CN105825156B - Tamper-proof processing method, device and terminal device - Google Patents
Tamper-proof processing method, device and terminal device Download PDFInfo
- Publication number
- CN105825156B CN105825156B CN201610162603.0A CN201610162603A CN105825156B CN 105825156 B CN105825156 B CN 105825156B CN 201610162603 A CN201610162603 A CN 201610162603A CN 105825156 B CN105825156 B CN 105825156B
- Authority
- CN
- China
- Prior art keywords
- terminal device
- tamper
- account
- transceiver
- proof
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/88—Detecting or preventing theft or loss
Abstract
The application proposes a kind of tamper-proof processing method, device and terminal device, wherein, this method includes:Receive tamper-proof enabled instruction;The transceiver in terminal device is controlled to launch continuous power signal with default power grade, so that the transceiver can not reception signal.Pass through tamper-proof processing method, device and terminal device provided by the invention, realize after effectively preventing that terminal device is stolen, other people illegally obtain the personal information or property of terminal device owning user, improve the security of terminal device, improve Consumer's Experience.
Description
Technical field
The application is related to technical field of information processing, more particularly to a kind of tamper-proof processing method, device and terminal device.
Background technology
At present, mobile terminal, as mobile phone or palm PC are increasingly popularized.People can be completed various each by mobile terminal
The activities such as work, life or the amusement of sample, accordingly, the various information of user can be also stored with mobile terminal.
This causes mobile terminal once losing, and other people cans usurp the mobile terminal by ill-gotten mobile terminal
The information of owning user, and then illegal operation is carried out, for example third party's property etc. is paid, transferred accounts or is defrauded of, this is serious
The interests of mobile terminal affiliated user are compromised, reduce the security of mobile terminal.
The content of the invention
The application is intended to one of technical problem at least solving in correlation technique to a certain extent.
Therefore, first purpose of the application is to propose a kind of tamper-proof processing method, the method achieve effective
After preventing that terminal device is stolen, other people illegally obtain the personal information or property of terminal device owning user, improve terminal
The security of equipment, improves Consumer's Experience.
Second purpose of the application is to propose another tamper-proof processing unit.
The 3rd purpose of the application is to propose a kind of terminal device.
The 4th purpose of the application is to propose another terminal device.
For the above-mentioned purpose, the application first aspect embodiment proposes a kind of tamper-proof processing method, including:
Receive tamper-proof enabled instruction;
The transceiver in terminal device is controlled to launch continuous power signal with default power grade, so that the transmitting-receiving
Device can not reception signal.
The tamper-proof processing method of the embodiment of the present application, after tamper-proof enabled instruction is received, that is, control in terminal device
The continuous power signal of Transceiver Transmit, to make transceiver can not reception signal.It is achieved thereby that effectively prevent terminal from setting
After stolen, other people illegally obtain the personal information or property of terminal device owning user, improve the safety of terminal device
Property, improve Consumer's Experience.
For the above-mentioned purpose, second aspect of the application proposes a kind of tamper-proof processing unit, including:
First receiving module, for receiving tamper-proof enabled instruction;
Control module, continuous power letter is launched with default power grade for controlling the transceiver in terminal device
Number, so that the transceiver can not reception signal.
The tamper-proof processing unit of the embodiment of the present application, after tamper-proof enabled instruction is received, that is, control in terminal device
The continuous power signal of Transceiver Transmit, to make transceiver can not reception signal.It is achieved thereby that effectively prevent terminal from setting
After stolen, other people illegally obtain the personal information or property of terminal device owning user, improve the safety of terminal device
Property, improve Consumer's Experience.
For the above-mentioned purpose, the 3rd aspect of the application proposes a kind of terminal device, including antitheft use described above
Manage device.
For the above-mentioned purpose, the 4th aspect of the application proposes a kind of terminal device, including:Following one or more groups
Part:Circuit board, housing, processor, memory, power circuit, multimedia groupware, audio-frequency assembly, input/output (I/O's) connects
Mouthful, sensor cluster, and communication component;Wherein, the circuit board is placed in the interior volume that the housing surrounds, the place
Reason device and the memory are arranged on the circuit board;The power circuit, for each circuit for the mobile terminal
Or device power supply;The memory is used to store executable program code;The processor is deposited by reading in the memory
The executable program code of storage runs program corresponding with the executable program code, for performing following steps:
Receive tamper-proof enabled instruction;
The transceiver in terminal device is controlled to launch continuous power signal with default power grade, so that the transmitting-receiving
Device can not reception signal.
The terminal device of the embodiment of the present application, after tamper-proof enabled instruction is received, that is, control the transmitting-receiving in terminal device
Device launches continuous power signal, to make transceiver can not reception signal.It is achieved thereby that effectively terminal device is prevented to be stolen
Afterwards, other people illegally obtain the personal information or property of terminal device owning user, improve the security of terminal device, improve
Consumer's Experience.
Brief description of the drawings
Of the invention above-mentioned and/or additional aspect and advantage will become from the following description of the accompanying drawings of embodiments
Substantially and it is readily appreciated that, wherein:
Fig. 1 is the schematic flow sheet of the tamper-proof processing method of the application one embodiment;
Fig. 2 is the schematic flow sheet of the tamper-proof processing method of the application another embodiment;
Fig. 3 is the schematic flow sheet of the tamper-proof processing method of the application another embodiment;
Fig. 4 is the structural representation of the tamper-proof processing unit of the application one embodiment;
Fig. 5 is the structural representation of the tamper-proof processing unit of the application another embodiment;
Fig. 6 is the structural representation of the tamper-proof processing unit of the application another embodiment;
Fig. 7 is the structural representation of the terminal device of the application one embodiment;
Fig. 8 is the structural representation of the terminal device of the application another embodiment.
Embodiment
Embodiments herein is described below in detail, the example of the embodiment is shown in the drawings, wherein from beginning to end
Same or similar label represents same or similar element or the element with same or like function.Below with reference to attached
The embodiment of figure description is exemplary, it is intended to for explaining the application, and it is not intended that limitation to the application.
Below with reference to the accompanying drawings the tamper-proof processing method, device and terminal device of the embodiment of the present application are described.
Fig. 1 is the schematic flow sheet of the tamper-proof processing method of the application one embodiment.
As shown in figure 1, the tamper-proof processing method includes:
Step 101, tamper-proof enabled instruction is received.
Specifically, the executive agent for the tamper-proof processing method that the present embodiment provides is tamper-proof processing unit, the device
It is specifically described exemplified by being configured in the terminal device with transceiver.
It should be noted that the type of terminal device is a lot, can be selected according to using needs, such as:Mobile phone, put down
Plate computer etc..
Specifically, terminal device and other terminal devices can be associated processing by user, and inter-related two
Tamper-proof control can be carried out between individual terminal device.
For example, after first terminal device and second terminal device are associated by user, if finding, first terminal device can not
When finding, then tamper-proof enabled instruction can be sent to first by second terminal device.
Step 102, the transceiver in terminal device is controlled to launch continuous power signal with default power grade, so that
The transceiver can not receive signal of communication.
Wherein, default power grade, can be preset in advance in terminal device, can be Transceiver Transmit signal
Maximum power level or other ranks power grade, default power grade is can realize that transceiver can not
Reception signal is defined.
Or default power grade, can also be tamper-proof processing unit according to the battery electric quantity of terminal device or
The signal strength actually received according to transceiver, is determined in real time.That is above-mentioned steps 102, including:
Judge whether the transceiver receives signal;
If so, then increase the default power grade, so that the transceiver can not reception signal.
For example, if the maximum power level of transceiver is 10, default power grade is 7, then transceiver is with work(
During the continuous power signal of power emission that rate grade is 7, signal is have received again, then tamper-proof processing unit can determine that this
When the transceiver transceiver channel be in unimpeded state, then can increase default power grade, for example power grade is increased
To 8, continue transmission power signal, if now remaining to receive signal, continue to increase power grade, until determining that letter can not be received
Number, i.e. the path blockade of transceiver, so as to prevent other people illegally to be usurped belonging to the terminal device after the terminal device is usurped
The personal information of user or property etc..
It should be noted that terminal device can be divided into a variety of, such as single transceiver according to the quantity of the transceiver of configuration
Terminal device, double transceiver terminal device etc., i.e. terminal device include at least one transceiver, then, above-mentioned steps 102, bag
Include:
Control transceiver all in the terminal device and continuous power signal is launched with default power grade respectively.
For example, include for dual-card dual-standby terminal equipment, terminal device:Global system for mobile communications (Global
System for Mobile Communications, abbreviation GSM), Time Division-Synchronous Code Division Multiple Access (Time Division-
Synchronous Code Division Multiple Access, abbreviation TD-SCDMA) or timesharing Long Term Evolution (Time
Division Long Term Evolution, abbreviation TD-LTE) standard transceiver, and two transceivers of GSM standards, and two
Transceiver can work simultaneously.
Then tamper-proof processing unit is after tamper-proof enabled instruction is received, you can two transceivers of control are simultaneously with default
The continuous power signal of power emission, so that the electricity of terminal is depleted as early as possible.
It should be noted that the power grade of two Transceiver Transmit Power signals can be with identical, can also be different.I.e. pair
For different transceivers, above-mentioned default power grade can refer to a grade, can also refer to including multiple grades.
The tamper-proof processing method of the embodiment of the present application, after tamper-proof enabled instruction is received, that is, control in terminal device
The continuous power signal of Transceiver Transmit, to make transceiver can not reception signal.It is achieved thereby that effectively prevent terminal from setting
After stolen, other people illegally obtain the personal information or property of terminal device owning user, improve the safety of terminal device
Property, improve Consumer's Experience.
Fig. 2 is the schematic flow sheet of the tamper-proof processing method of the application another embodiment.
As shown in Fig. 2 the tamper-proof processing method includes:
Step 201, tamper-proof enabled instruction is received.
Step 202, the transceiver in terminal device is controlled to launch continuous power signal with default power grade, so that
The transceiver can not reception signal.
The specific implementation process of above-mentioned steps 201 and step 202 can refer to above-mentioned steps 101 and the detailed of step 102 is retouched
State, here is omitted.
Step 203, the touch control operation of user's input is received, the touch control operation is used to control closing described antitheft diligent
Energy.
Specifically, the type of touch control operation is a lot, for example slide, point touch operation or pressing operation etc..
Specifically, user can control being turned on and off for the tamper-proof function on terminal device manually, if user passes through
Touch control operation.
Step 204, inquiry message is sent to the first account associated with the terminal device.
Specifically, anti-theft apparatus is after the touch control operation of user's input is received, you can is associated to the terminal device
The first account send inquiry message, ask whether determine close tamper-proof function.
Wherein, inquiry message can realize that the present embodiment is not done to this in the form of short message, mail or instant message etc.
Limit.
Wherein, the first account can be the account with the binding of other terminal devices, can also only be that user can pass through webpage
The account that client logs in, such as mailbox, QQ or wechat account etc..
Step 205, judge whether to receive the instruction message that first account returns, wherein, the instruction message is used for
Tamper-proof function is closed in instruction, if then performing step 206, otherwise performs step 207.
Step 206, the transceiver is controlled to stop transmission power signal.
Step 207, the transceiver is controlled to continue to launch continuous power signal with default power grade.
Specifically, after user receives inquiry message by the first account, you can choose whether to close tamper-proof function, if
Selection is that then anti-theft apparatus can receive instruction message, and then close tamper-proof function according to instruction message, i.e. control transmitting-receiving
Device stops transmission power signal.
Accordingly, if anti-theft apparatus does not receive the instruction message of the first account return, this touch-control behaviour can be confirmed
The operation performed as illegal operation, i.e., the user belonging to non-terminal equipment, then can control the transceiver to continue to launch
Continuous power signal.
It is understood that the first account can also pass through the instruction to terminal device return Do not switch off tamper-proof function
Message, so that content of the anti-theft apparatus according to the instruction message received, it is determined that this time whether touch control operation is legal, and then holds
Operated corresponding to row.
It should be noted that if transceiver in terminal device continues transmission power signal, the battery in terminal device
Electricity can consume very fast, therefore terminal device possibility will soon automatic shutdown.When user recharges for terminal device
After startup, anti-theft apparatus then still may proceed to control Transceiver Transmit continuous because not receiving the instruction message for confirming to close
Power signal, continue to finish the battery power consumption in terminal device.
The tamper-proof processing method of the embodiment of the present application, after tamper-proof enabled instruction is received, that is, control in terminal device
The continuous power signal of Transceiver Transmit, come make transceiver can not reception signal, and receive user input close it is antitheft
After the touch control operation of function, inquiry message is sent to the first account associated with terminal device, is returned receiving the first account
Confirmation message after, just control is closed a terminal the tamper-proof function of equipment, if not receiving confirmation message, control transceiver continues
Launch continuous power signal.It is achieved thereby that after effectively preventing that terminal device is stolen, other people illegally obtain terminal device institute
Belong to the personal information or property of user, improve the security of terminal device, improve Consumer's Experience, and terminal device
The closing of tamper-proof function needs to confirm just to can be achieved by the first account associated, further increases the safety of terminal device
Property and reliability.
Fig. 3 is the schematic flow sheet of the tamper-proof processing method of the application another embodiment.
As shown in figure 3, the tamper-proof processing method, on the basis of above-mentioned Fig. 1 or Fig. 2, in addition to:
Step 301, association request is sent to the second account.
Specifically, user, can be by holding when terminal device and other accounts are associated on the terminal device
Row is operation associated, and association request is sent to the second account.
Wherein, the second account can be the account with the binding of other terminal devices, can also only be that user can pass through webpage
The account that client logs in, such as mailbox, QQ or wechat account etc..
Step 302, the confirmation message that second account returns is received, second account is carried in the confirmation message
Information.
Step 303, second accounts information is preserved.
Specifically, tamper-proof processing unit, after the confirmation message of the second account return is received, you can by the second account
Information is stored in local.
Wherein, the second accounts information, user's mark of the second account, or the device identification for the second account can be referred to,
Or signature for user etc., the present embodiment is not limited this,.
Step 304, tamper-proof enabled instruction is received, the information of the first account is carried in the enabled instruction.
Step 305, judge whether first accounts information matches with the second accounts information, if matching, performs step
306, otherwise, perform step 307.
Step 306, the transceiver in terminal device is controlled to launch continuous power signal with default power grade, so that
The transceiver can not reception signal.
Step 307, terminate.
Specifically, tamper-proof processing unit, after tamper-proof enabled instruction is received, you can judge the first account in enabled instruction
Family information and the second accounts information, if matching, if matching, illustrates that the instruction is reliable, and then control Transceiver Transmit continuous
Power signal;If mismatching, illustrate the instruction for illegal instruction, therefore without response.
It is understood that anti-theft apparatus closes tamper-proof function in the instruction that is used for for receiving above-mentioned first account return
Instruction message after, can also by verify the first accounts information whether be matched with the second accounts information, come judge instruction message
It is whether legal.
The tamper-proof control method of the embodiment of the present application, association request is sent to the second account first, is receiving the second account
After the confirmation message that family returns, i.e., the information of the second account is stored in local, it is antitheft in the startup for receiving the transmission of the first account
After instruction, first determine whether the first accounts information matches with the second accounts information, if matching, control Transceiver Transmit connects
Continuous power signal, if mismatching, terminate, realize after effectively preventing that terminal device is stolen, other people illegally obtain terminal
The personal information or property of equipment owning user, the security of terminal device is improved, improves Consumer's Experience, and pass through
Whether the first accounts information matches with the second accounts information in checking tamper-proof enabled instruction, to start tamper-proof function, enters one
Step improves the safety and reliability of terminal device.
In order to realize above-described embodiment, the application also proposes a kind of tamper-proof processing unit.
Fig. 4 is the structural representation of the tamper-proof processing unit of the application one embodiment.
As shown in figure 4, the tamper-proof processing unit includes:
First receiving module 41, for receiving tamper-proof enabled instruction;
Control module 42, continuous power letter is launched with default power grade for controlling the transceiver in terminal device
Number, so that the transceiver can not reception signal.
Specifically, the tamper-proof processing unit that the present embodiment provides, for performing above-mentioned tamper-proof processing method, the device
It is specifically described exemplified by being configured in the terminal device with transceiver.
It should be noted that the type of terminal device is a lot, can be selected according to using needs, such as:Mobile phone, put down
Plate computer etc..
Specifically, terminal device and other terminal devices can be associated processing by user, and inter-related two
Tamper-proof control can be carried out between individual terminal device.
For example, after first terminal device and second terminal device are associated by user, if finding, first terminal device can not
When finding, then tamper-proof enabled instruction can be sent to first by second terminal device.
Wherein, default power grade, can be preset in advance in terminal device, can be Transceiver Transmit signal
Maximum power level or other ranks power grade, default power grade is can realize that transceiver can not
Reception signal is defined.
Or default power grade, can also be tamper-proof processing unit according to the battery electric quantity of terminal device or
The signal strength actually received according to transceiver, is determined in real time.That is control module 42, is specifically used for:
Judge whether the transceiver receives signal;
If so, then increase the default power grade, so that the transceiver can not reception signal.
In addition, it is necessary to explanation, terminal device can be divided into a variety of according to the quantity of the transceiver of configuration, for example single receive
Device terminal device, double transceiver terminal device etc. is sent out, i.e. terminal device includes at least one transceiver, then, above-mentioned control mould
Block, it is specifically used for:
Control transceiver all in the terminal device and continuous power signal is launched with default power grade respectively.
For example, include for dual-card dual-standby terminal equipment, terminal device:GSM, TD-SCDMA or TD-LTE standard
Transceiver, and two transceivers of GSM standards, and two transceivers can work simultaneously.Then tamper-proof processing unit is receiving
After tamper-proof enabled instruction, you can two transceivers are controlled simultaneously with the continuous power signal of default power emission, so that
The electricity of terminal is depleted as early as possible.
It should be noted that the foregoing explanation to the embodiment of tamper-proof processing method shown in Fig. 1 is also applied for the reality
The tamper-proof processing unit of example is applied, here is omitted.
The tamper-proof processing unit of the embodiment of the present application, after tamper-proof enabled instruction is received, that is, control in terminal device
The continuous power signal of Transceiver Transmit, to make transceiver can not reception signal.It is achieved thereby that effectively prevent terminal from setting
After stolen, other people illegally obtain the personal information or property of terminal device owning user, improve the safety of terminal device
Property, improve Consumer's Experience.
Fig. 5 is the structural representation of the tamper-proof processing unit of the application another embodiment.
As shown in figure 5, the tamper-proof processing unit, on the basis of shown in above-mentioned Fig. 4, in addition to:Second receiving module
51, for receiving the touch control operation of user's input, the touch control operation, which is used to control, closes the tamper-proof function;
Sending module 52, for sending inquiry message to the first account associated with the terminal device;
The control module 42, if being additionally operable to receive the instruction message that first account returns, control the transmitting-receiving
Device stops transmission power signal;Wherein, the instruction message is used to indicate to close tamper-proof function.
Or if not receiving the instruction message that first account returns, the control module 42, it is additionally operable to control institute
Transceiver is stated to continue to launch continuous power signal with default power grade.
Specifically, the type of touch control operation is a lot, for example slide, point touch operation or pressing operation etc..
Specifically, user can control being turned on and off for the tamper-proof function on terminal device manually, if user passes through
Touch control operation.
Specifically, anti-theft apparatus is after the touch control operation of user's input is received, you can is associated to the terminal device
The first account send inquiry message, ask whether determine close tamper-proof function.
Wherein, inquiry message can realize that the present embodiment is not done to this in the form of short message, mail or instant message etc.
Limit.
Wherein, the first account can be the account with the binding of other terminal devices, can also only be that user can pass through webpage
The account that client logs in, such as mailbox, QQ or wechat account etc..
Specifically, after user receives inquiry message by the first account, you can choose whether to close tamper-proof function, if
Selection is that then anti-theft apparatus can receive instruction message, and then close tamper-proof function according to instruction message, i.e. control transmitting-receiving
Device stops transmission power signal.
It should be noted that the explanation of the foregoing tamper-proof processing method embodiment to shown in Fig. 2 is also applied for this
The tamper-proof processing unit of embodiment, here is omitted.
The tamper-proof processing unit of the embodiment of the present application, after tamper-proof enabled instruction is received, that is, control in terminal device
The continuous power signal of Transceiver Transmit, come make transceiver can not reception signal, and receive user input close it is antitheft
After the touch control operation of function, inquiry message is sent to the first account associated with terminal device, is returned receiving the first account
Confirmation message after, just control is closed a terminal the tamper-proof function of equipment, if not receiving confirmation message, control transceiver continues
Launch continuous power signal.It is achieved thereby that after effectively preventing that terminal device is stolen, other people illegally obtain terminal device institute
Belong to the personal information or property of user, improve the security of terminal device, improve Consumer's Experience, and terminal device
The closing of tamper-proof function needs to confirm just to can be achieved by the first account associated, further increases the safety of terminal device
Property and reliability.
Fig. 6 is the structural representation of the tamper-proof processing unit of the application another embodiment.
As shown in fig. 6, the tamper-proof processing unit, on the basis of shown in above-mentioned Fig. 4 or Fig. 5, in addition to:
Relating module 61, for sending association request to the second account;
3rd receiving module 62, for receiving the confirmation message of the second account return, carried in the confirmation message
Second accounts information;
Memory module 63, for preserving second accounts information.
Specifically, user, can be by holding when terminal device and other accounts are associated on the terminal device
Row is operation associated, and association request is sent to the second account.
Wherein, the second account can be the account with the binding of other terminal devices, can also only be that user can pass through webpage
The account that client logs in, such as mailbox, QQ or wechat account etc..
Specifically, tamper-proof processing unit, after the confirmation message of the second account return is received, you can by the second account
Information is stored in local.
Wherein, the second accounts information, user's mark of the second account, or the device identification for the second account can be referred to,
Or signature for user etc., the present embodiment is not limited this,.
Accordingly, in order that tamper-proof enabled instruction is relatively reliable, then association can be carried in tamper-proof enabled instruction
First accounts information, so as to the device, in addition to:
Determining module 64, for determining that first accounts information matches with the second accounts information.
Specifically, tamper-proof processing unit, after tamper-proof enabled instruction is received, you can judge the first account in enabled instruction
Family information and the second accounts information, if matching, if matching, illustrates that the instruction is reliable, and then control Transceiver Transmit continuous
Power signal;If mismatching, illustrate the instruction for illegal instruction, therefore without response.
It should be noted that explaining in detail for method for preventing fraudulent-using embodiment shown in above-mentioned figure Fig. 3, is also applied for this implementation
The anti-theft apparatus of example, here is omitted.
The tamper-proof control device of the embodiment of the present application, association request is sent to the second account first, is receiving the second account
After the confirmation message that family returns, i.e., the information of the second account is stored in local, it is antitheft in the startup for receiving the transmission of the first account
After instruction, first determine whether the first accounts information matches with the second accounts information, if matching, control Transceiver Transmit connects
Continuous power signal, if mismatching, terminate, realize after effectively preventing that terminal device is stolen, other people illegally obtain terminal
The personal information or property of equipment owning user, the security of terminal device is improved, improves Consumer's Experience, and pass through
Whether the first accounts information matches with the second accounts information in checking tamper-proof enabled instruction, to start tamper-proof function, enters one
Step improves the safety and reliability of terminal device.
In order to realize above-described embodiment, the application also proposes a kind of terminal device.
Fig. 7 is the structural representation of the terminal device of the application one embodiment.As shown in fig. 7, the terminal device 1 wraps
Include:Tamper-proof processing unit 2, wherein, tamper-proof processing unit 2 can use the reality shown in the present invention above-mentioned Fig. 4, Fig. 5 or Fig. 6
The tamper-proof processing unit of example offer is provided.
Wherein, the terminal device 1 includes:Mobile phone or tablet personal computer.
The embodiment of the present application terminal device, after tamper-proof enabled instruction is received, that is, control the transceiver in terminal device
Launch continuous power signal, to make transceiver can not reception signal.It is achieved thereby that after effectively preventing that terminal device is stolen,
Other people illegally obtain the personal information or property of terminal device owning user, improve the security of terminal device, improve
Consumer's Experience.
Fig. 8 is the structural representation of the terminal device of the embodiment of the present application another embodiment.For example, terminal device can be with
It is mobile phone etc..
Referring to Fig. 8, terminal device can include following one or more assemblies:
Circuit board 801, housing 802, processor 803, memory 804, power circuit 805, multimedia groupware 806, audio
Component 807, the interface 808 of input/output (I/O), sensor cluster 809, and communication component 810;Wherein, the circuit board
801 are placed in the interior volume that the housing 802 surrounds, and the processor 803 and the memory 804 are arranged on the circuit
On plate 801;The power circuit 805, for each circuit or the device power supply for the mobile terminal;The memory 804
For storing executable program code;The processor 803 is by reading the executable program generation stored in the memory 804
Code runs program corresponding with the executable program code, for performing following steps:
Receive tamper-proof enabled instruction;
The transceiver in terminal device is controlled to launch continuous power signal with default power grade, so that the transmitting-receiving
Device can not reception signal.
It should be noted that the explanation of the foregoing tamper-proof processing method embodiment to shown in Fig. 1, Fig. 2 and Fig. 3
Suitable for the terminal device of the embodiment, its realization principle is similar, and here is omitted.
The embodiment of the present application terminal device, after tamper-proof enabled instruction is received, that is, control the transceiver in terminal device
Launch continuous power signal, to make transceiver can not reception signal.It is achieved thereby that after effectively preventing that terminal device is stolen,
Other people illegally obtain the personal information or property of terminal device owning user, improve the security of terminal device, improve
Consumer's Experience.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show
The description of example " or " some examples " etc. means specific features, structure, material or the spy for combining the embodiment or example description
Point is contained at least one embodiment or example of the application.In this manual, to the schematic representation of above-mentioned term not
Identical embodiment or example must be directed to.Moreover, specific features, structure, material or the feature of description can be with office
Combined in an appropriate manner in one or more embodiments or example.In addition, in the case of not conflicting, the skill of this area
Art personnel can be tied the different embodiments or example and the feature of different embodiments or example described in this specification
Close and combine.
In addition, term " first ", " second " are only used for describing purpose, and it is not intended that instruction or hint relative importance
Or the implicit quantity for indicating indicated technical characteristic.Thus, define " first ", the feature of " second " can be expressed or
Implicitly include at least one this feature.In the description of the present application, " multiple " are meant that at least two, such as two, three
It is individual etc., unless otherwise specifically defined.
Any process or method described otherwise above description in flow chart or herein is construed as, and represents to include
Module, fragment or the portion of the code of the executable instruction of one or more the step of being used to realize specific logical function or process
Point, and the scope of the preferred embodiment of the application includes other realization, wherein can not press shown or discuss suitable
Sequence, including according to involved function by it is basic simultaneously in the way of or in the opposite order, carry out perform function, this should be by the application
Embodiment person of ordinary skill in the field understood.
Expression or logic and/or step described otherwise above herein in flow charts, for example, being considered use
In the order list for the executable instruction for realizing logic function, may be embodied in any computer-readable medium, for
Instruction execution system, device or equipment (such as computer based system including the system of processor or other can be held from instruction
The system of row system, device or equipment instruction fetch and execute instruction) use, or combine these instruction execution systems, device or set
It is standby and use.For the purpose of this specification, " computer-readable medium " can any can be included, store, communicate, propagate or pass
Defeated program is for instruction execution system, device or equipment or the dress used with reference to these instruction execution systems, device or equipment
Put.The more specifically example (non-exhaustive list) of computer-readable medium includes following:Electricity with one or more wiring
Connecting portion (electronic installation), portable computer diskette box (magnetic device), random access memory (RAM), read-only storage
(ROM), erasable edit read-only storage (EPROM or flash memory), fiber device, and portable optic disk is read-only deposits
Reservoir (CDROM).In addition, computer-readable medium, which can even is that, to print the paper of described program thereon or other are suitable
Medium, because can then enter edlin, interpretation or if necessary with it for example by carrying out optical scanner to paper or other media
His suitable method is handled electronically to obtain described program, is then stored in computer storage.
It should be appreciated that each several part of the application can be realized with hardware, software, firmware or combinations thereof.Above-mentioned
In embodiment, software that multiple steps or method can be performed in memory and by suitable instruction execution system with storage
Or firmware is realized.If, and in another embodiment, can be with well known in the art for example, realized with hardware
Any one of row technology or their combination are realized:With the logic gates for realizing logic function to data-signal
Discrete logic, have suitable combinational logic gate circuit application specific integrated circuit, programmable gate array (PGA), scene
Programmable gate array (FPGA) etc..
Those skilled in the art are appreciated that to realize all or part of step that above-described embodiment method carries
Suddenly it is that by program the hardware of correlation can be instructed to complete, described program can be stored in a kind of computer-readable storage medium
In matter, the program upon execution, including one or a combination set of the step of embodiment of the method.
In addition, each functional unit in each embodiment of the application can be integrated in a proxy module, can also
That unit is individually physically present, can also two or more units be integrated in a module.Above-mentioned integrated mould
Block can both be realized in the form of hardware, can also be realized in the form of software function module.The integrated module is such as
Fruit is realized in the form of software function module and as independent production marketing or in use, can also be stored in a computer
In read/write memory medium.
Storage medium mentioned above can be read-only storage, disk or CD etc..Although have been shown and retouch above
Embodiments herein is stated, it is to be understood that above-described embodiment is exemplary, it is impossible to be interpreted as the limit to the application
System, one of ordinary skill in the art can be changed to above-described embodiment, change, replace and become within the scope of application
Type.
Claims (9)
1. a kind of tamper-proof processing method, it is characterised in that comprise the following steps:
Receive tamper-proof enabled instruction;
Control the transceiver in terminal device to launch continuous power signal with default power grade so that the transceiver without
Method reception signal;
Wherein, the default power grade, determined according to the battery electric quantity of terminal device;
Terminal device includes at least one transceiver, and all transceivers work simultaneously, the receipts in the control terminal device
Send out device and continuous power signal is launched with default power grade, including:
Control transceiver all in the terminal device and continuous power signal is launched with default power grade respectively;
Also include:
The touch control operation of user's input is received, the touch control operation, which is used to control, closes the tamper-proof function;
Inquiry message is sent to the first account associated with the terminal device;
If receiving the instruction message that first account returns, the transceiver is controlled to stop transmission power signal;Wherein, institute
Instruction message is stated to be used to indicate to close tamper-proof function;
After the transmission inquiry message to the first account associated with the terminal device, in addition to:
If not receiving the instruction message that first account returns, the transceiver is controlled to continue to send out with default power grade
Penetrate continuous power signal;
First account is the account with the binding of other terminal devices, or the account that user is logged in by webpage client
Family.
2. according to the method for claim 1, it is characterised in that also include;
Association request is sent to the second account;
The confirmation message that second account returns is received, second accounts information is carried in the confirmation message;
Preserve second accounts information.
3. according to the method for claim 2, it is characterised in that the first accounts information is carried in the enabled instruction, it is described
After receiving tamper-proof enabled instruction, in addition to:
Determine that first accounts information matches with the second accounts information.
A kind of 4. tamper-proof processing unit, it is characterised in that including:
First receiving module, for receiving tamper-proof enabled instruction;
Control module, continuous power signal is launched with default power grade for controlling the transceiver in terminal device, with
Make the transceiver can not reception signal;
Wherein, the default power grade, determined according to the battery electric quantity of terminal device;
The terminal device includes at least one transceiver, and all transceivers work simultaneously, the control module, specific to use
In:
Control transceiver all in the terminal device and continuous power signal is launched with default power grade respectively;
Also include:
Second receiving module, for receiving the touch control operation of user's input, the touch control operation is used to control closing described antitheft
Use function;
Sending module, for sending inquiry message to the first account associated with the terminal device;
The control module, if being additionally operable to receive the instruction message that first account returns, the transceiver is controlled to stop
Transmission power signal;Wherein, the instruction message is used to indicate to close tamper-proof function;
First account is the account with the binding of other terminal devices, or the account that user is logged in by webpage client
Family.
5. device according to claim 4, it is characterised in that
If not receiving the instruction message that first account returns, the control module, be additionally operable to control the transceiver after
It is continuous that continuous power signal is launched with default power grade.
6. device according to claim 4, it is characterised in that also include;
Relating module, for sending association request to the second account;
3rd receiving module, the confirmation message returned for receiving second account, described the is carried in the confirmation message
Two accounts informations;
Memory module, for preserving second accounts information.
7. device according to claim 6, it is characterised in that also include:
Determining module, for determining that first accounts information matches with the second accounts information.
8. a kind of terminal device, it is characterised in that including the tamper-proof processing unit as described in claim 4-7 is any.
9. a kind of terminal device, it is characterised in that including following one or more assemblies:Circuit board, housing, processor, storage
Device, power circuit, multimedia groupware, audio-frequency assembly, the interface of input/output (I/O), sensor cluster, and communication component;
Wherein, the circuit board is placed in the interior volume that the housing surrounds, and the processor and the memory are arranged on described
On circuit board;The power circuit, for each circuit or the device power supply for the terminal device;The memory is used to deposit
Store up executable program code;The processor is run and institute by reading the executable program code stored in the memory
Program corresponding to executable program code is stated, for performing step as claimed in claim 1.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610162603.0A CN105825156B (en) | 2016-03-21 | 2016-03-21 | Tamper-proof processing method, device and terminal device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610162603.0A CN105825156B (en) | 2016-03-21 | 2016-03-21 | Tamper-proof processing method, device and terminal device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105825156A CN105825156A (en) | 2016-08-03 |
CN105825156B true CN105825156B (en) | 2018-03-23 |
Family
ID=56524203
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610162603.0A Active CN105825156B (en) | 2016-03-21 | 2016-03-21 | Tamper-proof processing method, device and terminal device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105825156B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110084940B (en) * | 2019-04-29 | 2023-09-22 | 努比亚技术有限公司 | Intelligent anti-theft method, device and system based on wearable equipment and storage medium |
CN111310159A (en) * | 2020-01-17 | 2020-06-19 | 光悦科技(深圳)有限公司 | Anti-theft method and system for solar panel and host |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102739868A (en) * | 2012-06-18 | 2012-10-17 | 奇智软件(北京)有限公司 | Mobile terminal loss processing method and system |
CN105763727A (en) * | 2016-02-16 | 2016-07-13 | 广东欧珀移动通信有限公司 | Three-mode DSDS mobile terminal protection method and system |
CN105763728A (en) * | 2016-02-16 | 2016-07-13 | 广东欧珀移动通信有限公司 | Five-mode DSDS mobile terminal protection method and system |
-
2016
- 2016-03-21 CN CN201610162603.0A patent/CN105825156B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102739868A (en) * | 2012-06-18 | 2012-10-17 | 奇智软件(北京)有限公司 | Mobile terminal loss processing method and system |
CN105763727A (en) * | 2016-02-16 | 2016-07-13 | 广东欧珀移动通信有限公司 | Three-mode DSDS mobile terminal protection method and system |
CN105763728A (en) * | 2016-02-16 | 2016-07-13 | 广东欧珀移动通信有限公司 | Five-mode DSDS mobile terminal protection method and system |
Also Published As
Publication number | Publication date |
---|---|
CN105825156A (en) | 2016-08-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103548395B (en) | For the method and apparatus with the battery of safety element | |
EP2477431B1 (en) | Protection of a security element coupled with an NFC circuit | |
CN104700268B (en) | A kind of method of mobile payment and mobile device | |
CN102160068B (en) | Contactless payment authoring system and method | |
CN104144110A (en) | Message pushing method and system | |
CN103370954A (en) | Mobile wireless communications device having a near field communication (NFC) device and providing memory erasure and related methods | |
US20090152361A1 (en) | Memory card based contactless devices | |
CN104992092A (en) | Method, device and system for fingerprint information verification | |
CN101252748A (en) | System and method for realizing privacy SMS on mobile terminal | |
CN101422058A (en) | Method of securing access to a proximity communication module in a mobile terminal | |
WO2012143653A1 (en) | Access control mechanism for a secure element coupled to an nfc circuit | |
EP2695353A1 (en) | Test of the resistance of a security module of a telecommunication device coupled to an nfc circuit against communication channel diversion attacks | |
CN105068974A (en) | Information processing method and electronic device | |
CN107222632A (en) | Instant messaging method and device | |
CN106027368A (en) | Service data processing method and device | |
CN105868978A (en) | NFC mobile payment method and system thereof | |
CN105825156B (en) | Tamper-proof processing method, device and terminal device | |
Roland | Security issues in mobile NFC devices | |
CN101426049B (en) | Data card and method, equipment, system for using equipment binding | |
CN106454800A (en) | Identity verification method, device and system | |
CN108848249A (en) | Incoming display method, mobile terminal and storage medium based on double screen | |
CN106130993A (en) | A kind of method of information processing and electronic equipment | |
CN103179547B (en) | A kind of system and method for binding phone number and SIM supplement cards | |
CN107295153A (en) | A kind of management method and terminal for switching logon account | |
CN104683212B (en) | Message treatment method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP03 | Change of name, title or address |
Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Patentee after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. Address before: Changan town in Guangdong province Dongguan 523859 usha Beach Road No. 18 Patentee before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. |
|
CP03 | Change of name, title or address |