Movatterモバイル変換


[0]ホーム

URL:


CN1980459B - Method for realizing information destroying at network side - Google Patents

Method for realizing information destroying at network side
Download PDF

Info

Publication number
CN1980459B
CN1980459BCN2005101259620ACN200510125962ACN1980459BCN 1980459 BCN1980459 BCN 1980459BCN 2005101259620 ACN2005101259620 ACN 2005101259620ACN 200510125962 ACN200510125962 ACN 200510125962ACN 1980459 BCN1980459 BCN 1980459B
Authority
CN
China
Prior art keywords
information
network side
destroying
user
mobile terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2005101259620A
Other languages
Chinese (zh)
Other versions
CN1980459A (en
Inventor
张峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE CorpfiledCriticalZTE Corp
Priority to CN2005101259620ApriorityCriticalpatent/CN1980459B/en
Publication of CN1980459ApublicationCriticalpatent/CN1980459A/en
Application grantedgrantedCritical
Publication of CN1980459BpublicationCriticalpatent/CN1980459B/en
Expired - Fee Relatedlegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Landscapes

Abstract

This method applies in the net side of the mobile comm. system. The bonding info of user identification codes (IC) and the international mobile equipment IC is stored in the net side. The corresponding relation between the user IC and the service code of spare operation is also stored in the net side. This method includes the following steps. The net side (a) receives from user the request of destroying the aim mobile terminal (AMT) info; (b) confirms the user right of destroying the info; (c) searches the user IC of AMT and waits for AMT registering; (d) orientates the new user IC of AMT in HLR once finds AMT registering; (e) sends to AMT the related info destroying instruction to destroy the info. After the handset registers on the net server, once the handset is lost, the net side auto destroys all handset info.

Description

A kind of network side is realized the method for information destroying
Technical field
The present invention relates to a kind of network side and realize the method for information destroying, belong to communication technical field.
Background technology
Along with electronic technology, the continuous development of computer technology, the hardware performance of portable terminals such as mobile phone and software function have obtained bigger lifting, become the capable assistant in people's life, store a large amount of privacy informations on the mobile phone easily, telephone number, log, memorandum, note, perhaps with game provider, value-added service provider's number of the account, passwords etc. are implemented binding, perhaps customized not binding hours, the calling of region and access service, perhaps has the sub-district inlet, the building door, the door, office door, safety cabinet, automobile, computer, " gate inhibition " open function of portable hard drive, in case hand-set from stolen or lose, disabled user's use may bring tremendous loss to validated user.
Summary of the invention
The technical problem to be solved in the present invention is: a kind of method that can realize information destroying at network side is provided, and this method makes target machine start set memory program, destroying information sending dependent instruction automatically after receiving cellphone subscriber's request.
The present invention realizes by following technical proposals:
A kind of network side is realized the method for information destroying, be applied to the network side of mobile communication system, described network side storing has the binding information of custom IC and international mobile equipment identification number and the corresponding relation of custom IC and service password, and this method comprises the steps:
(a) network side receives the request of the needs destruction destination mobile terminal information of reporting of user, comprises the custom IC and the service password of destination mobile terminal in this request;
(b) confirm that the user has information destroying power;
(c) network side is searched the international mobile equipment identification number of destination mobile terminal according to the custom IC of setting up and the binding information of international mobile equipment identification number, waits for that destination mobile terminal is in the net registration;
(d) network side is found destination mobile terminal when the net registration, the new custom IC of localizing objects portable terminal in HLR;
(e) network side sends the information destroying instruction according to described new custom IC to destination mobile terminal, makes it start program stored auto-destruct information.
Further, in the described step (a), the user reports the destroying information request by short message mode or liaison mode or voice service mode.
Further, the corresponding different service password of different destroying information.
Further, in the described step (b), network side confirms that then this user has information destroying power to destination mobile terminal if confirming the destination mobile terminal custom IC and the service password that report mates.
Among the present invention, mobile phone is after webserver registration, and under the situation that user mobile phone is lost, network side can be initiated the auto-destruct operation to cellphone information automatically.
Description of drawings
Fig. 1 is the method flow diagram that network side is realized information back-up in the specific embodiment of the invention.
Fig. 2 is the structured flowchart of the device that network side realization information is recovered in the specific embodiment of the invention.
Fig. 3 is the method flow diagram that network side realization information is recovered in the specific embodiment of the invention.
Fig. 4 is the method flow diagram that network side is realized information destroying in the specific embodiment of the invention.
Fig. 5 is the method flow diagram that network side is realized warning in the specific embodiment of the invention.
Embodiment
Below in conjunction with the drawings and specific embodiments the present invention is further introduced, but not as a limitation of the invention.
In order to guarantee the information security of portable terminal, the server of network side is provided with an authenticating user identification unit, is used for the user's of information resources ownership is confirmed; A user profile pretreatment unit is used to extract the type of user terminal and the storage format of various information sources; A registering unit, be used to realize the binding relationship of user's SIM card and user mobile phone, also promptly set up the binding relationship of custom IC (International Subscriber Identification Number:IMSI) and international mobile equipment identification number (International Mobile Equipment Identity:IMEI); A database is used for store various kinds of data information, also comprises: an information recovery device.This network side can be realized information back-up function, information restore funcitons, information destroying function and warning function.
Before carrying out aforesaid operations, need in the registering unit of network side, set up the binding relationship of portable terminal IMSI and IMEI, the mapping relations table of pairing service password of various operations and operand, for example: back up the mapping of certain file and operator password, destroy the mapping of all files and operator password etc., carry out different operations corresponding to different service passwords.
Network side is realized the information back-up function, the information resources of portable terminal can be backuped in the database of network side server, so that be sent to portable terminal when needed, makes portable terminal rebulid the original information resource.With reference to shown in Figure 1, implementation step is as follows:
Step 101: network side receives user's backup request, also is that portable terminal proposes the backup information application by the method that destination mobile terminal IMSI and service password are provided to network side;
The information back-up request is: by short message mode, user's service password that liaison mode or voice service mode etc. send can be provided with a plurality of service passwords in registering unit, corresponding different respectively backup information requests.
Step 102: network side confirms that then the user ID information request is legal if confirming the destination mobile terminal IMSI report mates with service password, and also being the user has ownership to the information resources of destination mobile terminal;
Step 103: the information resources data to be derived that mobile terminal receive is selected, different service passwords can be selected different information resources backups, set in registering unit;
Step 104: encrypt with user cipher receiving data, be kept in the database of network side, include information such as the format name of information source and backup version in the data, these satellite informations are added when data deposit database in automatically receiving.
Network side can be realized the information restore funcitons, thereby mobile phone has lost original information resources or when information is damaged, can rebulid individual's information resources when the user has lost.Data are recovered to mean and are covered existing various information resources in the portable terminal, so must user's write permission and user be differentiated in network side message file ownership, prevent the malice recovery.Thereby before the user carries out information recovery business, can back up the information resources on the existing mobile phone in advance.
The information restore funcitons is realized that by the information recovery device with reference to shown in Figure 2, the information recovery device comprises the recoveryrequest receiving element 21 that connects successively, is used for the information recovery request of mobile terminal receive; Recoverauthority judging unit 22, be used for determining whether this device has the content of data write permission and request recovery;Information call unit 23 is used for calling the backup information data of network side server;Data processing unit 24 is used for Backup Data deciphering and format conversion;Data transmission unit 25, the data that are used for handling send to target terminal.
With reference to shown in Figure 3, information returns on the portable terminal and comprises the steps:
Step 201: network side receives the information recovery request of portable terminal;
The information recovery request is: by short message mode, user's service password that liaison mode or voice service mode etc. send can be provided with a plurality of service passwords in registering unit, corresponding different respectively recovering information requests.
Step 202: network side confirms that then portable terminal has write permission if confirming the destination mobile terminal IMSI and the service password that report mates;
Step 203: utilize IMSI in database, to find corresponding backup file;
Step 204: utilize service password deciphering backup file;
Step 205: according to the needs recovering information Instruction Selection resource data of user's transmission;
Step 206: read the type information of portable terminal, extract the end message resource format, information source form in the database is changed;
Step 207: the data after the conversion send to portable terminal, carry out corresponding write operation by portable terminal.
Network side realizes that the purpose of information destroying is: after user mobile phone is lost, trigger program in the target terminal by the mode that sends instruction to target terminal, finish the destruction of information resources.
With reference to shown in Figure 4, the implementation method of network side information destroying comprises the steps:
Step 301: network side receives the request that needs the destroying information resource of reporting of user;
The destroying information request is for passing through short message mode, and liaison mode or voice service mode etc. send the IMSI and the service password of destination mobile terminal, and a plurality of service passwords can be set in registering unit, corresponding respectively request of destroying different information.
Step 302: network side confirms that then this user has information ownership to destination mobile terminal if confirming the destination mobile terminal IMSI and the service password that report mates, and then can carry out information destroying;
Step 303: network side is searched the IMEI of portable terminal according to IMSI that sets up and the binding relationship of IMEI, and the startup process waits for that destination mobile terminal is in the net registration;
Step 304: network side is found destination mobile terminal when the net registration, the new IMSI of localizing objects portable terminal in HLR;
Step 305: this portable terminal is sent the information destroying dependent instruction, make it start program stored auto-destruct information.
Network side realizes that the effect of warning function is: mobile phone is lost, and after being reused by the people, during the binding information of finding user's IMSI and IMEI at network side and preservation inconsistent, trigger and reports to the police, and forbids this SIM card use, notifies the owner of lost property with the information of neocaine simultaneously.
With reference to shown in Figure 5, the warning implementation procedure of network side is as follows:
Step 401: when portable terminal was registered on the net, network side obtained the IMSI and the IMEI information of portable terminal;
Step 402: network side compares the IMSI of the IMSI that obtains and IMEI information and storage in advance and IMEI binding information and judges, if find that both are inconsistent, then carries out next step, otherwise, do not handle;
Step 403: network side is forbidden the SIM card use of this IMSI;
Step 404: network side sends to user's appointed positions with the information of new SIM card.
In this step, new card information can send to designated terminal by the mode of short message, phone, also can send to the wap mail server of appointment by Email.

Claims (4)

CN2005101259620A2005-11-302005-11-30Method for realizing information destroying at network sideExpired - Fee RelatedCN1980459B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN2005101259620ACN1980459B (en)2005-11-302005-11-30Method for realizing information destroying at network side

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN2005101259620ACN1980459B (en)2005-11-302005-11-30Method for realizing information destroying at network side

Publications (2)

Publication NumberPublication Date
CN1980459A CN1980459A (en)2007-06-13
CN1980459Btrue CN1980459B (en)2010-07-14

Family

ID=38131416

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN2005101259620AExpired - Fee RelatedCN1980459B (en)2005-11-302005-11-30Method for realizing information destroying at network side

Country Status (1)

CountryLink
CN (1)CN1980459B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN101252703B (en)*2008-03-282012-05-30宇龙计算机通信科技(深圳)有限公司Terminal data protection method, system and mobile communication terminal
CN101996445B (en)*2009-08-282015-05-13中兴通讯股份有限公司Method and system for remotely controlling intelligent card
CN102005089A (en)*2009-08-282011-04-06中兴通讯股份有限公司Method and system for remotely controlling intelligent card
CN101996446B (en)2009-08-282014-06-11中兴通讯股份有限公司Method and system for remotely controlling intelligent card
CN106714124A (en)2009-08-282017-05-24中兴通讯股份有限公司Method and system for remote control of smart card
FR2979783B1 (en)*2011-09-062013-08-23Alcatel Lucent MOBILE TERMINAL FLIGHT DETECTION SYSTEM
CN103079187A (en)*2011-10-252013-05-01刘艺Method for determining cell phone identity in IP (Internet Protocol) network
CN102932811A (en)*2012-09-272013-02-13东莞宇龙通信科技有限公司Method and system for detecting lost terminal
US9892276B2 (en)*2015-11-112018-02-13International Business Machines CorporationVerifiable data destruction in a database
CN112019684A (en)*2020-08-102020-12-01Oppo(重庆)智能科技有限公司Control method and electronic device

Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN1541015A (en)*2003-10-312004-10-27大唐微电子技术有限公司Method and system of preventing handset from theft by using international id code of mobile facilities
CN1602100A (en)*2004-10-212005-03-30康健Method of backup of cell phone note based on STK or UTK tech

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN1541015A (en)*2003-10-312004-10-27大唐微电子技术有限公司Method and system of preventing handset from theft by using international id code of mobile facilities
CN1602100A (en)*2004-10-212005-03-30康健Method of backup of cell phone note based on STK or UTK tech

Also Published As

Publication numberPublication date
CN1980459A (en)2007-06-13

Similar Documents

PublicationPublication DateTitle
CN101252703B (en)Terminal data protection method, system and mobile communication terminal
CA2520787C (en)Safeguarding user data stored in mobile communications devices
EP1805932B1 (en)System and method for providing a multi-credential authentication protocol
US7353394B2 (en)System and method for digital signature authentication of SMS messages
CN105338515B (en)Data service transmission method and mobile communication equipment
CN100563391C (en) Method, system and device for data protection of mobile communication terminal equipment
US20080090548A1 (en)Method for tracking mobile communication terminal
US20040192388A1 (en)Method of unlocking a mobile telephone type wireless communication terminal
CN101568119A (en)Mobile terminal with antitheft function and antitheft method thereof
US20030181219A1 (en)Method of indicating unauthorized use of a mobile terminal
CN101626571A (en)Card information backup method and system of user identification card
CN1980459B (en)Method for realizing information destroying at network side
EP2040497B1 (en)Tracking mobile communication devices
CN1684411A (en) A method for verifying the legitimacy of mobile terminal users
US20140120900A1 (en)Safeguarding User Data Stored in Mobile Communications Devices
EP2797348B1 (en)Subscriber data management
CN1980458B (en)Method for realizing information back-up at network side
CN1980457A (en)Network-side alarm-realizing method
CN108134771B (en)Method for verifying identity of mobile phone numbers
CN1980460A (en)Mobile terminal information resource safety security control and realizing method
CN110191464B (en)Method and system for preventing SIM card from being stolen
CN108989998A (en)A kind of information processing method and device
CN2867778Y (en)Device for achieving information recovery on the side of network
CN1980461A (en)Device and method for realizing information recovery at network side
CN2852573Y (en)Mobile terminal with information backup function

Legal Events

DateCodeTitleDescription
C06Publication
PB01Publication
C10Entry into substantive examination
SE01Entry into force of request for substantive examination
C14Grant of patent or utility model
GR01Patent grant
CF01Termination of patent right due to non-payment of annual fee

Granted publication date:20100714

Termination date:20171130

CF01Termination of patent right due to non-payment of annual fee

[8]ページ先頭

©2009-2025 Movatter.jp