CN107392013A - A kind of terminal safety protection method, terminal and computer-readable recording medium - Google Patents

A kind of terminal safety protection method, terminal and computer-readable recording medium Download PDF

Info

Publication number
CN107392013A
CN107392013A CN201710439684.9A CN201710439684A CN107392013A CN 107392013 A CN107392013 A CN 107392013A CN 201710439684 A CN201710439684 A CN 201710439684A CN 107392013 A CN107392013 A CN 107392013A
Authority
CN
China
Prior art keywords
terminal
request
user
mode
application program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710439684.9A
Other languages
Chinese (zh)
Inventor
刘丽红
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201710439684.9A priority Critical patent/CN107392013A/en
Publication of CN107392013A publication Critical patent/CN107392013A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode

Abstract

The invention discloses a kind of terminal safety protection method, terminal and computer-readable recording medium, the terminal safety protection method comprises the following steps:Whether monitor terminal itself there are abnormal conditions;If so, then entering safe mode, safe mode includes at least one of in the following manner:Mode one:Network connection is disconnected, and prohibits the use of the network connecting function of terminal itself;Mode two:The application program for being in running status is closed, application program is the application program in default the application list, and No starting presets the application program in the application list;Using such scheme, user's assets or the compromised possibility of information are reduced, improves the security of terminal, is effectively protected the assets or information of user.

Description

A kind of terminal safety protection method, terminal and computer-readable recording medium
Technical field
The present invention relates to field of terminal technology, more specifically to a kind of terminal safety protection method, terminal and calculating Machine readable storage medium storing program for executing.
Background technology
At present, the use of intelligent terminal is increasingly frequent, and the function on intelligent terminal is also stronger and stronger, however, intelligence is eventually End safety problem also increasingly highlights, when abnormal conditions occurs in intelligent terminal, for example, being controlled by poisoning intrusion, by disabled user System etc., now the information in intelligent terminal is easily compromised, and the privacy and safety of user cannot be protected, the security of terminal It is poor.
The content of the invention
It is a primary object of the present invention to propose a kind of terminal safety protection method, terminal and computer-readable storage medium Matter, it is intended to solve in the prior art, the information in terminal is easily compromised, unsafe problem.
In order to solve the above technical problems, the present invention provides a kind of terminal safety protection method, terminal safety protection method bag Include following steps:
Whether monitor terminal itself there are abnormal conditions;
If so, then entering safe mode, safe mode includes at least one of in the following manner:
Mode one:Network connection is disconnected, and prohibits the use of the network connecting function of terminal itself;
Mode two:The application program for being in running status is closed, application program is answering in default the application list With program, and No starting presets the application program in the application list.
Wherein, after safe mode is entered, terminal safety protection method also includes:
Receive startup request of the user to application program;
Judge the application program whether in default the application list;
If so, then ejecting prompting frame prompting user terminal abnormal conditions currently occurs, the application program can not be started, need to close Close current safety pattern or this safety protection function for closing a terminal after can just start;
If it is not, then start the application program.
Wherein, after safe mode is entered, terminal safety protection method also includes:
User terminal is reminded abnormal conditions currently occur by predetermined manner:
Receive the turn-off request to prompting;
Closed and reminded according to the turn-off request.
Wherein, abnormal conditions include following at least one:Terminal itself is controlled by poisoning intrusion, terminal by disabled user There is the download of non-user operation in system, terminal, terminal has the transmission short message that non-user operates.
Wherein, after safe mode is entered, terminal safety protection method also includes:
Receive the request for closing this safe mode;
This safe mode is closed according to the request;
Or the request for the monitor function closed a terminal is received, it is different whether monitor function occurs for monitor terminal itself Reason condition;
The monitor function closed a terminal according to the request.
Wherein, receive the request of monitor function that the request for closing this safe mode or reception close a terminal it Before, terminal safety protection method also includes:
Display sets interface, and interface includes carrying out authentication to user at least one of in the following manner:
Mode one:Password authentification;
Mode two:Fingerprint authentication;
Mode three:Problem is verified;
When authentication is by then entering and receiving the monitoring that the request for closing this safe mode or reception are closed a terminal The step of request of function.
Further, the present invention provides a kind of terminal, and terminal includes memory and processor;
Processor is used to perform the terminal security defence program stored in memory, to realize following steps:
Whether monitor terminal itself there are abnormal conditions;
If so, then entering safe mode, safe mode includes at least one of in the following manner:
Mode one:Network connection is disconnected, and prohibits the use of the network connecting function of terminal itself;
Mode two:The application program for being in running status is closed, application program is answering in default the application list With program, and No starting presets the application program in the application list.
Wherein, after safe mode is entered, processor is additionally operable to perform the terminal security protection journey stored in memory Sequence, to realize following steps:
Receive the request for closing this safe mode;
This safe mode is closed according to the request;
Or the request for the monitor function closed a terminal is received, it is different whether monitor function occurs for monitor terminal itself Reason condition;
The monitor function closed a terminal according to the request.
Further, the present invention provides a kind of computer-readable recording medium, and computer-readable recording medium storage has one Individual or multiple programs, one or more program can be by one or more computing devices, to realize following steps:
Whether monitor terminal itself there are abnormal conditions;
If so, then entering safe mode, safe mode includes at least one of in the following manner:
Mode one:Network connection is disconnected, and prohibits the use of the network connecting function of terminal itself;
Mode two:The application program for being in running status is closed, application program is answering in default the application list With program, and No starting presets the application program in the application list.
Wherein, enter safe mode after, one or more program can also by one or more computing device, To realize following steps:
Receive the request for closing this safe mode;
This safe mode is closed according to the request;
Or the request for the monitor function closed a terminal is received, it is different whether monitor function occurs for monitor terminal itself Reason condition;
The monitor function closed a terminal according to the request.
Beneficial effect
The invention provides a kind of terminal safety protection method, terminal and computer-readable recording medium, the terminal security Guard method comprises the following steps:Whether monitor terminal itself there are abnormal conditions;If so, then enter safe mode, safe mould Formula includes at least one of in the following manner:Mode one:Network connection is disconnected, and prohibits the use of the network connection work(of terminal itself Energy;Mode two:The application program for being in running status is closed, application program is the application journey in default the application list Sequence, and No starting presets the application program in the application list;Using such scheme, user's assets or information quilt are reduced The possibility of leakage, the security of terminal is improved, be effectively protected the assets or information of user.
Brief description of the drawings
Below in conjunction with drawings and Examples, the invention will be further described, in accompanying drawing:
Fig. 1 is the hardware architecture diagram for realizing each optional terminal of embodiment one of the present invention;
Fig. 2 is a kind of flow chart for terminal safety protection method that first embodiment of the invention provides;
Fig. 3 is to invent the schematic diagram that a kind of the application list that each embodiment provides is shown;
Fig. 4 is the schematic diagram that a kind of prompt text frame that each embodiment of the present invention provides is shown;
Fig. 5 is a kind of schematic diagram for terminal that second embodiment of the invention provides.
Embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
Describe to realize the terminal of each embodiment of the present invention referring now to accompanying drawing.In follow-up description, using for The suffix of such as " module ", " part " or " unit " of element is represented only for being advantageous to the explanation of the present invention, itself is not There is specific meaning.Therefore, " module " can be used mixedly with " part ".
Terminal can be implemented in a variety of manners.For example, the terminal described in the present invention can include such as mobile phone, flat board Computer, notebook computer, palm PC, personal digital assistant (Personal Digital Assistant, PDA), portable Media player (Portable Media Player, PMP), guider, wearable device, Intelligent bracelet, pedometer etc. move Dynamic terminal, and the fixed terminal such as digital TV, desktop computer.
It will be appreciated by those skilled in the art that in addition to being used in particular for moving the element of purpose, according to the present invention's The construction of embodiment can also apply to the terminal of fixed type.
Referring to Fig. 1, its hardware architecture diagram for each optional terminal of embodiment one of the realization present invention, the end End 100 can include:RF (Radio Frequency, radio frequency) unit 101, WiFi module 102, audio output unit 103, A/V (audio/video) input block 104, sensor 105, display unit 106, user input unit 107, interface unit 108, storage Device 109 and the grade part of processor 110.It will be understood by those skilled in the art that the terminal structure shown in Fig. 1 is not formed pair The restriction of terminal, terminal can be included than illustrating more or less parts, either combine some parts or different parts Arrangement.
The all parts of terminal are specifically introduced with reference to Fig. 1:
Radio frequency unit 101 can be used for receiving and sending messages or communication process in, the reception and transmission of signal, specifically, by base station Downlink information receive after, handled to processor 110;In addition, up data are sent to base station.Generally, radio frequency unit 101 Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier, duplexer etc..In addition, penetrate Frequency unit 101 can also be communicated by radio communication with network and other equipment.Above-mentioned radio communication can use any communication Standard or agreement, including but not limited to GSM (Global System of Mobile communication, global system for mobile telecommunications System), GPRS (General Packet Radio Service, general packet radio service), CDMA1000 (Code Division Multiple Access1000, CDMA 1000), WCDMA (Wideband Code Division Multiple Access, WCDMA), TD-SCDMA (Time Division-Synchronous Code Division Multiple Access, TD SDMA), FDD-LTE (Frequency Division Duplexing-Long Term Evolution, FDD Long Term Evolution) and TDD-LTE (Time Division Duplexing-Long Term Evolution, time division duplex Long Term Evolution) etc..
WiFi belongs to short range wireless transmission technology, and terminal can help user's transceiver electronicses postal by WiFi module 102 Part, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and accessed.
Audio output unit 103 can be in call signal reception pattern, call mode, logging mode, language in terminal 100 It is receiving or depositing by radio frequency unit 101 or WiFi module 102 when under the isotypes such as sound recognition mode, broadcast reception mode It is sound that the voice data stored in reservoir 109, which is converted into audio signal and exported,.Moreover, audio output unit 103 may be used also With the specific function provided to terminal 100 performs, related audio output is (for example, call signal receives sound, message sink sound Sound etc.).Audio output unit 103 can include loudspeaker, buzzer etc..
A/V input blocks 104 are used to receive audio or video signal.A/V input blocks 104 can include graphics processor (Graphics Processing Unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode Or the static images or the view data of video obtained in image capture mode by image capture apparatus (such as camera) are carried out Reason.Picture frame after processing may be displayed on display unit 106.Picture frame after the processing of graphics processor 1041 can be deposited Storage is transmitted in memory 109 (or other storage mediums) or via radio frequency unit 101 or WiFi module 102.Mike Wind 1042 can connect in telephone calling model, logging mode, speech recognition mode etc. operational mode via microphone 1042 Quiet down sound (voice data), and can be voice data by such acoustic processing.Audio (voice) data after processing can To be converted to the form output that mobile communication base station can be sent to via radio frequency unit 101 in the case of telephone calling model. Microphone 1042 can implement various types of noises and eliminate (or suppression) algorithm to eliminate (or suppression) in reception and send sound Caused noise or interference during frequency signal.
Terminal 100 also includes at least one sensor 105, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor includes ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to ambient light Light and shade adjusts the brightness of display panel 1061, and proximity transducer can close display panel when terminal 100 is moved in one's ear 1061 and/or backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions (generally three axles) and add The size of speed, size and the direction of gravity are can detect that when static, application (such as the horizontal/vertical screen available for identification mobile phone posture Switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;As for mobile phone also Configurable fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, hygrometer, temperature The other sensors such as meter, infrared ray sensor, will not be repeated here.
Display unit 106 is used for the information for showing the information inputted by user or being supplied to user.Display unit 106 can wrap Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used Forms such as (Organic Light-Emitting Diode, OLED) configures display panel 1061.
User input unit 107 can be used for the numeral or character information for receiving input, and produce the user with terminal 100 Set and function control it is relevant key signals input.Specifically, user input unit 107 may include contact panel 1071 and Other input equipments 1072.Contact panel 1071, also referred to as touch-screen, collect touch operation of the user on or near it (for example user uses any suitable objects or annex such as finger, stylus on contact panel 1071 or in contact panel 1071 Neighbouring operation), and corresponding attachment means are driven according to formula set in advance.Contact panel 1071 may include touch detection Two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation band The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it Contact coordinate is converted into, then gives processor 110, and the order sent of reception processing device 110 and can be performed.In addition, can To realize contact panel 1071 using polytypes such as resistance-type, condenser type, infrared ray and surface acoustic waves.Except contact panel 1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can wrap Include but be not limited to physical keyboard, in function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc. One or more, do not limit herein specifically.
Further, contact panel 1071 can cover display panel 1061, detect thereon when contact panel 1071 or After neighbouring touch operation, processor 110 is sent to determine the type of touch event, is followed by subsequent processing device 110 according to touch thing The type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, contact panel 1071 and display panel 1061 be the part independent as two to realize the input of mobile terminal and output function, but in certain embodiments, can Input and the output function of terminal are realized so that contact panel 1071 and display panel 1061 is integrated, is not limited herein specifically It is fixed.
Interface unit 108 is connected the interface that can pass through as at least one external device (ED) with terminal 100.It is for example, outside Device can include wired or wireless head-band earphone port, external power source (or battery charger) port, wired or wireless number According to port, memory card port, for connecting the port of device with identification module, audio input/output (I/O) port, regarding Frequency I/O ports, ear port etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, data are believed Breath, electric power etc.) and one or more elements that the input received is transferred in terminal 100 or can be used at end Data are transmitted between end 100 and external device (ED).
Memory 109 can be used for storage software program and various data.Memory 109 can mainly include storing program area And storage data field, wherein, storing program area can storage program area, application program (such as the sound needed at least one function Sound playing function, image player function etc.) etc.;Storage data field can store according to mobile phone use created data (such as Voice data, phone directory etc.) etc..In addition, memory 109 can include high-speed random access memory, can also include non-easy The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of terminal 100, utilizes each of various interfaces and the whole terminal 100 of connection Part, by running or performing the software program and/or module that are stored in memory 109, and call and be stored in memory Data in 109, the various functions and processing data of terminal 100 are performed, so as to carry out integral monitoring to terminal 100.Processor 110 may include one or more processing units;Preferably, processor 110 can integrate application processor and modem processor, Wherein, application processor mainly handles operating system, user interface and application program etc., and modem processor mainly handles nothing Line communicates.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
Although Fig. 1 is not shown, terminal 100 can also will not be repeated here including bluetooth module etc..
Based on above-mentioned terminal hardware structure, below by way of specific embodiment, the present invention is described in detail.
First embodiment
A kind of terminal safety protection method is present embodiments provided, referring to Fig. 2, Fig. 2 is that one kind that the present embodiment provides is whole The flow chart of method for security protection is held, the terminal safety protection method comprises the following steps:
S201:Whether monitor terminal itself there are abnormal conditions, if so, then entering S202, if it is not, then entering S203;
Before S201, the terminal safety protection method also includes:Display sets interface, sets interface to include terminal monitoring Whether the unlatching options and closing options, monitor function of function there are abnormal conditions for monitor terminal itself;If monitor Function is closed, then will not monitor terminal itself whether there are abnormal conditions, also will not when there are abnormal conditions in terminal itself, Into safe mode, the power consumption of terminal is saved;The operation of the unlatching options to terminal monitoring function is received, according to the operation Open the monitor function of terminal.
Whether monitor terminal itself, which abnormal conditions occurs, includes following at least one:Terminal itself is by poisoning intrusion, end End is controlled by disabled user, terminal has the download of non-user operation, terminal has transmission short message of non-user operation etc..
Before S201, the terminal safety protection method also includes:User, which can be set, needs application program to be protected, example Such as short message, wechat, Alipay, Mobile banking, and be added into the application list;
S202:Into safe mode, safe mode includes at least one of in the following manner:
Mode one:Network connection is disconnected, and prohibits the use of the network connecting function of terminal itself;
Terminal itself is controlled to disconnect the company with WiFi (Wireless Fidelity, Wireless Fidelity) and data services network Connect, and prohibit the use of WiFi and the data service of terminal itself, also be arranged to open by WiFi and data service, namely In the case where user is not turned off this safe mode or is not turned off the monitor function of terminal, even if user is carried out The unlatching of WiFi and/or data service operate, terminal be also not responding to user unlatching operation, still keep terminal disconnect with WiFi and The connection of data service;
Mode two:The application program for being in running status is closed, application program is answering in default the application list With program, and No starting presets the application program in the application list;
When listening to terminal and abnormal conditions occur, the application program in default the application list is obtained, forbids presetting Application program operation in the application list, and is arranged to open, namely user be not turned off this safe mode, Or in the case of being not turned off the monitor function of terminal, even if user has carried out the application program in default the application list Unlatching operation, terminal be also not responding to user unlatching operation, still keep No starting preset the application list in application Program;
Optionally, after S202 enters safe mode, the terminal safety protection method also includes:
Receive startup request of the user to application program;
Judge the application program whether in default the application list;
If so, then ejecting prompting frame prompting user terminal abnormal conditions currently occurs, the application program can not be started, need to close Close current safety pattern or this safety protection function for closing a terminal after can just start;
If it is not, then start the application program.
Optionally, after S202 enters safe mode, the terminal safety protection method also includes:
User terminal is reminded abnormal conditions currently occur by predetermined manner:
Receive the turn-off request to prompting;
Closed and reminded according to the turn-off request.
Wherein, predetermined manner includes at least one of in the following manner:
Mode one:Bright screen and ejection prompt text frame;Such as the word in prompt text frame can be that " terminal is currently at Precarious position.”
Mode two:Play caution sound;
Mode three:Vibration.
When reminding user terminal currently abnormal conditions occur, options is also provided and chooses whether that closing this carries for user Wake up, for example, user clicks on the choice box " I is aware of " shown on interface closes prompt text frame, caution sound and vibration afterwards, but Terminal-pair WiFi is not released to connect with data services network and the taboo of application program launching in default the application list Only.
Optionally, after S202 enters safe mode, the terminal safety protection method also includes:
Receive the request for closing this safe mode;
This safe mode is closed according to the request;
This time safe mode is closed, and the monitor function of terminal is still in opening, i.e., still monitor terminal is It is no abnormal conditions occur;
Or receive the request for the monitor function closed a terminal;
The monitor function closed a terminal according to the request;
Whether the monitor function closed a terminal, no longer monitor terminal there are abnormal conditions, further will not also open peace Syntype.
Optionally, user closed safe pattern can also be set, the monitor function closed a terminal when identification authentication mode, Before the request for the monitor function that the request of this safe mode or reception are closed a terminal is closed in S202 receptions, terminal peace All risk insurance maintaining method also includes:
Display sets interface, and interface includes carrying out authentication to user at least one of in the following manner:
Mode one:Password authentification;I.e. user need to input password;
Mode two:Fingerprint authentication;I.e. user needs typing fingerprint;
Mode three:Problem is verified;I.e. user need to fill in the answer of validation problem;
When authentication is by then entering and receiving the monitoring that the request for closing this safe mode or reception are closed a terminal The step of request of function.
Such as user sets closed safe pattern, the monitor function closed a terminal when identification authentication mode be problem checking And fingerprint authentication, user need to set validation problem and its answer, and need typing fingerprint, terminal using the fingerprint of typing as Fingerprint masterplate, for user in follow-up closed safe pattern or the monitor function closed a terminal, the answer of user's input needs and user The answer of the validation problem pre-set is consistent, and the fingerprint of typing need to be only authentication and pass through with fingerprint stencil matching.
When user needs to close this safe mode or the monitor function closed a terminal, body is carried out into interface is set Part checking, in authentication in the case of, just allows the monitor function closed this safe mode or closed a terminal, carries The high security of terminal.
S203:Terminate.
The scheme of the present embodiment is further described for a specific example for example below.
User enter set interface, select terminal monitoring function unlatching options, and set closed safe pattern and The identification authentication mode during monitor function closed a terminal, including problem checking and fingerprint authentication, and setting need to be to be protected Application program, including short message, wechat, Alipay, Mobile banking, and be added into the application list, it is referring to Fig. 3, Fig. 3 The schematic diagram that a kind of the application list that the present embodiment provides is shown.
Terminal system begins listening for the situation of terminal itself, automatically begins to download and install application program when capturing terminal Situation when, system judges that terminal is currently at abnormal conditions, i.e. terminal is currently at precarious position, backstage at once by WiFi and Data service disconnects, and is arranged to open;Obtain simultaneously in the need the application list to be protected set before user Application program, including short message, wechat, Alipay, Mobile banking, forbid short message, wechat, Alipay, Mobile banking's operation.
Referring to Fig. 4, Fig. 4 is the schematic diagram that a kind of prompt text frame that the present embodiment provides is shown, in order to remind user to note Meaning, terminal system also bright screen and eject prompt text frame remind user terminal be currently at precarious position, and open broadcasting warning Sound and vibration, user click on the choice box " I is aware of " shown on interface and close prompt text frame, caution sound and vibration afterwards, but Do not release terminal-pair WiFi connected with data services network and short message, wechat, Alipay, Mobile banking start forbid.
User starts an application program, and whether terminal system first judges the application program in default the application list Application program, if it is not, then normal start, if so, abnormal conditions, nothing currently occurs in system ejection prompting frame prompting user terminal Method starts the application program, can just start after need to closing current safety pattern or the monitor function closed a terminal.
When user needs to close this safe mode, into setting interface to carry out authentication, validation problem is first filled in Answer, then typing fingerprint, when the answer of user's input is consistent with the answer for the validation problem that user pre-sets, the finger of typing In the case that line matches, then authentication passes through.User selects to close the options of this safe mode, then this safe mode It is closed, terminal system recovers the unlatching of data WiFi and data service, and releases to short message, wechat, Alipay, Mobile banking What is started forbids;Now the safety protection function of terminal is still that is, still whether monitor terminal exception occurs in opening Situation.
When user needs the monitor function closed a terminal, into setting interface to carry out authentication, first fill in checking and ask The answer of topic, then typing fingerprint, when user input answer it is consistent with the answer for the validation problem that user pre-sets, typing In the case of fingerprint matching, then authentication passes through.The prison of the options, then terminal of the monitor function that user's selection is closed a terminal Auditory function is closed, and terminal system recovers the unlatching of data WiFi and data service, and releases to short message, wechat, Alipay, hand What machine bank started forbids, and closes whether occur the monitoring of abnormal conditions to terminal.
By the implementation of the present embodiment, user's assets or the compromised possibility of information are reduced, improves the peace of terminal Quan Xing, it is effectively protected the assets or information of user.
Second embodiment
The present embodiment provides a kind of terminal, referring to Fig. 5, a kind of schematic diagram for terminal that Fig. 5 provides for the present embodiment, and the end End includes memory 109 and processor 110 in Fig. 1;
Processor 110 is used to perform the terminal security defence program stored in memory 109, to realize following steps:
Whether monitor terminal itself there are abnormal conditions;
If not hearing terminal abnormal conditions occurs, terminate.
Before whether monitor terminal itself abnormal conditions occurs, processor 110 is additionally operable to perform and stored in memory 109 Terminal security defence program, to realize following steps:
Display sets interface, sets interface to include the unlatching options of terminal monitoring function and closes options, monitors work( It can be used for whether monitor terminal itself abnormal conditions occurs;If monitor function is closed, will not monitor terminal itself whether go out Existing abnormal conditions, it when abnormal conditions occurs in terminal itself, into safe mode, will not also save the power consumption of terminal;Receive The operation of unlatching options to terminal monitoring function, the monitor function of terminal is opened according to the operation.
Whether monitor terminal itself, which abnormal conditions occurs, includes following at least one:Terminal itself is by poisoning intrusion, end End is controlled by disabled user, terminal has the download of non-user operation, terminal has transmission short message of non-user operation etc..
Before whether monitor terminal abnormal conditions occurs, user, which can be set, needs application program to be protected, such as short Letter, wechat, Alipay, Mobile banking etc., and be added into the application list;
If listening to terminal itself abnormal conditions occurs, into safe mode, safe mode is included in the following manner extremely Few one kind:
Network connection is disconnected, and prohibits the use of the network connecting function of terminal itself;
Control terminal itself to disconnect the connection with WiFi and data services network, and prohibit the use of terminal itself WiFi and Data service, also i.e. WiFi and data service are arranged to open, namely user be not turned off this safe mode or In the case that person is not turned off the monitor function of terminal, even if user has carried out the unlatching operation of WiFi and/or data service, eventually End is also not responding to the unlatching operation of user, still keeps terminal to disconnect the connection with WiFi and data service;
Mode two:The application program for being in running status is closed, application program is answering in default the application list With program, and No starting presets the application program in the application list;
When listening to terminal and abnormal conditions occur, the application program in default the application list is obtained, forbids presetting Application program operation in the application list, and is arranged to open, namely user be not turned off this safe mode, Or in the case of being not turned off the monitor function of terminal, even if user has carried out the application program in default the application list Unlatching operation, terminal be also not responding to user unlatching operation, still keep No starting preset the application list in application Program;
Optionally, after safe mode is entered, processor 110 is additionally operable to perform the terminal peace stored in memory 109 Full guard program, to realize following steps:
Receive startup request of the user to application program;
Judge the application program whether in default the application list;
If so, then ejecting prompting frame prompting user terminal abnormal conditions currently occurs, the application program can not be started, need to close Close current safety pattern or this safety protection function for closing a terminal after can just start;
If it is not, then start the application program.
Optionally, after safe mode is entered, processor 110 is additionally operable to perform the terminal peace stored in memory 109 Full guard program, to realize following steps:
User terminal is reminded abnormal conditions currently occur by predetermined manner:
Receive the turn-off request to prompting;
Closed and reminded according to the turn-off request.
Wherein, predetermined manner includes at least one of in the following manner:Mode one:Bright screen and ejection prompt text frame;Example If the word in prompt text frame can be that " terminal is currently at precarious position.”
Mode two:Play caution sound;
Mode three:Vibration.
When reminding user terminal currently abnormal conditions occur, options is also provided and chooses whether that closing this carries for user Wake up, for example, user clicks on the choice box " I is aware of " shown on interface closes prompt text frame, caution sound and vibration afterwards, but Terminal-pair WiFi is not released to connect with data services network and the taboo of application program launching in default the application list Only.
Optionally, after safe mode is entered, processor 110 is additionally operable to perform the terminal peace stored in memory 109 Full guard program, to realize following steps:
Receive the request for closing this safe mode;
This safe mode is closed according to the request;
This time safe mode is closed, and the monitor function of terminal is still in opening, i.e., still monitor terminal is It is no abnormal conditions occur;
Or receive the request for the monitor function closed a terminal;
The monitor function closed a terminal according to the request;
Whether the monitor function closed a terminal, no longer monitor terminal there are abnormal conditions, further will not also open peace Syntype.
Optionally, user closed safe pattern can also be set, the monitor function closed a terminal when identification authentication mode, Before the request for this safety protection function that the request for closing this safe mode or reception are closed a terminal is received, processor 110 are additionally operable to perform the terminal security defence program stored in memory 109, to realize following steps:
Display sets interface, and interface includes carrying out authentication to user at least one of in the following manner:
Mode one:Password authentification;I.e. user need to input password;
Mode two:Fingerprint authentication;I.e. user needs typing fingerprint;
Mode three:Problem is verified;I.e. user need to fill in the answer of validation problem;
When authentication is by then entering and receiving the monitoring that the request for closing this safe mode or reception are closed a terminal The step of request of function.
Such as user sets closed safe pattern, the monitor function closed a terminal when identification authentication mode be problem checking And fingerprint authentication, user need to set validation problem and its answer, and need typing fingerprint, terminal using the fingerprint of typing as Fingerprint masterplate, for user in follow-up closed safe pattern or the monitor function closed a terminal, the answer of user's input needs and user The answer of the validation problem pre-set is consistent, and the fingerprint of typing need to be only authentication and pass through with fingerprint stencil matching.
When user needs to close this safe mode or the monitor function closed a terminal, body is carried out into interface is set Part checking, in authentication in the case of, just allows the monitor function closed this safe mode or closed a terminal, carries The high security of terminal.
The scheme of the present embodiment is further described for a specific example for example below.
User enter set interface, select terminal monitoring function unlatching options, and set closed safe pattern and The identification authentication mode during monitor function closed a terminal, including problem checking and fingerprint authentication, and setting need to be to be protected Application program, including short message, wechat, Alipay, Mobile banking, and be added into the application list, it is referring to Fig. 3, Fig. 3 The schematic diagram that a kind of the application list that the present embodiment provides is shown.
Terminal system begins listening for the situation of terminal itself, automatically begins to download and install application program when capturing terminal Situation when, system judges that terminal is currently at abnormal conditions, i.e. terminal is currently at precarious position, backstage at once by WiFi and Data service disconnects, and is arranged to open;Obtain simultaneously in the need the application list to be protected set before user Application program, including short message, wechat, Alipay, Mobile banking, forbid short message, wechat, Alipay, Mobile banking's operation.
Referring to Fig. 4, Fig. 4 is the schematic diagram that a kind of prompt text frame that the present embodiment provides is shown, in order to remind user to note Meaning, terminal system also bright screen and eject prompt text frame remind user terminal be currently at precarious position, and open broadcasting warning Sound and vibration, user click on the choice box " I is aware of " shown on interface and close prompt text frame, caution sound and vibration afterwards, but Do not release terminal-pair WiFi connected with data services network and short message, wechat, Alipay, Mobile banking start forbid.
User starts an application program, and whether terminal system first judges the application program in default the application list Application program, if it is not, then normal start, if so, abnormal conditions, nothing currently occurs in system ejection prompting frame prompting user terminal Method starts the application program, can just start after need to closing current safety pattern or the monitor function closed a terminal.
When user needs to close this safe mode, into setting interface to carry out authentication, validation problem is first filled in Answer, then typing fingerprint, when the answer of user's input is consistent with the answer for the validation problem that user pre-sets, the finger of typing In the case that line matches, then authentication passes through.User selects to close the options of this safe mode, then this safe mode It is closed, terminal system recovers the unlatching of data WiFi and data service, and releases to short message, wechat, Alipay, Mobile banking What is started forbids;Now the safety protection function of terminal is still that is, still whether monitor terminal exception occurs in opening Situation.
When user needs the monitor function closed a terminal, into setting interface to carry out authentication, first fill in checking and ask The answer of topic, then typing fingerprint, when user input answer it is consistent with the answer for the validation problem that user pre-sets, typing In the case of fingerprint matching, then authentication passes through.The prison of the options, then terminal of the monitor function that user's selection is closed a terminal Auditory function is closed, and terminal system recovers the unlatching of data WiFi and data service, and releases to short message, wechat, Alipay, hand What machine bank started forbids, and closes whether occur the monitoring of abnormal conditions to terminal.
By the implementation of the present embodiment, user's assets or the compromised possibility of information are reduced, improves the peace of terminal Quan Xing, it is effectively protected the assets or information of user.
3rd embodiment
The present embodiment provides a kind of computer-readable recording medium, and computer-readable recording medium storage has one or more Individual program, one or more program can be by one or more computing devices, to realize following steps:
Whether monitor terminal itself there are abnormal conditions;
If not hearing terminal abnormal conditions occurs, terminate.
Before whether monitor terminal itself abnormal conditions occurs, one or more program can also be by one or more Computing device, to realize following steps:
Display sets interface, sets interface to include the unlatching options of terminal monitoring function and closes options, monitors work( It can be used for whether monitor terminal itself abnormal conditions occurs;If monitor function is closed, will not monitor terminal itself whether go out Existing abnormal conditions, it when abnormal conditions occurs in terminal itself, into safe mode, will not also save the power consumption of terminal;Receive The operation of unlatching options to terminal monitoring function, the monitor function of terminal is opened according to the operation.
Whether monitor terminal itself, which abnormal conditions occurs, includes following at least one:Terminal itself is by poisoning intrusion, end End is controlled by disabled user, terminal has the download of non-user operation, terminal has transmission short message of non-user operation etc..
Before whether monitor terminal abnormal conditions occurs, user, which can be set, needs application program to be protected, such as short Letter, wechat, Alipay, Mobile banking etc., and be added into the application list;
If listening to terminal itself abnormal conditions occurs, into safe mode, safe mode is included in the following manner extremely Few one kind:
Network connection is disconnected, and prohibits the use of the network connecting function of terminal itself;
Control terminal itself to disconnect the connection with WiFi and data services network, and prohibit the use of terminal itself WiFi and Data service, also i.e. WiFi and data service are arranged to open, namely user be not turned off this safe mode or In the case that person is not turned off the monitor function of terminal, even if user has carried out the unlatching operation of WiFi and/or data service, eventually End is also not responding to the unlatching operation of user, still keeps terminal to disconnect the connection with WiFi and data service;
Mode two:The application program for being in running status is closed, application program is answering in default the application list With program, and No starting presets the application program in the application list;
When listening to terminal and abnormal conditions occur, the application program in default the application list is obtained, forbids presetting Application program operation in the application list, and is arranged to open, namely user be not turned off this safe mode, Or in the case of being not turned off the monitor function of terminal, even if user has carried out the application program in default the application list Unlatching operation, terminal be also not responding to user unlatching operation, still keep No starting preset the application list in application Program;
Optionally, after safe mode is entered, one or more program can also be held by one or more processor OK, to realize following steps:
Receive startup request of the user to application program;
Judge the application program whether in default the application list;
If so, then ejecting prompting frame prompting user terminal abnormal conditions currently occurs, the application program can not be started, need to close Close current safety pattern or this safety protection function for closing a terminal after can just start;
If it is not, then start the application program.
Optionally, after safe mode is entered, one or more program can also be held by one or more processor OK, to realize following steps:
User terminal is reminded abnormal conditions currently occur by predetermined manner:
Receive the turn-off request to prompting;
Closed and reminded according to the turn-off request.
Wherein, predetermined manner includes at least one of in the following manner:
Mode one:Bright screen and ejection prompt text frame;Such as the word in prompt text frame can be that " terminal is currently at Precarious position.”
Mode two:Play caution sound;
Mode three:Vibration.
When reminding user terminal currently abnormal conditions occur, options is also provided and chooses whether that closing this carries for user Wake up, for example, user clicks on the choice box " I is aware of " shown on interface closes prompt text frame, caution sound and vibration afterwards, but Terminal-pair WiFi is not released to connect with data services network and the taboo of application program launching in default the application list Only.
Optionally, after safe mode is entered, one or more program can also be held by one or more processor OK, to realize following steps:
Receive the request for closing this safe mode;
This safe mode is closed according to the request;
This time safe mode is closed, and the monitor function of terminal is still in opening, i.e., still monitor terminal is It is no abnormal conditions occur;
Or receive the request for the monitor function closed a terminal;
The monitor function closed a terminal according to the request;
Whether the monitor function closed a terminal, no longer monitor terminal there are abnormal conditions, further will not also open peace Syntype.
Optionally, user closed safe pattern can also be set, the monitor function closed a terminal when identification authentication mode, Before the request of this safety protection function that the request for closing this safe mode or reception are closed a terminal is received, one or The multiple programs of person can also be by one or more computing device, to realize following steps:
Display sets interface, and interface includes carrying out authentication to user at least one of in the following manner:
Mode one:Password authentification;I.e. user need to input password;
Mode two:Fingerprint authentication;I.e. user needs typing fingerprint;
Mode three:Problem is verified;I.e. user need to fill in the answer of validation problem;
When authentication is by then entering and receiving the monitoring that the request for closing this safe mode or reception are closed a terminal The step of request of function.
Such as user sets closed safe pattern, the monitor function closed a terminal when identification authentication mode be problem checking And fingerprint authentication, user need to set validation problem and its answer, and need typing fingerprint, terminal using the fingerprint of typing as Fingerprint masterplate, for user in follow-up closed safe pattern or the monitor function closed a terminal, the answer of user's input needs and user The answer of the validation problem pre-set is consistent, and the fingerprint of typing need to be only authentication and pass through with fingerprint stencil matching.
When user needs to close this safe mode or the monitor function closed a terminal, body is carried out into interface is set Part checking, in authentication in the case of, just allows the monitor function closed this safe mode or closed a terminal, carries The high security of terminal.
The scheme of the present embodiment is further described for a specific example for example below.
User enter set interface, select terminal monitoring function unlatching options, and set closed safe pattern and The identification authentication mode during monitor function closed a terminal, including problem checking and fingerprint authentication, and setting need to be to be protected Application program, including short message, wechat, Alipay, Mobile banking, and be added into the application list, it is referring to Fig. 3, Fig. 3 The schematic diagram that a kind of the application list that the present embodiment provides is shown.
Terminal system begins listening for the situation of terminal itself, automatically begins to download and install application program when capturing terminal Situation when, system judges that terminal is currently at abnormal conditions, i.e. terminal is currently at precarious position, backstage at once by WiFi and Data service disconnects, and is arranged to open;Obtain simultaneously in the need the application list to be protected set before user Application program, including short message, wechat, Alipay, Mobile banking, forbid short message, wechat, Alipay, Mobile banking's operation.
Referring to Fig. 4, Fig. 4 is the schematic diagram that a kind of prompt text frame that the present embodiment provides is shown, in order to remind user to note Meaning, terminal system also bright screen and eject prompt text frame remind user terminal be currently at precarious position, and open broadcasting warning Sound and vibration, user click on the choice box " I is aware of " shown on interface and close prompt text frame, caution sound and vibration afterwards, but Do not release terminal-pair WiFi connected with data services network and short message, wechat, Alipay, Mobile banking start forbid.
User starts an application program, and whether terminal system first judges the application program in default the application list Application program, if it is not, then normal start, if so, abnormal conditions, nothing currently occurs in system ejection prompting frame prompting user terminal Method starts the application program, can just start after need to closing current safety pattern or the monitor function closed a terminal.
When user needs to close this safe mode, into setting interface to carry out authentication, validation problem is first filled in Answer, then typing fingerprint, when the answer of user's input is consistent with the answer for the validation problem that user pre-sets, the finger of typing In the case that line matches, then authentication passes through.User selects to close the options of this safe mode, then this safe mode It is closed, terminal system recovers the unlatching of data WiFi and data service, and releases to short message, wechat, Alipay, Mobile banking What is started forbids;Now the safety protection function of terminal is still that is, still whether monitor terminal exception occurs in opening Situation.
When user needs the monitor function closed a terminal, into setting interface to carry out authentication, first fill in checking and ask The answer of topic, then typing fingerprint, when user input answer it is consistent with the answer for the validation problem that user pre-sets, typing In the case of fingerprint matching, then authentication passes through.The prison of the options, then terminal of the monitor function that user's selection is closed a terminal Auditory function is closed, and terminal system recovers the unlatching of data WiFi and data service, and releases to short message, wechat, Alipay, hand What machine bank started forbids, and closes whether occur the monitoring of abnormal conditions to terminal.
By the implementation of the present embodiment, user's assets or the compromised possibility of information are reduced, improves the peace of terminal Quan Xing, it is effectively protected the assets or information of user.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row His property includes, so that process, method, article or device including a series of elements not only include those key elements, and And also include the other element being not expressly set out, or also include for this process, method, article or device institute inherently Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this Other identical element also be present in the process of key element, method, article or device.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on such understanding, technical scheme is substantially done to prior art in other words Going out the part of contribution can be embodied in the form of software product, and the computer software product is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), including some instructions to cause a station terminal equipment (can be mobile phone, computer, clothes Be engaged in device, air conditioner, or network equipment etc.) method that performs each embodiment of the present invention.
The preferred embodiments of the present invention are these are only, are not intended to limit the scope of the invention, it is every to utilize this hair The equivalent structure or equivalent flow conversion that bright specification and accompanying drawing content are made, or directly or indirectly it is used in other related skills Art field, is included within the scope of the present invention.

Claims (10)

1. a kind of terminal safety protection method, it is characterised in that the terminal safety protection method comprises the following steps:
Monitor whether the terminal itself abnormal conditions occurs;
If so, then entering safe mode, the safe mode includes at least one of in the following manner:
Mode one:Network connection is disconnected, and prohibits the use of the terminal network connecting function of itself;
Mode two:The application program for being in running status is closed, the application program is answering in default the application list The application program in the application list is preset with program, and described in No starting.
2. terminal safety protection method as claimed in claim 1, it is characterised in that after the entrance safe mode, institute Stating terminal safety protection method also includes:
Receive startup request of the user to application program;
Judge the application program whether in described default the application list;
If so, then ejecting prompting frame prompting user terminal abnormal conditions currently occurs, the application program can not be started, need to close and work as It can just start after this safety protection function of preceding safe mode or the closing terminal;
If it is not, then start the application program.
3. terminal safety protection method as claimed in claim 1, it is characterised in that after the entrance safe mode, institute Stating terminal safety protection method also includes:
Terminal described in user is reminded abnormal conditions currently occur by predetermined manner:
Receive the turn-off request to prompting;
Closed and reminded according to the turn-off request.
4. terminal safety protection method as claimed in claim 1, it is characterised in that the abnormal conditions include it is following at least It is a kind of:The terminal itself is by poisoning intrusion, the terminal is controlled by disabled user, the terminal is present under non-user operation Carry, the terminal has the transmission short message that non-user operates.
5. the terminal safety protection method as described in any one of Claims 1-4, it is characterised in that enter safe mould described After formula, the terminal safety protection method also includes:
Receive the request for closing this safe mode;
This safe mode is closed according to the request;
Or the request for the monitor function for closing the terminal is received, the monitor function itself is for monitoring the terminal It is no abnormal conditions occur;
The monitor function of the terminal is closed according to the request.
6. terminal safety protection method as claimed in claim 5, it is characterised in that close this safe mode in described receive Request or receive the monitor function for closing the terminal request before, the terminal safety protection method also includes:
Display sets interface, and the interface includes carrying out authentication to user at least one of in the following manner:
Mode one:Password authentification;
Mode two:Fingerprint authentication;
Mode three:Problem is verified;
When authentication is by then entering the reception and closing the request of this safe mode or receive the closing terminal The step of request of monitor function.
7. a kind of terminal, it is characterised in that the terminal includes memory and processor;
The processor is used to perform the terminal security defence program stored in memory, to realize following steps:
Monitor whether the terminal itself abnormal conditions occurs;
If so, then entering safe mode, the safe mode includes at least one of in the following manner:
Mode one:Network connection is disconnected, and prohibits the use of the terminal network connecting function of itself;
Mode two:The application program for being in running status is closed, the application program is answering in default the application list The application program in the application list is preset with program, and described in No starting.
8. terminal as claimed in claim 7, it is characterised in that after the entrance safe mode, the processor is also used In performing the terminal security defence program that is stored in memory, to realize following steps:
Receive the request for closing this safe mode;
This safe mode is closed according to the request;
Or the request for the monitor function for closing the terminal is received, the monitor function itself is for monitoring the terminal It is no abnormal conditions occur;
The monitor function of the terminal is closed according to the request.
A kind of 9. computer-readable recording medium, it is characterised in that the computer-readable recording medium storage have one or Multiple programs, one or more of programs can be by one or more computing devices, to realize following steps:
Monitor whether the terminal itself abnormal conditions occurs;
If so, then entering safe mode, the safe mode includes at least one of in the following manner:
Mode one:Network connection is disconnected, and prohibits the use of the terminal network connecting function of itself;
Mode two:The application program for being in running status is closed, the application program is answering in default the application list The application program in the application list is preset with program, and described in No starting.
10. computer-readable recording medium as claimed in claim 9, it is characterised in that after the entrance safe mode, One or more of programs can also be by one or more computing device, to realize following steps:
Receive the request for closing this safe mode;
This safe mode is closed according to the request;
Or the request for the monitor function for closing the terminal is received, the monitor function itself is for monitoring the terminal It is no abnormal conditions occur;
The monitor function of the terminal is closed according to the request.
CN201710439684.9A 2017-06-12 2017-06-12 A kind of terminal safety protection method, terminal and computer-readable recording medium Pending CN107392013A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710439684.9A CN107392013A (en) 2017-06-12 2017-06-12 A kind of terminal safety protection method, terminal and computer-readable recording medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710439684.9A CN107392013A (en) 2017-06-12 2017-06-12 A kind of terminal safety protection method, terminal and computer-readable recording medium

Publications (1)

Publication Number Publication Date
CN107392013A true CN107392013A (en) 2017-11-24

Family

ID=60331780

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710439684.9A Pending CN107392013A (en) 2017-06-12 2017-06-12 A kind of terminal safety protection method, terminal and computer-readable recording medium

Country Status (1)

Country Link
CN (1) CN107392013A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108596592A (en) * 2018-04-19 2018-09-28 深圳鼎智通讯股份有限公司 A kind of triggering lock machine method of intelligent terminal
CN109525610A (en) * 2019-01-11 2019-03-26 高艳云 Network big data analysis terminal
CN109766728A (en) * 2019-01-23 2019-05-17 努比亚技术有限公司 Protect method, mobile terminal and the computer readable storage medium of personal secrets
CN110187933A (en) * 2019-05-27 2019-08-30 维沃移动通信有限公司 A kind of application program prohibited method and terminal
CN111163215A (en) * 2019-12-11 2020-05-15 上海传英信息技术有限公司 Application running method, terminal and computer readable storage medium
CN111866272A (en) * 2020-06-30 2020-10-30 维沃移动通信有限公司 Control method and device of electronic equipment
CN112990051A (en) * 2021-03-26 2021-06-18 国网河北省电力有限公司信息通信分公司 Auxiliary authentication method and device, electronic equipment and storage medium
CN115119154A (en) * 2021-03-17 2022-09-27 深圳市万普拉斯科技有限公司 Data connection management method and device, electronic equipment and readable storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1913679A (en) * 2006-08-25 2007-02-14 华为技术有限公司 Protection method and system for preventing fraudulent use of mobile terminal
CN103634268A (en) * 2012-08-20 2014-03-12 中国联合网络通信集团有限公司 A safety control method and an apparatus
CN105873028A (en) * 2016-03-28 2016-08-17 宇龙计算机通信科技(深圳)有限公司 Terminal control method, terminal control device, and terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1913679A (en) * 2006-08-25 2007-02-14 华为技术有限公司 Protection method and system for preventing fraudulent use of mobile terminal
CN103634268A (en) * 2012-08-20 2014-03-12 中国联合网络通信集团有限公司 A safety control method and an apparatus
CN105873028A (en) * 2016-03-28 2016-08-17 宇龙计算机通信科技(深圳)有限公司 Terminal control method, terminal control device, and terminal

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108596592A (en) * 2018-04-19 2018-09-28 深圳鼎智通讯股份有限公司 A kind of triggering lock machine method of intelligent terminal
CN109525610A (en) * 2019-01-11 2019-03-26 高艳云 Network big data analysis terminal
CN109766728A (en) * 2019-01-23 2019-05-17 努比亚技术有限公司 Protect method, mobile terminal and the computer readable storage medium of personal secrets
CN110187933A (en) * 2019-05-27 2019-08-30 维沃移动通信有限公司 A kind of application program prohibited method and terminal
CN111163215A (en) * 2019-12-11 2020-05-15 上海传英信息技术有限公司 Application running method, terminal and computer readable storage medium
CN111866272A (en) * 2020-06-30 2020-10-30 维沃移动通信有限公司 Control method and device of electronic equipment
CN115119154A (en) * 2021-03-17 2022-09-27 深圳市万普拉斯科技有限公司 Data connection management method and device, electronic equipment and readable storage medium
CN112990051A (en) * 2021-03-26 2021-06-18 国网河北省电力有限公司信息通信分公司 Auxiliary authentication method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN107392013A (en) A kind of terminal safety protection method, terminal and computer-readable recording medium
CN103473494B (en) A kind of run the method for application, device and terminal unit
CN107395850A (en) A kind of social communication information guard method, device and computer-readable recording medium
CN108062489A (en) A kind of glance prevention method, terminal and computer readable storage medium
CN109800602A (en) Method for secret protection, mobile terminal and computer readable storage medium
CN109656371A (en) Mobile terminal eye care method, device, mobile terminal and storage medium
CN107808084A (en) A kind of touch operation method and mobile terminal
CN108197441A (en) Flexible screen terminal and its solution lock control method, computer readable storage medium
CN107623778A (en) Incoming call sound method and mobile terminal
CN107645609A (en) A kind of brightness adjusting method and mobile terminal
CN108011887A (en) A kind of account management method and equipment
CN108710786A (en) A kind of method of Anti-addiction, equipment and computer readable storage medium
CN108280337A (en) A kind of message protection method and mobile terminal
CN109543474A (en) A kind of method for controlling mobile terminal and mobile terminal
CN108989534A (en) Message prompt method, mobile terminal and computer readable storage medium
CN108363591A (en) A kind of method and device of PUSH message control
CN108156325A (en) A kind of double-sided screen Incoming-call control method, equipment and computer readable storage medium
CN109462693A (en) A kind of information processing method, terminal and computer readable storage medium
CN108108092A (en) The method, apparatus and computer readable storage medium that message is checked under screen mode toggle
CN108182582A (en) A kind of method of payment, terminal and computer readable storage medium
CN107194217A (en) User data access control method, equipment and computer-readable recording medium
CN108259807B (en) Communication method, mobile terminal and computer readable storage medium
CN108769382A (en) A kind of message display method, wearable device and computer readable storage medium
CN107911778A (en) A kind of playback method based on loudspeaker in parallel, mobile terminal and readable storage medium storing program for executing
CN107944242B (en) Biological identification function disabling method and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20171124