WO2015131642A1 - Method and device for controlling access permission on terminal device - Google Patents

Method and device for controlling access permission on terminal device Download PDF

Info

Publication number
WO2015131642A1
WO2015131642A1 PCT/CN2014/095415 CN2014095415W WO2015131642A1 WO 2015131642 A1 WO2015131642 A1 WO 2015131642A1 CN 2014095415 W CN2014095415 W CN 2014095415W WO 2015131642 A1 WO2015131642 A1 WO 2015131642A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal device
information
control command
binding
preset
Prior art date
Application number
PCT/CN2014/095415
Other languages
French (fr)
Chinese (zh)
Inventor
梁晓辉
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2015131642A1 publication Critical patent/WO2015131642A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Definitions

  • the present invention relates to the field of mobile terminals, and in particular, to a method and apparatus for controlling access rights on a terminal device.
  • the functions of the system are more and more suitable for people's daily life and office needs, especially providing a good platform for users to conduct various communication, communication and business platform transactions. That is, the terminal will contain a lot of important information of the user, such as contact information, contact content, personal account and other private information; thus, personal information and safe use on the terminal is particularly important for the user.
  • the anti-theft software is also installed on the terminal, but these anti-theft softwares have the following defects: the anti-theft software function is mainly embodied in the anti-theft; and the main monitoring mobile phone is stolen and carried out after the card is replaced, but the terminal is not stolen, but The location where the terminal is currently located is not visible to the terminal user; when the terminal user does not want to be used by others, how does the terminal handle the terminal information in this scenario is not protected; and the existing installation security software lacks The terminal personal information is processed hierarchically.
  • the anti-theft software installed on the existing terminal cannot fully guarantee the security of the user information.
  • a method for controlling access rights on a terminal device comprising: acquiring an operation number of inputting an error unlocking information on a terminal device; determining that the number of operations is greater than or equal to a preset Sending an alarm message to the binding device bound to the terminal device; receiving a control command sent by the binding device after receiving the alarm message, and controlling the control device according to the control command
  • the terminal device enters a user mode corresponding to the control instruction, wherein different user modes have different access rights.
  • the method before acquiring the number of operations of inputting the error unlocking information on the terminal device, the method further includes: acquiring binding information preset by the user, where the binding information includes: binding bound to the terminal device The address information of the device, the upper limit of the alarm security, and at least one control command for controlling the terminal device to enter different modes; correspondingly, the number of operations for inputting the error unlocking information on the terminal device is specifically: receiving the location After the binding information is described, the number of operations for inputting the error unlocking information on the terminal device is obtained in real time.
  • the method further includes: if the difference between the preset alarm security upper limit value and the real-time acquired operation time is preset When the difference is obtained, the location information of the terminal device, the number of operations of inputting the error unlocking information, and a preset control command are acquired; the location information of the terminal device, the number of operations of inputting the error unlocking information, and a preset control instruction are generated.
  • the alarm message is generated.
  • the sending by the binding device that is bound to the terminal device, the preset alarm message, specifically: setting the unlocking setting information of the terminal device to be invalid;
  • the binding device bound by the terminal device sends a preset alarm message; and the process of receiving the control command sent by the binding device in real time on the terminal device is started.
  • control instruction is: a control mode of a guest mode, a control instruction of a delete mode, a control instruction of a lock mode, or a control instruction of a full-right mode; accordingly, the controlling the terminal device according to the control instruction Entering the user mode corresponding to the control command, specifically: if the control command is a guest mode control command, controlling the terminal device to enter a guest mode; if the control command is a delete mode control command, controlling the terminal device to enter The mode of deleting the pre-specified resource information; if the control instruction is the control command of the lock mode, controlling the terminal device to enter the permanent lock mode; if the control command of the full-right mode, controlling the terminal device to enter the full authority mode.
  • the method further includes: after receiving the control instruction sent by the binding device, if the user mode corresponding to the control instruction is not matched, continuing to bind the binding device to the terminal device Send an alarm message.
  • an apparatus for controlling access rights on a terminal device comprising: a detecting module configured to acquire an operation number of inputting an error unlocking information on the terminal device; and an alarm module configured to When it is determined that the number of operations is greater than or equal to a preset alarm security upper limit, sending an alarm message to the binding device bound to the terminal device; and the control module is configured to receive the binding device to receive the And a control instruction sent after the alarm message, and controlling, according to the control instruction, the terminal device to enter a user mode corresponding to the control instruction, wherein different user modes have different access rights.
  • the foregoing apparatus further includes: a preset module, configured to acquire binding information preset by the user, where the binding information includes: address information of the binding device bound to the terminal device, and an upper limit of alarm security The value and at least one control command for controlling the terminal device to enter a different mode.
  • a preset module configured to acquire binding information preset by the user, where the binding information includes: address information of the binding device bound to the terminal device, and an upper limit of alarm security The value and at least one control command for controlling the terminal device to enter a different mode.
  • the device further includes: a data acquiring module, configured to acquire the terminal device when a difference between a preset alarm security upper limit value and a real-time acquired operation time is a preset difference The location information, the number of operations of inputting the error unlocking information, and the preset control command; the alarm generating module is configured to generate the alarm by using the location information of the terminal device, the number of operations of inputting the error unlocking information, and a preset control command. Message.
  • a data acquiring module configured to acquire the terminal device when a difference between a preset alarm security upper limit value and a real-time acquired operation time is a preset difference The location information, the number of operations of inputting the error unlocking information, and the preset control command
  • the alarm generating module is configured to generate the alarm by using the location information of the terminal device, the number of operations of inputting the error unlocking information, and a preset control command.
  • the foregoing alarm module includes: an invalidation unit, configured to set the unlocking setting information of the terminal device to be invalid; and the information sending unit is configured to bind the binding device to the terminal device by using a short message Sending a preset alarm message; the activation unit is configured to enable a process of receiving a control instruction sent by the binding device in real time on the terminal device.
  • the device further includes: a retransmission module, configured to: after receiving the control command sent by the binding device, if the user mode corresponding to the control command is not matched, continue to be tied to the terminal device The binding device sends an alarm message.
  • a retransmission module configured to: after receiving the control command sent by the binding device, if the user mode corresponding to the control command is not matched, continue to be tied to the terminal device The binding device sends an alarm message.
  • the beneficial effects of the present invention are: detecting the number of screen unlocking errors in real time in the embodiment of the present invention, generating the alarm information content by comparing the number of screen unlocking errors with the security value of the alarm information, and making the content of the alarm information while transmitting the content of the alarm information
  • the screen unlocking function is automatically disabled; in turn, the user mode entered by the terminal is activated by reading and analyzing the control command sent by the binding party to ensure the security of the personal information in the terminal.
  • FIG. 1 is a schematic diagram of a method for controlling access rights on a terminal device in an embodiment of the present invention
  • FIG. 2 is a schematic diagram of sending alarm information to a binding device bound to a terminal according to an embodiment of the present invention
  • FIG. 3 is a second schematic diagram of a method for controlling access rights on a terminal device in an embodiment of the present invention
  • FIG. 4 is a third schematic diagram of a method for controlling access rights on a terminal device according to an embodiment of the present invention.
  • FIG. 5 is a fourth schematic diagram of a method for controlling access rights on a terminal device according to an embodiment of the present invention.
  • FIG. 6 is a schematic diagram showing an application of an embodiment of the present invention in an actual scenario
  • FIG. 7 is a schematic diagram of an apparatus for controlling access rights on a terminal device according to an embodiment of the present invention.
  • FIG. 8 is a schematic diagram of an alarm module in an embodiment of the present invention.
  • one of the flowcharts of the method for controlling access rights on a terminal device includes the following steps:
  • Step S100 Obtain an operation sequence of inputting an error unlocking information on the terminal device.
  • the terminal device detects the unlocking operation in real time, and the acquired number of operations is also real-time data.
  • Step S200 Send an alarm message to the binding device bound to the terminal device when the number of operations is greater than or equal to the preset alarm security upper limit value;
  • the alarm information includes: current location information of the terminal device, the number of operations of inputting the error unlocking information, and preset control commands, wherein the current location information of the terminal device can be acquired by the GPS module on the terminal device.
  • Step S300 Receive a control instruction sent by the binding device after receiving the alarm message, and control, according to the control instruction, the terminal device to enter a user mode corresponding to the control instruction, where different user modes have different access rights.
  • control command is: a guest mode control command, a delete mode control command, a lock mode control command, or a full-right mode control command; each command can cause the terminal to enter a different user mode, specifically:
  • control command is a guest mode control command
  • the terminal device is controlled to enter the guest mode; in the guest mode, some specific application software on the terminal device can be used, and all the information cannot be viewed, and the specific software used in the guest mode is preset by the user.
  • the browser on the terminal device can be used in advance, and the phone book and the short message cannot be viewed.
  • the browser can be used but the phone book and the short message cannot be viewed.
  • control terminal device enters a mode in which the pre-designated resource information has been deleted; in the delete mode, the terminal deletes part of the resource information, such as information related to personal privacy, photos, address books, and short messages. , mail, etc., this part of the resource information can be preset by the user.
  • control terminal device enters the permanent lock mode; in the lock mode, the terminal unlock information is invalid, no matter how the unlock information is input, the terminal will not be unlocked, but can receive the control command and press the control command. Take action.
  • control terminal device If the control command of the full-right mode, the control terminal device enters the full-right mode; in the full-right mode, the user can unlock the terminal by inputting any unlocking information.
  • step S200 of FIG. 1 is a specific step of sending an alarm message to a binding device bound to a terminal device in step S200 of FIG. 1 :
  • Step S201 setting unlocking setting information of the terminal device to be invalid
  • unlock setting information of the terminal device is set to be invalid, the user cannot unlock any unlock information.
  • Step S202 Send a preset alarm message to the binding device bound to the terminal device by using a short message.
  • sending the alarm information by means of a short message is a preferred manner, and of course, it is not limited thereto, and the alarm information may also be sent by email.
  • Step S203 Enable a process of receiving a control command sent by the binding device in real time on the terminal device.
  • step S100 As shown in FIG. 3, different from FIG. 1 in the embodiment of the present invention, between step S100 and step S200, the method further includes the following steps:
  • Step S400 If the difference between the preset alarm security upper limit value and the real-time acquired operation time is a preset difference, acquiring the location information of the terminal device, the operation times of inputting the error unlocking information, and the preset control instruction;
  • the preset difference is an arbitrary value.
  • the preset difference is 1, that is, when the difference between the preset alarm security upper limit value and the real-time acquired operation number is 1, the terminal is acquired.
  • step S500 the location information of the terminal device, the number of operations of inputting the error unlocking information, and the preset control command generate an alarm message.
  • the method further includes the following steps:
  • Step S600 Obtain binding information preset by the user, where the binding information includes: address information of the binding device bound to the terminal device, an alarm security upper limit value, and at least one control instruction for controlling the terminal device to enter different modes;
  • binding information is arbitrarily added by the user.
  • step S300 the method further includes the following steps:
  • Step 700 After receiving the control command sent by the binding device, if the user mode corresponding to the control command is not matched, the device continues to send an alarm message to the binding device bound to the terminal device.
  • the binding device sends a control command to the terminal device after receiving the alarm information.
  • the control command sends an error
  • the terminal device continues to send the alarm information without being locked until the correct control command is received.
  • FIG. 6 is a schematic diagram of an application of an embodiment of the present invention in an actual scenario
  • the user presets binding information, and the binding information includes: address information of the binding device bound to the terminal device (which may be a mobile phone number or an email address), an alarm security upper limit value M, and at least one used for control.
  • the current K value, the location of the terminal, and the preset control command are sent to the binding device.
  • the short message is sent to the binding device to enable the terminal device.
  • control command is a guest mode control command (u(user)
  • the terminal device is controlled to enter the guest mode; in the guest mode, some specific application software on the terminal device can be used, and all the information cannot be viewed, and the specific mode used in the guest mode is used.
  • the software is pre-set by the user. For example, a browser on the terminal device can be set in advance, If the phone book or SMS cannot be viewed, the browser can be used while the user enters the guest mode but the phone book and text message cannot be viewed. ;
  • control terminal device enters a mode in which the pre-designated resource information has been deleted; in the delete mode, the terminal deletes part of the resource information, and the part of the resource information may be a user advance Set
  • control command is a lock mode control command (lock (device)
  • lock device
  • the terminal device is controlled to enter a permanent lock mode; in the lock mode, the terminal unlock information is invalid, and the terminal will not be unlocked anyway regardless of how the unlock information is input;
  • control terminal device If the control command (all(limits)) of the full-right mode, the control terminal device enters the full-right mode; in the full-right mode, the user can unlock the terminal by inputting any unlocking information;
  • the terminal device continues to send the K value, the location of the terminal, and the preset control command to the binding device.
  • a schematic diagram of an apparatus for controlling access rights on a terminal device includes: a preset module 510, a detection module 520, a data acquisition module 530, an alarm generation module 540, an alarm module 550, a control module 560, and
  • the re-issuing module 570 is configured to acquire binding information preset by the user, where the binding information includes: address information of the binding device bound to the terminal device, an alarm security upper limit value, and at least one used to control the terminal.
  • the device enters a control command of a different mode; the detecting module 520 is configured to acquire the number of operations of inputting the wrong unlocking information on the terminal device; and the data acquiring module 530 is configured to set a difference between the preset alarm security upper limit value and the real-time acquired operation time.
  • the value is a preset difference
  • the location information of the terminal device, the number of operations of inputting the error unlocking information, and the preset control command are acquired;
  • the alarm generating module 540 is configured to set the location information of the terminal device and the number of operations for inputting the error unlocking information.
  • the alarm module 550 is configured to determine that the number of operations is greater than or equal to When the alarm security upper limit is set, the alarm message is sent to the binding device bound to the terminal device;
  • the control module 560 is configured to receive the control command sent by the binding device after receiving the alarm message, and control the terminal device to enter according to the control command.
  • a user mode corresponding to the control command wherein different user modes have different access rights;
  • the retransmission module 570 is configured to continue to the user mode corresponding to the control command after receiving the control command sent by the binding device The binding device bound to the terminal device sends an alarm message.
  • control command is: a guest mode control command, a delete mode control command, a lock mode control command, or a full-right mode control command; each command can cause the terminal to enter a different user mode, specifically:
  • control command is a guest mode control command
  • the terminal device is controlled to enter the guest mode; in the guest mode, the current user can use some functions of the terminal, which may be preset by the user.
  • control terminal device enters a mode in which the pre-designated resource information has been deleted; in the delete mode, the terminal deletes part of the resource information, and the part of the resource information may be preset by the user.
  • control command is the lock mode control command
  • the terminal device is controlled to enter the permanent lock mode; in the lock mode, the terminal unlock information is invalid, and the terminal will not be unlocked anyway regardless of how the unlock information is input.
  • control terminal device If the control command of the full-right mode, the control terminal device enters the full-right mode; in the full-right mode, the user can unlock the terminal by inputting any unlocking information.
  • the alarm module 550 includes: an invalidation unit 551, an information transmission unit 552, and an activation unit 553; the invalidation unit 551 is configured to set the unlock setting information of the terminal device to be invalid; the information transmission unit 552 The method is configured to send a preset alarm message to the binding device bound to the terminal device by means of a short message; the startup unit 553 is configured to enable the process of receiving the control command sent by the binding device in real time on the terminal device.
  • the unlocking setting information of the terminal device is set to be invalid, the user cannot unlock any unlocking information; sending the alarm information by means of a short message is a preferred method, and of course, it is not limited thereto, and may also be emailed.
  • the alarm information is sent; before the terminal sends the alarm information, the process of receiving the control command sent by the binding device is closed.
  • the number of screen unlocking errors is detected in real time, and the alarm information content is generated by comparing the number of screen unlocking errors with the security value of the alarm information, and the screen unlocking function of the terminal is simultaneously performed while transmitting the content of the alarm information. Automatically invalidate; further, by reading and analyzing the control commands sent by the binding party, the user mode entered by the terminal is started to ensure the security of the personal information in the terminal.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Selective Calling Equipment (AREA)
  • Lock And Its Accessories (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

Provided are a method and device for controlling access permission on a terminal device, the method comprising: obtaining the number of operations of inputting wrong unlocking information on the terminal device; when determining that the number of the operations is greater than or equal to a preset upper alarm threshold, sending an alarm message to a device bound to the terminal device; receiving a control instruction sent by the bound device after the bound device receives the alarm message, and controlling the terminal device according to the control instruction to enter a user mode corresponding to the control instruction, different user modes having different access permissions. The present invention ensures security of personal information on a user terminal through the trusted remote control mechanism when the terminal is in an unsafe state or when the user does not want the terminal to be operated by other users, and can also automatically identify unauthorized user operations and authorized users. The invention can be used in any terminal, and not only ensures security of terminal user information, but also ensures normal user operation of the terminal.

Description

一种控制终端设备上的访问权限的方法及装置Method and device for controlling access rights on terminal devices 技术领域Technical field
本发明涉及移动终端领域,尤其涉及一种控制终端设备上的访问权限的方法及装置。The present invention relates to the field of mobile terminals, and in particular, to a method and apparatus for controlling access rights on a terminal device.
背景技术Background technique
随着移动终端的普及和高速发展,其系统具有的功能越来越切合人们的日常生活和办公需要,尤其是给用户进行各种通讯、交流及商务平台交易提供了很好的平台,这无疑就是终端中会包含用户的很多重要信息,比如联系人信息、联系内容、个人账户等隐私信息;如此,终端上的个人信息及安全使用对用户而言就显得尤为重要。With the popularization and rapid development of mobile terminals, the functions of the system are more and more suitable for people's daily life and office needs, especially providing a good platform for users to conduct various communication, communication and business platform transactions. That is, the terminal will contain a lot of important information of the user, such as contact information, contact content, personal account and other private information; thus, personal information and safe use on the terminal is particularly important for the user.
目前,终端上也会安装防盗软件,但是这些防盗软件存在以下缺陷:防盗软件功能主要体现在防盗上;且主要监控手机被盗走且在换卡之后进行,而对于终端没有被盗走,但是终端当前所处的位置为终端用户看不到的地方;此时终端用户不想被他人任意使用时,终端如何处理,这种场景下的终端信息没有被保护;而且现有的安装防盗软件缺少对终端个人信息进行层级处理。At present, the anti-theft software is also installed on the terminal, but these anti-theft softwares have the following defects: the anti-theft software function is mainly embodied in the anti-theft; and the main monitoring mobile phone is stolen and carried out after the card is replaced, but the terminal is not stolen, but The location where the terminal is currently located is not visible to the terminal user; when the terminal user does not want to be used by others, how does the terminal handle the terminal information in this scenario is not protected; and the existing installation security software lacks The terminal personal information is processed hierarchically.
综上可知,现有的终端上安装的防盗软件并不能充分保证用户信息的安全。In summary, the anti-theft software installed on the existing terminal cannot fully guarantee the security of the user information.
发明内容Summary of the invention
为了克服防盗软件存在的上述问题,提供了一种控制终端设备上的访问权限的方法及装置。In order to overcome the above problems of the anti-theft software, a method and apparatus for controlling access rights on a terminal device are provided.
为了解决上述技术问题,本发明采用如下技术方案:In order to solve the above technical problem, the present invention adopts the following technical solutions:
依据本发明的一个实施例,提供了一种控制终端设备上的访问权限的方法,所述方法包括:获取终端设备上输入错误解锁信息的操作次数;在确定所述操作次数大于或等于预设的告警安全上限值时,向与所述终端设备绑定的绑定设备发送告警消息;接收所述绑定设备收到所述告警消息后发送的控制指令,并根据所述控制指令控制所述终端设备进入与所述控制指令对应的用户模式,其中不同的用户模式具有不同的访问权限。 According to an embodiment of the present invention, a method for controlling access rights on a terminal device is provided, the method comprising: acquiring an operation number of inputting an error unlocking information on a terminal device; determining that the number of operations is greater than or equal to a preset Sending an alarm message to the binding device bound to the terminal device; receiving a control command sent by the binding device after receiving the alarm message, and controlling the control device according to the control command The terminal device enters a user mode corresponding to the control instruction, wherein different user modes have different access rights.
可选的,在获取终端设备上输入错误解锁信息的操作次数之前,所述方法还包括:获取用户预设的绑定信息,所述绑定信息包括:与所述终端设备绑定的绑定设备的地址信息、告警安全上限值和至少一条用于控制终端设备进入不同模式的控制指令;相对应地,所述获取终端设备上输入错误解锁信息的操作次数,具体为:在接收到所述绑定信息之后,实时获取所述终端设备上输入错误解锁信息的操作次数。Optionally, before acquiring the number of operations of inputting the error unlocking information on the terminal device, the method further includes: acquiring binding information preset by the user, where the binding information includes: binding bound to the terminal device The address information of the device, the upper limit of the alarm security, and at least one control command for controlling the terminal device to enter different modes; correspondingly, the number of operations for inputting the error unlocking information on the terminal device is specifically: receiving the location After the binding information is described, the number of operations for inputting the error unlocking information on the terminal device is obtained in real time.
可选的,在获取终端设备上输入错误解锁信息的操作次数之后,所述方法还包括:若预设的告警安全上限值与实时获取的所述操作次数之间的差值为预设的差值时,获取所述终端设备的位置信息、输入错误解锁信息的操作次数和预设的控制指令;将所述终端设备的位置信息、输入错误解锁信息的操作次数和预设的控制指令生成所述告警消息。Optionally, after obtaining the number of operations of inputting the error unlocking information on the terminal device, the method further includes: if the difference between the preset alarm security upper limit value and the real-time acquired operation time is preset When the difference is obtained, the location information of the terminal device, the number of operations of inputting the error unlocking information, and a preset control command are acquired; the location information of the terminal device, the number of operations of inputting the error unlocking information, and a preset control instruction are generated. The alarm message.
可选的,所述向与所述终端设备绑定的绑定设备发送预设的告警消息,具体包括:将所述终端设备的解锁设置信息设置为失效;通过短消息的方式向与所述终端设备绑定的绑定设备发送预设的告警消息;开启所述终端设备上的实时接收所述绑定设备发送的控制指令的进程。Optionally, the sending, by the binding device that is bound to the terminal device, the preset alarm message, specifically: setting the unlocking setting information of the terminal device to be invalid; The binding device bound by the terminal device sends a preset alarm message; and the process of receiving the control command sent by the binding device in real time on the terminal device is started.
可选的,所述控制指令为:访客模式的控制指令、删除模式的控制指令、锁定模式的控制指令、或者全权模式的控制指令;相应地,所述根据所述控制指令控制所述终端设备进入与所述控制指令对应的用户模式,具体包括:若控制指令为访客模式的控制指令,控制所述终端设备进入访客模式;若控制指令为删除模式的控制指令,控制所述终端设备进入已删除预先指定的资源信息的模式;若控制指令为锁定模式的控制指令,控制所述终端设备进入永久锁定的模式;若全权模式的控制指令,控制所述终端设备进入全权模式。Optionally, the control instruction is: a control mode of a guest mode, a control instruction of a delete mode, a control instruction of a lock mode, or a control instruction of a full-right mode; accordingly, the controlling the terminal device according to the control instruction Entering the user mode corresponding to the control command, specifically: if the control command is a guest mode control command, controlling the terminal device to enter a guest mode; if the control command is a delete mode control command, controlling the terminal device to enter The mode of deleting the pre-specified resource information; if the control instruction is the control command of the lock mode, controlling the terminal device to enter the permanent lock mode; if the control command of the full-right mode, controlling the terminal device to enter the full authority mode.
可选的,所述方法还包括:在接收所述绑定设备发送的控制指令之后,若匹配不到与所述控制指令对应的用户模式,继续向与所述终端设备绑定的绑定设备发送告警消息。Optionally, the method further includes: after receiving the control instruction sent by the binding device, if the user mode corresponding to the control instruction is not matched, continuing to bind the binding device to the terminal device Send an alarm message.
依据本发明的另一个实施例,提供了一种控制终端设备上的访问权限的装置,所述装置包括:检测模块,设置为获取终端设备上输入错误解锁信息的操作次数;告警模块,设置为在确定所述操作次数大于或等于预设的告警安全上限值时,向与所述终端设备绑定的绑定设备发送告警消息;控制模块,设置为接收所述绑定设备收到所述告警消息后发送的控制指令,并根据所述控制指令控制所述终端设备进入与所述控制指令对应的用户模式,其中不同的用户模式具有不同的访问权限。 According to another embodiment of the present invention, there is provided an apparatus for controlling access rights on a terminal device, the apparatus comprising: a detecting module configured to acquire an operation number of inputting an error unlocking information on the terminal device; and an alarm module configured to When it is determined that the number of operations is greater than or equal to a preset alarm security upper limit, sending an alarm message to the binding device bound to the terminal device; and the control module is configured to receive the binding device to receive the And a control instruction sent after the alarm message, and controlling, according to the control instruction, the terminal device to enter a user mode corresponding to the control instruction, wherein different user modes have different access rights.
可选的,上述装置还包括:预设模块,设置为获取用户预设的绑定信息,所述绑定信息包括:与所述终端设备绑定的绑定设备的地址信息、告警安全上限值和至少一条用于控制终端设备进入不同模式的控制指令。Optionally, the foregoing apparatus further includes: a preset module, configured to acquire binding information preset by the user, where the binding information includes: address information of the binding device bound to the terminal device, and an upper limit of alarm security The value and at least one control command for controlling the terminal device to enter a different mode.
可选的,上述装置还包括:数据获取模块,设置为当预设的告警安全上限值与实时获取的所述操作次数之间的差值为预设的差值时,获取所述终端设备的位置信息、输入错误解锁信息的操作次数和预设的控制指令;告警生成模块,设置为将所述终端设备的位置信息、输入错误解锁信息的操作次数和预设的控制指令生成所述告警消息。Optionally, the device further includes: a data acquiring module, configured to acquire the terminal device when a difference between a preset alarm security upper limit value and a real-time acquired operation time is a preset difference The location information, the number of operations of inputting the error unlocking information, and the preset control command; the alarm generating module is configured to generate the alarm by using the location information of the terminal device, the number of operations of inputting the error unlocking information, and a preset control command. Message.
可选的,上述告警模块包括:无效单元,设置为将所述终端设备的解锁设置信息设置为失效;信息发送单元,设置为通过短消息的方式向与所述终端设备绑定的绑定设备发送预设的告警消息;启动单元,设置为开启所述终端设备上的实时接收所述绑定设备发送的控制指令的进程。Optionally, the foregoing alarm module includes: an invalidation unit, configured to set the unlocking setting information of the terminal device to be invalid; and the information sending unit is configured to bind the binding device to the terminal device by using a short message Sending a preset alarm message; the activation unit is configured to enable a process of receiving a control instruction sent by the binding device in real time on the terminal device.
可选的,上述装置还包括:重发模块,设置为在接收所述绑定设备发送的控制指令之后,若匹配不到与所述控制指令对应的用户模式,继续向与所述终端设备绑定的绑定设备发送告警消息。Optionally, the device further includes: a retransmission module, configured to: after receiving the control command sent by the binding device, if the user mode corresponding to the control command is not matched, continue to be tied to the terminal device The binding device sends an alarm message.
本发明的有益效果是:在本发明的实施例中实时检测屏幕解锁错误次数,通过屏幕解锁错误次数与告警信息安全值的比较,生成告警信息内容,并在发送告警信息内容的同时使终端的屏幕解锁功能自动失效;进而通过读取、分析绑定方发送的控制指令来启动终端进入的用户模式,以确保终端中个人信息的安全性。The beneficial effects of the present invention are: detecting the number of screen unlocking errors in real time in the embodiment of the present invention, generating the alarm information content by comparing the number of screen unlocking errors with the security value of the alarm information, and making the content of the alarm information while transmitting the content of the alarm information The screen unlocking function is automatically disabled; in turn, the user mode entered by the terminal is activated by reading and analyzing the control command sent by the binding party to ensure the security of the personal information in the terminal.
附图说明DRAWINGS
图1表示本发明实施例中控制终端设备上的访问权限的方法示意图之一;1 is a schematic diagram of a method for controlling access rights on a terminal device in an embodiment of the present invention;
图2表示本发明实施例向与终端绑定的绑定设备发送告警信息的示意图;2 is a schematic diagram of sending alarm information to a binding device bound to a terminal according to an embodiment of the present invention;
图3表示本发明实施例中控制终端设备上的访问权限的方法示意图之二;3 is a second schematic diagram of a method for controlling access rights on a terminal device in an embodiment of the present invention;
图4表示本发明实施例中控制终端设备上的访问权限的方法示意图之三;4 is a third schematic diagram of a method for controlling access rights on a terminal device according to an embodiment of the present invention;
图5表示本发明实施例中控制终端设备上的访问权限的方法示意图之四;FIG. 5 is a fourth schematic diagram of a method for controlling access rights on a terminal device according to an embodiment of the present invention; FIG.
图6表示本发明实施例在实际场景中应用的示意图;FIG. 6 is a schematic diagram showing an application of an embodiment of the present invention in an actual scenario;
图7表示本发明实施例中控制终端设备上的访问权限的装置示意图; FIG. 7 is a schematic diagram of an apparatus for controlling access rights on a terminal device according to an embodiment of the present invention;
图8表示本发明实施例中告警模块的示意图。FIG. 8 is a schematic diagram of an alarm module in an embodiment of the present invention.
具体实施方式detailed description
为使本发明的目的、技术方案和优点更加清楚,下面将结合附图及具体实施例对本发明进行详细描述。The present invention will be described in detail below with reference to the drawings and specific embodiments.
如图1所示,本发明实施例控制终端设备上的访问权限的方法流程图之一,包括以下步骤:As shown in FIG. 1 , one of the flowcharts of the method for controlling access rights on a terminal device according to an embodiment of the present invention includes the following steps:
步骤S100、获取终端设备上输入错误解锁信息的操作次数;Step S100: Obtain an operation sequence of inputting an error unlocking information on the terminal device.
应当说明的是,终端设备实时检测解锁操作,所获取的操作次数也是实时数据。It should be noted that the terminal device detects the unlocking operation in real time, and the acquired number of operations is also real-time data.
步骤S200、在确定操作次数大于或等于预设的告警安全上限值时,向与终端设备绑定的绑定设备发送告警消息;Step S200: Send an alarm message to the binding device bound to the terminal device when the number of operations is greater than or equal to the preset alarm security upper limit value;
应当说明的是,告警信息包括:终端设备的当前位置信息、输入错误解锁信息的操作次数和预设的控制指令,其中终端设备的当前位置信息可以通过终端设备上的GPS模块获取。It should be noted that the alarm information includes: current location information of the terminal device, the number of operations of inputting the error unlocking information, and preset control commands, wherein the current location information of the terminal device can be acquired by the GPS module on the terminal device.
步骤S300、接收绑定设备收到告警消息后发送的控制指令,并根据控制指令控制终端设备进入与控制指令对应的用户模式,其中不同的用户模式具有不同的访问权限。Step S300: Receive a control instruction sent by the binding device after receiving the alarm message, and control, according to the control instruction, the terminal device to enter a user mode corresponding to the control instruction, where different user modes have different access rights.
应当说明的是,控制指令为:访客模式的控制指令、删除模式的控制指令、锁定模式的控制指令、或者全权模式的控制指令;每个指令可以使终端进入不同的用户模式,具体为:It should be noted that the control command is: a guest mode control command, a delete mode control command, a lock mode control command, or a full-right mode control command; each command can cause the terminal to enter a different user mode, specifically:
若控制指令为访客模式的控制指令,控制终端设备进入访客模式;访客模式下可以使用终端设备上某些特定的应用软件,而无法查看所有信息,访客模式下使用的特定软件是用户预先设置的。例如,预先设置终端设备上的浏览器可以使用,电话簿、短信无法查看,则在用户进入访客模式时可以使用浏览器但无法查看电话簿和短信。If the control command is a guest mode control command, the terminal device is controlled to enter the guest mode; in the guest mode, some specific application software on the terminal device can be used, and all the information cannot be viewed, and the specific software used in the guest mode is preset by the user. . For example, the browser on the terminal device can be used in advance, and the phone book and the short message cannot be viewed. When the user enters the guest mode, the browser can be used but the phone book and the short message cannot be viewed.
若控制指令为删除模式的控制指令,控制终端设备进入已删除预先指定的资源信息的模式;在删除模式下终端对部分资源信息进行删除,例如涉及个人隐私的信息,照片、通讯录、短消息、邮件等,这部分资源信息可以是用户预先设置的。 If the control command is a control command of the delete mode, the control terminal device enters a mode in which the pre-designated resource information has been deleted; in the delete mode, the terminal deletes part of the resource information, such as information related to personal privacy, photos, address books, and short messages. , mail, etc., this part of the resource information can be preset by the user.
若控制指令为锁定模式的控制指令,控制终端设备进入永久锁定的模式;在锁定模式下终端的解锁信息失效,无论怎样输入解锁信息,终端将一直不能解锁,但可以接收控制指令并按控制指令进行操作。If the control command is the lock mode control command, the control terminal device enters the permanent lock mode; in the lock mode, the terminal unlock information is invalid, no matter how the unlock information is input, the terminal will not be unlocked, but can receive the control command and press the control command. Take action.
若全权模式的控制指令,控制终端设备进入全权模式;在全权模式下,用户输入任意解锁信息都可以将终端解锁。If the control command of the full-right mode, the control terminal device enters the full-right mode; in the full-right mode, the user can unlock the terminal by inputting any unlocking information.
图2是图1的步骤S200中向与终端设备绑定的绑定设备发送告警消息的具体步骤:2 is a specific step of sending an alarm message to a binding device bound to a terminal device in step S200 of FIG. 1 :
步骤S201、将终端设备的解锁设置信息设置为失效;Step S201, setting unlocking setting information of the terminal device to be invalid;
应当说明的是,当终端设备的解锁设置信息设置为失效时,用户输入任何解锁信息也无法解锁。It should be noted that when the unlock setting information of the terminal device is set to be invalid, the user cannot unlock any unlock information.
步骤S202、通过短消息的方式向与终端设备绑定的绑定设备发送预设的告警消息;Step S202: Send a preset alarm message to the binding device bound to the terminal device by using a short message.
应当说明的是,通过短消息的方式发送告警信息为优选的方式,当然也不仅限于此,也可以通过电子邮件发送告警信息。It should be noted that sending the alarm information by means of a short message is a preferred manner, and of course, it is not limited thereto, and the alarm information may also be sent by email.
步骤S203、开启终端设备上的实时接收绑定设备发送的控制指令的进程。Step S203: Enable a process of receiving a control command sent by the binding device in real time on the terminal device.
应当说明的是,终端在发送告警信息之前,接收绑定设备发送的控制指令的进程是关闭的。It should be noted that, before the terminal sends the alarm information, the process of receiving the control command sent by the binding device is closed.
如图3所示,本发明实施例中与图1所不同的是,在步骤S100与步骤S200之间,该方法还包括以下步骤:As shown in FIG. 3, different from FIG. 1 in the embodiment of the present invention, between step S100 and step S200, the method further includes the following steps:
步骤S400、若预设的告警安全上限值与实时获取的操作次数之间的差值为预设的差值时,获取终端设备的位置信息、输入错误解锁信息的操作次数和预设的控制指令;Step S400: If the difference between the preset alarm security upper limit value and the real-time acquired operation time is a preset difference, acquiring the location information of the terminal device, the operation times of inputting the error unlocking information, and the preset control instruction;
应当说明的是,预设的差值为任意值,优选的,预设差值为1,即当预设的告警安全上限值与实时获取的操作次数之间的差值1时,获取终端设备的位置信息、输入错误解锁信息的操作次数和预设的控制指令。It should be noted that the preset difference is an arbitrary value. Preferably, the preset difference is 1, that is, when the difference between the preset alarm security upper limit value and the real-time acquired operation number is 1, the terminal is acquired. The location information of the device, the number of operations for inputting the error unlock information, and the preset control commands.
步骤S500、将终端设备的位置信息、输入错误解锁信息的操作次数和预设的控制指令生成告警消息。 In step S500, the location information of the terminal device, the number of operations of inputting the error unlocking information, and the preset control command generate an alarm message.
如图4所示,本发明实施例中与图1所不同的是,在步骤S100之前,该方法还包括以下步骤:As shown in FIG. 4, in the embodiment of the present invention, unlike FIG. 1, before the step S100, the method further includes the following steps:
步骤S600、获取用户预设的绑定信息,绑定信息包括:与终端设备绑定的绑定设备的地址信息、告警安全上限值和至少一条用于控制终端设备进入不同模式的控制指令;Step S600: Obtain binding information preset by the user, where the binding information includes: address information of the binding device bound to the terminal device, an alarm security upper limit value, and at least one control instruction for controlling the terminal device to enter different modes;
应当说明的是,绑定信息是用户任意添加的。It should be noted that the binding information is arbitrarily added by the user.
如图5所示,本发明实施例中与图1所不同的是,在步骤S300之后,该方法还包括以下步骤:As shown in FIG. 5, in the embodiment of the present invention, unlike FIG. 1, after step S300, the method further includes the following steps:
步骤700、在接收绑定设备发送的控制指令之后,若匹配不到与控制指令对应的用户模式,继续向与终端设备绑定的绑定设备发送告警消息;Step 700: After receiving the control command sent by the binding device, if the user mode corresponding to the control command is not matched, the device continues to send an alarm message to the binding device bound to the terminal device.
应当说明的是,绑定设备受到告警信息以后向终端设备发送控制指令,当控制指令发送错误时,终端设备继续发送告警信息而不会被锁定,一直到收到正确的控制指令为止。It should be noted that the binding device sends a control command to the terminal device after receiving the alarm information. When the control command sends an error, the terminal device continues to send the alarm information without being locked until the correct control command is received.
如图6所示,本发明实施例在实际场景中应用的示意图;FIG. 6 is a schematic diagram of an application of an embodiment of the present invention in an actual scenario;
首先用户预设绑定信息,绑定信息包括:与终端设备绑定的绑定设备的地址信息(可以是手机号码也可以是电子邮箱地址)、告警安全上限值M和至少一条用于控制终端设备进入不同模式的控制指令;终端设备实时检测解锁信息,并将错误解锁的次数记录下来以K表示;当M-K的值小于1时,终端设备进入全权模式即解锁终端设备;当M-K的值等于1时,终端设备调用定位模块将终端设备所在位置的信息以及K值进行打包准备发送,终端设备进入全权模式即解锁终端设备;当M=K时,终端设备的解锁设置信息设置为失效即用户输入任何解锁信息也无法解锁,将当前K值、终端所在位置以及预设的控制指令发送到绑定设备,优选的,通过短消息方式发送到绑定设备,开启终端设备上的实时接收绑定设备发送的控制指令的进程;绑定设备向终端设备发送控制指令;终端设备接收绑定设备发送的控制指令并解析,与预设的控制指令进行匹配,进入相应的模式,以下列举几个常用的模式:First, the user presets binding information, and the binding information includes: address information of the binding device bound to the terminal device (which may be a mobile phone number or an email address), an alarm security upper limit value M, and at least one used for control. The terminal device enters a control command of a different mode; the terminal device detects the unlocking information in real time, and records the number of times the error is unlocked by K; when the value of the M-K is less than 1, the terminal device enters the full-right mode to unlock the terminal device; When the value of -K is equal to 1, the terminal device calls the positioning module to package and prepare the information of the location of the terminal device and the K value, and the terminal device enters the full-right mode to unlock the terminal device; when M=K, the unlocking setting information of the terminal device If it is set to invalid, the user can not unlock any unlock information. The current K value, the location of the terminal, and the preset control command are sent to the binding device. Preferably, the short message is sent to the binding device to enable the terminal device. The process of receiving the control command sent by the binding device in real time; the binding device sends a control instruction to the terminal device; Side apparatus receives the binding apparatus to control transmission and parsing instructions, matched to a predetermined control command, enter the corresponding mode, the following are a few common mode:
若控制指令为访客模式的控制指令(u(user)),控制终端设备进入访客模式;访客模式下可以使用终端设备上某些特定的应用软件,而无法查看所有信息,访客模式下使用的特定软件是用户预先设置的。例如,预先设置终端设备上的浏览器可以使用, 电话簿、短信无法查看,则在用户进入访客模式时可以使用浏览器但无法查看电话簿和短信。;If the control command is a guest mode control command (u(user)), the terminal device is controlled to enter the guest mode; in the guest mode, some specific application software on the terminal device can be used, and all the information cannot be viewed, and the specific mode used in the guest mode is used. The software is pre-set by the user. For example, a browser on the terminal device can be set in advance, If the phone book or SMS cannot be viewed, the browser can be used while the user enters the guest mode but the phone book and text message cannot be viewed. ;
若控制指令为删除模式的控制指令(del(secret)),控制终端设备进入已删除预先指定的资源信息的模式;在删除模式下终端对部分资源信息进行删除,这部分资源信息可以是用户预先设置的;If the control command is a delete mode control command (del(secret)), the control terminal device enters a mode in which the pre-designated resource information has been deleted; in the delete mode, the terminal deletes part of the resource information, and the part of the resource information may be a user advance Set
若控制指令为锁定模式的控制指令(lock(device)),控制终端设备进入永久锁定的模式;在锁定模式下终端的解锁信息失效,无论怎样输入解锁信息,终端将一直不能解锁;If the control command is a lock mode control command (lock (device)), the terminal device is controlled to enter a permanent lock mode; in the lock mode, the terminal unlock information is invalid, and the terminal will not be unlocked anyway regardless of how the unlock information is input;
若全权模式的控制指令(all(limits)),控制终端设备进入全权模式;在全权模式下,用户输入任意解锁信息都可以将终端解锁;If the control command (all(limits)) of the full-right mode, the control terminal device enters the full-right mode; in the full-right mode, the user can unlock the terminal by inputting any unlocking information;
若终端设备接收的控制指令与预设的控制指令都不匹配,终端设备继续向绑定设备发送K值、终端所在位置以及预设的控制指令。If the control command received by the terminal device does not match the preset control command, the terminal device continues to send the K value, the location of the terminal, and the preset control command to the binding device.
如图7所示,本发明实施例控制终端设备上的访问权限的装置示意图,包括:预设模块510、检测模块520、数据获取模块530、告警生成模块540、告警模块550、控制模块560和重发模块570;预设模块510设置为获取用户预设的绑定信息,绑定信息包括:与终端设备绑定的绑定设备的地址信息、告警安全上限值和至少一条用于控制终端设备进入不同模式的控制指令;检测模块520设置为获取终端设备上输入错误解锁信息的操作次数;数据获取模块530设置为当预设的告警安全上限值与实时获取的操作次数之间的差值为预设的差值时,获取终端设备的位置信息、输入错误解锁信息的操作次数和预设的控制指令;告警生成模块540设置为将终端设备的位置信息、输入错误解锁信息的操作次数和预设的控制指令生成告警消息;告警模块550设置为在确定操作次数大于或等于预设的告警安全上限值时,向与终端设备绑定的绑定设备发送告警消息;控制模块560设置为接收绑定设备收到告警消息后发送的控制指令,并根据控制指令控制终端设备进入与控制指令对应的用户模式,其中不同的用户模式具有不同的访问权限;重发模块570设置为在接收绑定设备发送的控制指令之后,若匹配不到与控制指令对应的用户模式,继续向与终端设备绑定的绑定设备发送告警消息。As shown in FIG. 7, a schematic diagram of an apparatus for controlling access rights on a terminal device according to an embodiment of the present invention includes: a preset module 510, a detection module 520, a data acquisition module 530, an alarm generation module 540, an alarm module 550, a control module 560, and The re-issuing module 570 is configured to acquire binding information preset by the user, where the binding information includes: address information of the binding device bound to the terminal device, an alarm security upper limit value, and at least one used to control the terminal. The device enters a control command of a different mode; the detecting module 520 is configured to acquire the number of operations of inputting the wrong unlocking information on the terminal device; and the data acquiring module 530 is configured to set a difference between the preset alarm security upper limit value and the real-time acquired operation time. When the value is a preset difference, the location information of the terminal device, the number of operations of inputting the error unlocking information, and the preset control command are acquired; the alarm generating module 540 is configured to set the location information of the terminal device and the number of operations for inputting the error unlocking information. Generating an alarm message with a preset control command; the alarm module 550 is configured to determine that the number of operations is greater than or equal to When the alarm security upper limit is set, the alarm message is sent to the binding device bound to the terminal device; the control module 560 is configured to receive the control command sent by the binding device after receiving the alarm message, and control the terminal device to enter according to the control command. a user mode corresponding to the control command, wherein different user modes have different access rights; the retransmission module 570 is configured to continue to the user mode corresponding to the control command after receiving the control command sent by the binding device The binding device bound to the terminal device sends an alarm message.
应当说明的是,控制指令为:访客模式的控制指令、删除模式的控制指令、锁定模式的控制指令、或者全权模式的控制指令;每个指令可以使终端进入不同的用户模式,具体为: It should be noted that the control command is: a guest mode control command, a delete mode control command, a lock mode control command, or a full-right mode control command; each command can cause the terminal to enter a different user mode, specifically:
若控制指令为访客模式的控制指令,控制终端设备进入访客模式;在访客模式下当前用户可以使用终端的部分功能,这部分功能可以是用户预先设置的。If the control command is a guest mode control command, the terminal device is controlled to enter the guest mode; in the guest mode, the current user can use some functions of the terminal, which may be preset by the user.
若控制指令为删除模式的控制指令,控制终端设备进入已删除预先指定的资源信息的模式;在删除模式下终端对部分资源信息进行删除,这部分资源信息可以是用户预先设置的。If the control command is the control command of the delete mode, the control terminal device enters a mode in which the pre-designated resource information has been deleted; in the delete mode, the terminal deletes part of the resource information, and the part of the resource information may be preset by the user.
若控制指令为锁定模式的控制指令,控制终端设备进入永久锁定的模式;在锁定模式下终端的解锁信息失效,无论怎样输入解锁信息,终端将一直不能解锁。If the control command is the lock mode control command, the terminal device is controlled to enter the permanent lock mode; in the lock mode, the terminal unlock information is invalid, and the terminal will not be unlocked anyway regardless of how the unlock information is input.
若全权模式的控制指令,控制终端设备进入全权模式;在全权模式下,用户输入任意解锁信息都可以将终端解锁。If the control command of the full-right mode, the control terminal device enters the full-right mode; in the full-right mode, the user can unlock the terminal by inputting any unlocking information.
图8是图7中告警模块550的示意图,告警模块550包括:无效单元551、信息发送单元552和启动单元553;无效单元551设置为将终端设备的解锁设置信息设置为失效;信息发送单元552设置为通过短消息的方式向与终端设备绑定的绑定设备发送预设的告警消息;启动单元553设置为开启终端设备上的实时接收绑定设备发送的控制指令的进程。8 is a schematic diagram of the alarm module 550 of FIG. 7. The alarm module 550 includes: an invalidation unit 551, an information transmission unit 552, and an activation unit 553; the invalidation unit 551 is configured to set the unlock setting information of the terminal device to be invalid; the information transmission unit 552 The method is configured to send a preset alarm message to the binding device bound to the terminal device by means of a short message; the startup unit 553 is configured to enable the process of receiving the control command sent by the binding device in real time on the terminal device.
应当说明的是,当终端设备的解锁设置信息设置为失效时,用户输入任何解锁信息也无法解锁;通过短消息的方式发送告警信息为优选的方式,当然也不仅限于此,也可以通过电子邮件发送告警信息;终端在发送告警信息之前,接收绑定设备发送的控制指令的进程是关闭的。It should be noted that when the unlocking setting information of the terminal device is set to be invalid, the user cannot unlock any unlocking information; sending the alarm information by means of a short message is a preferred method, and of course, it is not limited thereto, and may also be emailed. The alarm information is sent; before the terminal sends the alarm information, the process of receiving the control command sent by the binding device is closed.
以上的是本发明的优选实施方式,应当指出对于本技术领域的普通人员来说,在不脱离本发明的原理前提下还可以作出若干改进和润饰,这些改进和润饰也在本发明的保护范围内。The above is a preferred embodiment of the present invention, and it should be noted that those skilled in the art can also make several improvements and refinements without departing from the principles of the present invention. These improvements and refinements are also within the scope of the present invention. Inside.
工业实用性Industrial applicability
基于本发明实施例提供的上述技术方案,实时检测屏幕解锁错误次数,通过屏幕解锁错误次数与告警信息安全值的比较,生成告警信息内容,并在发送告警信息内容的同时使终端的屏幕解锁功能自动失效;进而通过读取、分析绑定方发送的控制指令来启动终端进入的用户模式,以确保终端中个人信息的安全性。 According to the foregoing technical solution provided by the embodiment of the present invention, the number of screen unlocking errors is detected in real time, and the alarm information content is generated by comparing the number of screen unlocking errors with the security value of the alarm information, and the screen unlocking function of the terminal is simultaneously performed while transmitting the content of the alarm information. Automatically invalidate; further, by reading and analyzing the control commands sent by the binding party, the user mode entered by the terminal is started to ensure the security of the personal information in the terminal.

Claims (11)

  1. 一种控制终端设备上的访问权限的方法,包括:A method for controlling access rights on a terminal device, comprising:
    获取终端设备上输入错误解锁信息的操作次数;Obtaining the number of operations for inputting the error unlocking information on the terminal device;
    在确定所述操作次数大于或等于预设的告警安全上限值时,向与所述终端设备绑定的绑定设备发送告警消息;When it is determined that the number of operations is greater than or equal to a preset alarm security upper limit, sending an alarm message to the binding device bound to the terminal device;
    接收所述绑定设备收到所述告警消息后发送的控制指令,并根据所述控制指令控制所述终端设备进入与所述控制指令对应的用户模式,其中不同的用户模式具有不同的访问权限。Receiving a control instruction sent by the binding device after receiving the alarm message, and controlling, according to the control instruction, the terminal device to enter a user mode corresponding to the control instruction, where different user modes have different access rights .
  2. 如权利要求1所述的方法,其中,在获取终端设备上输入错误解锁信息的操作次数之前,所述方法还包括:The method of claim 1, wherein the method further comprises: before acquiring the number of operations of inputting the error unlocking information on the terminal device, the method further comprising:
    获取用户预设的绑定信息,所述绑定信息包括:与所述终端设备绑定的绑定设备的地址信息、告警安全上限值和至少一条用于控制终端设备进入不同模式的控制指令;Obtain binding information preset by the user, where the binding information includes: address information of the binding device bound to the terminal device, an alarm security upper limit value, and at least one control instruction for controlling the terminal device to enter different modes. ;
    相对应地,所述获取终端设备上输入错误解锁信息的操作次数,具体为:Correspondingly, the operation operation of obtaining the error unlocking information on the terminal device is specifically:
    在接收到所述绑定信息之后,实时获取所述终端设备上输入错误解锁信息的操作次数。After receiving the binding information, the number of operations for inputting the error unlocking information on the terminal device is obtained in real time.
  3. 如权利要求1所述的方法,其中,在获取终端设备上输入错误解锁信息的操作次数之后,所述方法还包括:The method of claim 1, wherein after the number of operations of inputting the error unlocking information on the terminal device, the method further comprises:
    若预设的告警安全上限值与实时获取的所述操作次数之间的差值为预设的差值时,获取所述终端设备的位置信息、输入错误解锁信息的操作次数和预设的控制指令;If the difference between the preset alarm security upper limit value and the real-time acquired operation count is a preset difference, acquiring the location information of the terminal device, the operation times of inputting the error unlocking information, and the preset Control instruction;
    将所述终端设备的位置信息、输入错误解锁信息的操作次数和预设的控制指令生成所述告警消息。The alarm message is generated by using the location information of the terminal device, the number of operations of inputting the error unlocking information, and a preset control command.
  4. 如权利要求1所述的方法,其中,所述向与所述终端设备绑定的绑定设备发送预设的告警消息,包括:The method of claim 1, wherein the sending the preset alarm message to the binding device bound to the terminal device comprises:
    将所述终端设备的解锁设置信息设置为失效; Setting the unlock setting information of the terminal device to be invalid;
    通过短消息的方式向与所述终端设备绑定的绑定设备发送预设的告警消息;Sending a preset alarm message to the binding device bound to the terminal device by means of a short message;
    开启所述终端设备上的实时接收所述绑定设备发送的控制指令的进程。And a process of receiving, in real time, the control instruction sent by the binding device on the terminal device.
  5. 如权利要求1所述的方法,其中,所述控制指令为:访客模式的控制指令、删除模式的控制指令、锁定模式的控制指令、或者全权模式的控制指令;The method according to claim 1, wherein the control instruction is: a guest mode control command, a delete mode control command, a lock mode control command, or a full authority mode control command;
    相应地,所述根据所述控制指令控制所述终端设备进入与所述控制指令对应的用户模式,具体包括:Correspondingly, the controlling the terminal device to enter the user mode corresponding to the control instruction according to the control instruction comprises:
    若控制指令为访客模式的控制指令,控制所述终端设备进入访客模式;Controlling the terminal device to enter a guest mode if the control command is a guest mode control command;
    若控制指令为删除模式的控制指令,控制所述终端设备进入已删除预先指定的资源信息的模式;If the control instruction is a control instruction of the deletion mode, controlling the terminal device to enter a mode in which the pre-specified resource information has been deleted;
    若控制指令为锁定模式的控制指令,控制所述终端设备进入永久锁定的模式;If the control instruction is a control command of the lock mode, controlling the terminal device to enter a permanent lock mode;
    若全权模式的控制指令,控制所述终端设备进入全权模式。If the control command of the full authority mode, the terminal device is controlled to enter the full authority mode.
  6. 如权利要求1至5任一项所述的方法,其中,所述方法还包括:The method of any of claims 1 to 5, wherein the method further comprises:
    在接收所述绑定设备发送的控制指令之后,若匹配不到与所述控制指令对应的用户模式,继续向与所述终端设备绑定的绑定设备发送告警消息。After receiving the control command sent by the binding device, if the user mode corresponding to the control command is not matched, the device continues to send an alarm message to the binding device bound to the terminal device.
  7. 一种控制终端设备上的访问权限的装置,所述装置包括:A device for controlling access rights on a terminal device, the device comprising:
    检测模块,设置为获取终端设备上输入错误解锁信息的操作次数;The detecting module is configured to obtain the number of operations for inputting the error unlocking information on the terminal device;
    告警模块,设置为在确定所述操作次数大于或等于预设的告警安全上限值时,向与所述终端设备绑定的绑定设备发送告警消息;The alarm module is configured to send an alarm message to the binding device bound to the terminal device when determining that the number of operations is greater than or equal to a preset alarm security upper limit value;
    控制模块,设置为接收所述绑定设备收到所述告警消息后发送的控制指令,并根据所述控制指令控制所述终端设备进入与所述控制指令对应的用户模式,其中不同的用户模式具有不同的访问权限。a control module, configured to receive a control instruction sent by the binding device after receiving the alarm message, and control, according to the control instruction, the terminal device to enter a user mode corresponding to the control instruction, where different user modes Have different access rights.
  8. 如权利要求7所述的装置,其中,所述装置还包括:The device of claim 7 wherein said device further comprises:
    预设模块,设置为获取用户预设的绑定信息,所述绑定信息包括:与所述终端设备绑定的绑定设备的地址信息、告警安全上限值和至少一条用于控制终端设备进入不同模式的控制指令。The preset module is configured to obtain the binding information preset by the user, where the binding information includes: address information of the binding device bound to the terminal device, an alarm security upper limit value, and at least one used to control the terminal device Enter control commands for different modes.
  9. 如权利要求7所述的装置,其中,所述装置还包括: The device of claim 7 wherein said device further comprises:
    数据获取模块,设置为当预设的告警安全上限值与实时获取的所述操作次数之间的差值为预设的差值时,获取所述终端设备的位置信息、输入错误解锁信息的操作次数和预设的控制指令;The data acquisition module is configured to acquire the location information of the terminal device and input the error unlocking information when the difference between the preset alarm security upper limit value and the real-time acquired operation time is a preset difference value. Number of operations and preset control commands;
    告警生成模块,设置为将所述终端设备的位置信息、输入错误解锁信息的操作次数和预设的控制指令生成所述告警消息。The alarm generating module is configured to generate the alarm message by using the location information of the terminal device, the number of operations of inputting the error unlocking information, and a preset control command.
  10. 如权利要求7所述的装置,其中,所述告警模块包括:The apparatus of claim 7, wherein the alarm module comprises:
    无效单元,设置为将所述终端设备的解锁设置信息设置为失效;An invalid unit, configured to set the unlock setting information of the terminal device to be invalid;
    信息发送单元,设置为通过短消息的方式向与所述终端设备绑定的绑定设备发送预设的告警消息;The information sending unit is configured to send, by using a short message, a preset alarm message to the binding device bound to the terminal device;
    启动单元,设置为开启所述终端设备上的实时接收所述绑定设备发送的控制指令的进程。And a startup unit, configured to enable a process of receiving a control instruction sent by the binding device in real time on the terminal device.
  11. 如权利要求7至10任一项所述的装置,其中,所述装置还包括:The apparatus of any one of claims 7 to 10, wherein the apparatus further comprises:
    重发模块,设置为在接收所述绑定设备发送的控制指令之后,若匹配不到与所述控制指令对应的用户模式,继续向与所述终端设备绑定的绑定设备发送告警消息。 The retransmission module is configured to, after receiving the control command sent by the binding device, continue to send an alarm message to the binding device bound to the terminal device if the user mode corresponding to the control command is not matched.
PCT/CN2014/095415 2014-09-24 2014-12-29 Method and device for controlling access permission on terminal device WO2015131642A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410495167.XA CN105512524A (en) 2014-09-24 2014-09-24 Method and device for controlling access right on terminal device
CN201410495167.X 2014-09-24

Publications (1)

Publication Number Publication Date
WO2015131642A1 true WO2015131642A1 (en) 2015-09-11

Family

ID=54054505

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/095415 WO2015131642A1 (en) 2014-09-24 2014-12-29 Method and device for controlling access permission on terminal device

Country Status (2)

Country Link
CN (1) CN105512524A (en)
WO (1) WO2015131642A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108021799A (en) * 2016-10-28 2018-05-11 中兴通讯股份有限公司 A kind of unlocking method of terminal screen, device and terminal
CN114802550A (en) * 2021-01-27 2022-07-29 纳恩博(常州)科技有限公司 Unlocking method and device of electric scooter, electric scooter and storage medium

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106021077B (en) * 2016-05-17 2019-05-21 北京小米移动软件有限公司 The alarming method for power and device of terminal
CN106203012A (en) * 2016-06-22 2016-12-07 中国联合网络通信集团有限公司 The processing method of screen locking, device and equipment
CN106230674B (en) * 2016-08-30 2020-10-30 青岛海尔股份有限公司 Method and device for preventing intelligent household appliance from being maliciously controlled
CN107688735B (en) * 2017-08-31 2021-02-19 深圳天珑无线科技有限公司 Terminal control method and device, terminal and computer readable storage medium
EP3667537B8 (en) * 2017-09-27 2021-10-06 Shenzhen Heytap Technology Corp., Ltd. Method for unlocking electronic device, electronic device, storage medium, and program product
CN115767025B (en) * 2022-11-10 2024-01-23 合芯科技有限公司 Method, device, electronic equipment and storage medium for preventing data leakage

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003048892A2 (en) * 2001-11-14 2003-06-12 Mari Myra Shaw Access, identity, and ticketing system for providing multiple access methods for smart devices
CN102387498A (en) * 2010-08-27 2012-03-21 苏州安可信通信技术有限公司 Anti-theft system and method for mobile telephone
CN102413456A (en) * 2011-09-02 2012-04-11 中国电信股份有限公司 User terminal anti-theft method, user terminal anti-theft device and user terminal anti-theft system based on operation network
CN102710847A (en) * 2012-05-07 2012-10-03 深圳桑菲消费通信有限公司 Method for managing access of multiple visitors to mobile terminal
CN102917348A (en) * 2012-10-30 2013-02-06 广东欧珀移动通信有限公司 Intelligent multi-user mobile phone and logging method thereof
CN103927466A (en) * 2014-04-01 2014-07-16 可牛网络技术(北京)有限公司 Method and device for controlling mobile terminal

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102654014A (en) * 2011-03-01 2012-09-05 陆东昊 Anti-disclosure method used after losing financial data safe
CN103108082B (en) * 2013-01-24 2014-06-04 北京航空航天大学 Smartphone multi-user mode permission management method and smartphone multi-user mode permission management system
CN104010088B (en) * 2014-06-16 2016-06-08 中国地质大学(武汉) Intelligent mobile phone anti-theft method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003048892A2 (en) * 2001-11-14 2003-06-12 Mari Myra Shaw Access, identity, and ticketing system for providing multiple access methods for smart devices
CN102387498A (en) * 2010-08-27 2012-03-21 苏州安可信通信技术有限公司 Anti-theft system and method for mobile telephone
CN102413456A (en) * 2011-09-02 2012-04-11 中国电信股份有限公司 User terminal anti-theft method, user terminal anti-theft device and user terminal anti-theft system based on operation network
CN102710847A (en) * 2012-05-07 2012-10-03 深圳桑菲消费通信有限公司 Method for managing access of multiple visitors to mobile terminal
CN102917348A (en) * 2012-10-30 2013-02-06 广东欧珀移动通信有限公司 Intelligent multi-user mobile phone and logging method thereof
CN103927466A (en) * 2014-04-01 2014-07-16 可牛网络技术(北京)有限公司 Method and device for controlling mobile terminal

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108021799A (en) * 2016-10-28 2018-05-11 中兴通讯股份有限公司 A kind of unlocking method of terminal screen, device and terminal
CN108021799B (en) * 2016-10-28 2022-10-28 中兴通讯股份有限公司 Terminal screen unlocking method and device and terminal
CN114802550A (en) * 2021-01-27 2022-07-29 纳恩博(常州)科技有限公司 Unlocking method and device of electric scooter, electric scooter and storage medium
CN114802550B (en) * 2021-01-27 2023-10-20 纳恩博(常州)科技有限公司 Unlocking method and device for electric scooter, electric scooter and storage medium

Also Published As

Publication number Publication date
CN105512524A (en) 2016-04-20

Similar Documents

Publication Publication Date Title
WO2015131642A1 (en) Method and device for controlling access permission on terminal device
US10185816B2 (en) Controlling user access to electronic resources without password
KR101296863B1 (en) Entry authentication system using nfc door lock
CN110651270B (en) Data access method and device
KR101588197B1 (en) Automatic openable/closeable doorlock apparatus and automatic opening/closing method for doorlock
US8856916B1 (en) User associated geo-location based reauthorization to protect confidential information
WO2015074517A1 (en) Information viewing method, device, system and storage medium
US10055569B2 (en) Location specific image based authentication
CN103813334A (en) Right control method and right control device
CN104700050A (en) Mobile terminal safety positioning method and device
WO2017166689A1 (en) Privacy protection method and device
CN110766850B (en) Visitor information management method, access control system, server and storage medium
US8990887B2 (en) Secure mechanisms to enable mobile device communication with a security panel
WO2016115760A1 (en) Terminal system control method, device, and terminal
CN107786486B (en) Method and device for activating operating system
CN105809045A (en) Method and device for processing equipment systems during data reset
KR20090000188A (en) Method of re-enable device capability disabled by management server and device management system
JP2010097510A (en) Remote access management system and method
WO2017113719A1 (en) Remote mobile terminal locking method and system
WO2021074221A1 (en) Method for operating a medical system, medical system, and security module
CN105975841A (en) Method for locking/ unlocking computer screen on the basis of softdog
JP2018010542A (en) Construction data management method and program
US10038778B1 (en) Locally securing sensitive data stored on a mobile phone
JP2007053454A (en) Authentication device and method
KR101662944B1 (en) Laptop locking control method

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14884869

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 14884869

Country of ref document: EP

Kind code of ref document: A1