CN108509778A - End message guard method, device, computer equipment and storage medium - Google Patents

End message guard method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN108509778A
CN108509778A CN201810125064.2A CN201810125064A CN108509778A CN 108509778 A CN108509778 A CN 108509778A CN 201810125064 A CN201810125064 A CN 201810125064A CN 108509778 A CN108509778 A CN 108509778A
Authority
CN
China
Prior art keywords
information
terminal
authentication
privacy
privacy information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810125064.2A
Other languages
Chinese (zh)
Inventor
姚宏志
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Puhui Enterprise Management Co Ltd
Original Assignee
Ping An Puhui Enterprise Management Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Puhui Enterprise Management Co Ltd filed Critical Ping An Puhui Enterprise Management Co Ltd
Priority to CN201810125064.2A priority Critical patent/CN108509778A/en
Publication of CN108509778A publication Critical patent/CN108509778A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

This application involves a kind of end message guard method, system, computer equipment and storage mediums.The method includes:When receiving terminal out code, then detect whether safety switch is opened;When detecting that safety switch is opened, the first authentication prompt message is generated;The first authentication information corresponding with the first authentication prompt message for receiving input carries out subscriber authentication according to the first authentication information;When subscriber authentication fails, then terminal out code and opening imformation protected mode are not executed.It being capable of effective protection end message safety using this method.

Description

End message guard method, device, computer equipment and storage medium
Technical field
This application involves field of computer technology, are set more particularly to a kind of end message guard method, device, computer Standby and storage medium.
Background technology
The mobile terminals such as mobile phone, tablet computer become the requirement of people's daily life, store in mobile terminal big Measure individual subscriber privacy information.Currently, the main mode using setting password protects the information security of user, still, if moved Dynamic terminal occurs to lose or is stolen and falls into his human hand, once the operations such as holder shuts down to terminal, brush machine, user The information being stored in terminal will lose completely, can not restore, and be likely to bring more additional losses to user And injury, the information security of mobile terminal are unable to get effective protection.
Invention content
Based on this, it is necessary in view of the above technical problems, provide a kind of effective protection information of mobile terminal safety of capableing of Method, apparatus, computer equipment and storage medium.
A kind of end message guard method, the method includes:
When receiving terminal out code, postpones power-off operation and detect whether safety switch is opened;
When detecting that the safety switch is opened, the first authentication prompt message is generated;
The first authentication information corresponding with the first authentication prompt message for receiving input, according to described the One authentication information carries out subscriber authentication;
When subscriber authentication fails, then the terminal out code and opening imformation protected mode are intercepted.
Before whether the detection safety switch is opened in one of the embodiments, further include:
Receive the safety switch open command that security platform is sent;
Safety switch is opened according to the safety switch open command.
In one of the embodiments, after the opening imformation protected mode, including:
Preset alarm recording is obtained, plays the preset alarm recording until terminal power exhausts.
In one of the embodiments, after stating opening imformation protected mode, including:
Obtain privacy information list and default privacy application;
Privacy information in the privacy information list is hidden, and the default privacy application is subjected to operation lock It is fixed.
In one of the embodiments, after the opening imformation protected mode, including:
Obtain privacy information and terminal iidentification;
The privacy information is associated with terminal iidentification and is uploaded to security platform;
After the privacy information uploads, by the privacy information from local deletion.
In one of the embodiments, it is described by the privacy information after local delete, including:
Receive the information protection mode out code that the security platform is sent;
The second authentication prompt message is generated according to described information protected mode out code;
The second authentication information corresponding with the second authentication prompt message for receiving input, according to described the Two authentication informations carry out subscriber authentication;
When subscriber authentication success, described information protected mode is closed.
In one of the embodiments, after the closing described information protected mode, including:
It receives privacy information and restores instruction;
Restore instruction according to the privacy information and obtain terminal iidentification, the privacy information for generating the carrying terminal iidentification is extensive Multiple request;
The privacy information recovery request is sent to the security platform;
Receive the privacy information inquired according to the terminal iidentification that the security platform returns.
A kind of end message protective device, described device include:
Detection module is switched, is for when receiving terminal out code, postponing power-off operation and detecting safety switch No unlatching;
First information generation module, for when detecting that the safety switch is opened, generating the first authentication prompt Information;
Authentication module, the first identity corresponding with the first authentication prompt message for receiving input are tested Information is demonstrate,proved, subscriber authentication is carried out according to first authentication information;
Protected mode opening module, for when subscriber authentication fails, then intercepting the terminal out code and opening Open information protection mode.
A kind of computer equipment, including memory and processor, the memory are stored with computer program, the processing The step of device realizes the above method when executing the computer program.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor The step of above method is realized when row.
Above-mentioned information of mobile terminal guard method, device, computer equipment and storage medium are opened in emergency terminal switch In the case of, when receiving the terminal out code of user, the operation of subscriber authentication is carried out to active user, when to working as When preceding subscriber authentication failure, terminal out code is intercepted to not go on the shutoff operation of terminal, keeps terminal maximum Open state is kept to degree, in addition, opening imformation protected mode, takes other remedial measures to race against time for user.
Description of the drawings
Fig. 1 is the flow diagram of end message guard method in one embodiment;
Fig. 2 is the structure diagram of end message protective device in one embodiment;
Fig. 3 is the internal structure chart of one embodiment Computer equipment.
Specific implementation mode
It is with reference to the accompanying drawings and embodiments, right in order to make the object, technical solution and advantage of the application be more clearly understood The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, not For limiting the application.
In one embodiment, as shown in Figure 1, providing a kind of end message guard method, include the following steps:
Step 110, when receiving terminal out code, postpone power-off operation and detect whether safety switch is opened.
In the present embodiment, terminal can be, but not limited to be the bodies such as various mobile phones, tablet computer, portable wearable device Product mobile device that is smaller and being chronically at open state.User can such as pass through long-press according to the specific power-off operation of terminal The modes such as power key control terminal and are sent out terminal out code, so that terminal is shut down according to terminal out code Operation.After terminal receives terminal out code, it is not immediately performed power-off operation, but detects whether safety switch is opened.
Safety switch is protected for the information security to terminal, and when safety switch is opened, terminal is being closed Present terminal must be verified using the user identity of user before machine operation.Whether safety switch is opened can be by user It is selected.Preferably, the init state of safety switch is open state in terminal, and user in use can be free It chooses whether to open safety switch.
Step 120, when detecting that safety switch is opened, the first authentication prompt message is generated.
When terminal detects that safety switch is opened, the first authentication prompt message is generated, and by the first authentication Prompt message shows user.Specifically, terminal can show screen locking unlock interface, keep user's input numerical ciphers, pattern close Code etc., terminal can also generate the prompt of the biological characteristics such as input fingerprint, vocal print, facial characteristics to acquire the biological characteristic of user Information verifies user identity by biological information.Specific verification mode is not limited to the example above, Ke Yigen It specifically sets, can also select to set by user according to the unit type of terminal.
When terminal detects that safety switch is not opened, power-off operation is carried out according to the terminal out code received.
Step 130, the first authentication information corresponding with the first authentication prompt message for receiving input, according to One authentication information carries out subscriber authentication.
After user receives the first authentication prompt message of terminal, it can be prompted according to the first authentication of displaying The verification mode of information inputs corresponding first authentication information.For example, when prompt message is input password, Yong Huke To input password by the input equipment of the terminals such as screen, keyboard;When prompt message is input verbal instructions, user can lead to Cross the microphone input verbal instructions of terminal.
After terminal receives the first authentication information input by user, the pre-set user identity letter being locally stored is obtained Breath, pre-set user identity information can be that terminal is set by user when first used.Terminal is by the first authentication information and in advance If subscriber identity information is matched, judge whether user identity is proved to be successful according to matching result.
It is illustrated by taking verbal instructions verification mode as an example, user can pass through the voice collection device such as microphone of terminal Verbal instructions are inputted, after terminal collects verbal instructions input by user, vocal print feature are identified from verbal instructions, specifically The verbal instructions of acquisition are sent to server by ground, terminal, and the method for recognizing sound-groove pair unrelated with text may be used in server The verbal instructions of user are identified, and therefrom identify vocal print feature, the user that server is sent together according to same verbal instructions The corresponding pre-stored default vocal print feature of identifier lookup, the vocal print feature that will identify that are preset vocal print feature and are matched, Judge whether two vocal print features belong to same user according to matching result.When user carries out identity information registration, terminal can To acquire the log-in password recording of user, trains recording input model to be trained log-in password, generate pre-training vocal print and know Other model, and standard vocal print discriminant vectors are extracted, standard vocal print discriminant vectors are stored as default vocal print feature.Server obtains After taking verbal instructions, verbal instructions are inputted into pre-training Application on Voiceprint Recognition model and builds unidirectional vocal print discriminant vectors and is carried as this The vocal print feature of taking-up calculates the vector space distance of the first vocal print feature and the second vocal print feature, according to vector space distance Judge whether two vocal print features match.Specifically, when vector space distance is less than or equal to pre-determined distance threshold value, judge two A vocal print feature successful match judges that two vocal print features matchings are lost when counting vector space distance more than pre-determined distance threshold value It loses.
Step 140, when subscriber authentication fails, then terminal out code and opening imformation protected mode are intercepted.
When terminal-pair subscriber authentication fails, terminal does not execute the terminal out code received, without shutdown Operation.Terminal opening imformation protected mode, information protection mode are protected to the data information in terminal, prevent from currently using Family obtains a kind of protected mode for stealing or damaging the data information in terminal.After opening imformation protected mode, terminal can be into A series of operation of protection data informations of row.
When terminal-pair subscriber authentication success, terminal carries out power-off operation according to terminal out code.
In the case where emergency terminal switch is opened, when terminal receives the terminal out code of user, to currently using Family carry out subscriber authentication operation, when to current user identities authentication failed, intercept terminal out code to not after The continuous shutoff operation for carrying out terminal, makes terminal farthest keep open state, takes other remedial measures to strive for for user Time prevents other people from shutting down, the operations such as brush machine.In addition, terminal opening imformation protected mode, prevents other people from obtaining in terminal Property, private data and cause damages to user.
In one embodiment, before the step of whether detection safety switch is opened, further include:Security platform is received to send Safety switch open command;Safety switch is opened according to safety switch open command.
Security platform is the corresponding information security services device of terminal or server cluster.Terminal user is enterprising in terminal in advance Row user's registration, and send registration information to security platform and stored, log-on message may include user name, user's account Number, the information such as terminal iidentification, authentication password.Security platform stores the log-on message of user.
In one embodiment, the application program of security platform is installed, user can be enterprising in application program in terminal Row user's registration, and security platform is sent registration information to by application program.When user has found that terminal is lost, Ke Yi Application program is downloaded on other-end, progress terminal reports the loss operation after logging in the account of oneself.It specifically, can be to security platform Send the terminal iidentification and user's own user account for carrying lost terminal reports the loss request, and security platform receives user After what is sent reports the loss request, the prompt to the terminal transmission input authentication password for report the loss operation, user is according to prompt Authentication password is inputted, authentication password input by user is sent to security platform by the terminal that row reports the loss operation, safety After platform obtains authentication password, the authentication password stored when registration corresponding with user account is searched, by two mouths Order is compared, when two passwords are consistent, to the authentication of user by and generate safety switch open command, terminal is looked into The corresponding terminal iidentification of user account is looked for, safety switch open command is sent to the corresponding terminal of terminal iidentification.Wherein, identity Verify password can be numerical ciphers, graphical passwords, user biological information etc..
In other embodiments, user, which can also be used the modes such as phone is reported the loss, short message is reported the loss and carry out terminal, reports the loss, can also By the way of manual verification's user identity, however it is not limited to the mode described in above-described embodiment.
After terminal receives the safety switch open command of security platform transmission, the safety switch of terminal is opened.Terminal After opening safety switch, after terminal detects terminal out code, need first to verify the identity of active user.One In a embodiment, after terminal receives safety switch open command, the safety switch of power supply can also be opened, specifically, eventually End is internal can be arranged corresponding lock on the position of supply unit connection and power supply, the case where safety switch is not opened Under, lock is in the open state, and when safety switch is opened, terminal sends out line lock instruction to supply unit, by power supply Lock fastens, to lock power supply in terminal internal body, so that user can not take out power supply from terminal, also not It can realize the power-off operation by extracting power supply.In other embodiments, the locking structure of the power supply of terminal can also use lock Hardware configuration except button, as long as allowing to lock power supply from terminal inner.
In the present embodiment, when user lose mobile phone before not by terminal safety switch open when, can also pass through to The mode that security platform is reported the loss opens safety switch, to provide more remedial measures by security platform control terminal.
In one embodiment, after safety switch is opened, whether terminal detection GPS positioning function opens, when detecting GPS positioning function is when opening, to open GPS positioning so that can obtain the geographical location where terminal in real time.In opening imformation After protected mode, the geographical location for being currently located ground of acquisition is sent to security platform by terminal in real time or periodically, After security platform receives geographical location information, geographical location information is stored, and is searched in user.In a reality It applies in example, when user carries out terminal by other-end reports the loss operation, security platform can be by the lost terminal received Geographical location information real-time synchronization is sent to the terminal for carrying out reporting the loss operation, consequently facilitating user finds lost terminal.
In one embodiment, after the step of terminal opening imformation protected mode, including:Preset alarm recording is obtained, Preset alarm recording is played until terminal power exhausts.
Preset alarm recording can be previously set and be stored in advance in terminal before terminal is dispatched from the factory, preset alarm record Sound can also be voluntarily to be recorded and stored by user.The content of preset alarm recording may include that terminal is in loss shape Contact method or information warning that state, terminal are brought back etc..For example, preset alarm recording can be that " hand-set from stolen please dial electricity Words xxxxxxxxxx contacts security platform as early as possible, and well-wisher sends me go home ".
In one embodiment, the volume of preset alarm is recorded broadcasting frequency, broadcasting can be according to present terminal Electricity and current acoustic environment automatically adjust.Specifically, terminal detects current remaining capacity, and detects and work as front ring The noise decibel in border can prestore broadcasting frequency in terminal, broadcast sound volume and remaining capacity, ambient noise decibel compare Relation table, can also be previously set broadcasting frequency, broadcast sound volume computation rule, table look-up or according to rule calculate by way of Broadcasting frequency and broadcast sound volume are obtained, preset alarm recording is played out according to obtained broadcasting frequency and broadcast sound volume, and And it plays to the electricity of terminal and exhausts.
In this embodiment, by playing preset alarm recording, the attention of surrounding population can be caused and cause the person's of picking up It is psychological frightened, contribute to the person of picking up to return lost terminal.
In one embodiment, after the step of opening imformation protected mode, including:It obtains privacy information list and presets Privacy application;Privacy information in privacy information list is hidden, and default privacy application is subjected to operation locking.
Privacy information can be a specific information, or a category information.May include in privacy information list Specific name of the information, information coding etc., can also store the item name belonging to information.If privacy information may include address list Information, short message record etc., or specific memo information etc..User, can be by selection in using terminal Information such as memorandum newly carries out privacy label, some can also be related to the more same category information of user's private data such as by terminal Address list information acquiescence carries out privacy label.The information or information category for carrying out privacy label are stored in privacy information list. In addition, user can also be selectively mounted to the application program in terminal, privacy label is carried out to the application program of selection.
Terminal obtains privacy information list, and name of the information, the information coding of privacy information are read from privacy information list Or information category etc., and corresponding all privacy informations are found out, operation is hidden to privacy information, by privacy information Set invisible mode, active user can not check privacy information.For example, active user wants to open address list and check to communicate to believe When breath, terminal display is space record.
Terminal obtains the Apply Names or application identities for presetting privacy application, searches Apply Names or application identities are corresponding Application program, by application program set lock-out state, being placed in the application program of lock-out state can not start, so that current use Family can not check card to apply and be operated.
In this embodiment, when the user of lost terminal does not have setting terminal screen locking function, terminal can also be voluntarily Important privacy information and privacy application are locked, the person of picking up is avoided to steal the privacy information of user from terminal.
In one embodiment, after the step of opening imformation protected mode, including:Obtain privacy information and terminal mark Know;Privacy information is associated with terminal iidentification and is uploaded to security platform;After privacy information uploads, by privacy information from originally It deletes on ground.
After opening imformation protected mode, terminal obtains privacy information list, and searches corresponding in privacy information list Privacy information, terminal obtain terminal iidentification, privacy information is associated with terminal iidentification and is uploaded to security platform, security platform connects After receiving privacy information, registration user account corresponding with terminal iidentification is searched, privacy information and registration user account are closed Connection storage.After terminal detects that privacy information uploads, the privacy information of upload is deleted from local, so as to It is more effectively prevented from leakage of private information.
In one embodiment, by terminal iidentification privacy information after local the step of deleting, including:Receive terminal mark Know the information protection mode out code that security platform is sent;Second is generated according to terminal identification information protected mode out code Authentication prompt message;Receive the second authentication corresponding with the second authentication of terminal iidentification prompt message letter of input Breath carries out subscriber authentication according to the second authentication information of terminal iidentification;When subscriber authentication success, terminal is closed Identification information protected mode.
After terminal opening imformation protected mode, privacy information and privacy application in terminal are in the lock state, and It plays always and presets alarm recording, terminal can not normal use.When user gives the terminal of loss for change, need to carry out terminal The unlock operation for stating operation, so as to continue normal use terminal.
Operation is reported the loss in the releasing that user can carry out lost terminal by other-end, and user is by other-end to safety Platform send carry user account report the loss releasing request, after releasing request is reported the loss in security platform reception, to request user Identity is verified, for example, user can be prompted to input authentication password, when the authentication password input by user of reception When consistent with what is prestored when user's registration, verification passes through.When security platform to the authentication of user by when, security platform is looked into The corresponding terminal iidentification of registration user account is looked for, and generates information protection mode out code, security platform is by information protection mould Formula out code is sent to the corresponding terminal of terminal iidentification.
After terminal receives the information protection mode out code of security platform transmission, the second authentication prompt letter is generated Breath prompts active user to input authentication information.Authentication information can be the life of numerical ciphers, graphical passwords, user Object characteristic information etc..After user inputs authentication information by the input equipment of terminal, terminal believes the authentication of reception Breath is matched with the identity information that user prestores, and when successful match, is proved to be successful.When terminal-pair subscriber authentication success When, terminal closing information protected mode.After information protection mode is closed, the every operation under terminal termination message protected mode. If terminal can stop playing preset alarm recording, privacy application is unlocked, hiding privacy information is shown etc..
In the present embodiment, security platform control terminal closing information protected mode can be passed through by user so that use Family still can be used normally after giving terminal for change.
In one embodiment, after the step of closing information protected mode, including:It receives privacy information and restores instruction; Restore instruction according to privacy information and obtain terminal iidentification, generates the privacy information recovery request of carried terminal mark;Privacy is believed Breath recovery request is sent to security platform;Receive the privacy information inquired according to terminal iidentification that security platform returns.
After user gives terminal and closing information protected mode for change, user can send privacy by terminal to security platform Information recovering instructs, to be downloaded from security platform from the privacy information locally deleted.Specifically, user can be with security platform Application program carry out restore privacy information operation, to terminal send out privacy information restore instruction, terminal receive privacy letter After breath restores instruction, terminal iidentification is obtained, the privacy information recovery request for carrying terminal iidentification is generated, privacy information is restored Request is sent to security platform.Security platform receives privacy information recovery request, is extracted eventually from privacy information recovery request End mark searches the corresponding registration user account of terminal iidentification, obtains the privacy information with registration user account associated storage, will The privacy information found returns to terminal.After terminal receives privacy information, according to the information encoding or information of privacy information Privacy information is carried out classification storage by classification.
In the present embodiment, after user gives lost terminal for change, deleted privacy information can be downloaded from security platform, Information in terminal is restored.
It should be understood that although each step in the flow chart of Fig. 1 is shown successively according to the instruction of arrow, this A little steps are not that the inevitable sequence indicated according to arrow executes successively.Unless expressly state otherwise herein, these steps It executes there is no the limitation of stringent sequence, these steps can execute in other order.Moreover, at least part in Fig. 1 Step may include that either these sub-steps of multiple stages or stage are executed in synchronization to multiple sub-steps It completes, but can execute at different times, the execution sequence in these sub-steps or stage is also not necessarily to be carried out successively, But it can either the sub-step of other steps or at least part in stage execute in turn or alternately with other steps.
In one embodiment, as shown in Fig. 2, providing a kind of end message protective device, including:Switch detection module 210, first information generation module 220, authentication module 230 and protected mode opening module 240, wherein:
Detection module 210 is switched, for when receiving terminal out code, postponing power-off operation and detecting safety switch Whether open.
First information generation module 220, for when detecting that safety switch is opened, generating the first authentication prompt letter Breath.
Authentication module 230, the first identity corresponding with the first authentication prompt message for receiving input are tested Information is demonstrate,proved, subscriber authentication is carried out according to the first authentication information.
Protected mode opening module 240, for when subscriber authentication fails, then intercepting terminal out code and opening Information protection mode.
In one embodiment, device further includes:
First command reception module, the safety switch open command for receiving security platform transmission.
Opening module is switched, for opening safety switch according to safety switch open command.
In one embodiment, device further includes:
Record playing module plays preset alarm recording until terminal power exhausts for obtaining preset alarm recording.
In one embodiment, device further includes:
Privacy acquisition module, for obtaining privacy information list and default privacy application.
Privacy locking module, for the privacy information in privacy information list to be hidden, and by default privacy application Carry out operation locking.
In one embodiment, device further includes:
Data obtaining module, for obtaining privacy information and terminal iidentification.
Information uploading module is uploaded to security platform for privacy information to be associated with terminal iidentification.
Information deletion module, after being uploaded when privacy information, by privacy information from local deletion.
In one embodiment, device further includes:
Second command reception module, the information protection mode out code for receiving security platform transmission.
Second information generating module, for generating the second authentication prompt letter according to information protection mode out code Breath.
Second authentication module, the second identity corresponding with the second authentication prompt message for receiving input are tested Information is demonstrate,proved, subscriber authentication is carried out according to the second authentication information.
Protected mode closedown module is used for when subscriber authentication success, closing information protected mode.
In one embodiment, device further includes:
Restore command reception module, restores instruction for receiving privacy information.
Recovery request generation module obtains terminal iidentification for restoring instruction according to privacy information, generates carried terminal mark The privacy information recovery request of knowledge.
Recovery request sending module, for privacy information recovery request to be sent to security platform.
Privacy information returns to module, the privacy information inquired according to terminal iidentification for receiving security platform return.
Specific about end message protective device limits the limit that may refer to above for end message guard method Fixed, details are not described herein.Modules in above-mentioned end message protective device can fully or partially through software, hardware and its It combines to realize.Above-mentioned each module can be embedded in or in the form of hardware independently of in the processor in computer equipment, can also It is stored in a software form in the memory in computer equipment, in order to which processor calls the above modules of execution corresponding Operation.
In one embodiment, a kind of computer equipment is provided, which can be terminal, internal structure Figure can be as shown in Figure 3.The computer equipment includes the processor connected by system bus, memory, network interface, display Screen and input unit.Wherein, the processor of the computer equipment is for providing calculating and control ability.The computer equipment is deposited Reservoir includes non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system and computer journey Sequence.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating The network interface of machine equipment is used to communicate by network connection with external terminal.When the computer program is executed by processor with Realize a kind of end message guard method.The display screen of the computer equipment can be that liquid crystal display or electric ink are shown Screen, the input unit of the computer equipment can be the touch layer covered on display screen, can also be on computer equipment shell Button, trace ball or the Trackpad of setting can also be external keyboard, Trackpad or mouse etc..
It will be understood by those skilled in the art that structure shown in Fig. 3, is only tied with the relevant part of application scheme The block diagram of structure does not constitute the restriction for the computer equipment being applied thereon to application scheme, specific computer equipment May include either combining certain components than more or fewer components as shown in the figure or being arranged with different components.
In one embodiment, a kind of computer equipment, including memory and processor are provided, which is stored with Computer program, the processor realize following steps when executing computer program:When receiving terminal out code, postpone closing Machine operates and detects whether safety switch is opened;When detecting that safety switch is opened, the first authentication prompt message is generated; Receive input the first authentication information corresponding with the first authentication prompt message, according to the first authentication information into Row subscriber authentication;When subscriber authentication fails, then terminal out code and opening imformation protected mode are intercepted.
In one embodiment, following steps are also realized when processor executes computer program:Security platform is received to send Safety switch open command;Safety switch is opened according to safety switch open command.
In one embodiment, following steps are also realized when processor executes computer program:Preset alarm recording is obtained, Preset alarm recording is played until terminal power exhausts.
In one embodiment, following steps are also realized when processor executes computer program:Obtain privacy information list With default privacy application;Privacy information in privacy information list is hidden, and the application of default privacy is subjected to operation lock It is fixed.
In one embodiment, following steps are also realized when processor executes computer program:Obtain privacy information and end End mark;Privacy information is associated with terminal iidentification and is uploaded to security platform;After privacy information uploads, by privacy information From local deletion.
In one embodiment, following steps are also realized when processor executes computer program:Security platform is received to send Information protection mode out code;The second authentication prompt message is generated according to information protection mode out code;It receives The second authentication information corresponding with the second authentication prompt message of input, is used according to the second authentication information Family authentication;When subscriber authentication success, closing information protected mode.
In one embodiment, following steps are also realized when processor executes computer program:Privacy information is received to restore Instruction;Restore instruction according to privacy information and obtain terminal iidentification, generates the privacy information recovery request of carried terminal mark;It will be hidden Personal letter breath recovery request is sent to security platform;Receive the privacy information inquired according to terminal iidentification that security platform returns.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated Machine program realizes following steps when being executed by processor:When receiving terminal out code, postpones power-off operation and detect peace Whether full switch is opened;When detecting that safety switch is opened, the first authentication prompt message is generated;Receive input with the Corresponding first authentication information of one identity verification tip information carries out user identity according to the first authentication information and tests Card;When subscriber authentication fails, then terminal out code and opening imformation protected mode are intercepted.
In one embodiment, following steps are also realized when computer program is executed by processor:Receive security platform hair The safety switch open command sent;Safety switch is opened according to safety switch open command.
In one embodiment, following steps are also realized when computer program is executed by processor:Obtain preset alarm record Sound plays preset alarm recording until terminal power exhausts.
In one embodiment, following steps are also realized when computer program is executed by processor:Obtain privacy information row Table and default privacy application;Privacy information in privacy information list is hidden, and default privacy application is operated Locking.
In one embodiment, following steps are also realized when computer program is executed by processor:Obtain privacy information and Terminal iidentification;Privacy information is associated with terminal iidentification and is uploaded to security platform;After privacy information uploads, privacy is believed It ceases from local deletion.
In one embodiment, following steps are also realized when computer program is executed by processor:Receive security platform hair The information protection mode out code sent;The second authentication prompt message is generated according to information protection mode out code;It connects The second authentication information corresponding with the second authentication prompt message for receiving input is carried out according to the second authentication information Subscriber authentication;When subscriber authentication success, closing information protected mode.
In one embodiment, following steps are also realized when computer program is executed by processor:It is extensive to receive privacy information Multiple instruction;Restore instruction according to privacy information and obtain terminal iidentification, generates the privacy information recovery request of carried terminal mark;It will Privacy information recovery request is sent to security platform;Receive the privacy letter inquired according to terminal iidentification that security platform returns Breath.
One of ordinary skill in the art will appreciate that realizing all or part of flow in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer In read/write memory medium, the computer program is when being executed, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, Any reference to memory, storage, database or other media used in each embodiment provided herein, Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms, Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above example can be combined arbitrarily, to keep description succinct, not to above-described embodiment In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance Shield is all considered to be the range of this specification record.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art It says, under the premise of not departing from the application design, various modifications and improvements can be made, these belong to the protection of the application Range.Therefore, the protection domain of the application patent should be determined by the appended claims.

Claims (10)

1. a kind of end message guard method, the method includes:
When receiving terminal out code, postpones power-off operation and detect whether safety switch is opened;
When detecting that the safety switch is opened, the first authentication prompt message is generated;
The first authentication information corresponding with the first authentication prompt message for receiving input, according to first body Part verification information carries out subscriber authentication;
When subscriber authentication fails, then the terminal out code and opening imformation protected mode are intercepted.
2. according to the method described in claim 1, it is characterized in that, before whether the detection safety switch open, further include:
Receive the safety switch open command that security platform is sent;
Safety switch is opened according to the safety switch open command.
3. according to the method described in claim 1, it is characterized in that, after the opening imformation protected mode, including:
Preset alarm recording is obtained, plays the preset alarm recording until terminal power exhausts.
4. according to the method described in claim 1, it is characterized in that, after the opening imformation protected mode, including:
Obtain privacy information list and default privacy application;
Privacy information in the privacy information list is hidden, and the default privacy application is subjected to operation locking.
5. according to the method described in claim 1, it is characterized in that, after the opening imformation protected mode, including:
Obtain privacy information and terminal iidentification;
The privacy information is associated with terminal iidentification and is uploaded to security platform;
After the privacy information uploads, by the privacy information from local deletion.
6. according to the method described in claim 5, it is characterized in that, it is described by the privacy information after local delete, packet It includes:
Receive the information protection mode out code that the security platform is sent;
The second authentication prompt message is generated according to described information protected mode out code;
The second authentication information corresponding with the second authentication prompt message for receiving input, according to second body Part verification information carries out subscriber authentication;
When subscriber authentication success, described information protected mode is closed.
7. according to the method described in claim 6, it is characterized in that, after the closing described information protected mode, including:
It receives privacy information and restores instruction;
Restore instruction according to the privacy information and obtain terminal iidentification, the privacy information recovery for generating the carrying terminal iidentification is asked It asks;
The privacy information recovery request is sent to the security platform;
Receive the privacy information inquired according to the terminal iidentification that the security platform returns.
8. a kind of end message protective device, which is characterized in that described device includes:
Detection module is switched, for when receiving terminal out code, postponing power-off operation and then whether detecting safety switch It opens;
First information generation module, for when detecting that the safety switch is opened, generating the first authentication prompt message;
Authentication module, the first authentication corresponding with the first authentication prompt message letter for receiving input Breath carries out subscriber authentication according to first authentication information;
Protected mode opening module, for when subscriber authentication fails, then intercepting the terminal out code and opening letter Cease protected mode.
9. a kind of computer equipment, including memory and processor, the memory are stored with computer program, feature exists In when the processor executes the computer program the step of any one of realization claim 1 to 7 the method.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program The step of method described in any one of claim 1 to 7 is realized when being executed by processor.
CN201810125064.2A 2018-02-07 2018-02-07 End message guard method, device, computer equipment and storage medium Pending CN108509778A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810125064.2A CN108509778A (en) 2018-02-07 2018-02-07 End message guard method, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810125064.2A CN108509778A (en) 2018-02-07 2018-02-07 End message guard method, device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN108509778A true CN108509778A (en) 2018-09-07

Family

ID=63375609

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810125064.2A Pending CN108509778A (en) 2018-02-07 2018-02-07 End message guard method, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN108509778A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109753265A (en) * 2019-01-08 2019-05-14 合肥联宝信息技术有限公司 A kind of control method and electronic equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104143059A (en) * 2014-07-31 2014-11-12 可牛网络技术(北京)有限公司 Method and system for improving safety of mobile terminal
CN106572439A (en) * 2016-10-31 2017-04-19 努比亚技术有限公司 Terminal tracking method, device and mobile terminal
CN106919818A (en) * 2017-03-10 2017-07-04 深圳天珑无线科技有限公司 A kind of verification method and device
CN106982297A (en) * 2017-04-01 2017-07-25 宇龙计算机通信科技(深圳)有限公司 Safety protecting method and system
CN107292208A (en) * 2016-04-11 2017-10-24 中兴通讯股份有限公司 Guarding against theft for mobile terminal steals method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104143059A (en) * 2014-07-31 2014-11-12 可牛网络技术(北京)有限公司 Method and system for improving safety of mobile terminal
CN107292208A (en) * 2016-04-11 2017-10-24 中兴通讯股份有限公司 Guarding against theft for mobile terminal steals method and device
CN106572439A (en) * 2016-10-31 2017-04-19 努比亚技术有限公司 Terminal tracking method, device and mobile terminal
CN106919818A (en) * 2017-03-10 2017-07-04 深圳天珑无线科技有限公司 A kind of verification method and device
CN106982297A (en) * 2017-04-01 2017-07-25 宇龙计算机通信科技(深圳)有限公司 Safety protecting method and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
崔东浩: "《上海市长宁区社区教育教学丛书 移动学习与智慧生活》", 31 December 2016 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109753265A (en) * 2019-01-08 2019-05-14 合肥联宝信息技术有限公司 A kind of control method and electronic equipment

Similar Documents

Publication Publication Date Title
US8385883B2 (en) Apparatus and methods for locating, tracking and/or recovering a wireless communication device
US9218814B2 (en) Cross monitoring method and system based on voiceprint recognition and location tracking
US8483659B2 (en) Methods and systems for recovering lost or stolen mobile devices
CN101719955B (en) Intelligent terminal system with fingerprint identification and information processing method
US8751801B2 (en) System and method for authenticating users using two or more factors
CN109040439B (en) Method and device for realizing privacy protection
US9262615B2 (en) Methods and systems for improving the security of secret authentication data during authentication transactions
CN105530356B (en) Communication terminal and its data guard method and device
CN108062464A (en) Terminal control method and system based on Application on Voiceprint Recognition
WO2002054243A1 (en) Authentication method and device
CN105592146A (en) Equipment control method, device and terminal
CN107845165A (en) A kind of server cabinet door control method, device and terminal
CN104700050A (en) Mobile terminal safety positioning method and device
CN104023133A (en) Anti-theft method and device for mobile terminal
CN109271757A (en) A kind of offline Activiation method and system of software
CN108551550A (en) Image control, the filming control method of camera applications, device and electronic equipment
CN108347730B (en) Wireless communication processing method and device
CN108509778A (en) End message guard method, device, computer equipment and storage medium
CN110049490A (en) Safety protecting method, device, wearable device and the medium of wearable device
CN110298149A (en) Account permission locking means, device, computer equipment and storage medium
CN108052811A (en) Terminal control method and system based on face texture identification
CN107862601A (en) A kind of enchashment method and system for being automatically positioned alarm
CN107045598A (en) The theft preventing method and device of a kind of mobile device
JP3538095B2 (en) Electronic approval system and method using personal identification
CN106919818A (en) A kind of verification method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180907