Method for realizing mobile terminal data protection

A mobile terminal and data protection technology, which is applied in the direction of security devices, electrical components, radio/inductive link selection arrangements, etc., to achieve the effects of convenient and flexible unlocking, avoiding leakage, and avoiding embezzlement

Active Publication Date: 2006-08-16
CHINA MOBILE COMM GRP CO LTD
View PDF0 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] To sum up, there is currently no technical solution that can prevent the mobile terminal from leaking co

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing mobile terminal data protection
  • Method for realizing mobile terminal data protection
  • Method for realizing mobile terminal data protection

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0106] Example 1:

[0107] This embodiment provides a method for realizing data protection of a mobile terminal when the SIM card is replaced. Specifically, when mobile terminal A with the original SIM card number 1234567890 is lost, user B finds it and exchanges his SIM card into mobile terminal A to continue using it. The SIM card number that is replaced is 0123456789. The flowchart of the method for realizing data protection of the mobile terminal in this embodiment is as follows: Figure 6 As shown, it includes the following steps:

[0108] Step 101: When the mobile terminal A starts for the first time, the network-side server receives and automatically reports the IMEI information XXXXXXYYZZZZZZB and the corresponding SIM card information 1234567890, which are automatically reported by the mobile terminal, as the IMEI information and the corresponding SIM card information;

[0109] Step 102: The network-side server receives the IMEI information XXXXXXYYZZZZZZB and the corresp...

Example Embodiment

[0124] Example 2:

[0125] Such as Figure 7 As shown, this embodiment provides a flowchart of a method for realizing data protection of a mobile terminal when the information provided in the loss report is the original SIM card information under the same conditions as in Embodiment 1, including the following steps:

[0126] Step 201: When the mobile terminal A starts for the first time, the network-side server receives and automatically reports the IMEI information XXXXXXYYZZZZZZB and the corresponding SIM card information 1234567890, which are automatically reported by the mobile terminal, as the IMEI information and the corresponding SIM card information, and saves the received information Time information

[0127] Step 202: The network-side server receives the IMEI information XXXXXXYYZZZZZZB and the corresponding SIM card information 0123456789 automatically reported when the mobile terminal A detects that the SIM card changes, as the current IMEI information of the mobile te...

Example Embodiment

[0141] Example 3:

[0142] Such as Figure 8 As shown, this embodiment provides on the basis of Embodiment 1 or 2, preventing the SIM card that is lost or stolen along with the terminal from being replaced in the mobile terminal B for continued use, including the following steps:

[0143] Step 301 to step 305 are the same as step 101 to step 105;

[0144] Step 306: The network-side server verifies that the current SIM card 0123456789 is different from the original SIM card information 1234567890 before the lost time;

[0145] Step 307: The network-side server verifies whether the SIM card with the number 0123456789 and / or the SIM card with the number 1234567890 is in use, if yes, go to step 310, otherwise go to step 308;

[0146] Step 308: The network side server identification number is 0123456789 and / or the SIM card information with the number 1234567890;

[0147] Step 309: The network-side server detects whether the SIM card with the number 0123456789 and / or the number 12345678...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method to realize mobile terminal data protection, the network side server receive the loss report that aim at a mobile terminal; the network side server side demand the current SIM card of the mobile terminal in the network according to the information in the loss report; the network side server send the locked software to the mobile terminal according to the information of the current SIM card; the mobile terminal run the locked software automatically, perform lock the operation of the mobile terminal; the network side terminal save the automatic reporting IMEI information and the corresponding SIM information of the mobile terminal when any mobile terminal renew the SIM card and startup; set the current IMEI information and the corresponding SIM card information. The method of the invention is that realize the lock of the mobile terminal when it startup and whether or not change the SIM card; avoid to blab the content information of the mobile terminal; also avoid the embezzlement of the mobile terminal of SIM card by other people.

Description

technical field [0001] The invention relates to a method for realizing data protection of a mobile terminal, in particular to a method for protecting data information recorded in a mobile terminal when the mobile terminal is lost or stolen. Background technique [0002] With the improvement of mobile communication technology, the functions of mobile terminal equipment are becoming more and more complex, and the recorded content is constantly enriched. At the same time, the style of mobile terminal equipment is becoming smaller and more portable. But at the same time, the advantages of flexibility and compactness of mobile terminal equipment bring the risk of easy loss or theft, and the richness of recorded content also causes a large amount of leakage of user information after loss or theft. [0003] In order to overcome this problem and realize the protection of the content data of the mobile terminal when the mobile terminal is lost or stolen, the following three methods a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04Q7/38H04Q7/32H04W12/06H04W88/02
Inventor 刘璋詟朱春梅于川
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products