CN106304063A - A kind of terminal and the method for protection terminal data safety - Google Patents

A kind of terminal and the method for protection terminal data safety Download PDF

Info

Publication number
CN106304063A
CN106304063A CN201510280537.2A CN201510280537A CN106304063A CN 106304063 A CN106304063 A CN 106304063A CN 201510280537 A CN201510280537 A CN 201510280537A CN 106304063 A CN106304063 A CN 106304063A
Authority
CN
China
Prior art keywords
terminal
access module
described terminal
positional information
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201510280537.2A
Other languages
Chinese (zh)
Inventor
郝志坚
朱钰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201510280537.2A priority Critical patent/CN106304063A/en
Priority to PCT/CN2015/087038 priority patent/WO2016187966A1/en
Publication of CN106304063A publication Critical patent/CN106304063A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a kind of terminal and the method for protection terminal data safety, the method may include that when terminal is lit, and described terminal authenticates according to input instruction;When, after the failure of described terminal authentication, described terminal enters the first access module;When, after the success of described terminal authentication, described terminal enters the second access module.

Description

A kind of terminal and the method for protection terminal data safety
Technical field
The present invention relates to information security technology, a kind of terminal and the method for protection terminal data safety.
Background technology
Along with development and the maturation of communication technology, mobile terminal has become people's daily life and work In indispensable instrument.Much users are by individual privacy information and data, such as Bank Account Number, password, The storage such as financial information, personally identifiable information is to mobile terminal.When mobile terminal is lost or needs interim Use when using to other people, it is easy to privacy information and the leaking data of individual are gone out.
At present, the scheme protecting terminal individual privacy information and data safety to be used is generally and arranges with whole The network account of client identification module (SIM, Subscriber Identity Module) the card number binding of end, Just can carry out location tracking in the way of utilizing network account by remotely control once terminal loss, pass through Send the data in instruction erasing mobile phone, thus ensure the safety of terminal data.
But the scheme of this protection terminal data safety needs user to shift to an earlier date log on account and mobile terminal SIM bind mutually, and when after terminal loss can due to can not in time or be inconvenient to carry out network control, Or mobile terminal is by directly brush machine or has changed the SIM of terminal and makes to protect at present number of terminals Lost efficacy according to the scheme of safety.
Summary of the invention
In order to solve above-mentioned technical problem, the invention provides a kind of terminal and protect terminal data safety Method, it is possible to prevent important information in mobile terminal compromised and give the mobile terminal of loss in time for change, Improve terminal data and the safety of terminal itself.
In order to reach the object of the invention, the invention provides a kind of method protecting terminal data safety, institute The method of stating includes:
When terminal is lit, described terminal authenticates according to input instruction;
When, after the failure of described terminal authentication, described terminal enters the first access module;Wherein, described first Access module is for be set to may have access to by lower security rank data, and other security level data are disposed as not May have access to, and according to default sending strategy and be pre-stored in terminal security region target terminal letter Cease and the positional information of described terminal self and the identification information of described terminal are sent to target terminal;
When, after the success of described terminal authentication, described terminal enters the second access module;Wherein, described second Access module is to be disposed as may have access to by all data of terminal.
Further, described method also includes: described terminal arranges terminal according to the safety of data in advance The level of security of data.
Further, described terminal authenticates according to input instruction, including:
Described terminal receives the encrypted message of input;
Described terminal by the encrypted message of described input with preset encrypted message compare, when both one During cause, authenticate successfully;When both are inconsistent, failed authentication.
Further, described terminal according to default sending strategy and is pre-stored in terminal security region The positional information of terminal self and the identification information of terminal are sent to target terminal, tool by target terminal information Body includes:
Described terminal obtains current positional information, and compares with the secure location information prestored;
When the positional information that described terminal is current is consistent with the described secure location information prestored, described end End does not send positional information and the identification information of described terminal of self;
When the positional information that described terminal is current is inconsistent with the described secure location information prestored, described The described positional information of self and the identification information of described terminal are sent by terminal at predetermined intervals To described target terminal.
Further, when, after the success of described terminal authentication, described terminal enters the second access module, specifically Including:
After described terminal was in the first access module, and the success of described terminal authentication before lighting, institute State terminal and stop sending self positional information and the identification information of terminal, and enter the second access module;
After described terminal was in the second access module, and the success of described terminal authentication before lighting, institute State terminal and keep the second access module.
The invention provides a kind of terminal, described terminal includes: monitoring means, authenticating unit and access control Unit processed, wherein,
Described monitoring means, is used for monitoring whether described terminal is lighted;And monitor described terminal by point Time bright, trigger described authenticating unit;
Described authenticating unit, for authenticating according to input instruction;And trigger described access control unit;
Described access control unit, for when, after described authenticating unit failed authentication, indicating described terminal to enter Enter the first access module;Wherein, described first access module is for be set to visit by lower security rank data Asking, other security level data are disposed as inaccessible, and according to default sending strategy and pre- There is target terminal information in terminal security region by the positional information of described terminal self and described terminal Identification information send to target terminal;And,
After described authenticating unit authenticates successfully, described terminal is indicated to enter the second access module;Wherein, Described second access module is to be disposed as may have access to by all data of terminal.
Further, described terminal also includes arranging unit, in advance according to the safety setting of data The level of security of terminal data.
Further, described authenticating unit, including receiving subelement and contrast subunit, wherein,
Described reception subelement, for receiving the encrypted message of input;
Described contrast subunit, for comparing the encrypted message of described input with default encrypted message Right, when both are consistent, authenticate successfully;When both are inconsistent, failed authentication.
Further, described terminal also includes: acquiring unit, comparing unit and transmission control unit, its In,
Described acquiring unit, for obtaining current positional information;
Described comparing unit, for carrying out described current positional information with the secure location information prestored Comparison, and trigger described transmission control unit;
Described transmission control unit, for when described current positional information and the described home prestored When information is consistent, do not send positional information and the identification information of described terminal of described terminal self;And,
When described current positional information and the described secure location information prestored are inconsistent, according to predetermined Time interval the identification information of the positional information of described terminal self and described terminal is sent to described mesh Mark terminal.
Further, described access control unit, specifically for:
After described terminal was in the first access module before lighting, and described authenticating unit authenticates successfully, Stop sending self positional information and the identification information of terminal, and control described terminal entrance the second access Pattern;And,
After described terminal was in the second access module before lighting, and described authenticating unit authenticates successfully, Control described terminal and keep the second access module.
The invention provides a kind of terminal and the method for protection terminal data safety, by terminal security district Territory prestores the information of target terminal, and prestores target terminal according to safety zone after terminal authentication failure Information the relevant information of terminal self is sent to target terminal.The technical side provided by the present invention Case, it is possible to prevent important information in mobile terminal compromised and give the mobile terminal of loss in time for change, carrying High terminal data and the safety of terminal itself.
Other features and advantages of the present invention will illustrate in the following description, and, partly from froming the perspective of Bright book becomes apparent, or understands by implementing the present invention.The purpose of the present invention is excellent with other Point can be realized by structure specifically noted in description, claims and accompanying drawing and be obtained.
Accompanying drawing explanation
Accompanying drawing is used for providing being further appreciated by technical solution of the present invention, and constitutes one of description Point, it is used for explaining technical scheme together with embodiments herein, is not intended that the present invention The restriction of technical scheme.
A kind of method flow schematic diagram protecting terminal data safety that Fig. 1 provides for the embodiment of the present invention;
A kind of detailed process schematic diagram protecting terminal data safety that Fig. 2 provides for the embodiment of the present invention;
The structural representation of a kind of terminal that Fig. 3 provides for the embodiment of the present invention;
The structural representation of the another kind of terminal that Fig. 4 provides for the embodiment of the present invention.
Detailed description of the invention
For making the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing Embodiments of the invention are described in detail.It should be noted that in the case of not conflicting, this Shen Embodiment in please and the feature in embodiment can mutual combination in any.
Can be at the computer of such as one group of computer executable instructions in the step shown in the flow chart of accompanying drawing System performs.And, although show logical order in flow charts, but in some cases, Can be to be different from the step shown or described by order execution herein.
Embodiment one
Present embodiments provide a kind of method flow protecting terminal data safety, as it is shown in figure 1, the party Method may include that
S101: when terminal is lit, terminal authenticates according to input instruction;
It should be noted that in the present embodiment, terminal is waken up when lighting under blank screen holding state, Can be authenticated by password authentification.It is specifically as follows: terminal receives the encrypted message of user's input, Then the encrypted message of input is compared with the encrypted message preset, when both are consistent, authenticate into Merit;When both are inconsistent, failed authentication.It is to be appreciated that the encrypted message in the present embodiment is permissible For numerical ciphers, graph image password, gesture password etc., in embodiment, this is not especially limited.In detail Thin password verification process is the conventional techniques means of those skilled in the art, does not repeats them here.
It is to be appreciated that terminal can be according to the data access patterns of authenticating result setting terminal, data are visited Ask that the concrete form of pattern can be as described in follow-up S102 and S103.
S102: when, after terminal authentication failure, terminal enters the first access module;
It should be noted that when terminal authentication failure, the first access module should be more strict, therefore First access module can be to be set to may have access to by lower security rank data, and other security level data are equal It is set to inaccessible, and according to default sending strategy and be pre-stored in the mesh in terminal security region The positional information of terminal self and the identification information of terminal are sent to target terminal by mark end message;Thus Ensure that the safety of personal information in terminal data.In the present embodiment, addressable implication includes permissible Data checked, delete, the operation such as amendment.
It is to be appreciated that when terminal authentication failure, it is believed that terminal loss or terminal are borrowed the most temporarily Use to other people.At this time, it may be necessary to the accessibility of terminal data is configured;Wherein, terminal data Can include that application program, personal identification data, audio file, video file, text etc. are various The data of type, this is not especially limited by the present embodiment.
Exemplarily, the present embodiment can arrange the safe level of terminal data in advance according to the safety of data Not.In the present embodiment, the level of security of terminal data could be arranged to general grade, important level, Specific class, privacy classes etc., default level is general grade.The data of general grade may be considered Do not include the data of terminal use's personal information, the game such as downloaded, video file, audio file etc., Therefore, the lower security rank data in the present embodiment can correspond to general level data.
Further, terminal security region, can be a specific region in terminal, this specific region Storage content will not produce impact due to the operation such as brush machine, formatting and factory reset.Such as Current from safe storage system etc..In the present embodiment, safety can be installed in this specific region soft Part, terminal can be bound by this fail-safe software with target terminal information, and this target terminal information is permissible Mobile device international identity code (IMEI, International for the mark of target terminal, such as target terminal Mobile Equipment Identity), the international mobile subscriber of SIM that inserted in target terminal knows Other code (IMSI, International Mobile Subscriber Identification Number) or target The network account bound in SIM inserted in terminal.Target terminal is preserved by terminal security region Information, even if so that preserve target terminal information in terminal through brush machine, format and recover Still preserve after the operations such as factory is arranged, strengthen the safety of terminal.
Also, it should be noted in some cases, terminal is grasped by other users in user's controlled range Making, child the most at home holds terminal when carrying out random operation caused Password Input mistake, end End can be without sending the positional information of self and the identification information of terminal to target terminal;
Specifically, terminal is according to default sending strategy and the target that is pre-stored in terminal security region eventually The positional information of terminal self and the identification information of terminal are sent to target terminal by client information, may include that
Terminal obtains current positional information, and compares with the secure location information prestored;
When the positional information that terminal is current is consistent with the secure location information prestored, terminal does not send self Positional information and the identification information of terminal;
When the positional information that terminal is current is inconsistent with the secure location information prestored, terminal is according to predetermined Time interval the identification information of self positional information and terminal is sent to target terminal.
S103: when, after terminal authentication success, terminal enters the second access module;
Wherein, the second access module is to be disposed as may have access to by all data of terminal.
It should be noted that when after terminal authentication success, illustrate that now terminal is operated by user oneself, Therefore, the second access module should be all data being able to access that terminal, but, terminal is lighting it Before be likely to be at the first access module, say, that terminal may be to target terminal before lighting Send the positional information of self and the identification information of terminal, now need to stop sending these information.Therefore, When, after terminal authentication success, terminal enters the second access module, specifically includes:
After terminal was in the first access module, and terminal authentication success before lighting, terminal stops sending out Give the positional information of self and the identification information of terminal, and enter the second access module;
After terminal was in the second access module, and terminal authentication success before lighting, at terminal continuation In the second access module.
Present embodiments provide a kind of method protecting terminal data safety, by pre-in terminal security region Deposit the information of target terminal, and the letter of the target terminal that prestores after terminal authentication failure according to safety zone Cease and the relevant information of terminal self is sent to target terminal, it is possible to prevent important information quilt in mobile terminal Reveal and give for change in time the mobile terminal of loss, improve terminal data and the safety of terminal itself.
Embodiment two
Technical scheme based on embodiment one, present embodiments provide a kind of protect terminal data safety detailed Thin process, sees Fig. 2, and this detailed process may include that
S201: terminal prestores in safety zone target terminal information, and terminal data is set to peace Full rank could be arranged to general grade, important level, specific class, privacy classes;
S202: when terminal is lit, receives terminal and receives the encrypted message of user's input;
The encrypted message of input is compared by S203: terminal with the encrypted message preset;When both are consistent Time, turn to S204;When both are inconsistent, turn to S207;
It is to be appreciated that step S202 to S203 is terminal when being lit, reflect according to input instruction The detailed process of power.
S204: terminal determines the positional information that acquisition is current, and carries out with the secure location information prestored Comparison;When the positional information that terminal is current is consistent with the secure location information prestored, perform step S205; When the positional information that terminal is current is inconsistent with the secure location information prestored, perform step S206;
The terminal data that data safe class is general grade is set to may have access to by S205: terminal, and Other security level data are disposed as inaccessible;
The terminal data that data safe class is general grade is set to may have access to by S206: terminal, and Other security level data are disposed as inaccessible;And at predetermined intervals and be pre-stored in The positional information of self and the identification information of terminal are sent extremely by the target terminal information in terminal security region Target terminal;
It is to be appreciated that after step S204 to S206 is terminal authentication failure, terminal enters the first access The concrete form of pattern, it is possible to understand that ground, according to terminal positional information, when terminal enters the first access mould After formula, all can be set to may have access to by lower security rank data, other security level data are disposed as not May have access to, but, when terminal is in user's controlled range, terminal without by the positional information of self and The identification information of terminal sends to target terminal.
Next step S207 to S209 enters the concrete mistake of the second access module after being terminal authentication success Journey;It is to be appreciated that when after terminal authentication success, illustrate that now terminal is operated by user oneself, Therefore, the second access module should be all data being able to access that terminal, so the second access module is It is disposed as may have access to by all data of terminal.
S207: terminal obtains the access module before lighting;
S208: after terminal was in the first access module, and terminal authentication success before lighting, terminal Stop sending self positional information and the identification information of terminal, and enter the second access module;
S209: after terminal was in the second access module, and terminal authentication success before lighting, terminal Keep the second access module.
Present embodiments provide a kind of idiographic flow protecting terminal data safety, by terminal security district Territory prestores the information of target terminal, and prestores target terminal according to safety zone after terminal authentication failure Information the relevant information of terminal self is sent to target terminal such that it is able to prevent weight in mobile terminal Want information compromised and give the mobile terminal of loss in time for change, improve terminal data and terminal itself Safety.
Embodiment three
Based on the technology design that previous embodiment is identical, seeing Fig. 3, it illustrates the embodiment of the present invention provides The structure of a kind of terminal 30, this terminal 30 may include that monitoring means 301, authenticating unit 302 and Access control unit 303, wherein,
Whether monitoring means 301, light for monitoring terminal 30;And monitor terminal 30 when being lit, Trigger authenticating unit 302;
Authenticating unit 302, for authenticating according to input instruction;And trigger access control unit 303;
Access control unit 303, for when, after authenticating unit 302 failed authentication, instruction terminal 30 enters First access module;Wherein, the first access module for be set to may have access to by lower security rank data, its His security level data is disposed as inaccessible, and according to default sending strategy and be pre-stored in end Hold target terminal information in 30 safety zones by the positional information of terminal 30 self and the mark of terminal 30 Information sends to target terminal;And,
After authenticating unit 302 authenticates successfully, instruction terminal 30 enters the second access module;Wherein, Two access modules are to be disposed as may have access to by all data of terminal 30.
In such scheme, seeing Fig. 4, terminal 30 also includes arranging unit 304, in advance according to The safety of data arranges the level of security of terminal 30 data.
In such scheme, seeing Fig. 4, authenticating unit 302, including receiving subelement 3021 and contrast Subelement 3022, wherein,
Receive subelement 3021, for receiving the encrypted message of input;
Contrast subunit 3022, for the encrypted message of input is compared with the encrypted message preset, When both are consistent, authenticate successfully;When both are inconsistent, failed authentication.
In such scheme, seeing Fig. 4, terminal 30 also includes: acquiring unit 305, comparing unit 306 With send control unit 307, wherein,
Acquiring unit 305, for obtaining the positional information that terminal 30 is current;
Comparing unit 306, for entering positional information current for terminal 30 with the secure location information prestored Row comparison, and trigger transmission control unit 307;
Send control unit 307, for when the current positional information of terminal 30 and the security bit confidence prestored When ceasing consistent, do not send positional information and the identification information of terminal 30 of terminal 30 self;And,
When the positional information that terminal 30 is current is inconsistent with the secure location information prestored, according to predetermined The positional information of terminal 30 self and the identification information of terminal 30 are sent to target terminal by time interval.
In such scheme, access control unit 303, specifically for:
After terminal 30 was in the first access module before lighting, and authenticating unit 302 authenticates successfully, Stop sending self positional information and the identification information of terminal 30, and control terminal 30 and enter the second visit Ask pattern;And,
After terminal 30 was in the second access module before lighting, and authenticating unit 302 authenticates successfully, Control terminal 30 and keep the second access module.
Present embodiments provide the structure of a kind of terminal 30, by the target that prestores in terminal 30 safety zone The information of terminal, and the information general of the target terminal that prestores according to safety zone after terminal 30 failed authentication The relevant information of terminal 30 self sends to target terminal such that it is able to prevent important information in mobile terminal Compromised and give the mobile terminal of loss in time for change, improve terminal data and the safety of terminal itself.
The present embodiment is used for realizing above-mentioned each method embodiment, the workflow of unit in the present embodiment See the description in above-mentioned each method embodiment with operation principle, do not repeat them here.
Although the embodiment that disclosed herein is as above, but described content only readily appreciates the present invention And the embodiment used, it is not limited to the present invention.Technology people in any art of the present invention Member, on the premise of without departing from the spirit and scope that disclosed herein, can be in the form implemented and thin Any amendment and change is carried out on joint, but the scope of patent protection of the present invention, still must be with appended right Claim is defined in the range of standard.

Claims (10)

1. the method protecting terminal data safety, it is characterised in that described method includes:
When terminal is lit, described terminal authenticates according to input instruction;
When, after the failure of described terminal authentication, described terminal enters the first access module;Wherein, described first Access module is for be set to may have access to by lower security rank data, and other security level data are disposed as not May have access to, and according to default sending strategy and be pre-stored in terminal security region target terminal letter Cease and the positional information of described terminal self and the identification information of described terminal are sent to target terminal;
When, after the success of described terminal authentication, described terminal enters the second access module;Wherein, described second Access module is to be disposed as may have access to by all data of terminal.
Method the most according to claim 1, it is characterised in that described method also includes: described end End arranges the level of security of terminal data in advance according to the safety of data.
Method the most according to claim 1, it is characterised in that described terminal according to input instruct into Row authentication, including:
Described terminal receives the encrypted message of input;
Described terminal by the encrypted message of described input with preset encrypted message compare, when both one During cause, authenticate successfully;When both are inconsistent, failed authentication.
Method the most according to claim 1, it is characterised in that described terminal is according to default transmission Strategy and the target terminal information that is pre-stored in terminal security region are by the positional information of terminal self and end The identification information of end sends to target terminal, specifically includes:
Described terminal obtains current positional information, and compares with the secure location information prestored;
When the positional information that described terminal is current is consistent with the described secure location information prestored, described end End does not send positional information and the identification information of described terminal of self;
When the positional information that described terminal is current is inconsistent with the described secure location information prestored, described The described positional information of self and the identification information of described terminal are sent by terminal at predetermined intervals To described target terminal.
Method the most according to claim 1, it is characterised in that after described terminal authentication is successful, Described terminal enters the second access module, specifically includes:
After described terminal was in the first access module, and the success of described terminal authentication before lighting, institute State terminal and stop sending self positional information and the identification information of terminal, and enter the second access module;
After described terminal was in the second access module, and the success of described terminal authentication before lighting, institute State terminal and keep the second access module.
6. a terminal, it is characterised in that described terminal includes: monitoring means, authenticating unit and access Control unit, wherein,
Described monitoring means, is used for monitoring whether described terminal is lighted;And monitor described terminal by point Time bright, trigger described authenticating unit;
Described authenticating unit, for authenticating according to input instruction;And trigger described access control unit;
Described access control unit, for when, after described authenticating unit failed authentication, indicating described terminal to enter Enter the first access module;Wherein, described first access module is for be set to visit by lower security rank data Asking, other security level data are disposed as inaccessible, and according to default sending strategy and pre- There is target terminal information in terminal security region by the positional information of described terminal self and described terminal Identification information send to target terminal;And,
After described authenticating unit authenticates successfully, described terminal is indicated to enter the second access module;Wherein, Described second access module is to be disposed as may have access to by all data of terminal.
Terminal the most according to claim 6, it is characterised in that described terminal also includes arranging unit, For arranging the level of security of terminal data in advance according to the safety of data.
Terminal the most according to claim 6, it is characterised in that described authenticating unit, including receiving Subelement and contrast subunit, wherein,
Described reception subelement, for receiving the encrypted message of input;
Described contrast subunit, for comparing the encrypted message of described input with default encrypted message Right, when both are consistent, authenticate successfully;When both are inconsistent, failed authentication.
Terminal the most according to claim 6, it is characterised in that described terminal also includes: obtain single Unit, comparing unit and transmission control unit, wherein,
Described acquiring unit, for obtaining current positional information;
Described comparing unit, for carrying out described current positional information with the secure location information prestored Comparison, and trigger described transmission control unit;
Described transmission control unit, for when described current positional information and the described home prestored When information is consistent, do not send positional information and the identification information of described terminal of described terminal self;And,
When described current positional information and the described secure location information prestored are inconsistent, according to predetermined Time interval the identification information of the positional information of described terminal self and described terminal is sent to described mesh Mark terminal.
Terminal the most according to claim 6, it is characterised in that described access control unit, tool Body is used for:
After described terminal was in the first access module before lighting, and described authenticating unit authenticates successfully, Stop sending self positional information and the identification information of terminal, and control described terminal entrance the second access Pattern;And,
After described terminal was in the second access module before lighting, and described authenticating unit authenticates successfully, Control described terminal and keep the second access module.
CN201510280537.2A 2015-05-27 2015-05-27 A kind of terminal and the method for protection terminal data safety Withdrawn CN106304063A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510280537.2A CN106304063A (en) 2015-05-27 2015-05-27 A kind of terminal and the method for protection terminal data safety
PCT/CN2015/087038 WO2016187966A1 (en) 2015-05-27 2015-08-14 Terminal and method for protecting data security of terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510280537.2A CN106304063A (en) 2015-05-27 2015-05-27 A kind of terminal and the method for protection terminal data safety

Publications (1)

Publication Number Publication Date
CN106304063A true CN106304063A (en) 2017-01-04

Family

ID=57393742

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510280537.2A Withdrawn CN106304063A (en) 2015-05-27 2015-05-27 A kind of terminal and the method for protection terminal data safety

Country Status (2)

Country Link
CN (1) CN106304063A (en)
WO (1) WO2016187966A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170355942A1 (en) * 2016-06-13 2017-12-14 University Of Kentucky Research Foundation Cyclic photobioreactor and method for biofilm control
CN109189412A (en) * 2018-08-23 2019-01-11 深圳市宝尔爱迪科技有限公司 A method of communicating terminal application backup and recovery installation under no network
CN112187797B (en) * 2020-09-28 2022-08-26 深圳市雁云信息技术有限公司 Cloud data transmission method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102929807A (en) * 2012-11-19 2013-02-13 周万荣 Method for initiatively performing loss judgment and data processing and mobile terminal
CN104380298A (en) * 2011-07-22 2015-02-25 优盖提特拜克有限公司 Systems and methods for dynamically assessing and mitigating risk of an insured entity
CN104408360A (en) * 2014-10-24 2015-03-11 上海微肯网络科技有限公司 Encryption equipment and method based on mobile terminal

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1351174A4 (en) * 2001-01-12 2008-10-29 Secom Co Ltd Search supporting apparatus, search supporting system, operation instructing terminal, search supporting method, and operation instructing system
CN101656966A (en) * 2009-09-01 2010-02-24 成都市华为赛门铁克科技有限公司 Data protection method of mobile terminal, device thereof and mobile terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104380298A (en) * 2011-07-22 2015-02-25 优盖提特拜克有限公司 Systems and methods for dynamically assessing and mitigating risk of an insured entity
CN102929807A (en) * 2012-11-19 2013-02-13 周万荣 Method for initiatively performing loss judgment and data processing and mobile terminal
CN104408360A (en) * 2014-10-24 2015-03-11 上海微肯网络科技有限公司 Encryption equipment and method based on mobile terminal

Also Published As

Publication number Publication date
WO2016187966A1 (en) 2016-12-01

Similar Documents

Publication Publication Date Title
CN204948095U (en) Authenticate device and the mutual system guaranteeing between application program and user
CN105978917B (en) A kind of system and method for trusted application safety certification
JP5601729B2 (en) How to log into a mobile radio network
KR101653010B1 (en) Portable device association
EP2579220A1 (en) Entrance guard control method and system thereof
US20160112437A1 (en) Apparatus and Method for Authenticating a User via Multiple User Devices
CN103339975A (en) Method for exporting on a secure server data comprised on a UlCC comprised in a terminal
KR101451359B1 (en) User account recovery
JP2015509632A (en) Login method, login device, terminal, and network server
CN111209558B (en) Internet of things equipment identity authentication method and system based on block chain
JP2007058469A (en) Authentication system, authentication server, authentication method, and authentication program
CN104980926B (en) The long-range control method and device of mobile terminal
CN108933668A (en) For providing the system and method for protected password and authentication mechanism that software or firmware are programmed and are updated
CN101999125A (en) System and method for improving restrictiveness on accessingsoftware applications
CN102821112A (en) Mobile equipment, server and mobile equipment data verification method
CN104702760A (en) Communication number updating method and device
CN107623907B (en) eSIM card network locking method, terminal and network locking authentication server
CN107835162B (en) Software digital permit server gives the method and software digital permit server that permission is signed and issued in the license of software developer's software digital
CN108092764B (en) Password management method and equipment and device with storage function
CN106304063A (en) A kind of terminal and the method for protection terminal data safety
CN102340750A (en) Method for retrieving password of mobile phone private space
KR101417025B1 (en) Method for removable element authentication in an embedded system
CN101268712B (en) Method and a device to suspend the access to a service
CN105743860A (en) Method and device for converting characters
CN109981677A (en) A kind of credit management method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20170104