CN107609407A - The guard method of information security and device in a kind of user terminal - Google Patents

The guard method of information security and device in a kind of user terminal Download PDF

Info

Publication number
CN107609407A
CN107609407A CN201710701843.8A CN201710701843A CN107609407A CN 107609407 A CN107609407 A CN 107609407A CN 201710701843 A CN201710701843 A CN 201710701843A CN 107609407 A CN107609407 A CN 107609407A
Authority
CN
China
Prior art keywords
user terminal
user
default
unit
judging
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710701843.8A
Other languages
Chinese (zh)
Inventor
胡川
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Xiaotiancai Technology Co Ltd
Original Assignee
Guangdong Xiaotiancai Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Xiaotiancai Technology Co Ltd filed Critical Guangdong Xiaotiancai Technology Co Ltd
Priority to CN201710701843.8A priority Critical patent/CN107609407A/en
Publication of CN107609407A publication Critical patent/CN107609407A/en
Pending legal-status Critical Current

Links

Abstract

The invention discloses a kind of guard method of information security in user terminal and device, this method to include:Detect whether the abnormal operation for having for user terminal, when detecting the presence of the abnormal operation, determine operation user corresponding to the abnormal operation, and judge operation user whether be user terminal authorized user, when it is not the authorized user of user terminal to judge operation user, the default application in all applications for being installed on the user terminal is performed corresponding to information leakage protection operate.It can be seen that the risk of information leakage in user terminal can be reduced by implementing the embodiment of the present invention, the security of user terminal is improved.

Description

The guard method of information security and device in a kind of user terminal
Technical field
The present invention relates to intelligent terminal technical field, and in particular in a kind of user terminal the guard method of information security and Device.
Background technology
Currently, the intelligent subscriber such as mobile phone terminals have turned into a part indispensable in most people's life, pass through mobile phone Deng intelligent subscriber terminals, people can be chatted, done shopping, taken pictures and be recorded important information etc., i.e. mobile phone anywhere or anytime Deng being stored with chat message, payment information, video and photographic intelligence and memo information etc. in intelligent subscriber terminals.In reality In, the intelligent subscriber such as mobile phone terminals are stolen or loss can cause information leakage, or even are also possible to that property can be brought to user Loss.It can be seen that the security for how improving the intelligent subscriber terminals such as mobile phone is particularly important.
The content of the invention
The embodiment of the invention discloses a kind of guard method of information security in user terminal and device, user can be reduced The risk of information leakage in terminal, improve the security of user terminal.
First aspect of the embodiment of the present invention discloses a kind of guard method of information security in user terminal, methods described bag Include:
Detect whether the abnormal operation for having for the user terminal;
When detecting the presence of the abnormal operation, operation user corresponding to the abnormal operation is determined;
Judge it is described operation user whether be the user terminal authorized user, when judge it is described operation user be not During the authorized user, the default application in all applications for being installed on the user terminal is performed corresponding to information leakage protection Operation.
As an alternative embodiment, in first aspect of the embodiment of the present invention, the operation user is being judged When not being the authorized user, the default application in all applications for being installed on the user terminal perform corresponding to believe Before ceasing leakage-preventing operation, methods described also includes:
Start the locating interface on the user terminal, and by the locating interface to corresponding with the locating interface Location-server sends geographical position and obtains request, and receives the location-server for described by the locating interface Geographical position obtains the geographical position that request returns and obtains response, and the geographical position, which obtains response, includes the user terminal institute The current geographic position at place;
Judge whether the current geographic position is one of them in default conventional geographical position, when judging described work as When preceding geographical position is not one of them in the default conventional geographical position, triggering performs described on the user terminal Corresponding to default application execution in all applications of installation the step of information leakage protection operation.
As an alternative embodiment, in first aspect of the embodiment of the present invention, methods described also includes:
Judge whether the user terminal is in off-mode, when judging that the user terminal is not in the shutdown shape During state, it is determined that the default contact person of binding relationship is established with the user terminal in advance;
Prompting message is sent to the terminal that contacts corresponding with the default contact person, the prompting message includes described current Geographical position, and the prompting message is used to prompt the user terminal to be in abnormality;
The transmission for sending the prompting message to the contact terminal is deleted to record.
As an alternative embodiment, in first aspect of the embodiment of the present invention, methods described also includes:
When judging that the user terminal is not in the off-mode, the operation obtained for the user terminal is remembered Record;
Operation Log is generated according to the operation note, and the Operation Log is sent to the contact terminal.
As an alternative embodiment, in first aspect of the embodiment of the present invention, the operation note is included by point Hit the mark of the application of handle icon and the starting state of the application;
It is described when judging that the user terminal is not in the off-mode, obtain for the user terminal behaviour After noting down, and before the generation Operation Log according to the operation note, methods described also includes:
Identified whether described in judging as one of them in default mark, when judging described to be identified as the default mark In one of them when, judge whether the starting state indicates that the application is successfully started up, when judging the startup shape When the state instruction application is successfully started up, triggering performs described the step of generating Operation Log according to the operation note.
Second aspect of the embodiment of the present invention discloses a kind of protection device of information security in user terminal, described device bag Include:
Detection unit, for detecting whether the abnormal operation for the user terminal be present;
Determining unit, for when the detection unit detects the presence of the abnormal operation, determining the abnormal operation Corresponding operation user;
Judging unit, for judge it is described operation user whether be the user terminal authorized user;
Leakage-preventing unit, for when the judging unit judge it is described operation user be not the authorized user when, it is right Information leakage protection operation corresponding to default application execution in all applications installed on the user terminal.
As an alternative embodiment, in second aspect of the embodiment of the present invention, described device also includes:
Start unit, for the judging unit judge it is described operation user be the authorized user after and Default application in the leakage-preventing unit is to all applications for being installed on the user terminal perform corresponding to information is anti-lets out Before dew operation, start the locating interface on the user terminal;
Communication unit, it is geographical for being sent by the locating interface to location-server corresponding with the locating interface Position acquisition is asked, and is received the location-server by the locating interface and returned for geographical position acquisition request The geographical position returned obtains response, and the geographical position obtains the current geographic position for responding and including residing for the user terminal;
The judging unit, it is additionally operable to judge whether the current geographic position is default commonly use in geographical position wherein One, when it is not one of them in the default conventional geographical position to judge the current geographic position, described in triggering Leakage-preventing unit the default application in all applications for being installed on the user terminal is performed corresponding to information leakage protection operate.
As an alternative embodiment, in second aspect of the embodiment of the present invention, the judging unit, it is additionally operable to sentence Whether the user terminal that breaks is in off-mode;
The determining unit, it is additionally operable to when the judging unit judges that the user terminal is not in the off-mode When, it is determined that the default contact person of binding relationship is established with the user terminal in advance;
The communication unit, it is additionally operable to send prompting message to the terminal that contacts corresponding with the default contact person, it is described Prompting message includes the current geographic position, and the prompting message is used to prompt the user terminal to be in abnormality;
Described device also includes:
Unit is deleted, is recorded for deleting the transmission for sending the prompting message to the contact terminal.
As an alternative embodiment, in second aspect of the embodiment of the present invention, described device also includes:
Acquiring unit, for when the judging unit judges that the user terminal is not in the off-mode, obtaining Take the operation note for the user terminal;
Generation unit, for generating Operation Log according to the operation note;
The communication unit, it is additionally operable to send the Operation Log to the contact terminal.
As an alternative embodiment, in second aspect of the embodiment of the present invention, the operation note is included by point Hit the mark of the application of handle icon and the starting state of the application;
The judging unit, be additionally operable to the acquiring unit obtain for the user terminal operation note after with And before the generation unit generates Operation Log according to the operation note, judge described in identify whether as in default mark One of them, when judge it is described be identified as one of them in the default mark when, judge whether the starting state refers to Show that the application is successfully started up, when judging that the starting state instruction application is successfully started up, trigger the life The operation that Operation Log is generated according to the operation note is performed into unit.
The third aspect of the embodiment of the present invention discloses the protection device of information security in another user terminal, described device Including:
It is stored with the memory of executable program code;
The processor coupled with the memory;
The processor calls the executable program code stored in the memory, performs the embodiment of the present invention the The guard method of information security in user terminal described in one side.
Fourth aspect of the embodiment of the present invention discloses a kind of computer-readable recording medium, and it is stored hands over for electronic data The computer program changed, wherein, the computer program causes computer to perform described in first aspect of the embodiment of the present invention The guard method of information security in user terminal.
The aspect of the embodiment of the present invention the 5th discloses a kind of computer program product, and the computer program product includes depositing The non-transient computer-readable recording medium of computer program is stored up, the computer program is operable to perform computer The guard method of information security in user terminal described in first aspect of the embodiment of the present invention.
Compared with prior art, the embodiment of the present invention has the advantages that:
In the embodiment of the present invention, the abnormal operation for having for user terminal is detected whether, when detecting the presence of the exception During operation, determine operation user corresponding to the abnormal operation, and judge operation user whether be user terminal authorized user, When it is not the authorized user of user terminal to judge operation user, to pre- in all applications for being installed on the user terminal If information leakage protection operation corresponding to application execution.It can be seen that unauthorized user pin can detected by implementing the embodiment of the present invention During the abnormal operation triggered to user terminal, automatic triggering is for presetting the information leakage protection applied operation, drop on user terminal The risk of information leakage, improves the security of user terminal, and then improve the use of user terminal in low user terminal Experience.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, it will use below required in embodiment Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for ability For the those of ordinary skill of domain, on the premise of not paying creative work, it can also be obtained according to these accompanying drawings other attached Figure.
Fig. 1 is the schematic flow sheet of the guard method of information security in a kind of user terminal disclosed in the embodiment of the present invention;
Fig. 2 is the flow signal of the guard method of information security in another user terminal disclosed in the embodiment of the present invention Figure;
Fig. 3 is the structural representation of the protection device of information security in a kind of user terminal disclosed in the embodiment of the present invention;
Fig. 4 is the structural representation of the protection device of information security in another user terminal disclosed in the embodiment of the present invention Figure;
Fig. 5 is the structural representation of the protection device of information security in another user terminal disclosed in the embodiment of the present invention Figure;
Fig. 6 is the structural representation of the protection device of information security in another user terminal disclosed in the embodiment of the present invention Figure;
Fig. 7 is a kind of structural representation of user terminal disclosed in the embodiment of the present invention;
Fig. 8 is the structural representation of another user terminal disclosed in the embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.Based on this Embodiment in invention, the every other reality that those of ordinary skill in the art are obtained under the premise of creative work is not made Example is applied, belongs to the scope of protection of the invention.
It should be noted that the term " comprising " and " having " of the embodiment of the present invention and their any deformation, it is intended that Be to cover it is non-exclusive include, for example, containing the process of series of steps or unit, method, system, product or equipment not Be necessarily limited to those steps or the unit clearly listed, but may include not list clearly or for these processes, side The intrinsic other steps of method, product or equipment or unit.
The embodiment of the invention discloses a kind of guard method of information security in user terminal and device, can detect During the abnormal operation that unauthorized user triggers for user terminal, automatic triggering is prevented for presetting the information applied on user terminal Leakage operation, reduces the risk of information leakage in user terminal, improves the security of user terminal, and then improve user The usage experience of terminal.It is described in detail individually below.
Embodiment one
Referring to Fig. 1, Fig. 1 is the stream of the guard method of information security in a kind of user terminal disclosed in the embodiment of the present invention Journey schematic diagram.As shown in figure 1, the guard method of information security can include following operation in the user terminal:
101st, user terminal detects whether the abnormal operation for having for the user terminal, when the testing result of step 101 During to be, triggering performs step 102, when the testing result of step 101 is no, can terminate this flow.
In the embodiment of the present invention, the user terminal can be smart mobile phone (Android phone, iOS mobile phones etc.), intelligence electricity It is mobile to talk about wrist-watch, tablet personal computer, palm PC and mobile internet device (Mobile Internet Devices, MID) etc. Terminal, the embodiment of the present invention do not limit.
In the embodiment of the present invention, the abnormal operation for user terminal detected can include but is not limited to user terminal Multiple communication (call, the voice or video etc.) request received is not responded, user terminal receive multiple communication request it It is forced shutdown afterwards, user terminal applies journey by direct forced shutdown, the unlocking pin for the screen for unlocking user terminal or startup The setting up password mistake and errors number of sequence exceed the client identification module in preset times threshold value and user terminal (Subscriber Identification Module, SIM) blocks any one in being forcibly removed, and the embodiment of the present invention is not Limit.
102nd, user terminal determines operation user corresponding to above-mentioned abnormal operation.
In the embodiment of the present invention, user terminal can perform shooting operation by the front camera of user terminal, obtain Picture is imaged, the imaging picture is analyzed, obtains the picture feature of the imaging picture, when the picture feature includes character face spy During sign, character face's feature is defined as to operate user corresponding to above-mentioned abnormal operation, or, it can also prompt to input identity Information and the operation user according to corresponding to the identity information got determines above-mentioned abnormal operation.
103rd, user terminal judge aforesaid operations user whether be user terminal authorized user, when the judgement of step 103 When being as a result no, triggering performs step 104, when the judged result of step 103 is is, can terminate this flow.
In the embodiment of the present invention, user terminal judges whether aforesaid operations user is that the authorized user of user terminal can wrap Include:
User terminal judges whether above-mentioned character face's feature matches with character face's feature of preset authorization user, if It is, it is determined that aforesaid operations user is authorized user, if not, it is determined that aforesaid operations user is not authorized user;Or
User terminal judges whether the above-mentioned identity information that gets matches with the identity information of preset authorization user, if It is, it is determined that aforesaid operations user is authorized user, if not, it is determined that aforesaid operations user is not authorized user.
104th, user terminal the default application in all applications for being installed on user terminal is performed corresponding to information is anti-lets out Dew operation.
In the embodiment of the present invention, the default application can be all applications installed in user terminal, or user Certain applications in all applications installed in terminal, wherein, the certain applications can include having recorded login name and log in close The application of code, the application for being related to financing class, be related to pay the application of class, the application for the picture library being able to access that in user terminal, It is able to access that the application of address list in user terminal and is able to access that in user terminal that application of instant communication information etc. is related to The combination of any type application or multiclass application in the application of privacy and property, the embodiment of the present invention are not construed as limiting.Need Bright, the default application can also independently be set by the authorized user of user terminal, and the authorized user of user terminal can To be modified according to the actual demand of itself to the default application, the embodiment of the present invention does not limit.
In the embodiment of the present invention, user terminal performs correspondence to the default application in all applications for being installed on user terminal Information leakage protection operation can include but is not limited to following operate:
There is the default application of login name and login password (including to be related to the application of financing class, be related to and pay class to record Using), perform the operation for emptying login name and login password or directly perform unloading operation;
To the default application without login name and login password, the behaviour for starting the application lock for the default application is performed Make;
To the instant communication information (the especially instant communication information including preset keyword) that is stored in user terminal and/ Or address list and/or picture library perform deletion action or cryptographic operation.
It can be seen that unauthorized use can detected by implementing the guard method of information security in the user terminal described by Fig. 1 During the abnormal operation that family is triggered for user terminal, automatic triggering is for presetting the information leakage protection applied behaviour on user terminal Make, reduce the risk of information leakage in user terminal, improve the security of user terminal, and then improve user terminal Usage experience.
Embodiment two
Referring to Fig. 2, Fig. 2 is the guard method of information security in another user terminal disclosed in the embodiment of the present invention Schematic flow sheet.As shown in Fig. 2 the guard method of information security can include following operation in the user terminal:
201st, user terminal detects whether the abnormal operation for having for the user terminal, when the testing result of step 201 During to be, triggering performs step 202, when the testing result of step 201 is no, can terminate this flow.
202nd, user terminal determines operation user corresponding to above-mentioned abnormal operation.
203rd, user terminal judge aforesaid operations user whether be user terminal authorized user, when the judgement of step 203 When being as a result no, triggering performs step 204, when the judged result of step 203 is is, can terminate this flow.
In the embodiment of the present invention, the description for step 201- steps 203 refer to step 101- is directed in embodiment one The description of step 103, the embodiment of the present invention repeat no more.
204th, user terminal start user terminal on locating interface, and by the locating interface to the locating interface pair The location-server answered sends geographical position and obtains request.
205th, user terminal receives above-mentioned location-server by above-mentioned locating interface and asked for the acquisition of above-mentioned geographical position The geographical position of return is asked to obtain response, the geographical position obtains the current geographic position for responding and including residing for user terminal.
206th, user terminal judges whether above-mentioned current geographic position is one of them default commonly used in geographical position, when When the judged result of step 206 is no, triggering performs step 207, when the judged result of step 206 is is, can terminate this Secondary flow.
In the embodiment of the present invention, the default conventional geographical position can include the residence position of the authorized user of user terminal Put, the position of office space and other positions often gone etc., the embodiment of the present invention does not limit.
207th, user terminal the default application in all applications for being installed on user terminal is performed corresponding to information is anti-lets out Dew operation.
It can be seen that when the operation user for detecting above-mentioned abnormal operation is not authorized user, further to user terminal institute The geographical position at place is judged, can so improve the standard that anti-information leakage operation is performed to the default application in user terminal True property and reliability.
In an optional embodiment, in the user terminal guard method of information security can also include following behaviour Make:
User terminal judges whether user terminal is in off-mode, when judging that user terminal is not in off-mode When, it is determined that the default contact person of binding relationship is established with user terminal in advance;
User terminal to this preset contact person it is corresponding contact terminal send prompting message, the prompting message include it is above-mentioned Current geographic position, and the prompting message is used to prompt user terminal to be in abnormality.
The optional embodiment be able to will occur when user terminal is not shut down or when being forced to start shooting again after shutting down The geographical position of above-mentioned abnormal operation is sent to default contact person (such as friend, Jia Renhuo that binding relationship is established with user terminal Colleague etc.), so can be when the authorized user of user terminal be unaware that user terminal is lost or is stolen in time to default It is that people gives notice, in order to which default contact person takes appropriate measures.
Further alternative in the optional embodiment, the guard method of information security can be with the user terminal Including following operation:
User terminal deletes the transmission record that above-mentioned prompting message is sent to above-mentioned contact terminal.
In the optional embodiment, further optionally, in the user terminal guard method of information security may be used also With including following operation:
When judging that user terminal is not in off-mode, user terminal obtains the operation note for user terminal;
User terminal generates Operation Log according to the operation note got, and sends operation day to above-mentioned contact terminal Will.
It can be seen that the optional embodiment can also confirm user terminal by unauthorized user carry out abnormal operation when, The operation behavior of unauthorized user is recorded, and the operation behavior is timely notified to above-mentioned default contact person, and then further The risk that reduction privacy leakage or property suffer a loss.
In the optional embodiment, further optionally, aforesaid operations record can include being clicked handle icon The mark of application and the starting state of the application, and when judging that user terminal is not in off-mode, acquisition is directed to Before Operation Log being generated after the operation note of user terminal and according to operation note, information security in the user terminal Guard method can also include following operation:
User terminal judge it is above-mentioned identify whether as one of them in default mark, when judge it is above-mentioned be identified as it is default During one of them in mark, judge above-mentioned application that whether above-mentioned starting state indicates that aforesaid operations record includes by success Start, when judging that above-mentioned starting state indicates that above-mentioned application is successfully started up, triggering execution is above-mentioned to give birth to according to operation note The step of into Operation Log.
It can be seen that the optional embodiment can also record corresponding application as the preset privacy application of user in aforesaid operations And the application is when being successfully started up, aforesaid operations daily record just is sent to contacting terminal corresponding to above-mentioned default contact person, so both Privacy leakage can be reduced or risk that property suffers a loss, additionally it is possible to avoid frequently contacting to corresponding to above-mentioned default contact person Terminal sends Operation Log and brings the situation of puzzlement to occur to above-mentioned default contact person.
Further optionally, the guard method of information security can also include following operation in the user terminal:
User terminal deletes the transmission record that aforesaid operations daily record is sent to above-mentioned contact terminal.
It can be seen that unauthorized use can detected by implementing the guard method of information security in the user terminal described by Fig. 2 During the abnormal operation that family is triggered for user terminal, automatic triggering is for presetting the information leakage protection applied behaviour on user terminal Make, reduce the risk of information leakage in user terminal, improve the security of user terminal, and then improve user terminal Usage experience.
Embodiment three
Referring to Fig. 3, Fig. 3 is the knot of the protection device of information security in a kind of user terminal disclosed in the embodiment of the present invention Structure schematic diagram.Wherein, the protection device 300 of information security can be with software or application in the user terminal described by Fig. 3 Mode, which is installed, in the user terminal, can also be in a manner of hardware installed in the predeterminated position of user terminal, the present invention Embodiment does not limit.As shown in figure 3, the protection device 300 of information security can include detection unit in the user terminal 301st, determining unit 302, judging unit 303 and leakage-preventing unit 304, wherein:
Detection unit 301, for detecting whether the abnormal operation for user terminal be present.
In the embodiment of the present invention, abnormal operation that detection unit 301 detects can include but is not limited to user terminal and connect After multiple communication (call, the voice or video etc.) request received is not responded, user terminal receives multiple communication request It is forced shutdown, user terminal by direct forced shutdown, the unlocking pin for the screen for unlocking user terminal or startup application program Setting up password mistake and errors number exceed client identification module in preset times threshold value and user terminal (Subscriber Identification Module, SIM) blocks any one in being forcibly removed, and the embodiment of the present invention is not Limit.
Determining unit 302, for when detection unit 301 detects the presence of above-mentioned abnormal operation, determining above-mentioned abnormal behaviour Operation user corresponding to making.
In the embodiment of the present invention, determining unit 302 can perform shooting operation by the front camera of user terminal, obtain To imaging picture, the imaging picture is analyzed, obtains the picture feature of the imaging picture, when the picture feature includes character face During feature, character face's feature is defined as to operate user corresponding to above-mentioned abnormal operation, or, it can also prompt to input body Part information and the operation user according to corresponding to the identity information got determines above-mentioned abnormal operation.
Judging unit 303, for judging whether the aforesaid operations user that determining unit 302 is determined is awarding for user terminal Weigh user.
In the embodiment of the present invention, judging unit 303 judges whether the aforesaid operations user that determining unit 302 is determined is use The concrete mode of the authorized user of family terminal can be:
Judge whether above-mentioned character face's feature matches with character face's feature of preset authorization user, if so, then true It is authorized user to determine aforesaid operations user, if not, it is determined that aforesaid operations user is not authorized user;Or
Judge whether the above-mentioned identity information that gets matches with the identity information of preset authorization user, if so, then true It is authorized user to determine aforesaid operations user, if not, it is determined that aforesaid operations user is not authorized user.
Leakage-preventing unit 304, for when it is not above-mentioned authorized user that judging unit 303, which judges aforesaid operations user, Information leakage protection operation corresponding to being performed to the default application in all applications for being installed on user terminal.
In the embodiment of the present invention, the default application can be all applications installed in user terminal, or user Certain applications in all applications installed in terminal, wherein, the certain applications can include having recorded login name and log in close The application of code, the application for being related to financing class, be related to pay the application of class, the application for the picture library being able to access that in user terminal, It is able to access that the application of address list in user terminal and is able to access that in user terminal that application of instant communication information etc. is related to The combination of any type application or multiclass application in the application of privacy and property, the embodiment of the present invention are not construed as limiting.Need Bright, the default application can also independently be set by the authorized user of user terminal, and the authorized user of user terminal can To be modified according to the actual demand of itself to the default application, the embodiment of the present invention does not limit.
In the embodiment of the present invention, leakage-preventing unit 304 is held to the default application in all applications for being installed on user terminal Information leakage protection operation can include corresponding to row:
There is the default application of login name and login password (including to be related to the application of financing class, be related to and pay class to record Using), perform the operation for emptying login name and login password or directly perform unloading operation;
To the default application without login name and login password, the behaviour for starting the application lock for the default application is performed Make;
To the instant communication information (the especially instant communication information including preset keyword) that is stored in user terminal and/ Or address list and/or picture library perform deletion action or cryptographic operation.
It can be seen that in user terminal described by implementing Fig. 3 information security protection device 300 can detect it is unauthorized During the abnormal operation that user triggers for user terminal, automatic triggering is for presetting the information leakage protection applied behaviour on user terminal Make, reduce the risk of information leakage in user terminal, improve the security of user terminal, and then improve user terminal Usage experience.
In an optional embodiment, the protection device 300 of information security can also include starting in the user terminal Unit 305 and communication unit 306, it is further alternative, it can also include deleting unit 307, now, believe in the user terminal The structure for ceasing the protection device 300 of safety can be with as shown in figure 4, Fig. 4 be another user terminal disclosed in the embodiment of the present invention The structural representation of the protection device of middle information security.Wherein:
Start unit 305, for judging unit 303 judge aforesaid operations user be above-mentioned authorized user after with And the default application in leakage-preventing unit 304 is to all applications for being installed on user terminal perform corresponding to information leakage protection grasp Before work, start the locating interface on user terminal.
Communication unit 306, for being sent by above-mentioned locating interface to location-server corresponding with above-mentioned locating interface Geographical position obtains request, and receives above-mentioned location-server by above-mentioned locating interface and obtain request for the geographical position The geographical position of return obtains response, wherein, the geographical position obtains the current geographic position for responding and including residing for user terminal.
Judging unit 303, it can be also used for judging its in the whether default conventional geographical position of above-mentioned current geographic position In one, when judge above-mentioned current geographic position for one of them in the default conventional geographical position when, triggering is anti-to let out Dew unit 304 the default application in all applications for being installed on user terminal is performed corresponding to information leakage protection operate.
Judging unit 303, it can be also used for judging whether user terminal is in off-mode.
Determining unit 302, it can be also used for when judging unit 303 judges that user terminal is not in off-mode, really The fixed default contact person for establishing binding relationship with user terminal in advance.
Communication unit 306, it can be also used for sending prompting message to the terminal that contacts corresponding with above-mentioned default contact person, its In, the prompting message includes above-mentioned current geographic position, and the prompting message is used to prompt user terminal to be in abnormality.
Unit 307 is deleted, the transmission for sending above-mentioned prompting message to above-mentioned contact terminal for deleting communication unit 306 is remembered Record.
It can be seen that the protection device 300 for implementing information security in the user terminal described by Fig. 4 can also be above-mentioned when detecting When the operation user of abnormal operation is not authorized user, further the geographical position residing for user terminal is judged, so The accuracy and reliability that anti-information leakage operation is performed to the default application in user terminal can be improved, and in user terminal When not being shut down or when being forced to start shooting again after shutting down, the geographical position that above-mentioned abnormal operation occurs is sent to whole with user The default contact person (such as friend, household or colleague) of binding relationship is established at end, so can be in the authorized user of user terminal It is unaware that user terminal is lost or given notice in time to default contact person when being stolen, in order to which default contact person takes accordingly Measure.
Further alternative in the optional embodiment, the protection device 300 of information security may be used also in the user terminal With including acquiring unit 308 and generation unit 309, now, the structure of the protection device 300 of information security in the user terminal Can with as shown in figure 5, Fig. 5 be the protection device of information security in another user terminal disclosed in the embodiment of the present invention structure Schematic diagram.Wherein:
Acquiring unit 308, for when judging unit 303 judges that user terminal is not in off-mode, acquisition to be directed to The operation note of user terminal.
Generation unit 309, for the aforesaid operations record generation Operation Log got according to acquiring unit 308.
Communication unit 306, it can be also used for sending aforesaid operations daily record to above-mentioned contact terminal.
Optionally, unit 307 is deleted, deleting communication unit 306 is can be also used for and sends above-mentioned behaviour to above-mentioned contact terminal Make the transmission record of daily record.
Further optional, operation note can include the mark for being clicked the application of handle icon and the application Starting state, and judging unit 303, it can be also used for after acquiring unit 308 obtains the operation note for user terminal And before generation unit 309 records generation Operation Log according to aforesaid operations, judge above-mentioned identify whether as in default mark One of them, when judge it is above-mentioned be identified as in default mark one of them when, judge whether above-mentioned starting state indicates Above-mentioned application is successfully started up, and when judging that above-mentioned starting state indicates that above-mentioned application is successfully started up, triggers generation unit 309 perform the above-mentioned operation that generation Operation Log is recorded according to aforesaid operations.
It can be seen that implementing the protection device 300 of information security in the user terminal described by Fig. 5 can also remember in aforesaid operations When application corresponding to record is applied for the preset privacy of user and the application is successfully started up, just to corresponding to above-mentioned default contact person Contact terminal and send aforesaid operations daily record, can either so reduce privacy leakage or risk that property suffers a loss, additionally it is possible to keep away Exempt from frequently to bring puzzlement to above-mentioned default contact person to contact terminal transmission Operation Log corresponding to above-mentioned default contact person Situation occurs.
Example IV
Referring to Fig. 6, Fig. 6 is the protection device of information security in another user terminal disclosed in the embodiment of the present invention Structural representation.As shown in fig. 6, the protection device 600 of information security can include in the user terminal:At least one processor 601, for example, CPU, memory 602, at least one communication bus 603, input unit 604, output device 605.Wherein, communication is total Line 603 is used to realize the communication connection between these components.Memory 602 can be high-speed RAM memory or it is non-not Stable memory (non-volatile memory), for example, at least a magnetic disk storage.Memory 602 optionally may be used also To be at least one storage device for being located remotely from aforementioned processor 601.Wherein:
Processor 601 can store batch processing code with reference to the device described by Fig. 3 to Fig. 5 in memory 602, and Processor 601 calls the program code stored in memory 602, for performing following operation:
Detect whether the abnormal operation for having for user terminal;
When detecting the presence of abnormal operation, operation user corresponding to abnormal operation is determined;
Judge operate user whether be user terminal authorized user, when judge operate user be not authorized user when, Information leakage protection operation corresponding to being performed to the default application in all applications for being installed on user terminal.
In an optional embodiment, after judging to operate user for authorized user, to pacifying on user terminal Before information leakage protection operation corresponding to default application execution in all applications of dress, processor 601 is called in memory 602 The program code of storage, it can be also used for performing following operation:
Start the locating interface on user terminal, and sent out by locating interface to location-server corresponding with locating interface Geographical position is sent to obtain request, and the ground returned by locating interface reception location-server for geographical position acquisition request Position acquisition response is managed, geographical position obtains the current geographic position for responding and including residing for user terminal;
Judge whether current geographic position is one of them in default conventional geographical position, when judging current geographic position When putting not to preset one of them in conventional geographical position, triggering is performed in above-mentioned all applications to being installed on user terminal Default application perform corresponding to information leakage protection operation the step of.
Further alternative in the optional embodiment, processor 601 calls the program generation stored in memory 602 Code, can be also used for performing following operation:
Judge whether user terminal is in off-mode, when judging that user terminal is not in off-mode, it is determined that in advance The default contact person of binding relationship is first established with user terminal;
Prompting message is sent to the terminal that contacts corresponding with default contact person, prompting message includes current geographic position, and Prompting message is used to prompt user terminal to be in abnormality;
Delete the transmission record that prompting message is sent to contact terminal.
Further optional, processor 601 calls the program code stored in memory 602, can be also used for performing Operate below:
When judging that user terminal is not in off-mode, the operation note for user terminal is obtained;
Operation Log is generated according to operation note, and Operation Log is sent to contact terminal.
Further optional, aforesaid operations record can include the mark for being clicked the application of handle icon and should answer Starting state, and when judging that user terminal is not in off-mode, obtain for user terminal operation note it Afterwards, before and generating Operation Log according to operation note, processor 601 calls the program code stored in memory 602, also It can be used for performing following operation:
Judge it is above-mentioned identify whether as one of them in default mark, when judging above-mentioned be identified as in default mark One of them when, judge whether above-mentioned starting state indicates that above-mentioned application is successfully started up, when judging that above-mentioned starting state refers to When showing that above-mentioned application is successfully started up, triggering performs above-mentioned the step of generating Operation Log according to operation note.
It can be seen that implement Fig. 6 described by user terminal in information security protection device 600 can detect it is unauthorized During the abnormal operation that user triggers for user terminal, automatic triggering is for presetting the information leakage protection applied behaviour on user terminal Make, reduce the risk of information leakage in user terminal, improve the security of user terminal, and then improve user terminal Usage experience.
Embodiment five
Referring to Fig. 7, Fig. 7 is a kind of structural representation of user terminal disclosed in the embodiment of the present invention.As shown in fig. 7, The user terminal 700 can include the protection device of information security in user terminal, wherein, information security in the user terminal The structure of protection device can repeat no more such as the structure described by Fig. 3-Fig. 6 any embodiments, the embodiment of the present invention.It can be seen that Implementing the user terminal described by Fig. 7 can be when detecting the abnormal operation that unauthorized user triggers for user terminal, certainly Dynamic triggering is directed to the information leakage protection operation that application is preset on user terminal, reduces the risk of information leakage in user terminal, The security of user terminal is improved, and then improves the usage experience of user terminal.
Embodiment six
Referring to Fig. 8, Fig. 8 is the structural representation of another user terminal disclosed in the embodiment of the present invention.Such as Fig. 8 institutes Show, the user terminal can include:Radio frequency (Radio Frequency, RF) circuit 10, memory 20, input block 30, display Unit 40, sensor 50, voicefrequency circuit 60, Wireless Fidelity (Wireless Fidelity, WiFi) module 70, processor 80 with And the grade part of power supply 90.It will be understood by those skilled in the art that the user terminal structure shown in Fig. 8 was not formed to user's end The restriction at end, can be included than illustrating more or less parts, either combine some parts or different parts arrangement.
Each component parts of user terminal is specifically introduced with reference to Fig. 8:
RF circuits 10 can be used for the reception and transmission of information.Generally, RF circuits 10 include but is not limited to antenna, at least one Amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..In addition, RF Circuit 10 can also be communicated by radio communication with network and other equipment.Above-mentioned radio communication can use any communication standard Or agreement, including but not limited to global system for mobile communications (Global System of Mobile communication, GSM), general packet radio service (General Packet Radio Service, GPRS), CDMA (Code Division Multiple Access, CDMA), WCDMA (Wideband Code Division Multiple Access, WCDMA), Long Term Evolution (Long Term Evolution, LTE), Email, Short Message Service (Short Messaging Service, SMS) etc..
Memory 20 can be used for storage software program and module, and processor 80 is stored in the soft of memory 20 by operation Part program and module, so as to perform the various function application of user terminal and data processing.Memory 20 can mainly include Storing program area and storage data field, wherein, storing program area can storage program area, the application journey needed at least one function Sequence (such as application interface display function, call function etc.) etc.;Storage data field can store the use according to user terminal Data (such as identification of contacts, default mode of operation etc.) created etc..In addition, memory 20 can include depositing at random at a high speed Access to memory, can also include nonvolatile memory, a for example, at least disk memory, flush memory device or other are easy The property lost solid-state memory.
Input block 30 can be used for the numeral or character information for receiving input, and produces and set with the user of user terminal And the key signals input that function control is relevant.Specifically, input block 30 may include that contact panel 31 and other inputs are set Standby 32.Contact panel 31, also referred to as touch-screen, collecting touch operation of the user on or near it, (for example user uses hand The operation of any suitable object such as finger, stylus or annex on contact panel 31 or near contact panel 31), and according to pre- The formula first set drives corresponding attachment means.Optionally, contact panel 31 may include touch detecting apparatus and touch control Two parts of device.Wherein, the touch orientation of touch detecting apparatus detection user, and the signal that touch operation is brought is detected, it will believe Number send touch controller to;Touch controller receives touch information from touch detecting apparatus, and is converted into contact seat Mark, then gives processor 80, and the order sent of reception processing device 80 and can be performed.Furthermore, it is possible to using resistance-type, electricity The polytypes such as appearance formula, infrared ray and surface acoustic wave realize contact panel 31.Except contact panel 31, input block 30 may be used also With including other input equipments 32.Specifically, other input equipments 32 can include but is not limited to physical keyboard, function key (ratio Such as volume control button, switch key), trace ball, mouse, the one or more in action bars etc..
Display unit 40 can be used for display by the information of user's input or be supplied to the information and user terminal of user Various menus.Display unit 40 may include display panel 41, optionally, can use liquid crystal display (Liquid Crystal Display, LCD), the form such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) it is aobvious to configure Show panel 41.Further, contact panel 31 can cover display panel 41, when contact panel 31 is detected on or near it After touch operation, processor 80 is sent to determine the type of touch event, is followed by subsequent processing type of the device 80 according to touch event Corresponding visual output is provided on display panel 41.Although in fig. 8, contact panel 31 and display panel 41 are as two Independent part realizes the input of user terminal and input function, but in some embodiments it is possible to by contact panel 31 Integrated with display panel 41 and realize input and the output function of user terminal.
User terminal may also include at least one sensor 50, such as optical sensor, motion sensor and other sensings Device.Specifically, optical sensor may include ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 41, and proximity transducer can close display when user terminal is moved in one's ear Panel 41 and/or backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions (generally three axles) The size of acceleration, size and the direction of gravity are can detect that when static, available for identification user terminal posture application (such as Horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;As for The other sensors such as gyroscope that user terminal can also configure, barometer, hygrometer, thermometer, infrared ray sensor, herein not Repeat again.
Voicefrequency circuit 60, loudspeaker 61, microphone 62 can provide the COBBAIF between user and user terminal.Audio-frequency electric Electric signal after the voice data received conversion can be transferred to loudspeaker 61 by road 60, and sound letter is converted to by loudspeaker 61 Number output;On the other hand, the voice signal of collection is converted to electric signal by microphone 62, is converted to after being received by voicefrequency circuit 60 Voice data, then after voice data output processor 80 is handled, through RF circuits 10 to be sent to such as another user terminal, or Person exports voice data to memory 20 further to handle.
WiFi belongs to short range wireless transmission technology, and user terminal can help user's transceiver electronicses by WiFi module 70 Mail, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and accessed.Although Fig. 8 is shown WiFi module 70, but it is understood that, it is simultaneously not belonging to must be configured into for user terminal, can exist as needed completely Do not change in the essential scope of invention and omit.
Processor 80 is the control centre of user terminal, utilizes each of various interfaces and the whole user terminal of connection Part, by running or performing the software program and/or module that are stored in memory 20, and call and be stored in memory 20 Interior data, the various functions and processing data of user terminal are performed, so as to carry out integral monitoring to user terminal.Optionally, Processor 80 may include one or more processing units;Preferably, processor 80 can integrate application processor and modulatedemodulate is mediated Device is managed, wherein, application processor mainly handles operating system, user interface and application program etc., and modem processor is main Handle radio communication.It is understood that above-mentioned modem processor can not also be integrated into processor 80.
User terminal can also include the power supply 90 (such as battery) to all parts power supply, it is preferred that power supply can lead to Cross power-supply management system and processor 80 is logically contiguous, so as to realize management charging, electric discharge, Yi Jigong by power-supply management system The functions such as consumption management.
Although being not shown, user terminal can also include camera, bluetooth module etc., will not be repeated here.
In embodiment shown in earlier figures 1, Fig. 2, each step method flow can based on the user terminal structure realize.
In embodiment shown in earlier figures 3, Fig. 4, Fig. 5, each unit function can based on the user terminal structure realize.
It can be seen that the user terminal implemented described by Fig. 8 can detect unauthorized user for user terminal triggering During abnormal operation, automatic triggering is reduced in user terminal and believed for presetting the information leakage protection applied operation on user terminal The risk of leakage is ceased, improves the security of user terminal, and then improve the usage experience of user terminal.
Embodiment seven
The embodiment of the invention discloses a kind of computer-readable recording medium, and it stores the calculating for electronic data interchange Machine program, wherein, the computer program causes computer to perform the guarantor of information security in user terminal described by Fig. 1 or Fig. 2 Step in maintaining method.
Embodiment eight
The embodiment of the invention discloses a kind of computer program product, the computer program product includes storing computer The non-transient computer-readable recording medium of program, and the computer program is operable to make computer perform Fig. 1 or Fig. 2 institutes Step in the user terminal of description in the guard method of information security.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is can To instruct the hardware of correlation to complete by program, the program can be stored in a computer-readable recording medium, storage Medium include read-only storage (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), programmable read only memory (Programmable Read-only Memory, PROM), erasable programmable is read-only deposits Reservoir (Erasable Programmable Read Only Memory, EPROM), disposable programmable read-only storage (One- Time Programmable Read-Only Memory, OTPROM), the electronics formula of erasing can make carbon copies read-only storage (Electrically-Erasable Programmable Read-Only Memory, EEPROM), read-only optical disc (Compact Disc Read-Only Memory, CD-ROM) or other disk storages, magnetic disk storage, magnetic tape storage or can For carrying or any other computer-readable medium of data storage.
The guard method to information security in a kind of user terminal disclosed in the embodiment of the present invention and device are carried out above It is discussed in detail, specific case used herein is set forth to the principle and embodiment of the present invention, above example Illustrate to be only intended to help the method and its core concept for understanding the present invention;Meanwhile for those of ordinary skill in the art, according to According to the thought of the present invention, there will be changes in specific embodiments and applications, in summary, this specification content It should not be construed as limiting the invention.

Claims (12)

1. the guard method of information security in a kind of user terminal, it is characterised in that methods described includes:
Detect whether the abnormal operation for having for the user terminal;
When detecting the presence of the abnormal operation, operation user corresponding to the abnormal operation is determined;
Judge it is described operation user whether be the user terminal authorized user, when judge it is described operation user be not described During authorized user, the default application in all applications for being installed on the user terminal is performed corresponding to information leakage protection grasp Make.
2. the guard method of information security in user terminal according to claim 1, it is characterised in that described in judging Operate after user is not the authorized user, the default application in all applications for being installed on the user terminal is held Before information leakage protection operation corresponding to row, methods described also includes:
Start the locating interface on the user terminal, and positioned by the locating interface to corresponding with the locating interface Server sends geographical position and obtains request, and receives the location-server by the locating interface and be directed to the geography The geographical position that position acquisition request returns obtains response, and the geographical position, which obtains response, to be included residing for the user terminal Current geographic position;
Judge whether the current geographic position is one of them in default conventional geographical position, when judging the current position When reason position is not one of them in the default conventional geographical position, triggering execution is described to being installed on the user terminal All applications in default application perform corresponding to information leakage protection operation the step of.
3. the guard method of information security in user terminal according to claim 2, it is characterised in that methods described is also wrapped Include:
Judge whether the user terminal is in off-mode, when judging that the user terminal is not in the off-mode When, it is determined that the default contact person of binding relationship is established with the user terminal in advance;
Prompting message is sent to the terminal that contacts corresponding with the default contact person, the prompting message includes the current geographic Position, and the prompting message is used to prompt the user terminal to be in abnormality;
The transmission for sending the prompting message to the contact terminal is deleted to record.
4. the guard method of information security in user terminal according to claim 3, it is characterised in that methods described is also wrapped Include:
When judging that the user terminal is not in the off-mode, the operation note for the user terminal is obtained;
Operation Log is generated according to the operation note, and the Operation Log is sent to the contact terminal.
5. the guard method of information security in user terminal according to claim 4, it is characterised in that the operation note Including the mark of application for being clicked handle icon and the starting state of the application;
The operation when judging that the user terminal is not in the off-mode, obtained for the user terminal is remembered After record, and before the generation Operation Log according to the operation note, methods described also includes:
Identified whether described in judging as one of them in default mark, when judging described be identified as in the default mark One of them when, judge whether the starting state indicates that the application is successfully started up, when judging that the starting state refers to When showing that the application is successfully started up, triggering performs described the step of generating Operation Log according to the operation note.
6. the protection device of information security in a kind of user terminal, it is characterised in that described device includes:
Detection unit, for detecting whether the abnormal operation for the user terminal be present;
Determining unit, for when the detection unit detects the presence of the abnormal operation, determining that the abnormal operation is corresponding Operation user;
Judging unit, for judge it is described operation user whether be the user terminal authorized user;
Leakage-preventing unit, for when the judging unit judge it is described operation user be not the authorized user when, to described Information leakage protection operation corresponding to default application execution in all applications installed on user terminal.
7. the protection device of information security in user terminal according to claim 6, it is characterised in that described device is also wrapped Include:
Start unit, for after judging the operation user not for the authorized user in the judging unit and in institute State leakage-preventing unit the default application in all applications for being installed on the user terminal is performed corresponding to information leakage protection grasp Before work, start the locating interface on the user terminal;
Communication unit, for sending geographical position to location-server corresponding with the locating interface by the locating interface Request is obtained, and the location-server is received by the locating interface and obtains what request returned for the geographical position Geographical position obtains response, and the geographical position obtains the current geographic position for responding and including residing for the user terminal;
The judging unit, it is additionally operable to judge whether the current geographic position is to preset wherein one in conventional geographical position It is individual, when it is not one of them in the default conventional geographical position to judge the current geographic position, trigger described anti- Leakage unit the default application in all applications for being installed on the user terminal is performed corresponding to information leakage protection operate.
8. the protection device of information security in user terminal according to claim 7, it is characterised in that described to judge list Member, it is additionally operable to judge whether the user terminal is in off-mode;
The determining unit, it is additionally operable to when the judging unit judges that the user terminal is not in the off-mode, It is determined that the default contact person of binding relationship is established with the user terminal in advance;
The communication unit, it is additionally operable to send prompting message, the prompting to the terminal that contacts corresponding with the default contact person Message includes the current geographic position, and the prompting message is used to prompt the user terminal to be in abnormality;
Described device also includes:
Unit is deleted, is recorded for deleting the transmission for sending the prompting message to the contact terminal.
9. the protection device of information security in user terminal according to claim 8, it is characterised in that described device is also wrapped Include:
Acquiring unit, for when the judging unit judges that the user terminal is not in the off-mode, obtaining pin Operation note to the user terminal;
Generation unit, for generating Operation Log according to the operation note;
The communication unit, it is additionally operable to send the Operation Log to the contact terminal.
10. the protection device of information security in user terminal according to claim 9, it is characterised in that the operation note Record includes being clicked the mark of application and the starting state of the application of handle icon;
The judging unit, be additionally operable to the acquiring unit obtain for the user terminal operation note after and institute State before generation unit generates Operation Log according to the operation note, judge described in identify whether as in default mark wherein One, when judge it is described be identified as one of them in the default mark when, judge whether the starting state indicates institute State using being successfully started up, when judging that the starting state instruction application is successfully started up, it is single to trigger the generation Member performs the operation that Operation Log is generated according to the operation note.
11. the protection device of information security in a kind of user terminal, it is characterised in that described device includes:
It is stored with the memory of executable program code;
The processor coupled with the memory;
The processor calls the executable program code stored in the memory, performs such as claim 1 to right It is required that in user terminal described in 5 any one information security guard method.
A kind of 12. computer-readable recording medium, it is characterised in that it stores the computer program for electronic data interchange, Wherein, the computer program causes computer to perform in the user terminal as described in claim 1 to any one of claim 5 The guard method of information security.
CN201710701843.8A 2017-08-16 2017-08-16 The guard method of information security and device in a kind of user terminal Pending CN107609407A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710701843.8A CN107609407A (en) 2017-08-16 2017-08-16 The guard method of information security and device in a kind of user terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710701843.8A CN107609407A (en) 2017-08-16 2017-08-16 The guard method of information security and device in a kind of user terminal

Publications (1)

Publication Number Publication Date
CN107609407A true CN107609407A (en) 2018-01-19

Family

ID=61064072

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710701843.8A Pending CN107609407A (en) 2017-08-16 2017-08-16 The guard method of information security and device in a kind of user terminal

Country Status (1)

Country Link
CN (1) CN107609407A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108540654A (en) * 2018-03-22 2018-09-14 维沃移动通信有限公司 A kind of operating method and mobile terminal of mobile terminal
CN108537025A (en) * 2018-03-29 2018-09-14 广东欧珀移动通信有限公司 Method for secret protection and device, computer readable storage medium, terminal
CN110536017A (en) * 2019-09-03 2019-12-03 中国联合网络通信集团有限公司 Message sending control method, message transmission control device
WO2021098707A1 (en) * 2019-11-21 2021-05-27 维沃移动通信有限公司 Application program control method and electronic device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103246855A (en) * 2012-02-07 2013-08-14 宇龙计算机通信科技(深圳)有限公司 Terminal and terminal security management method
CN105491236A (en) * 2015-12-02 2016-04-13 小米科技有限责任公司 Terminal unlocking method and device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103246855A (en) * 2012-02-07 2013-08-14 宇龙计算机通信科技(深圳)有限公司 Terminal and terminal security management method
CN105491236A (en) * 2015-12-02 2016-04-13 小米科技有限责任公司 Terminal unlocking method and device

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108540654A (en) * 2018-03-22 2018-09-14 维沃移动通信有限公司 A kind of operating method and mobile terminal of mobile terminal
WO2019179312A1 (en) * 2018-03-22 2019-09-26 维沃移动通信有限公司 Mobile terminal operation method and mobile terminal
CN108537025A (en) * 2018-03-29 2018-09-14 广东欧珀移动通信有限公司 Method for secret protection and device, computer readable storage medium, terminal
CN108537025B (en) * 2018-03-29 2020-08-18 Oppo广东移动通信有限公司 Privacy protection method and device, computer readable storage medium and terminal
CN110536017A (en) * 2019-09-03 2019-12-03 中国联合网络通信集团有限公司 Message sending control method, message transmission control device
WO2021098707A1 (en) * 2019-11-21 2021-05-27 维沃移动通信有限公司 Application program control method and electronic device

Similar Documents

Publication Publication Date Title
CN107609407A (en) The guard method of information security and device in a kind of user terminal
CN106778175B (en) Interface locking method and device and terminal equipment
CN104901805B (en) A kind of identification authentication methods, devices and systems
CN105912905A (en) Fingerprint unlocking method and terminal
CN106412311B (en) A kind of data transmission method and terminal device
CN105912919B (en) A kind of unlocked by fingerprint method and terminal
CN112799750A (en) Terminal equipment information display method and terminal equipment
CN106470269A (en) A kind of method and apparatus of antitheft mobile phone
CN104573437B (en) Information authentication method, device and terminal
CN107743086A (en) A kind of message treatment method and system, message is sent and reception device
CN106845211A (en) Mobile terminal and its application start method and device
CN108304105A (en) A kind of application interface starts method, mobile terminal
CN106407771A (en) Message management method and device
CN103366104A (en) Method and device for controlling accessing of application
CN106331370B (en) A kind of data transmission method and terminal device
CN107102913B (en) Data back up method, device and computer equipment
CN107909682A (en) A kind of access control method, device and antitheft door
CN106302603A (en) The method and apparatus remotely deleting information
CN105262909B (en) Mobile terminal using method, mobile terminal and storage medium
CN106803027A (en) Application function entrance starts method, device and mobile terminal
CN106407779A (en) Information acquisition method and apparatus, and terminal
CN107613093A (en) The display methods and user terminal of a kind of communication information
CN107317908B (en) A kind of user knows method for distinguishing, terminal and storage medium
CN107707736A (en) Mobile terminal and relevant device with stolen safeguard function
CN107172298B (en) Information processing method, information processing device, computer equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180119