CN105825156B - Tamper-proof processing method, device and terminal device - Google Patents

Tamper-proof processing method, device and terminal device Download PDF

Info

Publication number
CN105825156B
CN105825156B CN201610162603.0A CN201610162603A CN105825156B CN 105825156 B CN105825156 B CN 105825156B CN 201610162603 A CN201610162603 A CN 201610162603A CN 105825156 B CN105825156 B CN 105825156B
Authority
CN
China
Prior art keywords
terminal device
tamper
account
transceiver
proof
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610162603.0A
Other languages
Chinese (zh)
Other versions
CN105825156A (en
Inventor
魏伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201610162603.0A priority Critical patent/CN105825156B/en
Publication of CN105825156A publication Critical patent/CN105825156A/en
Application granted granted Critical
Publication of CN105825156B publication Critical patent/CN105825156B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss

Abstract

The application proposes a kind of tamper-proof processing method, device and terminal device, wherein, this method includes:Receive tamper-proof enabled instruction;The transceiver in terminal device is controlled to launch continuous power signal with default power grade, so that the transceiver can not reception signal.Pass through tamper-proof processing method, device and terminal device provided by the invention, realize after effectively preventing that terminal device is stolen, other people illegally obtain the personal information or property of terminal device owning user, improve the security of terminal device, improve Consumer's Experience.

Description

Tamper-proof processing method, device and terminal device
Technical field
The application is related to technical field of information processing, more particularly to a kind of tamper-proof processing method, device and terminal device.
Background technology
At present, mobile terminal, as mobile phone or palm PC are increasingly popularized.People can be completed various each by mobile terminal The activities such as work, life or the amusement of sample, accordingly, the various information of user can be also stored with mobile terminal.
This causes mobile terminal once losing, and other people cans usurp the mobile terminal by ill-gotten mobile terminal The information of owning user, and then illegal operation is carried out, for example third party's property etc. is paid, transferred accounts or is defrauded of, this is serious The interests of mobile terminal affiliated user are compromised, reduce the security of mobile terminal.
The content of the invention
The application is intended to one of technical problem at least solving in correlation technique to a certain extent.
Therefore, first purpose of the application is to propose a kind of tamper-proof processing method, the method achieve effective After preventing that terminal device is stolen, other people illegally obtain the personal information or property of terminal device owning user, improve terminal The security of equipment, improves Consumer's Experience.
Second purpose of the application is to propose another tamper-proof processing unit.
The 3rd purpose of the application is to propose a kind of terminal device.
The 4th purpose of the application is to propose another terminal device.
For the above-mentioned purpose, the application first aspect embodiment proposes a kind of tamper-proof processing method, including:
Receive tamper-proof enabled instruction;
The transceiver in terminal device is controlled to launch continuous power signal with default power grade, so that the transmitting-receiving Device can not reception signal.
The tamper-proof processing method of the embodiment of the present application, after tamper-proof enabled instruction is received, that is, control in terminal device The continuous power signal of Transceiver Transmit, to make transceiver can not reception signal.It is achieved thereby that effectively prevent terminal from setting After stolen, other people illegally obtain the personal information or property of terminal device owning user, improve the safety of terminal device Property, improve Consumer's Experience.
For the above-mentioned purpose, second aspect of the application proposes a kind of tamper-proof processing unit, including:
First receiving module, for receiving tamper-proof enabled instruction;
Control module, continuous power letter is launched with default power grade for controlling the transceiver in terminal device Number, so that the transceiver can not reception signal.
The tamper-proof processing unit of the embodiment of the present application, after tamper-proof enabled instruction is received, that is, control in terminal device The continuous power signal of Transceiver Transmit, to make transceiver can not reception signal.It is achieved thereby that effectively prevent terminal from setting After stolen, other people illegally obtain the personal information or property of terminal device owning user, improve the safety of terminal device Property, improve Consumer's Experience.
For the above-mentioned purpose, the 3rd aspect of the application proposes a kind of terminal device, including antitheft use described above Manage device.
For the above-mentioned purpose, the 4th aspect of the application proposes a kind of terminal device, including:Following one or more groups Part:Circuit board, housing, processor, memory, power circuit, multimedia groupware, audio-frequency assembly, input/output (I/O's) connects Mouthful, sensor cluster, and communication component;Wherein, the circuit board is placed in the interior volume that the housing surrounds, the place Reason device and the memory are arranged on the circuit board;The power circuit, for each circuit for the mobile terminal Or device power supply;The memory is used to store executable program code;The processor is deposited by reading in the memory The executable program code of storage runs program corresponding with the executable program code, for performing following steps:
Receive tamper-proof enabled instruction;
The transceiver in terminal device is controlled to launch continuous power signal with default power grade, so that the transmitting-receiving Device can not reception signal.
The terminal device of the embodiment of the present application, after tamper-proof enabled instruction is received, that is, control the transmitting-receiving in terminal device Device launches continuous power signal, to make transceiver can not reception signal.It is achieved thereby that effectively terminal device is prevented to be stolen Afterwards, other people illegally obtain the personal information or property of terminal device owning user, improve the security of terminal device, improve Consumer's Experience.
Brief description of the drawings
Of the invention above-mentioned and/or additional aspect and advantage will become from the following description of the accompanying drawings of embodiments Substantially and it is readily appreciated that, wherein:
Fig. 1 is the schematic flow sheet of the tamper-proof processing method of the application one embodiment;
Fig. 2 is the schematic flow sheet of the tamper-proof processing method of the application another embodiment;
Fig. 3 is the schematic flow sheet of the tamper-proof processing method of the application another embodiment;
Fig. 4 is the structural representation of the tamper-proof processing unit of the application one embodiment;
Fig. 5 is the structural representation of the tamper-proof processing unit of the application another embodiment;
Fig. 6 is the structural representation of the tamper-proof processing unit of the application another embodiment;
Fig. 7 is the structural representation of the terminal device of the application one embodiment;
Fig. 8 is the structural representation of the terminal device of the application another embodiment.
Embodiment
Embodiments herein is described below in detail, the example of the embodiment is shown in the drawings, wherein from beginning to end Same or similar label represents same or similar element or the element with same or like function.Below with reference to attached The embodiment of figure description is exemplary, it is intended to for explaining the application, and it is not intended that limitation to the application.
Below with reference to the accompanying drawings the tamper-proof processing method, device and terminal device of the embodiment of the present application are described.
Fig. 1 is the schematic flow sheet of the tamper-proof processing method of the application one embodiment.
As shown in figure 1, the tamper-proof processing method includes:
Step 101, tamper-proof enabled instruction is received.
Specifically, the executive agent for the tamper-proof processing method that the present embodiment provides is tamper-proof processing unit, the device It is specifically described exemplified by being configured in the terminal device with transceiver.
It should be noted that the type of terminal device is a lot, can be selected according to using needs, such as:Mobile phone, put down Plate computer etc..
Specifically, terminal device and other terminal devices can be associated processing by user, and inter-related two Tamper-proof control can be carried out between individual terminal device.
For example, after first terminal device and second terminal device are associated by user, if finding, first terminal device can not When finding, then tamper-proof enabled instruction can be sent to first by second terminal device.
Step 102, the transceiver in terminal device is controlled to launch continuous power signal with default power grade, so that The transceiver can not receive signal of communication.
Wherein, default power grade, can be preset in advance in terminal device, can be Transceiver Transmit signal Maximum power level or other ranks power grade, default power grade is can realize that transceiver can not Reception signal is defined.
Or default power grade, can also be tamper-proof processing unit according to the battery electric quantity of terminal device or The signal strength actually received according to transceiver, is determined in real time.That is above-mentioned steps 102, including:
Judge whether the transceiver receives signal;
If so, then increase the default power grade, so that the transceiver can not reception signal.
For example, if the maximum power level of transceiver is 10, default power grade is 7, then transceiver is with work( During the continuous power signal of power emission that rate grade is 7, signal is have received again, then tamper-proof processing unit can determine that this When the transceiver transceiver channel be in unimpeded state, then can increase default power grade, for example power grade is increased To 8, continue transmission power signal, if now remaining to receive signal, continue to increase power grade, until determining that letter can not be received Number, i.e. the path blockade of transceiver, so as to prevent other people illegally to be usurped belonging to the terminal device after the terminal device is usurped The personal information of user or property etc..
It should be noted that terminal device can be divided into a variety of, such as single transceiver according to the quantity of the transceiver of configuration Terminal device, double transceiver terminal device etc., i.e. terminal device include at least one transceiver, then, above-mentioned steps 102, bag Include:
Control transceiver all in the terminal device and continuous power signal is launched with default power grade respectively.
For example, include for dual-card dual-standby terminal equipment, terminal device:Global system for mobile communications (Global System for Mobile Communications, abbreviation GSM), Time Division-Synchronous Code Division Multiple Access (Time Division- Synchronous Code Division Multiple Access, abbreviation TD-SCDMA) or timesharing Long Term Evolution (Time Division Long Term Evolution, abbreviation TD-LTE) standard transceiver, and two transceivers of GSM standards, and two Transceiver can work simultaneously.
Then tamper-proof processing unit is after tamper-proof enabled instruction is received, you can two transceivers of control are simultaneously with default The continuous power signal of power emission, so that the electricity of terminal is depleted as early as possible.
It should be noted that the power grade of two Transceiver Transmit Power signals can be with identical, can also be different.I.e. pair For different transceivers, above-mentioned default power grade can refer to a grade, can also refer to including multiple grades.
The tamper-proof processing method of the embodiment of the present application, after tamper-proof enabled instruction is received, that is, control in terminal device The continuous power signal of Transceiver Transmit, to make transceiver can not reception signal.It is achieved thereby that effectively prevent terminal from setting After stolen, other people illegally obtain the personal information or property of terminal device owning user, improve the safety of terminal device Property, improve Consumer's Experience.
Fig. 2 is the schematic flow sheet of the tamper-proof processing method of the application another embodiment.
As shown in Fig. 2 the tamper-proof processing method includes:
Step 201, tamper-proof enabled instruction is received.
Step 202, the transceiver in terminal device is controlled to launch continuous power signal with default power grade, so that The transceiver can not reception signal.
The specific implementation process of above-mentioned steps 201 and step 202 can refer to above-mentioned steps 101 and the detailed of step 102 is retouched State, here is omitted.
Step 203, the touch control operation of user's input is received, the touch control operation is used to control closing described antitheft diligent Energy.
Specifically, the type of touch control operation is a lot, for example slide, point touch operation or pressing operation etc..
Specifically, user can control being turned on and off for the tamper-proof function on terminal device manually, if user passes through Touch control operation.
Step 204, inquiry message is sent to the first account associated with the terminal device.
Specifically, anti-theft apparatus is after the touch control operation of user's input is received, you can is associated to the terminal device The first account send inquiry message, ask whether determine close tamper-proof function.
Wherein, inquiry message can realize that the present embodiment is not done to this in the form of short message, mail or instant message etc. Limit.
Wherein, the first account can be the account with the binding of other terminal devices, can also only be that user can pass through webpage The account that client logs in, such as mailbox, QQ or wechat account etc..
Step 205, judge whether to receive the instruction message that first account returns, wherein, the instruction message is used for Tamper-proof function is closed in instruction, if then performing step 206, otherwise performs step 207.
Step 206, the transceiver is controlled to stop transmission power signal.
Step 207, the transceiver is controlled to continue to launch continuous power signal with default power grade.
Specifically, after user receives inquiry message by the first account, you can choose whether to close tamper-proof function, if Selection is that then anti-theft apparatus can receive instruction message, and then close tamper-proof function according to instruction message, i.e. control transmitting-receiving Device stops transmission power signal.
Accordingly, if anti-theft apparatus does not receive the instruction message of the first account return, this touch-control behaviour can be confirmed The operation performed as illegal operation, i.e., the user belonging to non-terminal equipment, then can control the transceiver to continue to launch Continuous power signal.
It is understood that the first account can also pass through the instruction to terminal device return Do not switch off tamper-proof function Message, so that content of the anti-theft apparatus according to the instruction message received, it is determined that this time whether touch control operation is legal, and then holds Operated corresponding to row.
It should be noted that if transceiver in terminal device continues transmission power signal, the battery in terminal device Electricity can consume very fast, therefore terminal device possibility will soon automatic shutdown.When user recharges for terminal device After startup, anti-theft apparatus then still may proceed to control Transceiver Transmit continuous because not receiving the instruction message for confirming to close Power signal, continue to finish the battery power consumption in terminal device.
The tamper-proof processing method of the embodiment of the present application, after tamper-proof enabled instruction is received, that is, control in terminal device The continuous power signal of Transceiver Transmit, come make transceiver can not reception signal, and receive user input close it is antitheft After the touch control operation of function, inquiry message is sent to the first account associated with terminal device, is returned receiving the first account Confirmation message after, just control is closed a terminal the tamper-proof function of equipment, if not receiving confirmation message, control transceiver continues Launch continuous power signal.It is achieved thereby that after effectively preventing that terminal device is stolen, other people illegally obtain terminal device institute Belong to the personal information or property of user, improve the security of terminal device, improve Consumer's Experience, and terminal device The closing of tamper-proof function needs to confirm just to can be achieved by the first account associated, further increases the safety of terminal device Property and reliability.
Fig. 3 is the schematic flow sheet of the tamper-proof processing method of the application another embodiment.
As shown in figure 3, the tamper-proof processing method, on the basis of above-mentioned Fig. 1 or Fig. 2, in addition to:
Step 301, association request is sent to the second account.
Specifically, user, can be by holding when terminal device and other accounts are associated on the terminal device Row is operation associated, and association request is sent to the second account.
Wherein, the second account can be the account with the binding of other terminal devices, can also only be that user can pass through webpage The account that client logs in, such as mailbox, QQ or wechat account etc..
Step 302, the confirmation message that second account returns is received, second account is carried in the confirmation message Information.
Step 303, second accounts information is preserved.
Specifically, tamper-proof processing unit, after the confirmation message of the second account return is received, you can by the second account Information is stored in local.
Wherein, the second accounts information, user's mark of the second account, or the device identification for the second account can be referred to, Or signature for user etc., the present embodiment is not limited this,.
Step 304, tamper-proof enabled instruction is received, the information of the first account is carried in the enabled instruction.
Step 305, judge whether first accounts information matches with the second accounts information, if matching, performs step 306, otherwise, perform step 307.
Step 306, the transceiver in terminal device is controlled to launch continuous power signal with default power grade, so that The transceiver can not reception signal.
Step 307, terminate.
Specifically, tamper-proof processing unit, after tamper-proof enabled instruction is received, you can judge the first account in enabled instruction Family information and the second accounts information, if matching, if matching, illustrates that the instruction is reliable, and then control Transceiver Transmit continuous Power signal;If mismatching, illustrate the instruction for illegal instruction, therefore without response.
It is understood that anti-theft apparatus closes tamper-proof function in the instruction that is used for for receiving above-mentioned first account return Instruction message after, can also by verify the first accounts information whether be matched with the second accounts information, come judge instruction message It is whether legal.
The tamper-proof control method of the embodiment of the present application, association request is sent to the second account first, is receiving the second account After the confirmation message that family returns, i.e., the information of the second account is stored in local, it is antitheft in the startup for receiving the transmission of the first account After instruction, first determine whether the first accounts information matches with the second accounts information, if matching, control Transceiver Transmit connects Continuous power signal, if mismatching, terminate, realize after effectively preventing that terminal device is stolen, other people illegally obtain terminal The personal information or property of equipment owning user, the security of terminal device is improved, improves Consumer's Experience, and pass through Whether the first accounts information matches with the second accounts information in checking tamper-proof enabled instruction, to start tamper-proof function, enters one Step improves the safety and reliability of terminal device.
In order to realize above-described embodiment, the application also proposes a kind of tamper-proof processing unit.
Fig. 4 is the structural representation of the tamper-proof processing unit of the application one embodiment.
As shown in figure 4, the tamper-proof processing unit includes:
First receiving module 41, for receiving tamper-proof enabled instruction;
Control module 42, continuous power letter is launched with default power grade for controlling the transceiver in terminal device Number, so that the transceiver can not reception signal.
Specifically, the tamper-proof processing unit that the present embodiment provides, for performing above-mentioned tamper-proof processing method, the device It is specifically described exemplified by being configured in the terminal device with transceiver.
It should be noted that the type of terminal device is a lot, can be selected according to using needs, such as:Mobile phone, put down Plate computer etc..
Specifically, terminal device and other terminal devices can be associated processing by user, and inter-related two Tamper-proof control can be carried out between individual terminal device.
For example, after first terminal device and second terminal device are associated by user, if finding, first terminal device can not When finding, then tamper-proof enabled instruction can be sent to first by second terminal device.
Wherein, default power grade, can be preset in advance in terminal device, can be Transceiver Transmit signal Maximum power level or other ranks power grade, default power grade is can realize that transceiver can not Reception signal is defined.
Or default power grade, can also be tamper-proof processing unit according to the battery electric quantity of terminal device or The signal strength actually received according to transceiver, is determined in real time.That is control module 42, is specifically used for:
Judge whether the transceiver receives signal;
If so, then increase the default power grade, so that the transceiver can not reception signal.
In addition, it is necessary to explanation, terminal device can be divided into a variety of according to the quantity of the transceiver of configuration, for example single receive Device terminal device, double transceiver terminal device etc. is sent out, i.e. terminal device includes at least one transceiver, then, above-mentioned control mould Block, it is specifically used for:
Control transceiver all in the terminal device and continuous power signal is launched with default power grade respectively.
For example, include for dual-card dual-standby terminal equipment, terminal device:GSM, TD-SCDMA or TD-LTE standard Transceiver, and two transceivers of GSM standards, and two transceivers can work simultaneously.Then tamper-proof processing unit is receiving After tamper-proof enabled instruction, you can two transceivers are controlled simultaneously with the continuous power signal of default power emission, so that The electricity of terminal is depleted as early as possible.
It should be noted that the foregoing explanation to the embodiment of tamper-proof processing method shown in Fig. 1 is also applied for the reality The tamper-proof processing unit of example is applied, here is omitted.
The tamper-proof processing unit of the embodiment of the present application, after tamper-proof enabled instruction is received, that is, control in terminal device The continuous power signal of Transceiver Transmit, to make transceiver can not reception signal.It is achieved thereby that effectively prevent terminal from setting After stolen, other people illegally obtain the personal information or property of terminal device owning user, improve the safety of terminal device Property, improve Consumer's Experience.
Fig. 5 is the structural representation of the tamper-proof processing unit of the application another embodiment.
As shown in figure 5, the tamper-proof processing unit, on the basis of shown in above-mentioned Fig. 4, in addition to:Second receiving module 51, for receiving the touch control operation of user's input, the touch control operation, which is used to control, closes the tamper-proof function;
Sending module 52, for sending inquiry message to the first account associated with the terminal device;
The control module 42, if being additionally operable to receive the instruction message that first account returns, control the transmitting-receiving Device stops transmission power signal;Wherein, the instruction message is used to indicate to close tamper-proof function.
Or if not receiving the instruction message that first account returns, the control module 42, it is additionally operable to control institute Transceiver is stated to continue to launch continuous power signal with default power grade.
Specifically, the type of touch control operation is a lot, for example slide, point touch operation or pressing operation etc..
Specifically, user can control being turned on and off for the tamper-proof function on terminal device manually, if user passes through Touch control operation.
Specifically, anti-theft apparatus is after the touch control operation of user's input is received, you can is associated to the terminal device The first account send inquiry message, ask whether determine close tamper-proof function.
Wherein, inquiry message can realize that the present embodiment is not done to this in the form of short message, mail or instant message etc. Limit.
Wherein, the first account can be the account with the binding of other terminal devices, can also only be that user can pass through webpage The account that client logs in, such as mailbox, QQ or wechat account etc..
Specifically, after user receives inquiry message by the first account, you can choose whether to close tamper-proof function, if Selection is that then anti-theft apparatus can receive instruction message, and then close tamper-proof function according to instruction message, i.e. control transmitting-receiving Device stops transmission power signal.
It should be noted that the explanation of the foregoing tamper-proof processing method embodiment to shown in Fig. 2 is also applied for this The tamper-proof processing unit of embodiment, here is omitted.
The tamper-proof processing unit of the embodiment of the present application, after tamper-proof enabled instruction is received, that is, control in terminal device The continuous power signal of Transceiver Transmit, come make transceiver can not reception signal, and receive user input close it is antitheft After the touch control operation of function, inquiry message is sent to the first account associated with terminal device, is returned receiving the first account Confirmation message after, just control is closed a terminal the tamper-proof function of equipment, if not receiving confirmation message, control transceiver continues Launch continuous power signal.It is achieved thereby that after effectively preventing that terminal device is stolen, other people illegally obtain terminal device institute Belong to the personal information or property of user, improve the security of terminal device, improve Consumer's Experience, and terminal device The closing of tamper-proof function needs to confirm just to can be achieved by the first account associated, further increases the safety of terminal device Property and reliability.
Fig. 6 is the structural representation of the tamper-proof processing unit of the application another embodiment.
As shown in fig. 6, the tamper-proof processing unit, on the basis of shown in above-mentioned Fig. 4 or Fig. 5, in addition to:
Relating module 61, for sending association request to the second account;
3rd receiving module 62, for receiving the confirmation message of the second account return, carried in the confirmation message Second accounts information;
Memory module 63, for preserving second accounts information.
Specifically, user, can be by holding when terminal device and other accounts are associated on the terminal device Row is operation associated, and association request is sent to the second account.
Wherein, the second account can be the account with the binding of other terminal devices, can also only be that user can pass through webpage The account that client logs in, such as mailbox, QQ or wechat account etc..
Specifically, tamper-proof processing unit, after the confirmation message of the second account return is received, you can by the second account Information is stored in local.
Wherein, the second accounts information, user's mark of the second account, or the device identification for the second account can be referred to, Or signature for user etc., the present embodiment is not limited this,.
Accordingly, in order that tamper-proof enabled instruction is relatively reliable, then association can be carried in tamper-proof enabled instruction First accounts information, so as to the device, in addition to:
Determining module 64, for determining that first accounts information matches with the second accounts information.
Specifically, tamper-proof processing unit, after tamper-proof enabled instruction is received, you can judge the first account in enabled instruction Family information and the second accounts information, if matching, if matching, illustrates that the instruction is reliable, and then control Transceiver Transmit continuous Power signal;If mismatching, illustrate the instruction for illegal instruction, therefore without response.
It should be noted that explaining in detail for method for preventing fraudulent-using embodiment shown in above-mentioned figure Fig. 3, is also applied for this implementation The anti-theft apparatus of example, here is omitted.
The tamper-proof control device of the embodiment of the present application, association request is sent to the second account first, is receiving the second account After the confirmation message that family returns, i.e., the information of the second account is stored in local, it is antitheft in the startup for receiving the transmission of the first account After instruction, first determine whether the first accounts information matches with the second accounts information, if matching, control Transceiver Transmit connects Continuous power signal, if mismatching, terminate, realize after effectively preventing that terminal device is stolen, other people illegally obtain terminal The personal information or property of equipment owning user, the security of terminal device is improved, improves Consumer's Experience, and pass through Whether the first accounts information matches with the second accounts information in checking tamper-proof enabled instruction, to start tamper-proof function, enters one Step improves the safety and reliability of terminal device.
In order to realize above-described embodiment, the application also proposes a kind of terminal device.
Fig. 7 is the structural representation of the terminal device of the application one embodiment.As shown in fig. 7, the terminal device 1 wraps Include:Tamper-proof processing unit 2, wherein, tamper-proof processing unit 2 can use the reality shown in the present invention above-mentioned Fig. 4, Fig. 5 or Fig. 6 The tamper-proof processing unit of example offer is provided.
Wherein, the terminal device 1 includes:Mobile phone or tablet personal computer.
The embodiment of the present application terminal device, after tamper-proof enabled instruction is received, that is, control the transceiver in terminal device Launch continuous power signal, to make transceiver can not reception signal.It is achieved thereby that after effectively preventing that terminal device is stolen, Other people illegally obtain the personal information or property of terminal device owning user, improve the security of terminal device, improve Consumer's Experience.
Fig. 8 is the structural representation of the terminal device of the embodiment of the present application another embodiment.For example, terminal device can be with It is mobile phone etc..
Referring to Fig. 8, terminal device can include following one or more assemblies:
Circuit board 801, housing 802, processor 803, memory 804, power circuit 805, multimedia groupware 806, audio Component 807, the interface 808 of input/output (I/O), sensor cluster 809, and communication component 810;Wherein, the circuit board 801 are placed in the interior volume that the housing 802 surrounds, and the processor 803 and the memory 804 are arranged on the circuit On plate 801;The power circuit 805, for each circuit or the device power supply for the mobile terminal;The memory 804 For storing executable program code;The processor 803 is by reading the executable program generation stored in the memory 804 Code runs program corresponding with the executable program code, for performing following steps:
Receive tamper-proof enabled instruction;
The transceiver in terminal device is controlled to launch continuous power signal with default power grade, so that the transmitting-receiving Device can not reception signal.
It should be noted that the explanation of the foregoing tamper-proof processing method embodiment to shown in Fig. 1, Fig. 2 and Fig. 3 Suitable for the terminal device of the embodiment, its realization principle is similar, and here is omitted.
The embodiment of the present application terminal device, after tamper-proof enabled instruction is received, that is, control the transceiver in terminal device Launch continuous power signal, to make transceiver can not reception signal.It is achieved thereby that after effectively preventing that terminal device is stolen, Other people illegally obtain the personal information or property of terminal device owning user, improve the security of terminal device, improve Consumer's Experience.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or the spy for combining the embodiment or example description Point is contained at least one embodiment or example of the application.In this manual, to the schematic representation of above-mentioned term not Identical embodiment or example must be directed to.Moreover, specific features, structure, material or the feature of description can be with office Combined in an appropriate manner in one or more embodiments or example.In addition, in the case of not conflicting, the skill of this area Art personnel can be tied the different embodiments or example and the feature of different embodiments or example described in this specification Close and combine.
In addition, term " first ", " second " are only used for describing purpose, and it is not intended that instruction or hint relative importance Or the implicit quantity for indicating indicated technical characteristic.Thus, define " first ", the feature of " second " can be expressed or Implicitly include at least one this feature.In the description of the present application, " multiple " are meant that at least two, such as two, three It is individual etc., unless otherwise specifically defined.
Any process or method described otherwise above description in flow chart or herein is construed as, and represents to include Module, fragment or the portion of the code of the executable instruction of one or more the step of being used to realize specific logical function or process Point, and the scope of the preferred embodiment of the application includes other realization, wherein can not press shown or discuss suitable Sequence, including according to involved function by it is basic simultaneously in the way of or in the opposite order, carry out perform function, this should be by the application Embodiment person of ordinary skill in the field understood.
Expression or logic and/or step described otherwise above herein in flow charts, for example, being considered use In the order list for the executable instruction for realizing logic function, may be embodied in any computer-readable medium, for Instruction execution system, device or equipment (such as computer based system including the system of processor or other can be held from instruction The system of row system, device or equipment instruction fetch and execute instruction) use, or combine these instruction execution systems, device or set It is standby and use.For the purpose of this specification, " computer-readable medium " can any can be included, store, communicate, propagate or pass Defeated program is for instruction execution system, device or equipment or the dress used with reference to these instruction execution systems, device or equipment Put.The more specifically example (non-exhaustive list) of computer-readable medium includes following:Electricity with one or more wiring Connecting portion (electronic installation), portable computer diskette box (magnetic device), random access memory (RAM), read-only storage (ROM), erasable edit read-only storage (EPROM or flash memory), fiber device, and portable optic disk is read-only deposits Reservoir (CDROM).In addition, computer-readable medium, which can even is that, to print the paper of described program thereon or other are suitable Medium, because can then enter edlin, interpretation or if necessary with it for example by carrying out optical scanner to paper or other media His suitable method is handled electronically to obtain described program, is then stored in computer storage.
It should be appreciated that each several part of the application can be realized with hardware, software, firmware or combinations thereof.Above-mentioned In embodiment, software that multiple steps or method can be performed in memory and by suitable instruction execution system with storage Or firmware is realized.If, and in another embodiment, can be with well known in the art for example, realized with hardware Any one of row technology or their combination are realized:With the logic gates for realizing logic function to data-signal Discrete logic, have suitable combinational logic gate circuit application specific integrated circuit, programmable gate array (PGA), scene Programmable gate array (FPGA) etc..
Those skilled in the art are appreciated that to realize all or part of step that above-described embodiment method carries Suddenly it is that by program the hardware of correlation can be instructed to complete, described program can be stored in a kind of computer-readable storage medium In matter, the program upon execution, including one or a combination set of the step of embodiment of the method.
In addition, each functional unit in each embodiment of the application can be integrated in a proxy module, can also That unit is individually physically present, can also two or more units be integrated in a module.Above-mentioned integrated mould Block can both be realized in the form of hardware, can also be realized in the form of software function module.The integrated module is such as Fruit is realized in the form of software function module and as independent production marketing or in use, can also be stored in a computer In read/write memory medium.
Storage medium mentioned above can be read-only storage, disk or CD etc..Although have been shown and retouch above Embodiments herein is stated, it is to be understood that above-described embodiment is exemplary, it is impossible to be interpreted as the limit to the application System, one of ordinary skill in the art can be changed to above-described embodiment, change, replace and become within the scope of application Type.

Claims (9)

1. a kind of tamper-proof processing method, it is characterised in that comprise the following steps:
Receive tamper-proof enabled instruction;
Control the transceiver in terminal device to launch continuous power signal with default power grade so that the transceiver without Method reception signal;
Wherein, the default power grade, determined according to the battery electric quantity of terminal device;
Terminal device includes at least one transceiver, and all transceivers work simultaneously, the receipts in the control terminal device Send out device and continuous power signal is launched with default power grade, including:
Control transceiver all in the terminal device and continuous power signal is launched with default power grade respectively;
Also include:
The touch control operation of user's input is received, the touch control operation, which is used to control, closes the tamper-proof function;
Inquiry message is sent to the first account associated with the terminal device;
If receiving the instruction message that first account returns, the transceiver is controlled to stop transmission power signal;Wherein, institute Instruction message is stated to be used to indicate to close tamper-proof function;
After the transmission inquiry message to the first account associated with the terminal device, in addition to:
If not receiving the instruction message that first account returns, the transceiver is controlled to continue to send out with default power grade Penetrate continuous power signal;
First account is the account with the binding of other terminal devices, or the account that user is logged in by webpage client Family.
2. according to the method for claim 1, it is characterised in that also include;
Association request is sent to the second account;
The confirmation message that second account returns is received, second accounts information is carried in the confirmation message;
Preserve second accounts information.
3. according to the method for claim 2, it is characterised in that the first accounts information is carried in the enabled instruction, it is described After receiving tamper-proof enabled instruction, in addition to:
Determine that first accounts information matches with the second accounts information.
A kind of 4. tamper-proof processing unit, it is characterised in that including:
First receiving module, for receiving tamper-proof enabled instruction;
Control module, continuous power signal is launched with default power grade for controlling the transceiver in terminal device, with Make the transceiver can not reception signal;
Wherein, the default power grade, determined according to the battery electric quantity of terminal device;
The terminal device includes at least one transceiver, and all transceivers work simultaneously, the control module, specific to use In:
Control transceiver all in the terminal device and continuous power signal is launched with default power grade respectively;
Also include:
Second receiving module, for receiving the touch control operation of user's input, the touch control operation is used to control closing described antitheft Use function;
Sending module, for sending inquiry message to the first account associated with the terminal device;
The control module, if being additionally operable to receive the instruction message that first account returns, the transceiver is controlled to stop Transmission power signal;Wherein, the instruction message is used to indicate to close tamper-proof function;
First account is the account with the binding of other terminal devices, or the account that user is logged in by webpage client Family.
5. device according to claim 4, it is characterised in that
If not receiving the instruction message that first account returns, the control module, be additionally operable to control the transceiver after It is continuous that continuous power signal is launched with default power grade.
6. device according to claim 4, it is characterised in that also include;
Relating module, for sending association request to the second account;
3rd receiving module, the confirmation message returned for receiving second account, described the is carried in the confirmation message Two accounts informations;
Memory module, for preserving second accounts information.
7. device according to claim 6, it is characterised in that also include:
Determining module, for determining that first accounts information matches with the second accounts information.
8. a kind of terminal device, it is characterised in that including the tamper-proof processing unit as described in claim 4-7 is any.
9. a kind of terminal device, it is characterised in that including following one or more assemblies:Circuit board, housing, processor, storage Device, power circuit, multimedia groupware, audio-frequency assembly, the interface of input/output (I/O), sensor cluster, and communication component; Wherein, the circuit board is placed in the interior volume that the housing surrounds, and the processor and the memory are arranged on described On circuit board;The power circuit, for each circuit or the device power supply for the terminal device;The memory is used to deposit Store up executable program code;The processor is run and institute by reading the executable program code stored in the memory Program corresponding to executable program code is stated, for performing step as claimed in claim 1.
CN201610162603.0A 2016-03-21 2016-03-21 Tamper-proof processing method, device and terminal device Active CN105825156B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610162603.0A CN105825156B (en) 2016-03-21 2016-03-21 Tamper-proof processing method, device and terminal device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610162603.0A CN105825156B (en) 2016-03-21 2016-03-21 Tamper-proof processing method, device and terminal device

Publications (2)

Publication Number Publication Date
CN105825156A CN105825156A (en) 2016-08-03
CN105825156B true CN105825156B (en) 2018-03-23

Family

ID=56524203

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610162603.0A Active CN105825156B (en) 2016-03-21 2016-03-21 Tamper-proof processing method, device and terminal device

Country Status (1)

Country Link
CN (1) CN105825156B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110084940B (en) * 2019-04-29 2023-09-22 努比亚技术有限公司 Intelligent anti-theft method, device and system based on wearable equipment and storage medium
CN111310159A (en) * 2020-01-17 2020-06-19 光悦科技(深圳)有限公司 Anti-theft method and system for solar panel and host

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102739868A (en) * 2012-06-18 2012-10-17 奇智软件(北京)有限公司 Mobile terminal loss processing method and system
CN105763727A (en) * 2016-02-16 2016-07-13 广东欧珀移动通信有限公司 Three-mode DSDS mobile terminal protection method and system
CN105763728A (en) * 2016-02-16 2016-07-13 广东欧珀移动通信有限公司 Five-mode DSDS mobile terminal protection method and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102739868A (en) * 2012-06-18 2012-10-17 奇智软件(北京)有限公司 Mobile terminal loss processing method and system
CN105763727A (en) * 2016-02-16 2016-07-13 广东欧珀移动通信有限公司 Three-mode DSDS mobile terminal protection method and system
CN105763728A (en) * 2016-02-16 2016-07-13 广东欧珀移动通信有限公司 Five-mode DSDS mobile terminal protection method and system

Also Published As

Publication number Publication date
CN105825156A (en) 2016-08-03

Similar Documents

Publication Publication Date Title
CN103548395B (en) For the method and apparatus with the battery of safety element
EP2477431B1 (en) Protection of a security element coupled with an NFC circuit
CN104700268B (en) A kind of method of mobile payment and mobile device
CN102160068B (en) Contactless payment authoring system and method
CN104144110A (en) Message pushing method and system
CN103370954A (en) Mobile wireless communications device having a near field communication (NFC) device and providing memory erasure and related methods
US20090152361A1 (en) Memory card based contactless devices
CN104992092A (en) Method, device and system for fingerprint information verification
CN101252748A (en) System and method for realizing privacy SMS on mobile terminal
CN101422058A (en) Method of securing access to a proximity communication module in a mobile terminal
WO2012143653A1 (en) Access control mechanism for a secure element coupled to an nfc circuit
EP2695353A1 (en) Test of the resistance of a security module of a telecommunication device coupled to an nfc circuit against communication channel diversion attacks
CN105068974A (en) Information processing method and electronic device
CN107222632A (en) Instant messaging method and device
CN106027368A (en) Service data processing method and device
CN105868978A (en) NFC mobile payment method and system thereof
CN105825156B (en) Tamper-proof processing method, device and terminal device
Roland Security issues in mobile NFC devices
CN101426049B (en) Data card and method, equipment, system for using equipment binding
CN106454800A (en) Identity verification method, device and system
CN108848249A (en) Incoming display method, mobile terminal and storage medium based on double screen
CN106130993A (en) A kind of method of information processing and electronic equipment
CN103179547B (en) A kind of system and method for binding phone number and SIM supplement cards
CN107295153A (en) A kind of management method and terminal for switching logon account
CN104683212B (en) Message treatment method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Patentee after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523859 usha Beach Road No. 18

Patentee before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

CP03 Change of name, title or address