Method for realizing remote cipher key destruction for secret mobile phone
A mobile phone and remote technology, which is applied in the field of remote key destruction, can solve the problem of illegal users eavesdropping on secret calls, and achieve the effect of reducing harm
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0019] An administrator's confidential mobile phone initiates a remote kill command, and sends a short message with the remote kill command through the signaling channel of the GSM system. The remotely disabled secure mobile phone receives the remote kill command as soon as it is turned on. After receiving the key data, a short message with confirmation signaling will be returned through the signaling channel of the GSM system. At this time, all the confidential data of the user's confidential mobile phone will be cleared, and the confidential mobile phone that has been remotely killed will lose the confidential call function. It is carried out without the knowledge of illegal users who own the mobile phone that has been remotely blocked and kept secret.
Embodiment 2
[0021] The security phone of a certain financial company consists of an administrator security phone and several user security phones. Only the administrator security phone has the authority to initiate a remote kill command. The distinction between the administrator security phone and the user security phone is determined by the smartphone in the security phone. The identification code on the IC card is determined. The administrator's confidential mobile phone inputs the number of the user's confidential mobile phone that is remote-killed, and sends a remote-killing command, that is, sends a short message with the remote-killing command through the signaling channel of the GSM system. After the user's confidential mobile phone receives a short message with a remote kill command, after successfully destroying the key data in the confidential mobile phone, it returns a short message with confirmation signaling through the signaling channel of the GSM system. The short message o...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More