Unlock instant, AI-driven research and patent intelligence for your innovation.

Terminal information protection method, system, network-side equipment and terminal

A network-side device and terminal information technology, applied in network data management, wireless communication, electrical components, etc., can solve problems such as slow operation, low security, and potential safety hazards

Active Publication Date: 2015-09-30
CHINA MOBILE COMM GRP CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The process of retrieving or resetting the password after the password is lost is based on the mobile phone number, and neither the operator nor the APP manufacturer can perform security control, so there will be a large security risk
In this way, when the terminal is lost or stolen, the user can only confirm by resetting the password of each APP, which has the disadvantages of slow operation and low security
In addition, there are some users who directly log in to the APP by remembering the password, which will directly cause security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal information protection method, system, network-side equipment and terminal
  • Terminal information protection method, system, network-side equipment and terminal
  • Terminal information protection method, system, network-side equipment and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0113] The terminal information protection method provided by this embodiment, such as figure 1 shown, including the following steps:

[0114]Step 100: the network side saves terminal related information;

[0115] Here, the terminal-related information may be association information between a terminal identifier and an APP, or may be a terminal identifier.

[0116] Wherein, the terminal identifier may be a mobile phone number, and / or IMEI, and / or MAC address, and the like.

[0117] The APP-related information in the associated information may be the name of the APP, and / or the identifier of the APP, and the like.

[0118] When the terminal-related information is the association information between the terminal identifier and the APP, the network side saves the terminal-related information, specifically including:

[0119] The network side saves the association information between the terminal identifier and the APP according to the reported association information between t...

Embodiment 2

[0131] The terminal information protection method provided by this embodiment, such as figure 2 shown, including the following steps:

[0132] Step 201: The terminal receives an instruction to perform invalidation processing sent by the network side;

[0133] Step 202: The terminal performs invalidation-related processing according to the received instruction.

[0134] Here, when the instruction to perform invalidation processing is an indication of an invalid APP, performing invalidation-related processing specifically includes:

[0135] The middleware unit of the terminal closes the interface between the operating system of the terminal and the corresponding APP application layer according to the received indication of the failed APP; or,

[0136] After the process unit of the corresponding APP receives the indication of the invalid APP, when the corresponding APP is opened, the corresponding APP is directly invalidated.

[0137] In actual application, the APP correspond...

Embodiment 3

[0142] The terminal information protection method provided by this embodiment, such as image 3 shown, including the following steps:

[0143] Step 300: the network side saves terminal related information;

[0144] Here, the terminal-related information may be association information between a terminal identifier and an APP, or may be a terminal identifier.

[0145] The terminal identifier may be a mobile phone number, and / or IMEI, and / or MAC address, and the like.

[0146] The APP-related information in the associated information may be the name of the APP, and / or the identifier of the APP, and the like.

[0147] When the terminal-related information is the association information between the terminal identifier and the APP, the network side saves the terminal-related information, specifically including:

[0148] The network side saves the association information between the terminal identifier and the APP according to the reported association information between the termi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a terminal information protection method, which comprises steps: after a failure terminal indication is received, the network side indicates to perform failure treatment on the corresponding terminal according to saved terminal related information. The invention also discloses a terminal information protection system, network-side equipment and a terminal.

Description

technical field [0001] The present invention relates to security technology in the field of wireless communication, in particular to a terminal information protection method, system, network side equipment and terminal. Background technique [0002] With the development of technology, the application layer of the terminal integrates many applications (APP, APPlication). Each APP is generally bound to a mobile phone number, or password protection is set based on the mobile phone number. Therefore, when the password is lost and the password is retrieved / reset or payment confirmation is performed, many APPs need to operate based on the mobile phone number. [0003] The process of retrieving or resetting the password after the password is lost is based on the mobile phone number, and neither the operator nor the APP manufacturer can perform security control, so there will be a large security risk. In this way, when the terminal is lost or stolen, the user can only confirm by re...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/00H04W12/30
CPCH04W8/24H04W12/00
Inventor 丁海煜王军高有军江天明杨宁
Owner CHINA MOBILE COMM GRP CO LTD