CN104537311A - Terminal system control method and device, and terminal - Google Patents

Terminal system control method and device, and terminal Download PDF

Info

Publication number
CN104537311A
CN104537311A CN201510026623.0A CN201510026623A CN104537311A CN 104537311 A CN104537311 A CN 104537311A CN 201510026623 A CN201510026623 A CN 201510026623A CN 104537311 A CN104537311 A CN 104537311A
Authority
CN
China
Prior art keywords
control
terminal
control information
hardware
software
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510026623.0A
Other languages
Chinese (zh)
Inventor
刘东海
汪智勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201510026623.0A priority Critical patent/CN104537311A/en
Priority to PCT/CN2015/073436 priority patent/WO2016115760A1/en
Publication of CN104537311A publication Critical patent/CN104537311A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6281Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database at program execution time, where the protection is within the operating system

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Automation & Control Theory (AREA)
  • Small-Scale Networks (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a terminal system control method and device, and a terminal. The method comprises the steps that control information is determined on a server side according to a triggered control item, wherein the control information is used for controlling hardware and/or software of the terminal system; the control information is sent to the terminal; the control information is received on the terminal side; according to the control information, the hardware and/or software of the terminal system are/is controlled. The control item needed by a user is triggered through user operation, so that a control instruction corresponding to the control item is executed in the terminal system, and the terminal system is controlled. By controlling the terminal system, illegal users can not operate the terminal, and data in the terminal are protected.

Description

A kind of control method of terminal system, device and terminal
Technical field
The present invention relates to field of computer technology, particularly relate to a kind of control method of terminal system, device and terminal.
Background technology
Terminal data security incident in recent years takes place frequently, and in order to protect personal information security to be no longer on the hazard, those skilled in the art have studied terminal anti-theft method.Existing terminal anti-theft method comprises: note is antitheft, terminal anti-theft and prevent illegal brush machine.
Note is antitheft to be referred to: after lost terminal, by sending the short message including preset content to terminal, starts the anti-theft feature of terminal, terminal just can normally be used after user inputs correct anti-theft cipher.Such as: the anti-theft modes of extremely sending mobile phone, as shown in Figure 1.
Data network and geographic position is antitheft refers to: according to the information of terminal, in the geographic position at the current place of this terminal of server side searches.Such as: the cruel cloud positioning function of extremely sending mobile phone; And for example: the FindMy Phone function of i Phone, as shown in Figure 2.
Prevent illegal brush machine from referring to: to make terminal only under the condition of depositing, terminal brush machine could realized with brush machine instrument.
But in existing mode, the theft preventing method that terminal uses is single, stolen or after losing, disabled user by cracking the modes such as terminal software, again brush machine, can get around existing security settings and entering terminal system in terminal, and then obtain the data in terminal.
Summary of the invention
Fundamental purpose of the present invention is to provide a kind of data guard method, device and terminal, and single with the theft preventing method solving the use of existing terminal, disabled user can get around the problem of existing security settings.
Based on above-mentioned technical matters, the present invention solves by the following technical programs.
The invention provides a kind of control method of terminal system, comprising: receiving control information; According to described control information, the hardware of control terminal system and/or software.
Wherein, described terminal system comprises the first system and second system; Described according to described control information, the hardware of control terminal system and/or software, comprising: according to described control information, controls hardware and/or the software of described the first system; And/or, according to described control information, control hardware and/or the software of described second system.
Wherein, described according to described control information, control the hardware of described the first system and/or described second system, comprising: according to described control information, the hardware shielding or lost efficacy in described the first system and/or described second system.
Wherein, described control information is control item or steering order; Described according to described control information, the hardware of control terminal system and/or software, comprise: if described control information is control item, then in the instruction table of comparisons preset, inquire about the steering order that described control item is corresponding, and in described terminal system, perform described steering order, to control hardware and/or the software of described terminal system; If described control information is steering order, then in described terminal system, perform described steering order, to control hardware and/or the software of described terminal system.
Present invention also offers a kind of control device of terminal system, the described device being arranged on end side comprises: receiver module, for receiving control information; Control module, for according to described control information, the hardware of control terminal system and/or software.
Present invention also offers a kind of terminal, described terminal comprises the control device of the described terminal system being arranged on end side.
Present invention also offers a kind of control method of terminal system, comprising: according to the control item be triggered, determine control information; Wherein, described control information is used for hardware and/or the software of control terminal system; Described control information is sent to described terminal.
Wherein, described terminal system comprises the first system and second system; Described control information for controlling hardware and/or the software of described the first system, and/or controls hardware and/or the software of described second system.
Wherein, described control information is control item or steering order; The control item that described basis is triggered, determines control information, comprising: if local terminal exists the instruction table of comparisons preset, then in the described instruction table of comparisons, inquire about the steering order that described control item is corresponding, using described steering order as control information; If there is not the default instruction table of comparisons in local terminal, then using described control item as control information.
Present invention also offers a kind of control device of terminal system, the described device being arranged at server side comprises: determination module, for according to the control item be triggered, determines control information; Wherein, described control information is used for hardware and/or the software of control terminal system; Sending module, for sending described control information to described terminal.
Beneficial effect of the present invention is as follows:
The present invention, by the control item needed for user operation activated user, makes steering order corresponding to this control item perform in terminal system, thus realizes the control to terminal system.By controlling terminal system, disabled user can be made cannot to operate terminal, and then achieve the protection to data in terminal.
Accompanying drawing explanation
Accompanying drawing described herein is used to provide a further understanding of the present invention, and form a application's part, schematic description and description of the present invention, for explaining the present invention, does not form inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is the anti-theft modes schematic diagram of existing mobile phone;
Fig. 2 is the antitheft schematic diagram of data network and geographic position of existing mobile phone;
Fig. 3 is the end side process flow diagram of the control method of terminal system according to an embodiment of the invention;
Fig. 4 is the server side process flow diagram of the control method of terminal system according to an embodiment of the invention
Fig. 5 is the process flow diagram of the control method of terminal system according to a first embodiment of the present invention;
Fig. 6 is the process flow diagram of the control method of terminal system according to a second embodiment of the present invention;
Fig. 7 is the end side structural drawing of the control device of terminal system according to an embodiment of the invention;
Fig. 8 is the server-side configuration figure of the control device of terminal system according to an embodiment of the invention.
Embodiment
Main thought of the present invention is, arranges control item in the user interface provided for user at server, and user can by operation trigging control item; After control item is triggered, the steering order that this control item is corresponding is given and performs to terminal system; Under the control of steering order, the hardware in terminal system and/or software perform the operation preset.This operation can protect the data in terminal system not obtained by disabled user, thus the mode of the present invention by controlling terminal system, improve the safe coefficient of data.
For making the object, technical solutions and advantages of the present invention clearly, below in conjunction with drawings and the specific embodiments, the present invention is described in further detail.
The invention provides a kind of control method (performing in end side) of terminal system.As shown in Figure 3, Fig. 3 is the end side process flow diagram of the control method of terminal system according to an embodiment of the invention.
Step S310, receiving control information.
Control information is control item or steering order.
Control item, for hardware and/or the software of control terminal system.Such as: control terminal system-kill or recover its store data.
Steering order is the computer instruction that control item is corresponding, and for performing in terminal system, the hardware in control terminal system and/or software, make hardware and/software perform the operation preset.
Step S320, according to control information, the hardware of control terminal system and/or software.
After receiving control information, judge that described control information is control item or steering order.
If described control information is control item, then, in the instruction table of comparisons preset, inquires about the steering order that described control item is corresponding, and perform described steering order in described terminal system, to control hardware and/or the software of described terminal system; If described control information is steering order, then in described terminal system, perform described steering order, to control hardware and/or the software of described terminal system.
Terminal system comprises the first system and second system; According to control information, control hardware and/or the software of the first system; And/or, according to control information, control hardware and/or the software of second system.Further, according to control information, control the hardware of the first system and/or second system, comprising: according to control information, the hardware in shielding or inefficacy the first system and/or described second system.
The invention provides a kind of control method (performing at server side) of terminal system.As shown in Figure 4, Fig. 4 is the server side process flow diagram of the control method of terminal system according to an embodiment of the invention.
Step S410, according to the control item be triggered, determines control information; Wherein, control information is used for hardware and/or the software of control terminal system.
Control information is control item or steering order; If local terminal (server side) exists the instruction table of comparisons preset, then in the instruction table of comparisons, the steering order that inquiry control item is corresponding, using steering order as control information; If there is not the default instruction table of comparisons in local terminal, then using control item as control information.
Terminal system comprises the first system and second system; Control information for controlling hardware and/or the software of the first system, and/or controls hardware and/or the software of described second system.
Step S420, sends control information to terminal.
In one embodiment, before trigging control item, also comprise: pre-set the instruction table of comparisons; Wherein, have recorded the corresponding relation of control item and steering order in the instruction table of comparisons.Further, at end side or server side, the instruction table of comparisons is set.
Based on the instruction table of comparisons preset, server arranges control item in the user interface provided for user, and the control item that activated user is selected in the user interface.User is the authorized user of described terminal.
Application scenarios of the present invention is such as: after the terminal loss of user; other-end logon server can be passed through; select required control item in the user interface; server is according to obtaining and the control item of activated user selection; and issue control information to the terminal of user; the hardware of control terminal system and/or software, protect the data in terminal not stolen by disabled user with this.The hardware of control terminal system and/or software, as: make the data in terminal system deletion system, the hardware made in terminal system, software can not normally run.
Provide three the present invention preferably embodiment below, the present invention is described.
Embodiment one
Fig. 5 is the process flow diagram of the control method of terminal system according to a first embodiment of the present invention.
Step S510, pre-sets the instruction table of comparisons, and the instruction table of comparisons is stored in server.
The corresponding relation of control item and steering order is have recorded in the instruction table of comparisons.
The operation of the instruction table of comparisons can be set at server side, the operation of the instruction table of comparisons also can be set in end side.If arrange the instruction table of comparisons at server side, then server directly stores; If arrange the instruction table of comparisons in end side, then the instruction table of comparisons be provided with is uploaded onto the server, by the server stores instruction table of comparisons.
Step S520, server, based on the instruction table of comparisons prestored, arranges control item in the user interface provided for user at server.
Control item can be designed to the form of button.
Here the user of indication is the authorized user of terminal, that is to say the validated user of having the right to sending instructions under terminal.Such as: the owner of terminal.
Step S530, the control item that server triggers user selects in the user interface.
Authorized user can pass through other-end logon server, selects the control item needed in the user interface, to carry out Long-distance Control to terminal.
Step S540, server inquires about steering order corresponding to the control item that is triggered in the instruction table of comparisons, and this steering order is issued to terminal.
Step S550, terminal, after receiving steering order, performs this steering order in terminal system.
Embodiment two
Fig. 6 is the process flow diagram of the control method of terminal system according to a second embodiment of the present invention.
Step S610, pre-sets the instruction table of comparisons, and is stored in the terminal by the instruction table of comparisons.
By the instruction table of comparisons arranged at server side or end side, be finally stored in end side.
Step S620, server, based on the instruction table of comparisons, arranges control item in the user interface provided for user.
If the instruction table of comparisons is arranged in end side, so, server can obtain the instruction table of comparisons from terminal, and arranges control item according to the instruction table of comparisons.
Step S630, the control item that server triggers user selects in the user interface.
Step S640, the information of the control item that user selects is sent to terminal by server.
Step S650, terminal, after receiving the information of control item, inquires about the steering order that this control item is corresponding in the instruction table of comparisons, and in terminal system, perform this steering order.
Embodiment three
Terminal system comprises the first system and second system.Such as, the first system is conventional system, and second system is security system; The level of security of security system is higher than conventional system.And for example: the first system is Windows system, and second system is linux system.
In terminal system, perform described steering order, the hardware of control terminal system and/or software, comprising: in the first system, perform steering order, controls hardware and/or the software of the first system; Or, in second system, perform described steering order, control hardware and/or the software of second system.
The software of the first system and second system, hardware can be shared, also can separate use.Such as: the internal memory during the first system and second system all use, but use subregions different in internal memory.Therefore, when arranging control item and steering order corresponding to control item, for the software and hardware separately used, can embody is the process carried out the first system or second system; For the software and hardware shared, can not embody is the process carried out the first system or second system.
Such as: the handling object embodying control item and steering order in the instruction table of comparisons.The instruction table of comparisons such as shown in table 1, but it will be appreciated by those skilled in the art that the content in the instruction table of comparisons is not limited thereto.
Table 1
In Table 1, control item comprises: control content and kind.Control content for describing the process carried out terminal system; The kind of control item comprises startup control item, closing control item.Steering order implication is for describing the executive mode of steering order.Because the implementation of steering order is various, so only give the implication of steering order in table 1, concrete steering order is arranged according to applied environment.
In Table 1, the control content of the second system data dump that crashes from the first system is all that operating system (Operating System the is called for short OS) layer to terminal controls.
Wherein, after system in case of system halt is opened, crash at system start-up phase, if terminal is restarted again, still unloading phase crash, terminal can be made like this to run.Killing the object that application opens can be also can be that whole software processes to partial software.It can be delete data in this locality that data dump is opened, also can while data are deleted in this locality, by the data upload of deleting to server, so that can in local recovery data.
In Table 1, from front-facing camera to safety chip, controlling content, is all control the hardware layer of terminal.The hardware that can shield or lose efficacy in the first system or second system.Shielding refers to: make hardware temporarily unavailable; Inefficacy refers to: be that hardware can be used never.
Wherein, front-facing camera, fingerprint authentication are opened; all for verifying the identity of the user of handheld terminal; after this authentication; by the result upload server, user can check this result in the user interface, if be verified as disabled user; user can also trigger other control items, to protect the data in terminal.Card Reader pattern is closed, and terminal system cannot access customer identification module (Subscriber IdentityModule, be called for short SIM), and the information in such SIM card cannot be acquired.Charge mode is opened, then terminal cannot be charged, and cannot open after such terminal power exhausts.Display, power button are opened, then display, power button are by conductively-closed, and display can not show, and power button can not be user-operably, and cannot wipe shielding arrange by brush machine or restart.Safety chip, for running second system, therefore, controls safety chip, is namely control second system.Forbid that reading Trustzone forbids reading second system data, such second system cannot start, and the data in second system cannot be obtained.
Based on the corresponding relation of control item in table 1 and steering order, when control item is set in the user interface, the kind of control item can be arranged to the form of button, will the function declaration of content as button be controlled, when the user clicks on a button, the steering order that this button is corresponding is triggered.
For above-described embodiment, while the hardware and/or software execution predetermined registration operation of control terminal system, the process that record controls item and steering order performed, is stored in end side or server side by record content.Record content comprises: the process performed hardware and/or the software of terminal system.Such as: delete the relevant information of data in the first system and deleted data, recover the data in second system and be resumed the relevant information of data.Further, according to record content, Recovery processing is performed to the hardware carrying out in terminal system processing and/or software.Such as: the system of process of crashing makes it normal startup, the hardware of conductively-closed makes it to recover normal, deleted data and carries out recovering or carrying out downloading etc. from server side from end side.Further, if user wishes that terminal operating recovers normal, then the control item in user interface can be operated, trigger recovery operation.Such as: trigging control item is closed.
It should be noted that, if after hardware lost efficacy, can not process be resumed.
Present invention also offers a kind of control device of terminal system, this device is arranged on end side.
As shown in Figure 7, the end side structural drawing of control device for being terminal system according to an embodiment of the invention.
This device comprises:
Receiver module 710, for receiving control information.
Control module 720, for according to described control information, the hardware of control terminal system and/or software.
The function of the device described in the present embodiment is described in said method embodiment, therefore not detailed part in the description of the present embodiment, see the related description in previous embodiment, can not repeat at this.
Present invention also offers a kind of control device of terminal system, this device is arranged on server side.
As shown in Figure 8, the server-side configuration figure of control device for being terminal system according to an embodiment of the invention.
This device comprises:
Determination module 810, for according to the control item be triggered, determines control information; Wherein, described control information is used for hardware and/or the software of control terminal system.
Sending module 820, for sending described control information to described terminal.
The function of the device described in the present embodiment is described in said method embodiment, therefore not detailed part in the description of the present embodiment, see the related description in previous embodiment, can not repeat at this.
The foregoing is only embodiments of the invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within right of the present invention.

Claims (10)

1. a control method for terminal system, is characterized in that, comprising:
Receiving control information;
According to described control information, the hardware of control terminal system and/or software.
2. method according to claim 1, is characterized in that,
Described terminal system comprises the first system and second system;
Described according to described control information, the hardware of control terminal system and/or software, comprising:
According to described control information, control hardware and/or the software of described the first system; And/or,
According to described control information, control hardware and/or the software of described second system.
3. method according to claim 2, is characterized in that, described according to described control information, controls the hardware of described the first system and/or described second system, comprising:
According to described control information, the hardware shielding or lost efficacy in described the first system and/or described second system.
4. method according to claim 1, is characterized in that,
Described control information is control item or steering order;
Described according to described control information, the hardware of control terminal system and/or software, comprising:
If described control information is control item, then, in the instruction table of comparisons preset, inquires about the steering order that described control item is corresponding, and perform described steering order in described terminal system, to control hardware and/or the software of described terminal system;
If described control information is steering order, then in described terminal system, perform described steering order, to control hardware and/or the software of described terminal system.
5. a control device for terminal system, is characterized in that, the described device being arranged on end side comprises:
Receiver module, for receiving control information;
Control module, for according to described control information, the hardware of control terminal system and/or software.
6. a terminal, is characterized in that, described terminal comprises the control device of terminal system according to claim 5.
7. a control method for terminal system, is characterized in that, comprising:
According to the control item be triggered, determine control information; Wherein, described control information is used for hardware and/or the software of control terminal system;
Described control information is sent to described terminal.
8. method according to claim 7, is characterized in that,
Described terminal system comprises the first system and second system;
Described control information for controlling hardware and/or the software of described the first system, and/or controls hardware and/or the software of described second system.
9. method according to claim 7, is characterized in that,
Described control information is control item or steering order;
The control item that described basis is triggered, determine control information, comprising:
If local terminal exists the instruction table of comparisons preset, then in the described instruction table of comparisons, inquire about the steering order that described control item is corresponding, using described steering order as control information;
If there is not the default instruction table of comparisons in local terminal, then using described control item as control information.
10. a control device for terminal system, is characterized in that, the described device being arranged at server side comprises:
Determination module, for according to the control item be triggered, determines control information; Wherein, described control information is used for hardware and/or the software of control terminal system;
Sending module, for sending described control information to described terminal.
CN201510026623.0A 2015-01-20 2015-01-20 Terminal system control method and device, and terminal Pending CN104537311A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510026623.0A CN104537311A (en) 2015-01-20 2015-01-20 Terminal system control method and device, and terminal
PCT/CN2015/073436 WO2016115760A1 (en) 2015-01-20 2015-02-28 Terminal system control method, device, and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510026623.0A CN104537311A (en) 2015-01-20 2015-01-20 Terminal system control method and device, and terminal

Publications (1)

Publication Number Publication Date
CN104537311A true CN104537311A (en) 2015-04-22

Family

ID=52852833

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510026623.0A Pending CN104537311A (en) 2015-01-20 2015-01-20 Terminal system control method and device, and terminal

Country Status (2)

Country Link
CN (1) CN104537311A (en)
WO (1) WO2016115760A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105094819A (en) * 2015-07-15 2015-11-25 成都中科创达软件有限公司 Control method and device for local and remote equipment
CN105120100A (en) * 2015-09-01 2015-12-02 广东欧珀移动通信有限公司 Mobile terminal with theft anti-flashing function, and anti-flashing method of same
CN105262885A (en) * 2015-09-01 2016-01-20 广东欧珀移动通信有限公司 Mobile terminal with card-locking anti-theft function and card-locking anti-theft method thereof
CN105488440A (en) * 2015-11-23 2016-04-13 广东欧珀移动通信有限公司 Security protection method and terminal device
CN107517301A (en) * 2016-06-16 2017-12-26 成都鼎桥通信技术有限公司 The data guard method and device of mobile terminal
CN108959974A (en) * 2018-06-29 2018-12-07 中国科学院信息工程研究所 The safety protecting method and system of mobile terminal

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120154128A1 (en) * 2010-12-16 2012-06-21 Sunguk Cho Apparatus and method for wirelessly controlling a system or appliance
CN103914039A (en) * 2013-12-31 2014-07-09 海尔集团公司 Control method and system for household appliances
CN103945385A (en) * 2014-03-27 2014-07-23 宇龙计算机通信科技(深圳)有限公司 Theft preventing method and device for mobile terminal
CN104202370A (en) * 2014-08-19 2014-12-10 广州金山网络科技有限公司 Mobile terminal, remote control method, remote control system, server and remote control end thereof

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103606238B (en) * 2013-11-22 2016-01-20 赵福贵 mobile phone burglar alarm system
CN103905649B (en) * 2014-04-16 2017-08-15 北京联合大学 A kind of mobile phone antitheft system based on Bluetooth technology

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120154128A1 (en) * 2010-12-16 2012-06-21 Sunguk Cho Apparatus and method for wirelessly controlling a system or appliance
CN103914039A (en) * 2013-12-31 2014-07-09 海尔集团公司 Control method and system for household appliances
CN103945385A (en) * 2014-03-27 2014-07-23 宇龙计算机通信科技(深圳)有限公司 Theft preventing method and device for mobile terminal
CN104202370A (en) * 2014-08-19 2014-12-10 广州金山网络科技有限公司 Mobile terminal, remote control method, remote control system, server and remote control end thereof

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105094819A (en) * 2015-07-15 2015-11-25 成都中科创达软件有限公司 Control method and device for local and remote equipment
CN105120100A (en) * 2015-09-01 2015-12-02 广东欧珀移动通信有限公司 Mobile terminal with theft anti-flashing function, and anti-flashing method of same
CN105262885A (en) * 2015-09-01 2016-01-20 广东欧珀移动通信有限公司 Mobile terminal with card-locking anti-theft function and card-locking anti-theft method thereof
CN105120100B (en) * 2015-09-01 2018-01-19 广东欧珀移动通信有限公司 It is a kind of that there is the mobile terminal for being stolen anti-brush machine function and its anti-brush machine method
CN105262885B (en) * 2015-09-01 2018-09-04 广东欧珀移动通信有限公司 A kind of mobile terminal and its pintle hook lock theft preventing method with pintle hook lock anti-theft feature
CN105488440A (en) * 2015-11-23 2016-04-13 广东欧珀移动通信有限公司 Security protection method and terminal device
CN107517301A (en) * 2016-06-16 2017-12-26 成都鼎桥通信技术有限公司 The data guard method and device of mobile terminal
CN108959974A (en) * 2018-06-29 2018-12-07 中国科学院信息工程研究所 The safety protecting method and system of mobile terminal

Also Published As

Publication number Publication date
WO2016115760A1 (en) 2016-07-28

Similar Documents

Publication Publication Date Title
US12001857B2 (en) Device locator disable authentication
CN104537311A (en) Terminal system control method and device, and terminal
CN104376263B (en) The method and apparatus that application behavior intercepts
US9792446B2 (en) System and method for protecting data stored on a removable data storage device
CN102693381B (en) Method, device and system for anti-theft of portable computer equipment
US9378344B2 (en) Method and apparatus for protecting information based on data card
US9560527B2 (en) Version protection method and apparatus for mobile terminal
CN110770728A (en) Unmanned aerial vehicle control method, unmanned aerial vehicle and terminal for controlling unmanned aerial vehicle
CN102932741A (en) Mobile phone antitheft tracking method and antitheft tracking mobile phone
US20120102565A1 (en) Method and system for controlling the execution of a function protected by authentification of a user, in particular for the access to a resource
CN116456023A (en) Terminal anti-theft method and terminal equipment
CN105809045A (en) Method and device for processing equipment systems during data reset
US20150334565A1 (en) Authentication method and authentication device for communication apparatus and communication apparatus
CN104732150A (en) Starting method and device for mobile terminal
CN110619241A (en) Terminal protection method and device
CN108600964B (en) Mobile terminal tracking and positioning system
CN107154999B (en) Terminal and unlocking method and storage device based on environmental information
CN110636493B (en) Information backup method, device and equipment of virtual SIM card and storage medium
KR101873739B1 (en) Mobile terminal and method for providing security thereto
JP5502049B2 (en) Communication terminal and terminal control method
WO2018047203A1 (en) A system and a method for locking a lost portable communication device
KR101871715B1 (en) Mobile terminal and method for providing security thereto
CN117098136A (en) Equipment protection method and related device
CN104298929A (en) Payment equipment safety protection device and method
JP2008176647A (en) Method for preventing unauthorized use of computer, device with unauthorized use preventing function, and program

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20150422

RJ01 Rejection of invention patent application after publication