CN106126985B - Information security processing method and system based on intelligent terminal - Google Patents
Information security processing method and system based on intelligent terminal Download PDFInfo
- Publication number
- CN106126985B CN106126985B CN201610507696.6A CN201610507696A CN106126985B CN 106126985 B CN106126985 B CN 106126985B CN 201610507696 A CN201610507696 A CN 201610507696A CN 106126985 B CN106126985 B CN 106126985B
- Authority
- CN
- China
- Prior art keywords
- intelligent terminal
- password
- application software
- controlling
- screen
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/305—Authentication, i.e. establishing the identity or authorisation of security principals by remotely controlling device operation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/88—Detecting or preventing theft or loss
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Telephone Function (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention discloses an information security processing method and system based on an intelligent terminal, wherein the method comprises the following steps: the intelligent terminal detects the number of application software after the APP application password is changed in real time through a background; the intelligent terminal judges whether the number of the application software after the password change exceeds a preset value within first preset time; and when the number of the accumulated application software password changes is recorded by the background of the intelligent terminal and exceeds a preset value, controlling the intelligent terminal to be locked. By adopting the invention, the terminal without the screen locking password can be lost, the number of the application software passwords is accumulatively changed through the terminal background, and when the number exceeds a certain value, the screen of the terminal is locked, so that the information in the terminal is prevented from being stolen by other people, and the information safety of a user is ensured.
Description
Technical Field
The invention relates to the technical field of intelligent terminals, in particular to an information security processing method and system based on an intelligent terminal.
Background
With the development of science and technology and the continuous improvement of the living standard of people, the use of various intelligent terminals such as intelligent mobile phones, computers and other terminals is more and more popular.
At present, many people can not leave the mobile phone in daily life and work, so if the mobile phone is lost, great troubles are brought to the user. Especially, some users do not set the screen password of the mobile phone, and after the user loses the screen password, all information is presented to others. At this time, the user can generally modify the password of part of the application software, such as QQ, panning, wechat, Baidu stick, and the like, and although other people cannot enter the software with the changed password, the user can still view the privacy information such as address list, photo, short message, and the like, which also causes great loss to the user.
Accordingly, the prior art is yet to be improved and developed.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide an information security processing method and system based on an intelligent terminal, aiming at the above-mentioned defects in the prior art. According to the intelligent terminals such as the intelligent mobile phone and the computer, after the terminal without the screen locking password is lost, the number of the application software passwords is changed through accumulation in the background of the terminal, and when the number exceeds a certain value, the screen of the terminal is locked, so that information in the terminal is prevented from being stolen by others, and the information safety of a user is guaranteed.
The technical scheme adopted by the invention for solving the technical problem is as follows:
an information security processing method based on an intelligent terminal comprises the following steps:
step A, the intelligent terminal detects the number of application software after the APP application password is changed in real time through a background;
b, the intelligent terminal judges whether the number of the application software after the password change exceeds a preset value within first preset time;
and C, controlling the intelligent terminal to perform corresponding operation according to whether the number of the application software after the password change exceeds a preset value.
The information security processing method based on the intelligent terminal, wherein the step C comprises the following steps:
and C10, when the background of the intelligent terminal records the number of the accumulated application software password change and exceeds a preset value, controlling to lock the screen of the intelligent terminal.
The information security processing method based on the intelligent terminal, wherein the step C further comprises:
and step C20, when the background of the intelligent terminal records the number of the accumulated application software password changes and exceeds a preset value, and when the password error is detected when the APP application changing the application software password logs in again on the intelligent terminal, controlling to lock the screen of the intelligent terminal.
The information security processing method based on the intelligent terminal comprises the following steps after the screen of the intelligent terminal is locked:
step C30, after the intelligent terminal is locked, if the password is correct when the intelligent terminal detects that each APP which changes the application software password logs in again, controlling the intelligent terminal to cancel the screen locking;
and step C40, after the intelligent terminal locks the screen, if the password error is detected when the APP which changes the application software password logs in again on the intelligent terminal, controlling the intelligent terminal to continue to lock the screen.
According to the information security processing method based on the intelligent terminal, after the intelligent terminal is locked, the intelligent terminal is controlled not to enter to check any information before a correct password is input next time, and the background encrypts the information stored in the intelligent terminal to prevent other readable data from being checked.
The information security processing method based on the intelligent terminal further comprises the following steps before the step A:
and S, after confirming that the intelligent terminal is lost, receiving an operation instruction of a user and changing the login password of the intelligent terminal application software on a computer or other terminals.
The information security processing method based on the intelligent terminal comprises the steps that the number of the preset values is 3, and the first preset time is one day.
An information security processing system based on intelligent terminal, wherein, include:
the background detection module is used for controlling the intelligent terminal to detect the number of the application software after the APP application password is changed in real time through a background;
the judging module is used for controlling and judging whether the number of the application software after the password is changed in first preset time exceeds a preset value or not;
and the operation control module is used for controlling the intelligent terminal to carry out corresponding operation according to whether the number of the application software after the password change exceeds a preset value.
The information security processing system based on the intelligent terminal, wherein, the operation control module comprises:
the first screen locking control unit is used for controlling the intelligent terminal to be locked when the number of accumulated application software password changes recorded by the background of the intelligent terminal exceeds a preset value;
the second screen locking control unit is used for controlling the intelligent terminal to be locked when the number of accumulated application software password changes is recorded in the background of the intelligent terminal and exceeds a preset value, and when a password error is detected when the APP application for changing the application software password logs in again on the intelligent terminal;
the screen locking canceling unit is used for controlling the intelligent terminal to cancel screen locking when the password is correct when the intelligent terminal detects that the APP with each changed application software password logs in again after the intelligent terminal locks the screen;
and the screen continuing locking unit is used for detecting that the passwords are wrong when the APP applications for changing the application software passwords log in again on the intelligent terminal after the intelligent terminal locks the screen, and controlling the intelligent terminal to continue locking the screen.
The information security processing system based on the intelligent terminal, wherein, the operation control module further comprises:
the prevention control unit is used for controlling the intelligent terminal not to enter to check any information after the intelligent terminal is locked and before a correct password is input next time, and the background encrypts the information stored in the intelligent terminal to prevent other readable data from being checked;
and the password modification unit is used for receiving an operation instruction of a user and changing the login password of the intelligent terminal application software on a computer or other terminals after the intelligent terminal is confirmed to be lost.
The invention provides an information security processing method and system based on an intelligent terminal, and provides a method for guaranteeing information security after the terminal is lost, so that the intelligent terminal is added with new functions: the method has the function of guaranteeing information safety after the intelligent terminal is lost, when the intelligent terminal such as a smart phone and a computer and the terminal without the screen locking password is lost, the number of the application software passwords is changed through the accumulation of the terminal background, and when the number exceeds a certain value, the terminal is locked, so that the information in the terminal is prevented from being stolen by other people, the information safety of a user is guaranteed, and convenience is provided for the user.
Drawings
Fig. 1 is a flowchart of a preferred embodiment of the information security processing method based on an intelligent terminal according to the present invention.
Fig. 2 is a flowchart of a specific application embodiment of the information security processing method based on the intelligent terminal.
Fig. 3 is a functional block diagram of a preferred embodiment of the information security processing system based on the intelligent terminal.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer and clearer, the present invention is further described in detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Referring to fig. 1, fig. 1 is a flowchart illustrating a method for processing information security based on an intelligent terminal according to a preferred embodiment of the present invention. As shown in fig. 1, an information security processing method based on an intelligent terminal according to an embodiment of the present invention includes:
and S100, the intelligent terminal detects the number of the application software after the APP application password is changed in real time through a background.
The intelligent terminal comprises: terminals such as smart phones and computers.
In the embodiment of the invention, after the intelligent terminal is confirmed to be lost, the login password of the intelligent terminal application software is changed on a computer or other terminals by receiving the operation instruction of the user. At the moment, the intelligent terminal detects the number of the application software after the APP application password is changed in real time through the background.
Step S200, the intelligent terminal judges whether the number of the application software with the changed password exceeds a preset value in first preset time.
In the embodiment of the present invention, the number of the predetermined values is 3, and the first predetermined time is one day. Namely, the intelligent terminal judges whether the number of the application software with the changed password exceeds a preset value (3) within a first preset time (one day).
Step S300, the intelligent terminal may control the intelligent terminal to perform corresponding operations according to whether the number of the application software after the password change exceeds a predetermined value, in the embodiment of the present invention, specifically:
when the number of the accumulated application software password change is recorded in the background by an intelligent terminal of a user such as a mobile phone and exceeds a preset value, controlling to lock the screen of the intelligent terminal.
And after the intelligent terminal is locked, if the password is correct when the APP which changes the application software password is detected to log in again on the intelligent terminal, the intelligent terminal is controlled to cancel the screen locking.
However, after the intelligent terminal locks the screen, if a password error is detected when the APP which changes the application software password logs in again on the intelligent terminal, the intelligent terminal is controlled to continue to lock the screen. And after the intelligent terminal is locked, the intelligent terminal is controlled not to enter to check any information before the correct password is input next time, and the background encrypts the information stored in the intelligent terminal to prevent other readable data from being checked.
In a further embodiment, in the information security processing method based on the intelligent terminal, in another case, the step S300 includes: and when the background of the intelligent terminal records the number of the accumulated application software password changes and exceeds a preset value (3), and when the intelligent terminal detects that the APP application changing the application software password logs in again, the password is wrong, and the intelligent terminal is controlled to be locked. Namely, after the intelligent terminal is lost, a user immediately modifies the passwords of application software such as QQ, Taobao, WeChat, Baidu Bar and the like on the intelligent terminal mobile phone through a computer or other terminals, and when the passwords input by others on the intelligent terminal are incorrect, the intelligent terminal is controlled to be locked. The intelligent terminal is controlled not to enter to view any information, and the background encrypts the information stored in the intelligent terminal to prevent other readable data from being viewed.
The invention is further illustrated in detail by the following specific application examples:
the embodiment of the invention adds new functions to the intelligent terminal: the function of guaranteeing information safety after loss is achieved, and the function is used as a built-in function on the intelligent terminal.
As shown in fig. 2, the information security processing method based on an intelligent terminal according to the embodiment of the present invention includes the following steps:
1. after user a (the intelligent terminal owner) confirms that the (intelligent) terminal α is lost, the password of the application software such as QQ, naobao, wechat, baidu bar, etc. is changed on the computer or other terminals.
2. Another user B (the person who picked up the smart terminal) enters the operation interface of the (smart) terminal α, and when the terminal α is placed in a network environment such as WIFI/4G, the user B uses application software such as QQ, and cannot enter the QQ due to password change.
3. And (3) accumulating the number of the application software with the changed password in the step 3 in the background.
4. And the user B clicks application software such as Taobao, WeChat and the like, and the password is changed, so that the user B can not enter the application software.
5. According to step 4, when the terminal α cumulatively detects that the passwords of M (e.g. set to 3) application software have changed, it locks the screen of the mobile phone and pops up a dialog box to ask the user B to input any one of the M application software modified passwords, such as QQ.
6. And (4) after the background receives the password input by the user B, inputting the password into the software in the step (6), such as QQ, and judging whether the QQ can be logged in correctly.
7. If the software in the step 6 can be logged in correctly if the QQ is correct, the user B is confirmed to input the correct password, then the screen locking is cancelled, and the user B can freely perform other operations in the terminal. And step 4 re-enters the next accumulation period.
8. If the software in the step 6 cannot be logged in correctly if QQ, the user B is confirmed to input a wrong password, and the terminal α is kept in a screen locking state all the time
Therefore, the invention enables the terminal without the screen locking password to be lost, and the number of the application software passwords is accumulatively changed through the terminal background, and when the number exceeds a certain value, the screen of the terminal is locked, so that the information in the terminal is prevented from being stolen by other people, and the information safety of a user is ensured.
Based on the above embodiment, the present invention further provides an information security processing system based on an intelligent terminal, as shown in fig. 3, the system includes:
the background detection module 210 is configured to control the intelligent terminal to detect the number of the application software after the APP application password is changed in real time through a background; as described above.
The judging module 220 is configured to control and judge whether the number of the application software with the changed password exceeds a predetermined value within a first predetermined time; as described above.
The operation control module 230 is configured to control the intelligent terminal to perform corresponding operations according to whether the number of the application software after the password change exceeds a predetermined value; as described above.
Further, the information security processing system based on the intelligent terminal, wherein the operation control module comprises:
the first screen locking control unit is used for controlling the intelligent terminal to be locked when the number of accumulated application software password changes recorded by the background of the intelligent terminal exceeds a preset value; as described above.
The second screen locking control unit is used for controlling the intelligent terminal to be locked when the number of accumulated application software password changes is recorded in the background of the intelligent terminal and exceeds a preset value, and when a password error is detected when the APP application for changing the application software password logs in again on the intelligent terminal; as described above.
The screen locking canceling unit is used for controlling the intelligent terminal to cancel screen locking when the password is correct when the intelligent terminal detects that the APP with each changed application software password logs in again after the intelligent terminal locks the screen; as described above.
The continuous screen locking unit is used for controlling the intelligent terminal to continuously lock the screen when a password error is detected when the APP which changes the application software password logs in again on the intelligent terminal after the intelligent terminal locks the screen; as described above.
The information security processing system based on the intelligent terminal, wherein, the operation control module further comprises:
the prevention control unit is used for controlling the intelligent terminal not to enter to check any information after the intelligent terminal is locked and before a correct password is input next time, and the background encrypts the information stored in the intelligent terminal to prevent other readable data from being checked; as described above.
The password modification unit is used for receiving an operation instruction of a user and changing the login password of the intelligent terminal application software on a computer or other terminals after the intelligent terminal is confirmed to be lost; as described above.
In summary, the information security processing method and system based on the intelligent terminal provided by the present invention provide a method for guaranteeing information security after the terminal is lost, so that the intelligent terminal is added with new functions: the method has the function of guaranteeing information safety after the intelligent terminal is lost, when the intelligent terminal such as a smart phone and a computer and the terminal without the screen locking password is lost, the number of the application software passwords is changed through the accumulation of the terminal background, and when the number exceeds a certain value, the terminal is locked, so that the information in the terminal is prevented from being stolen by other people, the information safety of a user is guaranteed, and convenience is provided for the user.
Of course, it will be understood by those skilled in the art that all or part of the processes of the methods of the above embodiments may be implemented by a computer program instructing relevant hardware (such as a processor, a controller, etc.), and the program may be stored in a computer readable storage medium, and when executed, the program may include the processes of the above method embodiments. The storage medium may be a memory, a magnetic disk, an optical disk, etc.
It is to be understood that the invention is not limited to the examples described above, but that modifications and variations may be effected thereto by those of ordinary skill in the art in light of the foregoing description, and that all such modifications and variations are intended to be within the scope of the invention as defined by the appended claims.
Claims (6)
1. An information security processing method based on an intelligent terminal is characterized by comprising the following steps:
step A, the intelligent terminal detects the number of application software after the APP application password is changed in real time through a background;
b, the intelligent terminal judges whether the number of the application software after the password change exceeds a preset value within first preset time;
step C, controlling the intelligent terminal to perform corresponding operation according to whether the number of the application software after the password change exceeds a preset value;
the step C comprises the following steps:
c10, when the background of the intelligent terminal records the number of the accumulated application software password changes and exceeds a preset value, controlling the intelligent terminal to lock the screen;
the step C further comprises the following steps:
step C20, when the background of the intelligent terminal records the number of accumulated application software password changes and exceeds a preset value, and when a password error is detected when the APP application changing the application software password logs in again on the intelligent terminal, controlling the intelligent terminal to lock the screen;
after the screen locking of the intelligent terminal, the method further comprises the following steps:
step C30, after the intelligent terminal is locked, if the password is correct when the intelligent terminal detects that each APP which changes the application software password logs in again, controlling the intelligent terminal to cancel the screen locking;
step C40, after the intelligent terminal locks the screen, if a password error is detected when each APP which changes the application software password logs in again on the intelligent terminal, controlling the intelligent terminal to continue to lock the screen;
and the intelligent terminal does not have a screen locking password.
2. The intelligent terminal-based information security processing method according to claim 1, wherein after the intelligent terminal is locked, the intelligent terminal is controlled not to enter to view any information until a correct password is input next time, and the background encrypts information stored in the intelligent terminal to prevent other readable data from being viewed.
3. The information security processing method based on the intelligent terminal according to claim 1, further comprising before the step a:
and S, after confirming that the intelligent terminal is lost, receiving an operation instruction of a user and changing the login password of the intelligent terminal application software on a computer or other terminals.
4. The intelligent terminal-based information security processing method according to claim 1, wherein the number of the predetermined values is 3, and the first predetermined time is one day.
5. An information security processing system based on intelligent terminal, comprising:
the background detection module is used for controlling the intelligent terminal to detect the number of the application software after the APP application password is changed in real time through a background;
the judging module is used for controlling and judging whether the number of the application software after the password is changed in first preset time exceeds a preset value or not; the operation control module is used for controlling the intelligent terminal to carry out corresponding operation according to whether the number of the application software after the password change exceeds a preset value;
the operation control module includes:
the first screen locking control unit is used for controlling the intelligent terminal to be locked when the number of accumulated application software password changes recorded by the background of the intelligent terminal exceeds a preset value;
the operation control module further includes:
the second screen locking control unit is used for controlling the intelligent terminal to be locked when the number of accumulated application software password changes is recorded in the background of the intelligent terminal and exceeds a preset value, and when a password error is detected when the APP application for changing the application software password logs in again on the intelligent terminal;
the screen locking canceling unit is used for controlling the intelligent terminal to cancel screen locking when the password is correct when the intelligent terminal detects that the APP with each changed application software password logs in again after the intelligent terminal locks the screen;
the continuous screen locking unit is used for controlling the intelligent terminal to continuously lock the screen when a password error is detected when the APP which changes the application software password logs in again on the intelligent terminal after the intelligent terminal locks the screen;
and the intelligent terminal does not have a screen locking password.
6. The intelligent terminal-based information security processing system according to claim 5, wherein the operation control module further comprises:
the prevention control unit is used for controlling the intelligent terminal not to enter to check any information after the intelligent terminal is locked and before a correct password is input next time, and the background encrypts the information stored in the intelligent terminal to prevent other readable data from being checked; and the password modification unit is used for receiving an operation instruction of a user and changing the login password of the intelligent terminal application software on a computer or other terminals after the intelligent terminal is confirmed to be lost.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610507696.6A CN106126985B (en) | 2016-07-01 | 2016-07-01 | Information security processing method and system based on intelligent terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610507696.6A CN106126985B (en) | 2016-07-01 | 2016-07-01 | Information security processing method and system based on intelligent terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106126985A CN106126985A (en) | 2016-11-16 |
CN106126985B true CN106126985B (en) | 2020-03-06 |
Family
ID=57468825
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610507696.6A Active CN106126985B (en) | 2016-07-01 | 2016-07-01 | Information security processing method and system based on intelligent terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106126985B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101651861A (en) * | 2008-08-15 | 2010-02-17 | 希姆通信息技术(上海)有限公司 | Method and device for encrypting mobile phone programs |
CN102110200A (en) * | 2009-12-25 | 2011-06-29 | 凹凸电子(武汉)有限公司 | Authentication method capable of being executed by computer |
CN103763428A (en) * | 2013-12-12 | 2014-04-30 | 北京宝利明威软件技术有限公司 | Application management system and application management method on mobile terminal |
CN104636682A (en) * | 2015-02-09 | 2015-05-20 | 上海瀚银信息技术有限公司 | Password management system and method based on hardware device |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8959335B2 (en) * | 2012-04-17 | 2015-02-17 | Gemalto Sa | Secure password-based authentication for cloud computing services |
-
2016
- 2016-07-01 CN CN201610507696.6A patent/CN106126985B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101651861A (en) * | 2008-08-15 | 2010-02-17 | 希姆通信息技术(上海)有限公司 | Method and device for encrypting mobile phone programs |
CN102110200A (en) * | 2009-12-25 | 2011-06-29 | 凹凸电子(武汉)有限公司 | Authentication method capable of being executed by computer |
CN103763428A (en) * | 2013-12-12 | 2014-04-30 | 北京宝利明威软件技术有限公司 | Application management system and application management method on mobile terminal |
CN104636682A (en) * | 2015-02-09 | 2015-05-20 | 上海瀚银信息技术有限公司 | Password management system and method based on hardware device |
Also Published As
Publication number | Publication date |
---|---|
CN106126985A (en) | 2016-11-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101673238B1 (en) | Method, apparatus, electronic device, program and recording medium for connection management | |
AU2013245980B2 (en) | Location-based access control for portable electronic device | |
EP3610404B1 (en) | Methods and apparatus to monitor permission-controlled hidden sensitive application behavior at run-time | |
CN105519038B (en) | User input data protection method and system | |
US20190340348A1 (en) | Security verification method and device | |
US20180203986A1 (en) | Fingerprint Recognition Method and Apparatus, and Touchscreen Terminal | |
US10028139B2 (en) | Leveraging mobile devices to enforce restricted area security | |
US20140283014A1 (en) | User identity detection and authentication using usage patterns and facial recognition factors | |
WO2016015551A1 (en) | Method and system for improving safety of mobile terminal | |
JP6739648B2 (en) | Wireless network type detection method and apparatus and electronic device | |
CN104376700A (en) | Anti-loss systems and methods for mobile devices | |
US9756173B2 (en) | Leveraging mobile devices to enforce restricted area security | |
CN104091115A (en) | Method and device for monitoring safety of terminals | |
US20160381552A1 (en) | Handling risk events for a mobile device | |
WO2016072833A1 (en) | System and method to disable factory reset | |
CN108494749B (en) | Method, device and equipment for disabling IP address and computer readable storage medium | |
CN106507300A (en) | A kind of method for giving loss terminal for change, device and terminal | |
CN112446984A (en) | Intelligent door lock control method and device | |
US11372961B2 (en) | Method and device for assigning application usage permission | |
CN106126985B (en) | Information security processing method and system based on intelligent terminal | |
CN104412274A (en) | Portable terminal, program, and control method | |
EP3236377B1 (en) | Method, device and system for preventing account from being broken into | |
US20150082445A1 (en) | Information processing method and electronic device | |
CN110826061A (en) | Method and device for detecting operating environment of mobile terminal | |
JP2009212784A (en) | Communication system, mobile terminal and communication method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |