CN107734176A - Loss guard method, terminal and the computer-readable recording medium of mobile terminal - Google Patents

Loss guard method, terminal and the computer-readable recording medium of mobile terminal Download PDF

Info

Publication number
CN107734176A
CN107734176A CN201711016018.0A CN201711016018A CN107734176A CN 107734176 A CN107734176 A CN 107734176A CN 201711016018 A CN201711016018 A CN 201711016018A CN 107734176 A CN107734176 A CN 107734176A
Authority
CN
China
Prior art keywords
account
mobile terminal
data
loss
account checking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201711016018.0A
Other languages
Chinese (zh)
Inventor
黄儒鸿
张柳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Jinli Communication Equipment Co Ltd
Original Assignee
Shenzhen Jinli Communication Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Jinli Communication Equipment Co Ltd filed Critical Shenzhen Jinli Communication Equipment Co Ltd
Priority to CN201711016018.0A priority Critical patent/CN107734176A/en
Publication of CN107734176A publication Critical patent/CN107734176A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • H04M1/673Preventing unauthorised calls from a telephone set by electronic means the user being required to key in a code
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72454User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/025Services making use of location information using location based information parameters

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Computer Interaction (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Environmental & Geological Engineering (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the invention discloses loss guard method, terminal and the computer-readable recording medium of mobile terminal, wherein method includes:If detecting, the mobile terminal is started shooting extremely, reminds SCN subscriber connection network;If detecting, the mobile terminal has connected network, obtains the loss protection data being stored in advance in the place of safety of nonvolatile memory, wherein, the protection data of losing include losing defencive function switch data and account checking data;Judge whether the mobile terminal opens loss defencive function according to the loss defencive function switch data;The information called the account checking data and inputted according to user carries out account checking;If the number that the account checking does not pass through is not up to preset times, described the step of calling the account checking data to carry out account checking is returned, can protect mobile terminal can not normal use in the case of non-owner's use.

Description

Loss guard method, terminal and the computer-readable recording medium of mobile terminal
Technical field
The present invention relates to loss guard method, terminal and the calculating of technical field of mobile terminals, more particularly to mobile terminal Machine readable storage medium storing program for executing.
Background technology
With the development of science and technology, mobile phone of today is integrated with various functions, while also stores user's The important informations such as privacy information, photo, document and account data, once hand-set from stolen, may be caused seriously to user Economic loss and bring potential safety hazard.
At present, the solution method for antitheft mobile phone is broadly divided into two types, and one kind is remote anti-theft, that is, passes through network The stolen mobile phone of mode remote control, on condition that network must be connected;One kind needs to carry out this before being factory reset Ground authentication, for example protected using screen-lock password, factory reset can just only be entered by proof of identity, still Needing mobile phone to be in open state just can be with, it is impossible to protection exception situation, for example brush machine or directly entered by hardware combinations key Enter factory reset.
In consideration of it, the loss guard method, terminal and the computer-readable recording medium that are necessary to propose mobile terminal solve Certainly above mentioned problem.
The content of the invention
The embodiment of the present invention provides loss guard method, terminal and the computer-readable recording medium of mobile terminal, can be with Mobile terminal is protected after Default Value or brush machine is resumed, forces to carry out account checking, non-owner can not normal use.
In a first aspect, the embodiments of the invention provide a kind of loss guard method of mobile terminal, this method includes:If inspection Measure the mobile terminal to start shooting extremely, remind SCN subscriber connection network;
If detecting, the mobile terminal has connected network, and acquisition is stored in advance in the place of safety of nonvolatile memory Loss protection data, wherein, it is described lose protection data include lose defencive function switch data and account checking data;
Judge whether the mobile terminal opens loss defencive function according to the loss defencive function switch data;
The information called the account checking data and inputted according to user carries out account checking;
If the number that the account checking does not pass through is not up to preset times, the calling account checking data are returned The step of carrying out account checking.
Second aspect, the embodiments of the invention provide a kind of terminal, the terminal includes being used to perform above-mentioned first aspect The unit of method.
The third aspect, the embodiments of the invention provide another terminal, including processor, input equipment, output equipment and Memory, the processor, input equipment, output equipment and memory are connected with each other, wherein, the memory is used to store branch The computer program that terminal performs the above method is held, the computer program includes programmed instruction, and the processor is configured to use In calling described program instruction, the method for performing above-mentioned first aspect.
Fourth aspect, the embodiments of the invention provide a kind of computer-readable recording medium, the computer-readable storage medium Computer program is stored with, the computer program includes programmed instruction, and described program instruction makes institute when being executed by a processor The method for stating the above-mentioned first aspect of computing device.
The loss that the embodiment of the present invention is stored in advance in the place of safety of nonvolatile memory by obtaining protects data, Force to carry out account checking data, just shifting can be protected with normally-open mobile phone only in the case where account is verified Dynamic terminal after starting shooting extremely so that non-owner can not normal use.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, it is required in being described below to embodiment to use Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the present invention, general for this area For logical technical staff, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of schematic flow diagram of the loss guard method of mobile terminal provided in an embodiment of the present invention;
Fig. 2 is the sub-step schematic flow diagram for losing step S140 in guard method of mobile terminal shown in Fig. 1;
Fig. 3 is a kind of schematic flow diagram of the method for mobile terminal that another embodiment of the present invention provides;
Fig. 4 is the sub-step schematic flow diagram for losing step S240 in guard method of mobile terminal shown in Fig. 3;
Fig. 5 is the sub-step schematic flow diagram for losing step S270 in guard method of mobile terminal shown in Fig. 3;
Fig. 6 is a kind of schematic block diagram of terminal provided in an embodiment of the present invention;
Fig. 7 is the subelement schematic block diagram of account authentication unit in terminal shown in Fig. 6;
Fig. 8 is a kind of terminal schematic block diagram that another embodiment of the present invention provides;
Fig. 9 is the subelement schematic block diagram of account authentication unit in terminal shown in Fig. 8;
Figure 10 is the subelement schematic block diagram of lock machine unit in terminal shown in Fig. 8;
Figure 11 is a kind of terminal schematic block diagram that further embodiment of this invention provides.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is part of the embodiment of the present invention, rather than whole embodiments.Based on this hair Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained under the premise of creative work is not made Example, belongs to the scope of protection of the invention.
It should be appreciated that ought be in this specification and in the appended claims in use, term " comprising " and "comprising" instruction Described feature, entirety, step, operation, the presence of element and/or component, but it is not precluded from one or more of the other feature, whole Body, step, operation, element, component and/or its presence or addition for gathering.
It is also understood that the term used in this description of the invention is merely for the sake of the mesh for describing specific embodiment And be not intended to limit the present invention.As used in description of the invention and appended claims, unless on Other situations are hereafter clearly indicated, otherwise " one " of singulative, "one" and "the" are intended to include plural form.
It will be further appreciated that the term "and/or" used in description of the invention and appended claims is Refer to any combinations of one or more of the associated item listed and be possible to combine, and including these combinations.
As used in this specification and in the appended claims, term " if " can be according to context quilt Be construed to " when ... " or " once " or " in response to determining " or " in response to detecting ".Similarly, phrase " if it is determined that " or " if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true It is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
In the specific implementation, the terminal described in the embodiment of the present invention is including but not limited to such as with touch sensitive surface The mobile phone, laptop computer or tablet PC of (for example, touch-screen display and/or touch pad) etc it is other just Portable device.It is to be further understood that in certain embodiments, the equipment is not portable communication device, but with tactile Touch the desktop computer of sensing surface (for example, touch-screen display and/or touch pad).
In discussion below, the terminal including display and touch sensitive surface is described.It is, however, to be understood that It is that terminal can include one or more of the other physical user-interface device of such as physical keyboard, mouse and/or control-rod.
Terminal supports various application programs, such as one or more of following:Drawing application program, demonstration application journey Sequence, word-processing application, website create application program, disk imprinting application program, spreadsheet applications, game application Program, telephony application, videoconference application, email application, instant messaging applications, exercise Support application program, photo management application program, digital camera application program, digital camera application program, web-browsing application Program, digital music player application and/or video frequency player application program.
The various application programs that can be performed in terminal can use at least one public of such as touch sensitive surface Physical user-interface device.It can adjust and/or change among applications and/or in corresponding application programs and touch sensitive table The corresponding information shown in the one or more functions and terminal in face.So, the public physical structure of terminal is (for example, touch Sensing surface) the various application programs with user interface directly perceived and transparent for a user can be supported.
Referring to Fig. 1, it is a kind of schematic flow diagram of the loss guard method of mobile terminal provided in an embodiment of the present invention, This method can be applied moves in smart mobile phone (such as Android phone, IOS mobile phones), tablet personal computer or Intelligent worn device etc. In dynamic terminal, the present embodiment illustrates exemplified by applied to smart mobile phone.Method as shown in Figure 1 may include following steps S110 ~S150:
If S110, detecting that the mobile terminal is started shooting extremely, SCN subscriber connection network is reminded.
Generally, the non-owner user of screen-lock password limitation is had after hand-set from stolen and uses mobile phone, but can not be limited Non- owner user factory reset or reaches the situation of normal use mobile phone by brush machine by force, therefore the present invention is in mobile phone Abnormal start detection is carried out during start, fundamentally prevents non-owner user's normal use mobile phone.
In one embodiment, such as in the present embodiment, the abnormal start is included after passing through Macintosh factory reset First power on and brush machine after first power on, it is described prompting SCN subscriber connection network be in order to ensuing account verify provide net Network environment, is connected in this embodiment by WIFI, is also included other internetwork connection modes certainly, be will not be repeated here.
If S120, detecting that the mobile terminal has connected network, the peace for being stored in advance in nonvolatile memory is obtained Loss protection data in the whole district, wherein, the protection data of losing include losing defencive function switch data and account checking Data.
In one embodiment, such as in the present embodiment, the place of safety of the nonvolatile memory is RPMB (Replay Protected Memory Block), the RPMB is stored with the loss defencive function switch data and account for realizing the present invention Data are verified, are that the subregion come is individually marked on eMMC (Embedded Multi Media Card), for being deposited to system Put some special needs and authorize the data that can just conduct interviews, therefore user's force revert Default Value or brush machine can not yet The data being stored in the RPMB are deleted, and the access interface of the RPMB is performed below in TEE security contexts, due to TEE secure execution environments can prevent common software attacks, while RPMB can effectively prevent hardware attack, be effectively guaranteed The security of data, in the present embodiment, the defencive function switch data of losing is losing of being set before hand-set from stolen of owner Lose the burst of data that defencive function is turned on or off.
S130, according to it is described loss defencive function switch data judge the mobile terminal whether open loss protect work( Energy
In one embodiment, such as in the present embodiment, if the loss defencive function data judge that mobile phone is opened to open Loss defencive function has been opened, then has performed next step, if the loss defencive function data judge that mobile phone is not opened to close Loss defencive function is opened, then normal boot-strap, therefore user has to opening loss defencive function switch and could realized to mobile phone Lose protection.
S140, the information called the account checking data and inputted according to user carry out account checking.
Account checking interface has been entered after mobile phone extremely start, has prompted user to input account number cipher, now only gathers around The owner for having password could realize the normal use of mobile phone, rather than owner do not have account number cipher so as to can not normal use mobile phone, It can not also be used even if mobile phone is had, become waste product equivalent to mobile phone.
Further, as shown in Fig. 2 in one embodiment, such as in the present embodiment, the step S140 includes following son Step S141~S144:
S141, calling be stored in cloud account in the place of safety of the nonvolatile memory and with the cloud account pair The general unique identifier answered.
In one embodiment, such as in this implementation, the cloud account is cell-phone number, and the cloud account is owner in mobile phone quilt The cloud account of preceding mobile telephone registration is stolen, is stored in corresponding to cloud account and is backed up on server, the cell-phone number and described is led to A unique account on the server is can determine that with unique identifier.
S142, the display cloud account simultaneously prompt user to input password.
In one embodiment, such as in this implementation, the cloud account is shown after start connects network, and prompt input pair The password answered.
If S143, the password for receiving user's input, the password that user is inputted and account checking data hair Server end is sent to carry out account checking.
In one embodiment, such as in the present embodiment, after owner inputs password, password is sent to service by network Device end, verified with owner's backup in the account number cipher of server end.
S144, receive the result that the server end returns.
In one embodiment, such as in the present embodiment, after the server end checking password, the mobile terminal passes through net The result that network the reception server end returns, if the result is verified for account, normal boot-strap.
If the number that the checking of S150, the account does not pass through is not up to preset times, the step S140 is returned with again The account checking data are called to carry out account checking.If reaching preset times, mobile terminal can further be protected Shield, such as cause mobile terminal to enter lock machine state.
In one embodiment, such as in the present embodiment, if the account is verified, it was demonstrated that it is that owner is using, mobile phone Normal boot-strap, if account checking not by and the number that does not pass through within preset times, return continues account Checking, so that non-owner can not normal use mobile phone.
Generally, owner is substantially all can input proper password so as to normally start hand within preset times Machine, rather than owner are difficult then that correct password is inputted within preset times, in order to further prevent non-owner from using mobile phone, In the case that the number that the checking does not pass through reaches preset times, into lock machine state, such as forbid user in preset duration Interior progress account verification operation.
The embodiments of the invention provide a kind of loss guard method of mobile terminal, is connected after mobile terminal extremely start Network, obtain and lose protection data to judge whether mobile terminal opens loss defencive function, if opening loss protection work( Account checking data can be then called to carry out account checking, the password for sending user's input is verified to server end, according to The result that the reception server end returns opens mobile terminal, can be forced into account in the case of improper start Checking, effectively prevent non-owner normal use mobile phone in the case where starting shooting extremely.
Referring to Fig. 3, it is a kind of schematic flow diagram of the loss guard method of mobile terminal provided in an embodiment of the present invention, This method can be applied moves in smart mobile phone (such as Android phone, IOS mobile phones), tablet personal computer or Intelligent worn device etc. In dynamic terminal, the present embodiment illustrates exemplified by applied to smart mobile phone.Method as shown in Figure 3 may include following steps S210 ~S270:
If S210, detecting that the mobile terminal is started shooting extremely, SCN subscriber connection network is reminded.
Generally, the non-owner user of screen-lock password limitation is had after hand-set from stolen number and uses mobile phone, but can not be limited Make non-owner user and factory reset or reach the situation of normal use mobile phone by brush machine by force, therefore the present invention is in hand Abnormal start detection is carried out when machine is started shooting, fundamentally prevents non-owner user's normal use mobile phone.
In one embodiment, such as in the present embodiment, the abnormal start is included after passing through Macintosh factory reset First power on and brush machine after first power on, it is described prompting SCN subscriber connection network be in order to ensuing account verify provide net Network environment, is connected in this embodiment by WIFI, is also included other internetwork connection modes certainly, be will not be repeated here.
If S220, detecting that the mobile terminal has connected network, the peace for being stored in advance in nonvolatile memory is obtained Loss protection data in the whole district, wherein, the protection data of losing include losing defencive function switch data and account checking Data.
In one embodiment, such as in the present embodiment, the place of safety of the nonvolatile memory is RPMB (Replay Protected Memory Block), the RPMB is stored with the loss defencive function switch data and account for realizing the present invention Data are verified, are that the subregion come is individually marked on eMMC (Embedded Multi Media Card), for being deposited to system Put some special needs and authorize the data that can just conduct interviews, therefore user's force revert Default Value or brush machine can not yet The data being stored in the RPMB are deleted, and the access interface of the RPMB is performed below in TEE security contexts, due to TEE secure execution environments can prevent common software attacks, while RPMB can effectively prevent hardware attack, be effectively guaranteed The security of data, in the present embodiment, the defencive function switch data of losing is losing of being set before hand-set from stolen of owner Lose the burst of data that defencive function is turned on or off.
S230, according to it is described loss defencive function switch data judge the mobile terminal whether open loss protect work( Energy
In one embodiment, such as in the present embodiment, if the loss defencive function data judge that mobile phone is opened to open Loss defencive function has been opened, then has performed next step, if the loss defencive function data judge that mobile phone is not opened to close Loss defencive function is opened, then normal boot-strap, therefore user has to opening loss defencive function switch and could realized to mobile phone Lose protection.
S240, the information called the account checking data and inputted according to user carry out account checking.
Account checking interface has been entered after mobile phone extremely start, has prompted user to input account number cipher, now only gathers around The owner for having password could realize the normal use of mobile phone, rather than owner do not have account number cipher so as to can not normal use mobile phone, It can not also be used even if mobile phone is had, become waste product equivalent to mobile phone.
Further, as shown in figure 4, in one embodiment, such as in the present embodiment, the S240 comprises the following steps S241~S246:
S241, calling be stored in cloud account in the place of safety of the nonvolatile memory and with the cloud account pair The general unique identifier answered.
In one embodiment, such as in this implementation, the cloud account is cell-phone number, and the cloud account is owner in mobile phone quilt The cloud account of preceding mobile telephone registration is stolen, is stored in corresponding to cloud account and is backed up on server, the cell-phone number and described is led to A unique account on the server is can determine that with unique identifier.
S242, the display cloud account simultaneously prompt user to input password.
In one embodiment, such as in this implementation, the cloud account is shown after start connects network, and prompt input pair The password answered.
If S243, the password for receiving user's input, the password that user is inputted and account checking data hair Server end is sent to carry out account checking.
In one embodiment, such as in the present embodiment, after owner inputs password, password is sent to service by network Device end, verified with owner's backup in the account number cipher of server end.
If S244, detecting that user triggers the default request that forgets Password, by it is described forget Password request and it is described Account checking data be sent to server end, as the server end forgotten Password according to request and the account verify Data send corresponding identifying code to another terminal bound in advance.
If S245, receiving user's input identifying code, the identifying code is sent to server end, by the service Verify that data and the identifying code carry out account checking according to the account in device end.
S246, receive the result that the server end returns.
In one embodiment, such as in the present embodiment, generally, owner can be by inputting password come normally-open Mobile phone, but in the case where owner have forgotten password, can be by forgetting Password come normally-open mobile phone.User, which clicks on, to be forgotten Password, forget Password request and the account are sent by network and verifies that data arrive to server end, the received server-side Forget Password and send checking short message to the safe mobile phone that owner pre-sets after asking, by described in the case of owner's use It is normally-open that identifying code in the checking short message that safe mobile phone receives is input to mobile phone, rather than owner because it is described verify it is short The identifying code of letter and can not normal use mobile phone, it is to be understood that can also be and obtained by other manners such as mails certainly Identifying code, it will not be repeated here.
S250, judge whether the result passes through.
Verified not if S260, the result are account by judging that the result account checking occurs not Whether the number passed through reaches preset times, if not up to preset times, returns to the step S240 to call the account again Number checking data carry out account checking.
In one embodiment, such as in the present embodiment, if the account is verified, it was demonstrated that it is that owner is using, mobile phone Normal boot-strap, if account checking not by and the number that does not pass through within preset times, then return and continue account Checking, so that non-owner can not normal use mobile phone.
Generally, owner is substantially all can input proper password so as to normally start hand within preset times Machine, rather than owner are difficult then that correct password is inputted within preset times, in order to further prevent non-owner from using mobile phone, In the case that the number that the checking does not pass through reaches preset times, into lock machine shape.
If the number that the checking of S270, the account does not pass through reaches preset times, into lock machine state.
In one embodiment, such as in the present embodiment, the lock machine state includes:User is forbidden to be carried out in preset duration Account verification operation, in order to help owner's getting back mobile phone, as shown in figure 5, the step S270 also include sub-step S271~ S272:
The geographical position of mobile terminal described in S271, dynamic access.
S272, the geographical position is sent to server end, sent in the geographical position to pre- by the server end Another terminal first bound.
In one embodiment, such as in the present embodiment, substantially confirm that non-owner is using after lock machine state is entered Mobile phone, in order to help owner to give the mobile phone of loss for change, in preset duration mobile phone forbid carry out account verification operation, non-owner without The normally-open mobile phone of method, strive for the time for owner's getting back mobile phone, in the present embodiment, the preset duration is 24 hours, when So in other embodiments, the preset duration is alternatively other any durations, passes through dynamic access after lock machine state is entered The current geographic position of mobile phone, and the current geographic position of mobile phone is sent to by network by server end, then by server end The current geographic position of mobile phone is sent to the safe mobile phone that owner pre-sets, so as to help owner to give the mobile phone of loss for change.
The embodiments of the invention provide a kind of loss guard method of mobile terminal, is connected after mobile terminal extremely start Network, obtain and lose protection data to judge whether mobile terminal opens loss defencive function, if opening loss protection work( It can then call account checking data to carry out account checking, service is arrived by sending the request that forgets Password when owner forgets Password Device end, the identifying code of the default safe mobile phone of owner is returned to according to server end to open mobile terminal, can be improper Account checking is forced into the case of start, mobile phone is opened by forgetting Password when owner forgets Password, effectively prevents Only non-owner normal use mobile phone in the case where starting shooting extremely.
The embodiment of the present invention also provides a kind of terminal, and the terminal includes being used for the unit for performing the above method.The terminal 300 Including but not limited to smart mobile phone (such as Android phone, IOS mobile phones), tablet personal computer or Intelligent worn device etc..Specifically Ground, it is a kind of schematic block diagram of terminal provided in an embodiment of the present invention referring to Fig. 6.The terminal of the present embodiment includes:Networking unit 310th, acquiring unit 320, judging unit 330, account authentication unit 340 and returning unit 350.
Networking unit 310, if for detecting that the mobile terminal is started shooting extremely, remind SCN subscriber connection network.
Generally, the non-owner user of screen-lock password limitation is had after hand-set from stolen number and uses mobile phone, but can not be limited Make non-owner user and factory reset or reach the situation of normal use mobile phone by brush machine by force, therefore the present invention is in hand Abnormal start detection is carried out when machine is started shooting, fundamentally prevents non-owner user's normal use mobile phone.
In one embodiment, such as in the present embodiment, the abnormal start is included after passing through Macintosh factory reset First power on and brush machine after first power on, it is described guiding SCN subscriber connection network be in order to ensuing account verify provide net Network environment, wherein, connected in this embodiment by WIFI, also include other internetwork connection modes certainly, herein no longer Repeat.
First acquisition unit 320, if for detecting that the mobile terminal has connected network, acquisition is stored in advance in non-easy Loss protection data in the place of safety of the property lost memory, wherein, the protection data of losing include losing defencive function switch Data and account checking data.
Specifically, the place of safety of the nonvolatile memory is RPMB (Replay Protected Memory Block), the RPMB is stored with the loss defencive function switch data for realizing the present invention and account checking data, is eMMC The subregion come is individually marked on (Embedded Multi Media Card), for depositing some special need to system Authorize the data that can just conduct interviews, thus user's force revert Default Value or brush machine can not also delete be stored in it is described Data in RPMB, and the access interface of the RPMB is performed below in TEE security contexts, due to TEE secure execution environments Common software attacks can be prevented, while RPMB can effectively prevent hardware attack, be effectively guaranteed the security of data, In the present embodiment, it is described lose defencive function switch data be the loss defencive function that is set before hand-set from stolen of owner open or The burst of data that person closes.
Judging unit 330, for judging whether the mobile terminal is opened according to the loss defencive function switch data Loss defencive function.
Specifically, if the loss defencive function data judge that mobile phone opens loss defencive function, then held to open Row next step, if the loss defencive function data judge that mobile phone does not open loss defencive function, then normally to close Start, thus user have to open lose defencive function switch could realize it is antitheft.
Account authentication unit 340, the information for calling the account checking data and being inputted according to user carry out account Number checking.
Account checking interface has been entered after mobile phone extremely start, has prompted user to input account number cipher, now only gathers around The owner for having password could realize the normal use of mobile phone, rather than owner do not have account number cipher so as to can not normal use mobile phone, It can not also be used even if mobile phone is had, become waste product equivalent to mobile phone.
Further, in one embodiment, such as in this implementation, as shown in fig. 7, the account authentication unit 340 includes Call unit 341, Tip element 342, transmitting element 343 and receiving unit 344.
Call unit 341, for call be stored in cloud account in the place of safety of the nonvolatile memory and with General unique identifier corresponding to the cloud account.
In one embodiment, such as in this implementation, the cloud account is cell-phone number, and the cloud account is owner in mobile phone quilt The cloud account of preceding mobile telephone registration is stolen, is stored in corresponding to cloud account and is backed up on server, the cell-phone number and described is led to A unique account on the server is can determine that with unique identifier.
Tip element 342, for showing the cloud account and prompting user to input password.
In one embodiment, such as in this implementation, the cloud account is shown after start connects network, and prompt input pair The password answered.
Transmitting element 343, if the password for receiving user's input, the password that user is inputted and the account Checking data are sent to server end to carry out account checking.
In one embodiment, such as in the present embodiment, after owner inputs password, password is sent to service by network Device end, verified with owner's backup in the account number cipher of server end.
Receiving unit 344, the result returned for receiving the server end.
In one embodiment, such as in the present embodiment, after the server end checking password, the mobile terminal passes through net The result that network the reception server end returns, if the result is verified for account, normal boot-strap.
Returning unit 350, if being not up to preset times for the number that account checking does not pass through, return to the unit 340 to call account checking data to carry out account checking again.If reaching preset times, mobile terminal can be entered to advance The protection of one step, such as cause mobile terminal to enter lock machine state.
In one embodiment, such as in the present embodiment, if the account is verified, it was demonstrated that it is that owner is using, mobile phone Normal boot-strap, if account checking not by and the number that does not pass through within preset times, return continues account Checking, so that non-owner can not normal use mobile phone.
Generally, owner is substantially all can input proper password so as to normally start hand within preset times Machine, rather than owner are difficult then that correct password is inputted within preset times, in order to further prevent non-owner from using mobile phone, In the case that the number that the checking does not pass through reaches preset times, into lock machine state, such as forbid user in preset duration Interior progress account verification operation.
The embodiments of the invention provide a kind of loss guard method of mobile terminal, is connected after mobile terminal extremely start Network, obtain and lose protection data to judge whether mobile terminal opens loss defencive function, if opening loss protection work( Account checking data can be then called to carry out account checking, the password for sending user's input is verified to server end, according to The result that the reception server end returns opens mobile terminal, can be forced into account in the case of improper start Checking, effectively prevent non-owner normal use mobile phone in the case where starting shooting extremely.
Another embodiment of the present invention also provides a kind of terminal, and the terminal includes being used for the unit for performing the above method.The end End 400 includes but is not limited to smart mobile phone (such as Android phone, IOS mobile phones), tablet personal computer or Intelligent worn device etc.. Specifically, referring to Fig. 8, Fig. 8 is a kind of schematic block diagram of terminal provided in an embodiment of the present invention.The terminal of the present embodiment includes: Networking unit 410, first acquisition unit 420, the first judging unit 430, account authentication unit 440, the second judging unit 450, 3rd judging unit 460 and lock machine unit 470.
Networking unit 410, if for detecting that the mobile terminal is started shooting extremely, remind SCN subscriber connection network.
Generally, the non-owner user of screen-lock password limitation is had after hand-set from stolen number and uses mobile phone, but can not be limited Make non-owner user and factory reset or reach the situation of normal use mobile phone by brush machine by force, therefore the present invention is in hand Abnormal start detection is carried out when machine is started shooting, fundamentally prevents non-owner user's normal use mobile phone.
In one embodiment, such as in the present embodiment, the abnormal start is included after passing through Macintosh factory reset First power on and brush machine after first power on, it is described guiding SCN subscriber connection network be in order to ensuing account verify provide net Network environment, wherein, connected in this embodiment by WIFI, also include other internetwork connection modes certainly, herein no longer Repeat.
First acquisition unit 420, if for detecting that the mobile terminal has connected network, acquisition is stored in advance in non-easy Loss protection data in the place of safety of the property lost memory, wherein, the protection data of losing include losing defencive function switch Data and account checking data.
Specifically, the place of safety of the nonvolatile memory is RPMB (Replay Protected Memory Block), the RPMB is stored with the loss defencive function switch data for realizing the present invention and account checking data, is eMMC The subregion come is individually marked on (Embedded Multi Media Card), for depositing some special need to system Authorize the data that can just conduct interviews, thus user's force revert Default Value or brush machine can not also delete be stored in it is described Data in RPMB, and the access interface of the RPMB is performed below in TEE security contexts, due to TEE secure execution environments Common software attacks can be prevented, while RPMB can effectively prevent hardware attack, be effectively guaranteed the security of data, In the present embodiment, it is described lose defencive function switch data be the loss defencive function that is set before hand-set from stolen of owner open or The burst of data that person closes.
First judging unit 430, for whether judging the mobile terminal according to the loss defencive function switch data Open loss defencive function.
Specifically, if the loss defencive function data judge that mobile phone opens loss defencive function, then held to open Row next step, if the loss defencive function data judge that mobile phone does not open loss defencive function, then normally to close Start, thus user have to open lose defencive function switch could realize it is antitheft.
Account authentication unit 440, the information for calling the account checking data and being inputted according to user carry out account Number checking.
Account checking interface has been entered after mobile phone extremely start, has prompted user to input account number cipher, now only gathers around The owner for having password could realize the normal use of mobile phone, rather than owner do not have account number cipher so as to can not normal use mobile phone, It can not also be used even if mobile phone is had, become waste product equivalent to mobile phone.
Further, in one embodiment, such as in this implementation, as shown in figure 9, the account authentication unit 440 includes Call unit 441, Tip element 442, the first transmitting element 443, the second transmitting element 444, the 3rd transmitting element 445 and connect Receive unit 446.
Call unit 441, for call be stored in cloud account in the place of safety of the nonvolatile memory and with General unique identifier corresponding to the cloud account.
In one embodiment, such as in this implementation, the cloud account is cell-phone number, and the cloud account is owner in mobile phone quilt The cloud account of preceding mobile telephone registration is stolen, is stored in corresponding to cloud account and is backed up on server, the cell-phone number and described is led to A unique account on the server is can determine that with unique identifier.
Tip element 442, for showing the cloud account and prompting user to input password.
In one embodiment, such as in this implementation, the cloud account is shown after start connects network, and prompt input pair The password answered.
First transmitting element 443, if the password for receiving user's input, the password that user is inputted and described Account checking data are sent to server end to carry out account checking.
In one embodiment, such as in the present embodiment, after owner inputs password, password is sent to service by network Device end, verified with owner's backup in the account number cipher of server end.
Second transmitting element 444, if for detecting that user triggers the default request that forgets Password, by it is described forget it is close Code request and the account checking data be sent to server end, as the server end forgotten Password according to ask with And the account checking data send corresponding identifying code to another terminal bound in advance.
3rd transmitting element 445, if inputting the identifying code for receiving user, the identifying code is sent to service Device end, verify that data and the identifying code carry out account checking according to the account by the server end.
Receiving unit 446, the result returned for receiving the server end.
In one embodiment, such as in the present embodiment, generally, owner can be by inputting password come normally-open Mobile phone, but in the case where owner have forgotten password, can be by forgetting Password come normally-open mobile phone.User, which clicks on, to be forgotten Password, sent by network and forget Password request and the account verifies that data arrive server end, account checking data and The account checking data of above-described embodiment are identical, and the received server-side asks what backward owner pre-set to forgetting Password Safe mobile phone sends checking short message, the checking in the checking short message received by the safe mobile phone in the case of owner's use Code is input to that mobile phone is normally-open, rather than owner because of the identifying code of no checking short message can not normal use mobile phone, Identifying code is obtained by other manners such as mails it is understood that can also be certainly, will not be repeated here.
Second judging unit 450, for judging whether the result passes through.
3rd judging unit 460, if being that account is verified not by judging the result for the result Occur whether the number that account checking does not pass through reaches preset times, if not up to preset times, return to the unit 440 with again It is secondary to call the account checking data to carry out account checking.
In one embodiment, such as in the present embodiment, if the account is verified, it was demonstrated that it is that owner is using, mobile phone Normal boot-strap, if account checking not by and the number that does not pass through within preset times, then return and continue account Checking, so that non-owner can not normal use mobile phone.
Generally, owner is substantially all can input proper password so as to normally start hand within preset times Machine, rather than owner are difficult then that correct password is inputted within preset times, in order to further prevent non-owner from using mobile phone, In the case that the number that the checking does not pass through reaches preset times, into lock machine state.
Lock machine unit 470, if reaching preset times for the number that account checking does not pass through, into lock machine state.
In one embodiment, such as in the present embodiment, the lock machine state includes:User is forbidden to be carried out in preset duration Account verification operation, in order to help owner's getting back mobile phone, as shown in Figure 10, the lock machine unit 470 also includes second and obtains list The transmitting element 472 of member 471 and the 4th.
Second acquisition unit 471, the geographical position for mobile terminal described in dynamic access.
4th transmitting element 472, for sending the geographical position to server end, by the server end by described Reason position is sent to another terminal bound in advance
In one embodiment, such as in the present embodiment, substantially confirm that non-owner is using after lock machine state is entered Mobile phone, in order to help owner to give the mobile phone of loss for change, in preset duration mobile phone forbid carry out account verification operation, non-owner without The normally-open mobile phone of method, strive for the time for owner's getting back mobile phone, in the present embodiment, the preset duration is 24 hours, when So in other embodiments, the preset duration is alternatively other any durations, passes through dynamic access after lock machine state is entered The current geographic position of mobile phone, and the current geographic position of mobile phone is sent to by network by server end, then by server end The current geographic position of mobile phone is sent to the safe mobile phone that owner pre-sets, so as to help owner to give the mobile phone of loss for change.
The embodiments of the invention provide a kind of loss guard method of mobile terminal, is connected after mobile terminal extremely start Network, obtain and lose protection data to judge whether mobile terminal opens loss defencive function, if opening loss protection work( It can then call account checking data to carry out account checking, service is arrived by sending the request that forgets Password when owner forgets Password Device end, the identifying code of the default safe mobile phone of owner is returned to according to server end to open mobile terminal, can be improper Account checking is forced into the case of start, mobile phone is opened by forgetting Password when owner forgets Password, effectively prevents Only non-owner normal use mobile phone in the case where starting shooting extremely.
Referring to Figure 11, Figure 11 is a kind of terminal schematic block diagram that another embodiment of the present invention provides.This reality as depicted Applying the terminal in example can include:One or more processors 801;One or more input equipments 802, one or more output Equipment 803 and memory 804.Above-mentioned processor 801, input equipment 802, output equipment 803 and memory 804 pass through bus 805 connections.Memory 802 is used to store computer program, and the computer program includes programmed instruction, and processor 801 is used for Perform the programmed instruction that memory 802 stores.
Wherein, processor 801 is arranged to call described program instruction to perform:If detecting, the mobile terminal is abnormal Start, remind SCN subscriber connection network;If detecting, the mobile terminal has connected network, and acquisition is stored in advance in non-volatile deposit In the place of safety of reservoir loss protection data, wherein, it is described lose protection data include lose defencive function switch data and Account verifies data;Judge whether the mobile terminal opens loss protection work(according to the loss defencive function switch data Energy;The information called the account checking data and inputted according to user carries out account checking;If the account checking is obstructed The number crossed is not up to preset times, returns to described the step of calling the account checking data to carry out account checking.
In one embodiment, such as in the present embodiment, processor 801 is performing the calling described above account checking number When the information inputted according to and according to user carries out account checking, following program is specifically performed:Calling is stored in described non-volatile Cloud account and general unique identifier corresponding with the cloud account in the place of safety of property memory;Show the cloud account And user is prompted to input password;If receiving the password of user's input, the password that user is inputted and account checking Data are sent to server end to carry out account checking;Receive the result that the server end returns.
In one embodiment, such as in the present embodiment, processor 801 is performing the display described above cloud account and carried Show that user is inputted after password, also perform following program:If detecting, user triggers the default request that forgets Password, by described in Forget Password request and the account checking data be sent to server end, forgotten Password as the server end according to Request and account checking data send corresponding identifying code to another terminal bound in advance;If it is defeated to receive user Enter the identifying code, the identifying code be sent to server end, by the server end according to the account verify data with And the identifying code carries out account checking;Receive the result that the server end returns.
In one embodiment, such as in the present embodiment, processor 801 also performs following journey after said procedure is performed Sequence:If the number that the account checking does not pass through reaches preset times, into lock machine state, the lock machine state includes:Forbid User carries out account verification operation in preset duration.
In one embodiment, such as in the present embodiment, processor 801 is specific to perform such as when performing above-mentioned lock machine state Lower program:The geographical position of mobile terminal described in dynamic access;The geographical position is sent to server end, by the server End sends in the geographical position to another terminal bound in advance.
It should be appreciated that in embodiments of the present invention, alleged processor 801 can be CPU (Central Processing Unit, CPU), the processor can also be other general processors, digital signal processor (Digital Signal Processor, DSP), application specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other FPGAs Device, discrete gate or transistor logic, discrete hardware components etc..General processor can be microprocessor or this at It can also be any conventional processor etc. to manage device.
Input equipment 802 can include Trackpad, fingerprint adopt sensor (finger print information that is used to gathering user and fingerprint Directional information), microphone etc., output equipment 803 can include display (LCD etc.), loudspeaker etc..
The memory 804 can include read-only storage and random access memory, and to processor 801 provide instruction and Data.The a part of of memory 804 can also include nonvolatile RAM.For example, memory 804 can also be deposited Store up the information of device type.
In the specific implementation, processor 801, input equipment 802, the output equipment 803 described in the embodiment of the present invention can Perform institute in the first embodiment and second embodiment of a kind of loss guard method of mobile terminal provided in an embodiment of the present invention The implementation of description, the implementation of the terminal described by the embodiment of the present invention is also can perform, will not be repeated here.
A kind of computer-readable recording medium, the computer-readable storage medium are provided in another embodiment of the invention Matter is stored with computer program, and the computer program includes programmed instruction, and described program instruction is realized when being executed by processor: If detecting, the mobile terminal is started shooting extremely, reminds SCN subscriber connection network;If detecting, the mobile terminal has connected network, The loss protection data being stored in advance in the place of safety of nonvolatile memory are obtained, wherein, it is described to lose protection packet Include and lose defencive function switch data and account checking data;The movement is judged according to the loss defencive function switch data Whether terminal opens loss defencive function;The information called the account checking data and inputted according to user carries out account Checking;If the number that the account checking does not pass through is not up to preset times, returns to the calling account checking data and enter The step of row account is verified.
In one embodiment, implemented when the programmed instruction is executed by processor:Calling is stored in described non-volatile Cloud account and general unique identifier corresponding with the cloud account in the place of safety of memory;Show the cloud account simultaneously User is prompted to input password;If receiving the password of user's input, the password that user is inputted and account checking number According to server end is sent to carry out account checking;Receive the result that the server end returns.
In one embodiment, implemented when the programmed instruction is executed by processor:If it is default to detect that user triggers The request that forgets Password, by it is described forget Password request and the account checking data be sent to server end, by the clothes Business device end forgets Password request according to and the account verifies that data send corresponding identifying code to binding in advance Another terminal;If receiving user inputs the identifying code, the identifying code is sent to server end, by the server end Verify that data and the identifying code carry out account checking according to the account;Receive the checking knot that the server end returns Fruit.
In one embodiment, implemented when the programmed instruction is executed by processor:If what the account checking did not passed through Number reaches preset times, and into lock machine state, the lock machine state includes:Forbid user to carry out account in preset duration to test Card operation.
In one embodiment, implemented when the programmed instruction is executed by processor:Mobile terminal described in dynamic access Geographical position;The geographical position is sent to server end, is sent in the geographical position to tying up in advance by the server end Fixed another terminal.
The computer-readable recording medium can be the internal storage unit of the terminal described in foregoing any embodiment, example Such as the hard disk or internal memory of terminal.The computer-readable recording medium can also be the External memory equipment of the terminal, such as The plug-in type hard disk being equipped with the terminal, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card) etc..Further, the computer-readable recording medium can also be wrapped both Including the internal storage unit of the terminal also includes External memory equipment.The computer-readable recording medium is described for storing Other programs and data needed for computer program and the terminal.The computer-readable recording medium can be also used for temporarily When store the data that has exported or will export.
Those of ordinary skill in the art are it is to be appreciated that the list of each example described with reference to the embodiments described herein Member and algorithm steps, it can be realized with electronic hardware, computer software or the combination of the two, in order to clearly demonstrate hardware With the interchangeability of software, the composition and step of each example are generally described according to function in the above description.This A little functions are performed with hardware or software mode actually, application-specific and design constraint depending on technical scheme.Specially Industry technical staff can realize described function using distinct methods to each specific application, but this realization is not It is considered as beyond the scope of this invention.
It is apparent to those skilled in the art that for convenience of description and succinctly, the end of foregoing description End and the specific work process of unit, may be referred to the corresponding process in preceding method embodiment, will not be repeated here.
In several embodiments provided herein, it should be understood that disclosed terminal and method, it can be passed through Its mode is realized.For example, device embodiment described above is only schematical, for example, the division of the unit, only Only a kind of division of logic function, there can be other dividing mode when actually realizing, such as multiple units or component can be tied Another system is closed or is desirably integrated into, or some features can be ignored, or do not perform.In addition, shown or discussed phase Coupling or direct-coupling or communication connection between mutually can be INDIRECT COUPLING or the communication by some interfaces, device or unit Connection or electricity, the connection of mechanical or other forms.
The unit illustrated as separating component can be or may not be physically separate, show as unit The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected to realize scheme of the embodiment of the present invention according to the actual needs Purpose.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, can also It is that unit is individually physically present or two or more units are integrated in a unit.It is above-mentioned integrated Unit can both be realized in the form of hardware, can also be realized in the form of SFU software functional unit.
If the integrated unit is realized in the form of SFU software functional unit and is used as independent production marketing or use When, it can be stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially The part to be contributed in other words to prior art, or all or part of the technical scheme can be in the form of software product Embody, the computer software product is stored in a storage medium, including some instructions are causing a computer Equipment (can be personal computer, server, or network equipment etc.) performs the complete of each embodiment methods described of the present invention Portion or part steps.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey The medium of sequence code.
The foregoing is only a specific embodiment of the invention, but protection scope of the present invention is not limited thereto, any Those familiar with the art the invention discloses technical scope in, various equivalent modifications can be readily occurred in or replaced Change, these modifications or substitutions should be all included within the scope of the present invention.Therefore, protection scope of the present invention should be with right It is required that protection domain be defined.

Claims (10)

  1. A kind of 1. loss guard method of mobile terminal, it is characterised in that including:
    If detecting, the mobile terminal is started shooting extremely, reminds SCN subscriber connection network;
    If detecting, the mobile terminal has connected network, and acquisition is stored in advance in losing in the place of safety of nonvolatile memory Protection data are lost, wherein, the protection data of losing include losing defencive function switch data and account checking data;
    Judge whether the mobile terminal opens loss defencive function according to the loss defencive function switch data;
    The information called the account checking data and inputted according to user carries out account checking;
    If the number that the account checking does not pass through is not up to preset times, returns to the calling account checking data and carry out The step of account is verified.
  2. 2. the loss guard method of mobile terminal according to claim 1, it is characterised in that described to call the account to test Card data and the information progress account checking inputted according to user, including:
    Call and be stored in cloud account in the place of safety of the nonvolatile memory and corresponding general with the cloud account Unique identifier;
    Show the cloud account and prompt user to input password;
    If receiving the password of user's input, the password that user is inputted and account checking data are sent to server Hold to carry out account checking;
    Receive the result that the server end returns.
  3. 3. the loss guard method of mobile terminal according to claim 2, it is characterised in that the display cloud account And prompt user to input after password, in addition to:
    If detecting, user triggers the default request that forgets Password, by request and the account checking number of forgetting Password According to being sent to server end, request and account checking data are forgotten Password according to as the server end will be corresponding Identifying code send to another terminal bound in advance;
    If receiving user inputs the identifying code, the identifying code is sent to server end, by the server end according to The account checking data and the identifying code carry out account checking;
    Receive the result that the server end returns.
  4. 4. the loss guard method of mobile terminal according to claim 1, it is characterised in that methods described also includes:If The number that the account checking does not pass through reaches preset times, and into lock machine state, the lock machine state includes:User is forbidden to exist Account verification operation is carried out in preset duration.
  5. 5. the loss guard method of mobile terminal according to claim 4, it is characterised in that the lock machine state is also wrapped Include:
    The geographical position of mobile terminal described in dynamic access;
    The geographical position is sent to server end, is sent in the geographical position to what is bound in advance by the server end another One terminal.
  6. 6. the loss guard method of mobile terminal according to claim 1, it is characterised in that the abnormal start includes logical Cross first powering on after first powering on after Macintosh factory reset and brush machine.
  7. 7. the loss guard method of mobile terminal according to claim 1, it is characterised in that the nonvolatile memory Place of safety be RPMB.
  8. 8. a kind of terminal, it is characterised in that including the list for performing the method as described in claim 1-7 any claims Member.
  9. 9. a kind of terminal, it is characterised in that the processor, defeated including processor, input equipment, output equipment and memory Enter equipment, output equipment and memory to be connected with each other, wherein, the memory is used for store program codes, the processor quilt It is configured to call described program instruction, performs the loss guard method of the mobile terminal as described in claim any one of 1-7.
  10. A kind of 10. computer-readable recording medium, it is characterised in that the computer-readable storage medium is stored with computer program, The computer program includes programmed instruction, and described program instruction makes the computing device such as right when being executed by a processor It is required that the method described in any one of 1-7.
CN201711016018.0A 2017-10-25 2017-10-25 Loss guard method, terminal and the computer-readable recording medium of mobile terminal Withdrawn CN107734176A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711016018.0A CN107734176A (en) 2017-10-25 2017-10-25 Loss guard method, terminal and the computer-readable recording medium of mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711016018.0A CN107734176A (en) 2017-10-25 2017-10-25 Loss guard method, terminal and the computer-readable recording medium of mobile terminal

Publications (1)

Publication Number Publication Date
CN107734176A true CN107734176A (en) 2018-02-23

Family

ID=61213855

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711016018.0A Withdrawn CN107734176A (en) 2017-10-25 2017-10-25 Loss guard method, terminal and the computer-readable recording medium of mobile terminal

Country Status (1)

Country Link
CN (1) CN107734176A (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109005543A (en) * 2018-09-03 2018-12-14 上海欣方智能系统有限公司 A kind of system and method used based on IMEI limitation mobile phone
CN109245960A (en) * 2018-09-27 2019-01-18 平安普惠企业管理有限公司 Test terminal management method and system
CN110099164A (en) * 2019-03-28 2019-08-06 华为终端有限公司 The method and terminal given for change for lost terminal
CN110134545A (en) * 2019-04-03 2019-08-16 上海交通大学 The method and system of the virtual NVRAM of offer based on credible performing environment
CN110598384A (en) * 2019-09-16 2019-12-20 Oppo(重庆)智能科技有限公司 Information protection method, information protection device and mobile terminal
CN110851881A (en) * 2019-10-31 2020-02-28 成都欧珀通信科技有限公司 Security detection method and device for terminal equipment, electronic equipment and storage medium
CN111542047A (en) * 2020-03-30 2020-08-14 宇龙计算机通信科技(深圳)有限公司 Data uploading method and device, storage medium and related equipment
US20220229898A1 (en) * 2020-07-14 2022-07-21 Bank Of America Corporation Tamper-evident devices equipped with secure re-image file(s)
CN115037453A (en) * 2021-11-19 2022-09-09 荣耀终端有限公司 Data protection method and system and electronic equipment
CN115103055A (en) * 2022-06-17 2022-09-23 度小满科技(北京)有限公司 Loss processing method and device, mobile terminal and readable storage medium
WO2023124811A1 (en) * 2021-12-31 2023-07-06 中兴通讯股份有限公司 Security check method for mobile terminal, and mobile terminal and computer-readable storage medium
WO2023131209A1 (en) * 2022-01-10 2023-07-13 荣耀终端有限公司 Anti-theft method for terminal, and terminal device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101287234A (en) * 2008-05-26 2008-10-15 德信无线通讯科技(北京)有限公司 Anti-theft method and device for mobile communication terminal
CN101969493A (en) * 2010-10-28 2011-02-09 深圳市五巨科技有限公司 Anti-theft method and device for mobile terminal
US8172672B2 (en) * 2008-03-14 2012-05-08 Universal Entertainment Corproation Game judgment system
CN105868645A (en) * 2015-12-14 2016-08-17 乐视移动智能信息技术(北京)有限公司 Unlocking method and apparatus for losing locking state of mobile terminal
CN106470269A (en) * 2015-08-20 2017-03-01 腾讯科技(深圳)有限公司 A kind of method and apparatus of antitheft mobile phone

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8172672B2 (en) * 2008-03-14 2012-05-08 Universal Entertainment Corproation Game judgment system
CN101287234A (en) * 2008-05-26 2008-10-15 德信无线通讯科技(北京)有限公司 Anti-theft method and device for mobile communication terminal
CN101969493A (en) * 2010-10-28 2011-02-09 深圳市五巨科技有限公司 Anti-theft method and device for mobile terminal
CN106470269A (en) * 2015-08-20 2017-03-01 腾讯科技(深圳)有限公司 A kind of method and apparatus of antitheft mobile phone
CN105868645A (en) * 2015-12-14 2016-08-17 乐视移动智能信息技术(北京)有限公司 Unlocking method and apparatus for losing locking state of mobile terminal

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109005543A (en) * 2018-09-03 2018-12-14 上海欣方智能系统有限公司 A kind of system and method used based on IMEI limitation mobile phone
CN109005543B (en) * 2018-09-03 2021-06-01 上海欣方智能系统有限公司 System and method for limiting mobile phone use based on IMEI
CN109245960A (en) * 2018-09-27 2019-01-18 平安普惠企业管理有限公司 Test terminal management method and system
CN110099164A (en) * 2019-03-28 2019-08-06 华为终端有限公司 The method and terminal given for change for lost terminal
CN110134545B (en) * 2019-04-03 2020-12-22 上海交通大学 Method and system for providing virtual NVRAM based on trusted execution environment
CN110134545A (en) * 2019-04-03 2019-08-16 上海交通大学 The method and system of the virtual NVRAM of offer based on credible performing environment
CN110598384A (en) * 2019-09-16 2019-12-20 Oppo(重庆)智能科技有限公司 Information protection method, information protection device and mobile terminal
CN110598384B (en) * 2019-09-16 2022-02-22 Oppo(重庆)智能科技有限公司 Information protection method, information protection device and mobile terminal
CN110851881A (en) * 2019-10-31 2020-02-28 成都欧珀通信科技有限公司 Security detection method and device for terminal equipment, electronic equipment and storage medium
CN111542047A (en) * 2020-03-30 2020-08-14 宇龙计算机通信科技(深圳)有限公司 Data uploading method and device, storage medium and related equipment
US20220229898A1 (en) * 2020-07-14 2022-07-21 Bank Of America Corporation Tamper-evident devices equipped with secure re-image file(s)
US11748470B2 (en) * 2020-07-14 2023-09-05 Bank Of America Corporation Tamper-evident devices equipped with secure re-image file(s)
CN115037453A (en) * 2021-11-19 2022-09-09 荣耀终端有限公司 Data protection method and system and electronic equipment
WO2023124811A1 (en) * 2021-12-31 2023-07-06 中兴通讯股份有限公司 Security check method for mobile terminal, and mobile terminal and computer-readable storage medium
WO2023131209A1 (en) * 2022-01-10 2023-07-13 荣耀终端有限公司 Anti-theft method for terminal, and terminal device
CN115103055A (en) * 2022-06-17 2022-09-23 度小满科技(北京)有限公司 Loss processing method and device, mobile terminal and readable storage medium
CN115103055B (en) * 2022-06-17 2023-10-03 度小满科技(北京)有限公司 Loss processing method, loss processing device, mobile terminal and readable storage medium

Similar Documents

Publication Publication Date Title
CN107734176A (en) Loss guard method, terminal and the computer-readable recording medium of mobile terminal
US11394555B2 (en) Mobile terminal privacy protection method and protection apparatus, and mobile terminal
US9826093B2 (en) Mobile terminal calling request message processing method, device and system
CN104601324B (en) A kind of verification method, terminal and system for application
CN103577750B (en) Privacy authority management method and device
EP2562673A1 (en) Apparatus and method for securing mobile terminal
CN106357672B (en) A kind of login method and terminal
CN106534572A (en) Information display method and device and terminal
CN103095457A (en) Login and verification method for application program
CN107086984A (en) A kind of method, terminal and server for obtaining and generating identifying code
CN103971048B (en) A kind of method and its password input system for inputting password
CN107466031A (en) A kind of method and terminal for protecting data
CN106845181A (en) The acquisition methods and electronic equipment of a kind of password
CN107085791A (en) A kind of electric paying method and terminal
CN107358114A (en) A kind of method and terminal for preventing user data loss
CN103036852B (en) A kind of method and device realizing network entry
CN106790926A (en) A kind of contact management method and terminal
CN107729781A (en) The anti-lost method of mobile terminal, mobile terminal and computer-readable recording medium
CN103269402A (en) System and method for protecting mobile phone privacy
CN104853030B (en) The method and mobile terminal of a kind of information processing
CN110855833A (en) Terminal retrieving method and device, terminal and storage medium
CN107370872A (en) Method, terminal and the control device of a kind of terminal lock machine and control terminal lock machine
CN106453057B (en) A kind of method and terminal for preventing short message to be stolen
CN104796877B (en) The method and apparatus that a kind of anti-malice is deducted fees
CN106503570A (en) The method and device of protection Root authority

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20180223