CN105072603A - Mobile terminal equipment management method - Google Patents

Mobile terminal equipment management method Download PDF

Info

Publication number
CN105072603A
CN105072603A CN201510364486.1A CN201510364486A CN105072603A CN 105072603 A CN105072603 A CN 105072603A CN 201510364486 A CN201510364486 A CN 201510364486A CN 105072603 A CN105072603 A CN 105072603A
Authority
CN
China
Prior art keywords
mobile terminal
terminal device
user
log
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510364486.1A
Other languages
Chinese (zh)
Inventor
邱兰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201510364486.1A priority Critical patent/CN105072603A/en
Publication of CN105072603A publication Critical patent/CN105072603A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • H04W8/24Transfer of terminal data

Abstract

A mobile terminal equipment management method comprises a step S1 of verifying a log-in secret key of a user and executing following steps after being verified; a step S2 of judging if a registration operation is executed, if yes, executing a step S3, and if not, executing a step S4; the step S3 of relating the user to registration information of mobile terminal equipment; the step S4 of acquiring the registration information of the mobile terminal equipment; a step S5 of judging if abnormal registration exists, if not, executing a step S6, and if yes, executing a step S7; the step S6 of returning to normally-executed control commands; and the step S7 of refusing any application of the mobile terminal equipment, and sending a control command to delete all private information preset by the mobile terminal equipment. According to the mobile terminal equipment management method, the user and the registration information of the mobile terminal equipment are related, the registration information of the mobile terminal equipment is acquired and whether abnormal registration exists is judged, thereby preventing others from using the mobile terminal equipment of the user and protecting information safety of the user.

Description

Mobile terminal device management method
Technical field
The present invention relates to communication technical field, particularly relate to a kind of mobile terminal device management method.
Background technology
At present, along with the continuous progress of scientific and technological level, as the appearance of intelligent mobile terminal equipment, daily life is obtained convenient greatly.
But, in actual life, the case of losing is caused to can be found everywhere due to the neglectful reason of terminal user, more very, because these mobile terminal devices have relatively high market value and use value, the situation of being stolen and plundering also occurs often.
In fact, the mobile terminal device lost is extremely small by the probability that user gives for change, on the one hand, make user have lost expensive property, mean that the duplicate removal that needs to spend money to no avail again is newly purchased, on the other hand, user be lost and be stored in the information such as personal information a large amount of in mobile terminal device, business secret, if these information such as personal information, business secret of losing are obtained by unprincipled fellow, and then carry out illegal crime, bring serious threat by giving the information security of user.
Summary of the invention
Based on this, be necessary to provide a kind of mobile terminal device management method can protecting user information safety, other technologies scheme of the present invention, also solve the technical problem easily given for change after mobile terminal device is lost.
A kind of mobile terminal device management method, comprises the steps:
S1: authentication of users log in key, by time perform subsequent step;
S2: judge whether to perform log-on operation, if then perform step S3, then performs step S4 if not;
S3: described user is associated with the log-on message of mobile terminal device;
S4: the described log-on message obtaining described mobile terminal device;
S5: judge whether it exists abnormal registration, then performs step S6 if not, if then perform step S7;
S6: return the normal control command performed.
S7: any application refusing described mobile terminal device, sending controling instruction, for deleting whole privacy informations that described mobile terminal device is preset.
Wherein in an embodiment, when described mobile terminal device starts, perform step S4.
Wherein in an embodiment, when described mobile terminal device runs, the cycle performs step S4.
Wherein in an embodiment, in step S4, judge whether described mobile terminal device runs, if then the cycle obtains the described log-on message of described mobile terminal device.
Described user is associated with the log-on message of mobile terminal device by above-mentioned mobile terminal device management method; by obtaining the described log-on message of described mobile terminal device; and judge whether to there is abnormal registration; can prevent other people from using the mobile terminal device of user, the information security of user can be protected.
Accompanying drawing explanation
Fig. 1 is the flow chart of the mobile terminal device management method of an embodiment of the present invention.
Embodiment
For enabling above-mentioned purpose of the present invention, feature and advantage become apparent more, are described in detail the specific embodiment of the present invention below in conjunction with accompanying drawing.Set forth a lot of detail in the following description so that fully understand the present invention.But the present invention can be much different from alternate manner described here to implement, those skilled in the art can when without prejudice to doing similar improvement when intension of the present invention, therefore the present invention is by the restriction of following public concrete enforcement.
Such as, refer to Fig. 1, it is the flow chart of the mobile terminal device management method of an embodiment of the present invention, and it comprises the steps:
S1: authentication of users log in key, by time perform subsequent step;
S2: judge whether to perform log-on operation, if then perform step S3, then performs step S4 if not;
S3: described user is associated with the log-on message of mobile terminal device;
S4: the described log-on message obtaining described mobile terminal device;
S5: judge whether it exists abnormal registration, then performs step S6 if not, if then perform step S7;
S6: return the normal control command performed.
S7: any application refusing described mobile terminal device, sending controling instruction, for deleting whole privacy informations that described mobile terminal device is preset.
Such as, the mobile terminal device management method of an embodiment of the present invention comprises the steps:
S1: authentication of users log in key, by time perform subsequent step.Such as, server receives user name and encrypted message, judge whether authorized user, is, continues to perform subsequent step.
User performs normal control command to mobile terminal device, and namely user normally uses the function of this mobile terminal device, such as, control mobile terminal device and play music, and for example, control mobile terminal device and transfer immediate news, and for example, mobile terminal device display image is controlled.
Before user performs the step of the normal control command of mobile terminal device, mobile terminal device needs the login key of first authentication of users, if the login key of input is correct, then performs subsequent step, if the key of input is incorrect, then cannot perform subsequent operation to mobile terminal device.
S2: judge whether to perform log-on operation, if then perform step S3, then performs step S4 if not.
Such as, use mobile terminal device for the first time, then perform log-on operation.Such as, the solicited message of server mobile terminal receive equipment, judge whether to perform log-on operation, judged result, for being, performs step S3, and judged result is otherwise performs step S4.
S3: described user is associated with the log-on message of mobile terminal device.
Such as, initial registration information comprises mobile terminal device producer to preset unique of every platform mobile terminal device and the sequence number of correspondence.And for example, log-on message comprises user to accessing to your password of arranging voluntarily of every platform mobile terminal device, is similar to the pin code etc. of mobile phone.Such as, log-on message is: " hi! " or " Hello, everyone " or user-defined numeral and monogram, or " great long live the People's Republic of China " etc.
Such as, the log-on message of mobile terminal device also comprises the mailbox of user.And for example, the log-on message of mobile terminal device also comprises the name of user.And for example, the log-on message of mobile terminal device also comprises the telephone number of user.
In order to improve the identifiability of mobile terminal device log-on message.Such as, the log-on message of mobile terminal device also comprises the mailbox of user, the combination of other personal information such as name or telephone number.Like this, the identifiability of mobile terminal device log-on message can be improved.
And for example, described log-on message comprises user's white of the eye information, pupil information, facial information and/or eyebrow pitch information; Such as, described log-on message comprises user's white of the eye information and pupil information, like this, can utilize the camera technique of mobile terminal device, obtains user's white of the eye information and pupil information, then compares.Such as, described white of the eye information comprises shape and the area of the white of the eye, and/or described white of the eye information comprises blackspot wherein and stria vascularis.
Such as, when performing log-on operation, the log-on message of mobile terminal device is associated with user, and then the log-on message of mobile terminal device and user are bound, can specially enjoy this mobile terminal device to make user.
S4: the described log-on message obtaining described mobile terminal device.
It should be noted that, the present invention can directly perform from step S4.In order to protect the safety of user profile, with the information preventing other people from peeping customer mobile terminal device storage.Such as, when running mobile terminal device, every one section of Preset Time, also verifying the log-on message of described mobile terminal device, when passing through, can continue to use mobile terminal device, namely can perform normal control command to mobile terminal device.Like this, the safety of user profile can be protected, the information stored with the mobile terminal device preventing other people from peeping user.
In order to protect the safety of user profile, with the information preventing other people from peeping customer mobile terminal device storage.Such as, judge whether mobile terminal device runs, if then every one section of Preset Time, also verify the log-on message of mobile terminal device, when passing through, can continue to use mobile terminal device, namely can perform normal control command to mobile terminal device.Like this, the safety of user profile can be protected, the information stored with the mobile terminal device preventing other people from peeping user.
Such as, server obtains the log-on message of the mobile terminal device be associated with user and is stored in the server by described log-on message, verifies the described log-on message of described mobile terminal device with the cycle.
S5: judge whether it exists abnormal registration, then performs step S5 if not.
Such as, the non-first use mobile terminal device of user, namely the log-on message of mobile terminal device associates with user, and now, the log-on message of mobile terminal device is initial registration information.Such as, when running mobile terminal device, every one section of Preset Time, server also verifies the log-on message of mobile terminal device, if the mobile terminal device log-on message that server obtains does not mate with initial registration information, then judge that it exists abnormal registration, then cannot perform subsequent operation to mobile terminal device.
Such as, if the initial registration information of mobile terminal device that the log-on message that server obtains after recognizing first associated steps is associated with user is not mated, namely there is abnormal registration, then cannot perform subsequent operation to mobile terminal device.
In order to strengthen the controlling extent of user to mobile terminal device, be convenient to the real-time status understanding mobile terminal device.Such as, when judging to there is abnormal registration, following steps S51 is performed, to user's sending out notice information.Like this, the controlling extent of user to mobile terminal device can be strengthened, be convenient to understand the real-time status of mobile terminal device, be convenient to user and understand mobile terminal device better and whether there is abnormal registration.
In order to strengthen the controlling extent of user to mobile terminal device further, be easier to the mobile terminal device giving loss for change.Such as, after step S51, also perform following steps S52, obtain the positional information of mobile terminal device, send to user.Like this, the controlling extent of user to mobile terminal device can being strengthened further, by obtaining the positional information of mobile terminal device, being easier to the mobile terminal device that user gives loss for change.
In order to strengthen the controlling extent of user to mobile terminal device further, be easier to the mobile terminal device giving loss for change.Such as, after step S52, also perform following steps S53, the positional information of mobile device is sent to server.Like this, the controlling extent of user to mobile terminal device can be strengthened further, be easier to the mobile terminal device giving loss for change.
In order to strengthen the controlling extent of user to mobile terminal device further, be easier to the mobile terminal device giving loss for change.Such as, after step S53, also performing step S54, sending controling instruction, for opening the camera of mobile terminal device, and the image that described camera obtains being sent to server.Like this, the controlling extent of user to mobile terminal device can be strengthened, be easier to the mobile terminal device giving loss for change.
In order to the person of avoiding theft utilizes mobile terminal device to be engaged in fraudulent act, ensure the interests of user better.Such as, after step S54, also perform following steps S55, push prompting disclaimer information to user good friend, such as, prompting disclaimer information is: " every good friend; my mobile terminal device is stolen, if receive the information or phone that relate to money property, please don't believe! Thanks! " or " my mobile terminal device is lost, if receive my information and relate to money property, please ignores without exception! ".Like this, can the person of avoiding theft utilize mobile terminal device to be engaged in fraudulent act, ensure the interests of user better, and leave relief in time and prove.
In order to the person of avoiding theft uses mobile terminal device.Such as, after step S55, also perform following steps S56, mobile terminal device is automatically sounded and is shaken alarm.Like this, the effect of fright thief can be played, use mobile terminal device to prevent thief.
In order to protect the safety of user profile, using mobile terminal device the personal information of user to be sent to prevent thief or sharing network.Such as, judge whether to there is abnormal registration, if then sending controling instruction, for closing the network connecting function of described mobile terminal device.Like this, can the person of avoiding theft mobile terminal device be used the personal information of user to be sent or share network, to protect the safety of user profile.
S6: return the normal control command performed.
Such as, mobile terminal device sends log-on message to server when starting; Or mobile terminal device sends log-on message periodically to server, such as, mobile terminal device every morning 9 sends log-on message to server; Or mobile terminal device often runs some cycles and sends log-on message to server, such as, often run 100 minutes and then send log-on message to server.Or the described log-on message of server mobile terminal device described in active obtaining termly, judges wherein whether there is abnormal registration, be then sending controling instruction, for deleting whole privacy informations that described mobile terminal device is preset.Or the described log-on message of server mobile terminal device described in active obtaining termly, judges wherein whether there is abnormal registration, be then sending controling instruction, for opening the self-desttruction equipment be contained in advance in described mobile terminal device.And for example, the described log-on message of server mobile terminal device described in active obtaining termly, judges wherein whether there is abnormal registration, is then sending controling instruction, for anergy or lock described mobile terminal device.And for example, the described log-on message of server mobile terminal device described in active obtaining termly, judges wherein whether there is abnormal registration, is then sending controling instruction, for reporting to the police and the position of mobile terminal device described in real-time tracking, and output mobile path profile.
Such as, if the log-on message of the mobile terminal device that the log-on message that server obtains after recognizing first register step is associated with user matches, namely there is not abnormal registration, then can perform normal control command to mobile terminal device, such as, control mobile terminal device and play music, and for example, control mobile terminal device transfers immediate news, and and for example, controls mobile terminal device display image.
In order to protect the safety of user profile further.Such as, mobile terminal device starts or every one section of Preset Time, send password to server, server authentication is passed through, then allow to perform normal control command, if not, then cannot perform subsequent operation to mobile terminal device.
It should be noted that, mobile terminal device can be earphone, mobile phone, flat board, notebook computer, bracelet, glasses, earrings, watch or necklace.
Described user is associated with the log-on message of mobile terminal device by above-mentioned mobile terminal device management method; by obtaining the described log-on message of described mobile terminal device; and judge whether to there is abnormal registration; can prevent other people from using the mobile terminal device of user, the information security of user can be protected.
Have expressed several execution mode of the present invention, it describes comparatively concrete and detailed, but therefore can not be interpreted as the restriction to the scope of the claims of the present invention.It should be pointed out that for the person of ordinary skill of the art, without departing from the inventive concept of the premise, can also make some distortion and improvement, these all belong to protection scope of the present invention.Therefore, the protection range of patent of the present invention should be as the criterion with claims.

Claims (4)

1. a mobile terminal device management method, is characterized in that, comprises the steps:
S1: authentication of users log in key, by time perform subsequent step;
S2: judge whether to perform log-on operation, if then perform step S3, then performs step S4 if not;
S3: described user is associated with the log-on message of mobile terminal device;
S4: the described log-on message obtaining described mobile terminal device;
S5: judge whether it exists abnormal registration, then performs step S6 if not, if then perform step S7;
S6: return the normal control command performed;
S7: any application refusing described mobile terminal device, sending controling instruction, for deleting whole privacy informations that described mobile terminal device is preset.
2. mobile terminal device management method according to claim 1, is characterized in that, when described mobile terminal device starts, performs step S4.
3. mobile terminal device management method according to claim 1, is characterized in that, when described mobile terminal device runs, the cycle performs step S4.
4. mobile terminal device management method according to claim 1, is characterized in that, in step S4, judges whether described mobile terminal device runs, if then the cycle obtains the described log-on message of described mobile terminal device.
CN201510364486.1A 2015-06-25 2015-06-25 Mobile terminal equipment management method Pending CN105072603A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510364486.1A CN105072603A (en) 2015-06-25 2015-06-25 Mobile terminal equipment management method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510364486.1A CN105072603A (en) 2015-06-25 2015-06-25 Mobile terminal equipment management method

Publications (1)

Publication Number Publication Date
CN105072603A true CN105072603A (en) 2015-11-18

Family

ID=54501855

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510364486.1A Pending CN105072603A (en) 2015-06-25 2015-06-25 Mobile terminal equipment management method

Country Status (1)

Country Link
CN (1) CN105072603A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108471529A (en) * 2018-06-11 2018-08-31 河海大学文天学院 The adjustable 3D glasses of myopia degree, glasses management system and its application method

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020193094A1 (en) * 2001-06-15 2002-12-19 Lawless John P. Method and system for downloading software products directly to wireless phones
CN1645951A (en) * 2005-03-01 2005-07-27 北京立通无限科技有限公司 Method for clearing sensitive content in mobile by short message
CN101459721A (en) * 2007-12-11 2009-06-17 上海晨兴电子科技有限公司 Method and device for anti-theft tracking of mobile phone
CN101772017A (en) * 2009-01-06 2010-07-07 三星电子(中国)研发中心 Method for remotely destroying information of communication terminal and communication terminal thereof
CN101951548A (en) * 2010-09-03 2011-01-19 惠州Tcl移动通信有限公司 System and method for tracking stolen communication terminal and communication terminal
CN102014209A (en) * 2010-12-07 2011-04-13 中兴通讯股份有限公司 Mobile terminal and anti-theft method thereof
CN102497633A (en) * 2011-12-14 2012-06-13 华中科技大学 Protection method for private information in cellphones
CN102638628A (en) * 2012-03-30 2012-08-15 深圳市金立通信设备有限公司 Mobile phone anti-theft system and method based on camera and GPS (Global Position System) of mobile phone
CN102843405A (en) * 2011-06-24 2012-12-26 基信康信息技术(上海)有限公司 Mobile terminal, network server and method for anti-theft service of mobile terminal
CN103188668A (en) * 2011-12-27 2013-07-03 方正国际软件(北京)有限公司 Security protection method and security protection system for mobile terminal application
US20130281077A1 (en) * 2007-09-10 2013-10-24 NQ Mobile Lux S.A. Service management platform for configuring, monitoring, and managing mobile devices
CN103427999A (en) * 2013-08-23 2013-12-04 北京易优安信息技术有限公司 User authentication method and system

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020193094A1 (en) * 2001-06-15 2002-12-19 Lawless John P. Method and system for downloading software products directly to wireless phones
CN1645951A (en) * 2005-03-01 2005-07-27 北京立通无限科技有限公司 Method for clearing sensitive content in mobile by short message
US20130281077A1 (en) * 2007-09-10 2013-10-24 NQ Mobile Lux S.A. Service management platform for configuring, monitoring, and managing mobile devices
CN101459721A (en) * 2007-12-11 2009-06-17 上海晨兴电子科技有限公司 Method and device for anti-theft tracking of mobile phone
CN101772017A (en) * 2009-01-06 2010-07-07 三星电子(中国)研发中心 Method for remotely destroying information of communication terminal and communication terminal thereof
CN101951548A (en) * 2010-09-03 2011-01-19 惠州Tcl移动通信有限公司 System and method for tracking stolen communication terminal and communication terminal
CN102014209A (en) * 2010-12-07 2011-04-13 中兴通讯股份有限公司 Mobile terminal and anti-theft method thereof
CN102843405A (en) * 2011-06-24 2012-12-26 基信康信息技术(上海)有限公司 Mobile terminal, network server and method for anti-theft service of mobile terminal
CN102497633A (en) * 2011-12-14 2012-06-13 华中科技大学 Protection method for private information in cellphones
CN103188668A (en) * 2011-12-27 2013-07-03 方正国际软件(北京)有限公司 Security protection method and security protection system for mobile terminal application
CN102638628A (en) * 2012-03-30 2012-08-15 深圳市金立通信设备有限公司 Mobile phone anti-theft system and method based on camera and GPS (Global Position System) of mobile phone
CN103427999A (en) * 2013-08-23 2013-12-04 北京易优安信息技术有限公司 User authentication method and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108471529A (en) * 2018-06-11 2018-08-31 河海大学文天学院 The adjustable 3D glasses of myopia degree, glasses management system and its application method
CN108471529B (en) * 2018-06-11 2020-09-25 河海大学文天学院 3D glasses with adjustable myopia degrees, glasses management system and using method thereof

Similar Documents

Publication Publication Date Title
CN105069876B (en) The method and system of intelligent entrance guard control
US8595810B1 (en) Method for automatically updating application access security
CN108012268B (en) SIM card for ensuring safe use of application software on mobile phone terminal
US8452979B2 (en) Portable telecommunications apparatus
CN106797371B (en) Method and system for user authentication
CN102438237B (en) Use the access technique of mobile communication equipment
Ye et al. Security analysis of Internet-of-Things: A case study of august smart lock
Cook Selfie banking: is it a reality?
CN103281194B (en) A kind of safety and lightweight RFID ownership transfer method based on Bilinear map
CN108447154A (en) Safe unlocking method and device, encryption and decryption method and device, lock and server
Ferbrache Passwords are broken–the future shape of biometrics
KR20080085648A (en) Account fraud protection system having communication mechanism
JP2001350724A (en) User authentication system
CN105072603A (en) Mobile terminal equipment management method
US20230370463A1 (en) Air gap-based network isolation device
CN100429957C (en) Indentifying method for telecommunication smart card and terminal
CN101465733A (en) Identity authentication method based on telephone
CN106778334A (en) The guard method of account information and mobile terminal
JP2020004424A (en) Method and device for protecting privacy of mobile terminal and mobile terminal
US20220060476A1 (en) Air gap-based network isolation device
JP2004206258A (en) Multiple authentication system, computer program, and multiple authentication method
CN105050042A (en) Intelligent mobile phone management method
CN106357413A (en) Method for encrypting numbers with fingerprint and mobile terminal
Kurtz Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking
KR20090022493A (en) Device authenticating apparatus, method and computer readable record-medium on which program for executing method thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20151118

RJ01 Rejection of invention patent application after publication