CN103024744A - Method and system for authentication of mobile terminal - Google Patents

Method and system for authentication of mobile terminal Download PDF

Info

Publication number
CN103024744A
CN103024744A CN2012105685773A CN201210568577A CN103024744A CN 103024744 A CN103024744 A CN 103024744A CN 2012105685773 A CN2012105685773 A CN 2012105685773A CN 201210568577 A CN201210568577 A CN 201210568577A CN 103024744 A CN103024744 A CN 103024744A
Authority
CN
China
Prior art keywords
user
information
portable terminal
cloud server
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012105685773A
Other languages
Chinese (zh)
Other versions
CN103024744B (en
Inventor
刘娟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN201210568577.3A priority Critical patent/CN103024744B/en
Publication of CN103024744A publication Critical patent/CN103024744A/en
Application granted granted Critical
Publication of CN103024744B publication Critical patent/CN103024744B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention provides a method and a system for authentication of a mobile terminal. The method includes: a cloud end server acquires a user's application information according to a preset time interval; the cloud end server analyzes whether the user of the mobile terminal is abnormal or not according to a plurality of acquired user's application information; if so, the cloud end server transmits an authentication instruction to the mobile terminal; and the cloud end server receives the authentication information returned according to the authentication instruction by the mobile terminal, the cloud end server allows the user to continue to use the mobile terminal if the authentication information is correct, or else, the cloud end serve activates a self-locking program in the mobile terminal to lock the mobile terminal. By the method, authentication can be performed to users according to application habits of users, privacy disclosure of users due to the fact that the mobile terminal is lost or stolen can be prevented effectively, information safety is guaranteed, and users' experience is improved.

Description

The method and system of the authentication of portable terminal
Technical field
The present invention relates to mobile internet technical field, particularly a kind of method and system of authentication of portable terminal.
Background technology
At present, the user when using portable terminal, the accessing to your password of operated by rotary motion portable terminal, the user inputs correct accessing to your password can use this portable terminal.The problem that exists at present is, portable terminal for the user without any special identification and response, user whatsoever, mainly be correct operation, all can use this portable terminal, such as inputting correct password etc., if portable terminal does not arrange password, perhaps other users know and access to your password or password is stolen, in case portable terminal is lost, may be usurped by illegal user.
Summary of the invention
Purpose of the present invention is intended to solve at least one of described technological deficiency.
For this reason, one object of the present invention is to propose a kind of method of authentication of portable terminal, the method can be carried out authentication to the user of portable terminal according to user's use habit, prevent effectively that portable terminal from losing or the privacy of user when stolen is revealed, ensure information security, promote the user and experience.
Second purpose of the present invention is to propose a kind of system of authentication of portable terminal.
For reaching described purpose, the embodiment of first aspect present invention discloses a kind of method of authentication of portable terminal, may further comprise the steps: a, cloud server use information according to the user of predetermined time interval acquiring portable terminal; Whether b, described cloud server use the user of the described portable terminal of information analysis unusual according to a plurality of described user who obtains; If the user of the described portable terminal of c is unusual, then described cloud server sends the authentication instruction to described portable terminal; And d, described cloud server receive the authentication information that described portable terminal returns according to described authentication instruction, and control described user and continue to use described portable terminal when described authentication information is correct, otherwise the self-locking program that described cloud server activates in the described portable terminal locks described portable terminal.
Method according to the authentication of the portable terminal of the embodiment of the invention, cloud server uses information can judge whether the user occurs unusually according to the user, and when appearance is unusual, send the authentication instruction so that the user is carried out authentication, can carry out authentication to the user of portable terminal according to user's use habit, prevent effectively that portable terminal from losing or the privacy of user when stolen is revealed, ensure information security, promote the user and experience.
For reaching described purpose, the embodiment of second aspect present invention discloses a kind of system of authentication of portable terminal, comprise: cloud server and portable terminal, wherein, described cloud server, be used for using information according to the user of the described portable terminal of predetermined time interval acquiring, and use the user of the described portable terminal of information analysis whether unusual according to a plurality of described user who obtains, and when the user of described portable terminal is unusual, send the authentication instruction to described portable terminal, and receive the authentication information that described portable terminal returns according to described authentication instruction, and control described user and continue to use described portable terminal when described authentication information is correct, otherwise the self-locking program that activates in the described portable terminal locks described portable terminal.
System according to the authentication of the portable terminal of the embodiment of the invention, cloud server uses information can judge whether the user occurs unusually according to the user, and when appearance is unusual, send the authentication instruction so that the user is carried out authentication, can carry out authentication to the user of portable terminal according to user's use habit, prevent effectively that portable terminal from losing or the privacy of user when stolen is revealed, ensure information security, promote the user and experience.
The aspect that the present invention adds and advantage in the following description part provide, and part will become obviously from the following description, or recognize by practice of the present invention.
Description of drawings
Of the present invention and/or additional aspect and advantage are from obviously and easily understanding becoming the description of embodiment below in conjunction with accompanying drawing, wherein:
Fig. 1 is the flow chart of the method for the authentication of portable terminal according to an embodiment of the invention;
Fig. 2 is the flow chart of the method for the authentication of portable terminal in accordance with another embodiment of the present invention; And
Fig. 3 is the structural representation of the system of the authentication of portable terminal according to an embodiment of the invention.
Embodiment
The below describes embodiments of the invention in detail, and the example of described embodiment is shown in the drawings, and wherein identical or similar label represents identical or similar element or the element with identical or similar functions from start to finish.Be exemplary below by the embodiment that is described with reference to the drawings, only be used for explaining the present invention, and can not be interpreted as limitation of the present invention.On the contrary, embodiments of the invention comprise spirit and interior all changes, modification and the equivalent of intension scope that falls into additional claims.
In description of the invention, it will be appreciated that term " first ", " second " etc. only are used for describing purpose, and can not be interpreted as indication or hint relative importance.In addition, in description of the invention, except as otherwise noted, the implication of " a plurality of " is two or more.
Describe and to be understood in the flow chart or in this any process of otherwise describing or method, expression comprises module, fragment or the part of code of the executable instruction of the step that one or more is used to realize specific logical function or process, and the scope of preferred implementation of the present invention comprises other realization, wherein can be not according to order shown or that discuss, comprise according to related function by the mode of basic while or by opposite order, carry out function, this should be understood by the embodiments of the invention person of ordinary skill in the field.
Below with reference to the method and system of accompanying drawing description according to the authentication of the portable terminal of the embodiment of the invention.
A kind of method of authentication of portable terminal may further comprise the steps: a, cloud server use information according to the user of predetermined time interval acquiring portable terminal; Whether b, cloud server use the user of information analysis portable terminal unusual according to a plurality of users that obtain; If the user of c portable terminal is unusual, then cloud server sends the authentication instruction to portable terminal; And the authentication information returned according to the authentication instruction of d, cloud server mobile terminal receive, and the control user continues to use portable terminal when authentication information is correct, otherwise the self-locking program that cloud server activates in the portable terminal locks portable terminal.
Fig. 1 is the flow chart of the method for the authentication of portable terminal according to an embodiment of the invention.
As shown in Figure 1, the method for the authentication of portable terminal comprises the steps.
Step S101, cloud server uses information according to the user of predetermined time interval acquiring portable terminal.
Wherein, the interval can be the time interval that cloud server or mobile terminal self arrange predetermined time.
Step S102, whether cloud server uses the user of information analysis portable terminal unusual according to a plurality of users that obtain.
In one embodiment of the invention, the user use information comprise positional information, service time information and user's use habit information in one or more.For example; positional information has reflected the often geographical position of activity of user; such as Xicheng District of Beijing/Tongzhou District etc.; service time, information can reflect user's activity time; such as 7 starts in user morning etc.; user's use habit information can comprise multiple custom, likes opening hands-free etc. when receiving calls such as the user.
Step S103, if the user of portable terminal is unusual, then cloud server sends the authentication instruction to portable terminal.
Particularly, at first, cloud server can use information to carry out the feature that mobile phone users is obtained in statistical analysis according to a plurality of users that obtain, when using portable terminal, the general user has certain rule, for example through the Dongcheng District, Beijing during March activity of being everlasting, then, cloud server judges whether the user profile of newly obtaining occurs unusually.
Step S104, the authentication information that the cloud server mobile terminal receive returns according to the authentication instruction, and the control user continues to use portable terminal when authentication information is correct, otherwise the self-locking program that cloud server activates in the portable terminal locks portable terminal.
Method according to the authentication of the portable terminal of the embodiment of the invention, cloud server uses information can judge whether the user occurs unusually according to the user, and when appearance is unusual, send the authentication instruction so that the user is carried out authentication, can carry out authentication to the user of portable terminal according to user's use habit, prevent effectively that portable terminal from losing or the privacy of user when stolen is revealed, ensure information security, promote the user and experience.
Fig. 2 is the flow chart of the method for the authentication of portable terminal in accordance with another embodiment of the present invention.
As shown in Figure 2, the method for the authentication of portable terminal comprises the steps.
Step S201, cloud server uses information according to the user of predetermined time interval acquiring portable terminal.
Wherein, the interval can be the time interval that cloud server or mobile terminal self arrange predetermined time.
Step S202, cloud server uses information to set up the user according to a plurality of users that obtain and uses information table.
In one embodiment of the invention, the user use information comprise positional information, service time information and user's use habit information in one or more.For example; positional information has reflected the often geographical position of activity of user; such as Xicheng District of Beijing/Tongzhou District etc.; service time, information can reflect user's activity time; such as 7 starts in user morning etc.; user's use habit information can comprise multiple custom, likes opening hands-free etc. when receiving calls such as the user.
Should be appreciated that the user uses the foundation of information table also to continue, according to predetermined time the interval use information to upgrade to the user.
Step S203, whether the cloud server monitor user ' uses the user in the information table to use information to occur unusually.
Wherein, if the user uses the user in the information table to use information to occur unusually, then the user of portable terminal is unusual.
Step S204, if the user of portable terminal is unusual, then cloud server sends the authentication instruction to portable terminal.
Particularly, at first, cloud server can use information to carry out the feature that mobile phone users is obtained in statistical analysis according to a plurality of users that obtain, when using portable terminal, the general user has certain rule, for example through the Dongcheng District, Beijing during March activity of being everlasting, then, cloud server judges whether the user profile of newly obtaining occurs unusually.
Step S205, the authentication information that the cloud server mobile terminal receive returns according to the authentication instruction, and the control user continues to use portable terminal when authentication information is correct, otherwise the self-locking program that cloud server activates in the portable terminal locks portable terminal.
According to the method for the authentication of the portable terminal of the embodiment of the invention, cloud server uses information table whether the user to be used information to monitor to occur unusual by setting up the user, has improved efficient.
Use the user in the information table to use information to judge whether the user of portable terminal is unusual, can adopt several different methods, and the below is elaborated according to the user.
In one embodiment of the invention, cloud server uses positional information in the information table to obtain user's scope of activities according to the user; Cloud server judges that the user uses positional information in the information table whether or not within the scope of activities; And if not within scope of activities, then cloud server determines that the user of portable terminal is unusual.For example, cloud server is Xicheng District/Tongzhou District, BeiJing, China city according to the scope of activities that the user uses positional information in the information table to obtain the user, and when positional information the residing position of active user occurred and is Tianjin, then the active user's was unusual.
In one embodiment of the invention, whether cloud server monitor user ' use habit information occurs unusually.For example, cloud server uses the user's use habit information in the information table to show that this user gets used to hand-free function when calling according to the user, number of times is more than ninety percent, and cloud server is monitored this custom user within nearest 10 times and all do not adopted hands-freely, judges that then the user is unusual.
In one embodiment of the invention, cloud server arranges weights for each user uses information; Cloud server uses the weights of information to sue for peace unusual user; Cloud server is judged weights and whether greater than predetermined threshold value; And if greater than predetermined threshold value, then cloud server determines that the user of portable terminal is unusual.
Should be appreciated that above embodiment only is reference, can also adopt additive method to judge whether the user of portable terminal is unusual.
In order to realize above-described embodiment, the invention allows for a kind of system of authentication of portable terminal.
A kind of system of authentication of portable terminal, comprise: cloud server and portable terminal, wherein, cloud server, be used for according to predetermined time the interval acquiring portable terminal the user use information, and use the user of information analysis portable terminal whether unusual according to a plurality of users that obtain, and when the user of portable terminal is unusual, send the authentication instruction to portable terminal, and the authentication information returned according to the authentication instruction of mobile terminal receive, and the control user continues to use portable terminal when authentication information is correct, otherwise the self-locking program that activates in the portable terminal locks portable terminal.
Fig. 3 is the structural representation of the system of the authentication of portable terminal according to an embodiment of the invention.
As shown in Figure 3, the system of the authentication of portable terminal comprises: cloud server 10 and portable terminal.
Particularly, cloud server 10 is used for using information according to predetermined time interval acquiring portable terminal 20 user, wherein, predetermined time, the interval can be the time interval that cloud server 10 or portable terminal 20 arrange voluntarily, and use the user of information analysis portable terminal 20 whether unusual according to a plurality of users that obtain, and when the user of portable terminal 20 is unusual, send the authentication instruction to portable terminal 20, and the authentication information returned according to the authentication instruction of mobile terminal receive 20, and the control user continues to use portable terminal 20 when authentication information is correct, otherwise the self-locking program that activates in the portable terminal 20 locks portable terminal 20.
In one embodiment of the invention, the user use information comprise positional information, service time information and user's use habit information in one or more.For example; positional information has reflected the often geographical position of activity of user; such as Xicheng District of Beijing/Tongzhou District etc.; service time, information can reflect user's activity time; such as 7 starts in user morning etc.; user's use habit information can comprise multiple custom, likes opening hands-free etc. when receiving calls such as the user.
More specifically, at first, cloud server 10 can use information to carry out the feature that portable terminal 20 users are obtained in statistical analysis according to a plurality of users that obtain, when using portable terminal 20, the general user has certain rule, for example through the Dongcheng District, Beijing during March activity of being everlasting, then, cloud server 10 judges whether the user profile of newly obtaining occurs unusually.
System according to the authentication of the portable terminal of the embodiment of the invention, cloud server uses information can judge whether the user occurs unusually according to the user, and when appearance is unusual, send the authentication instruction so that the user is carried out authentication, can carry out authentication to the user of portable terminal according to user's use habit, prevent effectively that portable terminal from losing or the privacy of user when stolen is revealed, ensure information security, promote the user and experience.
In one embodiment of the invention, cloud server 10 also is used for: use information to set up the user according to a plurality of users that obtain and use information table, and whether monitor user ' uses the user in the information table to use information to occur unusually.Wherein, if the user uses the user in the information table to use information to occur unusually, then the user of portable terminal 20 is unusual.
Cloud server 10 uses the user in the information table to use information to judge whether the user of portable terminal is unusual, can adopt several different methods, and the below is elaborated according to the user.
In one embodiment of the invention, cloud server 10 also is used for: use the positional information of information table to obtain user's scope of activities according to the user, and judge that the user uses positional information in the information table whether within scope of activities, if and not within scope of activities, determine that then the user of portable terminal 20 is unusual.For example, cloud server 10 is Xicheng District/Tongzhou District, BeiJing, China city according to the scope of activities that the user uses positional information in the information table to obtain the user, and when positional information the residing position of active user occurred and is Tianjin, then the active user's was unusual.
In one embodiment of the invention, cloud server 10 also is used for: whether monitor user ' use habit information occurs unusually.For example, cloud server 10 uses the user's use habit information in the information table to show that this user gets used to hand-free function when calling according to the user, number of times is more than ninety percent, and cloud server 10 this custom of monitoring users within nearest 10 times all do not adopt hands-free, judge that then the user is unusual.
In one embodiment of the invention, cloud server 10 also is used for: for each user uses information weights are set, and use the weights of information to sue for peace the unusual user, and judge weights and whether greater than predetermined threshold value, and greater than predetermined threshold value the time, determine that the described user of portable terminal is unusual.
Should be appreciated that above embodiment only is reference, can also adopt additive method to judge whether the user of portable terminal is unusual.
Should be appreciated that in an embodiment of the present invention portable terminal can be the hardware device that mobile phone, panel computer, personal digital assistant, e-book etc. have various operating systems.
In the description of this specification, the description of reference term " embodiment ", " some embodiment ", " example ", " concrete example " or " some examples " etc. means to be contained at least one embodiment of the present invention or the example in conjunction with specific features, structure, material or the characteristics of this embodiment or example description.In this manual, the schematic statement of described term not necessarily referred to identical embodiment or example.And the specific features of description, structure, material or characteristics can be with suitable mode combinations in any one or more embodiment or example.
Although illustrated and described embodiments of the invention, for the ordinary skill in the art, be appreciated that without departing from the principles and spirit of the present invention and can carry out multiple variation, modification, replacement and modification to these embodiment that scope of the present invention is by claims and be equal to and limit.

Claims (12)

1. the method for the authentication of a portable terminal is characterized in that, may further comprise the steps:
A, cloud server use information according to the user of predetermined time interval acquiring portable terminal;
Whether b, described cloud server use the user of the described portable terminal of information analysis unusual according to a plurality of described user who obtains;
If the user of the described portable terminal of c is unusual, then described cloud server sends the authentication instruction to described portable terminal; And
D, described cloud server receive the authentication information that described portable terminal returns according to described authentication instruction, and control described user and continue to use described portable terminal when described authentication information is correct, otherwise the self-locking program that described cloud server activates in the described portable terminal locks described portable terminal.
2. method according to claim 1 is characterized in that, described user use information comprise positional information, service time information and user's use habit information in one or more.
3. method according to claim 1 and 2 is characterized in that, described step b specifically comprises:
B1, described cloud server use information to set up the user according to a plurality of described user who obtains and use information table; And
Whether b2, described cloud server are monitored described user and are used the described user in the information table to use information to occur unusually.
4. each described method is characterized in that according to claim 1-3, and described step b2 specifically comprises:
Described cloud server uses described positional information in the information table to obtain described user's scope of activities according to described user;
Described cloud server judges that described user uses described positional information in the information table whether within described scope of activities; And
If not within described scope of activities, then described cloud server determines that the described user of described portable terminal is unusual.
5. each described method is characterized in that according to claim 1-3, and described step b2 specifically also comprises:
Whether described cloud server is monitored described user's use habit information and is occurred unusually.
6. each described method is characterized in that according to claim 1-3, also comprises:
Described cloud server uses information that weights are set for each described user;
Described cloud server uses the weights of information to sue for peace unusual described user;
Described cloud server is judged described weights and whether greater than predetermined threshold value; And
If greater than described predetermined threshold value, then described cloud server determines that the described user of described portable terminal is unusual.
7. the system of the authentication of a portable terminal is characterized in that, comprising: cloud server and portable terminal, wherein,
Described cloud server, be used for using information according to the user of the described portable terminal of predetermined time interval acquiring, and use the user of the described portable terminal of information analysis whether unusual according to a plurality of described user who obtains, and when the user of described portable terminal is unusual, send the authentication instruction to described portable terminal, and receive the authentication information that described portable terminal returns according to described authentication instruction, and control described user and continue to use described portable terminal when described authentication information is correct, otherwise the self-locking program that activates in the described portable terminal locks described portable terminal.
8. system according to claim 7 is characterized in that, described user use information comprise positional information, service time information and user's use habit information in one or more.
9. according to claim 7 or 8 described systems, it is characterized in that described cloud server also is used for:
Use information to set up the user according to a plurality of described user who obtains and use information table, and monitor described user and use the described user in the information table to use information whether to occur unusually.
10. each described system is characterized in that according to claim 7-9, and described cloud server also is used for:
Use described positional information in the information table to obtain described user's scope of activities according to described user, and judge that described user uses described positional information in the information table whether within described scope of activities, if and not within described scope of activities, determine that then the described user of described portable terminal is unusual.
11. each described system is characterized in that according to claim 7-9, described cloud server also is used for:
Whether monitor described user's use habit information occurs unusually.
12. each described system is characterized in that according to claim 7-9, described cloud server also is used for:
For each described user uses information that weights are set, and use the weights of information to sue for peace the unusual described user, and judge described weights and whether greater than predetermined threshold value, and greater than described predetermined threshold value the time, determine that the described user of described portable terminal is unusual.
CN201210568577.3A 2012-12-24 2012-12-24 The method and system of the authentication of mobile terminal Active CN103024744B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210568577.3A CN103024744B (en) 2012-12-24 2012-12-24 The method and system of the authentication of mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210568577.3A CN103024744B (en) 2012-12-24 2012-12-24 The method and system of the authentication of mobile terminal

Publications (2)

Publication Number Publication Date
CN103024744A true CN103024744A (en) 2013-04-03
CN103024744B CN103024744B (en) 2015-08-05

Family

ID=47972780

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210568577.3A Active CN103024744B (en) 2012-12-24 2012-12-24 The method and system of the authentication of mobile terminal

Country Status (1)

Country Link
CN (1) CN103024744B (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104270719A (en) * 2014-10-19 2015-01-07 梁志成 Smart phone retrieving method
CN104361303A (en) * 2014-10-22 2015-02-18 小米科技有限责任公司 Terminal exception processing method and device and electronic equipment
CN104468466A (en) * 2013-09-12 2015-03-25 深圳市腾讯计算机系统有限公司 Operation management method and device for network account
CN105005725A (en) * 2015-07-17 2015-10-28 广东欧珀移动通信有限公司 Information security protection method and system for mobile terminal
WO2016041160A1 (en) * 2014-09-17 2016-03-24 华为技术有限公司 Mobile terminal control method and mobile terminal
CN105791570A (en) * 2016-02-29 2016-07-20 宇龙计算机通信科技(深圳)有限公司 Early-warning method and early-warning system of mobile terminal
CN105844126A (en) * 2016-03-16 2016-08-10 成都信息工程大学 Automatic identification method of intelligent electronic device user
CN106295349A (en) * 2015-05-29 2017-01-04 阿里巴巴集团控股有限公司 Risk Identification Method, identification device and the anti-Ore-controlling Role that account is stolen
CN106599709A (en) * 2015-10-15 2017-04-26 中兴通讯股份有限公司 Privacy information leakage prevention method and device as well as terminal
WO2017124246A1 (en) * 2016-01-18 2017-07-27 王志强 Data collection method in relevant art of contact matching and intelligent information distinguishing system
WO2018023806A1 (en) * 2016-08-05 2018-02-08 王志强 Method for feeding back usage information of information blocking technology and permission system
CN108401251A (en) * 2018-02-09 2018-08-14 深圳市易路网科技有限公司 A kind of method MIFI terminal remotes locking and unlocked
CN108769429A (en) * 2018-06-20 2018-11-06 努比亚技术有限公司 Mobile terminal safety mode starting method, mobile terminal and readable storage medium storing program for executing
CN110084007A (en) * 2014-10-13 2019-08-02 阿里巴巴集团控股有限公司 Construction method, device and the terminal of risk control model
CN110210864A (en) * 2019-06-13 2019-09-06 余晨 A kind of payment processing method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101166333A (en) * 2006-10-18 2008-04-23 华为技术有限公司 Management method and system for multicast broadcast service
CN102111755A (en) * 2011-03-21 2011-06-29 中兴通讯股份有限公司 Network unlocking method and system for mobile terminal
EP2352321A1 (en) * 2008-10-31 2011-08-03 ZTE Corporation Method and apparatus for authentication processing of mobile terminal
CN102752269A (en) * 2011-04-21 2012-10-24 中国移动通信集团广东有限公司 Cloud computing-based method and system for identity authentication and cloud server

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101166333A (en) * 2006-10-18 2008-04-23 华为技术有限公司 Management method and system for multicast broadcast service
EP2352321A1 (en) * 2008-10-31 2011-08-03 ZTE Corporation Method and apparatus for authentication processing of mobile terminal
CN102111755A (en) * 2011-03-21 2011-06-29 中兴通讯股份有限公司 Network unlocking method and system for mobile terminal
CN102752269A (en) * 2011-04-21 2012-10-24 中国移动通信集团广东有限公司 Cloud computing-based method and system for identity authentication and cloud server

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104468466B (en) * 2013-09-12 2019-01-29 深圳市腾讯计算机系统有限公司 The operation management method and device of network account
CN104468466A (en) * 2013-09-12 2015-03-25 深圳市腾讯计算机系统有限公司 Operation management method and device for network account
CN106664557A (en) * 2014-09-17 2017-05-10 华为技术有限公司 Mobile terminal control method and mobile terminal
CN106664557B (en) * 2014-09-17 2021-05-18 华为技术有限公司 Control method of mobile terminal and mobile terminal
WO2016041160A1 (en) * 2014-09-17 2016-03-24 华为技术有限公司 Mobile terminal control method and mobile terminal
CN110084007B (en) * 2014-10-13 2023-11-28 创新先进技术有限公司 Method, device and terminal for constructing risk control model
CN110084007A (en) * 2014-10-13 2019-08-02 阿里巴巴集团控股有限公司 Construction method, device and the terminal of risk control model
CN104270719A (en) * 2014-10-19 2015-01-07 梁志成 Smart phone retrieving method
US9773105B2 (en) 2014-10-22 2017-09-26 Xiaomi Inc. Device security using user interaction anomaly detection
CN104361303A (en) * 2014-10-22 2015-02-18 小米科技有限责任公司 Terminal exception processing method and device and electronic equipment
CN106295349A (en) * 2015-05-29 2017-01-04 阿里巴巴集团控股有限公司 Risk Identification Method, identification device and the anti-Ore-controlling Role that account is stolen
US11233812B2 (en) 2015-05-29 2022-01-25 Advanced New Technologies Co., Ltd. Account theft risk identification
CN106295349B (en) * 2015-05-29 2020-06-05 阿里巴巴集团控股有限公司 Account stolen risk identification method, identification device and prevention and control system
CN105005725A (en) * 2015-07-17 2015-10-28 广东欧珀移动通信有限公司 Information security protection method and system for mobile terminal
CN106599709A (en) * 2015-10-15 2017-04-26 中兴通讯股份有限公司 Privacy information leakage prevention method and device as well as terminal
WO2017124246A1 (en) * 2016-01-18 2017-07-27 王志强 Data collection method in relevant art of contact matching and intelligent information distinguishing system
CN105791570A (en) * 2016-02-29 2016-07-20 宇龙计算机通信科技(深圳)有限公司 Early-warning method and early-warning system of mobile terminal
CN105791570B (en) * 2016-02-29 2020-02-21 宇龙计算机通信科技(深圳)有限公司 Early warning method and system for mobile terminal
CN105844126A (en) * 2016-03-16 2016-08-10 成都信息工程大学 Automatic identification method of intelligent electronic device user
WO2018023806A1 (en) * 2016-08-05 2018-02-08 王志强 Method for feeding back usage information of information blocking technology and permission system
CN108401251B (en) * 2018-02-09 2021-10-15 深圳市易路网科技有限公司 Method for remotely locking and unlocking MIFI terminal
CN108401251A (en) * 2018-02-09 2018-08-14 深圳市易路网科技有限公司 A kind of method MIFI terminal remotes locking and unlocked
CN108769429A (en) * 2018-06-20 2018-11-06 努比亚技术有限公司 Mobile terminal safety mode starting method, mobile terminal and readable storage medium storing program for executing
CN110210864A (en) * 2019-06-13 2019-09-06 余晨 A kind of payment processing method and system
CN110210864B (en) * 2019-06-13 2021-12-07 深圳市永联共建信息技术有限公司 Payment processing method and system

Also Published As

Publication number Publication date
CN103024744B (en) 2015-08-05

Similar Documents

Publication Publication Date Title
CN103024744A (en) Method and system for authentication of mobile terminal
US9513797B2 (en) Locking and unlocking of an electronic device using a sloped lock track
EP2919431B1 (en) Secure distribution of electronic content taking into account receiver's location
US9081942B2 (en) Use of user location information for remote actions
US9336356B2 (en) Restricting network and device access based on presence detection
CN103108082B (en) Smartphone multi-user mode permission management method and smartphone multi-user mode permission management system
CN107276977B (en) System and method for using temporary private key between two devices
KR101141330B1 (en) Systems and methods for controlling service access on a wireless communication device
US9740883B2 (en) System and method for enabling control of mobile device functional components
US8494485B1 (en) Management of certificates for mobile devices
CN100593936C (en) Roaming authentication method based on WAPI
KR101883682B1 (en) Information pushing method, server, sharer client and third-party client
US9426120B1 (en) Location and time based mobile app policies
KR101892145B1 (en) Multiple-Segment Authentication Technologies
CA2915570A1 (en) Method and system protecting against identity theft or replication abuse
US20140099923A1 (en) Subscriber device unlock
CN106294027A (en) A kind of data back up method, device, carrier server and mobile terminal
CN106203009A (en) A kind of terminal unit processing method and processing device
Jansen et al. A location-based mechanism for mobile device security
US20150163246A1 (en) System and method for activation of personas based on activation parameters related to a multiple-persona mobile technology platform (mtp)
WO2013124602A1 (en) A mobile device management system for managing the functionality of a mobile device
CN106203016B (en) A kind of terminal processing method and equipment
CN104782154B (en) A kind of method and apparatus for disabling algorithm in a device
CN106341379B (en) Information processing method, device and system
CN102185955A (en) Mobile terminal with security function and security method thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant