CN112399421A - Terminal control method, equipment, storage medium and device based on information security - Google Patents

Terminal control method, equipment, storage medium and device based on information security Download PDF

Info

Publication number
CN112399421A
CN112399421A CN202011214837.8A CN202011214837A CN112399421A CN 112399421 A CN112399421 A CN 112399421A CN 202011214837 A CN202011214837 A CN 202011214837A CN 112399421 A CN112399421 A CN 112399421A
Authority
CN
China
Prior art keywords
preset
user terminal
terminal
information
behavior
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011214837.8A
Other languages
Chinese (zh)
Inventor
叶兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Trust Co Ltd
Original Assignee
Ping An Trust Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Trust Co Ltd filed Critical Ping An Trust Co Ltd
Priority to CN202011214837.8A priority Critical patent/CN112399421A/en
Publication of CN112399421A publication Critical patent/CN112399421A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a terminal control method, equipment, a storage medium and a device based on information security, which relate to the technical field of information security, and the method comprises the following steps: obtaining the position information of a user terminal; when the position information meets a preset condition, acquiring attitude data of the user terminal; determining a behavior type corresponding to the user terminal according to the attitude data; and when the behavior type belongs to a preset supervision behavior, determining a target terminal corresponding to the user terminal from preset terminals according to the position information, and controlling the target terminal to enter a locking state. According to the method and the device, when the user terminal is judged to be in the specific position and the use behavior belonging to the preset supervision behavior is executed, the target terminal corresponding to the user terminal is locked, so that the user terminal cannot operate the data on the target terminal, and the data leakage of the target terminal is avoided.

Description

Terminal control method, equipment, storage medium and device based on information security
Technical Field
The present invention relates to the field of information security technologies, and in particular, to a method, a device, a storage medium, and an apparatus for controlling a terminal based on information security.
Background
With the deep application of information technology, the information security risk is more prominent. For various organizations or units, in order to guarantee their competitiveness, it is necessary to avoid the disclosure of confidential information. Because internal employees are very easy to contact confidential data, and the convenience of information transmission and the popularization of intelligent terminals, the employees are very easy to intentionally or unintentionally reveal the confidential data. For example, many people like to take pictures and share pictures, and once the pictures contain a computer screen, related data and secrets may be leaked. Therefore, how to manage and control the terminal used by the user to avoid information leakage is very important.
The above is only for the purpose of assisting understanding of the technical aspects of the present invention, and does not represent an admission that the above is prior art.
Disclosure of Invention
The invention mainly aims to provide a device terminal method, device, storage medium and device based on information security, aiming at managing and controlling a terminal used by a user so as to realize information security management.
In order to achieve the above object, the present invention provides a terminal control method based on information security, which includes the following steps:
acquiring position information of a user terminal;
when the position information meets a preset condition, acquiring attitude data of the user terminal;
determining a behavior type corresponding to the user terminal according to the attitude data;
and when the behavior type belongs to a preset supervision behavior, determining a target terminal corresponding to the user terminal from preset terminals according to the position information, and controlling the target terminal to enter a locking state.
Optionally, when the position information meets the preset condition and before acquiring the posture data of the user terminal, the method further includes:
acquiring preset station information, and determining a coordinate range corresponding to each preset station according to the preset station information;
converting the position information into coordinate parameters according to the preset station information;
and when the coordinate parameter is in the coordinate range, judging that the position information meets a preset condition.
Optionally, the obtaining the location information of the user terminal includes:
feedback information returned by the user terminal when responding to a broadcast signal transmitted by a preset Bluetooth beacon is acquired;
determining the signal intensity corresponding to the preset Bluetooth beacon according to the feedback information;
and acquiring the position information of the preset Bluetooth beacon, and determining the position information of the user terminal according to the position information of the preset Bluetooth beacon and the signal intensity.
Optionally, the determining the behavior type corresponding to the user terminal according to the gesture data includes:
determining the inclination angle of the user terminal relative to a vertical plane according to the attitude data;
when the inclination angle is smaller than a preset angle, acquiring the use state of a camera module in the user terminal;
when the use state is the opening state, judging that the user terminal is in a photographing behavior;
correspondingly, when the behavior type belongs to a preset supervision behavior, determining a target terminal corresponding to the user terminal from preset terminals according to the position information, and controlling the target terminal to enter a locking state, including:
and when the behavior type is a photographing behavior, determining a target terminal corresponding to the user terminal from preset terminals according to the position information, and controlling the target terminal to enter a locking state.
Optionally, when the behavior type belongs to a preset supervision behavior, determining a target terminal corresponding to the user terminal from preset terminals according to the location information, and controlling the target terminal to enter a locked state, where the method includes:
when the behavior type belongs to a preset supervision behavior, determining a target terminal corresponding to the user terminal from preset terminals according to the position information;
receiving current display information fed back by the target terminal;
judging whether the current display information belongs to secret information or not according to the preset secret information characteristics;
and controlling the target terminal to enter a locking state when the current display information belongs to confidential information.
Optionally, when the behavior type belongs to a preset supervision behavior, determining a target terminal corresponding to the user terminal from preset terminals according to the location information includes:
when the behavior type belongs to a preset supervision behavior, acquiring preset terminal position information;
determining the distance between each preset terminal and the user terminal according to the preset terminal position information and the position information;
and taking a preset terminal with the distance to the user terminal smaller than a preset threshold value as a target terminal corresponding to the user terminal.
Optionally, when the behavior type belongs to a preset supervision behavior, determining a target terminal corresponding to the user terminal from preset terminals according to the location information, and controlling the target terminal to enter a locked state, further including:
receiving an authorization request sent by the user terminal, and determining the authority level corresponding to the user terminal according to the authorization request;
determining the security level corresponding to the current display information according to the preset security information characteristics;
and controlling the target terminal to exit the locking state when the authority level is matched with the confidentiality level.
In addition, in order to achieve the above object, the present invention further provides a terminal control apparatus based on information security, the apparatus including:
the position acquisition module is used for acquiring the position information of the user terminal;
the attitude data acquisition module is used for acquiring attitude data of the user terminal when the position information meets a preset condition;
the behavior judging module is used for determining a behavior type corresponding to the user terminal according to the attitude data;
and the control module is used for determining a target terminal corresponding to the user terminal from preset terminals according to the position information and controlling the target terminal to enter a locking state when the behavior type belongs to a preset supervision behavior.
Furthermore, in order to achieve the above object, the present invention further provides an information security-based terminal control device, which includes a memory, a processor, and an information security-based terminal control program stored in the memory and executable on the processor, wherein the information security-based terminal control program is configured to implement the steps of the information security-based terminal control method as described above.
In addition, in order to achieve the above object, the present invention further provides a storage medium having stored thereon an information security-based terminal control program, which when executed by a processor implements the steps of the information security-based terminal control method as described above.
In the invention, the position information of the user terminal is obtained; when the position information meets a preset condition, acquiring attitude data of the user terminal; determining a behavior type corresponding to the user terminal according to the attitude data; and when the behavior type belongs to a preset supervision behavior, determining a target terminal corresponding to the user terminal from preset terminals according to the position information, and controlling the target terminal to enter a locking state. According to the method and the device, when the user terminal is judged to be in the specific position and the use behavior belonging to the preset supervision behavior is executed, the target terminal corresponding to the user terminal is locked, so that the user terminal cannot operate the data on the target terminal, and the data leakage of the target terminal is avoided.
Drawings
Fig. 1 is a schematic structural diagram of a terminal control device based on information security in a hardware operating environment according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of a first embodiment of a terminal control method based on information security according to the present invention;
fig. 3 is a flowchart illustrating a second embodiment of a terminal control method based on information security according to the present invention;
fig. 4 is a flowchart illustrating a third embodiment of a terminal control method based on information security according to the present invention;
fig. 5 is a schematic flowchart of a fourth embodiment of a terminal control method based on information security according to the present invention;
fig. 6 is a block diagram of a first embodiment of a terminal control device based on information security according to the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Referring to fig. 1, fig. 1 is a schematic structural diagram of a terminal control device based on information security in a hardware operating environment according to an embodiment of the present invention.
As shown in fig. 1, the terminal control device based on information security may include: a processor 1001, such as a Central Processing Unit (CPU), a communication bus 1002, a user interface 1003, a network interface 1004, and a memory 1005. Wherein a communication bus 1002 is used to enable connective communication between these components. The user interface 1003 may include a Display screen (Display), and the optional user interface 1003 may further include a standard wired interface and a wireless interface, and the wired interface for the user interface 1003 may be a USB interface in the present invention. The network interface 1004 may optionally include a standard wired interface, a WIreless interface (e.g., a WIreless-FIdelity (WI-FI) interface). The Memory 1005 may be a Random Access Memory (RAM) Memory or a Non-volatile Memory (NVM), such as a disk Memory. The memory 1005 may alternatively be a storage device separate from the processor 1001.
Those skilled in the art will appreciate that the configuration shown in fig. 1 does not constitute a limitation of the information security-based terminal control device, and may include more or less components than those shown, or some components in combination, or a different arrangement of components.
As shown in fig. 1, a memory 1005, identified as a computer storage medium, may include an operating system, a network communication module, a user interface module, and a terminal control program based on information security.
In the terminal control device based on information security shown in fig. 1, the network interface 1004 is mainly used for connecting to a background server and performing data communication with the background server; the user interface 1003 is mainly used for connecting user equipment; the information security-based terminal control device calls the information security-based terminal control program stored in the memory 1005 through the processor 1001 and executes the information security-based terminal control method provided by the embodiment of the present invention.
Based on the hardware structure, the embodiment of the terminal control method based on information security is provided.
Referring to fig. 2, fig. 2 is a flowchart illustrating a first embodiment of a terminal control method based on information security according to the present invention, and proposes the first embodiment of the terminal control method based on information security according to the present invention.
In a first embodiment, the terminal control method based on information security includes the following steps:
step S10: position information of the user terminal is acquired.
It should be understood that the executing subject of this embodiment is the information security-based terminal control device, which has functions of image processing, data communication, program running, and the like, and the information security-based terminal control device may be a computer device such as a computer or a server, and of course, other devices having similar functions may also be used, and this embodiment is not limited thereto.
It should be noted that the terminal control device based on information security may communicate with an application program on the user terminal to obtain the geographic location information of the user terminal, so as to obtain the location information of the user terminal. The application program can be pre-installed on the user terminal, and acquires corresponding data (sensor data, positioning data and the like) to acquire the authority. The user terminal can be a mobile phone or a tablet.
In specific implementation, when a user enters a scene with devices such as an entrance guard, the user needs to verify the identity by using a corresponding application program to acquire an entrance right. In this embodiment, a request for permission to acquire positioning data may be added to such an application. When a user carries out a field, the user needs to authorize a positioning data acquisition permission request of an application program, and the user can acquire the entrance permission after passing the identity authentication. This embodiment can be applied to all subsequent related cases when the user terminal right needs to be acquired. Of course, the location information of the user terminal may also be located in other manners, such as by video monitoring, which is not limited in this embodiment.
Step S20: and acquiring the attitude data of the user terminal when the position information meets a preset condition.
It should be noted that, by determining the location information according to the preset condition, it can be determined whether the user terminal enters the preset specific location. During specific judgment, if the position information is a coordinate parameter, the coordinate parameter can be judged to be in a preset coordinate range; if the position information is the map mark point, whether the map mark point is in a preset range can be judged.
Note that the posture data may be detection data of a posture sensor in the user terminal. The attitude sensor can be a gyroscope, a gravity sensor, an acceleration sensor or an electronic compass.
In order to more accurately determine whether the user terminal enters the preset specific position, before acquiring the posture data of the user terminal when the position information satisfies the preset condition, the method further includes: acquiring preset station information, and determining a coordinate range corresponding to each preset station according to the preset station information; converting the position information into coordinate parameters according to the preset station information; and when the coordinate parameter is in the coordinate range, judging that the position information meets a preset condition.
It should be noted that the preset workstation information refers to the workstation position information in a specific environment, for example, the office workstation of the employee in the office, or the instrument operation position in the machine room. The present embodiment represents the position information in the form of coordinate parameters. When the coordinate system is established, the door of an office or a machine room can be used as the origin of the coordinate system, and the coordinate system of the whole office or machine room is established. Meanwhile, the position of the station is converted into a coordinate parameter, the coordinate range of the station is usually represented by a circle or a matrix, and all coordinates in the circle or the matrix belong to the station range.
It can be understood that, in order to determine the location information of the user terminal, the location information of the user terminal is converted based on the established coordinate system, and the coordinate parameters of the user terminal are obtained. And if the coordinate parameter of the user terminal belongs to the coordinate range of any station, judging that the position information of the user terminal meets the preset condition.
Step S30: and determining the behavior type corresponding to the user terminal according to the attitude data.
It should be noted that the behavior type may include taking a picture, recording, watching a video, or browsing a web page. When the user uses the user terminal, the gesture is prevented from being different under different action types. For example, when a user takes a picture, the mobile phone is usually in a vertical state; when watching video, the video is usually in a flat state; when browsing a web page, it is usually in a half-tilt state.
During specific implementation, the terminal control equipment based on information security judges the attitude data, and if the mobile phone is in a vertical state, the user terminal can be judged to take a picture; if the video is in a flat state, the video watching state of the user terminal can be judged; if the user terminal is in the half-tilt state, the user terminal can be judged to browse the webpage. Meanwhile, judgment can be carried out by combining the posture holding time, so that the accuracy is improved.
Step S40: and when the behavior type belongs to a preset supervision behavior, determining a target terminal corresponding to the user terminal from preset terminals according to the position information, and controlling the target terminal to enter a locking state.
It should be noted that the predetermined supervision behavior may include a photographing or recording behavior. If the user terminal is in a photographing or recording behavior, the risk of disclosure may be high, and management and control are required. The preset terminal refers to a terminal needing protection, and can comprise a computer on a workstation or a display of related equipment. Since the data on the display of a computer or related device relates to confidential documents, it needs to be protected. The locking state is to control the display to enter a screen locking state or power off, so that the display screen cannot display contents, and the security effect is achieved.
It should be noted that the target terminal refers to a display that the user terminal may capture when taking a picture or recording. According to the position of the station where the user terminal is located, display equipment on the station and surrounding stations can be used as target terminals.
In the first embodiment, the position information of the user terminal is acquired; when the position information meets a preset condition, acquiring attitude data of the user terminal; determining a behavior type corresponding to the user terminal according to the attitude data; and when the behavior type belongs to a preset supervision behavior, determining a target terminal corresponding to the user terminal from preset terminals according to the position information, and controlling the target terminal to enter a locking state. According to the embodiment, when the user terminal is judged to be in the specific position and execute the use behavior belonging to the preset supervision behavior, the target terminal corresponding to the user terminal is locked, so that the user terminal cannot operate the data on the target terminal, and the data leakage of the target terminal is avoided.
Referring to fig. 3, fig. 3 is a flowchart illustrating a second embodiment of the terminal control method based on information security according to the present invention, and the second embodiment of the terminal control method based on information security according to the present invention is proposed based on the first embodiment.
In order to make the location information of the ue more accurate, in this embodiment, the bluetooth beacon is used to locate the ue, and in the second embodiment, the step S10 includes:
step S101: and feedback information returned by the user terminal when responding to the broadcast signal transmitted by the preset Bluetooth beacon is acquired.
It should be noted that the preset bluetooth beacon is directed to bluetooth devices within a certain range to transmit broadcast signals, and the number of the preset bluetooth beacons may be multiple, such as three. And when the user enters the signal coverage range of the preset Bluetooth beacon, responding to the broadcast signal. And meanwhile, the broadcast signal is collected, and feedback information is sent to the terminal control equipment based on information safety. The feedback information comprises a preset Bluetooth beacon and the broadcast signal which are responded.
It should be noted that, in order to perform positioning more accurately, the preset bluetooth beacon preferably ensures that the ue can respond to multiple preset bluetooth beacons at any position.
Step S102: and determining the signal intensity corresponding to the preset Bluetooth beacon according to the feedback information.
In order to save the computational resources of the user terminal, in the present embodiment, the terminal control device based on information security detects the broadcast signal. Of course, the detection may also be performed by the user terminal. By detecting the amplitude or the like of the broadcast signal, the intensity value of the broadcast signal can be acquired. In general, the strength of each broadcast signal may not be the same due to the location of the bluetooth beacon being preset.
Step S103: and acquiring the position information of the preset Bluetooth beacon, and determining the position information of the user terminal according to the position information of the preset Bluetooth beacon and the signal intensity.
It is understood that the distance between the user terminal and the corresponding preset bluetooth beacon may be determined according to the strength of the broadcast signal based on the radio attenuation model. The calculation formula is as follows:
D=10(RSSI-A)/(10*n)
wherein D is the distance between the user terminal and the corresponding preset Bluetooth beacon; RSSI is the strength value of the broadcast signal, A is the signal strength when the transmitting end and the receiving end are 1 meter apart, and n is the environmental attenuation factor.
It should be noted that, in order to obtain the location of the ue, at least 3 bluetooth beacons are required to perform accurate positioning. When the user terminal responds to the 3 preset Bluetooth beacons, the distances between the user terminal and the 3 preset Bluetooth beacons are determined according to the strength of the broadcast signal, and the final position of the user terminal is obtained through a 3-point positioning method.
In the second embodiment, the user terminal is positioned through the bluetooth beacon, the accuracy of indoor positioning is far higher than that of GPS positioning, and the problem that the positioning accuracy of the user terminal through the GPS is insufficient is solved. Meanwhile, the target terminal corresponding to the user terminal is determined more accurately, so that adverse effects caused by locking of too many terminals are avoided.
Referring to fig. 4, fig. 4 is a flowchart illustrating a third embodiment of the terminal control method based on information security according to the present invention, and the third embodiment of the terminal control method based on information security according to the present invention is proposed based on the first embodiment and the second embodiment. This embodiment will be described based on the first embodiment.
In this embodiment, taking the photographing behavior as an example for explanation, in order to determine the usage behavior of the user terminal more accurately, in this embodiment, the step S30 includes:
step S301: and determining the inclination angle of the user terminal relative to a vertical plane according to the attitude data.
It is understood that the vertical plane refers to a plane perpendicular to the ground (horizontal ground). The user terminal can carry the attitude sensor, and the attitude sensor can directly detect the inclination angle of the user terminal. Therefore, the terminal control device based on information security can directly extract the inclination angle from the posture data after receiving the posture data, thereby obtaining the inclination angle of the user terminal relative to the vertical plane. If the tilt angle in the attitude data is relative to the ground, an angular transformation is also required to obtain the tilt angle relative to the vertical plane.
Step S302: and when the inclination angle is smaller than a preset angle, acquiring the use state of the camera module in the user terminal.
It should be noted that the preset angle may be 30 °, and when the inclination angle of the user terminal with respect to the vertical plane is less than 30 °, the user terminal may be interpreted as being in a vertical state. Of course, the preset angle may also be other values, which is not limited in this embodiment.
It is understood that, since the user terminal is used, the posture change is frequent, and when the user terminal is used for watching a video or browsing a web page, the posture thereof may be nearly parallel to the vertical plane. Therefore, in order to accurately determine whether the user terminal is in a photographing behavior, the present embodiment further detects the use state of the camera module in the user terminal. The terminal control equipment based on information security can communicate with a preset application program on the user terminal, so that the use state of the image head module is obtained.
Step S303: and when the use state is the opening state, judging that the user terminal is in the photographing behavior.
It should be noted that, if the camera is in the open state and the user terminal is in the vertical state, it indicates that the user terminal is in the photographing behavior. At this time, when the photographed image of the user terminal captures the display of the corresponding target terminal, information leakage may be caused.
Accordingly, the step S40 includes:
step S40': and when the behavior type is a photographing behavior, determining a target terminal corresponding to the user terminal from preset terminals according to the position information, and controlling the target terminal to enter a locking state.
It can be understood that, in order to avoid information leakage, when it is detected that the user terminal is in the photographing mode, the corresponding target terminal needs to be locked.
In the third embodiment, by monitoring the attitude data of the user terminal and the use state of the camera module, whether the user is in a photographing behavior can be accurately judged, so that a corresponding management and control strategy is executed. The embodiment can avoid the misidentification of the user terminal, and further avoid the mislocking of the target terminal.
Referring to fig. 5, fig. 5 is a flowchart illustrating a fourth embodiment of the terminal control method based on information security according to the present invention, and the fourth embodiment of the terminal control method based on information security according to the present invention is proposed based on the first embodiment, the second embodiment and the third embodiment. The present embodiment is explained based on the first embodiment.
In order to further control the target terminal more accurately and determine whether the target terminal needs to be protected, in a third embodiment, the step S40 includes:
step S401: and when the behavior type belongs to a preset supervision behavior, determining a target terminal corresponding to the user terminal from preset terminals according to the position information.
It should be noted that the target terminal refers to a display that the user terminal may capture when taking a picture or recording. According to the position of the station where the user terminal is located, display equipment on the station and surrounding stations can be used as target terminals.
It should be noted that, when the user terminal is in the photographing action, the range that the user terminal can capture is wide. Therefore, it is necessary to determine the target terminal reasonably so as to better avoid information leakage. In specific implementation, when the behavior type belongs to a preset supervision behavior, acquiring preset terminal position information; determining the distance between each preset terminal and the user terminal according to the preset terminal position information and the position information; and taking a preset terminal with the distance to the user terminal smaller than a preset threshold value as a target terminal corresponding to the user terminal.
It should be noted that the preset terminal position information may be a central point of a station coordinate range, and a distance between each preset terminal and the user terminal may be calculated according to various coordinate parameters. The preset threshold may be 1 meter, or 1.5 meters. Of course, other values are also possible, and this embodiment is not limited thereto.
Step S402: and receiving the current display information fed back by the target terminal.
It should be noted that the current display information may include display information of the display, such as open software or files. The target terminal is preset with a process monitoring application, and the terminal control equipment based on information safety communicates with the process monitoring application so as to obtain the current display information of the display.
Step S403: and judging whether the current display information belongs to secret information or not according to the preset secret information characteristics.
It should be noted that the preset security information feature may include a file name or a software name to be secured, and may further include a field. And when the current display information contains a file name, a software name or a field needing to be kept secret, judging that the current display information is the secret content. For example, the preset confidential information feature includes "client list", and if the current display information includes a file of "company client list a", it is determined that the current display information is confidential content.
Step S404: and controlling the target terminal to enter a locking state when the current display information belongs to confidential information.
It can be understood that if the current display content of the target terminal belongs to the confidential information, protection is required; if the currently displayed content does not belong to confidential information (such as a shopping website), protection is not required.
In addition, the employee can be properly opened with the permission when the employee needs to shoot the related data, such as internal communication. Therefore, the present embodiment further includes, after step S40:
step S50: and receiving an authorization request sent by the user terminal, and determining the authority level corresponding to the user terminal according to the authorization request.
It should be noted that, if the user needs to obtain the corresponding data, an authorization request may be sent through the user terminal to contact the lock state of the target terminal. The preset application program on the user terminal comprises an authorization request initiating control, and when the user clicks the control, the authorization request can be sent through the user terminal. Wherein the authorization request protects information such as user ID or user class.
It will be appreciated that for a company or organization, the user level may vary, with certain data access and acquisition rights. The user terminal is bound with the user, the authority level corresponding to the user terminal is determined, and data of a certain degree can be opened for the corresponding user.
Step S60: and determining the security level corresponding to the current display information according to the preset security information characteristics.
It should be noted that the preset security information feature further includes security classification information. For example, "customer list" is a first level; the "part A parameter" is two levels, wherein two levels greater than one level may be defined. And the terminal control equipment based on information security grades the information contained in the current display information, and takes the maximum privacy grade as the privacy grade corresponding to the current display information.
Step S70: and controlling the target terminal to exit the locking state when the authority level is matched with the confidentiality level.
It should be noted that, the matching of the authority level and the security level may mean that the authority level is the same as the security level, and if the authority level is second level and the security level is second level, it is determined that the authority level is matched with the security level. Or, the matching of the authority level and the security level may mean that the authority level is greater than the security level, and if the authority level is two, and the security level is one, it is determined that the authority level is matched with the security level.
It can be understood that, when the terminal control device based on information security determines that the authority level matches the security level, the target terminal is controlled to exit the locked state, that is, exit the screen-locked state or resume power supply. So that the user terminal can obtain the data conveniently. And simultaneously recording the user terminal for subsequent reference.
In the fourth embodiment, the current display information of the display is classified according to the preset confidential information characteristics, and if the current display information is confidential content, the corresponding target terminal is controlled, so that data leakage is avoided, and a user is given a certain degree of freedom. In addition, different users are considered to have different access rights to different materials. Therefore, whether the authority of the user terminal is matched with the security level of the display information or not is judged, and if the authority of the user terminal is matched with the security level of the display information, the user terminal is allowed to obtain the information, so that the use requirement of the user on the data is met.
Furthermore, an embodiment of the present invention further provides a storage medium, where the storage medium stores a terminal control program based on information security, and the terminal control program based on information security, when executed by a processor, implements the steps of the terminal control method based on information security as described above.
Since the storage medium adopts all technical solutions of all the embodiments, at least all the beneficial effects brought by the technical solutions of the embodiments are achieved, and no further description is given here.
In addition, an embodiment of the present invention further provides a terminal control device based on information security, and referring to fig. 6, fig. 6 is a block diagram illustrating a structure of a first embodiment of the terminal control device based on information security according to the present invention.
In this embodiment, the terminal control device based on information security includes:
a location obtaining module 10, configured to obtain location information of a user terminal;
an attitude data obtaining module 20, configured to obtain attitude data of the user terminal when the position information meets a preset condition;
a behavior judging module 30, configured to determine a behavior type corresponding to the user terminal according to the gesture data;
and the control module 40 is configured to determine a target terminal corresponding to the user terminal from preset terminals according to the location information and control the target terminal to enter a locked state when the behavior type belongs to a preset supervision behavior.
In the embodiment, the position information of the user terminal is obtained; when the position information meets a preset condition, acquiring attitude data of the user terminal; determining a behavior type corresponding to the user terminal according to the attitude data; and when the behavior type belongs to a preset supervision behavior, determining a target terminal corresponding to the user terminal from preset terminals according to the position information, and controlling the target terminal to enter a locking state. According to the embodiment, when the user terminal is judged to be in the specific position and execute the use behavior belonging to the preset supervision behavior, the target terminal corresponding to the user terminal is locked, so that the user terminal cannot operate the data on the target terminal, and the data leakage of the target terminal is avoided.
In one embodiment, the terminal control device based on information security further comprises a judging module;
the judging module is used for acquiring preset station information and determining a coordinate range corresponding to each preset station according to the preset station information; converting the position information into coordinate parameters according to the preset station information; and when the coordinate parameter is in the coordinate range, judging that the position information meets a preset condition.
In an embodiment, the location obtaining module 10 is further configured to obtain feedback information returned by the user terminal when responding to a broadcast signal transmitted by a preset bluetooth beacon; determining the signal intensity corresponding to the preset Bluetooth beacon according to the feedback information; and acquiring the position information of the preset Bluetooth beacon, and determining the position information of the user terminal according to the position information of the preset Bluetooth beacon and the signal intensity.
In an embodiment, the behavior determining module 30 is configured to determine an inclination angle of the user terminal with respect to a vertical plane according to the posture data; when the inclination angle is smaller than a preset angle, acquiring the use state of a camera module in the user terminal; when the use state is the opening state, judging that the user terminal is in a photographing behavior;
correspondingly, the control module 40 is further configured to determine, when the behavior type is a photographing behavior, a target terminal corresponding to the user terminal from preset terminals according to the location information, and control the target terminal to enter a locked state.
In an embodiment, the control module 40 is further configured to determine, when the behavior type belongs to a preset supervision behavior, a target terminal corresponding to the user terminal from preset terminals according to the location information; receiving current display information fed back by the target terminal; judging whether the current display information belongs to secret information or not according to the preset secret information characteristics; and controlling the target terminal to enter a locking state when the current display information belongs to confidential information.
In an embodiment, the control module 40 is further configured to obtain preset terminal location information when the behavior type belongs to a preset supervision behavior; determining the distance between each preset terminal and the user terminal according to the preset terminal position information and the position information; and taking a preset terminal with the distance to the user terminal smaller than a preset threshold value as a target terminal corresponding to the user terminal.
In one embodiment, the terminal control device based on information security further comprises an authorization module;
the authorization module is used for receiving an authorization request sent by the user terminal and determining the authority level corresponding to the user terminal according to the authorization request; determining the security level corresponding to the current display information according to the preset security information characteristics; and controlling the target terminal to exit the locking state when the authority level is matched with the confidentiality level.
Other embodiments or specific implementation manners of the terminal control device based on information security according to the present invention may refer to the above method embodiments, and are not described herein again.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The use of the words first, second, third, etc. do not denote any order, but rather the words first, second, third, etc. are to be interpreted as names.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention or portions thereof that contribute to the prior art may be embodied in the form of a software product, where the computer software product is stored in a storage medium (e.g., a Read Only Memory (ROM)/Random Access Memory (RAM), a magnetic disk, an optical disk), and includes several instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (10)

1. A terminal control method based on information security is characterized by comprising the following steps:
acquiring position information of a user terminal;
when the position information meets a preset condition, acquiring attitude data of the user terminal;
determining a behavior type corresponding to the user terminal according to the attitude data;
and when the behavior type belongs to a preset supervision behavior, determining a target terminal corresponding to the user terminal from preset terminals according to the position information, and controlling the target terminal to enter a locking state.
2. The method for controlling a terminal based on information security according to claim 1, wherein before acquiring the posture data of the user terminal when the position information satisfies a preset condition, the method further comprises:
acquiring preset station information, and determining a coordinate range corresponding to each preset station according to the preset station information;
converting the position information into coordinate parameters according to the preset station information;
and when the coordinate parameter is in the coordinate range, judging that the position information meets a preset condition.
3. The method for controlling a terminal based on information security as claimed in claim 1, wherein the obtaining the location information of the user terminal comprises:
feedback information returned by the user terminal when responding to a broadcast signal transmitted by a preset Bluetooth beacon is acquired;
determining the signal intensity corresponding to the preset Bluetooth beacon according to the feedback information;
and acquiring the position information of the preset Bluetooth beacon, and determining the position information of the user terminal according to the position information of the preset Bluetooth beacon and the signal intensity.
4. The terminal control method based on information security of claim 1, wherein the behavior type includes a photographing behavior, and the determining the behavior type corresponding to the user terminal according to the gesture data includes:
determining the inclination angle of the user terminal relative to a vertical plane according to the attitude data;
when the inclination angle is smaller than a preset angle, acquiring the use state of a camera module in the user terminal;
when the use state is the opening state, judging that the user terminal is in a photographing behavior;
correspondingly, when the behavior type belongs to a preset supervision behavior, determining a target terminal corresponding to the user terminal from preset terminals according to the position information, and controlling the target terminal to enter a locking state, including:
and when the behavior type is a photographing behavior, determining a target terminal corresponding to the user terminal from preset terminals according to the position information, and controlling the target terminal to enter a locking state.
5. The method as claimed in any one of claims 1 to 4, wherein when the behavior type belongs to a preset supervision behavior, determining a target terminal corresponding to the user terminal from preset terminals according to the location information, and controlling the target terminal to enter a locked state includes:
when the behavior type belongs to a preset supervision behavior, determining a target terminal corresponding to the user terminal from preset terminals according to the position information;
receiving current display information fed back by the target terminal;
judging whether the current display information belongs to secret information or not according to the preset secret information characteristics;
and controlling the target terminal to enter a locking state when the current display information belongs to confidential information.
6. The method as claimed in claim 5, wherein when the behavior type belongs to a predetermined regulatory behavior, determining the target terminal corresponding to the ue from predetermined terminals according to the location information includes:
when the behavior type belongs to a preset supervision behavior, acquiring preset terminal position information;
determining the distance between each preset terminal and the user terminal according to the preset terminal position information and the position information;
and taking a preset terminal with the distance to the user terminal smaller than a preset threshold value as a target terminal corresponding to the user terminal.
7. The method as claimed in claim 5, wherein when the behavior type belongs to a predetermined regulatory behavior, after determining a target terminal corresponding to the ue from predetermined terminals according to the location information and controlling the target terminal to enter a locked state, the method further comprises:
receiving an authorization request sent by the user terminal, and determining the authority level corresponding to the user terminal according to the authorization request;
determining the security level corresponding to the current display information according to the preset security information characteristics;
and controlling the target terminal to exit the locking state when the authority level is matched with the confidentiality level.
8. A terminal control apparatus based on information security, the apparatus comprising:
the position acquisition module is used for acquiring the position information of the user terminal;
the attitude data acquisition module is used for acquiring attitude data of the user terminal when the position information meets a preset condition;
the behavior judging module is used for determining a behavior type corresponding to the user terminal according to the attitude data;
and the control module is used for determining a target terminal corresponding to the user terminal from preset terminals according to the position information and controlling the target terminal to enter a locking state when the behavior type belongs to a preset supervision behavior.
9. An information security-based terminal control device, characterized in that the information security-based terminal control device comprises: a memory, a processor and an information security-based terminal control program stored on the memory and executable on the processor, the information security-based terminal control program implementing the steps of the information security-based terminal control method according to any one of claims 1 to 7 when executed by the processor.
10. A storage medium, characterized in that the storage medium has stored thereon an information security-based terminal control program that, when executed by a processor, implements the steps of the information security-based terminal control method according to any one of claims 1 to 7.
CN202011214837.8A 2020-11-03 2020-11-03 Terminal control method, equipment, storage medium and device based on information security Pending CN112399421A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011214837.8A CN112399421A (en) 2020-11-03 2020-11-03 Terminal control method, equipment, storage medium and device based on information security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011214837.8A CN112399421A (en) 2020-11-03 2020-11-03 Terminal control method, equipment, storage medium and device based on information security

Publications (1)

Publication Number Publication Date
CN112399421A true CN112399421A (en) 2021-02-23

Family

ID=74597336

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011214837.8A Pending CN112399421A (en) 2020-11-03 2020-11-03 Terminal control method, equipment, storage medium and device based on information security

Country Status (1)

Country Link
CN (1) CN112399421A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105653989A (en) * 2016-03-23 2016-06-08 宇龙计算机通信科技(深圳)有限公司 Anti-leakage method and device for information
CN107861780A (en) * 2017-09-25 2018-03-30 努比亚技术有限公司 A kind of terminal control method, terminal and computer-readable recording medium
WO2018232647A1 (en) * 2017-06-21 2018-12-27 深圳支点电子智能科技有限公司 Electronic device having high privacy protection level and related product

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105653989A (en) * 2016-03-23 2016-06-08 宇龙计算机通信科技(深圳)有限公司 Anti-leakage method and device for information
WO2018232647A1 (en) * 2017-06-21 2018-12-27 深圳支点电子智能科技有限公司 Electronic device having high privacy protection level and related product
CN107861780A (en) * 2017-09-25 2018-03-30 努比亚技术有限公司 A kind of terminal control method, terminal and computer-readable recording medium

Similar Documents

Publication Publication Date Title
Zhi et al. Security and privacy issues of UAV: A survey
US10075849B2 (en) Secure distribution of electronic content
US10185816B2 (en) Controlling user access to electronic resources without password
JP6430016B2 (en) Mobile object identification system and identification method
EP2071883B1 (en) Apparatus, method, program and recording medium for protecting data in a wireless communication terminal
US7496948B1 (en) Method for controlling access to a target application
US20160196414A1 (en) Advanced multi-factor authentication
US7561554B2 (en) Method and system for detecting rogue access points and device for identifying rogue access points
CN103248657B (en) Web Publishing facility information method and facility information sharing method thereof
US20140010225A1 (en) Method and system for providing a distributed wireless network service
US20130244684A1 (en) Permissions based on wireless network data
KR101033688B1 (en) Method and device of forming RFID tag and the method for content reception
US20140082713A1 (en) System and Method for Location-Based Authentication
JP6590575B2 (en) CONTENT PROVIDING METHOD, PROGRAM, AND COMPUTER PROCESSING SYSTEM
CN107801146B (en) Information security control method
CN103491539A (en) Method and device for controlling access right of mobile equipment
KR101855494B1 (en) Door system and method using mobile device
CN104038261A (en) Multi device position information managing and sharing method and relevant device
CN105989280A (en) Application program authority management system, device and method
CN106469284A (en) A kind of information processing method, device and mobile terminal
EP3348033A1 (en) A trusted geolocation beacon and a method for operating a trusted geolocation beacon
US10819681B2 (en) Content filtering with temporary privilege escalation responsive to a predetermined environmental condition
CN106960453A (en) Photograph taking fixing by gross bearings method and device
CN112399421A (en) Terminal control method, equipment, storage medium and device based on information security
KR20150041407A (en) Trust Access Point connection Apparatus and Method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20210223