WO2016192499A1 - Terminal management method and terminal - Google Patents

Terminal management method and terminal Download PDF

Info

Publication number
WO2016192499A1
WO2016192499A1 PCT/CN2016/080595 CN2016080595W WO2016192499A1 WO 2016192499 A1 WO2016192499 A1 WO 2016192499A1 CN 2016080595 W CN2016080595 W CN 2016080595W WO 2016192499 A1 WO2016192499 A1 WO 2016192499A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
operating system
user
information
data
Prior art date
Application number
PCT/CN2016/080595
Other languages
French (fr)
Chinese (zh)
Inventor
刘岩
王文林
张娜
孙巍
Original Assignee
宇龙计算机通信科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 宇龙计算机通信科技(深圳)有限公司 filed Critical 宇龙计算机通信科技(深圳)有限公司
Publication of WO2016192499A1 publication Critical patent/WO2016192499A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent

Definitions

  • the present invention relates to the field of computer technologies, and in particular, to a terminal management method and a terminal.
  • the prior art solution is to perform identity verification through the operating system. When the verification fails, the location information is sent to the preset mobile phone number, so that the user can retrieve the mobile phone according to the clue in the short message.
  • the drawback of the prior art is that it takes a long time for the user to receive the short message clue to retrieve the mobile phone, and the important information in the mobile phone still has the risk of being lost.
  • the embodiment of the invention discloses a terminal management method and a terminal, which can timely process information in the terminal to prevent loss of important information in the mobile phone.
  • an embodiment of the present invention provides a terminal management method, where the terminal includes an operating system, and the terminal is provided with a security system independent of the operating system, and the method includes:
  • the security system acquires user operation information when the terminal is operated
  • the security system When it is determined that the abnormality is abnormal, the security system sends a data backup instruction to the operating system, so that the operating system connects to the network according to the data backup instruction, and uploads the data information in the operating system to the data of the network end. Backup platform.
  • the operating system is connected to the network according to the data backup instruction, and uploads the data information in the operating system to a data backup platform of the network.
  • the operating system connects to the network according to the data backup instruction, and does not output prompt information that the network connection is successful;
  • the operating system uploads the data information contained in the operating system to the data backup platform on the network, and does not output prompt information indicating the upload status.
  • the method further includes:
  • the security system sends an operation instruction to the current operating system of the terminal, so that the current operating system sends the status information of the terminal to a preset phone number according to the operation instruction, where the operation instruction carries There is the preset phone number.
  • the current operating system sends the terminal to a preset phone number according to the operation instruction Status information, including:
  • the current operating system sends the status information of the terminal to a preset phone number according to the operation instruction, and does not output prompt information indicating a sending status and a record that does not retain the sending.
  • the terminal determines that the abnormality is abnormal, if the user actively makes a call or sends a message, the terminal automatically connects the phone to the pre-stored number, or sends the short message to the pre-stored number, but displays it to the user.
  • the person is the number that the connected user actually wants to connect or send.
  • the owner of the terminal is Zhang San
  • the pre-stored number in the terminal is 13085402915, but the terminal is obtained by Li Si.
  • Li Si uses the mobile phone to dial or send a message to 18612055981.
  • the terminal confirms the abnormality of the terminal according to the biological information such as fingerprints.
  • the terminal connects or sends the information such as the location of the phone or the message carrying terminal to 13085402915, but the reality is given to Li Si.
  • the connected 18612055981 or SMS was successfully sent to 18612055981.
  • the security system determines, according to the user operation information, whether the identity of the user that operates the terminal is abnormal, including:
  • the biometric verification function of the terminal main program interface it is determined whether the acquired user biometrics match the preset user biometrics, and if not, the user identity is determined to be abnormal; or
  • the password verification function of the terminal main program interface When the password verification function of the terminal main program interface is enabled, determining whether the first user has input a password that does not match the preset password multiple times, performing an operation of triggering the terminal to replace the operating system, if Then, it is determined that the user identity is abnormal.
  • an embodiment of the present invention provides a terminal, where the terminal includes an operating system, where the terminal is provided with a security system independent of the operating system, and the security system includes:
  • An obtaining unit configured to acquire user operation information when the terminal is operated
  • a determining unit configured to determine, according to the user operation information, whether an identity of a user operating the terminal is abnormal
  • a first sending unit configured to send a data backup instruction to the operating system when the determining unit determines that the user identity is abnormal, so that the operating system connects to the network according to the data backup instruction, and connects the operating system
  • the data information in the data is uploaded to the data backup platform on the network side.
  • the operating system is connected to the network according to the data backup instruction, and uploads the information information in the operating system to the data backup platform of the network.
  • the operating system connects to the network according to the data backup instruction, and does not output prompt information that the network connection is successful;
  • the operating system uploads the data information contained in the operating system to the data backup platform on the network, and does not output prompt information indicating the upload status.
  • the terminal further includes:
  • a second sending unit configured to send an operation instruction to a current operating system of the terminal, so as to The current operating system sends the status information of the terminal to a preset phone number according to the operation instruction, where the operation instruction carries the preset phone number.
  • the current operating system sends the status of the terminal to a preset phone number according to the operation instruction.
  • Information including:
  • the current operating system sends the status information of the terminal to a preset phone number according to the operation instruction, and does not output prompt information indicating a sending status and a record that does not retain the sending.
  • the determining unit is specifically configured to:
  • the biometric verification function of the terminal main program interface it is determined whether the acquired user biometrics match the preset user biometrics, and if not, the user identity is determined to be abnormal; or
  • the password verification function of the terminal main program interface When the password verification function of the terminal main program interface is enabled, determining whether the first user has input a password that does not match the preset password multiple times, performing an operation of triggering the terminal to replace the operating system, if Then, it is determined that the user identity is abnormal.
  • a security system independent of the operating system is set in the terminal, and the security system identifies the user operation information of the terminal to determine whether the user of the operation terminal is abnormal, and if abnormal, triggers the operating system to preset data.
  • the backup platform sends important data, effectively preventing the loss of important information in the terminal.
  • the security system when transmitting the important information, the security system triggers the operating system not to output the prompt information of the successful network connection, and does not output the prompt information for the data uploading, so that other users currently holding the terminal cannot detect the important information being performed.
  • Uploading judging whether the identity of the user using the terminal is abnormal according to the user operation habits pre-summarized, if the abnormality is performed, the operation of uploading the important material information is performed; further, determining whether the identity of the user is abnormal is completed by the security system, due to the security system and The operating system is independent of each other. Even if the terminal is flashed, the terminal can determine whether the user identity is abnormal through the parameter information set by the original user in the security system.
  • the security system can trigger the operating system to use the phone number pre-stored in the security system. Send a text message to the original user to inform the terminal
  • the previous state (such as location, SIM card number, etc.) allows the original user to retrieve the mobile phone as much as possible; further, the security system triggers the operating system to not send the sent status information when sending the short message, and does not retain the short message in the terminal.
  • the record improves the privacy; further, after determining the identity of the user, the security system can also trigger the operating system to open the relevant module to collect the current user information (such as photos, ID cards, etc.) and send it to the preset mobile phone.
  • the authentication method can be iris verification, fingerprint verification, eye pattern verification, face verification, palm print verification, voiceprint verification, etc., due to each person's These biometrics are basically unique and can improve the accuracy of the verification.
  • FIG. 1 is a schematic flowchart of a terminal management method according to an embodiment of the present invention.
  • FIG. 2 is a schematic flowchart of still another terminal management method according to an embodiment of the present invention.
  • FIG. 3 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
  • FIG. 4 is a schematic structural diagram of still another terminal according to an embodiment of the present invention.
  • FIG. 5 is a schematic structural diagram of still another terminal according to an embodiment of the present invention.
  • the terminal described in the embodiment of the present invention may be a mobile phone, a tablet computer, a notebook computer, a palmtop computer, a mobile internet device (MID), a wearable device (such as a smart watch (such as iWatch, etc.), a smart bracelet, and a meter. Stepper, etc.) or other terminal device that can be installed to deploy the instant messaging application client.
  • MID mobile internet device
  • a wearable device such as a smart watch (such as iWatch, etc.), a smart bracelet, and a meter. Stepper, etc.
  • a smart bracelet such as iWatch, etc.
  • a meter. Stepper, etc. or other terminal device that can be installed to deploy the instant messaging application client.
  • FIG. 1 is a schematic flowchart of a method for managing a terminal according to an embodiment of the present invention, where the method includes but is not limited to the following steps.
  • Step S101 The security system acquires user operation information when the terminal is operated.
  • the terminal includes an operating system and a security system, and data interaction can be performed between the operating system and the security system.
  • the security system can send an instruction to the operating system to cause the operating system to perform corresponding operations according to the instruction.
  • the security system and the operating system are independent of each other. Take a scenario as an example. After the user replaces the operating system of the terminal, the security system in the terminal remains, and the data in the security system is not lost.
  • the security system can also be connected to the terminal. The replaced operating system performs data interaction.
  • the security system can directly control the user interface on the terminal to obtain user operation information; and can also obtain user operation information from the operating system.
  • the operating system itself can obtain user operation information in real time, and when receiving the request instruction of the security system, the security system will obtain The user operation information obtained is sent to the security system.
  • the foregoing operation may be a password unlocking operation, a biometric feature (iris recognition, fingerprint recognition, eye pattern recognition, face recognition, palmprint recognition, voiceprint recognition, etc.) performed by the user on the terminal for entering the terminal main program interface.
  • Unlock operation slide unlock operation, button unlock operation, brush operation, etc.
  • the user operation information is some user information or operation information acquired by the security system when the user performs the above operation.
  • the obtained user operation information may include whether the password unlocking fails, the number of failures, and whether there is a failure after the failure.
  • the operation information of the operating system is refreshed.
  • the obtained user operation information may include the fingerprint of the user collected by the information collection interface module in the terminal, and the number of times the fingerprint is collected within a preset time.
  • the obtained user operation information may include some biometric information of the user acquired through the information collection interface module in the terminal, where The acquisition rule for acquiring the biometrics may be further set, for example, not acquiring the biometric information every time the sliding unlock is sensed, but acquiring the biometric information when the sliding is unlocked for the first time after the booting, or each day
  • the acquired user operation information may include some biometric information of the user acquired through the information collection interface module in the terminal. Wait.
  • Step S102 The security system determines, according to the user operation information, whether the identity of the user operating the terminal is abnormal.
  • the user operation information is acquired, the user operation information is processed and analyzed, and the result of the processing analysis is used to determine whether the identity of the user operating the terminal is abnormal.
  • the user enters the main program interface of the terminal by verifying the fingerprint (which may of course be iris recognition, eye pattern, face, palm print, voice print, etc.), the fingerprint acquired by the security system and the pre-recorded fingerprint. If the user does not match, it may be determined that the user identity is abnormal. (Further, the judgment condition may also be added. For example, when the obtained fingerprint does not match the pre-recorded fingerprint and the user also performs a related operation of refreshing the system, it is determined that the user identity is abnormal. ).
  • the fingerprint which may of course be iris recognition, eye pattern, face, palm print, voice print, etc.
  • the security system compares the obtained number of user input errors with a preset number of times threshold, when the number of errors reaches a preset threshold.
  • the user identity may be abnormal.
  • the judgment condition may also be increased.
  • the user identity is determined to be abnormal.
  • the user can have other verification methods when entering the main program interface.
  • the principle of the above analysis and judgment can also be used to determine whether the user identity is abnormal.
  • the biometrics can be verified according to preset rules, and the biometrics are verified as biometrics. If the preset feature does not match, the user identity is determined to be abnormal.
  • Step S103 When it is determined that the abnormality is abnormal, the security system sends a data backup instruction to the operating system, so that the operating system connects to the network according to the data backup instruction, and uploads the data information in the operating system to the data backup platform of the network.
  • the material information may include contact information in the terminal, a photo in the terminal, and the like, and the data information is not limited herein.
  • the data backup platform establishes a binding relationship with the terminal in advance, and the operating system can establish a network connection between the terminal and the data backup platform according to the data backup instruction.
  • each terminal may correspond to an account in the data backup system.
  • the operating system uploads the data information
  • the operating system only uploads the data information to the account corresponding to the terminal to which the terminal belongs.
  • the data backup instruction may include a username and password for logging in to the account, a data backup platform address lookup subcommand, a login subcommand, an upload subcommand, and the like.
  • the operating system searches for the network address of the data backup platform according to the platform address search sub-instruction, and enters the login interface of the login data backup platform in the background of the terminal through the browser, and then inputs the above-mentioned user name and password into the corresponding text box.
  • the login operation is performed, and after the login is successful, the operation of the above-mentioned data information is performed according to the upload sub-command.
  • the uploading may also be performed according to a preset uploading priority, and the priority parameter may be encapsulated in a data backup instruction.
  • the user name and password may be set by a user who initially uses the terminal, or may be preset in the terminal when the terminal is produced.
  • the operating system may also delete the information, and after all the data information is sent, the data may be uniformly deleted, or deleted while being sent; the operating system is specifically deleted according to the security system. Instructions to perform the delete task.
  • the operating system connects to the network according to the data backup instruction, and uploads the data information in the operating system to the data backup platform of the network, including: the operating system connects to the network according to the data backup instruction, and does not output the network connection. Successful prompt information; the operating system uploads the data information contained in the operating system to the data backup platform on the network side, and does not output prompt information indicating the upload status.
  • the operating system does not output the network when connecting to the network (including the wireless network and the data network).
  • the network including the wireless network and the data network.
  • the network connection icon When the network connection is successful, the network connection icon is brightened by gray.
  • the display effect is specifically implemented by the operating system.
  • the data backup command sent by the security system to the operating system indicates that the operating system keeps the network connection icon gray when the network connection is successful.
  • the security system sends the file to the operating system.
  • the data backup instruction instructs the operating system not to display the icon of the data upload when the data is uploaded.
  • a security system independent of an operating system is set in the terminal, and the security system identifies user operation information of the terminal to determine whether the user of the operation terminal is abnormal, and if abnormal, triggers the operating system in time.
  • the preset data backup platform sends important data, effectively preventing the loss of important information in the terminal.
  • FIG. 2 is a schematic flowchart diagram of still another method for managing a terminal according to an embodiment of the present invention, where the method includes but is not limited to the following steps.
  • Step S201 The security system acquires user operation information when the terminal is operated.
  • the terminal includes an operating system and a security system, and data interaction can be performed between the operating system and the security system.
  • the security system can send an instruction to the operating system to cause the operating system to perform corresponding operations according to the instruction.
  • the security system and the operating system are independent of each other. Take a scenario as an example. After the user replaces the operating system of the terminal, the security system in the terminal remains, and the data in the security system is not lost.
  • the security system can also be connected to the terminal. The replaced operating system performs data interaction.
  • the security system can directly control the user interface on the terminal to obtain user operation information; and can also obtain user operation information from the operating system.
  • the operating system itself can obtain user operation information in real time, and when receiving the request instruction of the security system, the security system will obtain The user operation information obtained is sent to the security system.
  • the foregoing operation may be a password unlocking operation, a biometric feature (iris recognition, fingerprint recognition, eye pattern recognition, face recognition, palm print) performed by the user on the terminal for entering the terminal main program interface. Recognition, voiceprint recognition, etc.) unlocking operation, sliding unlocking operation, button unlocking operation, brushing operation, and the like.
  • the user operation information is some user information or operation information acquired by the security system when the user performs the above operation.
  • the obtained user operation information may include whether the password unlocking fails, the number of failures, whether there is a related operation of refreshing the operating system after the failure, and the like;
  • the obtained user operation information may include information of the user's fingerprint collected by the information collection interface module in the terminal, the number of times the fingerprint is collected within a preset time period, and whether the related operation of the operating system is refreshed;
  • the acquired user operation information may include some biometric information of the user acquired by the information collecting interface module in the terminal, wherein the acquiring rules for acquiring the biometrics may further be set, for example, not The biometric information is acquired every time the sliding is unlocked, but the biometric information is acquired when the sliding is unlocked for the first time after the power is turned on, or the biometric information is acquired when the sliding sens
  • Step S202 The security system determines, according to the user operation information, whether the identity of the user operating the terminal is abnormal.
  • the user operation information is acquired, the user operation information is processed and analyzed, and the result of the processing analysis is used to determine whether the identity of the user operating the terminal is abnormal.
  • the user enters the main program interface of the terminal by verifying the fingerprint (which may of course be iris recognition, eye pattern, face, palm print, voice print, etc.), the fingerprint acquired by the security system and the pre-recorded fingerprint. If the user does not match, it may be determined that the user identity is abnormal. (Further, the judgment condition may also be added. For example, when the obtained fingerprint does not match the pre-recorded fingerprint and the user also performs a related operation of refreshing the system, it is determined that the user identity is abnormal. ).
  • the fingerprint which may of course be iris recognition, eye pattern, face, palm print, voice print, etc.
  • the security system compares the obtained number of user input errors with a preset number of times threshold, when the number of errors reaches a preset threshold. , it can be judged that the user identity is abnormal (further, the judgment condition can also be increased, for example, the number of errors reaches a preset threshold and the user also When the related operation of refreshing the system is performed, it is determined that the user identity is abnormal.
  • the user can have other verification methods when entering the main program interface.
  • the principle of the above analysis and judgment can also be used to determine whether the user identity is abnormal.
  • the biometric feature may be obtained according to a preset rule, and the biometric feature is verified. When the biometric feature does not match the preset feature, the user identity is determined to be abnormal.
  • Step S203 When it is determined that the abnormality is abnormal, the security system sends a data backup instruction to the operating system, so that the operating system connects to the network according to the data backup instruction, and uploads the material information in the operating system to the data backup platform of the network.
  • the material information may include contact information in the terminal, a photo in the terminal, and the like, and the data information is not limited herein.
  • the data backup platform establishes a binding relationship with the terminal in advance, and the operating system can establish a network connection between the terminal and the data backup platform according to the data backup instruction.
  • each terminal may correspond to an account in the data backup system.
  • the operating system uploads the data information
  • the operating system only uploads the data information to the account corresponding to the terminal to which the terminal belongs.
  • the data backup instruction may include a username and password for logging in to the account, a data backup platform address lookup subcommand, a login subcommand, an upload subcommand, and the like.
  • the operating system searches for the network address of the data backup platform according to the platform address search sub-instruction, and enters the login interface of the login data backup platform in the background of the terminal through the browser, and then inputs the above-mentioned user name and password into the corresponding text box.
  • the login operation is performed, and after the login is successful, the operation of the above-mentioned data information is performed according to the upload sub-command.
  • the uploading may also be performed according to a preset uploading priority, and the priority parameter may be encapsulated in a data backup instruction.
  • the user name and password may be set by a user who initially uses the terminal, or may be preset in the terminal when the terminal is produced.
  • the operating system may also delete the information, and after all the data information is sent, the data may be uniformly deleted, or deleted while being sent; the operating system is specifically deleted according to the security system. Instructions to perform the delete task.
  • the operating system connects to the network based on data backup instructions and will operate
  • the data information in the system is uploaded to the data backup platform of the network, including: the operating system connects to the network according to the data backup instruction, and does not output the prompt information of the successful network connection; the operating system uploads the data information contained in the system to the data backup platform of the network.
  • the prompt information indicating the upload status is not output.
  • the prompt information of the successful network connection is not output.
  • the network including the wireless network and the data network
  • the prompt information of the successful network connection is not output.
  • the network connection icon For example, most mobile phones currently have a network connection icon, and when the network connection is successful, the network connection icon
  • the data backup command sent by the security system to the operating system indicates that the operating system keeps the network connection icon gray when the network connection is successful.
  • the security system sends the file to the operating system.
  • the data backup instruction instructs the operating system not to display the icon of the data upload when the data is uploaded.
  • Step S204 The security system sends an operation instruction to the current operating system of the terminal, so that the current operating system sends the status information of the terminal to the preset phone number according to the operation instruction, where the operation instruction carries the preset phone number.
  • the preset phone number may be a phone number set by a user who initially uses the terminal (hereinafter referred to as the original user), and the user setting is stored in the security system.
  • the operation instruction is used to trigger the function of the short message of the operating system, and input the preset phone number into the short message edit box and add the above state information, further triggering the operating system to send the edited short message content.
  • the foregoing status information includes, but is not limited to, current location information of the terminal, a SIM card phone number currently placed in the terminal, and the like.
  • the preset phone number may be a phone number used by the original user, or may be a phone number of another person (such as a friend, a relative, or the like of the original user), so that when the terminal is not used by the original user, The terminal will send information to the original user (or its friends, relatives) to facilitate the original user to retrieve the terminal.
  • the current operating system sends the status information of the terminal to the preset phone number according to the operation instruction, including: the current operating system sends the preset phone number according to the operation instruction.
  • the status information of the terminal is transmitted, and the prompt information indicating the transmission status and the record not being transmitted are not output.
  • the security system sends an instruction to the operating system to prevent the operating system from performing the above prompting.
  • the security system sends an instruction to prevent the operating system from retaining or deleting the SMS record.
  • the operating system opens the positioning system (such as GPS, Beidou positioning system, etc.) in the terminal to obtain the current location information of the terminal before sending the short message to the preset phone number.
  • the positioning system is The positioning system is turned on in response to the relevant instructions sent by the security system.
  • the prompt information is outputted in the corresponding part of the terminal to prompt the user to locate the system.
  • the instruction sent by the security system to the operating system causes the operating system.
  • the positioning system is turned on, but no prompt message is output.
  • the security system may further send a shooting instruction to the operating system, so that the operating system turns on the current surrounding image of the camera shooting terminal, and uploads the screen to the data backup.
  • the platform or SMS is sent to the above preset phone number.
  • sequence of the process of sending the short message and the process of uploading the data information is not limited herein, and no matter which process is before or after, it is a complete implementable solution. .
  • a security system independent of the operating system is set in the terminal, and the security system identifies user operation information of the terminal to determine whether the user of the operation terminal is abnormal, and if abnormal, triggers the operating system to
  • the preset data backup platform sends important data, effectively preventing the loss of important information in the terminal.
  • the security system when transmitting these important information, the security system triggers the operating system not to output the network connection.
  • the successful prompt information is not output, and the prompt information for data uploading is not output, so that other users currently holding the terminal cannot detect the uploading of important information; the user identity of the used terminal is judged according to the user operation habits pre-summed. Whether it is abnormal, if an abnormality is performed, the operation of uploading important material information is performed; further, determining whether the user identity is abnormal is completed by the security system, since the security system and the operating system are independent of each other, even if the terminal is brushed, the terminal can still pass through the security system.
  • the parameter information set by the original user is used to determine whether the user identity is abnormal.
  • the security system may trigger the operating system to send a short message to the original user according to the phone number pre-stored in the security system to inform the terminal of the current state (such as location, SIM card number, etc.) ), so that the original user can retrieve the mobile phone as much as possible; further, the security system will trigger the operating system to not send the sent status information when sending the short message, and the record of the short message is not retained in the terminal, thereby improving the privacy; further Ground, in judgment After the identity is abnormal, the security system can also trigger the operating system to open the relevant module to collect the current user information (such as photos, ID cards, etc.) and send it to the preset mobile phone, so as to provide more useful clues for the original user to retrieve the mobile phone;
  • the authentication method can be verified by iris verification, fingerprint verification, eye pattern verification, face verification, palm print verification, voiceprint verification, etc. Since each of these biometric features is basically unique, the accuracy of verification can be improved. .
  • FIG. 3 is a schematic structural diagram of a terminal 30 according to an embodiment of the present invention.
  • the terminal 30 may include an operating system 301 and a security system 302.
  • the security system 302 may include an obtaining unit 3021, a determining unit 3022, and a first The transmitting unit 3023, wherein the detailed description of each unit is as follows.
  • the obtaining unit 3021 is configured to acquire user operation information when the terminal 30 is operated.
  • the terminal 30 includes an operating system 301 and a security system 302.
  • Data interaction can be performed between the operating system 301 and the security system 302.
  • the security system 302 can send an instruction to the operating system 301 to cause the operating system 301 to execute according to the instruction.
  • the corresponding operation The security system 302 and the operating system 301 are independent of each other. Taking a scenario as an example, after the user replaces the operating system 301 of the terminal 30, the security system 302 in the terminal 30 remains, and the data in the security system 302 is not lost.
  • the security system 302 can also perform data interaction with the replaced operating system 301 in the terminal 30.
  • the obtaining unit 3021 can directly control the user interface on the terminal 30 to obtain the user operation information.
  • the user operation information can also be obtained from the operating system 301.
  • the operating system 301 itself obtains the user operation information in real time, and receives the request of the obtaining unit 3021.
  • the acquired user operation information is sent to the obtaining unit 3021.
  • the foregoing operation may be a password unlocking operation performed by the user on the terminal 30 for entering the main program interface of the terminal 30, biometrics (iris recognition, fingerprint recognition, eye pattern recognition, face recognition, palmprint recognition, voiceprint recognition). Etc.) Unlock operation, slide unlock operation, button unlock operation, brush operation, etc.
  • the user operation information is the acquisition unit 3021 that senses some user information or operation information acquired when the user performs the above operation.
  • the obtained user operation information may include whether the password unlocking fails, the number of failures, whether there is a related operation of refreshing the operating system 301 after the failure, and the like when the user is sensed.
  • the acquired user operation information may include the fingerprint of the user collected by the information collection interface module in the terminal 30, the number of times the fingerprint is collected within a preset time period, and whether the related operation of the operating system 301 is refreshed.
  • the obtained user operation information may include some biometric information of the user acquired by the information collecting interface module in the terminal 30, wherein the acquiring rules for acquiring the biometrics may further be set.
  • the biometric information is not acquired every time the sliding unlock is sensed, but the biometric information is acquired when the sliding sensing is first detected after the power is turned on, or the creature is acquired when the sliding sensing is first sensed every day. Feature information, etc.; when the user refresh system is sensed
  • the obtained user operation information may include some biometric information of the user acquired through the information collection interface module in the terminal 30.
  • the determining unit 3022 is configured to determine, according to the user operation information, whether the identity of the user operating the terminal 30 is abnormal.
  • the determining unit 3022 performs processing analysis on the user operation information, and the result of the processing analysis is used to determine whether the user identity of the user operating on the terminal 30 is abnormal.
  • the determining unit 3022 analyzes and obtains the acquisition unit 3021.
  • the user identity may be determined to be abnormal (further, the judgment condition may also be added, for example, the analysis finds that the obtained fingerprint does not match the pre-recorded fingerprint and the user also performs the refresh.
  • the system is related to the operation, it is determined that the user identity is abnormal).
  • the determining unit 3022 compares the obtained number of times the user inputs an error with a preset number of times threshold, and when the number of errors reaches the preset
  • the user identity may be abnormal.
  • the judgment condition may also be increased.
  • the biometric feature may be obtained according to a preset rule, and the biometric feature is verified. When the biometric feature does not match the preset feature, the user identity is determined to be abnormal.
  • the first sending unit 3023 is configured to send a data backup instruction to the operating system 301 when the determining unit 3022 determines that the user identity is abnormal, so that the operating system 301 connects to the network according to the data backup instruction, and uploads the material information in the operating system 301 to the A data backup platform on the network side.
  • the material information may include contact information in the terminal 30, photos in the terminal 30, and the like, and the data information is not limited herein.
  • the data backup platform establishes a binding relationship with the terminal 30 in advance, and the operating system 301 can establish a network connection between the terminal 30 and the data backup platform according to the data backup instruction.
  • each terminal 30 can correspond to an account in the data backup system.
  • the operating system 301 uploads the data information only to the account corresponding to the terminal 30 to which the terminal belongs.
  • the data backup instruction may include a username and password for logging in to the account, a data backup platform address lookup subcommand, a login subcommand, an upload subcommand, and the like.
  • the operating system 301 searches for the network address of the data backup platform according to the platform address search sub-instruction, and enters the login interface of the login data backup platform in the background of the terminal 30 through the browser, and then The above user name and password are input into the corresponding text box, and then the login operation is performed according to the login sub-command.
  • the above-mentioned data information operation is performed according to the upload sub-command. Further, when there is more data information, the uploading may also be performed according to a preset uploading priority, and the priority parameter may be encapsulated in a data backup instruction.
  • the user name and password may be set by a user who initially uses the terminal 30, or may be preset in the terminal 30 when the terminal 30 is produced.
  • the operating system 301 may be deleted, and all the data information may be uniformly deleted after being sent, or may be deleted while being sent; the operating system 301 is specifically configured according to the first sending.
  • the delete instruction sent by unit 3023 performs the delete task.
  • the operating system 301 connects to the network according to the data backup instruction, and uploads the data information in the operating system 301 to the data backup platform of the network, including: the operating system 301 connects to the network according to the data backup instruction, and does not The prompt information indicating that the network connection is successful is output; the operating system 301 uploads the data information included in the network to the data backup platform of the network, and does not output prompt information indicating the upload status.
  • the prompt information of the successful network connection is not output.
  • the network connection is successful, the network connection is The icon is highlighted by the gray color.
  • the display effect is specifically implemented by the operating system 301.
  • the data backup instruction sent by the first sending unit 3023 to the operating system 301 indicates that the operating system 301 is successful when the network connection is successful. Still keep the network connection icon gray.
  • the terminal 30 uploads data to the network the icon of the data upload is displayed, and the icon is also controlled by the operating system 301.
  • the first sending unit 3023 The data backup instruction sent to the operating system 301 instructs the operating system 301 not to display the icon for data upload when performing data upload.
  • each unit may also correspond to the corresponding description of the method embodiment shown in FIG. 1 .
  • security independent of the operating system 301 is set in the terminal 30.
  • the system 302 identifies the user operation information of the terminal 30 to determine whether the user of the operation terminal 30 is abnormal. If abnormal, the operating system 301 is triggered to send important data to the preset data backup platform in time, thereby effectively preventing the terminal 30. The loss of important information.
  • FIG. 4 is a schematic structural diagram of another terminal 30 according to an embodiment of the present invention.
  • the terminal 30 may include an operating system 301 and a security system 302.
  • the security system 302 may include an obtaining unit 3021 and a determining unit 3022.
  • the obtaining unit 3021 is configured to acquire user operation information when the terminal is operated.
  • the terminal 30 includes an operating system 301 and a security system 302.
  • Data interaction can be performed between the operating system 301 and the security system 302.
  • the security system 302 can send an instruction to the operating system 301 to cause the operating system 301 to execute according to the instruction.
  • the corresponding operation The security system 302 and the operating system 301 are independent of each other. Taking a scenario as an example, after the user replaces the operating system 301 of the terminal 30, the security system 302 in the terminal 30 remains, and the data in the security system 302 is not lost.
  • the security system 302 can also perform data interaction with the replaced operating system 301 in the terminal 30.
  • the obtaining unit 3021 can directly control the user interface on the terminal 30 to obtain the user operation information.
  • the user operation information can also be obtained from the operating system 301.
  • the operating system 301 itself obtains the user operation information in real time, and receives the request of the obtaining unit 3021.
  • the acquired user operation information is sent to the obtaining unit 3021.
  • the foregoing operation may be a password unlocking operation performed by the user on the terminal 30 for entering the main program interface of the terminal 30, biometrics (iris recognition, fingerprint recognition, eye pattern recognition, face recognition, palmprint recognition, voiceprint recognition). Etc.) Unlock operation, slide unlock operation, button unlock operation, brush operation, etc.
  • the user operation information is the acquisition unit 3021 that senses some user information or operation information acquired when the user performs the above operation.
  • the obtained user operation information may include whether the password unlocking fails, the number of failures, whether there is a related operation of refreshing the operating system 301 after the failure, and the like when the user is sensed.
  • the obtained user operation information may include the fingerprint of the user collected by the information collection interface module in the terminal 30, the number of times the fingerprint is collected within the preset time, and whether the phase of the operating system 301 is refreshed.
  • the obtained user operation information may include some biometric information of the user acquired through the information collection interface module in the terminal 30, wherein the acquisition of the biometric feature is obtained.
  • the rule can be further set, for example, not acquiring biometric information every time the sliding unlock is sensed, but acquiring biometric information when sensing the sliding unlocking for the first time after powering on, or sensing the sliding for the first time every day.
  • the biometric information and the like are obtained when the user is unlocked.
  • the acquired user operation information may include some biometric information of the user acquired through the information collection interface module in the terminal 30.
  • the determining unit 3022 is configured to determine, according to the user operation information, whether the identity of the user who operates the terminal is abnormal.
  • the determining unit 3022 performs processing analysis on the user operation information, and the result of the processing analysis is used to determine whether the user identity of the user operating on the terminal 30 is abnormal.
  • the determining unit 3022 analyzes and obtains the acquisition unit 3021.
  • the user identity may be determined to be abnormal (further, the judgment condition may also be added, for example, the analysis finds that the obtained fingerprint does not match the pre-recorded fingerprint and the user also performs the refresh.
  • the system is related to the operation, it is determined that the user identity is abnormal).
  • the determining unit 3022 compares the obtained number of times the user inputs an error with a preset number of times threshold, and when the number of errors reaches the preset
  • the user identity may be abnormal.
  • the judgment condition may also be increased.
  • the biometric feature may be obtained according to a preset rule, and the biometric feature is verified. When the biometric feature does not match the preset feature, the user identity is determined to be abnormal.
  • the first sending unit 3023 is configured to send a data backup instruction to the operating system when the determining unit 3022 determines that the user identity is abnormal, so that the operating system connects to the network according to the data backup instruction, and uploads the data information in the operating system to the data of the network. Backup platform.
  • the material information may include contact information in the terminal 30, photos in the terminal 30, and the like, and the data information is not limited herein.
  • the data backup platform establishes a binding relationship with the terminal 30 in advance, and the operating system 301 can establish a network connection between the terminal 30 and the data backup platform according to the data backup instruction.
  • each terminal 30 can correspond to an account in the data backup system.
  • the operating system 301 uploads the data information only to the account corresponding to the terminal 30 to which the terminal belongs.
  • the data backup instruction may include a username and password for logging in to the account, a data backup platform address lookup subcommand, a login subcommand, an upload subcommand, and the like.
  • the operating system 301 searches for the network address of the data backup platform according to the platform address search sub-instruction, and enters the login interface of the login data backup platform in the background of the terminal 30 through the browser, and then inputs the above-mentioned username and password into the corresponding text box.
  • the login operation is performed according to the login sub-instruction, and after the login is successful, the operation of the above-mentioned data information is performed according to the upload sub-command.
  • the uploading may also be performed according to a preset uploading priority, and the priority parameter may be encapsulated in a data backup instruction.
  • the user name and password may be set by a user who initially uses the terminal 30, or may be preset in the terminal 30 when the terminal 30 is produced.
  • the operating system 301 may be deleted, and all the data information may be uniformly deleted after being sent, or may be deleted while being sent; the operating system 301 is specifically configured according to the first sending.
  • the delete instruction sent by unit 3023 performs the delete task.
  • the operating system 301 connects to the network according to the data backup instruction, and uploads the data information in the operating system 301 to the data backup platform of the network, including: the operating system 301 connects to the network according to the data backup instruction, and does not The prompt information indicating that the network connection is successful is output; the operating system 301 uploads the data information included in the network to the data backup platform of the network, and does not output prompt information indicating the upload status.
  • the prompt information of the successful network connection is not output.
  • the network connection is successful, the network connection is The icon is highlighted by the gray color.
  • the display effect is specifically implemented by the operating system 301.
  • the data backup instruction sent by the first sending unit 3023 to the operating system 301 indicates that the operating system 301 is successful when the network connection is successful. Still keep the network connection icon gray.
  • the terminal 30 uploads data to the network the icon of the data upload is displayed, and the icon is also controlled by the operating system 301.
  • the first sending unit 3023 The data backup instruction sent to the operating system 301 instructs the operating system 301 not to display the icon for data upload when performing data upload.
  • the second sending unit 3024 is configured to send an operation instruction to the current operating system 301 of the terminal 30, so that the current operating system 301 sends the status information of the terminal 30 to the preset phone number according to the operation instruction, where the operation instruction carries a preset. Phone number.
  • the preset phone number may be a phone number set by the user who initially uses the terminal 30 (hereinafter referred to as the original user), and is stored in the security system after the original user is set.
  • the operation instruction is used to trigger the function of the short message of the operating system 301, and input the preset phone number into the short message edit box and add the above state information, further triggering the operating system 301 to send the edited short message content.
  • the foregoing status information includes, but is not limited to, current location information of the terminal 30, a SIM card telephone number currently placed in the terminal 30, and the like.
  • the preset phone number may be a phone number used by the original user, or may be a phone number of another person (such as a friend, a relative, or the like of the original user), so that when the terminal 30 is not used by the original user,
  • the second sending unit 3024 triggers the operating system 301 to send information to the original user (or a friend or a relative) to facilitate the original user to retrieve the terminal 30.
  • the current operating system 301 sends the status information of the terminal 30 to the preset phone number according to the operation instruction, including: the current operating system 301 sends the terminal 30 to the preset phone number according to the operation instruction. Status information, and does not output prompt information characterizing the transmission status and records that do not retain the transmission.
  • the second sending unit 3024 sends an instruction to the operating system 301 to prevent the operating system 301 from performing the above prompting. Further, in the prior art, after the short message is sent, the recording is retained in the terminal 30. In the scenario of the example, the second sending unit 3024 sends an instruction to the operating system 301 to prevent the operating system 301 from retaining or deleting the short message record.
  • the operating system 301 opens the positioning system (such as GPS, Beidou positioning system, etc.) in the terminal 30 to obtain the current location information of the terminal 30 before sending the short message to the preset phone number.
  • the operating system 301 is to open the positioning system in response to the relevant instructions sent by the second transmitting unit 3024.
  • the prompting information is outputted in the corresponding part of the terminal 30 to prompt the user that the positioning system is turned on.
  • the second sending unit 3024 is directed to the operating system 301.
  • the sent command causes the operating system 301 to turn on the positioning system, but does not output any prompt information.
  • the second sending unit 3024 may further send a shooting instruction to the operating system 301, so that the operating system 301 turns on the current surrounding image of the camera shooting terminal 30, and the The screen is uploaded to the above data backup platform or sent to the above preset phone number by SMS.
  • sequence of the process of sending the short message and the process of uploading the data information is not limited herein, and no matter which process is before or after, it is a complete implementable solution. .
  • each unit may also correspond to the corresponding description of the method embodiment shown in FIG. 2 .
  • a security system 302 independent of the operating system 301 is provided in the terminal 30, and the security system 302 identifies user operation information for the terminal 30 to determine the operation terminal 30. Whether the user is abnormal or not, if the abnormality is triggered, the operating system 301 is triggered to send important data to the preset data backup platform, thereby effectively preventing the loss of important information in the terminal 30.
  • FIG. 5 is a schematic structural diagram of still another terminal 50 according to an embodiment of the present invention.
  • the apparatus 50 may include: at least one processor 501, such as a CPU, at least one network interface 504, a user interface 503, and a memory 505.
  • a security system 507 at least one communication bus 502, and a display screen 506.
  • the communication bus 502 is used to implement connection communication between these components.
  • the user interface 503 can include a display screen (Displ5y) 506, and the optional user interface 503 can also include a standard wired interface and a wireless interface.
  • the communication interface 504 can optionally include a standard wired interface (such as a data line interface, a network line interface, etc.), and a wireless interface (such as a WI-FI interface, a Bluetooth interface, and a near field communication interface).
  • the memory 505 may be a high speed R5M memory or a non-vol5 tile memory such as at least one disk memory.
  • the memory 505 can also optionally be at least one storage device located remotely from the aforementioned processor 501.
  • a memory 505 as a computer storage medium may include an operating system, a network communication module, a user interface module, and an operating system program, and the security system 507 may include a security program.
  • the communication interface 504 is mainly used to connect other terminals to perform data communication with other terminals; and the processor 501 can be used to invoke the security program in the security system 507 and perform the following operations:
  • the security system acquires user operation information when the terminal is operated
  • the security system When it is determined that the abnormality is abnormal, the security system sends a data backup instruction to the operating system, so that the operating system connects to the network according to the data backup instruction, and uploads the data information in the operating system to the data of the network end. Backup platform.
  • the operating system connects to the network according to the data backup instruction, and uploads the data information in the operating system to the data backup platform of the network, including:
  • the operating system connects to the network according to the data backup instruction, and does not output prompt information that the network connection is successful;
  • the operating system uploads the data information contained in the operating system to the data backup platform on the network side, and
  • the prompt information indicating the upload status is not output.
  • the method further includes:
  • the security system sends an operation instruction to the current operating system of the terminal, so that the current operating system sends the status information of the terminal to a preset phone number according to the operation instruction, where the operation instruction carries There is the preset phone number.
  • the current operating system sends the status information of the terminal to the preset phone number according to the operation instruction, including:
  • the current operating system sends the status information of the terminal to a preset phone number according to the operation instruction, and does not output prompt information indicating a sending status and a record that does not retain the sending.
  • the security system determines, according to the user operation information, whether the identity of the user operating the terminal is abnormal, including:
  • the biometric verification function of the terminal main program interface it is determined whether the acquired user biometrics match the preset user biometrics, and if not, the user identity is determined to be abnormal; or
  • the password verification function of the terminal main program interface When the password verification function of the terminal main program interface is enabled, determining whether the first user has input a password that does not match the preset password multiple times, performing an operation of triggering the terminal to replace the operating system, if Then, it is determined that the user identity is abnormal.
  • a security system independent of an operating system is set in a terminal, and the security system identifies user operation information of the terminal to determine whether the user of the operation terminal is abnormal. If abnormal, the operating system is triggered to send important data to the preset data backup platform in time, effectively preventing the loss of important information in the terminal.
  • the security system when transmitting the important information, the security system triggers the operating system not to output the prompt information of the successful network connection, and does not output the prompt information for the data uploading, so that other users currently holding the terminal cannot detect the important information being performed.
  • Uploading judging whether the identity of the user using the terminal is abnormal according to the user operation habits pre-summarized, if the abnormality is performed, the operation of uploading the important material information is performed; further, determining whether the identity of the user is abnormal is completed by the security system, due to the security system and The operating systems are independent of each other. Even if the terminal is flashed, the terminal can still be used in the security system.
  • the parameter information set by the user determines whether the user identity is abnormal; further, the security system may trigger the operating system to send a short message to the original user according to the phone number pre-stored in the security system to inform the terminal of the current state (such as location, SIM card number, etc.) Therefore, the original user can retrieve the mobile phone as much as possible; further, the security system triggers the operating system to not send the sent status information when sending the short message, and does not retain the record of the short message in the terminal, thereby improving the privacy; further After determining the identity of the user, the security system can also trigger the operating system to open the relevant module to collect the current user information (such as photos, ID cards, etc.) and send it to the preset mobile phone, so that the original user can find more useful information.
  • the authentication method can be iris verification, fingerprint verification, eye pattern verification, face verification, palm print verification, voiceprint verification, etc. Since each of these biometric features is basically unique, it can be improved. The accuracy of the verification.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

Disclosed in the embodiments of the present invention are a terminal management method and terminal. The terminal comprises an operating system, characterized by the terminal being provided with a security system independent of the operating system. The method comprises: acquiring, by the security system, user operation information when operating the terminal; determining, by the security system and according to the user operation information, whether a user identity operating the terminal is abnormal; if so, sending, by the security system, a data backup instruction to the operating system, such that the operating system connects to a network according to the data backup instruction, and the security system uploads data information of the operating system to a data backup platform at a network terminal. The present invention can timely avoid a loss of important information when a mobile phone is lost.

Description

一种终端管理方法及终端Terminal management method and terminal
本申请要求于2015年5月29日提交中国专利局,申请号为201510288740.4、发明名称为“一种终端管理方法及终端”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。The present application claims priority to Chinese Patent Application No. 201510288740.4, entitled "A Terminal Management Method and Terminal", filed on May 29, 2015, the entire contents of .
技术领域Technical field
本发明涉及计算机技术领域,尤其涉及一种终端管理方法及终端。The present invention relates to the field of computer technologies, and in particular, to a terminal management method and a terminal.
背景技术Background technique
随着通信硬件和软件技术的迅速发展,手机的性能越越来越强大,它早已不限于拨打电话和发送短信,现如今,一部手机足以掌控我们的生活,购物、拍照、玩游戏、看视频等各种功能应有尽有,也正因为如此,手机中往往会存放一些比较重要的,或者比较私密的信息。With the rapid development of communication hardware and software technology, the performance of mobile phones is becoming more and more powerful. It is no longer limited to making calls and sending text messages. Nowadays, a mobile phone is enough to control our lives, shopping, taking pictures, playing games, watching Video and other functions are available, and because of this, mobile phones often store some important or relatively private information.
现实生活中,人们往往会出现丢失手机的情况,手机本身丢失可能没那么严重,但是手机中的信息丢失往往会导致比较严重的后果。现有技术的解决方案是,通过操作系统进行身份验证,当验证失败时,向预先设定的手机号码发送位置信息,以便用户能根据短信中的线索找回手机。现有技术的缺陷在于,用户从收到短信线索到找回手机往往需要较长的时间,手机内的重要信息还是存在丢失的风险。In real life, people often have lost their mobile phones. The loss of the mobile phone itself may not be so serious, but the loss of information in the mobile phone often leads to serious consequences. The prior art solution is to perform identity verification through the operating system. When the verification fails, the location information is sent to the preset mobile phone number, so that the user can retrieve the mobile phone according to the clue in the short message. The drawback of the prior art is that it takes a long time for the user to receive the short message clue to retrieve the mobile phone, and the important information in the mobile phone still has the risk of being lost.
发明内容Summary of the invention
本发明实施例公开了一种终端管理方法及终端,能够及时对终端中的信息进行处理,以防止手机中的重要信息的丢失。The embodiment of the invention discloses a terminal management method and a terminal, which can timely process information in the terminal to prevent loss of important information in the mobile phone.
第一方面,本发明实施例提供一种终端管理方法,所述终端包括操作系统,其特征在于,所述终端设有独立于所述操作系统的安全系统,所述方法包括:In a first aspect, an embodiment of the present invention provides a terminal management method, where the terminal includes an operating system, and the terminal is provided with a security system independent of the operating system, and the method includes:
所述安全系统获取对所述终端进行操作时的用户操作信息;The security system acquires user operation information when the terminal is operated;
所述安全系统根据所述用户操作信息判断对所述终端进行操作的用户身份是否异常; Determining, by the security system, whether the identity of the user operating the terminal is abnormal according to the user operation information;
当判断为异常时,所述安全系统向所述操作系统发送数据备份指令,以使所述操作系统根据所述数据备份指令连接网络,并将所述操作系统中的资料信息上传到网络端的数据备份平台。When it is determined that the abnormality is abnormal, the security system sends a data backup instruction to the operating system, so that the operating system connects to the network according to the data backup instruction, and uploads the data information in the operating system to the data of the network end. Backup platform.
结合第一方面,在第一方面的第一种可能的实现方式中,所述操作系统根据所述数据备份指令连接网络,并将所述操作系统中的资料信息上传到网络端的数据备份平台,包括:With reference to the first aspect, in a first possible implementation manner of the first aspect, the operating system is connected to the network according to the data backup instruction, and uploads the data information in the operating system to a data backup platform of the network. include:
所述操作系统根据所述数据备份指令连接网络,且不输出网络连接成功的提示信息;The operating system connects to the network according to the data backup instruction, and does not output prompt information that the network connection is successful;
所述操作系统将自身包含的资料信息上传到网络端的数据备份平台,且不输出表征上传状态的提示信息。The operating system uploads the data information contained in the operating system to the data backup platform on the network, and does not output prompt information indicating the upload status.
姐和第一方面,在第一方面的第二种可能的实现方式中,当所述安全系统根据所述用户操作信息判断对所述终端进行操作的用户身份异常后,所述方法还包括:And the first aspect, in a second possible implementation manner of the first aspect, after the security system determines that the identity of the user operating the terminal is abnormal according to the user operation information, the method further includes:
所述安全系统向所述终端当前的操作系统发送操作指令,以使所述当前的操作系统根据所述操作指令向预设的电话号码发送所述终端的状态信息,其中,所述操作指令携带有所述预设的电话号码。The security system sends an operation instruction to the current operating system of the terminal, so that the current operating system sends the status information of the terminal to a preset phone number according to the operation instruction, where the operation instruction carries There is the preset phone number.
姐和第一方面的第二种可能的实现方式,在第一方面的第三种可能的实现方式中,所述当前的操作系统根据所述操作指令向预设的电话号码发送所述终端的状态信息,包括:And a second possible implementation manner of the first aspect, in a third possible implementation manner of the first aspect, the current operating system sends the terminal to a preset phone number according to the operation instruction Status information, including:
所述当前的操作系统根据所述操作指令向预设的电话号码发送所述终端的状态信息,且不输出表征发送状态的提示信息和不保留发送的记录。The current operating system sends the status information of the terminal to a preset phone number according to the operation instruction, and does not output prompt information indicating a sending status and a record that does not retain the sending.
可选的,当所述终端判断异常时,若使用者向外主动拨打电话或者发送信息时,终端会自动将电话接通至预存的号码,或者将短信发送至预存的号码,但是显示给使用者的却是接通的用户者实际想接通或者发送的号码。举例:例如终端的主人是张三,终端中预存储的号码是13085402915,但是终端被李四获得。李四更换手机卡后使用手机拨打或者发送消息至18612055981,终端根据指纹等生物信息确认终端异常,终端将电话或者短信携带终端位置等信息接通至或发送至13085402915,但是现实给李四的是接通的18612055981或者短信成功发送给18612055981。 Optionally, when the terminal determines that the abnormality is abnormal, if the user actively makes a call or sends a message, the terminal automatically connects the phone to the pre-stored number, or sends the short message to the pre-stored number, but displays it to the user. The person is the number that the connected user actually wants to connect or send. For example: For example, the owner of the terminal is Zhang San, and the pre-stored number in the terminal is 13085402915, but the terminal is obtained by Li Si. After replacing the mobile phone card, Li Si uses the mobile phone to dial or send a message to 18612055981. The terminal confirms the abnormality of the terminal according to the biological information such as fingerprints. The terminal connects or sends the information such as the location of the phone or the message carrying terminal to 13085402915, but the reality is given to Li Si. The connected 18612055981 or SMS was successfully sent to 18612055981.
结合第一方面、第一方面的第一种可能的实现方式、第一方面的第二种可能的实现方式和第一方面的第三种可能的实现方式中的任一种可能的实现方式,在第一方面的第四种可能的实现方式中,所述安全系统根据所述用户操作信息判断对所述终端进行操作的用户身份是否异常,包括:With reference to the first aspect, the first possible implementation of the first aspect, the second possible implementation of the first aspect, and any one of the possible implementations of the third possible implementation of the first aspect, In a fourth possible implementation manner of the first aspect, the security system determines, according to the user operation information, whether the identity of the user that operates the terminal is abnormal, including:
当开启了进入所述终端主程序界面的生物特征验证功能时,判断获取到的用户生物特征是否与预设的用户生物特征相匹配,若不匹配,则判定所述用户身份异常;或者When the biometric verification function of the terminal main program interface is enabled, it is determined whether the acquired user biometrics match the preset user biometrics, and if not, the user identity is determined to be abnormal; or
当开启了进入所述终端主程序界面的密码验证功能时,判断所述第一用户是否多次输入了与预设密码不相匹配的密码后,执行触发所述终端更换操作系统的操作,若是,则判定所述用户身份异常。When the password verification function of the terminal main program interface is enabled, determining whether the first user has input a password that does not match the preset password multiple times, performing an operation of triggering the terminal to replace the operating system, if Then, it is determined that the user identity is abnormal.
第二方面,本发明实施例提供一种终端,所述终端包括操作系统,其特征在于,所述终端设有独立于所述操作系统的安全系统,所述安全系统包括:In a second aspect, an embodiment of the present invention provides a terminal, where the terminal includes an operating system, where the terminal is provided with a security system independent of the operating system, and the security system includes:
获取单元,用于获取对所述终端进行操作时的用户操作信息;An obtaining unit, configured to acquire user operation information when the terminal is operated;
判断单元,用于根据所述用户操作信息判断对所述终端进行操作的用户身份是否异常;a determining unit, configured to determine, according to the user operation information, whether an identity of a user operating the terminal is abnormal;
第一发送单元,用于在所述判断单元判断出用户身份异常时,向所述操作系统发送数据备份指令,以使所述操作系统根据所述数据备份指令连接网络,并将所述操作系统中的资料信息上传到网络端的数据备份平台。a first sending unit, configured to send a data backup instruction to the operating system when the determining unit determines that the user identity is abnormal, so that the operating system connects to the network according to the data backup instruction, and connects the operating system The data information in the data is uploaded to the data backup platform on the network side.
结合第二方面,在第二方面的第一种可能的实现方式中,所述操作系统根据所述数据备份指令连接网络,并将所述操作系统中的资料信息上传到网络端的数据备份平台,包括:With reference to the second aspect, in a first possible implementation manner of the second aspect, the operating system is connected to the network according to the data backup instruction, and uploads the information information in the operating system to the data backup platform of the network. include:
所述操作系统根据所述数据备份指令连接网络,且不输出网络连接成功的提示信息;The operating system connects to the network according to the data backup instruction, and does not output prompt information that the network connection is successful;
所述操作系统将自身包含的资料信息上传到网络端的数据备份平台,且不输出表征上传状态的提示信息。The operating system uploads the data information contained in the operating system to the data backup platform on the network, and does not output prompt information indicating the upload status.
结合第二方面,在第二方面的第二种可能的实现方式中,,所述终端还包括:With reference to the second aspect, in a second possible implementation manner of the second aspect, the terminal further includes:
第二发送单元,用于向所述终端当前的操作系统发送操作指令,以使所 述当前的操作系统根据所述操作指令向预设的电话号码发送所述终端的状态信息,其中,所述操作指令携带有所述预设的电话号码。a second sending unit, configured to send an operation instruction to a current operating system of the terminal, so as to The current operating system sends the status information of the terminal to a preset phone number according to the operation instruction, where the operation instruction carries the preset phone number.
结合第二方面的第二种可能的实现方式,在第二方面的第三种可能的实现方式中,所述当前的操作系统根据所述操作指令向预设的电话号码发送所述终端的状态信息,包括:With the second possible implementation of the second aspect, in a third possible implementation manner of the second aspect, the current operating system sends the status of the terminal to a preset phone number according to the operation instruction. Information, including:
所述当前的操作系统根据所述操作指令向预设的电话号码发送所述终端的状态信息,且不输出表征发送状态的提示信息和不保留发送的记录。The current operating system sends the status information of the terminal to a preset phone number according to the operation instruction, and does not output prompt information indicating a sending status and a record that does not retain the sending.
结合第二方面、第二方面的第一种可能的实现方式、第二方面的第二种可能的实现方式和第二方面的第三种可能的实现方式中的任一种可能的实现方式,在第二方面的第四种可能的实现方式中,所述判断单元具体用于:With reference to the second aspect, the first possible implementation of the second aspect, the second possible implementation of the second aspect, and any one of the possible implementations of the third possible implementation of the second aspect, In a fourth possible implementation manner of the second aspect, the determining unit is specifically configured to:
当开启了进入所述终端主程序界面的生物特征验证功能时,判断获取到的用户生物特征是否与预设的用户生物特征相匹配,若不匹配,则判定所述用户身份异常;或者When the biometric verification function of the terminal main program interface is enabled, it is determined whether the acquired user biometrics match the preset user biometrics, and if not, the user identity is determined to be abnormal; or
当开启了进入所述终端主程序界面的密码验证功能时,判断所述第一用户是否多次输入了与预设密码不相匹配的密码后,执行触发所述终端更换操作系统的操作,若是,则判定所述用户身份异常。When the password verification function of the terminal main program interface is enabled, determining whether the first user has input a password that does not match the preset password multiple times, performing an operation of triggering the terminal to replace the operating system, if Then, it is determined that the user identity is abnormal.
通过实施本发明实施例,在终端中设置独立于操作系统的安全系统,安全系统识别对终端的用户操作信息,以判断操作终端的用户是否异常,若异常则及时触发操作系统向预设的数据备份平台发送重要数据,有效地防止了终端中的重要信息的丢失。By implementing the embodiment of the present invention, a security system independent of the operating system is set in the terminal, and the security system identifies the user operation information of the terminal to determine whether the user of the operation terminal is abnormal, and if abnormal, triggers the operating system to preset data. The backup platform sends important data, effectively preventing the loss of important information in the terminal.
进一步地,在发送这些重要信息时,安全系统触发操作系统不输出网络连接成功的提示信息,也不输出正在进行数据上传的提示信息,以使当前持有终端的其他用户无法察觉正在进行重要信息的上传;根据预先总结出的用户操作习惯来判断使用终端的用户身份是否异常,若异常才执行上传重要资料信息的操作;进一步地,判断用户身份是否异常由安全系统来完成,由于安全系统与操作系统相互独立,即使终端被刷机了,终端依然可以通过安全系统中原始用户设置的参数信息来判断用户身份是否异常;再进一步地,安全系统可以触发操作系统根据安全系统中预存的电话号码来向原用户发送短信,以告知终端当 前的状态(如位置、SIM卡号等),使得原用户可以尽可能的找回手机;再进一步地,安全系统会触发操作系统发送短信时不输出发送的状态信息,也不在终端中保留该短信的记录,提高了隐秘性;再进一步地,在判断用户身份异常后,安全系统还可以触发操作系统开启相关模块来采集当前用户的信息(如照片、身份证等)发送到预设的手机好,以为原用户找回手机提供更多有用的线索;另外,身份验证方式可以为虹膜验证、指纹验证、眼纹验证、人脸验证、掌纹验证、声纹验证等验证方式,由于每个人的这些生物特征基本都是唯一的,可以提高验证的准确度。Further, when transmitting the important information, the security system triggers the operating system not to output the prompt information of the successful network connection, and does not output the prompt information for the data uploading, so that other users currently holding the terminal cannot detect the important information being performed. Uploading; judging whether the identity of the user using the terminal is abnormal according to the user operation habits pre-summarized, if the abnormality is performed, the operation of uploading the important material information is performed; further, determining whether the identity of the user is abnormal is completed by the security system, due to the security system and The operating system is independent of each other. Even if the terminal is flashed, the terminal can determine whether the user identity is abnormal through the parameter information set by the original user in the security system. Further, the security system can trigger the operating system to use the phone number pre-stored in the security system. Send a text message to the original user to inform the terminal The previous state (such as location, SIM card number, etc.) allows the original user to retrieve the mobile phone as much as possible; further, the security system triggers the operating system to not send the sent status information when sending the short message, and does not retain the short message in the terminal. The record improves the privacy; further, after determining the identity of the user, the security system can also trigger the operating system to open the relevant module to collect the current user information (such as photos, ID cards, etc.) and send it to the preset mobile phone. In order to provide more useful clues for the original user to retrieve the mobile phone; in addition, the authentication method can be iris verification, fingerprint verification, eye pattern verification, face verification, palm print verification, voiceprint verification, etc., due to each person's These biometrics are basically unique and can improve the accuracy of the verification.
附图说明DRAWINGS
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the embodiments or the description of the prior art will be briefly described below. Obviously, the drawings in the following description are only It is a certain embodiment of the present invention, and other drawings can be obtained from those skilled in the art without any creative work.
图1是本发明实施例提供的一种终端管理方法的流程示意图;1 is a schematic flowchart of a terminal management method according to an embodiment of the present invention;
图2是本发明实施例提供的又一种终端管理方法的流程示意图;2 is a schematic flowchart of still another terminal management method according to an embodiment of the present invention;
图3是本发明实施例提供的一种终端的结构示意图;3 is a schematic structural diagram of a terminal according to an embodiment of the present invention;
图4是本发明实施例提供的又一种终端的结构示意图;4 is a schematic structural diagram of still another terminal according to an embodiment of the present invention;
图5是本发明实施例提供的又一种终端的结构示意图。FIG. 5 is a schematic structural diagram of still another terminal according to an embodiment of the present invention.
具体实施方式detailed description
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明的一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The technical solutions in the embodiments of the present invention are clearly and completely described in the following with reference to the accompanying drawings in the embodiments of the present invention. It is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments obtained by those skilled in the art based on the embodiments of the present invention without creative efforts are within the scope of the present invention.
需要说明的是,在本发明实施例中使用的术语是仅仅出于描述特定实施例的目的,而非旨在限制本发明。在本发明实施例和所附权利要求书中所使用的单数形式的“一种”、“所述”和“该”也旨在包括多数形式,除非上下文清楚地表示其他含义。还应当理解,本文中使用的术语“和/或”是指并包含一个 或多个相关联的列出项目的任何或所有可能组合。另外,本发明的说明书和权利要求书及上述附图中的术语“第一”、“第二”、“第三”和“第四”等是用于区别不同对象,而不是用于描述特定顺序。此外,术语“包括”和“具有”以及它们任何变形,意图在于覆盖不排他的包含。例如包含了一系列步骤或单元的过程、方法、系统、产品或设备没有限定于已列出的步骤或单元,而是可选地还包括没有列出的步骤或单元,或可选地还包括对于这些过程、方法、产品或设备固有的其它步骤或单元。It is to be understood that the terminology used in the embodiments of the present invention is for the purpose of describing the particular embodiments, and is not intended to limit the invention. The singular forms "a", "the" and "the" It should also be understood that the term "and/or" as used herein refers to and includes a Or any associated combination of any or all of the possible items. In addition, the terms "first", "second", "third", and "fourth" and the like in the specification and claims of the present invention and the above drawings are used to distinguish different objects, and are not intended to describe specific order. Furthermore, the terms "comprises" and "comprising" and "comprising" are intended to cover a non-exclusive inclusion. For example, a process, method, system, product, or device that comprises a series of steps or units is not limited to the listed steps or units, but optionally also includes steps or units not listed, or alternatively Other steps or units inherent to these processes, methods, products or equipment.
本发明实施例所描述的终端可以是手机、平板电脑、笔记本电脑、掌上电脑、移动互联网设备(MID,mobile internet device)、可穿戴设备(例如智能手表(如iWatch等)、智能手环、计步器等)或其他可安装部署即时通讯应用客户端的终端设备。The terminal described in the embodiment of the present invention may be a mobile phone, a tablet computer, a notebook computer, a palmtop computer, a mobile internet device (MID), a wearable device (such as a smart watch (such as iWatch, etc.), a smart bracelet, and a meter. Stepper, etc.) or other terminal device that can be installed to deploy the instant messaging application client.
请参见图1,图1是本发明实施例提供的一种终端管理方法的流程示意图,该方法包括但不限于如下步骤。Referring to FIG. 1, FIG. 1 is a schematic flowchart of a method for managing a terminal according to an embodiment of the present invention, where the method includes but is not limited to the following steps.
步骤S101:安全系统获取对终端进行操作时的用户操作信息。Step S101: The security system acquires user operation information when the terminal is operated.
具体地,终端包括操作系统和安全系统,操作系统和安全系统之间可以进行数据交互,例如,安全系统可以向操作系统发送指令,以使操作系统根据该指令执行相应操作。安全系统和操作系统相互独立,以一种场景为例,当用户更换了终端的操作系统后,终端中的安全系统依然保留,且安全系统中的数据不丢失,另外,安全系统还可以与终端中更换后的操作系统进行数据交互。Specifically, the terminal includes an operating system and a security system, and data interaction can be performed between the operating system and the security system. For example, the security system can send an instruction to the operating system to cause the operating system to perform corresponding operations according to the instruction. The security system and the operating system are independent of each other. Take a scenario as an example. After the user replaces the operating system of the terminal, the security system in the terminal remains, and the data in the security system is not lost. In addition, the security system can also be connected to the terminal. The replaced operating system performs data interaction.
安全系统可以直接控制终端上的用户接口来获取用户操作信息;也可以向操作系统获取用户操作信息,例如,操作系统本身会实时获取用户操作信息,当接收到安全系统的请求指令时,将获取到的该用户操作信息发送给安全系统。The security system can directly control the user interface on the terminal to obtain user operation information; and can also obtain user operation information from the operating system. For example, the operating system itself can obtain user operation information in real time, and when receiving the request instruction of the security system, the security system will obtain The user operation information obtained is sent to the security system.
进一步地,上述操作可以是用户对终端执行的用于进入终端主程序界面的密码解锁操作、生物特征(虹膜识别、指纹识别、眼纹识别、人脸识别、掌纹识别、声纹识别等)解锁操作、滑动解锁操作、按键解锁操作、刷机操作等。Further, the foregoing operation may be a password unlocking operation, a biometric feature (iris recognition, fingerprint recognition, eye pattern recognition, face recognition, palmprint recognition, voiceprint recognition, etc.) performed by the user on the terminal for entering the terminal main program interface. Unlock operation, slide unlock operation, button unlock operation, brush operation, etc.
相应地,用户操作信息为安全系统感应到用户执行上述操作时,获取的一些用户信息或操作信息。举例来说,当感应到用户执行密码解锁操作时,获取到的用户操作信息可以包括密码解锁是否失败、失败的次数,失败之后是否有 刷新操作系统的相关操作等信息;当感应到用户使用指纹解锁操作时,获取到的用户操作信息可以包括通过终端中的信息采集接口模块采集到的用户的指纹、预设时间内采集指纹的次数、是否有刷新操作系统的相关操作等信息;当感应到用户执行滑动解锁的操作时,获取到的用户操作信息可以包括通过终端中的信息采集接口模块获取到的用户的一些生物特征信息,其中,获取生物特征的获取规则还可以进一步设置,例如,不在每一次感应到滑动解锁时都获取生物特征信息,而是在开机后第一次感应到滑动解锁时都获取生物特征信息,或者每一天第一次感应到滑动解锁时都获取生物特征信息等;当感应到用户刷新系统的操作时,获取到的用户操作信息可以包括通过终端中的信息采集接口模块获取到的用户的一些生物特征信息等。Correspondingly, the user operation information is some user information or operation information acquired by the security system when the user performs the above operation. For example, when the user is instructed to perform the password unlocking operation, the obtained user operation information may include whether the password unlocking fails, the number of failures, and whether there is a failure after the failure. The operation information of the operating system is refreshed. When the user uses the fingerprint unlocking operation, the obtained user operation information may include the fingerprint of the user collected by the information collection interface module in the terminal, and the number of times the fingerprint is collected within a preset time. If there is any information about the operation of the operating system, the obtained user operation information may include some biometric information of the user acquired through the information collection interface module in the terminal, where The acquisition rule for acquiring the biometrics may be further set, for example, not acquiring the biometric information every time the sliding unlock is sensed, but acquiring the biometric information when the sliding is unlocked for the first time after the booting, or each day When the user senses the operation of the user to refresh the system, the acquired user operation information may include some biometric information of the user acquired through the information collection interface module in the terminal. Wait.
需要说明的是,上述举例描述的一些方案仅为本发明的一些可选的方案,显然还可以通过这些方案推导出其他的方案来,推导出的方案同样落入本发明的保护范围。It should be noted that some of the solutions described in the above examples are only some alternatives of the present invention, and it is obvious that other solutions can be deduced by these solutions, and the deduced solutions also fall within the protection scope of the present invention.
步骤S102:安全系统根据用户操作信息判断对终端进行操作的用户身份是否异常。Step S102: The security system determines, according to the user operation information, whether the identity of the user operating the terminal is abnormal.
具体地,获取了用户操作信息后,对用户操作信息进行处理分析,处理分析的结果用来判断对终端进行操作的用户身份是否异常。Specifically, after the user operation information is acquired, the user operation information is processed and analyzed, and the result of the processing analysis is used to determine whether the identity of the user operating the terminal is abnormal.
举例来所,当用户通过验证指纹(当然还可以是虹膜识、眼纹、人脸、掌纹、声纹等)来进入终端的主程序界面时,安全系统获取到的指纹与预先录入的指纹不匹配时,可以判定该用户身份异常(进一步地,还可以增加判断条件,例如,获取到的指纹与预先录入的指纹不匹配且用户还执行了刷新系统的相关操作时,判定该用户身份异常)。再如,当用户通过在密码解锁界面输入密码来进入终端的主程序界面时,安全系统将获取到的用户输入错误的次数与预设的次数阈值进行对比,当错误的次数达到预设阈值时,可以判断用户身份异常(进一步地,还可以增加判断条件,例如,错误的次数达到预设阈值且用户还有执行了刷新系统的相关操作时,判定该用户身份异常)。当然,用户进入主程序界面还可以有其他的验证方式,同样的,也可以通过上述分析判断的原理来判断用户身份是否异常。进一步地,当用户进入主程序界面不需要任何验证时,可以按照预设的规则获取生物特征后,对生物特征进行验证,当生物特征 与预设的特征不符合时,判定用户身份异常。For example, when the user enters the main program interface of the terminal by verifying the fingerprint (which may of course be iris recognition, eye pattern, face, palm print, voice print, etc.), the fingerprint acquired by the security system and the pre-recorded fingerprint. If the user does not match, it may be determined that the user identity is abnormal. (Further, the judgment condition may also be added. For example, when the obtained fingerprint does not match the pre-recorded fingerprint and the user also performs a related operation of refreshing the system, it is determined that the user identity is abnormal. ). For another example, when the user enters the main program interface of the terminal by entering a password on the password unlocking interface, the security system compares the obtained number of user input errors with a preset number of times threshold, when the number of errors reaches a preset threshold. The user identity may be abnormal. (Further, the judgment condition may also be increased. For example, when the number of errors reaches a preset threshold and the user has performed a related operation of refreshing the system, the user identity is determined to be abnormal). Of course, the user can have other verification methods when entering the main program interface. Similarly, the principle of the above analysis and judgment can also be used to determine whether the user identity is abnormal. Further, when the user does not need any verification to enter the main program interface, the biometrics can be verified according to preset rules, and the biometrics are verified as biometrics. If the preset feature does not match, the user identity is determined to be abnormal.
需要说明的是,上述举例描述的一些方案仅为本发明的一些可选的方案,显然还可以通过这些方案推导出其他的方案来,推导出的方案同样落入本发明的保护范围。It should be noted that some of the solutions described in the above examples are only some alternatives of the present invention, and it is obvious that other solutions can be deduced by these solutions, and the deduced solutions also fall within the protection scope of the present invention.
步骤S103:当判断为异常时,安全系统向操作系统发送数据备份指令,以使操作系统根据数据备份指令连接网络,并将操作系统中的资料信息上传到网络端的数据备份平台。Step S103: When it is determined that the abnormality is abnormal, the security system sends a data backup instruction to the operating system, so that the operating system connects to the network according to the data backup instruction, and uploads the data information in the operating system to the data backup platform of the network.
具体地,资料信息可以包括终端中的联系人信息、终端中的照片等,此处不对资料信息作限制。数据备份平台预先与终端建立了绑定关系,操作系统可以根据数据备份指令来建立终端与数据备份平台的网络连接。Specifically, the material information may include contact information in the terminal, a photo in the terminal, and the like, and the data information is not limited herein. The data backup platform establishes a binding relationship with the terminal in advance, and the operating system can establish a network connection between the terminal and the data backup platform according to the data backup instruction.
在一种可选的方案中,每个终端可以在数据备份系统中对应一个账号,操作系统在进行资料信息上传时,只将资料信息上传到自身所属的终端所对应的账号中。进一步地,数据备份指令可以包括登录上述账号的用户名和密码,数据备份平台地址查找子指令、登陆子指令、上传子指令等。举例来说,操作系统根据平台地址查找子指令来查找数据备份平台的网络地址,并通过浏览器在终端后台进入登陆数据备份平台的登陆界面,然后将上述用户名和密码输入到相应文本框中,再根据登陆子指令执行登陆操作,登陆成功后根据上传子指令执行上述资料信息的操作。进一步地,当资料信息较多时,还可以根据预设的上传优先级进行上传,该优先级参数可以封装在数据备份指令中。In an optional solution, each terminal may correspond to an account in the data backup system. When the operating system uploads the data information, the operating system only uploads the data information to the account corresponding to the terminal to which the terminal belongs. Further, the data backup instruction may include a username and password for logging in to the account, a data backup platform address lookup subcommand, a login subcommand, an upload subcommand, and the like. For example, the operating system searches for the network address of the data backup platform according to the platform address search sub-instruction, and enters the login interface of the login data backup platform in the background of the terminal through the browser, and then inputs the above-mentioned user name and password into the corresponding text box. Then, according to the login sub-instruction, the login operation is performed, and after the login is successful, the operation of the above-mentioned data information is performed according to the upload sub-command. Further, when there is more data information, the uploading may also be performed according to a preset uploading priority, and the priority parameter may be encapsulated in a data backup instruction.
可选的,上述用户名和密码可以是最开始使用该终端的用户设置的,也可以是在生产该终端时预置于终端中的。Optionally, the user name and password may be set by a user who initially uses the terminal, or may be preset in the terminal when the terminal is produced.
可选的,上述资料信息上传完后,还可以由操作系统来进行删除,可以在发送完所有的资料信息后再统一删除,也可以边发送边删除;操作系统具体是根据安全系统发送的删除指令来执行删除任务的。Optionally, after the foregoing information information is uploaded, the operating system may also delete the information, and after all the data information is sent, the data may be uniformly deleted, or deleted while being sent; the operating system is specifically deleted according to the security system. Instructions to perform the delete task.
在一种可选的方案中,操作系统根据数据备份指令连接网络,并将操作系统中的资料信息上传到网络端的数据备份平台,包括:操作系统根据数据备份指令连接网络,且不输出网络连接成功的提示信息;操作系统将自身包含的资料信息上传到网络端的数据备份平台,且不输出表征上传状态的提示信息。In an optional solution, the operating system connects to the network according to the data backup instruction, and uploads the data information in the operating system to the data backup platform of the network, including: the operating system connects to the network according to the data backup instruction, and does not output the network connection. Successful prompt information; the operating system uploads the data information contained in the operating system to the data backup platform on the network side, and does not output prompt information indicating the upload status.
具体地,操作系统在连接网络(包括无线网和数据网络)时,不输出网 络连接成功的提示信息,举例来说,目前大部分手机都有网络连接图标,当网络连接成功时,网络连接图标由灰色变亮,这样的显示效果具体由操作系统来实现,在本实施例的场景下,安全系统向操作系统发送的数据备份指令指示操作系统在网络连接成功时,依然保持网络连接图标为灰色。同理,现有技术中,终端向网络端上传数据时,会显示数据上传的图标,显示该图标同样也是由操作系统来控制的,在本实施例的场景下,安全系统向操作系统发送的数据备份指令指示操作系统在进行数据上传时,不显示数据上传的图标。Specifically, the operating system does not output the network when connecting to the network (including the wireless network and the data network). For example, most mobile phones currently have a network connection icon. When the network connection is successful, the network connection icon is brightened by gray. The display effect is specifically implemented by the operating system. In this embodiment, In the scenario, the data backup command sent by the security system to the operating system indicates that the operating system keeps the network connection icon gray when the network connection is successful. Similarly, in the prior art, when the terminal uploads data to the network, the icon of the data upload is displayed, and the icon is also controlled by the operating system. In the scenario of the embodiment, the security system sends the file to the operating system. The data backup instruction instructs the operating system not to display the icon of the data upload when the data is uploaded.
需要说明的是,上述举例描述的一些方案仅为本发明的一些可选的方案,显然还可以通过这些方案推导出其他的方案来,推导出的方案同样落入本发明的保护范围。It should be noted that some of the solutions described in the above examples are only some alternatives of the present invention, and it is obvious that other solutions can be deduced by these solutions, and the deduced solutions also fall within the protection scope of the present invention.
在图1所描述的终端管理方法中,在终端中设置独立于操作系统的安全系统,安全系统识别对终端的用户操作信息,以判断操作终端的用户是否异常,若异常则及时触发操作系统向预设的数据备份平台发送重要数据,有效地防止了终端中的重要信息的丢失。In the terminal management method described in FIG. 1, a security system independent of an operating system is set in the terminal, and the security system identifies user operation information of the terminal to determine whether the user of the operation terminal is abnormal, and if abnormal, triggers the operating system in time. The preset data backup platform sends important data, effectively preventing the loss of important information in the terminal.
请参见图2,图2是本发明实施例提供的又一种终端管理方法的流程示意图,该方法包括但不限于如下步骤。Referring to FIG. 2, FIG. 2 is a schematic flowchart diagram of still another method for managing a terminal according to an embodiment of the present invention, where the method includes but is not limited to the following steps.
步骤S201:安全系统获取对终端进行操作时的用户操作信息。Step S201: The security system acquires user operation information when the terminal is operated.
具体地,终端包括操作系统和安全系统,操作系统和安全系统之间可以进行数据交互,例如,安全系统可以向操作系统发送指令,以使操作系统根据该指令执行相应操作。安全系统和操作系统相互独立,以一种场景为例,当用户更换了终端的操作系统后,终端中的安全系统依然保留,且安全系统中的数据不丢失,另外,安全系统还可以与终端中更换后的操作系统进行数据交互。Specifically, the terminal includes an operating system and a security system, and data interaction can be performed between the operating system and the security system. For example, the security system can send an instruction to the operating system to cause the operating system to perform corresponding operations according to the instruction. The security system and the operating system are independent of each other. Take a scenario as an example. After the user replaces the operating system of the terminal, the security system in the terminal remains, and the data in the security system is not lost. In addition, the security system can also be connected to the terminal. The replaced operating system performs data interaction.
安全系统可以直接控制终端上的用户接口来获取用户操作信息;也可以向操作系统获取用户操作信息,例如,操作系统本身会实时获取用户操作信息,当接收到安全系统的请求指令时,将获取到的该用户操作信息发送给安全系统。The security system can directly control the user interface on the terminal to obtain user operation information; and can also obtain user operation information from the operating system. For example, the operating system itself can obtain user operation information in real time, and when receiving the request instruction of the security system, the security system will obtain The user operation information obtained is sent to the security system.
进一步地,上述操作可以是用户对终端执行的用于进入终端主程序界面的密码解锁操作、生物特征(虹膜识别、指纹识别、眼纹识别、人脸识别、掌纹 识别、声纹识别等)解锁操作、滑动解锁操作、按键解锁操作、刷机操作等。Further, the foregoing operation may be a password unlocking operation, a biometric feature (iris recognition, fingerprint recognition, eye pattern recognition, face recognition, palm print) performed by the user on the terminal for entering the terminal main program interface. Recognition, voiceprint recognition, etc.) unlocking operation, sliding unlocking operation, button unlocking operation, brushing operation, and the like.
相应地,用户操作信息为安全系统感应到用户执行上述操作时,获取的一些用户信息或操作信息。举例来说,当感应到用户执行密码解锁操作时,获取到的用户操作信息可以包括密码解锁是否失败、失败的次数,失败之后是否有刷新操作系统的相关操作等信息;当感应到用户使用指纹解锁操作时,获取到的用户操作信息可以包括通过终端中的信息采集接口模块采集到的用户的指纹、预设时间内采集指纹的次数、是否有刷新操作系统的相关操作等信息;当感应到用户执行滑动解锁的操作时,获取到的用户操作信息可以包括通过终端中的信息采集接口模块获取到的用户的一些生物特征信息,其中,获取生物特征的获取规则还可以进一步设置,例如,不在每一次感应到滑动解锁时都获取生物特征信息,而是在开机后第一次感应到滑动解锁时都获取生物特征信息,或者每一天第一次感应到滑动解锁时都获取生物特征信息等;当感应到用户刷新系统的操作时,获取到的用户操作信息可以包括通过终端中的信息采集接口模块获取到的用户的一些生物特征信息等。Correspondingly, the user operation information is some user information or operation information acquired by the security system when the user performs the above operation. For example, when the user is instructed to perform the password unlocking operation, the obtained user operation information may include whether the password unlocking fails, the number of failures, whether there is a related operation of refreshing the operating system after the failure, and the like; During the unlocking operation, the obtained user operation information may include information of the user's fingerprint collected by the information collection interface module in the terminal, the number of times the fingerprint is collected within a preset time period, and whether the related operation of the operating system is refreshed; When the user performs the operation of the sliding unlocking, the acquired user operation information may include some biometric information of the user acquired by the information collecting interface module in the terminal, wherein the acquiring rules for acquiring the biometrics may further be set, for example, not The biometric information is acquired every time the sliding is unlocked, but the biometric information is acquired when the sliding is unlocked for the first time after the power is turned on, or the biometric information is acquired when the sliding sensing is first sensed every day; When sensing the user refreshing the system When the acquired number of user operation information may include biometric information of the user acquired by the terminal information collection interface module.
需要说明的是,上述举例描述的一些方案仅为本发明的一些可选的方案,显然还可以通过这些方案推导出其他的方案来,推导出的方案同样落入本发明的保护范围。It should be noted that some of the solutions described in the above examples are only some alternatives of the present invention, and it is obvious that other solutions can be deduced by these solutions, and the deduced solutions also fall within the protection scope of the present invention.
步骤S202:安全系统根据用户操作信息判断对终端进行操作的用户身份是否异常。Step S202: The security system determines, according to the user operation information, whether the identity of the user operating the terminal is abnormal.
具体地,获取了用户操作信息后,对用户操作信息进行处理分析,处理分析的结果用来判断对终端进行操作的用户身份是否异常。Specifically, after the user operation information is acquired, the user operation information is processed and analyzed, and the result of the processing analysis is used to determine whether the identity of the user operating the terminal is abnormal.
举例来所,当用户通过验证指纹(当然还可以是虹膜识、眼纹、人脸、掌纹、声纹等)来进入终端的主程序界面时,安全系统获取到的指纹与预先录入的指纹不匹配时,可以判定该用户身份异常(进一步地,还可以增加判断条件,例如,获取到的指纹与预先录入的指纹不匹配且用户还执行了刷新系统的相关操作时,判定该用户身份异常)。再如,当用户通过在密码解锁界面输入密码来进入终端的主程序界面时,安全系统将获取到的用户输入错误的次数与预设的次数阈值进行对比,当错误的次数达到预设阈值时,可以判断用户身份异常(进一步地,还可以增加判断条件,例如,错误的次数达到预设阈值且用户还 有执行了刷新系统的相关操作时,判定该用户身份异常)。当然,用户进入主程序界面还可以有其他的验证方式,同样的,也可以通过上述分析判断的原理来判断用户身份是否异常。进一步地,当用户进入主程序界面不需要任何验证时,可以按照预设的规则获取生物特征后,对生物特征进行验证,当生物特征与预设的特征不符合时,判定用户身份异常。For example, when the user enters the main program interface of the terminal by verifying the fingerprint (which may of course be iris recognition, eye pattern, face, palm print, voice print, etc.), the fingerprint acquired by the security system and the pre-recorded fingerprint. If the user does not match, it may be determined that the user identity is abnormal. (Further, the judgment condition may also be added. For example, when the obtained fingerprint does not match the pre-recorded fingerprint and the user also performs a related operation of refreshing the system, it is determined that the user identity is abnormal. ). For another example, when the user enters the main program interface of the terminal by entering a password on the password unlocking interface, the security system compares the obtained number of user input errors with a preset number of times threshold, when the number of errors reaches a preset threshold. , it can be judged that the user identity is abnormal (further, the judgment condition can also be increased, for example, the number of errors reaches a preset threshold and the user also When the related operation of refreshing the system is performed, it is determined that the user identity is abnormal. Of course, the user can have other verification methods when entering the main program interface. Similarly, the principle of the above analysis and judgment can also be used to determine whether the user identity is abnormal. Further, when the user does not need any verification to enter the main program interface, the biometric feature may be obtained according to a preset rule, and the biometric feature is verified. When the biometric feature does not match the preset feature, the user identity is determined to be abnormal.
需要说明的是,上述举例描述的一些方案仅为本发明的一些可选的方案,显然还可以通过这些方案推导出其他的方案来,推导出的方案同样落入本发明的保护范围。It should be noted that some of the solutions described in the above examples are only some alternatives of the present invention, and it is obvious that other solutions can be deduced by these solutions, and the deduced solutions also fall within the protection scope of the present invention.
步骤S203:当判断为异常时,安全系统向操作系统发送数据备份指令,以使操作系统根据数据备份指令连接网络,并将操作系统中的资料信息上传到网络端的数据备份平台。Step S203: When it is determined that the abnormality is abnormal, the security system sends a data backup instruction to the operating system, so that the operating system connects to the network according to the data backup instruction, and uploads the material information in the operating system to the data backup platform of the network.
具体地,资料信息可以包括终端中的联系人信息、终端中的照片等,此处不对资料信息作限制。数据备份平台预先与终端建立了绑定关系,操作系统可以根据数据备份指令来建立终端与数据备份平台的网络连接。Specifically, the material information may include contact information in the terminal, a photo in the terminal, and the like, and the data information is not limited herein. The data backup platform establishes a binding relationship with the terminal in advance, and the operating system can establish a network connection between the terminal and the data backup platform according to the data backup instruction.
在一种可选的方案中,每个终端可以在数据备份系统中对应一个账号,操作系统在进行资料信息上传时,只将资料信息上传到自身所属的终端所对应的账号中。进一步地,数据备份指令可以包括登录上述账号的用户名和密码,数据备份平台地址查找子指令、登陆子指令、上传子指令等。举例来说,操作系统根据平台地址查找子指令来查找数据备份平台的网络地址,并通过浏览器在终端后台进入登陆数据备份平台的登陆界面,然后将上述用户名和密码输入到相应文本框中,再根据登陆子指令执行登陆操作,登陆成功后根据上传子指令执行上述资料信息的操作。进一步地,当资料信息较多时,还可以根据预设的上传优先级进行上传,该优先级参数可以封装在数据备份指令中。In an optional solution, each terminal may correspond to an account in the data backup system. When the operating system uploads the data information, the operating system only uploads the data information to the account corresponding to the terminal to which the terminal belongs. Further, the data backup instruction may include a username and password for logging in to the account, a data backup platform address lookup subcommand, a login subcommand, an upload subcommand, and the like. For example, the operating system searches for the network address of the data backup platform according to the platform address search sub-instruction, and enters the login interface of the login data backup platform in the background of the terminal through the browser, and then inputs the above-mentioned user name and password into the corresponding text box. Then, according to the login sub-instruction, the login operation is performed, and after the login is successful, the operation of the above-mentioned data information is performed according to the upload sub-command. Further, when there is more data information, the uploading may also be performed according to a preset uploading priority, and the priority parameter may be encapsulated in a data backup instruction.
可选的,上述用户名和密码可以是最开始使用该终端的用户设置的,也可以是在生产该终端时预置于终端中的。Optionally, the user name and password may be set by a user who initially uses the terminal, or may be preset in the terminal when the terminal is produced.
可选的,上述资料信息上传完后,还可以由操作系统来进行删除,可以在发送完所有的资料信息后再统一删除,也可以边发送边删除;操作系统具体是根据安全系统发送的删除指令来执行删除任务的。Optionally, after the foregoing information information is uploaded, the operating system may also delete the information, and after all the data information is sent, the data may be uniformly deleted, or deleted while being sent; the operating system is specifically deleted according to the security system. Instructions to perform the delete task.
在一种可选的方案中,操作系统根据数据备份指令连接网络,并将操作 系统中的资料信息上传到网络端的数据备份平台,包括:操作系统根据数据备份指令连接网络,且不输出网络连接成功的提示信息;操作系统将自身包含的资料信息上传到网络端的数据备份平台,且不输出表征上传状态的提示信息。In an alternative scenario, the operating system connects to the network based on data backup instructions and will operate The data information in the system is uploaded to the data backup platform of the network, including: the operating system connects to the network according to the data backup instruction, and does not output the prompt information of the successful network connection; the operating system uploads the data information contained in the system to the data backup platform of the network. The prompt information indicating the upload status is not output.
具体地,操作系统在连接网络(包括无线网和数据网络)时,不输出网络连接成功的提示信息,举例来说,目前大部分手机都有网络连接图标,当网络连接成功时,网络连接图标由灰色变亮,这样的显示效果具体由操作系统来实现,在本实施例的场景下,安全系统向操作系统发送的数据备份指令指示操作系统在网络连接成功时,依然保持网络连接图标为灰色。同理,现有技术中,终端向网络端上传数据时,会显示数据上传的图标,显示该图标同样也是由操作系统来控制的,在本实施例的场景下,安全系统向操作系统发送的数据备份指令指示操作系统在进行数据上传时,不显示数据上传的图标。Specifically, when the operating system connects to the network (including the wireless network and the data network), the prompt information of the successful network connection is not output. For example, most mobile phones currently have a network connection icon, and when the network connection is successful, the network connection icon The display effect is implemented by the operating system. In the scenario of this embodiment, the data backup command sent by the security system to the operating system indicates that the operating system keeps the network connection icon gray when the network connection is successful. . Similarly, in the prior art, when the terminal uploads data to the network, the icon of the data upload is displayed, and the icon is also controlled by the operating system. In the scenario of the embodiment, the security system sends the file to the operating system. The data backup instruction instructs the operating system not to display the icon of the data upload when the data is uploaded.
需要说明的是,上述举例描述的一些方案仅为本发明的一些可选的方案,显然还可以通过这些方案推导出其他的方案来,推导出的方案同样落入本发明的保护范围。It should be noted that some of the solutions described in the above examples are only some alternatives of the present invention, and it is obvious that other solutions can be deduced by these solutions, and the deduced solutions also fall within the protection scope of the present invention.
步骤S204:安全系统向终端当前的操作系统发送操作指令,以使当前的操作系统根据操作指令向预设的电话号码发送终端的状态信息,其中,操作指令携带有预设的电话号码。Step S204: The security system sends an operation instruction to the current operating system of the terminal, so that the current operating system sends the status information of the terminal to the preset phone number according to the operation instruction, where the operation instruction carries the preset phone number.
具体地,预设的电话号码可以为最开始使用终端的用户(以下称原用户)设置的一个电话号码,该用户设置之后存储于安全系统中。该操作指令用于触发操作系统的短信的功能,并向短信编辑框中输入上述预设的电话号码以及添加上述状态信息,进一步地触发操作系统发送编辑好的短信内容。进一步地,上述状态信息包括但不限于终端当前的位置信息、当前置入终端中的SIM卡电话号码等。Specifically, the preset phone number may be a phone number set by a user who initially uses the terminal (hereinafter referred to as the original user), and the user setting is stored in the security system. The operation instruction is used to trigger the function of the short message of the operating system, and input the preset phone number into the short message edit box and add the above state information, further triggering the operating system to send the edited short message content. Further, the foregoing status information includes, but is not limited to, current location information of the terminal, a SIM card phone number currently placed in the terminal, and the like.
进一步地,上述预设的电话号码可以是原用户使用的电话号码,也可以是其他人(如原用户的朋友、亲人等)的电话号码,这样一来,当终端不为原用户使用时,终端会向原用户(或其朋友、亲人)发送信息,以方便原用户找回终端。Further, the preset phone number may be a phone number used by the original user, or may be a phone number of another person (such as a friend, a relative, or the like of the original user), so that when the terminal is not used by the original user, The terminal will send information to the original user (or its friends, relatives) to facilitate the original user to retrieve the terminal.
在一种可选的方案中,当前的操作系统根据操作指令向预设的电话号码发送终端的状态信息,包括:当前的操作系统根据操作指令向预设的电话号码 发送终端的状态信息,且不输出表征发送状态的提示信息和不保留发送的记录。In an optional solution, the current operating system sends the status information of the terminal to the preset phone number according to the operation instruction, including: the current operating system sends the preset phone number according to the operation instruction. The status information of the terminal is transmitted, and the prompt information indicating the transmission status and the record not being transmitted are not output.
具体地,目前大多数终端在发送短信时,会通过声音、画面等进行提示,以告知用户当前正在发送短信或者短信已经发送成功,这些都是通过操作系统来具体实现的,在本实施例的场景下,安全系统向操作系统发送了使操作系统不进行上述提示的指令;进一步地,现有技术中,短信发送完了之后会在终端中保留记录,在本实施例的场景下,安全系统向操作系统发送了使操作系统不对短信记录进行保留或者删除短信记录的指令。Specifically, most of the terminals currently use the voice, the screen, and the like to prompt the user to send a short message to inform the user that the short message is being sent or the short message has been successfully sent. These are specifically implemented by the operating system, in this embodiment. In the scenario, the security system sends an instruction to the operating system to prevent the operating system from performing the above prompting. Further, in the prior art, after the short message is sent, the record is retained in the terminal. In the scenario of the embodiment, the security system The operating system sends an instruction to prevent the operating system from retaining or deleting the SMS record.
在一种可选的方案中,操作系统在向预设的电话号码发送短信之前,打开终端中的定位系统(如GPS、北斗定位系统等)来获取终端当前的位置信息,当然,操作系统是在响应安全系统发送的相关指令才打开定位系统的。In an optional solution, the operating system opens the positioning system (such as GPS, Beidou positioning system, etc.) in the terminal to obtain the current location information of the terminal before sending the short message to the preset phone number. Of course, the operating system is The positioning system is turned on in response to the relevant instructions sent by the security system.
需要说明的是,目前大多数终端开启定位系统后在终端的相应部位会输出提示信息以提示用户定位系统已开启,在本发明实施例的场景下,安全系统向操作系统发送的指令致使操作系统开启了定位系统,但是不输出任何提示信息。It should be noted that, when most terminals open the positioning system, the prompt information is outputted in the corresponding part of the terminal to prompt the user to locate the system. In the scenario of the embodiment of the present invention, the instruction sent by the security system to the operating system causes the operating system. The positioning system is turned on, but no prompt message is output.
在一种可选的方案中,在判断出用户身份异常时,安全系统还可以向操作系统发送拍摄指令,以使操作系统开启摄像头拍摄终端当前周围的画面,并将该画面上传到上述数据备份平台或者通过短信发送到上述预设的电话号码。In an optional solution, when determining that the identity of the user is abnormal, the security system may further send a shooting instruction to the operating system, so that the operating system turns on the current surrounding image of the camera shooting terminal, and uploads the screen to the data backup. The platform or SMS is sent to the above preset phone number.
进一步地,上述发送短信的过程和上述上传资料信息的过程的先后顺序此处不作限制,不管哪个过程在前或在后都是完整的可实施的方案,此处不再对每种情况分别举例。Further, the sequence of the process of sending the short message and the process of uploading the data information is not limited herein, and no matter which process is before or after, it is a complete implementable solution. .
需要说明的是,上述描述的一些方案仅为本发明的一些可选的方案,显然还可以通过这些方案推导出其他的方案来,推导出的方案同样落入本发明的保护范围。It should be noted that some of the foregoing descriptions are only some alternatives of the present invention, and it is obvious that other solutions can be deduced by these solutions, and the deduced solutions also fall within the protection scope of the present invention.
在图2所描述的终端管理方法中,在终端中设置独立于操作系统的安全系统,安全系统识别对终端的用户操作信息,以判断操作终端的用户是否异常,若异常则及时触发操作系统向预设的数据备份平台发送重要数据,有效地防止了终端中的重要信息的丢失。In the terminal management method described in FIG. 2, a security system independent of the operating system is set in the terminal, and the security system identifies user operation information of the terminal to determine whether the user of the operation terminal is abnormal, and if abnormal, triggers the operating system to The preset data backup platform sends important data, effectively preventing the loss of important information in the terminal.
进一步地,在发送这些重要信息时,安全系统触发操作系统不输出网络连 接成功的提示信息,也不输出正在进行数据上传的提示信息,以使当前持有终端的其他用户无法察觉正在进行重要信息的上传;根据预先总结出的用户操作习惯来判断使用终端的用户身份是否异常,若异常才执行上传重要资料信息的操作;进一步地,判断用户身份是否异常由安全系统来完成,由于安全系统与操作系统相互独立,即使终端被刷机了,终端依然可以通过安全系统中原始用户设置的参数信息来判断用户身份是否异常;再进一步地,安全系统可以触发操作系统根据安全系统中预存的电话号码来向原用户发送短信,以告知终端当前的状态(如位置、SIM卡号等),使得原用户可以尽可能的找回手机;再进一步地,安全系统会触发操作系统发送短信时不输出发送的状态信息,也不在终端中保留该短信的记录,提高了隐秘性;再进一步地,在判断用户身份异常后,安全系统还可以触发操作系统开启相关模块来采集当前用户的信息(如照片、身份证等)发送到预设的手机好,以为原用户找回手机提供更多有用的线索;另外,身份验证方式可以为虹膜验证、指纹验证、眼纹验证、人脸验证、掌纹验证、声纹验证等验证方式,由于每个人的这些生物特征基本都是唯一的,可以提高验证的准确度。Further, when transmitting these important information, the security system triggers the operating system not to output the network connection. The successful prompt information is not output, and the prompt information for data uploading is not output, so that other users currently holding the terminal cannot detect the uploading of important information; the user identity of the used terminal is judged according to the user operation habits pre-summed. Whether it is abnormal, if an abnormality is performed, the operation of uploading important material information is performed; further, determining whether the user identity is abnormal is completed by the security system, since the security system and the operating system are independent of each other, even if the terminal is brushed, the terminal can still pass through the security system. The parameter information set by the original user is used to determine whether the user identity is abnormal. Further, the security system may trigger the operating system to send a short message to the original user according to the phone number pre-stored in the security system to inform the terminal of the current state (such as location, SIM card number, etc.) ), so that the original user can retrieve the mobile phone as much as possible; further, the security system will trigger the operating system to not send the sent status information when sending the short message, and the record of the short message is not retained in the terminal, thereby improving the privacy; further Ground, in judgment After the identity is abnormal, the security system can also trigger the operating system to open the relevant module to collect the current user information (such as photos, ID cards, etc.) and send it to the preset mobile phone, so as to provide more useful clues for the original user to retrieve the mobile phone; The authentication method can be verified by iris verification, fingerprint verification, eye pattern verification, face verification, palm print verification, voiceprint verification, etc. Since each of these biometric features is basically unique, the accuracy of verification can be improved. .
上述详细阐述了本发明实施例的方法,为了便于更好地实施本发明实施例的上述方案,相应地,下面提供了本发明实施例的终端。The foregoing describes the method of the embodiment of the present invention in detail. In order to facilitate the implementation of the foregoing solution of the embodiment of the present invention, the terminal of the embodiment of the present invention is provided below.
请参见图3,图3是本发明实施例提供的一种终端30的结构示意图,该终端30可以包括操作系统301和安全系统302,安全系统302可以包括获取单元3021、判断单元3022和第一发送单元3023,其中,各个单元的详细描述如下。Referring to FIG. 3, FIG. 3 is a schematic structural diagram of a terminal 30 according to an embodiment of the present invention. The terminal 30 may include an operating system 301 and a security system 302. The security system 302 may include an obtaining unit 3021, a determining unit 3022, and a first The transmitting unit 3023, wherein the detailed description of each unit is as follows.
获取单元3021用于获取对终端30进行操作时的用户操作信息。The obtaining unit 3021 is configured to acquire user operation information when the terminal 30 is operated.
具体地,终端30包括操作系统301和安全系统302,操作系统301和安全系统302之间可以进行数据交互,例如,安全系统302可以向操作系统301发送指令,以使操作系统301根据该指令执行相应操作。安全系统302和操作系统301相互独立,以一种场景为例,当用户更换了终端30的操作系统301后,终端30中的安全系统302依然保留,且安全系统302中的数据不丢失,另外,安全系统302还可以与终端30中更换后的操作系统301进行数据交互。 Specifically, the terminal 30 includes an operating system 301 and a security system 302. Data interaction can be performed between the operating system 301 and the security system 302. For example, the security system 302 can send an instruction to the operating system 301 to cause the operating system 301 to execute according to the instruction. The corresponding operation. The security system 302 and the operating system 301 are independent of each other. Taking a scenario as an example, after the user replaces the operating system 301 of the terminal 30, the security system 302 in the terminal 30 remains, and the data in the security system 302 is not lost. The security system 302 can also perform data interaction with the replaced operating system 301 in the terminal 30.
获取单元3021可以直接控制终端30上的用户接口来获取用户操作信息;也可以向操作系统301获取用户操作信息,例如,操作系统301本身会实时获取用户操作信息,当接收到获取单元3021的请求指令时,将获取到的该用户操作信息发送给获取单元3021。The obtaining unit 3021 can directly control the user interface on the terminal 30 to obtain the user operation information. The user operation information can also be obtained from the operating system 301. For example, the operating system 301 itself obtains the user operation information in real time, and receives the request of the obtaining unit 3021. When the command is received, the acquired user operation information is sent to the obtaining unit 3021.
进一步地,上述操作可以是用户对终端30执行的用于进入终端30主程序界面的密码解锁操作、生物特征(虹膜识别、指纹识别、眼纹识别、人脸识别、掌纹识别、声纹识别等)解锁操作、滑动解锁操作、按键解锁操作、刷机操作等。Further, the foregoing operation may be a password unlocking operation performed by the user on the terminal 30 for entering the main program interface of the terminal 30, biometrics (iris recognition, fingerprint recognition, eye pattern recognition, face recognition, palmprint recognition, voiceprint recognition). Etc.) Unlock operation, slide unlock operation, button unlock operation, brush operation, etc.
相应地,用户操作信息为获取单元3021感应到用户执行上述操作时,获取的一些用户信息或操作信息。举例来说,当感应到用户执行密码解锁操作时,获取到的用户操作信息可以包括密码解锁是否失败、失败的次数,失败之后是否有刷新操作系统301的相关操作等信息;当感应到用户使用指纹解锁操作时,获取到的用户操作信息可以包括通过终端30中的信息采集接口模块采集到的用户的指纹、预设时间内采集指纹的次数、是否有刷新操作系统301的相关操作等信息;当感应到用户执行滑动解锁的操作时,获取到的用户操作信息可以包括通过终端30中的信息采集接口模块获取到的用户的一些生物特征信息,其中,获取生物特征的获取规则还可以进一步设置,例如,不在每一次感应到滑动解锁时都获取生物特征信息,而是在开机后第一次感应到滑动解锁时都获取生物特征信息,或者每一天第一次感应到滑动解锁时都获取生物特征信息等;当感应到用户刷新系统的操作时,获取到的用户操作信息可以包括通过终端30中的信息采集接口模块获取到的用户的一些生物特征信息等。Correspondingly, the user operation information is the acquisition unit 3021 that senses some user information or operation information acquired when the user performs the above operation. For example, when the user is instructed to perform the password unlocking operation, the obtained user operation information may include whether the password unlocking fails, the number of failures, whether there is a related operation of refreshing the operating system 301 after the failure, and the like when the user is sensed. During the fingerprint unlocking operation, the acquired user operation information may include the fingerprint of the user collected by the information collection interface module in the terminal 30, the number of times the fingerprint is collected within a preset time period, and whether the related operation of the operating system 301 is refreshed. When the user performs the operation of performing the sliding unlocking, the obtained user operation information may include some biometric information of the user acquired by the information collecting interface module in the terminal 30, wherein the acquiring rules for acquiring the biometrics may further be set. For example, the biometric information is not acquired every time the sliding unlock is sensed, but the biometric information is acquired when the sliding sensing is first detected after the power is turned on, or the creature is acquired when the sliding sensing is first sensed every day. Feature information, etc.; when the user refresh system is sensed During the operation, the obtained user operation information may include some biometric information of the user acquired through the information collection interface module in the terminal 30.
需要说明的是,上述举例描述的一些方案仅为本发明的一些可选的方案,显然还可以通过这些方案推导出其他的方案来,推导出的方案同样落入本发明的保护范围。It should be noted that some of the solutions described in the above examples are only some alternatives of the present invention, and it is obvious that other solutions can be deduced by these solutions, and the deduced solutions also fall within the protection scope of the present invention.
判断单元3022用于根据用户操作信息判断对终端30进行操作的用户身份是否异常。The determining unit 3022 is configured to determine, according to the user operation information, whether the identity of the user operating the terminal 30 is abnormal.
具体地,获取单元3021获取了用户操作信息后,由判断单元3022对用户操作信息进行处理分析,处理分析的结果用来判断对终端30进行操作的用户身份是否异常。 Specifically, after the acquiring unit 3021 acquires the user operation information, the determining unit 3022 performs processing analysis on the user operation information, and the result of the processing analysis is used to determine whether the user identity of the user operating on the terminal 30 is abnormal.
举例来所,当用户通过验证指纹(当然还可以是虹膜识、眼纹、人脸、掌纹、声纹等)来进入终端30的主程序界面时,判断单元3022分析得出获取单元3021获取到的指纹与预先录入的指纹不匹配时,可以判定该用户身份异常(进一步地,还可以增加判断条件,例如,分析得出获取到的指纹与预先录入的指纹不匹配且用户还执行了刷新系统的相关操作时,判定该用户身份异常)。再如,当用户通过在密码解锁界面输入密码来进入终端30的主程序界面时,判断单元3022将获取到的用户输入错误的次数与预设的次数阈值进行对比,当错误的次数达到预设阈值时,可以判断用户身份异常(进一步地,还可以增加判断条件,例如,错误的次数达到预设阈值且用户还有执行了刷新系统的相关操作时,判定该用户身份异常)。当然,用户进入主程序界面还可以有其他的验证方式,同样的,也可以通过上述分析判断的原理来判断用户身份是否异常。进一步地,当用户进入主程序界面不需要任何验证时,可以按照预设的规则获取生物特征后,对生物特征进行验证,当生物特征与预设的特征不符合时,判定用户身份异常。For example, when the user enters the main program interface of the terminal 30 by verifying the fingerprint (which may of course be iris recognition, eye pattern, face, palm print, voice print, etc.), the determining unit 3022 analyzes and obtains the acquisition unit 3021. When the obtained fingerprint does not match the pre-recorded fingerprint, the user identity may be determined to be abnormal (further, the judgment condition may also be added, for example, the analysis finds that the obtained fingerprint does not match the pre-recorded fingerprint and the user also performs the refresh. When the system is related to the operation, it is determined that the user identity is abnormal). For example, when the user enters the main program interface of the terminal 30 by inputting a password on the password unlocking interface, the determining unit 3022 compares the obtained number of times the user inputs an error with a preset number of times threshold, and when the number of errors reaches the preset When the threshold is used, the user identity may be abnormal. (Further, the judgment condition may also be increased. For example, when the number of errors reaches a preset threshold and the user has performed a related operation of refreshing the system, the user identity is determined to be abnormal). Of course, the user can have other verification methods when entering the main program interface. Similarly, the principle of the above analysis and judgment can also be used to determine whether the user identity is abnormal. Further, when the user does not need any verification to enter the main program interface, the biometric feature may be obtained according to a preset rule, and the biometric feature is verified. When the biometric feature does not match the preset feature, the user identity is determined to be abnormal.
需要说明的是,上述举例描述的一些方案仅为本发明的一些可选的方案,显然还可以通过这些方案推导出其他的方案来,推导出的方案同样落入本发明的保护范围。It should be noted that some of the solutions described in the above examples are only some alternatives of the present invention, and it is obvious that other solutions can be deduced by these solutions, and the deduced solutions also fall within the protection scope of the present invention.
第一发送单元3023用于在判断单元3022判断出用户身份异常时,向操作系统301发送数据备份指令,以使操作系统301根据数据备份指令连接网络,并将操作系统301中的资料信息上传到网络端的数据备份平台。The first sending unit 3023 is configured to send a data backup instruction to the operating system 301 when the determining unit 3022 determines that the user identity is abnormal, so that the operating system 301 connects to the network according to the data backup instruction, and uploads the material information in the operating system 301 to the A data backup platform on the network side.
具体地,资料信息可以包括终端30中的联系人信息、终端30中的照片等,此处不对资料信息作限制。数据备份平台预先与终端30建立了绑定关系,操作系统301可以根据数据备份指令来建立终端30与数据备份平台的网络连接。Specifically, the material information may include contact information in the terminal 30, photos in the terminal 30, and the like, and the data information is not limited herein. The data backup platform establishes a binding relationship with the terminal 30 in advance, and the operating system 301 can establish a network connection between the terminal 30 and the data backup platform according to the data backup instruction.
在一种可选的方案中,每个终端30可以在数据备份系统中对应一个账号,操作系统301在进行资料信息上传时,只将资料信息上传到自身所属的终端30所对应的账号中。进一步地,数据备份指令可以包括登录上述账号的用户名和密码,数据备份平台地址查找子指令、登陆子指令、上传子指令等。举例来说,操作系统301根据平台地址查找子指令来查找数据备份平台的网络地址,并通过浏览器在终端30后台进入登陆数据备份平台的登陆界面,然后将 上述用户名和密码输入到相应文本框中,再根据登陆子指令执行登陆操作,登陆成功后根据上传子指令执行上述资料信息的操作。进一步地,当资料信息较多时,还可以根据预设的上传优先级进行上传,该优先级参数可以封装在数据备份指令中。In an optional solution, each terminal 30 can correspond to an account in the data backup system. When the data information is uploaded, the operating system 301 uploads the data information only to the account corresponding to the terminal 30 to which the terminal belongs. Further, the data backup instruction may include a username and password for logging in to the account, a data backup platform address lookup subcommand, a login subcommand, an upload subcommand, and the like. For example, the operating system 301 searches for the network address of the data backup platform according to the platform address search sub-instruction, and enters the login interface of the login data backup platform in the background of the terminal 30 through the browser, and then The above user name and password are input into the corresponding text box, and then the login operation is performed according to the login sub-command. After the login is successful, the above-mentioned data information operation is performed according to the upload sub-command. Further, when there is more data information, the uploading may also be performed according to a preset uploading priority, and the priority parameter may be encapsulated in a data backup instruction.
可选的,上述用户名和密码可以是最开始使用该终端30的用户设置的,也可以是在生产该终端30时预置于终端30中的。Optionally, the user name and password may be set by a user who initially uses the terminal 30, or may be preset in the terminal 30 when the terminal 30 is produced.
可选的,上述资料信息上传完后,还可以由操作系统301来进行删除,可以在发送完所有的资料信息后再统一删除,也可以边发送边删除;操作系统301具体是根据第一发送单元3023发送的删除指令来执行删除任务的。Optionally, after the foregoing information information is uploaded, the operating system 301 may be deleted, and all the data information may be uniformly deleted after being sent, or may be deleted while being sent; the operating system 301 is specifically configured according to the first sending. The delete instruction sent by unit 3023 performs the delete task.
在一种可选的方案中,操作系统301根据数据备份指令连接网络,并将操作系统301中的资料信息上传到网络端的数据备份平台,包括:操作系统301根据数据备份指令连接网络,且不输出网络连接成功的提示信息;操作系统301将自身包含的资料信息上传到网络端的数据备份平台,且不输出表征上传状态的提示信息。In an optional solution, the operating system 301 connects to the network according to the data backup instruction, and uploads the data information in the operating system 301 to the data backup platform of the network, including: the operating system 301 connects to the network according to the data backup instruction, and does not The prompt information indicating that the network connection is successful is output; the operating system 301 uploads the data information included in the network to the data backup platform of the network, and does not output prompt information indicating the upload status.
具体地,操作系统301在连接网络(包括无线网和数据网络)时,不输出网络连接成功的提示信息,举例来说,目前大部分手机都有网络连接图标,当网络连接成功时,网络连接图标由灰色变亮,这样的显示效果具体由操作系统301来实现,在本实施例的场景下,第一发送单元3023向操作系统301发送的数据备份指令指示操作系统301在网络连接成功时,依然保持网络连接图标为灰色。同理,现有技术中,终端30向网络端上传数据时,会显示数据上传的图标,显示该图标同样也是由操作系统301来控制的,在本实施例的场景下,第一发送单元3023向操作系统301发送的数据备份指令指示操作系统301在进行数据上传时,不显示数据上传的图标。Specifically, when the operating system 301 connects to the network (including the wireless network and the data network), the prompt information of the successful network connection is not output. For example, most mobile phones currently have network connection icons. When the network connection is successful, the network connection is The icon is highlighted by the gray color. The display effect is specifically implemented by the operating system 301. In the scenario of the embodiment, the data backup instruction sent by the first sending unit 3023 to the operating system 301 indicates that the operating system 301 is successful when the network connection is successful. Still keep the network connection icon gray. Similarly, in the prior art, when the terminal 30 uploads data to the network, the icon of the data upload is displayed, and the icon is also controlled by the operating system 301. In the scenario of the embodiment, the first sending unit 3023 The data backup instruction sent to the operating system 301 instructs the operating system 301 not to display the icon for data upload when performing data upload.
需要说明的是,上述举例描述的一些方案仅为本发明的一些可选的方案,显然还可以通过这些方案推导出其他的方案来,推导出的方案同样落入本发明的保护范围。It should be noted that some of the solutions described in the above examples are only some alternatives of the present invention, and it is obvious that other solutions can be deduced by these solutions, and the deduced solutions also fall within the protection scope of the present invention.
需要说明的是,在本发明实施例中,各个单元的具体实现还可以对应参照图1所示的方法实施例的相应描述。It should be noted that, in the embodiment of the present invention, the specific implementation of each unit may also correspond to the corresponding description of the method embodiment shown in FIG. 1 .
在图3所描述的终端30中,在终端30中设置独立于操作系统301的安全 系统302,安全系统302识别对终端30的用户操作信息,以判断操作终端30的用户是否异常,若异常则及时触发操作系统301向预设的数据备份平台发送重要数据,有效地防止了终端30中的重要信息的丢失。In the terminal 30 described in FIG. 3, security independent of the operating system 301 is set in the terminal 30. The system 302 identifies the user operation information of the terminal 30 to determine whether the user of the operation terminal 30 is abnormal. If abnormal, the operating system 301 is triggered to send important data to the preset data backup platform in time, thereby effectively preventing the terminal 30. The loss of important information.
请参见图4,图4是本发明实施例提供的又一种终端30的结构示意图,该终端30可以包括操作系统301和安全系统302,安全系统302可以包括获取单元3021、判断单元3022、第一发送单元3023和第二发送单元3024,其中,各个单元的详细描述如下。Referring to FIG. 4, FIG. 4 is a schematic structural diagram of another terminal 30 according to an embodiment of the present invention. The terminal 30 may include an operating system 301 and a security system 302. The security system 302 may include an obtaining unit 3021 and a determining unit 3022. A transmitting unit 3023 and a second transmitting unit 3024, wherein the detailed description of each unit is as follows.
获取单元3021用于获取对终端进行操作时的用户操作信息。The obtaining unit 3021 is configured to acquire user operation information when the terminal is operated.
具体地,终端30包括操作系统301和安全系统302,操作系统301和安全系统302之间可以进行数据交互,例如,安全系统302可以向操作系统301发送指令,以使操作系统301根据该指令执行相应操作。安全系统302和操作系统301相互独立,以一种场景为例,当用户更换了终端30的操作系统301后,终端30中的安全系统302依然保留,且安全系统302中的数据不丢失,另外,安全系统302还可以与终端30中更换后的操作系统301进行数据交互。Specifically, the terminal 30 includes an operating system 301 and a security system 302. Data interaction can be performed between the operating system 301 and the security system 302. For example, the security system 302 can send an instruction to the operating system 301 to cause the operating system 301 to execute according to the instruction. The corresponding operation. The security system 302 and the operating system 301 are independent of each other. Taking a scenario as an example, after the user replaces the operating system 301 of the terminal 30, the security system 302 in the terminal 30 remains, and the data in the security system 302 is not lost. The security system 302 can also perform data interaction with the replaced operating system 301 in the terminal 30.
获取单元3021可以直接控制终端30上的用户接口来获取用户操作信息;也可以向操作系统301获取用户操作信息,例如,操作系统301本身会实时获取用户操作信息,当接收到获取单元3021的请求指令时,将获取到的该用户操作信息发送给获取单元3021。The obtaining unit 3021 can directly control the user interface on the terminal 30 to obtain the user operation information. The user operation information can also be obtained from the operating system 301. For example, the operating system 301 itself obtains the user operation information in real time, and receives the request of the obtaining unit 3021. When the command is received, the acquired user operation information is sent to the obtaining unit 3021.
进一步地,上述操作可以是用户对终端30执行的用于进入终端30主程序界面的密码解锁操作、生物特征(虹膜识别、指纹识别、眼纹识别、人脸识别、掌纹识别、声纹识别等)解锁操作、滑动解锁操作、按键解锁操作、刷机操作等。Further, the foregoing operation may be a password unlocking operation performed by the user on the terminal 30 for entering the main program interface of the terminal 30, biometrics (iris recognition, fingerprint recognition, eye pattern recognition, face recognition, palmprint recognition, voiceprint recognition). Etc.) Unlock operation, slide unlock operation, button unlock operation, brush operation, etc.
相应地,用户操作信息为获取单元3021感应到用户执行上述操作时,获取的一些用户信息或操作信息。举例来说,当感应到用户执行密码解锁操作时,获取到的用户操作信息可以包括密码解锁是否失败、失败的次数,失败之后是否有刷新操作系统301的相关操作等信息;当感应到用户使用指纹解锁操作时,获取到的用户操作信息可以包括通过终端30中的信息采集接口模块采集到的用户的指纹、预设时间内采集指纹的次数、是否有刷新操作系统301的相 关操作等信息;当感应到用户执行滑动解锁的操作时,获取到的用户操作信息可以包括通过终端30中的信息采集接口模块获取到的用户的一些生物特征信息,其中,获取生物特征的获取规则还可以进一步设置,例如,不在每一次感应到滑动解锁时都获取生物特征信息,而是在开机后第一次感应到滑动解锁时都获取生物特征信息,或者每一天第一次感应到滑动解锁时都获取生物特征信息等;当感应到用户刷新系统的操作时,获取到的用户操作信息可以包括通过终端30中的信息采集接口模块获取到的用户的一些生物特征信息等。Correspondingly, the user operation information is the acquisition unit 3021 that senses some user information or operation information acquired when the user performs the above operation. For example, when the user is instructed to perform the password unlocking operation, the obtained user operation information may include whether the password unlocking fails, the number of failures, whether there is a related operation of refreshing the operating system 301 after the failure, and the like when the user is sensed. During the fingerprint unlocking operation, the obtained user operation information may include the fingerprint of the user collected by the information collection interface module in the terminal 30, the number of times the fingerprint is collected within the preset time, and whether the phase of the operating system 301 is refreshed. When the operation of the user is performed, the obtained user operation information may include some biometric information of the user acquired through the information collection interface module in the terminal 30, wherein the acquisition of the biometric feature is obtained. The rule can be further set, for example, not acquiring biometric information every time the sliding unlock is sensed, but acquiring biometric information when sensing the sliding unlocking for the first time after powering on, or sensing the sliding for the first time every day. The biometric information and the like are obtained when the user is unlocked. When the operation of the user refreshing the system is sensed, the acquired user operation information may include some biometric information of the user acquired through the information collection interface module in the terminal 30.
需要说明的是,上述举例描述的一些方案仅为本发明的一些可选的方案,显然还可以通过这些方案推导出其他的方案来,推导出的方案同样落入本发明的保护范围。It should be noted that some of the solutions described in the above examples are only some alternatives of the present invention, and it is obvious that other solutions can be deduced by these solutions, and the deduced solutions also fall within the protection scope of the present invention.
判断单元3022用于根据用户操作信息判断对终端进行操作的用户身份是否异常。The determining unit 3022 is configured to determine, according to the user operation information, whether the identity of the user who operates the terminal is abnormal.
具体地,获取单元3021获取了用户操作信息后,由判断单元3022对用户操作信息进行处理分析,处理分析的结果用来判断对终端30进行操作的用户身份是否异常。Specifically, after the acquiring unit 3021 acquires the user operation information, the determining unit 3022 performs processing analysis on the user operation information, and the result of the processing analysis is used to determine whether the user identity of the user operating on the terminal 30 is abnormal.
举例来说,当用户通过验证指纹(当然还可以是虹膜识、眼纹、人脸、掌纹、声纹等)来进入终端30的主程序界面时,判断单元3022分析得出获取单元3021获取到的指纹与预先录入的指纹不匹配时,可以判定该用户身份异常(进一步地,还可以增加判断条件,例如,分析得出获取到的指纹与预先录入的指纹不匹配且用户还执行了刷新系统的相关操作时,判定该用户身份异常)。再如,当用户通过在密码解锁界面输入密码来进入终端30的主程序界面时,判断单元3022将获取到的用户输入错误的次数与预设的次数阈值进行对比,当错误的次数达到预设阈值时,可以判断用户身份异常(进一步地,还可以增加判断条件,例如,错误的次数达到预设阈值且用户还有执行了刷新系统的相关操作时,判定该用户身份异常)。当然,用户进入主程序界面还可以有其他的验证方式,同样的,也可以通过上述分析判断的原理来判断用户身份是否异常。进一步地,当用户进入主程序界面不需要任何验证时,可以按照预设的规则获取生物特征后,对生物特征进行验证,当生物特征与预设的特征不符合时,判定用户身份异常。 For example, when the user enters the main program interface of the terminal 30 by verifying the fingerprint (which may of course be iris recognition, eye pattern, face, palm print, voice print, etc.), the determining unit 3022 analyzes and obtains the acquisition unit 3021. When the obtained fingerprint does not match the pre-recorded fingerprint, the user identity may be determined to be abnormal (further, the judgment condition may also be added, for example, the analysis finds that the obtained fingerprint does not match the pre-recorded fingerprint and the user also performs the refresh. When the system is related to the operation, it is determined that the user identity is abnormal). For example, when the user enters the main program interface of the terminal 30 by inputting a password on the password unlocking interface, the determining unit 3022 compares the obtained number of times the user inputs an error with a preset number of times threshold, and when the number of errors reaches the preset When the threshold is used, the user identity may be abnormal. (Further, the judgment condition may also be increased. For example, when the number of errors reaches a preset threshold and the user has performed a related operation of refreshing the system, the user identity is determined to be abnormal). Of course, the user can have other verification methods when entering the main program interface. Similarly, the principle of the above analysis and judgment can also be used to determine whether the user identity is abnormal. Further, when the user does not need any verification to enter the main program interface, the biometric feature may be obtained according to a preset rule, and the biometric feature is verified. When the biometric feature does not match the preset feature, the user identity is determined to be abnormal.
需要说明的是,上述举例描述的一些方案仅为本发明的一些可选的方案,显然还可以通过这些方案推导出其他的方案来,推导出的方案同样落入本发明的保护范围。It should be noted that some of the solutions described in the above examples are only some alternatives of the present invention, and it is obvious that other solutions can be deduced by these solutions, and the deduced solutions also fall within the protection scope of the present invention.
第一发送单元3023用于在判断单元3022判断出用户身份异常时,向操作系统发送数据备份指令,以使操作系统根据数据备份指令连接网络,并将操作系统中的资料信息上传到网络端的数据备份平台。The first sending unit 3023 is configured to send a data backup instruction to the operating system when the determining unit 3022 determines that the user identity is abnormal, so that the operating system connects to the network according to the data backup instruction, and uploads the data information in the operating system to the data of the network. Backup platform.
具体地,资料信息可以包括终端30中的联系人信息、终端30中的照片等,此处不对资料信息作限制。数据备份平台预先与终端30建立了绑定关系,操作系统301可以根据数据备份指令来建立终端30与数据备份平台的网络连接。Specifically, the material information may include contact information in the terminal 30, photos in the terminal 30, and the like, and the data information is not limited herein. The data backup platform establishes a binding relationship with the terminal 30 in advance, and the operating system 301 can establish a network connection between the terminal 30 and the data backup platform according to the data backup instruction.
在一种可选的方案中,每个终端30可以在数据备份系统中对应一个账号,操作系统301在进行资料信息上传时,只将资料信息上传到自身所属的终端30所对应的账号中。进一步地,数据备份指令可以包括登录上述账号的用户名和密码,数据备份平台地址查找子指令、登陆子指令、上传子指令等。举例来说,操作系统301根据平台地址查找子指令来查找数据备份平台的网络地址,并通过浏览器在终端30后台进入登陆数据备份平台的登陆界面,然后将上述用户名和密码输入到相应文本框中,再根据登陆子指令执行登陆操作,登陆成功后根据上传子指令执行上述资料信息的操作。进一步地,当资料信息较多时,还可以根据预设的上传优先级进行上传,该优先级参数可以封装在数据备份指令中。In an optional solution, each terminal 30 can correspond to an account in the data backup system. When the data information is uploaded, the operating system 301 uploads the data information only to the account corresponding to the terminal 30 to which the terminal belongs. Further, the data backup instruction may include a username and password for logging in to the account, a data backup platform address lookup subcommand, a login subcommand, an upload subcommand, and the like. For example, the operating system 301 searches for the network address of the data backup platform according to the platform address search sub-instruction, and enters the login interface of the login data backup platform in the background of the terminal 30 through the browser, and then inputs the above-mentioned username and password into the corresponding text box. In the middle, the login operation is performed according to the login sub-instruction, and after the login is successful, the operation of the above-mentioned data information is performed according to the upload sub-command. Further, when there is more data information, the uploading may also be performed according to a preset uploading priority, and the priority parameter may be encapsulated in a data backup instruction.
可选的,上述用户名和密码可以是最开始使用该终端30的用户设置的,也可以是在生产该终端30时预置于终端30中的。Optionally, the user name and password may be set by a user who initially uses the terminal 30, or may be preset in the terminal 30 when the terminal 30 is produced.
可选的,上述资料信息上传完后,还可以由操作系统301来进行删除,可以在发送完所有的资料信息后再统一删除,也可以边发送边删除;操作系统301具体是根据第一发送单元3023发送的删除指令来执行删除任务的。Optionally, after the foregoing information information is uploaded, the operating system 301 may be deleted, and all the data information may be uniformly deleted after being sent, or may be deleted while being sent; the operating system 301 is specifically configured according to the first sending. The delete instruction sent by unit 3023 performs the delete task.
在一种可选的方案中,操作系统301根据数据备份指令连接网络,并将操作系统301中的资料信息上传到网络端的数据备份平台,包括:操作系统301根据数据备份指令连接网络,且不输出网络连接成功的提示信息;操作系统301将自身包含的资料信息上传到网络端的数据备份平台,且不输出表征上传状态的提示信息。 In an optional solution, the operating system 301 connects to the network according to the data backup instruction, and uploads the data information in the operating system 301 to the data backup platform of the network, including: the operating system 301 connects to the network according to the data backup instruction, and does not The prompt information indicating that the network connection is successful is output; the operating system 301 uploads the data information included in the network to the data backup platform of the network, and does not output prompt information indicating the upload status.
具体地,操作系统301在连接网络(包括无线网和数据网络)时,不输出网络连接成功的提示信息,举例来说,目前大部分手机都有网络连接图标,当网络连接成功时,网络连接图标由灰色变亮,这样的显示效果具体由操作系统301来实现,在本实施例的场景下,第一发送单元3023向操作系统301发送的数据备份指令指示操作系统301在网络连接成功时,依然保持网络连接图标为灰色。同理,现有技术中,终端30向网络端上传数据时,会显示数据上传的图标,显示该图标同样也是由操作系统301来控制的,在本实施例的场景下,第一发送单元3023向操作系统301发送的数据备份指令指示操作系统301在进行数据上传时,不显示数据上传的图标。Specifically, when the operating system 301 connects to the network (including the wireless network and the data network), the prompt information of the successful network connection is not output. For example, most mobile phones currently have network connection icons. When the network connection is successful, the network connection is The icon is highlighted by the gray color. The display effect is specifically implemented by the operating system 301. In the scenario of the embodiment, the data backup instruction sent by the first sending unit 3023 to the operating system 301 indicates that the operating system 301 is successful when the network connection is successful. Still keep the network connection icon gray. Similarly, in the prior art, when the terminal 30 uploads data to the network, the icon of the data upload is displayed, and the icon is also controlled by the operating system 301. In the scenario of the embodiment, the first sending unit 3023 The data backup instruction sent to the operating system 301 instructs the operating system 301 not to display the icon for data upload when performing data upload.
需要说明的是,上述举例描述的一些方案仅为本发明的一些可选的方案,显然还可以通过这些方案推导出其他的方案来,推导出的方案同样落入本发明的保护范围。It should be noted that some of the solutions described in the above examples are only some alternatives of the present invention, and it is obvious that other solutions can be deduced by these solutions, and the deduced solutions also fall within the protection scope of the present invention.
第二发送单元3024用于向终端30当前的操作系统301发送操作指令,以使当前的操作系统301根据操作指令向预设的电话号码发送终端30的状态信息,其中,操作指令携带有预设的电话号码。The second sending unit 3024 is configured to send an operation instruction to the current operating system 301 of the terminal 30, so that the current operating system 301 sends the status information of the terminal 30 to the preset phone number according to the operation instruction, where the operation instruction carries a preset. Phone number.
具体地,预设的电话号码可以为最开始使用终端30的用户(以下称原用户)设置的一个电话号码,原用户设置之后存储于安全系统中。该操作指令用于触发操作系统301的短信的功能,并向短信编辑框中输入上述预设的电话号码以及添加上述状态信息,进一步地触发操作系统301发送编辑好的短信内容。进一步地,上述状态信息包括但不限于终端30当前的位置信息、当前置入终端30中的SIM卡电话号码等。Specifically, the preset phone number may be a phone number set by the user who initially uses the terminal 30 (hereinafter referred to as the original user), and is stored in the security system after the original user is set. The operation instruction is used to trigger the function of the short message of the operating system 301, and input the preset phone number into the short message edit box and add the above state information, further triggering the operating system 301 to send the edited short message content. Further, the foregoing status information includes, but is not limited to, current location information of the terminal 30, a SIM card telephone number currently placed in the terminal 30, and the like.
进一步地,上述预设的电话号码可以是原用户使用的电话号码,也可以是其他人(如原用户的朋友、亲人等)的电话号码,这样一来,当终端30不为原用户使用时,第二发送单元3024会触发操作系统301向原用户(或其朋友、亲人)发送信息,以方便原用户找回终端30。Further, the preset phone number may be a phone number used by the original user, or may be a phone number of another person (such as a friend, a relative, or the like of the original user), so that when the terminal 30 is not used by the original user, The second sending unit 3024 triggers the operating system 301 to send information to the original user (or a friend or a relative) to facilitate the original user to retrieve the terminal 30.
在一种可选的方案中,当前的操作系统301根据操作指令向预设的电话号码发送终端30的状态信息,包括:当前的操作系统301根据操作指令向预设的电话号码发送终端30的状态信息,且不输出表征发送状态的提示信息和不保留发送的记录。 In an optional solution, the current operating system 301 sends the status information of the terminal 30 to the preset phone number according to the operation instruction, including: the current operating system 301 sends the terminal 30 to the preset phone number according to the operation instruction. Status information, and does not output prompt information characterizing the transmission status and records that do not retain the transmission.
具体地,目前大多数终端30在发送短信时,会通过声音、画面等进行提示,以告知用户当前正在发送短信或者短信已经发送成功,这些都是通过操作系统301来具体实现的,在本实施例的场景下,第二发送单元3024向操作系统301发送了使操作系统301不进行上述提示的指令;进一步地,现有技术中,短信发送完了之后会在终端30中保留记录,在本实施例的场景下,第二发送单元3024向操作系统301发送了使操作系统301不对短信记录进行保留或者删除短信记录的指令。Specifically, most terminals 30 currently use a voice, a screen, etc. to prompt the user to send a short message to notify that the user is currently sending a short message or that the short message has been successfully sent. These are all implemented by the operating system 301. In the scenario of the example, the second sending unit 3024 sends an instruction to the operating system 301 to prevent the operating system 301 from performing the above prompting. Further, in the prior art, after the short message is sent, the recording is retained in the terminal 30. In the scenario of the example, the second sending unit 3024 sends an instruction to the operating system 301 to prevent the operating system 301 from retaining or deleting the short message record.
在一种可选的方案中,操作系统301在向预设的电话号码发送短信之前,打开终端30中的定位系统(如GPS、北斗定位系统等)来获取终端30当前的位置信息,当然,操作系统301是在响应第二发送单元3024发送的相关指令才打开定位系统的。In an optional solution, the operating system 301 opens the positioning system (such as GPS, Beidou positioning system, etc.) in the terminal 30 to obtain the current location information of the terminal 30 before sending the short message to the preset phone number. The operating system 301 is to open the positioning system in response to the relevant instructions sent by the second transmitting unit 3024.
需要说明的是,目前大多数终端30开启定位系统后在终端30的相应部位会输出提示信息以提示用户定位系统已开启,在本发明实施例的场景下,第二发送单元3024向操作系统301发送的指令致使操作系统301开启了定位系统,但是不输出任何提示信息。It should be noted that, after the terminal 30 turns on the positioning system, the prompting information is outputted in the corresponding part of the terminal 30 to prompt the user that the positioning system is turned on. In the scenario of the embodiment of the present invention, the second sending unit 3024 is directed to the operating system 301. The sent command causes the operating system 301 to turn on the positioning system, but does not output any prompt information.
在一种可选的方案中,在判断出用户身份异常时,第二发送单元3024还可以向操作系统301发送拍摄指令,以使操作系统301开启摄像头拍摄终端30当前周围的画面,并将该画面上传到上述数据备份平台或者通过短信发送到上述预设的电话号码。In an optional solution, when determining that the identity of the user is abnormal, the second sending unit 3024 may further send a shooting instruction to the operating system 301, so that the operating system 301 turns on the current surrounding image of the camera shooting terminal 30, and the The screen is uploaded to the above data backup platform or sent to the above preset phone number by SMS.
进一步地,上述发送短信的过程和上述上传资料信息的过程的先后顺序此处不作限制,不管哪个过程在前或在后都是完整的可实施的方案,此处不再对每种情况分别举例。Further, the sequence of the process of sending the short message and the process of uploading the data information is not limited herein, and no matter which process is before or after, it is a complete implementable solution. .
需要说明的是,上述描述的一些方案仅为本发明的一些可选的方案,显然还可以通过这些方案推导出其他的方案来,推导出的方案同样落入本发明的保护范围。It should be noted that some of the foregoing descriptions are only some alternatives of the present invention, and it is obvious that other solutions can be deduced by these solutions, and the deduced solutions also fall within the protection scope of the present invention.
需要说明的是,在本发明实施例中,各个单元的具体实现还可以对应参照图2所示的方法实施例的相应描述。It should be noted that, in the embodiment of the present invention, the specific implementation of each unit may also correspond to the corresponding description of the method embodiment shown in FIG. 2 .
在图4所描述的终端30中,在终端30中设置独立于操作系统301的安全系统302,安全系统302识别对终端30的用户操作信息,以判断操作终端30 的用户是否异常,若异常则及时触发操作系统301向预设的数据备份平台发送重要数据,有效地防止了终端30中的重要信息的丢失。In the terminal 30 described in FIG. 4, a security system 302 independent of the operating system 301 is provided in the terminal 30, and the security system 302 identifies user operation information for the terminal 30 to determine the operation terminal 30. Whether the user is abnormal or not, if the abnormality is triggered, the operating system 301 is triggered to send important data to the preset data backup platform, thereby effectively preventing the loss of important information in the terminal 30.
请参照图5,图5时本发明实施例提供的又一种终端50的结构示意图,该装置50可以包括:至少一个处理器501,例如CPU,至少一个网络接口504,用户接口503,存储器505,安全系统507,至少一个通信总线502以及显示屏506。其中,通信总线502用于实现这些组件之间的连接通信。其中,用户接口503可以包括显示屏(Displ5y)506,可选用户接口503还可以包括标准的有线接口、无线接口。通信接口504可选的可以包括标准的有线接口(如数据线接口、网线接口等)、无线接口(如WI-FI接口、蓝牙接口、近场通讯接口)。存储器505可以是高速R5M存储器,也可以是非不稳定的存储器(non-vol5tile memory),例如至少一个磁盘存储器。存储器505可选的还可以是至少一个位于远离前述处理器501的存储装置。如图5所示,作为一种计算机存储介质的存储器505中可以包括操作系统、网络通信模块、用户接口模块以及操作系统程序,安全系统507中可以包括安全程序。Referring to FIG. 5, FIG. 5 is a schematic structural diagram of still another terminal 50 according to an embodiment of the present invention. The apparatus 50 may include: at least one processor 501, such as a CPU, at least one network interface 504, a user interface 503, and a memory 505. A security system 507, at least one communication bus 502, and a display screen 506. Among them, the communication bus 502 is used to implement connection communication between these components. The user interface 503 can include a display screen (Displ5y) 506, and the optional user interface 503 can also include a standard wired interface and a wireless interface. The communication interface 504 can optionally include a standard wired interface (such as a data line interface, a network line interface, etc.), and a wireless interface (such as a WI-FI interface, a Bluetooth interface, and a near field communication interface). The memory 505 may be a high speed R5M memory or a non-vol5 tile memory such as at least one disk memory. The memory 505 can also optionally be at least one storage device located remotely from the aforementioned processor 501. As shown in FIG. 5, a memory 505 as a computer storage medium may include an operating system, a network communication module, a user interface module, and an operating system program, and the security system 507 may include a security program.
在图5所示的终端50中,通信接口504主要用于连接其他终端,与其他终端进行数据通信;而处理器501可以用于调用安全系统507中的安全程序,并执行以下操作:In the terminal 50 shown in FIG. 5, the communication interface 504 is mainly used to connect other terminals to perform data communication with other terminals; and the processor 501 can be used to invoke the security program in the security system 507 and perform the following operations:
所述安全系统获取对所述终端进行操作时的用户操作信息;The security system acquires user operation information when the terminal is operated;
所述安全系统根据所述用户操作信息判断对所述终端进行操作的用户身份是否异常;Determining, by the security system, whether the identity of the user operating the terminal is abnormal according to the user operation information;
当判断为异常时,所述安全系统向所述操作系统发送数据备份指令,以使所述操作系统根据所述数据备份指令连接网络,并将所述操作系统中的资料信息上传到网络端的数据备份平台。When it is determined that the abnormality is abnormal, the security system sends a data backup instruction to the operating system, so that the operating system connects to the network according to the data backup instruction, and uploads the data information in the operating system to the data of the network end. Backup platform.
可选的,所述操作系统根据所述数据备份指令连接网络,并将所述操作系统中的资料信息上传到网络端的数据备份平台,包括:Optionally, the operating system connects to the network according to the data backup instruction, and uploads the data information in the operating system to the data backup platform of the network, including:
所述操作系统根据所述数据备份指令连接网络,且不输出网络连接成功的提示信息;The operating system connects to the network according to the data backup instruction, and does not output prompt information that the network connection is successful;
所述操作系统将自身包含的资料信息上传到网络端的数据备份平台,且 不输出表征上传状态的提示信息。The operating system uploads the data information contained in the operating system to the data backup platform on the network side, and The prompt information indicating the upload status is not output.
可选的,当所述安全系统根据所述用户操作信息判断对所述终端进行操作的用户身份异常后,所述方法还包括:Optionally, after the security system determines that the identity of the user operating the terminal is abnormal according to the user operation information, the method further includes:
所述安全系统向所述终端当前的操作系统发送操作指令,以使所述当前的操作系统根据所述操作指令向预设的电话号码发送所述终端的状态信息,其中,所述操作指令携带有所述预设的电话号码。The security system sends an operation instruction to the current operating system of the terminal, so that the current operating system sends the status information of the terminal to a preset phone number according to the operation instruction, where the operation instruction carries There is the preset phone number.
可选的,所述当前的操作系统根据所述操作指令向预设的电话号码发送所述终端的状态信息,包括:Optionally, the current operating system sends the status information of the terminal to the preset phone number according to the operation instruction, including:
所述当前的操作系统根据所述操作指令向预设的电话号码发送所述终端的状态信息,且不输出表征发送状态的提示信息和不保留发送的记录。The current operating system sends the status information of the terminal to a preset phone number according to the operation instruction, and does not output prompt information indicating a sending status and a record that does not retain the sending.
可选的,所述安全系统根据所述用户操作信息判断对所述终端进行操作的用户身份是否异常,包括:Optionally, the security system determines, according to the user operation information, whether the identity of the user operating the terminal is abnormal, including:
当开启了进入所述终端主程序界面的生物特征验证功能时,判断获取到的用户生物特征是否与预设的用户生物特征相匹配,若不匹配,则判定所述用户身份异常;或者When the biometric verification function of the terminal main program interface is enabled, it is determined whether the acquired user biometrics match the preset user biometrics, and if not, the user identity is determined to be abnormal; or
当开启了进入所述终端主程序界面的密码验证功能时,判断所述第一用户是否多次输入了与预设密码不相匹配的密码后,执行触发所述终端更换操作系统的操作,若是,则判定所述用户身份异常。When the password verification function of the terminal main program interface is enabled, determining whether the first user has input a password that does not match the preset password multiple times, performing an operation of triggering the terminal to replace the operating system, if Then, it is determined that the user identity is abnormal.
综上所述,通过实施本发明实施例,通过实施本发明实施例,在终端中设置独立于操作系统的安全系统,安全系统识别对终端的用户操作信息,以判断操作终端的用户是否异常,若异常则及时触发操作系统向预设的数据备份平台发送重要数据,有效地防止了终端中的重要信息的丢失。In summary, by implementing an embodiment of the present invention, by implementing an embodiment of the present invention, a security system independent of an operating system is set in a terminal, and the security system identifies user operation information of the terminal to determine whether the user of the operation terminal is abnormal. If abnormal, the operating system is triggered to send important data to the preset data backup platform in time, effectively preventing the loss of important information in the terminal.
进一步地,在发送这些重要信息时,安全系统触发操作系统不输出网络连接成功的提示信息,也不输出正在进行数据上传的提示信息,以使当前持有终端的其他用户无法察觉正在进行重要信息的上传;根据预先总结出的用户操作习惯来判断使用终端的用户身份是否异常,若异常才执行上传重要资料信息的操作;进一步地,判断用户身份是否异常由安全系统来完成,由于安全系统与操作系统相互独立,即使终端被刷机了,终端依然可以通过安全系统中原始用 户设置的参数信息来判断用户身份是否异常;再进一步地,安全系统可以触发操作系统根据安全系统中预存的电话号码来向原用户发送短信,以告知终端当前的状态(如位置、SIM卡号等),使得原用户可以尽可能的找回手机;再进一步地,安全系统会触发操作系统发送短信时不输出发送的状态信息,也不在终端中保留该短信的记录,提高了隐秘性;再进一步地,在判断用户身份异常后,安全系统还可以触发操作系统开启相关模块来采集当前用户的信息(如照片、身份证等)发送到预设的手机好,以为原用户找回手机提供更多有用的线索;另外,身份验证方式可以为虹膜验证、指纹验证、眼纹验证、人脸验证、掌纹验证、声纹验证等验证方式,由于每个人的这些生物特征基本都是唯一的,可以提高验证的准确度。Further, when transmitting the important information, the security system triggers the operating system not to output the prompt information of the successful network connection, and does not output the prompt information for the data uploading, so that other users currently holding the terminal cannot detect the important information being performed. Uploading; judging whether the identity of the user using the terminal is abnormal according to the user operation habits pre-summarized, if the abnormality is performed, the operation of uploading the important material information is performed; further, determining whether the identity of the user is abnormal is completed by the security system, due to the security system and The operating systems are independent of each other. Even if the terminal is flashed, the terminal can still be used in the security system. The parameter information set by the user determines whether the user identity is abnormal; further, the security system may trigger the operating system to send a short message to the original user according to the phone number pre-stored in the security system to inform the terminal of the current state (such as location, SIM card number, etc.) Therefore, the original user can retrieve the mobile phone as much as possible; further, the security system triggers the operating system to not send the sent status information when sending the short message, and does not retain the record of the short message in the terminal, thereby improving the privacy; further After determining the identity of the user, the security system can also trigger the operating system to open the relevant module to collect the current user information (such as photos, ID cards, etc.) and send it to the preset mobile phone, so that the original user can find more useful information. In addition, the authentication method can be iris verification, fingerprint verification, eye pattern verification, face verification, palm print verification, voiceprint verification, etc. Since each of these biometric features is basically unique, it can be improved. The accuracy of the verification.
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来指令相关的硬件来完成,该程序在执行时,可包括如上述各方法的实施例的流程。One of ordinary skill in the art can understand that all or part of the process of implementing the above embodiments can be completed by a computer program to instruct related hardware, and when executed, the program can include the flow of the embodiments of the above methods.
以上所揭露的仅为本发明一种较佳实施例而已,当然不能以此来限定本发明之权利范围,本领域普通技术人员可以理解实现上述实施例的全部或部分流程,并依本发明权利要求所作的等同变化,仍属于发明所涵盖的范围。 The above disclosure is only a preferred embodiment of the present invention, and of course, the scope of the present invention is not limited thereto, and those skilled in the art can understand all or part of the process of implementing the above embodiments, and according to the present invention. The equivalent changes required are still within the scope of the invention.

Claims (10)

  1. 一种终端管理方法,所述终端包括操作系统,其特征在于,所述终端设有独立于所述操作系统的安全系统,所述方法包括:A terminal management method, the terminal includes an operating system, wherein the terminal is provided with a security system independent of the operating system, and the method includes:
    所述安全系统获取对所述终端进行操作时的用户操作信息;The security system acquires user operation information when the terminal is operated;
    所述安全系统根据所述用户操作信息判断对所述终端进行操作的用户身份是否异常;Determining, by the security system, whether the identity of the user operating the terminal is abnormal according to the user operation information;
    当判断为异常时,所述安全系统向所述操作系统发送数据备份指令,以使所述操作系统根据所述数据备份指令连接网络,并将所述操作系统中的资料信息上传到网络端的数据备份平台。When it is determined that the abnormality is abnormal, the security system sends a data backup instruction to the operating system, so that the operating system connects to the network according to the data backup instruction, and uploads the data information in the operating system to the data of the network end. Backup platform.
  2. 根据权利要求1所述的方法,其特征在于,所述操作系统根据所述数据备份指令连接网络,并将所述操作系统中的资料信息上传到网络端的数据备份平台,包括:The method according to claim 1, wherein the operating system connects to the network according to the data backup instruction, and uploads the data information in the operating system to the data backup platform of the network, including:
    所述操作系统根据所述数据备份指令连接网络,且不输出网络连接成功的提示信息;The operating system connects to the network according to the data backup instruction, and does not output prompt information that the network connection is successful;
    所述操作系统将自身包含的资料信息上传到网络端的数据备份平台,且不输出表征上传状态的提示信息。The operating system uploads the data information contained in the operating system to the data backup platform on the network, and does not output prompt information indicating the upload status.
  3. 根据权利要求1所述的方法,其特征在于,当所述安全系统根据所述用户操作信息判断对所述终端进行操作的用户身份异常后,所述方法还包括:The method according to claim 1, wherein the method further comprises: after the security system determines that the identity of the user operating the terminal is abnormal according to the user operation information, the method further includes:
    所述安全系统向所述终端当前的操作系统发送操作指令,以使所述当前的操作系统根据所述操作指令向预设的电话号码发送所述终端的状态信息,其中,所述操作指令携带有所述预设的电话号码。The security system sends an operation instruction to the current operating system of the terminal, so that the current operating system sends the status information of the terminal to a preset phone number according to the operation instruction, where the operation instruction carries There is the preset phone number.
  4. 根据权利要求3所述的方法,其特征在于,所述当前的操作系统根据所述操作指令向预设的电话号码发送所述终端的状态信息,包括:The method according to claim 3, wherein the current operating system sends the status information of the terminal to a preset phone number according to the operation instruction, including:
    所述当前的操作系统根据所述操作指令向预设的电话号码发送所述终端的状态信息,且不输出表征发送状态的提示信息和不保留发送的记录。 The current operating system sends the status information of the terminal to a preset phone number according to the operation instruction, and does not output prompt information indicating a sending status and a record that does not retain the sending.
  5. 根据权利要求1~4任一项所述的方法,其特征在于,所述安全系统根据所述用户操作信息判断对所述终端进行操作的用户身份是否异常,包括:The method according to any one of claims 1 to 4, wherein the security system determines whether the identity of the user operating the terminal is abnormal according to the user operation information, including:
    当开启了进入所述终端主程序界面的生物特征验证功能时,判断获取到的用户生物特征是否与预设的用户生物特征相匹配,若不匹配,则判定所述用户身份异常;或者When the biometric verification function of the terminal main program interface is enabled, it is determined whether the acquired user biometrics match the preset user biometrics, and if not, the user identity is determined to be abnormal; or
    当开启了进入所述终端主程序界面的密码验证功能时,判断所述第一用户是否多次输入了与预设密码不相匹配的密码后,执行触发所述终端更换操作系统的操作,若是,则判定所述用户身份异常。When the password verification function of the terminal main program interface is enabled, determining whether the first user has input a password that does not match the preset password multiple times, performing an operation of triggering the terminal to replace the operating system, if Then, it is determined that the user identity is abnormal.
  6. 一种终端,所述终端包括操作系统,其特征在于,所述终端设有独立于所述操作系统的安全系统,所述安全系统包括:A terminal, the terminal includes an operating system, wherein the terminal is provided with a security system independent of the operating system, and the security system includes:
    获取单元,用于获取对所述终端进行操作时的用户操作信息;An obtaining unit, configured to acquire user operation information when the terminal is operated;
    判断单元,用于根据所述用户操作信息判断对所述终端进行操作的用户身份是否异常;a determining unit, configured to determine, according to the user operation information, whether an identity of a user operating the terminal is abnormal;
    第一发送单元,用于在所述判断单元判断出用户身份异常时,向所述操作系统发送数据备份指令,以使所述操作系统根据所述数据备份指令连接网络,并将所述操作系统中的资料信息上传到网络端的数据备份平台。a first sending unit, configured to send a data backup instruction to the operating system when the determining unit determines that the user identity is abnormal, so that the operating system connects to the network according to the data backup instruction, and connects the operating system The data information in the data is uploaded to the data backup platform on the network side.
  7. 根据权利要求6所述的终端,其特征在于,所述操作系统根据所述数据备份指令连接网络,并将所述操作系统中的资料信息上传到网络端的数据备份平台,包括:The terminal according to claim 6, wherein the operating system connects to the network according to the data backup instruction, and uploads the material information in the operating system to the data backup platform of the network, including:
    所述操作系统根据所述数据备份指令连接网络,且不输出网络连接成功的提示信息;The operating system connects to the network according to the data backup instruction, and does not output prompt information that the network connection is successful;
    所述操作系统将自身包含的资料信息上传到网络端的数据备份平台,且不输出表征上传状态的提示信息。The operating system uploads the data information contained in the operating system to the data backup platform on the network, and does not output prompt information indicating the upload status.
  8. 根据权利要求6所述的终端,其特征在于,所述终端还包括:The terminal according to claim 6, wherein the terminal further comprises:
    第二发送单元,用于向所述终端当前的操作系统发送操作指令,以使所 述当前的操作系统根据所述操作指令向预设的电话号码发送所述终端的状态信息,其中,所述操作指令携带有所述预设的电话号码。a second sending unit, configured to send an operation instruction to a current operating system of the terminal, so as to The current operating system sends the status information of the terminal to a preset phone number according to the operation instruction, where the operation instruction carries the preset phone number.
  9. 根据权利要求8所述的终端,其特征在于,所述当前的操作系统根据所述操作指令向预设的电话号码发送所述终端的状态信息,包括:The terminal according to claim 8, wherein the current operating system sends the status information of the terminal to a preset phone number according to the operation instruction, including:
    所述当前的操作系统根据所述操作指令向预设的电话号码发送所述终端的状态信息,且不输出表征发送状态的提示信息和不保留发送的记录。The current operating system sends the status information of the terminal to a preset phone number according to the operation instruction, and does not output prompt information indicating a sending status and a record that does not retain the sending.
  10. 根据权利要求6~9任一项所述的终端,其特征在于,所述判断单元具体用于:The terminal according to any one of claims 6 to 9, wherein the determining unit is specifically configured to:
    当开启了进入所述终端主程序界面的生物特征验证功能时,判断获取到的用户生物特征是否与预设的用户生物特征相匹配,若不匹配,则判定所述用户身份异常;或者When the biometric verification function of the terminal main program interface is enabled, it is determined whether the acquired user biometrics match the preset user biometrics, and if not, the user identity is determined to be abnormal; or
    当开启了进入所述终端主程序界面的密码验证功能时,判断所述第一用户是否多次输入了与预设密码不相匹配的密码后,执行触发所述终端更换操作系统的操作,若是,则判定所述用户身份异常。 When the password verification function of the terminal main program interface is enabled, determining whether the first user has input a password that does not match the preset password multiple times, performing an operation of triggering the terminal to replace the operating system, if Then, it is determined that the user identity is abnormal.
PCT/CN2016/080595 2015-05-29 2016-04-29 Terminal management method and terminal WO2016192499A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510288740.4A CN105577911A (en) 2015-05-29 2015-05-29 Terminal management method and terminal
CN201510288740.4 2015-05-29

Publications (1)

Publication Number Publication Date
WO2016192499A1 true WO2016192499A1 (en) 2016-12-08

Family

ID=55887545

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/080595 WO2016192499A1 (en) 2015-05-29 2016-04-29 Terminal management method and terminal

Country Status (2)

Country Link
CN (1) CN105577911A (en)
WO (1) WO2016192499A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110858971A (en) * 2018-08-22 2020-03-03 九阳股份有限公司 Intelligent device network distribution method and system
CN116016766A (en) * 2022-12-29 2023-04-25 天翼电信终端有限公司 Fingerprint verification management method based on container judgment

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106101095B (en) * 2016-06-08 2019-12-06 北京安云世纪科技有限公司 mobile terminal data processing method, device and equipment
CN106156563A (en) * 2016-06-29 2016-11-23 宇龙计算机通信科技(深圳)有限公司 A kind of data guard method and terminal unit
CN106550012B (en) * 2016-09-30 2020-08-11 北京小米移动软件有限公司 Monitoring method of intelligent equipment and intelligent equipment
CN106412331A (en) * 2016-11-17 2017-02-15 珠海市魅族科技有限公司 Data backup method and apparatus
CN107133075A (en) * 2017-05-23 2017-09-05 合肥联宝信息技术有限公司 Os starting method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101355424A (en) * 2007-07-27 2009-01-28 深圳兆日技术有限公司 Method for safely migrating handhold equipment data
CN101606408A (en) * 2007-02-07 2009-12-16 日本电气株式会社 Communication system and communication means
US20100210240A1 (en) * 2009-02-17 2010-08-19 Flexilis, Inc. System and method for remotely securing or recovering a mobile device
CN102855451A (en) * 2012-08-22 2013-01-02 中晟国计科技有限公司 Portable computer terminal with safe anti-secret-disclosing function

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101552966B (en) * 2009-05-04 2011-11-30 中兴通讯股份有限公司 Mobile terminal capable of being traced and positioned, and tracing and positioning method
CN102722427A (en) * 2012-06-04 2012-10-10 上海斐讯数据通信技术有限公司 Data information backup method and data information backup system
KR102210995B1 (en) * 2013-04-24 2021-02-02 삼성전자 주식회사 Apparatus and method for notifying information of security in electric device and computer-readable recording medium for the same
CN104346549A (en) * 2013-08-08 2015-02-11 联想(北京)有限公司 Information processing method and electronic equipment
CN103634477B (en) * 2013-12-11 2016-01-20 深圳市亚略特生物识别科技有限公司 There is theft preventing method and the system of the mobile phone of fingerprint device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101606408A (en) * 2007-02-07 2009-12-16 日本电气株式会社 Communication system and communication means
CN101355424A (en) * 2007-07-27 2009-01-28 深圳兆日技术有限公司 Method for safely migrating handhold equipment data
US20100210240A1 (en) * 2009-02-17 2010-08-19 Flexilis, Inc. System and method for remotely securing or recovering a mobile device
CN102855451A (en) * 2012-08-22 2013-01-02 中晟国计科技有限公司 Portable computer terminal with safe anti-secret-disclosing function

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110858971A (en) * 2018-08-22 2020-03-03 九阳股份有限公司 Intelligent device network distribution method and system
CN116016766A (en) * 2022-12-29 2023-04-25 天翼电信终端有限公司 Fingerprint verification management method based on container judgment

Also Published As

Publication number Publication date
CN105577911A (en) 2016-05-11

Similar Documents

Publication Publication Date Title
WO2016192499A1 (en) Terminal management method and terminal
CA2903795C (en) Contextual device locking/unlocking
CN104935491B (en) A kind of method and device sending facial expression image
US9277391B2 (en) Pairing method between bluetooth devices and bluetooth system using the same
US11252151B2 (en) Method and apparatus for data transmission between terminals
CN106488335A (en) Live-broadcast control method and device
TW201933288A (en) Attendance check method and apparatus, and attendance check device
US20150261389A1 (en) Communication Event History
EP3179397A1 (en) Methods and devices for managing automatic parallel login and logout in several applications
CN103365957A (en) Photo sharing based on proximity and connection
WO2015149235A1 (en) Privacy protection method and terminal device
CN104199688A (en) Mobile terminal and system reinstallation control method and device thereof
CN107862194B (en) A kind of method, device and mobile terminal of safety verification
CN105407098A (en) Identity verification method and device
WO2018054387A1 (en) Method and device for managing permission of terminal
AU2011253977B2 (en) Method, system and apparatus for selecting an image captured on an image capture device
CN103118357A (en) Antitheft system and antitheft method for mobile terminals
WO2019061471A1 (en) Password verification method, password setting method, and mobile terminal
CN104318185A (en) Application control method, application control equipment and mobile terminal
CN107169060A (en) Image processing method, device and terminal in terminal
KR20130082980A (en) User personalized recommendation system based on face-recognition
CN103593106A (en) Handheld device and method for unlocking same
WO2017193343A1 (en) Media file sharing method, media file sharing device and terminal
CN106412481A (en) Prompt method and device, and terminals based on VoLTE video call
JP2017102758A (en) Authentication device, authentication method, and program

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16802422

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 20/04/2018)

122 Ep: pct application non-entry in european phase

Ref document number: 16802422

Country of ref document: EP

Kind code of ref document: A1