CN105072603A - Mobile terminal equipment management method - Google Patents
Mobile terminal equipment management method Download PDFInfo
- Publication number
- CN105072603A CN105072603A CN201510364486.1A CN201510364486A CN105072603A CN 105072603 A CN105072603 A CN 105072603A CN 201510364486 A CN201510364486 A CN 201510364486A CN 105072603 A CN105072603 A CN 105072603A
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- terminal device
- user
- log
- message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/22—Processing or transfer of terminal data, e.g. status or physical capabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/22—Processing or transfer of terminal data, e.g. status or physical capabilities
- H04W8/24—Transfer of terminal data
Abstract
A mobile terminal equipment management method comprises a step S1 of verifying a log-in secret key of a user and executing following steps after being verified; a step S2 of judging if a registration operation is executed, if yes, executing a step S3, and if not, executing a step S4; the step S3 of relating the user to registration information of mobile terminal equipment; the step S4 of acquiring the registration information of the mobile terminal equipment; a step S5 of judging if abnormal registration exists, if not, executing a step S6, and if yes, executing a step S7; the step S6 of returning to normally-executed control commands; and the step S7 of refusing any application of the mobile terminal equipment, and sending a control command to delete all private information preset by the mobile terminal equipment. According to the mobile terminal equipment management method, the user and the registration information of the mobile terminal equipment are related, the registration information of the mobile terminal equipment is acquired and whether abnormal registration exists is judged, thereby preventing others from using the mobile terminal equipment of the user and protecting information safety of the user.
Description
Technical field
The present invention relates to communication technical field, particularly relate to a kind of mobile terminal device management method.
Background technology
At present, along with the continuous progress of scientific and technological level, as the appearance of intelligent mobile terminal equipment, daily life is obtained convenient greatly.
But, in actual life, the case of losing is caused to can be found everywhere due to the neglectful reason of terminal user, more very, because these mobile terminal devices have relatively high market value and use value, the situation of being stolen and plundering also occurs often.
In fact, the mobile terminal device lost is extremely small by the probability that user gives for change, on the one hand, make user have lost expensive property, mean that the duplicate removal that needs to spend money to no avail again is newly purchased, on the other hand, user be lost and be stored in the information such as personal information a large amount of in mobile terminal device, business secret, if these information such as personal information, business secret of losing are obtained by unprincipled fellow, and then carry out illegal crime, bring serious threat by giving the information security of user.
Summary of the invention
Based on this, be necessary to provide a kind of mobile terminal device management method can protecting user information safety, other technologies scheme of the present invention, also solve the technical problem easily given for change after mobile terminal device is lost.
A kind of mobile terminal device management method, comprises the steps:
S1: authentication of users log in key, by time perform subsequent step;
S2: judge whether to perform log-on operation, if then perform step S3, then performs step S4 if not;
S3: described user is associated with the log-on message of mobile terminal device;
S4: the described log-on message obtaining described mobile terminal device;
S5: judge whether it exists abnormal registration, then performs step S6 if not, if then perform step S7;
S6: return the normal control command performed.
S7: any application refusing described mobile terminal device, sending controling instruction, for deleting whole privacy informations that described mobile terminal device is preset.
Wherein in an embodiment, when described mobile terminal device starts, perform step S4.
Wherein in an embodiment, when described mobile terminal device runs, the cycle performs step S4.
Wherein in an embodiment, in step S4, judge whether described mobile terminal device runs, if then the cycle obtains the described log-on message of described mobile terminal device.
Described user is associated with the log-on message of mobile terminal device by above-mentioned mobile terminal device management method; by obtaining the described log-on message of described mobile terminal device; and judge whether to there is abnormal registration; can prevent other people from using the mobile terminal device of user, the information security of user can be protected.
Accompanying drawing explanation
Fig. 1 is the flow chart of the mobile terminal device management method of an embodiment of the present invention.
Embodiment
For enabling above-mentioned purpose of the present invention, feature and advantage become apparent more, are described in detail the specific embodiment of the present invention below in conjunction with accompanying drawing.Set forth a lot of detail in the following description so that fully understand the present invention.But the present invention can be much different from alternate manner described here to implement, those skilled in the art can when without prejudice to doing similar improvement when intension of the present invention, therefore the present invention is by the restriction of following public concrete enforcement.
Such as, refer to Fig. 1, it is the flow chart of the mobile terminal device management method of an embodiment of the present invention, and it comprises the steps:
S1: authentication of users log in key, by time perform subsequent step;
S2: judge whether to perform log-on operation, if then perform step S3, then performs step S4 if not;
S3: described user is associated with the log-on message of mobile terminal device;
S4: the described log-on message obtaining described mobile terminal device;
S5: judge whether it exists abnormal registration, then performs step S6 if not, if then perform step S7;
S6: return the normal control command performed.
S7: any application refusing described mobile terminal device, sending controling instruction, for deleting whole privacy informations that described mobile terminal device is preset.
Such as, the mobile terminal device management method of an embodiment of the present invention comprises the steps:
S1: authentication of users log in key, by time perform subsequent step.Such as, server receives user name and encrypted message, judge whether authorized user, is, continues to perform subsequent step.
User performs normal control command to mobile terminal device, and namely user normally uses the function of this mobile terminal device, such as, control mobile terminal device and play music, and for example, control mobile terminal device and transfer immediate news, and for example, mobile terminal device display image is controlled.
Before user performs the step of the normal control command of mobile terminal device, mobile terminal device needs the login key of first authentication of users, if the login key of input is correct, then performs subsequent step, if the key of input is incorrect, then cannot perform subsequent operation to mobile terminal device.
S2: judge whether to perform log-on operation, if then perform step S3, then performs step S4 if not.
Such as, use mobile terminal device for the first time, then perform log-on operation.Such as, the solicited message of server mobile terminal receive equipment, judge whether to perform log-on operation, judged result, for being, performs step S3, and judged result is otherwise performs step S4.
S3: described user is associated with the log-on message of mobile terminal device.
Such as, initial registration information comprises mobile terminal device producer to preset unique of every platform mobile terminal device and the sequence number of correspondence.And for example, log-on message comprises user to accessing to your password of arranging voluntarily of every platform mobile terminal device, is similar to the pin code etc. of mobile phone.Such as, log-on message is: " hi! " or " Hello, everyone " or user-defined numeral and monogram, or " great long live the People's Republic of China " etc.
Such as, the log-on message of mobile terminal device also comprises the mailbox of user.And for example, the log-on message of mobile terminal device also comprises the name of user.And for example, the log-on message of mobile terminal device also comprises the telephone number of user.
In order to improve the identifiability of mobile terminal device log-on message.Such as, the log-on message of mobile terminal device also comprises the mailbox of user, the combination of other personal information such as name or telephone number.Like this, the identifiability of mobile terminal device log-on message can be improved.
And for example, described log-on message comprises user's white of the eye information, pupil information, facial information and/or eyebrow pitch information; Such as, described log-on message comprises user's white of the eye information and pupil information, like this, can utilize the camera technique of mobile terminal device, obtains user's white of the eye information and pupil information, then compares.Such as, described white of the eye information comprises shape and the area of the white of the eye, and/or described white of the eye information comprises blackspot wherein and stria vascularis.
Such as, when performing log-on operation, the log-on message of mobile terminal device is associated with user, and then the log-on message of mobile terminal device and user are bound, can specially enjoy this mobile terminal device to make user.
S4: the described log-on message obtaining described mobile terminal device.
It should be noted that, the present invention can directly perform from step S4.In order to protect the safety of user profile, with the information preventing other people from peeping customer mobile terminal device storage.Such as, when running mobile terminal device, every one section of Preset Time, also verifying the log-on message of described mobile terminal device, when passing through, can continue to use mobile terminal device, namely can perform normal control command to mobile terminal device.Like this, the safety of user profile can be protected, the information stored with the mobile terminal device preventing other people from peeping user.
In order to protect the safety of user profile, with the information preventing other people from peeping customer mobile terminal device storage.Such as, judge whether mobile terminal device runs, if then every one section of Preset Time, also verify the log-on message of mobile terminal device, when passing through, can continue to use mobile terminal device, namely can perform normal control command to mobile terminal device.Like this, the safety of user profile can be protected, the information stored with the mobile terminal device preventing other people from peeping user.
Such as, server obtains the log-on message of the mobile terminal device be associated with user and is stored in the server by described log-on message, verifies the described log-on message of described mobile terminal device with the cycle.
S5: judge whether it exists abnormal registration, then performs step S5 if not.
Such as, the non-first use mobile terminal device of user, namely the log-on message of mobile terminal device associates with user, and now, the log-on message of mobile terminal device is initial registration information.Such as, when running mobile terminal device, every one section of Preset Time, server also verifies the log-on message of mobile terminal device, if the mobile terminal device log-on message that server obtains does not mate with initial registration information, then judge that it exists abnormal registration, then cannot perform subsequent operation to mobile terminal device.
Such as, if the initial registration information of mobile terminal device that the log-on message that server obtains after recognizing first associated steps is associated with user is not mated, namely there is abnormal registration, then cannot perform subsequent operation to mobile terminal device.
In order to strengthen the controlling extent of user to mobile terminal device, be convenient to the real-time status understanding mobile terminal device.Such as, when judging to there is abnormal registration, following steps S51 is performed, to user's sending out notice information.Like this, the controlling extent of user to mobile terminal device can be strengthened, be convenient to understand the real-time status of mobile terminal device, be convenient to user and understand mobile terminal device better and whether there is abnormal registration.
In order to strengthen the controlling extent of user to mobile terminal device further, be easier to the mobile terminal device giving loss for change.Such as, after step S51, also perform following steps S52, obtain the positional information of mobile terminal device, send to user.Like this, the controlling extent of user to mobile terminal device can being strengthened further, by obtaining the positional information of mobile terminal device, being easier to the mobile terminal device that user gives loss for change.
In order to strengthen the controlling extent of user to mobile terminal device further, be easier to the mobile terminal device giving loss for change.Such as, after step S52, also perform following steps S53, the positional information of mobile device is sent to server.Like this, the controlling extent of user to mobile terminal device can be strengthened further, be easier to the mobile terminal device giving loss for change.
In order to strengthen the controlling extent of user to mobile terminal device further, be easier to the mobile terminal device giving loss for change.Such as, after step S53, also performing step S54, sending controling instruction, for opening the camera of mobile terminal device, and the image that described camera obtains being sent to server.Like this, the controlling extent of user to mobile terminal device can be strengthened, be easier to the mobile terminal device giving loss for change.
In order to the person of avoiding theft utilizes mobile terminal device to be engaged in fraudulent act, ensure the interests of user better.Such as, after step S54, also perform following steps S55, push prompting disclaimer information to user good friend, such as, prompting disclaimer information is: " every good friend; my mobile terminal device is stolen, if receive the information or phone that relate to money property, please don't believe! Thanks! " or " my mobile terminal device is lost, if receive my information and relate to money property, please ignores without exception! ".Like this, can the person of avoiding theft utilize mobile terminal device to be engaged in fraudulent act, ensure the interests of user better, and leave relief in time and prove.
In order to the person of avoiding theft uses mobile terminal device.Such as, after step S55, also perform following steps S56, mobile terminal device is automatically sounded and is shaken alarm.Like this, the effect of fright thief can be played, use mobile terminal device to prevent thief.
In order to protect the safety of user profile, using mobile terminal device the personal information of user to be sent to prevent thief or sharing network.Such as, judge whether to there is abnormal registration, if then sending controling instruction, for closing the network connecting function of described mobile terminal device.Like this, can the person of avoiding theft mobile terminal device be used the personal information of user to be sent or share network, to protect the safety of user profile.
S6: return the normal control command performed.
Such as, mobile terminal device sends log-on message to server when starting; Or mobile terminal device sends log-on message periodically to server, such as, mobile terminal device every morning 9 sends log-on message to server; Or mobile terminal device often runs some cycles and sends log-on message to server, such as, often run 100 minutes and then send log-on message to server.Or the described log-on message of server mobile terminal device described in active obtaining termly, judges wherein whether there is abnormal registration, be then sending controling instruction, for deleting whole privacy informations that described mobile terminal device is preset.Or the described log-on message of server mobile terminal device described in active obtaining termly, judges wherein whether there is abnormal registration, be then sending controling instruction, for opening the self-desttruction equipment be contained in advance in described mobile terminal device.And for example, the described log-on message of server mobile terminal device described in active obtaining termly, judges wherein whether there is abnormal registration, is then sending controling instruction, for anergy or lock described mobile terminal device.And for example, the described log-on message of server mobile terminal device described in active obtaining termly, judges wherein whether there is abnormal registration, is then sending controling instruction, for reporting to the police and the position of mobile terminal device described in real-time tracking, and output mobile path profile.
Such as, if the log-on message of the mobile terminal device that the log-on message that server obtains after recognizing first register step is associated with user matches, namely there is not abnormal registration, then can perform normal control command to mobile terminal device, such as, control mobile terminal device and play music, and for example, control mobile terminal device transfers immediate news, and and for example, controls mobile terminal device display image.
In order to protect the safety of user profile further.Such as, mobile terminal device starts or every one section of Preset Time, send password to server, server authentication is passed through, then allow to perform normal control command, if not, then cannot perform subsequent operation to mobile terminal device.
It should be noted that, mobile terminal device can be earphone, mobile phone, flat board, notebook computer, bracelet, glasses, earrings, watch or necklace.
Described user is associated with the log-on message of mobile terminal device by above-mentioned mobile terminal device management method; by obtaining the described log-on message of described mobile terminal device; and judge whether to there is abnormal registration; can prevent other people from using the mobile terminal device of user, the information security of user can be protected.
Have expressed several execution mode of the present invention, it describes comparatively concrete and detailed, but therefore can not be interpreted as the restriction to the scope of the claims of the present invention.It should be pointed out that for the person of ordinary skill of the art, without departing from the inventive concept of the premise, can also make some distortion and improvement, these all belong to protection scope of the present invention.Therefore, the protection range of patent of the present invention should be as the criterion with claims.
Claims (4)
1. a mobile terminal device management method, is characterized in that, comprises the steps:
S1: authentication of users log in key, by time perform subsequent step;
S2: judge whether to perform log-on operation, if then perform step S3, then performs step S4 if not;
S3: described user is associated with the log-on message of mobile terminal device;
S4: the described log-on message obtaining described mobile terminal device;
S5: judge whether it exists abnormal registration, then performs step S6 if not, if then perform step S7;
S6: return the normal control command performed;
S7: any application refusing described mobile terminal device, sending controling instruction, for deleting whole privacy informations that described mobile terminal device is preset.
2. mobile terminal device management method according to claim 1, is characterized in that, when described mobile terminal device starts, performs step S4.
3. mobile terminal device management method according to claim 1, is characterized in that, when described mobile terminal device runs, the cycle performs step S4.
4. mobile terminal device management method according to claim 1, is characterized in that, in step S4, judges whether described mobile terminal device runs, if then the cycle obtains the described log-on message of described mobile terminal device.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510364486.1A CN105072603A (en) | 2015-06-25 | 2015-06-25 | Mobile terminal equipment management method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510364486.1A CN105072603A (en) | 2015-06-25 | 2015-06-25 | Mobile terminal equipment management method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105072603A true CN105072603A (en) | 2015-11-18 |
Family
ID=54501855
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510364486.1A Pending CN105072603A (en) | 2015-06-25 | 2015-06-25 | Mobile terminal equipment management method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105072603A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108471529A (en) * | 2018-06-11 | 2018-08-31 | 河海大学文天学院 | The adjustable 3D glasses of myopia degree, glasses management system and its application method |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020193094A1 (en) * | 2001-06-15 | 2002-12-19 | Lawless John P. | Method and system for downloading software products directly to wireless phones |
CN1645951A (en) * | 2005-03-01 | 2005-07-27 | 北京立通无限科技有限公司 | Method for clearing sensitive content in mobile by short message |
CN101459721A (en) * | 2007-12-11 | 2009-06-17 | 上海晨兴电子科技有限公司 | Method and device for anti-theft tracking of mobile phone |
CN101772017A (en) * | 2009-01-06 | 2010-07-07 | 三星电子(中国)研发中心 | Method for remotely destroying information of communication terminal and communication terminal thereof |
CN101951548A (en) * | 2010-09-03 | 2011-01-19 | 惠州Tcl移动通信有限公司 | System and method for tracking stolen communication terminal and communication terminal |
CN102014209A (en) * | 2010-12-07 | 2011-04-13 | 中兴通讯股份有限公司 | Mobile terminal and anti-theft method thereof |
CN102497633A (en) * | 2011-12-14 | 2012-06-13 | 华中科技大学 | Protection method for private information in cellphones |
CN102638628A (en) * | 2012-03-30 | 2012-08-15 | 深圳市金立通信设备有限公司 | Mobile phone anti-theft system and method based on camera and GPS (Global Position System) of mobile phone |
CN102843405A (en) * | 2011-06-24 | 2012-12-26 | 基信康信息技术(上海)有限公司 | Mobile terminal, network server and method for anti-theft service of mobile terminal |
CN103188668A (en) * | 2011-12-27 | 2013-07-03 | 方正国际软件(北京)有限公司 | Security protection method and security protection system for mobile terminal application |
US20130281077A1 (en) * | 2007-09-10 | 2013-10-24 | NQ Mobile Lux S.A. | Service management platform for configuring, monitoring, and managing mobile devices |
CN103427999A (en) * | 2013-08-23 | 2013-12-04 | 北京易优安信息技术有限公司 | User authentication method and system |
-
2015
- 2015-06-25 CN CN201510364486.1A patent/CN105072603A/en active Pending
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020193094A1 (en) * | 2001-06-15 | 2002-12-19 | Lawless John P. | Method and system for downloading software products directly to wireless phones |
CN1645951A (en) * | 2005-03-01 | 2005-07-27 | 北京立通无限科技有限公司 | Method for clearing sensitive content in mobile by short message |
US20130281077A1 (en) * | 2007-09-10 | 2013-10-24 | NQ Mobile Lux S.A. | Service management platform for configuring, monitoring, and managing mobile devices |
CN101459721A (en) * | 2007-12-11 | 2009-06-17 | 上海晨兴电子科技有限公司 | Method and device for anti-theft tracking of mobile phone |
CN101772017A (en) * | 2009-01-06 | 2010-07-07 | 三星电子(中国)研发中心 | Method for remotely destroying information of communication terminal and communication terminal thereof |
CN101951548A (en) * | 2010-09-03 | 2011-01-19 | 惠州Tcl移动通信有限公司 | System and method for tracking stolen communication terminal and communication terminal |
CN102014209A (en) * | 2010-12-07 | 2011-04-13 | 中兴通讯股份有限公司 | Mobile terminal and anti-theft method thereof |
CN102843405A (en) * | 2011-06-24 | 2012-12-26 | 基信康信息技术(上海)有限公司 | Mobile terminal, network server and method for anti-theft service of mobile terminal |
CN102497633A (en) * | 2011-12-14 | 2012-06-13 | 华中科技大学 | Protection method for private information in cellphones |
CN103188668A (en) * | 2011-12-27 | 2013-07-03 | 方正国际软件(北京)有限公司 | Security protection method and security protection system for mobile terminal application |
CN102638628A (en) * | 2012-03-30 | 2012-08-15 | 深圳市金立通信设备有限公司 | Mobile phone anti-theft system and method based on camera and GPS (Global Position System) of mobile phone |
CN103427999A (en) * | 2013-08-23 | 2013-12-04 | 北京易优安信息技术有限公司 | User authentication method and system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108471529A (en) * | 2018-06-11 | 2018-08-31 | 河海大学文天学院 | The adjustable 3D glasses of myopia degree, glasses management system and its application method |
CN108471529B (en) * | 2018-06-11 | 2020-09-25 | 河海大学文天学院 | 3D glasses with adjustable myopia degrees, glasses management system and using method thereof |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105069876B (en) | The method and system of intelligent entrance guard control | |
US8595810B1 (en) | Method for automatically updating application access security | |
CN108012268B (en) | SIM card for ensuring safe use of application software on mobile phone terminal | |
US8452979B2 (en) | Portable telecommunications apparatus | |
CN106797371B (en) | Method and system for user authentication | |
CN102438237B (en) | Use the access technique of mobile communication equipment | |
Ye et al. | Security analysis of Internet-of-Things: A case study of august smart lock | |
Cook | Selfie banking: is it a reality? | |
CN103281194B (en) | A kind of safety and lightweight RFID ownership transfer method based on Bilinear map | |
CN108447154A (en) | Safe unlocking method and device, encryption and decryption method and device, lock and server | |
Ferbrache | Passwords are broken–the future shape of biometrics | |
KR20080085648A (en) | Account fraud protection system having communication mechanism | |
JP2001350724A (en) | User authentication system | |
CN105072603A (en) | Mobile terminal equipment management method | |
US20230370463A1 (en) | Air gap-based network isolation device | |
CN100429957C (en) | Indentifying method for telecommunication smart card and terminal | |
CN101465733A (en) | Identity authentication method based on telephone | |
CN106778334A (en) | The guard method of account information and mobile terminal | |
JP2020004424A (en) | Method and device for protecting privacy of mobile terminal and mobile terminal | |
US20220060476A1 (en) | Air gap-based network isolation device | |
JP2004206258A (en) | Multiple authentication system, computer program, and multiple authentication method | |
CN105050042A (en) | Intelligent mobile phone management method | |
CN106357413A (en) | Method for encrypting numbers with fingerprint and mobile terminal | |
Kurtz | Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking | |
KR20090022493A (en) | Device authenticating apparatus, method and computer readable record-medium on which program for executing method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20151118 |
|
RJ01 | Rejection of invention patent application after publication |