CN111756924A - Information leakage prevention method and terminal equipment - Google Patents

Information leakage prevention method and terminal equipment Download PDF

Info

Publication number
CN111756924A
CN111756924A CN202010555760.4A CN202010555760A CN111756924A CN 111756924 A CN111756924 A CN 111756924A CN 202010555760 A CN202010555760 A CN 202010555760A CN 111756924 A CN111756924 A CN 111756924A
Authority
CN
China
Prior art keywords
card
terminal equipment
terminal device
leakage prevention
information leakage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010555760.4A
Other languages
Chinese (zh)
Inventor
倪孝深
陈文强
闫鹏
曲义宏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qingdao Hisense Electronic Equipment Co Ltd
Original Assignee
Qingdao Hisense Electronic Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qingdao Hisense Electronic Equipment Co Ltd filed Critical Qingdao Hisense Electronic Equipment Co Ltd
Priority to CN202010555760.4A priority Critical patent/CN111756924A/en
Publication of CN111756924A publication Critical patent/CN111756924A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses an information leakage prevention method and terminal equipment, comprising the following steps: judging whether to start a loss mode; when the loss mode is started, shielding an input signal for controlling shutdown of the terminal equipment and shielding an input signal for controlling the terminal equipment to disconnect network connection, and controlling action of a card lock mechanism to lock the SIM card and/or the memory card. According to the information leakage prevention method, the loss mode is set, when the loss mode is started, some functions of the terminal equipment can be locked from the aspect of software control, the terminal equipment is prevented from being shut down maliciously, data information in the terminal equipment is prevented from being checked or copied by a person, so that processing time can be strived for a loser, meanwhile, an SIM card and/or a memory card storing the data information is mechanically locked from the aspect of hardware, and data loss caused by reading after the card is taken out forcibly by the person is prevented. The scheme can guarantee the data security of the terminal equipment in all directions.

Description

Information leakage prevention method and terminal equipment
Technical Field
The invention relates to the technical field of information security, in particular to an information leakage prevention method and terminal equipment for preventing information leakage.
Background
Intelligent terminal devices such as mobile phones and smart watches have become essential for life of people, and with the progress of technology, the functions of the terminal devices are enriched, and a large amount of privacy information and important data are stored in the terminal devices.
After the terminal equipment of the user is lost, the privacy leakage risk exists besides certain economic loss. If the terminal equipment is stolen by people or the user is lost and cannot be picked up by people, important data and privacy information are easily lost and leaked.
In addition, if the important information user in the terminal device has no other backup, the loss exceeding the value of the terminal device is brought to the user. The technical problem to be solved by the present invention is how to transfer out data after the terminal device is lost, so as to minimize the loss caused by the loss of the terminal device by the user.
Disclosure of Invention
In order to solve the technical problem that data leakage is easily caused by the fact that intelligent terminal equipment is lost in the prior art, the invention provides an information leakage prevention method and terminal equipment for preventing information leakage.
In order to achieve the purpose, the invention adopts the following technical scheme:
the invention provides an information leakage prevention method, which comprises the following steps:
judging whether to start a loss mode;
when the loss mode is started, shielding an input signal for controlling shutdown of the terminal equipment and shielding an input signal for controlling the terminal equipment to disconnect network connection, and controlling action of a card lock mechanism to lock the SIM card and/or the memory card.
Further, the method for starting the lost mode comprises the following steps:
the external equipment sends a loss notice to the terminal equipment through a communication network;
and after receiving the loss notification, the terminal equipment starts a loss mode.
Further, shielding the input signal for controlling the shutdown of the terminal device screen includes shielding the shutdown input signal from the key and shielding the shutdown input signal from the touch screen.
Furthermore, before controlling the card lock mechanism to act, the method also comprises the step of detecting the state of the current card lock mechanism, and when the card lock mechanism does not lock the SIM card and/or the storage card, the card lock mechanism is controlled to act to lock the SIM card and/or the storage card.
Further, when the loss mode is turned on, the method further comprises controlling the terminal device to be set to the ring mode.
Further, when the loss mode is turned on, the terminal device acquires the location information thereof and transmits the location information to the external device, and/or,
the external equipment acquires the data stored in the terminal equipment through a communication network;
and/or the presence of a gas in the gas,
and the terminal equipment deletes the stored data.
Further, when the terminal device is in a power-off state, the terminal device cannot start the loss mode, and when the terminal device is powered on again, the terminal device automatically receives the loss notification and controls to start the loss mode.
The invention also provides a terminal device, which comprises a casing and also comprises:
the clamping and locking mechanism is arranged in the shell and is used for locking or unlocking the SIM card and/or the storage card;
a communication module for communicating with an external device;
a control module configured to perform information leakage prevention control in accordance with the information leakage prevention method of any one of claims 1 to 7.
Further, the terminal device further includes:
a card holder for supporting the SIM card and/or memory card, the card holder being ejectably fitted within the housing;
the latch mechanism includes:
a driving device fixed in the casing;
and the driving device can drive the locking block to move and is used for limiting the movement of the card holder in the ejecting direction or releasing the limitation of the movement of the card holder in the ejecting direction.
Furthermore, a notch is formed in one side of the card support, the locking block is of a sheet structure matched with the notch, the driving device drives the locking block to rotate on the plane where the locking block is located, at least part of the locking block rotates into the notch and is used for limiting the card support to move in the ejecting direction, and the locking block rotates out of the notch and is used for relieving the limitation of the card support to move in the ejecting direction.
Compared with the prior art, the technical scheme of the invention has the following technical effects: according to the information leakage prevention method, the loss mode is set, when the loss mode is started, some functions of the terminal equipment can be locked from the aspect of software control, the terminal equipment is prevented from being shut down maliciously, data information in the terminal equipment is prevented from being checked or copied by a person, so that processing time can be strived for a loser, meanwhile, an SIM card and/or a memory card storing the data information is mechanically locked from the aspect of hardware, and data loss caused by reading after the card is taken out forcibly by the person is prevented. The scheme can guarantee the data security of the terminal equipment in all directions.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a communication schematic diagram of an embodiment of an information leakage prevention method proposed by the present invention;
fig. 2 is a flow chart of an embodiment of an information leakage prevention method according to the present invention;
fig. 3 is a schematic structural diagram of an embodiment of a terminal device proposed by the present invention;
FIG. 4 is a schematic view of the card holder and latch mechanism of FIG. 3 in a mated condition;
FIG. 5 is a schematic view of a latch mechanism in an embodiment of the terminal device of the present invention;
fig. 6 is a side view of the structure of fig. 5.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the description of the present invention, it should be noted that the terms "mounted," "connected," and "connected" are to be construed broadly and may be, for example, fixedly connected, detachably connected, or integrally connected unless otherwise explicitly stated or limited. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art. In the foregoing description of embodiments, the particular features, structures, materials, or characteristics may be combined in any suitable manner in any one or more embodiments or examples.
Example one
The present embodiment provides an information leakage prevention method, which is particularly suitable for data information protection of an intelligent terminal device having a network communication function, and along with the multi-functionalization and intelligentization of the terminal device, an address book, a photo, important business data, and the like are stored in the terminal device, so how to ensure information security in the terminal device is a technical problem mainly solved by the present embodiment, as shown in fig. 1, the information leakage prevention method includes:
judging whether to start a loss mode;
when the loss mode is started, shielding an input signal for controlling the shutdown of the terminal equipment 1 and shielding an input signal for controlling the disconnection of the network connection of the terminal equipment 1, and controlling the action of a card lock mechanism to lock the SIM card and/or the memory card.
According to the information leakage prevention method, by setting the loss mode, when the loss mode is started, some functions of the terminal equipment can be locked from the aspect of software control, malicious shutdown, checking or copying of data information in the terminal equipment by people can be prevented, so that processing time can be strived for a loser, an input signal for disconnecting network connection can be shielded through software control, the network which loses the terminal equipment is kept smooth, and a user can control data transfer and deletion control of the lost terminal equipment through the network. Meanwhile, in terms of hardware, the SIM card and/or the memory card storing data materials are mechanically locked, and data loss caused by reading after the card is forcibly taken out by a person is prevented. The scheme can guarantee the data security of the terminal equipment in all directions.
The control logic of the lost mode should be embedded in the system, and the lost mode can be turned on by operating the terminal device or by network control of other terminal devices (hereinafter referred to as external devices).
When the lost mode is started through the external equipment network control, the external equipment is provided with the application software which is the same as that of the lost terminal equipment, and a user logs in the local application software by using the external equipment and the account which is the same as that of the lost terminal equipment. And operating the external equipment to establish network connection with the lost terminal equipment to realize remote control of the lost terminal equipment.
As shown in fig. 2, the preferred method for starting the lost mode in this embodiment is:
the external device sends a loss notification to the terminal device through the communication network 2;
and after receiving the loss notification, the terminal equipment starts a loss mode.
In order to prevent the terminal device from being powered off, which may cause the external device to fail to communicate with the terminal device and thus fail to perform a series of protection controls, after the loss mode is turned on, some functions are disabled locally by the lost terminal device.
At present, there are two shutdown modes of terminal equipment, one is to input a shutdown control signal to control shutdown by operating an external key, and the other is to control shutdown by operating a touch screen and software. Therefore, after the loss mode is started, the input signal for controlling the shutdown of the screen of the terminal equipment can be shielded, including shielding the shutdown input signal from the key and shielding the shutdown input signal from the touch screen, so as to keep the terminal equipment in a startup state.
The terminal device can shield some functions, and also can keep some functions, for example, a function of answering a call can be kept, so that a user can conveniently find out other people who contact the terminal device through phone contact.
In order to prevent the terminal device from being disconnected from the network, which causes the external device to be unable to keep communicating with the lost terminal device, and further to be difficult to copy or delete data in the terminal device, after the loss mode is started, the method also comprises the step of shielding an input signal for controlling the terminal device to disconnect the network connection so as to keep the network smooth, and a user can copy important data in time during the period, so that the loss caused by the loss of the important data is avoided.
The external device may copy the data stored in the terminal device through the communication network, and the copied data may be stored in the network server or in the external device.
Before controlling the card locking mechanism to act, the method also comprises the step of detecting the current card locking mechanism state, and when the card locking mechanism does not lock the SIM card and/or the storage card, the card locking mechanism is controlled to act to lock the SIM card and/or the storage card. If the card-locking mechanism is in a state of locking the SIM card and/or the memory card, there is no need to control the action thereof.
In order to further ensure the security of the user data and at the same time frighten others to attempt to illegally occupy the terminal device and steal data, in this embodiment, it is preferable that the method further includes controlling the terminal device to be forcibly set to the ring mode when the loss mode is turned on. And the mode of shielding the key input signal and shielding the touch screen input signal can also be used for preventing the ring mode from being closed again.
In order to help the user to quickly retrieve the lost terminal equipment, when the lost mode is started, the terminal equipment also acquires the position information of the lost terminal equipment and sends the position information to the external equipment. The user can help the terminal equipment to find the terminal equipment by positioning the position of the terminal equipment.
In order to further secure the user profile and prevent the terminal device from being disassembled violently, and the SIM card and/or the memory card still have the risk of data leakage when being taken out, it is preferable that the terminal device also deletes and destroys the data stored in the terminal device when the loss mode starts. The controlling step may be arranged to be completed after the user copies the data.
The method aims to solve the problem that a user cannot find that the terminal equipment is lost at the first time, so that the lost mode cannot be controlled to be started in time, and the lost mode cannot be started when the terminal equipment is powered off at the moment. The user can still send the loss notice to the terminal equipment through the external equipment, and when the terminal equipment is started again, the loss notice is automatically received, and the loss mode is controlled to be started. So as to maximally secure the data and reduce the user loss. After the loss mode is started, the terminal device immediately executes a series of control of the loss mode, thereby preventing the terminal device from being forcibly powered off again or closing the network.
Example two
As shown in fig. 3 and 4, the present embodiment provides a terminal device 1, which includes a housing 11 and a locking mechanism 12, a card can be inserted into the housing 11 or pulled out from the housing 11 from a card slot 14 on one side of the housing 11, and the locking mechanism 12 is disposed in the housing 11 and used for locking or unlocking the card 15 when the card is inserted into the housing 11. The card refers to a SIM card and/or a memory card.
A communication module and a control module (not shown in the figure) are also arranged in the casing 11, and the communication module is used for communicating with the external equipment 2; the control module is configured to perform information leakage prevention control in accordance with the information leakage prevention method described in the first embodiment. The information leakage prevention method can be specifically described in the first embodiment, and is not described herein.
The terminal device in this embodiment further comprises a card holder 13 for holding a SIM card and/or a memory card 15, which is/are spring-mounted in the housing 11.
As shown in fig. 5 and 6, the locking mechanism 12 preferably includes a driving device 121 and a locking piece 122 in the present embodiment, the driving device 121 is fixed in the housing 11; the lock block 122 is connected with a power output shaft of the driving device 121, and the driving device 121 can drive the lock block 122 to move so as to limit the movement of the card holder 13 in the ejecting direction or release the limitation of the movement of the card holder 13 in the ejecting direction.
The driving device 121 may be implemented by a stepping motor.
In this embodiment, the power output shaft of the driving device 121 is perpendicular to the plane direction of the terminal device, and the locking block 122 can be implemented by using a sheet structure, so that the thickness of the locking block can be thinner, and the volume of the terminal device is not increased.
As a preferred embodiment, a notch 131 is formed in one side of the card holder 13, the lock block 122 is a sheet structure matched with the notch 131, the driving device 121 drives the lock block 122 to rotate on the plane where the lock block 122 is located, the lock block 122 can rotate at least partially into the notch, when the lock block 122 rotates at least partially into the notch 131, the card holder 13 can be limited to move in the ejecting direction, and when the lock block 122 rotates out of the notch 131, the lock block is used for releasing the lock block to limit the card holder 13 to move in the ejecting direction, that is, the card holder 13 can be ejected from the housing 11.
In this embodiment, the notch 131 is an 1/4 circular structure, the locking piece 122 is a semicircular structure, when the locking piece 122 rotates toward the notch 131, half of the locking piece 122, that is, the 1/4 circle, just rotates into the 1/4 circular structure, the straight edge of the locking piece 122 is parallel to and opposite to the straight edge of the notch 131, and the direction of the straight edge is perpendicular to the inserting and pulling direction when the card holder 13 is assembled or pulled out, so that the card holder 13 can be tightly locked. By arranging the locking piece 122 in a semicircular shape, interference of the locking piece to the surroundings can be reduced to the maximum when the locking piece rotates, and the occupied space is further saved.
In the foregoing description of embodiments, the particular features, structures, materials, or characteristics may be combined in any suitable manner in any one or more embodiments or examples.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. A method of preventing leakage of information, comprising:
judging whether to start a loss mode;
when the loss mode is started, shielding an input signal for controlling shutdown of the terminal equipment and shielding an input signal for controlling the terminal equipment to disconnect network connection, and controlling action of a card lock mechanism to lock the SIM card and/or the memory card.
2. An information leakage prevention method according to claim 1, wherein the loss mode is enabled by:
the external equipment sends a loss notice to the terminal equipment through a communication network;
and after receiving the loss notification, the terminal equipment starts a loss mode.
3. An information leakage prevention method according to claim 1, wherein shielding the input signal for controlling the shutdown of the screen of the terminal device comprises shielding a shutdown input signal from the key and shielding a shutdown input signal from the touch screen.
4. An information leakage prevention method according to claim 1, further comprising a step of detecting a current card lock mechanism state before controlling the operation of the card lock mechanism, the control of the operation of the card lock mechanism locking the SIM card and/or the memory card when the SIM card and/or the memory card is not locked by the card lock mechanism.
5. An information leakage prevention method according to claim 1, further comprising controlling the terminal device to be set to a ring mode when the loss mode is turned on.
6. An information leakage prevention method according to any of claims 1-5, further comprising, when the loss mode is turned on, the terminal device acquiring its location information and transmitting the location information to an external device, and/or,
the external equipment acquires the data stored in the terminal equipment through a communication network;
and/or the presence of a gas in the gas,
and the terminal equipment deletes the stored data.
7. An information leakage prevention method according to claim 2, wherein said terminal device cannot turn on the loss mode when it is in a power-off state, and when said terminal device is turned on again, said loss notification is automatically received and the loss mode is controlled to be turned on.
8. A terminal device, comprising a housing, further comprising:
the clamping and locking mechanism is arranged in the shell and is used for locking or unlocking the SIM card and/or the storage card;
a communication module for communicating with an external device;
a control module configured to perform information leakage prevention control in accordance with the information leakage prevention method of any one of claims 1 to 7.
9. The terminal device according to claim 8, wherein the terminal device further comprises:
a card holder for supporting the SIM card and/or memory card, the card holder being ejectably fitted within the housing;
the latch mechanism includes:
a driving device fixed in the casing;
and the driving device can drive the locking block to move and is used for limiting the movement of the card holder in the ejecting direction or releasing the limitation of the movement of the card holder in the ejecting direction.
10. The terminal device according to claim 9, wherein a notch is formed in one side of the card holder, the lock block is a sheet structure matched with the notch, the driving device drives the lock block to rotate on a plane where the lock block is located, the lock block at least partially rotates into the notch to limit the movement of the card holder in the ejecting direction, and the lock block rotates out of the notch to release the limitation of the movement of the card holder in the ejecting direction.
CN202010555760.4A 2020-06-17 2020-06-17 Information leakage prevention method and terminal equipment Pending CN111756924A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010555760.4A CN111756924A (en) 2020-06-17 2020-06-17 Information leakage prevention method and terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010555760.4A CN111756924A (en) 2020-06-17 2020-06-17 Information leakage prevention method and terminal equipment

Publications (1)

Publication Number Publication Date
CN111756924A true CN111756924A (en) 2020-10-09

Family

ID=72674800

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010555760.4A Pending CN111756924A (en) 2020-06-17 2020-06-17 Information leakage prevention method and terminal equipment

Country Status (1)

Country Link
CN (1) CN111756924A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114172999A (en) * 2021-12-02 2022-03-11 王颖 Land is beckoned and is clapped information safety monitoring device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1635807A (en) * 2003-12-27 2005-07-06 海信集团有限公司 A deadlock method for preventing handset from being embezzled
CN103118174A (en) * 2012-12-31 2013-05-22 广东欧珀移动通信有限公司 Anti-theft method of mobile terminal and mobile terminal
CN105872142A (en) * 2016-04-29 2016-08-17 维沃移动通信有限公司 Card support popping structure, control method and mobile terminal
CN106982297A (en) * 2017-04-01 2017-07-25 宇龙计算机通信科技(深圳)有限公司 Safety protecting method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1635807A (en) * 2003-12-27 2005-07-06 海信集团有限公司 A deadlock method for preventing handset from being embezzled
CN103118174A (en) * 2012-12-31 2013-05-22 广东欧珀移动通信有限公司 Anti-theft method of mobile terminal and mobile terminal
CN105872142A (en) * 2016-04-29 2016-08-17 维沃移动通信有限公司 Card support popping structure, control method and mobile terminal
CN106982297A (en) * 2017-04-01 2017-07-25 宇龙计算机通信科技(深圳)有限公司 Safety protecting method and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114172999A (en) * 2021-12-02 2022-03-11 王颖 Land is beckoned and is clapped information safety monitoring device
CN114172999B (en) * 2021-12-02 2023-03-14 王颖 Land is beckoned and is clapped information safety monitoring device

Similar Documents

Publication Publication Date Title
US7873382B2 (en) Mobile apparatus with remote lock and control function
CN102739868B (en) The loss processing method of mobile terminal and system
CN104700050A (en) Mobile terminal safety positioning method and device
EP2613580B1 (en) System, method and communication terminal for tracking stolen communication terminal
JP2002077372A (en) Method and apparatus of controlling and protecting portable telephone from being lost, stolen or abused
US20040046638A1 (en) Terminal lock system comprising key device carried by user and terminal-associated device incorporated in terminal device
EP1901577B1 (en) Apparatus and method for controlling bluetooth in portable terminal
WO2011088652A1 (en) Anti-theft mobile terminal and anti-theft method for mobile terminal
CN101184265B (en) Method for monitoring stolen mobile terminal and mobile terminal
CN101926099A (en) Method for destructive readout of data in case of mobile theft
WO2015007116A1 (en) Anti-theft method for data after loss of cell phone
CN102387498A (en) Anti-theft system and method for mobile telephone
CN101330681A (en) Mobile phone anti-theft method and anti-theft mobile phone thereof
CN108769925B (en) Anti-theft recovery system for mobile terminal
CN106231092A (en) A kind of phone information security protection method
CN111756924A (en) Information leakage prevention method and terminal equipment
KR101459243B1 (en) Security Method of Computer using the Security Locker for USB Socket
CN1980428A (en) Method for mobile terminal to automatically encipher and automatically protect subscriber identifying module
CN101409944A (en) Method and apparatus for encrypting keyboard
EP1473952B1 (en) Mobile apparatus with remote lock and control function
CN105141736A (en) Information security protection method and apparatus
JP4372034B2 (en) Mobile phone terminal system, mobile phone terminal unauthorized use prevention method, and mobile phone terminal unauthorized use prevention program
CN201682540U (en) Anti-theft mobile phone
CN111050236B (en) Electronic equipment anti-theft method, device and system, electronic equipment and storage medium
JP2000222358A (en) Data back-up and data recovery device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20201009