CN104537311A - Terminal system control method and device, and terminal - Google Patents
Terminal system control method and device, and terminal Download PDFInfo
- Publication number
- CN104537311A CN104537311A CN201510026623.0A CN201510026623A CN104537311A CN 104537311 A CN104537311 A CN 104537311A CN 201510026623 A CN201510026623 A CN 201510026623A CN 104537311 A CN104537311 A CN 104537311A
- Authority
- CN
- China
- Prior art keywords
- control
- terminal
- control information
- hardware
- software
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6281—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database at program execution time, where the protection is within the operating system
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Automation & Control Theory (AREA)
- Small-Scale Networks (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses a terminal system control method and device, and a terminal. The method comprises the steps that control information is determined on a server side according to a triggered control item, wherein the control information is used for controlling hardware and/or software of the terminal system; the control information is sent to the terminal; the control information is received on the terminal side; according to the control information, the hardware and/or software of the terminal system are/is controlled. The control item needed by a user is triggered through user operation, so that a control instruction corresponding to the control item is executed in the terminal system, and the terminal system is controlled. By controlling the terminal system, illegal users can not operate the terminal, and data in the terminal are protected.
Description
Technical field
The present invention relates to field of computer technology, particularly relate to a kind of control method of terminal system, device and terminal.
Background technology
Terminal data security incident in recent years takes place frequently, and in order to protect personal information security to be no longer on the hazard, those skilled in the art have studied terminal anti-theft method.Existing terminal anti-theft method comprises: note is antitheft, terminal anti-theft and prevent illegal brush machine.
Note is antitheft to be referred to: after lost terminal, by sending the short message including preset content to terminal, starts the anti-theft feature of terminal, terminal just can normally be used after user inputs correct anti-theft cipher.Such as: the anti-theft modes of extremely sending mobile phone, as shown in Figure 1.
Data network and geographic position is antitheft refers to: according to the information of terminal, in the geographic position at the current place of this terminal of server side searches.Such as: the cruel cloud positioning function of extremely sending mobile phone; And for example: the FindMy Phone function of i Phone, as shown in Figure 2.
Prevent illegal brush machine from referring to: to make terminal only under the condition of depositing, terminal brush machine could realized with brush machine instrument.
But in existing mode, the theft preventing method that terminal uses is single, stolen or after losing, disabled user by cracking the modes such as terminal software, again brush machine, can get around existing security settings and entering terminal system in terminal, and then obtain the data in terminal.
Summary of the invention
Fundamental purpose of the present invention is to provide a kind of data guard method, device and terminal, and single with the theft preventing method solving the use of existing terminal, disabled user can get around the problem of existing security settings.
Based on above-mentioned technical matters, the present invention solves by the following technical programs.
The invention provides a kind of control method of terminal system, comprising: receiving control information; According to described control information, the hardware of control terminal system and/or software.
Wherein, described terminal system comprises the first system and second system; Described according to described control information, the hardware of control terminal system and/or software, comprising: according to described control information, controls hardware and/or the software of described the first system; And/or, according to described control information, control hardware and/or the software of described second system.
Wherein, described according to described control information, control the hardware of described the first system and/or described second system, comprising: according to described control information, the hardware shielding or lost efficacy in described the first system and/or described second system.
Wherein, described control information is control item or steering order; Described according to described control information, the hardware of control terminal system and/or software, comprise: if described control information is control item, then in the instruction table of comparisons preset, inquire about the steering order that described control item is corresponding, and in described terminal system, perform described steering order, to control hardware and/or the software of described terminal system; If described control information is steering order, then in described terminal system, perform described steering order, to control hardware and/or the software of described terminal system.
Present invention also offers a kind of control device of terminal system, the described device being arranged on end side comprises: receiver module, for receiving control information; Control module, for according to described control information, the hardware of control terminal system and/or software.
Present invention also offers a kind of terminal, described terminal comprises the control device of the described terminal system being arranged on end side.
Present invention also offers a kind of control method of terminal system, comprising: according to the control item be triggered, determine control information; Wherein, described control information is used for hardware and/or the software of control terminal system; Described control information is sent to described terminal.
Wherein, described terminal system comprises the first system and second system; Described control information for controlling hardware and/or the software of described the first system, and/or controls hardware and/or the software of described second system.
Wherein, described control information is control item or steering order; The control item that described basis is triggered, determines control information, comprising: if local terminal exists the instruction table of comparisons preset, then in the described instruction table of comparisons, inquire about the steering order that described control item is corresponding, using described steering order as control information; If there is not the default instruction table of comparisons in local terminal, then using described control item as control information.
Present invention also offers a kind of control device of terminal system, the described device being arranged at server side comprises: determination module, for according to the control item be triggered, determines control information; Wherein, described control information is used for hardware and/or the software of control terminal system; Sending module, for sending described control information to described terminal.
Beneficial effect of the present invention is as follows:
The present invention, by the control item needed for user operation activated user, makes steering order corresponding to this control item perform in terminal system, thus realizes the control to terminal system.By controlling terminal system, disabled user can be made cannot to operate terminal, and then achieve the protection to data in terminal.
Accompanying drawing explanation
Accompanying drawing described herein is used to provide a further understanding of the present invention, and form a application's part, schematic description and description of the present invention, for explaining the present invention, does not form inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is the anti-theft modes schematic diagram of existing mobile phone;
Fig. 2 is the antitheft schematic diagram of data network and geographic position of existing mobile phone;
Fig. 3 is the end side process flow diagram of the control method of terminal system according to an embodiment of the invention;
Fig. 4 is the server side process flow diagram of the control method of terminal system according to an embodiment of the invention
Fig. 5 is the process flow diagram of the control method of terminal system according to a first embodiment of the present invention;
Fig. 6 is the process flow diagram of the control method of terminal system according to a second embodiment of the present invention;
Fig. 7 is the end side structural drawing of the control device of terminal system according to an embodiment of the invention;
Fig. 8 is the server-side configuration figure of the control device of terminal system according to an embodiment of the invention.
Embodiment
Main thought of the present invention is, arranges control item in the user interface provided for user at server, and user can by operation trigging control item; After control item is triggered, the steering order that this control item is corresponding is given and performs to terminal system; Under the control of steering order, the hardware in terminal system and/or software perform the operation preset.This operation can protect the data in terminal system not obtained by disabled user, thus the mode of the present invention by controlling terminal system, improve the safe coefficient of data.
For making the object, technical solutions and advantages of the present invention clearly, below in conjunction with drawings and the specific embodiments, the present invention is described in further detail.
The invention provides a kind of control method (performing in end side) of terminal system.As shown in Figure 3, Fig. 3 is the end side process flow diagram of the control method of terminal system according to an embodiment of the invention.
Step S310, receiving control information.
Control information is control item or steering order.
Control item, for hardware and/or the software of control terminal system.Such as: control terminal system-kill or recover its store data.
Steering order is the computer instruction that control item is corresponding, and for performing in terminal system, the hardware in control terminal system and/or software, make hardware and/software perform the operation preset.
Step S320, according to control information, the hardware of control terminal system and/or software.
After receiving control information, judge that described control information is control item or steering order.
If described control information is control item, then, in the instruction table of comparisons preset, inquires about the steering order that described control item is corresponding, and perform described steering order in described terminal system, to control hardware and/or the software of described terminal system; If described control information is steering order, then in described terminal system, perform described steering order, to control hardware and/or the software of described terminal system.
Terminal system comprises the first system and second system; According to control information, control hardware and/or the software of the first system; And/or, according to control information, control hardware and/or the software of second system.Further, according to control information, control the hardware of the first system and/or second system, comprising: according to control information, the hardware in shielding or inefficacy the first system and/or described second system.
The invention provides a kind of control method (performing at server side) of terminal system.As shown in Figure 4, Fig. 4 is the server side process flow diagram of the control method of terminal system according to an embodiment of the invention.
Step S410, according to the control item be triggered, determines control information; Wherein, control information is used for hardware and/or the software of control terminal system.
Control information is control item or steering order; If local terminal (server side) exists the instruction table of comparisons preset, then in the instruction table of comparisons, the steering order that inquiry control item is corresponding, using steering order as control information; If there is not the default instruction table of comparisons in local terminal, then using control item as control information.
Terminal system comprises the first system and second system; Control information for controlling hardware and/or the software of the first system, and/or controls hardware and/or the software of described second system.
Step S420, sends control information to terminal.
In one embodiment, before trigging control item, also comprise: pre-set the instruction table of comparisons; Wherein, have recorded the corresponding relation of control item and steering order in the instruction table of comparisons.Further, at end side or server side, the instruction table of comparisons is set.
Based on the instruction table of comparisons preset, server arranges control item in the user interface provided for user, and the control item that activated user is selected in the user interface.User is the authorized user of described terminal.
Application scenarios of the present invention is such as: after the terminal loss of user; other-end logon server can be passed through; select required control item in the user interface; server is according to obtaining and the control item of activated user selection; and issue control information to the terminal of user; the hardware of control terminal system and/or software, protect the data in terminal not stolen by disabled user with this.The hardware of control terminal system and/or software, as: make the data in terminal system deletion system, the hardware made in terminal system, software can not normally run.
Provide three the present invention preferably embodiment below, the present invention is described.
Embodiment one
Fig. 5 is the process flow diagram of the control method of terminal system according to a first embodiment of the present invention.
Step S510, pre-sets the instruction table of comparisons, and the instruction table of comparisons is stored in server.
The corresponding relation of control item and steering order is have recorded in the instruction table of comparisons.
The operation of the instruction table of comparisons can be set at server side, the operation of the instruction table of comparisons also can be set in end side.If arrange the instruction table of comparisons at server side, then server directly stores; If arrange the instruction table of comparisons in end side, then the instruction table of comparisons be provided with is uploaded onto the server, by the server stores instruction table of comparisons.
Step S520, server, based on the instruction table of comparisons prestored, arranges control item in the user interface provided for user at server.
Control item can be designed to the form of button.
Here the user of indication is the authorized user of terminal, that is to say the validated user of having the right to sending instructions under terminal.Such as: the owner of terminal.
Step S530, the control item that server triggers user selects in the user interface.
Authorized user can pass through other-end logon server, selects the control item needed in the user interface, to carry out Long-distance Control to terminal.
Step S540, server inquires about steering order corresponding to the control item that is triggered in the instruction table of comparisons, and this steering order is issued to terminal.
Step S550, terminal, after receiving steering order, performs this steering order in terminal system.
Embodiment two
Fig. 6 is the process flow diagram of the control method of terminal system according to a second embodiment of the present invention.
Step S610, pre-sets the instruction table of comparisons, and is stored in the terminal by the instruction table of comparisons.
By the instruction table of comparisons arranged at server side or end side, be finally stored in end side.
Step S620, server, based on the instruction table of comparisons, arranges control item in the user interface provided for user.
If the instruction table of comparisons is arranged in end side, so, server can obtain the instruction table of comparisons from terminal, and arranges control item according to the instruction table of comparisons.
Step S630, the control item that server triggers user selects in the user interface.
Step S640, the information of the control item that user selects is sent to terminal by server.
Step S650, terminal, after receiving the information of control item, inquires about the steering order that this control item is corresponding in the instruction table of comparisons, and in terminal system, perform this steering order.
Embodiment three
Terminal system comprises the first system and second system.Such as, the first system is conventional system, and second system is security system; The level of security of security system is higher than conventional system.And for example: the first system is Windows system, and second system is linux system.
In terminal system, perform described steering order, the hardware of control terminal system and/or software, comprising: in the first system, perform steering order, controls hardware and/or the software of the first system; Or, in second system, perform described steering order, control hardware and/or the software of second system.
The software of the first system and second system, hardware can be shared, also can separate use.Such as: the internal memory during the first system and second system all use, but use subregions different in internal memory.Therefore, when arranging control item and steering order corresponding to control item, for the software and hardware separately used, can embody is the process carried out the first system or second system; For the software and hardware shared, can not embody is the process carried out the first system or second system.
Such as: the handling object embodying control item and steering order in the instruction table of comparisons.The instruction table of comparisons such as shown in table 1, but it will be appreciated by those skilled in the art that the content in the instruction table of comparisons is not limited thereto.
Table 1
In Table 1, control item comprises: control content and kind.Control content for describing the process carried out terminal system; The kind of control item comprises startup control item, closing control item.Steering order implication is for describing the executive mode of steering order.Because the implementation of steering order is various, so only give the implication of steering order in table 1, concrete steering order is arranged according to applied environment.
In Table 1, the control content of the second system data dump that crashes from the first system is all that operating system (Operating System the is called for short OS) layer to terminal controls.
Wherein, after system in case of system halt is opened, crash at system start-up phase, if terminal is restarted again, still unloading phase crash, terminal can be made like this to run.Killing the object that application opens can be also can be that whole software processes to partial software.It can be delete data in this locality that data dump is opened, also can while data are deleted in this locality, by the data upload of deleting to server, so that can in local recovery data.
In Table 1, from front-facing camera to safety chip, controlling content, is all control the hardware layer of terminal.The hardware that can shield or lose efficacy in the first system or second system.Shielding refers to: make hardware temporarily unavailable; Inefficacy refers to: be that hardware can be used never.
Wherein, front-facing camera, fingerprint authentication are opened; all for verifying the identity of the user of handheld terminal; after this authentication; by the result upload server, user can check this result in the user interface, if be verified as disabled user; user can also trigger other control items, to protect the data in terminal.Card Reader pattern is closed, and terminal system cannot access customer identification module (Subscriber IdentityModule, be called for short SIM), and the information in such SIM card cannot be acquired.Charge mode is opened, then terminal cannot be charged, and cannot open after such terminal power exhausts.Display, power button are opened, then display, power button are by conductively-closed, and display can not show, and power button can not be user-operably, and cannot wipe shielding arrange by brush machine or restart.Safety chip, for running second system, therefore, controls safety chip, is namely control second system.Forbid that reading Trustzone forbids reading second system data, such second system cannot start, and the data in second system cannot be obtained.
Based on the corresponding relation of control item in table 1 and steering order, when control item is set in the user interface, the kind of control item can be arranged to the form of button, will the function declaration of content as button be controlled, when the user clicks on a button, the steering order that this button is corresponding is triggered.
For above-described embodiment, while the hardware and/or software execution predetermined registration operation of control terminal system, the process that record controls item and steering order performed, is stored in end side or server side by record content.Record content comprises: the process performed hardware and/or the software of terminal system.Such as: delete the relevant information of data in the first system and deleted data, recover the data in second system and be resumed the relevant information of data.Further, according to record content, Recovery processing is performed to the hardware carrying out in terminal system processing and/or software.Such as: the system of process of crashing makes it normal startup, the hardware of conductively-closed makes it to recover normal, deleted data and carries out recovering or carrying out downloading etc. from server side from end side.Further, if user wishes that terminal operating recovers normal, then the control item in user interface can be operated, trigger recovery operation.Such as: trigging control item is closed.
It should be noted that, if after hardware lost efficacy, can not process be resumed.
Present invention also offers a kind of control device of terminal system, this device is arranged on end side.
As shown in Figure 7, the end side structural drawing of control device for being terminal system according to an embodiment of the invention.
This device comprises:
Receiver module 710, for receiving control information.
Control module 720, for according to described control information, the hardware of control terminal system and/or software.
The function of the device described in the present embodiment is described in said method embodiment, therefore not detailed part in the description of the present embodiment, see the related description in previous embodiment, can not repeat at this.
Present invention also offers a kind of control device of terminal system, this device is arranged on server side.
As shown in Figure 8, the server-side configuration figure of control device for being terminal system according to an embodiment of the invention.
This device comprises:
Determination module 810, for according to the control item be triggered, determines control information; Wherein, described control information is used for hardware and/or the software of control terminal system.
Sending module 820, for sending described control information to described terminal.
The function of the device described in the present embodiment is described in said method embodiment, therefore not detailed part in the description of the present embodiment, see the related description in previous embodiment, can not repeat at this.
The foregoing is only embodiments of the invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within right of the present invention.
Claims (10)
1. a control method for terminal system, is characterized in that, comprising:
Receiving control information;
According to described control information, the hardware of control terminal system and/or software.
2. method according to claim 1, is characterized in that,
Described terminal system comprises the first system and second system;
Described according to described control information, the hardware of control terminal system and/or software, comprising:
According to described control information, control hardware and/or the software of described the first system; And/or,
According to described control information, control hardware and/or the software of described second system.
3. method according to claim 2, is characterized in that, described according to described control information, controls the hardware of described the first system and/or described second system, comprising:
According to described control information, the hardware shielding or lost efficacy in described the first system and/or described second system.
4. method according to claim 1, is characterized in that,
Described control information is control item or steering order;
Described according to described control information, the hardware of control terminal system and/or software, comprising:
If described control information is control item, then, in the instruction table of comparisons preset, inquires about the steering order that described control item is corresponding, and perform described steering order in described terminal system, to control hardware and/or the software of described terminal system;
If described control information is steering order, then in described terminal system, perform described steering order, to control hardware and/or the software of described terminal system.
5. a control device for terminal system, is characterized in that, the described device being arranged on end side comprises:
Receiver module, for receiving control information;
Control module, for according to described control information, the hardware of control terminal system and/or software.
6. a terminal, is characterized in that, described terminal comprises the control device of terminal system according to claim 5.
7. a control method for terminal system, is characterized in that, comprising:
According to the control item be triggered, determine control information; Wherein, described control information is used for hardware and/or the software of control terminal system;
Described control information is sent to described terminal.
8. method according to claim 7, is characterized in that,
Described terminal system comprises the first system and second system;
Described control information for controlling hardware and/or the software of described the first system, and/or controls hardware and/or the software of described second system.
9. method according to claim 7, is characterized in that,
Described control information is control item or steering order;
The control item that described basis is triggered, determine control information, comprising:
If local terminal exists the instruction table of comparisons preset, then in the described instruction table of comparisons, inquire about the steering order that described control item is corresponding, using described steering order as control information;
If there is not the default instruction table of comparisons in local terminal, then using described control item as control information.
10. a control device for terminal system, is characterized in that, the described device being arranged at server side comprises:
Determination module, for according to the control item be triggered, determines control information; Wherein, described control information is used for hardware and/or the software of control terminal system;
Sending module, for sending described control information to described terminal.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510026623.0A CN104537311A (en) | 2015-01-20 | 2015-01-20 | Terminal system control method and device, and terminal |
PCT/CN2015/073436 WO2016115760A1 (en) | 2015-01-20 | 2015-02-28 | Terminal system control method, device, and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510026623.0A CN104537311A (en) | 2015-01-20 | 2015-01-20 | Terminal system control method and device, and terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104537311A true CN104537311A (en) | 2015-04-22 |
Family
ID=52852833
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510026623.0A Pending CN104537311A (en) | 2015-01-20 | 2015-01-20 | Terminal system control method and device, and terminal |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN104537311A (en) |
WO (1) | WO2016115760A1 (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105094819A (en) * | 2015-07-15 | 2015-11-25 | 成都中科创达软件有限公司 | Control method and device for local and remote equipment |
CN105120100A (en) * | 2015-09-01 | 2015-12-02 | 广东欧珀移动通信有限公司 | Mobile terminal with theft anti-flashing function, and anti-flashing method of same |
CN105262885A (en) * | 2015-09-01 | 2016-01-20 | 广东欧珀移动通信有限公司 | Mobile terminal with card-locking anti-theft function and card-locking anti-theft method thereof |
CN105488440A (en) * | 2015-11-23 | 2016-04-13 | 广东欧珀移动通信有限公司 | Security protection method and terminal device |
CN107517301A (en) * | 2016-06-16 | 2017-12-26 | 成都鼎桥通信技术有限公司 | The data guard method and device of mobile terminal |
CN108959974A (en) * | 2018-06-29 | 2018-12-07 | 中国科学院信息工程研究所 | The safety protecting method and system of mobile terminal |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120154128A1 (en) * | 2010-12-16 | 2012-06-21 | Sunguk Cho | Apparatus and method for wirelessly controlling a system or appliance |
CN103914039A (en) * | 2013-12-31 | 2014-07-09 | 海尔集团公司 | Control method and system for household appliances |
CN103945385A (en) * | 2014-03-27 | 2014-07-23 | 宇龙计算机通信科技(深圳)有限公司 | Theft preventing method and device for mobile terminal |
CN104202370A (en) * | 2014-08-19 | 2014-12-10 | 广州金山网络科技有限公司 | Mobile terminal, remote control method, remote control system, server and remote control end thereof |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103606238B (en) * | 2013-11-22 | 2016-01-20 | 赵福贵 | mobile phone burglar alarm system |
CN103905649B (en) * | 2014-04-16 | 2017-08-15 | 北京联合大学 | A kind of mobile phone antitheft system based on Bluetooth technology |
-
2015
- 2015-01-20 CN CN201510026623.0A patent/CN104537311A/en active Pending
- 2015-02-28 WO PCT/CN2015/073436 patent/WO2016115760A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120154128A1 (en) * | 2010-12-16 | 2012-06-21 | Sunguk Cho | Apparatus and method for wirelessly controlling a system or appliance |
CN103914039A (en) * | 2013-12-31 | 2014-07-09 | 海尔集团公司 | Control method and system for household appliances |
CN103945385A (en) * | 2014-03-27 | 2014-07-23 | 宇龙计算机通信科技(深圳)有限公司 | Theft preventing method and device for mobile terminal |
CN104202370A (en) * | 2014-08-19 | 2014-12-10 | 广州金山网络科技有限公司 | Mobile terminal, remote control method, remote control system, server and remote control end thereof |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105094819A (en) * | 2015-07-15 | 2015-11-25 | 成都中科创达软件有限公司 | Control method and device for local and remote equipment |
CN105120100A (en) * | 2015-09-01 | 2015-12-02 | 广东欧珀移动通信有限公司 | Mobile terminal with theft anti-flashing function, and anti-flashing method of same |
CN105262885A (en) * | 2015-09-01 | 2016-01-20 | 广东欧珀移动通信有限公司 | Mobile terminal with card-locking anti-theft function and card-locking anti-theft method thereof |
CN105120100B (en) * | 2015-09-01 | 2018-01-19 | 广东欧珀移动通信有限公司 | It is a kind of that there is the mobile terminal for being stolen anti-brush machine function and its anti-brush machine method |
CN105262885B (en) * | 2015-09-01 | 2018-09-04 | 广东欧珀移动通信有限公司 | A kind of mobile terminal and its pintle hook lock theft preventing method with pintle hook lock anti-theft feature |
CN105488440A (en) * | 2015-11-23 | 2016-04-13 | 广东欧珀移动通信有限公司 | Security protection method and terminal device |
CN107517301A (en) * | 2016-06-16 | 2017-12-26 | 成都鼎桥通信技术有限公司 | The data guard method and device of mobile terminal |
CN108959974A (en) * | 2018-06-29 | 2018-12-07 | 中国科学院信息工程研究所 | The safety protecting method and system of mobile terminal |
Also Published As
Publication number | Publication date |
---|---|
WO2016115760A1 (en) | 2016-07-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12001857B2 (en) | Device locator disable authentication | |
CN104537311A (en) | Terminal system control method and device, and terminal | |
CN104376263B (en) | The method and apparatus that application behavior intercepts | |
US9792446B2 (en) | System and method for protecting data stored on a removable data storage device | |
CN102693381B (en) | Method, device and system for anti-theft of portable computer equipment | |
US9378344B2 (en) | Method and apparatus for protecting information based on data card | |
US9560527B2 (en) | Version protection method and apparatus for mobile terminal | |
CN110770728A (en) | Unmanned aerial vehicle control method, unmanned aerial vehicle and terminal for controlling unmanned aerial vehicle | |
CN102932741A (en) | Mobile phone antitheft tracking method and antitheft tracking mobile phone | |
US20120102565A1 (en) | Method and system for controlling the execution of a function protected by authentification of a user, in particular for the access to a resource | |
CN116456023A (en) | Terminal anti-theft method and terminal equipment | |
CN105809045A (en) | Method and device for processing equipment systems during data reset | |
US20150334565A1 (en) | Authentication method and authentication device for communication apparatus and communication apparatus | |
CN104732150A (en) | Starting method and device for mobile terminal | |
CN110619241A (en) | Terminal protection method and device | |
CN108600964B (en) | Mobile terminal tracking and positioning system | |
CN107154999B (en) | Terminal and unlocking method and storage device based on environmental information | |
CN110636493B (en) | Information backup method, device and equipment of virtual SIM card and storage medium | |
KR101873739B1 (en) | Mobile terminal and method for providing security thereto | |
JP5502049B2 (en) | Communication terminal and terminal control method | |
WO2018047203A1 (en) | A system and a method for locking a lost portable communication device | |
KR101871715B1 (en) | Mobile terminal and method for providing security thereto | |
CN117098136A (en) | Equipment protection method and related device | |
CN104298929A (en) | Payment equipment safety protection device and method | |
JP2008176647A (en) | Method for preventing unauthorized use of computer, device with unauthorized use preventing function, and program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20150422 |
|
RJ01 | Rejection of invention patent application after publication |