CN108738012A - Alternate device document method and terminal - Google Patents
Alternate device document method and terminal Download PDFInfo
- Publication number
- CN108738012A CN108738012A CN201810433106.9A CN201810433106A CN108738012A CN 108738012 A CN108738012 A CN 108738012A CN 201810433106 A CN201810433106 A CN 201810433106A CN 108738012 A CN108738012 A CN 108738012A
- Authority
- CN
- China
- Prior art keywords
- data
- terminal
- protected mode
- specific instruction
- alternate device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/22—Processing or transfer of terminal data, e.g. status or physical capabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/22—Processing or transfer of terminal data, e.g. status or physical capabilities
- H04W8/24—Transfer of terminal data
Abstract
Alternate device document method proposed by the present invention and terminal, method include:Terminal receives specific instruction;According to the specific instruction information activation protected mode;Under the protected mode, the data of designated storage location are sent to specified network site.The present invention provides a kind of new modes, can protect oneself lost mobile phone data in time, prevent hand-set data from losing.
Description
Technical field
The present invention relates to communication technique field, a kind of alternate device document method and terminal are especially related to.
Background technology
In today of communications industry prosperity, mobile phone has become the indispensable contact tool of people's life.Mobile phone exists
While offering convenience to life, some unnecessary puzzlements are will also result in.Such as after mobile phone is lost, if usually not photograph
The backup of the capsule information such as piece, telephone number preserves, these data just may be looked for again not back.
Invention content
The main object of the present invention is to provide a kind of alternate device document method and terminal, can not be given for change with to solve user and be lost
The problem of losing mobile phone EMS memory storage data.
The present invention proposes a kind of alternate device document method, including:
Terminal receives information from dedicated tunnel;
Judge whether described information includes specific instruction;
If so, activation protected mode;
Under the protected mode, the data of designated storage location are sent to specified network site.
Preferably, before the step of terminal receives information from dedicated tunnel, further include:
Receive the set content of input;
According to the set content, the designated storage location and the specified network site are set.
Preferably, before the step of terminal receives information from dedicated tunnel, further include:
Receive the instruction setting operation of input;
According to described instruction, specific instruction described in operation setting is set.
Preferably, described under the protected mode, the data of designated storage location are sent to specified network site
After step, further include:
Delete the data being locally stored.
Preferably, further include:
Under the protected mode, current location information is obtained;
The location information is sent to the transmitting terminal of the specified network site or the specific instruction.
Another aspect of the present invention, it is also proposed that a kind of terminal, including:
Receiving module, for receiving information from dedicated tunnel;
Judgment module, for judging whether described information includes specific instruction;
Protection module is activated, is used for if so, activation protected mode;
The activation protection module includes transmission data unit, is used under the protected mode, by designated storage location
Data be sent to specified network site.
Preferably, further include:
First input module, the set content for receiving input;
First setup module, for the designated storage location and the specified network to be arranged according to the set content
Position.
Preferably, further include:
Second input module, the instruction setting operation for receiving input;
Second setup module, for specific instruction described in operation setting to be arranged according to described instruction.
Preferably, the activation protection module further includes:
Deleting unit, for deleting the data being locally stored.
Preferably, the activation protection module further includes:
Position units are obtained, under the protected mode, obtaining current location information;
Position transmission unit, for the location information to be sent to the specified network site or the specific instruction
Transmitting terminal.
Alternate device document method proposed by the present invention and terminal, method include:Terminal receives specific instruction;According to institute
State specific instruction activation protected mode;Under the protected mode, the data of designated storage location are sent to specified network position
It sets.The present invention provides a kind of new modes, can protect oneself lost mobile phone data in time, prevent hand-set data from losing.
Description of the drawings
Fig. 1 is the flow diagram of one embodiment of alternate device document method of the present invention;
Fig. 2 is the structural schematic diagram of one embodiment of terminal of the present invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific implementation mode
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
Referring to Fig.1, the embodiment of the present invention proposes a kind of alternate device document method, including:
S10, terminal receive information from dedicated tunnel;
S20, judge whether described information includes specific instruction;
S30, if so, activation protected mode;Under the protected mode, the data of designated storage location are sent to finger
Determine network site.
In the present embodiment, terminal refers to the smart machine with network connecting function, such as smart mobile phone, tablet computer
Deng.Protected mode can be a kind of special pattern of terminal, and under the pattern, terminal does not support peripheral operation at the appointed time,
Such as suspend the touch screen induction of mobile phone.
In step S10, terminal receives the specific instruction that external equipment is sent from dedicated tunnel.In one example, specific finger
Order can be sent by specific channel, if some can make some system applications with the mobile phone of brand, such as be given for change
The application of mobile phone.These applications can be used for the transmission of specific instruction.The user of lost mobile phone can be used the mobile phone with brand to
The mobile phone of loss sends specific instruction.In another example, specific instruction can also the mode of short message receive, at this point, terminal
Kernel is provided with the thread dedicated for short message reading.
In step S20, terminal judges whether the information received from dedicated tunnel includes specific instruction.What specific instruction referred to
It is a kind of character string with certain length.Such as specific instruction certain section of content that can be specified according to user and the md5 generated
Value.Processor is provided with judgement process, for reading above- mentioned information, and detects whether above- mentioned information includes specific instruction.
In step S30, if it includes specific instruction that terminal, which detects in information, protected mode is activated at once.In an application
In example, by taking smart mobile phone as an example, in protected mode, mobile phone operating system is not responding to extraneous touch command, duration 30
Minute.Within this time, the data of predesignated storage location are sent to the designated storage location of network by smart mobile phone.It uploads
After, the user of lost mobile phone can be from the location of instruction downloading data of network, to give oneself original hand-set data for change.Data
Including but not limited to photo, telephone number, chat record.Designated storage location can be Dropbox, can also be that other can be temporary
The cyberspace of deposit data.
Optionally, before step S10, further include:
Receive the set content of input;
According to the set content, the designated storage location and the specified network site are set.
In the present embodiment, terminal is provided with special application or program is used to be arranged the file for being used for upload and upload
Network site.Such as, camera files in mobile phone and contacts list can be arranged as upload object in user.Network site
Some Dropbox or mail address are could be provided as, Baidu's Dropbox that user can such as be arranged is used as specified network site, can also
Netease's mailbox of user is set as specified network site.Terminal provides the interface of input, and set content refers to user's
Selection operation, or input network address.
Optionally, before step S10, further include:
Receive the instruction setting operation of input;
According to described instruction, specific instruction described in operation setting is set.
In the present embodiment, terminal is provided with special application or program for specific instruction to be arranged.User can use one
A everyday words or number are used as password, then according to this everyday words or are digitally generated specific instruction.It can such as select
It is " C2DF5F7D3132A7920E6B245AB1E58625 " as specific that " HelloKitty ", which is used as memory cipher, md5 values,
Instruction.
Optionally, described under the protected mode, the data of designated storage location are sent to specified network site
After step, further include:
Delete the data being locally stored.
It,, need to be to being present in hand in order to protect the individual privacy of user after terminal is by Data Transfer Done in the present embodiment
Information in machine is deleted.Data herein including but not limited to need the data uploaded, and can be some need not back up,
But need the personal data deleted." being locally stored " refers to being stored in terminal.
Optionally, further include:
Under the protected mode, current location information is obtained;
The location information is sent to the transmitting terminal of the specified network site or the specific instruction.
In the present embodiment, in protected mode, terminal can also obtain its location information being currently located, then by position
Delivering facilitates user to give the mobile phone of oneself for change.If location information is sent to specified network site, storage location and need
The data to be uploaded are identical.Since the data volume of location information is smaller, if location information to be sent to the transmitting terminal of specific instruction,
It is then to be sent by the way of short message or specific application.
Alternate device document method proposed by the present invention, including:Terminal receives specific instruction;Swashed according to the specific instruction
Protected mode living;Under the protected mode, the data of designated storage location are sent to specified network site.The present invention provides
A kind of new mode, can protect oneself lost mobile phone data, prevent hand-set data from losing in time.
With reference to Fig. 2, the embodiment of the present invention also proposes a kind of terminal, including:
Receiving module 10, for receiving information from dedicated tunnel;
Judgment module 20, for judging whether described information includes specific instruction;
Protection module 30 is activated, is used for if so, activation protected mode;
The activation protection module includes transmission data unit, is used under the protected mode, by designated storage location
Data be sent to specified network site.
In the present embodiment, terminal refers to the smart machine with network connecting function, such as smart mobile phone, tablet computer
Deng.Protected mode can be a kind of special pattern of terminal, and under the pattern, terminal does not support peripheral operation at the appointed time,
Such as suspend the touch screen induction of mobile phone.
In receiving module 10, terminal receives the specific instruction that external equipment is sent from dedicated tunnel.In one example, specific
Instruction can be sent by specific channel, if some can make some system applications with the mobile phone of brand, such as be looked for
Turn round and stretch out the hand the application of machine.These applications can be used for the transmission of specific instruction.The mobile phone with brand can be used in the user of lost mobile phone
Specific instruction is sent to the mobile phone of loss.In another example, specific instruction can also the mode of short message receive, at this point, terminal
Kernel be provided with the thread dedicated for short message reading.
In judgment module 20, terminal judges whether the information received from dedicated tunnel includes specific instruction.Specific instruction
Refer to a kind of character string with certain length.Such as certain section of content being specified according to user of specific instruction and generate
Md5 values.Processor is provided with judgement process, for reading above- mentioned information, and detects whether above- mentioned information includes specific instruction.
It activates in protection module 30, if it includes specific instruction that terminal, which detects in information, activates protected mode at once.?
In one application example, by taking smart mobile phone as an example, in protected mode, mobile phone operating system is not responding to extraneous touch command,
Duration 30 minutes.Within this time, the data of predesignated storage location are sent to the specified storage position of network by smart mobile phone
It sets.After upload, the user of lost mobile phone can be provided from the location of instruction downloading data of network with giving oneself original mobile phone for change
Material.Data include but not limited to photo, telephone number, chat record.Designated storage location can be Dropbox, can also be other
It can be with the cyberspace of temporal data.
Optionally, further include:
First input module, the set content for receiving input;
First setup module, for the designated storage location and the specified network to be arranged according to the set content
Position.
In the present embodiment, terminal is provided with special application or program is used to be arranged the file for being used for upload and upload
Network site.Such as, camera files in mobile phone and contacts list can be arranged as upload object in user.Network site
Some Dropbox or mail address are could be provided as, Baidu's Dropbox that user can such as be arranged is used as specified network site, can also
Netease's mailbox of user is set as specified network site.Terminal provides the interface of input, and set content refers to user's
Selection operation, or input network address.
Optionally, further include:
Second input module, the instruction setting operation for receiving input;
Second setup module, for specific instruction described in operation setting to be arranged according to described instruction.
In the present embodiment, terminal is provided with special application or program for specific instruction to be arranged.User can use one
A everyday words or number are used as password, then according to this everyday words or are digitally generated specific instruction.It can such as select
It is " C2DF5F7D3132A7920E6B245AB1E58625 " as specific that " HelloKitty ", which is used as memory cipher, md5 values,
Instruction.
Optionally, activation protection module 30 further includes:
Deleting unit, for deleting the data being locally stored.
It,, need to be to being present in hand in order to protect the individual privacy of user after terminal is by Data Transfer Done in the present embodiment
Information in machine is deleted.Data herein including but not limited to need the data uploaded, and can be some need not back up,
But need the personal data deleted." being locally stored " refers to being stored in terminal.
Optionally, activation protection module 30 further includes:
Position units are obtained, under the protected mode, obtaining current location information;
Position transmission unit, for the location information to be sent to the specified network site or the specific instruction
Transmitting terminal.
In the present embodiment, in protected mode, terminal can also obtain its location information being currently located, then by position
Delivering facilitates user to give the mobile phone of oneself for change.If location information is sent to specified network site, storage location and need
The data to be uploaded are identical.Since the data volume of location information is smaller, if location information to be sent to the transmitting terminal of specific instruction,
It is then to be sent by the way of short message or specific application.
Terminal proposed by the present invention, including:Receiving module receives information for terminal from dedicated tunnel;Judgment module is used
In judge described information whether include specific instruction;Protection module is activated, is used for if so, activation protected mode;The activation
Protection module includes transmission data unit, under the protected mode, the data of designated storage location being sent to specified
Network site.The present invention provides a kind of new modes, can protect oneself lost mobile phone data in time, prevent hand-set data from losing
It loses.
Example the above is only the implementation of the present invention is not intended to restrict the invention, for those skilled in the art
For member, the invention may be variously modified and varied.Any modification made by all within the spirits and principles of the present invention,
Equivalent replacement, improvement etc., should be included within scope of the presently claimed invention.
Claims (10)
1. a kind of alternate device document method, which is characterized in that including:
Terminal receives information from dedicated tunnel;
Judge whether described information includes specific instruction;
If so, activation protected mode;
Under the protected mode, the data of designated storage location are sent to specified network site.
2. alternate device document method according to claim 1, which is characterized in that the terminal is received from dedicated tunnel to be believed
Before the step of breath, further include:
Receive the set content of input;
According to the set content, the designated storage location and the specified network site are set.
3. alternate device document method according to claim 1, which is characterized in that the terminal is received from dedicated tunnel to be believed
Before the step of breath, further include:
Receive the instruction setting operation of input;
According to described instruction, specific instruction described in operation setting is set.
4. alternate device document method according to claim 1, which is characterized in that it is described under the protected mode, it will
After the step of data of designated storage location are sent to specified network site, further include:
Delete the data being locally stored.
5. alternate device document method according to claim 1, which is characterized in that further include:
Under the protected mode, current location information is obtained;
The location information is sent to the transmitting terminal of the specified network site or the specific instruction.
6. a kind of terminal, which is characterized in that including:
Receiving module, for receiving information from dedicated tunnel;
Judgment module, for judging whether described information includes specific instruction;
Protection module is activated, is used for if so, activation protected mode;
The activation protection module includes transmission data unit, is used under the protected mode, by the number of designated storage location
According to being sent to specified network site.
7. alternate device data device according to claim 6, which is characterized in that further include:
First input module, the set content for receiving input;
First setup module, for the designated storage location and the specified network position to be arranged according to the set content
It sets.
8. alternate device data device according to claim 6, which is characterized in that further include:
Second input module, the instruction setting operation for receiving input;
Second setup module, for specific instruction described in operation setting to be arranged according to described instruction.
9. alternate device data device according to claim 6, which is characterized in that the activation protection module further includes:
Deleting unit, for deleting the data being locally stored.
10. alternate device data device according to claim 6, which is characterized in that the activation protection module further includes:
Position units are obtained, under the protected mode, obtaining current location information;
Position transmission unit, the transmission for the location information to be sent to the specified network site or the specific instruction
End.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810433106.9A CN108738012A (en) | 2018-05-08 | 2018-05-08 | Alternate device document method and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810433106.9A CN108738012A (en) | 2018-05-08 | 2018-05-08 | Alternate device document method and terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108738012A true CN108738012A (en) | 2018-11-02 |
Family
ID=63937155
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810433106.9A Pending CN108738012A (en) | 2018-05-08 | 2018-05-08 | Alternate device document method and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108738012A (en) |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101207859A (en) * | 2006-12-19 | 2008-06-25 | 中兴通讯股份有限公司 | Method for preventing mobile phone being stolen |
CN101252703A (en) * | 2008-03-28 | 2008-08-27 | 宇龙计算机通信科技(深圳)有限公司 | Terminal data protecting method, system as well as mobile communication terminal |
CN101610500A (en) * | 2009-07-23 | 2009-12-23 | 中兴通讯股份有限公司 | Mobile phone data retrieving method, mobile phone and mobile phone data retrieving system |
CN102905009A (en) * | 2011-07-28 | 2013-01-30 | 北京邮电大学 | Method and system for protecting information of mobile terminal |
CN103020534A (en) * | 2012-11-30 | 2013-04-03 | 北京网秦天下科技有限公司 | Method and system for managing mobile terminal |
CN103037310A (en) * | 2012-12-14 | 2013-04-10 | 北京网秦天下科技有限公司 | Mobile terminal intelligent anti-theft method and mobile terminal |
CN103702318A (en) * | 2013-12-13 | 2014-04-02 | 北京奇虎科技有限公司 | Mobile terminal antitheft method and client |
CN104540123A (en) * | 2015-01-07 | 2015-04-22 | 福州北卡信息科技有限公司 | Encryption backup and security deletion method and system for important data of mobile terminal |
CN105491232A (en) * | 2015-11-27 | 2016-04-13 | 上海斐讯数据通信技术有限公司 | Built-in virtual SIM card based mobile phone security information protection system and method |
CN105933374A (en) * | 2016-03-30 | 2016-09-07 | 青岛海信移动通信技术股份有限公司 | Mobile terminal data backup method, system and mobile terminal |
-
2018
- 2018-05-08 CN CN201810433106.9A patent/CN108738012A/en active Pending
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101207859A (en) * | 2006-12-19 | 2008-06-25 | 中兴通讯股份有限公司 | Method for preventing mobile phone being stolen |
CN101252703A (en) * | 2008-03-28 | 2008-08-27 | 宇龙计算机通信科技(深圳)有限公司 | Terminal data protecting method, system as well as mobile communication terminal |
CN101610500A (en) * | 2009-07-23 | 2009-12-23 | 中兴通讯股份有限公司 | Mobile phone data retrieving method, mobile phone and mobile phone data retrieving system |
CN102905009A (en) * | 2011-07-28 | 2013-01-30 | 北京邮电大学 | Method and system for protecting information of mobile terminal |
CN103020534A (en) * | 2012-11-30 | 2013-04-03 | 北京网秦天下科技有限公司 | Method and system for managing mobile terminal |
CN103037310A (en) * | 2012-12-14 | 2013-04-10 | 北京网秦天下科技有限公司 | Mobile terminal intelligent anti-theft method and mobile terminal |
CN103702318A (en) * | 2013-12-13 | 2014-04-02 | 北京奇虎科技有限公司 | Mobile terminal antitheft method and client |
CN104540123A (en) * | 2015-01-07 | 2015-04-22 | 福州北卡信息科技有限公司 | Encryption backup and security deletion method and system for important data of mobile terminal |
CN105491232A (en) * | 2015-11-27 | 2016-04-13 | 上海斐讯数据通信技术有限公司 | Built-in virtual SIM card based mobile phone security information protection system and method |
CN105933374A (en) * | 2016-03-30 | 2016-09-07 | 青岛海信移动通信技术股份有限公司 | Mobile terminal data backup method, system and mobile terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101110853B (en) | Portable communication equipment with loss protection function and loss protection method thereof | |
JP5700108B2 (en) | Thin client-server system, thin client terminal, data management method, and computer-readable recording medium | |
AU2018238203B2 (en) | A system and method for providing user accounts through which users are able to operate computing devices | |
JPWO2007077603A1 (en) | Information processing apparatus, information processing method, and program | |
WO2019019952A1 (en) | Folder sending method, sending terminal and receiving terminal, and storage medium | |
CN106598777A (en) | Method and system used for saving and recovering deleted file, and mobile equipment | |
CN103856919A (en) | Information sending method and device as well as information receiving method and device | |
US20230006950A1 (en) | Information sharing method, device and non-transitory computer readable storage medium thereof | |
JP7130995B2 (en) | Information processing device and program | |
CN101951568A (en) | Short message information interception processing method and device | |
JP2002543641A (en) | Wireless terminal device with browser | |
CN108738012A (en) | Alternate device document method and terminal | |
WO2016197884A1 (en) | Identity-based data processing method and device | |
CN104412274A (en) | Portable terminal, program, and control method | |
JP2019512984A (en) | Method, apparatus and system for checking change of telephone number | |
JP2009163282A (en) | Information processor, access control method and access control program | |
CN108228767B (en) | Method and device for directionally deleting files by smart phone and storage device | |
TWI822680B (en) | Message sending method and processing equipment | |
CN106789960A (en) | A kind of account login method and terminal | |
CN105898051A (en) | User terminal information deleting method and user terminal information deleting device | |
JP5932502B2 (en) | Communication system, portable terminal, and user data management method | |
JP2006126911A (en) | Data transmitting system | |
CN108710471A (en) | A kind of data destruction method, device, server and system | |
JP3894218B2 (en) | Information sharing system | |
CN107409327B (en) | Processing operation method and equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181102 |
|
RJ01 | Rejection of invention patent application after publication |