CN104822142A - Terminal - Google Patents

Terminal Download PDF

Info

Publication number
CN104822142A
CN104822142A CN201510142128.6A CN201510142128A CN104822142A CN 104822142 A CN104822142 A CN 104822142A CN 201510142128 A CN201510142128 A CN 201510142128A CN 104822142 A CN104822142 A CN 104822142A
Authority
CN
China
Prior art keywords
terminal
data
hardcore
data management
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510142128.6A
Other languages
Chinese (zh)
Inventor
柯卫卫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Jinli Communication Equipment Co Ltd
Original Assignee
Shenzhen Jinli Communication Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Jinli Communication Equipment Co Ltd filed Critical Shenzhen Jinli Communication Equipment Co Ltd
Priority to CN201510142128.6A priority Critical patent/CN104822142A/en
Publication of CN104822142A publication Critical patent/CN104822142A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • H04W8/24Transfer of terminal data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/725Cordless telephones

Abstract

An embodiment of the present invention discloses a terminal. The terminal comprises: a state detecting unit used for detecting whether a data management function of a home terminal is in an on state, an information receiving unit used for receiving processing information specific to core hardware for storing data, which is sent by a server, if detecting that the data management function is in the on state, and a controlling and processing unit used for controlling and processing the core hardware according to the processing information. The embodiment of the present invention can be used for avoiding data loss of the terminal, improving the security of the terminal and reducing the burglary risk of the terminal.

Description

A kind of terminal
Technical field
The present invention relates to communication technical field, particularly relate to a kind of terminal.
Background technology
Along with the fast development of terminal technology, the intelligent mobile terminal such as mobile phone, flat board has become instrument indispensable in people's life, and mobile terminal stores a large amount of personal data, once stolen or loss, personal data just exist by the hidden danger revealed, and cause huge loss and harm to user.
For mobile phone, at present for preventing the solution of hand-set from stolen from having a lot, but mainly concentrate on and how to give stolen mobile phone for change, such as, by obtaining the geographical location information of stolen mobile phone or following the trail of stolen mobile phone to stolen mobile phone transmission note, but this mode gives stolen mobile phone for change needs the regular hour, personal data still exist may by what reveal, affect user and obtain personal data in stolen mobile phone in time, likely cause economic loss to user, reduce the fail safe of mobile phone and create chance to thief to a certain extent.
Summary of the invention
The embodiment of the present invention provides a kind of terminal, can avoid the loss of terminal data, improves the fail safe of terminal, reduces the risk that terminal is stolen.
Embodiments provide a kind of terminal, can comprise:
Whether state detection unit, be in opening for the data management function detecting local terminal;
Information receiving unit, if for detecting that described data management function is in opening, then the process information for the hardcore for storing data of reception server transmission;
Manipulation processing unit, for carrying out manipulation process according to described process information to described hardcore.
In embodiments of the present invention, by when detecting that the data management function of local terminal is in opening, the process information for the hardcore for storing data that reception server sends, and according to process information, manipulation process is carried out to hardcore, the loss of terminal data can be avoided, improve the fail safe of terminal, and the molecule that effectively avoids theft utilizes terminal data to speculate, and can reduce the stolen risk of terminal to a certain extent.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme of the embodiment of the present invention, below the accompanying drawing used required in describing embodiment is briefly described, apparently, accompanying drawing in the following describes is some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the schematic flow sheet of a kind of data processing method that the embodiment of the present invention provides;
Fig. 2 is the schematic flow sheet of the method for the another kind of data processing that the embodiment of the present invention provides;
Fig. 3 is the schematic flow sheet of the method for another data processing that the embodiment of the present invention provides;
The circuit diagram smashing hardware components smashing tupe that Fig. 4 provides for the embodiment of the present invention;
The circuit diagram of the locking hardware components of the locking processing pattern that Fig. 5 provides for the embodiment of the present invention;
Fig. 6 is the structural representation of a kind of terminal that the embodiment of the present invention provides;
Fig. 7 is the structural representation of the manipulation processing unit that the embodiment of the present invention provides;
Fig. 8 is the structural representation of the another kind of terminal that the embodiment of the present invention provides;
Fig. 9 is the structural representation of another terminal that the embodiment of the present invention provides;
Figure 10 is the structural representation of another terminal that the embodiment of the present invention provides.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
The method of the data processing that the embodiment of the present invention provides can be applied to the scene of the data processing of the terminal after to stolen or loss, such as: whether the data management function that terminal detects local terminal is in opening, if detect, described data management function is in opening, the then process information for the hardcore for storing data of described terminal reception server transmission, described terminal carries out to described hardcore the scene etc. manipulating process according to described process information.The embodiment of the present invention can also be applied to the scene of the data obtained in the screen terminal that cannot normally use.The embodiment of the present invention can avoid the loss of terminal data, improve the fail safe of terminal, and the molecule that effectively avoids theft utilizes terminal data to speculate, and can reduce the stolen risk of terminal to a certain extent.
The terminal that the embodiment of the present invention relates to can include but not limited to the electronic equipments such as mobile phone, PAD (panel computer), intelligent wearable device, notebook computer.
The method of the data processing provided below in conjunction with accompanying drawing 1-accompanying drawing 3 pairs of embodiment of the present invention describes in detail.
Refer to Fig. 1, the schematic flow sheet of the method for a kind of data processing provided for the embodiment of the present invention, the method can comprise step S101-step S103.
S101, whether the data management function detecting local terminal is in opening.
Wherein, local terminal can be stolen after terminal, lose after terminal, screen damage terminal etc.The data management function of described terminal is realized by the system of defense of described terminal, and described system of defense comprises software section and hardware components, and described software section manipulation hardware components performs removes process or locking processing.Its software section is a background program; this program is not be integrated in the master operating system of described terminal; but to be embedded in the integrated circuit of described terminal in (certain register); like this can for storing the hardcore of data in terminal described in available protecting; even if described terminal is after by operations such as violence brush machine, formats; this program still can be run, and described hardcore can not be destroyed.
When detecting that terminal starts, described terminal just can automatically load and run described system of defense from integrated circuit, described system of defense need log in by data management account, when using described terminal first, described data management function is in non-logging status, and described terminal notifying user registers described data management account and logs in described data management function.Described terminal iidentification carries out registering as data management account and automatically logs in when described terminal starts by described terminal, described terminal iidentification is the exclusive identification code of described terminal---media interviews control (Media Access Control, MAC) address, but MAC Address is longer and do not have rule, be not easy to user's memory, therefore the data management account that the embodiment of the present invention provides also comprises secondary account, the user ID that user inputs by described terminal, as secondary account, facilitates user to remember.Described user ID and described terminal iidentification have unique incidence relation, and namely a terminal iidentification corresponds to a user ID.
If described terminal detects that described data management function is in logging status, then open described data management function; If described terminal detects that described data management function is not in logging status, then point out user's input for the user ID of described data management function and inputted user ID and described terminal iidentification are registered as described data management account, then the described data management account of registration is sent to server by described terminal, carries out association store to make described server to described user ID and described terminal iidentification.The server of described server corresponding to the data management function of terminal, for storing data management account, reception, transmission processing information.
S102, if detect, described data management function is in opening, then the process information for the hardcore for storing data of reception server transmission.
Concrete, if described terminal detects that described data management function is in opening, show that described terminal has used described terminal iidentification to log in described data management function.Make described terminal stolen or lose after can receive described server send the process information for the hardcore for storing data, the communication connection between described terminal and described server need be set up.Adopt described terminal iidentification and establish a communications link according to default connected mode and described server, described default connected mode can include but not limited to the connected modes such as wireless network connection, data traffic connection, near-field communication connection.
Described process information is described terminal iidentification corresponding to the user ID received by described whois lookup, and the information that sends is carried out according to described terminal iidentification, described process information is the information for controlling described terminal sent to described server by control ends such as personal computer (personal computer, PC) end or Web (webpage) ends.User utilizes described user ID at described control end, i.e. secondary account, log in the server corresponding to described data management function and select tupe, the tupe of described user ID and selection is synchronized to described server by described terminal, described server searches the described terminal iidentification corresponding to described user ID according to described user ID, and search the receiving terminal of described process information according to described terminal iidentification, i.e. described terminal.Described process information is used to indicate the corresponding manipulation process of described data management function execution to the hardcore for storing data.
S103, carries out manipulation process according to described process information to described hardcore.
Concrete, described process information comprises tupe, i.e. the tupe to described hardcore selected at described control end of user, and described tupe comprises and smashes tupe or locking processing pattern.Described smashing smashes hardware components in the corresponding described system of defense of tupe, the circuit diagram that described specific implementation process of smashing hardware components is shown in Figure 4, circuit diagram shown in Fig. 4 comprises instantaneous discharge unit, triggering discharges unit, data processing unit etc., central processing unit (the Central Processing Unit of described data processing unit and described terminal, CPU) be connected, described instantaneous discharge unit is connected with CPU with the internal storage location of described terminal, if the tupe in the described process information that described terminal receives is for smashing tupe, first by the described data processing unit process in Fig. 4, instantaneous discharge unit described in described triggering discharges unit controls produces high-tension current to smash CPU and the internal storage location of described terminal afterwards, namely the core cell for storing data is smashed, thus remove the data of described hardcore storage, the data of described terminal are made to use like this, delinquency prevention molecule utilizes data to make a profit, the data of effective protection terminal.
Locking hardware components in the corresponding described system of defense of described locking processing pattern, the circuit diagram that the specific implementation process of described locking hardware components is shown in Figure 5, circuit diagram shown in Fig. 5 comprises current interruption circuit, data processing unit etc., described current interruption circuit is connected with internal storage location with the CPU of described terminal, also be connected with the power supply of described terminal, described data processing unit is connected with the CPU of described terminal, if the tupe in the described process information that described terminal receives is locking processing pattern, described data processing unit in Fig. 5 first receives described process information, trigger described current interruption circuit afterwards and produce the power supply and CPU that block terminal described in current blocking, power supply between internal storage location, make described power supply cannot be CPU, internal storage location is powered, namely make the described hardcore for storing data cannot normal power supply, thus lock the data of described hardcore storage, can effectively prevent other people from stealing the data of described terminal.
Circuit diagram shown in Fig. 5 not only can realize the locking processing to described hardcore, can also realize the unblock process to described hardcore.When the described data processing unit in Fig. 5 receives described unblock process information, remove the control of described current interruption circuit to produce restoring current, recover the normal power supply between the power supply of described terminal and CPU, internal storage location, thus remove the locking to described hardcore.For mobile phone, if user gives mobile phone that is stolen or that lose for change, and the data of described mobile phone are locked, and by just can remove the locking to described data at control end unlatching unlocking functions such as PC end or Web ends, described mobile phone just can recover normal use.
In order to ensure user in terminal stolen or lose after still can obtain the data stored in described hardcore, before execution step S103, described terminal first obtains the data that store in described hardcore and by described data backup to described server, like this when looking for the terminal of not returning stolen or loss, user can by obtaining the data stored in described hardcore at the described control end server logged in corresponding to described data management function, while the described hardcore process to described terminal, ensure that user can obtain in time and use described data like this, avoid the loss that loss of data brings.
In embodiments of the present invention, by when detecting that the data management function of local terminal is in opening, the process information for the hardcore for storing data that reception server sends, and according to process information, manipulation process is carried out to hardcore, the loss of terminal data can be avoided, improve the fail safe of terminal, and the molecule that effectively avoids theft utilizes terminal data to speculate, and can reduce the stolen risk of terminal to a certain extent.
Refer to Fig. 2, be the schematic flow sheet of the another kind of data processing method that the embodiment of the present invention provides, the method can comprise step S201-step S210.
S201, obtains the user ID that the data management function for local terminal inputs.
Wherein, local terminal can be stolen after terminal, lose after terminal, screen damage terminal etc.The data management function of described terminal is realized by the system of defense of described terminal, and described system of defense comprises software section and hardware components, and described software section manipulation hardware components performs removes process or locking processing.Its software section is a background program; this program is not be integrated in the master operating system of described terminal; but to be embedded in the integrated circuit of described terminal in (certain register); like this can for storing the hardcore of data in terminal described in available protecting; even if described terminal is after by operations such as violence brush machine, formats; this program still can be run, and described hardcore can not be destroyed.
When using described terminal first, described terminal loads and runs described data management function from integrated circuit, prompting user input is for the user ID of the described data management function of described terminal, the secondary account of described user ID as data management account is registered, is convenient to user's memory.Described user ID also logs in server corresponding to described data management function for user at PC end or the control end such as Web end, described server for storing data management account, reception, transmission processing information.Described terminal obtains the user ID that user inputs for the described data management function of described terminal.
S202, is sent to server by the terminal iidentification of described user ID and local terminal, carries out association store to make described server to described user ID and described terminal iidentification.
Concrete, when using described terminal first, described terminal loads and runs described data management function from integrated circuit, and is registered by the primary account number of the terminal iidentification of described terminal as described data management account.Wherein, described terminal iidentification is the exclusive identification code of terminal---MAC Address, each terminal has unique and unmodifiable MAC Address, once registered described data management account, described terminal just can use described terminal iidentification automatically to log in described data management function when starting shooting.Described user ID and described terminal iidentification are sent to described server by described terminal, to make described server, association store is carried out to described user ID and described terminal iidentification, described user ID and described terminal iidentification have unique incidence relation, and namely a terminal iidentification corresponds to a user ID.
S203, detects described data management function and whether is in opening.
Concrete, whether be in logging status to judge whether by the described data management function detecting described terminal and open described data management function, if detect, described data management function is in logging status, then open described data management function; If detect, described data management function is not in logging status, then point out user's input for the user ID of described data management function and inputted user ID and described terminal iidentification are registered as described data management account, then the described data management account of registration is sent to described server, to make described server, association store is carried out to described user ID and described terminal iidentification.
S204, if detect, described data management function is in opening, adopts described terminal iidentification and establishes a communications link according to default connected mode and server.
Concrete, if described terminal detects that described data management function is in opening, show that described terminal has used described terminal iidentification to log in described data management function.Make described terminal stolen or lose after can receive described server send the process information for the hardcore for storing data, the communication connection between described terminal and described server need be set up.Adopt described terminal iidentification and establish a communications link according to default connected mode and described server, described default connected mode can include but not limited to the connected modes such as wireless network connection, data traffic connection, near-field communication connection.
S205, the process information of the hardcore to storage data that reception server sends.
Wherein, described process information is described terminal iidentification corresponding to the user ID received by described whois lookup, and the information that sends is carried out according to described terminal iidentification, described process information is held by PC or the information for controlling described terminal that the control end such as Web end sends to described server.User utilizes described user ID at described control end, i.e. secondary account, log in the server corresponding to described data management function and select tupe, the tupe of described user ID and selection is synchronized to described server by described terminal, described server searches the described terminal iidentification corresponding to described user ID according to described user ID, and search the receiving terminal of described process information according to described terminal iidentification, i.e. described terminal.Described process information is used to indicate the corresponding manipulation process of described data management function execution to the hardcore for storing data.
S206, obtains the data that store in described hardcore and by described data backup to described server.
In order to ensure user in described terminal stolen or lose after still can obtain the data stored in described hardcore, described terminal first obtains the data that store in described hardcore and by described data backup to described server, like this when looking for the terminal of not returning stolen or loss, user can by obtaining the data stored in described hardcore at the described control end server logged in corresponding to described data management function, while the described hardcore process to described terminal, ensure that user can obtain in time and use described data like this, avoid the loss that loss of data brings.
S207, judges the tupe in described process information.
Wherein, described tupe is the tupe to described hardcore that user selects at described control end, comprises and smashes tupe or locking processing pattern.
S208, when described tupe for described in smash tupe time, data dump process is carried out to described hardcore.
Concrete, described smashing smashes hardware components in the corresponding described system of defense of tupe, the circuit diagram that described specific implementation process of smashing hardware components is shown in Figure 4, circuit diagram shown in Fig. 4 comprises instantaneous discharge unit, triggering discharges unit, data processing unit etc., described data processing unit is connected with the CPU of described terminal, described instantaneous discharge unit is connected with CPU with the internal storage location of described terminal, if the tupe in the described process information that described terminal receives is for smashing tupe, first by the described data processing unit process in Fig. 4, instantaneous discharge unit described in described triggering discharges unit controls produces high-tension current to smash CPU and the internal storage location of described terminal afterwards, namely the core cell for storing data is smashed, thus remove the data of described hardcore storage, the data of described terminal are made to use like this, delinquency prevention molecule utilizes data to make a profit, the data of effective protection terminal.
S209, when described tupe is described locking processing pattern, carries out data interlock process to described hardcore.
Concrete, locking hardware components in the corresponding described system of defense of described locking processing pattern, the circuit diagram that the specific implementation process of described locking hardware components is shown in Figure 5, circuit diagram shown in Fig. 5 comprises current interruption circuit, data processing unit etc., described current interruption circuit is connected with internal storage location with the CPU of described terminal, also be connected with the power supply of described terminal, described data processing unit is connected with the CPU of described terminal, if the tupe in the described process information that described terminal receives is locking processing pattern, described data processing unit in Fig. 5 first receives described process information, trigger described current interruption circuit afterwards and produce the power supply and CPU that block terminal described in current blocking, power supply between internal storage location, make described power supply cannot be CPU, internal storage location is powered, namely make the described hardcore for storing data cannot normal power supply, thus lock the data of described hardcore storage, can effectively prevent other people from stealing the data of described terminal.
S210, when receiving the unblock process information to described hardcore that described server sends, carries out unlocking data process to described hardcore.
Concrete, when described terminal receives the unblock process information to described hardcore of described server transmission, show that terminal that is stolen or that lose is given for change, described terminal is called described data management function and is carried out unlocking data process to described hardcore.Circuit diagram shown in Fig. 5 not only can realize the locking processing to described hardcore, can also realize the unblock process to described hardcore.Refer to Fig. 5, when the described data processing unit in Fig. 5 receives described unblock process information, remove the control of described current interruption circuit to produce restoring current, recover the normal power supply between the power supply of described terminal and CPU, internal storage location, thus remove the locking to described hardcore.For mobile phone, if user gives mobile phone that is stolen or that lose for change, and the data of described mobile phone are locked, and by just can contact the locking to described data at control end unlatching unlocking functions such as PC end or Web ends, described mobile phone just can recover normal use.
In embodiments of the present invention, by when detecting that the data management function of local terminal is in opening, the process information for the hardcore for storing data that reception server sends, and according to process information, manipulation process is carried out to hardcore, the loss of terminal data can be avoided, improve the fail safe of terminal.The described terminal iidentification corresponding according to received user ID searches terminal that is stolen or that lose, improves the accuracy of data processing.
Refer to Fig. 3, the schematic flow sheet of the method for another data processing provided for the embodiment of the present invention, the method can comprise step S301-step S310.
S301, receives the enabling signal of local terminal and judges the whether registered data management account of local terminal when receiving described enabling signal.
Wherein, local terminal can be stolen after terminal, lose after terminal, screen damage terminal etc.The data management function of described terminal is realized by the system of defense of described terminal, and described system of defense comprises software section and hardware components, and described software section manipulation hardware components performs removes process or locking processing.Its software section is a background program; this program is not be integrated in the master operating system of described terminal; but to be embedded in the integrated circuit of described terminal in (certain register); like this can for storing the hardcore of data in terminal described in available protecting; even if described terminal is after by operations such as violence brush machine, formats; this program still can be run, and described hardcore can not be destroyed.
Receive the enabling signal of described terminal and load from integrated circuit when receiving described enabling signal and run described data management function, judging the whether registered data management account of described terminal.
S302, when the result judged is no, prompting user inputs the user ID for the data management function of local terminal and is registered as described data management account by the terminal iidentification of inputted user ID and local terminal.
Concrete, when the result judged is no, though show that described data management function is in running status but is not unlocked, described terminal notifying user inputs the user ID for the data management function of described terminal and the terminal iidentification of inputted user ID and described terminal is carried out registration to open described data management function as described data management account.Wherein, described terminal iidentification is the exclusive identification code of terminal---MAC Address, each terminal has unique and unmodifiable MAC Address, once registered described data management account, described terminal just can use described terminal iidentification automatically to log in described data management function when starting shooting.But MAC Address is longer and do not have rule, be not easy to user's memory, the data management account that therefore embodiment of the present invention provides also comprises secondary account, and user ID user inputted is as secondary account so that user's memory.Described user ID also logs in the server corresponding to described data management function for control end described in user, described server for storing data management account, receive, transmission processing information.Described user ID and described terminal iidentification have unique incidence relation, and namely a terminal iidentification corresponds to a user ID.
The embodiment of the present invention all can judge the whether registered data management account of described terminal when described terminal is started shooting each time; if the result judged is no; user is then pointed out to register described data management account; employing repeatedly judges and the mode of reminding guarantees that user can use the data management function of described terminal, reaches the object of protection terminal data.
S303, detects described data management function and whether is in opening.
Concrete, whether be in logging status to judge whether by the described data management function detecting described terminal and open described data management function, if detect, described data management function is in logging status, then open described data management function; If detect, described data management function is not in logging status, then point out user's input for the user ID of described data management function and inputted user ID and described terminal iidentification are registered as described data management account, then the described data management account of registration is sent to described server, to make described server, association store is carried out to described user ID and described terminal iidentification.
S304, if detect, described data management function is in opening, adopts described terminal iidentification and establishes a communications link according to default connected mode and server.
Concrete, if described terminal detects that described data management function is in opening, show that described terminal has used described terminal iidentification to log in described data management function.Make described terminal stolen or lose after can receive described server send the process information for the hardcore for storing data, the communication connection between described terminal and described server need be set up.Adopt described terminal iidentification and establish a communications link according to default connected mode and described server, described default connected mode can include but not limited to the connected modes such as wireless network connection, data traffic connection, near-field communication connection.
S305, the process information of the hardcore to storage data that reception server sends.
Wherein, described process information is described terminal iidentification corresponding to the user ID received by described whois lookup, and the information that sends is carried out according to described terminal iidentification, described process information is held by PC or the information for controlling described terminal that the control end such as Web end sends to described server.User utilizes described user ID at described control end, i.e. secondary account, log in the server corresponding to described data management function and select tupe, the tupe of described user ID and selection is synchronized to described server by described terminal, described server searches the described terminal iidentification corresponding to described user ID according to described user ID, and search the receiving terminal of described process information according to described terminal iidentification, i.e. described terminal.Described process information is used to indicate the corresponding manipulation process of described data management function execution to the hardcore for storing data.
S306, obtains the data that store in described hardcore and by described data backup to described server.
In order to ensure user in described terminal stolen or lose after still can obtain the data stored in described hardcore, described terminal first obtains the data that store in described hardcore and by described data backup to described server, like this when looking for the terminal of not returning stolen or loss, user can by obtaining the data stored in described hardcore at the described control end server logged in corresponding to described data management function, while the described hardcore process to described terminal, ensure that user can obtain in time and use described data like this, avoid the loss that loss of data brings.
S307, judges the tupe in described process information.
Wherein, described tupe is the tupe to described hardcore that user selects at described control end, comprises and smashes tupe or locking processing pattern.
S308, when described tupe for described in smash tupe time, data dump process is carried out to described hardcore.
Concrete, described smashing smashes hardware components in the corresponding described system of defense of tupe, the circuit diagram that described specific implementation process of smashing hardware components is shown in Figure 4, circuit diagram shown in Fig. 4 comprises instantaneous discharge unit, triggering discharges unit, data processing unit etc., described data processing unit is connected with the CPU of described terminal, described instantaneous discharge unit is connected with CPU with the internal storage location of described terminal, if the tupe in the described process information that described terminal receives is for smashing tupe, first by the described data processing unit process in Fig. 4, instantaneous discharge unit described in described triggering discharges unit controls produces high-tension current to smash CPU and the internal storage location of described terminal afterwards, namely the core cell for storing data is smashed, thus remove the data of described hardcore storage, the data of described terminal are made to use like this, delinquency prevention molecule utilizes data to make a profit, the data of effective protection terminal.
S309, when described tupe is described locking processing pattern, carries out data interlock process to described hardcore.
Concrete, locking hardware components in the corresponding described system of defense of described locking processing pattern, the circuit diagram that the specific implementation process of described locking hardware components is shown in Figure 5, circuit diagram shown in Fig. 5 comprises current interruption circuit, data processing unit etc., described current interruption circuit is connected with internal storage location with the CPU of described terminal, also be connected with the power supply of described terminal, described data processing unit is connected with the CPU of described terminal, if the tupe in the described process information that described terminal receives is locking processing pattern, described data processing unit in Fig. 5 first receives described process information, trigger described current interruption circuit afterwards and produce the power supply and CPU that block terminal described in current blocking, power supply between internal storage location, make described power supply cannot be CPU, internal storage location is powered, namely make the described hardcore for storing data cannot normal power supply, thus lock the data of described hardcore storage, can effectively prevent other people from stealing the data of described terminal.
S310, when receiving the unblock process information to described hardcore that described server sends, carries out unlocking data process to described hardcore.
Concrete, when described terminal receives the unblock process information to described hardcore of described server transmission, show that terminal that is stolen or that lose is given for change, described terminal is called described data management function and is carried out unlocking data process to described hardcore.Circuit diagram shown in Fig. 5 not only can realize the locking processing to described hardcore, can also realize the unblock process to described hardcore.Refer to Fig. 5, when the described data processing unit in Fig. 5 receives described unblock process information, remove the control of described current interruption circuit to produce restoring current, recover the normal power supply between the power supply of described terminal and CPU, internal storage location, thus remove the locking to described hardcore.For mobile phone, if user gives mobile phone that is stolen or that lose for change, and the data of described mobile phone are locked, and by just can contact the locking to described data at control end unlatching unlocking functions such as PC end or Web ends, described mobile phone just can recover normal use.
In embodiments of the present invention, by when detecting that the data management function of local terminal is in opening, the process information for the hardcore for storing data that reception server sends, and according to process information, manipulation process is carried out to hardcore, the loss of terminal data can be avoided, improve the fail safe of terminal.The described terminal iidentification corresponding according to received user ID searches terminal that is stolen or that lose, improves the accuracy of data processing.The embodiment of the present invention all can judge the whether registered data management account of described terminal when terminal is started shooting each time, employing repeatedly judges and the mode of reminding guarantees that user can use the data management function of terminal, reaches the object of protection terminal data.
It should be noted that, embodiment shown in Fig. 2 is that terminal is when using first, log-on data management account also carries out to hardcore the situation manipulating process, embodiment shown in Fig. 3 be terminal when starting at every turn, judge the whether registered data management account of terminal and under registered condition to hardcore carry out manipulate process situation.Also the step S201 shown in Fig. 2 and S202 can be first performed before performing the step S301 shown in Fig. 3, the i.e. log-on data management account when terminal uses first, perform the step S201 shown in Fig. 2 and S202, and the step S301 shown in Fig. 3 can be performed too when each startup terminal.
The terminal provided below in conjunction with accompanying drawing 6-accompanying drawing 9 pairs of embodiment of the present invention describes in detail.It should be noted that, the terminal shown in accompanying drawing 6-accompanying drawing 9, for performing the method for Fig. 1 of the present invention-embodiment illustrated in fig. 3, for convenience of explanation, illustrate only the part relevant to the embodiment of the present invention, concrete ins and outs do not disclose, and please refer to the embodiment shown in Fig. 1-Fig. 3 of the present invention.
Referring to Fig. 6, is the structural representation of a kind of terminal provided by the invention; This terminal 10 can comprise: state detection unit 101, information receiving unit 102 and manipulation processing unit 103.
Whether state detection unit 101, be in opening for the data management function detecting local terminal.
Wherein, described terminal 10 can be stolen after terminal, lose after terminal, screen damage terminal etc.The data management function of described terminal 10 is realized by the system of defense of described terminal 10, and described system of defense comprises software section and hardware components, and described software section manipulation hardware components performs removes process or locking processing.Its software section is a background program; this program is not be integrated in the master operating system of described terminal 10; but to be embedded in the integrated circuit of described terminal 10 in (certain register); like this can for storing the hardcore of data in terminal 10 described in available protecting; even if described terminal 10 is after by operations such as violence brush machine, formats; this program still can be run, and described hardcore can not be destroyed.
In specific implementation, when detecting that described terminal 10 starts, just can automatically load from integrated circuit and run described system of defense, described system of defense need log in by data management account, when using described terminal 10 first, described data management function is in non-logging status, and described terminal 10 points out user register described data management account and log in described data management function.Described terminal iidentification carries out registering as data management account and automatically logs in when described terminal 10 starts by described terminal 10, described terminal iidentification is exclusive identification code---the MAC Address of described terminal 10, but MAC Address is longer and do not have rule, be not easy to user's memory, therefore the data management account that the embodiment of the present invention provides also comprises secondary account, and the user ID that user inputs by described terminal 10 is as secondary account so that user remembers.Described user ID and described terminal iidentification have unique incidence relation, and namely a terminal iidentification corresponds to a user ID.
Whether described state detection unit 101 is in logging status and detects described data management function by detecting described data management function and whether be in opening, if described state detection unit 101 detects that described data management function is in logging status, then described data management function is in opening; If described state detection unit 101 detects that described data management function is in non-logging status, then described data management function is in non-opening, prompting user inputs the user ID for described data management function and inputted user ID and described terminal iidentification is registered as described data management account, then the described data management account of registration is sent to server by described terminal 10, carries out association store to make described server to described user ID and described terminal iidentification.The server of described server corresponding to the data management function of described terminal 10, for storing data management account, reception, transmission processing information.
Information receiving unit 102, if for detecting that described data management function is in opening, then the process information for the hardcore for storing data of reception server transmission.
In specific implementation, when described state detection unit 101 detects that described data management function is in opening, show that described terminal 10 has used described terminal iidentification to log in described data management function, described information receiving unit 102 receives the process information for the hardcore for storing data that described server sends.Make described terminal 10 stolen or lose after can receive described process information, the communication connection between described terminal 10 and described server need be set up.Adopt described terminal iidentification and establish a communications link according to default connected mode and server, described default connected mode can include but not limited to the connected modes such as wireless network connection, data traffic connection, near-field communication connection.
Described process information is described terminal iidentification corresponding to the user ID received by described whois lookup, and the information that sends is carried out according to described terminal iidentification, described process information is held by PC or the information for controlling described terminal 10 that the control end such as Web end sends to described server.User utilizes described user ID at described control end, i.e. secondary account, log in the server corresponding to described data management function and select tupe, the tupe of described user ID and selection is synchronized to described server by described terminal 10, described server searches the described terminal iidentification corresponding to described user ID according to described user ID, and search the receiving terminal of described process information according to described terminal iidentification, i.e. described terminal 10.Described process information is used to indicate the corresponding manipulation process of described data management function execution to the hardcore for storing data.
Manipulation processing unit 103, for carrying out manipulation process according to described process information to described hardcore.
In specific implementation, described manipulation processing unit 103 manipulates process according to tupe in described process information accordingly to described hardcore, wherein, described tupe is the tupe to described hardcore that user selects at described control end, comprises and smashes tupe or locking processing pattern.When described tupe for described in smash tupe time, described manipulation processing unit 103 carries out data dump process to described hardcore; When described tupe is described locking processing pattern, described manipulation processing unit 103 carries out data interlock process to described hardcore.
Concrete, refer to Fig. 7, for the structural representation of the manipulation processing unit that the embodiment of the present invention provides, as shown in Figure 7, shown manipulation processing unit 103 can comprise mode determination 1301, removing processing unit 1302, lock processing unit 1303 and unlock processing unit 1304.
Mode determination 1301, for judging the tupe in described process information.
In specific implementation, described mode determination 1301 judges the tupe in described process information, and described tupe comprises and smashes tupe or locking processing pattern.
Remove processing unit 1302, for when described tupe for described in smash tupe time, data dump process is carried out to described hardcore.
In specific implementation, when the tupe that described mode determination 1301 judges is as smashing tupe, described removing processing unit 1302 carries out data dump process to described hardcore.Described smashing smashes hardware components in the corresponding described system of defense of tupe, the circuit diagram that described specific implementation process of smashing hardware components is shown in Figure 4, circuit diagram shown in Fig. 4 comprises instantaneous discharge unit, triggering discharges unit, data processing unit etc., described data processing unit is connected with the CPU of described terminal 10, described instantaneous discharge unit is connected with CPU with the internal storage location of described terminal 10, if the tupe in the described process information that described terminal 10 receives is for smashing tupe, first by the described data processing unit process in Fig. 4, instantaneous discharge unit described in described triggering discharges unit controls produces high-tension current to smash CPU and the internal storage location of described terminal 10 afterwards, namely the core cell for storing data is smashed, thus remove the data of described hardcore storage, the data of described terminal 10 are made to use like this, delinquency prevention molecule utilizes data to make a profit, the data of the described terminal 10 of effective protection.
Lock processing unit 1303, for when described tupe is described locking processing pattern, carries out data interlock process to described hardcore.
In specific implementation, when the tupe that described mode determination 1301 judges is locking processing pattern, described lock processing unit 1303 carries out data interlock process to described hardcore.Locking hardware components in the corresponding described system of defense of described locking processing pattern, the circuit diagram that the specific implementation process of described locking hardware components is shown in Figure 5, circuit diagram shown in Fig. 5 comprises current interruption circuit, data processing unit etc., described current interruption circuit is connected with internal storage location with the CPU of described terminal 10, also be connected with the power supply of described terminal 10, described data processing unit is connected with the CPU of described terminal 10, if the tupe in the described process information that described terminal 10 receives is locking processing pattern, described lock processing unit 1303 in Fig. 5 triggers described current interruption circuit and produces the power supply and CPU that block terminal described in current blocking, power supply between internal storage location, make described power supply cannot be CPU, internal storage location is powered, namely make the described hardcore for storing data cannot normal power supply, thus lock the data of described hardcore storage, can effectively prevent other people from stealing the data of described terminal 10.
Unlocking processing unit 1304, for when receiving the unblock process information to described hardcore that described server sends, unlocking data process being carried out to described hardcore.
In specific implementation, after described lock processing unit 1303 carries out data interlock process to described hardcore, described terminal 10 receives again the unblock process information to described hardcore that described server sends, show that described terminal 10 that is stolen or that lose is given for change, described unblock processing unit 1304 calls described data management function and carries out unlocking data process to described hardcore.Circuit diagram shown in Fig. 5 not only can realize the locking processing to described hardcore, can also realize the unblock process to described hardcore.Refer to Fig. 5, when the described data processing unit in Fig. 5 receives described unblock process information, remove the control of described current interruption circuit to produce restoring current, recover the normal power supply between the power supply of described terminal 10 and CPU, internal storage location, thus remove the locking to described hardcore.For mobile phone, if user gives mobile phone that is stolen or that lose for change, and the data of described mobile phone are locked, and by just can contact the locking to described data at control end unlatching unlocking functions such as PC end or Web ends, described mobile phone just can recover normal use.
In embodiments of the present invention, by when detecting that the data management function of local terminal is in opening, the process information for the hardcore for storing data that reception server sends, and according to process information, manipulation process is carried out to hardcore, the loss of terminal data can be avoided, improve the fail safe of terminal, and the molecule that effectively avoids theft utilizes terminal data to speculate, and can reduce the stolen risk of terminal to a certain extent.
Referring to Fig. 8, is the structural representation of another kind of terminal provided by the invention; This terminal 20 can comprise: mark acquiring unit 201, mark transmitting element 202, state detection unit 203, communication connection unit 204, information receiving unit 205, data backup unit 206 and manipulation processing unit 207; Wherein, the concrete structure of described manipulation processing unit 207 can the specific descriptions of described manipulation processing unit 103 of embodiment shown in Figure 7, do not repeat at this.
Mark acquiring unit 201, the user ID that the data management function for obtaining for local terminal inputs.
Wherein, described terminal 20 can be stolen after terminal, lose after terminal, screen damage terminal etc.The data management function of described terminal 20 is realized by the system of defense of described terminal 20, and described system of defense comprises software section and hardware components, and described software section manipulation hardware components performs removes process or locking processing.Its software section is a background program; this program is not be integrated in the master operating system of described terminal 20; but to be embedded in the integrated circuit of described terminal 20 in (certain register); like this can for storing the hardcore of data in terminal 20 described in available protecting; even if described terminal 20 is after by operations such as violence brush machine, formats; this program still can be run, and described hardcore can not be destroyed.
In specific implementation, when using described terminal 20 first, load from integrated circuit and run described data management function, described terminal 20 points out user to input user ID for described data management function, and described mark acquiring unit 201 obtains described user ID.The secondary account of described user ID as data management account is registered by described terminal 20, is convenient to user's memory.Described user ID also logs in server corresponding to described data management function for user at PC end or the control end such as Web end, described server for storing data management account, reception, transmission processing information.Described terminal 20 obtains the user ID that user inputs for the described data management function of local terminal.
Mark transmitting element 202, for the terminal iidentification of described user ID and local terminal is sent to server, carries out association store to make described server to described user ID and described terminal iidentification.
In specific implementation, when using described terminal 20 first, described terminal 20 loads and runs described data management function from integrated circuit, and is registered by the primary account number of described terminal iidentification as described data management account.Wherein, described terminal iidentification is exclusive identification code---the MAC Address of described terminal 20, each terminal has unique and unmodifiable MAC Address, once registered described data management account, described terminal 20 just can use described terminal iidentification automatically to log in described data management function when starting shooting.The described user ID that described mark acquiring unit 201 gets by described mark transmitting element 202 and described terminal iidentification are sent to described server, to make described server, association store is carried out to described user ID and described terminal iidentification, described user ID and described terminal iidentification have unique incidence relation, and namely a terminal iidentification corresponds to a user ID.
Whether state detection unit 203, be in opening for detecting described data management function.
In specific implementation, whether described state detection unit 203 is in logging status and detects described data management function by detecting described data management function and whether be in opening, if described state detection unit 203 detects that described data management function is in logging status, then described data management function is in opening; If described state detection unit 203 detects that described data management function is in non-logging status, then described data management function is in non-opening, prompting user inputs the user ID for described data management function and inputted user ID and described terminal iidentification is registered as described data management account, then the described data management account of registration is sent to server, the described user ID got described mark acquiring unit 201 to make described server and described terminal iidentification carry out association store.
Communication connection unit 204, if for detecting that described data management function is in opening, adopting described terminal iidentification and establishing a communications link according to default connected mode and server.
In specific implementation, if described state detection unit 203 detects that described data management function is in opening, show that described terminal 20 has used described terminal iidentification to log in described data management function.Make described terminal 20 stolen or lose after can receive described server transmission the process information for the hardcore for storing data, the communication connection between described terminal 20 and described server need be set up.Described communication connection unit 204 adopts described terminal iidentification and establishes a communications link according to default connected mode and server, and described default connected mode can include but not limited to the connected modes such as wireless network connection, data traffic connection, near-field communication connection.
Information receiving unit 205, for the process information of the hardcore to storage data that reception server sends.
In specific implementation, the process information of the hardcore to storage data that described information receiving unit 205 reception server sends.Wherein, described process information is described terminal iidentification corresponding to the user ID received by described whois lookup, and the information that sends is carried out according to described terminal iidentification, described process information is held by PC or the information for controlling described terminal 20 that the control end such as Web end sends to described server.User utilizes described user ID at control ends such as PC end or Web ends, i.e. secondary account, log in the server corresponding to described data management function and select tupe, the tupe of described user ID and selection is synchronized to described server by described terminal 20, described server searches the described terminal iidentification corresponding to described user ID according to described user ID, and search the receiving terminal of described process information according to described terminal iidentification, i.e. described terminal 20.Described process information is used to indicate the corresponding manipulation process of described data management function execution to the hardcore for storing data.
Data backup unit 206, for obtaining the data that store in described hardcore and by described data backup to described server.
In specific implementation, in order to ensure user in described terminal 20 stolen or lose after still can obtain the data stored in described hardcore, data utilizing described data backup unit 206 to obtain to store in described hardcore by described data backup to described server, like this when looking for do not return stolen or loss described terminal 20, user can by obtaining the data stored in described hardcore at the described control end server logged in corresponding to described data management function, while the described hardcore process to described terminal 20, ensure that user can obtain in time and use described data like this, avoid the loss that loss of data brings.
Manipulation processing unit 207, for carrying out manipulation process according to described process information to described hardcore.
In embodiments of the present invention, by when detecting that the data management function of local terminal is in opening, the process information for the hardcore for storing data that reception server sends, and according to process information, manipulation process is carried out to hardcore, the loss of terminal data can be avoided, improve the fail safe of terminal.The described terminal iidentification corresponding according to received user ID searches terminal that is stolen or that lose, improves the accuracy of data processing.
Referring to Fig. 9, is the structural representation of another terminal provided by the invention; This terminal 30 can comprise: account judging unit 301, account registering unit 302, state detection unit 303, communication connection unit 304, information receiving unit 305, data backup unit 306 and manipulation processing unit 307; Wherein, the concrete structure of described state detection unit 303, described communication connection unit 304, described information receiving unit 305, described data backup unit 306 and described manipulation processing unit 307 can distinguish the specific descriptions of the described state detection unit 203 of embodiment shown in Figure 8, described communication connection unit 204, described information receiving unit 205, described data backup unit 206 and described manipulation processing unit 207, does not repeat at this.
Account judging unit 301, for receiving the enabling signal of local terminal and judging the whether registered data management account of local terminal when receiving described enabling signal.
Wherein, described terminal 30 can be stolen after terminal, lose after terminal, screen damage terminal etc.The data management function of described terminal 30 is realized by the system of defense of described terminal 30, and described system of defense comprises software section and hardware components, and described software section manipulation hardware components performs removes process or locking processing.Its software section is a background program; this program is not be integrated in the master operating system of described terminal 30; but to be embedded in the integrated circuit of described terminal 30 in (certain register); like this can for storing the hardcore of data in terminal 30 described in available protecting; even if described terminal 30 is after by operations such as violence brush machine, formats; this program still can be run, and described hardcore can not be destroyed.
Receive the enabling signal of described terminal 30 and load from integrated circuit when receiving described enabling signal and run described data management function, described account judging unit 301 judges the whether registered data management account of described terminal 30.
Account registering unit 302, for when the result judged is no, prompting user inputs the user ID for the data management function of local terminal and is registered as described data management account by the terminal iidentification of inputted user ID and local terminal.
In specific implementation, when the result of the judgement of described account judging unit 301 is no, though show that described data management function is in running status but is not unlocked, described account registering unit 302 points out user input the user ID for the data management function of described terminal 30 and the terminal iidentification of inputted user ID and described terminal 30 is carried out registration to open described data management function as described data management account.Wherein, described terminal iidentification is exclusive identification code---the MAC Address of described terminal 30, each terminal has unique and unmodifiable MAC Address, once registered described data management account, described terminal 30 just can use described terminal iidentification automatically to log in described data management function when starting shooting.But MAC Address is longer and do not have rule, be not easy to user's memory, the data management account that therefore embodiment of the present invention provides also comprises secondary account, and user ID user inputted is as secondary account so that user's memory.Described user ID also logs in the server corresponding to described data management function for control end described in user, described server for storing data management account, receive, transmission processing information.Described user ID and described terminal iidentification have unique incidence relation, and namely a terminal iidentification corresponds to a user ID.
Described account judging unit 301 all can judge the whether registered data management account of described terminal 30 when described terminal 30 is started shooting each time; if the result judged is no; then described account registering unit 302 points out user to register described data management account; employing repeatedly judges and the mode of reminding guarantees that user can use the data management function of described terminal 30, reaches the object of protection terminal data.
Whether state detection unit 303, be in opening for detecting described data management function.
Communication connection unit 304, if for detecting that described data management function is in opening, adopting described terminal iidentification and establishing a communications link according to default connected mode and server.
Information receiving unit 305, for the process information of the hardcore to storage data that reception server sends.
Data backup unit 306, for obtaining the data that store in described hardcore and by described data backup to described server.
Manipulation processing unit 307, for carrying out manipulation process according to described process information to described hardcore.
In embodiments of the present invention, by when detecting that the data management function of local terminal is in opening, the process information for the hardcore for storing data that reception server sends, and according to process information, manipulation process is carried out to hardcore, the loss of terminal data can be avoided, improve the fail safe of terminal.The terminal iidentification corresponding according to received user ID searches terminal that is stolen or that lose, improves the accuracy of data processing.The embodiment of the present invention all can judge the whether registered data management account of terminal when described terminal is started shooting each time, employing repeatedly judges and the mode of reminding guarantees that user can use the data management function of terminal, reaches the object of protection terminal data.
It should be noted that, mark acquiring unit 201 in terminal 20 shown in Fig. 8, mark transmitting element 202 can perform the registration of data management account when using first, account judging unit 301 in terminal 30 shown in Fig. 9 all can judge whether registered data management account when each startup, therefore acquiring unit 201 is identified, mark transmitting element 202 and account judging unit 301 can be present in a terminal simultaneously, namely the registration of data management account not only can be carried out when using first, also can when each terminal starts, again carry out judging whether registered data management account.
Refer to Figure 10, for embodiments providing the structural representation of another terminal.As shown in Figure 10, this terminal comprises: at least one processor 1001, such as CPU, input equipment 1003, output equipment 1004, memory 1005, at least one communication bus 1002, described processor 1001 can be referred to as hardcore with described memory 1005, does not indicate in Fig. 10.Wherein, communication bus 1002 is for realizing the connection communication between these assemblies.Wherein, memory 1005 can be high-speed RAM memory, also can be non-labile memory (non-volatile memory), such as at least one magnetic disc store.Wherein processor 1001 can terminal described by composition graphs 6-Fig. 9, store batch processing code, and processor 1001 calls the program code stored in memory 1005, for performing following operation in memory 1005:
Whether the data management function detecting local terminal is in opening;
If detect, described data management function is in opening, then the process information for the hardcore for storing data of described input equipment 1003 reception server transmission;
According to described process information, manipulation process is carried out to described hardcore.
In an alternate embodiment of the invention, processor 1001 calls the program code stored in memory 1005 and performs and detect before whether the data management function of local terminal be in opening, also performs following steps:
Described input equipment 1003 obtains the user ID that the data management function for local terminal inputs;
The terminal iidentification of described user ID and local terminal is sent to server by described output equipment 1004, carries out association store to make described server to described user ID and described terminal iidentification.
In an alternate embodiment of the invention, processor 1001 calls the program code stored in memory 1005 and performs and detect before whether the data management function of local terminal be in opening, also performs following steps:
Control described input equipment 1003 to receive the enabling signal of local terminal and described input equipment 1003 judges the whether registered data management account of local terminal when receiving described enabling signal;
When the result that described input equipment 1003 judges is no, described input equipment 1003 points out user input the user ID for the data management function of local terminal and registered as described data management account by the terminal iidentification of inputted user ID and local terminal.
In an alternate embodiment of the invention, processor 1001 also performs following steps before calling the process information of the hardcore to storage data of the program code execution reception server transmission stored in memory 1005:
Adopt described terminal iidentification and establish a communications link according to default connected mode and server.
In an alternate embodiment of the invention, described process information is described terminal iidentification corresponding to the user ID received by described whois lookup, and carries out the information that sends according to described terminal iidentification.
In an alternate embodiment of the invention, processor 1001 call in memory 1005 store program code perform according to described process information to described hardcore carry out manipulation process before, also perform following steps:
Described output equipment 1004 obtains the data that store in described hardcore and by described data backup to described server.
In an alternate embodiment of the invention, processor 1001 call in memory 1005 store program code perform according to described process information to described hardcore carry out manipulation process time, specifically perform following steps:
Control the tupe that described input equipment 1003 judges in described process information, described tupe comprises and smashes tupe or locking processing pattern;
When described tupe for described in smash tupe time, data dump process is carried out to described hardcore;
When described tupe is described locking processing pattern, data interlock process is carried out to described hardcore.
In an alternate embodiment of the invention, processor 1001 call in memory 1005 store program code perform when described tupe for described in smash tupe time, when data dump process is carried out to described hardcore, specifically perform following steps:
When described tupe for described in smash tupe time, call described data management function produce high-tension current smash described hardcore, with remove described hardcore store data.
In an alternate embodiment of the invention, processor 1001 calls the program code stored in memory 1005 and performs when described tupe is described locking processing pattern, when carrying out data interlock process to described hardcore, specifically performs following steps:
When described tupe is described locking processing pattern, calls the prevention of described data management function generation blocking-up electric current and power to described hardcore, to lock the data that described hardcore stores.
In an alternate embodiment of the invention, processor 1001 calls the program code stored in memory 1005 and performs when described tupe is described locking processing pattern, after carrying out data interlock process, also performs following steps to described hardcore:
When described input equipment 1003 receives the unblock process information to described hardcore of described server transmission, call described data management function according to described unblock process information and produce restoring current, to remove the locking to the data that described hardcore stores.
In embodiments of the present invention, by when detecting that the data management function of local terminal is in opening, the process information for the hardcore for storing data that reception server sends, and according to process information, manipulation process is carried out to hardcore, the loss of terminal data can be avoided, improve the fail safe of terminal, and the molecule that effectively avoids theft utilizes terminal data to speculate, and can reduce the stolen risk of terminal to a certain extent.
Unit described in the embodiment of the present invention or unit, universal integrated circuit can be passed through, such as CPU (Central Processing Unit, central processing unit), or realized by ASIC (Application SpecificIntegrated Circuit, application-specific integrated circuit (ASIC)).
Step in embodiment of the present invention method can be carried out order according to actual needs and be adjusted, merges and delete.
Unit in embodiment of the present invention terminal or unit can carry out merging, divide and deleting according to actual needs.
One of ordinary skill in the art will appreciate that all or part of flow process realized in above-described embodiment method, that the hardware that can carry out instruction relevant by computer program has come, described program can be stored in a computer read/write memory medium, this program, when performing, can comprise the flow process of the embodiment as above-mentioned each side method.Wherein, described storage medium can be magnetic disc, CD, read-only store-memory body (Read-Only Memory, ROM) or random store-memory body (Random Access Memory, RAM) etc.
Above disclosedly be only present pre-ferred embodiments, certainly can not limit the interest field of the present invention with this, therefore according to the equivalent variations that the claims in the present invention are done, still belong to the scope that the present invention is contained.

Claims (10)

1. a terminal, is characterized in that, comprising:
Whether state detection unit, be in opening for the data management function detecting local terminal;
Information receiving unit, if for detecting that described data management function is in opening, then the process information for the hardcore for storing data of reception server transmission;
Manipulation processing unit, for carrying out manipulation process according to described process information to described hardcore.
2. terminal according to claim 1, is characterized in that, also comprises:
Mark acquiring unit, the user ID that the data management function for obtaining for local terminal inputs;
Mark transmitting element, for the terminal iidentification of described user ID and local terminal is sent to server, carries out association store to make described server to described user ID and described terminal iidentification.
3. terminal according to claim 1, is characterized in that, also comprises:
Account judging unit, for receiving the enabling signal of local terminal and judging the whether registered data management account of local terminal when receiving described enabling signal;
Account registering unit, for when the result judged is no, prompting user inputs the user ID for the data management function of local terminal and is registered as described data management account by the terminal iidentification of inputted user ID and local terminal.
4. the terminal according to Claims 2 or 3, is characterized in that, also comprises:
Communication connection unit, for adopting described terminal iidentification and establishing a communications link according to default connected mode and server.
5. terminal according to claim 4, is characterized in that, described process information is described terminal iidentification corresponding to the user ID received by described whois lookup, and carries out the information that sends according to described terminal iidentification.
6. terminal according to claim 1, is characterized in that, also comprises:
Data backup unit, for obtaining the data that store in described hardcore and by described data backup to described server.
7. terminal according to claim 1, is characterized in that, described manipulation processing unit comprises:
Mode determination, for judging the tupe in described process information, described tupe comprises and smashes tupe or locking processing pattern;
Remove processing unit, for when described tupe for described in smash tupe time, data dump process is carried out to described hardcore;
Lock processing unit, for when described tupe is described locking processing pattern, carries out data interlock process to described hardcore.
8. terminal according to claim 7, it is characterized in that, described removing processing unit specifically for when described tupe for described in smash tupe time, call described data management function produce high-tension current smash described hardcore, with remove described hardcore store data.
9. terminal according to claim 7, it is characterized in that, described lock processing unit is specifically for when described tupe is described locking processing pattern, call the prevention of described data management function generation blocking-up electric current to power to described hardcore, to lock the data that described hardcore stores.
10. terminal according to claim 9, is characterized in that, also comprises:
Unlock processing unit, for when receiving the unblock process information to described hardcore that described server sends, call described data management function according to described unblock process information and produce restoring current, to remove the locking to the data that described hardcore stores.
CN201510142128.6A 2015-03-28 2015-03-28 Terminal Pending CN104822142A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510142128.6A CN104822142A (en) 2015-03-28 2015-03-28 Terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510142128.6A CN104822142A (en) 2015-03-28 2015-03-28 Terminal

Publications (1)

Publication Number Publication Date
CN104822142A true CN104822142A (en) 2015-08-05

Family

ID=53732284

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510142128.6A Pending CN104822142A (en) 2015-03-28 2015-03-28 Terminal

Country Status (1)

Country Link
CN (1) CN104822142A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4639726A (en) * 1983-08-18 1987-01-27 Nec Corporation Radio communication apparatus disabled on reception of a predetermined signal
US5862472A (en) * 1995-07-29 1999-01-19 Samsung Electronics Co., Ltd. Circuit for indicating loss of portable telephone and control method thereof
CN1452428A (en) * 2002-04-09 2003-10-29 日本电气株式会社 Mobile communication terminal and its remote control system, and remote controlling method and program
CN1574982A (en) * 2003-06-04 2005-02-02 Lg电子株式会社 Apparatus and method for remotely changing a function of a mobile communication terminal
CN101018375A (en) * 2007-01-29 2007-08-15 中兴通讯股份有限公司 Method for remotely controlling the terminal data
CN201465553U (en) * 2009-05-04 2010-05-12 同方股份有限公司 Mobile storage device with self-destruction function
CN103118357A (en) * 2013-02-20 2013-05-22 上海斐讯数据通信技术有限公司 Antitheft system and antitheft method for mobile terminals

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4639726A (en) * 1983-08-18 1987-01-27 Nec Corporation Radio communication apparatus disabled on reception of a predetermined signal
US5862472A (en) * 1995-07-29 1999-01-19 Samsung Electronics Co., Ltd. Circuit for indicating loss of portable telephone and control method thereof
CN1452428A (en) * 2002-04-09 2003-10-29 日本电气株式会社 Mobile communication terminal and its remote control system, and remote controlling method and program
CN1574982A (en) * 2003-06-04 2005-02-02 Lg电子株式会社 Apparatus and method for remotely changing a function of a mobile communication terminal
CN101018375A (en) * 2007-01-29 2007-08-15 中兴通讯股份有限公司 Method for remotely controlling the terminal data
CN201465553U (en) * 2009-05-04 2010-05-12 同方股份有限公司 Mobile storage device with self-destruction function
CN103118357A (en) * 2013-02-20 2013-05-22 上海斐讯数据通信技术有限公司 Antitheft system and antitheft method for mobile terminals

Similar Documents

Publication Publication Date Title
US8718602B2 (en) Method and system for remote control of smart card
CN100590665C (en) Portable terminal unit
US9762722B2 (en) Location-based and time-based mobile device security
CN102413221B (en) Method for protecting privacy information and mobile terminal
WO2017107830A1 (en) Application installation method, apparatus and electronic device
CN104348809A (en) Network security monitoring method and system
CN104376263A (en) Application behavior intercepting method and application behavior intercepting device
JP2010026662A (en) Information leakage prevention system
CN101997960A (en) High-safety two-operating system mobile phone capable of resisting hackers and being used for Internet banking
CN105260660A (en) Monitoring method, device and system of intelligent terminal payment environment
CN104866782A (en) Data processing method and apparatus
CN102413220A (en) Method for controlling right of using connection function and mobile terminal
EP1841190B1 (en) Personal information protecting method and mobile terminal
CN102857913B (en) Method and device for authenticating in safety channel establishing process as well as intelligent card and terminal
CN105657147A (en) Mobile terminal anti-theft method and device
CN111414605A (en) Unlocking method and device of embedded security unit, electronic equipment and storage medium
EP2524320B1 (en) Recovering data in a storage medium of an electronic device that has been tampered with
CN104853032A (en) Data processing method
JP2008278108A (en) Method for locking information terminal
CN106507300A (en) A kind of method for giving loss terminal for change, device and terminal
JP4692130B2 (en) Authentication apparatus and program
CN102411692B (en) Method, system and equipment for running terminal
JP2011108183A (en) Communication control system, central device, terminal device, and computer program
CN104822142A (en) Terminal
CN104917737B (en) User account protection method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20150805