CN106385415B - Information security control method and device and terminal - Google Patents

Information security control method and device and terminal Download PDF

Info

Publication number
CN106385415B
CN106385415B CN201610825315.9A CN201610825315A CN106385415B CN 106385415 B CN106385415 B CN 106385415B CN 201610825315 A CN201610825315 A CN 201610825315A CN 106385415 B CN106385415 B CN 106385415B
Authority
CN
China
Prior art keywords
terminals
terminal
information
distance
current terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610825315.9A
Other languages
Chinese (zh)
Other versions
CN106385415A (en
Inventor
黄宏用
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201610825315.9A priority Critical patent/CN106385415B/en
Publication of CN106385415A publication Critical patent/CN106385415A/en
Application granted granted Critical
Publication of CN106385415B publication Critical patent/CN106385415B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses an information security control method, an information security control device and a terminal. The method comprises the following steps: when a viewing instruction of application information is received, detecting whether a current login account of an application to which the application information belongs logs in other terminals at the same time; determining that the current login account logs in at other terminals at the same time, and acquiring the distance between the current terminal and the other terminals; and sending an identity verification prompt when the distance between the current terminal and any one of the other terminals is determined to be greater than a preset threshold value. According to the technical scheme provided by the embodiment of the invention, the problem that when the same login account number is simultaneously logged in a plurality of terminals, the terminal far away from the user is easy to leak the application information is solved, and the safety of the application information in the terminal is improved.

Description

Information security control method and device and terminal
Technical Field
The embodiment of the invention relates to the field of information security, in particular to an information security control method, an information security control device and a terminal.
Background
With the continuous development of communication technology, various social applications gradually appear in the visual field of users, and the communication modes of the users by adopting terminals are greatly enriched.
In order to facilitate the user to perform multiple operations, in the prior art, one login account can log in a plurality of terminals simultaneously, the user can operate the same social application at different places, and the plurality of terminals can receive application information sent by other people simultaneously.
However, when the same login account logs in at multiple terminals, if the distance between the current operation terminal of the user and other terminals is long, the user cannot monitor the operation conditions of other terminals, and application information sent by other terminals may be acquired by operators on other terminals, so that the application information is leaked, and the security of the application information is reduced.
Disclosure of Invention
The invention provides an information security control method, an information security control device and a terminal, and aims to improve the security of application information in the terminal.
In a first aspect, an embodiment of the present invention provides an information security control method, where the method includes:
when a viewing instruction of application information is received, detecting whether a current login account of an application to which the application information belongs logs in other terminals at the same time;
determining that the current login account logs in at other terminals at the same time, and acquiring the distance between the current terminal and the other terminals;
and sending an identity verification prompt when the distance between the current terminal and any one of the other terminals is determined to be greater than a preset threshold value.
In a second aspect, an embodiment of the present invention further provides an information security control apparatus, where the apparatus includes:
the account detection module is used for detecting whether the current login account of the application to which the application information belongs logs in other terminals at the same time when a viewing instruction of the application information is received;
the distance acquisition module is used for acquiring the distance between the current terminal and other terminals when the current login account is simultaneously logged in at other terminals;
and the prompt sending module is used for sending an identity verification prompt when the distance between the current terminal and any one of the other terminals is determined to be greater than a preset threshold value.
In a third aspect, an embodiment of the present invention further provides a terminal, where the terminal includes the information security control apparatus according to the second aspect.
According to the technical scheme provided by the embodiment of the invention, when the checking instruction of the application information is received, whether the current login account of the application to which the application information belongs logs in at other terminals at the same time is detected, the distance between the current terminal and other terminals is obtained when the current login account logs in at other terminals at the same time is determined, and the identity verification prompt is sent when the distance between the current terminal and any one of the other terminals is determined to be larger than the preset threshold value, so that the problem that the application information is easy to leak from the terminal far away from the position of the user when the same login account logs in a plurality of terminals at the same time is avoided, and the safety of the application information in the terminal is improved.
Drawings
In order to more clearly illustrate the technical solutions of the exemplary embodiments of the present invention, a brief description is given below of the drawings used in describing the embodiments. It should be clear that the described figures are only views of some of the embodiments of the invention to be described, not all, and that for a person skilled in the art, other figures can be derived from these figures without inventive effort.
Fig. 1 is a schematic flow chart of an information security control method according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of an information security control method according to a second embodiment of the present invention;
fig. 3 is a schematic flow chart of an information security control method according to a third embodiment of the present invention;
fig. 4 is a schematic structural diagram of an information security control apparatus according to a fourth embodiment of the present invention;
fig. 5 is a schematic structural diagram of a terminal according to a fifth embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting of the invention. It should be further noted that, for the convenience of description, only some of the structures related to the present invention are shown in the drawings, not all of the structures.
Example one
Fig. 1 is a flowchart illustrating an information security control method according to an embodiment of the present invention. The embodiment is applicable to the case that the same login account is simultaneously logged in a plurality of terminals, and the information security control method can be executed by the information security control device. The device can be realized by means of hardware and/or software and can be arranged in a terminal supporting the social application function.
Referring to fig. 1, the information security control method may specifically include:
and step 110, when a viewing instruction of the application information is received, detecting whether the current login account of the application to which the application information belongs logs in other terminals at the same time.
Illustratively, the application information may include WeChat information, microblog information, mailbox information, or QQ application information. Correspondingly, the application to which the application information belongs may include a WeChat application, a microblog application, a mailbox application or a QQ application.
Optionally, the application to which the application information belongs is a social application.
It should be noted that the application in the terminal may run on the current operation interface or may run in the background, and correspondingly, the application information in this embodiment may be the application information of the current application or may be the application information of the application running in the background.
In this embodiment, a corresponding viewing instruction is generated by a click operation of the user. For example, a terminal is installed with a QQ application and a wechat application, and a user first runs the QQ application, then puts the QQ application in the background and runs the wechat application, in which case, the application information received by the terminal may be the QQ application information or the wechat application information. Specifically, when the application information received by the terminal is QQ application information, since the QQ application runs in the background, the user needs to click the QQ application information prompt link in a "notification" pull-down menu of the terminal, and the terminal determines to receive a viewing instruction of the QQ application when detecting the click operation of the user; when the application information received by the terminal is WeChat application information, the user can check the application information only by clicking a chat record opening link with an application information sender because the WeChat application is running, and the terminal determines to receive a check instruction of the WeChat application when detecting the clicking operation of the user.
For the case that the current login account logs in only one terminal, the user is usually near the terminal, and there is almost no possibility that the application information is viewed by others. Correspondingly, when a viewing instruction of the application information is received, whether the current login account is logged in at other terminals at the same time is detected to determine whether to use the information security control method in the embodiment.
And step 120, when the current login account is determined to be logged in at other terminals at the same time, acquiring the distance between the current terminal and the other terminals.
For example, when the same login account of a certain application logs in multiple terminals at the same time, the current terminal in this embodiment may be any one of the multiple terminals, and the remaining terminals are other terminals.
For the condition that the current login account logs in the current terminal and other terminals at the same time, the current terminal does not directly open the application information when detecting an application information viewing instruction of a user, but judges whether the user can simultaneously monitor the operation conditions of all receiving terminals (namely the current terminal and other terminals) of the application information, if so, the application information on the current terminal is opened, and if not, only the user can view the application information through encryption and other modes, so that the problem of information leakage when the current terminal is not the current terminal operated by the user is avoided. Optionally, whether the user can simultaneously monitor the operation conditions of all receiving terminals of the application information can be judged according to the distance between the current terminal and other terminals.
It can be understood that, for the case that the current login account logs in at two terminals at the same time, the farther the distance between the two terminals is, the less likely the user will detect the operating conditions of the two terminals at the same time. For the case that the current login account logs in at least three terminals at the same time, since the terminal closest to the user cannot be determined, the user cannot detect the operation conditions of all the terminals at the same time due to the fact that the distance between any two terminals is too large. In summary, in this embodiment, the distance between the current terminal and each of the other terminals is obtained, and when it is determined that the distance between the current terminal and any one of the other terminals is too large, it is determined that the user cannot simultaneously detect the operation conditions of all receiving terminals of the application information.
The distance may be obtained in various manners, for example, by comparing IP addresses of the current terminal and other terminals, or by obtaining positions of the current terminal and other terminals by using an indoor positioning technology, so as to obtain a distance between the current terminal and other terminals.
And step 130, sending an identity verification prompt when the distance between the current terminal and any one of the other terminals is determined to be greater than a preset threshold value.
In this embodiment, a preset threshold is set, when the distance between two terminals is smaller than the preset threshold, a user can simultaneously monitor the operation condition of one terminal during the operation of the other terminal, and when the distance between two terminals is larger than the preset threshold, the user cannot monitor the operation condition of the other terminal. It should be noted that the preset threshold may be set by the user according to actual situations. In the embodiment, the user is prompted to perform identity verification when the distance between the current terminal and any one of the other terminals is greater than the preset threshold value, so that only the user can check the application information, and the application information cannot be leaked no matter whether the current terminal is the terminal closest to the user.
It should also be noted that the authentication means may include, but is not limited to, fingerprint authentication or password authentication. For example, issuing an authentication prompt may include issuing a prompt to authenticate with a fingerprint.
According to the technical scheme, when the checking instruction of the application information is received, whether the current login account of the application to which the application information belongs logs in at other terminals at the same time is detected, when the current login account logs in at other terminals at the same time is determined, the distance between the current terminal and other terminals is obtained, and when the distance between the current terminal and any one of the other terminals is determined to be larger than a preset threshold value, an identity verification prompt is sent out, so that the problem that information leakage is prone to happen to terminals far away from the position of a user when the same login account logs in a plurality of terminals at the same time is avoided, and the safety of the application information in the terminals is improved.
Example two
Based on the first embodiment, the present embodiment specifically describes the step of obtaining the distance between the current terminal and the other terminal.
Fig. 2 is a schematic flow chart of an information security control method according to a second embodiment of the present invention. Referring to fig. 2, the information security control method may specifically include:
step 210, when receiving a viewing instruction of the application information, detecting whether the current login account of the application to which the application information belongs is logged in at the other terminals at the same time.
And step 220, when the current login account is determined to be logged in at other terminals at the same time, the IP address of the current terminal is sent to the other terminals through the server.
The IP address is used to give a number to the terminals on the internet, each networked terminal having an IP address, each IP address including two identification codes, one of which is a network identification code and the other of which is a host identification code. The coverage area of the network, the region where the network is located, and the like can be known through network identification. In the present embodiment, the relationship between the distance between the plurality of terminals and the preset threshold is determined using the IP address.
Step 230, receiving the IP address of the other terminal through the server.
The current terminal and other terminals are connected with the server and can communicate with the server. In order to obtain the relation between the distance between the current terminal and other terminals and a preset threshold value by comparing the IP addresses, the other terminals send respective IP addresses to the server, the server sends the IP addresses of the other terminals to the current terminal, and the current terminal locally sequentially compares the IP address of the current terminal with the received IP address of each terminal in the other terminals.
And 240, determining the distance between the current terminal and the other terminals according to the IP address of the current terminal and the IP addresses of the other terminals.
In the prior art, there is a method for obtaining the geographical position of the terminal through the IP address of the terminal, in this embodiment, the geographical position of the current terminal may be obtained through the IP address of the current terminal, the geographical positions of other terminals may be obtained through the IP addresses of other terminals, and then the distance between the current terminal and each of the other terminals may be obtained according to the geographical position of the current terminal and the geographical positions of the other terminals.
Optionally, since the method for obtaining the location of the corresponding terminal through the IP address is relatively complex, the embodiment may also determine the relationship between the distance between the two terminals and the preset threshold value by combining other properties of the IP address. For example, the area where the two terminals connect to the network may be determined by the IP address, for example, the network identifier of the IP address of the terminal a indicates that the terminal a is located in the city B, the network identifier of the IP address of the terminal C indicates that the terminal C is located in the city D, the terminal a and the terminal C are located in two different cities, respectively, and the user cannot monitor the operation conditions of the terminal a and the terminal C at the same time, so that the distance between the terminal a and the terminal C is necessarily greater than the preset threshold.
And step 250, sending an identity verification prompt when the distance between the current terminal and any one of the other terminals is determined to be greater than a preset threshold value.
According to the technical scheme provided by the embodiment, when a viewing instruction of the application information is received, whether the current login account of the application to which the application information belongs logs in at other terminals at the same time is detected, when the current login account logs in at other terminals at the same time is determined, the distance between the current terminal and the other terminals is determined according to the IP address of the current terminal and the IP addresses of the other terminals, and when the distance between the current terminal and any one of the other terminals is determined to be larger than a preset threshold value, an identity verification prompt is sent out, so that the problem that the application information is easily leaked by the terminal far away from the position of a user when the same login account logs in a plurality of terminals at the same time is avoided, and the safety of the application information in the terminal is improved.
EXAMPLE III
Based on the first embodiment, the present embodiment specifically describes the step of obtaining the distance between the current terminal and the other terminal.
Fig. 3 is a schematic flow chart of an information security control method according to a third embodiment of the present invention. Referring to fig. 3, the information security control method may specifically include:
and 310, when a viewing instruction of the application information is received, detecting whether the current login account of the application to which the application information belongs logs in other terminals at the same time.
And step 320, when the current login account is determined to be logged in at other terminals at the same time, acquiring the position information of the current terminal by adopting an indoor positioning technology, and sending the position information to the other terminals through a server.
Typically, the geographical position of a terminal can be simply obtained by conventional GPS positioning, and thus the distance between two terminals. However, when the terminals that may be logged in by the current login account are located in the same building, for example, on different floors, the distance between the two terminals cannot be accurately obtained from the geographic position of each terminal obtained by using the conventional GPS positioning technology, and at this time, the position information of the current terminal can be obtained by using the indoor positioning technology, and similarly, the position information of other terminals can also be obtained by using the indoor positioning technology.
And step 330, receiving the position information of the other terminals through the server.
The current terminal and other terminals are connected with the server and can communicate with the server, so that the current terminal can send the position information of the current terminal to other terminals through the server and can also receive the position information of other terminals through the server.
Step 340, determining the distance between the current terminal and the other terminals according to the position information of the current terminal and the position information of the other terminals.
The position information is obtained by adopting an indoor positioning technology, so that the position information is more accurate, and the distance between the current terminal and any one of the other terminals can be obtained by the current terminal through the position information of the current terminal and the received position information of any one of the other terminals.
Specifically, there are many indoor positioning technologies, which may include, but are not limited to, indoor GPS positioning technologies and indoor wireless positioning technologies.
And 350, sending an identity verification prompt when the distance between the current terminal and any one of the other terminals is determined to be greater than a preset threshold value.
According to the technical scheme provided by the embodiment, when a viewing instruction of the application information is received, whether the current login account of the application to which the application information belongs logs in at other terminals at the same time is detected, when the current login account logs in at other terminals at the same time is determined, the distance between the current terminal and the other terminals is determined according to the position information of the current terminal and the position information of the other terminals, and when the distance between the current terminal and any one of the other terminals is determined to be larger than a preset threshold value, an identity verification prompt is sent, so that the problem that the application information is easily leaked by the terminal far away from the position of a user when the same login account logs in a plurality of terminals at the same time is avoided, and the safety of the application information in the terminal is improved.
Example four
Fig. 4 is a schematic structural diagram of an information security control apparatus according to a fourth embodiment of the present invention. The information security control device provided by the embodiment can be arranged in a terminal supporting the social application function. Referring to fig. 4, the specific structure of the information security control device is as follows:
the account detection module 410 is configured to detect whether a current login account of an application to which application information belongs is logged in at the same time at another terminal when a viewing instruction of the application information is received;
a distance obtaining module 420, configured to determine that the current login account is logged in at the other terminal at the same time, and obtain a distance between the current terminal and the other terminal;
a prompt sending module 430, configured to send an authentication prompt when it is determined that a distance between the current terminal and any terminal of the other terminals is greater than a preset threshold.
In this embodiment, the distance obtaining module 420 may include:
an address sending unit, configured to send the IP address of the current terminal to the other terminals through a server;
an address receiving unit, configured to receive, by the server, the IP address of the other terminal;
and the distance determining unit is used for determining the distance between the current terminal and the other terminals according to the IP address of the current terminal and the IP addresses of the other terminals.
In this embodiment, the distance obtaining module 420 may include:
the information sending unit is used for acquiring the position information of the current terminal by adopting an indoor positioning technology and sending the position information to other terminals through a server;
an information receiving unit, configured to receive, by the server, location information of the other terminal;
and the distance determining unit is used for determining the distance between the current terminal and the other terminals according to the position information of the current terminal and the position information of the other terminals.
In this embodiment, the application information may include WeChat information, microblog information, mailbox information, or QQ application information.
In this embodiment, the prompt issuing module 430 may include:
and the fingerprint verification unit is used for sending out a prompt for identity verification through the fingerprint.
The information security control device provided by the embodiment of the invention belongs to the same inventive concept as the information security control method provided by any embodiment of the invention, can execute the information security control method provided by any embodiment of the invention, and has corresponding functional modules and beneficial effects. The technical details that are not described in detail in this embodiment can be referred to the information security control process provided by any embodiment of the present invention.
EXAMPLE five
The present embodiment provides a terminal, which may include the information security control apparatus provided in the fourth embodiment of the present invention. Fig. 5 is a schematic structural diagram of a terminal according to a fifth embodiment of the present invention, and as shown in fig. 5, the terminal 500 may include: memory 501, a Central Processing Unit (CPU) 502, a peripheral interface 503, RF (Radio Frequency) circuitry 505, audio circuitry 506, speakers 511, a power management chip 508, an input/output (I/O) subsystem 509, a touch screen 512, other input/control devices 510, and an external port 504, which communicate via one or more communication buses or signal lines 507.
It should be understood that the illustrated terminal 500 is only one example of a terminal, and that the terminal 500 may have more or fewer components than shown in the figures, may combine two or more components, or may have a different configuration of components. The various components shown in the figures may be implemented in hardware, software, or a combination of hardware and software, including one or more signal processing and/or application specific integrated circuits.
The following describes in detail a terminal for implementing information security control provided in this embodiment, where the terminal is a mobile phone as an example.
A memory 501, the memory 501 being accessible by the CPU502, the peripheral interface 503, and the like, the memory 501 may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic disk storage devices, flash memory devices, or other volatile solid state storage devices.
A peripheral interface 503, the peripheral interface 503 may connect input and output peripherals of the device to the CPU502 and the memory 501.
An I/O subsystem 509, which I/O subsystem 509 may connect input and output peripherals on the device, such as the touch screen 502 (equivalent to the screen in the above embodiment) and other input/control devices 510, to the peripheral interface 503. The I/O subsystem 509 may include a display controller 5091 and one or more input controllers 5092 for controlling other input/control devices 510. Where one or more input controllers 5092 receive electrical signals from or send electrical signals to other input/control devices 510, the other input/control devices 510 may include physical buttons (push buttons, rocker buttons, etc.), dials, slide switches, joysticks, click wheels. It is noted that the input controller 5092 may be connected to any one of: a keyboard, an infrared port, a USB interface, and a pointing device such as a mouse.
A touch screen 512, which is an input interface and an output interface between the user terminal and the user, displays visual output to the user, which may include graphics, text, icons, video, and the like.
The display controller 5091 in the I/O subsystem 509 receives electrical signals from the touch screen 512 or transmits electrical signals to the touch screen 512. The touch screen 512 detects a contact on the touch screen, and the display controller 5091 converts the detected contact into an interaction with a user interface object displayed on the touch screen 512, that is, implements a human-computer interaction, and the user interface object displayed on the touch screen 512 may be an icon for running a game, an icon networked to a corresponding network, or the like. It is worth mentioning that the device may also comprise a light mouse, which is a touch sensitive surface that does not show visual output, or an extension of the touch sensitive surface formed by the touch screen.
The RF circuit 505 is mainly used to establish communication between the mobile phone and the wireless network (i.e., network side), and implement data reception and transmission between the mobile phone and the wireless network. Such as sending and receiving short messages, e-mails, etc. In particular, the RF circuitry 505 receives and transmits RF signals, also referred to as electromagnetic signals, through which the RF circuitry 505 converts electrical signals to or from electromagnetic signals and communicates with communication networks and other devices. The RF circuitry 505 may include known circuitry for performing these functions including, but not limited to, an antenna system, an RF transceiver, one or more amplifiers, a tuner, one or more oscillators, a digital signal processor, a CODEC (CODEC) chipset, a Subscriber Identity Module (SIM), and so forth.
The audio circuit 506 is mainly used to receive audio data from the peripheral interface 503, convert the audio data into an electric signal, and transmit the electric signal to the speaker 511.
The speaker 511 is used for restoring the voice signal received by the handset from the wireless network through the RF circuit 505 to sound and playing the sound to the user.
And a power management chip 508 for supplying power and managing power to the hardware connected to the CPU502, the I/O subsystem, and the peripheral interfaces.
The CPU502 provided in the embodiment of the present invention may perform the following operations:
when a viewing instruction of application information is received, detecting whether a current login account of an application to which the application information belongs logs in other terminals at the same time;
determining that the current login account logs in at other terminals at the same time, and acquiring the distance between the current terminal and the other terminals;
and sending an identity verification prompt when the distance between the current terminal and any one of the other terminals is determined to be greater than a preset threshold value.
The terminal can execute the method provided by the first embodiment to the third embodiment of the invention, and has the corresponding functional modules and beneficial effects of the execution method. For technical details that are not described in detail in the above embodiments, reference may be made to an information security control method provided in any embodiment of the present invention.
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present invention and the technical principles employed. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present invention has been described in greater detail by the above embodiments, the present invention is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present invention, and the scope of the present invention is determined by the scope of the appended claims.

Claims (11)

1. An information security control method, comprising:
when a viewing instruction of application information is received, detecting whether a current login account of an application to which the application information belongs logs in other terminals at the same time;
when the current login account is determined to be logged in at other terminals at the same time, the distance between the current terminal and each terminal in the other terminals is obtained, and the current terminal is the terminal which receives the viewing instruction;
and sending an authentication prompt when the distance between the current terminal and any one of the other terminals is determined to be greater than a preset threshold value, wherein the authentication prompt is specific to all terminals which log in simultaneously.
2. The method of claim 1, wherein the obtaining the distance between the current terminal and the other terminal comprises:
sending the IP address of the current terminal to the other terminals through a server;
receiving the IP addresses of the other terminals through the server;
and determining the distance between the current terminal and the other terminals according to the IP address of the current terminal and the IP addresses of the other terminals.
3. The method of claim 1, wherein the obtaining the distance between the current terminal and the other terminal comprises:
acquiring the position information of the current terminal by adopting an indoor positioning technology, and sending the position information to the other terminals through a server;
receiving the position information of the other terminals through the server;
and determining the distance between the current terminal and the other terminals according to the position information of the current terminal and the position information of the other terminals.
4. The method of claim 1, wherein the application information comprises WeChat information, microblog information, mailbox information, or QQ application information.
5. The method of claim 1, wherein issuing an authentication prompt comprises:
and sending out a prompt for identity verification through the fingerprint.
6. An information security control apparatus, comprising:
the account detection module is used for detecting whether the current login account of the application to which the application information belongs logs in other terminals at the same time when a viewing instruction of the application information is received;
the distance acquisition module is used for acquiring the distance between the current terminal and each terminal in other terminals when the current login account is determined to be logged in at the same time at the other terminals, wherein the current terminal is the terminal which receives the viewing instruction;
and the prompt sending module is used for sending an authentication prompt when the distance between the current terminal and any one of the other terminals is determined to be greater than a preset threshold value, wherein the authentication prompt is specific to all terminals which log in simultaneously.
7. The apparatus of claim 6, wherein the distance acquisition module comprises:
an address sending unit, configured to send the IP address of the current terminal to the other terminals through a server;
an address receiving unit, configured to receive, by the server, the IP address of the other terminal;
and the distance determining unit is used for determining the distance between the current terminal and the other terminals according to the IP address of the current terminal and the IP addresses of the other terminals.
8. The apparatus of claim 6, wherein the distance acquisition module comprises:
the information sending unit is used for acquiring the position information of the current terminal by adopting an indoor positioning technology and sending the position information to other terminals through a server;
an information receiving unit, configured to receive, by the server, location information of the other terminal;
and the distance determining unit is used for determining the distance between the current terminal and the other terminals according to the position information of the current terminal and the position information of the other terminals.
9. The apparatus of claim 6, wherein the application information comprises WeChat information, microblog information, mailbox information, or QQ application information.
10. The apparatus of claim 6, wherein the cue issuance module comprises:
and the fingerprint verification unit is used for sending out a prompt for identity verification through the fingerprint.
11. A terminal, characterized by comprising an information security control apparatus according to any one of claims 6 to 10.
CN201610825315.9A 2016-09-14 2016-09-14 Information security control method and device and terminal Active CN106385415B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610825315.9A CN106385415B (en) 2016-09-14 2016-09-14 Information security control method and device and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610825315.9A CN106385415B (en) 2016-09-14 2016-09-14 Information security control method and device and terminal

Publications (2)

Publication Number Publication Date
CN106385415A CN106385415A (en) 2017-02-08
CN106385415B true CN106385415B (en) 2019-12-31

Family

ID=57935742

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610825315.9A Active CN106385415B (en) 2016-09-14 2016-09-14 Information security control method and device and terminal

Country Status (1)

Country Link
CN (1) CN106385415B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107480508A (en) * 2017-08-18 2017-12-15 珠海市魅族科技有限公司 A kind of method and terminal for logging in application, computer installation and readable storage medium storing program for executing
CN112822092B (en) * 2019-11-18 2022-07-26 腾讯科技(深圳)有限公司 Message reminding method and device and computer readable storage medium
CN112637195B (en) * 2020-12-21 2022-11-11 维沃移动通信(杭州)有限公司 Method and device for controlling electronic equipment and electronic equipment

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012115403A2 (en) * 2011-02-24 2012-08-30 (주)잉카인터넷 Location information-based authentication system and method
CN102638416B (en) * 2012-03-27 2015-09-09 上海量明科技发展有限公司 The method of IM message, client and system is checked when multi-client logs in
US20160065558A1 (en) * 2013-01-08 2016-03-03 Coursera, Inc. Identity verification for online education
CN103532983A (en) * 2013-10-31 2014-01-22 北京云巢动脉科技有限公司 Multipoint login processing method and device
CN104767717B (en) * 2014-01-03 2019-01-29 腾讯科技(深圳)有限公司 Auth method and device
US10440016B2 (en) * 2014-12-09 2019-10-08 Duo Security, Inc. System and method for applying digital fingerprints in multi-factor authentication

Also Published As

Publication number Publication date
CN106385415A (en) 2017-02-08

Similar Documents

Publication Publication Date Title
US9979497B2 (en) Audio playing method and apparatus based on Bluetooth connection
US9717065B2 (en) Indoor remote triggered location scanning
WO2017198161A1 (en) Network connection method, apparatus, storage medium, and terminal
CN106778175B (en) Interface locking method and device and terminal equipment
AU2018421189A1 (en) Method for quickly opening application or application function, and terminal
CN110198301B (en) Service data acquisition method, device and equipment
US11356562B2 (en) Transferring an active telephone conversation
CN110622539A (en) Detecting a fake cell tower
CN111478849B (en) Service access method, device and storage medium
CN106911956B (en) Audio data playing method and device and mobile terminal
EP3640787A1 (en) Input method and electronic device
CN106385415B (en) Information security control method and device and terminal
CN107404753B (en) Volume adjusting method, device, terminal and storage medium
CN106815534B (en) Method and device for protecting user privacy and mobile terminal
CN104954340A (en) Proxy IP address detection method and device
CN107370872A (en) Method, terminal and the control device of a kind of terminal lock machine and control terminal lock machine
CN106611152A (en) User identity determination method and apparatus
CN108984231A (en) A kind of login method and mobile terminal of application program account
CN106713572B (en) Data reporting control method, device and terminal
CN107104930A (en) It is a kind of that the methods, devices and systems for checking authority are set
JP6974620B2 (en) Notification message processing method and terminal
CN107592289B (en) Password setting method and device
CN106101361A (en) The display packing of cell phone address book, device and mobile phone
CN117411655A (en) Equipment decryption control method and device, electronic equipment and storage medium
CN107995150A (en) Auth method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: OPPO Guangdong Mobile Communications Co., Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: Guangdong Opel Mobile Communications Co., Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant