CN107948390A - The guard method of user data and mobile terminal - Google Patents

The guard method of user data and mobile terminal Download PDF

Info

Publication number
CN107948390A
CN107948390A CN201711204387.2A CN201711204387A CN107948390A CN 107948390 A CN107948390 A CN 107948390A CN 201711204387 A CN201711204387 A CN 201711204387A CN 107948390 A CN107948390 A CN 107948390A
Authority
CN
China
Prior art keywords
mobile terminal
user data
user
destination mobile
abnormal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711204387.2A
Other languages
Chinese (zh)
Inventor
黄亮鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201711204387.2A priority Critical patent/CN107948390A/en
Publication of CN107948390A publication Critical patent/CN107948390A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72484User interfaces specially adapted for cordless or mobile telephones wherein functions are triggered by incoming communication events

Abstract

Guard method and mobile terminal the invention discloses a kind of user data, the described method includes:Destination mobile terminal receives the solicited message sent by the first mobile terminal;When the character string in the solicited message includes default PIN code, the destination mobile terminal obtain prestore with the associated lock instruction of the solicited message;Destination mobile terminal performs the lock instruction and the SIM card in the destination mobile terminal is locked.The present invention can protect the user data in the mobile terminal, avoid user data from revealing after user's lost mobile terminal.Further, user can also recover the mobile terminal by these protected user data, avoid property loss.

Description

The guard method of user data and mobile terminal
Technical field
The present invention relates to guard method and the mobile terminal of field of terminal, more particularly to a kind of user data.
Background technology
The intelligent terminals such as mobile phone are the instruments that user is commonly used, or even become the essential daily necessities of user. By these intelligent terminals, the behaviors such as user can be linked up, be consumed, communicated, meanwhile, these behaviors also represent number of users According to track.
As intelligent terminal caused by user's life and other various aspects to changing, between people and intelligent terminal Relation it is even closer, intelligent terminal can also be recorded the data of each side of user behavior, so that more convenient user Use.Once intelligent terminal is lost, in addition to property loss is faced, the data of user are stolen and also user can be brought user More serious influence.Therefore, the security for the user data that the security of intelligent terminal, especially intelligent terminal are recorded is right Ever more important for user.
Therefore, the not compromised method of user data can be protected after intelligent terminal loss there is an urgent need for one kind.
The content of the invention
The purpose of the embodiment of the present invention is to provide guard method and the mobile terminal of a kind of user data, to solve intelligence eventually The problem of end protects user data not compromised after being lost by user.
In order to solve the above-mentioned technical problem, the present invention is realized in:
First aspect, there is provided a kind of guard method of user data, the described method includes:
Destination mobile terminal receives the solicited message sent by the first mobile terminal;
When the character string in the solicited message includes default PIN code, the destination mobile terminal is obtained and deposited in advance Storage with the associated lock instruction of the solicited message;
Destination mobile terminal performs the lock instruction and the SIM card in the destination mobile terminal is locked.
Second aspect, there is provided a kind of mobile terminal, the mobile terminal include:
Receiving module, for receiving the solicited message sent by the first mobile terminal;
Acquisition module, when including default PIN code for the character string in the solicited message, obtains what is prestored With the associated lock instruction of the solicited message;
Execution module, locks the SIM card in the mobile terminal for performing the lock instruction.
The third aspect, there is provided a kind of mobile terminal, the mobile terminal include processor, memory and be stored in described deposit On reservoir and the computer program that can run on the processor, the computer program are realized when being performed by the processor The step of method as described in relation to the first aspect.
Fourth aspect, there is provided a kind of computer-readable recording medium, meter is stored on the computer-readable recording medium Calculation machine program, the step of method as described in relation to the first aspect is realized when the computer program is executed by processor.
In embodiments of the present invention, user, can be to loss by the first mobile terminal after destination mobile terminal is lost Destination mobile terminal send a solicited message, destination mobile terminal when receiving the solicited message, then obtain prestore With the associated lock instruction of the solicited message, and perform the lock instruction to the user data in lost target mobile terminal Protected, avoid user data from revealing;First mobile terminal can be the mobile terminal that any user can use, from And user is set timely to protect the user data in it after destination mobile terminal is lost;Further, user can be with The destination mobile terminal is recovered by these protected user data, avoids property loss.
Brief description of the drawings
Attached drawing described herein is used for providing a further understanding of the present invention, forms the part of the present invention, this hair Bright schematic description and description is used to explain the present invention, does not form inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is the flow chart of the guard method of user data according to an embodiment of the invention;
Fig. 2 is the flow chart of the guard method of user data according to another embodiment of the present invention;
Fig. 3 is the flow chart of the guard method of user data according to yet another embodiment of the invention;
Fig. 4 is the structure diagram of mobile terminal according to an embodiment of the invention;
Fig. 5 is the structure diagram of mobile terminal according to another embodiment of the present invention;
Fig. 6 is the structure diagram of mobile terminal according to yet another embodiment of the invention;
Fig. 7 is the structure diagram of mobile terminal according to yet another embodiment of the invention;
Fig. 8 is the structure diagram of mobile terminal according to yet another embodiment of the invention.
Embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with the specific embodiment of the invention and Technical solution of the present invention is clearly and completely described in corresponding attached drawing.Obviously, described embodiment is only the present invention one Section Example, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not doing Go out all other embodiments obtained under the premise of creative work, belong to the scope of protection of the invention.
Fig. 1 shows the flow chart of the guard method of user data according to an embodiment of the invention.As shown in Figure 1, should Method includes:
Step 102, destination mobile terminal receives the solicited message sent by the first mobile terminal.
Wherein, destination mobile terminal can be detected all information from exterior terminal or server, including come Short message, social information from exterior terminal etc., the information such as sent by wechat, QQ or other application program, or receive Short message.It is understood that exterior terminal can be the smart machines such as another mobile phone.
Step 104, when the character string in solicited message includes default PIN code, destination mobile terminal is obtained and deposited in advance Storage with the associated lock instruction of solicited message.
Solicited message is needed with uniqueness, its can be at least one of default PIN code, cell-phone number or account or At least one combination.PIN code can be the PIN code of the SIM card in destination mobile terminal, and cell-phone number can be that target movement is whole Cell-phone number used in end.Destination mobile terminal detection receives the default solicited message that exterior terminal or server are sent When, the uniqueness based on the solicited message, destination mobile terminal can perform and the associated lock instruction of the solicited message.Can be with Understand, which is necessarily performed by destination mobile terminal is used to protect the user data in it.
Step 106, destination mobile terminal performs lock instruction and the SIM card in destination mobile terminal is locked.
In the present embodiment, lock instruction can be the instruction for the SIM card in lock onto target mobile terminal, perform locking Instruction then can avoid user from taking out from lost target mobile terminal the SIM card for his use with locking SIM card, to Family impacts.
In embodiments of the present invention, user, can be to loss by the first mobile terminal after destination mobile terminal is lost Destination mobile terminal send a solicited message, destination mobile terminal when receiving the solicited message, then obtain prestore With the associated lock instruction of the solicited message, and perform the lock instruction to the user data in lost target mobile terminal Protected, avoid user data from revealing;First mobile terminal can be the mobile terminal that any user can use, from And user is set timely to protect the user data in it after destination mobile terminal is lost;Further, user can be with The destination mobile terminal is recovered by these protected user data, avoids property loss.
In one implementation of the present embodiment, destination mobile terminal performs lock instruction and the SIM card in it is locked While, a random code for being used to release the lock instruction can be returned to the first mobile terminal, which can be that target is moved The PIN code of dynamic terminal-pair SIM card modify after PIN code.
Fig. 2 shows the flow chart of the guard method of user data according to another embodiment of the present invention.As shown in Fig. 2, This method further includes:
Step 107, destination mobile terminal receives locking of the random code releasing to SIM card.
For example, after user sends a solicited message by another mobile terminal to lost target mobile terminal, lose Destination mobile terminal can return to the random code to the mobile terminal that user uses, herein, which is lost target PIN code after the former PIN code of mobile terminal modification SIM card.The uniqueness of the random code, ensure that the SIM card will not be removed With used for other purposes, to prevent the property to user from causing damages.
The uniqueness of the random code returned based on lost target mobile terminal, releasing of the user to lock instruction is usually only There is user just to realize.It will be further understood that if lock instruction is released from, it imply that user has looked for Lost target mobile terminal is arrived.
Fig. 3 shows the flow chart of the guard method of user data according to yet another embodiment of the invention.As shown in figure 3, Before step 102, this method further includes:
Step 1011, whether the pre-set user data of destination mobile terminal detection storage inside are abnormal.
User data can be various data, including the data for unlock, such as unlocked by fingerprint data, face unlock data Deng;For the logon account data of login application program, Alipay, the account data of wechat are such as logged in;User is to mobile terminal Use data, such as usage time, place;It can also be the image data of view data, such as video camera shooting.Certainly, User data can also include other forms and species, the present embodiment do not limit specifically herein.
Step 1012, if being abnormal, destination mobile terminal performs protection instruction pair corresponding with the user data The user data is protected.
In one implementation of the present embodiment, mobile terminal, can be with after the instruction of user data exception starting protection is judged The testing mechanism to the external information of reception is triggered, which can make destination mobile terminal whole by the first movement to reception The solicited message that end is sent is detected.
It is appreciated that user, after lost mobile terminal, can not necessarily be sent immediately using another mobile terminal please Ask information, including user to have no knowledge about having lost, or request can not be sent also without another mobile terminal is obtained after loss Information.For this reason, the present embodiment can be protected user data while user's lost mobile terminal.
Specifically, after mobile terminal loss, if mobile terminal is operated by other users, user data is inevitably resulted in Exception, such as the change of finger print data, the modification of the unlocking pattern etc..The abnormal phenomenon of this user data, then can be moved Detected by terminal, so as to trigger the protection instruction being pre-set in mobile terminal.
Protection instruction can be the combination of one or at least one in screen locking instruction, shutdown command, encrypted instruction etc..Protect When finger shield order instructs for screen locking, perform screen locking instruction then can carry out screen locking to protect user data to mobile terminal.Protection Instruct for shutdown command when, then can make to enter shutdown after mobile terminal to lock screen., then can be right when screen locking instruction is encrypted instruction Corresponding user data is encrypted.Wherein, the purpose for protecting instruction is when mobile terminal is lost, to the user of its inside Data are protected, and prevent the leakage of user data from being impacted to user.It should be appreciated that protection instruction is not limited to the above A variety of instruction types and content.
In one implementation of the present embodiment, user data can be stored by default user data record sheet, I.e. user data can be the data in default user data record sheet.Further, step 1011 can be implemented as:Inspection Whether the user data surveyed in user data record sheet is abnormal.
In another implementation of the present embodiment, the user data in user data record sheet includes at least user to movement One or more in the usage time of terminal and place, the user account information of record, associated person information, it should be pointed out that , the user data in user data record sheet can be used to detect whether exception, so that mobile terminal starting protection These user data are protected in instruction.
In another implementation of the present embodiment, the user data in user data record sheet is user to mobile terminal When usage time and place, step 1011 can be implemented as:
Whether destination mobile terminal exceeds the usage time detection screen locking duration of the destination mobile terminal according to user Preset time period;And/or
Whether destination mobile terminal detection user is default place to the place to use of the destination mobile terminal;
If screen locking duration is not default place beyond preset time period or/and place to use, judgement is abnormal.
User can be the mobile terminal longest screen locking time to the usage time of mobile terminal, or at a certain section Between in the longest screen locking time, such as in the morning, at night afternoon, screen locking time in different time periods.When in certain corresponding a period of time Between in section, whether the screen locking duration that can detect mobile terminal exceeds preset time period, so that when judging the screen locking of mobile terminal Between whether there occurs exception.If abnormal, may imply that the loss of mobile terminal, mobile terminal then perform protection instruct into Row screen locking etc. operates, to protect user data.
User can be the place that the users such as family, company or park are commonly used to the place to use of mobile terminal.Can Whether it is default place to the place to use of mobile terminal to detect user, for example, use of the detection user to mobile terminal Whether place is family, company either these preset locations such as park or whether be in the certain distance of these preset locations, such as In the range of one kilometer or several kilometers.If non-default place, it imply that mobile terminal may be lost, mobile terminal is then Perform protection instruction and carry out the operation such as screen locking, to protect user data.
In another implementation of the present embodiment, the user data in user data record sheet is believed for the user account of record During breath, step 1011 can be implemented as:
Whether destination mobile terminal detection user account signal has increase, deletion or change;
If so, then judge to be abnormal.
The account information of user, including the account letter all for logging in mailbox, Alipay, wechat, microblogging, blog etc. Breath.What these account informations of usual user were no variation in, therefore, whether detection user, which increases, deletes or have changed, is used for The account information of login, it can be determined that whether the mobile terminal may be lost.When mobile terminal is lost, these account informations It is abnormal, then it often imply that mobile terminal is in lost condition.
In another implementation of the present embodiment, the user data in user data record sheet is the associated person information of record When, step 1011 can be implemented as:
Whether destination mobile terminal detection associated person information has increase or deletion;
If so, then judge to be abnormal.
Associated person information can be the connection in the social softwares such as the associated person information in user's address list or wechat It is people's information, the present embodiment does not limit specifically herein, within the scope of the present embodiment can be realized.General user's Big change will not occur for associated person information, therefore, can detect whether associated person information has the operation such as increase or deletion, with Whether detection associated person information has exception.If exception, then the mobile terminal is likely to be at lost condition, and mobile terminal is then held Row protection instruction carries out the operation such as screen locking, to protect user data.
It is understood that operation of the user to mobile terminal, the present embodiment allows user data there are some exceptions, preceding Carry be these extremely be user operation.In this case, then further detection protection refers to the present embodiment the method Whether order is released from;If protection instruction is released from, abnormal user data is added in user data record sheet.
It is that mobile terminal pair is released by the corresponding operating of user it is understood that to the release operation of protection instruction The limitation of user right.Specifically, can be the unlock operation to mobile terminal when mobile terminal is in screen lock state, Such as unlocked by fingerprint, recognition of face unlock, iris unlock., can be to these when the user data in mobile terminal is encrypted Operation etc. is decrypted in user data.It is understood that these release operations are corresponding to user for releasing mobile terminal The limitation of authority.Here, the present embodiment will not enumerate.
When mobile terminal receives release operation, for example, fingerprint is matched, then mobile terminal is unlocked, so that De-preservation instructs.
Here it is to be understood that if protection instruction has a variety of limitations, such as screen locking, encrypt, then in requisition for one One lifts restrictions.The process to lift restrictions can have corresponding releasing order, can also randomly choose.
If user in itself naturally can normally solve protection instruction the abnormal operation of mobile terminal, user Remove, mobile terminal can then judge the normal operating that the abnormal operation is user, then be added to the abnormal user data and use In user data record sheet.
It is pointed out that whether extremely the user's data record sheet can be recycled for detection user data, therefore, can Normally to be updated to user data record sheet, mobile terminal is avoided to perform the abnormal of protection instruction.
User after lost mobile terminal, mobile terminal can according to the whether abnormal starting protection instruction of user data to User data is protected.
In the present embodiment, mobile terminal can also detect whether operation of the user to mobile terminal is to operate first.
No matter user uses two mobile phones or new machine, first in use, mobile terminal can detect whether for The operation first at family, as power-on operation enters start guiding interface.
If operating first, whether mobile terminal can detect is stored with disabled user's data inside it.
If first operation of the user to mobile terminal, whether mobile terminal can then detect itself is stored with illegally User data.Herein, it is to be understood that disabled user's data are to include all data of non-user user first.By Then to the use first of mobile terminal, therefore, the user data in mobile terminal should be it is empty, it is therefore, all in it User data is illegal.
If not storing disabled user's data, mobile terminal can be acquired the default user data of the user.
If the illegal user data of mobile terminal memory storage, user can seek to help to seller or after sale Help.If mobile terminal does not store disabled user's data, mobile terminal can gather related data input by user, such as use Finger print data that family is set, encryption data, the unlocking pattern data, data of recognition of face etc..It is appreciated that mobile terminal All data of user can be acquired, however it is not limited to which enumerated above is a variety of.It is understood that for these use User data, effectively can protect these user data through this embodiment.
It is appreciated that only user is to protection instruction and after lock instruction all solutions remove, which just can be with Normal use.This also tends to imply that user has found the mobile terminal.
It is appreciated that the mobile terminal of user is after the loss, it is also possible to whole to the movement there is illegal user End carries out programming again, achievees the purpose that to delete the user data enforcement of going forward side by side in mobile terminal and uses.For this reason, the present embodiment is another In one implementation, it can detect whether mobile terminal enters reforestation practices in the power-offstate;If into reforestation practices, examine Survey whether mobile terminal has carried out recovering function setting in advance;If having carried out recovering function setting in advance, retain and recover work( Corresponding user data can be set.
The setting of function is recovered, can be the setting of the user data such as positional information, these user data can help to use The mobile terminal is further recovered in the case where losing the mobile terminal in family.Herein, reforestation practices are that mobile terminal enters Recovery patterns, in particular to the recovery interface that can be directly entered during shutdown, it is not necessary to screen-lock password either fingerprint Verify the interface that can enter.Illegal user to the mobile terminal when carrying out programming again, when mobile terminal enters Recovery patterns, when deleting user data, user data corresponding with recovering function setting will not be then deleted.
The guard method of user data according to embodiments of the present invention is described in detail above in association with Fig. 1 to Fig. 3.It is detailed below Mobile terminal according to embodiments of the present invention is carefully described.Fig. 4 shows mobile terminal according to an embodiment of the invention, such as Fig. 4 Shown, mobile terminal 400 includes:
Receiving module 402, for receiving the solicited message sent by the first mobile terminal;
Acquisition module 404, when including default PIN code for the character string in the solicited message, acquisition is deposited in advance Storage with the associated lock instruction of the solicited message;
Execution module 406, locks the SIM card in the mobile terminal for performing the lock instruction.
In embodiments of the present invention, user, can be to loss by the first mobile terminal after destination mobile terminal is lost Destination mobile terminal send a solicited message, destination mobile terminal when receiving the solicited message, then obtain prestore With the associated lock instruction of the solicited message, and perform the lock instruction to the user data in lost target mobile terminal Protected, avoid user data from revealing;First mobile terminal can be the mobile terminal that any user can use, from And user is set timely to protect the user data in it after destination mobile terminal is lost;Further, user can be with The destination mobile terminal is recovered by these protected user data, avoids property loss.
Fig. 5 shows mobile terminal according to another embodiment of the present invention, as shown in figure 5, mobile terminal 400 further includes:
Module 407 is returned to, for returning to a random code for the instruction that unlocks to the first mobile terminal, random code is Mobile terminal modify to the PIN code of SIM card after PIN code;
Module 408 is released, for receiving locking of the random code releasing to SIM card.
Fig. 6 shows mobile terminal according to yet another embodiment of the invention, as shown in fig. 6, mobile terminal 400 further includes:
Whether detection module 401, the pre-set user data for detecting mobile terminal storage inside are abnormal;
Execution module 406 is additionally operable to, when the result of detection module detection is is abnormal, perform corresponding with user data Protection instruction user data is protected.
Alternatively, as one embodiment, user data is the data in default user data record sheet;
Detection module 401 is specifically used for:
Whether the user data in destination mobile terminal detection user data record sheet is abnormal.
Alternatively, as one embodiment, the data in user data record sheet include at least user and target are moved eventually The usage time at end and place;
Detection module 401 is specifically used for:
Whether destination mobile terminal is according to usage time detection screen locking duration of the user to destination mobile terminal beyond default Period;And/or
Whether destination mobile terminal detection user is default place to the place to use of destination mobile terminal;
If screen locking duration is not default place beyond preset time period or/and place to use, judgement is abnormal.
Alternatively, as one embodiment, the data in user data record sheet further include the user account information of record;
Detection module 401 is specifically used for:
Whether destination mobile terminal detection user account signal has increase, deletion or change;
If so, then judge to be abnormal.
Alternatively, as one embodiment, the data in user data record sheet further include the associated person information of record;
Detection module 401 is specifically used for:
Whether destination mobile terminal detection associated person information has increase or deletion;
If so, then judge to be abnormal.
Fig. 7 shows mobile terminal according to yet another embodiment of the invention, as shown in fig. 7, mobile terminal further includes:
Instruction detection module 409, for detecting whether protection instruction is released from;
Add module 410, for when instruction detection module detects that protection instruction is released from, then by abnormal number of users According to added in user data record sheet.
Mobile terminal according to embodiments of the present invention is referred to the flow of the method for the corresponding embodiment of the present invention, also, Unit/module and other above-mentioned operation and/or functions in the mobile terminal are respectively in order to realize the phase in above method Flow is answered, for sake of simplicity, details are not described herein.
Fig. 8 is a kind of hardware architecture diagram for the mobile terminal for realizing each embodiment of the present invention, the mobile terminal 800 Including but not limited to:It is radio frequency unit 801, mixed-media network modules mixed-media 802, audio output unit 803, input unit 804, sensor 805, aobvious Show the components such as unit 806, user input unit 807, interface unit 808, memory 809, processor 810 and power supply 811. It will be understood by those skilled in the art that the mobile terminal structure shown in Fig. 8 does not form the restriction to mobile terminal, it is mobile whole End can be included than illustrating more or fewer components, either combine some components or different components arrangement.In the present invention In embodiment, mobile terminal includes but not limited to mobile phone, tablet computer, laptop, palm PC, car-mounted terminal, can wear Wear equipment and pedometer etc..
Wherein, processor 810, are used for:
Receive the solicited message sent by the first mobile terminal;
When the character string in the solicited message includes default PIN code, obtain prestore with it is described request believe Cease associated lock instruction;
The lock instruction is performed to lock the SIM card in the destination mobile terminal.
In embodiments of the present invention, user, can be to loss by the first mobile terminal after destination mobile terminal is lost Destination mobile terminal send a solicited message, destination mobile terminal when receiving the solicited message, then obtain prestore With the associated lock instruction of the solicited message, and perform the lock instruction to the user data in lost target mobile terminal Protected, avoid user data from revealing;First mobile terminal can be the mobile terminal that any user can use, from And user is set timely to protect the user data in it after destination mobile terminal is lost;Further, user can be with The destination mobile terminal is recovered by these protected user data, avoids property loss.
It should be understood that in the embodiment of the present invention, radio frequency unit 801 can be used for receiving and sending messages or communication process in, signal Reception and transmission, specifically, by from base station downlink data receive after, handled to processor 810;In addition, by uplink Data sending is to base station.In general, radio frequency unit 801 includes but not limited to antenna, at least one amplifier, transceiver, coupling Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 801 can also by wireless communication system and network and other set Standby communication.
Mobile terminal has provided wireless broadband internet to the user by mixed-media network modules mixed-media 802 and has accessed, and such as helps user to receive Send e-mails, browse webpage and access streaming video etc..
Audio output unit 803 can be receiving by radio frequency unit 801 or mixed-media network modules mixed-media 802 or in memory 809 It is sound that the voice data of storage, which is converted into audio signal and exports,.Moreover, audio output unit 803 can also be provided and moved The relevant audio output of specific function that dynamic terminal 800 performs is (for example, call signal receives sound, message sink sound etc. Deng).Audio output unit 803 includes loudspeaker, buzzer and receiver etc..
Input unit 804 is used to receive audio or video signal.Input unit 804 can include graphics processor (Graphics Processing Unit, GPU) 8041 and microphone 8042, graphics processor 8041 is in video acquisition mode Or the static images or the view data of video obtained in image capture mode by image capture apparatus (such as camera) carry out Reason.Picture frame after processing may be displayed on display unit 806.Picture frame after the processing of graphics processor 8041 can be deposited Storage is transmitted in memory 809 (or other storage mediums) or via radio frequency unit 801 or mixed-media network modules mixed-media 802.Mike Wind 8042 can receive sound, and can be voice data by such acoustic processing.Voice data after processing can be The form output of mobile communication base station can be sent to via radio frequency unit 801 by being converted in the case of telephone calling model.
Mobile terminal 800 further includes at least one sensor 805, such as optical sensor, motion sensor and other biographies Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein, ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 8061, and proximity sensor can close when mobile terminal 800 is moved in one's ear Display panel 8061 and/or backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions (general For three axis) size of acceleration, size and the direction of gravity are can detect that when static, available for identification mobile terminal posture (ratio Such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap);Pass Sensor 805 can also include fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, wet Meter, thermometer, infrared ray sensor etc. are spent, details are not described herein.
Display unit 806 is used for the information for showing by information input by user or being supplied to user.Display unit 806 can wrap Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used Forms such as (Organic Light-Emitting Diode, OLED) configures display panel 8061.
User input unit 807 can be used for the numeral or character information for receiving input, and produce the use with mobile terminal The key signals input that family is set and function control is related.Specifically, user input unit 807 include contact panel 8071 and Other input equipments 8072.Contact panel 8071, also referred to as touch-screen, collect user on it or neighbouring touch operation (for example user uses any suitable objects or annex such as finger, stylus on contact panel 8071 or in contact panel 8071 Neighbouring operation).Contact panel 8071 may include both touch detecting apparatus and touch controller.Wherein, touch detection Device detects the touch orientation of user, and detects the signal that touch operation is brought, and transmits a signal to touch controller;Touch control Device processed receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives processor 810, receiving area Manage the order that device 810 is sent and performed.It is furthermore, it is possible to more using resistance-type, condenser type, infrared ray and surface acoustic wave etc. Type realizes contact panel 8071.Except contact panel 8071, user input unit 807 can also include other input equipments 8072.Specifically, other input equipments 8072 can include but is not limited to physical keyboard, function key (such as volume control button, Switch key etc.), trace ball, mouse, operation lever, details are not described herein.
Further, contact panel 8071 can be covered on display panel 8061, when contact panel 8071 is detected at it On or near touch operation after, send to processor 810 with determine touch event type, be followed by subsequent processing device 810 according to touch The type for touching event provides corresponding visual output on display panel 8061.Although in fig. 8, contact panel 8071 and display Panel 8061 is the component independent as two to realize the function that outputs and inputs of mobile terminal, but in some embodiments In, can be integrated by contact panel 8071 and display panel 8061 and realize the function that outputs and inputs of mobile terminal, it is specific this Place does not limit.
Interface unit 808 is the interface that external device (ED) is connected with mobile terminal 800.For example, external device (ED) can include Line or wireless head-band earphone port, external power supply (or battery charger) port, wired or wireless data port, storage card end Mouth, port, audio input/output (I/O) port, video i/o port, earphone end for connecting the device with identification module Mouthful etc..Interface unit 808 can be used for receive the input (for example, data message, electric power etc.) from external device (ED) and One or more elements that the input received is transferred in mobile terminal 800 can be used in 800 He of mobile terminal Data are transmitted between external device (ED).
Memory 809 can be used for storage software program and various data.Memory 809 can mainly include storing program area And storage data field, wherein, storing program area can storage program area, application program (such as the sound needed at least one function Sound playing function, image player function etc.) etc.;Storage data field can store according to mobile phone use created data (such as Voice data, phone directory etc.) etc..In addition, memory 809 can include high-speed random access memory, can also include non-easy The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 810 is the control centre of mobile terminal, utilizes each of various interfaces and the whole mobile terminal of connection A part, by running or performing the software program and/or module that are stored in memory 809, and calls and is stored in storage Data in device 809, perform the various functions and processing data of mobile terminal, so as to carry out integral monitoring to mobile terminal.Place Reason device 810 may include one or more processing units;Preferably, processor 810 can integrate application processor and modulatedemodulate is mediated Device is managed, wherein, application processor mainly handles operating system, user interface and application program etc., and modem processor is main Handle wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 810.
Mobile terminal 800 can also include the power supply 811 (such as battery) to all parts power supply, it is preferred that power supply 811 Can be logically contiguous by power-supply management system and processor 810, so as to realize management charging by power-supply management system, put The function such as electricity and power managed.
In addition, mobile terminal 800 includes some unshowned function modules, details are not described herein.
Preferably, the embodiment of the present invention also provides a kind of mobile terminal, including memory 809, processor 810 and is stored in It is real when which is performed by processor 810 on memory 809 and the computer program that can be run on processor 810 Each process of the guard method embodiment of existing above-mentioned user data, and identical technique effect can be reached, to avoid repeating, this In repeat no more.
The embodiment of the present invention also provides a kind of computer-readable recording medium, and meter is stored with computer-readable recording medium Calculation machine program, the computer program realize each mistake of the guard method embodiment of above-mentioned user data when being executed by processor Journey, and identical technique effect can be reached, to avoid repeating, which is not described herein again.Wherein, the computer-readable storage medium Matter, such as read-only storage (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation RAM), magnetic disc or CD etc..
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row His property includes, so that process, method, article or device including a series of elements not only include those key elements, and And other elements that are not explicitly listed are further included, or further include as this process, method, article or device institute inherently Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this Also there are other identical element in the process of key element, method, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on such understanding, technical scheme substantially in other words does the prior art Going out the part of contribution can be embodied in the form of software product, which is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), including some instructions are used so that a station terminal (can be mobile phone, computer, services Device, air conditioner, or network equipment etc.) perform method described in each embodiment of the present invention.
The embodiment of the present invention is described above in conjunction with attached drawing, but the invention is not limited in above-mentioned specific Embodiment, above-mentioned embodiment is only schematical, rather than restricted, those of ordinary skill in the art Under the enlightenment of the present invention, in the case of present inventive concept and scope of the claimed protection is not departed from, it can also make very much Form, belongs within the protection of the present invention.

Claims (18)

  1. A kind of 1. guard method of user data, it is characterised in that the described method includes:
    Destination mobile terminal receives the solicited message sent by the first mobile terminal;
    When the character string in the solicited message includes default PIN code, the destination mobile terminal obtains what is prestored With the associated lock instruction of the solicited message;
    The destination mobile terminal performs the lock instruction and the SIM card in the destination mobile terminal is locked.
  2. 2. according to the method described in claim 1, it is characterized in that, the destination mobile terminal performs the lock instruction to institute While stating the SIM card in destination mobile terminal and locked, return to one to first mobile terminal and be used to release the lock Surely the random code instructed, the random code are the PIN code after destination mobile terminal modifies the PIN code of the SIM card;
    The method further includes:
    Destination mobile terminal receives locking of the random code releasing to the SIM card.
  3. 3. according to the method described in claim 1, it is characterized in that, the destination mobile terminal is received by the first mobile terminal hair Before the solicited message sent, the method further includes:
    Whether the pre-set user data of destination mobile terminal detection storage inside are abnormal;
    If being abnormal, destination mobile terminal perform it is corresponding with the user data protection instruction to the user data into Row protection.
  4. 4. according to the method described in claim 3, it is characterized in that, the user data is in default user data record sheet Data;
    Whether the pre-set user data of destination mobile terminal detection storage inside are abnormal, and are specially:
    Whether the user data that destination mobile terminal is detected in the user data record sheet is abnormal.
  5. 5. according to the method described in claim 4, it is characterized in that, the data in the user data record sheet are included at least and used Usage time and place of the family to the destination mobile terminal;
    Whether the pre-set user data of destination mobile terminal detection storage inside are abnormal, and are specially:
    Whether destination mobile terminal is according to usage time detection screen locking duration of the user to the destination mobile terminal beyond default Period;And/or
    Whether destination mobile terminal detection user is default place to the place to use of the destination mobile terminal;
    If screen locking duration is not default place beyond preset time period or/and place to use, judgement is abnormal.
  6. 6. according to the method described in claim 5, it is characterized in that, the data in the user data record sheet further include record User account information;
    Whether the pre-set user data of destination mobile terminal detection storage inside are abnormal, and are specially:
    Destination mobile terminal detects whether the user account signal has increase, deletion or change;
    If so, then judge to be abnormal.
  7. 7. according to the method described in claim 6, it is characterized in that, the data in the user data record sheet further include record Associated person information;
    Whether the pre-set user data of destination mobile terminal detection storage inside are abnormal, and are specially:
    Destination mobile terminal detects whether the associated person information has increase or deletion;
    If so, then judge to be abnormal.
  8. 8. according to claim 3-7 any one of them methods, it is characterised in that the method further includes:
    Detect whether the protection instruction is released from;
    If the protection instruction is released from, the abnormal user data is added in the user data record sheet.
  9. 9. a kind of mobile terminal, it is characterised in that the mobile terminal includes:
    Receiving module, for receiving the solicited message sent by the first mobile terminal;
    Acquisition module, when including default PIN code for the character string in the solicited message, obtain prestore with institute State the associated lock instruction of solicited message;
    Execution module, locks the SIM card in the mobile terminal for performing the lock instruction.
  10. 10. mobile terminal according to claim 9, it is characterised in that the mobile terminal further includes:
    Return to module, be used to releasing the random code of the lock instruction for returning to one to first mobile terminal, it is described with Machine code is the PIN code after the mobile terminal modifies the PIN code of the SIM card;
    Module is released, for receiving locking of the random code releasing to the SIM card.
  11. 11. mobile terminal according to claim 10, it is characterised in that the mobile terminal further includes:
    Whether detection module, the pre-set user data for detecting the mobile terminal storage inside are abnormal;
    The execution module is additionally operable to, when the result of detection module detection is is abnormal, perform and the user data The user data is protected in corresponding protection instruction.
  12. 12. mobile terminal according to claim 11, it is characterised in that the user data is remembered for default user data Record the data in table;
    The detection module is specifically used for:
    Whether the user data that destination mobile terminal is detected in the user data record sheet is abnormal.
  13. 13. mobile terminal according to claim 12, it is characterised in that the data in the user data record sheet are at least Including usage time of the user to the destination mobile terminal and place;
    The detection module is specifically used for:
    Whether destination mobile terminal is according to usage time detection screen locking duration of the user to the destination mobile terminal beyond default Period;And/or
    Whether destination mobile terminal detection user is default place to the place to use of the destination mobile terminal;
    If screen locking duration is not default place beyond preset time period or/and place to use, judgement is abnormal.
  14. 14. mobile terminal according to claim 13, it is characterised in that the data in the user data record sheet are also wrapped Include the user account information of record;
    The detection module is specifically used for:
    Destination mobile terminal detects whether the user account signal has increase, deletion or change;
    If so, then judge to be abnormal.
  15. 15. mobile terminal according to claim 14, it is characterised in that the data in the user data record sheet are also wrapped Include the associated person information of record;
    The detection module is specifically used for:
    Destination mobile terminal detects whether the associated person information has increase or deletion;
    If so, then judge to be abnormal.
  16. 16. according to claim 11-15 any one of them mobile terminals, it is characterised in that the mobile terminal further includes:
    Instruction detection module, for detecting whether the protection instruction is released from;
    Add module, for described instruction detection module detect it is described protection instruction be released from when, then will exception described in User data is added in the user data record sheet.
  17. A kind of 17. mobile terminal, it is characterised in that including:Memory, processor and it is stored on the memory and can be in institute The computer program run on processor is stated, such as claim 1 to 8 is realized when the computer program is performed by the processor Any one of user data guard method the step of.
  18. 18. a kind of computer-readable recording medium, it is characterised in that be stored with computer on the computer-readable recording medium Program, realizes the guarantor such as user data described in any item of the claim 1 to 8 when the computer program is executed by processor The step of maintaining method.
CN201711204387.2A 2017-11-27 2017-11-27 The guard method of user data and mobile terminal Pending CN107948390A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711204387.2A CN107948390A (en) 2017-11-27 2017-11-27 The guard method of user data and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711204387.2A CN107948390A (en) 2017-11-27 2017-11-27 The guard method of user data and mobile terminal

Publications (1)

Publication Number Publication Date
CN107948390A true CN107948390A (en) 2018-04-20

Family

ID=61949948

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711204387.2A Pending CN107948390A (en) 2017-11-27 2017-11-27 The guard method of user data and mobile terminal

Country Status (1)

Country Link
CN (1) CN107948390A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109117666A (en) * 2018-07-27 2019-01-01 深圳市国通世纪科技开发有限公司 Lose terminal safety protection method, computer equipment and storage medium
CN110795596A (en) * 2019-11-07 2020-02-14 北京首钢自动化信息技术有限公司 Information feedback method and device for client
WO2020142864A1 (en) * 2019-01-07 2020-07-16 Citrix Systems, Inc. Subscriber identity management

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1407787A (en) * 2001-09-08 2003-04-02 深圳市中兴通讯股份有限公司上海第二研究所 Self-alarming and anti-theft method for mobile terminals
JP2008109306A (en) * 2006-10-24 2008-05-08 Sharp Corp Portable terminal
CN101917691A (en) * 2010-08-12 2010-12-15 中国电信股份有限公司 Method, system and terminal for setting terminal PIN (Personal Identification Number) code
CN102929807A (en) * 2012-11-19 2013-02-13 周万荣 Method for initiatively performing loss judgment and data processing and mobile terminal
CN103957322A (en) * 2014-05-05 2014-07-30 深圳市中兴移动通信有限公司 Mobile terminal and antitheft method thereof

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1407787A (en) * 2001-09-08 2003-04-02 深圳市中兴通讯股份有限公司上海第二研究所 Self-alarming and anti-theft method for mobile terminals
JP2008109306A (en) * 2006-10-24 2008-05-08 Sharp Corp Portable terminal
CN101917691A (en) * 2010-08-12 2010-12-15 中国电信股份有限公司 Method, system and terminal for setting terminal PIN (Personal Identification Number) code
CN102929807A (en) * 2012-11-19 2013-02-13 周万荣 Method for initiatively performing loss judgment and data processing and mobile terminal
CN103957322A (en) * 2014-05-05 2014-07-30 深圳市中兴移动通信有限公司 Mobile terminal and antitheft method thereof

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109117666A (en) * 2018-07-27 2019-01-01 深圳市国通世纪科技开发有限公司 Lose terminal safety protection method, computer equipment and storage medium
WO2020142864A1 (en) * 2019-01-07 2020-07-16 Citrix Systems, Inc. Subscriber identity management
US10986085B2 (en) 2019-01-07 2021-04-20 Citrix Systems, Inc. Subscriber identity management
US11647017B2 (en) 2019-01-07 2023-05-09 Citrix Systems, Inc. Subscriber identity management
CN110795596A (en) * 2019-11-07 2020-02-14 北京首钢自动化信息技术有限公司 Information feedback method and device for client

Similar Documents

Publication Publication Date Title
CN103488924B (en) A kind of unlocking processing method of terminal, device and equipment
CN109918930A (en) A kind of information protecting method and terminal device
CN105912905A (en) Fingerprint unlocking method and terminal
CN107133498A (en) A kind of privacy application management method and device and mobile terminal
CN108510022A (en) A kind of Quick Response Code generates, verification method and server
CN106470269A (en) A kind of method and apparatus of antitheft mobile phone
CN106327193B (en) A kind of system unlocking method and equipment
CN107748848A (en) A kind of information processing method and mobile terminal
CN108551521A (en) A kind of log-on message reminding method and mobile terminal
CN106874805A (en) A kind of data guard method, device and mobile terminal
CN110035183A (en) Information sharing method and terminal
CN107609407A (en) The guard method of information security and device in a kind of user terminal
CN110457888A (en) A kind of verifying code imput method, device, electronic equipment and storage medium
CN107948390A (en) The guard method of user data and mobile terminal
CN110309004A (en) The processing method and terminal of data
CN107707554A (en) A kind of login method and mobile terminal of application program account
CN107133507A (en) A kind of privacy services system access method, device and mobile terminal
CN108710806A (en) A kind of terminal unlock method, mobile terminal
CN108197448A (en) Document display method, device, readable storage medium storing program for executing and terminal
CN107786739A (en) A kind of information acquisition method and mobile terminal
CN107577961A (en) Mobile terminal and Related product available for security information protection
CN109918944A (en) A kind of information protecting method, device, mobile terminal and storage medium
CN110321731A (en) A kind of information protecting method and mobile terminal
CN109218984A (en) A kind of method for tracing and mobile terminal
CN106874795A (en) A kind of tamper machine method of mobile terminal, device and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180420

RJ01 Rejection of invention patent application after publication