CN105550588B - A kind of terminal locking method and terminal - Google Patents

A kind of terminal locking method and terminal Download PDF

Info

Publication number
CN105550588B
CN105550588B CN201510449743.1A CN201510449743A CN105550588B CN 105550588 B CN105550588 B CN 105550588B CN 201510449743 A CN201510449743 A CN 201510449743A CN 105550588 B CN105550588 B CN 105550588B
Authority
CN
China
Prior art keywords
terminal
hot spot
preset
safe hot
force
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510449743.1A
Other languages
Chinese (zh)
Other versions
CN105550588A (en
Inventor
胡盛琼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201510449743.1A priority Critical patent/CN105550588B/en
Publication of CN105550588A publication Critical patent/CN105550588A/en
Application granted granted Critical
Publication of CN105550588B publication Critical patent/CN105550588B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2125Just-in-time application of countermeasures, e.g., on-the-fly decryption, just-in-time obfuscation or de-obfuscation

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention discloses a kind of terminal locking methods, which comprises judges that can terminal detect the wireless access signal of safe hot spot of user preset;If the terminal cannot detect the wireless access signal of the safe hot spot, judge the terminal currently whether in preset outgoing mode;If the terminal is not at the outgoing mode, timing is carried out for the offline time of the safe hot spot;If the offline time of the safe hot spot is more than the preset offline time threshold value, confirm that the terminal is in abnormality;Locking processing is carried out to the terminal.The invention also discloses a kind of terminals.Using the present invention, the safe hot spot by monitor terminal may be implemented, determine terminal whether be in it is stolen, lose etc. abnormalities, and in abnormality to terminal into row lock protection, prevent the leakage of user data.

Description

A kind of terminal locking method and terminal
Technical field
The present invention relates to electronic technology field more particularly to a kind of terminal locking methods and terminal.
Background technique
As electric terminal usage scenario and function are more and more extensive, more and more individual privacy informations all start to save There has also been increasingly higher demands, pattern lockings, password in electric terminal, therefore to the safety of electric terminal and privacy Locking and fingerprint locking etc. mode are all the currently used methods concentrated and carry out encryption lock to electric terminal.But this A little methods are limited to the encryption of electric terminal, if electric terminal is stolen, other people are easy for break a code, Huo Zhezhi Row brush machine is tapped into restore factory state, so that all Crypted passwords of user setting is failed, this makes the user data in terminal In the presence of very big risk of leakage.
Summary of the invention
The technical problem to be solved by the embodiment of the invention is that providing a kind of terminal locking method and terminal, Ke Yitong The safe hot spot for crossing monitor terminal, determines whether terminal is in the abnormalities such as stolen, loss, and in abnormality to terminal Into row lock protection, the leakage of user data is prevented.
In order to solve the above-mentioned technical problem, the embodiment of the invention provides a kind of terminal locking methods, which comprises
Judge that can terminal detect the wireless access signal of safe hot spot of user preset;
If the terminal cannot detect the wireless access signal of the safe hot spot, judge the terminal currently whether In preset outgoing mode;
If the terminal is not at the outgoing mode, timing is carried out for the offline time of the safe hot spot;
If the offline time of the safe hot spot is more than the preset offline time threshold value, confirm that the terminal is in Abnormality;
Locking processing is carried out to the terminal.
Correspondingly, the embodiment of the invention also provides a kind of terminal, the terminal includes:
Hot spots detection module, for judging that can terminal detect the wireless access signal of the safe hot spot of user preset;
Outgoing detection module is sentenced if cannot detect the wireless access signal of the safe hot spot for the terminal Whether the terminal of breaking currently is in preset outgoing mode;
Offline timing module, if be not at the outgoing mode for the terminal, for the safe hot spot from The line time carries out timing;
Abnormal module, if the offline time for the safe hot spot is more than the preset offline time threshold value, really Recognize the terminal and is in abnormality;
Locking module, for carrying out locking processing to the terminal.
The embodiment of the present invention, which passes through, judges that can terminal detect the wireless access signal of the safe hot spot of user preset, if Whether the terminal cannot detect the wireless access signal of the safe hot spot, then judge the terminal currently in preset Outgoing mode carries out timing for the offline time of the safe hot spot if the terminal is not at the outgoing mode, if The offline time of the safe hot spot is more than the preset offline time threshold value, then confirms that the terminal is in abnormality, Locking processing is carried out to the terminal, realizes the safe hot spot by monitor terminal, determines whether terminal is in stolen, loses Etc. abnormalities, and in abnormality to terminal into row lock protection, prevent the leakage of user data.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Fig. 1 is a kind of flow diagram of terminal locking method in the embodiment of the present invention;
Fig. 2 is the flow diagram of terminal locking method in another embodiment of the present invention;
Fig. 3 is a kind of composed structure schematic diagram of terminal in the embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
Fig. 1 is a kind of flow diagram of terminal locking method in the embodiment of the present invention, and this method process can be by terminal Implement, the terminal may include mobile phone, laptop, tablet computer, vehicle-mounted computer, POS (Point Of Sales, pin Sell a little) machine etc..The method of the present embodiment may include: as described in Figure
Step S101 judges that can terminal detect the wireless access signal of safe hot spot of user preset.
Specifically, the safe hot spot can be the common but wifi hotspot of secret that the user specifies, such as family Front yard wifi hotspot, company's wifi hotspot etc., terminal can be by the wireless access signal of the detection safe hot spot of timing It is no to exist to judge whether the terminal appears in the place that the user often occurs.For example, if the user setting from The wifi hotspot of own family is as the safe hot spot, then if the terminal detects the wireless access letter of the safe hot spot Number, it may be said that the bright terminal appears in the family of the user, then can also illustrate that the terminal is in safe shape Under state;Otherwise, it thens follow the steps S102 and detects whether the user has outgoing situation.
Step S102 judges the end if the terminal cannot detect the wireless access signal of the safe hot spot Whether end is current is in preset outgoing mode.
Specifically, if can be the outgoing mode by the terminal profile when user needs outgoing.It needs to illustrate , the outgoing mode can be the user and leaves the covering of the safe hot spot for a long time needing to travel, go on business etc. In the case where range and set or open, therefore the outgoing mode also can be set to tourism pattern, mode of going on business, from On-mode etc., is not construed as limiting here.In specific implementation, the user can detect the nothing of the safe hot spot in the terminal Line accesses manually opened outgoing mode when signal, and sets the duration that comes into force, when the terminal is detected by timing At the end of the duration that comes into force, then the outgoing mode is automatically exited from;On the other hand, the user can also examine in the terminal Set and come into force the beginning and ending time that (come into force time started and the end that comes into force in the case where the wireless access signal for measuring the safe hot spot Time), when the terminal detects that the time started of coming into force reaches, then the outgoing mode is automatically turned on, when the end When end detects that the end time of coming into force reaches, then the outgoing mode is automatically exited from.Further, the terminal can be with According to beginning and ending time or the duration that comes into force of coming into force to determine entry-into-force time section, and detect whether current time is located by timing In judging whether the terminal is under the outgoing mode in the entry-into-force time section.Under the outgoing mode, i.e., Prevent the terminal from detecting the wireless access signal of the safe hot spot, the terminal will not be judged as abnormal shape State.
Step S103, if the terminal is not at the outgoing mode, for the safe hot spot offline time into Row timing.
Specifically, if the terminal both can't detect the wireless access signal of the safe hot spot not also in described outgoing Mode, it may be considered that the terminal is currently at offline state, then the timing since the determination terminal offline time, Obtain the offline time of the safe hot spot.Further, an offline time threshold value can also be preset, when the safety In the case that the offline time of hot spot is less than the preset offline time threshold value, the terminal detects the safety heat The wireless access signal of point, then reset the offline time;If occur the offline situation of the terminal again next time, then weigh It is new to start timing.For example, it is assumed that the preset offline time threshold value is 48 hours, the terminal detects the safe hot spot Wireless access signal when, to the timing of the offline time be 23 hours 15 points, be less than the offline time threshold value, then will The offline time distinguishes zero for 23 hours 15, waits reclocking.
Step S104 confirms institute if the offline time of the safe hot spot is more than the preset offline time threshold value It states terminal and is in abnormality.
Specifically, making when the terminal persistently can't detect the safe hot spot in the case where the non-outgoing mode The offline time for obtaining the safe hot spot is more than the preset offline time threshold value, then can be confirmed that the terminal is in abnormal State, such as stolen, loss etc..
Step S105 carries out locking processing to the terminal.
Specifically, after the terminal is identified in abnormality locking processing can be taken to the terminal, pass through The system that the holder of the terminal cannot be introduced into the terminal after locking processing also can not just open the application of the terminal Program interface, system desktop etc., therefore cannot be introduced into the terminal terminal is obtained by other people and steal or reveal institute State the user information of user.Further alternative, the user can preset an emergency contact mailbox, to the end Before end carries out locking processing, the user information of the terminal can be backed up and be sent to the emergency contact postal of the user preset Case, in case the user loses important information.
The embodiment of the present invention, which passes through, judges that can terminal detect the wireless access signal of the safe hot spot of user preset, if Whether the terminal cannot detect the wireless access signal of the safe hot spot, then judge the terminal currently in preset Outgoing mode carries out timing for the offline time of the safe hot spot if the terminal is not at the outgoing mode, if The offline time of the safe hot spot is more than the preset offline time threshold value, then confirms that the terminal is in abnormality, Locking processing is carried out to the terminal, realizes the safe hot spot by monitor terminal, determines whether terminal is in stolen, loses Etc. abnormalities, and in abnormality to terminal into row lock protection, prevent the leakage of user data.
Fig. 2 is the flow diagram of terminal locking method in another embodiment of the present invention.The side of the present embodiment as described in Figure Method may include:
Step S201 obtains the current wifi hotspot list of the terminal.
Specifically, the wifi hotspot search of the terminal is opened in the place that the user can often go at oneself, so that institute State the list for all wifi hotspots that terminal is got around the place.
Step S202 selects the wifi hotspot in the wifi hotspot list as the safe hot spot.
Specifically, due to the user often to go to place that may have multiple, the safe hot spot also can be set more It is a, one or several wifi hotspots can be selected to make in the wifi hotspot list in the place that each user often goes For the safe hot spot.For example, the wifi hotspot that can add user's family can also be added as a safe hot spot The wifi hotspot of the Subscriber Unit can also continue to add the wifi that the user often goes to friend house as a safe hot spot Hot spot is as safe hot spot etc..In the preferred embodiment, the setting of the safe hot spot can not only have privacy but also have Common property, and should not be arranged it is excessive, can just play so timely and accurately judge whether the terminal abnormal.
Step S203, when the terminal detects the wireless access signal of the safe hot spot of the user preset, setting Come into force beginning and ending time or the duration that comes into force of the outgoing mode.
Specifically, if the user has the special circumstances such as outgoing to cause not appearing in for some time and often go in place, The i.e. described terminal can't detect the unlimited access signal of the safe hot spot for some time, and the user can set outgoing Come into force beginning and ending time or the duration that comes into force of mode and the outgoing mode.The beginning and ending time of coming into force can be the outer depanning The time of formula beginning and end, such as 8:00 on May 1st, 2016 come into effect, and on May 3rd, 2016,18:00 terminated to come into force;Institute It is 48 hours a length of when stating the duration that comes into force and can be the outgoing mode and come into force duration length, such as coming into force, i.e., it is described outer Mode is opened at once from current time out continue 48 hours after terminate.In specific implementation, when the terminal can detecte it is described When the wireless access signal of the safe hot spot of user preset, illustrate that the terminal is often going in place in the user, It is considered that the terminal is in a safe condition, it in this case, just can be to depanning outside the terminal profile Formula carries out this setting after stealing the terminal to avoid other people.
Step S204 confirms when coming into force of the outgoing mode according to come into force beginning and ending time or the duration that comes into force Between section.
Specifically, by setting of the step S203 to come into force beginning and ending time or the duration that comes into force of the outgoing mode, The terminal can determine the entry-into-force time section of the outgoing mode.For example, if the user setting is described outgoing The beginning and ending time of coming into force of mode is that 8:00 on May 1st, 2016 comes into effect, and on May 3rd, 2016,18:00 terminated to come into force, then institute The entry-into-force time section for stating outgoing mode is 8:00 on May 1st, 2016 --- on May 3rd, 2016 18:00;If the user It is provided that a length of 48 hours when coming into force of the outgoing mode, and assumes that current time is 12:00 on May 1st, 2016, then The entry-into-force time section that the outgoing mode can still be extrapolated is 12:00 on May 1st, 2016 --- on May 3rd, 2016 12:00.
Step S205 judges that can terminal detect the wireless access signal of safe hot spot of user preset.
Specifically, terminal can be whether there is by the wireless access signal of the detection safe hot spot of timing to judge Whether the terminal appears in the place that the user often occurs.For example, if the wifi of oneself family of the user setting Hot spot is as the safe hot spot, then if the terminal detects the wireless access signal of the safe hot spot, described in explanation Terminal appears in the family of the user, then can also illustrate that the terminal is in a safe condition lower.Further, If the user is provided with multiple wifi hotspots as the safe hot spot in step S202, just only timing judges institute The wireless access signal for any one safe hot spot that can terminal detect in the safe hot spot is stated, as long as can detect To the wireless access signal of any one safe hot spot, can illustrate the terminal be in place that the user often goes it One, i.e., it is believed that the terminal is in a safe condition lower.
Step S206 judges the end if the terminal cannot detect the wireless access signal of the safe hot spot Whether end is current is in preset outgoing mode.
Specifically, when the safe hot spot is one, if the terminal cannot detect the nothing of this safe hot spot Whether line accesses signal, then directly judge the terminal currently in preset outgoing mode;When the safe hot spot is multiple When, only when the terminal cannot detect the wireless access signal of all safe hot spots, just start to judge the end Whether end is current is in preset outgoing mode, as long as otherwise can detect any one wireless access in the safe hot spot Signal, then it represents that the terminal security.
Step S207, if the terminal is in the outgoing mode, detecting current time, whether to be in the user pre- If outgoing mode entry-into-force time section in.
Specifically, can periodically detect whether current time is located when detecting that the terminal is in the outgoing mode In the entry-into-force time section being arranged before the outgoing mode.For example, it is assumed that the user has preset the terminal The entry-into-force time section of outgoing mode is 8:00 on May 1st, 2016 --- on May 3rd, 2016 18:00, if timing detects It is 14:15 on May 2nd, 2016 to current time, then the terminal detection current time is coming into force in the outgoing mode In time interval;If timing detects that current time is 23:00 on May 3rd, 2016, the terminal detection current time is not It is in the entry-into-force time section in the outgoing mode.
Step S208 exits the outgoing mode if current time is not in the entry-into-force time section.
Specifically, if when current time in the entry-into-force time section, though the terminal cannot detect it is described The wireless access signal of safe hot spot, the terminal will not be judged as abnormality, and the terminal will continue timing and detect Whether the terminal is still under gone out mode;Conversely, if current time is not in the entry-into-force time section, it is described Terminal exits the outgoing mode.
Step S209, if the terminal is not at the outgoing mode, for the safe hot spot offline time into Row timing.
Specifically, if the terminal both can't detect the wireless access signal of the safe hot spot not also in described outgoing Mode, it may be considered that the terminal is currently at offline state, then the timing since the determination terminal offline time, Obtain the offline time of the safe hot spot.
Step S210, when the terminal detects the wireless access signal of the safe hot spot, by the offline time It resets.
Specifically, the terminal can preset an offline time threshold value, when the offline time of the safe hot spot In the case where being less than the preset offline time threshold value, the terminal detects the wireless access letter of the safe hot spot Number, then the offline time is reset.If occur the offline situation of the terminal again next time, then restart timing.Example Such as, it is assumed that the preset offline time threshold value is 48 hours, and the terminal detects the wireless access letter of the safe hot spot Number when, to the timing of the offline time be 23 hours 15 points, be less than the offline time threshold value, then by the offline time Zero is distinguished within 23 hours 15, reclocking is waited.
Step S211 confirms institute if the offline time of the safe hot spot is more than the preset offline time threshold value It states terminal and is in abnormality.
Specific method can refer to step S104.
Step S212 backs up the user information of the terminal and is sent to the mailbox of the user preset.
Specifically, the user can preset an emergency contact mailbox, locking processing is being carried out to the terminal Before, the user information of the terminal can be backed up and be sent to the emergency contact mailbox of the user preset, in order to avoid the use Lose important information in family.
Step S213 carries out locking processing to the terminal.
Specifically, after the terminal is identified in abnormality then locking processing can be taken to the terminal, pass through The system that the holder of the terminal after locking processing cannot be introduced into the terminal is crossed, answering for the terminal also can not be just opened With program interface, system desktop etc., therefore it cannot be introduced into the terminal terminal is obtained by other people and steal or reveal The user information of the user.
Step S214 generates locking mark and the locking mark is written to the initial parameter subregion of the terminal preset.
Specifically, locking mark can be generated and write locking mark after carrying out locking processing to the terminal Enter the initial parameter subregion of the terminal preset, the initial parameter subregion is being used to of just distributing when leaving the factory of the terminal The initialization application and setting of the terminal are stored, therefore when the initial parameter of the terminal preset is written in the locking mark After subregion, no matter the methods of reset system, initialization, factory reset are taken to the terminal, the locking mark all can It still remains.
Step S215 detects whether the terminal there is the locking to identify when detecting that the terminal turns back on.
Specifically, when detecting that the terminal turns back on, the terminal can detecte whether the terminal has institute State locking mark.If the terminal has been locked, then the terminal can still be examined when no matter turning back in what method The terminal is measured to identify with the locking;If the terminal be not locked out it is in a safe condition, then when turning back on, just It will not detect the locking mark, the terminal system can be normally entered, or carry out the programs such as authentication.
Step S216, if detecting, the terminal is identified with the locking, locks the terminal.
Specifically, if detecting, the terminal is identified with the locking, illustrates that the terminal is to be in abnormality, The terminal is then locked, in order to avoid reveal the user information of the user.
The embodiment of the present invention, which passes through, judges that can terminal detect the wireless access signal of the safe hot spot of user preset, if Whether the terminal cannot detect the wireless access signal of the safe hot spot, then judge the terminal currently in preset Outgoing mode carries out timing for the offline time of the safe hot spot if the terminal is not at the outgoing mode, if The offline time of the safe hot spot is more than the preset offline time threshold value, then confirms that the terminal is in abnormality, Locking processing is carried out to the terminal, realizes the safe hot spot by monitor terminal, determines whether terminal is in stolen, loses Etc. abnormalities, and in abnormality to terminal into row lock protection, prevent the leakage of user data.
Fig. 3 is a kind of composed structure schematic diagram of terminal in the embodiment of the present invention, and the terminal may include mobile phone, notes This computer, tablet computer, vehicle-mounted computer, POS (Point Of Sales, point of sale) machine etc..The end of the present embodiment as described in Figure End may include:
Hot spots detection module 310, for judging that can terminal detect the wireless access letter of the safe hot spot of user preset Number.
Specifically, the safe hot spot can be the common but wifi hotspot of secret that the user specifies, such as family Front yard wifi hotspot, company's wifi hotspot etc., Hot spots detection module 310 can pass through the wireless of the detection safe hot spot of timing Access signal whether there is to judge whether the terminal appears in the place that the user often occurs.For example, if described The wifi hotspot of user setting oneself family is as the safe hot spot, then if Hot spots detection module 310 detects the peace The wireless access signal of full hot spot, illustrates that the terminal appears in the family of the user, then can also illustrate the end End is in a safe condition lower;Otherwise, then it needs to trigger outgoing detection module 312 and detects whether the user has outgoing feelings Condition.Further, if the multiple wifi hotspots of the user setting are as the safe hot spot, just only timing judges institute The wireless access signal for any one safe hot spot that can terminal detect in the safe hot spot is stated, as long as can detect To the wireless access signal of any one safe hot spot, can illustrate the terminal be in place that the user often goes it One, i.e., it is believed that the terminal is in a safe condition lower.
Outgoing detection module 312, if cannot detect the wireless access signal of the safe hot spot for the terminal, Judge the terminal currently whether in preset outgoing mode.
Specifically, when the safe hot spot is one, if Hot spots detection module 310 cannot detect this safety heat Whether the wireless access signal of point, then detection module 312 of going out directly judge the terminal currently in preset outgoing mode; When the safe hot spot is multiple, only when Hot spots detection module 310 cannot detect the wireless of all safe hot spots When accessing signal, outgoing detection module 312 just starts to judge whether the terminal is currently in preset outgoing mode, otherwise only Want to detect any one wireless access signal in the safe hot spot, then it represents that the terminal security.
Offline timing module 314, if being not at the outgoing mode for the terminal, for the safe hot spot Offline time carries out timing.
Specifically, if the terminal both can't detect the wireless access signal of the safe hot spot not also in described outgoing Mode, it may be considered that the terminal is currently at offline state, then offline timing module 314 is offline from the determination terminal Time start timing, obtain the offline time of the safe hot spot.
Abnormal module 316, if the offline time for the safe hot spot is more than the preset offline time threshold value, Confirm that the terminal is in abnormality.
Specifically, making when the terminal persistently can't detect the safe hot spot in the case where the non-outgoing mode The offline time for obtaining the safe hot spot is more than the preset offline time threshold value, then abnormal module 316 can be confirmed described Terminal is in abnormality, such as stolen, loss etc..
Locking module 318, for carrying out locking processing to the terminal.
Specifically, after the terminal is identified in abnormality, then it can be by locking module 318 to the terminal Locking processing is taken, the system that the holder of the terminal cannot be introduced into the terminal after locking processing just can not yet Application Program Interface, the system desktop etc. of the terminal are opened, therefore cannot be introduced into institute the terminal is obtained by other people State the user information that the user was stolen or revealed to terminal.
The locking module 318 is also used to: if detecting, the terminal is identified with the locking, locks the end End.
Specifically, illustrating that the terminal is place if locking module 318 detects that the terminal is identified with the locking In abnormality, then the terminal is locked, in order to avoid reveal the user information of the user.
Further, the terminal further include:
Come into force detection module 320, if being in the outgoing mode for the terminal, detects whether current time is in In the entry-into-force time section of the outgoing mode of the user preset.
Specifically, the detection module 320 that comes into force can be detected periodically when detecting that the terminal is in the outgoing mode Whether current time is in the entry-into-force time section being arranged before the outgoing mode.For example, it is assumed that the user is pre- If the entry-into-force time section of the outgoing mode of the terminal is 8:00 on May 1st, 2016 --- 3 days 18 May in 2016: 00, if timing detects that current time is 14:15 on May 2nd, 2016, the terminal detection current time is in described outer Out in the entry-into-force time section of mode;If timing detects that current time is 23:00 on May 3rd, 2016, the terminal inspection Current time is surveyed to be not in the entry-into-force time section of the outgoing mode.
Module 322 is exited, if being not in the entry-into-force time section for current time, exits the outer depanning Formula.
Specifically, if when current time in the entry-into-force time section, though the terminal cannot detect it is described The wireless access signal of safe hot spot, the terminal will not be judged as abnormality, and the terminal will continue timing and detect Whether the terminal is still under gone out mode;Conversely, being exited if current time is not in the entry-into-force time section Module 322 makes the terminal exit the outgoing mode.
Dump block 324, when for detecting the wireless access signal of the safe hot spot when the terminal, will it is described from The line time resets.
Specifically, the terminal can preset an offline time threshold value, when the offline time of the safe hot spot In the case where being less than the preset offline time threshold value, Hot spots detection module 310 detects the nothing of the safe hot spot Line accesses signal, then dump block 324 resets the offline time.If occurring the offline situation of the terminal again next time When, then restart timing.For example, it is assumed that the preset offline time threshold value is 48 hours, Hot spots detection module 310 is detected To the safe hot spot wireless access signal when, offline timing module 314 is 23 hours 15 to the timing of the offline time Point, it is less than the offline time threshold value, then the offline time is distinguished zero for 23 hours 15, waits reclocking.
Mark module 326 is locked, the first of the terminal preset is written for generating to lock mark and identify the locking Beginning parameter subregion.
Specifically, locking mark module 326 can be generated locking mark and will after carrying out locking processing to the terminal The locking mark is written the initial parameter subregion of the terminal preset, the initial parameter subregion be the terminal when leaving the factory The initialization application for being used to store the terminal that just distributes and setting, therefore when the locking mark write-in terminal After preset initial parameter subregion, no matter the methods of reset system, initialization, factory reset, institute are taken to the terminal Stating locking mark can all still remain.
Label detection module 328, for detecting whether the terminal has institute when detecting that the terminal turns back on State locking mark.
Specifically, whether label detection module 328 can detecte the terminal when detecting that the terminal turns back on It is identified with the locking.If the terminal has been locked, then when no matter being turned back in what method, label detection module 328 still can detecte the terminal identifies with the locking;If the terminal be not locked out it is in a safe condition, then When turning back on, the locking mark would not be detected, the terminal system can be normally entered, or carry out authentication etc. Program.
Hot spot obtains module 330, for obtaining the current wifi hotspot list of the terminal.
Specifically, the wifi hotspot search of the terminal is opened in the place that the user can often go at oneself, so that hot Point obtains the list that module 330 gets all wifi hotspots around the place.
Hot spot selecting module 332, for selecting the wifi hotspot in the wifi hotspot list as the safe hot spot.
Specifically, due to the user often to go to place that may have multiple, the safe hot spot also can be set more A, hot spot selecting module 332 can select one in the wifi hotspot list in the place that each user often goes Or several wifi hotspots are as the safe hot spot.For example, the wifi hotspot that can add user's family is pacified as one Full hot spot can also add the wifi hotspot of the Subscriber Unit as a safe hot spot, can also continue to add the use Family often goes the wifi hotspot of friend home to as safe hot spot etc..In the preferred embodiment, the setting of the safe hot spot can be with Not only it with privacy but also with common property, and should not be arranged excessively, can just play the judgement end timely and accurately in this way Whether end is abnormal.
Outgoing setting module 334, the wireless access of the safe hot spot for detecting the user preset when the terminal When signal, come into force beginning and ending time or the duration that comes into force of the outgoing mode are set.
Specifically, if the user has the special circumstances such as outgoing to cause not appearing in for some time and often go in place, The i.e. described terminal can't detect the unlimited access signal of the safe hot spot for some time, and the user can be by outgoing Setting module 334 sets come into force beginning and ending time or the duration that comes into force of outgoing mode and the outgoing mode.The start-stop that comes into force Time can be the time of the outgoing mode beginning and end, such as 8:00 on May 1st, 2016 comes into effect, in May, 2016 18:00 terminated to come into force on 3rd;The duration that comes into force can be the outgoing mode and come into force duration length, such as when coming into force A length of 48 hours, i.e., the described outgoing mode is opened at once from current time continue 48 hours after terminate.In specific implementation, when described When terminal can detecte the wireless access signal of the safe hot spot of the user preset, illustrate that the terminal is in the use Family is often gone in place, it is believed that the terminal is in a safe condition, in this case, just can be to institute The outgoing mode of terminal profile is stated, carries out this setting after stealing the terminal to avoid other people.
Come into force section module 336, for beginning and ending time or the duration that comes into force of coming into force according to, confirms the outer depanning The entry-into-force time section of formula.
Specifically, by outgoing setting module 334 to come into force beginning and ending time or the duration that comes into force of the outgoing mode Setting, the section module 336 that comes into force can determine the entry-into-force time section of the outgoing mode.For example, if the user sets Set is the outgoing mode come into force the beginning and ending time be 8:00 on May 1st, 2016 come into effect, on May 3rd, 2016 18:00 End comes into force, then the entry-into-force time section of the outgoing mode is 8:00 on May 1st, 2016 --- on May 3rd, 2016 18:00;If the user setting is the outgoing mode a length of 48 hours when coming into force, and assumes that current time is 2016 May 1 12:00, then still can extrapolate the outgoing mode entry-into-force time section be 1 day 12 May in 2016: 00 --- on May 3rd, 2016 12:00.
Backup module 338, for backing up the user information of the terminal and being sent to the mailbox of the user preset.
Specifically, the user can preset an emergency contact mailbox, locking processing is being carried out to the terminal Before, backup module 338 can back up the user information of the terminal and be sent to the emergency contact mailbox of the user preset, In order to avoid the user loses important information.
The embodiment of the present invention, which passes through, judges that can terminal detect the wireless access signal of the safe hot spot of user preset, if Whether the terminal cannot detect the wireless access signal of the safe hot spot, then judge the terminal currently in preset Outgoing mode carries out timing for the offline time of the safe hot spot if the terminal is not at the outgoing mode, if The offline time of the safe hot spot is more than the preset offline time threshold value, then confirms that the terminal is in abnormality, Locking processing is carried out to the terminal, realizes the safe hot spot by monitor terminal, determines whether terminal is in stolen, loses Etc. abnormalities, and in abnormality to terminal into row lock protection, prevent the leakage of user data.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the program can be stored in a computer-readable storage medium In, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, the storage medium can be magnetic Dish, CD, read-only memory (Read-Only Memory, ROM) or random access memory (Random Access Memory, RAM) etc..
The above disclosure is only the preferred embodiments of the present invention, cannot limit the right model of the present invention with this certainly It encloses, therefore equivalent changes made in accordance with the claims of the present invention, is still within the scope of the present invention.

Claims (12)

1. a kind of terminal locking method, which is characterized in that the described method includes:
Judge that can terminal detect that the wireless access signal of safe hot spot of user preset, the safe hot spot are the user Specified wifi hotspot;
If the terminal cannot detect the wireless access signal of the safe hot spot, judge whether the terminal is currently in Preset outgoing mode, the preset outgoing mode are that user is needing to travel, go on business, and leave the covering of the safe hot spot In the case where range and set or open, the preset outgoing mode includes following one kind: tourism pattern, mode of going on business, from On-mode;
If the terminal is not at the outgoing mode, timing is carried out for the offline time of the safe hot spot;
If the offline time of the safe hot spot is more than preset offline time threshold value, confirm that the terminal is in abnormal shape State;
Locking processing is carried out to the terminal;
It generates locking mark and the locking mark is written to the initial parameter subregion of the terminal preset;
The method also includes:
When detecting that the terminal turns back on, detect whether the terminal there is the locking to identify;
If detecting, the terminal is identified with the locking, locks the terminal.
2. terminal locking method as described in claim 1, which is characterized in that the method also includes:
If the terminal is in the outgoing mode, the outgoing mode whether current time is in the user preset is detected In entry-into-force time section;
If current time is not in the entry-into-force time section, the outgoing mode is exited.
3. terminal locking method as claimed in claim 2, which is characterized in that can the judgement terminal detect user preset Safe hot spot wireless access signal before further include:
When the terminal detects the wireless access signal of the safe hot spot of the user preset, the outgoing mode is set Come into force beginning and ending time or the duration that comes into force;
According to come into force beginning and ending time or the duration that comes into force, the entry-into-force time section of the outgoing mode is confirmed.
4. terminal locking method as described in claim 1, which is characterized in that the method also includes:
When the terminal detects the wireless access signal of the safe hot spot, the offline time is reset.
5. terminal locking method as described in claim 1, which is characterized in that can the judgement terminal detect user preset Safe hot spot wireless access signal before further include:
Obtain the current wifi hotspot list of the terminal;
Select the wifi hotspot in the wifi hotspot list as the safe hot spot.
6. terminal locking method as described in claim 1, which is characterized in that before the progress locking processing to the terminal Further include:
It backs up the user information of the terminal and is sent to the mailbox of the user preset.
7. a kind of terminal, which is characterized in that the terminal includes:
Hot spots detection module, it is described for judging that can terminal detect the wireless access signal of the safe hot spot of user preset Safe hot spot is the wifi hotspot that the user specifies;
Outgoing detection module judges institute if cannot detect the wireless access signal of the safe hot spot for the terminal Whether terminal is stated currently in preset outgoing mode, and the preset outgoing mode is that user is needing to travel, go on business, and is left It sets or opens in the case where the coverage area of the safe hot spot, the preset outgoing mode includes following one kind: trip Trip mode, leaves mode at mode of going on business;
Offline timing module, if being not at the outgoing mode for the terminal, for the safe hot spot it is offline when Between carry out timing;
Abnormal module confirms the end if the offline time for the safe hot spot is more than preset offline time threshold value End is in abnormality;
Locking module, for carrying out locking processing to the terminal;
Wherein, the terminal further include:
Mark module is locked, for generating locking mark and described lock being identified the initial parameter point that the terminal preset is written Area;
Label detection module, for detecting whether the terminal has the locking when detecting that the terminal turns back on Mark;
The locking module is also used to: if detecting, the terminal is identified with the locking, locks the terminal.
8. terminal as claimed in claim 7, which is characterized in that the terminal further include:
Come into force detection module, if being in the outgoing mode for the terminal, detects whether current time is in the use In the entry-into-force time section of the preset outgoing mode in family;
Module is exited, if being not in the entry-into-force time section for current time, exits the outgoing mode.
9. terminal as claimed in claim 8, which is characterized in that the terminal further include:
Outgoing setting module, when for detecting the wireless access signal of safe hot spot of the user preset when the terminal, Set come into force beginning and ending time or the duration that comes into force of the outgoing mode;
Come into force section module, for beginning and ending time or the duration that comes into force of coming into force according to, confirms the life of the outgoing mode Imitate time interval.
10. terminal as claimed in claim 7, which is characterized in that the terminal further include:
Dump block, when for detecting the wireless access signal of the safe hot spot when the terminal, by the offline time It resets.
11. terminal as claimed in claim 7, which is characterized in that the terminal further include:
Hot spot obtains module, for obtaining the current wifi hotspot list of the terminal;
Hot spot selecting module, for selecting the wifi hotspot in the wifi hotspot list as the safe hot spot.
12. terminal as claimed in claim 7, which is characterized in that the terminal further include:
Backup module, for backing up the user information of the terminal and being sent to the mailbox of the user preset.
CN201510449743.1A 2015-07-28 2015-07-28 A kind of terminal locking method and terminal Active CN105550588B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510449743.1A CN105550588B (en) 2015-07-28 2015-07-28 A kind of terminal locking method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510449743.1A CN105550588B (en) 2015-07-28 2015-07-28 A kind of terminal locking method and terminal

Publications (2)

Publication Number Publication Date
CN105550588A CN105550588A (en) 2016-05-04
CN105550588B true CN105550588B (en) 2019-06-11

Family

ID=55829775

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510449743.1A Active CN105550588B (en) 2015-07-28 2015-07-28 A kind of terminal locking method and terminal

Country Status (1)

Country Link
CN (1) CN105550588B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106231594B (en) * 2016-09-19 2019-12-10 惠州Tcl移动通信有限公司 Mobile terminal information protection method and system
CN108632758B (en) * 2018-04-09 2021-04-09 Oppo广东移动通信有限公司 Terminal tracking method, processing device, terminal and storage medium
CN110457079A (en) * 2019-08-12 2019-11-15 深圳联想懂的通信有限公司 A kind of Off-line control method and electronic equipment
CN111145442A (en) * 2019-12-31 2020-05-12 杭州极客科技有限公司 Intelligent charging system, control method, electronic device, and medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101252703A (en) * 2008-03-28 2008-08-27 宇龙计算机通信科技(深圳)有限公司 Terminal data protecting method, system as well as mobile communication terminal
CN103763391A (en) * 2013-02-05 2014-04-30 李明 Method for achieving anti-lost function of mobile equipment based on environment recognition

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9042865B2 (en) * 2012-03-29 2015-05-26 Sony Computer Entertainment America Llc Method for determining mobile device password settings based on check-in information

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101252703A (en) * 2008-03-28 2008-08-27 宇龙计算机通信科技(深圳)有限公司 Terminal data protecting method, system as well as mobile communication terminal
CN103763391A (en) * 2013-02-05 2014-04-30 李明 Method for achieving anti-lost function of mobile equipment based on environment recognition

Also Published As

Publication number Publication date
CN105550588A (en) 2016-05-04

Similar Documents

Publication Publication Date Title
CN105550588B (en) A kind of terminal locking method and terminal
CN105530356B (en) Communication terminal and its data guard method and device
CN101772018A (en) Theft preventing mobile terminal and theft preventing method of mobile terminal
US10754806B2 (en) Method and apparatus for access to a computer unit
CN105320880B (en) The control method and device of terminal
CN205594622U (en) Computer storage system
CN105262885B (en) A kind of mobile terminal and its pintle hook lock theft preventing method with pintle hook lock anti-theft feature
CN104915599A (en) Application program monitoring method and terminal
CN106096450A (en) A kind of application program freezing method and mobile terminal
CN102243698A (en) Method for realizing information security of intelligent terminal and intelligent terminal
CN105376711A (en) Position prompting method and apparatus of wearable device, and wearable device
CN104243708A (en) Mobile terminal and anti-theft method and device of mobile terminal
CN108399710A (en) A kind of fingerprint recognition alarm method, system and terminal device
CN107292208B (en) Anti-theft method and device for mobile terminal
US20130303112A1 (en) Tracking of missing communication devices
CN105141736A (en) Information security protection method and apparatus
CN106453057B (en) A kind of method and terminal for preventing short message to be stolen
US10977350B2 (en) Contact information display method and device, and information display method and device
CN104412274A (en) Portable terminal, program, and control method
US8182549B2 (en) Terminal theft protection process, and corresponding system, terminal and computer program
CN106850987A (en) The guard method of terminal device and SIM
CN109492439A (en) Information protecting method, terminal device and computer readable storage medium
CN105611496B (en) Position indicating method, device and the mobile terminal of mobile terminal
CN114357398A (en) Terminal access right processing method and device and electronic equipment
CN107454972A (en) A kind of IC-card management method, system and access controller

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant