CN107948390A - The guard method of user data and mobile terminal - Google Patents
The guard method of user data and mobile terminal Download PDFInfo
- Publication number
- CN107948390A CN107948390A CN201711204387.2A CN201711204387A CN107948390A CN 107948390 A CN107948390 A CN 107948390A CN 201711204387 A CN201711204387 A CN 201711204387A CN 107948390 A CN107948390 A CN 107948390A
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- user data
- user
- destination mobile
- abnormal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
- H04M1/67—Preventing unauthorised calls from a telephone set by electronic means
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72484—User interfaces specially adapted for cordless or mobile telephones wherein functions are triggered by incoming communication events
Abstract
Guard method and mobile terminal the invention discloses a kind of user data, the described method includes:Destination mobile terminal receives the solicited message sent by the first mobile terminal;When the character string in the solicited message includes default PIN code, the destination mobile terminal obtain prestore with the associated lock instruction of the solicited message;Destination mobile terminal performs the lock instruction and the SIM card in the destination mobile terminal is locked.The present invention can protect the user data in the mobile terminal, avoid user data from revealing after user's lost mobile terminal.Further, user can also recover the mobile terminal by these protected user data, avoid property loss.
Description
Technical field
The present invention relates to guard method and the mobile terminal of field of terminal, more particularly to a kind of user data.
Background technology
The intelligent terminals such as mobile phone are the instruments that user is commonly used, or even become the essential daily necessities of user.
By these intelligent terminals, the behaviors such as user can be linked up, be consumed, communicated, meanwhile, these behaviors also represent number of users
According to track.
As intelligent terminal caused by user's life and other various aspects to changing, between people and intelligent terminal
Relation it is even closer, intelligent terminal can also be recorded the data of each side of user behavior, so that more convenient user
Use.Once intelligent terminal is lost, in addition to property loss is faced, the data of user are stolen and also user can be brought user
More serious influence.Therefore, the security for the user data that the security of intelligent terminal, especially intelligent terminal are recorded is right
Ever more important for user.
Therefore, the not compromised method of user data can be protected after intelligent terminal loss there is an urgent need for one kind.
The content of the invention
The purpose of the embodiment of the present invention is to provide guard method and the mobile terminal of a kind of user data, to solve intelligence eventually
The problem of end protects user data not compromised after being lost by user.
In order to solve the above-mentioned technical problem, the present invention is realized in:
First aspect, there is provided a kind of guard method of user data, the described method includes:
Destination mobile terminal receives the solicited message sent by the first mobile terminal;
When the character string in the solicited message includes default PIN code, the destination mobile terminal is obtained and deposited in advance
Storage with the associated lock instruction of the solicited message;
Destination mobile terminal performs the lock instruction and the SIM card in the destination mobile terminal is locked.
Second aspect, there is provided a kind of mobile terminal, the mobile terminal include:
Receiving module, for receiving the solicited message sent by the first mobile terminal;
Acquisition module, when including default PIN code for the character string in the solicited message, obtains what is prestored
With the associated lock instruction of the solicited message;
Execution module, locks the SIM card in the mobile terminal for performing the lock instruction.
The third aspect, there is provided a kind of mobile terminal, the mobile terminal include processor, memory and be stored in described deposit
On reservoir and the computer program that can run on the processor, the computer program are realized when being performed by the processor
The step of method as described in relation to the first aspect.
Fourth aspect, there is provided a kind of computer-readable recording medium, meter is stored on the computer-readable recording medium
Calculation machine program, the step of method as described in relation to the first aspect is realized when the computer program is executed by processor.
In embodiments of the present invention, user, can be to loss by the first mobile terminal after destination mobile terminal is lost
Destination mobile terminal send a solicited message, destination mobile terminal when receiving the solicited message, then obtain prestore
With the associated lock instruction of the solicited message, and perform the lock instruction to the user data in lost target mobile terminal
Protected, avoid user data from revealing;First mobile terminal can be the mobile terminal that any user can use, from
And user is set timely to protect the user data in it after destination mobile terminal is lost;Further, user can be with
The destination mobile terminal is recovered by these protected user data, avoids property loss.
Brief description of the drawings
Attached drawing described herein is used for providing a further understanding of the present invention, forms the part of the present invention, this hair
Bright schematic description and description is used to explain the present invention, does not form inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is the flow chart of the guard method of user data according to an embodiment of the invention;
Fig. 2 is the flow chart of the guard method of user data according to another embodiment of the present invention;
Fig. 3 is the flow chart of the guard method of user data according to yet another embodiment of the invention;
Fig. 4 is the structure diagram of mobile terminal according to an embodiment of the invention;
Fig. 5 is the structure diagram of mobile terminal according to another embodiment of the present invention;
Fig. 6 is the structure diagram of mobile terminal according to yet another embodiment of the invention;
Fig. 7 is the structure diagram of mobile terminal according to yet another embodiment of the invention;
Fig. 8 is the structure diagram of mobile terminal according to yet another embodiment of the invention.
Embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with the specific embodiment of the invention and
Technical solution of the present invention is clearly and completely described in corresponding attached drawing.Obviously, described embodiment is only the present invention one
Section Example, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not doing
Go out all other embodiments obtained under the premise of creative work, belong to the scope of protection of the invention.
Fig. 1 shows the flow chart of the guard method of user data according to an embodiment of the invention.As shown in Figure 1, should
Method includes:
Step 102, destination mobile terminal receives the solicited message sent by the first mobile terminal.
Wherein, destination mobile terminal can be detected all information from exterior terminal or server, including come
Short message, social information from exterior terminal etc., the information such as sent by wechat, QQ or other application program, or receive
Short message.It is understood that exterior terminal can be the smart machines such as another mobile phone.
Step 104, when the character string in solicited message includes default PIN code, destination mobile terminal is obtained and deposited in advance
Storage with the associated lock instruction of solicited message.
Solicited message is needed with uniqueness, its can be at least one of default PIN code, cell-phone number or account or
At least one combination.PIN code can be the PIN code of the SIM card in destination mobile terminal, and cell-phone number can be that target movement is whole
Cell-phone number used in end.Destination mobile terminal detection receives the default solicited message that exterior terminal or server are sent
When, the uniqueness based on the solicited message, destination mobile terminal can perform and the associated lock instruction of the solicited message.Can be with
Understand, which is necessarily performed by destination mobile terminal is used to protect the user data in it.
Step 106, destination mobile terminal performs lock instruction and the SIM card in destination mobile terminal is locked.
In the present embodiment, lock instruction can be the instruction for the SIM card in lock onto target mobile terminal, perform locking
Instruction then can avoid user from taking out from lost target mobile terminal the SIM card for his use with locking SIM card, to
Family impacts.
In embodiments of the present invention, user, can be to loss by the first mobile terminal after destination mobile terminal is lost
Destination mobile terminal send a solicited message, destination mobile terminal when receiving the solicited message, then obtain prestore
With the associated lock instruction of the solicited message, and perform the lock instruction to the user data in lost target mobile terminal
Protected, avoid user data from revealing;First mobile terminal can be the mobile terminal that any user can use, from
And user is set timely to protect the user data in it after destination mobile terminal is lost;Further, user can be with
The destination mobile terminal is recovered by these protected user data, avoids property loss.
In one implementation of the present embodiment, destination mobile terminal performs lock instruction and the SIM card in it is locked
While, a random code for being used to release the lock instruction can be returned to the first mobile terminal, which can be that target is moved
The PIN code of dynamic terminal-pair SIM card modify after PIN code.
Fig. 2 shows the flow chart of the guard method of user data according to another embodiment of the present invention.As shown in Fig. 2,
This method further includes:
Step 107, destination mobile terminal receives locking of the random code releasing to SIM card.
For example, after user sends a solicited message by another mobile terminal to lost target mobile terminal, lose
Destination mobile terminal can return to the random code to the mobile terminal that user uses, herein, which is lost target
PIN code after the former PIN code of mobile terminal modification SIM card.The uniqueness of the random code, ensure that the SIM card will not be removed
With used for other purposes, to prevent the property to user from causing damages.
The uniqueness of the random code returned based on lost target mobile terminal, releasing of the user to lock instruction is usually only
There is user just to realize.It will be further understood that if lock instruction is released from, it imply that user has looked for
Lost target mobile terminal is arrived.
Fig. 3 shows the flow chart of the guard method of user data according to yet another embodiment of the invention.As shown in figure 3,
Before step 102, this method further includes:
Step 1011, whether the pre-set user data of destination mobile terminal detection storage inside are abnormal.
User data can be various data, including the data for unlock, such as unlocked by fingerprint data, face unlock data
Deng;For the logon account data of login application program, Alipay, the account data of wechat are such as logged in;User is to mobile terminal
Use data, such as usage time, place;It can also be the image data of view data, such as video camera shooting.Certainly,
User data can also include other forms and species, the present embodiment do not limit specifically herein.
Step 1012, if being abnormal, destination mobile terminal performs protection instruction pair corresponding with the user data
The user data is protected.
In one implementation of the present embodiment, mobile terminal, can be with after the instruction of user data exception starting protection is judged
The testing mechanism to the external information of reception is triggered, which can make destination mobile terminal whole by the first movement to reception
The solicited message that end is sent is detected.
It is appreciated that user, after lost mobile terminal, can not necessarily be sent immediately using another mobile terminal please
Ask information, including user to have no knowledge about having lost, or request can not be sent also without another mobile terminal is obtained after loss
Information.For this reason, the present embodiment can be protected user data while user's lost mobile terminal.
Specifically, after mobile terminal loss, if mobile terminal is operated by other users, user data is inevitably resulted in
Exception, such as the change of finger print data, the modification of the unlocking pattern etc..The abnormal phenomenon of this user data, then can be moved
Detected by terminal, so as to trigger the protection instruction being pre-set in mobile terminal.
Protection instruction can be the combination of one or at least one in screen locking instruction, shutdown command, encrypted instruction etc..Protect
When finger shield order instructs for screen locking, perform screen locking instruction then can carry out screen locking to protect user data to mobile terminal.Protection
Instruct for shutdown command when, then can make to enter shutdown after mobile terminal to lock screen., then can be right when screen locking instruction is encrypted instruction
Corresponding user data is encrypted.Wherein, the purpose for protecting instruction is when mobile terminal is lost, to the user of its inside
Data are protected, and prevent the leakage of user data from being impacted to user.It should be appreciated that protection instruction is not limited to the above
A variety of instruction types and content.
In one implementation of the present embodiment, user data can be stored by default user data record sheet,
I.e. user data can be the data in default user data record sheet.Further, step 1011 can be implemented as:Inspection
Whether the user data surveyed in user data record sheet is abnormal.
In another implementation of the present embodiment, the user data in user data record sheet includes at least user to movement
One or more in the usage time of terminal and place, the user account information of record, associated person information, it should be pointed out that
, the user data in user data record sheet can be used to detect whether exception, so that mobile terminal starting protection
These user data are protected in instruction.
In another implementation of the present embodiment, the user data in user data record sheet is user to mobile terminal
When usage time and place, step 1011 can be implemented as:
Whether destination mobile terminal exceeds the usage time detection screen locking duration of the destination mobile terminal according to user
Preset time period;And/or
Whether destination mobile terminal detection user is default place to the place to use of the destination mobile terminal;
If screen locking duration is not default place beyond preset time period or/and place to use, judgement is abnormal.
User can be the mobile terminal longest screen locking time to the usage time of mobile terminal, or at a certain section
Between in the longest screen locking time, such as in the morning, at night afternoon, screen locking time in different time periods.When in certain corresponding a period of time
Between in section, whether the screen locking duration that can detect mobile terminal exceeds preset time period, so that when judging the screen locking of mobile terminal
Between whether there occurs exception.If abnormal, may imply that the loss of mobile terminal, mobile terminal then perform protection instruct into
Row screen locking etc. operates, to protect user data.
User can be the place that the users such as family, company or park are commonly used to the place to use of mobile terminal.Can
Whether it is default place to the place to use of mobile terminal to detect user, for example, use of the detection user to mobile terminal
Whether place is family, company either these preset locations such as park or whether be in the certain distance of these preset locations, such as
In the range of one kilometer or several kilometers.If non-default place, it imply that mobile terminal may be lost, mobile terminal is then
Perform protection instruction and carry out the operation such as screen locking, to protect user data.
In another implementation of the present embodiment, the user data in user data record sheet is believed for the user account of record
During breath, step 1011 can be implemented as:
Whether destination mobile terminal detection user account signal has increase, deletion or change;
If so, then judge to be abnormal.
The account information of user, including the account letter all for logging in mailbox, Alipay, wechat, microblogging, blog etc.
Breath.What these account informations of usual user were no variation in, therefore, whether detection user, which increases, deletes or have changed, is used for
The account information of login, it can be determined that whether the mobile terminal may be lost.When mobile terminal is lost, these account informations
It is abnormal, then it often imply that mobile terminal is in lost condition.
In another implementation of the present embodiment, the user data in user data record sheet is the associated person information of record
When, step 1011 can be implemented as:
Whether destination mobile terminal detection associated person information has increase or deletion;
If so, then judge to be abnormal.
Associated person information can be the connection in the social softwares such as the associated person information in user's address list or wechat
It is people's information, the present embodiment does not limit specifically herein, within the scope of the present embodiment can be realized.General user's
Big change will not occur for associated person information, therefore, can detect whether associated person information has the operation such as increase or deletion, with
Whether detection associated person information has exception.If exception, then the mobile terminal is likely to be at lost condition, and mobile terminal is then held
Row protection instruction carries out the operation such as screen locking, to protect user data.
It is understood that operation of the user to mobile terminal, the present embodiment allows user data there are some exceptions, preceding
Carry be these extremely be user operation.In this case, then further detection protection refers to the present embodiment the method
Whether order is released from;If protection instruction is released from, abnormal user data is added in user data record sheet.
It is that mobile terminal pair is released by the corresponding operating of user it is understood that to the release operation of protection instruction
The limitation of user right.Specifically, can be the unlock operation to mobile terminal when mobile terminal is in screen lock state,
Such as unlocked by fingerprint, recognition of face unlock, iris unlock., can be to these when the user data in mobile terminal is encrypted
Operation etc. is decrypted in user data.It is understood that these release operations are corresponding to user for releasing mobile terminal
The limitation of authority.Here, the present embodiment will not enumerate.
When mobile terminal receives release operation, for example, fingerprint is matched, then mobile terminal is unlocked, so that
De-preservation instructs.
Here it is to be understood that if protection instruction has a variety of limitations, such as screen locking, encrypt, then in requisition for one
One lifts restrictions.The process to lift restrictions can have corresponding releasing order, can also randomly choose.
If user in itself naturally can normally solve protection instruction the abnormal operation of mobile terminal, user
Remove, mobile terminal can then judge the normal operating that the abnormal operation is user, then be added to the abnormal user data and use
In user data record sheet.
It is pointed out that whether extremely the user's data record sheet can be recycled for detection user data, therefore, can
Normally to be updated to user data record sheet, mobile terminal is avoided to perform the abnormal of protection instruction.
User after lost mobile terminal, mobile terminal can according to the whether abnormal starting protection instruction of user data to
User data is protected.
In the present embodiment, mobile terminal can also detect whether operation of the user to mobile terminal is to operate first.
No matter user uses two mobile phones or new machine, first in use, mobile terminal can detect whether for
The operation first at family, as power-on operation enters start guiding interface.
If operating first, whether mobile terminal can detect is stored with disabled user's data inside it.
If first operation of the user to mobile terminal, whether mobile terminal can then detect itself is stored with illegally
User data.Herein, it is to be understood that disabled user's data are to include all data of non-user user first.By
Then to the use first of mobile terminal, therefore, the user data in mobile terminal should be it is empty, it is therefore, all in it
User data is illegal.
If not storing disabled user's data, mobile terminal can be acquired the default user data of the user.
If the illegal user data of mobile terminal memory storage, user can seek to help to seller or after sale
Help.If mobile terminal does not store disabled user's data, mobile terminal can gather related data input by user, such as use
Finger print data that family is set, encryption data, the unlocking pattern data, data of recognition of face etc..It is appreciated that mobile terminal
All data of user can be acquired, however it is not limited to which enumerated above is a variety of.It is understood that for these use
User data, effectively can protect these user data through this embodiment.
It is appreciated that only user is to protection instruction and after lock instruction all solutions remove, which just can be with
Normal use.This also tends to imply that user has found the mobile terminal.
It is appreciated that the mobile terminal of user is after the loss, it is also possible to whole to the movement there is illegal user
End carries out programming again, achievees the purpose that to delete the user data enforcement of going forward side by side in mobile terminal and uses.For this reason, the present embodiment is another
In one implementation, it can detect whether mobile terminal enters reforestation practices in the power-offstate;If into reforestation practices, examine
Survey whether mobile terminal has carried out recovering function setting in advance;If having carried out recovering function setting in advance, retain and recover work(
Corresponding user data can be set.
The setting of function is recovered, can be the setting of the user data such as positional information, these user data can help to use
The mobile terminal is further recovered in the case where losing the mobile terminal in family.Herein, reforestation practices are that mobile terminal enters
Recovery patterns, in particular to the recovery interface that can be directly entered during shutdown, it is not necessary to screen-lock password either fingerprint
Verify the interface that can enter.Illegal user to the mobile terminal when carrying out programming again, when mobile terminal enters
Recovery patterns, when deleting user data, user data corresponding with recovering function setting will not be then deleted.
The guard method of user data according to embodiments of the present invention is described in detail above in association with Fig. 1 to Fig. 3.It is detailed below
Mobile terminal according to embodiments of the present invention is carefully described.Fig. 4 shows mobile terminal according to an embodiment of the invention, such as Fig. 4
Shown, mobile terminal 400 includes:
Receiving module 402, for receiving the solicited message sent by the first mobile terminal;
Acquisition module 404, when including default PIN code for the character string in the solicited message, acquisition is deposited in advance
Storage with the associated lock instruction of the solicited message;
Execution module 406, locks the SIM card in the mobile terminal for performing the lock instruction.
In embodiments of the present invention, user, can be to loss by the first mobile terminal after destination mobile terminal is lost
Destination mobile terminal send a solicited message, destination mobile terminal when receiving the solicited message, then obtain prestore
With the associated lock instruction of the solicited message, and perform the lock instruction to the user data in lost target mobile terminal
Protected, avoid user data from revealing;First mobile terminal can be the mobile terminal that any user can use, from
And user is set timely to protect the user data in it after destination mobile terminal is lost;Further, user can be with
The destination mobile terminal is recovered by these protected user data, avoids property loss.
Fig. 5 shows mobile terminal according to another embodiment of the present invention, as shown in figure 5, mobile terminal 400 further includes:
Module 407 is returned to, for returning to a random code for the instruction that unlocks to the first mobile terminal, random code is
Mobile terminal modify to the PIN code of SIM card after PIN code;
Module 408 is released, for receiving locking of the random code releasing to SIM card.
Fig. 6 shows mobile terminal according to yet another embodiment of the invention, as shown in fig. 6, mobile terminal 400 further includes:
Whether detection module 401, the pre-set user data for detecting mobile terminal storage inside are abnormal;
Execution module 406 is additionally operable to, when the result of detection module detection is is abnormal, perform corresponding with user data
Protection instruction user data is protected.
Alternatively, as one embodiment, user data is the data in default user data record sheet;
Detection module 401 is specifically used for:
Whether the user data in destination mobile terminal detection user data record sheet is abnormal.
Alternatively, as one embodiment, the data in user data record sheet include at least user and target are moved eventually
The usage time at end and place;
Detection module 401 is specifically used for:
Whether destination mobile terminal is according to usage time detection screen locking duration of the user to destination mobile terminal beyond default
Period;And/or
Whether destination mobile terminal detection user is default place to the place to use of destination mobile terminal;
If screen locking duration is not default place beyond preset time period or/and place to use, judgement is abnormal.
Alternatively, as one embodiment, the data in user data record sheet further include the user account information of record;
Detection module 401 is specifically used for:
Whether destination mobile terminal detection user account signal has increase, deletion or change;
If so, then judge to be abnormal.
Alternatively, as one embodiment, the data in user data record sheet further include the associated person information of record;
Detection module 401 is specifically used for:
Whether destination mobile terminal detection associated person information has increase or deletion;
If so, then judge to be abnormal.
Fig. 7 shows mobile terminal according to yet another embodiment of the invention, as shown in fig. 7, mobile terminal further includes:
Instruction detection module 409, for detecting whether protection instruction is released from;
Add module 410, for when instruction detection module detects that protection instruction is released from, then by abnormal number of users
According to added in user data record sheet.
Mobile terminal according to embodiments of the present invention is referred to the flow of the method for the corresponding embodiment of the present invention, also,
Unit/module and other above-mentioned operation and/or functions in the mobile terminal are respectively in order to realize the phase in above method
Flow is answered, for sake of simplicity, details are not described herein.
Fig. 8 is a kind of hardware architecture diagram for the mobile terminal for realizing each embodiment of the present invention, the mobile terminal 800
Including but not limited to:It is radio frequency unit 801, mixed-media network modules mixed-media 802, audio output unit 803, input unit 804, sensor 805, aobvious
Show the components such as unit 806, user input unit 807, interface unit 808, memory 809, processor 810 and power supply 811.
It will be understood by those skilled in the art that the mobile terminal structure shown in Fig. 8 does not form the restriction to mobile terminal, it is mobile whole
End can be included than illustrating more or fewer components, either combine some components or different components arrangement.In the present invention
In embodiment, mobile terminal includes but not limited to mobile phone, tablet computer, laptop, palm PC, car-mounted terminal, can wear
Wear equipment and pedometer etc..
Wherein, processor 810, are used for:
Receive the solicited message sent by the first mobile terminal;
When the character string in the solicited message includes default PIN code, obtain prestore with it is described request believe
Cease associated lock instruction;
The lock instruction is performed to lock the SIM card in the destination mobile terminal.
In embodiments of the present invention, user, can be to loss by the first mobile terminal after destination mobile terminal is lost
Destination mobile terminal send a solicited message, destination mobile terminal when receiving the solicited message, then obtain prestore
With the associated lock instruction of the solicited message, and perform the lock instruction to the user data in lost target mobile terminal
Protected, avoid user data from revealing;First mobile terminal can be the mobile terminal that any user can use, from
And user is set timely to protect the user data in it after destination mobile terminal is lost;Further, user can be with
The destination mobile terminal is recovered by these protected user data, avoids property loss.
It should be understood that in the embodiment of the present invention, radio frequency unit 801 can be used for receiving and sending messages or communication process in, signal
Reception and transmission, specifically, by from base station downlink data receive after, handled to processor 810;In addition, by uplink
Data sending is to base station.In general, radio frequency unit 801 includes but not limited to antenna, at least one amplifier, transceiver, coupling
Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 801 can also by wireless communication system and network and other set
Standby communication.
Mobile terminal has provided wireless broadband internet to the user by mixed-media network modules mixed-media 802 and has accessed, and such as helps user to receive
Send e-mails, browse webpage and access streaming video etc..
Audio output unit 803 can be receiving by radio frequency unit 801 or mixed-media network modules mixed-media 802 or in memory 809
It is sound that the voice data of storage, which is converted into audio signal and exports,.Moreover, audio output unit 803 can also be provided and moved
The relevant audio output of specific function that dynamic terminal 800 performs is (for example, call signal receives sound, message sink sound etc.
Deng).Audio output unit 803 includes loudspeaker, buzzer and receiver etc..
Input unit 804 is used to receive audio or video signal.Input unit 804 can include graphics processor
(Graphics Processing Unit, GPU) 8041 and microphone 8042, graphics processor 8041 is in video acquisition mode
Or the static images or the view data of video obtained in image capture mode by image capture apparatus (such as camera) carry out
Reason.Picture frame after processing may be displayed on display unit 806.Picture frame after the processing of graphics processor 8041 can be deposited
Storage is transmitted in memory 809 (or other storage mediums) or via radio frequency unit 801 or mixed-media network modules mixed-media 802.Mike
Wind 8042 can receive sound, and can be voice data by such acoustic processing.Voice data after processing can be
The form output of mobile communication base station can be sent to via radio frequency unit 801 by being converted in the case of telephone calling model.
Mobile terminal 800 further includes at least one sensor 805, such as optical sensor, motion sensor and other biographies
Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein, ambient light sensor can be according to environment
The light and shade of light adjusts the brightness of display panel 8061, and proximity sensor can close when mobile terminal 800 is moved in one's ear
Display panel 8061 and/or backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions (general
For three axis) size of acceleration, size and the direction of gravity are can detect that when static, available for identification mobile terminal posture (ratio
Such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap);Pass
Sensor 805 can also include fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, wet
Meter, thermometer, infrared ray sensor etc. are spent, details are not described herein.
Display unit 806 is used for the information for showing by information input by user or being supplied to user.Display unit 806 can wrap
Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used
Forms such as (Organic Light-Emitting Diode, OLED) configures display panel 8061.
User input unit 807 can be used for the numeral or character information for receiving input, and produce the use with mobile terminal
The key signals input that family is set and function control is related.Specifically, user input unit 807 include contact panel 8071 and
Other input equipments 8072.Contact panel 8071, also referred to as touch-screen, collect user on it or neighbouring touch operation
(for example user uses any suitable objects or annex such as finger, stylus on contact panel 8071 or in contact panel 8071
Neighbouring operation).Contact panel 8071 may include both touch detecting apparatus and touch controller.Wherein, touch detection
Device detects the touch orientation of user, and detects the signal that touch operation is brought, and transmits a signal to touch controller;Touch control
Device processed receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives processor 810, receiving area
Manage the order that device 810 is sent and performed.It is furthermore, it is possible to more using resistance-type, condenser type, infrared ray and surface acoustic wave etc.
Type realizes contact panel 8071.Except contact panel 8071, user input unit 807 can also include other input equipments
8072.Specifically, other input equipments 8072 can include but is not limited to physical keyboard, function key (such as volume control button,
Switch key etc.), trace ball, mouse, operation lever, details are not described herein.
Further, contact panel 8071 can be covered on display panel 8061, when contact panel 8071 is detected at it
On or near touch operation after, send to processor 810 with determine touch event type, be followed by subsequent processing device 810 according to touch
The type for touching event provides corresponding visual output on display panel 8061.Although in fig. 8, contact panel 8071 and display
Panel 8061 is the component independent as two to realize the function that outputs and inputs of mobile terminal, but in some embodiments
In, can be integrated by contact panel 8071 and display panel 8061 and realize the function that outputs and inputs of mobile terminal, it is specific this
Place does not limit.
Interface unit 808 is the interface that external device (ED) is connected with mobile terminal 800.For example, external device (ED) can include
Line or wireless head-band earphone port, external power supply (or battery charger) port, wired or wireless data port, storage card end
Mouth, port, audio input/output (I/O) port, video i/o port, earphone end for connecting the device with identification module
Mouthful etc..Interface unit 808 can be used for receive the input (for example, data message, electric power etc.) from external device (ED) and
One or more elements that the input received is transferred in mobile terminal 800 can be used in 800 He of mobile terminal
Data are transmitted between external device (ED).
Memory 809 can be used for storage software program and various data.Memory 809 can mainly include storing program area
And storage data field, wherein, storing program area can storage program area, application program (such as the sound needed at least one function
Sound playing function, image player function etc.) etc.;Storage data field can store according to mobile phone use created data (such as
Voice data, phone directory etc.) etc..In addition, memory 809 can include high-speed random access memory, can also include non-easy
The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 810 is the control centre of mobile terminal, utilizes each of various interfaces and the whole mobile terminal of connection
A part, by running or performing the software program and/or module that are stored in memory 809, and calls and is stored in storage
Data in device 809, perform the various functions and processing data of mobile terminal, so as to carry out integral monitoring to mobile terminal.Place
Reason device 810 may include one or more processing units;Preferably, processor 810 can integrate application processor and modulatedemodulate is mediated
Device is managed, wherein, application processor mainly handles operating system, user interface and application program etc., and modem processor is main
Handle wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 810.
Mobile terminal 800 can also include the power supply 811 (such as battery) to all parts power supply, it is preferred that power supply 811
Can be logically contiguous by power-supply management system and processor 810, so as to realize management charging by power-supply management system, put
The function such as electricity and power managed.
In addition, mobile terminal 800 includes some unshowned function modules, details are not described herein.
Preferably, the embodiment of the present invention also provides a kind of mobile terminal, including memory 809, processor 810 and is stored in
It is real when which is performed by processor 810 on memory 809 and the computer program that can be run on processor 810
Each process of the guard method embodiment of existing above-mentioned user data, and identical technique effect can be reached, to avoid repeating, this
In repeat no more.
The embodiment of the present invention also provides a kind of computer-readable recording medium, and meter is stored with computer-readable recording medium
Calculation machine program, the computer program realize each mistake of the guard method embodiment of above-mentioned user data when being executed by processor
Journey, and identical technique effect can be reached, to avoid repeating, which is not described herein again.Wherein, the computer-readable storage medium
Matter, such as read-only storage (Read-Only Memory, abbreviation ROM), random access memory (Random Access
Memory, abbreviation RAM), magnetic disc or CD etc..
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row
His property includes, so that process, method, article or device including a series of elements not only include those key elements, and
And other elements that are not explicitly listed are further included, or further include as this process, method, article or device institute inherently
Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this
Also there are other identical element in the process of key element, method, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on such understanding, technical scheme substantially in other words does the prior art
Going out the part of contribution can be embodied in the form of software product, which is stored in a storage medium
In (such as ROM/RAM, magnetic disc, CD), including some instructions are used so that a station terminal (can be mobile phone, computer, services
Device, air conditioner, or network equipment etc.) perform method described in each embodiment of the present invention.
The embodiment of the present invention is described above in conjunction with attached drawing, but the invention is not limited in above-mentioned specific
Embodiment, above-mentioned embodiment is only schematical, rather than restricted, those of ordinary skill in the art
Under the enlightenment of the present invention, in the case of present inventive concept and scope of the claimed protection is not departed from, it can also make very much
Form, belongs within the protection of the present invention.
Claims (18)
- A kind of 1. guard method of user data, it is characterised in that the described method includes:Destination mobile terminal receives the solicited message sent by the first mobile terminal;When the character string in the solicited message includes default PIN code, the destination mobile terminal obtains what is prestored With the associated lock instruction of the solicited message;The destination mobile terminal performs the lock instruction and the SIM card in the destination mobile terminal is locked.
- 2. according to the method described in claim 1, it is characterized in that, the destination mobile terminal performs the lock instruction to institute While stating the SIM card in destination mobile terminal and locked, return to one to first mobile terminal and be used to release the lock Surely the random code instructed, the random code are the PIN code after destination mobile terminal modifies the PIN code of the SIM card;The method further includes:Destination mobile terminal receives locking of the random code releasing to the SIM card.
- 3. according to the method described in claim 1, it is characterized in that, the destination mobile terminal is received by the first mobile terminal hair Before the solicited message sent, the method further includes:Whether the pre-set user data of destination mobile terminal detection storage inside are abnormal;If being abnormal, destination mobile terminal perform it is corresponding with the user data protection instruction to the user data into Row protection.
- 4. according to the method described in claim 3, it is characterized in that, the user data is in default user data record sheet Data;Whether the pre-set user data of destination mobile terminal detection storage inside are abnormal, and are specially:Whether the user data that destination mobile terminal is detected in the user data record sheet is abnormal.
- 5. according to the method described in claim 4, it is characterized in that, the data in the user data record sheet are included at least and used Usage time and place of the family to the destination mobile terminal;Whether the pre-set user data of destination mobile terminal detection storage inside are abnormal, and are specially:Whether destination mobile terminal is according to usage time detection screen locking duration of the user to the destination mobile terminal beyond default Period;And/orWhether destination mobile terminal detection user is default place to the place to use of the destination mobile terminal;If screen locking duration is not default place beyond preset time period or/and place to use, judgement is abnormal.
- 6. according to the method described in claim 5, it is characterized in that, the data in the user data record sheet further include record User account information;Whether the pre-set user data of destination mobile terminal detection storage inside are abnormal, and are specially:Destination mobile terminal detects whether the user account signal has increase, deletion or change;If so, then judge to be abnormal.
- 7. according to the method described in claim 6, it is characterized in that, the data in the user data record sheet further include record Associated person information;Whether the pre-set user data of destination mobile terminal detection storage inside are abnormal, and are specially:Destination mobile terminal detects whether the associated person information has increase or deletion;If so, then judge to be abnormal.
- 8. according to claim 3-7 any one of them methods, it is characterised in that the method further includes:Detect whether the protection instruction is released from;If the protection instruction is released from, the abnormal user data is added in the user data record sheet.
- 9. a kind of mobile terminal, it is characterised in that the mobile terminal includes:Receiving module, for receiving the solicited message sent by the first mobile terminal;Acquisition module, when including default PIN code for the character string in the solicited message, obtain prestore with institute State the associated lock instruction of solicited message;Execution module, locks the SIM card in the mobile terminal for performing the lock instruction.
- 10. mobile terminal according to claim 9, it is characterised in that the mobile terminal further includes:Return to module, be used to releasing the random code of the lock instruction for returning to one to first mobile terminal, it is described with Machine code is the PIN code after the mobile terminal modifies the PIN code of the SIM card;Module is released, for receiving locking of the random code releasing to the SIM card.
- 11. mobile terminal according to claim 10, it is characterised in that the mobile terminal further includes:Whether detection module, the pre-set user data for detecting the mobile terminal storage inside are abnormal;The execution module is additionally operable to, when the result of detection module detection is is abnormal, perform and the user data The user data is protected in corresponding protection instruction.
- 12. mobile terminal according to claim 11, it is characterised in that the user data is remembered for default user data Record the data in table;The detection module is specifically used for:Whether the user data that destination mobile terminal is detected in the user data record sheet is abnormal.
- 13. mobile terminal according to claim 12, it is characterised in that the data in the user data record sheet are at least Including usage time of the user to the destination mobile terminal and place;The detection module is specifically used for:Whether destination mobile terminal is according to usage time detection screen locking duration of the user to the destination mobile terminal beyond default Period;And/orWhether destination mobile terminal detection user is default place to the place to use of the destination mobile terminal;If screen locking duration is not default place beyond preset time period or/and place to use, judgement is abnormal.
- 14. mobile terminal according to claim 13, it is characterised in that the data in the user data record sheet are also wrapped Include the user account information of record;The detection module is specifically used for:Destination mobile terminal detects whether the user account signal has increase, deletion or change;If so, then judge to be abnormal.
- 15. mobile terminal according to claim 14, it is characterised in that the data in the user data record sheet are also wrapped Include the associated person information of record;The detection module is specifically used for:Destination mobile terminal detects whether the associated person information has increase or deletion;If so, then judge to be abnormal.
- 16. according to claim 11-15 any one of them mobile terminals, it is characterised in that the mobile terminal further includes:Instruction detection module, for detecting whether the protection instruction is released from;Add module, for described instruction detection module detect it is described protection instruction be released from when, then will exception described in User data is added in the user data record sheet.
- A kind of 17. mobile terminal, it is characterised in that including:Memory, processor and it is stored on the memory and can be in institute The computer program run on processor is stated, such as claim 1 to 8 is realized when the computer program is performed by the processor Any one of user data guard method the step of.
- 18. a kind of computer-readable recording medium, it is characterised in that be stored with computer on the computer-readable recording medium Program, realizes the guarantor such as user data described in any item of the claim 1 to 8 when the computer program is executed by processor The step of maintaining method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711204387.2A CN107948390A (en) | 2017-11-27 | 2017-11-27 | The guard method of user data and mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711204387.2A CN107948390A (en) | 2017-11-27 | 2017-11-27 | The guard method of user data and mobile terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107948390A true CN107948390A (en) | 2018-04-20 |
Family
ID=61949948
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711204387.2A Pending CN107948390A (en) | 2017-11-27 | 2017-11-27 | The guard method of user data and mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107948390A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109117666A (en) * | 2018-07-27 | 2019-01-01 | 深圳市国通世纪科技开发有限公司 | Lose terminal safety protection method, computer equipment and storage medium |
CN110795596A (en) * | 2019-11-07 | 2020-02-14 | 北京首钢自动化信息技术有限公司 | Information feedback method and device for client |
WO2020142864A1 (en) * | 2019-01-07 | 2020-07-16 | Citrix Systems, Inc. | Subscriber identity management |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1407787A (en) * | 2001-09-08 | 2003-04-02 | 深圳市中兴通讯股份有限公司上海第二研究所 | Self-alarming and anti-theft method for mobile terminals |
JP2008109306A (en) * | 2006-10-24 | 2008-05-08 | Sharp Corp | Portable terminal |
CN101917691A (en) * | 2010-08-12 | 2010-12-15 | 中国电信股份有限公司 | Method, system and terminal for setting terminal PIN (Personal Identification Number) code |
CN102929807A (en) * | 2012-11-19 | 2013-02-13 | 周万荣 | Method for initiatively performing loss judgment and data processing and mobile terminal |
CN103957322A (en) * | 2014-05-05 | 2014-07-30 | 深圳市中兴移动通信有限公司 | Mobile terminal and antitheft method thereof |
-
2017
- 2017-11-27 CN CN201711204387.2A patent/CN107948390A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1407787A (en) * | 2001-09-08 | 2003-04-02 | 深圳市中兴通讯股份有限公司上海第二研究所 | Self-alarming and anti-theft method for mobile terminals |
JP2008109306A (en) * | 2006-10-24 | 2008-05-08 | Sharp Corp | Portable terminal |
CN101917691A (en) * | 2010-08-12 | 2010-12-15 | 中国电信股份有限公司 | Method, system and terminal for setting terminal PIN (Personal Identification Number) code |
CN102929807A (en) * | 2012-11-19 | 2013-02-13 | 周万荣 | Method for initiatively performing loss judgment and data processing and mobile terminal |
CN103957322A (en) * | 2014-05-05 | 2014-07-30 | 深圳市中兴移动通信有限公司 | Mobile terminal and antitheft method thereof |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109117666A (en) * | 2018-07-27 | 2019-01-01 | 深圳市国通世纪科技开发有限公司 | Lose terminal safety protection method, computer equipment and storage medium |
WO2020142864A1 (en) * | 2019-01-07 | 2020-07-16 | Citrix Systems, Inc. | Subscriber identity management |
US10986085B2 (en) | 2019-01-07 | 2021-04-20 | Citrix Systems, Inc. | Subscriber identity management |
US11647017B2 (en) | 2019-01-07 | 2023-05-09 | Citrix Systems, Inc. | Subscriber identity management |
CN110795596A (en) * | 2019-11-07 | 2020-02-14 | 北京首钢自动化信息技术有限公司 | Information feedback method and device for client |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103488924B (en) | A kind of unlocking processing method of terminal, device and equipment | |
CN109918930A (en) | A kind of information protecting method and terminal device | |
CN105912905A (en) | Fingerprint unlocking method and terminal | |
CN107133498A (en) | A kind of privacy application management method and device and mobile terminal | |
CN108510022A (en) | A kind of Quick Response Code generates, verification method and server | |
CN106470269A (en) | A kind of method and apparatus of antitheft mobile phone | |
CN106327193B (en) | A kind of system unlocking method and equipment | |
CN107748848A (en) | A kind of information processing method and mobile terminal | |
CN108551521A (en) | A kind of log-on message reminding method and mobile terminal | |
CN106874805A (en) | A kind of data guard method, device and mobile terminal | |
CN110035183A (en) | Information sharing method and terminal | |
CN107609407A (en) | The guard method of information security and device in a kind of user terminal | |
CN110457888A (en) | A kind of verifying code imput method, device, electronic equipment and storage medium | |
CN107948390A (en) | The guard method of user data and mobile terminal | |
CN110309004A (en) | The processing method and terminal of data | |
CN107707554A (en) | A kind of login method and mobile terminal of application program account | |
CN107133507A (en) | A kind of privacy services system access method, device and mobile terminal | |
CN108710806A (en) | A kind of terminal unlock method, mobile terminal | |
CN108197448A (en) | Document display method, device, readable storage medium storing program for executing and terminal | |
CN107786739A (en) | A kind of information acquisition method and mobile terminal | |
CN107577961A (en) | Mobile terminal and Related product available for security information protection | |
CN109918944A (en) | A kind of information protecting method, device, mobile terminal and storage medium | |
CN110321731A (en) | A kind of information protecting method and mobile terminal | |
CN109218984A (en) | A kind of method for tracing and mobile terminal | |
CN106874795A (en) | A kind of tamper machine method of mobile terminal, device and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180420 |
|
RJ01 | Rejection of invention patent application after publication |