CN108509778A - End message guard method, device, computer equipment and storage medium - Google Patents
End message guard method, device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN108509778A CN108509778A CN201810125064.2A CN201810125064A CN108509778A CN 108509778 A CN108509778 A CN 108509778A CN 201810125064 A CN201810125064 A CN 201810125064A CN 108509778 A CN108509778 A CN 108509778A
- Authority
- CN
- China
- Prior art keywords
- information
- terminal
- authentication
- privacy
- privacy information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/88—Detecting or preventing theft or loss
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
This application involves a kind of end message guard method, system, computer equipment and storage mediums.The method includes:When receiving terminal out code, then detect whether safety switch is opened;When detecting that safety switch is opened, the first authentication prompt message is generated;The first authentication information corresponding with the first authentication prompt message for receiving input carries out subscriber authentication according to the first authentication information;When subscriber authentication fails, then terminal out code and opening imformation protected mode are not executed.It being capable of effective protection end message safety using this method.
Description
Technical field
This application involves field of computer technology, are set more particularly to a kind of end message guard method, device, computer
Standby and storage medium.
Background technology
The mobile terminals such as mobile phone, tablet computer become the requirement of people's daily life, store in mobile terminal big
Measure individual subscriber privacy information.Currently, the main mode using setting password protects the information security of user, still, if moved
Dynamic terminal occurs to lose or is stolen and falls into his human hand, once the operations such as holder shuts down to terminal, brush machine, user
The information being stored in terminal will lose completely, can not restore, and be likely to bring more additional losses to user
And injury, the information security of mobile terminal are unable to get effective protection.
Invention content
Based on this, it is necessary in view of the above technical problems, provide a kind of effective protection information of mobile terminal safety of capableing of
Method, apparatus, computer equipment and storage medium.
A kind of end message guard method, the method includes:
When receiving terminal out code, postpones power-off operation and detect whether safety switch is opened;
When detecting that the safety switch is opened, the first authentication prompt message is generated;
The first authentication information corresponding with the first authentication prompt message for receiving input, according to described the
One authentication information carries out subscriber authentication;
When subscriber authentication fails, then the terminal out code and opening imformation protected mode are intercepted.
Before whether the detection safety switch is opened in one of the embodiments, further include:
Receive the safety switch open command that security platform is sent;
Safety switch is opened according to the safety switch open command.
In one of the embodiments, after the opening imformation protected mode, including:
Preset alarm recording is obtained, plays the preset alarm recording until terminal power exhausts.
In one of the embodiments, after stating opening imformation protected mode, including:
Obtain privacy information list and default privacy application;
Privacy information in the privacy information list is hidden, and the default privacy application is subjected to operation lock
It is fixed.
In one of the embodiments, after the opening imformation protected mode, including:
Obtain privacy information and terminal iidentification;
The privacy information is associated with terminal iidentification and is uploaded to security platform;
After the privacy information uploads, by the privacy information from local deletion.
In one of the embodiments, it is described by the privacy information after local delete, including:
Receive the information protection mode out code that the security platform is sent;
The second authentication prompt message is generated according to described information protected mode out code;
The second authentication information corresponding with the second authentication prompt message for receiving input, according to described the
Two authentication informations carry out subscriber authentication;
When subscriber authentication success, described information protected mode is closed.
In one of the embodiments, after the closing described information protected mode, including:
It receives privacy information and restores instruction;
Restore instruction according to the privacy information and obtain terminal iidentification, the privacy information for generating the carrying terminal iidentification is extensive
Multiple request;
The privacy information recovery request is sent to the security platform;
Receive the privacy information inquired according to the terminal iidentification that the security platform returns.
A kind of end message protective device, described device include:
Detection module is switched, is for when receiving terminal out code, postponing power-off operation and detecting safety switch
No unlatching;
First information generation module, for when detecting that the safety switch is opened, generating the first authentication prompt
Information;
Authentication module, the first identity corresponding with the first authentication prompt message for receiving input are tested
Information is demonstrate,proved, subscriber authentication is carried out according to first authentication information;
Protected mode opening module, for when subscriber authentication fails, then intercepting the terminal out code and opening
Open information protection mode.
A kind of computer equipment, including memory and processor, the memory are stored with computer program, the processing
The step of device realizes the above method when executing the computer program.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor
The step of above method is realized when row.
Above-mentioned information of mobile terminal guard method, device, computer equipment and storage medium are opened in emergency terminal switch
In the case of, when receiving the terminal out code of user, the operation of subscriber authentication is carried out to active user, when to working as
When preceding subscriber authentication failure, terminal out code is intercepted to not go on the shutoff operation of terminal, keeps terminal maximum
Open state is kept to degree, in addition, opening imformation protected mode, takes other remedial measures to race against time for user.
Description of the drawings
Fig. 1 is the flow diagram of end message guard method in one embodiment;
Fig. 2 is the structure diagram of end message protective device in one embodiment;
Fig. 3 is the internal structure chart of one embodiment Computer equipment.
Specific implementation mode
It is with reference to the accompanying drawings and embodiments, right in order to make the object, technical solution and advantage of the application be more clearly understood
The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, not
For limiting the application.
In one embodiment, as shown in Figure 1, providing a kind of end message guard method, include the following steps:
Step 110, when receiving terminal out code, postpone power-off operation and detect whether safety switch is opened.
In the present embodiment, terminal can be, but not limited to be the bodies such as various mobile phones, tablet computer, portable wearable device
Product mobile device that is smaller and being chronically at open state.User can such as pass through long-press according to the specific power-off operation of terminal
The modes such as power key control terminal and are sent out terminal out code, so that terminal is shut down according to terminal out code
Operation.After terminal receives terminal out code, it is not immediately performed power-off operation, but detects whether safety switch is opened.
Safety switch is protected for the information security to terminal, and when safety switch is opened, terminal is being closed
Present terminal must be verified using the user identity of user before machine operation.Whether safety switch is opened can be by user
It is selected.Preferably, the init state of safety switch is open state in terminal, and user in use can be free
It chooses whether to open safety switch.
Step 120, when detecting that safety switch is opened, the first authentication prompt message is generated.
When terminal detects that safety switch is opened, the first authentication prompt message is generated, and by the first authentication
Prompt message shows user.Specifically, terminal can show screen locking unlock interface, keep user's input numerical ciphers, pattern close
Code etc., terminal can also generate the prompt of the biological characteristics such as input fingerprint, vocal print, facial characteristics to acquire the biological characteristic of user
Information verifies user identity by biological information.Specific verification mode is not limited to the example above, Ke Yigen
It specifically sets, can also select to set by user according to the unit type of terminal.
When terminal detects that safety switch is not opened, power-off operation is carried out according to the terminal out code received.
Step 130, the first authentication information corresponding with the first authentication prompt message for receiving input, according to
One authentication information carries out subscriber authentication.
After user receives the first authentication prompt message of terminal, it can be prompted according to the first authentication of displaying
The verification mode of information inputs corresponding first authentication information.For example, when prompt message is input password, Yong Huke
To input password by the input equipment of the terminals such as screen, keyboard;When prompt message is input verbal instructions, user can lead to
Cross the microphone input verbal instructions of terminal.
After terminal receives the first authentication information input by user, the pre-set user identity letter being locally stored is obtained
Breath, pre-set user identity information can be that terminal is set by user when first used.Terminal is by the first authentication information and in advance
If subscriber identity information is matched, judge whether user identity is proved to be successful according to matching result.
It is illustrated by taking verbal instructions verification mode as an example, user can pass through the voice collection device such as microphone of terminal
Verbal instructions are inputted, after terminal collects verbal instructions input by user, vocal print feature are identified from verbal instructions, specifically
The verbal instructions of acquisition are sent to server by ground, terminal, and the method for recognizing sound-groove pair unrelated with text may be used in server
The verbal instructions of user are identified, and therefrom identify vocal print feature, the user that server is sent together according to same verbal instructions
The corresponding pre-stored default vocal print feature of identifier lookup, the vocal print feature that will identify that are preset vocal print feature and are matched,
Judge whether two vocal print features belong to same user according to matching result.When user carries out identity information registration, terminal can
To acquire the log-in password recording of user, trains recording input model to be trained log-in password, generate pre-training vocal print and know
Other model, and standard vocal print discriminant vectors are extracted, standard vocal print discriminant vectors are stored as default vocal print feature.Server obtains
After taking verbal instructions, verbal instructions are inputted into pre-training Application on Voiceprint Recognition model and builds unidirectional vocal print discriminant vectors and is carried as this
The vocal print feature of taking-up calculates the vector space distance of the first vocal print feature and the second vocal print feature, according to vector space distance
Judge whether two vocal print features match.Specifically, when vector space distance is less than or equal to pre-determined distance threshold value, judge two
A vocal print feature successful match judges that two vocal print features matchings are lost when counting vector space distance more than pre-determined distance threshold value
It loses.
Step 140, when subscriber authentication fails, then terminal out code and opening imformation protected mode are intercepted.
When terminal-pair subscriber authentication fails, terminal does not execute the terminal out code received, without shutdown
Operation.Terminal opening imformation protected mode, information protection mode are protected to the data information in terminal, prevent from currently using
Family obtains a kind of protected mode for stealing or damaging the data information in terminal.After opening imformation protected mode, terminal can be into
A series of operation of protection data informations of row.
When terminal-pair subscriber authentication success, terminal carries out power-off operation according to terminal out code.
In the case where emergency terminal switch is opened, when terminal receives the terminal out code of user, to currently using
Family carry out subscriber authentication operation, when to current user identities authentication failed, intercept terminal out code to not after
The continuous shutoff operation for carrying out terminal, makes terminal farthest keep open state, takes other remedial measures to strive for for user
Time prevents other people from shutting down, the operations such as brush machine.In addition, terminal opening imformation protected mode, prevents other people from obtaining in terminal
Property, private data and cause damages to user.
In one embodiment, before the step of whether detection safety switch is opened, further include:Security platform is received to send
Safety switch open command;Safety switch is opened according to safety switch open command.
Security platform is the corresponding information security services device of terminal or server cluster.Terminal user is enterprising in terminal in advance
Row user's registration, and send registration information to security platform and stored, log-on message may include user name, user's account
Number, the information such as terminal iidentification, authentication password.Security platform stores the log-on message of user.
In one embodiment, the application program of security platform is installed, user can be enterprising in application program in terminal
Row user's registration, and security platform is sent registration information to by application program.When user has found that terminal is lost, Ke Yi
Application program is downloaded on other-end, progress terminal reports the loss operation after logging in the account of oneself.It specifically, can be to security platform
Send the terminal iidentification and user's own user account for carrying lost terminal reports the loss request, and security platform receives user
After what is sent reports the loss request, the prompt to the terminal transmission input authentication password for report the loss operation, user is according to prompt
Authentication password is inputted, authentication password input by user is sent to security platform by the terminal that row reports the loss operation, safety
After platform obtains authentication password, the authentication password stored when registration corresponding with user account is searched, by two mouths
Order is compared, when two passwords are consistent, to the authentication of user by and generate safety switch open command, terminal is looked into
The corresponding terminal iidentification of user account is looked for, safety switch open command is sent to the corresponding terminal of terminal iidentification.Wherein, identity
Verify password can be numerical ciphers, graphical passwords, user biological information etc..
In other embodiments, user, which can also be used the modes such as phone is reported the loss, short message is reported the loss and carry out terminal, reports the loss, can also
By the way of manual verification's user identity, however it is not limited to the mode described in above-described embodiment.
After terminal receives the safety switch open command of security platform transmission, the safety switch of terminal is opened.Terminal
After opening safety switch, after terminal detects terminal out code, need first to verify the identity of active user.One
In a embodiment, after terminal receives safety switch open command, the safety switch of power supply can also be opened, specifically, eventually
End is internal can be arranged corresponding lock on the position of supply unit connection and power supply, the case where safety switch is not opened
Under, lock is in the open state, and when safety switch is opened, terminal sends out line lock instruction to supply unit, by power supply
Lock fastens, to lock power supply in terminal internal body, so that user can not take out power supply from terminal, also not
It can realize the power-off operation by extracting power supply.In other embodiments, the locking structure of the power supply of terminal can also use lock
Hardware configuration except button, as long as allowing to lock power supply from terminal inner.
In the present embodiment, when user lose mobile phone before not by terminal safety switch open when, can also pass through to
The mode that security platform is reported the loss opens safety switch, to provide more remedial measures by security platform control terminal.
In one embodiment, after safety switch is opened, whether terminal detection GPS positioning function opens, when detecting
GPS positioning function is when opening, to open GPS positioning so that can obtain the geographical location where terminal in real time.In opening imformation
After protected mode, the geographical location for being currently located ground of acquisition is sent to security platform by terminal in real time or periodically,
After security platform receives geographical location information, geographical location information is stored, and is searched in user.In a reality
It applies in example, when user carries out terminal by other-end reports the loss operation, security platform can be by the lost terminal received
Geographical location information real-time synchronization is sent to the terminal for carrying out reporting the loss operation, consequently facilitating user finds lost terminal.
In one embodiment, after the step of terminal opening imformation protected mode, including:Preset alarm recording is obtained,
Preset alarm recording is played until terminal power exhausts.
Preset alarm recording can be previously set and be stored in advance in terminal before terminal is dispatched from the factory, preset alarm record
Sound can also be voluntarily to be recorded and stored by user.The content of preset alarm recording may include that terminal is in loss shape
Contact method or information warning that state, terminal are brought back etc..For example, preset alarm recording can be that " hand-set from stolen please dial electricity
Words xxxxxxxxxx contacts security platform as early as possible, and well-wisher sends me go home ".
In one embodiment, the volume of preset alarm is recorded broadcasting frequency, broadcasting can be according to present terminal
Electricity and current acoustic environment automatically adjust.Specifically, terminal detects current remaining capacity, and detects and work as front ring
The noise decibel in border can prestore broadcasting frequency in terminal, broadcast sound volume and remaining capacity, ambient noise decibel compare
Relation table, can also be previously set broadcasting frequency, broadcast sound volume computation rule, table look-up or according to rule calculate by way of
Broadcasting frequency and broadcast sound volume are obtained, preset alarm recording is played out according to obtained broadcasting frequency and broadcast sound volume, and
And it plays to the electricity of terminal and exhausts.
In this embodiment, by playing preset alarm recording, the attention of surrounding population can be caused and cause the person's of picking up
It is psychological frightened, contribute to the person of picking up to return lost terminal.
In one embodiment, after the step of opening imformation protected mode, including:It obtains privacy information list and presets
Privacy application;Privacy information in privacy information list is hidden, and default privacy application is subjected to operation locking.
Privacy information can be a specific information, or a category information.May include in privacy information list
Specific name of the information, information coding etc., can also store the item name belonging to information.If privacy information may include address list
Information, short message record etc., or specific memo information etc..User, can be by selection in using terminal
Information such as memorandum newly carries out privacy label, some can also be related to the more same category information of user's private data such as by terminal
Address list information acquiescence carries out privacy label.The information or information category for carrying out privacy label are stored in privacy information list.
In addition, user can also be selectively mounted to the application program in terminal, privacy label is carried out to the application program of selection.
Terminal obtains privacy information list, and name of the information, the information coding of privacy information are read from privacy information list
Or information category etc., and corresponding all privacy informations are found out, operation is hidden to privacy information, by privacy information
Set invisible mode, active user can not check privacy information.For example, active user wants to open address list and check to communicate to believe
When breath, terminal display is space record.
Terminal obtains the Apply Names or application identities for presetting privacy application, searches Apply Names or application identities are corresponding
Application program, by application program set lock-out state, being placed in the application program of lock-out state can not start, so that current use
Family can not check card to apply and be operated.
In this embodiment, when the user of lost terminal does not have setting terminal screen locking function, terminal can also be voluntarily
Important privacy information and privacy application are locked, the person of picking up is avoided to steal the privacy information of user from terminal.
In one embodiment, after the step of opening imformation protected mode, including:Obtain privacy information and terminal mark
Know;Privacy information is associated with terminal iidentification and is uploaded to security platform;After privacy information uploads, by privacy information from originally
It deletes on ground.
After opening imformation protected mode, terminal obtains privacy information list, and searches corresponding in privacy information list
Privacy information, terminal obtain terminal iidentification, privacy information is associated with terminal iidentification and is uploaded to security platform, security platform connects
After receiving privacy information, registration user account corresponding with terminal iidentification is searched, privacy information and registration user account are closed
Connection storage.After terminal detects that privacy information uploads, the privacy information of upload is deleted from local, so as to
It is more effectively prevented from leakage of private information.
In one embodiment, by terminal iidentification privacy information after local the step of deleting, including:Receive terminal mark
Know the information protection mode out code that security platform is sent;Second is generated according to terminal identification information protected mode out code
Authentication prompt message;Receive the second authentication corresponding with the second authentication of terminal iidentification prompt message letter of input
Breath carries out subscriber authentication according to the second authentication information of terminal iidentification;When subscriber authentication success, terminal is closed
Identification information protected mode.
After terminal opening imformation protected mode, privacy information and privacy application in terminal are in the lock state, and
It plays always and presets alarm recording, terminal can not normal use.When user gives the terminal of loss for change, need to carry out terminal
The unlock operation for stating operation, so as to continue normal use terminal.
Operation is reported the loss in the releasing that user can carry out lost terminal by other-end, and user is by other-end to safety
Platform send carry user account report the loss releasing request, after releasing request is reported the loss in security platform reception, to request user
Identity is verified, for example, user can be prompted to input authentication password, when the authentication password input by user of reception
When consistent with what is prestored when user's registration, verification passes through.When security platform to the authentication of user by when, security platform is looked into
The corresponding terminal iidentification of registration user account is looked for, and generates information protection mode out code, security platform is by information protection mould
Formula out code is sent to the corresponding terminal of terminal iidentification.
After terminal receives the information protection mode out code of security platform transmission, the second authentication prompt letter is generated
Breath prompts active user to input authentication information.Authentication information can be the life of numerical ciphers, graphical passwords, user
Object characteristic information etc..After user inputs authentication information by the input equipment of terminal, terminal believes the authentication of reception
Breath is matched with the identity information that user prestores, and when successful match, is proved to be successful.When terminal-pair subscriber authentication success
When, terminal closing information protected mode.After information protection mode is closed, the every operation under terminal termination message protected mode.
If terminal can stop playing preset alarm recording, privacy application is unlocked, hiding privacy information is shown etc..
In the present embodiment, security platform control terminal closing information protected mode can be passed through by user so that use
Family still can be used normally after giving terminal for change.
In one embodiment, after the step of closing information protected mode, including:It receives privacy information and restores instruction;
Restore instruction according to privacy information and obtain terminal iidentification, generates the privacy information recovery request of carried terminal mark;Privacy is believed
Breath recovery request is sent to security platform;Receive the privacy information inquired according to terminal iidentification that security platform returns.
After user gives terminal and closing information protected mode for change, user can send privacy by terminal to security platform
Information recovering instructs, to be downloaded from security platform from the privacy information locally deleted.Specifically, user can be with security platform
Application program carry out restore privacy information operation, to terminal send out privacy information restore instruction, terminal receive privacy letter
After breath restores instruction, terminal iidentification is obtained, the privacy information recovery request for carrying terminal iidentification is generated, privacy information is restored
Request is sent to security platform.Security platform receives privacy information recovery request, is extracted eventually from privacy information recovery request
End mark searches the corresponding registration user account of terminal iidentification, obtains the privacy information with registration user account associated storage, will
The privacy information found returns to terminal.After terminal receives privacy information, according to the information encoding or information of privacy information
Privacy information is carried out classification storage by classification.
In the present embodiment, after user gives lost terminal for change, deleted privacy information can be downloaded from security platform,
Information in terminal is restored.
It should be understood that although each step in the flow chart of Fig. 1 is shown successively according to the instruction of arrow, this
A little steps are not that the inevitable sequence indicated according to arrow executes successively.Unless expressly state otherwise herein, these steps
It executes there is no the limitation of stringent sequence, these steps can execute in other order.Moreover, at least part in Fig. 1
Step may include that either these sub-steps of multiple stages or stage are executed in synchronization to multiple sub-steps
It completes, but can execute at different times, the execution sequence in these sub-steps or stage is also not necessarily to be carried out successively,
But it can either the sub-step of other steps or at least part in stage execute in turn or alternately with other steps.
In one embodiment, as shown in Fig. 2, providing a kind of end message protective device, including:Switch detection module
210, first information generation module 220, authentication module 230 and protected mode opening module 240, wherein:
Detection module 210 is switched, for when receiving terminal out code, postponing power-off operation and detecting safety switch
Whether open.
First information generation module 220, for when detecting that safety switch is opened, generating the first authentication prompt letter
Breath.
Authentication module 230, the first identity corresponding with the first authentication prompt message for receiving input are tested
Information is demonstrate,proved, subscriber authentication is carried out according to the first authentication information.
Protected mode opening module 240, for when subscriber authentication fails, then intercepting terminal out code and opening
Information protection mode.
In one embodiment, device further includes:
First command reception module, the safety switch open command for receiving security platform transmission.
Opening module is switched, for opening safety switch according to safety switch open command.
In one embodiment, device further includes:
Record playing module plays preset alarm recording until terminal power exhausts for obtaining preset alarm recording.
In one embodiment, device further includes:
Privacy acquisition module, for obtaining privacy information list and default privacy application.
Privacy locking module, for the privacy information in privacy information list to be hidden, and by default privacy application
Carry out operation locking.
In one embodiment, device further includes:
Data obtaining module, for obtaining privacy information and terminal iidentification.
Information uploading module is uploaded to security platform for privacy information to be associated with terminal iidentification.
Information deletion module, after being uploaded when privacy information, by privacy information from local deletion.
In one embodiment, device further includes:
Second command reception module, the information protection mode out code for receiving security platform transmission.
Second information generating module, for generating the second authentication prompt letter according to information protection mode out code
Breath.
Second authentication module, the second identity corresponding with the second authentication prompt message for receiving input are tested
Information is demonstrate,proved, subscriber authentication is carried out according to the second authentication information.
Protected mode closedown module is used for when subscriber authentication success, closing information protected mode.
In one embodiment, device further includes:
Restore command reception module, restores instruction for receiving privacy information.
Recovery request generation module obtains terminal iidentification for restoring instruction according to privacy information, generates carried terminal mark
The privacy information recovery request of knowledge.
Recovery request sending module, for privacy information recovery request to be sent to security platform.
Privacy information returns to module, the privacy information inquired according to terminal iidentification for receiving security platform return.
Specific about end message protective device limits the limit that may refer to above for end message guard method
Fixed, details are not described herein.Modules in above-mentioned end message protective device can fully or partially through software, hardware and its
It combines to realize.Above-mentioned each module can be embedded in or in the form of hardware independently of in the processor in computer equipment, can also
It is stored in a software form in the memory in computer equipment, in order to which processor calls the above modules of execution corresponding
Operation.
In one embodiment, a kind of computer equipment is provided, which can be terminal, internal structure
Figure can be as shown in Figure 3.The computer equipment includes the processor connected by system bus, memory, network interface, display
Screen and input unit.Wherein, the processor of the computer equipment is for providing calculating and control ability.The computer equipment is deposited
Reservoir includes non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system and computer journey
Sequence.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating
The network interface of machine equipment is used to communicate by network connection with external terminal.When the computer program is executed by processor with
Realize a kind of end message guard method.The display screen of the computer equipment can be that liquid crystal display or electric ink are shown
Screen, the input unit of the computer equipment can be the touch layer covered on display screen, can also be on computer equipment shell
Button, trace ball or the Trackpad of setting can also be external keyboard, Trackpad or mouse etc..
It will be understood by those skilled in the art that structure shown in Fig. 3, is only tied with the relevant part of application scheme
The block diagram of structure does not constitute the restriction for the computer equipment being applied thereon to application scheme, specific computer equipment
May include either combining certain components than more or fewer components as shown in the figure or being arranged with different components.
In one embodiment, a kind of computer equipment, including memory and processor are provided, which is stored with
Computer program, the processor realize following steps when executing computer program:When receiving terminal out code, postpone closing
Machine operates and detects whether safety switch is opened;When detecting that safety switch is opened, the first authentication prompt message is generated;
Receive input the first authentication information corresponding with the first authentication prompt message, according to the first authentication information into
Row subscriber authentication;When subscriber authentication fails, then terminal out code and opening imformation protected mode are intercepted.
In one embodiment, following steps are also realized when processor executes computer program:Security platform is received to send
Safety switch open command;Safety switch is opened according to safety switch open command.
In one embodiment, following steps are also realized when processor executes computer program:Preset alarm recording is obtained,
Preset alarm recording is played until terminal power exhausts.
In one embodiment, following steps are also realized when processor executes computer program:Obtain privacy information list
With default privacy application;Privacy information in privacy information list is hidden, and the application of default privacy is subjected to operation lock
It is fixed.
In one embodiment, following steps are also realized when processor executes computer program:Obtain privacy information and end
End mark;Privacy information is associated with terminal iidentification and is uploaded to security platform;After privacy information uploads, by privacy information
From local deletion.
In one embodiment, following steps are also realized when processor executes computer program:Security platform is received to send
Information protection mode out code;The second authentication prompt message is generated according to information protection mode out code;It receives
The second authentication information corresponding with the second authentication prompt message of input, is used according to the second authentication information
Family authentication;When subscriber authentication success, closing information protected mode.
In one embodiment, following steps are also realized when processor executes computer program:Privacy information is received to restore
Instruction;Restore instruction according to privacy information and obtain terminal iidentification, generates the privacy information recovery request of carried terminal mark;It will be hidden
Personal letter breath recovery request is sent to security platform;Receive the privacy information inquired according to terminal iidentification that security platform returns.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated
Machine program realizes following steps when being executed by processor:When receiving terminal out code, postpones power-off operation and detect peace
Whether full switch is opened;When detecting that safety switch is opened, the first authentication prompt message is generated;Receive input with the
Corresponding first authentication information of one identity verification tip information carries out user identity according to the first authentication information and tests
Card;When subscriber authentication fails, then terminal out code and opening imformation protected mode are intercepted.
In one embodiment, following steps are also realized when computer program is executed by processor:Receive security platform hair
The safety switch open command sent;Safety switch is opened according to safety switch open command.
In one embodiment, following steps are also realized when computer program is executed by processor:Obtain preset alarm record
Sound plays preset alarm recording until terminal power exhausts.
In one embodiment, following steps are also realized when computer program is executed by processor:Obtain privacy information row
Table and default privacy application;Privacy information in privacy information list is hidden, and default privacy application is operated
Locking.
In one embodiment, following steps are also realized when computer program is executed by processor:Obtain privacy information and
Terminal iidentification;Privacy information is associated with terminal iidentification and is uploaded to security platform;After privacy information uploads, privacy is believed
It ceases from local deletion.
In one embodiment, following steps are also realized when computer program is executed by processor:Receive security platform hair
The information protection mode out code sent;The second authentication prompt message is generated according to information protection mode out code;It connects
The second authentication information corresponding with the second authentication prompt message for receiving input is carried out according to the second authentication information
Subscriber authentication;When subscriber authentication success, closing information protected mode.
In one embodiment, following steps are also realized when computer program is executed by processor:It is extensive to receive privacy information
Multiple instruction;Restore instruction according to privacy information and obtain terminal iidentification, generates the privacy information recovery request of carried terminal mark;It will
Privacy information recovery request is sent to security platform;Receive the privacy letter inquired according to terminal iidentification that security platform returns
Breath.
One of ordinary skill in the art will appreciate that realizing all or part of flow in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer
In read/write memory medium, the computer program is when being executed, it may include such as the flow of the embodiment of above-mentioned each method.Wherein,
Any reference to memory, storage, database or other media used in each embodiment provided herein,
Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM
(PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include
Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms,
Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing
Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM
(RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above example can be combined arbitrarily, to keep description succinct, not to above-described embodiment
In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance
Shield is all considered to be the range of this specification record.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously
It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art
It says, under the premise of not departing from the application design, various modifications and improvements can be made, these belong to the protection of the application
Range.Therefore, the protection domain of the application patent should be determined by the appended claims.
Claims (10)
1. a kind of end message guard method, the method includes:
When receiving terminal out code, postpones power-off operation and detect whether safety switch is opened;
When detecting that the safety switch is opened, the first authentication prompt message is generated;
The first authentication information corresponding with the first authentication prompt message for receiving input, according to first body
Part verification information carries out subscriber authentication;
When subscriber authentication fails, then the terminal out code and opening imformation protected mode are intercepted.
2. according to the method described in claim 1, it is characterized in that, before whether the detection safety switch open, further include:
Receive the safety switch open command that security platform is sent;
Safety switch is opened according to the safety switch open command.
3. according to the method described in claim 1, it is characterized in that, after the opening imformation protected mode, including:
Preset alarm recording is obtained, plays the preset alarm recording until terminal power exhausts.
4. according to the method described in claim 1, it is characterized in that, after the opening imformation protected mode, including:
Obtain privacy information list and default privacy application;
Privacy information in the privacy information list is hidden, and the default privacy application is subjected to operation locking.
5. according to the method described in claim 1, it is characterized in that, after the opening imformation protected mode, including:
Obtain privacy information and terminal iidentification;
The privacy information is associated with terminal iidentification and is uploaded to security platform;
After the privacy information uploads, by the privacy information from local deletion.
6. according to the method described in claim 5, it is characterized in that, it is described by the privacy information after local delete, packet
It includes:
Receive the information protection mode out code that the security platform is sent;
The second authentication prompt message is generated according to described information protected mode out code;
The second authentication information corresponding with the second authentication prompt message for receiving input, according to second body
Part verification information carries out subscriber authentication;
When subscriber authentication success, described information protected mode is closed.
7. according to the method described in claim 6, it is characterized in that, after the closing described information protected mode, including:
It receives privacy information and restores instruction;
Restore instruction according to the privacy information and obtain terminal iidentification, the privacy information recovery for generating the carrying terminal iidentification is asked
It asks;
The privacy information recovery request is sent to the security platform;
Receive the privacy information inquired according to the terminal iidentification that the security platform returns.
8. a kind of end message protective device, which is characterized in that described device includes:
Detection module is switched, for when receiving terminal out code, postponing power-off operation and then whether detecting safety switch
It opens;
First information generation module, for when detecting that the safety switch is opened, generating the first authentication prompt message;
Authentication module, the first authentication corresponding with the first authentication prompt message letter for receiving input
Breath carries out subscriber authentication according to first authentication information;
Protected mode opening module, for when subscriber authentication fails, then intercepting the terminal out code and opening letter
Cease protected mode.
9. a kind of computer equipment, including memory and processor, the memory are stored with computer program, feature exists
In when the processor executes the computer program the step of any one of realization claim 1 to 7 the method.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program
The step of method described in any one of claim 1 to 7 is realized when being executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810125064.2A CN108509778A (en) | 2018-02-07 | 2018-02-07 | End message guard method, device, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810125064.2A CN108509778A (en) | 2018-02-07 | 2018-02-07 | End message guard method, device, computer equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108509778A true CN108509778A (en) | 2018-09-07 |
Family
ID=63375609
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810125064.2A Pending CN108509778A (en) | 2018-02-07 | 2018-02-07 | End message guard method, device, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108509778A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109753265A (en) * | 2019-01-08 | 2019-05-14 | 合肥联宝信息技术有限公司 | A kind of control method and electronic equipment |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104143059A (en) * | 2014-07-31 | 2014-11-12 | 可牛网络技术(北京)有限公司 | Method and system for improving safety of mobile terminal |
CN106572439A (en) * | 2016-10-31 | 2017-04-19 | 努比亚技术有限公司 | Terminal tracking method, device and mobile terminal |
CN106919818A (en) * | 2017-03-10 | 2017-07-04 | 深圳天珑无线科技有限公司 | A kind of verification method and device |
CN106982297A (en) * | 2017-04-01 | 2017-07-25 | 宇龙计算机通信科技(深圳)有限公司 | Safety protecting method and system |
CN107292208A (en) * | 2016-04-11 | 2017-10-24 | 中兴通讯股份有限公司 | Guarding against theft for mobile terminal steals method and device |
-
2018
- 2018-02-07 CN CN201810125064.2A patent/CN108509778A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104143059A (en) * | 2014-07-31 | 2014-11-12 | 可牛网络技术(北京)有限公司 | Method and system for improving safety of mobile terminal |
CN107292208A (en) * | 2016-04-11 | 2017-10-24 | 中兴通讯股份有限公司 | Guarding against theft for mobile terminal steals method and device |
CN106572439A (en) * | 2016-10-31 | 2017-04-19 | 努比亚技术有限公司 | Terminal tracking method, device and mobile terminal |
CN106919818A (en) * | 2017-03-10 | 2017-07-04 | 深圳天珑无线科技有限公司 | A kind of verification method and device |
CN106982297A (en) * | 2017-04-01 | 2017-07-25 | 宇龙计算机通信科技(深圳)有限公司 | Safety protecting method and system |
Non-Patent Citations (1)
Title |
---|
崔东浩: "《上海市长宁区社区教育教学丛书 移动学习与智慧生活》", 31 December 2016 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109753265A (en) * | 2019-01-08 | 2019-05-14 | 合肥联宝信息技术有限公司 | A kind of control method and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8385883B2 (en) | Apparatus and methods for locating, tracking and/or recovering a wireless communication device | |
US9218814B2 (en) | Cross monitoring method and system based on voiceprint recognition and location tracking | |
US8483659B2 (en) | Methods and systems for recovering lost or stolen mobile devices | |
CN101719955B (en) | Intelligent terminal system with fingerprint identification and information processing method | |
US8751801B2 (en) | System and method for authenticating users using two or more factors | |
CN109040439B (en) | Method and device for realizing privacy protection | |
US9262615B2 (en) | Methods and systems for improving the security of secret authentication data during authentication transactions | |
CN105530356B (en) | Communication terminal and its data guard method and device | |
CN108062464A (en) | Terminal control method and system based on Application on Voiceprint Recognition | |
WO2002054243A1 (en) | Authentication method and device | |
CN105592146A (en) | Equipment control method, device and terminal | |
CN107845165A (en) | A kind of server cabinet door control method, device and terminal | |
CN104700050A (en) | Mobile terminal safety positioning method and device | |
CN104023133A (en) | Anti-theft method and device for mobile terminal | |
CN109271757A (en) | A kind of offline Activiation method and system of software | |
CN108551550A (en) | Image control, the filming control method of camera applications, device and electronic equipment | |
CN108347730B (en) | Wireless communication processing method and device | |
CN108509778A (en) | End message guard method, device, computer equipment and storage medium | |
CN110049490A (en) | Safety protecting method, device, wearable device and the medium of wearable device | |
CN110298149A (en) | Account permission locking means, device, computer equipment and storage medium | |
CN108052811A (en) | Terminal control method and system based on face texture identification | |
CN107862601A (en) | A kind of enchashment method and system for being automatically positioned alarm | |
CN107045598A (en) | The theft preventing method and device of a kind of mobile device | |
JP3538095B2 (en) | Electronic approval system and method using personal identification | |
CN106919818A (en) | A kind of verification method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180907 |