CN109492439A - Information protecting method, terminal device and computer readable storage medium - Google Patents

Information protecting method, terminal device and computer readable storage medium Download PDF

Info

Publication number
CN109492439A
CN109492439A CN201811145414.8A CN201811145414A CN109492439A CN 109492439 A CN109492439 A CN 109492439A CN 201811145414 A CN201811145414 A CN 201811145414A CN 109492439 A CN109492439 A CN 109492439A
Authority
CN
China
Prior art keywords
terminal equipment
data
terminal device
preset
protection method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811145414.8A
Other languages
Chinese (zh)
Inventor
王涵博
王文斌
蒋文涛
史建如
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanchang And Germany Communications Technology Co Ltd
Original Assignee
Nanchang And Germany Communications Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanchang And Germany Communications Technology Co Ltd filed Critical Nanchang And Germany Communications Technology Co Ltd
Priority to CN201811145414.8A priority Critical patent/CN109492439A/en
Publication of CN109492439A publication Critical patent/CN109492439A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The present embodiments relate to field of terminal, a kind of information protecting method, terminal device and computer readable storage medium are disclosed.In the present invention, information protecting method is applied to terminal device, comprising: the motion state of real-time detection terminal device;When the motion state detected meets preset condition, controlling terminal equipment carries out screen locking and enters pre-alarm state;Under pre-alarm state, when detecting to the terminal device scheduled sensitive operation of execution, the data in terminal device is deleted, so that terminal device is stolen when robbing, steal a possibility that person of robbing can not learn the data information stored in terminal device, can reduce information leakage.

Description

Information protection method, terminal device and computer-readable storage medium
Technical Field
The embodiments of the present invention relate to the field of terminals, and in particular, to an information protection method, a terminal device, and a computer-readable storage medium.
Background
With the coming of the information age, people can store a large amount of important information in terminal equipment such as mobile phones, computers, hard disks and the like so as to be called at any time, which makes the protection of information security particularly important. The development of terminal equipment technologies such as mobile phones and computers also provides great convenience for people to store data.
However, the inventors found that at least the following problems exist in the prior art: as people store more and more data in mobile phones, the data stored in the mobile phones may be more important than the mobile phones themselves. If the data in the mobile phone is known and utilized by the robber, the lost mobile phone will be lost greatly.
Disclosure of Invention
An object of embodiments of the present invention is to provide an information protection method, a terminal device, and a computer-readable storage medium, so that when a terminal device is stolen, a robber cannot know data information stored in the terminal device, and the possibility of information leakage can be reduced.
In order to solve the above technical problem, an embodiment of the present invention provides an information protection method, applied to a terminal device, including: detecting the motion state of the terminal equipment in real time; when the detected motion state meets a preset condition, controlling the terminal equipment to lock the screen and enter a pre-alarm state; and in the pre-alarm state, when detecting that the preset sensitive operation is executed on the terminal equipment, deleting the data in the terminal equipment.
An embodiment of the present invention further provides a terminal device, including: at least one processor; and a memory communicatively coupled to the at least one processor; the memory stores instructions executable by the at least one processor, and the instructions are executed by the at least one processor to enable the at least one processor to execute the information protection method.
The embodiment of the invention also provides a computer readable storage medium, which stores a computer program, and the computer program realizes the information protection method when being executed by a processor.
Compared with the prior art, the method and the device for controlling the screen locking of the terminal equipment timely control the terminal equipment to lock the screen and enter the pre-alarm state when the motion state of the terminal equipment detected in real time meets the preset condition, so that if the terminal equipment is suddenly robbed, a robber cannot unlock the robber in a short time, the information safety inside the terminal equipment is ensured to a certain extent, and meanwhile, the terminal equipment enters the pre-alarm state, so that a safety line is added for the information safety inside the terminal equipment. In the pre-alarm state, when the fact that the preset sensitive operation is executed on the terminal device is detected, the data in the terminal device is deleted, the situation that a robber attempts to steal the data in the terminal device by executing the preset sensitive operation is avoided, the possibility of information leakage is reduced, the protection of data information stored in the terminal device is facilitated, and the use safety of a user is improved.
In addition, after entering a pre-alarm state, judging whether an unlocking instruction for the terminal equipment is detected within a preset time length; and if the unlocking instruction is detected within the preset time length, the pre-alarm state is released. The unlocking instruction of the terminal equipment is detected within the preset time, which indicates that the terminal equipment enters the pre-alarm state by some action of a holder possibly of the terminal equipment, so that the pre-alarm state is released if the unlocking instruction is detected within the preset time, the possible misjudgment is favorably avoided, and the use of a user is facilitated.
In addition, if the unlocking instruction is not detected within the preset time length, an alarm mechanism is triggered, since the unlocking instruction is generally known only by a holder of the terminal equipment, if the unlocking instruction is not detected within the preset time length, the terminal equipment can be stolen by a thief, and at the moment, the alarm mechanism is triggered, which is beneficial to warning the thief and simultaneously beneficial to the holder of the terminal equipment to retrieve the stolen terminal equipment.
In addition, deleting the data in the terminal device specifically includes: the preset sensitive data in the terminal equipment is deleted, which is beneficial to preventing the sensitive data from being stolen by robbers, and meanwhile, if the terminal equipment is found back, only the sensitive information needs to be recovered, which is beneficial to rapidly recovering the original state of the terminal equipment.
In addition, deleting the data in the terminal device specifically includes: acquiring the priority of each application in the terminal equipment; the priority of each application of the terminal equipment is preset; and deleting the data of the application with the priority higher than the preset priority level. Since the data of the application with the priority higher than the preset priority level is usually more sensitive and valuable and is the data which is least likely to be leaked by the terminal equipment holder, the data of the application with the priority higher than the preset priority level is deleted, so that the data of the application with the higher priority level can be deleted quickly in a short time, and safety guarantee is further provided for the information security of the user.
Drawings
One or more embodiments are illustrated by way of example in the accompanying drawings, which correspond to the figures in which like reference numerals refer to similar elements and which are not to scale unless otherwise specified.
Fig. 1 is a flowchart of an information protection method according to a first embodiment of the present invention;
fig. 2 is a flowchart of an information protection method according to a second embodiment of the present invention;
fig. 3 is a flowchart of an information protection method according to a third embodiment of the present invention;
fig. 4 is a schematic structural diagram of a terminal device according to a fourth embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more apparent, embodiments of the present invention will be described in detail below with reference to the accompanying drawings. However, it will be appreciated by those of ordinary skill in the art that numerous technical details are set forth in order to provide a better understanding of the present application in various embodiments of the present invention. However, the technical solution claimed in the present application can be implemented without these technical details and various changes and modifications based on the following embodiments.
A first embodiment of the present invention relates to an information protection method. The core of the embodiment lies in detecting the motion state of the terminal equipment in real time; when the detected motion state meets a preset condition, controlling the terminal equipment to lock the screen and enter a pre-alarm state; in the pre-alarm state, when the terminal equipment is detected to execute preset sensitive operation, the data in the terminal equipment is deleted, so that when the terminal equipment is stolen and robbed, a robber cannot know the data information stored in the terminal equipment, and the possibility of information leakage can be reduced. The following describes the implementation details of the information protection method of the present embodiment in detail, and the following is only provided for the convenience of understanding and is not necessary for implementing the present embodiment.
The information protection method in this embodiment is applied to a terminal device, and the terminal device may be a mobile phone tablet computer or other terminal devices. For example, when a mobile phone holder plays a mobile phone on the road, the mobile phone holder may be directly snatched by a runaway party, and at this time, the mobile phone is not in a screen locking state, and after the runaway party directly snatches the mobile phone, the data inside can be taken without obstacles. The value of data in the mobile phone shows higher value than that of the mobile phone in the present and future, so that the protection of the data in the mobile phone from being stolen by a thief is more important. The present embodiment provides a method for protecting data in a mobile phone from being stolen by a thief, and a flowchart of an information protection method in the present embodiment is shown in fig. 1, and specifically includes:
step 101: and detecting the motion state of the terminal equipment in real time.
Specifically, the mobile phone can detect acceleration data through a built-in acceleration sensor, the motion state of the mobile phone is confirmed according to the change of the acceleration data, and different trends of the change of the acceleration data can represent different motion states of the mobile phone. Preferably, the motion state of the real-time detection terminal device can be controlled by a switch in the mobile phone, and the user can control the switch to be turned on when needed, so that the mobile phone can start to detect the motion state of the terminal device in real time, and the control switch is turned off when the motion state of the terminal device is not needed to be detected in real time, thereby achieving the effect of energy conservation.
Step 102: and when the detected motion state meets the preset condition, controlling the terminal equipment to lock the screen and enter a pre-alarm state.
Specifically, the preset conditions may be: the difference between the two adjacent detected accelerations is greater than a preset threshold, and the preset threshold can be set by a person skilled in the art according to actual needs. If the difference value of the two accelerations is large, the mobile phone is in a state of sudden acceleration, if the mobile phone is in a normal motion state, the mobile phone is considered to be in an abnormal state, for example, when a user walks on the road to use the mobile phone, the acceleration of the mobile phone is small, when the mobile phone is suddenly snatched by a flying party, the value of the acceleration is instantly increased, the difference of the acceleration values of the mobile phone before and after the mobile phone is snatched is large, if the mobile phone does not stop between normal walking and the sudden acceleration, does not get on the vehicle and the like, does not have the process of speed increase, and directly enters high-speed acceleration, the mobile phone is considered to be snatched. At the moment, the terminal equipment is controlled to lock the screen and enter a pre-alarm state, the screen is locked, so that a robber cannot unlock and steal data in the mobile phone in a short time, the pre-alarm state is a state ready for alarm, the mobile phone is indicated to enter a high-degree defense state at the moment, and if the defense state is broken, the mobile phone can immediately alarm. For example, after entering the pre-alarm state, the information of the emergency contact persons pre-stored in the mobile phone can be called, and if the pre-alarm state is broken, the alarm information can be directly sent to the emergency contact persons pre-stored in the mobile phone.
Step 103: and in the pre-alarm state, when detecting that the preset sensitive operation is executed on the terminal equipment, deleting the data in the terminal equipment.
Specifically, when the mobile phone detects a predetermined sensitive operation, the data in the terminal device can be deleted. The sensitive operation can be shutdown, card pulling, data copying and the like, and after the mobile phone is stolen, the stealer can usually perform the operations of shutdown, card pulling, data copying and the like, so when the sensitive operation is detected, the data in the mobile phone can be deleted, and the data in the mobile phone can be data stored locally in the mobile phone or data stored in an SIM card in the mobile phone.
In practical application, when deleting data in the terminal device, an alarm mechanism can be triggered, for example, alarm information can be sent to an emergency contact prestored in the mobile phone, preferably, the mobile phone can carry positioning information of the mobile phone in the alarm information and send the positioning information to the emergency contact, so that the emergency contact can search the position of the mobile phone in time according to the positioning information to know the position of a robber, and the mobile phone can be recovered. The mode of triggering the alarm mechanism can also be that a preset ring tone is automatically played at the maximum volume, and the content of the ring tone can be preset by a user, so that people around can know that the mobile phone playing the preset ring tone at present is a stolen or robbed mobile phone after hearing the ring tone. It should be noted that, the present embodiment is only an example of the above two alarm mechanisms, and is not limited to this in practical application.
Compared with the prior art, this embodiment, when real-time detection's terminal equipment's motion state satisfied the preset condition, in time control terminal equipment carries out the lock screen and gets into the warning state in advance for if terminal equipment is robbed suddenly, in the short time, the person of robbing by robbing can't carry out the unblock to the terminal equipment of robbing by robber, guaranteed the inside information safety of terminal equipment to a certain extent, get into the warning state in advance simultaneously, increased a safety defense line again for the inside information safety of terminal equipment. In the pre-alarm state, when the fact that the preset sensitive operation is executed on the terminal device is detected, the data in the terminal device is deleted, the situation that a robber attempts to steal the data in the terminal device by executing the preset sensitive operation is avoided, the possibility of information leakage is reduced, the protection of data information stored in the terminal device is facilitated, and the use safety of a user is improved.
A second embodiment of the present invention relates to an information protection method. The second embodiment is a further improvement of the first embodiment, and the main improvements are as follows: in the second embodiment of the invention, after entering the pre-alarm state, whether an unlocking instruction for the terminal equipment is detected within a preset time length is judged; if the unlocking instruction is detected within the preset time, the pre-alarm state is released, and possible misoperation is avoided.
As shown in fig. 2, a flowchart of the information protection method in this embodiment specifically includes:
step 201: and detecting the motion state of the terminal equipment in real time.
Step 202: and when the detected motion state meets the preset condition, controlling the terminal equipment to lock the screen and enter a pre-alarm state.
Steps 201 to 202 are substantially the same as steps 101 to 102 in the first embodiment, and are not repeated herein to avoid repetition.
Step 203: and judging whether an unlocking instruction for the terminal equipment is detected within a preset time length, if so, executing the step 204, otherwise, executing the step 205.
Specifically, after the mobile phone enters the pre-alarm state, the mobile phone is initially in the automatic screen locking state, and the entering of the pre-alarm state may also be triggered by the holder of the mobile phone itself, for example, the holder of the mobile phone changes from a normal walking state to a fast running state suddenly, and at this time, the detected motion state of the mobile phone also meets a preset condition, that is, the mobile phone locks the screen and enters the pre-alarm state. If the owner of the mobile phone knows the unlocking password of the mobile phone, the owner of the mobile phone can send a prompt message when the mobile phone enters the pre-alarm state, the owner of the mobile phone can unlock the mobile phone after receiving the prompt message, if the mobile phone judges that a correct unlocking instruction is received within the preset time, the step 204 can be carried out, and the preset time can be set by a person skilled in the art according to actual needs. The robber does not know the unlocking password of the mobile phone, the mobile phone enters step 205 because no unlocking command is detected within the preset time length, or the mobile phone detects an incorrect unlocking instruction within the preset time length, which may be that the robber tries to unlock, and then the step 205 is also entered.
Step 204: and releasing the pre-alarm state.
That is to say, if the pre-alarm state is triggered by the mobile phone holder, the pre-alarm state is released in time, so that the mobile phone holder can use the mobile phone conveniently.
Step 205: and in the pre-alarm state, when detecting that the preset sensitive operation is executed on the terminal equipment, deleting the data in the terminal equipment.
Step 205 is substantially the same as step 103 in the first embodiment, and is not repeated here to avoid repetition.
Compared with the prior art, the method and the device have the advantages that after the pre-alarm state is entered, whether the unlocking instruction for the terminal device is detected within the preset time is judged; and if the unlocking instruction is detected within the preset time length, the pre-alarm state is released. The unlocking instruction of the terminal equipment is detected within the preset time length, which indicates that the terminal equipment enters the pre-alarm state by some action of a holder possibly of the terminal equipment, so that the pre-alarm state is released if the unlocking instruction is detected within the preset time length, the possible misjudgment is favorably avoided, and the further use of a user is facilitated. Because the unlocking instruction is generally only known by the holder of the terminal equipment, if the unlocking instruction description is not detected within the preset time length, the terminal equipment can be stolen by a thief, and at the moment, the alarm mechanism is triggered to be beneficial to warning the thief and simultaneously the holder of the terminal equipment can find the stolen and robbed terminal equipment.
A third embodiment of the present invention relates to an information protection method. The third embodiment is a further improvement of the first embodiment, and the main improvements are as follows: in a third embodiment of the present invention, deleting data in a terminal device specifically includes: and the preset sensitive data in the terminal equipment is deleted, so that the sensitive data is prevented from being leaked.
As shown in fig. 3, a flowchart of the information protection method in this embodiment specifically includes:
step 301: and detecting the motion state of the terminal equipment in real time.
Step 302: and when the detected motion state meets the preset condition, controlling the terminal equipment to lock the screen and enter a pre-alarm state.
Steps 301 to 302 are substantially the same as steps 101 to 102 in the first embodiment, and are not repeated herein to avoid repetition.
Step 303: in the pre-alarm state, when detecting that the preset sensitive operation is executed on the terminal equipment, deleting the data of the application with the priority higher than the preset priority level.
Specifically, the deleting of the data in the terminal device may be deleting of sensitive data preset in the terminal device. The sensitive data may be data with privacy, for example, the sensitive data may be a telephone number of a family person, a file that needs to be kept secret, and the like, and the user may set which data is the sensitive data in advance. That is to say, when deleting data, the data with the relative privacy can be preferentially deleted, and other data which cannot be influenced even if being known by others can not be deleted, and the data with the relative privacy can be preferentially deleted, so that the data with the relative privacy can be rapidly deleted, and a thief can be prevented from stealing the data.
Preferably, the priority of each application of the terminal device is preset, for example, a corresponding relationship between different applications and priority levels is stored in the mobile phone, and the corresponding relationship can be set by the user according to actual needs. There are many applications in the mobile phone, and the requirements of the data stored in different applications on security and privacy are different, for example, the application binding the bank card relates to property security, the set priority may be higher, while the set priority may be lower when viewing the application of the video, and certainly in the actual application, the setting of the priority level is not limited to this. It should be noted that the information of the contact stored in the address book may also be preset with a priority, for example, the information of the family is higher in priority, and the priority of the infrequently contacted person is lower. When detecting that the preset sensitive operation is executed on the mobile phone, the priority of each application in the mobile phone can be obtained, the data of the application with the priority higher than the preset priority level is deleted, and the preset priority level can be set by a user according to actual needs.
Compared with the prior art, in the embodiment, because the data of the application with the priority higher than the preset priority level is usually more sensitive and valuable and is the data which is least likely to be leaked by the terminal equipment holder, the data of the application with the priority higher than the preset priority level is deleted, so that the data of the application with the higher priority level can be deleted quickly in a short time, and further, safety guarantee is provided for the information safety of a user.
The steps of the above methods are divided for clarity, and the implementation may be combined into one step or split some steps, and the steps are divided into multiple steps, so long as the same logical relationship is included, which are all within the protection scope of the present patent; it is within the scope of the patent to add insignificant modifications to the algorithms or processes or to introduce insignificant design changes to the core design without changing the algorithms or processes.
A fourth embodiment of the present invention relates to a terminal device, as shown in fig. 4, including at least one processor 401; and a memory 402 communicatively coupled to the at least one processor 401; the memory 402 stores instructions executable by the at least one processor 401, and the instructions are executed by the at least one processor 401, so that the at least one processor 401 can execute the information protection method.
Where the memory 402 and the processor 401 are coupled by a bus, which may include any number of interconnected buses and bridges that couple one or more of the various circuits of the processor 401 and the memory 402 together. The bus may also connect various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. A bus interface provides an interface between the bus and the transceiver. The transceiver may be one element or a plurality of elements, such as a plurality of receivers and transmitters, providing a means for communicating with various other apparatus over a transmission medium. The data processed by the processor 401 may be transmitted over a wireless medium via an antenna, which may receive the data and transmit the data to the processor 401.
The processor 401 is responsible for managing the bus and general processing and may provide various functions including timing, peripheral interfaces, voltage regulation, power management, and other control functions. And memory 402 may be used to store data used by processor 401 in performing operations.
A fifth embodiment of the present invention relates to a computer-readable storage medium storing a computer program. The computer program realizes the above-described method embodiments when executed by a processor.
That is, as can be understood by those skilled in the art, all or part of the steps in the method for implementing the embodiments described above may be implemented by a program instructing related hardware, where the program is stored in a storage medium and includes several instructions to enable a device (which may be a single chip, a chip, or the like) or a processor (processor) to execute all or part of the steps of the method described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
It will be understood by those of ordinary skill in the art that the foregoing embodiments are specific examples for carrying out the invention, and that various changes in form and details may be made therein without departing from the spirit and scope of the invention in practice.

Claims (10)

1. An information protection method is applied to a terminal device, and comprises the following steps:
detecting the motion state of the terminal equipment in real time;
when the detected motion state meets a preset condition, controlling the terminal equipment to lock the screen and enter a pre-alarm state;
and in the pre-alarm state, when detecting that preset sensitive operation is executed on the terminal equipment, deleting data in the terminal equipment.
2. The information protection method according to claim 1, further comprising:
after entering the pre-alarm state, judging whether an unlocking instruction for the terminal equipment is detected within a preset time length;
and if the unlocking instruction is detected within the preset time length, the pre-alarm state is released.
3. The information protection method according to claim 2, further comprising:
and if the unlocking instruction is not detected within the preset time length, triggering an alarm mechanism.
4. The information protection method according to claim 3, further comprising:
and triggering the alarm mechanism when the data in the terminal equipment is deleted.
5. The information protection method according to any one of claims 1 to 4, wherein the preset condition is:
and the difference value of the acceleration detected in two adjacent times is greater than a preset threshold.
6. The information protection method according to any one of claims 1 to 4, wherein the predetermined sensitive operation comprises one of the following or any combination thereof:
shutdown, card pulling and data copying.
7. The information protection method according to any one of claims 1 to 4, wherein the deleting data in the terminal device specifically includes:
and deleting preset sensitive data in the terminal equipment.
8. The information protection method according to claim 7, wherein the deleting the data in the terminal device specifically includes:
acquiring the priority of each application in the terminal equipment; the priority of each application of the terminal equipment is preset;
and deleting the data of the application with the priority higher than the preset priority level.
9. A terminal device, comprising:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the information protection method of any one of claims 1 to 8.
10. A computer-readable storage medium storing a computer program, wherein the computer program is executed by a processor to implement the information protection method according to any one of claims 1 to 9.
CN201811145414.8A 2018-09-29 2018-09-29 Information protecting method, terminal device and computer readable storage medium Pending CN109492439A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811145414.8A CN109492439A (en) 2018-09-29 2018-09-29 Information protecting method, terminal device and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811145414.8A CN109492439A (en) 2018-09-29 2018-09-29 Information protecting method, terminal device and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN109492439A true CN109492439A (en) 2019-03-19

Family

ID=65690701

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811145414.8A Pending CN109492439A (en) 2018-09-29 2018-09-29 Information protecting method, terminal device and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN109492439A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112187998A (en) * 2020-09-27 2021-01-05 广东小天才科技有限公司 Drop prompting method and terminal equipment
CN113094738A (en) * 2020-01-09 2021-07-09 中国移动通信集团山东有限公司 Data protection method, system and mobile terminal

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1882131A (en) * 2005-06-15 2006-12-20 英华达(上海)电子有限公司 Method for protecting stolen handset telephone directory
CN101305378A (en) * 2005-11-28 2008-11-12 国际商业机器公司 System and method for preventing unauthorized acquisition of information
CN102664989A (en) * 2012-03-26 2012-09-12 中国联合网络通信集团有限公司 Data processing method of terminal lexicon, apparatus and terminal thereof
CN105184184A (en) * 2015-08-06 2015-12-23 上海与德通讯技术有限公司 Anti-theft method for terminal data
CN106254652A (en) * 2016-08-05 2016-12-21 乐视控股(北京)有限公司 The safety protecting method of terminal unit, Apparatus and system
CN205829777U (en) * 2016-07-29 2016-12-21 哈尔滨理工大学 A kind of cellphone information protection lock

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1882131A (en) * 2005-06-15 2006-12-20 英华达(上海)电子有限公司 Method for protecting stolen handset telephone directory
CN101305378A (en) * 2005-11-28 2008-11-12 国际商业机器公司 System and method for preventing unauthorized acquisition of information
CN102664989A (en) * 2012-03-26 2012-09-12 中国联合网络通信集团有限公司 Data processing method of terminal lexicon, apparatus and terminal thereof
CN105184184A (en) * 2015-08-06 2015-12-23 上海与德通讯技术有限公司 Anti-theft method for terminal data
CN205829777U (en) * 2016-07-29 2016-12-21 哈尔滨理工大学 A kind of cellphone information protection lock
CN106254652A (en) * 2016-08-05 2016-12-21 乐视控股(北京)有限公司 The safety protecting method of terminal unit, Apparatus and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113094738A (en) * 2020-01-09 2021-07-09 中国移动通信集团山东有限公司 Data protection method, system and mobile terminal
CN112187998A (en) * 2020-09-27 2021-01-05 广东小天才科技有限公司 Drop prompting method and terminal equipment

Similar Documents

Publication Publication Date Title
US10009323B2 (en) Method and apparatus for detecting and dealing with a lost electronics device
EP3610404B1 (en) Methods and apparatus to monitor permission-controlled hidden sensitive application behavior at run-time
US10129381B2 (en) Disablement of lost or stolen device
RU2276474C2 (en) Method for protecting cell phones from stealing, device and plant for realization of said method
EP2919499B1 (en) Version protection method and apparatus for mobile terminals
US20080083982A1 (en) Method and system for initiating proximity warning alarm for electronic devices and prohibiting operation thereof
WO2013095596A1 (en) Always-available embedded theft reaction subsystem
CN104276133B (en) Long-range starting is forbidden and remotely starting forbids bypass to prevent
CN109492439A (en) Information protecting method, terminal device and computer readable storage medium
CN111079134A (en) Method and device for controlling authority globally, storage medium and electronic equipment
EP4322095A1 (en) Resource transfer
US20050181780A1 (en) System and method for controlling functions of mobile communication terminal
CN106254652A (en) The safety protecting method of terminal unit, Apparatus and system
CN110032898B (en) Data clearing method and device, electronic equipment and storage medium
CN107154999B (en) Terminal and unlocking method and storage device based on environmental information
JP2017141610A (en) Vehicle door lock system and vehicle key
CN115731645A (en) Entrance guard management method and device, intelligent equipment and intelligent entrance guard system
WO2016193176A1 (en) A remotely protected electronic device
CN106127089A (en) Mobile terminal safety means of defence and device
CN106127071B (en) File access protection method and system based on mobile terminal and mobile terminal
CN110691163B (en) Mobile terminal screen management method, device, medium and equipment
CN118301603A (en) Terminal key switching method, device, electronic equipment and storage medium
US20200108794A1 (en) Vehicle control device
CN111866260A (en) Unlocking method of intelligent terminal and related device
CN118051939A (en) Privacy protection method and related equipment thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190319