CN107370872A - Method, terminal and the control device of a kind of terminal lock machine and control terminal lock machine - Google Patents

Method, terminal and the control device of a kind of terminal lock machine and control terminal lock machine Download PDF

Info

Publication number
CN107370872A
CN107370872A CN201710433101.1A CN201710433101A CN107370872A CN 107370872 A CN107370872 A CN 107370872A CN 201710433101 A CN201710433101 A CN 201710433101A CN 107370872 A CN107370872 A CN 107370872A
Authority
CN
China
Prior art keywords
terminal
response message
default
message
lock machine
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201710433101.1A
Other languages
Chinese (zh)
Inventor
璧靛己
赵强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Jinli Communication Equipment Co Ltd
Original Assignee
Shenzhen Jinli Communication Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Jinli Communication Equipment Co Ltd filed Critical Shenzhen Jinli Communication Equipment Co Ltd
Priority to CN201710433101.1A priority Critical patent/CN107370872A/en
Publication of CN107370872A publication Critical patent/CN107370872A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72454User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/42User authentication using separate channels for security data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • H04M1/673Preventing unauthorised calls from a telephone set by electronic means the user being required to key in a code
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72457User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to geographic location
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Computer Interaction (AREA)
  • Environmental & Geological Engineering (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the invention discloses a kind of terminal lock machine and method, terminal and the control device of control terminal lock machine, wherein, terminal lock machine method includes:The solicited message that receiving terminal is sent, the solicited message that the solicited message is generated by the terminal when monitoring default trigger event;Corresponding response message is sent to the terminal according to the solicited message so that response message described in the terminal-pair is hidden and performs lock machine operation according to the response message.The embodiment of the present invention receives the response message that the control device returns by sending solicited message to control device, and the response message sent to control device is hidden, so realize terminal without prompting lock machine.

Description

Method, terminal and the control device of a kind of terminal lock machine and control terminal lock machine
Technical field
The present invention relates to electronic technology field, more particularly to method, the terminal of a kind of terminal lock machine and control terminal lock machine And control device.
Background technology
Nowadays, terminal (such as mobile phone, tablet personal computer etc.) have become in people's life & amusement or work and study can not or Scarce instrument.Although existing terminal can by setting the modes such as screen-lock password to prevent other people direct using terminals, , can be by changing client identification module SIM card (Subscriber Identification ModuleCard) after terminal is stolen Or obtain terminal authorization and close the functions such as its lookup or tracking, realize the normal use of terminal.
Therefore, it is necessary to a kind of new technical scheme is proposed, to solve above-mentioned technical problem.
The content of the invention
The embodiment of the present invention provides method, terminal and the control device of a kind of terminal lock machine and control terminal lock machine, can be with To control device send response message be hidden, and then realize terminal without prompting lock machine.
In a first aspect, the embodiments of the invention provide a kind of method of terminal lock machine, this method includes:
Default trigger event is monitored;
If monitoring the default trigger event, solicited message is sent to control device;
The response message that the control device returns is received, and the response message is hidden;
Lock machine operation is performed according to the response message.
Second aspect, the embodiments of the invention provide a kind of method for controlling terminal lock machine, this method includes:
The solicited message that receiving terminal is sent, the solicited message are monitoring default trigger event when institute for the terminal The solicited message of generation;
Corresponding response message is sent to the terminal according to the solicited message so that letter is responded described in the terminal-pair Breath is hidden and performs lock machine operation according to the response message.
The third aspect, the embodiments of the invention provide a kind of terminal, the terminal includes:
Monitoring unit, for being monitored to default trigger event;
Transmitting element, if for monitoring the default trigger event, solicited message is sent to control device;
Receiving unit, the response message returned for receiving the control device, and the response message is hidden;
Execution unit, for performing lock machine operation according to the response message.
Fourth aspect, the embodiments of the invention provide a kind of control device, the control device includes:
Information receiving unit, the solicited message sent for receiving terminal, the solicited message are that the terminal is monitoring The solicited message generated during to default trigger event;
First information transmitting element, for sending corresponding response message to the terminal according to the solicited message, make Response message described in the terminal-pair is obtained to be hidden and perform lock machine operation according to the response message.
5th aspect, the embodiments of the invention provide another terminal, including processor, input equipment, output equipment and Memory, the processor, input equipment, output equipment and memory are connected with each other, wherein, the memory is used to store branch The application program that terminal performs the above method is held, the processor is arranged to the method for performing above-mentioned first aspect.
6th aspect, the embodiments of the invention provide a kind of computer-readable recording medium, the computer-readable storage medium Computer program is stored with, the computer program includes programmed instruction, and described program instruction makes institute when being executed by a processor The method for stating the above-mentioned first aspect of computing device.
7th aspect, the embodiments of the invention provide another control device, including processor, input equipment, output are set Standby and memory, the processor, input equipment, output equipment and memory are connected with each other, wherein, the memory is used to deposit Storage supports terminal to perform the application program of the above method, and the processor is arranged to the method for performing above-mentioned second aspect.
Fourth aspect, the embodiments of the invention provide a kind of computer-readable recording medium, the computer-readable storage medium Computer program is stored with, the computer program includes programmed instruction, and described program instruction makes institute when being executed by a processor The method for stating the above-mentioned second aspect of computing device.
The embodiment of the present invention to default trigger event by being monitored;If monitoring the default trigger event, to Control device sends solicited message;The response message that the control device returns is received, and the response message is hidden; Lock machine operation is performed according to the response message, the response message that can be sent to control device is hidden, and then is realized eventually End without prompting lock machine.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, it is required in being described below to embodiment to use Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the present invention, general for this area For logical technical staff, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of schematic flow diagram of the method for terminal lock machine provided in an embodiment of the present invention;
Fig. 2 is a kind of schematic flow diagram of the method for terminal lock machine that another embodiment of the present invention provides;
Fig. 3 is a kind of schematic flow diagram of the method for control terminal lock machine provided in an embodiment of the present invention;
Fig. 4 is a kind of schematic block diagram of terminal provided in an embodiment of the present invention;
Fig. 5 is a kind of schematic block diagram for terminal that another embodiment of the present invention provides;
Fig. 6 is a kind of schematic block diagram of control device provided in an embodiment of the present invention;
Fig. 7 is a kind of terminal schematic block diagram that yet another embodiment of the invention provides;
Fig. 8 is another control device schematic block diagram that yet another embodiment of the invention provides.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is part of the embodiment of the present invention, rather than whole embodiments.Based on this hair Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained under the premise of creative work is not made Example, belongs to the scope of protection of the invention.
It should be appreciated that ought be in this specification and in the appended claims in use, term " comprising " and "comprising" instruction Described feature, entirety, step, operation, the presence of element and/or component, but it is not precluded from one or more of the other feature, whole Body, step, operation, element, component and/or its presence or addition for gathering.
It is also understood that the term used in this description of the invention is merely for the sake of the mesh for describing specific embodiment And be not intended to limit the present invention.As used in description of the invention and appended claims, unless on Other situations are hereafter clearly indicated, otherwise " one " of singulative, "one" and "the" are intended to include plural form.
It will be further appreciated that the term "and/or" used in description of the invention and appended claims is Refer to any combinations of one or more of the associated item listed and be possible to combine, and including these combinations.
As used in this specification and in the appended claims, term " if " can be according to context quilt Be construed to " when ... " or " once " or " in response to determining " or " in response to detecting ".Similarly, phrase " if it is determined that " or " if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true It is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
In the specific implementation, the terminal described in the embodiment of the present invention is including but not limited to such as with touch sensitive surface The mobile phone, laptop computer or tablet PC of (for example, touch-screen display and/or touch pad) etc it is other just Portable device.It is to be further understood that in certain embodiments, the equipment is not portable communication device, but with tactile Touch the desktop computer of sensing surface (for example, touch-screen display and/or touch pad).
In discussion below, the terminal including display and touch sensitive surface is described.It is, however, to be understood that It is that terminal can include one or more of the other physical user-interface device of such as physical keyboard, mouse and/or control-rod.
Terminal supports various application programs, such as one or more of following:Drawing application program, demonstration application journey Sequence, word-processing application, website create application program, disk imprinting application program, spreadsheet applications, game application Program, telephony application, videoconference application, email application, instant messaging applications, exercise Support application program, photo management application program, digital camera application program, digital camera application program, web-browsing application Program, digital music player application and/or video frequency player application program.
The various application programs that can be performed in terminal can use at least one public of such as touch sensitive surface Physical user-interface device.It can adjust and/or change among applications and/or in corresponding application programs and touch sensitive table The corresponding information shown in the one or more functions and terminal in face.So, the public physical structure of terminal is (for example, touch Sensing surface) the various application programs with user interface directly perceived and transparent for a user can be supported.
It is that the embodiment of the present invention provides a kind of schematic flow diagram of the method for terminal lock machine, as shown in figure 1, eventually referring to Fig. 1 The method of end lock machine may include:
S101:Default trigger event is monitored.
In step S101, default trigger event can change including client identification module SIM card information, preset and answer With being prohibited to run or unload the default application.
Default trigger event is monitored and can detected by the sensor in terminal, or by application module Detected.
For example, the sensor in terminal can be the biography for detection terminal SIM card slot state or SIM card information Sensor, application module can with detection mobile network, data traffic and speech path network network management module, or SIM card Management module.
For example, application module can be clock module, calendaring module or the weather module run with terminal operating Deng.
The default trigger event is used for the event for describing change terminal ownership information, or by obtaining terminal system After ROOT authorities, to being used for the operation for ensureing that the application of user information safety is disabled in system.
Can detect in real time as when default trigger event is detected, or including but not limited to following two scenes.
Scene 1:
User Activity track is counted, by the current location of positioning terminal, judges current location whether in user In event trace, if it is not, being then monitored to default trigger event.
For example, only include place A, place B and place C between date, in User Activity track.When detecting end The current location at end is place X, and place X is then monitored not in User Activity track to default trigger event.
Scene 2:
When the ROOT authorities for detecting the terminal current system are acquired, default trigger event is monitored.
For example, when the terminal is connected with computer, and obtain by brush machine instrument the ROOT authorities of terminal system, then it is right Default trigger event is monitored.
S102:If monitoring the default trigger event, solicited message is sent to control device.
In step s 102, if monitoring the default trigger event, and default trigger event is that SIM card information becomes Change, then send solicited message to control device.Wherein, the client identification module SIM card information changes, and reflects described Whether the SIM card in terminal is artificially extracted, or is changed.The information of current SIM card is carried in the solicited message.Need It can include it is noted that SIM card information changes:Digital coding in SIM card changes, corresponding to SIM card Telephone number changes, the speech path network corresponding to SIM card changes or SIM card corresponding to data network become Change.The information of current SIM card comprises at least:The real-name authentication information of telephone number, SIM card corresponding to SIM card, SIM card One or more in operator's informaiton corresponding to information of home location and SIM card.
It is understood that password can be password, user-defined password or the random cipher of systemic presupposition.
As a kind of possibility realized of the present embodiment, to control device send solicited message can be by default application to Control device sends the solicited message.It is described default when sending the solicited message to control device by default application Using with communication authority, and for detecting the SIM card information of the terminal, wherein, communication authority can include:Send information Authority, the authority of receive information, the authority for initiating to reserved number call request, or the authority of incoming call answering.
It is understood that default application can be social networking application, can be specifically instant messaging application or non-instant Communications applications.
Change to change for the telephone number corresponding to SIM card with the SIM card information of the terminal and illustrated Illustrate, if the telephone number corresponding to SIM card changes, need by obtaining the telephone number corresponding to current SIM card, And the telephone number generation solicited message according to corresponding to current SIM card, and then send the solicited message to control device.
S103:The response message that the control device returns is received, and the response message is hidden.
In step s 103, response message carries lock machine instruction and/or password, and lock machine is instructed for controlling terminal to perform Lock machine operates.
Solicited message is sent to control device so that the control device is generated according to the current SIM card information and responded Information, and return to the response message.After terminal is by identifying the response message, response message is hidden.
It is embodied in it is understood that being hidden to response message when receiving the response message, does not prompt the sound Information is answered, or the response message is hidden in information list, i.e., does not show the response in information list Information.
S104:Lock machine operation is performed according to the response message.
In step S104, lock machine operation includes screen locking, shutdown or performs deactivation operation to port.
It is understood that in order to ensure the stability of lock machine state, lock machine operation is being performed according to the response message While, " forbid performing is not task of data interaction is carried out with control device " can also be realized, and/or " forbid obtaining ROOT authorities ".
In such scheme, by being monitored to default trigger event;If the default trigger event is monitored, to control Control equipment sends solicited message;The response message that the control device returns is received, and the response message is hidden;Root Lock machine operation is performed according to the response message, the response message that can be sent to control device is hidden, and then realizes terminal Without prompting lock machine.
It is a kind of schematic flow diagram of the method for terminal lock machine that another embodiment of the present invention provides referring to Fig. 2, such as Fig. 2 Shown, the method for terminal lock machine may include:
S201:Default trigger event is monitored.
It is understood that step S201 is identical with the step S101 in above-described embodiment, step S101 for details, reference can be made to Associated description, will not be repeated here.
S202:If monitoring the default trigger event, solicited message is sent to control device.
In step S202, if monitoring, the default trigger event changes for client identification module SIM card information, Then solicited message is sent to control device.The information of current SIM card is carried in the solicited message.
In the present embodiment, the current SIM card information includes destination number and target IMEI code.By the way that request is referred to Make, the destination number and the target IMEI code compile the information content, to generate the solicited message.
It should be noted that IMEI code (International Mobile Equipment Identity) Chinese is entitled: International Mobile Equipment Identity code, it is the abbreviation of International Mobile Equipment Identity code, international mobile equipment identification code, is by 15 bit digitals " the electronics string number " of composition.
Single or multiple IMEI codes corresponding to each terminal differ, i.e., IMEI code has uniqueness.Single terminal An IMEI code, two IMEI codes or multiple IMEI codes can be corresponded to simultaneously.When terminal can support that multimode is conversed, that is, support During more cartoon communication services, then the terminal can correspond to multiple IMEI codes.
So that terminal can only use a SIM card as an example, when the SIM card information of terminal changes, by described in acquisition Destination number, target IMEI code corresponding with the current SIM card corresponding to current SIM card;By request instruction, described current SIM card number and the target IMEI code compile the solicited message, and the form of solicited message can enter shown in following table.
Request instruction Target IMEI code Current SIM card number
For example, request instruction is " SIM change ", IMEI code are the combination of any 15 character strings, raw information Content is specifically as follows:SIM change*IMEI codes * 13612345678.Wherein, " SIM change " are the request instruction, " 13612345678 " are the destination number of the current SIM card, and " * " is the character for segmentation.
Terminal can use two SIM cards simultaneously, when a SIM card information of terminal changes, be worked as by obtaining The destination number of preceding SIM card, specifically obtains the number of new SIM card after SIM card information change, and by the new SIM card Number Reorganization be destination number.
For example, terminal uses two SIM cards simultaneously, the number of the first SIM card is " 13612345678 ", the second SIM card Number is " 18512345678 ", and the IMEI code corresponding to the first SIM card is " 1234567890abcde ", and the second SIM card institute is right The IMEI code answered is " 0987654321edcba ".When detecting that terminal only has the information of the first SIM card to change, and the The number of one SIM card becomes from " 13612345678 " when turning to " 13787654321 ", by the destination number that gets be for " 13787654321 ", target IMEI code corresponding with the current SIM card are " 1234567890abcde ", corresponding request letter The content of breath is " SIM change*1234567890abcde*13787654321 ".
As a kind of possibility realized of the present embodiment, to control device send solicited message can be by default application to Control device sends solicited message.I.e. by request instruction, the destination number and the target IMEI code in default application The information content is compiled, to generate the solicited message, the solicited message is sent to the control by the default application Equipment.
It should be noted that sent by default application to control device in the scene of solicited message, the default triggering Event can also be that default application is prohibited to run or unloads the default application.
When detecting the default trigger event, and the default trigger event is prohibited to run or unloaded for default application The default application is carried, then lock machine operation is performed according to default upper lock mechanism.Wherein, the default application operation is forbidden in detection, Or the unloading default application, can be specifically to be detected by application module in terminal system.
In order to improve the accuracy that above-mentioned event occurs for detection, the application module for detecting above-mentioned event can be terminal Application module normally opened in system, or being run always with terminal.For example, clock module, calendaring module, weather module or feelings Scape intelligent object.
It should be noted that default upper lock mechanism can be that predetermined system is locked in terminal system, when detection forbid it is described Default application operation, or during the unloading default application, then call the system lock to perform lock machine by the terminal and operate.Its In, it can be by obtaining System Privileges to forbid the default application operation, and disabling setting is carried out to default application.Described in unloading Default application, can directly be unloaded by pulling icon, or unloaded by force by obtaining system ROOT authorities.
It is understood that after locking execution lock machine operation by calling system, can be by carrying out system to the terminal Refitting, or the mode of brush machine are recovered.
If it is to forbid the default application to run by the default trigger event, or the default trigger event is unloading The default application, then lock machine operation is performed according to default upper lock mechanism so that when default application is unloaded, remain able to touch Lock mechanism forbids terminal to be used on hair.
In actual applications, it can also prevent that default application is disabled or is unloaded by way of hiding default application.
So that default application is AntiTheftTrack.apk as an example, looked into " the application list " in terminal " setting " " AntiTheftTrack.apk " is found, " AntiTheftTrack.apk " is hidden by selection so that should Icon corresponding to " AntiTheftTrack.apk " do not show in the display interface of terminal, realizes pair AntiTheftTrack.apk's hides.
S203:The response message that the control device returns is received, and the response message is hidden.
In step S203, terminal receives the response message that the control device returns, and the response message is carried out Hide.
The response message is corresponding with the solicited message, and the content of the response message specifically can be such as following table institute Show.
Lock machine instructs Target IMEI code
Lock machine instruction can be the instruction for calling system lock, or control the instruction of the terminal progress lock machine.
Lock machine instruction can include keyword or key character, by identifying response message, and then obtain corresponding crucial Word, lock machine instructs according to corresponding to can obtaining the keyword.
So that lock machine instruction is the instruction for calling system lock as an example, lock machine instruction can be " lock phone ".For example, The content of response message is specifically as follows:lock phone*1234567890abcde.Wherein, " lock phone " refer to for lock machine The keyword of order, " 1234567890abcde " are the IMEI code, and " * " is the character for segmentation.
It is understood that response message can also include password, for being used to judge that unlocking pin is in releasing process No correct, the password can be password, user-defined password or the random cipher by generating of systemic presupposition.
Step S203 can specifically include:Judge whether the response message includes the first default mark, described first is pre- If it is identified as the title for performing the process for receiving the response message operation;If it is default that the response message includes described first Mark, then be hidden to the response message.
It should be noted that the first default title for being identified as the process for performing the reception response message operation, works as inspection Measuring has first to preset mark in the information header of response message, then determines that execution receives the response and believed according to the first default mark The process of operation is ceased, and operation is hidden to the process, even the implementation procedure and result of the process be not in screen Display.
S204:Lock machine operation is performed according to the response message.
It is understood that step S204 is identical with the step S104 in above-described embodiment, step S104 for details, reference can be made to Associated description, will not be repeated here.
S205:Receive that the control device sends short message is corresponding unlocks short message with the response, and according to the solution Short message is locked, performs unblock operation.
In step S205, the unlocking information carries the second default mark, unlock instruction, target IMEI code and unblock Password.
It should be noted that it is identified and is hidden for the ease of unlocking information, described in being carried in unlocking information Second default mark, can trigger the operation being hidden to the information while unlocking information is identified.
It is understood that the described second default title for being identified as the process for performing the reception unlocking information operation, The step of to being hidden in step S203 to response message, is similar, therefore here is omitted.
In the present embodiment, unlock instruction can be the instruction for stopping calling system lock, or control the terminal The instruction being unlocked.The content of the unlocking information specifically can be with as shown in the table.
Unlock instruction Target IMEI code Password
It is understood that unlocking pin can be for the password of systemic presupposition, user-defined password or by generating Random cipher.
So that unlock instruction is for stopping the instruction of calling system lock as an example, unlock instruction can be " unlock phone”.For example, the content of unlocking information is specifically as follows:unlock phone*1234567890abcde*123456.Its In, " unlock phone " are the keyword of unlock instruction, and " 1234567890abcde " is the IMEI code, and " 123456 " are The unlocking pin, " * " are the character for segmentation.
When carrying out lock machine by calling system, it is allowed to which user is unlocked by inputting the unlocking pin.
It is understood that in all embodiments of the invention, in solicited message, response message and unlocking information Settable default mark, request is believed by identifying solicited message, response message or unlocking information, and then according to default mark Breath, response message or unlocking information are hidden.Wherein, please when receiving and dispatching solicited message, response message or unlocking information Ask information, response message and unlocking information to give tacit consent to be hidden, user can take solicited message and unlocking information by setting Blanking is hidden.
As a kind of mode in the cards of the present embodiment, when the communicating number change of control device, control device is write from memory Recognize to the terminal and send information for changing reserved number, the information includes the number after control device change, described Original reserved number is revised as number after change by terminal according to the information for being used to change the reserved number Code.
It should be noted that before the solicited message is sent to control device according to reserved number, institute is not received State the information for changing the reserved number, it is determined that the reserved number does not change, then according to reserved number to control Control equipment sends the solicited message.When receiving the information for being used to change the reserved number, it is determined that described to prestore Number is changed, then sends the solicited message to control device according to the number after change.
In such scheme, by being monitored to default trigger event;If the default trigger event is monitored, to control Control equipment sends solicited message;The response message that the control device returns is received, and the response message is hidden;Root Lock machine operation is performed according to the response message, the response message that can be sent to control device is hidden, and then realizes terminal Without prompting lock machine.
By receiving that the control device sends and short message is corresponding unlocks short message for the response, and according to the unblock Short message, unblock operation is performed, and then realize unblock.
If the default trigger event is default described default to unload using operation, or the default trigger event to forbid Using then according to default upper lock mechanism execution lock machine operation so that when default application is unloaded, remain able to trigger lock machine System carries out lock machine to terminal.
It is a kind of schematic flow diagram of method for controlling terminal lock machine provided in an embodiment of the present invention referring to Fig. 3, such as Fig. 3 Shown, the method for control terminal lock machine may include:
S301:The solicited message that receiving terminal is sent, the solicited message are that the terminal is monitoring default triggering thing The solicited message generated during part.
In step S301, the client identification module SIM card information changes, and reflects the SIM in the terminal Whether card is artificially extracted, or changes.The information of current SIM card is carried in the solicited message.Response message carries Lock machine instruction and/or password, lock machine are instructed for controlling terminal to perform lock machine operation.
It can include it should be noted that SIM card information changes:Digital coding in SIM card changes, SIM The corresponding telephone number of card changes, the speech path network corresponding to SIM card changes or SIM card corresponding to data Network changes.The information of current SIM card comprises at least:The real-name authentication letter of telephone number, SIM card corresponding to SIM card One or more in breath, the information of home location of SIM card and operator's informaiton corresponding to SIM card.
In the present embodiment, the current SIM card information includes destination number and target IMEI code.By the way that request is referred to Make, the destination number and the target IMEI code compile the information content, to generate the solicited message.
It should be noted that IMEI code (International Mobile Equipment Identity) Chinese is entitled: International Mobile Equipment Identity code, it is the abbreviation of International Mobile Equipment Identity code, international mobile equipment identification code, is by 15 bit digitals " the electronics string number " of composition.
Single or multiple IMEI codes corresponding to each terminal differ, i.e., IMEI code has uniqueness.Single terminal An IMEI code, two IMEI codes or multiple IMEI codes can be corresponded to simultaneously.When terminal can support that multimode is conversed, that is, support During more cartoon communication services, then the terminal can correspond to multiple IMEI codes.
As a kind of mode realized of the present embodiment, before step S301, including:Sent to the terminal for changing The information of the reserved number, the terminal is set to change reserved number according to described information.
Step S301 is specifically included:The solicited message that receiving terminal is sent according to new preset number.
It is understood that when the communicating number change of control device, control device, which is given tacit consent to send to the terminal, to be used In the information of modification reserved number, the information includes the number after control device change, and the terminal is used to repair according to described Change the information of the reserved number, original reserved number is revised as the number after change.
It should be noted that before the solicited message that receiving terminal is sent according to reserved number, do not sent out to terminal Send the information for being used to change the reserved number, it is determined that the reserved number does not change so that terminal can root The solicited message is sent according to reserved number.Described it is used to change described prestore when the control device have sent to the terminal The information of number, it is determined that the reserved number is changed, then receives what the terminal was sent according to the number after change The solicited message.
S302:Corresponding response message is sent to the terminal according to the solicited message so that described in the terminal-pair Response message is hidden and performs lock machine operation according to the response message.
The response message is corresponding with the solicited message, and the content of the response message specifically can be such as following table institute Show.
Lock machine instructs Target IMEI code
Lock machine instruction can be the instruction for calling system lock, or control the instruction of the terminal progress lock machine.
Lock machine instruction can include keyword or key character, by identifying response message, and then obtain corresponding crucial Word, lock machine instructs according to corresponding to can obtaining the keyword.
So that lock machine instruction is the instruction for calling system lock as an example, lock machine instruction can be " lock phone ".For example, The content of response message is specifically as follows:lock phone*1234567890abcde.Wherein, " lock phone " refer to for lock machine The keyword of order, " 1234567890abcde " are the IMEI code, and " * " is the character for segmentation.
It is understood that response message can also include password, for being used to judge that unlocking pin is in releasing process No correct, the password can be password, user-defined password or the random cipher by generating of systemic presupposition.
As a kind of possibility realized of the present embodiment, step S302 can specifically include:According to the solicited message to institute State terminal and send corresponding response message so that response message described in the terminal-pair is identified, if the terminal detects There is the first default mark in the information header of the response message, then response message described in the terminal-pair is hidden, and described the The one default title for being identified as the terminal and performing the process for receiving the response message operation.
It should be noted that the first default title for being identified as the process for performing the reception response message operation, works as inspection Measuring has first to preset mark in the information header of response message, then determines that execution receives the response and believed according to the first default mark The process of operation is ceased, and operation is hidden to the process, even the implementation procedure and result of the process be not in screen Display.
S303:Sent to the terminal and respond that short message is corresponding unlocks short message with described, make the terminal according to the solution Lock short message and perform unblock operation.
In step S303, the unlocking information carries the second default mark, unlock instruction, target IMEI code and unblock Password.
It should be noted that it is identified and is hidden for the ease of unlocking information, described in being carried in unlocking information Second default mark, can trigger the operation being hidden to the information while unlocking information is identified.
It is understood that the step of to being hidden in step S302 to response message, is similar, the described second pre- bidding Know to perform the title for the process for receiving the unlocking information operation.
In the present embodiment, unlock instruction can be the instruction for stopping calling system lock, or control the terminal The instruction being unlocked.The content of the unlocking information specifically can be with as shown in the table.
Unlock instruction Target IMEI code Password
It is understood that unlocking pin can be for the password of systemic presupposition, user-defined password or by generating Random cipher.
So that unlock instruction is for stopping the instruction of calling system lock as an example, unlock instruction can be " unlock phone”.For example, the content of unlocking information is specifically as follows:unlock phone*1234567890abcde*123456.Its In, " unlock phone " are the keyword of unlock instruction, and " 1234567890abcde " is the IMEI code, and " 123456 " are The unlocking pin, " * " are the character for segmentation.
When carrying out lock machine by calling system, it is allowed to which user is unlocked by inputting the unlocking pin.
It is understood that in all embodiments of the invention, in solicited message, response message and unlocking information Settable default mark, request is believed by identifying solicited message, response message or unlocking information, and then according to default mark Breath, response message or unlocking information are hidden.Wherein, please when receiving and dispatching solicited message, response message or unlocking information Ask information, response message and unlocking information to give tacit consent to be hidden, user can take solicited message and unlocking information by setting Blanking is hidden.
In such scheme, by the solicited message of receiving terminal transmission, the solicited message is that the terminal is monitoring The solicited message generated during default trigger event;Corresponding response message is sent to the terminal according to the solicited message, So that response message described in the terminal-pair is hidden and performs lock machine operation according to the response message.So that terminal can be with To control device send response message be hidden, and then realize terminal without prompting lock machine.
Referring to Fig. 4, Fig. 4 is a kind of schematic block diagram of terminal provided in an embodiment of the present invention.Terminal 400 can be intelligence The mobile terminals such as mobile phone, tablet personal computer.The each unit that the terminal 400 of the present embodiment includes is used to perform embodiment corresponding to Fig. 1 In each step, referring specifically to the associated description in embodiment corresponding to Fig. 1 and Fig. 1, do not repeat herein.The present embodiment Terminal 400 includes:Monitoring unit 401, transmitting element 402, receiving unit 403 and execution unit 404.
Monitoring unit 401, for being monitored to default trigger event, and monitoring result is sent to transmitting element 402.
For example, monitoring unit 401 is monitored to default trigger event, and monitoring result is sent to transmitting element 402.
Transmitting element 402, for receiving the monitoring result of the transmission of monitoring unit 401, and if monitoring the default triggering Event, then send solicited message to control device.
For example, transmitting element 402 receives the monitoring result that monitoring unit 401 is sent, and if monitoring the default triggering Event, then send solicited message to control device.
Receiving unit 403, the response message returned for receiving the control device, and the response message is carried out hidden Hide.
For example, receiving unit 403 receives the response message that the control device returns, and the response message is carried out hidden Hide.
Execution unit 404, for performing lock machine operation according to the response message.
Operated for example, execution unit 402 performs lock machine according to the response message.
In such scheme, by being monitored to default trigger event;If the default trigger event is monitored, to control Control equipment sends solicited message;The response message that the control device returns is received, and the response message is hidden;Root Lock machine operation is performed according to the response message, the response message that can be sent to control device is hidden, and then realizes terminal Without prompting lock machine.
Referring to Fig. 5, Fig. 5 is a kind of schematic block diagram for terminal that another embodiment of the present invention provides.Terminal 500 can be The mobile terminals such as smart mobile phone, tablet personal computer.The each unit that the terminal 500 of the present embodiment includes is used to perform real corresponding to Fig. 2 Each step in example is applied, referring specifically to the associated description in embodiment corresponding to Fig. 2 and Fig. 2, is not repeated herein.This implementation The terminal 500 of example includes:Monitoring unit 501, transmitting element 502, receiving unit 503, execution unit 504, unlocking unit 505 with And default lock machine unit 506.
Monitoring unit 501, for being monitored to default trigger event, and monitoring result is sent to transmitting element 502.
For example, monitoring unit 501 is monitored to default trigger event, and monitoring result is sent to transmitting element 502.
Transmitting element 502, for receiving the monitoring result of the transmission of monitoring unit 501, and if monitoring the default triggering Event, then send solicited message to control device.
For example, transmitting element 502 receives the monitoring result that monitoring unit 501 is sent, and if monitoring the default triggering Event, then send solicited message to control device.
Further, as a kind of possibility realized of the present embodiment, if testing result for default application be prohibited operation or Person unloads the default application, then testing result is sent into default lock machine unit 506.
Transmitting element 502 is additionally operable to, if testing result is prohibited to run or unloads the default application for default application, Testing result is then sent to default lock machine unit 506.
If being prohibited to run or unloading the default application for example, the testing result of transmitting element 502 is default application, Testing result is sent to default lock machine unit 506.
Receiving unit 503, the response message returned for receiving the control device, and the response message is carried out hidden Hide.
For example, receiving unit 503 receives the response message that the control device returns, and the response message is carried out hidden Hide.
Receiving unit 503 is specifically used for, and receives the response message that the control device returns, and judge the response message Whether first default mark, the described first default title that is identified as execution receives the process of the response message operation are included; If the response message includes the described first default mark, the response message is hidden.
For example, receiving unit 503 receives the response message that the control device returns, and whether judge the response message Including the first default mark, the described first default title for being identified as the process for performing the reception response message operation;If institute Stating response message includes the described first default mark, then the response message is hidden.
Execution unit 504, for performing lock machine operation according to the response message.
Operated for example, execution unit 504 performs lock machine according to the response message.
Unlocking unit 505, for receive that the control device sends it is corresponding with the response short message unlock short message, and According to the unblock short message, unblock operation is performed.
For example, unlocking unit 505 receive that the control device sends it is corresponding with the response short message unlock short message, and According to the unblock short message, unblock operation is performed.
Default lock machine unit 506, if it is to forbid default application operation for the default trigger event, or it is described default tactile Hair event then performs lock machine operation to unload the default application according to default upper lock mechanism.
If for example, the 506 default trigger event of lock machine unit is preset to forbid default application operation, or described preset to touch Hair event then performs lock machine operation to unload the default application according to default upper lock mechanism.
In such scheme, by being monitored to default trigger event;If the default trigger event is monitored, to control Control equipment sends solicited message;The response message that the control device returns is received, and the response message is hidden;Root Lock machine operation is performed according to the response message, the response message that can be sent to control device is hidden, and then realizes terminal Without prompting lock machine.
By receiving that the control device sends and short message is corresponding unlocks short message for the response, and according to the unblock Short message, unblock operation is performed, and then realize unblock.
If the default trigger event is default described default to unload using operation, or the default trigger event to forbid Using then according to default upper lock mechanism execution lock machine operation so that when default application is unloaded, remain able to trigger lock machine System carries out lock machine to terminal.
Referring to Fig. 6, Fig. 6 is a kind of schematic block diagram of control device provided in an embodiment of the present invention.Control device 600 can Think the mobile terminals such as smart mobile phone, tablet personal computer, can also be server.The control device 600 of the present embodiment includes each Unit is used to perform each step in embodiment corresponding to Fig. 3, referring specifically to the phase in embodiment corresponding to Fig. 3 and Fig. 3 Description is closed, is not repeated herein.The control device 600 of the present embodiment includes:Information receiving unit 601 and first information transmitting element 602。
Information receiving unit 601, the solicited message sent for receiving terminal, the solicited message are that the terminal is being supervised Measure the solicited message generated during default trigger event.
For example, the solicited message that the receiving terminal of information receiving unit 60 is sent, the solicited message is that the terminal is being supervised Measure the solicited message generated during default trigger event.
First information transmitting element 602, for sending corresponding response message to the terminal according to the solicited message, So that response message described in the terminal-pair is hidden and performs lock machine operation according to the response message.
For example, first information transmitting element 602 sends corresponding response message according to the solicited message to the terminal, So that response message described in the terminal-pair is hidden and performs lock machine operation according to the response message.
Further, control device 600 also includes:
Second information transmitting unit 603, for sending corresponding response message to the terminal according to the solicited message, So that response message described in the terminal-pair is hidden, and lock machine operation is performed according to the response message.
For example, the second information transmitting unit 603 sends corresponding response message according to the solicited message to the terminal, So that response message described in the terminal-pair is hidden, and lock machine operation is performed according to the response message.
As a kind of possibility realized of the present embodiment, control device 600 can also include changing unit 604.
Changing unit 604, for sending the information for changing the reserved number to the terminal, make the terminal root Reserved number is changed according to described information.
For example, changing unit 604 sends the information for changing the reserved number to the terminal, make the terminal root Reserved number is changed according to described information.
Information receiving unit 601 is specifically used for, the solicited message that receiving terminal is sent according to new preset number.
For example, the solicited message that the receiving terminal of information receiving unit 601 is sent according to new preset number.
In such scheme, by the solicited message of receiving terminal transmission, the solicited message is that the terminal is monitoring The solicited message generated during default trigger event;Corresponding response message is sent to the terminal according to the solicited message, So that response message described in the terminal-pair is hidden and performs lock machine operation according to the response message.So that terminal can be with To control device send response message be hidden, and then realize terminal without prompting lock machine.
It is a kind of terminal schematic block diagram that yet another embodiment of the invention provides referring to Fig. 7.In the present embodiment as depicted Terminal can include:One or more processors 701;One or more input equipments 702, one or more output equipments 703 and memory 704.Above-mentioned processor 701, input equipment 702, output equipment 703 and memory 704 are connected by bus 705 Connect.Memory 702 is used to store, and computer program includes instruction, and processor 701 is by calling the calculating that memory 702 stores Machine program performs following operation:
Processor 701 is used for:Default trigger event is monitored.
Processor 701 is used for:If monitoring the default trigger event, solicited message is sent to control device.
Processor 701 is used for:The response message that the control device returns is received, and the response message is carried out hidden Hide.
Processor 701 is used for:Lock machine operation is performed according to the response message.
Processor 701 is additionally operable to:Receive that the control device sends it is corresponding with the response short message unlock short message, and According to the unblock short message, unblock operation is performed.
Processor 701 is specifically used for:Judge whether the response message includes the first default mark, the described first pre- bidding Know to perform the title for the process for receiving the response message operation;If the response message includes the described first pre- bidding Know, then the response message is hidden.
Processor 701 is specifically used for:By request instruction, the current SIM card number and institute in the default application State target IMEI code and compile the solicited message;Solicited message is sent from default apply to control device;By default The response message returned using the control device is received, and the response message is hidden;Basis is applied by default The response message performs lock machine operation.
Processor 701 is additionally operable to:If the default trigger event is default using operation, or the default triggering thing to forbid Part then performs lock machine operation to unload the default application according to default upper lock mechanism.
It should be appreciated that in embodiments of the present invention, alleged processor 701 can be CPU (Central Processing Unit, CPU), the processor can also be other general processors, digital signal processor (Digital Signal Processor, DSP), application specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other FPGAs Device, discrete gate or transistor logic, discrete hardware components etc..General processor can be microprocessor or this at It can also be any conventional processor etc. to manage device.
Input equipment 702 can include Trackpad, fingerprint adopt sensor (finger print information that is used to gathering user and fingerprint Directional information), microphone etc., output equipment 703 can include display (LCD etc.), loudspeaker etc..
The memory 704 can include read-only storage and random access memory, and to processor 701 provide instruction and Data.The a part of of memory 704 can also include nonvolatile RAM.For example, memory 704 can also be deposited Store up the information of device type.
In the specific implementation, processor 701, input equipment 702, the output equipment 703 described in the embodiment of the present invention can Described in the first embodiment and second embodiment for performing a kind of method of control terminal lock machine provided in an embodiment of the present invention Implementation, also can perform the embodiment of the present invention described by terminal implementation, will not be repeated here.
A kind of computer-readable recording medium, the computer-readable storage medium are provided in another embodiment of the invention Matter is stored with computer program, and the computer program is realized when being executed by processor:
Default trigger event is monitored.
If monitoring the default trigger event, solicited message is sent to control device.
The response message that the control device returns is received, and the response message is hidden.
Lock machine operation is performed according to the response message.
The computer program is also realized when being executed by processor:
Receive the corresponding with the response short message of the control device transmission and unlock short message, and it is short according to the unblock Letter, perform unblock operation.
The computer program is also realized when being executed by processor:
Judge whether the response message is preset including first to identify, the described first default be identified as performs the reception sound Answer the title of the process of information operation.
If the response message includes the described first default mark, the response message is hidden.
The computer program is also realized when being executed by processor:
Destination number, target corresponding with the current SIM card corresponding to the current SIM card are obtained by default application IMEI code.
Request instruction, the current SIM card number and the target IMEI code are compiled in the default application The solicited message.
Solicited message is sent from default apply to control device.
The response message of the control device return is received by default application, and the response message is hidden.
Lock machine is performed by default application according to the response message to operate.
The computer program is also realized when being executed by processor:
If the default trigger event is default described default to unload using operation, or the default trigger event to forbid Using then according to default upper lock mechanism execution lock machine operation.
In such scheme, by being monitored to default trigger event;If the default trigger event is monitored, to control Control equipment sends solicited message;The response message that the control device returns is received, and the response message is hidden;Root Lock machine operation is performed according to the response message, the response message that can be sent to control device is hidden, and then realizes terminal Without prompting lock machine.
By receiving that the control device sends and short message is corresponding unlocks short message for the response, and according to the unblock Short message, unblock operation is performed, and then realize unblock.
The computer-readable recording medium can be the internal storage unit of the terminal described in foregoing any embodiment, example Such as the hard disk or internal memory of terminal.The computer-readable recording medium can also be the External memory equipment of the terminal, such as The plug-in type hard disk being equipped with the terminal, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card) etc..Further, the computer-readable recording medium can also be wrapped both Including the internal storage unit of the terminal also includes External memory equipment.The computer-readable recording medium is described for storing Other programs and data needed for computer program and the terminal.The computer-readable recording medium can be also used for temporarily When store the data that has exported or will export.
It is a kind of control device schematic block diagram that yet another embodiment of the invention provides referring to Fig. 8.This implementation as depicted Control device in example can include:One or more processors 801;One or more input equipments 802, it is one or more defeated Go out equipment 803 and memory 804.Above-mentioned processor 801, input equipment 802, output equipment 803 and memory 804 pass through bus 805 connections.Memory 802 is used to store, and computer program includes instruction, what processor 801 was stored by calling memory 802 Computer program performs following operation:
Processor 801 is used for:Receiving terminal send solicited message, the solicited message be the terminal monitor it is pre- If the solicited message generated during trigger event.
Processor 801 is used for:Corresponding response message is sent to the terminal according to the solicited message so that the end End is hidden to the response message and performs lock machine operation according to the response message.
Processor 801 is used for:Sent to the terminal and respond that short message is corresponding unlocks short message with described, make the terminal root Unblock operation is performed according to the unblock short message.
Processor 801 is additionally operable to:The information for changing the reserved number is sent to the terminal, makes the terminal root Reserved number is changed according to described information.
Processor 801 is specifically used for:The solicited message that receiving terminal is sent according to new preset number.
In such scheme, by the solicited message of receiving terminal transmission, the solicited message is that the terminal is monitoring The solicited message generated during default trigger event;Corresponding response message is sent to the terminal according to the solicited message, So that response message described in the terminal-pair is hidden and performs lock machine operation according to the response message.So that terminal can be with To control device send response message be hidden, and then realize terminal without prompting lock machine.
It should be appreciated that in embodiments of the present invention, alleged processor 801 can be CPU (Central Processing Unit, CPU), the processor can also be other general processors, digital signal processor (Digital Signal Processor, DSP), application specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other FPGAs Device, discrete gate or transistor logic, discrete hardware components etc..General processor can be microprocessor or this at It can also be any conventional processor etc. to manage device.
Input equipment 802 can include Trackpad, fingerprint adopt sensor (finger print information that is used to gathering user and fingerprint Directional information), microphone etc., output equipment 803 can include display (LCD etc.), loudspeaker etc..
The memory 804 can include read-only storage and random access memory, and to processor 801 provide instruction and Data.The a part of of memory 804 can also include nonvolatile RAM.For example, memory 804 can also be deposited Store up the information of device type.
In the specific implementation, processor 801, input equipment 802, the output equipment 803 described in the embodiment of the present invention can Described in the first embodiment and second embodiment for performing a kind of method of control terminal lock machine provided in an embodiment of the present invention Implementation, also can perform the embodiment of the present invention described by terminal implementation, will not be repeated here.
A kind of computer-readable recording medium, the computer-readable storage medium are provided in another embodiment of the invention Matter is stored with computer program, and the computer program is realized when being executed by processor:
The solicited message that receiving terminal is sent, the solicited message are monitoring default trigger event when institute for the terminal The solicited message of generation.
Corresponding response message is sent to the terminal according to the solicited message so that letter is responded described in the terminal-pair Breath is hidden and performs lock machine operation according to the response message.
The computer program is also realized when being executed by processor:
Sent to the terminal and respond that short message is corresponding unlocks short message with described, make the terminal according to the unblock short message Perform unblock operation.
The computer program is also realized when being executed by processor:
The information for changing the reserved number is sent to the terminal, the terminal is changed according to described information pre- Deposit number.
The solicited message that receiving terminal is sent according to new preset number.
In such scheme, by the solicited message of receiving terminal transmission, the solicited message is that the terminal is monitoring The solicited message generated during default trigger event;Corresponding response message is sent to the terminal according to the solicited message, So that response message described in the terminal-pair is hidden and performs lock machine operation according to the response message.So that terminal can be with To control device send response message be hidden, and then realize terminal without prompting lock machine.
The computer-readable recording medium can be the internal storage unit of the terminal described in foregoing any embodiment, example Such as the hard disk or internal memory of terminal.The computer-readable recording medium can also be the External memory equipment of the terminal, such as The plug-in type hard disk being equipped with the terminal, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card) etc..Further, the computer-readable recording medium can also be wrapped both Including the internal storage unit of the terminal also includes External memory equipment.The computer-readable recording medium is described for storing Other programs and data needed for computer program and the terminal.The computer-readable recording medium can be also used for temporarily When store the data that has exported or will export.
Those of ordinary skill in the art are it is to be appreciated that the list of each example described with reference to the embodiments described herein Member and algorithm steps, it can be realized with electronic hardware, computer software or the combination of the two, in order to clearly demonstrate hardware With the interchangeability of software, the composition and step of each example are generally described according to function in the above description.This A little functions are performed with hardware or software mode actually, application-specific and design constraint depending on technical scheme.Specially Industry technical staff can realize described function using distinct methods to each specific application, but this realization is not It is considered as beyond the scope of this invention.
It is apparent to those skilled in the art that for convenience of description and succinctly, the end of foregoing description End and the specific work process of unit, may be referred to the corresponding process in preceding method embodiment, will not be repeated here.
In several embodiments provided herein, it should be understood that disclosed system, terminal and method, can be with Realize by another way.For example, device embodiment described above is only schematical, for example, the unit Division, only a kind of division of logic function, can there is other dividing mode, such as multiple units or component when actually realizing Another system can be combined or be desirably integrated into, or some features can be ignored, or do not perform.In addition, shown or beg for The mutual coupling of opinion or direct-coupling or communication connection can be the INDIRECT COUPLINGs by some interfaces, device or unit Or communication connection or electricity, the connection of mechanical or other forms.
The unit illustrated as separating component can be or may not be physically separate, show as unit The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected to realize scheme of the embodiment of the present invention according to the actual needs Purpose.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, can also It is that unit is individually physically present or two or more units are integrated in a unit.It is above-mentioned integrated Unit can both be realized in the form of hardware, can also be realized in the form of SFU software functional unit.
If the integrated unit is realized in the form of SFU software functional unit and is used as independent production marketing or use When, it can be stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially The part to be contributed in other words to prior art, or all or part of the technical scheme can be in the form of software product Embody, the computer software product is stored in a storage medium, including some instructions are causing a computer Equipment (can be personal computer, server, or network equipment etc.) performs the complete of each embodiment methods described of the present invention Portion or part steps.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey The medium of sequence code.
The foregoing is only a specific embodiment of the invention, but protection scope of the present invention is not limited thereto, any Those familiar with the art the invention discloses technical scope in, various equivalent modifications can be readily occurred in or replaced Change, these modifications or substitutions should be all included within the scope of the present invention.Therefore, protection scope of the present invention should be with right It is required that protection domain be defined.

Claims (10)

  1. A kind of 1. method of terminal lock machine, it is characterised in that methods described includes:
    Default trigger event is monitored;
    If monitoring the default trigger event, solicited message is sent to control device;
    The response message that the control device returns is received, and the response message is hidden;
    Lock machine operation is performed according to the response message.
  2. 2. according to the method for claim 1, it is characterised in that it is described that the response message is hidden, including:
    Whether include first default mark, described first default be identified as execution and receive the response letter if judging the response message Cease the title of the process of operation;
    If the response message includes the described first default mark, the response message is hidden.
  3. A kind of 3. method for controlling terminal lock machine, it is characterised in that methods described includes:
    The solicited message that receiving terminal is sent, the solicited message are generated by the terminal when monitoring default trigger event Solicited message;
    Corresponding response message is sent to the terminal according to the solicited message so that response message described in the terminal-pair is entered Row is hidden and performs lock machine operation according to the response message.
  4. 4. according to the method for claim 3, it is characterised in that described that phase is sent to the terminal according to the solicited message The response message answered so that response message described in the terminal-pair is hidden and performs lock machine behaviour according to the response message Make, including:
    Corresponding response message is sent to the terminal according to the solicited message so that the terminal judges the response message Whether first default mark is included, described first presets the title for being identified as and performing the process for receiving the response message operation, If the response message includes the described first default mark, the response message is hidden.
  5. A kind of 5. terminal, it is characterised in that including:
    Monitoring unit, for being monitored to default trigger event;
    Transmitting element, if for monitoring the default trigger event, solicited message is sent to control device;
    Receiving unit, the response message returned for receiving the control device, and the response message is hidden;
    Execution unit, for performing lock machine operation according to the response message.
  6. A kind of 6. control device, it is characterised in that including:
    Information receiving unit, for receiving terminal send solicited message, the solicited message be the terminal monitor it is pre- If the solicited message generated during trigger event;
    First information transmitting element, for sending corresponding response message to the terminal according to the solicited message so that institute Response message described in terminal-pair is stated to be hidden and perform lock machine operation according to the response message.
  7. 7. a kind of terminal, it is characterised in that the processor, defeated including processor, input equipment, output equipment and memory Enter equipment, output equipment and memory to be connected with each other, wherein, the memory is used to store computer program, the processor It is arranged to call the computer program, performs method as claimed in claim 1 or 2.
  8. 8. a kind of computer-readable recording medium, it is characterised in that the computer-readable storage medium is stored with computer program, institute Stating computer program includes programmed instruction, and described program instruction makes the computing device such as right will when being executed by a processor Seek the method described in 1 or 2.
  9. A kind of 9. control device, it is characterised in that including processor, input equipment, output equipment and memory, the processing Device, input equipment, output equipment and memory are connected with each other, wherein, the memory is used to store computer program, the place Reason device is arranged to call the computer program, performs the method as described in claim 3 or 4.
  10. A kind of 10. computer-readable recording medium, it is characterised in that the computer-readable storage medium is stored with computer program, The computer program includes programmed instruction, and described program instruction makes the computing device such as right when being executed by a processor It is required that the method described in 3 or 4.
CN201710433101.1A 2017-06-09 2017-06-09 Method, terminal and the control device of a kind of terminal lock machine and control terminal lock machine Withdrawn CN107370872A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710433101.1A CN107370872A (en) 2017-06-09 2017-06-09 Method, terminal and the control device of a kind of terminal lock machine and control terminal lock machine

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710433101.1A CN107370872A (en) 2017-06-09 2017-06-09 Method, terminal and the control device of a kind of terminal lock machine and control terminal lock machine

Publications (1)

Publication Number Publication Date
CN107370872A true CN107370872A (en) 2017-11-21

Family

ID=60304840

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710433101.1A Withdrawn CN107370872A (en) 2017-06-09 2017-06-09 Method, terminal and the control device of a kind of terminal lock machine and control terminal lock machine

Country Status (1)

Country Link
CN (1) CN107370872A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108171084A (en) * 2018-01-30 2018-06-15 江苏信源达科技有限公司 Method, apparatus, mobile terminal and the readable storage medium storing program for executing of safeguards system safety
CN108307463A (en) * 2018-01-30 2018-07-20 江苏信源达科技有限公司 mode switching method, system and access control system
CN108843972A (en) * 2018-06-25 2018-11-20 西安华为技术有限公司 Fuel Delivery System, exhaust apparatus, fuel oil delivery method and controller
CN110696503A (en) * 2019-10-11 2020-01-17 杭州珐珞斯科技有限公司 Control device, method and equipment of printing equipment
CN112383913A (en) * 2020-11-12 2021-02-19 深圳市锐尔觅移动通信有限公司 Terminal card locking control method and device, terminal equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120244839A1 (en) * 2010-01-21 2012-09-27 Zte Corporation Anti-theft mobile terminal and anti-theft method for mobile terminal
CN102929807A (en) * 2012-11-19 2013-02-13 周万荣 Method for initiatively performing loss judgment and data processing and mobile terminal

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120244839A1 (en) * 2010-01-21 2012-09-27 Zte Corporation Anti-theft mobile terminal and anti-theft method for mobile terminal
CN102929807A (en) * 2012-11-19 2013-02-13 周万荣 Method for initiatively performing loss judgment and data processing and mobile terminal

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108171084A (en) * 2018-01-30 2018-06-15 江苏信源达科技有限公司 Method, apparatus, mobile terminal and the readable storage medium storing program for executing of safeguards system safety
CN108307463A (en) * 2018-01-30 2018-07-20 江苏信源达科技有限公司 mode switching method, system and access control system
CN108171084B (en) * 2018-01-30 2019-01-29 江苏信源达科技有限公司 Method, apparatus, mobile terminal and the readable storage medium storing program for executing of safeguards system safety
CN108843972A (en) * 2018-06-25 2018-11-20 西安华为技术有限公司 Fuel Delivery System, exhaust apparatus, fuel oil delivery method and controller
CN110696503A (en) * 2019-10-11 2020-01-17 杭州珐珞斯科技有限公司 Control device, method and equipment of printing equipment
CN110696503B (en) * 2019-10-11 2021-08-31 杭州珐珞斯科技有限公司 Control device, method and equipment of printing equipment
CN112383913A (en) * 2020-11-12 2021-02-19 深圳市锐尔觅移动通信有限公司 Terminal card locking control method and device, terminal equipment and storage medium
CN112383913B (en) * 2020-11-12 2024-05-14 深圳市锐尔觅移动通信有限公司 Terminal card locking control method and device, terminal equipment and storage medium

Similar Documents

Publication Publication Date Title
CN107370872A (en) Method, terminal and the control device of a kind of terminal lock machine and control terminal lock machine
CN110651270B (en) Data access method and device
US20090126021A1 (en) Secure initialization of intrusion detection system
CN107704765A (en) A kind of interface access method, server and computer-readable recording medium
CN106921799A (en) A kind of mobile terminal safety means of defence and mobile terminal
CN108563933A (en) Control method, device, storage medium and the mobile terminal of application program
CN104866752B (en) A kind of application guard method and user terminal
US10140445B2 (en) Information processing apparatus and information processing method
CN105574437A (en) Method and device for protecting privacy information and electronic equipment
CN107466031A (en) A kind of method and terminal for protecting data
CN106959754A (en) Control the method and mobile terminal of mobile terminal
CN106790727A (en) Information push method and device
CN104598836A (en) Method and device for managing communication content on mobile terminal as well as mobile terminal
CN107169343A (en) A kind of method and terminal of control application program
CN108737638A (en) Application control method, apparatus, mobile terminal and computer-readable medium
WO2018140172A1 (en) Determining computer ownership
CN106778295A (en) File storage, display methods, device and terminal
CN111414605A (en) Unlocking method and device of embedded security unit, electronic equipment and storage medium
CN107341376A (en) The anti-misinformation of picture and glance prevention method and electronic equipment
US9398450B2 (en) Mobile survey tools with added security
CN108520186A (en) Record screen method, mobile terminal and computer readable storage medium
CN107679411A (en) A kind of mobile terminal privacy processing method and mobile terminal
CN107391987A (en) Application guard method, device and electronic equipment based on living things feature recognition
CN106341379B (en) Information processing method, device and system
CN107368735A (en) One kind applies installation method, mobile terminal and computer-readable recording medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20171121

WW01 Invention patent application withdrawn after publication