CN104426877B - A kind of information processing method and server - Google Patents

A kind of information processing method and server Download PDF

Info

Publication number
CN104426877B
CN104426877B CN201310392960.2A CN201310392960A CN104426877B CN 104426877 B CN104426877 B CN 104426877B CN 201310392960 A CN201310392960 A CN 201310392960A CN 104426877 B CN104426877 B CN 104426877B
Authority
CN
China
Prior art keywords
state
user terminal
information
server
authentication information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310392960.2A
Other languages
Chinese (zh)
Other versions
CN104426877A (en
Inventor
璧佃唉
赵谦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201310392960.2A priority Critical patent/CN104426877B/en
Publication of CN104426877A publication Critical patent/CN104426877A/en
Application granted granted Critical
Publication of CN104426877B publication Critical patent/CN104426877B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Abstract

The invention discloses a kind of information processing method, solving that user terminal in the prior art exists cannot be under the premise of guaranteeing user's routine use data convenience, the technical issues of protecting data not usurped by other people in user terminal loss.This method is applied to a server, which comprises the current state for obtaining a user terminal is first state and the first request for using corresponding first authentication information of the first data in the user terminal from the user terminal;Judge whether the first state is a preset state, obtains the first judging result;When first judging result shows that the first state is the preset state, based on first request, controls first authentication information and be in and prohibit hair-like state.

Description

A kind of information processing method and server
Technical field
The present invention relates to electronic technology field more particularly to a kind of information processing methods and server.
Background technique
With the continuous development of electronic technology, the type of electronic equipment is more and more, and function is also stronger and stronger, gives people Production and living bring convenience.
In the information age of today, people can have various individuals in user terminal (such as mobile phone, tablet computer etc.) Data (including cards folder data, short message data, schedule data, e-mail data etc.), wherein just not including user It is ready the private data for allowing other users to obtain.In the prior art, it is carried out in such a way that these private datas, password is set Protection, and when user needs to call password-protected data, it needs to be manually entered counterpart keys.
But it is at least found above-mentioned during realizing the technical solution of the embodiment of the present application in present inventor The prior art has the following technical problems:
Ordinary user is only claimed user terminal data when losing and is not stolen by other people when using user terminal With usually in use, requiring the protection of data relatively low.
For example, a mobile phone user has contact method and other details (addresses, work of household and friend in mobile phone Work, personal website etc.);If protecting these data, in the prior art, can only to data (or call data application journey Sequence) setting password, it will lead to all user can be required to be manually entered a counterpart keys when calling these data every time in this way.
However usually in use, need often to call these data, if being manually entered a key every time, undoubtedly give User brings inconvenience.But if for this reason, user is not just to certain often calling and have encryption meaning Data be arranged cryptoguard, then user terminal lose when, just will appear the case where personal data are usurped by other people.
That is, user terminal in the prior art exist cannot under the premise of guaranteeing user's routine use data convenience, The technical issues of protecting data not usurped by other people when user terminal is lost.
Summary of the invention
It is whole to solve user in the prior art by providing a kind of information processing method and server for the embodiment of the present application End exists and cannot protect data when user terminal is lost not by him under the premise of guaranteeing user's routine use data convenience The technical issues of people usurps, realizing can be convenient using data in user terminal in routine use, and when user terminal is lost When protect technical effect that wherein data are not usurped by other people.
On the one hand, the embodiment of the present application provides a kind of information processing method, is applied to a server, which comprises The current state for obtaining a user terminal is first state and is used for from the user terminal using in the user terminal First request of corresponding first authentication information of the first data;Judge whether the first state is a preset state, obtains the One judging result;When first judging result shows that the first state is the preset state, asked based on described first It asks, controls first authentication information and be in and prohibit hair-like state.
Preferably, judge whether the first state is a preset state described, after obtaining the first judging result, institute State method further include: when it is the preset state that first judging result, which shows the first state not, based on described the One request, is sent to the user terminal for first authentication information.
Preferably, the current state for obtaining a user terminal is first state, is specifically included: it is whole to obtain the user End responds the first key information for operating and generating and sending to the first of one programmable button of user terminal;Based on described One key information is obtained for showing that the user of the user terminal is in the first state of stress state.
Preferably, the current state for obtaining a user terminal is first state, is specifically included: being obtained and the user What the different second user terminal of terminal was sent believes for characterizing the user terminal and being in the first of lost condition and informed Breath;Based on first notification, the first state that the user terminal is in the lost condition is obtained.
Preferably, the current state for obtaining a user terminal is first state, specifically includes: asking based on described first It asks, obtains the first state that the user terminal is in normal condition.
Preferably, it controls first authentication information based on first request described and is in after taboo hair-like state, institute State method further include: obtain the status condition information from the user terminal;Judge whether the status condition information is one Preset state conditional information obtains the second judging result;Wherein, the preset state conditional information is server storage By a shape of the taboo hair-like state for being used to that the server to be made to release first authentication information of the user terminal uploads State conditional information;When second judging result shows that the status condition information is the preset state conditional information, really The fixed user terminal is in the normal condition.
On the other hand, the embodiment of the present application provides a kind of server, comprising: first acquisition unit, for obtaining user's end The current state at end is first state and is used to be corresponded to using the first data in the user terminal from the user terminal The first authentication information first request;First judging unit is obtained for judging whether the first state is a preset state Take the first judging result;First control unit, for showing that the first state is described default in first judging result When state, based on first request, controls first authentication information and be in and prohibit hair-like state.
Preferably, the server further include: the second control unit, for showing described in first judging result When one state is not the preset state, based on first request, it is whole that first authentication information is sent to the user End.
Preferably, the first acquisition unit includes: the first acquisition module, for obtaining the user terminal response to institute The first key information stating the first operation of one programmable button of user terminal and generating and sending;Second obtains module, is used for base It obtains in first key information for showing that the user of the user terminal is in the first state of stress state.
Preferably, the first acquisition unit includes: that third obtains module, different from the user terminal for obtaining What second user terminal was sent is used to characterize the first notification that the user terminal has been in lost condition;4th obtains Module obtains the first state that the user terminal is in the lost condition based on first notification.
Preferably, the first acquisition unit includes: the 5th acquisition module, for based on described in first request User terminal is in the first state of normal condition.
Preferably, the server further include: third acquiring unit, for based on the first request control described the One authentication information is in after taboo hair-like state, obtains the status condition information from the user terminal;Second judgment unit is sentenced Whether the status condition information of breaking is a preset state conditional information, obtains the second judging result;Wherein, the preset state Conditional information is the reflecting for making the server release described first by the user terminal uploads of server storage Weigh a status condition information of the taboo hair-like state of information;First determination unit, for showing in second judging result When the status condition information is the preset state conditional information, determine that the user terminal is in the normal condition.
One or more technical solutions provided in the embodiments of the present application have at least the following technical effects or advantages:
1, due in information processing method provided by the embodiments of the present application, user when calling protected data usually not With key is manually entered, remote server can issue key automatically, so that user can easily use data;And when user feels When data are dangerous in user terminal, user can issue to server and request, and make it stop sending key to user terminal, make It obtains when calling data, needs to be manually entered key, and then protect the safety of data;It is whole to solve user in the prior art End exists and cannot protect data when user terminal is lost not by him under the premise of guaranteeing user's routine use data convenience The technical issues of people usurps, realizing can be convenient using data in user terminal in routine use, and when user terminal is lost When protect technical effect that wherein data are not usurped by other people.
2, since in information processing method provided by the embodiments of the present application, user (is such as robbed in the case where being coerced Rob), a request can be sent to server, it is made to stop sending out to user terminal quickly through pressing one key (or Macintosh) Key corresponding with protection data is sent, and then realizing in case of emergency protects data.
3, since in information processing method provided by the embodiments of the present application, user exists after user terminal is reported the loss It is sent to remote server after stopping issuing key request, it can be by corresponding user terminal or different from the of the user terminal Two user terminals send the status condition information for making server restore to send cipher key service to user terminal to server, make User can continue after user terminal is recovered in routine use user terminal data it is convenient, and when user terminal is lost The protection mode that wherein data are not usurped by other people protects data when mistake.
Detailed description of the invention
Fig. 1 is the flow chart of an information processing method in the embodiment of the present application;
Fig. 2 is another flow chart of information processing method in the embodiment of the present application;
Fig. 3 is the another flow chart of information processing method in the embodiment of the present application;
Fig. 4 is the structural schematic diagram of server in the embodiment of the present application;
Fig. 5 is the structural schematic diagram of the first acquisition unit of server in the embodiment of the present application;
Fig. 6 is the structural schematic diagram of server in the embodiment of the present application;
Fig. 7 is the another structural schematic diagram of server in the embodiment of the present application.
Specific embodiment
It is whole to solve user in the prior art by providing a kind of information processing method and server for the embodiment of the present application End exists and cannot protect data when user terminal is lost not by him under the premise of guaranteeing user's routine use data convenience The technical issues of people usurps, realizing can be convenient using data in user terminal in routine use, and when user terminal is lost When protect technical effect that wherein data are not usurped by other people.
Technical solution in the embodiment of the present application is in order to solve the above technical problems, general thought is as follows:
On the one hand, a kind of information processing method is provided, a server is applied to, which comprises
The current state for obtaining a user terminal is first state and is used to use the use from the user terminal First request of corresponding first authentication information of the first data in the terminal of family;
Judge whether the first state is a preset state, obtains the first judging result;
When first judging result shows that the first state is the preset state, requested based on described first, It controls first authentication information and is in and prohibit hair-like state.
Since in information processing method provided by the embodiments of the present application, user does not have to when calling protected data usually It is manually entered key, remote server can issue key automatically, so that user can easily use data;And when user feels to use When family data in terminal is dangerous, user can issue to server and request, it is made to stop sending key to user terminal, so that It when calling data, needs to be manually entered key, and then protects the safety of data;Solves user terminal in the prior art In the presence of cannot under the premise of guaranteeing user's routine use data convenience, protect data user terminal lose when not by other people The technical issues of usurping, realizing can be convenient using data in user terminal in routine use, and when user terminal is lost The protection technical effect that wherein data are not usurped by other people.
In order to make the application the technical staff in the technical field be more clearly understood that the present invention, with reference to the accompanying drawing, Technical solution of the present invention is described in detail by specific embodiment.
Referring to FIG. 1, the embodiment of the present application provides a kind of information processing method, it is applied to a server, this method comprises:
S101: obtain a user terminal current state be first state and it is from the user terminal for use user First request of corresponding first authentication information of the first data in terminal;
S102: judging whether the first state is a preset state, obtains the first judging result;
S103: first judging result show first state be preset state when, based on first request, control this first Authentication information, which is in, prohibits hair-like state.
Referring to FIG. 2, in step S102: judging whether the first state is a preset state, obtain the first judging result Later, information processing method provided by the embodiments of the present application further include:
S104: when it is preset state that the first judging result, which shows first state not, based on the first request, by the first authentication Information is sent to the user terminal.
Below will by taking user terminal is mobile phone as an example, step S101, S102 to the method in the embodiment of the present application and The realization process of S103 and S104 is described in detail:
Firstly, user can lead to when user will protect a certain data that it is made to be not other people when mobile phone is dangerous institute's used times It crosses user terminal and one password is arranged to the data (or the application program for calling the data).
Then, corresponding key is uploaded to remote server by user terminal, wherein the server can be runed by communication Quotient or terminal relevant manufactures or third party provide.Remote server can save the key, as the first authentication information.
Then, when user needs to call the data, user terminal can send a request to remote server, and server connects When by the request, the status information for obtaining the user terminal can be checked simultaneously, and whether judge the user terminal current state For a preset state, such as: judging the user terminal by no in prohibiting hair-like state.
Then, if the judgment result displays user terminal, which is in, prohibits hair-like state, server will not respond the request, but Continue to control first authentication information and be in prohibit hair-like state.This way it is ensured that data, which are in unsafe condition in mobile phone, (prohibits hair-like State) when, server will not issue the first authentication information to user terminal, so that user must be manually entered the first authentication information (key) is just capable of calling the data, and then protects the safety of data.
But if the judgment result displays user terminal, which is not on, prohibits hair-like state, server can respond the user Request, issues the first authentication information corresponding with the request to user terminal, user terminal is receiving first authentication information Afterwards, user terminal can call the data based on first authentication information, be manually entered key without user.
Since the data transmission bauds of current communication network is very fast and user terminal and server performance are also very It is powerful, so, including the judgement of terminal request, server, issue the first authentication information and user terminal receive the first authentication information, It calls event spent by the whole process of data extremely short, can be completed usually in 1~2 second, so, relative to being manually entered Authentication information calls data, after technical solution provided by the embodiments of the present application, the efficiency of data is called greatly to be mentioned It rises.
Therefore, in technical solution provided by the embodiments of the present application, user usually call data when without manually inputting Corresponding authentication information, server can automated to respond to the request of user terminal sending, corresponding authentication information be sent to it, to use Family terminal calls protected data based on the authentication information received;And when server is in the requirement for receiving user terminal When issuing the request of the first authentication information, first authentication information is got in when prohibiting hair-like state, server can stop issuing The authentication information, user must be manually entered authentication information and just be capable of calling the data, and then realize in routine use user Data in terminal is convenient, and the technical effect that wherein data are not usurped by other people is protected when user terminal is lost.
In a practical situation, user to a data be arranged password after, user can tradeoff Information Security demand and After data convenience, decides in its sole discretion and whether the data are corresponded into authentication information and be uploaded to remote server.Specifically, right In the data that safety requirements is slightly lower or is commonly used, user can be uploaded to remote server, and then used usually When can request being sent to server and call data by way of receiving the authentication information, to remove from every time defeated manually Enter the inconvenience of authentication information;And the data high for certain demands for security, user can be after being arranged password, selecting will be right The authentication information answered is uploaded to remote server, although being manually entered authentication letter in this way, calling require user when data every time Breath, but prevent the data in daily life and can be contacted at one's side other people of the user terminal to call.That is, passing through Information processing method provided by the embodiments of the present application, user voluntarily can flexibly determine the mode of protection data, to not TongAn The data of full demand use different Preservation tactics.
Specifically, the control of the first authentication information can be applied to two kinds in the concrete realization to prohibit hair-like state by server Situation, respectively user terminal are in the case where stress state and the case where user terminal are in lost condition.That is, in the application In the information processing method that embodiment provides, the current state for obtaining a user terminal is first state, implements process packet It includes:
When the case where user terminal being in stress state, the method in the embodiment of the present application allows service as follows Device knows that by the control of the first authentication information be taboo hair-like state:
Obtain the first key that user terminal response generates and sends the first operation of one programmable button of user terminal Information;
Based on first key information, obtain for showing that the user of user terminal is in the first state of stress state.
When the case where user terminal being in lost condition, the method in the embodiment of the present application allows service as follows Device knows that by the control of the first authentication information be taboo hair-like state:
Obtain the second user terminal transmission different from user terminal has been in loss shape for characterizing user terminal First notification of state;
Based on first notification, the first state that user terminal is in lost condition is obtained.
For continuing to use the example that user terminal is mobile phone, when mobile phone user is when being coerced, and such as kidnaps or plunders, user Can by touch by some preset key on mobile phone or certain several key combination at Macintosh so that user terminal is to server The first key information is sent, and remote server can get the mobile phone and be in stress state after receiving the key information Information, and then by user terminal be defined as prohibit hair-like state, i.e., user terminal is in preset mode, and then server can be by first Authentication information control is taboo hair-like state.Therefore, by information processing method provided by the embodiments of the present application, can user be existed When meeting with urgent emergency situations, protected safe condition quickly can be set by data, to protect the data of user not It is usurped by other people.
For continuing to use the example that user terminal is mobile phone, when mobile phone is in lost condition, user can pass through another use Family terminal to server issues the request for reporting the loss this user terminal, and server can be after receiving this and reporting the loss request by the user The corresponding first authentication information control of terminal is taboo hair-like state.
Specifically, another user terminal can be mobile phone or tablet computer, laptop, desktop computer etc. can With remote server (or remote server manager provide other users terminal, such as phone, computer) interaction equipment.
Specifically, user is when reporting the loss, and server may also require that user provides a presupposed information, such as user name and close Code or the first authentication information itself.In this way, can be incited somebody to action by other users terminal after user loses user terminal The user terminal of the loss is reported the loss, and then makes server no longer to corresponding first authentication information of user terminal transmission is lost, User must be manually entered authentication information when calling corresponding data, and then guarantee that data are not usurped by other people.
It is controlled as prohibiting the situation of hair-like state, current shape in addition to above-mentioned current first state corresponds to the first authentication information State further includes that the situation of transmissible mode is in corresponding to the first authentication information.In information processing method provided by the embodiments of the present application In, server receive user terminal requirement issue the first authentication information first request when, it is current user terminal to be obtained State, specific implementation process include:
Based on the first request, the first state that user terminal is in normal condition is obtained.
For continuing to use the example that user terminal is mobile phone, remote server can obtain use when receiving first request Family terminal current state, when do not get make the user terminal be in prohibit hair-like state information when, including report the loss request and with Relevant first key information of user terminal determines that user terminal is in normal condition at this time, and server can respond user end End issue first request, to user terminal under pass corresponding first authentication information.
In information processing method provided by the embodiments of the present application, by server control in taboo hair-like state or transmissible mode The first authentication information specifically:
The default authentication information for being used to obtain the first data by user terminal uploads of server storage.
For continuing to use the example that user terminal is mobile phone, the first authentication information that server passes down to user terminal is specially For user terminal when the first data of cryptoguard are arranged, the correspondence authentication information uploaded onto the server, server is receiving this The corresponding relationship of the authentication information and the authentication information and user terminal can be stored after authentication information, specific storage location Including the storage device being connected inside the remote server and with the server, such as register or hard disk.In this way, when user exists When in the future to call first data to send the first request to server, server can be according to the authentication information and terminal pair of storage It should be related to that the corresponding authentication information that will be stored before descends into user terminal, and then make user terminal by the authentication information tune With the data, realizes and call data in the case where being manually entered corresponding authentication information without user.
In practical applications, if user has changed the corresponding authentication information of protection data and will be on new authentication information When reaching server, server can store the first new authentication information again, while can delete corresponding in preceding authentication information It removes.
Referring to FIG. 3, in order to enable user can make server will when determining that user terminal is in a safe condition It is set as transmissible mode in the first authentication information for prohibiting hair-like state, in information processing method provided by the embodiments of the present application, The current state for obtaining a user terminal be first state and come user terminal for obtaining in user terminal the first number Before the first request step according to corresponding first authentication information, this method further include:
S105: the status condition information for carrying out user terminal is obtained;
S106: judging whether the status condition information is a preset state conditional information, obtains the second judging result;Its In, which is the believing for making server release the first authentication by user terminal uploads of server storage One status condition information of the taboo hair-like state of breath;
S107: when the second judging result shows that status condition information is preset state conditional information, user terminal is determined In normal condition.
In step S107: when the second judging result shows that status condition information is preset state conditional information, determining and use Family terminal is in after normal condition, information processing method provided by the embodiments of the present application further include:
It controls the first authentication information and is in transmissible mode.
For continuing to use the example that user terminal is mobile phone, firstly, remote server is obtaining and is storing user terminal uploads The first authentication information step after or with the step simultaneously, server may require that user provide a preset state condition letter Breath, for when the first authentication information is in and prohibits hair-like state, allowing user, whereby preset state conditional information allows the server by the The control of one authentication information is transmissible mode.After server receives the preset state conditional information of user's upload, stored In case specific storage location includes server internal in the future as whether the first authentication information the criterion for transmissible mode is controlled Or the external storage element being connected with server.Specifically, which can be the first authentication letter Breath itself, or different from another presupposed information of the first authentication information, such as relevant mailbox, association mobile phone.
Then, after the first authentication information is in by server prohibits hair-like state, user, can be in order to release the taboo hair-like state A status condition information is provided to server, in a practical situation, the mode packet of status condition information is sent with user orientation server It includes using the user terminal itself and other users terminal two kinds of situations, such as other mobile phones, tablet computer etc..
Then, server judges whether the status condition information is preset status condition information, shows in judging result When the status condition information that user terminal currently uploads is identical as preset state conditional information, then server can determine user end End is in normal condition, and then server can release the taboo hair-like state of the first authentication information based on the normal condition, and controlling it is Transmissible mode.Therefore, by information processing method provided by the embodiments of the present application, user can be convenient after recovering user terminal Ground makes server restore the service for passing the first authentication information down to user terminal.
On the other hand, referring to FIG. 4, another embodiment of the application provides a kind of server, comprising:
First acquisition unit 10, the current state for obtaining user terminal are first state and the use for carrying out user terminal In the first request using corresponding first authentication information of the first data in user terminal;
First judging unit 20 obtains the first judging result for judging whether first state is a preset state;
First control unit 30, for being asked based on first when the first judging result shows that first state is preset state It asks, the first authentication information of control, which is in, prohibits hair-like state.
Referring to FIG. 5, the application is real in order to make user in a manner of convenient and fast using protected data in routine use The server of example offer is provided further include:
Second control unit 40, for being based on first when it is preset state that the first judging result, which shows first state not, Request, is sent to user terminal for the first authentication information.
Referring to FIG. 6, in server provided by the embodiments of the present application, in order to obtain the first current shape of user terminal State, first acquisition unit include:
First obtains module 101, for obtaining user terminal response to the first of one programmable button of user terminal the operation The first key information generated and sent;
Second obtains module 102, for obtaining the user for showing user terminal based on the first key information in the side of body Compel the first state of state.
In server provided by the embodiments of the present application, in order to obtain the current first state of user terminal, first is obtained Unit includes:
Third obtains module 103, uses for obtaining the characterization that is used for that the second user terminal different from user terminal is sent Family terminal has been in the first notification of lost condition;
4th obtains module 104, obtains the first state that user terminal is in lost condition based on the first notification.
Referring to FIG. 6, in server provided by the embodiments of the present application, in order to obtain the first current shape of user terminal State, first acquisition unit include:
5th obtains module 105, for being in the first state of normal condition based on the first request user terminal.
In server provided by the embodiments of the present application, in order to enable server can respond the first request, the server Further include:
Second acquisition unit, for obtaining the corresponding with the first data are used as the first authentication letter of user terminal uploads One default authentication information of breath enables the server to response first and requests to pass the first authentication information under user terminal.
Referring to FIG. 7, in order to enable user can make server will when determining that user terminal is in a safe condition Transmissible mode, server provided by the embodiments of the present application are set as in the first authentication information for prohibiting hair-like state further include:
Third acquiring unit 50, for after prohibiting hair-like state, being obtained based on first request the first authentication information of control Fetch the status condition information of user terminal;
Second judgment unit 60 judges whether status condition information is a preset state conditional information, obtains the second judgement As a result;Wherein, preset state conditional information by user terminal uploads is used to that server to be made to release first for server storage One status condition information of the taboo hair-like state of authentication information;
First determination unit 70, for showing that status condition information is preset state conditional information in the second judging result When, determine that user terminal is in normal condition.
Various change mode and specific example in the information processing method of the application previous embodiment offer is equally applicable In the server of the present embodiment, by the aforementioned detailed description to information processing method, those skilled in the art can be clear The implementation method of server in the present embodiment is known, so this will not be detailed here in order to illustrate the succinct of book.
One or more technical solutions provided in the embodiments of the present application have at least the following technical effects or advantages:
1, due in information processing method provided by the embodiments of the present application, user when calling protected data usually not With key is manually entered, remote server can issue key automatically, so that user can easily use data;And when user feels When data are dangerous in user terminal, user can issue to server and request, and make it stop sending key to user terminal, make It obtains when calling data, needs to be manually entered key, and then protect the safety of data;It is whole to solve user in the prior art End exists and cannot protect data when user terminal is lost not by him under the premise of guaranteeing user's routine use data convenience The technical issues of people usurps, realizing can be convenient using data in user terminal in routine use, and when user terminal is lost When protect technical effect that wherein data are not usurped by other people.
2, since in information processing method provided by the embodiments of the present application, user (is such as robbed in the case where being coerced Rob), a request can be sent to server, it is made to stop sending out to user terminal quickly through pressing one key (or Macintosh) Key corresponding with protection data is sent, and then realizing in case of emergency protects data.
3, since in information processing method provided by the embodiments of the present application, user exists after user terminal is reported the loss It is sent to remote server after stopping issuing key request, it can be by corresponding user terminal or different from the of the user terminal Two user terminals send the status condition information for making server restore to send cipher key service to user terminal to server, make User can continue after user terminal is recovered in routine use user terminal data it is convenient, and when user terminal is lost The protection mode that wherein data are not usurped by other people protects data when mistake.
Obviously, various changes and modifications can be made to the invention without departing from essence of the invention by those skilled in the art Mind and range.In this way, if these modifications and changes of the present invention belongs to the range of the claims in the present invention and its equivalent technologies Within, then the present invention is also intended to include these modifications and variations.

Claims (12)

1. a kind of information processing method is applied to a server, which comprises
The current state for obtaining a user terminal is first state and is used for from the user terminal using user's end First request of corresponding first authentication information of the first data in end;
Judge whether the first state is a preset state, obtain the first judging result, wherein the preset state is stress State or lost condition;
When first judging result shows that the first state is the preset state, based on first request, control First authentication information, which is in, prohibits hair-like state, wherein first authentication information is not described default in the first state The user terminal is issued to by the server when state, so that the user terminal can be based on first authentication information Call first data.
2. information processing method as described in claim 1, which is characterized in that judge whether the first state is one described Preset state, after obtaining the first judging result, the method also includes:
It, will based on first request when it is the preset state that first judging result, which shows the first state not, First authentication information is sent to the user terminal.
3. information processing method as claimed in claim 1 or 2, which is characterized in that the current shape for obtaining a user terminal State is first state, is specifically included:
Obtain the user terminal response generates and sends the first operation of one programmable button of user terminal first Key information;
Based on first key information, obtains the user for showing the user terminal and be in assist and compel described the first of state State.
4. information processing method as claimed in claim 1 or 2, which is characterized in that the current shape for obtaining a user terminal State is first state, is specifically included:
Obtain losing for characterizing the user terminal and being in for the second user terminal transmission different from the user terminal First notification of mistake state;
Based on first notification, the first state that the user terminal is in the lost condition is obtained.
5. information processing method as claimed in claim 1 or 2, which is characterized in that the current shape for obtaining a user terminal State is first state, is specifically included:
Based on first request, the first state that the user terminal is in normal condition is obtained.
6. information processing method as claimed in claim 1 or 2, which is characterized in that described based on first request, control First authentication information is in after taboo hair-like state, the method also includes:
Obtain the status condition information from the user terminal;
Judge whether the status condition information is a preset state conditional information, obtains the second judging result;Wherein, described pre- If status condition information is for server storage as the user terminal uploads for making described in the server releasing One status condition information of the taboo hair-like state of the first authentication information;
When second judging result shows that the status condition information is the preset state conditional information, the use is determined Family terminal is in normal condition.
7. a kind of server, comprising:
First acquisition unit, the current state for obtaining user terminal are first state and are used for from the user terminal Use the first request of corresponding first authentication information of the first data in the user terminal;
First judging unit obtains the first judging result for judging whether the first state is a preset state, wherein The preset state is stress state or lost condition;
First control unit, for being based on when first judging result shows that the first state is the preset state First request controls first authentication information and is in and prohibit hair-like state, wherein first authentication information is described first The user terminal is issued to by the server when state is not the preset state, so that the user terminal can be based on First authentication information calls first data.
8. server as claimed in claim 7, which is characterized in that the server further include:
Second control unit, for when it is the preset state that first judging result, which shows the first state not, base In first request, first authentication information is sent to the user terminal.
9. server as claimed in claim 7 or 8, which is characterized in that the first acquisition unit includes:
First obtains module, for obtaining user terminal response to the first operation of one programmable button of user terminal The first key information generated and sent;
Second obtains module, for obtaining the user for showing the user terminal based on first key information in association Compel the first state of state.
10. server as claimed in claim 7 or 8, which is characterized in that the first acquisition unit includes:
Third obtains module, is used to characterize the use for obtaining different from user terminal second user terminal transmissions Family terminal has been in the first notification of lost condition;
4th obtains module, obtains described that the user terminal is in the lost condition based on first notification One state.
11. server as claimed in claim 7 or 8, which is characterized in that the first acquisition unit includes:
5th obtains module, for being in first shape of normal condition based on user terminal described in first request State.
12. server as claimed in claim 7 or 8, which is characterized in that the server further include:
Third acquiring unit, for controlling first authentication information after prohibiting hair-like state based on first request, Obtain the status condition information from the user terminal;
Second judgment unit judges whether the status condition information is a preset state conditional information, obtains the second judgement knot Fruit;Wherein, the preset state conditional information is server storage by the described for making of the user terminal uploads Server releases a status condition information of the taboo hair-like state of first authentication information;
First determination unit, for showing that the status condition information is the preset state condition in second judging result When information, determine that the user terminal is in normal condition.
CN201310392960.2A 2013-09-02 2013-09-02 A kind of information processing method and server Active CN104426877B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310392960.2A CN104426877B (en) 2013-09-02 2013-09-02 A kind of information processing method and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310392960.2A CN104426877B (en) 2013-09-02 2013-09-02 A kind of information processing method and server

Publications (2)

Publication Number Publication Date
CN104426877A CN104426877A (en) 2015-03-18
CN104426877B true CN104426877B (en) 2019-01-15

Family

ID=52974827

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310392960.2A Active CN104426877B (en) 2013-09-02 2013-09-02 A kind of information processing method and server

Country Status (1)

Country Link
CN (1) CN104426877B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101252703A (en) * 2008-03-28 2008-08-27 宇龙计算机通信科技(深圳)有限公司 Terminal data protecting method, system as well as mobile communication terminal
CN102780989A (en) * 2012-07-06 2012-11-14 北京小米科技有限责任公司 Method and system for preventing loss of mobile terminal
CN102883023A (en) * 2012-10-15 2013-01-16 东莞宇龙通信科技有限公司 Terminal and information protection control method

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4805122B2 (en) * 2006-12-19 2011-11-02 富士通株式会社 Portable information terminal, security method and program
CN202276390U (en) * 2011-08-30 2012-06-13 深圳万利达移动通信有限公司 Emergency calling-for-help mobile phone

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101252703A (en) * 2008-03-28 2008-08-27 宇龙计算机通信科技(深圳)有限公司 Terminal data protecting method, system as well as mobile communication terminal
CN102780989A (en) * 2012-07-06 2012-11-14 北京小米科技有限责任公司 Method and system for preventing loss of mobile terminal
CN102883023A (en) * 2012-10-15 2013-01-16 东莞宇龙通信科技有限公司 Terminal and information protection control method

Also Published As

Publication number Publication date
CN104426877A (en) 2015-03-18

Similar Documents

Publication Publication Date Title
EP2857947B1 (en) Terminal device and unlocking method thereof
US20230045087A1 (en) Method for Remedying a Security Breach on a Mobile Device
EP2122976B1 (en) Systems and methods for caller identification customization and remote management of communication devices
CA2831527C (en) Computer-implemented system and method for validating call connections
CN105160742A (en) Method and system for carrying out judgment, alarming and information shielding on forced unlocking
CN104038613B (en) The method and apparatus of information security management
CN105472093B (en) Mobile terminal call answers method for authenticating and mobile terminal
CN103699860A (en) Terminal antitheft method and equipment
US11593464B2 (en) System and method for providing user accounts through which users are able to operate computing devices
CN110932967B (en) Seamless session realization method and system for instant messaging message
CN101483861A (en) Method for mobile phone information safety protection
US20070155362A1 (en) First responder communication system
CN102340750A (en) Method for retrieving password of mobile phone private space
CN101415186A (en) Method for security protection of mobile phone information
CN104854599B (en) The processing method of mobile terminal, wearable device and communication information
TW200840320A (en) Home notification service system combined with digital household control host
CN104426877B (en) A kind of information processing method and server
CN101895829A (en) Method and system for retrieving FLASH data from mobile telephone, and mobile telephone
WO2017020598A1 (en) Contact information management method, apparatus and terminal
CN106714147A (en) Privacy short message protection method
KR20070117767A (en) System and method for remote controlling mobile telecommunication terminal
CN107197075B (en) Clean boot means of defence, device and computer readable storage medium
WO2015151251A1 (en) Network service providing device, network service providing method, and program
WO2015047166A1 (en) A telecare system and an electronic lock device for use therein, and an associated method for monitoring attendance to a telecare alarm event in a telecare system
CN105898051A (en) User terminal information deleting method and user terminal information deleting device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant