CN104184750B - A kind of method and system for protecting end-user listening data - Google Patents

A kind of method and system for protecting end-user listening data Download PDF

Info

Publication number
CN104184750B
CN104184750B CN201410469706.2A CN201410469706A CN104184750B CN 104184750 B CN104184750 B CN 104184750B CN 201410469706 A CN201410469706 A CN 201410469706A CN 104184750 B CN104184750 B CN 104184750B
Authority
CN
China
Prior art keywords
client
user
data
terminal
use habit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410469706.2A
Other languages
Chinese (zh)
Other versions
CN104184750A (en
Inventor
刘明辉
张云勇
张尼
李正
胡坤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201410469706.2A priority Critical patent/CN104184750B/en
Publication of CN104184750A publication Critical patent/CN104184750A/en
Application granted granted Critical
Publication of CN104184750B publication Critical patent/CN104184750B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Computer And Data Communications (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention provides a kind of method and system for protecting end-user listening data, wherein, methods described includes:When network connection be present in server and client:Monitoring server client presence;When monitoring server is to client presence exception, security alarm is carried out to the user data of terminal where client;The client presence is abnormal, including:Client is not online within the time of setting, or client executing deletion is acted.The present invention need not be that terminal increases extra hardware, realize automatic, the advantageously protection to end-user listening data.

Description

A kind of method and system for protecting end-user listening data
Technical field
The present invention relates to the security fields of end-user listening data, are related to a kind of method of protection end-user listening data and are System.
Background technology
With the enhancing of cell-phone function, such as cell-phone camera, mobile phone call a taxi, mobile phone shopping, that user stores on mobile phone Personal data is more and more, once mobile phone is lost, the personal data stored on mobile phone are revealed, it will account to user, even The person brings potential safety hazard.
Based on user to the gradual strong of mobile phone data protection wish, mobile phone data security turns into study hotspot, summarizes Come, generally comprise following several mobile phone data security technologies:
1, it is the extra hardware device of the accuracy of mobile phone, the distance of itself and mobile phone is detected by the hardware device, if apart from super Preset value is crossed, then sends warning information, reduces the probability of cellphone subscriber's lost mobile phone;
2, mobile phone and SIM card are bound, and when mobile phone detects that SIM card changes, prompt user to input PIN code, when testing Demonstrate,prove input PIN code it is correct after, support renewal SIM card work;
3, living things feature recognition (such as fingerprint) module is installed on mobile phone, is changed into work shape when mobile phone power-on or from standby , it is necessary to go out correct information by living things feature recognition during state, normal user interface is just shown;
4, client-side program of the installation with anti-theft feature on mobile phone, and set to can be to the hand during hand-set from stolen Machine sends the security number of message, while identical client-side program is also installed on the mobile phone of security number, when user confirms After hand-set from stolen, instruction is sent to the client-side program of stolen mobile phone by the client-side program on the mobile phone where security number To lock stolen mobile phone.
Problems be present in above-mentioned mobile phone data security technology:
For the 1st kind, it not only needs additionally to configure hardware device, and is lost to reduce mobile phone, and user will also carry Extra hardware device, or even there is also the possibility of loss for the extra hardware device;
For the 2nd kind, PIN code and the conventional data of non-user, for non-frequently-used data, exist by user forget can Energy;
For the 3rd kind, biological characteristic recognition module is installed on mobile phone, adds the volume and cost of mobile phone;It is in addition, right The performance requirement of biological characteristic recognition module is high, once the module breaks down, mobile phone can not use.
For the 4th kind, the mobile phone where security number is wanted and stolen mobile phone communicates, it is necessary to network be present between two mobile phones Connection, when not having network connection between two mobile phones, can not realize the protection to data in mobile phone.
The content of the invention
The invention provides a kind of method and system for protecting end-user listening data, how to solve not change mobile phone hard Under conditions of part, the problem of providing the user a kind of more convenient end-user listening data protection mechanism.
In order to solve the above technical problems, a kind of method for protecting end-user listening data of the present invention, methods described include:
When network connection be present in server and client:
Monitoring server client presence;
When monitoring server is to client presence exception, safety is carried out to the user data of terminal where client Alarm;
The client presence is abnormal, including:Client is not online within the time of setting, or to client executing Deletion acts.
Alternatively, when client presence is not extremely online within the time of setting including client, server prison It is not online within the time of setting to survey client, including:
Server sends request message in each chronomere that setting time includes to client;
If server does not receive the response message from client in any one chronomere, then it is assumed that client It is not online within the time of setting.
Alternatively, methods described also includes:
When network connection is not present in server and client:
Client records user's use habit data in terminal, the user, which is accustomed to data, to be included:At one section The interior application program used and the location within a period of time;
The client judge user's use habit data and client monitors to user data whether be fitted, if not Fitting, client perform protection operation to the user data of terminal where it.
Alternatively,
The application program that the client records use within a period of time, including:
Period of each application program in front stage operation in client records preset number of days;
Client statistics in daily same time period in the record of front stage operation same application, and by the application The program name of program and period are as user's use habit data;
The client records in the location of certain time, including:
Terminal is in the location of each period in client records preset number of days;
Client statistics is in the record of same position in daily same time period, and the position and period are made For user's use habit data.
Alternatively, the client judge user's use habit data and client monitors to user data whether intend Close, including:
What client monitored one day is in same time period and type identical data with user's use habit data It is fitted with corresponding user's use habit data, digital simulation degree;
Client sums the degree of fitting being calculated, and judges whether summed result is less than preset value, and fruit is less than preset value, Then illustrate user's use habit data and client monitors to user data be not fitted.
Alternatively, the client performs protection operation to the user data of terminal where it, including:
User data of terminal is accessed where client prevents it.
In order to solve the above technical problems, present invention also offers a kind of system for protecting end-user listening data, the system Including server, the server includes client state monitoring modular, data protection module, wherein:
The client state monitoring modular, for when server has network connection with client, monitoring client Presence, and when monitoring client presence exception, notify the data protection module;The client is in wire State is abnormal, including:Client is not online within the time of setting, or client executing deletion is acted;
The data protection module, in client presence exception, to the number of users of terminal where client According to progress security alarm.
Alternatively, the client state monitoring modular, for monitoring client not online, bag within the time of setting Include:
In each chronomere that setting time includes request message is sent to client;
If the response message from client is not received in any one chronomere, then it is assumed that client is being set Time in it is not online.
Alternatively, the system also includes the client in terminal, and the client judges mould including lost terminal Block and data protection module, wherein:
The lost terminal judge module, for when network connection is not present in client and server, record user to make With custom data, judge user's use habit data and client monitors to user data whether be fitted, it is logical if be not fitted Know the data protection module;The user, which is accustomed to data, to be included:The application program that is used within a period of time and at one section It is the location of interior;
The data protection module, for performing protection operation to the user data of terminal where client.
Alternatively,
The lost terminal judge module, for being recorded in the application program used in a period of time, including:
Period of each application program in front stage operation in record preset number of days;Statistics in daily same time period The record of front stage operation same application, and using the program name of the application program and period as user's use habit number According to;
The lost terminal judge module, for being recorded in the location of certain time, including:
Terminal is in the location of each period in record preset number of days;Statistics is in daily same time period in same The record of one position, and using the position and period as user's use habit data.
Alternatively,
The lost terminal judge module, the user data arrived for judging user's use habit data and client monitors Whether it is fitted, including:
One day is monitored be in same time period with user's use habit data and type identical data with it is corresponding User's use habit data be fitted, digital simulation degree;
The degree of fitting being calculated is summed, judges whether summed result is less than preset value, if less than preset value, then says Bright user's use habit data and client monitors to user data be not fitted.
Alternatively, the data protection module, for performing protection operation, bag to the user data of terminal where client Include:
The user data of terminal is accessed where preventing client.
Set in above-mentioned technical proposal with the server of client communication, by monitoring server client state so that sentence Terminal where disconnected client whether there is risk of missing;Or whether occurred by the use habit of client oneself monitoring user Change, and then the terminal where judging client whether there is risk of missing.This technical scheme does not need user to participate in, and is not required to To be that terminal increases extra hardware, realize automatic, the advantageously protection to end-user listening data.
Brief description of the drawings
Fig. 1 is the method flow diagram that end-user listening data is protected by server of the present embodiment;
Fig. 2 is the method flow diagram that end-user listening data is protected by client of the present embodiment;
Fig. 3 is the server group of the protection end-user listening data of the present embodiment into module map;
Fig. 4 is the groups of clients of the protection end-user listening data of the present embodiment into module map.
Embodiment
For the object, technical solutions and advantages of the present invention are more clearly understood, below in conjunction with accompanying drawing to the present invention Embodiment be described in detail.It should be noted that in the case where not conflicting, in the embodiment and embodiment in the application Feature can mutually be combined.
When server and client have network connection, the method shown in Fig. 1 can be used to be used by server protection terminal User data, as shown in the figure:
S101 monitoring server client presences;
S102 servers judge client, and whether presence is abnormal, if it is, performing step S103;If it is not, hold Row step S101;
Client presence is abnormal, including:Client is not online within the time of setting, or client executing is deleted Action;
Preferably, monitoring server client is not online within the time of setting, including:
Server sends request message in each chronomere that setting time includes to client;If server is every The response message from client is not received in individual chronomere, then it is assumed that client is not online within the time of setting; Assuming that setting time is 2 days, server sends request message on the 1st day to client, if not receiving the sound from client Message is answered, then active client state is arranged to not online 1 day;Server continues to send request message to client on the 2nd day, If not receiving the response message from client yet, active client state is arranged to not online 2 days, and think this The presence of client is abnormal;
Due to that when middle client-side program is performed deletion action in the prior art, message can be sent to server, therefore take Business device can monitor whether to receive the message from client, if receiving the message, then it is assumed that the presence of the client is different Often;Alternatively, when installing the client, settable whether open " sends terminal user when deleting client to server The function of the message ", if being not turned on this functionality, server end will not be to number of users when deleted for the client According to protection operation is performed, terminal user is facilitated to delete the client according to itself wish;
S103 carries out security alarm to the user data of terminal where client;
Alternatively,
, can be by the security alarm of end-user listening data when server can store the emergency call connection of the terminal user The customer service system of operator is notified in the lump with the emergency call connection of terminal user, facilitates the customer service system subsequent notification of operator Its terminal of user may lose;Or when the customer data base of operator is able to record client and terminal user where client Emergency call connection when, the security alarm of end-user listening data and client identification can be sent to the visitor of operator by server Family system, facilitate the customer service system of operator to confirm terminal user according to the client identification, and then notify its end of the user End may lose;
When network connection is not present in server and client, the method shown in Fig. 2 can be used to protect terminal by client User data, as shown in the figure:
S201 is located at client records user's use habit data in terminal;
The user, which is accustomed to data, to be included:The application program used within a period of time and residing position within a period of time Put;
Preferably, the application program that the client records use within a period of time, including:
Period of each application program in front stage operation in client records preset number of days;
Client statistics in daily same time period in the record of front stage operation same application, and by the application The program name of program and period are as user's use habit data, such as am7:00-am8:00, wechat, pm 9:00-pm 10: 00 Taobao;
Preferably, client records location within a period of time, including:
Terminal is in the location of each period in client records preset number of days;
Client statistics is in the record of same position in daily same time period, and the position and period are made For user's use habit data;
Client can start to record user's use habit data again every preset time (number of days), and habit is used to prevent user Used to change, there is relatively large deviation in the user's use habit data and actual user's use habit for causing generation;
S202 client monitors user data, and judge the user data that user's use habit data arrive with client monitors Whether it is fitted, if be not fitted, performs step S203;If fitting, continues executing with step S202;
What client monitored one day is in same time period and type identical data with user's use habit data It is fitted with corresponding user's use habit data, digital simulation degree;Client sums the degree of fitting being calculated, and judges Whether summed result is less than preset value:Include as user is accustomed to data:am7:00-am8:00, wechat, pm 9:00-pm 10:00 Taobao, pm7:00-am7:00 XX homes, Haidian District;So client is respectively by am 7:00-am8:The 00 application journey collected Sequence, pm 9:00-pm 10:00 application program collected and pm7:00-am7:00 positional information collected with it is corresponding User is accustomed to data and is fitted, and be calculated three degrees of fitting are summed, judge whether summed result is less than preset value;
Alternatively, the method for the degree of fitting summation includes:
If the sum of user's use habit data is N;The weight of each user's use habit data is ai, can be set;For Each user's use habit data set identical basis point S (such as 10 points), according to each user's use habit data with it is identical The difference of the data for the same type that period monitors determines deduction of points percentage xi, xiSettable, diversity factor is bigger, the x of settingi It is bigger;Then the degree of fitting summed result is:If client in one day user data monitored is am 7:00-am8:00, e-book;pm 9:00-pm 12:00 Taobao;pm7:00-am7:00 XX homes, Haidian District, it is determined that xiWhen, Compare user's use habit data am 7:00-am8:00 wechat and Monitoring Data am 7:00-am8:00QQ chat tools, both Difference is different using application program, determines that deduction of points percentage be 20% (if both application programs are micro- according to the difference Letter and e-book, then determine that deduction of points percentage is more than 20% according to the difference, because wechat belongs to IMU together with QQ chat tools Letter instrument, both diversity factoies are less than the diversity factor of wechat and e-book);Compare user's use habit data pm 9:00-pm 10:00 Taobao and Monitoring Data pm 9:00-pm 12:00 Taobao, both differences are that the usage time of application program is different, surpassed Go out duration less than 4 hours, determine that deduction of points percentage is 30% according to the difference;Compare user's use habit data pm7:00- am7:00 XX homes, Haidian District and Monitoring Data pm7:00-am7:00 XX homes, Haidian District, both are identical, it is determined that deduction of points percentage For 0;
S203 clients perform protection operation to the user data of terminal where it.
User data of terminal is accessed where client can prevent it;The instruction setting that client can receive user is interviewed The user data of limitation is asked, such as address book data, wechat data, picture data.
Voluntarily forbid user data to be accessed by client, the situation of network connection can be lost in client and server Under, continue to protect end-user listening data.
Client can also obtain end message in addition to it can perform protection operation to the user data of terminal where client. When client and server have network connection, the end message is reported into server, the end message includes:Terminal position Confidence ceases.According to the positional information of terminal can fast positioning lose terminal position, for give for change lose terminal provides facilitate.
After client performs to user data forbids accessed operation, if it is desired to releasing this quiescing, terminal is used Family can lift a ban application to associated mechanisms proposition, and (such as cellphone subscriber lifts a ban application to operator's customer service proposition, and tablet personal computer user can Customer service to the affiliated manufacturer of client proposes to lift a ban application), while proof of identification is provided, indicated after associated mechanisms examine identity Server sends releasing to client and forbids the accessed instruction of user data.
The present embodiment additionally provides a kind of system for protecting end-user listening data, and the system includes server, the clothes Device of being engaged in includes client state monitoring modular, data protection module, the comprising modules figure of server as shown in figure 3, wherein,
The client state monitoring modular, for when server has network connection with client, monitoring client Presence, and when monitoring client presence exception, notify the data protection module;The client is in wire State is abnormal, including:Client is not online within the time of setting, or client executing deletion is acted;
Alternatively, client state monitoring modular, for monitor client within the time of setting it is not online, including: In each chronomere that setting time includes request message is sent to client;If do not connect in any one chronomere Receive the response message from client, then it is assumed that client is not online within the time of setting:Assuming that setting time is 2 days, Server sends request message on the 1st day to client, if not receiving the response message from client, by existing customer End state is arranged to not online 1 day;Server continues to send request message to client on the 2nd day, is come from if do not received yet The response message of client, then active client state is arranged to not online 2 days, and thinks that the presence of the client is different Often;
Alternatively, client state monitoring modular, for monitoring to act client executing deletion, including:Judgement is It is no to be received from client because of the deletion notification message that client is performed deletion action and is sent to server, if received The message, then it is assumed that the deletion action to client executing;Whether terminal user is settable to open when installing the client The function of " sending the message to server when deleting client " is opened, if being not turned on this functionality, the client exists Server end will not perform protection operation to user data when being deleted, and facilitate terminal user to delete the visitor according to itself wish Family end;
The data protection module, in client presence exception, to the number of users of terminal where client According to progress security alarm;
Alternatively,
When server can store the emergency call connection of the terminal user, the data protection module can use terminal The security alarm of user data and the emergency call connection of terminal user notify the customer service system of operator in the lump, facilitate operator Its terminal of customer service system subsequent notification user may lose;Or when the customer data base of operator is able to record client and visitor Where the end of family during the emergency call connection of terminal user, data protection module can be by the security alarm of end-user listening data and client End mark is sent to the client of operator, facilitates the customer service system of operator to confirm that terminal is used according to the client identification Family, and then notify the user that its terminal may lose;
The system of above-mentioned protection end-user listening data may also include the client in terminal, and the client is included eventually Judge module and data protection module are lost in end, and the comprising modules figure of the client is as shown in figure 4, wherein:
The lost terminal judge module, for when network connection is not present in client and server, record user to make With custom data, judge user's use habit data and client monitors to user data whether be fitted, it is logical if be not fitted Know the data protection module;The user, which is accustomed to data, to be included:The application program that is used within a period of time and at one section It is the location of interior;
The lost terminal judge module, for being recorded in the application program used in a period of time, including:
Period of each application program in front stage operation in record preset number of days;Statistics in daily same time period The record of front stage operation same application, and using the program name of the application program and period as user's use habit number According to;Such as am 7:00-am8:00, wechat, pm 9:00-pm 10:00 Taobao;
The lost terminal judge module, for being recorded in the location of certain time, including:
Terminal is in the location of each period in record preset number of days;Statistics is in daily same time period in same The record of one position, and using the position and period as user's use habit data;
The lost terminal judge module can start to record user's use habit data again every preset time (number of days), Changed to prevent user's use habit, cause user's use habit data of generation and the appearance of actual user's use habit larger Deviation;
The lost terminal judge module, the user data arrived for judging user's use habit data and client monitors Whether it is fitted, including:
One day is monitored be in same time period with user's use habit data and type identical data with it is corresponding User's use habit data be fitted, digital simulation degree;The degree of fitting being calculated is summed, whether judges summed result Less than preset value, if less than preset value, then illustrate user's use habit data and client monitors to user data be not intended to Close;
Alternatively, digital simulation degree summation includes:
If the sum of user's use habit data is N;The weight of each user's use habit data is ai, can be set;For Each user's use habit data set identical basis point S (such as 10 points), according to each user's use habit data with it is identical The difference of the data for the same type that period monitors determines deduction of points percentage xi, xiSettable, diversity factor is bigger, the x of settingi It is bigger;Then the degree of fitting summed result is:If client in one day user data monitored is am 7:00-am8:00, e-book;pm 9:00-pm 12:00 Taobao;pm7:00-am7:00 XX homes, Haidian District, it is determined that xiWhen, Compare user's use habit data am 7:00-am8:00 wechat and Monitoring Data am 7:00-am8:00QQ chat tools, both Difference is different using application program, determines that deduction of points percentage be 20% (if both application programs are micro- according to the difference Letter and e-book, then determine that deduction of points percentage is more than 20% according to the difference, because wechat belongs to IMU together with QQ chat tools Letter instrument, both diversity factoies are less than the diversity factor of wechat and e-book);Compare user's use habit data pm 9:00-pm 10:00 Taobao and Monitoring Data pm 9:00-pm 12:00 Taobao, both differences are that the usage time of application program is different, surpassed Go out duration less than 4 hours, determine that deduction of points percentage is 30% according to the difference;Compare user's use habit data pm7:00- am7:00 XX homes, Haidian District and Monitoring Data pm7:00-am7:00 XX homes, Haidian District, both are identical, it is determined that deduction of points percentage For 0;
The data protection module, for performing protection operation to the user data of terminal where client, including, prevent The user data of terminal where client is accessed, the user data limited by accesss including address book data, wechat data and/ Or picture data.
Above-mentioned lost terminal judge module, it is additionally operable to obtain end message, such as positional information, and the end message is notified Data protection module;
The data protection module, it is additionally operable to when client has network connection with server, by the end message Server is reported, server can notify the end message client of operator, can be quick according to the positional information of terminal The position of terminal is lost in positioning, is provided conveniently to give loss terminal for change.
The system of the above-mentioned protection end-user listening data for being configured with the client voluntarily forbids user data by client It is accessed, it can continue to protect end-user listening data in the case where client and server lose network connection.
One of ordinary skill in the art will appreciate that all or part of step in the above method can be instructed by program Related hardware is completed, and described program can be stored in computer-readable recording medium, such as read-only storage, disk or CD Deng.Alternatively, all or part of step of above-described embodiment can also be realized using one or more integrated circuits, accordingly Ground, each module/unit in above-described embodiment can be realized in the form of hardware, can also use the shape of software function module Formula is realized.The present invention is not restricted to the combination of the hardware and software of any particular form.
It should be noted that the present invention can also have other various embodiments, without departing substantially from of the invention spiritual and its essence In the case of, those skilled in the art can make various corresponding changes and deformation according to the present invention, but these are corresponding Change and deform the protection domain that should all belong to appended claims of the invention.

Claims (10)

  1. A kind of 1. method for protecting end-user listening data, it is characterised in that methods described includes:
    Terminal user opens the function of sending message when deleting the client to server when installing client;
    In the emergency call connection of terminal user described in the server storage or terminal user where recording the client Emergency call connection;
    When network connection be present in server and client:Monitoring server client presence;
    When monitoring server to the client executing deletion to when acting, by the security alarm of end-user listening data and described tight Anxious telephone number notice operator customer service system, or the mark of the security alarm of end-user listening data and the client is led to Know operator's customer service system.
  2. 2. the method as described in claim 1, it is characterised in that methods described also includes:
    When network connection is not present in server and client:
    Client records user's use habit data in terminal, user's use habit data include:At one section The interior application program used and the location within a period of time;
    The client judge user's use habit data and client monitors to user data whether be fitted, if be not intended to Close, client performs protection operation to the user data of terminal where it.
  3. 3. method as claimed in claim 2, it is characterised in that
    The application program that the client records use within a period of time, including:
    Period of each application program in front stage operation in client records preset number of days;
    Client statistics in daily same time period in the record of front stage operation same application, and by the application program Program name and the period as user's use habit data;
    The client records in the location of certain time, including:
    Terminal is in the location of each period in client records preset number of days;
    Client statistics is in the record of same position in daily same time period, and using the position and period as use Family use habit data.
  4. 4. method as claimed in claim 3, it is characterised in that the client judges user's use habit data and client Whether the user data monitored is fitted, including:
    What client monitored one day be in same time period with user's use habit data and type identical data with it is right The user's use habit data answered are fitted, digital simulation degree;
    Client sums the degree of fitting being calculated, and judges whether summed result is less than preset value, fruit is less than preset value, then said Bright user's use habit data and client monitors to user data be not fitted.
  5. 5. method as claimed in claim 2, it is characterised in that the client performs guarantor to the user data of terminal where it Shield operation, including:
    User data of terminal is accessed where client prevents it.
  6. 6. a kind of system for protecting end-user listening data, it is characterised in that the system includes server, and the server includes Client state monitoring modular, data protection module, the emergency call connection or note of the server storage client user The emergency call connection of terminal user where recording the client, wherein:
    The client state monitoring modular, for when server has network connection with client, monitoring client to be online State, and when monitoring to act client executing deletion, notify the data protection module;
    The data protection module, during notice for receiving the client state monitoring modular, by end-user listening data Security alarm and emergency call connection notice operator customer service system, or by the security alarm of end-user listening data and The identification notification operator customer service system of the client;
    Wherein, the client when mounted, opens the function of sending message when deleting the client to server.
  7. 7. system as claimed in claim 6, it is characterised in that the system also includes the client in terminal, described Client includes lost terminal judge module and data protection module, wherein:
    The lost terminal judge module, for when network connection is not present in client and server, record user to use habit Used data, judge user's use habit data and client monitors to user data whether be fitted, if be not fitted, notice institute State data protection module;User's use habit data include:The application program that is used within a period of time and at one section It is the location of interior;
    The data protection module, for performing protection operation to the user data of terminal where client.
  8. 8. system as claimed in claim 7, it is characterised in that
    The lost terminal judge module, for being recorded in the application program used in a period of time, including:
    Period of each application program in front stage operation in record preset number of days;Statistics is in daily same time period on foreground The record of same application is run, and using the program name of the application program and period as user's use habit data;
    The lost terminal judge module, for being recorded in the location of certain time, including:
    Terminal is in the location of each period in record preset number of days;Statistics is in same position in daily same time period The record put, and using the position and period as user's use habit data.
  9. 9. system as claimed in claim 8, it is characterised in that
    The lost terminal judge module, for judging whether is user data that user's use habit data and client monitors arrive Fitting, including:
    One day is monitored be in same time period with user's use habit data and type identical data and corresponding use Family use habit data are fitted, digital simulation degree;
    The degree of fitting being calculated is summed, judges whether summed result is less than preset value, if less than preset value, then illustrates to use Family use habit data and client monitors to user data be not fitted.
  10. 10. system as claimed in claim 7, it is characterised in that the data protection module, for terminal where client User data perform protection operation, including:
    The user data of terminal is accessed where preventing client.
CN201410469706.2A 2014-09-15 2014-09-15 A kind of method and system for protecting end-user listening data Active CN104184750B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410469706.2A CN104184750B (en) 2014-09-15 2014-09-15 A kind of method and system for protecting end-user listening data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410469706.2A CN104184750B (en) 2014-09-15 2014-09-15 A kind of method and system for protecting end-user listening data

Publications (2)

Publication Number Publication Date
CN104184750A CN104184750A (en) 2014-12-03
CN104184750B true CN104184750B (en) 2018-03-16

Family

ID=51965492

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410469706.2A Active CN104184750B (en) 2014-09-15 2014-09-15 A kind of method and system for protecting end-user listening data

Country Status (1)

Country Link
CN (1) CN104184750B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111160019B (en) * 2019-12-30 2023-08-15 中国联合网络通信集团有限公司 Public opinion monitoring method, device and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101132557A (en) * 2007-09-28 2008-02-27 赵颜 Method providing equipment and data safety service for mobile phone users
CN101631048A (en) * 2008-07-14 2010-01-20 中国移动通信集团河南有限公司 Method, device and system for monitoring managed object
CN202617350U (en) * 2011-12-14 2012-12-19 成都智汇科技有限公司 Mobile phone safety management and control system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101577907B (en) * 2009-06-02 2011-12-07 中兴通讯股份有限公司 Method and device for managing mobile terminal
CN102413456B (en) * 2011-09-02 2014-11-19 中国电信股份有限公司 User terminal anti-theft method, user terminal anti-theft device and user terminal anti-theft system based on operation network
CN103648024A (en) * 2013-12-27 2014-03-19 深圳Tcl新技术有限公司 Method for monitoring running of application program of intelligent terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101132557A (en) * 2007-09-28 2008-02-27 赵颜 Method providing equipment and data safety service for mobile phone users
CN101631048A (en) * 2008-07-14 2010-01-20 中国移动通信集团河南有限公司 Method, device and system for monitoring managed object
CN202617350U (en) * 2011-12-14 2012-12-19 成都智汇科技有限公司 Mobile phone safety management and control system

Also Published As

Publication number Publication date
CN104184750A (en) 2014-12-03

Similar Documents

Publication Publication Date Title
US10666813B2 (en) Restoring functionality of a mobile device
EP3270619B1 (en) Network connection control method and system for mobile terminal
US8295812B1 (en) Reducing mobile-phone fraud
US20140194095A1 (en) System and method for message identification and notification
US9264888B2 (en) Control of a mobile device
KR102313395B1 (en) Method for processing communication based on user account and electronic device for the same
CN104486727A (en) Mobile phone anti-theft method and system based on Android system
CN105320880A (en) Terminal control method and apparatus
CN102780989A (en) Method and system for preventing loss of mobile terminal
EP2040497B1 (en) Tracking mobile communication devices
CN107911565A (en) Calling-control method, terminal, equipment and computer-readable recording medium
CN108848278B (en) Method, device and equipment for monitoring one-number multi-terminal service safety
CN104796885B (en) A kind of method and system that secret call is realized in communication process
CN100571436C (en) A kind of implementation method of mobile terminal information resource safety guarantee
CN104184750B (en) A kind of method and system for protecting end-user listening data
KR20050048162A (en) Mobile communication terminal having privacy protection ability and call information management method using the same
CA2771716A1 (en) Invocation of system services through auxiliary interface
EP2579630B1 (en) Managing identity information after a SIM swap
CN104065829B (en) The screen locking method of mobile terminal and mobile terminal
WO2018197652A1 (en) Method and apparatus for monitoring user activity associated with a user device
CN107153790A (en) Mobile terminal safety means of defence, device and mobile terminal
EP2321951B1 (en) System for advertising integration with auxiliary interface
CN104660834A (en) Junk call protection method and device
CN108229109A (en) A kind of android system securing software anti-uninstall method, equipment and storage device
KR102415993B1 (en) Terminal and Method for Notify of Emergency State

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant