CN105069344A - Mobile terminal locking method and apparatus - Google Patents

Mobile terminal locking method and apparatus Download PDF

Info

Publication number
CN105069344A
CN105069344A CN201510438507.XA CN201510438507A CN105069344A CN 105069344 A CN105069344 A CN 105069344A CN 201510438507 A CN201510438507 A CN 201510438507A CN 105069344 A CN105069344 A CN 105069344A
Authority
CN
China
Prior art keywords
mobile terminal
encryption device
facility information
end message
binding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510438507.XA
Other languages
Chinese (zh)
Other versions
CN105069344B (en
Inventor
王舒捷
万钰臻
李明浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Technology Co Ltd
Xiaomi Inc
Original Assignee
Xiaomi Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaomi Inc filed Critical Xiaomi Inc
Priority to CN201510438507.XA priority Critical patent/CN105069344B/en
Publication of CN105069344A publication Critical patent/CN105069344A/en
Application granted granted Critical
Publication of CN105069344B publication Critical patent/CN105069344B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention provides a mobile terminal locking method and apparatus, and belongs to the technical field of mobile terminals. The method comprises: when a mobile terminal is in a network connection state, sending terminal information to a server; receiving a remote locking request of the server, wherein the remote locking request carries device information of a bound encryption device, obtained by the server according to the terminal information; and locking the mobile terminal, so that the mobile terminal keeps a locking state when being not connected to the bound encryption device. According to the mobile terminal locking method and apparatus, a unique unlocking way for the remotely locked mobile terminal is provided through the encryption device bound with the mobile terminal; and any other user in non-legal users cannot unlock the mobile terminal when not obtaining the encryption device bound with the mobile terminal, so that the security of the mobile terminal is improved.

Description

Mobile terminal locking method and device
Technical field
The disclosure relates to technical field of mobile terminals, particularly relates to a kind of mobile terminal locking method and device.
Background technology
Along with the development of mobile communication technology, mobile terminal of today not only has basic communication function, also there is storing subscriber information, carry out the function of social activity and financial class activity, its security threat faced also gets more and more, in order to ensure individual privacy and the property safety of the validated user of mobile terminal, mobile terminal provides safety prevention measure, as software protecting method and hardware safety method.
At present, the software protecting method of mobile terminal can be cryptoguard, that is to say, when mobile terminal is in the lock state, once need to operate mobile terminal, needs the unblock page that provides at mobile terminal inputs password, thus realizes unlocking.The hardware safety method of mobile terminal comprises the hardware-based cryptographics such as fingerprint recognition, fingerprint identification technology is by obtaining the fingerprint of active user, and itself and the fingerprint prestored are compared, if comparison result is consistent, then mobile terminal is unlocked, if comparison result is inconsistent, then do not respond the operation of active user to mobile terminal.
Summary of the invention
For overcoming Problems existing in correlation technique, the disclosure provides a kind of mobile terminal locking method and device, and described technical scheme is as follows:
According to the first aspect of disclosure embodiment, a kind of mobile terminal locking method is provided, comprises:
When mobile terminal is in networking state, to server transmitting terminal information;
Receive the remote lock request of described server, the facility information of the binding encryption device that described server obtains according to described end message is carried in described remote lock request;
Described mobile terminal being locked, making described mobile terminal keep lock-out state when not accessing described binding encryption device.
In the first possibility implementation of first aspect of the present disclosure, when mobile terminal is in networking state, before server transmitting terminal information, described method also comprises:
The facility information of encryption device is bound described in described acquisition for mobile terminal;
The facility information of described binding encryption device and the end message of described mobile terminal are sent to server, make server carry out corresponding stored to described facility information and end message.
In the second possibility implementation of first aspect of the present disclosure, before binding the facility information of encryption device described in described acquisition for mobile terminal, also comprise: when described binding encryption device accesses described mobile terminal first, the end message of described mobile terminal is write described binding encryption device, described binding encryption device is made to change to a read states, thus using described encryption device as described binding encryption device.
In the third possibility implementation of first aspect of the present disclosure, locking is carried out to described mobile terminal and comprises: under described lock-out state, forbid the appointed function of described mobile terminal.
In the 4th kind of possibility implementation of first aspect of the present disclosure, after locking described mobile terminal, described method also comprises:
When described mobile terminal has equipment access, obtain the facility information of access device;
When determining that the facility information of described access device is identical with the facility information of binding encryption device, described mobile terminal is unlocked.
In the 5th kind of possibility implementation of first aspect of the present disclosure, after determining that the facility information of described access device is identical with the facility information of binding encryption device, obtain the end message stored in described binding encryption device; When the end message of described storage is identical with the end message of described mobile terminal, perform the step that described mobile terminal is unlocked.
In the 6th kind of possibility implementation of first aspect of the present disclosure, after determining that the facility information of described access device is identical with the facility information of binding encryption device, display lock-out state removes option; When the confirmation operation described lock-out state being removed to option being detected, perform the step that described mobile terminal is unlocked.
In the 7th kind of possibility implementation of first aspect of the present disclosure, described binding encryption device is connected by the general-purpose serial bus USB interface of mobile terminal or the earpiece holes of described mobile terminal with described mobile terminal.
In the 8th kind of possibility implementation of first aspect of the present disclosure, the end message of described mobile terminal is the mobile device international identity code IMEI of described mobile terminal; And/or, the physical address MAC Address of described mobile terminal.
In the 9th kind of possibility implementation of first aspect of the present disclosure, the facility information of described binding encryption device is hardware sequence number.
According to the second aspect of disclosure embodiment, a kind of mobile terminal locking device is provided, comprises:
Sending module, for when mobile terminal is in networking state, to server transmitting terminal information;
Receiver module, for receiving the remote lock request of described server, the facility information of the binding encryption device that described server obtains according to described end message is carried in described remote lock request;
Locking module, for locking described mobile terminal, makes described mobile terminal keep lock-out state when not accessing described binding encryption device.
In the first possibility implementation of second aspect of the present disclosure, described device also comprises:
Acquisition module, for obtaining the facility information of described binding encryption device;
Described sending module also for the facility information of described binding encryption device and the end message of described mobile terminal are sent to server, makes server carry out corresponding stored to described facility information and described end message.
In the second possibility implementation of second aspect of the present disclosure, corresponding device also comprises:
Writing module, for when encryption device accesses described mobile terminal first, writes described encryption device by the end message of described mobile terminal, makes described encryption device change to a read states, thus using described encryption device as described binding encryption device.
In the third possibility implementation of second aspect of the present disclosure, described locking module is used under described lock-out state, forbids the appointed function of described mobile terminal.
In the 4th kind of possibility implementation of second aspect of the present disclosure, described acquisition module, also for when described mobile terminal has equipment access, obtains the facility information of access device; Described device also comprises determination module, unlocks described mobile terminal when the facility information of described access device is identical with the facility information of binding encryption device for determining.
In the 5th kind of possibility implementation of second aspect of the present disclosure, described acquisition module also for after determining that the facility information of described access device is identical with the facility information of binding encryption device, obtains the end message stored in described binding encryption device; Described locking module also for when the end message of described storage is identical with the end message of described mobile terminal, performs the step unlocked described mobile terminal.
In the 6th kind of possibility implementation of second aspect of the present disclosure, described device also comprises display module, and for after determining that the facility information of described access device is identical with the facility information of binding encryption device, display lock-out state removes option; Described locking module also for when the confirmation operation described lock-out state being removed to option being detected, performs the step unlocked described mobile terminal.
In the 7th kind of possibility implementation of second aspect of the present disclosure, described binding encryption device is connected by the general-purpose serial bus USB interface of described mobile terminal or the earpiece holes of described mobile terminal with described mobile terminal.
In the 8th kind of possibility implementation of second aspect of the present disclosure, the end message of described mobile terminal is the mobile device international identity code IMEI of described mobile terminal; And/or, the MAC address of described mobile terminal.
In the 9th kind of possibility implementation of second aspect of the present disclosure, the facility information of described binding encryption device is hardware sequence number.
The third aspect, additionally provides a kind of mobile terminal locking device, comprising:
Processor;
For the storer of the executable instruction of storage of processor;
Wherein, described processor is configured to:
When mobile terminal is in networking state, to server transmitting terminal information;
Receive the remote lock request of described server, the facility information of the binding encryption device that described server obtains according to described end message is carried in described remote lock request;
Described mobile terminal being locked, making described mobile terminal keep lock-out state when not accessing described binding encryption device.
Should be understood that, it is only exemplary and explanatory that above general description and details hereinafter describe, and can not limit the disclosure.
The beneficial effect that the technical scheme that disclosure embodiment provides is brought is:
By the encryption device with mobile terminal binding, provide unique unblock approach of the mobile terminal after to remote lock, any other user of non-legally user is not when having to obtain the encryption device with this mobile terminal binding, all cannot unlock this mobile terminal, improve the security of mobile terminal.
Accompanying drawing explanation
Accompanying drawing to be herein merged in instructions and to form the part of this instructions, shows and meets embodiment of the present disclosure, and is used from instructions one and explains principle of the present disclosure.
Fig. 1 is the process flow diagram of a kind of mobile terminal locking method according to an exemplary embodiment.
Fig. 2 is the process flow diagram of a kind of mobile terminal locking method according to an exemplary embodiment.
Fig. 3 is the block diagram of a kind of mobile terminal locking device according to an exemplary embodiment.
Fig. 4 is the block diagram of a kind of mobile terminal locking device 400 according to an exemplary embodiment.
Embodiment
For making object of the present disclosure, technical scheme and advantage clearly, below in conjunction with accompanying drawing, disclosure embodiment is described in further detail.
Here will be described exemplary embodiment in detail, its sample table shows in the accompanying drawings.When description below relates to accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawing represents same or analogous key element.Embodiment described in following exemplary embodiment does not represent all embodiments consistent with the disclosure.On the contrary, they only with as in appended claims describe in detail, the example of apparatus and method that aspects more of the present disclosure are consistent.
Fig. 1 is the process flow diagram of a kind of mobile terminal locking method according to an exemplary embodiment, and as shown in Figure 1, the method is used for, in mobile terminal, comprising the following steps.
In a step 101, when mobile terminal is in networking state, to server transmitting terminal information.
In a step 102, receive the remote lock request of described server, the facility information of the binding encryption device that described server obtains according to described end message is carried in described remote lock request.
In step 103, described mobile terminal being locked, making described mobile terminal keep lock-out state when not accessing described binding encryption device.
In the first possibility implementation of the present disclosure, when mobile terminal is in networking state, before server transmitting terminal information, described method also comprises:
The facility information of encryption device is bound described in described acquisition for mobile terminal;
The facility information of described binding encryption device and the end message of described mobile terminal are sent to server, make server carry out corresponding stored to described facility information and end message.
In the second possibility implementation of the present disclosure, before binding the facility information of encryption device described in described acquisition for mobile terminal, when encryption device accesses described mobile terminal first, the end message of described mobile terminal is write described encryption device, described binding encryption device is made to change to a read states, thus using described encryption device as described binding encryption device.
In the third possibility implementation of the present disclosure, locking is carried out to described mobile terminal and comprises: under described lock-out state, forbid the appointed function of described mobile terminal.
In the 4th kind of possibility implementation of the present disclosure, after locking described mobile terminal, described method also comprises:
When described mobile terminal has equipment access, obtain the facility information of access device;
When determining that the facility information of described access device is identical with the facility information of binding encryption device, described mobile terminal is unlocked.
In the 5th kind of possibility implementation of the present disclosure, after determining that the facility information of described access device is identical with the facility information of binding encryption device, obtain the end message stored in described binding encryption device; When the end message of described storage is identical with the end message of described mobile terminal, perform the step that described mobile terminal is unlocked.
In the 6th kind of possibility implementation of the present disclosure, after determining that the facility information of described access device is identical with the facility information of binding encryption device, display lock-out state removes option; When the confirmation operation described lock-out state being removed to option being detected, perform the step that described mobile terminal is unlocked.
In the 7th kind of possibility implementation of the present disclosure, described binding encryption device is connected by the general-purpose serial bus USB interface of mobile terminal or the earpiece holes of described mobile terminal with described mobile terminal.
In the 8th kind of possibility implementation of the present disclosure, the end message of described mobile terminal is the mobile device international identity code IMEI of described mobile terminal; And/or, the physical address MAC Address of described mobile terminal.
In the 9th kind of possibility implementation of the present disclosure, the facility information of described binding encryption device is hardware sequence number.
Above-mentioned all alternatives, can adopt and combine arbitrarily formation embodiment of the present disclosure, this is no longer going to repeat them.
Fig. 2 is the process flow diagram of a kind of mobile terminal locking method according to an exemplary embodiment.With reference to Fig. 2, this embodiment specifically comprises:
In step 201, when encryption device accesses described mobile terminal first, the end message of mobile terminal is write this encryption device, make this encryption device change to a read states, thus using described encryption device as described binding encryption device.
This encryption device can be movable storage device, and as USB flash disk, portable hard drive etc., this movable storage device can be connected with this mobile terminal by the general-purpose serial bus USB interface of mobile terminal or the earpiece holes of mobile terminal.
The end message of mobile terminal can be: the IMEI (InternationalMobileEquipmentIdentity, mobile device international identity code) of mobile terminal; And/or, MAC (MediaAccessControl, the media interviews control) address of this mobile terminal.Each mobile terminal only has a corresponding fixing IMEI and MAC Address, make when occurring as special circumstances such as mobile terminal loss, even if disabled user has same money encryption device, so long as not setting up the encryption device of binding relationship with this lost mobile terminal before, all unlocking operation cannot be performed to this lost mobile terminal.
The mode that this encryption device changes to a read states can have two kinds: one automatically changes to a read states after write data; Another kind manually changes to a read states, that is to say, user selects this encryption device to change to a read states voluntarily, when needing to change the mobile terminal bound with this encryption device, can first format this encryption device, remove original end message stored in this encryption device, to re-write the end message of the new mobile terminal be connected with this encryption device, thus realize recycling of encryption device.
The first is changed to automatically to the situation of a read states, when after the end message writing some mobile terminals in this encryption device, just automatically block the write passage of this encryption device, this encryption device is changed to a read states, when this encryption device is connected with other mobile terminals again, other mobile terminals cannot write end message again in this encryption device, thus realize the man-to-man irreversible binding of encryption device and mobile terminal, only have after making and could perform unlocking operation to this mobile terminal with the encryption device of this mobile terminal binding, thus improve the security of mobile terminal.
For the situation manually changing to a read states, be described for three buttons encryption device being provided with difference in functionality, as these three buttons are respectively: read-only, read-write, format.When after the end message writing some mobile terminals in this encryption device, user can press the read-only button on encryption device, this encryption device is set to a read states, when this encryption device is connected with other mobile terminals again, other mobile terminals cannot write end message again in this encryption device; When a user replaces a mobile terminal, first can press the formatting button on encryption device, before removing, be stored in the end message in encryption device, then press the read-write button on encryption device, access new mobile terminal, re-write the end message of this new mobile terminal.Thisly can be realized by the encryption device manually changing state recycling, reduce the wasting of resources.Certainly, encryption device can also be other example, in hardware, and as encryption device has hardware switch, control switching that is read-only or readable state by this hardware switch, the embodiment of the present invention does not do concrete restriction to this.
The process that end message is write the encryption device be connected with this mobile terminal by mobile terminal can comprise the following steps: when this mobile terminal detects this encryption device, the display information on screen write interface of this mobile terminal, described information write interface at least comprises the option whether writing this mobile terminal identity information to this encryption device, when the determination operation to this option being detected, this mobile terminal is by its end message write encryption device.
In step 202., the facility information of this binding encryption device of this acquisition for mobile terminal.
The facility information of this binding encryption device can be the hardware sequence number of this binding encryption device.
In step 203, the end message of this facility information and this mobile terminal is sent to server by this mobile terminal, makes server carry out corresponding stored to this facility information and this end message.
This server is for providing the information service platform of service to this mobile terminal, this information service platform can realize the corresponding stored to the end message of mobile terminal and the facility information of binding encryption device.
In step 204, when mobile terminal is in networking state, this mobile terminal is to server transmitting terminal information.
Mobile terminal validated user can to server application user name, and password is set, when mobile terminal is lost, this validated user can use the username and password logon server to losing mobile terminal, change this loss mobile terminal state on the server, server does respective markers according to this state to this loss mobile terminal.When this loss mobile terminal is in networking state, this loss mobile terminal is to server transmitting terminal information, and server is learnt, and this mobile terminal is in networking state.
In step 205, when server receives end message, if determine that this mobile terminal is labeled, send remote lock request to this mobile terminal, the facility information of the binding encryption device that this server obtains according to this end message is carried in this remote lock request.
Because mobile terminal validated user marks mobile terminal on the server, server is once the end message receiving this mobile terminal be labeled and send, can determine that current mobile terminal is in networking state, then send remote lock request from trend mobile terminal.
In step 206, mobile terminal receives the remote lock request of this server, and the facility information of the binding encryption device that this server obtains according to this end message is carried in this remote lock request.
In step 207, this mobile terminal being locked, making this mobile terminal keep lock-out state when not accessing described binding encryption device.
In above-mentioned steps 206 and 207, after this mobile terminal receives remote lock request, the program be embedded in this mobile terminal operating system locks this mobile terminal.
This lock-out state can be complete lock-out state, also can be part lock-out state.When mobile terminal is in complete lock-out state, do not respond any operation that this mobile terminal is performed.When mobile terminal is in part lock-out state, the appointed function of forbidden moves terminal, this appointed function can comprise: the function relating to this mobile terminal validated user privacy, and the function that may threaten to the property safety of this validated user.Above-mentioned two kinds of lock-out states can be selected after logon server voluntarily by the validated user of mobile terminal, also first can perform part locking, then perform and lock completely.
In step 205, this remote lock request can also carry lockType mark, and this lockType mark can lock mark for part, can also for lock mark completely, and its particular type can be determined the appointment of lockType on the server according to user.Wherein, mobile terminal, under part lock-out state, can be set up call and connect.Based on this, user is when finding that mobile terminal is lost, the remote lock request of carrying part locking mark can be triggered by logon server, first to perform part lock operation to this loss mobile terminal, then this loss mobile terminal is called out, if someone answers, communication can be carried out and allow the other side give back this loss mobile terminal; If ring unanswered or the other side are unwilling to give back, then carry the remote lock request locking mark completely by server triggers, to carry out complete lock operation to the mobile terminal having carried out part locking.
In a step 208, when this mobile terminal has equipment access, obtain the facility information of access device.
When mobile terminal has equipment access, mobile terminal all by being tentatively connected of setting up with access device, can obtain the facility information of this access device.
In step 209, when determining that the facility information of this access device is identical with the facility information of binding encryption device, this mobile terminal is unlocked.
If the facility information of access device is identical with the facility information entrained by remote lock request, can determine that this access device is the binding encryption device that validated user is held, then now can unlock mobile terminal, to ensure that validated user can operate mobile terminal.
In order to improve the security of mobile terminal further, after determining that the facility information of described access device is identical with the facility information of binding encryption device, this mobile terminal can also obtain the end message stored in described binding encryption device, is contrasted by the end message of this information and this mobile terminal.Identical, directly unlock.
In order to increase the dirigibility of mobile terminal operation, the lock-out state that can also increase mobile terminal removes option, whether carries out unblock process to lock-out state for controlling.If the end message stored in described binding encryption device is identical with the end message of this mobile terminal, on the screen of this mobile terminal, then show lock-out state remove option, when the confirmation operation this lock-out state being removed to option being detected, unlocking operation is performed to this mobile terminal, makes the various functions of this mobile terminal recover normal.If the end message stored in described binding encryption device is different from the end message of this mobile terminal, then this mobile terminal is without response.
The method that disclosure embodiment provides, by the encryption device with mobile terminal binding, provide unique unblock approach of the mobile terminal after to remote lock, any other user of non-legally user is not when having to obtain the encryption device with this mobile terminal binding, all cannot unlock this mobile terminal, improve the security of mobile terminal.
Fig. 3 is the block diagram of a kind of mobile terminal locking device according to an exemplary embodiment.With reference to Fig. 3, this device comprises sending module 301, receiver module 302 and locking module 303.
Sending module 301, for when mobile terminal is in networking state, to server transmitting terminal information;
Receiver module 302, for receiving the remote lock request of described server, the facility information of the binding encryption device that described server obtains according to described end message is carried in described remote lock request;
Locking module 303, for locking described mobile terminal, makes described mobile terminal keep lock-out state when not accessing described binding encryption device.
In the first possibility implementation that the disclosure provides, described device also comprises:
Acquisition module, for obtaining the facility information of described binding encryption device;
Described sending module also for the facility information of described binding encryption device and the end message of described mobile terminal are sent to server, makes server carry out corresponding stored to described facility information and described end message.
In the second possibility implementation that the disclosure provides, described device also comprises:
Writing module, for when encryption device accesses described mobile terminal first, writes described encryption device by the end message of described mobile terminal, makes described encryption device change to a read states, thus using described encryption device as described binding encryption device.
In the third possibility implementation that the disclosure provides, described locking module is used under described lock-out state, forbids the appointed function of described mobile terminal.
In the 4th kind of possibility implementation that the disclosure provides, described device comprises:
Described acquisition module, also for when described mobile terminal has equipment access, obtains the facility information of access device;
Determination module, unlocks described mobile terminal when the facility information of described access device is identical with the facility information of binding encryption device for determining.
In the 5th kind of possibility implementation that the disclosure provides, described acquisition module also for after determining that the facility information of described access device is identical with the facility information of binding encryption device, obtains the end message stored in described binding encryption device;
Described locking module also for when the end message of described storage is identical with the end message of described mobile terminal, performs the step unlocked described mobile terminal.
In the 6th kind of possibility implementation that the disclosure provides, described device also comprises:
Display module, for after determining that the facility information of described access device is identical with the facility information of binding encryption device, display lock-out state removes option;
Described locking module also for when the confirmation operation described lock-out state being removed to option being detected, performs the step unlocked described mobile terminal.
In the 7th kind of possibility implementation that the disclosure provides, described binding encryption device is connected by the general-purpose serial bus USB interface of described mobile terminal or the earpiece holes of described mobile terminal with described mobile terminal.
In the 8th kind of possibility implementation that the disclosure provides, the end message of described mobile terminal is the mobile device international identity code IMEI of described mobile terminal; And/or, the MAC address of described mobile terminal.
In the 9th kind of possibility implementation that the disclosure provides, the facility information of described binding encryption device is hardware sequence number.
About the device in above-described embodiment, wherein the concrete mode of modules executable operations has been described in detail in about the embodiment of the method, will not elaborate explanation herein.
Fig. 4 is the block diagram of a kind of mobile terminal locking device 400 according to an exemplary embodiment.Such as, device 400 can be mobile phone, computing machine, digital broadcast terminal, messaging devices, game console, tablet device, Medical Devices, body-building equipment, personal digital assistant etc.
With reference to Fig. 4, device 400 can comprise following one or more assembly: processing components 402, storer 404, power supply module 406, multimedia groupware 404, audio-frequency assembly 410, the interface 412 of I/O (I/O), sensor module 414, and communications component 416.
The integrated operation of the usual control device 400 of processing components 402, such as with display, call, data communication, camera operation and record operate the operation be associated.Treatment element 402 can comprise one or more processor 420 to perform instruction, to complete all or part of step of above-mentioned method.In addition, processing components 402 can comprise one or more module, and what be convenient between processing components 402 and other assemblies is mutual.Such as, processing element 402 can comprise multi-media module, mutual with what facilitate between multimedia groupware 408 and processing components 402.
Storer 404 is configured to store various types of data to be supported in the operation of equipment 400.The example of these data comprises for any application program of operation on device 400 or the instruction of method, contact data, telephone book data, message, picture, video etc.Storer 404 can be realized by the volatibility of any type or non-volatile memory device or their combination, as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), Erasable Programmable Read Only Memory EPROM (EPROM), programmable read only memory (PROM), ROM (read-only memory) (ROM), magnetic store, flash memory, disk or CD.
The various assemblies that electric power assembly 406 is device 400 provide electric power.Electric power assembly 406 can comprise power-supply management system, one or more power supply, and other and the assembly generating, manage and distribute electric power for device 400 and be associated.
Multimedia groupware 408 is included in the screen providing an output interface between described device 400 and user.In certain embodiments, screen can comprise liquid crystal display (LCD) and touch panel (TP).If screen comprises touch panel, screen may be implemented as touch-screen, to receive the input signal from user.Touch panel comprises one or more touch sensor with the gesture on sensing touch, slip and touch panel.Described touch sensor can the border of not only sensing touch or sliding action, but also detects the duration relevant to described touch or slide and pressure.In certain embodiments, multimedia groupware 408 comprises a front-facing camera and/or post-positioned pick-up head.When equipment 400 is in operator scheme, during as screening-mode or video mode, front-facing camera and/or post-positioned pick-up head can receive outside multi-medium data.Each front-facing camera and post-positioned pick-up head can be fixing optical lens systems or have focal length and optical zoom ability.
Audio-frequency assembly 410 is configured to export and/or input audio signal.Such as, audio-frequency assembly 410 comprises a microphone (MIC), and when device 400 is in operator scheme, during as call model, logging mode and speech recognition mode, microphone is configured to receive external audio signal.The sound signal received can be stored in storer 404 further or be sent via communications component 416.In certain embodiments, audio-frequency assembly 410 also comprises a loudspeaker, for output audio signal.
I/O interface 412 is for providing interface between processing components 402 and peripheral interface module, and above-mentioned peripheral interface module can be keyboard, some striking wheel, button etc.These buttons can include but not limited to: home button, volume button, start button and locking press button.
Sensor module 414 comprises one or more sensor, for providing the state estimation of various aspects for device 400.Such as, sensor module 414 can detect the opening/closing state of equipment 400, the relative positioning of assembly, such as described assembly is display and the keypad of device 400, the position of all right pick-up unit 400 of sensor module 414 or device 400 1 assemblies changes, the presence or absence that user contacts with device 400, the temperature variation of device 400 orientation or acceleration/deceleration and device 400.Sensor module 414 can comprise proximity transducer, be configured to without any physical contact time detect near the existence of object.Sensor module 414 can also comprise optical sensor, as CMOS or ccd image sensor, for using in imaging applications.In certain embodiments, this sensor module 414 can also comprise acceleration transducer, gyro sensor, Magnetic Sensor, pressure transducer or temperature sensor.
Communications component 416 is configured to the communication being convenient to wired or wireless mode between device 400 and other equipment.Device 400 can access the wireless network based on communication standard, as WiFi, 2G or 3G, or their combination.In one exemplary embodiment, communication component 416 receives from the broadcast singal of external broadcasting management system or broadcast related information via broadcast channel.In one exemplary embodiment, described communication component 416 also comprises near-field communication (NFC) module, to promote junction service.Such as, can based on radio-frequency (RF) identification (RFID) technology in NFC module, Infrared Data Association (IrDA) technology, ultra broadband (UWB) technology, bluetooth (BT) technology and other technologies realize.
In the exemplary embodiment, device 400 can be realized, for performing above-mentioned mobile terminal locking method by one or more application specific integrated circuit (ASIC), digital signal processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD) (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components.
In the exemplary embodiment, additionally provide a kind of non-transitory computer-readable recording medium comprising instruction, such as, comprise the storer 404 of instruction, above-mentioned instruction can perform said method by the processor 420 of device 400.Such as, described non-transitory computer-readable recording medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and optical data storage devices etc.
In the exemplary embodiment, additionally provide a kind of non-transitory computer-readable recording medium, when the instruction in described storage medium is performed by the processor of mobile terminal, make mobile terminal can perform above-mentioned mobile terminal locking method.
Those skilled in the art, at consideration instructions and after putting into practice invention disclosed herein, will easily expect other embodiment of the present disclosure.The application is intended to contain any modification of the present disclosure, purposes or adaptations, and these modification, purposes or adaptations are followed general principle of the present disclosure and comprised the undocumented common practise in the art of the disclosure or conventional techniques means.Instructions and embodiment are only regarded as exemplary, and true scope of the present disclosure and spirit are pointed out by claim below.
Should be understood that, the disclosure is not limited to precision architecture described above and illustrated in the accompanying drawings, and can carry out various amendment and change not departing from its scope.The scope of the present disclosure is only limited by appended claim.

Claims (21)

1. a mobile terminal locking method, is characterized in that, described method comprises:
When mobile terminal is in networking state, to server transmitting terminal information;
Receive the remote lock request of described server, the facility information of the binding encryption device that described server obtains according to described end message is carried in described remote lock request;
Described mobile terminal being locked, making described mobile terminal keep lock-out state when not accessing described binding encryption device.
2. method according to claim 1, is characterized in that, when mobile terminal is in networking state, before server transmitting terminal information, described method also comprises:
The facility information of encryption device is bound described in described acquisition for mobile terminal;
The facility information of described binding encryption device and the end message of described mobile terminal are sent to server, make server carry out corresponding stored to described facility information and described end message.
3. method according to claim 2, is characterized in that, before binding the facility information of encryption device, also comprises described in described acquisition for mobile terminal:
When encryption device accesses described mobile terminal first, the end message of described mobile terminal is write described encryption device, make described encryption device change to a read states, thus using described encryption device as described binding encryption device.
4. method according to claim 1, is characterized in that, carries out locking comprise described mobile terminal:
Under described lock-out state, forbid the appointed function of described mobile terminal.
5. method according to claim 1, is characterized in that, after locking described mobile terminal, described method also comprises:
When described mobile terminal has equipment access, obtain the facility information of access device;
When determining that the facility information of described access device is identical with the facility information of binding encryption device, described mobile terminal is unlocked.
6. method according to claim 5, is characterized in that, described method also comprises:
After determining that the facility information of described access device is identical with the facility information of binding encryption device, obtain the end message stored in described binding encryption device;
When the end message of described storage is identical with the end message of described mobile terminal, perform the step that described mobile terminal is unlocked.
7. method according to claim 5, is characterized in that, described method also comprises:
After determining that the facility information of described access device is identical with the facility information of binding encryption device, display lock-out state removes option;
When the confirmation operation described lock-out state being removed to option being detected, perform the step that described mobile terminal is unlocked.
8. method according to claim 1, is characterized in that, described binding encryption device is connected by the general-purpose serial bus USB interface of described mobile terminal or the earpiece holes of described mobile terminal with described mobile terminal.
9. method according to claim 1, is characterized in that, the end message of described mobile terminal is the mobile device international identity code IMEI of described mobile terminal; And/or, the MAC address of described mobile terminal.
10. method according to claim 1, is characterized in that, the facility information of described binding encryption device is hardware sequence number.
11. 1 kinds of mobile terminal locking devices, is characterized in that, described device comprises:
Sending module, for when mobile terminal is in networking state, to server transmitting terminal information;
Receiver module, for receiving the remote lock request of described server, the facility information of the binding encryption device that described server obtains according to described end message is carried in described remote lock request;
Locking module, for locking described mobile terminal, makes described mobile terminal keep lock-out state when not accessing described binding encryption device.
12. devices according to claim 11, is characterized in that, described device also comprises:
Acquisition module, for obtaining the facility information of described binding encryption device;
Described sending module also for the facility information of described binding encryption device and the end message of described mobile terminal are sent to server, makes server carry out corresponding stored to described facility information and described end message.
13. devices according to claim 12, is characterized in that, described device also comprises:
Writing module, for when encryption device accesses described mobile terminal first, writes described encryption device by the end message of described mobile terminal, makes described encryption device change to a read states, thus using described encryption device as described binding encryption device.
14. devices according to claim 11, is characterized in that, described locking module is used under described lock-out state, forbids the appointed function of described mobile terminal.
15. devices according to claim 11, is characterized in that, described device comprises:
Described acquisition module, also for when described mobile terminal has equipment access, obtains the facility information of access device;
Determination module, unlocks described mobile terminal when the facility information of described access device is identical with the facility information of binding encryption device for determining.
16. devices according to claim 15, is characterized in that, described acquisition module also for after determining that the facility information of described access device is identical with the facility information of binding encryption device, obtains the end message stored in described binding encryption device;
Described locking module also for when the end message of described storage is identical with the end message of described mobile terminal, performs the step unlocked described mobile terminal.
17. devices according to claim 15, is characterized in that, described device also comprises:
Display module, for after determining that the facility information of described access device is identical with the facility information of binding encryption device, display lock-out state removes option;
Described locking module also for when the confirmation operation described lock-out state being removed to option being detected, performs the step unlocked described mobile terminal.
18. devices according to claim 11, is characterized in that, described binding encryption device is connected by the general-purpose serial bus USB interface of described mobile terminal or the earpiece holes of described mobile terminal with described mobile terminal.
19. devices according to claim 11, is characterized in that, the end message of described mobile terminal is the mobile device international identity code IMEI of described mobile terminal; And/or, the MAC address of described mobile terminal.
20. devices according to claim 11, is characterized in that, the facility information of described binding encryption device is hardware sequence number.
21. 1 kinds of mobile terminal locking devices, is characterized in that, comprising:
Processor;
For the executable instruction of storage of processor;
Wherein, described processor is configured to:
When mobile terminal is in networking state, to server transmitting terminal information;
Receive the remote lock request of described server, the facility information of the binding encryption device that described server obtains according to described end message is carried in described remote lock request;
Described mobile terminal being locked, making described mobile terminal keep lock-out state when not accessing described binding encryption device.
CN201510438507.XA 2015-07-23 2015-07-23 mobile terminal locking method and device Active CN105069344B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510438507.XA CN105069344B (en) 2015-07-23 2015-07-23 mobile terminal locking method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510438507.XA CN105069344B (en) 2015-07-23 2015-07-23 mobile terminal locking method and device

Publications (2)

Publication Number Publication Date
CN105069344A true CN105069344A (en) 2015-11-18
CN105069344B CN105069344B (en) 2018-10-19

Family

ID=54498707

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510438507.XA Active CN105069344B (en) 2015-07-23 2015-07-23 mobile terminal locking method and device

Country Status (1)

Country Link
CN (1) CN105069344B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105721569A (en) * 2016-02-03 2016-06-29 青岛海信移动通信技术股份有限公司 Method, device and system for controlling mobile terminal
CN107070967A (en) * 2016-12-23 2017-08-18 沈阳通用软件有限公司 A kind of general terminal system reinforcement means
CN107517278A (en) * 2017-10-11 2017-12-26 上海展扬通信技术有限公司 The long-range control method and tele-control system of a kind of intelligent terminal
CN114463879A (en) * 2022-01-25 2022-05-10 杭州涂鸦信息技术有限公司 Unlocking method, intelligent terminal and computer readable storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102819721A (en) * 2012-08-15 2012-12-12 腾讯科技(深圳)有限公司 NFC (near field communication)-based information interaction method and device
CN103347133A (en) * 2013-07-15 2013-10-09 上海果壳电子有限公司 Method for achieving mobile phone automatic unlocking and answering calls by identity ring
CN103944728A (en) * 2014-04-25 2014-07-23 天地融科技股份有限公司 Data security interactive system
CN104573473A (en) * 2014-12-05 2015-04-29 小米科技有限责任公司 Method and authentication device for unlocking administration authority

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102819721A (en) * 2012-08-15 2012-12-12 腾讯科技(深圳)有限公司 NFC (near field communication)-based information interaction method and device
CN103347133A (en) * 2013-07-15 2013-10-09 上海果壳电子有限公司 Method for achieving mobile phone automatic unlocking and answering calls by identity ring
CN103944728A (en) * 2014-04-25 2014-07-23 天地融科技股份有限公司 Data security interactive system
CN104573473A (en) * 2014-12-05 2015-04-29 小米科技有限责任公司 Method and authentication device for unlocking administration authority

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105721569A (en) * 2016-02-03 2016-06-29 青岛海信移动通信技术股份有限公司 Method, device and system for controlling mobile terminal
CN107070967A (en) * 2016-12-23 2017-08-18 沈阳通用软件有限公司 A kind of general terminal system reinforcement means
CN107517278A (en) * 2017-10-11 2017-12-26 上海展扬通信技术有限公司 The long-range control method and tele-control system of a kind of intelligent terminal
CN114463879A (en) * 2022-01-25 2022-05-10 杭州涂鸦信息技术有限公司 Unlocking method, intelligent terminal and computer readable storage medium

Also Published As

Publication number Publication date
CN105069344B (en) 2018-10-19

Similar Documents

Publication Publication Date Title
CN104185304B (en) A kind of method and device accessing WI-FI network
CN110400405B (en) Method, device and medium for controlling access control
CN104794382A (en) Application starting method and device
CN104503688A (en) Intelligent hardware device control achieving method and device
CN104091376A (en) Intelligent lock control method and apparatus thereof
CN105516508A (en) Method and device for activating virtual SIM card
CN105160239A (en) Application program access restriction method and apparatus
CN104992092A (en) Method, device and system for fingerprint information verification
CN105407098A (en) Identity verification method and device
CN105468767A (en) Method and device for acquiring calling card information
CN104468524A (en) Permission verification method and device
CN104573550A (en) Method and device for protecting data
CN105491236A (en) Terminal unlocking method and device
CN104331228A (en) Screen locking method and device
CN105678133A (en) Terminal unlocking method and device
CN104506491A (en) Personal data account management method and device
CN104735670A (en) Network access method and device
CN105550568A (en) Mobile terminal data protection method and apparatus
CN106156561A (en) Application locking method, application unlocking method and a device
CN105095717A (en) Processing method and processing device of exception event, and electronic equipment
CN105471814A (en) Account number management method and account number management device
CN108022349A (en) Information input method, equipment, smart lock and storage medium
CN107635231A (en) Control method, device and the mobile terminal of focus WIFI switches
CN105631254A (en) Unlocking method and unlocking device
CN105392141A (en) Device control method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant