CN106304063A - A kind of terminal and the method for protection terminal data safety - Google Patents
A kind of terminal and the method for protection terminal data safety Download PDFInfo
- Publication number
- CN106304063A CN106304063A CN201510280537.2A CN201510280537A CN106304063A CN 106304063 A CN106304063 A CN 106304063A CN 201510280537 A CN201510280537 A CN 201510280537A CN 106304063 A CN106304063 A CN 106304063A
- Authority
- CN
- China
- Prior art keywords
- terminal
- access module
- described terminal
- positional information
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses a kind of terminal and the method for protection terminal data safety, the method may include that when terminal is lit, and described terminal authenticates according to input instruction;When, after the failure of described terminal authentication, described terminal enters the first access module;When, after the success of described terminal authentication, described terminal enters the second access module.
Description
Technical field
The present invention relates to information security technology, a kind of terminal and the method for protection terminal data safety.
Background technology
Along with development and the maturation of communication technology, mobile terminal has become people's daily life and work
In indispensable instrument.Much users are by individual privacy information and data, such as Bank Account Number, password,
The storage such as financial information, personally identifiable information is to mobile terminal.When mobile terminal is lost or needs interim
Use when using to other people, it is easy to privacy information and the leaking data of individual are gone out.
At present, the scheme protecting terminal individual privacy information and data safety to be used is generally and arranges with whole
The network account of client identification module (SIM, Subscriber Identity Module) the card number binding of end,
Just can carry out location tracking in the way of utilizing network account by remotely control once terminal loss, pass through
Send the data in instruction erasing mobile phone, thus ensure the safety of terminal data.
But the scheme of this protection terminal data safety needs user to shift to an earlier date log on account and mobile terminal
SIM bind mutually, and when after terminal loss can due to can not in time or be inconvenient to carry out network control,
Or mobile terminal is by directly brush machine or has changed the SIM of terminal and makes to protect at present number of terminals
Lost efficacy according to the scheme of safety.
Summary of the invention
In order to solve above-mentioned technical problem, the invention provides a kind of terminal and protect terminal data safety
Method, it is possible to prevent important information in mobile terminal compromised and give the mobile terminal of loss in time for change,
Improve terminal data and the safety of terminal itself.
In order to reach the object of the invention, the invention provides a kind of method protecting terminal data safety, institute
The method of stating includes:
When terminal is lit, described terminal authenticates according to input instruction;
When, after the failure of described terminal authentication, described terminal enters the first access module;Wherein, described first
Access module is for be set to may have access to by lower security rank data, and other security level data are disposed as not
May have access to, and according to default sending strategy and be pre-stored in terminal security region target terminal letter
Cease and the positional information of described terminal self and the identification information of described terminal are sent to target terminal;
When, after the success of described terminal authentication, described terminal enters the second access module;Wherein, described second
Access module is to be disposed as may have access to by all data of terminal.
Further, described method also includes: described terminal arranges terminal according to the safety of data in advance
The level of security of data.
Further, described terminal authenticates according to input instruction, including:
Described terminal receives the encrypted message of input;
Described terminal by the encrypted message of described input with preset encrypted message compare, when both one
During cause, authenticate successfully;When both are inconsistent, failed authentication.
Further, described terminal according to default sending strategy and is pre-stored in terminal security region
The positional information of terminal self and the identification information of terminal are sent to target terminal, tool by target terminal information
Body includes:
Described terminal obtains current positional information, and compares with the secure location information prestored;
When the positional information that described terminal is current is consistent with the described secure location information prestored, described end
End does not send positional information and the identification information of described terminal of self;
When the positional information that described terminal is current is inconsistent with the described secure location information prestored, described
The described positional information of self and the identification information of described terminal are sent by terminal at predetermined intervals
To described target terminal.
Further, when, after the success of described terminal authentication, described terminal enters the second access module, specifically
Including:
After described terminal was in the first access module, and the success of described terminal authentication before lighting, institute
State terminal and stop sending self positional information and the identification information of terminal, and enter the second access module;
After described terminal was in the second access module, and the success of described terminal authentication before lighting, institute
State terminal and keep the second access module.
The invention provides a kind of terminal, described terminal includes: monitoring means, authenticating unit and access control
Unit processed, wherein,
Described monitoring means, is used for monitoring whether described terminal is lighted;And monitor described terminal by point
Time bright, trigger described authenticating unit;
Described authenticating unit, for authenticating according to input instruction;And trigger described access control unit;
Described access control unit, for when, after described authenticating unit failed authentication, indicating described terminal to enter
Enter the first access module;Wherein, described first access module is for be set to visit by lower security rank data
Asking, other security level data are disposed as inaccessible, and according to default sending strategy and pre-
There is target terminal information in terminal security region by the positional information of described terminal self and described terminal
Identification information send to target terminal;And,
After described authenticating unit authenticates successfully, described terminal is indicated to enter the second access module;Wherein,
Described second access module is to be disposed as may have access to by all data of terminal.
Further, described terminal also includes arranging unit, in advance according to the safety setting of data
The level of security of terminal data.
Further, described authenticating unit, including receiving subelement and contrast subunit, wherein,
Described reception subelement, for receiving the encrypted message of input;
Described contrast subunit, for comparing the encrypted message of described input with default encrypted message
Right, when both are consistent, authenticate successfully;When both are inconsistent, failed authentication.
Further, described terminal also includes: acquiring unit, comparing unit and transmission control unit, its
In,
Described acquiring unit, for obtaining current positional information;
Described comparing unit, for carrying out described current positional information with the secure location information prestored
Comparison, and trigger described transmission control unit;
Described transmission control unit, for when described current positional information and the described home prestored
When information is consistent, do not send positional information and the identification information of described terminal of described terminal self;And,
When described current positional information and the described secure location information prestored are inconsistent, according to predetermined
Time interval the identification information of the positional information of described terminal self and described terminal is sent to described mesh
Mark terminal.
Further, described access control unit, specifically for:
After described terminal was in the first access module before lighting, and described authenticating unit authenticates successfully,
Stop sending self positional information and the identification information of terminal, and control described terminal entrance the second access
Pattern;And,
After described terminal was in the second access module before lighting, and described authenticating unit authenticates successfully,
Control described terminal and keep the second access module.
The invention provides a kind of terminal and the method for protection terminal data safety, by terminal security district
Territory prestores the information of target terminal, and prestores target terminal according to safety zone after terminal authentication failure
Information the relevant information of terminal self is sent to target terminal.The technical side provided by the present invention
Case, it is possible to prevent important information in mobile terminal compromised and give the mobile terminal of loss in time for change, carrying
High terminal data and the safety of terminal itself.
Other features and advantages of the present invention will illustrate in the following description, and, partly from froming the perspective of
Bright book becomes apparent, or understands by implementing the present invention.The purpose of the present invention is excellent with other
Point can be realized by structure specifically noted in description, claims and accompanying drawing and be obtained.
Accompanying drawing explanation
Accompanying drawing is used for providing being further appreciated by technical solution of the present invention, and constitutes one of description
Point, it is used for explaining technical scheme together with embodiments herein, is not intended that the present invention
The restriction of technical scheme.
A kind of method flow schematic diagram protecting terminal data safety that Fig. 1 provides for the embodiment of the present invention;
A kind of detailed process schematic diagram protecting terminal data safety that Fig. 2 provides for the embodiment of the present invention;
The structural representation of a kind of terminal that Fig. 3 provides for the embodiment of the present invention;
The structural representation of the another kind of terminal that Fig. 4 provides for the embodiment of the present invention.
Detailed description of the invention
For making the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing
Embodiments of the invention are described in detail.It should be noted that in the case of not conflicting, this Shen
Embodiment in please and the feature in embodiment can mutual combination in any.
Can be at the computer of such as one group of computer executable instructions in the step shown in the flow chart of accompanying drawing
System performs.And, although show logical order in flow charts, but in some cases,
Can be to be different from the step shown or described by order execution herein.
Embodiment one
Present embodiments provide a kind of method flow protecting terminal data safety, as it is shown in figure 1, the party
Method may include that
S101: when terminal is lit, terminal authenticates according to input instruction;
It should be noted that in the present embodiment, terminal is waken up when lighting under blank screen holding state,
Can be authenticated by password authentification.It is specifically as follows: terminal receives the encrypted message of user's input,
Then the encrypted message of input is compared with the encrypted message preset, when both are consistent, authenticate into
Merit;When both are inconsistent, failed authentication.It is to be appreciated that the encrypted message in the present embodiment is permissible
For numerical ciphers, graph image password, gesture password etc., in embodiment, this is not especially limited.In detail
Thin password verification process is the conventional techniques means of those skilled in the art, does not repeats them here.
It is to be appreciated that terminal can be according to the data access patterns of authenticating result setting terminal, data are visited
Ask that the concrete form of pattern can be as described in follow-up S102 and S103.
S102: when, after terminal authentication failure, terminal enters the first access module;
It should be noted that when terminal authentication failure, the first access module should be more strict, therefore
First access module can be to be set to may have access to by lower security rank data, and other security level data are equal
It is set to inaccessible, and according to default sending strategy and be pre-stored in the mesh in terminal security region
The positional information of terminal self and the identification information of terminal are sent to target terminal by mark end message;Thus
Ensure that the safety of personal information in terminal data.In the present embodiment, addressable implication includes permissible
Data checked, delete, the operation such as amendment.
It is to be appreciated that when terminal authentication failure, it is believed that terminal loss or terminal are borrowed the most temporarily
Use to other people.At this time, it may be necessary to the accessibility of terminal data is configured;Wherein, terminal data
Can include that application program, personal identification data, audio file, video file, text etc. are various
The data of type, this is not especially limited by the present embodiment.
Exemplarily, the present embodiment can arrange the safe level of terminal data in advance according to the safety of data
Not.In the present embodiment, the level of security of terminal data could be arranged to general grade, important level,
Specific class, privacy classes etc., default level is general grade.The data of general grade may be considered
Do not include the data of terminal use's personal information, the game such as downloaded, video file, audio file etc.,
Therefore, the lower security rank data in the present embodiment can correspond to general level data.
Further, terminal security region, can be a specific region in terminal, this specific region
Storage content will not produce impact due to the operation such as brush machine, formatting and factory reset.Such as
Current from safe storage system etc..In the present embodiment, safety can be installed in this specific region soft
Part, terminal can be bound by this fail-safe software with target terminal information, and this target terminal information is permissible
Mobile device international identity code (IMEI, International for the mark of target terminal, such as target terminal
Mobile Equipment Identity), the international mobile subscriber of SIM that inserted in target terminal knows
Other code (IMSI, International Mobile Subscriber Identification Number) or target
The network account bound in SIM inserted in terminal.Target terminal is preserved by terminal security region
Information, even if so that preserve target terminal information in terminal through brush machine, format and recover
Still preserve after the operations such as factory is arranged, strengthen the safety of terminal.
Also, it should be noted in some cases, terminal is grasped by other users in user's controlled range
Making, child the most at home holds terminal when carrying out random operation caused Password Input mistake, end
End can be without sending the positional information of self and the identification information of terminal to target terminal;
Specifically, terminal is according to default sending strategy and the target that is pre-stored in terminal security region eventually
The positional information of terminal self and the identification information of terminal are sent to target terminal by client information, may include that
Terminal obtains current positional information, and compares with the secure location information prestored;
When the positional information that terminal is current is consistent with the secure location information prestored, terminal does not send self
Positional information and the identification information of terminal;
When the positional information that terminal is current is inconsistent with the secure location information prestored, terminal is according to predetermined
Time interval the identification information of self positional information and terminal is sent to target terminal.
S103: when, after terminal authentication success, terminal enters the second access module;
Wherein, the second access module is to be disposed as may have access to by all data of terminal.
It should be noted that when after terminal authentication success, illustrate that now terminal is operated by user oneself,
Therefore, the second access module should be all data being able to access that terminal, but, terminal is lighting it
Before be likely to be at the first access module, say, that terminal may be to target terminal before lighting
Send the positional information of self and the identification information of terminal, now need to stop sending these information.Therefore,
When, after terminal authentication success, terminal enters the second access module, specifically includes:
After terminal was in the first access module, and terminal authentication success before lighting, terminal stops sending out
Give the positional information of self and the identification information of terminal, and enter the second access module;
After terminal was in the second access module, and terminal authentication success before lighting, at terminal continuation
In the second access module.
Present embodiments provide a kind of method protecting terminal data safety, by pre-in terminal security region
Deposit the information of target terminal, and the letter of the target terminal that prestores after terminal authentication failure according to safety zone
Cease and the relevant information of terminal self is sent to target terminal, it is possible to prevent important information quilt in mobile terminal
Reveal and give for change in time the mobile terminal of loss, improve terminal data and the safety of terminal itself.
Embodiment two
Technical scheme based on embodiment one, present embodiments provide a kind of protect terminal data safety detailed
Thin process, sees Fig. 2, and this detailed process may include that
S201: terminal prestores in safety zone target terminal information, and terminal data is set to peace
Full rank could be arranged to general grade, important level, specific class, privacy classes;
S202: when terminal is lit, receives terminal and receives the encrypted message of user's input;
The encrypted message of input is compared by S203: terminal with the encrypted message preset;When both are consistent
Time, turn to S204;When both are inconsistent, turn to S207;
It is to be appreciated that step S202 to S203 is terminal when being lit, reflect according to input instruction
The detailed process of power.
S204: terminal determines the positional information that acquisition is current, and carries out with the secure location information prestored
Comparison;When the positional information that terminal is current is consistent with the secure location information prestored, perform step S205;
When the positional information that terminal is current is inconsistent with the secure location information prestored, perform step S206;
The terminal data that data safe class is general grade is set to may have access to by S205: terminal, and
Other security level data are disposed as inaccessible;
The terminal data that data safe class is general grade is set to may have access to by S206: terminal, and
Other security level data are disposed as inaccessible;And at predetermined intervals and be pre-stored in
The positional information of self and the identification information of terminal are sent extremely by the target terminal information in terminal security region
Target terminal;
It is to be appreciated that after step S204 to S206 is terminal authentication failure, terminal enters the first access
The concrete form of pattern, it is possible to understand that ground, according to terminal positional information, when terminal enters the first access mould
After formula, all can be set to may have access to by lower security rank data, other security level data are disposed as not
May have access to, but, when terminal is in user's controlled range, terminal without by the positional information of self and
The identification information of terminal sends to target terminal.
Next step S207 to S209 enters the concrete mistake of the second access module after being terminal authentication success
Journey;It is to be appreciated that when after terminal authentication success, illustrate that now terminal is operated by user oneself,
Therefore, the second access module should be all data being able to access that terminal, so the second access module is
It is disposed as may have access to by all data of terminal.
S207: terminal obtains the access module before lighting;
S208: after terminal was in the first access module, and terminal authentication success before lighting, terminal
Stop sending self positional information and the identification information of terminal, and enter the second access module;
S209: after terminal was in the second access module, and terminal authentication success before lighting, terminal
Keep the second access module.
Present embodiments provide a kind of idiographic flow protecting terminal data safety, by terminal security district
Territory prestores the information of target terminal, and prestores target terminal according to safety zone after terminal authentication failure
Information the relevant information of terminal self is sent to target terminal such that it is able to prevent weight in mobile terminal
Want information compromised and give the mobile terminal of loss in time for change, improve terminal data and terminal itself
Safety.
Embodiment three
Based on the technology design that previous embodiment is identical, seeing Fig. 3, it illustrates the embodiment of the present invention provides
The structure of a kind of terminal 30, this terminal 30 may include that monitoring means 301, authenticating unit 302 and
Access control unit 303, wherein,
Whether monitoring means 301, light for monitoring terminal 30;And monitor terminal 30 when being lit,
Trigger authenticating unit 302;
Authenticating unit 302, for authenticating according to input instruction;And trigger access control unit 303;
Access control unit 303, for when, after authenticating unit 302 failed authentication, instruction terminal 30 enters
First access module;Wherein, the first access module for be set to may have access to by lower security rank data, its
His security level data is disposed as inaccessible, and according to default sending strategy and be pre-stored in end
Hold target terminal information in 30 safety zones by the positional information of terminal 30 self and the mark of terminal 30
Information sends to target terminal;And,
After authenticating unit 302 authenticates successfully, instruction terminal 30 enters the second access module;Wherein,
Two access modules are to be disposed as may have access to by all data of terminal 30.
In such scheme, seeing Fig. 4, terminal 30 also includes arranging unit 304, in advance according to
The safety of data arranges the level of security of terminal 30 data.
In such scheme, seeing Fig. 4, authenticating unit 302, including receiving subelement 3021 and contrast
Subelement 3022, wherein,
Receive subelement 3021, for receiving the encrypted message of input;
Contrast subunit 3022, for the encrypted message of input is compared with the encrypted message preset,
When both are consistent, authenticate successfully;When both are inconsistent, failed authentication.
In such scheme, seeing Fig. 4, terminal 30 also includes: acquiring unit 305, comparing unit 306
With send control unit 307, wherein,
Acquiring unit 305, for obtaining the positional information that terminal 30 is current;
Comparing unit 306, for entering positional information current for terminal 30 with the secure location information prestored
Row comparison, and trigger transmission control unit 307;
Send control unit 307, for when the current positional information of terminal 30 and the security bit confidence prestored
When ceasing consistent, do not send positional information and the identification information of terminal 30 of terminal 30 self;And,
When the positional information that terminal 30 is current is inconsistent with the secure location information prestored, according to predetermined
The positional information of terminal 30 self and the identification information of terminal 30 are sent to target terminal by time interval.
In such scheme, access control unit 303, specifically for:
After terminal 30 was in the first access module before lighting, and authenticating unit 302 authenticates successfully,
Stop sending self positional information and the identification information of terminal 30, and control terminal 30 and enter the second visit
Ask pattern;And,
After terminal 30 was in the second access module before lighting, and authenticating unit 302 authenticates successfully,
Control terminal 30 and keep the second access module.
Present embodiments provide the structure of a kind of terminal 30, by the target that prestores in terminal 30 safety zone
The information of terminal, and the information general of the target terminal that prestores according to safety zone after terminal 30 failed authentication
The relevant information of terminal 30 self sends to target terminal such that it is able to prevent important information in mobile terminal
Compromised and give the mobile terminal of loss in time for change, improve terminal data and the safety of terminal itself.
The present embodiment is used for realizing above-mentioned each method embodiment, the workflow of unit in the present embodiment
See the description in above-mentioned each method embodiment with operation principle, do not repeat them here.
Although the embodiment that disclosed herein is as above, but described content only readily appreciates the present invention
And the embodiment used, it is not limited to the present invention.Technology people in any art of the present invention
Member, on the premise of without departing from the spirit and scope that disclosed herein, can be in the form implemented and thin
Any amendment and change is carried out on joint, but the scope of patent protection of the present invention, still must be with appended right
Claim is defined in the range of standard.
Claims (10)
1. the method protecting terminal data safety, it is characterised in that described method includes:
When terminal is lit, described terminal authenticates according to input instruction;
When, after the failure of described terminal authentication, described terminal enters the first access module;Wherein, described first
Access module is for be set to may have access to by lower security rank data, and other security level data are disposed as not
May have access to, and according to default sending strategy and be pre-stored in terminal security region target terminal letter
Cease and the positional information of described terminal self and the identification information of described terminal are sent to target terminal;
When, after the success of described terminal authentication, described terminal enters the second access module;Wherein, described second
Access module is to be disposed as may have access to by all data of terminal.
Method the most according to claim 1, it is characterised in that described method also includes: described end
End arranges the level of security of terminal data in advance according to the safety of data.
Method the most according to claim 1, it is characterised in that described terminal according to input instruct into
Row authentication, including:
Described terminal receives the encrypted message of input;
Described terminal by the encrypted message of described input with preset encrypted message compare, when both one
During cause, authenticate successfully;When both are inconsistent, failed authentication.
Method the most according to claim 1, it is characterised in that described terminal is according to default transmission
Strategy and the target terminal information that is pre-stored in terminal security region are by the positional information of terminal self and end
The identification information of end sends to target terminal, specifically includes:
Described terminal obtains current positional information, and compares with the secure location information prestored;
When the positional information that described terminal is current is consistent with the described secure location information prestored, described end
End does not send positional information and the identification information of described terminal of self;
When the positional information that described terminal is current is inconsistent with the described secure location information prestored, described
The described positional information of self and the identification information of described terminal are sent by terminal at predetermined intervals
To described target terminal.
Method the most according to claim 1, it is characterised in that after described terminal authentication is successful,
Described terminal enters the second access module, specifically includes:
After described terminal was in the first access module, and the success of described terminal authentication before lighting, institute
State terminal and stop sending self positional information and the identification information of terminal, and enter the second access module;
After described terminal was in the second access module, and the success of described terminal authentication before lighting, institute
State terminal and keep the second access module.
6. a terminal, it is characterised in that described terminal includes: monitoring means, authenticating unit and access
Control unit, wherein,
Described monitoring means, is used for monitoring whether described terminal is lighted;And monitor described terminal by point
Time bright, trigger described authenticating unit;
Described authenticating unit, for authenticating according to input instruction;And trigger described access control unit;
Described access control unit, for when, after described authenticating unit failed authentication, indicating described terminal to enter
Enter the first access module;Wherein, described first access module is for be set to visit by lower security rank data
Asking, other security level data are disposed as inaccessible, and according to default sending strategy and pre-
There is target terminal information in terminal security region by the positional information of described terminal self and described terminal
Identification information send to target terminal;And,
After described authenticating unit authenticates successfully, described terminal is indicated to enter the second access module;Wherein,
Described second access module is to be disposed as may have access to by all data of terminal.
Terminal the most according to claim 6, it is characterised in that described terminal also includes arranging unit,
For arranging the level of security of terminal data in advance according to the safety of data.
Terminal the most according to claim 6, it is characterised in that described authenticating unit, including receiving
Subelement and contrast subunit, wherein,
Described reception subelement, for receiving the encrypted message of input;
Described contrast subunit, for comparing the encrypted message of described input with default encrypted message
Right, when both are consistent, authenticate successfully;When both are inconsistent, failed authentication.
Terminal the most according to claim 6, it is characterised in that described terminal also includes: obtain single
Unit, comparing unit and transmission control unit, wherein,
Described acquiring unit, for obtaining current positional information;
Described comparing unit, for carrying out described current positional information with the secure location information prestored
Comparison, and trigger described transmission control unit;
Described transmission control unit, for when described current positional information and the described home prestored
When information is consistent, do not send positional information and the identification information of described terminal of described terminal self;And,
When described current positional information and the described secure location information prestored are inconsistent, according to predetermined
Time interval the identification information of the positional information of described terminal self and described terminal is sent to described mesh
Mark terminal.
Terminal the most according to claim 6, it is characterised in that described access control unit, tool
Body is used for:
After described terminal was in the first access module before lighting, and described authenticating unit authenticates successfully,
Stop sending self positional information and the identification information of terminal, and control described terminal entrance the second access
Pattern;And,
After described terminal was in the second access module before lighting, and described authenticating unit authenticates successfully,
Control described terminal and keep the second access module.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510280537.2A CN106304063A (en) | 2015-05-27 | 2015-05-27 | A kind of terminal and the method for protection terminal data safety |
PCT/CN2015/087038 WO2016187966A1 (en) | 2015-05-27 | 2015-08-14 | Terminal and method for protecting data security of terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510280537.2A CN106304063A (en) | 2015-05-27 | 2015-05-27 | A kind of terminal and the method for protection terminal data safety |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106304063A true CN106304063A (en) | 2017-01-04 |
Family
ID=57393742
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510280537.2A Withdrawn CN106304063A (en) | 2015-05-27 | 2015-05-27 | A kind of terminal and the method for protection terminal data safety |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106304063A (en) |
WO (1) | WO2016187966A1 (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170355942A1 (en) * | 2016-06-13 | 2017-12-14 | University Of Kentucky Research Foundation | Cyclic photobioreactor and method for biofilm control |
CN109189412A (en) * | 2018-08-23 | 2019-01-11 | 深圳市宝尔爱迪科技有限公司 | A method of communicating terminal application backup and recovery installation under no network |
CN112187797B (en) * | 2020-09-28 | 2022-08-26 | 深圳市雁云信息技术有限公司 | Cloud data transmission method and system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102929807A (en) * | 2012-11-19 | 2013-02-13 | 周万荣 | Method for initiatively performing loss judgment and data processing and mobile terminal |
CN104380298A (en) * | 2011-07-22 | 2015-02-25 | 优盖提特拜克有限公司 | Systems and methods for dynamically assessing and mitigating risk of an insured entity |
CN104408360A (en) * | 2014-10-24 | 2015-03-11 | 上海微肯网络科技有限公司 | Encryption equipment and method based on mobile terminal |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1351174A4 (en) * | 2001-01-12 | 2008-10-29 | Secom Co Ltd | Search supporting apparatus, search supporting system, operation instructing terminal, search supporting method, and operation instructing system |
CN101656966A (en) * | 2009-09-01 | 2010-02-24 | 成都市华为赛门铁克科技有限公司 | Data protection method of mobile terminal, device thereof and mobile terminal |
-
2015
- 2015-05-27 CN CN201510280537.2A patent/CN106304063A/en not_active Withdrawn
- 2015-08-14 WO PCT/CN2015/087038 patent/WO2016187966A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104380298A (en) * | 2011-07-22 | 2015-02-25 | 优盖提特拜克有限公司 | Systems and methods for dynamically assessing and mitigating risk of an insured entity |
CN102929807A (en) * | 2012-11-19 | 2013-02-13 | 周万荣 | Method for initiatively performing loss judgment and data processing and mobile terminal |
CN104408360A (en) * | 2014-10-24 | 2015-03-11 | 上海微肯网络科技有限公司 | Encryption equipment and method based on mobile terminal |
Also Published As
Publication number | Publication date |
---|---|
WO2016187966A1 (en) | 2016-12-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN204948095U (en) | Authenticate device and the mutual system guaranteeing between application program and user | |
CN105978917B (en) | A kind of system and method for trusted application safety certification | |
JP5601729B2 (en) | How to log into a mobile radio network | |
KR101653010B1 (en) | Portable device association | |
EP2579220A1 (en) | Entrance guard control method and system thereof | |
US20160112437A1 (en) | Apparatus and Method for Authenticating a User via Multiple User Devices | |
CN103339975A (en) | Method for exporting on a secure server data comprised on a UlCC comprised in a terminal | |
KR101451359B1 (en) | User account recovery | |
JP2015509632A (en) | Login method, login device, terminal, and network server | |
CN111209558B (en) | Internet of things equipment identity authentication method and system based on block chain | |
JP2007058469A (en) | Authentication system, authentication server, authentication method, and authentication program | |
CN104980926B (en) | The long-range control method and device of mobile terminal | |
CN108933668A (en) | For providing the system and method for protected password and authentication mechanism that software or firmware are programmed and are updated | |
CN101999125A (en) | System and method for improving restrictiveness on accessingsoftware applications | |
CN102821112A (en) | Mobile equipment, server and mobile equipment data verification method | |
CN104702760A (en) | Communication number updating method and device | |
CN107623907B (en) | eSIM card network locking method, terminal and network locking authentication server | |
CN107835162B (en) | Software digital permit server gives the method and software digital permit server that permission is signed and issued in the license of software developer's software digital | |
CN108092764B (en) | Password management method and equipment and device with storage function | |
CN106304063A (en) | A kind of terminal and the method for protection terminal data safety | |
CN102340750A (en) | Method for retrieving password of mobile phone private space | |
KR101417025B1 (en) | Method for removable element authentication in an embedded system | |
CN101268712B (en) | Method and a device to suspend the access to a service | |
CN105743860A (en) | Method and device for converting characters | |
CN109981677A (en) | A kind of credit management method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20170104 |