CN109086635A - A kind of system that mobile device after the loss protects personal information - Google Patents
A kind of system that mobile device after the loss protects personal information Download PDFInfo
- Publication number
- CN109086635A CN109086635A CN201810973668.2A CN201810973668A CN109086635A CN 109086635 A CN109086635 A CN 109086635A CN 201810973668 A CN201810973668 A CN 201810973668A CN 109086635 A CN109086635 A CN 109086635A
- Authority
- CN
- China
- Prior art keywords
- unit
- mobile device
- information
- external information
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/81—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer by operating on the power supply, e.g. enabling or disabling power-on, sleep or resume operations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Abstract
The present invention relates to field of information security technology; more particularly to the system that a kind of mobile device after the loss protects personal information, including the receiving module in setting in a mobile device central processor, identification judgment module, feedback module, processing module, protective module.The present invention passes through setting protective module; make after mobile device is lost; the person of picking up can not crack mobile device by input password or strong brush-making machine; to obtain the right to use of mobile device; after the person of picking up carries out illegal operation to mobile device, the protective module of mobile device carries out forced shutdown to mobile device by carrying out power panel the mode such as to power off, to carry out self-protection; leakage of personal information is solved the problems, such as with least cost, provides maximum ensure to personal property.
Description
Technical field
The present invention relates to field of information security technology, and in particular to a kind of mobile device after the loss carries out personal information
The system of protection.
Background technique
The mobile devices such as present mobile phone have become a part indispensable in people's daily life, and mobile phone is in many years
Present multifunction after development, especially in recent years, with mobile payment fast development, mobile phone has become after silver
New means of payment after row card, credit card often will cause individual after mobile phone loss however as the universal of mobile phone
How the leakage of payment information protects the personal property information security in the mobile devices such as mobile phone to have become the research come this year
Trend, the mobile devices such as mobile phone rely primarily on positioning function to be given for change at present, but positioning function can not be solved thoroughly
The problem of information leakage, can still control mobile device after the person of picking up carries out strong brush-making machine to mobile device, thus
Cause information leakage.
Summary of the invention
It is an object of the invention to overcome problems of the prior art, a kind of mobile device is provided after the loss to a
The system that people's information is protected, it may be implemented after mobile device is lost, the illegal operation by outside to mobile device,
Mobile device is set to can be carried out self-protection.
To realize above-mentioned technical purpose and the technique effect, the present invention is achieved by the following technical solutions:
A kind of system that mobile device after the loss protects personal information comprising be arranged in mobile device CPU
In receiving module, identification judgment module, feedback module, processing module, protective module,
It include acquisition unit, transfer unit in the receiving module, the acquisition unit is described for acquiring external information
Transfer unit is for transmitting external information;
Unit is transferred including receiving unit, backup units, database in the identification judgment module, analyzes and determines unit,
The receiving unit is used to receive the external information of transfer unit transmitting, and the external information is transferred to backup units, by
The backup units are backed up, and external information is finally transferred to database again and transfers unit, the database transfers unit
Preset correct information in CPU is transferred, and correct information and external information are sent to analytical judgment unit, the analysis together
Judging unit obtains comparison result by the way that external information is compared with correct information;
The feedback module is used to comparison result feeding back to processing module;
In the processing module include analytical unit, isolated location, processing unit, the analytical unit to comparison result into
The analysis result is transferred to isolated location by row analysis, and generate analysis as a result, if being judged as invalid information, it is described every
It is used to for external information being isolated from unit, generates isolation signals, the processing unit receives isolation signals, and generates protection letter
Number;
The protective module includes acquiring unit, positions acquiring unit, backstage evidence obtaining unit, battery control unit from the background,
The acquiring unit receives protection signal, and generates action command, and the backstage positioning acquiring unit is for receiving action command
And obtain the position of current mobile device and be sent in pre-programmed emergency contact number by system background, the backstage evidence obtaining is single
Member is for receiving action command and the external information backed up in backup units being sent to pre-programmed emergency connection by system background
In number, the battery control unit is for receiving action command and detecting in backstage positioning acquiring unit, from the background evidence obtaining unit
Movement whether complete, if completing, the battery for controlling mobile device carries out pressure power-off.
Further, the mobile device includes smart phone.
Further, the external information includes the unlocking pin of input, fingerprint input information, the instruction of strong brush-making machine.
Further, working method includes the following steps:
Step 1, external information receive: the acquisition unit in receiving module acquires external information, and by the transfer unit
Transmit external information;
Step 2, external information identification judgement: the receiving unit in the identification judgment module receives transfer unit transmitting
External information, and the external information is transferred to backup units, it is backed up by the backup units, finally again by outer letter
Breath is transferred to database and transfers unit, and the database transfers unit and transfers preset correct information in CPU, and by correct information
And external information is sent to analytical judgment unit together, the analytical judgment unit is by carrying out external information and correct information
It compares, obtains comparison result;
Step 3, comparison result feedback: comparison result is fed back to processing module by feedback module;
Step 4, external information processing: the analytical unit in processing module analyzes comparison result, and generates analysis
As a result, if being judged as invalid information, the analysis result is transferred to isolated location, the isolated location by external information into
Row isolation, and isolation signals are generated, the processing unit receives isolation signals, and generates protection signal;
Step 5, protection: acquiring unit receives protection signal in protective module, and generates action command, the backstage positioning
Acquiring unit receives action command and obtains the position of current mobile device and be sent to pre-programmed emergency connection by system background
In number, the backstage evidence obtaining unit receives action command and sends out the external information backed up in backup units by system background
Send into pre-programmed emergency contact number, the battery control unit receive action command and detect backstage positioning acquiring unit, after
Whether the movement in platform evidence obtaining unit is completed, if completing, the battery for controlling mobile device carries out pressure power-off, to be protected
Shield.
Beneficial effects of the present invention: by the way that protective module is arranged, make after mobile device is lost, the person of picking up can not be by defeated
Enter password or strong brush-making machine cracks mobile device, to obtain the right to use of mobile device, movement is set in the person of picking up
After standby progress illegal operation, the protective module of mobile device carries out mobile device by carrying out power panel the mode such as to power off
Forced shutdown solves the problems, such as leakage of personal information to carry out self-protection with least cost, provides maximum protect to personal property
Barrier enables illegal external information to be extracted to outside by backstage evidence obtaining unit, provides conveniently for the evidence obtaining of next step.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, will be described below to embodiment required
Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for ability
For the those of ordinary skill of domain, without creative efforts, it can also be obtained according to these attached drawings other attached
Figure.
Fig. 1 is a kind of frame structure signal of system that mobile device after the loss protects personal information of the present invention
Figure;
Fig. 2 is the frame of receiving module in a kind of system that mobile device after the loss protects personal information of the present invention
Frame structural schematic diagram;
Fig. 3 is to identify judgment module in a kind of system that mobile device after the loss protects personal information of the present invention
Circuit theory schematic diagram;
Fig. 4 is the frame of processing module in a kind of system that mobile device after the loss protects personal information of the present invention
Frame structural schematic diagram;
Fig. 5 is the frame of protective module in a kind of system that mobile device after the loss protects personal information of the present invention
Frame structural schematic diagram;
In attached drawing, component representated by each label is as follows:
1- receiving module, 2- identify judgment module, 3- feedback module, 4- processing module, 5- protective module, 101- acquisition list
Member, 102- transfer unit, 201- receiving unit, 202- backup units, 203- database transfer unit, and 204- analyzes and determines single
Member, 401- analytical unit, 402- isolated location, 403- processing unit, 501- acquiring unit, the backstage 502- positioning acquiring unit,
The backstage 503- evidence obtaining unit, 504- battery control unit.
Specific embodiment
In order to be easy to understand the technical means, the creative features, the aims and the efficiencies achieved by the present invention, below will
In conjunction with the attached drawing in the embodiment of the present invention, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that
Described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Based on the implementation in the present invention
Example, all other embodiment obtained by those of ordinary skill in the art without making creative efforts belong to
The scope of protection of the invention.
The system that a kind of mobile device as shown in Figs. 1-5 after the loss protects personal information comprising setting
Receiving module 1, identification judgment module 2, feedback module 3, processing module 4, protective module 5 in mobile device CPU,
It include acquisition unit 101, transfer unit 102 in the receiving module 1, the acquisition unit 101 is outer for acquiring
Carry out information, the transfer unit 102 is for transmitting external information;
Unit 203, analysis are transferred including receiving unit 201, backup units 202, database in the identification judgment module 2
Judging unit 204, the receiving unit 201 are used to receive the external information of the transmitting of transfer unit 102, and by the external information
Backup units 202 are transferred to, is backed up by the backup units 202, external information is finally transferred to database again and is transferred
Unit 203, the database transfer unit 203 and transfer preset correct information in CPU, and by correct information and external information one
And be sent to analyze and determine unit 204, the analytical judgment unit 204 by the way that external information is compared with correct information,
Obtain comparison result;
The feedback module 3 is used to comparison result feeding back to processing module 4;
It include analytical unit 401, isolated location 402, processing unit 403, the analytical unit in the processing module 4
401 pairs of comparison results are analyzed, and generate analysis as a result, being transferred to the analysis result if being judged as invalid information
Isolated location 402, the isolated location 402 generate isolation signals, the processing unit 403 connects for external information to be isolated
Isolation signals are received, and generate protection signal;
The protective module 5 includes acquiring unit 501, backstage positioning acquiring unit 502, backstage evidence obtaining unit 503, battery
Control unit 504, the acquiring unit 501 receives protection signal, and generates action command, and the backstage positions acquiring unit
502 are used to receive action command and obtain the position of current mobile device and be sent to pre-programmed emergency connection number by system background
In code, the backstage evidence obtaining unit 503 is for receiving action command and passing through the external information backed up in backup units 202
System backstage is sent in pre-programmed emergency contact number, and the battery control unit 504 is for receiving action command and detecting backstage
Whether the movement in positioning acquiring unit 502, backstage evidence obtaining unit 503 is completed, if completing, control the battery of mobile device into
Row forces power-off.
The mobile device includes smart phone.
The external information includes the unlocking pin of input, fingerprint input information, the instruction of strong brush-making machine.
A kind of working method includes the following steps:
Step 1, external information receive: the acquisition unit 101 in receiving module 1 acquires external information, and by the transmitting
Unit 102 transmits external information;
Step 2, external information identification judgement: the receiving unit 201 in the identification judgment module 2 receives transfer unit
The external information of 102 transmitting, and the external information is transferred to backup units 202, it is carried out by the backup units 202 standby
Part, external information is finally transferred to database again and transfers unit 203, the database, which is transferred unit 203 and transferred in CPU, to be preset
Correct information, and by correct information and external information together be sent to analyze and determine unit 204, the analytical judgment unit
204, by the way that external information is compared with correct information, obtain comparison result;
Step 3, comparison result feedback: comparison result is fed back to processing module 4 by feedback module 3;
Step 4, external information processing: the analytical unit 401 in processing module 4 analyzes comparison result, and generates
The analysis result is transferred to isolated location 402, the isolated location 402 will as a result, if being judged as invalid information by analysis
External information is isolated, and generates isolation signals, and the processing unit 403 receives isolation signals, and generates protection signal;
Step 5, protection: acquiring unit 501 receives protection signal in protective module 5, and generates action command, the backstage
Positioning acquiring unit 502 receives action command and obtains the position of current mobile device and be sent to by system background default tight
In anxious contact number, the backstage evidence obtaining unit 503 receives action command and leads to the external information backed up in backup units 202
It crosses system background to be sent in pre-programmed emergency contact number, the battery control unit 504 receives action command and detects backstage
Whether the movement in positioning acquiring unit 502, backstage evidence obtaining unit 503 is completed, if completing, control the battery of mobile device into
Row forces power-off, to be protected.
Present invention disclosed above preferred embodiment is only intended to help to illustrate the present invention.There is no detailed for preferred embodiment
All details are described, are not limited the invention to the specific embodiments described.Obviously, according to the content of this specification,
It can make many modifications and variations.These embodiments are chosen and specifically described to this specification, is in order to better explain the present invention
Principle and practical application, so that skilled artisan be enable to better understand and utilize the present invention.The present invention is only
It is limited by claims and its full scope and equivalent.
Claims (4)
1. the system that a kind of mobile device after the loss protects personal information, which is characterized in that it includes that setting is moving
Receiving module (1), identification judgment module (2), feedback module (3), processing module (4), protective module (5) in dynamic equipment CPU,
It include acquisition unit (101), transfer unit (102) in the receiving module (1), the acquisition unit (101) is for adopting
Collect external information, the transfer unit (102) is for transmitting external information;
Include in the identification judgment module (2) receiving unit (201), backup units (202), database transfer unit (203),
It analyzes and determines unit (204), the receiving unit (201) is used to receive the external information of transfer unit (102) transmitting, and by institute
It states external information and is transferred to backup units (202), backed up by the backup units (202), finally again pass external information
It is handed to database to transfer unit (203), the database transfers unit (203) and transfers preset correct information in CPU, and will just
It firmly believes that breath and external information are sent to together and analyzes and determines unit (204), the analytical judgment unit (204) is by externally writing letters
Breath is compared with correct information, obtains comparison result;
The feedback module (3) is used to comparison result feeding back to processing module (4);
It include analytical unit (401), isolated location (402), processing unit (403) in the processing module (4), the analysis is single
First (401) analyze comparison result, and generate analysis as a result, passing the analysis result if being judged as invalid information
It is handed to isolated location (402), the isolated location (402) generates isolation signals, the processing is single for external information to be isolated
First (403) receive isolation signals, and generate protection signal;
The protective module (5) include acquiring unit (501), backstage positioning acquiring unit (502), backstage evidence obtaining unit (503),
Battery control unit (504), the acquiring unit (501) receives protection signal, and generates action command, and the backstage positioning obtains
Unit (502) are taken to preset tightly for receiving action command and obtaining the position of current mobile device and be sent to by system background
In anxious contact number, backstage evidence obtaining unit (503) is used to receive action command and will back up in backup units (202) outer
Carry out information to be sent in pre-programmed emergency contact number by system background, the battery control unit (504) acts for reception
It orders and detects whether the movement in backstage positioning acquiring unit (502), from the background evidence obtaining unit (503) is completed, if completing, control
The battery of mobile device processed carries out pressure power-off.
2. the system that a kind of mobile device according to claim 1 after the loss protects personal information, feature
It is, the mobile device includes smart phone.
3. the system that a kind of mobile device according to claim 1 after the loss protects personal information, feature
It is, the external information includes the unlocking pin of input, fingerprint input information, the instruction of strong brush-making machine.
4. the system that a kind of mobile device according to claim 1 after the loss protects personal information, feature
It is, working method includes the following steps:
Step 1, external information receive: the acquisition unit (101) in receiving module (1) acquires external information, and by the transmitting
Unit (102) transmits external information;
Step 2, external information identification judgement: the receiving unit (201) in identification judgment module (2) receives transfer unit
(102) external information transmitted, and is transferred to backup units (202) for the external information, by the backup units (202) into
Row backup, is finally transferred to database for external information again and transfers unit (203), the database is transferred unit (203) and transferred
Preset correct information in CPU, and correct information and external information are sent to together and analyze and determine unit (204), described point
Analysis judging unit (204) obtains comparison result by the way that external information is compared with correct information;
Step 3, comparison result feedback: comparison result is fed back to processing module (4) by feedback module (3);
Step 4, external information processing: the analytical unit (401) in processing module (4) analyzes comparison result, and generates
Analysis is as a result, be transferred to isolated location (402), the isolated location for the analysis result if being judged as invalid information
(402) external information is isolated, and generates isolation signals, the processing unit (403) receives isolation signals, and generates guarantor
Protect signal;
Step 5, protection: acquiring unit (501) receives protection signal in protective module (5), and generates action command, the backstage
Positioning acquiring unit (502) receives action command and obtains the position of current mobile device and be sent to by system background default
In emergency contact number, backstage evidence obtaining unit (503) the reception action command is simultaneously external by what is backed up in backup units (202)
Information is sent in pre-programmed emergency contact number by system background, and the battery control unit (504) receives action command simultaneously
Whether the movement in detection backstage positioning acquiring unit (502), backstage evidence obtaining unit (503) is completed, if completing, controls movement
The battery of equipment carries out pressure power-off, to be protected.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810973668.2A CN109086635A (en) | 2018-08-24 | 2018-08-24 | A kind of system that mobile device after the loss protects personal information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810973668.2A CN109086635A (en) | 2018-08-24 | 2018-08-24 | A kind of system that mobile device after the loss protects personal information |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109086635A true CN109086635A (en) | 2018-12-25 |
Family
ID=64794501
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810973668.2A Pending CN109086635A (en) | 2018-08-24 | 2018-08-24 | A kind of system that mobile device after the loss protects personal information |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109086635A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103220637A (en) * | 2012-01-19 | 2013-07-24 | 腾讯科技(深圳)有限公司 | Mobile phone anti-theft protection method and mobile phone anti-theft protection device |
CN103634477A (en) * | 2013-12-11 | 2014-03-12 | 深圳市亚略特生物识别科技有限公司 | Method and system for preventing thievery of mobile phone with fingerprint device |
CN104618605A (en) * | 2015-02-13 | 2015-05-13 | 深圳市中兴移动通信有限公司 | Mobile terminal positioning method and device |
CN104834872A (en) * | 2015-06-01 | 2015-08-12 | 上海斐讯数据通信技术有限公司 | Mobile terminal antitheft control system and method |
CN105262866A (en) * | 2015-11-13 | 2016-01-20 | 上海斐讯数据通信技术有限公司 | Anti-theft method, system and anti-theft handset |
US20170344762A1 (en) * | 2016-05-24 | 2017-11-30 | Beijing Xiaomi Mobile Software Co., Ltd. | Method and device for providing notification indicating loss of terminal |
-
2018
- 2018-08-24 CN CN201810973668.2A patent/CN109086635A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103220637A (en) * | 2012-01-19 | 2013-07-24 | 腾讯科技(深圳)有限公司 | Mobile phone anti-theft protection method and mobile phone anti-theft protection device |
CN103634477A (en) * | 2013-12-11 | 2014-03-12 | 深圳市亚略特生物识别科技有限公司 | Method and system for preventing thievery of mobile phone with fingerprint device |
CN104618605A (en) * | 2015-02-13 | 2015-05-13 | 深圳市中兴移动通信有限公司 | Mobile terminal positioning method and device |
CN104834872A (en) * | 2015-06-01 | 2015-08-12 | 上海斐讯数据通信技术有限公司 | Mobile terminal antitheft control system and method |
CN105262866A (en) * | 2015-11-13 | 2016-01-20 | 上海斐讯数据通信技术有限公司 | Anti-theft method, system and anti-theft handset |
US20170344762A1 (en) * | 2016-05-24 | 2017-11-30 | Beijing Xiaomi Mobile Software Co., Ltd. | Method and device for providing notification indicating loss of terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100485558C (en) | Electrical power system safety operation intelligent monitoring device and monitoring method thereof | |
CN103287942B (en) | Elevator maintenance maintenance device and elevator maintenance monitoring and managing method | |
CN104778765A (en) | Mobile access control system and method | |
CN105659192A (en) | Examination anti-cheating system | |
CN104183043A (en) | Unattended security protection system of transformer substation | |
CN105574477A (en) | Secure anti-theft method, apparatus and system | |
CN104110271A (en) | Under-mine equipment monitoring alarm system based on face recognition technology | |
CN102254281A (en) | Automatic car leasing system and leasing method | |
CN106503524A (en) | A kind of computer network security guard system | |
CN102693414A (en) | Fingerprint identification device and method | |
CN103745199A (en) | Risk prevention financial self-help acceptance device and method on basis of face recognition technology | |
EP2764656A1 (en) | Method and apparatus for determining input | |
CN109086635A (en) | A kind of system that mobile device after the loss protects personal information | |
CN210052214U (en) | Device for identifying personnel identity information in oil field operation area | |
CN102185385A (en) | System and method thereof for detecting physical on/off state of power protection circuit | |
CN107820598A (en) | Fingerprint event processing apparatus and method | |
CN108108196B (en) | Wake-up device, wake-up system, wake-up method and device | |
CN106953408A (en) | A kind of monitoring system of electric substation | |
CN104091110A (en) | Safe login verification method through facial recognition in Linux operation system | |
CN107645206A (en) | A kind of power equipment intelligent patrol detection data collecting system | |
CN102957794A (en) | Shortcut key control method and terminal | |
CN101877045A (en) | Fingerprint-card controller | |
CN105678856A (en) | Power industry on-site inspection method based on smart phone | |
CN111292484A (en) | Android-based root prevention and application authority control method for intelligent POS machine | |
CN208689598U (en) | Building cruising inspection system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181225 |
|
RJ01 | Rejection of invention patent application after publication |