Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for realizing mobile terminal data protection

A mobile terminal and data protection technology, which is applied in the direction of security devices, electrical components, radio/inductive link selection arrangements, etc., to achieve the effects of convenient and flexible unlocking, avoiding leakage, and avoiding embezzlement

Active Publication Date: 2006-08-16
CHINA MOBILE COMM GRP CO LTD
View PDF0 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] To sum up, there is currently no technical solution that can prevent the mobile terminal from leaking content data and related information under any circumstances, and also deny others from using the mobile terminal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing mobile terminal data protection
  • Method for realizing mobile terminal data protection
  • Method for realizing mobile terminal data protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0107] This embodiment provides a method for realizing data protection of a mobile terminal when the SIM card is replaced. Specifically: when mobile terminal A with the original SIM card number 1234567890 is lost, user B picks up and replaces his own SIM card into mobile terminal A to continue using, and the replaced SIM card number is 0123456789. The flow chart of the method for realizing the data protection of the mobile terminal in this embodiment is as follows: Figure 6 shown, including the following steps:

[0108] Step 101. When the mobile terminal A is started for the first time, the network side server receives and uses the IMEI information XXXXXXYYZZZZZZB and the corresponding SIM card information 1234567890 automatically reported by the mobile terminal as the IMEI information and the corresponding SIM card information;

[0109] Step 102, the network side server receives the IMEI information XXXXXXYYZZZZZZB and the corresponding SIM card information 0123456789 autom...

Embodiment 2

[0125] Such as Figure 7 As shown, the present embodiment provides a flow chart of a method for realizing data protection of a mobile terminal when the information provided in the loss report is the original SIM card information under the same situation as that of Embodiment 1, including the following steps:

[0126] Step 201, when the mobile terminal A starts for the first time, the network side server receives and uses the IMEI information XXXXXXYYZZZZZZB and the corresponding SIM card information 1234567890 automatically reported by the mobile terminal as the IMEI information and the corresponding SIM card information, and saves the received time information;

[0127] Step 202, the network side server receives the IMEI information XXXXXXYYZZZZZZB and the corresponding SIM card information 0123456789 that is automatically reported when the mobile terminal A detects that the SIM card changes, as the current IMEI information and the corresponding SIM card information of the mo...

Embodiment 3

[0142] Such as Figure 8 As shown, this embodiment provides on the basis of Embodiment 1 or 2 to prevent the SIM card lost or stolen along with the terminal from being replaced into the mobile terminal B for continued use, including the following steps:

[0143] Step 301-step 305 is the same as step 101-step 105;

[0144] Step 306, the network side server verifies that the current SIM card 0123456789 is different from the original SIM card information 1234567890 before the lost time;

[0145] Step 307, the network side server checks whether the SIM card whose number is 0123456789 and / or the SIM card whose number is 1234567890 is in use, if yes, execute step 310, otherwise execute step 308;

[0146] Step 308, the network side server identification number is 0123456789 and / or the SIM card information whose number is 1234567890;

[0147] Step 309, the network side server detects whether the number is 0123456789 and / or whether the SIM card whose number is 1234567890 is activated...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method to realize mobile terminal data protection, the network side server receive the loss report that aim at a mobile terminal; the network side server side demand the current SIM card of the mobile terminal in the network according to the information in the loss report; the network side server send the locked software to the mobile terminal according to the information of the current SIM card; the mobile terminal run the locked software automatically, perform lock the operation of the mobile terminal; the network side terminal save the automatic reporting IMEI information and the corresponding SIM information of the mobile terminal when any mobile terminal renew the SIM card and startup; set the current IMEI information and the corresponding SIM card information. The method of the invention is that realize the lock of the mobile terminal when it startup and whether or not change the SIM card; avoid to blab the content information of the mobile terminal; also avoid the embezzlement of the mobile terminal of SIM card by other people.

Description

technical field [0001] The invention relates to a method for realizing data protection of a mobile terminal, in particular to a method for protecting data information recorded in a mobile terminal when the mobile terminal is lost or stolen. Background technique [0002] With the improvement of mobile communication technology, the functions of mobile terminal equipment are becoming more and more complex, and the recorded content is constantly enriched. At the same time, the style of mobile terminal equipment is becoming smaller and more portable. But at the same time, the advantages of flexibility and compactness of mobile terminal equipment bring the risk of easy loss or theft, and the richness of recorded content also causes a large amount of leakage of user information after loss or theft. [0003] In order to overcome this problem and realize the protection of the content data of the mobile terminal when the mobile terminal is lost or stolen, the following three methods a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04Q7/38H04Q7/32H04W12/06H04W88/02
Inventor 刘璋詟朱春梅于川
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products