CN110443042A - A kind of terminal control method and terminal device - Google Patents
A kind of terminal control method and terminal device Download PDFInfo
- Publication number
- CN110443042A CN110443042A CN201910668035.5A CN201910668035A CN110443042A CN 110443042 A CN110443042 A CN 110443042A CN 201910668035 A CN201910668035 A CN 201910668035A CN 110443042 A CN110443042 A CN 110443042A
- Authority
- CN
- China
- Prior art keywords
- terminal device
- user
- information
- account
- account information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Automation & Control Theory (AREA)
- Telephonic Communication Services (AREA)
Abstract
The embodiment of the invention provides a kind of terminal control method and terminal devices, are related to field of communication technology, to solve the problems, such as that terminal device has safety coefficient lower.Wherein, the terminal control method, comprising: obtain at least two account informations of terminal device;The terminal device is adjusted to targeted security mode, wherein the targeted security mode corresponds to the incidence relation of at least two account information.Terminal control method in the embodiment of the present invention is applied in terminal device.
Description
Technical field
The present embodiments relate to field of communication technology more particularly to a kind of terminal control methods and terminal device.
Background technique
With the rapid development of communication technology, various terminal equipment is widely used in people's lives.For example, people utilize
Terminal device carry out capital management, web page browsing, blog is write, bill record, schedule record etc..As it can be seen that terminal device is answered
Used in various aspects such as finance, social activities.
Although terminal device facilitates people's lives, but also bring unfavorable one side, and there are privacy compromises
Risk.For example, user's using terminal equipment carries out trafficking in property, terminal device can all automatically record relevant transaction amount, account
Family remaining sum etc., and other users can also view these related contents when using the terminal device, cause user's property uneasy
Entirely.For another example, user's using terminal equipment carries out social chat, and terminal device can all automatically record relevant chat content etc., and
Other users can also view these related contents, privacy of user is caused to leak when using the terminal device.
As it can be seen that existing terminal device has that safety coefficient is lower.
Summary of the invention
The embodiment of the present invention provides a kind of terminal control method, and the safety coefficient to solve the problems, such as terminal device is lower.
In order to solve the above-mentioned technical problem, the present invention is implemented as follows:
In a first aspect, being applied to terminal device, the method packet the embodiment of the invention provides a kind of terminal control method
It includes: obtaining at least two account informations of the terminal device;The terminal device is adjusted to targeted security mode, wherein
The targeted security mode corresponds to the incidence relation of at least two account information.
Second aspect, the embodiment of the invention also provides a kind of terminal devices, comprising: account information obtains module, is used for
Obtain at least two account informations of the terminal device;Safe mode adjust module, for by the terminal device adjust to
Targeted security mode, wherein the targeted security mode corresponds to the incidence relation of at least two account information.
The third aspect, the embodiment of the invention also provides a kind of terminal device, including processor, memory is stored in institute
The computer program that can be run on memory and on the processor is stated, when the computer program is executed by the processor
The step of realizing the terminal control method.
Fourth aspect, it is described computer-readable to deposit the embodiment of the invention also provides a kind of computer readable storage medium
Computer program is stored on storage media, the computer program realizes the step of the terminal control method when being executed by processor
Suddenly.
In embodiments of the present invention, at least two account informations of terminal device are obtained, the type of account information is not limited to
System login account information, finger print information, facial information, encrypted message etc., while account information is not limited to current account letter
Breath, can also be the account information of history, so that terminal device can be based on local data, or based on terminal device and cloud it
Between the data interaction that carries out, the account information of acquisition is analyzed, to judge the association between these account informations obtained
Relationship, to be assessed according to risk class of the incidence relation to terminal device, thus according to different risk class to terminal
The targeted security mode of equipment adjustment Different Strategies.As it can be seen that the present embodiment can be according between the account information in terminal device
Incidence relation, adjusting terminal device to suitable targeted security mode can set realization data in different safe modes
Shared and data protection, to improve the safety coefficient of terminal device.
Detailed description of the invention
Fig. 1 is one of flow chart of terminal control method of the embodiment of the present invention;
Fig. 2 is the two of the flow chart of the terminal control method of the embodiment of the present invention;
Fig. 3 is the three of the flow chart of the terminal control method of the embodiment of the present invention;
Fig. 4 is the four of the flow chart of the terminal control method of the embodiment of the present invention;
Fig. 5 is one of block diagram of terminal device of the embodiment of the present invention;
Fig. 6 is the two of the block diagram of the terminal device of the embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair
Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts
Example, shall fall within the protection scope of the present invention.
Referring to Fig. 1, the flow chart of the terminal control method of one embodiment of the invention is shown, is applied to terminal device,
Include:
Step S1: at least two account informations of terminal device are obtained.
Terminal device in the present embodiment can be personal terminal device, such as personal mobile phone;It can also be public end
End equipment, such as in-company experiencing machine.
In general, user in using terminal equipment, need to log in personal account information in terminal device, it should to obtain
The right to use of terminal device, and then sequence of operations can be carried out on the terminal device.
Preferably, whole account informations of terminal device are obtained.
Preferably, terminal device can be obtained currently to log in and whole account informations of historical log.
Wherein, account information includes system login account, finger print information, facial information, unlocking pin etc..
Step S2: terminal device is adjusted to targeted security mode, wherein targeted security mode corresponds at least two accounts
The incidence relation of family information.
After the account information for obtaining terminal device, account information can be analyzed, to obtain the account of terminal device
The incidence relation of information.
For example, in one case, the account information of terminal device corresponds to a kind of preset incidence relation, i.e., at least two
Account information is corresponding with a user, terminal device such as personal mobile phone.
For another example, in another case, the corresponding another preset incidence relation of the account information of terminal device, i.e., at least
Two account informations are corresponding with multiple users, terminal device such as personal mobile phone, wherein multiple kinsfolks are the personal mobile phone
User.
For another example, in another case, the corresponding another preset incidence relation of the account information of terminal device, i.e., at least
Two account informations are corresponding with multiple users, terminal device such as common equipment.
Illustratively, in the analytic process to the incidence relation of account information, firstly, terminal device can be according to local number
It is analyzed according to account information, to obtain whether the incidence relation of account information of terminal device is designated as being corresponding with multiple use
Family;If the incidence relation of the account information of terminal device is designated as being corresponding with multiple users, further between multiple users
Relationship analyzed, to obtain the incidence relation of account information.
Preferably, on the one hand, terminal device can obtain content relevant to account information from cloud, after obtaining content
The incidence relation of multiple account informations is analyzed.
For example, if the account information obtained is system login account, and usually user needs in Accreditation System login account
Personal information related to user, including mailbox, real name, address etc. are submitted, therefore terminal device can be obtained from cloud and account
Number relevant personal information of information.To obtain multiple account informations according to personal information corresponding in each account information
Incidence relation.
Further, if the account information obtained is finger print information, terminal device can be obtained from cloud and account information
Relevant biological characteristic, biological characteristic include fingerprint characteristic.Thus according to the corresponding fingerprint characteristic of each account information, in conjunction with a
People's data obtains the incidence relation of multiple account informations.
Further, if the account information obtained is facial information, terminal device can be obtained from cloud and account information
Relevant biological characteristic, biological characteristic include face characteristic.Thus according to the corresponding face characteristic of each account information, in conjunction with a
People's data obtains the incidence relation of multiple account informations.
Further, if the account information obtained is unlocking pin, terminal device can be obtained from cloud and account information
Relevant personal information, biological characteristic etc..To be obtained more according to the biological characteristic of each account information in conjunction with personal information
The incidence relation of a account information.
Preferably, on the other hand, it can be interacted by cellular data between terminal device and cloud, so as to by cloud
It is unified that content relevant to account information is analyzed, to obtain the incidence relation of multiple account informations.
Therefore, the association that the present embodiment by terminal device or cloud, can obtain multiple account informations of terminal device is closed
System.
Preferably, in the case where the incidence relation of multiple account informations is designated as corresponding to multiple users, multiple users can
Be embodied in whether be a group member, such as, if be one family member, if be a company member etc..
Illustratively, it if home address information is identical in the corresponding personal information of multiple account informations, then can be defaulted as more
A user is the member of one family.
Illustratively, if mailbox suffix is identical in the corresponding personal information of account information, then can be defaulted as multiple users is
The member of one company.
Preferably, in order to quantify the incidence relation of multiple account informations, introducing " degree of correlation " this concept is multiple
The degree of correlation between account information is higher, illustrates that relationship is closer between the corresponding user of multiple account informations.And this implementation
Example is not construed as limiting the explanation of " degree of correlation " size, and the size of the degree of correlation can judge according to group types, can also foundation
Other judgements.
For example, the incidence relation of multiple account informations is designated as more when degree of correlation highest between multiple account informations
The corresponding user of a account information;Take second place, the incidence relation of multiple account informations be designated as multiple account informations correspond to it is multiple
User, and multiple users kinsfolk each other;Third, the incidence relation of multiple account informations is designated as multiple account informations pair
Answer multiple users, and multiple users corporator each other;When the degree of correlation between multiple account informations is minimum, multiple account letters
The incidence relation of breath is designated as multiple account informations and corresponds to multiple users, and multiple users are not belonging to any one common group
Body.
The incidence relation for being preferably based at least two different account informations corresponds to a kind of targeted security mode.
For example, the incidence relation of at least two account informations is designated as the corresponding user of at least two account informations, then
The security risk of current device is lower, can adjust a kind of targeted security mode;For another example, the incidence relation of at least two account informations
It is designated as at least two account informations and corresponds to multiple users, and have common group between multiple users, then the peace of current device
Full blast is nearly medium, can adjust another kind targeted security mode;For another example, the incidence relation of at least two account informations is designated as at least
Two account informations correspond to multiple users, and do not have common group between multiple users, then the security risk of current device compared with
Height can adjust another kind targeted security mode.
In embodiments of the present invention, at least two account informations of terminal device are obtained, the type of account information is not limited to
System login account information, finger print information, facial information, encrypted message etc., while account information is not limited to current account letter
Breath, can also be the account information of history, so that terminal device can be based on local data, or based on terminal device and cloud it
Between the data interaction that carries out, the account information of acquisition is analyzed, to judge the association between these account informations obtained
Relationship, to be assessed according to risk class of the incidence relation to terminal device, thus according to different risk class to terminal
The targeted security mode of equipment adjustment Different Strategies.As it can be seen that the present embodiment can be according between the account information in terminal device
Incidence relation, adjusting terminal device to suitable targeted security mode can set realization data in different safe modes
Shared and data protection, to improve the safety coefficient of terminal device on the basis of user-friendly.
On the basis of embodiment shown in Fig. 1, Fig. 2 shows the streams of the terminal control method of another embodiment of the present invention
Cheng Tu, step S2 include:
Step S21: when at least two account informations correspond to same user, terminal device is adjusted to first object and is pacified
Syntype.
Step S22: when at least two account informations correspond at least two users, terminal device is adjusted to the second mesh
Mark safe mode.
In the present embodiment, the adjustment of targeted security mode is preferably carried out to terminal device from two kinds of situations.
In one case, at least two account informations correspond to same user, i.e. the user of terminal device only has one
The security level of a user, terminal device are higher, therefore can adjust terminal device to first object safe mode.When terminal is set
When for being in first object safe mode, terminal device can automatically record the use data of user, on the one hand will not using data
Other users are leaked to, on the other hand, help user record history using data, avoid user's repetitive operation etc..
In one case, at least two account informations correspond at least two users, i.e. the user of terminal device has
The security level of multiple users, terminal device are lower, therefore can adjust terminal device to the second targeted security mode.Work as terminal
When equipment is in the second targeted security mode, terminal device alternative records the use data of user, or does not record user
Use data, be on the one hand not revealed to uncorrelated user using data, on the other hand, using data help user record go through
History avoids user's repetitive operation, while facilitating the data sharing etc. of associated user.
Wherein, different to the security risk assessment result of terminal device according to different situations, adjust the mesh of terminal device
It is also different to mark safe mode.In different targeted security modes, different Preservation tactics can be pointedly set, to facilitate use
While family uses, effective protection privacy of user improves the safety coefficient of terminal device.
On the basis of embodiment shown in Fig. 2, Fig. 3 shows the stream of the terminal control method of another embodiment of the present invention
Before Cheng Tu, step S2 further include:
Step S3: to each account information at least two account informations, the corresponding attribute information of account information is obtained.
Step S4: according to attribute information, the corresponding user of account information is determined.
Wherein, attribute information includes at least user's real name information, user number information, subscriber mailbox information and station address
Information.
In the present embodiment, according to the corresponding attribute information of each account information, the corresponding user of account information is determined, from
And judge whether the user that at least two account informations correspond to is a user.If at least two account informations correspond to one
User, then the scene that more people use is not present in terminal device, and security risk is lower, can tune to first object safe mode;If
At least two account informations correspond at least two users, then for terminal device there are the scene that more people use, security risk is higher,
It can tune to the second targeted security mode.
Preferably, attribute information is obtained from user's login account in account information.
Illustratively, can scanning system Account Logon database of record, if having recorded user in database logs in account
Number, then the scene that more people use is not present in terminal device;If being had recorded in database more than more than one user's login account,
Then it is same need to further to judge that more than one user's login account belongs to there may be the scene that more people use for terminal device
People, if belonging to same people, the scene that more people use is not present in terminal device, conversely, there are the fields that more people use for terminal device
Scape.
As it can be seen that according to the quantity of user's login account, and attribute information corresponding with user's login account, judge terminal
Equipment whether there is the scene that uses of more people, thus in the case where the scene that terminal device is used there are more people and terminal
In the case where the scene that equipment is used there is no more people, respectively to formulate terminal device the targeted security mode of corresponding strategy,
To improve the safety coefficient of terminal device, privacy of user is protected.
In the present embodiment, according to attribute information corresponding with each account information, such as user's real name information, Subscriber Number
Information, subscriber mailbox information and station address information can analyze to obtain the incidence relation of multiple account informations.To according to more
The incidence relation of a account information, judges whether terminal device has strong demand to safeguard protection mode, and according to different associations
Relationship opens the targeted security mode of adaptation, on the basis of ensuring user's normal use, improves the safety system of terminal device
Number.
On the basis of embodiment shown in Fig. 2, Fig. 4 shows the stream of the terminal control method of another embodiment of the present invention
Cheng Tu, step S22 include:
Step S221: correspond to the feelings between at least two users for first kind incidence relation at least two account informations
Under condition, the operation data of each user on the terminal device is recorded.
Step S222: correspond to the feelings between at least two users for the second class incidence relation at least two account informations
Under condition, the operation data of each user on the terminal device is removed.
Preferably, in one case, the incidence relation between the account information of terminal device belongs to a kind of preset pass
Connection relationship, i.e. the first incidence relation, i.e. at least two account informations correspond at least two users, and between at least two users
The degree of association it is higher, in order between multiple users can shared data on the terminal device, then adjust to the second targeted security mode.
Wherein, in the strategy of the corresponding second targeted security mode of the first incidence relation, it can record each user on the terminal device
Operation data.
In another case, in the present embodiment, the incidence relation between the account information of terminal device belongs to one kind
Preset incidence relation, i.e. the first incidence relation, i.e. at least two account informations correspond at least two users, and at least two
The degree of association between user is lower, in order to avoid leaking privacy between multiple users, then adjusts to the second targeted security mode.Its
In, in the strategy of the corresponding second targeted security mode of the second relationship, the behaviour of each user on the terminal device can be removed
Make data.
Illustratively, if at least two account informations correspond at least two users be one family member, user it
Between the degree of association it is higher, then it is assumed that at least two account informations correspond at least two users between be first kind incidence relation;
If at least two account informations correspond to the member that at least two users are not belonging to any one group, the degree of association between user
It is lower, then it is assumed that it is the second class incidence relation between at least two users that at least two account informations, which correspond to,.
Preferably, if at least two account informations correspond at least two users for the member of a company, between user
The degree of association it is medium, and multiple users need to access mutual operation data mutually in the common equipment of company, then it is assumed that at least
It is first kind incidence relation between at least two users that two account informations, which correspond to,;Alternatively, each user needs each self-shield
In the operation data of the common equipment of company, then it is assumed that it is second between at least two users that at least two account informations, which correspond to,
Class incidence relation.
Therefore, the judgement that at least two account informations are corresponded to the incidence relation between at least two users, can be according to
According to specific dicision rules.Under different situations, dicision rules can also be different.
Preferably, dicision rules can be managed collectively by cloud or terminal device, in different times, different situations
At least two account informations of terminal device are determined corresponding to the incidence relation between at least two users, thus according to
Incidence relation assesses the security risk grade of terminal device.
Preferably, dicision rules can be arranged automatically by cloud or terminal device, can also be by user's manual setting.
Illustratively, when the account information obtained corresponds to a user, can define should for cloud or terminal device
Terminal device is currently at low-risk, therefore corresponding strategy, strategy can be distributed or set automatically by terminal device by cloud
Such as: user starts the application on terminal device or operates on the terminal device, and terminal device can save each application
Account information, account information includes logon data and browsing data, while terminal device can be detailed when user uses this kind of application
The usage record of thin record user, and encrypting storing user starts the fingerprint used when terminal device, password, facial head portrait, steps on
Record the account informations such as account.
Illustratively, cloud or terminal device are when the account information obtained corresponds to multiple users, and multiple use
Belong to the first incidence relation between family, can define the terminal device and be currently at risk, thus can be distributed by cloud or by
Terminal device sets corresponding strategy automatically, strategy such as: user start application on terminal device or on the terminal device into
Row operation, terminal device can save the account information of each application, and account information includes logon data and browsing data, while whole
End equipment can record in detail the usage record of user when user uses this kind of application, and encrypting storing user starts mobile device
When the account informations such as the fingerprint, password, facial head portrait, the login account that use, while requiring user to carry out two in application starting
Secondary verifying can just start.
Illustratively, cloud or terminal device are when the account information obtained corresponds to multiple users, and multiple use
Belong to the second incidence relation between family, can define the terminal device and be currently at high risk, thus can be distributed by cloud or by
Terminal device sets corresponding strategy automatically, strategy such as: user starts the application on terminal device or grasps on the terminal device
Make, terminal device will not save the account information of each application, and account information includes logon data and browsing data, i.e., once answering
Be closed or equipment breath screen lock, the account information in can be deleted at once, while terminal device can make in user
With when this kind of application in detail record operator usage record, and encrypting storing user start mobile device when use fingerprint,
The account informations such as password, facial head portrait, login account.
As it can be seen that the risk class according to locating for terminal device is different, corresponding strategy can be set to terminal device, each
A kind of corresponding safe mode of strategy.
It should be noted that in the present embodiment, for the operand of the user that records or remove on the terminal device
According to, including user in the account information of each application, account information includes the browsing data of the logon data of user, and for
The usage record at family, such as recorded using the time, it can retain always, in order to background analysis management.
Wherein, the case where the account information of terminal device is corresponding with a user, conventional terminal control side can be used
Method, the i.e. operation data of record user on the terminal device, because other people do not have access right, to can ensure that user used
Safety.
On the basis of the embodiment shown in fig. 4, the terminal control method of another embodiment of the present invention provides a kind of note
Record the implementation of operation data of each user on the terminal device.Step S221 includes:
Receive the first input that the first user accesses the first application program;
In response to the first input, authentication is carried out to the first user;
If being proved to be successful, the first application program is run;
Record operation data of first user in the first application program.
In the Preservation tactics of the second targeted security mode of the present embodiment, it can be answered according to certain rules for different
Different protected modes is taken for the application program of different security levels with program setting application security level.
Preferably, type of the cloud according to application program, the permission and operation being related to carry out safety to each application program
Rank is sorted out, and the application for needing to carry out safeguard protection is filtered out.
Preferably, the application setting that with security risk, user can be had to secret protection demand is higher peace
Full rank, application program other for higher security level can record the operation data of user, but user is opening application program
When, secondary verifying need to be carried out.It can be lower security level by the application setting of not security risk, for compared with lower security
The application program of rank can record the operation data of user, for sharing between multiple users;It will also recognize that the operation data of user,
It avoids leaking.
Preferably, the first application program security level with higher in the present embodiment.For example, the first application program is
The more sensitive application program etc. of program relevant to user's property, user.
Preferably, the first application program is not limited to indicate the main interface and first application program of the first application program
Any sub-interface.That is, secondary verifying can be carried out when user opens the main interface of the first application program;Alternatively, user can be direct
The main interface of the first application program is opened, but when one of sub-interface of user's the first application program of unlatching, carries out secondary tests
Card.
Wherein, the first user is any user in terminal device in multiple users.
After terminal device is adjusted to the second targeted security mode, the first application program automatically into safeguard protection mode,
When accessing the first application program under safeguard protection mode to the first user, the first user need to be prompted to carry out secondary verifying, with
Ensure the data safety of user.
Wherein, operation data includes at least logon data of first user in the first application program and browsing data.
Illustratively, logon data includes the logon account of the first application program, browses and browses under the data logon account
Jump path, content of pages etc..
In the present embodiment, in order to further increase the safety coefficient of terminal device, even if pass between a plurality of users
In the biggish situation of connection relationship, it is also desirable to user carries out secondary identity authentication when accessing the application program in terminal device, with
Further prevent the privacy compromise of user.
Such as, in one family, parent and child are the user of a mobile phone to application scenarios simultaneously, then for some important
In access, terminal device needs to carry out secondary verifying, but terminal device automatically records user in program by program, parent and child
On operation note, then user is after through secondary verifying, without logging in again.
Application scenarios for another example, after user's registration terminal equipment, temporarily away from, and terminal device does not put out screen also, thus other
Personnel can check terminal device, and require to carry out secondary verifying for some important procedures, when anyone accesses, to keep away
Exempt from the important procedure that other staff check on terminal device.
Further, in step sl, the first account information of the first user of terminal device can be obtained.To respond
In the step of first inputs, authentication can be carried out to the first user according to the first account information.
Wherein, the first account information includes user's login account of the first user, the unlocked by fingerprint information of the first user,
At least one of password unlocking information and the facial unlocking information of the first user of one user.
Preferably, the login mode of first user's registration terminal equipment includes: to be logged in by user's login account, pass through finger
Line unlocking information is logged in, is logged in by password unlocking information, being logged in by facial unlocking information.
In the present embodiment, the login mode of reusable first user registration terminal equipment, in the first application program
Unlatching interface in the first user carry out authentication, both avoided user for individual application programs repeat setting login side
Formula in turn, ensures that user identity, while improving the safety coefficient of terminal device, simplifies user's operation.
Preferably, terminal device can also periodically report be activated the reason of enabling, high security level of targeted security mode to answer
The record being opened with program, so that relevant staff can inspect periodically terminal device service condition, it is corresponding to carry out
Manual setting, so that it is guaranteed that the convenience that uses of each user is at the same time it can also ensuring the safety in utilization of each user.
Particularly, the embodiment of the present invention is suitable for public terminals equipment, by helping user to make by certain rule
It when with some common moving equipment, prevents oneself logon account, browser record, private data etc. from revealing, greatly improves
The safety of terminal device.
Fig. 5 shows the block diagram of the terminal device of another embodiment of the present invention, comprising:
Account information obtains module 10, for obtaining at least two account informations of terminal device;
Safe mode adjusts module 20, for adjusting terminal device to targeted security mode, wherein targeted security mode
Incidence relation corresponding at least two account informations.
In embodiments of the present invention, at least two account informations of terminal device are obtained, the type of account information is not limited to
System login account information, finger print information, facial information, encrypted message etc., while account information is not limited to current account letter
Breath, can also be the account information of history, so that terminal device can be based on local data, or based on terminal device and cloud it
Between the data interaction that carries out, the account information of acquisition is analyzed, to judge the association between these account informations obtained
Relationship, to be assessed according to risk class of the incidence relation to terminal device, thus according to different risk class to terminal
The targeted security mode of equipment adjustment Different Strategies.As it can be seen that the present embodiment can be according between the account information in terminal device
Incidence relation, adjusting terminal device to suitable targeted security mode can set realization data in different safe modes
Shared and data protection, to improve the safety coefficient of terminal device on the basis of user-friendly.
Preferably, safe mode adjustment module 20 includes:
First object safe mode adjustment unit is used for when at least two account informations correspond to same user, will be whole
End equipment is adjusted to first object safe mode;
Second targeted security mode adjustment unit is used for when at least two account informations correspond at least two users,
Terminal device is adjusted to the second targeted security mode.
Preferably, terminal device further include:
Attribute information obtains module, for obtaining account information to each account information at least two account informations
Corresponding attribute information;
User's determining module, for determining the corresponding user of account information according to attribute information;
Wherein, attribute information includes at least user's real name information, user number information, subscriber mailbox information and station address
Information.
Preferably, the second targeted security mode adjustment unit includes:
Data record subelement is closed for corresponding between at least two users at least two account informations for the first kind
In the case where connection relationship, the operation data of each user on the terminal device is recorded;
Data dump subelement is closed for corresponding between at least two users at least two account informations for the second class
In the case where connection relationship, the operation data of each user on the terminal device is removed.
Terminal device provided in an embodiment of the present invention can be realized terminal device in the embodiment of the method for Fig. 1 to Fig. 4 and realize
Each process, to avoid repeating, which is not described herein again.
A kind of hardware structural diagram of Fig. 6 terminal device of each embodiment to realize the present invention, the terminal device 100
Including but not limited to: radio frequency unit 101, audio output unit 103, input unit 104, sensor 105, is shown network module 102
Show the components such as unit 106, user input unit 107, interface unit 108, memory 109, processor 110 and power supply 111.
It will be understood by those skilled in the art that terminal device structure shown in Fig. 6 does not constitute the restriction to terminal device, terminal is set
Standby may include perhaps combining certain components or different component layouts than illustrating more or fewer components.In the present invention
In embodiment, terminal device includes but is not limited to mobile phone, tablet computer, laptop, palm PC, car-mounted terminal, can wear
Wear equipment and pedometer etc..
Wherein, processor 110, for obtaining at least two account informations of the terminal device;By the terminal device
It adjusts to targeted security mode, wherein the targeted security mode corresponds to the incidence relation of at least two account information.
In embodiments of the present invention, at least two account informations of terminal device are obtained, the type of account information is not limited to
System login account information, finger print information, facial information, encrypted message etc., while account information is not limited to current account letter
Breath, can also be the account information of history, so that terminal device can be based on local data, or based on terminal device and cloud it
Between the data interaction that carries out, the account information of acquisition is analyzed, to judge the association between these account informations obtained
Relationship, to be assessed according to risk class of the incidence relation to terminal device, thus according to different risk class to terminal
The targeted security mode of equipment adjustment Different Strategies.As it can be seen that the present embodiment can be according between the account information in terminal device
Incidence relation, adjusting terminal device to suitable targeted security mode can set realization data in different safe modes
Shared and data protection, to improve the safety coefficient of terminal device on the basis of user-friendly.
It should be understood that the embodiment of the present invention in, radio frequency unit 101 can be used for receiving and sending messages or communication process in, signal
Send and receive, specifically, by from base station downlink data receive after, to processor 110 handle;In addition, by uplink
Data are sent to base station.In general, radio frequency unit 101 includes but is not limited to antenna, at least one amplifier, transceiver, coupling
Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 101 can also by wireless communication system and network and other set
Standby communication.
Terminal device provides wireless broadband internet by network module 102 for user and accesses, and such as user is helped to receive
It sends e-mails, browse webpage and access streaming video etc..
Audio output unit 103 can be received by radio frequency unit 101 or network module 102 or in memory 109
The audio data of storage is converted into audio signal and exports to be sound.Moreover, audio output unit 103 can also provide and end
The relevant audio output of specific function that end equipment 100 executes is (for example, call signal receives sound, message sink sound etc.
Deng).Audio output unit 103 includes loudspeaker, buzzer and receiver etc..
Input unit 104 is for receiving audio or video signal.Input unit 104 may include graphics processor
(Graphics Processing Unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode
Or the image data of the static images or video obtained in image capture mode by image capture apparatus (such as camera) carries out
Reason.Treated, and picture frame may be displayed on display unit 106.Through graphics processor 1041, treated that picture frame can be deposited
Storage is sent in memory 109 (or other storage mediums) or via radio frequency unit 101 or network module 102.Mike
Wind 1042 can receive sound, and can be audio data by such acoustic processing.Treated audio data can be
The format output that mobile communication base station can be sent to via radio frequency unit 101 is converted in the case where telephone calling model.
Terminal device 100 further includes at least one sensor 105, such as optical sensor, motion sensor and other biographies
Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment
The light and shade of light adjusts the brightness of display panel 1061, and proximity sensor can close when terminal device 100 is moved in one's ear
Display panel 1061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (general
For three axis) size of acceleration, it can detect that size and the direction of gravity when static, can be used to identify terminal device posture (ratio
Such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap);It passes
Sensor 105 can also include fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, wet
Meter, thermometer, infrared sensor etc. are spent, details are not described herein.
Display unit 106 is for showing information input by user or being supplied to the information of user.Display unit 106 can wrap
Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used
Forms such as (Organic Light-Emitting Diode, OLED) configure display panel 1061.
User input unit 107 can be used for receiving the number or character information of input, and generate the use with terminal device
Family setting and the related key signals input of function control.Specifically, user input unit 107 include touch panel 1071 and
Other input equipments 1072.Touch panel 1071, also referred to as touch screen collect the touch operation of user on it or nearby
(for example user uses any suitable objects or attachment such as finger, stylus on touch panel 1071 or in touch panel 1071
Neighbouring operation).Touch panel 1071 may include both touch detecting apparatus and touch controller.Wherein, touch detection
Device detects the touch orientation of user, and detects touch operation bring signal, transmits a signal to touch controller;Touch control
Device processed receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives processor 110, receiving area
It manages the order that device 110 is sent and is executed.Furthermore, it is possible to more using resistance-type, condenser type, infrared ray and surface acoustic wave etc.
Seed type realizes touch panel 1071.In addition to touch panel 1071, user input unit 107 can also include other input equipments
1072.Specifically, other input equipments 1072 can include but is not limited to physical keyboard, function key (such as volume control button,
Switch key etc.), trace ball, mouse, operating stick, details are not described herein.
Further, touch panel 1071 can be covered on display panel 1061, when touch panel 1071 is detected at it
On or near touch operation after, send processor 110 to determine the type of touch event, be followed by subsequent processing device 110 according to touching
The type for touching event provides corresponding visual output on display panel 1061.Although in Fig. 6, touch panel 1071 and display
Panel 1061 is the function that outputs and inputs of realizing terminal device as two independent components, but in some embodiments
In, can be integrated by touch panel 1071 and display panel 1061 and realize the function that outputs and inputs of terminal device, it is specific this
Place is without limitation.
Interface unit 108 is the interface that external device (ED) is connect with terminal device 100.For example, external device (ED) may include having
Line or wireless head-band earphone port, external power supply (or battery charger) port, wired or wireless data port, storage card end
Mouth, port, the port audio input/output (I/O), video i/o port, earphone end for connecting the device with identification module
Mouthful etc..Interface unit 108 can be used for receiving the input (for example, data information, electric power etc.) from external device (ED) and
By one or more elements that the input received is transferred in terminal device 100 or can be used in 100 He of terminal device
Data are transmitted between external device (ED).
Memory 109 can be used for storing application programs and various data.Memory 109 can mainly include storage journey
Sequence area and storage data area, wherein storing program area can the (ratio of application program needed for storage program area, at least one function
Such as sound-playing function, image player function) etc.;Storage data area, which can be stored, uses created data according to mobile phone
(such as audio data, phone directory etc.) etc..In addition, memory 109 may include high-speed random access memory, can also include
Nonvolatile memory, for example, at least a disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of terminal device, utilizes each of various interfaces and the entire terminal device of connection
A part by running or execute the application programs and/or module that are stored in memory 109, and is called and is stored in
Data in memory 109 execute the various functions and processing data of terminal device, to carry out whole prison to terminal device
Control.Processor 110 may include one or more processing units;Preferably, processor 110 can integrate application processor and modulatedemodulate
Adjust processor, wherein the main processing operation system of application processor, user interface and application program etc., modem processor
Main processing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
Terminal device 100 can also include the power supply 111 (such as battery) powered to all parts, it is preferred that power supply 111
Can be logically contiguous by power-supply management system and processor 110, to realize management charging by power-supply management system, put
The functions such as electricity and power managed.
In addition, terminal device 100 includes some unshowned functional modules, details are not described herein.
Preferably, the embodiment of the present invention also provides a kind of terminal device, including processor 110, and memory 109 is stored in
On memory 109 and the computer program that can run on the processor 110, the computer program are executed by processor 110
Each process of the above-mentioned terminal control method embodiment of Shi Shixian, and identical technical effect can be reached, to avoid repeating, here
It repeats no more.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium
Calculation machine program, the computer program realize each process of above-mentioned terminal control method embodiment, and energy when being executed by processor
Reach identical technical effect, to avoid repeating, which is not described herein again.Wherein, the computer readable storage medium, such as only
Read memory (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation
RAM), magnetic or disk etc..
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row
His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and
And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do
There is also other identical elements in the process, method of element, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can add the mode of required general hardware platform to realize by application program, naturally it is also possible to by hardware, but many feelings
The former is more preferably embodiment under condition.Based on this understanding, technical solution of the present invention is substantially in other words to existing skill
The part that art contributes can be embodied in the form of application product, which is stored in one
In a storage medium (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal (can be mobile phone, count
Calculation machine, server, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific
Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art
Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much
Form belongs within protection of the invention.
Claims (10)
1. a kind of terminal control method is applied to terminal device, which is characterized in that the described method includes:
Obtain at least two account informations of the terminal device;
The terminal device is adjusted to targeted security mode, wherein the targeted security mode corresponds to described at least two
The incidence relation of account information.
2. the method according to claim 1, wherein described adjust the terminal device to targeted security mould
Formula, comprising:
When at least two account information corresponds to same user, the terminal device is adjusted to the safe mould of first object
Formula;
When at least two account information corresponds at least two users, the terminal device is adjusted to the second target and is pacified
Syntype.
3. according to the method described in claim 2, it is characterized in that, described adjust the terminal device to targeted security mode
Before, the method also includes:
To each account information at least two account information, the corresponding attribute information of the account information is obtained;
According to the attribute information, the corresponding user of the account information is determined;
Wherein, the attribute information includes at least user's real name information, user number information, subscriber mailbox information and station address
Information.
4. according to the method described in claim 2, it is characterized in that, described correspond at least at least two account information
When two users, the terminal device is adjusted to the second targeted security mode, comprising:
In the case where being first kind incidence relation between at least two account information corresponds at least two users, record
Operation data of each user on the terminal device;
In the case where being the second class incidence relation between at least two account information corresponds at least two users, remove
Operation data of each user on the terminal device.
5. a kind of terminal device, which is characterized in that the terminal device includes:
Account information obtains module, for obtaining at least two account informations of the terminal device;
Safe mode adjusts module, for adjusting the terminal device to targeted security mode, wherein the targeted security mould
Formula corresponds to the incidence relation of at least two account information.
6. terminal device according to claim 5, which is characterized in that the safe mode adjusts module and includes:
First object safe mode adjustment unit is used for when at least two account information corresponds to same user, by institute
Terminal device is stated to adjust to first object safe mode;
Second targeted security mode adjustment unit is used for when at least two account information corresponds at least two users,
The terminal device is adjusted to the second targeted security mode.
7. terminal device according to claim 6, which is characterized in that the terminal device further include:
Attribute information obtains module, for obtaining the account to each account information at least two account information
The corresponding attribute information of information;
User's determining module, for determining the corresponding user of the account information according to the attribute information;
Wherein, the attribute information includes at least user's real name information, user number information, subscriber mailbox information and station address
Information.
8. terminal device according to claim 6, which is characterized in that the second targeted security mode adjustment unit packet
It includes:
Data record subelement is closed for corresponding between at least two users at least two account information for the first kind
In the case where connection relationship, operation data of each user on the terminal device is recorded;
Data dump subelement is closed for corresponding between at least two users at least two account information for the second class
In the case where connection relationship, operation data of each user on the terminal device is removed.
9. a kind of terminal device, which is characterized in that including processor, memory is stored on the memory and can be described
The computer program run on processor is realized when the computer program is executed by the processor as in Claims 1-4
The step of described in any item terminal control methods.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium
Program, the computer program realize terminal control method according to any one of claims 1 to 4 when being executed by processor
The step of.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910668035.5A CN110443042A (en) | 2019-07-23 | 2019-07-23 | A kind of terminal control method and terminal device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910668035.5A CN110443042A (en) | 2019-07-23 | 2019-07-23 | A kind of terminal control method and terminal device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110443042A true CN110443042A (en) | 2019-11-12 |
Family
ID=68431302
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910668035.5A Pending CN110443042A (en) | 2019-07-23 | 2019-07-23 | A kind of terminal control method and terminal device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110443042A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103885827A (en) * | 2014-03-28 | 2014-06-25 | 深圳市中兴移动通信有限公司 | Method switching running modes automatically and intelligent terminal |
CN104717207A (en) * | 2015-02-09 | 2015-06-17 | 惠州Tcl移动通信有限公司 | Information sharing method and server |
CN107040497A (en) * | 2016-02-03 | 2017-08-11 | 阿里巴巴集团控股有限公司 | Network account theft preventing method and device |
CN108632089A (en) * | 2018-05-07 | 2018-10-09 | 平安普惠企业管理有限公司 | Test management method, device, equipment and the computer storage media of terminal |
-
2019
- 2019-07-23 CN CN201910668035.5A patent/CN110443042A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103885827A (en) * | 2014-03-28 | 2014-06-25 | 深圳市中兴移动通信有限公司 | Method switching running modes automatically and intelligent terminal |
CN104717207A (en) * | 2015-02-09 | 2015-06-17 | 惠州Tcl移动通信有限公司 | Information sharing method and server |
CN107040497A (en) * | 2016-02-03 | 2017-08-11 | 阿里巴巴集团控股有限公司 | Network account theft preventing method and device |
CN108632089A (en) * | 2018-05-07 | 2018-10-09 | 平安普惠企业管理有限公司 | Test management method, device, equipment and the computer storage media of terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109918930A (en) | A kind of information protecting method and terminal device | |
CN107315937A (en) | A kind of method for secret protection, mobile terminal and computer-readable recording medium | |
CN109558718A (en) | Application program login method, computer end, mobile terminal, system and storage medium | |
CN107395850A (en) | A kind of social communication information guard method, device and computer-readable recording medium | |
CN109257336A (en) | It is a kind of based on the encrypted message processing method of block chain, terminal device | |
CN109033779A (en) | A kind of unlock authentication method, wearable device and computer readable storage medium | |
CN110188524A (en) | Information ciphering method, information decryption method and terminal | |
CN108174012A (en) | A kind of authority control method and mobile terminal | |
CN110149628A (en) | A kind of information processing method and terminal device | |
CN108011887A (en) | A kind of account management method and equipment | |
CN108206892A (en) | Guard method, device, mobile terminal and the storage medium of contact person's privacy | |
CN110457888A (en) | A kind of verifying code imput method, device, electronic equipment and storage medium | |
CN109993010A (en) | A kind of information display method and mobile terminal | |
CN110035183A (en) | Information sharing method and terminal | |
CN107707554A (en) | A kind of login method and mobile terminal of application program account | |
CN108156537A (en) | The remote operation method and mobile terminal of a kind of mobile terminal | |
CN110321731A (en) | A kind of information protecting method and mobile terminal | |
CN109918944A (en) | A kind of information protecting method, device, mobile terminal and storage medium | |
CN108984231A (en) | A kind of login method and mobile terminal of application program account | |
CN108650415A (en) | End message display methods, mobile terminal and computer readable storage medium | |
CN108363591A (en) | A kind of method and device of PUSH message control | |
CN107895108A (en) | A kind of operation management method and mobile terminal | |
CN110191106A (en) | A kind of data transmission method for uplink, terminal and communication system | |
CN109992939A (en) | A kind of login method and terminal device | |
CN108848240A (en) | A kind of protecting information safety method and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191112 |
|
RJ01 | Rejection of invention patent application after publication |