WO2021000319A1 - 保障终端安全的方法、装置以及系统 - Google Patents

保障终端安全的方法、装置以及系统 Download PDF

Info

Publication number
WO2021000319A1
WO2021000319A1 PCT/CN2019/094708 CN2019094708W WO2021000319A1 WO 2021000319 A1 WO2021000319 A1 WO 2021000319A1 CN 2019094708 W CN2019094708 W CN 2019094708W WO 2021000319 A1 WO2021000319 A1 WO 2021000319A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
sim
user identity
identity information
information corresponding
Prior art date
Application number
PCT/CN2019/094708
Other languages
English (en)
French (fr)
Inventor
吴更石
欧阳晓宇
铁晓磊
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to CN201980096704.4A priority Critical patent/CN113853779A/zh
Priority to PCT/CN2019/094708 priority patent/WO2021000319A1/zh
Publication of WO2021000319A1 publication Critical patent/WO2021000319A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M11/00Telephonic communication systems specially adapted for combination with other electrical systems
    • H04M11/04Telephonic communication systems specially adapted for combination with other electrical systems with alarm systems, e.g. fire, police or burglar alarm systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements

Definitions

  • This application relates to the field of communication technology, and in particular to a method, device, and system for ensuring terminal security.
  • the functions of the terminal become more intelligent and enriched, more and more personal privacy data are bound to the terminal, such as a personal bank card bound to the payment function, and ensuring the security of the terminal has gradually become an important requirement of users.
  • SIM subscriber identity module
  • the person who illegally possesses the terminal can also change the original SIM card of the terminal to obtain the normal communication function of the terminal, such as normal data communication. It is even possible to browse the information stored in the terminal, and use various applications installed on the terminal normally, which poses privacy leakage and financial security issues.
  • This application provides a method, device, and system for ensuring terminal security, which are used to retrieve the terminal after it is lost, and to protect the privacy of user information in the terminal.
  • a wireless communication device which may be a complete computing device. It can also be part of the computing device, such as chips related to wireless communication functions, such as system chips, communication chips, or radio frequency chips. Among them, the system chip is also called system-on-chip, or SoC chip.
  • the wireless communication device may be a terminal such as a smart phone, a system chip or a communication chip that can be set in the terminal, or an independent functional chip.
  • the communication chip may include one or more of a radio frequency processing chip and a baseband processing chip.
  • the baseband processing chip is sometimes called a modem (modem) or baseband processor.
  • the communication chip or the independent functional chip can be integrated inside the SoC chip or not integrated with the SoC chip.
  • the baseband processing chip is integrated in the SoC chip, and the radio frequency processing chip is not integrated with the SoC chip.
  • the embodiments of the present application provide a method for ensuring the security of a terminal.
  • the terminal supports a first user identification module SIM and a second SIM.
  • the method includes: through narrowband internet of things (NB-IoT)
  • the communication receives the positioning information request message for the terminal; in response to the positioning information request message for the terminal, the positioning information of the terminal is sent through NB-IoT communication; where the first SIM is used for NB-IoT communication, and the second SIM is used for Cellular network communication other than NB-IoT communication.
  • NB-IoT narrowband internet of things
  • a legitimate user of the terminal can directly trigger the terminal to report positioning information through the cloud, so that the user can determine the location of the terminal.
  • a user who legally holds a terminal can register an account with the server in advance and bind it to the terminal.
  • the user needs to determine the location of the terminal he logs into the security center server through the previously registered user identity information (such as account name and password), and triggers the terminal to report location information.
  • the user identity information corresponding to the second SIM is determined; when the user identity information corresponding to the second SIM changes, the second SIM is sent through NB-IoT communication The corresponding user identity information.
  • the embodiments of the present application provide a method for ensuring the security of a terminal.
  • the terminal supports a first user identification module SIM and a second SIM.
  • the method includes: determining user identity information corresponding to the second SIM; When the user identity information of the user changes, the positioning information of the terminal is sent through narrowband Internet of Things NB-IoT communication; among them, the first SIM is used for NB-IoT communication, and the second SIM is used for cellular network communication other than NB-IoT communication.
  • the first SIM is bound to NB-IoT communication
  • the second SIM is used for cellular network communication other than NB-IoT communication, such as long-term evolution (LTE) communication, new air interface (new radio, NR) communication, etc.
  • the user identity information corresponding to the second SIM includes one of the international mobile subscriber identification number (IMSI), the integrated services digital network (ISDN) number of the mobile subscriber, or the mobile phone number of the second SIM. Multiple.
  • IMSI international mobile subscriber identification number
  • ISDN integrated services digital network
  • the first SIM of the terminal is an embedded subscriber identification module (ESIM), a software SIM (soft SIM), or a virtual SIM (virtual SIM, vSIM), which can be set at the factory and is difficult to change .
  • ESIM embedded subscriber identification module
  • software SIM software SIM
  • virtual SIM virtual SIM, vSIM
  • the second SIM may correspond to a physical SIM card in the terminal, or may correspond to a virtual SIM or a software SIM in the terminal.
  • the user identity information corresponding to the second SIM can be used to determine whether the user identity of the terminal has changed.
  • the second SIM as a physical SIM card
  • the physical SIM card used for cellular network communication other than NB-IoT communication when the physical SIM card used for cellular network communication other than NB-IoT communication is unplugged, it can be found through the SIM circuit that the physical SIM card is unplugged, and the second SIM The corresponding user identity information cannot be read, and it can be considered that the user identity information corresponding to the second SIM has changed.
  • the physical SIM card is replaced with another physical SIM card, it is found that the user identity information corresponding to the second SIM becomes the identity information of other users.
  • the user identity information corresponding to the virtual SIM or the software SIM is replaced with new user identity information, and the software code can detect that the user identity information corresponding to the second SIM has changed.
  • the location information of the terminal can still be reported through NB-IoT communication, so that the user can track and find Back to the terminal.
  • the terminal can also communicate normally through NB-IoT communication, effectively avoiding the situation that the terminal cannot report positioning information due to insufficient power consumption; and because NB-IoT communication has the advantage of wide coverage , Thereby effectively increasing the area where the terminal communicates through NB-IoT, avoiding the situation that the communication cannot be performed normally due to insufficient network coverage; and because NB-IoT communication has the advantage of low traffic, it makes communication through NB-IoT Sending positioning information can effectively reduce communication traffic.
  • the terminal when the user identity information corresponding to the second SIM changes, the terminal is disabled Cellular network communication functions other than NB-IoT.
  • the cellular network communication functions other than NB-IoT of the terminal are disabled, the cellular network communication functions other than NB-IoT are stopped, so that the terminal cannot perform normal data communication functions, such as making/receiving calls, Sending/receiving short messages, etc. can prevent those who illegally possess the terminal from using the terminal for data communication.
  • the terminal when the user identity information corresponding to the second SIM changes, the terminal is disabled The short-distance communication function.
  • the short-distance communication function may include one or more of communication functions such as Bluetooth communication, wireless fidelity (WiFi) communication, ZigBee (ZigBee), and ultra wideband (UWB) communication.
  • Bluetooth wireless fidelity
  • WiFi wireless fidelity
  • ZigBee ZigBee
  • UWB ultra wideband
  • the user identity information corresponding to the second SIM is changed including: The user identity information is different from the user identity information corresponding to the previous second SIM.
  • the user identity information corresponding to the second SIM can be periodically detected, and the user identity information corresponding to the second SIM detected in the current cycle can be compared with the user identity information detected in the previous cycle.
  • the detected user identity information corresponding to the second SIM is different from the previously detected user identity information, and it is determined that the user identity information corresponding to the second SIM has changed.
  • the terminal can send the terminal's positioning information through NB-IoT communication. So that the user can track and retrieve the terminal.
  • the user identity information corresponding to the second SIM is changed including: The user identity information is inconsistent with the user identity information bound to the terminal; among them, the user identity information bound to the terminal is downloaded through NB-IoT communication.
  • the terminal user can bind the terminal with previously registered user identity information, for example, bind the user's mobile phone number registered on the Internet with the terminal. If the mobile phone number is different from the mobile phone number corresponding to the current second SIM of the terminal, it is determined that the user of the terminal has changed.
  • the server can instruct the user currently using the terminal to upload the security authentication information to the server.
  • the server can compare the pre-stored security authentication information with the security authentication information currently sent by the terminal. If they are consistent, the user currently using the terminal is legal
  • the server can send user identity information to the terminal through NB-IoT communication, and the terminal determines that the user identity information downloaded by the NB-IoT communication and sent by the server is the user identity information bound to the terminal;
  • the security authentication information may be at least one of face information, fingerprint information, iris information, voice information, password information, or ID card information.
  • the terminal determines that the user identity information corresponding to the second SIM is inconsistent with the user identity information bound to the terminal, it indicates that the user currently using the terminal is an illegal user.
  • the terminal can send the terminal's location information through NB-IoT communication. So that the user can track and retrieve the terminal.
  • the positioning information is directly obtained through the receiver included in the terminal, for example, the positioning information comes from the terminal At least one of the global positioning system (GPS) receiver, Beidou satellite navigation system receiver, or global navigation satellite system (GNSS) receiver.
  • GPS global positioning system
  • GNSS global navigation satellite system
  • the information used for positioning can be obtained, and the terminal processes the information used for positioning to Obtain positioning information, where the information used for positioning may be at least one of WIFI information of the terminal, assisted global positioning system (AGPS) information, or Bluetooth information.
  • AGPS assisted global positioning system
  • the method further includes: sending the terminal corresponding to the second SIM through NB-IoT communication The latest user identity information.
  • the terminal can obtain the latest user identity information corresponding to the second SIM, and the terminal reports the latest user identity information corresponding to the second SIM to the server through NB-IoT communication.
  • the terminal when the terminal detects that the user identity information corresponding to the second SIM has changed, it means that the person who illegally holds the terminal inserts his legally used user identification module card into the terminal, which effectively guarantees the safety of the terminal and facilitates Determine the identity of the person who illegally holds the terminal, the terminal can automatically report the latest user identity information used by the person who illegally holds the terminal to the server, so that the latest user identity information of the person who illegally holds the terminal can be quickly and accurately determined Its identity improves the efficiency of retrieving the terminal.
  • the method further includes: deleting user privacy data of the terminal.
  • the module that can store user privacy data can delete the user privacy data; wherein, the user privacy data is at least one of the following: user call record data, SMS data, image data, video data, contact data or notebook data, etc.
  • the terminal determines that the user identity information corresponding to the second SIM has changed, it can be determined that the terminal is in an insecure state, and the terminal can enable the module that stores user privacy data to delete user privacy data, which effectively avoids The leakage of user privacy data stored in the terminal ensures the security of the user privacy data stored in the terminal.
  • an embodiment of the present application provides a method for ensuring terminal security, and the method includes:
  • a positioning information request message for the terminal is sent through the narrowband Internet of Things NB-IoT;
  • the user can pre-register the user identity information and bind it to the terminal, and only when the user identity information of the terminal is verified on the server side, the user is considered as a legitimate user. Only then trigger the terminal to report the positioning information and receive the positioning information from the terminal to avoid illegal tracking of the user of the terminal.
  • an embodiment of the present application provides a device, which is applied inside a terminal, or the device is a terminal, and the terminal supports a first subscriber identity module SIM and a second SIM, and the device includes:
  • the receiving unit, the processing unit, and the sending unit are used to receive the positioning information request message for the terminal through narrowband Internet of Things NB-IoT communication; the processing unit is used to respond to the positioning information request message for the terminal to make The transmitting unit transmits the positioning information of the terminal through NB-IoT communication; wherein the first SIM is used for NB-IoT communication, and the second SIM is used for cellular network communication other than NB-IoT communication.
  • the processing unit is further used to determine the user identity information corresponding to the second SIM; the sending unit is also used to generate the user identity information corresponding to the second SIM When changing, the terminal's positioning information is sent through narrowband IoT NB-IoT communication.
  • the embodiments of the present application provide a device, which is applied inside a terminal, or, the device is a terminal, and the terminal supports a first subscriber identification module SIM and a second SIM, and the device includes:
  • the processing unit is used to determine the user identity information corresponding to the second SIM; the sending unit is used to send the location information of the terminal through narrowband Internet of Things NB-IoT communication when the user identity information corresponding to the second SIM changes;
  • One SIM is used for NB-IoT communication, and the second SIM is used for cellular network communication other than NB-IoT.
  • the processing unit is further configured to change the user identity information corresponding to the second SIM , Disable the cellular network communication function of the terminal except NB-IoT.
  • the second SIM is a physical SIM
  • the processing unit is used for the slave terminal of the second SIM When the card slot is pulled out, it is determined that the user identity information corresponding to the second SIM has changed.
  • the processing unit is configured to compare the user identity information corresponding to the second SIM with the previous one. When the user identity information corresponding to the two SIMs are different, it is determined that the user identity information corresponding to the second SIM has changed.
  • the processing unit is configured to bind the user identity information corresponding to the second SIM with the terminal When the user identity information is inconsistent, it is determined that the user identity information corresponding to the second SIM has changed; wherein, the user identity information bound to the terminal is downloaded through NB-IoT communication.
  • the user identity information includes one or more of the International Mobile Subscriber Identity Code IMSI, the ISDN number of the Integrated Service Digital Network for Mobile Subscribers, and the mobile phone number of the second SIM.
  • the positioning information comes from the global positioning system GPS receiver of the terminal.
  • the processing unit is further configured to perform according to the terminal's wireless fidelity WIFI information and/or assistance The global satellite positioning system AGPS information is confirmed.
  • the sending unit is further configured to send the second SIM corresponding to the terminal through NB-IoT communication The latest user identity information of.
  • the processing unit is further configured to enable the terminal to delete user privacy data of the terminal.
  • an embodiment of the present application provides a server, including:
  • the processing unit is used to verify the user identity information of the terminal
  • the sending unit is used to send a positioning information request message for the terminal through the narrowband Internet of Things NB-IoT when the user identity information of the terminal is verified;
  • the receiving unit is used to receive positioning information from the terminal.
  • the embodiments of the present invention provide a computer program product, which is used to execute the communication method executed by the aforementioned terminal when the computer program product is executed.
  • an embodiment of the present invention provides a computer-readable storage medium, where instructions are stored in the computer-readable storage medium, and the instructions are used to execute the communication method executed by the foregoing terminal.
  • an embodiment of the present application provides a communication system, including the device in any aspect of the third aspect or the fourth solution and optional implementation manners, and a wireless communication device.
  • FIG. 1 is a structural example diagram of a communication system provided by an embodiment of this application.
  • FIG. 2 is an example flow chart of a method for ensuring terminal security provided by an embodiment of the application
  • FIG. 3 is an example flow chart of another method for ensuring terminal security according to an embodiment of the application.
  • FIG. 4 is an example flow chart of another method for guaranteeing terminal security provided by an embodiment of the application.
  • FIG. 5 is an example flow chart of another method for ensuring terminal security according to an embodiment of the application.
  • FIG. 6 is a diagram of another example structure of a communication system provided by an embodiment of this application.
  • FIG. 7 is an example flow chart of another method for ensuring terminal security provided by an embodiment of this application.
  • FIG. 8 is a structural example diagram of a communication device provided by an embodiment of the application.
  • FIG. 9 is a diagram of another example structure of a communication device provided by an embodiment of the application.
  • FIG. 10 is a structural example diagram of a server provided by an embodiment of the application.
  • FIG. 11 is a diagram of an example structure of a terminal provided by an embodiment of the application.
  • This application provides a method, device, and system for ensuring terminal security, which are used to retrieve the terminal after it is lost, and to protect the privacy of user information in the terminal.
  • the embodiments of the present application will be described below in conjunction with the drawings.
  • the communication system shown in this embodiment includes a communication device 101 and a terminal 102.
  • the communication device 101 shown in this embodiment may be any type of equipment with wireless transceiving function managed by an operator.
  • the communication device 101 shown in this embodiment may be a base station, and the base station may be a macro base station.
  • Micro base stations, pico base stations, small stations, relay stations, etc. are not specifically limited in this embodiment. This embodiment does not limit the specific number of the communication devices 101.
  • the communication system also includes a security center server 103 with communication functions.
  • the security center server 103 can be operated by a third party and can be used to store private data such as user identity information and terminal location information. .
  • the function of the security center server 103 may also be realized by the communication device 101, which is not specifically limited in this application.
  • the communication system provided by the embodiments of the present application can be applied to various communication systems, such as a fifth generation (5 Generation, 5G) communication system, NR, LTE communication, and so on.
  • 5G fifth generation
  • the communication system can also be applied to future-oriented communication technologies, all of which are applicable to the technical solutions provided in the embodiments of the present application.
  • the system architecture and business scenarios described in the embodiments of this application are intended to illustrate the technical solutions of the embodiments of this application more clearly, and do not constitute a limitation on the communication devices provided in the embodiments of this application.
  • Those of ordinary skill in the art will know that with the network With the evolution of architecture and the emergence of new business scenarios, the communication device provided in the embodiments of the present application is equally applicable to similar technical problems.
  • the terminal 102 shown in this embodiment also referred to as user equipment (UE), mobile station (MS), terminal (mobile terminal, MT), etc., is a way to provide users with voice and/or Devices with data connectivity, for example, handheld devices with wireless connection capabilities, vehicle-mounted devices, etc.
  • UE user equipment
  • MS mobile station
  • MT mobile terminal
  • voice and/or Devices with data connectivity for example, handheld devices with wireless connection capabilities, vehicle-mounted devices, etc.
  • terminals are: mobile phones (mobile phones), tablets, notebook computers, palmtop computers, mobile internet devices (MID), wearable devices, virtual reality (VR) devices, and augmented reality (augmented reality, AR) equipment, wireless terminals in industrial control, wireless terminals in self-driving (self-driving), wireless terminals in remote medical surgery, and smart grid (smart grid)
  • the process of the method for ensuring terminal security provided by this application is exemplified: it should be noted that the steps are numbered in the following method embodiments It is just an example to describe the method for ensuring terminal security provided in this application more clearly, and does not limit the terminal’s need to take the same number of steps to complete the method for ensuring terminal security.
  • the terminal executes the method of ensuring terminal security. In the method, more steps can be performed than in the following embodiments or some steps can be omitted. As long as the method of ensuring the security of the terminal is completed according to the technical idea provided by this application, that is, the steps shown in FIG. It is not all necessary for the terminal to execute the method to ensure the security of the terminal.
  • the method provided in the embodiments of the present application may be executed by a wireless communication device, which may be a terminal or a chip applied in the terminal.
  • a wireless communication device which may be a terminal or a chip applied in the terminal.
  • the terminal is taken as an example below.
  • FIG. 2 is a step flowchart of an embodiment of the method for ensuring terminal security provided by the present application.
  • Step 201 The terminal determines user identity information corresponding to the second SIM.
  • the terminal shown in this embodiment supports a first SIM and a second SIM, where the first SIM is used for NB-IoT communication, and the second SIM is used for cellular network communication other than the NB-IoT communication.
  • the user identity information corresponding to the second SIM includes one or more of IMSI, ISDN number, and mobile phone number of the second SIM.
  • the aforementioned user identity information can be used for terminals to communicate via cellular networks other than NB-IoT to distinguish messages from different users.
  • the user identity information corresponding to the second SIM can be further expanded.
  • the user identity information can also be a verification key (Ki), a location area identity (LAI), and a temporary mobile user identification.
  • Ki verification key
  • LAI location area identity
  • a temporary mobile user identification One or more of a code (international mobile subscriber identity, TMSI), a prohibited public telephone network code, a personal identification number (PIN), an unlock code (PUK), or payment information.
  • TMSI international mobile subscriber identity
  • PIN personal identification number
  • PAK unlock code
  • the payment information is used to indicate whether the related service of the first SIM is successfully subscribed.
  • the first SIM shown in this embodiment may be an embedded subscriber identification module (ESIM), a software SIM (soft SIM), or a virtual SIM (virtual SIM, vSIM), that is, the first SIM It is installed in the terminal in the form of software or embedded hardware, which is difficult to change.
  • ESIM embedded subscriber identification module
  • software SIM soft SIM
  • virtual SIM virtual SIM
  • vSIM virtual SIM
  • the second SIM may correspond to a physical SIM card in the terminal, or may correspond to a virtual SIM or a software SIM in the terminal.
  • the second SIM is a physical SIM
  • the user identity information corresponding to the second SIM can be read through the SIM interface circuit.
  • the second SIM is a virtual SIM or a software SIM
  • the user identity information corresponding to the second SIM in the corresponding memory can be read through the processor interface circuit.
  • this embodiment takes the first SIM as a software SIM and the second SIM as a physical SIM card, that is, the second SIM shown in this embodiment is inserted into the card slot of the terminal as an example for illustrative description:
  • Step 202 The terminal determines that the user identity information corresponding to the second SIM has changed.
  • the terminal When the second SIM is removed from the card slot of the terminal, the terminal cannot read the user identity information corresponding to the second SIM through the pins in the card slot, and it can be considered that the user identity information corresponding to the second SIM has changed.
  • the user identity information obtained by the terminal through the pins of the card slot becomes another physical SIM card The corresponding user identity information.
  • the terminal can periodically detect the user identity information corresponding to the second SIM through the pins of the card slot, and compare the user identity information corresponding to the second SIM detected in the current cycle with the user identity information detected in the previous cycle If the user identity information corresponding to the second SIM detected in the current cycle is different from the previously detected user identity information, it is determined that the user identity information corresponding to the second SIM has changed.
  • the terminal determines that the user identity information corresponding to the second SIM is inconsistent with the user identity information bound to the terminal, determine that the user identity information corresponding to the second SIM has changed;
  • the security center server can instruct the user currently using the terminal to upload the security certification information to the security center server, and the security center server can compare the pre-stored security certification information with the security certification information currently sent by the terminal. If they are consistent, it means The user currently using the terminal is a legitimate user.
  • the security center server can send user identity information to the terminal through NB-IoT communication, and the terminal determines that the user identity information downloaded through NB-IoT communication is the user identity information bound to the terminal; among them,
  • the security authentication information may be at least one of face information, fingerprint information, iris information, voice information, password information, or ID card information.
  • the user identity information corresponding to the second SIM can be read from the module storing the second SIM through the interface circuit, and if the processor determines that the user identity information corresponding to the second SIM is replaced If new user identity information is generated, it is determined that the user identity information corresponding to the second SIM has changed.
  • Step 203 The terminal sends the location information of the terminal to the security center server through NB-IoT communication.
  • the terminal can send the terminal's location information to the security center server through NB-IoT communication. It should be clarified that, in this embodiment, the terminal sends positioning information to the security center server as an example for illustrative description, as long as the terminal can send the positioning information to any server through NB-IoT communication.
  • the first SIM shown in this embodiment is not a physical SIM in the form of physical hardware. Therefore, the user cannot perform operations such as replacing the physical SIM card, removing the card, or destroying the first SIM in the form of software.
  • the terminal can communicate with the first SIM.
  • the SIM-bound NB-IoT communication reports the terminal's location information to the security center server, so that the user can track and retrieve the terminal.
  • the following describes several optional ways for the terminal to send the terminal's location information to the security center server. :
  • the terminal can directly send positioning information to the security center server through NB-IoT communication.
  • the terminal can send positioning information to the communication device through NB-IoT communication, and the communication device forwards the positioning information to the security center server.
  • the terminal sends the location information to the security center server, and the security center server receives and stores the location information for users to query the location information stored in the security center server as an example.
  • the communication device receives and stores the location information. Take the location information stored in the communication device for the user as an example, that is, in this example, the terminal sends the location information to the communication device.
  • NB-IoT communication has the following characteristics: First, wide coverage. In the same frequency band, NB-IoT has a gain of 20dB compared to the existing network, which is equivalent to increasing the capacity of the coverage area by 100 times.
  • the terminal supports NB-IoT communication. It can effectively increase the range of terminal communication; the second is the ability to support massive connections.
  • One sector of NB-IoT can support 100,000 connections, supporting low latency sensitivity, ultra-low equipment cost, and low equipment power consumption.
  • optimized network architecture the third is lower power consumption, and the terminal supporting NB-IoT communication can support up to 10 years of standby time.
  • the terminal's positioning information can be reported through NB-IoT communication, thereby effectively reducing the terminal's ability to report positioning information. If the terminal power consumption is insufficient, cellular networks other than the NB-IoT communication cannot be performed. In the case of communication, the terminal can also report positioning information through NB-IoT communication; and because NB-IoT communication has the advantage of wide coverage, it effectively increases the area for the terminal to report positioning information through NB-IoT communication, avoiding The situation where the positioning information cannot be reported due to insufficient communication coverage; and because NB-IoT communication has the advantage of low traffic, the communication traffic can be effectively reduced through NB-IoT communication.
  • the characteristics of power consumption even if the terminal is in a lost state, the person who illegally possesses the terminal shuts down the terminal.
  • the terminal still has the ability to report positioning information based on NB-IoT communication, which ensures that the terminal can still be turned off. Positioning function.
  • Step 301 The terminal determines the user identity information corresponding to the second SIM.
  • Step 302 The terminal determines that the user identity information corresponding to the second SIM has changed.
  • Step 303 The terminal sends location information of the terminal to the security center server through NB-IoT communication.
  • step 301 to step 303 shown in this embodiment please refer to step 201 to step 203 shown in FIG. 2 for details, and the specific execution process will not be repeated in this embodiment.
  • Step 304 The terminal disables the cellular network communication function of the terminal except NB-IoT.
  • the terminal when the terminal determines that the user identity information corresponding to the second SIM has changed, the terminal can disable the cellular network communication functions of the terminal other than the NB-IoT, so that the terminal cannot perform normally It has normal data communication functions such as making/receiving calls, sending/receiving text messages, etc.
  • the terminal at this time can report positioning information through NB-IoT communication, which is convenient for positioning the terminal, improves the security of the terminal and can avoid illegal The person who owns the terminal uses the terminal for data communication.
  • the terminal shown in this embodiment may also disable the short-distance communication function of the terminal when the user identity information corresponding to the second SIM changes.
  • the short-distance communication may be Bluetooth communication or WiFi communication.
  • ZigBee ZigBee
  • UWB ultra-wideband
  • step 303 there is no restriction on the execution sequence between step 303 and step 304.
  • Step 305 The terminal deletes user privacy data of the terminal.
  • the target module when the terminal detects that the user identity information corresponding to the second SIM has changed, the target module can be enabled to delete user privacy data, where the target module is a module that has stored user privacy data.
  • the process for the terminal to enable the target module to delete the user's private data may be sending deletion instruction information to the target module, where the deletion instruction information is used to instruct the target module to delete the user's private data.
  • the user privacy data is at least one of the following items: user call record data, short message data, image data, video data, contact data, or notepad data, etc.
  • the terminal determines that the user identity information corresponding to the second SIM has changed, it can be determined that the terminal is in an insecure state, and the terminal can enable the target module to delete user privacy data, effectively avoiding the storage of the terminal.
  • the leakage of user privacy data ensures the security of user privacy data stored in the terminal.
  • the target module is a secure element
  • the secure element when the secure element receives the deletion instruction information, the secure element can delete the locally stored secure data, such as bank account data, security authentication data, etc.
  • the target module is an application processor
  • the application processor when the application processor receives the deletion instruction information, the application processor can delete the locally stored data and the running application. If the WeChat is deleted
  • the application program makes it impossible for people who illegally occupy the terminal to check the information such as contacts, chat records, and payment status displayed on WeChat, which effectively guarantees the security of user privacy data stored in the terminal.
  • the wireless communication device used to execute the above process has the highest priority in the terminal, so that the wireless communication device can send deletion indication information to the target module, where the highest control priority refers to:
  • the wireless communication device has the authority to control the target module in the terminal, and the wireless communication device is used to perform the function of reporting positioning information through NB-IoT communication; specifically, through the highest control priority, the wireless communication device can control the execution of the target module
  • the highest control priority also means that the target module does not have the authority to control the wireless communication device, that is, the target module cannot stop the operation of the wireless communication device, cannot obtain the information stored by the wireless communication device, and cannot delete the information stored by the wireless communication device. Etc., where the function implemented by the wireless communication device is different from the function implemented by the target module.
  • the wireless communication device can control the target module as needed, but the target module cannot control the wireless communication device, so that when the terminal is in a lost state, People who illegally possess the terminal cannot control the wireless communication device through the target module, thereby improving the security of the wireless communication device.
  • step 303 there is no restriction on the execution sequence between step 303, step 304, and step 305.
  • Step 306 The terminal sends the latest user identity information corresponding to the second SIM to the security center server through NB-IoT communication.
  • the terminal when the terminal determines that the user identity information corresponding to the second SIM has changed, the terminal can obtain the latest user identity information corresponding to the second SIM, and the terminal communicates the latest user identity information corresponding to the second SIM through NB-IoT communication. Report to the security center server.
  • the terminal when the terminal detects that the user identity information corresponding to the second SIM has changed, it means that the person who illegally holds the terminal inserts his legally used user identification module card into the terminal, which effectively protects the security of the terminal and facilitates Determine the identity of the person holding the terminal illegally, the terminal can automatically report the latest user identity information used by the person holding the terminal illegally to the security center server, so that the latest user identity information of the person holding the terminal illegally can be quickly and accurately Identifying its identity improves the efficiency of retrieving the terminal.
  • step 303 there is no restriction on the execution sequence between step 303, step 304, step 305, and step 306.
  • Step 401 The terminal determines user identity information corresponding to the second SIM.
  • Step 402 The terminal determines that the user identity information corresponding to the second SIM has changed.
  • Step 403 The terminal obtains positioning information.
  • the terminal can directly obtain positioning information through a locator, where the locator can be a GPS receiver, a Beidou satellite navigation system receiver, or a global navigation satellite system (GNSS) receiver. At least one.
  • a locator can be a GPS receiver, a Beidou satellite navigation system receiver, or a global navigation satellite system (GNSS) receiver. At least one.
  • GNSS global navigation satellite system
  • the terminal may obtain information used for positioning, and perform processing based on the information used for positioning to obtain positioning information.
  • the information used for positioning can be the auxiliary global satellite positioning system AGPS information, where AGPS is an operating mode for GPS positioning with certain assistance. It can use the signal of the base station to cooperate with the GPS satellite signal to allow The positioning speed of the terminal is faster; in this example, the terminal assists the GPS receiver to complete ranging and positioning services through AGPS information.
  • the information used for positioning can be WiFi information.
  • each WiFi access point has a globally unique media access control address (MAC)
  • MAC media access control address
  • the terminal when the terminal turns on WiFi You can scan and collect the broadcast signals of the surrounding WiFi access points, so you can obtain the MAC addresses broadcast by the WiFi access points; the terminal sends these data (such as MAC addresses) that can identify the WiFi access points through the wireless communication network
  • the location server retrieves the geographic location of each WiFi access point, and combines the strength of the WiFi broadcast signal to calculate the location information of the terminal and send it to the terminal.
  • the information used for positioning is an optional example and is not limited.
  • the information used for positioning may also be Bluetooth positioning information.
  • This embodiment does not limit the execution timing between step 402 and step 403.
  • Step 404 The terminal sends the location information of the terminal to the security center server through NB-IoT communication.
  • step 404 shown in this embodiment please refer to step 203 shown in FIG. 2 for details, and details are not repeated in this embodiment.
  • Step 501 The terminal receives a positioning information request message for the terminal through NB-IoT communication.
  • the user when the user is unable to find the terminal, in order to facilitate the user to retrieve the terminal, the current location of the terminal needs to be located.
  • the user can use a personal computer (PC) side or another legal terminal.
  • the terminal and other devices held by the user log in to the security center server through the registered account ID and password, and the user sends a positioning information request message to the terminal through the security center server through NB-IoT communication.
  • the user is on the PC side. Log in to the security center server as an example to illustrate.
  • Step 502 The terminal obtains positioning information according to the positioning information request message.
  • the terminal When the terminal receives the positioning information request message, the terminal obtains the positioning information of the terminal in response to the terminal positioning information request message, where the terminal obtains the positioning information for specific instructions, please refer to the above embodiment for details. Details are not described in this embodiment.
  • Step 503 The terminal sends the location information of the terminal to the security center server through NB-IoT communication.
  • the terminal can send the positioning information of the terminal through NB-IoT communication.
  • step 503 For the specific execution process of step 503 shown in this embodiment, please refer to step 203 shown in FIG. 2 for details, and the specific execution process will not be repeated in this embodiment.
  • the security center server when the security center server receives the location information of the terminal, the security center server can send the location information to the PC where the user enters the account ID and password, and the PC can display the location sent by the security center server Information, the user can determine the current location of the terminal by viewing the location information displayed on the PC, and realize the tracking and positioning of the terminal, which is convenient for the user to retrieve the terminal based on the current location of the terminal, and effectively avoids the loss of the terminal.
  • Step 701 The terminal downloads related information of the first SIM from the communication device.
  • the user 600 can purchase the terminal 602 through the online shopping mall 601.
  • the user 600 holds the terminal 602, in order to implement the method for ensuring the security of the terminal shown in this application, the user needs The download of the first SIM is completed through the terminal 602.
  • the user 600 enables the terminal 602 to download related information of the first SIM from the communication device 601 managed by the operator through NB-IoT.
  • the related information of the first SIM includes one or more of IMSI, ISDN number, Ki, LAI, PIN, key, or PUK of the first SIM.
  • the communication device 601 may verify the user 600 who currently requests to download the related information of the first SIM. For example, the communication device 601 instructs the current terminal 602 to be used. The user 600 uploads the security authentication information to the communication device 601. The communication device 601 can compare the locally pre-stored security authentication information with the security authentication information currently sent by the terminal 602. If they are consistent, it means that the current terminal 602 is used. The user 600 is a legitimate user, and the communication device 601 can send the relevant information of the first SIM to the terminal 602. If they are inconsistent, it means that the user 600 currently using the terminal 602 is an illegal user, and the communication device 601 does not use the first SIM. The relevant information of is sent to the terminal 602. For a specific description of the security authentication information, refer to the above-mentioned embodiment, which is not described in detail in this embodiment.
  • Step 702 The terminal sends a first request message to the communication device.
  • the terminal 602 in the case that the terminal 602 successfully downloads the related information of the first SIM, the terminal 602 needs to perform the activation operation of the first SIM in order to realize the communication through NB-IoT, which is specifically described as follows:
  • the terminal 602 shown in this embodiment successfully obtains the related information of the first SIM, the terminal 602 can also read the key from the related information of the first SIM, and use the read key to pair the first SIM.
  • the IMSI of a SIM is encrypted to generate the first request message. This embodiment does not limit the first request message, as long as the first request message has a one-to-one correspondence with the first SIM.
  • the terminal 602 sends the first request message to the communication device 603 through NB-IoT communication.
  • Step 703 The communication device sends a first notification message to the terminal.
  • the communication device 603 decrypts the received first request message to obtain IMSI and other information.
  • This embodiment does not limit how the communication device 603 specifically judges that the terminal has the right to communicate through NB-IoT.
  • the communication device 603 may pre-store a white list, the white list including IMSIs with the communication authority through NB-IoT, when the communication device 603 receives the first request message sent by the terminal 602, the communication device 603 It can be determined whether the IMSI included in the first request message is in the white list, and if it is determined that the IMSI is in the white list, the communication device 603 can send the first notification information to the terminal.
  • the communication device may send the first notification information to the terminal 602 through NB-IoT communication.
  • the terminal 602 After the terminal 602 receives the first notification message and completes the activation operation of the first SIM, the terminal 602 has the right to communicate through NB-IoT.
  • steps 701 to 703 shown in this embodiment are optional steps. If the terminal already has the permission to communicate through NB-IoT, there is no need to perform steps 701 to step shown in this embodiment. 703.
  • Step 704 The terminal downloads related information of the second SIM from the communication device.
  • the terminal can download the related information of the second SIM from the communication device through NB-IoT communication.
  • the related information of the second SIM please refer to the description of the related information of the first SIM above, and the details will not be repeated.
  • Step 705 The terminal sends a second request message to the communication device.
  • the terminal 602 in the case that the terminal 602 successfully downloads the related information of the second SIM, the terminal 602 needs to activate the second SIM in order to realize communication through a cellular network other than NB-IoT. Operation, for the specific description of the activation operation of the second SIM, please refer to the description of the activation operation of the first SIM shown in step 702 above, and the details are not repeated here.
  • Step 706 The communication device sends a second notification message to the terminal.
  • the communication device 603 decrypts the received second request message to obtain IMSI and other information, and the communication device 603 determines whether the terminal that has sent the second request message can be used legally based on the stored subscription data. Please refer to step 705 for details. The details will not be repeated.
  • the communication device 603 determines that the terminal can be used legally, the communication device 603 sends the second notification information to the terminal, and the terminal receives the second notification information through NB-IoT. The notification information. After the terminal receives the second notification message, it completes the activation operation of the second SIM, and the terminal has the right to communicate through cellular networks other than NB-IoT.
  • steps 704 to 706 shown in this embodiment are optional steps. If the terminal already has the permission to communicate through NB-IoT, there is no need to perform steps 704 to step shown in this embodiment. 706.
  • Step 707 The terminal determines that the user identity information corresponding to the second SIM has changed.
  • Step 708 The terminal sends the location information of the terminal to the security center server through NB-IoT communication.
  • the terminal 602 can send positioning information to the security center server 604 when it determines that the user identity information corresponding to the second SIM has changed.
  • step 707 to step 708 shown in this embodiment, please refer to step 202 to step 203 shown in FIG. 2 for details, and details are not described in detail.
  • the terminal can activate the first SIM and the second SIM through NB-IoT communication, which effectively saves the power consumption of the terminal for activating the first SIM and the second SIM.
  • the scenarios shown in the foregoing embodiments are all scenarios of methods used by individuals to ensure terminal security.
  • the method provided in this application can also be applied to manufacturers, who can perform the above-mentioned correlation of the first SIM
  • For the downloading process of information please refer to the above for detailed instructions for downloading.
  • the manufacturer downloads the relevant information of the first SIM to the terminal 602, and after the execution, the request is sent through the NB -After the IoT communication authority process, the manufacturer can instruct the terminal 602 to report the location information of the terminal 602 periodically, so that the terminal 602 can periodically report the location information to the security center during the transportation of the terminal 602
  • the manufacturer realizes the purpose of tracking the logistics of the terminal 602 after leaving the factory by querying the security center server 604.
  • the unbinding process can be performed through the following steps. After unbinding, the terminal 602 will not The positioning information will be reported to the security center server 604, so that the leakage of the positioning information of the terminal 602 is avoided.
  • Step 709 The terminal sends an unbinding instruction message to the security center server.
  • the user 600 when the user 600 determines that the location of the terminal 602 does not need to be located, the user 600 can send an unbinding instruction message to the security center server 604 through the terminal 602, and the security center server 604 receives the unbinding instruction information In the case of, the security center server 604 will no longer send the location information to the terminal 602.
  • the security center server will not provide location information to users who have logged in to the security center server, but The security center server can retain location information, but can retain relevant information for the authority to extract.
  • the terminal 602 may pre-establish a binding relationship of user identity information corresponding to the first SIM and the second SIM, and establish in the terminal 602 In the case of the binding relationship of the user identity information corresponding to the first SIM and the second SIM, in the case that the terminal 602 determines that the user identity information has changed, the positioning information reporting procedure shown in the foregoing embodiment is executed. In this embodiment, if the terminal 602 receives the unbinding instruction message, the terminal will unbind the user identity information corresponding to the first SIM and the second SIM. Even if the user identity information has changed, the terminal 602 will not be The central server 604 reports location information, which effectively protects the privacy of users.
  • the method for ensuring the security of the terminal has been described in detail above with reference to FIGS. 2, 3, 4, 6 and 7.
  • the following describes the structure of the wireless communication device for executing the above method shown in FIG. 8.
  • the details will not be repeated; the wireless communication device is applied to the terminal, and the terminal supports the first SIM and the second SIM. Please refer to the above description for the description of the wireless communication device, and the details will not be repeated.
  • FIG. 8 is a schematic structural diagram of a wireless communication device 800 provided by an embodiment of the present application.
  • the wireless communication device 800 includes a processing unit 801 and a sending unit 802.
  • the processing unit 801 is configured to determine user identity information corresponding to the second SIM;
  • the sending unit 802 is used to send the positioning information of the terminal through NB-IoT communication when the user identity information corresponding to the second SIM changes; wherein, the first SIM is used for NB-IoT communication, and the second SIM is used for removing NB-IoT communication. Cellular network communication other than IoT.
  • the processing unit 801 is further configured to disable cellular network communication functions of the terminal other than NB-IoT when the user identity information corresponding to the second SIM changes.
  • the second SIM is a physical SIM
  • the processing unit 801 is configured to determine that the user identity information corresponding to the second SIM has changed when the second SIM is removed from the card slot of the terminal.
  • the processing unit 801 is configured to determine that the user identity information corresponding to the second SIM has changed when the user identity information corresponding to the second SIM is different from the user identity information corresponding to the previous second SIM.
  • the processing unit 801 is configured to determine that the user identity information corresponding to the second SIM has changed when the user identity information corresponding to the second SIM is inconsistent with the user identity information bound to the terminal; wherein, the user identity information bound to the terminal Download through NB-IoT communication.
  • the user identity information includes an international mobile subscriber identity code IMSI.
  • the user identity information includes an ISDN number of a mobile user integrated service digital network.
  • the positioning information comes from the global positioning system GPS receiver of the terminal.
  • the processing unit 801 is further configured to determine according to the wireless fidelity WIFI information of the terminal and/or the auxiliary global satellite positioning system AGPS information.
  • the sending unit 802 is further configured to send the latest user identity information corresponding to the second SIM of the terminal through NB-IoT communication.
  • processing unit 801 is further configured to enable the terminal to delete user privacy data of the terminal.
  • the functions implemented by the processing unit 801 and the sending unit 802 shown in this embodiment can be partially or fully realized by software.
  • the processing unit 801 and the sending unit 802 can be located in the same or different physical hardware devices in the terminal.
  • the example is not limited.
  • the following is an exemplary description of several optional setting methods of the processing unit 801 and the sending unit 802. It should be clear that the description of the setting methods of the processing unit 801 and the sending unit 802 in this embodiment is optional
  • the example of is not limited, as long as the processing unit 801 and the sending unit 802 can perform the above functions;
  • the wireless communication device 800 may be a terminal for executing the foregoing method embodiments.
  • the corresponding units included in the wireless communication device 800 are respectively used to execute corresponding operations and/or processing performed by the terminal in each method embodiment.
  • the sending unit 802 is a transceiver
  • the processing unit 801 may be a processor.
  • the transceiver has the function of sending and/or receiving, and the transceiver can also be replaced by a receiver and/or transmitter.
  • the wireless communication device 800 may be a chip or an integrated circuit.
  • the sending unit 802 may be a communication interface
  • the processing unit 801 may be a logic circuit.
  • the communication interface may be an input/output interface or a transceiver circuit.
  • the input and output interface may include an input interface and an output interface.
  • the transceiver circuit may include an input interface circuit and an output interface circuit.
  • the processing unit 801 can be partially or fully implemented by software.
  • the processing unit 801 may include a memory and a processor, where the memory is used to store a computer program, and the processor reads and executes the computer program stored in the memory to perform corresponding processing and/or steps in any method embodiment .
  • the processing unit 801 may only include a processor.
  • the memory for storing the computer program is located outside the processing unit 801, and the processor is connected to the memory through a circuit/wire to read and execute the computer program stored in the memory.
  • the functions of the processing unit 801 may be partially or fully implemented by hardware.
  • the processing unit 801 may include an input interface circuit, a logic circuit, and an output interface circuit.
  • the processing unit 801 is a baseband processor, and the sending unit 802 is an interface circuit of the baseband processor.
  • the baseband processor can read the user identity information corresponding to the second SIM through the interface circuit, for example, read the user identity information stored in the physical SIM card, or read the user identity information stored in the virtual SIM or the software SIM The relevant user identity information in the storage.
  • the baseband processor determines that the user identity information corresponding to the second SIM has changed, it sends the modulated positioning information of the terminal to a radio frequency intergrated circuit (RFIC) through the interface circuit, and it is upconverted and amplified through the RFIC Sent out by the antenna.
  • RFIC radio frequency intergrated circuit
  • the processing unit 801 is an application processor, and the sending unit 802 is an interface circuit of a baseband processor.
  • the application processor can read the user identity information corresponding to the second SIM through the interface circuit, for example, read user identity information stored in a physical SIM card, or read user identity information stored in a virtual SIM or a software SIM The relevant user identity information in the storage.
  • the application processor determines that the user identity information corresponding to the second SIM has changed, the modulated positioning information of the terminal is sent to the RFIC through the interface circuit of the baseband processor, and is upconverted and amplified by the RFIC and then sent out by the antenna.
  • the processing unit 801 is a secure element (SE), and the sending unit 802 is an interface circuit of a baseband processor.
  • SE secure element
  • the SE can read the user identity information corresponding to the second SIM through the interface circuit, for example, read the user identity information stored in the physical SIM card, or read the memory storing the user identity information in the virtual SIM or software SIM Related user identity information in
  • the modulated positioning information of the terminal is sent to the RFIC through the interface circuit of the baseband processor, and the RFIC is up-converted, amplified, and then sent out by the antenna.
  • the processing unit 801 may also be one or more field-programmable gate arrays (FPGA), application specific integrated circuit (ASIC), system on chip (SoC), central processing Central processor unit (CPU), network processor (NP), digital signal processor (DSP), microcontroller (microcontroller unit, MCU), programmable logic device (programmable logic device) , PLD) or other integrated chips, or any combination of the above chips or processors.
  • FPGA field-programmable gate arrays
  • ASIC application specific integrated circuit
  • SoC system on chip
  • CPU central processing Central processor unit
  • NP network processor
  • DSP digital signal processor
  • microcontroller microcontroller unit, MCU
  • programmable logic device programmable logic device
  • PLD programmable logic device
  • the processing unit 801 shown in any one of the above methods 2-7 can be coupled to a locator.
  • the processing unit 801 obtains the position through the locator
  • the location information is sent to the sending unit 802 shown in the above manner, and the sending unit 802 sends the location information.
  • the processing unit 801 shown in any of the foregoing manners 2-7 may include a locator, and the processing unit 801 sends the positioning information acquired by the locator to the sending unit 802, and the sending unit 802 sends the positioning information.
  • the sending unit 802 shown in any one of the foregoing manners 2-7 may be coupled with a locator, and the sending unit 802 may obtain positioning information through the locator to send the positioning information.
  • a chip can be specially designed, the chip can be provided with the processing unit 802 and/or the locator, and the first SIM in the form of software is provided inside the chip, and the chip is coupled with the baseband chip so that the chip can be used
  • the baseband chip can send positioning information to the security center server.
  • the chip shown in this embodiment can independently locate the terminal.
  • the chip includes a GPS locator, etc., and for example, the chip can process information used for positioning (as shown in the above embodiment). WIFI information) to obtain positioning information. It can be seen that the chip shown in this manner can independently obtain positioning information capable of positioning the terminal without relying on other chips inside the terminal.
  • the method for ensuring the security of the terminal is described in detail above in conjunction with FIG. 5.
  • the following describes the structure of the wireless communication device for performing the above method shown in FIG. 9.
  • the wireless communication device is applied to the terminal, and the terminal supports the first SIM and the second SIM.
  • the wireless communication device please refer to the above description, and the details are not repeated.
  • the wireless communication device 900 shown in this embodiment specifically includes:
  • the receiving unit 901 is configured to receive a positioning information request message for the terminal through narrowband Internet of Things NB-IoT communication;
  • the processing unit 902 is configured to enable the sending unit 903 to send the location information of the terminal through NB-IoT communication in response to the location information request message for the terminal; wherein, the first SIM is used for NB-IoT communication, and the second SIM is used for Cellular network communication other than NB-IoT communication;
  • the sending unit 903 is further configured to send the positioning information of the terminal through narrowband Internet of Things NB-IoT communication when the user identity information corresponding to the second SIM changes.
  • the processing unit 902 is configured to determine user identity information corresponding to the second SIM;
  • the sending unit 903 is further configured to send the positioning information of the terminal through narrowband Internet of Things NB-IoT communication when the user identity information corresponding to the second SIM changes;
  • the processing unit 902 is further configured to disable cellular network communication functions of the terminal other than NB-IoT when the user identity information corresponding to the second SIM changes.
  • the second SIM is a physical SIM
  • the processing unit 902 is configured to determine that the user identity information corresponding to the second SIM has changed when the second SIM is removed from the card slot of the terminal.
  • the processing unit 902 is configured to determine that the user identity information corresponding to the second SIM has changed when the user identity information corresponding to the second SIM is different from the user identity information corresponding to the previous second SIM.
  • the processing unit 902 is configured to determine that the user identity information corresponding to the second SIM has changed when the user identity information corresponding to the second SIM is inconsistent with the user identity information bound to the terminal; wherein, the user identity information bound to the terminal Download through NB-IoT communication.
  • the user identity information includes an international mobile subscriber identity code IMSI.
  • the user identity information includes an ISDN number of a mobile user integrated service digital network.
  • the positioning information comes from the global positioning system GPS receiver of the terminal.
  • the processing unit 902 is further configured to determine according to the wireless fidelity WIFI information of the terminal and/or the auxiliary global satellite positioning system AGPS information.
  • the sending unit 903 is further configured to send the latest user identity information corresponding to the second SIM of the terminal through NB-IoT communication.
  • processing unit 902 is further configured to enable the terminal to delete user privacy data of the terminal.
  • the functions implemented by the receiving unit 901, the processing unit 902, and the sending unit 903 shown in this embodiment can be partially or completely implemented by software, and the receiving unit 901, the processing unit 902, and the sending unit 903 can be located in the same or different entities in the terminal.
  • the hardware device it is not specifically limited in this embodiment.
  • the description of the setting methods of the receiving unit 901 and the sending unit 903 shown in this embodiment please refer to the description of the sending unit 802 shown in FIG. 8 and the processing unit 902.
  • the description of the setting mode please refer to the description of the processing unit 802 shown in FIG. 8 for details, and details are not repeated in this embodiment.
  • the method for ensuring the security of the terminal provided by the present application is described in detail above in conjunction with FIG. 5.
  • the following describes the structure of the security center server used to perform the method shown in FIG. 5 as shown in FIG. 10.
  • the security center server used to perform the method shown in FIG. 5 as shown in FIG. 10.
  • FIG. 5 For the specific description of the method for ensuring the security of the terminal performed by the security center server shown in this embodiment, please refer to the above-mentioned FIG. 5 for details. Show, do not repeat the details;
  • the security center server 1000 includes:
  • the processing unit 1001 is used to verify the user identity information of the terminal
  • the sending unit 1002 is configured to send a positioning information request message for the terminal through the narrowband Internet of Things NB-IoT when the user identity information of the terminal is verified;
  • the receiving unit 1003 is configured to receive positioning information from the terminal.
  • the functions implemented by the receiving unit 1003, the processing unit 1001, and the sending unit 1002 shown in this embodiment can be partly or completely implemented by software.
  • the receiving unit 1003, the processing unit 1001, and the sending unit 1002 can be located in the same or different security center servers. Within the physical hardware device, it is not specifically limited in this embodiment.
  • For the description of the setting method of the receiving unit 1003 and the sending unit 1002 shown in this embodiment please refer to the description of the sending unit 802 shown in FIG. 8 for details.
  • the description of the setting mode of the unit 1001 please refer to the description of the processing unit 802 shown in FIG. 8 for details, and details are not repeated in this embodiment.
  • this application also provides a terminal, which is described below with reference to FIG. 11.
  • the terminal 1100 includes a processor 1101, a transceiver 1102, and a memory 1103. Among them, the processor 1101, the transceiver 1102, and the memory 1103 can communicate with each other through an internal connection path to transfer control signals and/or data signals.
  • the memory 1103 is used to store computer programs, and the processor 1101 is used to call and run the computer programs from the memory 1103 to control the transceiver 1102 to send and receive signals.
  • the terminal 1100 may further include an antenna 1104.
  • the transceiver 1102 transmits or receives wireless signals through an antenna.
  • processor 1101 and the memory 1103 may be combined into one processing device, and the processor 1101 is configured to execute the program code stored in the memory 1103 to implement the foregoing functions.
  • the memory 1103 may also be integrated in the processor 1101.
  • the memory 1103 is independent of the processor 1101, that is, located outside the processor 1101.
  • the processor 1101 may be used to execute the actions described in the foregoing method embodiments that are implemented inside the terminal.
  • the transceiver 1102 may be used to perform receiving or sending actions performed by the terminal, and the memory 1103 is used to implement a storage function.
  • the memory 1103 may store the first SIM shown above.
  • processing and/or operations performed by the sending unit 802 shown in FIG. 8, the receiving unit 901 and the sending unit 903 shown in FIG. 9 may be implemented by the transceiver 1102.
  • the processing and/or operations performed by the processing unit 801 shown in FIG. 8 and the processing unit 902 shown in FIG. 9 may be implemented by the processor 1101 shown in FIG. 11.
  • the processor 1101 shown in FIG. 11 For details, please refer to the detailed description of the method embodiment, which will not be repeated here.
  • the terminal 1100 may further include a power supply 1105 for providing power to various devices or circuits in the terminal.
  • the terminal 1100 may further include one or more of an input unit 1106, a display unit 1107, an audio circuit 1108, a camera 1109, and a sensor 1110.
  • the audio circuit may also include a speaker 11082, a microphone 11084, and the like.
  • the input unit 1106 may be a signal input interface
  • the display unit 1107 may also be a signal output interface.
  • this application also provides a communication system, including the terminal described in the method embodiments of this application.
  • the communication system may also include a communication device.
  • the communication system may also include a security center server.
  • the present application also provides a computer-readable storage medium on which a computer program is stored.
  • the computer program When the computer program is executed by a computer, the computer executes the operations performed by the terminal in any method embodiment and/ Or processing.
  • the computer program product includes computer program code.
  • the computer program code runs on a computer, the computer executes the operation and/or processing performed by the terminal in any method embodiment. .
  • the application also provides a chip including a processor.
  • the memory used to store the computer program is provided independently of the chip, and the processor is used to execute the computer program stored in the memory to perform operations and/or processing performed by the terminal in any method embodiment.
  • the chip may also include a memory and/or a communication interface.
  • the communication interface may be an input/output interface, an input/output circuit, etc.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
  • each unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the function is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium.
  • the technical solution of this application essentially or the part that contributes to the existing technology or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the method described in each embodiment of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk or optical disk and other media that can store program code .

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephone Function (AREA)

Abstract

本申请提供了一种保障终端安全的方法、装置以及系统,该方法包括:确定第二SIM对应的用户身份信息;在第二SIM对应的用户身份信息发生改变时,通过窄带物联网NB-IoT通信发送终端的定位信息;终端确定第二SIM对应的用户身份信息发生变化,则终端即可通过与第一SIM绑定的NB-IoT通信向服务器上报终端的定位信息,以便于用户追踪找回该终端。

Description

保障终端安全的方法、装置以及系统 技术领域
本申请涉及通信技术领域,尤其涉及的是一种保障终端安全的方法、装置以及系统。
背景技术
随着终端的功能日渐智能和丰富,终端所绑定的个人隐私数据越来越多,例如因支付功能而绑定的个人银行卡,保障终端安全也逐渐成为用户的重要需求。
通常,终端内部插设有一种用户识别模块(subscriber identity module,SIM)卡,通过该实体SIM卡来实现终端的通信功能。当终端丢失时,非法占有该终端的人可以拔掉该终端内的实体SIM卡,或者关闭蜂窝网络通信功能,用户无法通过云账户查询到该终端的实际位置。
非法占有该终端的人还可以通过更换终端的原SIM卡,以获取该终端的正常通信功能,如正常进行数据通信。甚至,还可以对终端所存储的信息进行浏览、正常使用终端已安装的各类应用程序等,存在隐私泄露和财务安全问题。
发明内容
本申请提供了一种保障终端安全的方法、装置以及系统,用于终端丢失后的找回、以及终端内用户隐私信息的安全保护。
应理解,本申请实施例中第一方面至第二方面任一方面、以及任一方面可能的实施方式中所提供的方法可以由无线通信装置执行,该无线通信装置可以是计算设备的整机,也可以是该计算设备中的部分器件,例如无线通信功能相关的芯片,如系统芯片、通信芯片或射频芯片。其中,系统芯片也称为片上系统,或称为SoC芯片。具体地,无线通信装置可以是诸如智能手机这样的终端,也可以是能够被设置在终端中的系统芯片或通信芯片,还可以是独立的功能性芯片。通信芯片可以包括射频处理芯片和基带处理芯片的一种或多种。基带处理芯片有时也称为调制解调器(modem)或基带处理器。在物理实现中,通信芯片或独立的功能性芯片可集成在SoC芯片内部,也可以不与SoC芯片集成。例如,基带处理芯片集成在SoC芯片中,射频处理芯片不与SoC芯片集成。
第一方面,本申请实施例提供了一种保障终端安全的方法,终端支持第一用户识别模块SIM和第二SIM,该方法包括:通过窄带物联网(narrow band internet of things,NB-IoT)通信接收针对于终端的定位信息请求消息;响应于针对于终端的定位信息请求消息,通过NB-IoT通信发送终端的定位信息;其中,第一SIM用于NB-IoT通信,第二SIM用于除NB-IoT通信以外的蜂窝网络通信。
这里,终端的合法用户可通过云端直接触发终端上报定位信息,以便于用户确定终端的位置。例如,合法持有终端的用户可预先在服务器注册账户,并与终端绑定。在用户需要确定终端位置时,通过之前预先注册的用户身份信息(如账户名和密码)登录安全中心服务器,并触发终端上报定位信息。
结合第一方面所提供的技术方案,一种可能的实现方式中,确定第二SIM对应的用户身份信息;在第二SIM对应的用户身份信息发生改变时,通过NB-IoT通信发送第二SIM对应的用户身份信息。
第二方面,本申请实施例提供了一种保障终端安全的方法,终端支持第一用户识别模块SIM和第二SIM,该方法包括:确定第二SIM对应的用户身份信息;在第二SIM对应的用户身份信息发生改变时,通过窄带物联网NB-IoT通信发送终端的定位信息;其中,第一SIM用于NB-IoT通信,第二SIM用于除NB-IoT通信以外的蜂窝网络通信。
第一方面和第二方面中,第一SIM与NB-IoT通信绑定,第二SIM用于除NB-IoT通信以外的蜂窝网络通信,例如长期演进(long term evolution,LTE)通信、新空口(new radio,NR)通信等。第二SIM对应的用户身份信息包括国际移动用户识别码(international mobile subscriber identification number,IMSI)、移动用户综合业务数字网(integrated services digital network,ISDN)号码、第二SIM的手机号码中的一个或多个。
可选的,终端的第一SIM为嵌入式用户识别卡(embedded subscriber identification module,ESIM)、软件SIM(soft SIM)或虚拟SIM(virtual SIM,vSIM),可以在终端出厂时设置,较难更改。
第二SIM可以对应于终端内的实体SIM卡,也可以对应于终端内的虚拟SIM或软件SIM。第二SIM对应的用户身份信息可以用于判断该终端的用户身份是否发生变化。
例如,以第二SIM为实体SIM卡为例,用于除NB-IoT通信以外的蜂窝网络通信的实体SIM卡被拔掉时,通过SIM电路可以发现该实体SIM卡被拔掉,第二SIM对应的用户身份信息无法读取,可认为该第二SIM对应的用户身份信息发生变化。或者,在该实体SIM卡被替换成其他实体SIM卡时,发现第二SIM对应的用户身份信息变为其他用户的身份信息。类似地,虚拟SIM或软件SIM对应的用户身份信息被替换成新的用户身份信息,软件代码可以检测出第二SIM对应的用户身份信息发生变化。
应理解,通过上述方案,在终端丢失后,即使终端的第二SIM被拔掉或替换,对应的用户身份信息发生改变,仍可通过NB-IoT通信上报终端的定位信息,以便于用户追踪找回该终端。
还可理解,因NB-IoT通信具备的低功耗优势,从而使得通过NB-IoT通信发送定位信息可降低通信过程中对终端的功耗的消耗,在终端功耗不足无法进行除NB-IoT通信以外的蜂窝网络通信的情况下,终端还可以通过NB-IoT通信进行正常的通信,有效的避免终端因功耗不足无法进行定位信息上报的情况;又因NB-IoT通信具有广覆盖的优势,从而有效的增加了终端通过NB-IoT通信的区域,避免了因网络覆盖不足而无法正常进行通信的情况的出现;又因NB-IoT通信具有低流量的优势,则使得通过NB-IoT通信进行定位信息的发送可有效的降低通信流量。
结合第一方面至第二方面任一方面以及任一种可能的实施方式所提供的技术方案,一种可能的技术方案中,在第二SIM对应的用户身份信息发生改变时,去使能终端除NB-IoT以外的蜂窝网络通信功能。
应理解,去使能终端的除NB-IoT以外的蜂窝网络通信功能时,停止了除NB-IoT以外的蜂窝网络通信功能,以使终端无法进行正常的数据通信功能,如拨打/接听电话、发送/接收短信等,可以避免非法占有终端的人使用终端进行数据通信。
结合第一方面至第二方面任一方面以及任一种可能的实施方式所提供的技术方案,一种可能的技术方案中,在第二SIM对应的用户身份信息发生改变时,去使能终端的短距离通信功能。
这里,短距离通信功能可包括蓝牙通信、无线保真(wireless fidelity,WiFi)通信、紫蜂(ZigBee)以及超宽带(ultra wideband,UWB)通信等通信功能的一种或多种。
结合第一方面至第二方面任一方面以及任一种可能的实施方式所提供的技术方案,一种可能的技术方案中,第二SIM对应的用户身份信息发生改变包括:第二SIM对应的用户身份信息与之前第二SIM对应的用户身份信息不同。
这里,可周期性地对第二SIM对应的用户身份信息进行检测,并对当前周期所检测到第二SIM对应的用户身份信息与之前周期检测到的用户身份信息进行比对,若当前周期所检测到的第二SIM对应的用户身份信息与之前检测到的用户身份信息不同,则确定出第二SIM对应的用户身份信息发生改变。
应理解,在确定第二SIM对应的用户身份信息发生改变时,则说明非法占有终端的人基于对该终端进行正常的使用的目的,将终端内的第二SIM进行了更换,即将终端内部的第二SIM替换成了非法占有终端的人能够正常使用的SIM,从而导致了终端内的第二SIM对应的用户身份信息发生改变,此时,终端可通过NB-IoT通信发送终端的定位信息,以便于用户追踪找回该终端。
结合第一方面至第二方面任一方面以及任一种可能的实施方式所提供的技术方案,一种可能的技术方案中,第二SIM对应的用户身份信息发生改变包括:第二SIM对应的用户身份信息与终端绑定的用户身份信息不一致;其中,终端绑定的用户身份信息通过NB-IoT通信下载。
应理解,终端用户可将该终端与之前预先注册的用户身份信息绑定,例如将网上所注册的用户手机号与该终端绑定。若该手机号与终端当前的第二SIM对应的手机号不同则确定终端的用户发生了变化。
或者,服务器可指示当前使用终端的用户将安全认证信息上传至服务器,服务器可对预存安全认证信息和终端当前所发送的安全认证信息进行比对,若一致,则说明当前使用终端的用户为合法的用户,服务器可通过NB-IoT通信将用户身份信息发送给终端,终端确定通过NB-IoT通信下载的由服务器所发送的用户身份信息为终端绑定的用户身份信息;
应理解,安全认证信息可为人脸信息、指纹信息、虹膜信息、声音信息、密码信息、或身份证信息中的至少一项。
终端在确定第二SIM对应的用户身份信息与终端绑定的用户身份信息不一致时,则说明当前使用终端的用户为非法的用户,此时,终端可通过NB-IoT通信发送终端的定位信息,以便于用户追踪找回该终端。
结合第一方面至第二方面任一方面以及任一种可能的实施方式所提供的技术方案,一种可能的技术方案中,通过终端所包括的接收器直接获取定位信息,如定位信息来自终端的全球定位系统(global positioning system,GPS)接收器、北斗卫星导航系统接收器、 或全球导航卫星系统(global navigation satellite system,GNSS)接收器中的至少一项。
结合第一方面或第二方面或任意一种可能的实现方式所提供的技术方案,一种可能的实现方式中,可获取用于进行定位的信息,终端对用于进行定位的信息进行处理以获取定位信息,其中,用于进行定位的信息可为终端的WIFI信息、辅助全球卫星定位系统(assisted global positioning system,AGPS)信息、或蓝牙信息中的至少一项。
结合第一方面至第二方面任一方面以及任一种可能的实施方式所提供的技术方案,一种可能的技术方案中,方法还包括:通过NB-IoT通信发送终端的第二SIM对应的最新用户身份信息。
这里,在确定第二SIM对应的用户身份信息发生改变时,则终端可获取第二SIM对应的最新用户身份信息,终端通过NB-IoT通信将第二SIM对应的最新用户身份信息上报给服务器。
应理解,终端检测到第二SIM对应的用户身份信息发生改变时,则说明非法持有终端的人将其合法使用的用户识别模块卡插设入终端内,为有效的保障终端的安全,便于确定非法持有终端的人的身份,则终端可自动将非法持有终端的人所使用的最新用户身份信息上报给服务器,便于通过非法持有终端的人的最新用户身份信息快速准确的确定出其身份,提升了寻回终端的效率。
结合第一方面至第二方面任一方面以及任一种可能的实施方式所提供的技术方案,一种可能的技术方案中,方法还包括:删除终端的用户隐私数据。
这里,终端检测到第二SIM对应的用户身份信息发生改变时,可使能存储用户隐私数据的模块删除用户隐私数据;其中,用户隐私数据为以下所示的至少一项:用户通话记录数据、短信数据、图像数据、视频数据、联系人数据或记事本数据等。
应理解,在终端确定出第二SIM对应的用户身份信息发送改变时,即可确定出终端处于不安全的状态,则终端可使能存储用户隐私数据的模块删除用户隐私数据,有效的避免了终端所存储的用户隐私数据的泄露,保障了终端所存储的用户隐私数据的安全。
第三方面,本申请实施例提供了一种保障终端安全的方法,该方法包括:
在终端的用户身份信息通过验证时,通过窄带物联网NB-IoT发送针对终端的定位信息请求消息;
接收来自终端的定位信息。
应理解,用户可预先注册用户身份信息,并与终端绑定,只有当终端的用户身份信息在服务器侧通过验证时,才认为该用户为合法用户。才触发终端上报定位信息,并接收来自终端的定位信息,以避免终端的用户被非法追踪。
应理解,第四方面至第七方面所提供的方案与第一方面至第二方面以及任一种可能的实施方式中所提供方案存在相似部分,技术效果和方案细节可参照第一方面至第二方面及任一种可能的实施方式中相关表述,下面不再重复赘述。
第四方面,本申请实施例提供了一种装置,该装置应用于终端内部,或者,该装置为一种终端,该终端支持第一用户识别模块SIM和第二SIM,该装置包括:
接收单元、处理单元以及发送单元;接收单元,用于通过窄带物联网NB-IoT通信接收针对于该终端的定位信息请求消息;处理单元,用于响应于针对于终端的定位信息请求消息,使能发送单元通过NB-IoT通信发送终端的定位信息;其中,第一SIM用于NB-IoT通信,第二SIM用于除NB-IoT通信以外的蜂窝网络通信。
结合第四方面所提供的技术方案,一种可能的实施方式中,处理单元,还用于确定第二SIM对应的用户身份信息;发送单元,还用于在第二SIM对应的用户身份信息发生改变时,通过窄带物联网NB-IoT通信发送终端的定位信息。
第五方面,本申请实施例提供了一种装置,该装置应用于终端内部,或者,该装置为一种终端,该终端支持第一用户识别模块SIM和第二SIM,该装置包括:
处理单元,用于确定第二SIM对应的用户身份信息;发送单元,用于在第二SIM对应的用户身份信息发生改变时,通过窄带物联网NB-IoT通信发送终端的定位信息;其中,第一SIM用于NB-IoT通信,第二SIM用于除NB-IoT以外的蜂窝网络通信。
结合第四方面至第五方面任一方面以及任一种可能的实施方式所提供的技术方案,一种可能的技术方案中,处理单元还用于在第二SIM对应的用户身份信息发生改变时,去使能终端除NB-IoT以外的蜂窝网络通信功能。
结合第四方面至第五方面任一方面以及任一种可能的实施方式所提供的技术方案,一种可能的技术方案中,第二SIM为实体SIM,处理单元用于在第二SIM从终端的卡槽中被拔出时,确定第二SIM对应的用户身份信息发生改变。
结合第四方面至第五方面任一方面以及任一种可能的实施方式所提供的技术方案,一种可能的技术方案中,处理单元用于在第二SIM所对应的用户身份信息与之前第二SIM对应的用户身份信息不同时,确定第二SIM对应的用户身份信息发生改变。
结合第四方面至第五方面任一方面以及任一种可能的实施方式所提供的技术方案,一种可能的技术方案中,处理单元用于在第二SIM对应的用户身份信息与终端绑定的用户身份信息不一致时,确定第二SIM对应的用户身份信息发生改变;其中,终端绑定的用户身份信息通过NB-IoT通信下载。
其中,用户身份信息包括国际移动用户识别码IMSI、移动用户综合业务数字网ISDN号码、第二SIM的手机号码中的一个或多个。
结合第四方面至第五方面任一方面以及任一种可能的实施方式所提供的技术方案,一种可能的技术方案中,定位信息来自终端的全球定位系统GPS接收器。
结合第四方面至第五方面任一方面以及任一种可能的实施方式所提供的技术方案,一种可能的技术方案中,处理单元还用于根据终端的无线保真WIFI信息和/或辅助全球卫星定位系统AGPS信息确定。
结合第四方面至第五方面任一方面以及任一种可能的实施方式所提供的技术方案,一种可能的技术方案中,发送单元还用于通过NB-IoT通信发送终端的第二SIM对应的最新用户身份信息。
应理解,可以由执法机构来提取该非法用户的信息,以提高用户隐私的保护度。
结合第四方面至第五方面任一方面以及任一种可能的实施方式所提供的技术方案,一 种可能的技术方案中,处理单元还用于使能终端删除终端的用户隐私数据。
第五方面,本申请实施例提供了一种服务器,包括:
处理单元,用于验证终端的用户身份信息;
发送单元,用于在终端的用户身份信息通过验证时,通过窄带物联网NB-IoT发送针对终端的定位信息请求消息;
接收单元,用于接收来自终端的定位信息。
第六方面,本发明实施例提供了一种计算机程序产品,当计算机程序产品被执行时,其用于执行上述终端所执行的通信方法。
第七方面,本发明实施例提供一种计算机可读存储介质,计算机可读存储介质中存储有指令,指令用于执行上述终端所执行的通信方法。
第八方面,本申请实施例提供了一种通信系统,包括第三方面或第四方案任一方面以及可选的实施方式中的装置,以及无线通信装置。
附图说明
图1为本申请实施例所提供的通信系统的一种结构示例图;
图2为本申请实施例所提供的保障终端安全的方法一种流程示例图;
图3为本申请实施例所提供的保障终端安全的方法另一种流程示例图;
图4为本申请实施例所提供的保障终端安全的方法另一种流程示例图;
图5为本申请实施例所提供的保障终端安全的方法另一种流程示例图;
图6为本申请实施例所提供的通信系统的另一种结构示例图;
图7为本申请实施例所提供的保障终端安全的方法另一种流程示例图;
图8为本申请实施例所提供的通信装置的一种结构示例图;
图9为本申请实施例所提供的通信装置的另一种结构示例图;
图10为本申请实施例所提供的服务器的一种结构示例图;
图11为本申请实施例所提供的终端的一种结构示例图。
具体实施方式
本申请提供了一种保障终端安全的方法、装置以及系统,用于终端丢失后的找回、以及终端内用户隐私信息的安全保护。下面结合附图,对本申请的实施例进行描述。
以下结合图1所示对本申请实施例的一种可能的通信系统的结构进行示例性说明,如图1所示,本实施例所示的通信系统包括有通信装置101和终端102。本实施例所示的所述通信装置101可以是运营商所管理的任意一种具有无线收发功能的设备,具体的,本实施例所示的通信装置101可为基站,基站可以是:宏基站,微基站,微微基站,小站,中继站等,具体在本实施例中不做限定。本实施例对该通信装置101的具体数量不做限定。
可选的,继续以图1所示为例,该通信系统还包括具有通信功能的安全中心服务器103,该安全中心服务器103可由第三方运营,可用于存储用户身份信息、终端定位信息等隐私数据。
可选的,在具体应用中,也可由通信装置101实现安全中心服务器103的功能,具体 在本申请中不做限定。
本申请实施例所提供的通信系统可以应用于各种通信系统,例如第五代(5Generation,5G)通信系统、NR、LTE通信等。此外,该通信系统还可以适用于面向未来的通信技术,都适用本申请实施例提供的技术方案。本申请实施例描述的系统架构以及业务场景是为了更加清楚的说明本申请实施例的技术方案,并不构成对于本申请实施例提供的通信装置的限定,本领域普通技术人员可知,随着网络架构的演变和新业务场景的出现,本申请实施例提供的通信装置对于类似的技术问题,同样适用。
本实施例所示的终端102,又称之为用户设备(user equipment,UE)、移动台(mobile station,MS)、终端(mobile terminal,MT)等,是一种向用户提供语音和/或数据连通性的设备,例如,具有无线连接功允许的手持式设备、车载设备等。目前,一些终端的举例为:手机(mobile phone)、平板电脑、笔记本电脑、掌上电脑、移动互联网设备(mobile internet device,MID)、可穿戴设备,虚拟现实(virtual reality,VR)设备、增强现实(augmented reality,AR)设备、工业控制(industrial control)中的无线终端、无人驾驶(self driving)中的无线终端、远程手术(remote medical surgery)中的无线终端、智能电网(smart grid)中的无线终端、运输安全(transportation safety)中的无线终端、智慧城市(smart city)中的无线终端、智慧家庭(smart home)中的无线终端等。
基于图1所示的通信系统,以及结合图2至图7所示对本申请所提供的保障终端安全的方法的流程进行示例性说明:需要说明的是,以下各方法实施例中对步骤的编号仅是为例更清楚的描述本申请提供的保障终端安全的方法,并不限制终端必须采用相同数量的步骤才可以完成保障终端安全的方法,例如,在具体实现中,终端执行保障终端安全的方法时,可执行比以下实施例更多的步骤或省略执行部分步骤,只要按照本申请提供的技术构思完成其保障终端安全的方法即可,也即,图2中所示的步骤对于某一次终端执行保障终端安全的方法而言并不是全部必须的。
本申请实施例提供的方法可以由无线通信装置执行,该无线通信装置可以是终端,也可以是应用于终端内部的芯片,为了表述清楚,下面以终端为例。
参见图2,图2是本申请提供的保障终端安全的方法的一个实施例步骤流程图。
步骤201、终端确定第二SIM对应的用户身份信息。
本实施例所示的终端支持第一SIM和第二SIM,其中,该第一SIM用于NB-IoT通信,该第二SIM用于除该NB-IoT通信以外的蜂窝网络通信。可选的,第二SIM对应的用户身份信息包括IMSI、ISDN号码、第二SIM的手机号码中的一个或多个。上述用户身份信息可以用于终端通过除NB-IoT以外的蜂窝网络通信,以区分不同用户的消息。
可以理解的是,第二SIM对应的用户身份信息还可以进一步拓展,例如,该用户身份信息还可为验证密钥(Ki)、位置区域识别码(location area identity,LAI)、移动用户暂时识别码(international mobile subscriber identity,TMSI)、禁止接入的公共电话网代码、个人识别码(personal identification number,PIN)、解锁码(PUK)、或支付信息中的一个或多个。其中,该支付信息用于指示是否成功订购该第一SIM的相关服务。
可选的,本实施例所示的第一SIM可为嵌入式用户识别卡(embedded subscriber identification module,ESIM)、软件SIM(soft SIM)或虚拟SIM(virtual SIM,vSIM),即该第一SIM以软件或嵌入式硬件的形态设置于该终端内部,较难更改。
可选的,第二SIM可以对应于终端内的实体SIM卡,也可以对应于终端内的虚拟SIM或软件SIM。当第二SIM为实体SIM时,具体地,可通过SIM接口电路读取第二SIM对应的用户身份信息。当第二SIM为虚拟SIM或软件SIM时,可通过处理器接口电路读取对应存储器中第二SIM对应的用户身份信息。
为了便于表述,本实施例以该第一SIM为软件SIM,该第二SIM为实体SIM卡,即本实施例所示的第二SIM插设于终端的卡槽内部为例进行示例性说明:
步骤202、终端确定第二SIM对应的用户身份信息发生改变。
以下对终端确定第二SIM对应的用户身份信息发生变化的具体过程进行示例性说明:
方式1
在第二SIM从终端的卡槽中被拔掉时,终端无法通过卡槽中的引脚读取第二SIM对应的用户身份信息,可认为该第二SIM对应的用户身份信息发生变化。
方式2
将第二SIM从终端的卡槽中拔出,并将其他实体SIM卡插设入终端的卡槽的情况下,终端通过卡槽的引脚所获取到的用户身份信息变为其他实体SIM卡对应的用户身份信息。
方式3
终端可周期性的通过卡槽的引脚对第二SIM对应的用户身份信息进行检测,并对当前周期所检测到第二SIM对应的用户身份信息与之前周期检测到的用户身份信息进行比对,若当前周期所检测到的第二SIM对应的用户身份信息与之前检测到的用户身份信息不同,则确定出第二SIM对应的用户身份信息发生改变。
方式4
终端在确定该第二SIM对应的用户身份信息与该终端绑定的用户身份信息不一致的情况下,确定第二SIM对应的用户身份信息发生变化;
具体的,安全中心服务器可指示当前使用终端的用户将安全认证信息上传至安全中心服务器,安全中心服务器可对预存安全认证信息和终端当前所发送的安全认证信息进行比对,若一致,则说明当前使用终端的用户为合法的用户,安全中心服务器可通过NB-IoT通信将用户身份信息发送给终端,终端确定通过NB-IoT通信下载的用户身份信息为终端绑定的用户身份信息;其中,安全认证信息可为人脸信息、指纹信息、虹膜信息、声音信息、密码信息、或身份证信息中的至少一项。
方式5
若第二SIM为虚拟SIM或软件SIM时,通过接口电路可从存储有第二SIM的模块中读取第二SIM对应的用户身份信息,若处理器确定第二SIM对应的用户身份信息被替换成新的用户身份信息,则确定第二SIM对应的用户身份信息发生变化。
步骤203、终端通过NB-IoT通信向安全中心服务器发送终端的定位信息。
在终端确定该第二SIM对应的用户身份信息发生变化,则终端可通过NB-IoT通信向安 全中心服务器发送该终端的定位信息。需明确的是,本实施例以终端将定位信息发送给安全中心服务器为例进行示例性说明,只要所述终端能够通过NB-IoT通信将定位信息发送给任一服务器即可。
可以理解,因本实施例所示的该第一SIM并非为物理的硬件形式的实体SIM。因此,用户无法对呈软件形式的该第一SIM执行如实体SIM的换卡,拔卡、破坏等操作,只要终端确定第二SIM对应的用户身份信息发生变化,则终端即可通过与第一SIM绑定的NB-IoT通信向安全中心服务器上报终端的定位信息,以便于用户追踪找回该终端,以下对终端向安全中心服务器发送终端的定位信息的几种可选的方式进行示例性说明:
方式1
在通信系统包括有安全中心服务器、通信装置和终端的情况下,则终端可通过NB-IoT通信直接将定位信息发送给安全中心服务器。
方式2
在通信系统包括有安全中心服务器、通信装置和终端的情况下,则终端可通过NB-IoT通信将定位信息发送给通信装置,再由通信装置将定位信息转发给安全中心服务器。
方式3
上述方式以终端将定位信息发送给安全中心服务器,由安全中心服务器接收并存储定位信息,以供用户查询存储于安全中心服务器中的定位信息为例,本方式以通信装置接收并存储定位信息,以供用户查询存储于通信装置中的定位信息为例,即本示例中,终端将定位信息发送给通信装置。
以下对本实施例所示的通过NB-IoT通信上报定位信息的有益效果进行说明:
NB-IoT通信具备如下特点:一是广覆盖,在同样的频段下,NB-IoT比现有的网络增益20dB,相当于提升了100倍覆盖区域的能力,在终端支持NB-IoT通信的情况下,可有效的提升终端通信的范围;二是具备支撑海量连接的能力,NB-IoT一个扇区能够支持10万个连接,支持低延时敏感度、超低的设备成本、低设备功耗和优化的网络架构;三是更低功耗,支持NB-IoT通信的终端可支持长达10年的待机时间。
本实施例所示的可通过NB-IoT通信进行终端的定位信息的上报,从而有效的降低了终端进行定位信息上报的功,在终端功耗不足无法进行除该NB-IoT通信以外的蜂窝网络通信的情况下,终端还可以通过NB-IoT通信进行定位信息的上报;又因NB-IoT通信具有广覆盖的优势,从而有效的增加了终端通过NB-IoT通信进行定位信息上报的区域,避免了因通信覆盖不足而无法进行定位信息上报的情况的出现;又因NB-IoT通信具有低流量的优势,则使得通过NB-IoT通信可有效的降低通信流量,而且因NB-IoT通信的低功耗的特性,则即便终端处于丢失状态,非法占有终端的人对终端进行了关机的操作,该终端基于NB-IoT通信依旧具有上报定位信息的能力,保障了终端关机状态下,依旧能够实现定位的功能。
以下结合图3所示说明,终端在确定该第二SIM对应的用户身份信息发生改变时,是如何有效的保障终端安全的;
步骤301、终端确定第二SIM对应的用户身份信息。
步骤302、终端确定第二SIM对应的用户身份信息发生改变。
步骤303、终端通过NB-IoT通信向安全中心服务器发送该终端的定位信息。
本实施例所示的步骤301至步骤303的具体执行过程,请详见图2所示的步骤201至步骤203所示,具体执行过程在本实施例中不做赘述。
步骤304、终端去使能终端除NB-IoT以外的蜂窝网络通信功能。
本实施例中,在终端确定该第二SIM对应的用户身份信息发生改变的情况下,则终端即可去使能该终端除该NB-IoT以外的蜂窝网络通信功能,以使终端无法进行正常的拨打/接听电话、发送/接收短信等正常的数据通信功能,但是此时的终端却可以通过NB-IoT通信进行定位信息的上报,便于对终端进行定位,提升了终端的安全且可以避免非法占有终端的人使用终端进行数据通信。
可选的,本实施例所示的终端还可在该第二SIM对应的用户身份信息发生改变的情况下,去使能该终端的短距离通信功能,短距离通信可为蓝牙通信、WiFi通信、紫蜂(ZigBee)、或超宽带(UWB)通信中的一项或多项,具体在本实施例中不做限定。可见,采用本实施例所示,有效的避免非法占有终端的人通过短距离通信进行联网。
需明确的是,本实施例对步骤303和步骤304之间,并无执行时序上的先后限定。
步骤305、终端删除终端的用户隐私数据。
具体的,终端检测到第二SIM对应的用户身份信息发生改变时,可使能目标模块删除用户隐私数据,其中,该目标模块为已存储用户隐私数据的模块。终端使能目标模块删除用户隐私数据的过程可为,向目标模块发送删除指示信息,该删除指示信息用于指示目标模块删除用户隐私数据。
该用户隐私数据为以下所示的至少一项:用户通话记录数据、短信数据、图像数据、视频数据、联系人数据或记事本数据等。
应理解,在终端确定出该第二SIM对应的用户身份信息发送改变时,即可确定出终端处于不安全的状态,则终端可使能目标模块删除用户隐私数据,有效的避免了终端所存储的用户隐私数据的泄露,保障了终端所存储的用户隐私数据的安全。
具体例如,若该目标模块为安全元件,则安全元件在接收到删除指示信息的情况下,该安全元件即可对本地已存储的安全数据,如银行账户数据、安全认证数据等进行删除,又如,若目标模块为应用处理器,则在该应用处理器在接收到该删除指示信息的情况下,该应用处理器即可对本地所存储的数据以及所运行的应用进行删除,若删除微信应用程序,从而使得非法占有终端的人,无法查阅微信所显示的联系人、聊天记录以及支付情况等信息,有效的保障了终端所存储的用户隐私数据的安全。
可选的,本实施例用于执行上述流程的无线通信装置在该终端内具有最高的优先级,则使得无线通信装置能够向目标模块发送删除指示信息,其中,最高的控制优先级是指,无线通信装置具有控制该终端内的目标模块的权限,无线通信装置用于执行通过NB-IoT通信上报定位信息的功能;具体的,通过最高的控制优先级,使得无线通信装置能够控制目标模块执行如下控制功能中的一项或多项:
停止目标模块的运行、或获取目标模块所存储的信息;
最高的控制优先级还指,目标模块不具有控制无线通信装置的权限,即该目标模块无 法停止无线通信装置的运行,无法获取无线通信装置所存储的信息,无法删除无线通信装置所存储的信息等,其中,无线通信装置所实现的功能和该目标模块所实现的功能不相同。
采用本方面所示,因无线通信装置具有最高的控制优先级,则使得无线通信装置可根据需要对目标模块进行控制,而目标模块无法对无线通信装置进行控制,从而使得终端处于丢失状态时,非法占有终端的人无法通过目标模块对无线通信装置进行控制,从而提升了无线通信装置的安全。
需明确的是,本实施例对步骤303、步骤304和步骤305之间,并无执行时序上的先后限定。
步骤306、终端通过NB-IoT通信向安全中心服务器发送第二SIM对应的最新用户身份信息。
本实施例中,终端在确定第二SIM对应的用户身份信息发生改变时,则终端可获取第二SIM对应的最新用户身份信息,终端通过NB-IoT通信将第二SIM对应的最新用户身份信息上报给安全中心服务器。
可见,终端检测到该第二SIM对应的用户身份信息发生改变时,则说明非法持有终端的人将其合法使用的用户识别模块卡插设入终端内,为有效的保障终端的安全,便于确定非法持有终端的人的身份,则终端可自动将非法持有终端的人所使用的最新用户身份信息上报给安全中心服务器,便于通过非法持有终端的人的最新用户身份信息快速准确的确定出其身份,提升了寻回终端的效率。
本实施例所示的终端向安全中心发送第二SIM对应的最新用户身份信息的过程,可参见图2所示的步骤203中终端向安全中心服务器发送的定位信息的具体过程,具体在本实施例中不做赘述。
需明确的是,本实施例对步骤303、步骤304、步骤305和步骤306之间,并无执行时序上的先后限定。
以下结合图4所示对终端获取定位信息的具体过程进行示例性说明:
步骤401、终端确定第二SIM对应的用户身份信息。
步骤402、终端确定第二SIM对应的用户身份信息发生改变。
步骤403、终端获取定位信息。
方式1
终端可通过定位器直接获取定位信息,其中,定位器具体可以是全球定位系统(GPS)接收器、北斗卫星导航系统接收器、或全球导航卫星系统(global navigation satellite system,GNSS)接收器中的至少一项。
方式2
终端可获取用于进行定位的信息,并基于用于进行定位的信息进行处理以获取定位信息。
例如,用于进行定位的信息可为辅助全球卫星定位系统AGPS信息,其中,AGPS是一种在一定辅助配合下进行GPS定位的运行方式,它可以利用基站的信号,配合GPS卫星信号,可以让终端的定位的速度更快;此种示例下,终端通过AGPS信息协助GPS接收器完成 测距和定位服务。
又如,用于进行定位的信息可为WiFi信息,具体的,由于每一个WiFi接入点都有一个全球唯一的媒体访问控制地址(media access control address,MAC),终端在开启WiFi的情况下即可扫描并收集周围的WiFi接入点的广播信号,因此可以获取到WiFi接入点广播出来的MAC地址;终端将这些能够标示WiFi接入点的数据(例如MAC地址)通过无线通信网络发送给位置服务器,由位置服务器检索出每一个WiFi接入点的地理位置,并结合WiFi广播信号的强弱程度,计算出该终端的定位信息并发送给终端。
上述对用于进行定位的信息的说明为可选的示例,不做限定,例如,用于进行定位的信息还可蓝牙定位信息等。
本实施例对步骤402和步骤403之间的执行时序不做限定。
步骤404、终端通过NB-IoT通信向安全中心服务器发送终端的定位信息。
本实施例所示的步骤404的具体执行过程的说明,请详见图2所示的步骤203所示,具体在本实施例中不做赘述。
由上述图2至图4所示可知,终端在第二SIM对应的用户身份信息发生改变时,终端进行定位信息的上报,以下结合图5所示说明终端上报定位信息的另一种情况进行说明:
步骤501、终端通过NB-IoT通信接收针对于终端的定位信息请求消息。
本实施例中,在用户无法找到终端时,为便于用户找回终端,则需要对终端的当前位置进行定位,可选的,用户可在个人计算机(personal computer,PC)端、另一台合法持有的终端等设备上通过已注册过的账户标识和密码等,登录至安全中心服务器,用户通过安全中心服务器通过NB-IoT通信向终端发送定位信息请求消息,本实施例以用户在PC端登录安全中心服务器为例进行示例性说明。
步骤502、终端根据定位信息请求消息获取定位信息。
终端在接收到该定位信息请求消息的情况下,终端响应于该终端定位信息请求消息,获取终端的定位信息,其中,该终端获取定位信息的具体说明,请详见上述实施例所示,具体在本实施例中不做赘述。
步骤503、终端通过NB-IoT通信向安全中心服务器发送终端的定位信息。
在终端获取到该定位信息的情况下,终端即可通过NB-IoT通信发送该终端的定位信息。
本实施例所示的步骤503的具体执行过程,请详见图2所示的步骤203,具体执行过程在本实施例中不做赘述。
本实施例中,该安全中心服务器接收到终端的定位信息的情况下,安全中心服务器即可将定位信息发送给用户输入账户标识和密码的PC端,PC端可显示安全中心服务器所发送的定位信息,用户通过查看PC端已显示的定位信息能够确定终端的当前位置,实现对终端的跟踪和定位,便于用户基于终端的当前位置实现对终端的找回,有效的避免终端的丢失。
为更好的理解本实施例所示的保障终端安全的方法,以下结合图6所示的场景示例图 和图7所示,对本实施例所示的保障终端安全的方法的一种应用场景进行示例性说明:
步骤701、终端从通信装置下载第一SIM的相关信息。
具体的,如图6所示,用户600可通过网上商城601实现对终端602的购买,在用户600持有终端602的情况下,为实现本申请所示的保障终端安全的方法,则用户需要通过终端602完成第一SIM的下载。
更具体的,用户600使能终端602通过NB-IoT从运营商管理的通信装置601下载第一SIM的相关信息。其中,第一SIM的相关信息包括第一SIM的IMSI、ISDN号码、Ki、LAI、PIN、密钥或PUK中的一个或多个。
可选的,为提升终端602下载第一SIM的相关信息的安全性,则通信装置601可对当前请求下载第一SIM的相关信息的用户600进行验证,例如,通信装置601指示当前使用终端602的用户600将安全认证信息上传至通信装置601,通信装置601可对本地预先存储的预存安全认证信息和终端602当前所发送的安全认证信息进行比对,若一致,则说明当前使用终端602的用户600为合法的用户,通信装置601可将第一SIM的相关信息发送给该终端602,若不一致,则说明当前使用终端602的用户600为非法的用户,通信装置601不将该第一SIM的相关信息发送给终端602,该安全认证信息的具体说明,可参见上述实施例所示,具体在本实施例中不做赘述。
步骤702、终端向通信装置发送第一请求消息。
如图6所示,在终端602成功下载第一SIM的相关信息的情况下,该终端602为实现通过NB-IoT通信,则终端602还需要执行对第一SIM的激活操作,具体说明如下:
本实施例所示的终端602成功获取到该第一SIM的相关信息的情况下,终端602还可从第一SIM的相关信息中读出密钥,并通过已读取出的密钥对第一SIM的IMSI等进行加密以生成第一请求消息。本实施例对第一请求消息不做限定,只要第一请求消息与该第一SIM一一对应即可。终端602通过NB-IoT通信将第一请求消息发送给通信装置603。
步骤703、通信装置向终端发送第一通知消息。
如图6所示,通信装置603对已接收到第一请求消息进行解密以获取到IMSI等信息,本实施例对通信装置603具体如何判断终端具有通过NB-IoT通信的权限的过程不做限定,例如,通信装置603可预先存储有白名单,该白名单包括有具有通过NB-IoT通信权限的IMSI,在通信装置603接收到终端602所发送的第一请求消息的情况下,通信装置603可判断第一请求消息所包括的IMSI是否位于该白名单内,若判断出该IMSI位于白名单内,则通信装置603可向终端发送第一通知信息。可选的,通信装置可通过NB-IoT通信向终端602发送第一通知信息。终端602接收到第一通知消息后,即完成了对第一SIM的激活操作,则终端602具有通过NB-IoT通信的权限。
需明确的是,本实施例所示的步骤701至步骤703所示为可选执行的步骤,若终端已具有通过NB-IoT通信的权限,则无需执行本实施例所示的步骤701至步骤703。
步骤704、终端从通信装置下载第二SIM的相关信息。
可选的,终端可通过NB-IoT通信从通信装置下载第二SIM的相关信息,对第二SIM的相关信息的说明,请详见上述第一SIM的相关信息的说明,具体不做赘述。
步骤705、终端向通信装置发送第二请求消息。
如图6所示,在终端602成功下载第二SIM的相关信息的情况下,该终端602为实现通过除NB-IoT之外的蜂窝网络通信,则终端602还需要执行对第二SIM的激活操作,对第二SIM的激活操作的具体说明,请详见上述步骤702所示对第一SIM的激活操作的说明,具体不做赘述。
步骤706、通信装置向终端发送第二通知消息。
如图6所示,通信装置603对已接收到第二请求消息进行解密以获取到IMSI等信息,通信装置603基于已存储的签约数据判断已发送第二请求消息的终端是否可以合法使用,具体说明请详见步骤705所示,具体不做赘述,在通信装置603在确定出终端可以合法使用的情况下,则通信装置603将第二通知信息发送给终端,终端通过NB-IoT接收第二通知信息,终端接收到第二通知消息后,即完成了对第二SIM的激活操作,则终端具有通过除NB-IoT之外的蜂窝网络通信的权限。
需明确的是,本实施例所示的步骤704至步骤706所示为可选执行的步骤,若终端已具有通过NB-IoT通信的权限,则无需执行本实施例所示的步骤704至步骤706。
步骤707、终端确定第二SIM对应的用户身份信息发生改变。
步骤708、终端通过NB-IoT通信向安全中心服务器发送终端的定位信息。
采用本实施例所示的方法,终端602在确定出第二SIM对应的用户身份信息发生改变的情况下,即可向安全中心服务器604发送定位信息。
本实施例所示的步骤707至步骤708的具体执行过程的说明,请详见图2所示的步骤202至步骤203所示,具体不做赘述。
采用本实施例所示的方法,终端可通过NB-IoT通信对第一SIM和第二SIM进行激活,有效的节省终端对第一SIM和第二SIM进行激活的功耗。
可选的,上述实施例所示的场景均为个人使用以保障终端安全的方法的场景,本申请所提供的方法还可应用于制造商,制造商可执行上述所示的第一SIM的相关信息的下载过程,下载的具体说明请详见上述所示,具体不做赘述,如图6所示,在制造商将第一SIM的相关信息下载至终端602内,且执行完向请求通过NB-IoT进行通信的权限的流程后,制造商可指示终端602周期性的上报终端602的定位信息,以使终端602在出厂运输的过程中,终端602能够周期性的将定位信息上报至安全中心服务器604,制造商通过查询安全中心服务器604实现了对出厂后的终端602进行物流跟踪的目的。
可选的,因终端602向安全中心服务器604上报定位信息会带来终端602的隐私泄露的问题,则可选的,本实施例可通过如下步骤执行解绑过程,解绑后终端602将不会向安全中心服务器604上报定位信息,则避免了终端602的定位信息的泄露。
步骤709、终端向安全中心服务器发送解绑指示消息。
继续如图6所示,在用户600确定无需对终端602的位置进行定位的情况下,用户600可通过终端602向安全中心服务器604发送解绑指示消息,安全中心服务器604接收到解绑指示信息的情况下,安全中心服务器604将不会再把定位信息发送给终端602。
可见,在安全中心服务器根据解绑指示信息,即便获取到终端的第二SIM对应的用户 身份信息已改变的情况下,安全中心服务器不会向已登录至安全中心服务器的用户提供定位信息,但是安全中心服务器可保留定位信息,但是可以保留相关信息供权威机构提取。
可选的,终端602为实现将定位信息通过NB-IoT通信向安全中心服务器发送的目的,则终端可预先建立第一SIM和第二SIM对应的用户身份信息的绑定关系,在终端602建立了第一SIM和第二SIM对应的用户身份信息的绑定关系的情况下,在终端602确定用户身份信息已改变的情况下,则执行上述实施例所示的定位信息的上报流程。本实施例中,若终端602接收到解绑指示消息,则终端解除第一SIM和第二SIM对应的用户身份信息的绑定关系,则即便用户身份信息已改变,终端602也不会向安全中心服务器604上报定位信息,有效的保护了用户的隐私。
以上结合图2、图3、图4、图6以及图7对本申请提供的保障终端安全的方法进行了详细说明。下面结合图8所示说明用于执行上述方法的无线通信装置的结构进行说明,本实施例所示的无线通信装置执行保障终端安全的方法的具体说明,请详见上述图2、图3、图4、图6以及图7所示,具体不做赘述;无线通信装置应用于终端,终端支持第一SIM和第二SIM,无线通信装置的说明请详见上述所示,具体不做赘述。
参见图8,图8是本申请实施例提供的无线通信装置800的一种示意性结构图。无线通信装置800包括处理单元801和发送单元802。
处理单元801,用于确定第二SIM对应的用户身份信息;
发送单元802,用于在第二SIM对应的用户身份信息发生改变时,通过NB-IoT通信发送终端的定位信息;其中,第一SIM用于NB-IoT通信,第二SIM用于除NB-IoT以外的蜂窝网络通信。可选的,处理单元801还用于在第二SIM对应的用户身份信息发生改变时,去使能终端除NB-IoT以外的蜂窝网络通信功能。
可选的,第二SIM为实体SIM,处理单元801用于在第二SIM从终端的卡槽中被拔出时,确定第二SIM对应的用户身份信息发生改变。
可选的,处理单元801用于在第二SIM所对应的用户身份信息与之前第二SIM对应的用户身份信息不同时,确定第二SIM对应的用户身份信息发生改变。
可选的,处理单元801用于在第二SIM对应的用户身份信息与终端绑定的用户身份信息不一致时,确定第二SIM对应的用户身份信息发生改变;其中,终端绑定的用户身份信息通过NB-IoT通信下载。
可选的,用户身份信息包括国际移动用户识别码IMSI。
可选的,用户身份信息包括移动用户综合业务数字网ISDN号码。
可选的,定位信息来自终端的全球定位系统GPS接收器。
可选的,处理单元801还用于根据终端的无线保真WIFI信息和/或辅助全球卫星定位系统AGPS信息确定。
可选的,发送单元802还用于通过NB-IoT通信发送终端的第二SIM对应的最新用户身份信息。
可选的,处理单元801还用于使能终端删除终端的用户隐私数据。
本实施例所示的处理单元801和发送单元802所实现的功能可以部分或全部通过软件 实现,则处理单元801和发送单元802可位于终端内相同或不同的实体硬件器件内,具体在本实施例中不做限定,以下对处理单元801和发送单元802可选的几种设置方式进行示例性说明,需明确的是,本实施例对处理单元801和发送单元802设置方式的说明为可选的示例,不做限定,只要处理单元801和发送单元802能够执行上述功能即可;
方式1
无线通信装置800可以为用于执行上述方法实施例的终端。无线通信装置800包括的相应单元分别用于执行各方法实施例中由终端执行的相应操作和/或处理。
例如,发送单元802为收发器,处理单元801可以是处理器。其中,收发器具有发送和/或接收的功能,收发器也可以由接收器和/或发射器代替。
方式2
无线通信装置800可以为芯片或集成电路。此时,发送单元802可以为通信接口,处理单元801可以为逻辑电路。
可选地,通信接口可以是输入输出接口或者收发电路。输入输出接口可以包括输入接口和输出接口。收发电路可以包括输入接口电路和输出接口电路。
方式3
处理单元801的功能可以部分或全部通过软件实现。此时,处理单元801可以包括存储器和处理器,其中,存储器用于存储计算机程序,处理器读取并执行存储器中存储的计算机程序,以执行任意一个方法实施例中的相应处理和/或步骤。
可选地,处理单元801可以仅包括处理器。用于存储计算机程序的存储器位于处理单元801之外,处理器通过电路/电线与存储器连接,以读取并执行存储器中存储的计算机程序。
可选地,处理单元801的功能可以部分或全部通过硬件实现。此时,处理单元801可以包括输入接口电路,逻辑电路和输出接口电路。
方式4
处理单元801为基带处理器,发送单元802为基带处理器的接口电路。
具体地,基带处理器可通过接口电路读取第二SIM对应的用户身份信息,例如,读取实体SIM卡内所存储的用户身份信息,或者,读取存储虚拟SIM或软件SIM中用户身份信息的存储器中相关的用户身份信息。在基带处理器确定第二SIM对应的用户身份信息发生变化时,通过接口电路向射频集成电路(radio frequency intergrated circuit,RFIC)发送调制后的该终端的定位信息,并通过RFIC上变频、放大后由天线发送出去。
方式5
处理单元801为应用处理器,所述发送单元802为基带处理器的接口电路。
具体的,应用处理器可通过接口电路读取第二SIM对应的用户身份信息,例如,读取实体SIM卡内所存储的用户身份信息,或者,读取存储虚拟SIM或软件SIM中用户身份信息的存储器中相关的用户身份信息。在应用处理器确定第二SIM对应的用户身份信息发生变化时,通过基带处理器的接口电路向RFIC发送调制后的该终端的定位信息,并通过RFIC上变频、放大后由天线发送出去。
方式6
处理单元801为安全元件(secure element,SE),所述发送单元802为基带处理器的接口电路。
具体的,SE可通过接口电路读取第二SIM对应的用户身份信息,例如,读取实体SIM卡内所存储的用户身份信息,或者,读取存储虚拟SIM或软件SIM中用户身份信息的存储器中相关的用户身份信息。在SE确定第二SIM对应的用户身份信息发生变化时,通过基带处理器的接口电路向RFIC发送调制后的该终端的定位信息,并通过RFIC上变频、放大后由天线发送出去。
方式7
所述处理单元801还可是一个或多个现场可编程门阵列(field-programmable gate array,FPGA)、专用集成芯片(application specific integrated circuit,ASIC)、系统芯片(system on chip,SoC)、中央处理器(central processor unit,CPU)、网络处理器(network processor,NP)、数字信号处理电路(digital signal processor,DSP)、微控制器(micro controller unit,MCU),可编程控制器(programmable logic device,PLD)或其它集成芯片,或者上述芯片或者处理器的任意组合等。
方式8
上述方式2-7任一项所示的处理单元801可耦合定位器,该定位器的具体说明,请详见上述实施例所示,具体不做赘述,所述处理单元801通过定位器获取定位信息,并将定位信息发送给上述方式所示的发送单元802,由发送单元802进行定位信息的发送。
方式9
上述方式2-7任一项所示的处理单元801可包括有定位器,处理单元801通过定位器所获取到的定位信息发送给发送单元802,由发送单元802进行定位信息的发送。
方式10
上述方式2-7任一项所示的发送单元802可耦合定位器,该发送单元802可通过定位器获取定位信息,以进行定位信息的发送。
方式11
本方式可专门设计一个芯片,所述芯片可设置所述处理单元802和/或定位器,且呈软件形式的第一SIM设置于该芯片内部,该芯片与基带芯片耦合,以使芯片可使能所述基带芯片向安全中心服务器发送定位信息。
可选的,本实施例所示的芯片可独立对终端进行定位,如该芯片包括GPS定位器等,又如,该芯片可对用于进行定位的信息进行处理(如上述实施例所示的WIFI信息)以获取定位信息,可见,本方式所示芯片可在不依赖终端内部的其他芯片的情况下,即可独立获取能够对终端进行定位的定位信息。
以上结合图5对本申请提供的保障终端安全的方法进行了详细说明。下面结合图9所示说明用于执行上述方法的无线通信装置的结构进行说明,本实施例所示的无线通信装置执行保障终端安全的方法的具体说明,请详见上述图5所示,具体不做赘述;无线通信装置应用于终端,终端支持第一SIM和第二SIM,无线通信装置的说明请详见上述所示,具 体不做赘述。
本实施例所示的无线通信装置900具体包括:
接收单元901,用于通过窄带物联网NB-IoT通信接收针对于终端的定位信息请求消息;
处理单元902,用于响应于针对于终端的定位信息请求消息,使能发送单元903通过NB-IoT通信发送终端的定位信息;其中,第一SIM用于NB-IoT通信,第二SIM用于除NB-IoT通信以外的蜂窝网络通信;
发送单元903,还用于在第二SIM对应的用户身份信息发生改变时,通过窄带物联网NB-IoT通信发送终端的定位信息。
可选的,处理单元902用于确定第二SIM对应的用户身份信息;
发送单元903,还用于在第二SIM对应的用户身份信息发生改变时,通过窄带物联网NB-IoT通信发送终端的定位信息;
可选的,处理单元902还用于在第二SIM对应的用户身份信息发生改变时,去使能终端除NB-IoT以外的蜂窝网络通信功能。
可选的,第二SIM为实体SIM,处理单元902用于在第二SIM从终端的卡槽中被拔出时,确定第二SIM对应的用户身份信息发生改变。
可选的,处理单元902用于在第二SIM所对应的用户身份信息与之前第二SIM对应的用户身份信息不同时,确定第二SIM对应的用户身份信息发生改变。
可选的,处理单元902用于在第二SIM对应的用户身份信息与终端绑定的用户身份信息不一致时,确定第二SIM对应的用户身份信息发生改变;其中,终端绑定的用户身份信息通过NB-IoT通信下载。
可选的,用户身份信息包括国际移动用户识别码IMSI。
可选的,用户身份信息包括移动用户综合业务数字网ISDN号码。
可选的,定位信息来自终端的全球定位系统GPS接收器。
可选的,处理单元902还用于根据终端的无线保真WIFI信息和/或辅助全球卫星定位系统AGPS信息确定。
可选的,发送单元903还用于通过NB-IoT通信发送终端的第二SIM对应的最新用户身份信息。
可选的,处理单元902还用于使能终端删除终端的用户隐私数据。
本实施例所示的接收单元901、处理单元902以及发送单元903所实现的功能可以部分或全部通过软件实现,则接收单元901、处理单元902以及发送单元903可位于终端内相同或不同的实体硬件器件内,具体在本实施例中不做限定,本实施例所示的接收单元901以及发送单元903的设置方式的说明,请详见图8所示的发送单元802的说明,处理单元902设置方式的说明,请详见图8所示的处理单元802的说明,具体在本实施例中不做赘述。
以上结合图5对本申请提供的保障终端安全的方法进行了详细说明。下面结合图10所示说明用于执行图5所示方法的安全中心服务器的结构进行说明,本实施例所示的安全中心服务器执行保障终端安全的方法的具体说明,请详见上述图5所示,具体不做赘述;
该安全中心服务器1000包括:
处理单元1001,用于验证终端的用户身份信息;
发送单元1002,用于在终端的用户身份信息通过验证时,通过窄带物联网NB-IoT发送针对终端的定位信息请求消息;
接收单元1003,用于接收来自终端的定位信息。
本实施例所示的接收单元1003、处理单元1001以及发送单元1002所实现的功能可以部分或全部通过软件实现,则接收单元1003、处理单元1001以及发送单元1002可位于安全中心服务器内相同或不同的实体硬件器件内,具体在本实施例中不做限定,本实施例所示的接收单元1003以及发送单元1002的设置方式的说明,请详见图8所示的发送单元802的说明,处理单元1001设置方式的说明,请详见图8所示的处理单元802的说明,具体在本实施例中不做赘述。
此外,本申请还提供一种终端,下面结合图11进行说明。
参见图11,图11为本申请实施例提供的终端的一种示意性结构图。如图11所示,终端1100包括处理器1101、收发器1102和存储器1103。其中,处理器1101、收发器1102和存储器1103之间可以通过内部连接通路互相通信,传递控制信号和/或数据信号。存储器1103用于存储计算机程序,处理器1101用于从存储器1103中调用并运行计算机程序,以控制收发器1102收发信号。可选地,终端1100还可以包括天线1104。收发器1102通过天线发射或接收无线信号。
可选地,处理器1101和存储器1103可以合成一个处理装置,处理器1101用于执行存储器1103中存储的程序代码来实现上述功能。
可选地,存储器1103也可以集成在处理器1101中。或者,存储器1103独立于处理器1101,也即位于处理器1101之外。
处理器1101可以用于执行前面方法实施例中描述的由终端内部实现的动作。收发器1102可以用于执行由终端执行的接收或发送的动作,存储器1103用于实现存储的功能,例如,所述存储器1103可存储上述所示的第一SIM。
又例如,图8所示的发送单元802、图9所示的接收单元901、发送单元903执行的处理和/或操作可以由收发器1102实现。图8所示的处理单元801、图9所示的处理单元902执行的处理和/或操作可以由图11中所示的处理器1101实现。具体可以参见方法实施例的详细说明,这里不再赘述。
可选地,终端1100还可以包括电源1105,用于给终端中的各种器件或电路提供电源。
除此之外,为了使得终端的功能更加完善,终端1100还可以包括输入单元1106、显示单元1107、音频电路1108、摄像头1109和传感器1110等中的一个或多个。音频电路还可以包括扬声器11082、麦克风11084等。
可选地,输入单元1106可以是信号输入接口,显示单元1107也可以是信号输出接口。
此外,本申请还提供一种通信系统,包括本申请各方法实施例中的所述终端。此外, 该通信系统还可以包括通信装置,可选的,所述通信系统还可包括安全中心服务器。
本申请还提供一种计算机可读存储介质,所述计算机可读存储介质上存储有计算机程序,所述计算机程序被计算机执行时,使得计算机执行任意一个方法实施例中由终端执行的操作和/或处理。
本申请还提供一种计算机程序产品,所述计算机程序产品包括计算机程序代码,当所述计算机程序代码在计算机上运行时,使得计算机执行任意一个方法实施例中由终端执行的操作和/或处理。
本申请还提供一种芯片,所述芯片包括处理器。用于存储计算机程序的存储器独立于芯片而设置,处理器用于执行存储器中存储的计算机程序,以执行任意一个方法实施例中由终端执行的操作和/或处理。
进一步地,所述芯片还可以包括存储器和/或通信接口。所述通信接口可以是输入输出接口,输入输出电路等。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现,具体取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。

Claims (22)

  1. 一种保障终端安全的方法,其特征在于,所述终端支持第一用户识别模块SIM和第二SIM,所述方法包括:
    确定所述第二SIM对应的用户身份信息;
    在所述第二SIM对应的用户身份信息发生改变时,通过窄带物联网NB-IoT通信发送所述终端的定位信息;
    其中,所述第一SIM用于所述NB-IoT通信,所述第二SIM用于除所述NB-IoT通信以外的蜂窝网络通信。
  2. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    在所述第二SIM对应的用户身份信息发生改变时,去使能所述终端除所述NB-IoT以外的蜂窝网络通信功能。
  3. 根据权利要求1或2所述的方法,其特征在于,所述第二SIM对应的用户身份信息发生改变包括:
    所述第二SIM对应的用户身份信息与之前所述第二SIM对应的用户身份信息不同。
  4. 根据权利要求1或2所述的方法,其特征在于,所述第二SIM对应的用户身份信息发生改变包括:
    所述第二SIM对应的用户身份信息与所述终端绑定的用户身份信息不一致;
    其中,所述终端绑定的用户身份信息通过所述NB-IoT通信下载。
  5. 根据权利要求1至4任一所述的方法,其特征在于,所述用户身份信息包括国际移动用户识别码IMSI。
  6. 根据权利要求1至4任一所述的方法,其特征在于,所述用户身份信息包括移动用户综合业务数字网ISDN号码。
  7. 根据权利要求1至6任一所述的方法,其特征在于,所述定位信息来自所述终端的全球定位系统GPS接收器。
  8. 根据权利要求1至6任一所述的方法,其特征在于,所述定位信息根据所述终端的无线保真WIFI信息和/或辅助全球卫星定位系统AGPS信息确定。
  9. 根据权利要求1至8任一所述的方法,其特征在于,所述方法还包括:
    通过所述NB-IoT通信发送所述终端的第二SIM对应的最新用户身份信息。
  10. 根据权利要求1至9任一所述的方法,其特征在于,所述方法还包括:
    删除所述终端的用户隐私数据。
  11. 一种应用于终端的装置,其特征在于,所述终端支持第一SIM和第二SIM,所述装置包括:
    处理单元,用于确定第二SIM对应的用户身份信息;
    发送单元,用于在所述第二SIM对应的用户身份信息发生改变时,通过NB-IoT通信发送所述终端的定位信息;
    其中,所述第一SIM用于NB-IoT通信,所述第二SIM用于除所述NB-IoT以外的蜂窝网络通信。
  12. 根据权利要求11所述的装置,其特征在于,所述处理单元还用于在所述第二SIM对应的用户身份信息发生改变时,去使能所述终端除所述NB-IoT以外的蜂窝网络通信功能。
  13. 根据权利要求11或12所述的装置,其特征在于,所述第二SIM为实体SIM,所述处理单元用于在所述第二SIM从所述终端的卡槽中被拔出时,确定所述第二SIM对应的用户身份信息发生改变。
  14. 根据权利要求11或12所述的装置,其特征在于,所述处理单元用于在所述第二SIM所对应的用户身份信息与之前所述第二SIM对应的用户身份信息不同时,确定所述第二SIM对应的用户身份信息发生改变。
  15. 根据权利要求11或12所述的装置,其特征在于,所述处理单元用于在所述第二SIM对应的用户身份信息与所述终端绑定的用户身份信息不一致时,确定所述第二SIM对应的用户身份信息发生改变;
    其中,所述终端绑定的用户身份信息通过所述NB-IoT通信下载。
  16. 根据权利要求11至15任一所述的装置,其特征在于,所述用户身份信息包括国际移动用户识别码IMSI。
  17. 根据权利要求11至15任一所述的装置,其特征在于,所述用户身份信息包括移动用户综合业务数字网ISDN号码。
  18. 根据权利要求11至17任一所述的装置,其特征在于,所述定位信息来自所述终端的全球定位系统GPS接收器。
  19. 根据权利要求11至17任一所述的装置,其特征在于,所述处理单元还用于根据所述终端的无线保真WIFI信息和/或辅助全球卫星定位系统AGPS信息确定。
  20. 根据权利要求11至19任一所述的装置,其特征在于,所述发送单元还用于通过所述NB-IoT通信发送所述终端的第二SIM对应的最新用户身份信息。
  21. 根据权利要求11至20任一所述的装置,其特征在于,所述处理单元还用于使能所述终端删除所述终端的用户隐私数据。
  22. 一种终端,其特征在于,包括收发器、存储器和处理器,所述存储器用于存储计算机程序,所述处理器用于读取并执行所述存储器中存储器的所述计算机程序,以执行如权利要求1-10中任一项所述的方法。
PCT/CN2019/094708 2019-07-04 2019-07-04 保障终端安全的方法、装置以及系统 WO2021000319A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201980096704.4A CN113853779A (zh) 2019-07-04 2019-07-04 保障终端安全的方法、装置以及系统
PCT/CN2019/094708 WO2021000319A1 (zh) 2019-07-04 2019-07-04 保障终端安全的方法、装置以及系统

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/094708 WO2021000319A1 (zh) 2019-07-04 2019-07-04 保障终端安全的方法、装置以及系统

Publications (1)

Publication Number Publication Date
WO2021000319A1 true WO2021000319A1 (zh) 2021-01-07

Family

ID=74100489

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/094708 WO2021000319A1 (zh) 2019-07-04 2019-07-04 保障终端安全的方法、装置以及系统

Country Status (2)

Country Link
CN (1) CN113853779A (zh)
WO (1) WO2021000319A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113204609A (zh) * 2021-05-28 2021-08-03 成都欧珀通信科技有限公司 导航信息处理方法及相关装置
CN114173320A (zh) * 2021-12-15 2022-03-11 中国电信股份有限公司 终端寻找方法、装置、设备及计算机可读存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080043993A1 (en) * 2006-08-16 2008-02-21 Global Tel*Link Corporation Integration of cellular phone detection and reporting into a prison telephone system
CN104519491A (zh) * 2013-09-30 2015-04-15 大唐电信(天津)通信终端制造有限公司 一种用于移动终端的报警方法和装置
CN207937815U (zh) * 2018-02-11 2018-10-02 无锡职业技术学院 一种基于nb-iot的防盗防丢失卡套
CN108833710A (zh) * 2018-06-26 2018-11-16 奇酷互联网络科技(深圳)有限公司 防盗保护方法及移动终端

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080043993A1 (en) * 2006-08-16 2008-02-21 Global Tel*Link Corporation Integration of cellular phone detection and reporting into a prison telephone system
CN104519491A (zh) * 2013-09-30 2015-04-15 大唐电信(天津)通信终端制造有限公司 一种用于移动终端的报警方法和装置
CN207937815U (zh) * 2018-02-11 2018-10-02 无锡职业技术学院 一种基于nb-iot的防盗防丢失卡套
CN108833710A (zh) * 2018-06-26 2018-11-16 奇酷互联网络科技(深圳)有限公司 防盗保护方法及移动终端

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113204609A (zh) * 2021-05-28 2021-08-03 成都欧珀通信科技有限公司 导航信息处理方法及相关装置
CN113204609B (zh) * 2021-05-28 2023-09-19 成都欧珀通信科技有限公司 导航信息处理方法及相关装置
CN114173320A (zh) * 2021-12-15 2022-03-11 中国电信股份有限公司 终端寻找方法、装置、设备及计算机可读存储介质

Also Published As

Publication number Publication date
CN113853779A (zh) 2021-12-28

Similar Documents

Publication Publication Date Title
US9007174B2 (en) Service identification authentication
US8954067B2 (en) Method and apparatus for emulating a plurality of subscriptions
US10904737B2 (en) Electronic device and proximity discovery method thereof
US9246883B2 (en) Subscriber identity module provisioning
US20100130167A1 (en) Communication Method And Infrastructure Supporting Device Security And Tracking Of Mobile And Portable Multimedia Devices
US20150085848A1 (en) Method and Apparatus for Controlling Wireless Network Access Parameter Sharing
US11122404B2 (en) Electronic device, external electronic device, and method of managing embedded subscriber identity modules of external electronic device
AU2014224110B2 (en) Apparatus, method, and system for activating a mobile terminal
US10820187B2 (en) Electronic device for managing embedded subscriber identification module and method for same
JP2015515156A (ja) モバイル通信デバイスの追跡
KR20190087206A (ko) 약전계 환경에서 콜 연속성을 제공하는 전자 장치 및 제어 방법
JP4962237B2 (ja) 携帯装置の位置に関する情報とファイル用暗号鍵とを管理するためのプログラムおよび方法
WO2021000319A1 (zh) 保障终端安全的方法、装置以及系统
EP3334194A1 (en) Connection information broadcast using beacon technology
CN112866984B (zh) 通话记录的同步方法、云平台和终端
CN113784277A (zh) 用于存储位置信息的系统、方法和装置
US20130344887A1 (en) D-slp service area detection using area id
US9467856B2 (en) Secure mechanism for obtaining authorization for a discovered location server
US20220350878A1 (en) Subscriber authentication responsive to emergency services registration
JP7355919B2 (ja) 事業者ネットワーク切り替え方法および電子デバイス
EP2654328B1 (en) Remote Request during On-Going Call
US11889580B2 (en) Wireless communication units and wireless communication system and methods to support beacon technology
WO2024065337A1 (zh) 服务域限制的实现方法、装置
JPWO2008075626A1 (ja) 通信端末認証システム、インターネットを使用した電話システム
CN115500094A (zh) 一种寻呼处理方法及其装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19936414

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19936414

Country of ref document: EP

Kind code of ref document: A1