WO2016115760A1 - 一种终端系统的控制方法、装置和终端 - Google Patents
一种终端系统的控制方法、装置和终端 Download PDFInfo
- Publication number
- WO2016115760A1 WO2016115760A1 PCT/CN2015/073436 CN2015073436W WO2016115760A1 WO 2016115760 A1 WO2016115760 A1 WO 2016115760A1 CN 2015073436 W CN2015073436 W CN 2015073436W WO 2016115760 A1 WO2016115760 A1 WO 2016115760A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- control
- terminal
- control information
- hardware
- software
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6281—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database at program execution time, where the protection is within the operating system
Definitions
- the present invention relates to the field of computer technologies, and in particular, to a method, an apparatus, and a terminal for controlling a terminal system.
- terminal data security incidents are frequent, and in order to protect personal information security from threats, those skilled in the art have studied terminal anti-theft methods.
- Existing terminal anti-theft methods include: SMS anti-theft, terminal anti-theft, and prevention of illegal brushing.
- SMS anti-theft means that after the terminal is lost, by sending a short message containing the preset content to the terminal, the anti-theft function of the terminal is activated, so that the terminal can be used normally after the user inputs the correct anti-theft password.
- the anti-theft mode of Coolpad mobile phone as shown in Figure 1.
- the data network and the geographical location anti-theft means that, according to the information of the terminal, the server searches for the geographical location of the terminal.
- the server searches for the geographical location of the terminal.
- cool cloud positioning function of Cool mobile phone another example: the Find My Phone function of Apple mobile phone, as shown in Figure 2.
- Preventing illegal brushing means that the terminal can only achieve terminal brushing under the condition of coexistence with the brushing tool.
- the anti-theft method used by the terminal is single. After the terminal is stolen or lost, the illegal user can enter the terminal system by bypassing the existing anti-theft settings by cracking the terminal software, re-flashing, etc., thereby obtaining the terminal.
- the data is only a few bits.
- the main object of the present invention is to provide a data protection method, device and terminal to solve the existing
- the anti-theft method used by the terminal is single, and the illegal user can bypass the problem of the existing anti-theft settings.
- the present invention provides a method for controlling a terminal system, comprising: receiving control information; and controlling hardware and/or software of the terminal system according to the control information.
- the terminal system includes a first system and a second system.
- the controlling hardware and/or software of the terminal system according to the control information includes: controlling hardware of the first system according to the control information. And/or software; and/or, according to the control information, controlling hardware and/or software of the second system.
- the controlling the hardware of the first system and/or the second system according to the control information including: masking or invalidating the first system and/or the second according to the control information
- the hardware in the system including: masking or invalidating the first system and/or the second according to the control information
- the control information is a control item or a control instruction; and the hardware and/or software for controlling the terminal system according to the control information includes: if the control information is a control item, the preset instruction comparison table Querying a control instruction corresponding to the control item, and executing the control instruction in the terminal system to control hardware and/or software of the terminal system; if the control information is a control instruction, The control instructions are executed in the terminal system to control hardware and/or software of the terminal system.
- the present invention also provides a control device for a terminal system, the device disposed on the terminal side includes: a receiving module, configured to receive control information; and a control module, configured to control hardware of the terminal system according to the control information Or software.
- the present invention also provides a terminal including control means of the terminal system disposed on the terminal side.
- the present invention also provides a method for controlling a terminal system, comprising: determining control information according to a triggered control item; wherein the control information is used to control hardware and/or software of the terminal system; The terminal sends.
- the terminal system includes a first system and a second system; the control information is used to control hardware and/or software of the first system, and/or control hardware and/or software of the second system.
- the control information is a control item or a control instruction
- the determining the control information according to the triggered control item includes: if there is a preset instruction comparison table at the local end, in the instruction comparison table, The control instruction corresponding to the control item is queried, and the control instruction is used as control information; if the preset instruction comparison table does not exist at the local end, the control item is used as control information.
- the present invention also provides a control device for a terminal system, the device disposed on the server side, comprising: a determining module, configured to determine control information according to the triggered control item; wherein the control information is used to control the terminal system Hardware and/or software; a transmitting module, configured to send the control information to the terminal.
- the invention triggers the control item required by the user by the user operation, so that the control instruction corresponding to the control item is executed in the terminal system, thereby realizing the control of the terminal system.
- the illegal user can not operate the terminal, thereby realizing the protection of the data in the terminal.
- FIG. 1 is a schematic diagram of an anti-theft mode of a conventional mobile phone
- FIG. 2 is a schematic diagram of data network and geographic location anti-theft of an existing mobile phone
- FIG. 3 is a flowchart of a terminal side of a method for controlling a terminal system according to an embodiment of the present invention
- FIG. 4 is a server side flow chart of a method for controlling a terminal system according to an embodiment of the present invention.
- FIG. 5 is a flowchart of a control method of a terminal system according to a first embodiment of the present invention
- FIG. 6 is a flowchart of a control method of a terminal system according to a second embodiment of the present invention.
- FIG. 7 is a block diagram showing a terminal side of a control device of a terminal system according to an embodiment of the present invention.
- FIG. 8 is a server side block diagram of a control device of a terminal system according to an embodiment of the present invention.
- the main idea of the present invention is that a control item is set in a user interface provided by the server for the user, and the user can trigger the control item by operation; after the control item is triggered, the control instruction corresponding to the control item is Released to the terminal system for execution; under the control of the control commands, the hardware and/or software in the terminal system performs the preset operations.
- This operation can protect the data in the terminal system from being obtained by the illegal user, so that the present invention improves the security of the data by controlling the terminal system.
- FIG. 3 is a flowchart of a terminal side of a control method of a terminal system according to an embodiment of the present invention.
- Step S310 receiving control information.
- the control information is a control item or a control instruction.
- Control item used to control the hardware and/or software of the end system For example: Control the terminal system to delete or restore its stored data.
- the control instruction is a computer instruction corresponding to the control item, and is executed in the terminal system to control hardware and/or software in the terminal system, so that the hardware and/or software perform a preset operation.
- Step S320 controlling hardware and/or software of the terminal system according to the control information.
- control information After receiving the control information, it is determined that the control information is a control item or a control instruction.
- control information is a control item, querying, in a preset instruction comparison table, a control instruction corresponding to the control item, and executing the control instruction in the terminal system to control hardware of the terminal system And/or software; if the control information is a control instruction, executing the control instruction in the terminal system to control hardware and/or software of the terminal system.
- the terminal system includes a first system and a second system; controls hardware and/or software of the first system according to the control information; and/or controls hardware and/or software of the second system according to the control information. Further, controlling the hardware of the first system and/or the second system according to the control information comprises: masking or invalidating the hardware in the first system and/or the second system according to the control information.
- FIG. 4 is a server side flow chart of a control method of a terminal system according to an embodiment of the present invention.
- Step S410 determining control information according to the triggered control item; wherein the control information is used to control hardware and/or software of the terminal system.
- the control information is a control item or a control instruction; if there is a preset instruction pair on the local end (server side) According to the table, in the instruction comparison table, the control instruction corresponding to the control item is queried, and the control instruction is used as the control information; if the preset instruction comparison table does not exist at the local end, the control item is used as the control information.
- the terminal system includes a first system and a second system; control information is used to control hardware and/or software of the first system, and/or control hardware and/or software of the second system.
- step S420 the control information is sent to the terminal.
- the method before the triggering the control item, the method further includes: presetting the instruction comparison table; wherein the correspondence between the control item and the control instruction is recorded in the instruction comparison table. Further, on the terminal side or the server side, an instruction comparison table is set.
- the server Based on the preset instruction comparison table, the server sets a control item in the user interface provided for the user, and triggers a control item selected by the user in the user interface.
- the user is an authorized user of the terminal.
- the application scenario of the present invention is, for example, after the user's terminal is lost, the server can be logged in to the server through other terminals, and the required control items are selected in the user interface, and the server obtains and triggers the control item selected by the user according to the control terminal, and the user
- the control information is sent to control the hardware and/or software of the terminal system to protect the data in the terminal from being stolen by illegal users.
- the hardware and/or software of the terminal system is controlled, for example, the terminal system deletes the data in the system, and the hardware and software in the terminal system cannot operate normally.
- FIG. 5 is a flowchart of a control method of a terminal system according to a first embodiment of the present invention.
- step S510 an instruction comparison table is set in advance, and the instruction comparison table is stored in the server.
- control item The correspondence between the control item and the control instruction is recorded in the instruction comparison table.
- the operation of the instruction comparison table may be set on the server side, or the operation of the instruction comparison table may be set on the terminal side. If the instruction comparison table is set on the server side, the server directly stores; if the instruction comparison table is set on the terminal side, the set instruction completion table is uploaded to the server, and the server stores the instruction comparison table.
- Step S520 the server sets a control item in a user interface provided by the server for the user based on the pre-stored instruction comparison table.
- Controls can be designed in the form of buttons.
- the user referred to here is an authorized user of the terminal, that is, a legitimate user who has the right to issue instructions to the terminal.
- the owner of the terminal For example: the owner of the terminal.
- step S530 the server triggers a control item selected by the user in the user interface.
- Authorized users can log in to the server through other terminals and select the required controls in the user interface to remotely control the terminal.
- step S540 the server queries the control command corresponding to the triggered control item in the instruction comparison table, and delivers the control instruction to the terminal.
- Step S550 after receiving the control instruction, the terminal executes the control instruction in the terminal system.
- FIG. 6 is a flow chart showing a control method of a terminal system according to a second embodiment of the present invention.
- Step S610 the instruction comparison table is set in advance, and the instruction comparison table is stored in the terminal.
- the instruction comparison table set on the server side or the terminal side is finally stored on the terminal side.
- step S620 the server sets a control item in a user interface provided for the user based on the instruction comparison table.
- the server can acquire the instruction comparison table from the terminal and set the control item according to the instruction comparison table.
- step S630 the server triggers a control item selected by the user in the user interface.
- Step S640 the server sends the information of the control item selected by the user to the terminal.
- Step S650 after receiving the information of the control item, the terminal queries the control command corresponding to the control item in the instruction comparison table, and executes the control instruction in the terminal system.
- the terminal system includes a first system and a second system.
- the first system is a general system and the second system is a security system; the security system has a higher security level than the ordinary system.
- the first system is a Windows system, and the second system is a Linux system.
- Executing the control instruction in the terminal system, controlling hardware and/or software of the terminal system comprising: executing control instructions in the first system, controlling hardware and/or software of the first system; or executing in the second system
- the control instruction controls hardware and/or software of the second system.
- the software and hardware of the first system and the second system may be shared or may be used separately.
- both the first system and the second system use memory, but use different partitions in memory. Therefore, when the control items and the control items corresponding to the control items are set, the software and hardware used separately can be processed for the first system or the second system; for the shared software and hardware, the Is the processing of the first system or the second system.
- the processing object of the control item and the control instruction is reflected in the instruction comparison table.
- the instruction comparison table is shown in Table 1, but those skilled in the art should know that the contents of the instruction comparison table are not limited thereto.
- control items include: control content and kind.
- the control content is used to describe the processing performed on the terminal system; the types of control items include a startup control item and a shutdown control item.
- the meaning of the control instructions is used to describe how the control instructions are executed. Since the implementation of the control instructions is various, only the meaning of the control instructions is given in Table 1, and the specific control instructions are set according to the application environment.
- control content from the first system crash to the second system data clearing is to control the operating system (OS) layer of the terminal.
- the object that kills the application can be processed for some software or all software.
- Data clearing can be done by deleting data locally or by deleting the data locally and uploading the deleted data to the server so that the data can be restored locally.
- control content from the front camera to the security chip controls the hardware layer of the terminal.
- the hardware in the first system or the second system can be masked or disabled. Shielding means: making the hardware temporarily unavailable; failure means that the hardware is never available.
- the front camera and the fingerprint verification are all used to verify the identity of the user of the handheld terminal. After the verification, the verification result is uploaded to the server, and the user can view the verification result in the user interface. If the verification is an illegal user, the user also Other controls can be triggered to protect the data in the terminal.
- SIM Subscriber Identity Module
- the terminal system cannot access the Subscriber Identity Module (SIM), so that the information in the SIM card cannot be obtained.
- SIM Subscriber Identity Module
- the charging mode is on, the terminal cannot be charged, so the terminal will not turn on after the battery is exhausted.
- the display and power button are turned on, the display and power button will be blocked, the display will not be displayed, and the power button will not be operated by the user.
- the mask setting cannot be erased by brushing or restarting.
- the security chip is used to run the second system, so the control of the security chip is to control the second system.
- Forbidden to read Trustzone is to prohibit reading the second system data, so the second system will not be able to start, the data in the second system will be no The law was obtained.
- the type of the control item can be set to the form of the button, and the control content is used as a function description of the button, and when the user clicks the button, the trigger is triggered.
- the control command corresponding to this button is triggered.
- the processing executed by the control item and the control command is recorded, and the recorded content is stored on the terminal side or the server side.
- the recorded content includes: processing of hardware and/or software execution of the terminal system. For example, deleting data in the first system and related information of the deleted data, restoring data in the second system, and related information of the restored data. Further, recovery processing is performed on hardware and/or software that has been processed in the terminal system in accordance with the recorded content. For example, the system that crashes the system to start normally, the blocked hardware restores it to normal, the deleted data is restored from the terminal side, or downloaded from the server side. Further, if the user wants the terminal to resume normal operation, the control item in the user interface can be operated to trigger a recovery operation. For example: the trigger control is off.
- the present invention also provides a control device for a terminal system, which is disposed on the terminal side.
- FIG. 7 it is a terminal side structure diagram of a control device of a terminal system according to an embodiment of the present invention.
- the device includes:
- the receiving module 710 is configured to receive control information.
- the control module 720 is configured to control hardware and/or software of the terminal system according to the control information.
- the present invention also provides a control device for a terminal system that is disposed on the server side.
- FIG. 8 it is a server side structure diagram of a control device of a terminal system according to an embodiment of the present invention.
- the device includes:
- the determining module 810 is configured to determine control information according to the triggered control item; wherein the control information is used to control hardware and/or software of the terminal system.
- the sending module 820 is configured to send the control information to the terminal.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Automation & Control Theory (AREA)
- Small-Scale Networks (AREA)
- Telephonic Communication Services (AREA)
Abstract
本发明公开了一种终端系统的控制方法、装置和终端。其中,所述方法包括:在服务器侧,根据被触发的控制项,确定控制信息;其中,所述控制信息用于控制终端系统的硬件和/或软件;将所述控制信息向所述终端发送。在终端侧,接收控制信息;根据所述控制信息,控制终端系统的硬件和/或软件。本发明通过用户操作触发用户所需的控制项,使该控制项对应的控制指令在终端系统中执行,从而实现对终端系统的控制。通过对终端系统进行控制,可以使非法用户无法对终端进行操作,进而实现了对终端中数据的保护。
Description
本申请要求于2015年01月20日提交中国专利局,申请号为CN201510026623.0、发明名称为“一种终端系统的控制方法、装置和终端”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
本发明涉及计算机技术领域,尤其涉及一种终端系统的控制方法、装置和终端。
近年来终端数据安全事件频发,为了保护个人信息安全不再受到威胁,本领域技术人员研究了终端防盗方法。现有的终端防盗方法包括:短信防盗、终端防盗、以及防止非法刷机。
短信防盗是指:在终端丢失后,通过向终端发送包含有预设内容的短信息,启动终端的防盗功能,使终端在用户输入正确的防盗密码后才可以正常使用。例如:酷派手机的防盗模式,如图1所示。
数据网络和地理位置防盗是指:根据终端的信息,在服务端查找该终端当前所在的地理位置。例如:酷派手机的酷云定位功能;又如:苹果手机的Find My Phone功能,如图2所示。
防止非法刷机是指:使终端仅在和刷机工具并存的条件下,才能实现终端刷机。
但是,在现有方式中,终端使用的防盗方法单一,在终端失窃或丢失后,非法用户可以通过破解终端软件、重新刷机等方式,绕开现有的防盗设置进入终端系统,进而获得终端中的数据。
发明内容
本发明的主要目的在于提供一种数据保护方法、装置和终端,以解决现有
终端使用的防盗方法单一,非法用户可以绕开现有的防盗设置的问题。
基于上述技术问题,本发明是通过以下技术方案来解决的。
本发明提供了一种终端系统的控制方法,包括:接收控制信息;根据所述控制信息,控制终端系统的硬件和/或软件。
其中,所述终端系统包括第一系统和第二系统;所述根据所述控制信息,控制终端系统的硬件和/或软件,包括:根据所述控制信息,控制所述第一系统的硬件和/或软件;和/或,根据所述控制信息,控制所述第二系统的硬件和/或软件。
其中,所述根据所述控制信息,控制所述第一系统和/或所述第二系统的硬件,包括:根据所述控制信息,屏蔽或失效所述第一系统和/或所述第二系统中的硬件。
其中,所述控制信息为控制项或控制指令;所述根据所述控制信息,控制终端系统的硬件和/或软件,包括:如果所述控制信息为控制项,则在预设的指令对照表中,查询所述控制项对应的控制指令,并在所述终端系统中执行所述控制指令,以控制所述终端系统的硬件和/或软件;如果所述控制信息为控制指令,则在所述终端系统中执行所述控制指令,以控制所述终端系统的硬件和/或软件。
本发明还提供了一种终端系统的控制装置,设置在终端侧的所述装置包括:接收模块,用于接收控制信息;控制模块,用于根据所述控制信息,控制终端系统的硬件和/或软件。
本发明还提供了一种终端,所述终端包括设置在终端侧的所述终端系统的控制装置。
本发明还提供了一种终端系统的控制方法,包括:根据被触发的控制项,确定控制信息;其中,所述控制信息用于控制终端系统的硬件和/或软件;将所述控制信息向所述终端发送。
其中,所述终端系统包括第一系统和第二系统;所述控制信息用于控制所述第一系统的硬件和/或软件,和/或控制所述第二系统的硬件和/或软件。
其中,所述控制信息为控制项或控制指令;所述根据被触发的控制项,确定控制信息,包括:如果本端存在预设的指令对照表,则在所述指令对照表中,
查询所述控制项对应的控制指令,将所述控制指令作为控制信息;如果本端不存在预设的指令对照表,则将所述控制项作为控制信息。
本发明还提供了一种终端系统的控制装置,设置于服务器侧的所述装置包括:确定模块,用于根据被触发的控制项,确定控制信息;其中,所述控制信息用于控制终端系统的硬件和/或软件;发送模块,用于将所述控制信息向所述终端发送。
本发明有益效果如下:
本发明通过用户操作触发用户所需的控制项,使该控制项对应的控制指令在终端系统中执行,从而实现对终端系统的控制。通过对终端系统进行控制,可以使非法用户无法对终端进行操作,进而实现了对终端中数据的保护。
此处所说明的附图用来提供对本发明的进一步理解,构成本申请的一部分,本发明的示意性实施例及其说明用于解释本发明,并不构成对本发明的不当限定。在附图中:
图1是现有手机的防盗模式示意图;
图2是现有手机的数据网络和地理位置防盗示意图;
图3是根据本发明一个实施例的终端系统的控制方法的终端侧流程图;
图4是根据本发明一实施例的终端系统的控制方法的服务器侧流程图
图5是根据本发明第一实施例的终端系统的控制方法的流程图;
图6是根据本发明第二实施例的终端系统的控制方法的流程图;
图7是根据本发明一实施例的终端系统的控制装置的终端侧结构图;
图8是根据本发明一实施例的终端系统的控制装置的服务器侧结构图。
本发明的主要思想在于,在服务器为用户提供的用户界面中设置控制项,用户可以通过操作触发控制项;控制项被触发后,该控制项对应的控制指令被
下达至终端系统中执行;在控制指令的控制下,终端系统中的硬件和/或软件执行预设的操作。该操作可以保护终端系统中的数据不被非法用户获得,从而本发明通过对终端系统进行控制的方式,提高了数据的安全程度。
为使本发明的目的、技术方案和优点更加清楚,以下结合附图及具体实施例,对本发明作进一步地详细说明。
本发明提供了一种终端系统的控制方法(在终端侧执行)。如图3所示,图3是根据本发明一实施例的终端系统的控制方法的终端侧流程图。
步骤S310,接收控制信息。
控制信息为控制项或控制指令。
控制项,用于控制终端系统的硬件和/或软件。例如:控制终端系统删除或恢复其存储的数据。
控制指令,是控制项对应的计算机指令,用于在终端系统中执行,控制终端系统中的硬件和/或软件,使硬件和/软件执行预设的操作。
步骤S320,根据控制信息,控制终端系统的硬件和/或软件。
在接收到控制信息后,判断所述控制信息是控制项或控制指令。
如果所述控制信息为控制项,则在预设的指令对照表中,查询所述控制项对应的控制指令,并在所述终端系统中执行所述控制指令,以控制所述终端系统的硬件和/或软件;如果所述控制信息为控制指令,则在所述终端系统中执行所述控制指令,以控制所述终端系统的硬件和/或软件。
终端系统包括第一系统和第二系统;根据控制信息,控制第一系统的硬件和/或软件;和/或,根据控制信息,控制第二系统的硬件和/或软件。进一步地,根据控制信息,控制第一系统和/或第二系统的硬件,包括:根据控制信息,屏蔽或失效第一系统和/或所述第二系统中的硬件。
本发明提供了一种终端系统的控制方法(在服务器侧执行)。如图4所示,图4是根据本发明一实施例的终端系统的控制方法的服务器侧流程图。
步骤S410,根据被触发的控制项,确定控制信息;其中,控制信息用于控制终端系统的硬件和/或软件。
控制信息为控制项或控制指令;如果本端(服务器侧)存在预设的指令对
照表,则在指令对照表中,查询控制项对应的控制指令,将控制指令作为控制信息;如果本端不存在预设的指令对照表,则将控制项作为控制信息。
终端系统包括第一系统和第二系统;控制信息用于控制第一系统的硬件和/或软件,和/或控制所述第二系统的硬件和/或软件。
步骤S420,将控制信息向终端发送。
在一个实施例中,在触发控制项之前,还包括:预先设置指令对照表;其中,指令对照表中记录了控制项与控制指令的对应关系。进一步地,在终端侧或服务器侧,设置指令对照表。
基于预设的指令对照表,服务器在为用户提供的用户界面中设置控制项,并且触发用户在用户界面中选择的控制项。用户为所述终端的授权用户。
本发明的应用场景例如是:当用户的终端遗失后,可以通过其他终端登录服务器,在用户界面中选择所需的控制项,服务器根据获取并触发用户选择的控制项,并向用户的终端下发控制信息,控制终端系统的硬件和/或软件,以此来保护终端中的数据不被非法用户窃取。控制终端系统的硬件和/或软件,如:使终端系统删除系统中的数据、使终端系统中的硬件、软件不能正常运行。
下面给出三个本发明较优的实施例,来说明本发明。
实施例一
图5为根据本发明第一实施例的终端系统的控制方法的流程图。
步骤S510,预先设置指令对照表,并将指令对照表存储在服务器。
指令对照表中记录了控制项与控制指令的对应关系。
可以在服务器侧设置指令对照表的操作,也可以在终端侧设置指令对照表的操作。如果在服务器侧设置指令对照表,则服务器直接存储;如果在终端侧设置指令对照表,则将设置完成的指令对照表上传到服务器,由服务器存储指令对照表。
步骤S520,服务器基于预先存储的指令对照表,在服务器为用户提供的用户界面中设置控制项。
控制项可以设计成按钮的形式。
这里所指的用户为终端的授权用户,也即是有权对终端下发指令的合法用户。例如:终端的所有者。
步骤S530,服务器触发用户在用户界面中选择的控制项。
授权用户可以通过其他终端登录服务器,在用户界面中选择需要的控制项,以便对终端进行远程控制。
步骤S540,服务器在指令对照表中查询被触发的控制项对应的控制指令,并将该控制指令下发到终端。
步骤S550,终端在接收到控制指令后,在终端系统中执行该控制指令。
实施例二
图6为根据本发明第二实施例的终端系统的控制方法的流程图。
步骤S610,预先设置指令对照表,并将指令对照表存储在终端中。
将在服务器侧或终端侧设置的指令对照表,最终存储在终端侧。
步骤S620,服务器基于指令对照表,在为用户提供的用户界面中设置控制项。
如果指令对照表是在终端侧设置的,那么,服务器可以从终端中获取指令对照表,并根据指令对照表设置控制项。
步骤S630,服务器触发用户在用户界面中选择的控制项。
步骤S640,服务器将用户选择的控制项的信息发送到终端。
步骤S650,终端在接收到控制项的信息后,在指令对照表中查询该控制项对应的控制指令,并在终端系统中执行该控制指令。
实施例三
终端系统包括第一系统和第二系统。例如,第一系统是普通系统,第二系统是安全系统;安全系统的安全级别高于普通系统。又如:第一系统是Windows系统,第二系统是Linux系统。
在终端系统中执行所述控制指令,控制终端系统的硬件和/或软件,包括:在第一系统中执行控制指令,控制第一系统的硬件和/或软件;或者,在第二系统中执行所述控制指令,控制第二系统的硬件和/或软件。
第一系统和第二系统的软件、硬件可以是共用的,也可以是分开使用的的。例如:第一系统和第二系统都使用中的内存,但是使用内存中不同的分区。因此,在设置控制项和控制项对应的控制指令时,针对分开使用的软件和硬件,可以体现出是对第一系统或第二系统进行的处理;针对共用的软件和硬件,可以不体现出是对第一系统或第二系统进行的处理。
例如:在指令对照表中体现出控制项和控制指令的处理对象。指令对照表例如表1所示,但是本领域技术人员应当知道,指令对照表中的内容不限于此。
表1
在表1中,控制项包括:控制内容和种类。控制内容用于描述对终端系统进行的处理;控制项的种类包括启动控制项、关闭控制项。控制指令含义用于描述控制指令的执行方式。因为控制指令的实现方式多样,所以,表1中仅给出了控制指令的含义,具体的控制指令根据应用环境进行设置。
在表1中,从第一系统死机到第二系统数据清除的控制内容,都为对终端的操作系统(Operating System,简称OS)层进行控制。
其中,系统死机开启后,在系统启动阶段死机,如果终端被再次重启,依旧在启动阶段死机,这样可以使终端无法运行。杀应用开启的对象可以是对部分软件也可以是全部软件进行处理。数据清除开启可以是在本地删除数据,也可以在本地删除数据的同时,将删除的数据上传至服务器,以便可以在本地恢复数据。
在表1中,从前置摄像头到安全芯片控制内容,都为对终端的硬件层进行控制。可以屏蔽或失效第一系统或第二系统中的硬件。屏蔽是指:使硬件暂时不可用;失效是指:是硬件永远不可用。
其中,前置摄像头、指纹验证开启,都用于验证手持终端的用户的身份,在验证后,将验证结果上传服务器,用户可以在用户界面中查看该验证结果,如果验证为非法用户,用户还可以触发其他控制项,以便对终端中的数据进行保护。读卡模式关闭,终端系统无法访问客户识别模块(Subscriber Identity Module,简称SIM),这样SIM卡中的信息将无法被获取。充电模式开启,则终端无法充电,这样终端电量耗尽后将无法开启。显示器、电源按键开启,则显示器、电源按键将被屏蔽,显示器将不能进行显示,电源按键将不能被用户操作,通过刷机或重启无法擦除屏蔽设置。安全芯片用于运行第二系统,因此,对安全芯片进行控制,即是对第二系统进行控制。禁止读取Trustzone即是禁止读取第二系统数据,这样第二系统将无法启动,第二系统中的数据将无
法被获得。
基于表1中控制项和控制指令的对应关系,在用户界面中设置控制项时,可以将控制项的种类设置成按钮的形式,将控制内容作为按钮的功能说明,当用户点击按钮时,触发该按钮对应的控制指令。
针对上述实施例而言,在控制终端系统的硬件和/或软件执行预设操作的同时,记录控制项和控制指令执行过的处理,将记录内容存储在终端侧或服务器侧。记录内容包括:对终端系统的硬件和/或软件执行的处理。例如:删除第一系统中的数据以及被删除数据的相关信息、恢复第二系统中的数据以及被恢复数据的相关信息。进一步地,根据记录内容对终端系统中进行过处理的硬件和/或软件执行恢复处理。例如:死机处理的系统使之正常启动、被屏蔽的硬件使之恢复正常、被删除的数据从终端侧进行恢复或从服务器侧进行下载等等。进一步地,如果用户希望终端运行恢复正常,则可以对用户界面中的控制项进行操作,触发恢复操作。例如:触发控制项关闭。
需要说明的是,如果硬件被失效后,不能够被恢复处理。
本发明还提供了一种终端系统的控制装置,该装置被设置在终端侧。
如图7所示,为是根据本发明一实施例的终端系统的控制装置的终端侧结构图。
该装置中包括:
接收模块710,用于接收控制信息。
控制模块720,用于根据所述控制信息,控制终端系统的硬件和/或软件。
本实施例所述的装置的功能已经上述方法实施例中进行了描述,故本实施例的描述中未详尽之处,可以参见前述实施例中的相关说明,在此不做赘述。
本发明还提供了一种终端系统的控制装置,该装置被设置在服务器侧。
如图8所示,为是根据本发明一实施例的终端系统的控制装置的服务器侧结构图。
该装置包括:
确定模块810,用于根据被触发的控制项,确定控制信息;其中,所述控制信息用于控制终端系统的硬件和/或软件。
发送模块820,用于将所述控制信息向所述终端发送。
本实施例所述的装置的功能已经在上述方法实施例中进行了描述,故本实施例的描述中未详尽之处,可以参见前述实施例中的相关说明,在此不做赘述。
以上所述仅为本发明的实施例而已,并不用于限制本发明,对于本领域的技术人员来说,本发明可以有各种更改和变化。凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的权利要求范围之内。
Claims (10)
- 一种终端系统的控制方法,其特征在于,包括:接收控制信息;根据所述控制信息,控制终端系统的硬件和/或软件。
- 根据权利要求1所述的方法,其特征在于,所述终端系统包括第一系统和第二系统;所述根据所述控制信息,控制终端系统的硬件和/或软件,包括:根据所述控制信息,控制所述第一系统的硬件和/或软件;和/或,根据所述控制信息,控制所述第二系统的硬件和/或软件。
- 根据权利要求2所述的方法,其特征在于,所述根据所述控制信息,控制所述第一系统和/或所述第二系统的硬件,包括:根据所述控制信息,屏蔽或失效所述第一系统和/或所述第二系统中的硬件。
- 根据权利要求1所述的方法,其特征在于,所述控制信息为控制项或控制指令;所述根据所述控制信息,控制终端系统的硬件和/或软件,包括:如果所述控制信息为控制项,则在预设的指令对照表中,查询所述控制项对应的控制指令,并在所述终端系统中执行所述控制指令,以控制所述终端系统的硬件和/或软件;如果所述控制信息为控制指令,则在所述终端系统中执行所述控制指令,以控制所述终端系统的硬件和/或软件。
- 一种终端系统的控制装置,其特征在于,设置在终端侧的所述装置包括:接收模块,用于接收控制信息;控制模块,用于根据所述控制信息,控制终端系统的硬件和/或软件。
- 一种终端,其特征在于,所述终端包括权利要求5所述的终端系统的控制装置。
- 一种终端系统的控制方法,其特征在于,包括:根据被触发的控制项,确定控制信息;其中,所述控制信息用于控制终端系统的硬件和/或软件;将所述控制信息向所述终端发送。
- 根据权利要求7所述的方法,其特征在于,所述终端系统包括第一系统和第二系统;所述控制信息用于控制所述第一系统的硬件和/或软件,和/或控制所述第二系统的硬件和/或软件。
- 根据权利要求7所述的方法,其特征在于,所述控制信息为控制项或控制指令;所述根据被触发的控制项,确定控制信息,包括:如果本端存在预设的指令对照表,则在所述指令对照表中,查询所述控制项对应的控制指令,将所述控制指令作为控制信息;如果本端不存在预设的指令对照表,则将所述控制项作为控制信息。
- 一种终端系统的控制装置,其特征在于,设置于服务器侧的所述装置包括:确定模块,用于根据被触发的控制项,确定控制信息;其中,所述控制信息用于控制终端系统的硬件和/或软件;发送模块,用于将所述控制信息向所述终端发送。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510026623.0A CN104537311A (zh) | 2015-01-20 | 2015-01-20 | 一种终端系统的控制方法、装置和终端 |
CN201510026623.0 | 2015-01-20 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2016115760A1 true WO2016115760A1 (zh) | 2016-07-28 |
Family
ID=52852833
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2015/073436 WO2016115760A1 (zh) | 2015-01-20 | 2015-02-28 | 一种终端系统的控制方法、装置和终端 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN104537311A (zh) |
WO (1) | WO2016115760A1 (zh) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105094819A (zh) * | 2015-07-15 | 2015-11-25 | 成都中科创达软件有限公司 | 一种本地、远程设备控制方法及装置 |
CN105120100B (zh) * | 2015-09-01 | 2018-01-19 | 广东欧珀移动通信有限公司 | 一种具有被盗防刷机功能的移动终端及其防刷机方法 |
CN105262885B (zh) * | 2015-09-01 | 2018-09-04 | 广东欧珀移动通信有限公司 | 一种具有锁卡防盗功能的移动终端及其锁卡防盗方法 |
CN105488440A (zh) * | 2015-11-23 | 2016-04-13 | 广东欧珀移动通信有限公司 | 安全保护方法和终端设备 |
CN107517301A (zh) * | 2016-06-16 | 2017-12-26 | 成都鼎桥通信技术有限公司 | 移动终端的数据保护方法和装置 |
CN108959974A (zh) * | 2018-06-29 | 2018-12-07 | 中国科学院信息工程研究所 | 移动终端的安全防护方法和系统 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103606238A (zh) * | 2013-11-22 | 2014-02-26 | 赵福贵 | 新型手机防盗器系统 |
CN103905649A (zh) * | 2014-04-16 | 2014-07-02 | 北京联合大学 | 一种基于蓝牙技术的手机防盗系统 |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101208212B1 (ko) * | 2010-12-16 | 2012-12-04 | 엘지전자 주식회사 | 네트워크 시스템 및 그 제어방법 |
CN103914972B (zh) * | 2013-12-31 | 2018-10-12 | 海尔集团公司 | 一种家电控制装置及其红外学习方法 |
CN103945385B (zh) * | 2014-03-27 | 2018-02-13 | 宇龙计算机通信科技(深圳)有限公司 | 移动终端防盗的方法及其装置 |
CN104202370A (zh) * | 2014-08-19 | 2014-12-10 | 广州金山网络科技有限公司 | 移动终端及其远程控制方法、系统、服务器及远程控制端 |
-
2015
- 2015-01-20 CN CN201510026623.0A patent/CN104537311A/zh active Pending
- 2015-02-28 WO PCT/CN2015/073436 patent/WO2016115760A1/zh active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103606238A (zh) * | 2013-11-22 | 2014-02-26 | 赵福贵 | 新型手机防盗器系统 |
CN103905649A (zh) * | 2014-04-16 | 2014-07-02 | 北京联合大学 | 一种基于蓝牙技术的手机防盗系统 |
Also Published As
Publication number | Publication date |
---|---|
CN104537311A (zh) | 2015-04-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12001857B2 (en) | Device locator disable authentication | |
WO2016115760A1 (zh) | 一种终端系统的控制方法、装置和终端 | |
US10395068B2 (en) | User account for system protection or recovery | |
CN107622203B (zh) | 敏感信息的保护方法、装置、存储介质及电子设备 | |
EP3161720B1 (en) | Data protection based on user and gesture recognition | |
EP2574022B1 (en) | Mobile terminal and method of providing security thereto | |
EP3161645B1 (en) | Fast data protection using dual file systems | |
US20160267290A1 (en) | Information viewing method, device, system and storage medium | |
JP5981035B2 (ja) | ハードウェアによるアクセス保護 | |
WO2016015551A1 (zh) | 提高移动终端安全性的方法及系统 | |
US9800577B2 (en) | Method and apparatus for controlling communications terminal and corresponding communications terminal | |
US20220350881A1 (en) | Access monitoring of mobile device in possession by unauthorized user | |
US20150094023A1 (en) | Retroactively Securing a Mobile Device From a Remote Source | |
CN110770728A (zh) | 无人机控制方法、无人机及控制无人机的终端 | |
TWI789350B (zh) | Wifi安全防護系統、無線網路防護方法、裝置及電子設備 | |
US20120311722A1 (en) | Electronic systems with data protection functions | |
CN105809045A (zh) | 一种设备系统在数据重置时的处理方法和装置 | |
CN111316269A (zh) | 一种终端的安全保护方法及装置 | |
TW201926117A (zh) | 電子裝置及其解鎖方法 | |
EP3098744A1 (en) | A remotely protected electronic device | |
KR101236547B1 (ko) | 이동 단말기, 이동 단말기의 제어 방법 및 이동 단말기를 이용한 개인 정보 보호 시스템 | |
KR101873739B1 (ko) | 이동 단말기 및 그 보안 제공방법 | |
WO2023024888A1 (zh) | 数据处理方法、装置、设备及存储介质 | |
KR101871715B1 (ko) | 이동 단말기 및 그 보안 제공방법 | |
CN113420278A (zh) | 数据删除方法、装置、电子设备和计算机可读存储介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15878437 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 15878437 Country of ref document: EP Kind code of ref document: A1 |