Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security protection method and security protection system for mobile terminal application

A mobile terminal and security protection technology, applied in security devices, electrical components, wireless communications, etc., can solve problems such as poor security, insufficient use of SIM card number device binding, legitimate users cannot be detected and protected in time, and improve Effects of Safety and Convenience

Active Publication Date: 2013-07-03
方正国际软件(北京)有限公司
View PDF5 Cites 44 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] 1. The mobile terminal device is always by the user's side, and the characteristics of the mobile terminal device (unique identification, SIM card number (mobile phone number)) are not fully utilized for device binding
[0009] 2. When the user name and password are stolen or can be used on other different devices, legitimate users cannot be detected and protected in time, and the security is poor
[0010] 3. When the device is lost, it cannot prevent illegal users from using it in time, and the security is poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security protection method and security protection system for mobile terminal application
  • Security protection method and security protection system for mobile terminal application
  • Security protection method and security protection system for mobile terminal application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0074] 1. First, when the user registers, the application automatically obtains the unique identifier of the mobile terminal equipment (IMEI number), the mobile user identity identifier (IMSI number), and sends it to the server for registration along with the registration information (login name, password) filled in by the user , and bind the login information with the equipment terminal identifier (IMEI) and SIM card information (IMSI) hardware information to form a user identity identifier, such as Figure 6 as shown,

[0075] When registering:

[0076] Mobile terminal equipment identification (IMEI number): 012154009774002

[0077] Mobile subscriber identity (SIM card number IMSI): 460006531643738

[0078] User registration name and password: whylcq, 123456

[0079] 2. Automatically detect and obtain the current user identity information and send it to the server when logging in.

[0080] When logging in:

[0081] Mobile terminal equipment identification (IMEI number):...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security protection method and a security protection system for a mobile terminal application, and belongs to the field of terminal application security protection. The method comprises the steps that a mobile terminal equipment identity, a mobile subscriber identity and subscriber login information are sent to a server for registration during a registration course, and bound to form a subscriber identity; login information, the mobile terminal equipment identity and the mobile subscriber identity in the current subscriber identity are compared with the original subscriber identity in the server sequentially during a login course to determine information required to be updated; and updating is performed by authentication of the original mobile subscriber identity finally. According to the method and the system, a mobile terminal equipment information binding method is adopted, so that the security problems due to the fact that terminal equipment is updated, an SIM (Subscriber Identity Module) card number is replaced or the subscriber login information is stolen under the condition of single registration of a subscriber are solved, and the security and conveniences of the terminal application are improved.

Description

technical field [0001] The present invention relates to the technical field of terminal application security protection, in particular to a method and system for security protection of mobile terminal applications. Background technique [0002] With the maturity of the mobile Internet and the popularization of smart mobile terminals, search, reading, games, and business based on smart terminals have become an indispensable part of people's lives, and smart mobile terminals have become an indispensable tool for people's lives. However, due to loss, replacement, equipment update, SIM card number replacement and forgotten registered account, etc. bring convenience to people while enjoying the mobile Internet, but also add troubles. [0003] The users of existing smart mobile terminal applications basically adopt the following methods: [0004] 1. The registration information includes user name, password, and email address. Sometimes the email address is directly used as the us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06
Inventor 梁长庆
Owner 方正国际软件(北京)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products