CN110443042A - A kind of terminal control method and terminal device - Google Patents

A kind of terminal control method and terminal device Download PDF

Info

Publication number
CN110443042A
CN110443042A CN201910668035.5A CN201910668035A CN110443042A CN 110443042 A CN110443042 A CN 110443042A CN 201910668035 A CN201910668035 A CN 201910668035A CN 110443042 A CN110443042 A CN 110443042A
Authority
CN
China
Prior art keywords
terminal device
user
information
account
account information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910668035.5A
Other languages
Chinese (zh)
Inventor
陈龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201910668035.5A priority Critical patent/CN110443042A/en
Publication of CN110443042A publication Critical patent/CN110443042A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Automation & Control Theory (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the invention provides a kind of terminal control method and terminal devices, are related to field of communication technology, to solve the problems, such as that terminal device has safety coefficient lower.Wherein, the terminal control method, comprising: obtain at least two account informations of terminal device;The terminal device is adjusted to targeted security mode, wherein the targeted security mode corresponds to the incidence relation of at least two account information.Terminal control method in the embodiment of the present invention is applied in terminal device.

Description

A kind of terminal control method and terminal device
Technical field
The present embodiments relate to field of communication technology more particularly to a kind of terminal control methods and terminal device.
Background technique
With the rapid development of communication technology, various terminal equipment is widely used in people's lives.For example, people utilize Terminal device carry out capital management, web page browsing, blog is write, bill record, schedule record etc..As it can be seen that terminal device is answered Used in various aspects such as finance, social activities.
Although terminal device facilitates people's lives, but also bring unfavorable one side, and there are privacy compromises Risk.For example, user's using terminal equipment carries out trafficking in property, terminal device can all automatically record relevant transaction amount, account Family remaining sum etc., and other users can also view these related contents when using the terminal device, cause user's property uneasy Entirely.For another example, user's using terminal equipment carries out social chat, and terminal device can all automatically record relevant chat content etc., and Other users can also view these related contents, privacy of user is caused to leak when using the terminal device.
As it can be seen that existing terminal device has that safety coefficient is lower.
Summary of the invention
The embodiment of the present invention provides a kind of terminal control method, and the safety coefficient to solve the problems, such as terminal device is lower.
In order to solve the above-mentioned technical problem, the present invention is implemented as follows:
In a first aspect, being applied to terminal device, the method packet the embodiment of the invention provides a kind of terminal control method It includes: obtaining at least two account informations of the terminal device;The terminal device is adjusted to targeted security mode, wherein The targeted security mode corresponds to the incidence relation of at least two account information.
Second aspect, the embodiment of the invention also provides a kind of terminal devices, comprising: account information obtains module, is used for Obtain at least two account informations of the terminal device;Safe mode adjust module, for by the terminal device adjust to Targeted security mode, wherein the targeted security mode corresponds to the incidence relation of at least two account information.
The third aspect, the embodiment of the invention also provides a kind of terminal device, including processor, memory is stored in institute The computer program that can be run on memory and on the processor is stated, when the computer program is executed by the processor The step of realizing the terminal control method.
Fourth aspect, it is described computer-readable to deposit the embodiment of the invention also provides a kind of computer readable storage medium Computer program is stored on storage media, the computer program realizes the step of the terminal control method when being executed by processor Suddenly.
In embodiments of the present invention, at least two account informations of terminal device are obtained, the type of account information is not limited to System login account information, finger print information, facial information, encrypted message etc., while account information is not limited to current account letter Breath, can also be the account information of history, so that terminal device can be based on local data, or based on terminal device and cloud it Between the data interaction that carries out, the account information of acquisition is analyzed, to judge the association between these account informations obtained Relationship, to be assessed according to risk class of the incidence relation to terminal device, thus according to different risk class to terminal The targeted security mode of equipment adjustment Different Strategies.As it can be seen that the present embodiment can be according between the account information in terminal device Incidence relation, adjusting terminal device to suitable targeted security mode can set realization data in different safe modes Shared and data protection, to improve the safety coefficient of terminal device.
Detailed description of the invention
Fig. 1 is one of flow chart of terminal control method of the embodiment of the present invention;
Fig. 2 is the two of the flow chart of the terminal control method of the embodiment of the present invention;
Fig. 3 is the three of the flow chart of the terminal control method of the embodiment of the present invention;
Fig. 4 is the four of the flow chart of the terminal control method of the embodiment of the present invention;
Fig. 5 is one of block diagram of terminal device of the embodiment of the present invention;
Fig. 6 is the two of the block diagram of the terminal device of the embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall within the protection scope of the present invention.
Referring to Fig. 1, the flow chart of the terminal control method of one embodiment of the invention is shown, is applied to terminal device, Include:
Step S1: at least two account informations of terminal device are obtained.
Terminal device in the present embodiment can be personal terminal device, such as personal mobile phone;It can also be public end End equipment, such as in-company experiencing machine.
In general, user in using terminal equipment, need to log in personal account information in terminal device, it should to obtain The right to use of terminal device, and then sequence of operations can be carried out on the terminal device.
Preferably, whole account informations of terminal device are obtained.
Preferably, terminal device can be obtained currently to log in and whole account informations of historical log.
Wherein, account information includes system login account, finger print information, facial information, unlocking pin etc..
Step S2: terminal device is adjusted to targeted security mode, wherein targeted security mode corresponds at least two accounts The incidence relation of family information.
After the account information for obtaining terminal device, account information can be analyzed, to obtain the account of terminal device The incidence relation of information.
For example, in one case, the account information of terminal device corresponds to a kind of preset incidence relation, i.e., at least two Account information is corresponding with a user, terminal device such as personal mobile phone.
For another example, in another case, the corresponding another preset incidence relation of the account information of terminal device, i.e., at least Two account informations are corresponding with multiple users, terminal device such as personal mobile phone, wherein multiple kinsfolks are the personal mobile phone User.
For another example, in another case, the corresponding another preset incidence relation of the account information of terminal device, i.e., at least Two account informations are corresponding with multiple users, terminal device such as common equipment.
Illustratively, in the analytic process to the incidence relation of account information, firstly, terminal device can be according to local number It is analyzed according to account information, to obtain whether the incidence relation of account information of terminal device is designated as being corresponding with multiple use Family;If the incidence relation of the account information of terminal device is designated as being corresponding with multiple users, further between multiple users Relationship analyzed, to obtain the incidence relation of account information.
Preferably, on the one hand, terminal device can obtain content relevant to account information from cloud, after obtaining content The incidence relation of multiple account informations is analyzed.
For example, if the account information obtained is system login account, and usually user needs in Accreditation System login account Personal information related to user, including mailbox, real name, address etc. are submitted, therefore terminal device can be obtained from cloud and account Number relevant personal information of information.To obtain multiple account informations according to personal information corresponding in each account information Incidence relation.
Further, if the account information obtained is finger print information, terminal device can be obtained from cloud and account information Relevant biological characteristic, biological characteristic include fingerprint characteristic.Thus according to the corresponding fingerprint characteristic of each account information, in conjunction with a People's data obtains the incidence relation of multiple account informations.
Further, if the account information obtained is facial information, terminal device can be obtained from cloud and account information Relevant biological characteristic, biological characteristic include face characteristic.Thus according to the corresponding face characteristic of each account information, in conjunction with a People's data obtains the incidence relation of multiple account informations.
Further, if the account information obtained is unlocking pin, terminal device can be obtained from cloud and account information Relevant personal information, biological characteristic etc..To be obtained more according to the biological characteristic of each account information in conjunction with personal information The incidence relation of a account information.
Preferably, on the other hand, it can be interacted by cellular data between terminal device and cloud, so as to by cloud It is unified that content relevant to account information is analyzed, to obtain the incidence relation of multiple account informations.
Therefore, the association that the present embodiment by terminal device or cloud, can obtain multiple account informations of terminal device is closed System.
Preferably, in the case where the incidence relation of multiple account informations is designated as corresponding to multiple users, multiple users can Be embodied in whether be a group member, such as, if be one family member, if be a company member etc..
Illustratively, it if home address information is identical in the corresponding personal information of multiple account informations, then can be defaulted as more A user is the member of one family.
Illustratively, if mailbox suffix is identical in the corresponding personal information of account information, then can be defaulted as multiple users is The member of one company.
Preferably, in order to quantify the incidence relation of multiple account informations, introducing " degree of correlation " this concept is multiple The degree of correlation between account information is higher, illustrates that relationship is closer between the corresponding user of multiple account informations.And this implementation Example is not construed as limiting the explanation of " degree of correlation " size, and the size of the degree of correlation can judge according to group types, can also foundation Other judgements.
For example, the incidence relation of multiple account informations is designated as more when degree of correlation highest between multiple account informations The corresponding user of a account information;Take second place, the incidence relation of multiple account informations be designated as multiple account informations correspond to it is multiple User, and multiple users kinsfolk each other;Third, the incidence relation of multiple account informations is designated as multiple account informations pair Answer multiple users, and multiple users corporator each other;When the degree of correlation between multiple account informations is minimum, multiple account letters The incidence relation of breath is designated as multiple account informations and corresponds to multiple users, and multiple users are not belonging to any one common group Body.
The incidence relation for being preferably based at least two different account informations corresponds to a kind of targeted security mode.
For example, the incidence relation of at least two account informations is designated as the corresponding user of at least two account informations, then The security risk of current device is lower, can adjust a kind of targeted security mode;For another example, the incidence relation of at least two account informations It is designated as at least two account informations and corresponds to multiple users, and have common group between multiple users, then the peace of current device Full blast is nearly medium, can adjust another kind targeted security mode;For another example, the incidence relation of at least two account informations is designated as at least Two account informations correspond to multiple users, and do not have common group between multiple users, then the security risk of current device compared with Height can adjust another kind targeted security mode.
In embodiments of the present invention, at least two account informations of terminal device are obtained, the type of account information is not limited to System login account information, finger print information, facial information, encrypted message etc., while account information is not limited to current account letter Breath, can also be the account information of history, so that terminal device can be based on local data, or based on terminal device and cloud it Between the data interaction that carries out, the account information of acquisition is analyzed, to judge the association between these account informations obtained Relationship, to be assessed according to risk class of the incidence relation to terminal device, thus according to different risk class to terminal The targeted security mode of equipment adjustment Different Strategies.As it can be seen that the present embodiment can be according between the account information in terminal device Incidence relation, adjusting terminal device to suitable targeted security mode can set realization data in different safe modes Shared and data protection, to improve the safety coefficient of terminal device on the basis of user-friendly.
On the basis of embodiment shown in Fig. 1, Fig. 2 shows the streams of the terminal control method of another embodiment of the present invention Cheng Tu, step S2 include:
Step S21: when at least two account informations correspond to same user, terminal device is adjusted to first object and is pacified Syntype.
Step S22: when at least two account informations correspond at least two users, terminal device is adjusted to the second mesh Mark safe mode.
In the present embodiment, the adjustment of targeted security mode is preferably carried out to terminal device from two kinds of situations.
In one case, at least two account informations correspond to same user, i.e. the user of terminal device only has one The security level of a user, terminal device are higher, therefore can adjust terminal device to first object safe mode.When terminal is set When for being in first object safe mode, terminal device can automatically record the use data of user, on the one hand will not using data Other users are leaked to, on the other hand, help user record history using data, avoid user's repetitive operation etc..
In one case, at least two account informations correspond at least two users, i.e. the user of terminal device has The security level of multiple users, terminal device are lower, therefore can adjust terminal device to the second targeted security mode.Work as terminal When equipment is in the second targeted security mode, terminal device alternative records the use data of user, or does not record user Use data, be on the one hand not revealed to uncorrelated user using data, on the other hand, using data help user record go through History avoids user's repetitive operation, while facilitating the data sharing etc. of associated user.
Wherein, different to the security risk assessment result of terminal device according to different situations, adjust the mesh of terminal device It is also different to mark safe mode.In different targeted security modes, different Preservation tactics can be pointedly set, to facilitate use While family uses, effective protection privacy of user improves the safety coefficient of terminal device.
On the basis of embodiment shown in Fig. 2, Fig. 3 shows the stream of the terminal control method of another embodiment of the present invention Before Cheng Tu, step S2 further include:
Step S3: to each account information at least two account informations, the corresponding attribute information of account information is obtained.
Step S4: according to attribute information, the corresponding user of account information is determined.
Wherein, attribute information includes at least user's real name information, user number information, subscriber mailbox information and station address Information.
In the present embodiment, according to the corresponding attribute information of each account information, the corresponding user of account information is determined, from And judge whether the user that at least two account informations correspond to is a user.If at least two account informations correspond to one User, then the scene that more people use is not present in terminal device, and security risk is lower, can tune to first object safe mode;If At least two account informations correspond at least two users, then for terminal device there are the scene that more people use, security risk is higher, It can tune to the second targeted security mode.
Preferably, attribute information is obtained from user's login account in account information.
Illustratively, can scanning system Account Logon database of record, if having recorded user in database logs in account Number, then the scene that more people use is not present in terminal device;If being had recorded in database more than more than one user's login account, Then it is same need to further to judge that more than one user's login account belongs to there may be the scene that more people use for terminal device People, if belonging to same people, the scene that more people use is not present in terminal device, conversely, there are the fields that more people use for terminal device Scape.
As it can be seen that according to the quantity of user's login account, and attribute information corresponding with user's login account, judge terminal Equipment whether there is the scene that uses of more people, thus in the case where the scene that terminal device is used there are more people and terminal In the case where the scene that equipment is used there is no more people, respectively to formulate terminal device the targeted security mode of corresponding strategy, To improve the safety coefficient of terminal device, privacy of user is protected.
In the present embodiment, according to attribute information corresponding with each account information, such as user's real name information, Subscriber Number Information, subscriber mailbox information and station address information can analyze to obtain the incidence relation of multiple account informations.To according to more The incidence relation of a account information, judges whether terminal device has strong demand to safeguard protection mode, and according to different associations Relationship opens the targeted security mode of adaptation, on the basis of ensuring user's normal use, improves the safety system of terminal device Number.
On the basis of embodiment shown in Fig. 2, Fig. 4 shows the stream of the terminal control method of another embodiment of the present invention Cheng Tu, step S22 include:
Step S221: correspond to the feelings between at least two users for first kind incidence relation at least two account informations Under condition, the operation data of each user on the terminal device is recorded.
Step S222: correspond to the feelings between at least two users for the second class incidence relation at least two account informations Under condition, the operation data of each user on the terminal device is removed.
Preferably, in one case, the incidence relation between the account information of terminal device belongs to a kind of preset pass Connection relationship, i.e. the first incidence relation, i.e. at least two account informations correspond at least two users, and between at least two users The degree of association it is higher, in order between multiple users can shared data on the terminal device, then adjust to the second targeted security mode. Wherein, in the strategy of the corresponding second targeted security mode of the first incidence relation, it can record each user on the terminal device Operation data.
In another case, in the present embodiment, the incidence relation between the account information of terminal device belongs to one kind Preset incidence relation, i.e. the first incidence relation, i.e. at least two account informations correspond at least two users, and at least two The degree of association between user is lower, in order to avoid leaking privacy between multiple users, then adjusts to the second targeted security mode.Its In, in the strategy of the corresponding second targeted security mode of the second relationship, the behaviour of each user on the terminal device can be removed Make data.
Illustratively, if at least two account informations correspond at least two users be one family member, user it Between the degree of association it is higher, then it is assumed that at least two account informations correspond at least two users between be first kind incidence relation; If at least two account informations correspond to the member that at least two users are not belonging to any one group, the degree of association between user It is lower, then it is assumed that it is the second class incidence relation between at least two users that at least two account informations, which correspond to,.
Preferably, if at least two account informations correspond at least two users for the member of a company, between user The degree of association it is medium, and multiple users need to access mutual operation data mutually in the common equipment of company, then it is assumed that at least It is first kind incidence relation between at least two users that two account informations, which correspond to,;Alternatively, each user needs each self-shield In the operation data of the common equipment of company, then it is assumed that it is second between at least two users that at least two account informations, which correspond to, Class incidence relation.
Therefore, the judgement that at least two account informations are corresponded to the incidence relation between at least two users, can be according to According to specific dicision rules.Under different situations, dicision rules can also be different.
Preferably, dicision rules can be managed collectively by cloud or terminal device, in different times, different situations At least two account informations of terminal device are determined corresponding to the incidence relation between at least two users, thus according to Incidence relation assesses the security risk grade of terminal device.
Preferably, dicision rules can be arranged automatically by cloud or terminal device, can also be by user's manual setting.
Illustratively, when the account information obtained corresponds to a user, can define should for cloud or terminal device Terminal device is currently at low-risk, therefore corresponding strategy, strategy can be distributed or set automatically by terminal device by cloud Such as: user starts the application on terminal device or operates on the terminal device, and terminal device can save each application Account information, account information includes logon data and browsing data, while terminal device can be detailed when user uses this kind of application The usage record of thin record user, and encrypting storing user starts the fingerprint used when terminal device, password, facial head portrait, steps on Record the account informations such as account.
Illustratively, cloud or terminal device are when the account information obtained corresponds to multiple users, and multiple use Belong to the first incidence relation between family, can define the terminal device and be currently at risk, thus can be distributed by cloud or by Terminal device sets corresponding strategy automatically, strategy such as: user start application on terminal device or on the terminal device into Row operation, terminal device can save the account information of each application, and account information includes logon data and browsing data, while whole End equipment can record in detail the usage record of user when user uses this kind of application, and encrypting storing user starts mobile device When the account informations such as the fingerprint, password, facial head portrait, the login account that use, while requiring user to carry out two in application starting Secondary verifying can just start.
Illustratively, cloud or terminal device are when the account information obtained corresponds to multiple users, and multiple use Belong to the second incidence relation between family, can define the terminal device and be currently at high risk, thus can be distributed by cloud or by Terminal device sets corresponding strategy automatically, strategy such as: user starts the application on terminal device or grasps on the terminal device Make, terminal device will not save the account information of each application, and account information includes logon data and browsing data, i.e., once answering Be closed or equipment breath screen lock, the account information in can be deleted at once, while terminal device can make in user With when this kind of application in detail record operator usage record, and encrypting storing user start mobile device when use fingerprint, The account informations such as password, facial head portrait, login account.
As it can be seen that the risk class according to locating for terminal device is different, corresponding strategy can be set to terminal device, each A kind of corresponding safe mode of strategy.
It should be noted that in the present embodiment, for the operand of the user that records or remove on the terminal device According to, including user in the account information of each application, account information includes the browsing data of the logon data of user, and for The usage record at family, such as recorded using the time, it can retain always, in order to background analysis management.
Wherein, the case where the account information of terminal device is corresponding with a user, conventional terminal control side can be used Method, the i.e. operation data of record user on the terminal device, because other people do not have access right, to can ensure that user used Safety.
On the basis of the embodiment shown in fig. 4, the terminal control method of another embodiment of the present invention provides a kind of note Record the implementation of operation data of each user on the terminal device.Step S221 includes:
Receive the first input that the first user accesses the first application program;
In response to the first input, authentication is carried out to the first user;
If being proved to be successful, the first application program is run;
Record operation data of first user in the first application program.
In the Preservation tactics of the second targeted security mode of the present embodiment, it can be answered according to certain rules for different Different protected modes is taken for the application program of different security levels with program setting application security level.
Preferably, type of the cloud according to application program, the permission and operation being related to carry out safety to each application program Rank is sorted out, and the application for needing to carry out safeguard protection is filtered out.
Preferably, the application setting that with security risk, user can be had to secret protection demand is higher peace Full rank, application program other for higher security level can record the operation data of user, but user is opening application program When, secondary verifying need to be carried out.It can be lower security level by the application setting of not security risk, for compared with lower security The application program of rank can record the operation data of user, for sharing between multiple users;It will also recognize that the operation data of user, It avoids leaking.
Preferably, the first application program security level with higher in the present embodiment.For example, the first application program is The more sensitive application program etc. of program relevant to user's property, user.
Preferably, the first application program is not limited to indicate the main interface and first application program of the first application program Any sub-interface.That is, secondary verifying can be carried out when user opens the main interface of the first application program;Alternatively, user can be direct The main interface of the first application program is opened, but when one of sub-interface of user's the first application program of unlatching, carries out secondary tests Card.
Wherein, the first user is any user in terminal device in multiple users.
After terminal device is adjusted to the second targeted security mode, the first application program automatically into safeguard protection mode, When accessing the first application program under safeguard protection mode to the first user, the first user need to be prompted to carry out secondary verifying, with Ensure the data safety of user.
Wherein, operation data includes at least logon data of first user in the first application program and browsing data.
Illustratively, logon data includes the logon account of the first application program, browses and browses under the data logon account Jump path, content of pages etc..
In the present embodiment, in order to further increase the safety coefficient of terminal device, even if pass between a plurality of users In the biggish situation of connection relationship, it is also desirable to user carries out secondary identity authentication when accessing the application program in terminal device, with Further prevent the privacy compromise of user.
Such as, in one family, parent and child are the user of a mobile phone to application scenarios simultaneously, then for some important In access, terminal device needs to carry out secondary verifying, but terminal device automatically records user in program by program, parent and child On operation note, then user is after through secondary verifying, without logging in again.
Application scenarios for another example, after user's registration terminal equipment, temporarily away from, and terminal device does not put out screen also, thus other Personnel can check terminal device, and require to carry out secondary verifying for some important procedures, when anyone accesses, to keep away Exempt from the important procedure that other staff check on terminal device.
Further, in step sl, the first account information of the first user of terminal device can be obtained.To respond In the step of first inputs, authentication can be carried out to the first user according to the first account information.
Wherein, the first account information includes user's login account of the first user, the unlocked by fingerprint information of the first user, At least one of password unlocking information and the facial unlocking information of the first user of one user.
Preferably, the login mode of first user's registration terminal equipment includes: to be logged in by user's login account, pass through finger Line unlocking information is logged in, is logged in by password unlocking information, being logged in by facial unlocking information.
In the present embodiment, the login mode of reusable first user registration terminal equipment, in the first application program Unlatching interface in the first user carry out authentication, both avoided user for individual application programs repeat setting login side Formula in turn, ensures that user identity, while improving the safety coefficient of terminal device, simplifies user's operation.
Preferably, terminal device can also periodically report be activated the reason of enabling, high security level of targeted security mode to answer The record being opened with program, so that relevant staff can inspect periodically terminal device service condition, it is corresponding to carry out Manual setting, so that it is guaranteed that the convenience that uses of each user is at the same time it can also ensuring the safety in utilization of each user.
Particularly, the embodiment of the present invention is suitable for public terminals equipment, by helping user to make by certain rule It when with some common moving equipment, prevents oneself logon account, browser record, private data etc. from revealing, greatly improves The safety of terminal device.
Fig. 5 shows the block diagram of the terminal device of another embodiment of the present invention, comprising:
Account information obtains module 10, for obtaining at least two account informations of terminal device;
Safe mode adjusts module 20, for adjusting terminal device to targeted security mode, wherein targeted security mode Incidence relation corresponding at least two account informations.
In embodiments of the present invention, at least two account informations of terminal device are obtained, the type of account information is not limited to System login account information, finger print information, facial information, encrypted message etc., while account information is not limited to current account letter Breath, can also be the account information of history, so that terminal device can be based on local data, or based on terminal device and cloud it Between the data interaction that carries out, the account information of acquisition is analyzed, to judge the association between these account informations obtained Relationship, to be assessed according to risk class of the incidence relation to terminal device, thus according to different risk class to terminal The targeted security mode of equipment adjustment Different Strategies.As it can be seen that the present embodiment can be according between the account information in terminal device Incidence relation, adjusting terminal device to suitable targeted security mode can set realization data in different safe modes Shared and data protection, to improve the safety coefficient of terminal device on the basis of user-friendly.
Preferably, safe mode adjustment module 20 includes:
First object safe mode adjustment unit is used for when at least two account informations correspond to same user, will be whole End equipment is adjusted to first object safe mode;
Second targeted security mode adjustment unit is used for when at least two account informations correspond at least two users, Terminal device is adjusted to the second targeted security mode.
Preferably, terminal device further include:
Attribute information obtains module, for obtaining account information to each account information at least two account informations Corresponding attribute information;
User's determining module, for determining the corresponding user of account information according to attribute information;
Wherein, attribute information includes at least user's real name information, user number information, subscriber mailbox information and station address Information.
Preferably, the second targeted security mode adjustment unit includes:
Data record subelement is closed for corresponding between at least two users at least two account informations for the first kind In the case where connection relationship, the operation data of each user on the terminal device is recorded;
Data dump subelement is closed for corresponding between at least two users at least two account informations for the second class In the case where connection relationship, the operation data of each user on the terminal device is removed.
Terminal device provided in an embodiment of the present invention can be realized terminal device in the embodiment of the method for Fig. 1 to Fig. 4 and realize Each process, to avoid repeating, which is not described herein again.
A kind of hardware structural diagram of Fig. 6 terminal device of each embodiment to realize the present invention, the terminal device 100 Including but not limited to: radio frequency unit 101, audio output unit 103, input unit 104, sensor 105, is shown network module 102 Show the components such as unit 106, user input unit 107, interface unit 108, memory 109, processor 110 and power supply 111. It will be understood by those skilled in the art that terminal device structure shown in Fig. 6 does not constitute the restriction to terminal device, terminal is set Standby may include perhaps combining certain components or different component layouts than illustrating more or fewer components.In the present invention In embodiment, terminal device includes but is not limited to mobile phone, tablet computer, laptop, palm PC, car-mounted terminal, can wear Wear equipment and pedometer etc..
Wherein, processor 110, for obtaining at least two account informations of the terminal device;By the terminal device It adjusts to targeted security mode, wherein the targeted security mode corresponds to the incidence relation of at least two account information.
In embodiments of the present invention, at least two account informations of terminal device are obtained, the type of account information is not limited to System login account information, finger print information, facial information, encrypted message etc., while account information is not limited to current account letter Breath, can also be the account information of history, so that terminal device can be based on local data, or based on terminal device and cloud it Between the data interaction that carries out, the account information of acquisition is analyzed, to judge the association between these account informations obtained Relationship, to be assessed according to risk class of the incidence relation to terminal device, thus according to different risk class to terminal The targeted security mode of equipment adjustment Different Strategies.As it can be seen that the present embodiment can be according between the account information in terminal device Incidence relation, adjusting terminal device to suitable targeted security mode can set realization data in different safe modes Shared and data protection, to improve the safety coefficient of terminal device on the basis of user-friendly.
It should be understood that the embodiment of the present invention in, radio frequency unit 101 can be used for receiving and sending messages or communication process in, signal Send and receive, specifically, by from base station downlink data receive after, to processor 110 handle;In addition, by uplink Data are sent to base station.In general, radio frequency unit 101 includes but is not limited to antenna, at least one amplifier, transceiver, coupling Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 101 can also by wireless communication system and network and other set Standby communication.
Terminal device provides wireless broadband internet by network module 102 for user and accesses, and such as user is helped to receive It sends e-mails, browse webpage and access streaming video etc..
Audio output unit 103 can be received by radio frequency unit 101 or network module 102 or in memory 109 The audio data of storage is converted into audio signal and exports to be sound.Moreover, audio output unit 103 can also provide and end The relevant audio output of specific function that end equipment 100 executes is (for example, call signal receives sound, message sink sound etc. Deng).Audio output unit 103 includes loudspeaker, buzzer and receiver etc..
Input unit 104 is for receiving audio or video signal.Input unit 104 may include graphics processor (Graphics Processing Unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode Or the image data of the static images or video obtained in image capture mode by image capture apparatus (such as camera) carries out Reason.Treated, and picture frame may be displayed on display unit 106.Through graphics processor 1041, treated that picture frame can be deposited Storage is sent in memory 109 (or other storage mediums) or via radio frequency unit 101 or network module 102.Mike Wind 1042 can receive sound, and can be audio data by such acoustic processing.Treated audio data can be The format output that mobile communication base station can be sent to via radio frequency unit 101 is converted in the case where telephone calling model.
Terminal device 100 further includes at least one sensor 105, such as optical sensor, motion sensor and other biographies Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 1061, and proximity sensor can close when terminal device 100 is moved in one's ear Display panel 1061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (general For three axis) size of acceleration, it can detect that size and the direction of gravity when static, can be used to identify terminal device posture (ratio Such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap);It passes Sensor 105 can also include fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, wet Meter, thermometer, infrared sensor etc. are spent, details are not described herein.
Display unit 106 is for showing information input by user or being supplied to the information of user.Display unit 106 can wrap Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used Forms such as (Organic Light-Emitting Diode, OLED) configure display panel 1061.
User input unit 107 can be used for receiving the number or character information of input, and generate the use with terminal device Family setting and the related key signals input of function control.Specifically, user input unit 107 include touch panel 1071 and Other input equipments 1072.Touch panel 1071, also referred to as touch screen collect the touch operation of user on it or nearby (for example user uses any suitable objects or attachment such as finger, stylus on touch panel 1071 or in touch panel 1071 Neighbouring operation).Touch panel 1071 may include both touch detecting apparatus and touch controller.Wherein, touch detection Device detects the touch orientation of user, and detects touch operation bring signal, transmits a signal to touch controller;Touch control Device processed receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives processor 110, receiving area It manages the order that device 110 is sent and is executed.Furthermore, it is possible to more using resistance-type, condenser type, infrared ray and surface acoustic wave etc. Seed type realizes touch panel 1071.In addition to touch panel 1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can include but is not limited to physical keyboard, function key (such as volume control button, Switch key etc.), trace ball, mouse, operating stick, details are not described herein.
Further, touch panel 1071 can be covered on display panel 1061, when touch panel 1071 is detected at it On or near touch operation after, send processor 110 to determine the type of touch event, be followed by subsequent processing device 110 according to touching The type for touching event provides corresponding visual output on display panel 1061.Although in Fig. 6, touch panel 1071 and display Panel 1061 is the function that outputs and inputs of realizing terminal device as two independent components, but in some embodiments In, can be integrated by touch panel 1071 and display panel 1061 and realize the function that outputs and inputs of terminal device, it is specific this Place is without limitation.
Interface unit 108 is the interface that external device (ED) is connect with terminal device 100.For example, external device (ED) may include having Line or wireless head-band earphone port, external power supply (or battery charger) port, wired or wireless data port, storage card end Mouth, port, the port audio input/output (I/O), video i/o port, earphone end for connecting the device with identification module Mouthful etc..Interface unit 108 can be used for receiving the input (for example, data information, electric power etc.) from external device (ED) and By one or more elements that the input received is transferred in terminal device 100 or can be used in 100 He of terminal device Data are transmitted between external device (ED).
Memory 109 can be used for storing application programs and various data.Memory 109 can mainly include storage journey Sequence area and storage data area, wherein storing program area can the (ratio of application program needed for storage program area, at least one function Such as sound-playing function, image player function) etc.;Storage data area, which can be stored, uses created data according to mobile phone (such as audio data, phone directory etc.) etc..In addition, memory 109 may include high-speed random access memory, can also include Nonvolatile memory, for example, at least a disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of terminal device, utilizes each of various interfaces and the entire terminal device of connection A part by running or execute the application programs and/or module that are stored in memory 109, and is called and is stored in Data in memory 109 execute the various functions and processing data of terminal device, to carry out whole prison to terminal device Control.Processor 110 may include one or more processing units;Preferably, processor 110 can integrate application processor and modulatedemodulate Adjust processor, wherein the main processing operation system of application processor, user interface and application program etc., modem processor Main processing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
Terminal device 100 can also include the power supply 111 (such as battery) powered to all parts, it is preferred that power supply 111 Can be logically contiguous by power-supply management system and processor 110, to realize management charging by power-supply management system, put The functions such as electricity and power managed.
In addition, terminal device 100 includes some unshowned functional modules, details are not described herein.
Preferably, the embodiment of the present invention also provides a kind of terminal device, including processor 110, and memory 109 is stored in On memory 109 and the computer program that can run on the processor 110, the computer program are executed by processor 110 Each process of the above-mentioned terminal control method embodiment of Shi Shixian, and identical technical effect can be reached, to avoid repeating, here It repeats no more.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium Calculation machine program, the computer program realize each process of above-mentioned terminal control method embodiment, and energy when being executed by processor Reach identical technical effect, to avoid repeating, which is not described herein again.Wherein, the computer readable storage medium, such as only Read memory (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation RAM), magnetic or disk etc..
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by application program, naturally it is also possible to by hardware, but many feelings The former is more preferably embodiment under condition.Based on this understanding, technical solution of the present invention is substantially in other words to existing skill The part that art contributes can be embodied in the form of application product, which is stored in one In a storage medium (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal (can be mobile phone, count Calculation machine, server, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much Form belongs within protection of the invention.

Claims (10)

1. a kind of terminal control method is applied to terminal device, which is characterized in that the described method includes:
Obtain at least two account informations of the terminal device;
The terminal device is adjusted to targeted security mode, wherein the targeted security mode corresponds to described at least two The incidence relation of account information.
2. the method according to claim 1, wherein described adjust the terminal device to targeted security mould Formula, comprising:
When at least two account information corresponds to same user, the terminal device is adjusted to the safe mould of first object Formula;
When at least two account information corresponds at least two users, the terminal device is adjusted to the second target and is pacified Syntype.
3. according to the method described in claim 2, it is characterized in that, described adjust the terminal device to targeted security mode Before, the method also includes:
To each account information at least two account information, the corresponding attribute information of the account information is obtained;
According to the attribute information, the corresponding user of the account information is determined;
Wherein, the attribute information includes at least user's real name information, user number information, subscriber mailbox information and station address Information.
4. according to the method described in claim 2, it is characterized in that, described correspond at least at least two account information When two users, the terminal device is adjusted to the second targeted security mode, comprising:
In the case where being first kind incidence relation between at least two account information corresponds at least two users, record Operation data of each user on the terminal device;
In the case where being the second class incidence relation between at least two account information corresponds at least two users, remove Operation data of each user on the terminal device.
5. a kind of terminal device, which is characterized in that the terminal device includes:
Account information obtains module, for obtaining at least two account informations of the terminal device;
Safe mode adjusts module, for adjusting the terminal device to targeted security mode, wherein the targeted security mould Formula corresponds to the incidence relation of at least two account information.
6. terminal device according to claim 5, which is characterized in that the safe mode adjusts module and includes:
First object safe mode adjustment unit is used for when at least two account information corresponds to same user, by institute Terminal device is stated to adjust to first object safe mode;
Second targeted security mode adjustment unit is used for when at least two account information corresponds at least two users, The terminal device is adjusted to the second targeted security mode.
7. terminal device according to claim 6, which is characterized in that the terminal device further include:
Attribute information obtains module, for obtaining the account to each account information at least two account information The corresponding attribute information of information;
User's determining module, for determining the corresponding user of the account information according to the attribute information;
Wherein, the attribute information includes at least user's real name information, user number information, subscriber mailbox information and station address Information.
8. terminal device according to claim 6, which is characterized in that the second targeted security mode adjustment unit packet It includes:
Data record subelement is closed for corresponding between at least two users at least two account information for the first kind In the case where connection relationship, operation data of each user on the terminal device is recorded;
Data dump subelement is closed for corresponding between at least two users at least two account information for the second class In the case where connection relationship, operation data of each user on the terminal device is removed.
9. a kind of terminal device, which is characterized in that including processor, memory is stored on the memory and can be described The computer program run on processor is realized when the computer program is executed by the processor as in Claims 1-4 The step of described in any item terminal control methods.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium Program, the computer program realize terminal control method according to any one of claims 1 to 4 when being executed by processor The step of.
CN201910668035.5A 2019-07-23 2019-07-23 A kind of terminal control method and terminal device Pending CN110443042A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910668035.5A CN110443042A (en) 2019-07-23 2019-07-23 A kind of terminal control method and terminal device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910668035.5A CN110443042A (en) 2019-07-23 2019-07-23 A kind of terminal control method and terminal device

Publications (1)

Publication Number Publication Date
CN110443042A true CN110443042A (en) 2019-11-12

Family

ID=68431302

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910668035.5A Pending CN110443042A (en) 2019-07-23 2019-07-23 A kind of terminal control method and terminal device

Country Status (1)

Country Link
CN (1) CN110443042A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103885827A (en) * 2014-03-28 2014-06-25 深圳市中兴移动通信有限公司 Method switching running modes automatically and intelligent terminal
CN104717207A (en) * 2015-02-09 2015-06-17 惠州Tcl移动通信有限公司 Information sharing method and server
CN107040497A (en) * 2016-02-03 2017-08-11 阿里巴巴集团控股有限公司 Network account theft preventing method and device
CN108632089A (en) * 2018-05-07 2018-10-09 平安普惠企业管理有限公司 Test management method, device, equipment and the computer storage media of terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103885827A (en) * 2014-03-28 2014-06-25 深圳市中兴移动通信有限公司 Method switching running modes automatically and intelligent terminal
CN104717207A (en) * 2015-02-09 2015-06-17 惠州Tcl移动通信有限公司 Information sharing method and server
CN107040497A (en) * 2016-02-03 2017-08-11 阿里巴巴集团控股有限公司 Network account theft preventing method and device
CN108632089A (en) * 2018-05-07 2018-10-09 平安普惠企业管理有限公司 Test management method, device, equipment and the computer storage media of terminal

Similar Documents

Publication Publication Date Title
CN109918930A (en) A kind of information protecting method and terminal device
CN107315937A (en) A kind of method for secret protection, mobile terminal and computer-readable recording medium
CN109558718A (en) Application program login method, computer end, mobile terminal, system and storage medium
CN107395850A (en) A kind of social communication information guard method, device and computer-readable recording medium
CN109257336A (en) It is a kind of based on the encrypted message processing method of block chain, terminal device
CN109033779A (en) A kind of unlock authentication method, wearable device and computer readable storage medium
CN110188524A (en) Information ciphering method, information decryption method and terminal
CN108174012A (en) A kind of authority control method and mobile terminal
CN110149628A (en) A kind of information processing method and terminal device
CN108011887A (en) A kind of account management method and equipment
CN108206892A (en) Guard method, device, mobile terminal and the storage medium of contact person's privacy
CN110457888A (en) A kind of verifying code imput method, device, electronic equipment and storage medium
CN109993010A (en) A kind of information display method and mobile terminal
CN110035183A (en) Information sharing method and terminal
CN107707554A (en) A kind of login method and mobile terminal of application program account
CN108156537A (en) The remote operation method and mobile terminal of a kind of mobile terminal
CN110321731A (en) A kind of information protecting method and mobile terminal
CN109918944A (en) A kind of information protecting method, device, mobile terminal and storage medium
CN108984231A (en) A kind of login method and mobile terminal of application program account
CN108650415A (en) End message display methods, mobile terminal and computer readable storage medium
CN108363591A (en) A kind of method and device of PUSH message control
CN107895108A (en) A kind of operation management method and mobile terminal
CN110191106A (en) A kind of data transmission method for uplink, terminal and communication system
CN109992939A (en) A kind of login method and terminal device
CN108848240A (en) A kind of protecting information safety method and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20191112

RJ01 Rejection of invention patent application after publication