CN104281811A - Terminal self-destruction method, system and device - Google Patents

Terminal self-destruction method, system and device Download PDF

Info

Publication number
CN104281811A
CN104281811A CN201310288216.8A CN201310288216A CN104281811A CN 104281811 A CN104281811 A CN 104281811A CN 201310288216 A CN201310288216 A CN 201310288216A CN 104281811 A CN104281811 A CN 104281811A
Authority
CN
China
Prior art keywords
terminal
self
destruction
message
feedback message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310288216.8A
Other languages
Chinese (zh)
Inventor
吴成岩
王玉来
李晓红
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Group Beijing Co Ltd
Original Assignee
China Mobile Group Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Group Beijing Co Ltd filed Critical China Mobile Group Beijing Co Ltd
Priority to CN201310288216.8A priority Critical patent/CN104281811A/en
Publication of CN104281811A publication Critical patent/CN104281811A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Abstract

The invention discloses a terminal self-destruction method, system and device. The method mainly comprises the steps that a first terminal detects whether the first terminal has the wireless communication capacity or not; when the first terminal has the wireless communication capacity, the first terminal sends an alarm message to a second terminal bound to the first terminal through the wireless communication capacity, receives a feedback message sent by the second terminal, and determines whether self-destruction operation is carried out on personal information stored locally or not according to the received feedback message; when the first terminal does not have the wireless communication capacity, the first terminal carries out the self-destruction operation on the personal information stored locally. According to the scheme, the reliability of terminal self-destruction can be effectively improved, the personal information in the first terminal can be prevented from being stolen illegally, and self-destruction misoperation carried out on the first terminal can also be avoided.

Description

A kind of self-destruction method of terminal, system and device
Technical field
The present invention relates to communication technical field, particularly relate to a kind of self-destruction method of terminal, system and device.
Background technology
Along with the continuous progress of the communication technology, the terminal involved by wireless communication technology is deep into the live and work field of people gradually, for user provides communication anywhere or anytime and information service.Wherein, mobile phone is as a conventional terminal, it is a part indispensable in personal lifestyle, the personal information of mobile phone EMS memory storage, as address list, message registration, short message record, multimedia message record etc. all belong to the private information of user, once lose, will there is the risk of privacy leakage in these private informations, even likely cause swindle case to occur.
In order to reduce the privacy leakage risk that lost terminal causes, industry proposes the self-destruction method for terminal.At present, the self-destruction method of terminal is cryptoguard mode, that is: prestore password in advance in the terminal, terminal user input password is required when starting up of terminal, with whether the password prestored in terminal is consistent, password according to terminal user input judges whether to terminal user be that disabled user carries out certification, if the password inputted by terminal user that terminal receives is consistent with the password that this locality prestores, then determine that present terminal user is validated user, terminal is in a safe condition, and terminal can normally use; If the password inputted by terminal user that terminal receives is inconsistent with the local password prestored, then determine that present terminal user is disabled user, terminal is in unsafe condition, and the self-destruction program of terminal built-in will start, and deletes the personal information of tag memory storage.
But current terminal self-destruction method exists certain drawback: first, if password is revealed when terminal is stolen, disabled user normally can use terminal by the password usurped, losing efficacy of the self-destruction mode of cryptoguard; Secondly, current terminal self-destruction method easily causes maloperation, as owner have forgotten password, then may cause unnecessary terminal self-destruction operation.
In sum, because current terminal self-destruction method still exists problems in reliability, therefore, the terminal self-destruction mode urgently finding a kind of reliability higher.
Summary of the invention
Embodiments provide a kind of self-destruction method of terminal, system and device, in order to solve exist in prior art the not high problem of the reliability of self-destruction is carried out to terminal.
The embodiment of the present invention is by the following technical solutions:
A self-destruction method for terminal, comprising:
First terminal detects self whether have wireless communication ability;
When first terminal has wireless communication ability, described first terminal utilizes described wireless communication ability to send alarm information to second terminal of binding with described first terminal, and receive the feedback message of described second terminal transmission, determine according to the described feedback message received the operation self whether performing the personal information that self-destruction this locality stores;
When first terminal does not have wireless communication ability, described first terminal performs the operation of the personal information that self-destruction this locality stores.
As seen from the above embodiment, for the first terminal without wireless communication ability, be probably in unsafe condition, should self-destruction operation be carried out; For the first terminal with wireless communication ability, judge whether to need to perform self-destruction operation according to the instruction of the feedback message of the second terminal transmission trusty, effectively can improve the reliability of terminal self-destruction, avoid the personal information in first terminal illegally to be usurped, also can avoid the maloperation to first terminal self-destruction simultaneously.
More preferably, first terminal detects self whether have wireless communication ability, specifically comprises:
First terminal, when determining self to have SIM card and can be communicated by described SIM card and/or have WLAN function and can access wlan network by described WLAN function, determines that self has wireless communication ability.
The program can adopt in above-mentioned two kinds of detection modes any one, improve the realizability of embodiments of the invention.
On the one hand, when first terminal is had SIM card and can be communicated by described SIM card, described first terminal sends SMS message to described second terminal the alarm information of form, and receive the feedback message of the short message form that described second terminal sends, and when determining that described feedback message is safety verification message, entering normal operating condition, when determining that described feedback message is self-destruction acknowledge message, performing the operation of the personal information that self-destruction this locality stores.As can be seen here, after the verification process adding short message form, first terminal, by available SIM card, carries out information interaction with terminal trusty, thus improves the reliability of the self-destruction operation of described first terminal, avoids the maloperation of self-destruction.
On the other hand, when described first terminal has WLAN function and can access wlan network by described WLAN function, described first terminal sends the alarm information of instruction type to described second terminal by alarm platform, and receive the feedback message that described second terminal sent by described alarm platform, and when determining that described feedback message is safety verification message, enter normal operating condition, when determining that described feedback message is self-destruction acknowledge message, perform the operation of the personal information that self-destruction this locality stores.As can be seen here, after adding the verification process of instruction type, first terminal carries out information interaction by alarm platform and terminal trusty, thus improves the reliability of the self-destruction operation of described first terminal, avoids the maloperation of self-destruction.
More preferably, before whether first terminal detection self has wireless communication ability, also comprise:
Described first terminal starts local camera collection picture, and the picture of collection and the picture set prestored is compared, and determines that comparison result does not mate.
This programme adds the process of picture comparison, utilizes the picture gathered and the comparison result of the picture set prestored, determines that whether first terminal is in a safe condition.By the enforcement of the program, further increase the reliability of terminal self-destruction operation, avoid the maloperation of self-destruction.
More preferably, in described alarm information, carry the picture of described camera collection, make described second terminal carry out authentication according to described picture to described first terminal.
In the program, after this alarm information is sent to terminal trusty, terminal trusty is not only verified this alarm information, also can verify the picture of the described camera collection that this alarm information carries, visible, double verification herein improves the reliability of terminal self-destruction operation, avoids the maloperation of self-destruction.
A destruct system for terminal, comprising:
First terminal, whether wireless communication ability is had for detecting self, when having wireless communication ability, described wireless communication ability is utilized to send alarm information to second terminal of binding with described first terminal, and receive the feedback message of described second terminal transmission, determining according to the described feedback message received the operation self whether performing the personal information that self-destruction this locality stores, when not having wireless communication ability, performing the operation of the personal information that self-destruction this locality stores;
Second terminal, for receiving the alarm information that described first terminal sends, and sends feedback message to described first terminal.
As seen from the above embodiment, for above-mentioned destruct system, first terminal is not when detection self has wireless communication ability, and first terminal is probably in unsafe condition, should perform self-destruction operation; When detection self has wireless communication ability, judge whether to need to perform above-mentioned self-destruction operation according to the instruction of the feedback message of the second terminal transmission trusty.Thus improve the reliability of the self-destruction operation of first terminal, avoid the maloperation of self-destruction.
More preferably, first terminal, specifically for when determining self to have SIM card and can be communicated by described SIM card and/or have WLAN function and can access wlan network by described WLAN function, determines that self has wireless communication ability.
The program can adopt any one in above-mentioned two kinds of detection modes to determine whether first terminal self has wireless communication ability, improves the realizability of embodiments of the invention.
On the one hand, first terminal, specifically for when having SIM card and can be communicated by described SIM card, the alarm information of the form that sends SMS message to described second terminal, and receive the feedback message of the short message form that described second terminal sends, and when determining that described feedback message is safety verification message, enter normal operating condition, when determining that described feedback message is self-destruction acknowledge message, perform the operation of the personal information that self-destruction this locality stores.As can be seen here, after the verification process adding short message form, first terminal, by available SIM card, carries out information interaction with terminal trusty, thus improves the reliability of the self-destruction operation of described first terminal, avoids the maloperation of self-destruction.
On the other hand, first terminal, specifically for when having WLAN function and wlan network can be accessed by described WLAN function, alarm information is sent to described second terminal by alarm platform, and receive the feedback message that described second terminal sent by described alarm platform, and when determining that described feedback message is safety verification message, enter normal operating condition, when determining that described feedback message is self-destruction acknowledge message, perform the operation of the personal information that self-destruction this locality stores.As can be seen here, after adding the verification process of instruction type, first terminal carries out information interaction by alarm platform and terminal trusty, thus improves the reliability of the self-destruction operation of described first terminal, avoids the maloperation of self-destruction.
Preferably, first terminal, also for starting local camera collection picture, and comparing the picture of collection and the picture set prestored, determining that comparison result does not mate.
This programme adds the process of picture comparison, utilizes the picture gathered and the comparison result of the picture set prestored, determines that whether first terminal is in a safe condition.By the enforcement of the program, further increase the reliability of terminal self-destruction operation, avoid the maloperation of self-destruction.
More preferably, in described alarm information, carry the picture of described camera collection, make described second terminal carry out authentication according to described picture to described first terminal.
In the program, after this alarm information is sent to terminal trusty, terminal trusty is not only verified this alarm information, also can verify the picture of the described camera collection that this alarm information carries, visible, double verification herein improves the reliability of terminal self-destruction operation, avoids the maloperation of self-destruction.
A kind of terminal, comprises ability detecting unit, control module and self-destruction unit, wherein:
Whether ability detecting unit, have wireless communication ability for detecting self, when having wireless communication ability, and trigger control unit, otherwise, trigger self-destruction unit;
Control module, for utilizing described wireless communication ability to send alarm information to the other-end of binding, and receiving the feedback message of described other-end transmission, determining whether to trigger self-destruction unit according to the described feedback message received;
Self-destruction unit, for performing the operation of the personal information that self-destruction this locality stores.
As seen from the above embodiment, for above-mentioned terminal, when ability detecting unit detects that terminal does not have wireless communication ability, terminal is probably in unsafe condition, should trigger self-destruction unit.When ability detecting unit detects that terminal has wireless communication ability, regulate and control the information interaction between terminal and other-end trusty by described control module, and the instruction of the feedback message sent according to other-end trusty judges whether to need to trigger self-destruction unit.Thus determine self scheme the need of self-destruction by these three unit feedback message jointly realized by sending with the other-end self bound, improve the reliability of the self-destruction operation of terminal, avoid the maloperation of self-destruction.
More preferably, ability detecting unit, specifically for when determining self to have SIM card and can be communicated by described SIM card and/or have WLAN function and can access wlan network by described WLAN function, determines that self has wireless communication ability, trigger control unit.
Ability detecting unit in the program can adopt any one in above-mentioned two kinds of detection modes to determine whether terminal self has wireless communication ability, improves the realizability of embodiments of the invention.
On the one hand, described control module, during specifically for being tested with SIM card at ability detecting unit and can being communicated by described SIM card, the alarm information of the form that sends SMS message to described other-end, and receive the feedback message of the short message form that described other-end sends, and when determining that described feedback message is safety verification message, enter normal operating condition, when determining that described feedback message is self-destruction acknowledge message, trigger self-destruction unit.As can be seen here, after the verification process adding short message form, control module is by available SIM card, information interaction is carried out with other-end trusty, and determine whether to trigger self-destruction unit according to the feedback message that other-end sends, thus improve the reliability of the self-destruction operation of terminal, avoid the maloperation of self-destruction.
On the other hand, described control module, during specifically for being tested with WLAN function at ability detecting unit and wlan network can being accessed by described WLAN function, alarm information is sent to described other-end by alarm platform, and receive the feedback message that described other-end sent by described alarm platform, and when determining that described feedback message is safety verification message, enter normal operating condition, when determining that described feedback message is self-destruction acknowledge message, trigger self-destruction unit.As can be seen here, after adding the verification process of instruction type, control module carries out information interaction by alarm platform and other-end trusty, and determine whether to trigger self-destruction unit according to the content of feedback message, thus improve the reliability of the self-destruction operation of described first terminal, avoid the maloperation of self-destruction.
More preferably, this terminal can also comprise picture comparing unit, for starting local camera collection picture, and the picture of collection and the picture set prestored is compared, when comparison result does not mate, and burst capability detecting unit.
Whether this programme adds picture comparing unit, utilizes picture comparing unit to compare to the picture of the current collection of camera and the picture set prestored, and in a safe condition according to comparison result determination terminal.By the enforcement of the program, further increase the reliability of terminal self-destruction operation, avoid the maloperation of self-destruction.
Described control module, specifically for utilizing described wireless communication ability to send to the other-end of binding the alarm information carrying the picture of described camera collection, makes the other-end of described binding carry out authentication according to described picture to described terminal.
In this programme, after this alarm information is sent to other-end trusty, other-end trusty is not only verified this alarm information, also can verify the picture of the described camera collection that this alarm information carries, visible, double verification herein improves the reliability of terminal self-destruction operation, avoids the maloperation of self-destruction.
Accompanying drawing explanation
The process flow diagram of the self-destruction method of the terminal that Fig. 1 provides for the embodiment of the present invention one;
The self-destruction method process flow diagram of the terminal that Fig. 2 provides for the embodiment of the present invention two;
The self-destruction method process flow diagram of the terminal that Fig. 3 provides for the embodiment of the present invention three;
The structural representation of the terminal that Fig. 4 provides for the embodiment of the present invention four;
The structural representation of the terminal that Fig. 5 provides for the embodiment of the present invention five;
The process flow diagram of the terminal operating shooting protection module that Fig. 6 provides for the embodiment of the present invention five;
The process flow diagram of the terminal operating opposite end protection module that Fig. 7 provides for the embodiment of the present invention five;
Fig. 8 carries out the process flow diagram of self-destruction operation for terminal that the embodiment of the present invention five provides;
The structural representation of the destruct system of the terminal that Fig. 9 provides for the embodiment of the present invention six.
Embodiment
In order to improve the reliability of terminal self-destruction, the embodiment of the present invention proposes a kind of new terminal self-destruction method, in the scheme of the embodiment of the present invention, first terminal and the second terminal trusty set up binding relationship in advance, when first terminal self-inspection is the need of execution self-destruction operation, first detect the ability self whether having and carry out with the second terminal communicating, if do not have, represent that first terminal is current and be in unsafe condition, should self-destruction operation be carried out; If have, then first terminal sends alarm information to described second terminal, and judge whether to need to perform self-destruction operation according to the feedback message that the second terminal sends, because the second terminal is first terminal terminal trusty, therefore, the instruction of the feedback message that first terminal sends according to the second terminal judges whether to need to perform the reliability that self-destruction operation effectively can improve self-destruction, avoid the personal information in first terminal illegally to be usurped, also can avoid the maloperation to first terminal self-destruction simultaneously.
It should be noted that, the first terminal related in various embodiments of the present invention and the second terminal can be the mobile terminals such as mobile phone, PDA, and the embodiment of the present invention does not limit the form of first terminal and the second terminal.
The self-destruction operation related in various embodiments of the present invention refers to: the operation of the personal information that terminal self-destruction this locality stores, particularly, can be that terminal starts self-destruction program by built-in self-destruction module, in order to delete the local personal information such as address list, message registration, short message record stored, and reset terminal.
Below in conjunction with Figure of description, embodiments of the invention are described, should be appreciated that embodiment described herein is only for instruction and explanation of the present invention, is not limited to the present invention.And when not conflicting, the embodiment in this explanation and the feature in embodiment can be combined with each other.
Embodiment one:
The embodiment of the present invention one describes a kind of self-destruction method of terminal, and suppose that first terminal in the present embodiment one and the second terminal are mobile phone terminals, the schematic flow sheet of the present embodiment one as shown in Figure 1, comprises the following steps:
Step 101: first terminal detects self whether have wireless communication ability, if having wireless communication ability, then performs step 102; Otherwise, perform step 105.
When first terminal enters into normal operating condition from shutdown or the non-normal operating condition such as standby, the operation that first terminal performs this step 101 can be triggered, whether self-inspection has wireless communication ability, and concrete self test mode includes but not limited to following either type or various ways combination:
Mode one: whether whether self-inspection had SIM card and can be communicated by described SIM card when there being SIM card.
Mode two: whether whether self-inspection have WLAN function and can by described WLAN function access wlan network when there being WLAN function.
Mode three: whether whether self-inspection had Bluetooth function and can be communicated with the external world by Bluetooth function when there being Bluetooth function.
In practical operation, whether first terminal can have wireless communication ability according to above-mentioned three kinds of mode self-inspections respectively, if first terminal communicates with the external world by above-mentioned at least one mode, then confirms that self has wireless communication ability; If first terminal does not communicate with the external world by above-mentioned either type, then confirm that self does not have wireless communication ability.
Step 102: first terminal utilizes wireless communication ability to send alarm information to second terminal of binding with first terminal.
Described alarm information can be the alarm information of arbitrary form, as the alarm information of short message form or the alarm information etc. of instruction type, such as, when described alarm information is the alarm information of short message form, described alarm information can be comprise content of text " carrying out self-destruction operation? " short message.
Step 103: first terminal receives the feedback message that the second terminal sends.
Described feedback message also can be the feedback message of arbitrary form, as the feedback message of short message form or the feedback message etc. of instruction type, such as, when described feedback message is the feedback message of instruction type, described feedback message can be comprise whether to require that first terminal performs the instruction of self-destruction operation instruction, if command content is 1, represents and requires that first terminal performs self-destruction operation, command content is 2, when expression requires that first terminal enters normal operating condition.
Step 104: first terminal determines according to the feedback message received the operation self whether performing the personal information that self-destruction this locality stores, and terminates the self-destruction operating process of this first terminal.
In this step 104, because the second terminal is terminal trusty, therefore, also be trusty to the instruction of first terminal whether self-destruction in the feedback message that second terminal sends, such as, when comprising the command content of requirement first terminal execution self-destruction operation in described feedback message, first terminal performs self-destruction operation; Otherwise, when first terminal enters normal operating condition.
Step 105: first terminal performs the operation of the personal information that self-destruction this locality stores, terminates the self-destruction operation of this first terminal.
Preferably, maloperation is there is in order to avoid further, when first terminal self-inspection do not have have wireless communication ability time, export the prompting message of " inspection SIM card " by local screen, require that the user of first terminal guarantees there is available SIM card in current first terminal.If now first terminal is in unsafe conditions (as first terminal is stolen), if then the user of first terminal can not guarantee to have available SIM card also mandatory requirement first terminal enter normal operating condition, then first terminal will perform this step 105, the operation of the personal information that self-destruction this locality stores, avoids the personal information in first terminal to leak; If now first terminal is in security context (if first terminal is by legal use), if then the user of first terminal can not guarantee there is available SIM card, the operation that first terminal enters normal operating condition can be exited, then first terminal will not perform this step 105, avoid the maloperation occurring self-destruction.
By the scheme of step 101 ~ step 105 in the present embodiment one, for the first terminal without wireless communication ability, represent that first terminal is current and be in unsafe condition, should self-destruction operation be carried out; For the first terminal with wireless communication ability, judge whether to need to perform self-destruction operation according to the instruction of the feedback message of the second terminal transmission trusty, effectively can improve the reliability of self-destruction, avoid the personal information in first terminal illegally to be usurped, also can avoid the maloperation to first terminal self-destruction simultaneously.
Whether whether the embodiment of the present invention two have SIM card for first terminal self-inspection and whether whether can have WLAN function by described SIM card communication, self-inspection when there being SIM card and by described WLAN function access wlan network, can be described in detail the embodiment of the present invention one when there being WLAN function.
Embodiment two:
Suppose that in the present embodiment two, first terminal is mobile phone A, the second terminal is mobile phone B, and as shown in Figure 2, be the method step schematic diagram of the embodiment of the present invention two, described method mainly comprises the following steps:
Step 201: whether mobile phone A self-inspection has SIM card, if having, then performs step 202; Otherwise, perform step 204.
Step 202: whether mobile phone A self-inspection can be communicated by described SIM card, if so, then performs step 203; Otherwise, perform step 204.
Particularly, whether mobile phone A can, by described SIM card access to wireless communication network (as GSM network), if so, then be determined to be communicated by described SIM card in self-inspection; Otherwise, determine to be communicated by described SIM card.
Step 203: the alarm information of short message form is sent to mobile phone B by mobile phone A, jumps to step 207.
Alternatively, in the scheme of the present embodiment, mobile phone A stores the identification information having the mobile phone B of binding relationship with mobile phone A in advance in a secure environment in this locality, this identification information can be the phone number of mobile phone B.When performing step 203, mobile phone A can call the phone number of the local mobile phone B stored, the alarm information of the form that sends SMS message directly to mobile phone B.
Step 204: whether mobile phone A self-inspection has WLAN function, if so, then performs step 205; Otherwise, perform step 209.
Step 205: whether mobile phone A self-inspection by described WLAN function access wlan network, if so, then can perform step 206; Otherwise, perform step 209.
Step 206: the alarm information of instruction type is sent to alarm platform by mobile phone A, is sent to mobile phone B by alarm platform by described alarm information, jumps to step 207.
Alternatively, in the scheme of the present embodiment, the IMEI(International Mobile Equipment Identity that mobile phone A registers self in advance in a secure environment in described alarm platform demonstrate,proves code) identify and alarm number, described alarm number can be the phone number of mobile phone B, and alarm platform can safeguard the binding relationship between the IMEI mark of mobile phone A and the phone number of mobile phone B.
When alarm platform receives the alarm information of the instruction type that mobile phone A sends, therefrom can extract the IMEI mark of mobile phone A, and identify the binding relationship between the phone number of mobile phone B according to the IMEI of described mobile phone A, described alarm information is sent to mobile phone B, and alarm platform includes but not limited to send alarm information by short message form to mobile phone B.
It should be noted that, in the scheme of the present embodiment two, first whether there is SIM card to first terminal and whether can carry out self-inspection by described SIM card communication when there being SIM card, when being communicated by SIM card, again to whether having WLAN function and whether can carry out self-inspection by described WLAN function when there being WLAN function, whether the scheme of the present embodiment is also not limited to: first to having WLAN function and whether can carry out self-inspection by described WLAN function when there being WLAN function, obstructed out-of-date in self-inspection, whether there is SIM card to first terminal again and whether can carry out self-inspection by described SIM card communication when there being SIM card.The scheme of the present embodiment does not limit the sequencing of self-inspection, and first terminal can also walk abreast and carry out self-inspection to SIM card function and WLAN function, selects one of them available function to send alarm information to the second terminal.
Step 207: mobile phone A receives the feedback message that mobile phone B sends.Before this step 207 performs, if what mobile phone B received is the alarm information (namely step 203 is performed) that mobile phone A is sent by short message form, mobile phone B is by resolving the alarm information received, determine that the transmitting terminal of alarm information is mobile phone A, also determine the content of alarm information simultaneously, then in this step 207, mobile phone B sends feedback message by short message form to mobile phone A.When carrying out Message Transmission between mobile phone A and mobile phone B, can according to the content in the agreement determination message of consulting in advance.
If what mobile phone B received is the warning information (namely step 206 is performed) that mobile phone A is sent by alarm platform, mobile phone B is by resolving the alarm information received, determine that the transmitting terminal of alarm information is alarm platform, also determine the content of alarm information simultaneously, then in this step 207, mobile phone B sends feedback message by short message form or instruction type to alarm platform, after alarm platform receives the feedback message of mobile phone B transmission, parse content wherein, and the feedback message of instruction type is sent to mobile phone A, wherein, mobile phone B sends in the feedback message of alarm platform and indicates the mobile phone A whether result of self-destruction and alarm platform coming to the same thing of sending to the feedback message of mobile phone A to indicate.When carrying out Message Transmission between mobile phone A and alarm platform, can according to the content in the agreement determination message of consulting in advance; When carrying out Message Transmission between mobile phone B and alarm platform, also can according to the content in the agreement determination message of consulting in advance.
Step 208: feedback message described in mobile phone A identification, when determining that described feedback message is safety verification message, enters normal operating condition, when determining that described feedback message is self-destruction acknowledge message, performing the operation of the personal information that self-destruction this locality stores, and terminating.
Step 209: mobile phone A exports the prompting message of " inspection SIM card ", if when self-inspection has an available SIM card, jump to step 203; Otherwise, perform the operation of the personal information that self-destruction this locality stores, and terminate.
Whether above embodiment one and embodiment two perform self-destruction operation according to the instruction of the second terminal trusty to first terminal is carried out reliability certification; in order to improve the reliability of self-destruction operation further; the embodiment of the present invention three also proposed the scheme of a kind of comprehensive camera picture collection protection, opposite end certification protection, is described in detail below by embodiment three.
Embodiment three:
Step 301: mobile phone A starts local camera collection picture, and the picture of collection and the picture set prestored are compared, if coupling, then perform step 302; Otherwise, perform step 303.
In the present embodiment three, when mobile phone A enters into normal operating condition from shutdown or the non-normal operating condition such as standby, mobile phone A will start local camera, by described camera collection picture, and utilize picture recognition function, by local camera collection to picture compare with the picture set that prestores.
In this step 301, local camera collection to picture can be one, also can be multiple, its gather picture content can but be not limited to portrait picture, also can be the picture of environment residing for mobile phone A.
The described picture prestored refers to the picture for carrying out legal comparison, content in the picture prestored can be considered as legal content, such as: at least one the portrait picture that can prestore at least one legitimate user, or at least one pictures in special scenes, as at least one pictures in working environment or at least one pictures in home environment.
If at least one of the current collection of the local camera picture gathered is mate with the comparison result of at least one pictures in picture set, then represent that current phone A is in security context or is used by legitimate user, step 302 can be performed, if any picture of the current collection of local camera is not all mated with the comparison result of any picture in picture set, then represent that current phone A may be in unsafe conditions and maybe may the person of being illegally used use, can step 303 be performed.
Step 302: mobile phone A enters normal operating condition.
Step 303: carry out Message Transmission between mobile phone A and the mobile phone B of binding, determines whether to perform self-destruction operation according to the feedback message that mobile phone B sends.
The scheme of this step 303 is identical with the scheme of embodiment one or embodiment two, is described in Fig. 3 for the scheme of embodiment two.
Embodiment four:
The embodiment of the present invention four provides a kind of terminal belonging to same inventive concept with embodiment one, and as shown in Figure 4, this terminal specifically comprises following functions unit:
Whether ability detecting unit 401, have wireless communication ability for detecting self, when having wireless communication ability, and trigger control unit 402, otherwise, trigger self-destruction unit 403.
Control module 402, the wireless communication ability detected for Utilization ability detecting unit 401 sends alarm information to the other-end bound, and receives the feedback message of other-end transmission, determines whether to trigger self-destruction unit 403 according to the feedback message received.
Self-destruction unit 403, for performing the operation of the personal information that self-destruction this locality stores.
Particularly, ability detecting unit 401, for when determining self to have SIM card and can be communicated by described SIM card and/or have WLAN function and wlan network can be accessed by described WLAN function, determine that self has wireless communication ability, trigger control unit 402.
Different according to the testing result of ability detecting unit 401, the specific implementation of control module 402 is not identical yet, is described respectively below:
Described control module 402, during specifically for being tested with SIM card at ability detecting unit 401 and can being communicated by described SIM card, the alarm information of the form that sends SMS message to described other-end, and receive the feedback message of the short message form that described other-end sends, and when determining that described feedback message is safety verification message, entering normal operating condition, when determining that described feedback message is self-destruction acknowledge message, triggering self-destruction unit 403.
Described control module 402, during specifically for being tested with WLAN function at ability detecting unit 401 and wlan network can being accessed by described WLAN function, alarm information is sent to described other-end by alarm platform, and receive the feedback message that described other-end sent by described alarm platform, and when determining that described feedback message is safety verification message, entering normal operating condition, when determining that described feedback message is self-destruction acknowledge message, triggering self-destruction unit 403.
Described terminal also comprises:
Picture comparing unit 404, for starting local camera collection picture, and compares the picture of collection and the picture set prestored, when comparison result does not mate, and burst capability detecting unit 401.
Preferably, the picture of described camera collection can be carried in described alarm information, described other-end is made to determine to send the current status of terminal of alarm information according to the picture carried in alarm information, described picture is utilized to carry out authentication to the described terminal sending alarm information, for determining whether that the terminal needing instruction to send alarm information performs self-destruction operation and provides foundation.
These three functional units of above three ability detecting units 401, control module 402, self-destruction unit 403 can be referred to as opposite end protection module, determine whether to need to perform for the feedback message realized by sending with the other-end self bound the scheme that self-destruction operates.
The storage unit of described this functional unit of picture comparing unit 404 and the set of storage inside picture can be referred to as shooting protection module; judge for realizing whether being in security context by the picture of described camera collection to terminal, and then determine whether the scheme needing execution self-destruction operation.
Below reciprocal process between the miscellaneous part in the opposite end protection module in terminal, shooting protection module and terminal is described, to realize the scheme of embodiment four.
Embodiment five:
As shown in Figure 5, be the inner structure schematic diagram of terminal in the embodiment of the present invention five, mainly comprise: mobile phone kernel 501, opposite end protection module 502, shooting protection module 503, peripherals 504.
Mobile phone kernel 501 specifically comprises: power management chip, CPU, clock control and FLASH module, be responsible for data in mobile phone information interaction, with peripheral communications, opposite end protection module, protection module of making a video recording call and steering order performs.
Peripherals 504 specifically comprises: WLAN module, camera and on-screen keyboard, is responsible for communicating with the external world with CPU, performs the control command of CPU, receives the operational order of extraneous input simultaneously.
Particularly, when opposite end protection module 502 and shooting protection module 503 run, as follows with the reciprocal process of mobile phone kernel 501 and peripherals 504:
First, when terminal needs that never normal operating condition enters into normal operating condition, shooting protection module 503 need be run, as shown in Figure 6, be the process flow diagram running shooting protection module 503, be specially:
Sequential calling program in shooting protection module 503, by interrupting application, obtains the right to use of CPU, and namely CPU is shooting protection module 503 allocation process resource; Start the video camera program in FLASH, camera is forced to enter Photographing Mode, and receive camera collection and input picture after, start the picture comparing unit 404 in shooting protection module 503, the picture set prestored in the picture of current for the camera received collection and storage unit is compared, if comparison result mates, then enter normal operating condition; Otherwise, trigger opposite end protection module 502.
Then, when opposite end protection module 502 is subject to the triggering of shooting protection module 503, opposite end protection module 502 need be run, as shown in Figure 7, be the process flow diagram running opposite end protection module 502, be specially:
Sequential calling program in opposite end protection module 502 is by interrupting application, and obtain the right to use of CPU, namely CPU is opposite end protection module 502 allocation process resource.
Different from the mode that the external world communicates according to this terminal, the process running opposite end protection module 502 is not identical yet, is illustrated respectively below:
If the ability detecting unit 401 in opposite end protection module 502 determines that this terminal is had SIM card and can be communicated by this SIM card; then control module 402 starts the short message transmission program in FLASH; and the alarm information of the form that sends SMS message to the other-end bound; and receive the feedback message of the short message form that described other-end sends; when described feedback message is safety verification message; enter normal operating condition; when described feedback message is self-destruction acknowledge message, trigger self-destruction unit 403.
If the ability detecting unit 401 in opposite end protection module 502 determines that this terminal does not have carry out by SIM card the ability that communicates; then control module 402 starts WLAN module; after access wlan network; pressure is linked to alarm platform; and by the other-end transmission alarm information of this alarm platform to binding; and receive the feedback message of described other-end transmission; when described feedback message is safety verification message; enter normal operating condition; when described feedback message is self-destruction acknowledge message, trigger self-destruction unit 403.
If control module 402 normally cannot start WLAN module cause the failure of access wlan network, then call terminal screen, prompt terminal user inserts available SIM card, otherwise this terminal is by unavailable, triggers self-destruction unit 403.
When the self-destruction unit 403 in opposite end protection module 502 is subject to triggering; sequential calling program in opposite end protection module 502 interrupts application, for self-destruction operating process distributes cpu resource, deletes the personal information in the FLASH of this terminal; and resetting this terminal, its flow process is as shown in Figure 8.
Embodiment six:
The embodiment of the present invention six additionally provides a kind of destruct system belonging to the terminal under same inventive concept with embodiment one, and described system comprises first terminal 601 and the second terminal 602, is described the structural representation of this system below by way of Fig. 9.
First terminal 601, whether wireless communication ability is had for detecting self, when having wireless communication ability, wireless communication ability is utilized to send alarm information to the second terminal 602 with binding, and receive the feedback message of the second whole 602 ends transmissions, determining according to the feedback message received the operation self whether performing the personal information that self-destruction this locality stores, when not having wireless communication ability, performing the operation of the personal information that self-destruction this locality stores;
Second terminal 602, for receiving, the alarm information that first terminal 601 sends, and send feedback message to first terminal 601.
First terminal 601, specifically for when determining self to have SIM card and can be communicated by SIM card and/or have WLAN function and can access wlan network by WLAN function, determines that self has wireless communication ability.
When first terminal 601 is when SIM card having been detected and can be communicated by described SIM card, the alarm information of the form that sends SMS message to the second terminal 602, and receive the feedback message of the short message form that the second terminal 602 sends, and when determining that described feedback message is safety verification message, enter normal operating condition, when determining that described feedback message is self-destruction acknowledge message, perform the operation of the personal information that self-destruction this locality stores.
When first terminal 601 is when WLAN function having been detected and can access wlan network by described WLAN function, alarm information is sent to the second terminal 602 by alarm platform 603, and receive the feedback message of the second terminal 602 by alarm platform 603 transmission, and when determining that described feedback message is safety verification message, enter normal operating condition, when determining that described feedback message is self-destruction acknowledge message, perform the operation of the personal information that self-destruction this locality stores.
Alternatively, the picture of collection and the picture set prestored also for starting local camera collection picture, and are compared by first terminal 601, determine that comparison result does not mate.
In concrete terminal destruct system, the picture of the current collection of camera in above-mentioned possibility can also be carried in the alarm information that first terminal 601 sends, make described second terminal 602 carry out authentication according to described picture to described first terminal 601.
The inner structure of the first terminal 601 in native system can be identical with the terminal structure described in embodiment four and embodiment five.
Those skilled in the art should understand, embodiments of the invention can be provided as method, system or computer program.Therefore, the present invention can adopt the form of complete hardware embodiment, completely software implementation or the embodiment in conjunction with software and hardware aspect.And the present invention can adopt in one or more form wherein including the upper computer program implemented of computer-usable storage medium (including but not limited to magnetic disk memory, CD-ROM, optical memory etc.) of computer usable program code.
The present invention describes with reference to according to the process flow diagram of the method for the embodiment of the present invention, equipment (system) and computer program and/or block scheme.Should understand can by the combination of the flow process in each flow process in computer program instructions realization flow figure and/or block scheme and/or square frame and process flow diagram and/or block scheme and/or square frame.These computer program instructions can being provided to the processor of multi-purpose computer, special purpose computer, Embedded Processor or other programmable data processing device to produce a machine, making the instruction performed by the processor of computing machine or other programmable data processing device produce device for realizing the function of specifying in process flow diagram flow process or multiple flow process and/or block scheme square frame or multiple square frame.
These computer program instructions also can be stored in can in the computer-readable memory that works in a specific way of vectoring computer or other programmable data processing device, the instruction making to be stored in this computer-readable memory produces the manufacture comprising command device, and this command device realizes the function of specifying in process flow diagram flow process or multiple flow process and/or block scheme square frame or multiple square frame.
These computer program instructions also can be loaded in computing machine or other programmable data processing device, make on computing machine or other programmable devices, to perform sequence of operations step to produce computer implemented process, thus the instruction performed on computing machine or other programmable devices is provided for the step realizing the function of specifying in process flow diagram flow process or multiple flow process and/or block scheme square frame or multiple square frame.
Although describe the preferred embodiments of the present invention, those skilled in the art once obtain the basic creative concept of cicada, then can make other change and amendment to these embodiments.So claims are intended to be interpreted as comprising preferred embodiment and falling into all changes and the amendment of the scope of the invention.
Obviously, those skilled in the art can carry out various change and modification to the present invention and not depart from the spirit and scope of the present invention.Like this, if these amendments of the present invention and modification belong within the scope of the claims in the present invention and equivalent technologies thereof, then the present invention is also intended to comprise these change and modification.

Claims (18)

1. a self-destruction method for terminal, is characterized in that, comprising:
First terminal detects self whether have wireless communication ability;
When first terminal has wireless communication ability, described first terminal utilizes described wireless communication ability to send alarm information to second terminal of binding with described first terminal, and receive the feedback message of described second terminal transmission, determine according to the described feedback message received the operation self whether performing the personal information that self-destruction this locality stores;
When first terminal does not have wireless communication ability, described first terminal performs the operation of the personal information that self-destruction this locality stores.
2. the method for claim 1, is characterized in that, first terminal detects self whether have wireless communication ability, specifically comprises:
First terminal, when determining self to have SIM card and can be communicated by described SIM card and/or have WLAN function and can access wlan network by described WLAN function, determines that self has wireless communication ability.
3. method as claimed in claim 2, it is characterized in that, when first terminal is had SIM card and can be communicated by described SIM card, described first terminal sends SMS message to described second terminal the alarm information of form, and receive the feedback message of the short message form that described second terminal sends, and when determining that described feedback message is safety verification message, enter normal operating condition, when determining that described feedback message is self-destruction acknowledge message, perform the operation of the personal information that self-destruction this locality stores.
4. method as claimed in claim 2, it is characterized in that, when described first terminal has WLAN function and can access wlan network by described WLAN function, described first terminal sends alarm information by alarm platform to described second terminal, and receive the feedback message that described second terminal sent by described alarm platform, and when determining that described feedback message is safety verification message, enter normal operating condition, when determining that described feedback message is self-destruction acknowledge message, perform the operation of the personal information that self-destruction this locality stores.
5. the method as described in as arbitrary in Claims 1 to 4, is characterized in that, before first terminal detects and self whether has wireless communication ability, also comprises:
Described first terminal starts local camera collection picture, and the picture of collection and the picture set prestored is compared, and determines that comparison result does not mate.
6. method as claimed in claim 5, is characterized in that, carry the picture of described camera collection in described alarm information, make described second terminal carry out authentication according to described picture to described first terminal.
7. a destruct system for terminal, is characterized in that, comprising:
First terminal, whether wireless communication ability is had for detecting self, when having wireless communication ability, described wireless communication ability is utilized to send alarm information to second terminal of binding with described first terminal, and receive the feedback message of described second terminal transmission, determining according to the described feedback message received the operation self whether performing the personal information that self-destruction this locality stores, when not having wireless communication ability, performing the operation of the personal information that self-destruction this locality stores;
Second terminal, for receiving the alarm information that described first terminal sends, and sends feedback message to described first terminal.
8. system as claimed in claim 7, is characterized in that,
First terminal, specifically for when determining self to have SIM card and can be communicated by described SIM card and/or have WLAN function and can access wlan network by described WLAN function, determines that self has wireless communication ability.
9. system as claimed in claim 8, is characterized in that,
First terminal, specifically for when having SIM card and can be communicated by described SIM card, the alarm information of the form that sends SMS message to described second terminal, and receive the feedback message of the short message form that described second terminal sends, and when determining that described feedback message is safety verification message, entering normal operating condition, when determining that described feedback message is self-destruction acknowledge message, performing the operation of the personal information that self-destruction this locality stores.
10. system as claimed in claim 8, is characterized in that,
First terminal, specifically for when having WLAN function and wlan network can be accessed by described WLAN function, alarm information is sent to described second terminal by alarm platform, and receive the feedback message that described second terminal sent by described alarm platform, and when determining that described feedback message is safety verification message, entering normal operating condition, when determining that described feedback message is self-destruction acknowledge message, performing the operation of the personal information that self-destruction this locality stores.
11. as arbitrary in claim 7 ~ 10 as described in system, it is characterized in that,
First terminal, also for starting local camera collection picture, and comparing the picture of collection and the picture set prestored, determining that comparison result does not mate.
12. systems as claimed in claim 11, is characterized in that, carry the picture of described camera collection in described alarm information, make described second terminal carry out authentication according to described picture to described first terminal.
13. 1 kinds of terminals, is characterized in that, comprise ability detecting unit, control module and self-destruction unit, wherein:
Whether ability detecting unit, have wireless communication ability for detecting self, when having wireless communication ability, and trigger control unit, otherwise, trigger self-destruction unit;
Control module, for utilizing described wireless communication ability to send alarm information to the other-end of binding, and receiving the feedback message of described other-end transmission, determining whether to trigger self-destruction unit according to the described feedback message received;
Self-destruction unit, for performing the operation of the personal information that self-destruction this locality stores.
14. terminals as claimed in claim 13, is characterized in that,
Ability detecting unit, specifically for when determining self to have SIM card and can be communicated by described SIM card and/or have WLAN function and can access wlan network by described WLAN function, determines that self has wireless communication ability, trigger control unit.
15. terminals as claimed in claim 14, is characterized in that,
Described control module, during specifically for being tested with SIM card at ability detecting unit and can being communicated by described SIM card, the alarm information of the form that sends SMS message to described other-end, and receive the feedback message of the short message form that described other-end sends, and when determining that described feedback message is safety verification message, entering normal operating condition, when determining that described feedback message is self-destruction acknowledge message, triggering self-destruction unit.
16. terminals as claimed in claim 14, is characterized in that,
Described control module, during specifically for being tested with WLAN function at ability detecting unit and wlan network can being accessed by described WLAN function, alarm information is sent to described other-end by alarm platform, and receive the feedback message that described other-end sent by described alarm platform, and when determining that described feedback message is safety verification message, entering normal operating condition, when determining that described feedback message is self-destruction acknowledge message, triggering self-destruction unit.
17. as arbitrary in claim 13 ~ 16 as described in terminal, it is characterized in that, described terminal also comprises:
Picture comparing unit, for starting local camera collection picture, and compares the picture of collection and the picture set prestored, when comparison result does not mate, and burst capability detecting unit.
18. terminals as claimed in claim 17, it is characterized in that, described control module, specifically for utilizing described wireless communication ability to send to the other-end of binding the alarm information carrying the picture of described camera collection, the other-end of described binding is made to carry out authentication according to described picture to described terminal.
CN201310288216.8A 2013-07-10 2013-07-10 Terminal self-destruction method, system and device Pending CN104281811A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310288216.8A CN104281811A (en) 2013-07-10 2013-07-10 Terminal self-destruction method, system and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310288216.8A CN104281811A (en) 2013-07-10 2013-07-10 Terminal self-destruction method, system and device

Publications (1)

Publication Number Publication Date
CN104281811A true CN104281811A (en) 2015-01-14

Family

ID=52256673

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310288216.8A Pending CN104281811A (en) 2013-07-10 2013-07-10 Terminal self-destruction method, system and device

Country Status (1)

Country Link
CN (1) CN104281811A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105872192A (en) * 2015-12-08 2016-08-17 乐视移动智能信息技术(北京)有限公司 Control method and device for mobile terminals
US20170163816A1 (en) * 2015-12-08 2017-06-08 Le Holdings (Beijing) Co., Ltd. Mobile terminal and controlling method thereof
CN107608713A (en) * 2017-08-22 2018-01-19 维沃移动通信有限公司 A kind of application program transfer method and mobile terminal

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1606326A (en) * 2003-10-10 2005-04-13 高延飞 Security management method for mobile phone
US20050237185A1 (en) * 2004-03-05 2005-10-27 Simon Fraser University Wireless computer monitoring device with automatic arming and disarming
CN1835038A (en) * 2006-04-05 2006-09-20 中国移动通信集团公司 Anti-theft monitoring system of traffic tools
CN1980460A (en) * 2005-11-30 2007-06-13 中兴通讯股份有限公司 Mobile terminal information resource safety security control and realizing method
CN1988443A (en) * 2005-12-21 2007-06-27 联想(北京)有限公司 Method and system for real time monitoring radio terminal based on biological information
CN101965082A (en) * 2010-08-26 2011-02-02 电子科技大学 Wireless intelligent streetlamp control method and system
CN102158595A (en) * 2011-02-16 2011-08-17 中兴通讯股份有限公司 Method and device for realizing burglary prevention of mobile terminal by face recognition
CN102663444A (en) * 2012-03-26 2012-09-12 广州商景网络科技有限公司 Method for preventing account number from being stolen and system thereof
CN102843669A (en) * 2012-08-17 2012-12-26 中兴通讯股份有限公司 Data access method and device

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1606326A (en) * 2003-10-10 2005-04-13 高延飞 Security management method for mobile phone
US20050237185A1 (en) * 2004-03-05 2005-10-27 Simon Fraser University Wireless computer monitoring device with automatic arming and disarming
CN1980460A (en) * 2005-11-30 2007-06-13 中兴通讯股份有限公司 Mobile terminal information resource safety security control and realizing method
CN1988443A (en) * 2005-12-21 2007-06-27 联想(北京)有限公司 Method and system for real time monitoring radio terminal based on biological information
CN1835038A (en) * 2006-04-05 2006-09-20 中国移动通信集团公司 Anti-theft monitoring system of traffic tools
CN101965082A (en) * 2010-08-26 2011-02-02 电子科技大学 Wireless intelligent streetlamp control method and system
CN102158595A (en) * 2011-02-16 2011-08-17 中兴通讯股份有限公司 Method and device for realizing burglary prevention of mobile terminal by face recognition
CN102663444A (en) * 2012-03-26 2012-09-12 广州商景网络科技有限公司 Method for preventing account number from being stolen and system thereof
CN102843669A (en) * 2012-08-17 2012-12-26 中兴通讯股份有限公司 Data access method and device

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105872192A (en) * 2015-12-08 2016-08-17 乐视移动智能信息技术(北京)有限公司 Control method and device for mobile terminals
US20170163816A1 (en) * 2015-12-08 2017-06-08 Le Holdings (Beijing) Co., Ltd. Mobile terminal and controlling method thereof
WO2017096826A1 (en) * 2015-12-08 2017-06-15 乐视控股(北京)有限公司 Method and device for controlling mobile terminal
CN107608713A (en) * 2017-08-22 2018-01-19 维沃移动通信有限公司 A kind of application program transfer method and mobile terminal

Similar Documents

Publication Publication Date Title
CN103391374B (en) Dual system terminal supporting seamless switching
US8718602B2 (en) Method and system for remote control of smart card
CN104376263B (en) The method and apparatus that application behavior intercepts
CN104767713B (en) Account binding method, server and system
CA2882033C (en) Data access method and device
TW200302007A (en) System and method for preventing use of a wireless device
US20090247123A1 (en) Method for Providing Security Services by Using Mobile Terminal Password and Mobile Terminal Thereof
CN104601324A (en) Verification method specific to applications, terminal and system
TWI526936B (en) Change the way smart card application type, intelligent terminal, service level Taiwan and systems
EP2825956B1 (en) Method, apparatus and system of recovering an operating system on a portable communication device
CN106488394A (en) A kind of method and device of equipment connection
CN104281811A (en) Terminal self-destruction method, system and device
Yu et al. Remotely wiping sensitive data on stolen smartphones
CN102801731B (en) A kind of method of protected data and device
CN104252388A (en) Method for realizing switching between non-trusted environment and trusted environment in mobile equipment
CN104618315B (en) A kind of method, apparatus and system of verification information push and Information Authentication
KR101087698B1 (en) Method for authenticating security of smart-phone
CN104822127A (en) Bluetooth device, data channel real-time management and control method and system thereof
CN102411692B (en) Method, system and equipment for running terminal
CN107070878B (en) System and method for virus isolation of monitored application
CN106603625B (en) Data protection method and device
CN105095702B (en) A kind of superuser right control method and device
CN105550577A (en) Security control method and system for terminal container
CN101127995A (en) An information processing method for phone-card separated mobile terminal
CN104994225A (en) Short message sending control method and short message sending control device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20150114