WO2018232654A1 - Terminal mobile pouvant être utilisé pour la protection d'informations de sécurité et produit associé - Google Patents
Terminal mobile pouvant être utilisé pour la protection d'informations de sécurité et produit associé Download PDFInfo
- Publication number
- WO2018232654A1 WO2018232654A1 PCT/CN2017/089438 CN2017089438W WO2018232654A1 WO 2018232654 A1 WO2018232654 A1 WO 2018232654A1 CN 2017089438 W CN2017089438 W CN 2017089438W WO 2018232654 A1 WO2018232654 A1 WO 2018232654A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- mobile terminal
- wifi
- location information
- information
- location
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
Definitions
- the present invention relates to the field of communication technologies, and in particular, to a mobile terminal and related products that can be used for security information protection.
- the location information is transmitted to the server, for example, by the mobile terminal, and the server transmits the location information to the user according to the received location information, so that the user can find the mobile according to the location information. terminal.
- security information such as identity photos or security accounts such as bank accounts or communication accounts. In this way, when the mobile terminal is not retrieved, it may cause the information to be leaked. It can be seen that the security performance of the security information of the mobile terminal is relatively low.
- the object of the present invention is to provide a mobile terminal and related products that can be used for security information protection, and solve the problem that the security performance of the security information of the mobile terminal is relatively low.
- an embodiment of the present invention provides a method for protecting a security information of a mobile terminal, including:
- the mobile terminal detects the number of times the unlock verification fails, and determines whether the number of failures exceeds a preset number of times, and if so, collects location information of the mobile terminal;
- the security information in the mobile terminal is encrypted, and the location information is sent to the pre-bound terminal device.
- the method further includes:
- the mobile terminal searches for a nearby WIFI signal and identifies a WIFI identifier of the nearby WIFI signal;
- the mobile terminal sends the location information to a pre-bound terminal device, including:
- the mobile terminal sends the WIFI identifier and the location information to a pre-bound terminal device.
- the method further includes:
- the mobile terminal sends the WIFI identifier and the location information to the pre-bound terminal device, including:
- the mobile terminal sends the WIFI identifier, the WIFI registration information, and the location information to a pre-bound terminal device.
- the method further includes:
- the mobile terminal records altitude information of a location where the mobile terminal is located;
- the mobile terminal sends the WIFI identifier, the WIFI registration information, and the location information to the pre-bound terminal device, including:
- the mobile terminal sends the WIFI identifier, the WIFI registration information, the location information, and the altitude information to a pre-bound terminal device.
- the method further includes:
- the mobile terminal hides an application specified on the mobile terminal that needs to be kept secret from being hidden on the interface, and prohibits the pre-designated application that needs to be kept from running;
- the mobile terminal exits the account that is logged in on the mobile terminal, and deletes the password record of the account.
- the embodiment of the invention further provides a mobile terminal, including:
- a detecting module configured to detect the number of failed unlocking verifications, and determine whether the number of failed times exceeds a pre- Setting the number of times, if yes, collecting location information of the mobile terminal;
- a determining module configured to determine whether the location information belongs to a location range corresponding to a motion track pre-stored by the mobile terminal
- a determining module configured to determine that the mobile terminal is in a stolen state if the location information does not belong to the location range
- a sending module configured to encrypt the security information in the mobile terminal when the mobile terminal is unlocked, and send the location information to the pre-bound terminal device.
- the mobile terminal further includes:
- a search module configured to search for a nearby WIFI signal, and identify a WIFI identifier of the nearby WIFI signal
- the sending module is configured to send the WIFI identifier and the location information to a pre-bound terminal device.
- the mobile terminal further includes:
- a querying module configured to query, by the server, the WIFI registration information corresponding to the WIFI identifier
- the sending module is configured to send the WIFI identifier, the WIFI registration information, and the location information to a pre-bound terminal device.
- the mobile terminal further includes:
- a recording module configured to record altitude information of a location where the mobile terminal is located
- the sending module is configured to send the WIFI identifier, the WIFI registration information, the location information, and the altitude information to a pre-bound terminal device.
- the mobile terminal further includes:
- a hiding module configured to: when the stolen state is in the stolen state, the mobile terminal hides an application specified on the mobile terminal that needs to be kept secret from being hidden on the interface, and prohibits the pre-specified application that needs to be kept from running ;
- the embodiment of the invention further provides another mobile terminal, including:
- processor configured to perform the following steps:
- the security information in the mobile terminal is encrypted, and the location information is sent to the pre-bound terminal device.
- the processor is further configured to: search for a nearby WIFI signal, and identify a WIFI identifier of the nearby WIFI signal;
- the sending the location information to the pre-bound terminal device includes: sending the WIFI identifier and the location information to a pre-bound terminal device.
- the processor is further configured to: query, by the server, the WIFI registration information corresponding to the WIFI identifier;
- the sending the WIFI identifier and the location information to the pre-bound terminal device includes: sending the WIFI identifier, the WIFI registration information, and the location information to the pre-bound terminal device.
- the processor is further configured to: record altitude information of a location where the mobile terminal is located;
- Sending the WIFI identifier, the WIFI registration information, and the location information to the pre-bound terminal device including: sending the WIFI identifier, the WIFI registration information, the location information, and the altitude information to a pre-bound Terminal Equipment.
- the processor is further configured to: if the stolen state is, the pre-designated application that needs to be kept secret on the mobile terminal is hidden on the interface, and the pre-designation needs to be kept secret.
- the application runs; and quits the account logged in on the mobile terminal, and deletes the password record of the account.
- the processor is further configured to detect whether the mobile terminal generates a first ⁇ action event, and if the mobile terminal generates a first ⁇ action event, detecting the mobile terminal Whether the specified smart watch generates a second action event, and if the smart watch generates a second action event, determining whether the first action action event and the second action event include the same action direction, if The action direction is the same, and it is determined whether the start time of the ⁇ action included in the first ⁇ action event and the second ⁇ action event is within a preset time period, and the first sway is determined.
- the duration of the ⁇ action included in the event and the second ⁇ action event is within the preset duration, if both the first ⁇ action event and the second ⁇ action event include a ⁇ action start time The first ⁇ action event and the second ⁇ action event are both within the preset duration, and the first ⁇ action event is determined to be within the preset duration Whether the difference between the start time of the ⁇ action included in the second action event is less than a third preset threshold, if the difference between the first ⁇ action event and the start time of the ⁇ action included in the second ⁇ action event is less than Determining, by the preset threshold, whether the difference between the duration of the first action and the duration of the action included in the second action event is less than a fourth preset threshold, if the first action event and the first The difference between the duration of the duration of the motion of the second motion event is less than the fourth preset threshold, and determining that the mobile terminal and the smart watch both generate the same action event within the preset duration. And determining that the mobile terminal and the
- the embodiment of the present invention further provides a computer readable storage medium, where the computer readable storage medium stores program code, and the program code includes instructions for performing the following steps: detecting an unlock verification failure number, and determining the failure Whether the number of times exceeds a preset number of times, and if so, collecting location information of the mobile terminal;
- the security information in the mobile terminal is encrypted, and the location information is sent to the pre-bound terminal device.
- the program code includes instructions for performing: searching for a nearby WIFI signal, and identifying a WIFI identifier of the nearby WIFI signal; and sending the WIFI identifier and the location information to a pre-bound Terminal Equipment.
- the program code includes the following steps: performing the following steps: querying, by the server, the WIFI registration information corresponding to the WIFI identifier;
- the sending the WIFI identifier and the location information to the pre-bound terminal device includes: sending the WIFI identifier, the WIFI registration information, and the location information to the pre-bound terminal device. .
- the program code includes instructions for performing the following steps: recording the mobile terminal The altitude information of the location where the end is located;
- Sending the WIFI identifier, the WIFI registration information, and the location information to the pre-bound terminal device including: sending the WIFI identifier, the WIFI registration information, the location information, and the altitude information to a pre-bound Terminal Equipment.
- the program code includes the following steps: if the stolen state is used, the pre-specified application that needs to be kept on the mobile terminal is hidden on the interface, and the Determining in advance the application running that needs to be kept secret; and exiting the account that is logged in on the mobile terminal, and deleting the password record of the account.
- the mobile terminal detects the number of failed unlocking verifications, and determines whether the number of failed times exceeds a preset number of times, and if so, collects location information of the mobile terminal; the mobile terminal determines whether the location information belongs to the location Determining, by the mobile terminal, a location range corresponding to the motion track pre-stored; if the location information does not belong to the location range, determining that the mobile terminal is in a stolen state; if the location is in a stolen state, the mobile terminal When unlocked, the security information in the mobile terminal is encrypted, and the location information is sent to the pre-bound terminal device. In this way, when the mobile terminal is detected to be in a stolen state, the security information in the mobile terminal is encrypted, thereby improving the security performance of the mobile terminal security information.
- FIG. 1 is a schematic flowchart of a method for protecting a security information of a mobile terminal according to an embodiment of the present invention
- FIG. 2 is a schematic structural diagram of a mobile terminal according to an embodiment of the present invention.
- FIG. 3 is a schematic structural diagram of another mobile terminal according to an embodiment of the present invention.
- FIG. 4 is a schematic structural diagram of another mobile terminal according to an embodiment of the present invention.
- FIG. 5 is a schematic structural diagram of another mobile terminal according to an embodiment of the present disclosure.
- FIG. 6 is a schematic structural diagram of another mobile terminal according to an embodiment of the present disclosure.
- FIG. 7 is a schematic structural diagram of another mobile terminal according to an embodiment of the present disclosure.
- FIG. 8 is a schematic structural diagram of another mobile terminal according to an embodiment of the present invention. .
- FIG. 1 is a schematic flowchart of a method for protecting a security information of a mobile terminal according to an embodiment of the present invention. As shown in FIG. 1
- the mobile terminal detects the number of times of the unlocking verification failure, and determines whether the number of failures exceeds a preset number of times. If yes, the location information of the mobile terminal is collected.
- the mobile terminal determines whether the location information belongs to a location range corresponding to a motion track pre-stored by the mobile terminal.
- the location range may be a location area where the mobile terminal frequently moves.
- the location is often not in the same location, because the user who steals the mobile terminal and the mobile terminal may not be the same location. For example, it is impossible to be the same cell.
- the security information in the mobile terminal is encrypted, thereby improving the security performance of the mobile terminal security information.
- the security information may be security information preset by the mobile terminal, or may be pre-specified by the user. Of course, the mobile terminal may automatically recognize the stolen state when it detects the stolen state.
- the method further includes:
- the mobile terminal searches for a nearby WIFI signal and identifies a WIFI identifier of the nearby WIFI signal;
- the mobile terminal sends the location information to a pre-bound terminal device, including:
- the mobile terminal sends the WIFI identifier and the location information to a pre-bound terminal device.
- the foregoing WIFI signal may be a WIFI signal that can be found by the mobile terminal, and may further be a WIFI signal that is connected to the mobile terminal, and the foregoing steps may be performed when the mobile terminal is not unlocked, that is, locked, or the mobile terminal is After unlocking.
- the user can retrieve the mobile terminal more easily based on the location information and the WIFI signal, because the connectable range of the WIFI signal is fixed, and the location of the WIFI signal is also fixed.
- the method further includes:
- the mobile terminal sends the WIFI identifier and the location information to the pre-bound terminal device, including:
- the mobile terminal sends the WIFI identifier, the WIFI registration information, and the location information to a pre-bound terminal device.
- each WIFI signal may be authenticated by the server, so that the identity information of the person stealing the mobile terminal may be further confirmed by the WIFI identifier to facilitate the user to retrieve the mobile terminal.
- the method further includes:
- the mobile terminal records altitude information of a location where the mobile terminal is located;
- the mobile terminal sends the WIFI identifier, the WIFI registration information, and the location information to the pre-bound terminal device, including:
- the mobile terminal sends the WIFI identifier, the WIFI registration information, the location information, and the altitude information to a pre-bound terminal device.
- the altitude information of the user terminal can be sent to the pre-bound terminal device in time, so as to further facilitate the user to retrieve the mobile terminal, that is, the probability of retrieving the mobile terminal is improved, for example, the specific information may be determined according to the altitude information. floor.
- the method further includes:
- the mobile terminal hides an application specified on the mobile terminal that needs to be kept secret from being hidden on the interface, and prohibits the pre-designated application that needs to be kept secret. run;
- the mobile terminal exits the account that is logged in on the mobile terminal, and deletes the password record of the account.
- the application that needs to be kept secret is hidden on the interface, and the application that needs to be kept secret is prohibited from being operated, so that the information of the mobile terminal can be further protected.
- the security of the account that is logged in to the mobile terminal can be protected, so as to prevent others from using these accounts for malicious information distribution or stealing accounts. Information inside.
- the mobile terminal may further detect whether the mobile terminal generates a first ⁇ action event, and if the mobile terminal generates a first ⁇ action event, detecting the mobile terminal designation Whether the smart watch generates a second cymbal action event, and if the smart watch generates a second cymbal action event, determining whether the first cymbal action event and the second cymbal action event include the same squat action direction, if the squat action Determining whether the first ⁇ action event and the second ⁇ action event include a ⁇ action start time within a preset time period, and determining the first ⁇ action event and the second ⁇ action event Whether the duration of the included action duration is within the preset duration, if the start time of the first action included in the first and second action events is within a preset time period, and the first The action duration of the ⁇ action included in the action event and the second ⁇ action event are both within the preset duration,
- the stolen of the mobile terminal is released. status.
- the preset duration may be 11 seconds, 22 seconds, 30 seconds, 50 seconds, 72 seconds, 102 seconds, or other times.
- the first preset threshold may be 3 seconds, 5 seconds, 10 seconds, 20 seconds, 50 seconds, 84 seconds, or other time.
- the second preset threshold may be 13 seconds, 15 seconds, 22 seconds, 20 seconds, 54 seconds, 81 seconds, or other times.
- the mobile terminal detects the number of failed unlocking verifications, and determines whether the number of failed times exceeds a preset number of times, and if so, collects location information of the mobile terminal; the mobile terminal determines whether the location information belongs to the location Determining, by the mobile terminal, a location range corresponding to the motion track pre-stored; if the location information does not belong to the location range, determining that the mobile terminal is in a stolen state; if the location is in a stolen state, the mobile terminal When unlocked, the security information in the mobile terminal is encrypted, and the location information is sent to the pre-bound terminal device. In this way, when the mobile terminal is detected to be in a stolen state, the security information in the mobile terminal is encrypted, thereby improving the security performance of the mobile terminal security information.
- FIG. 2 is a schematic structural diagram of a mobile terminal according to an embodiment of the present invention. As shown in FIG. 2, the method includes:
- the detecting module 201 is configured to detect the number of failed unlocking verifications, and determine whether the number of failed times exceeds a preset number of times, and if yes, collect location information of the mobile terminal;
- the determining module 202 is configured to determine whether the location information belongs to a location range corresponding to a motion track pre-stored by the mobile terminal;
- the determining module 203 is configured to determine that the mobile terminal is in a stolen state if the location information does not belong to the location range;
- the sending module 204 is configured to encrypt the security information in the mobile terminal when the mobile terminal is unlocked, and send the location information to the pre-bound terminal device.
- the mobile terminal further includes:
- the searching module 205 is configured to search for a nearby WIFI signal, and identify a WIFI identifier of the nearby WIFI signal;
- the sending module 204 is configured to send the WIFI identifier and the location information to a pre-bound terminal device.
- the mobile terminal further includes:
- the query module 206 is configured to query, by the server, the WIFI registration information corresponding to the WIFI identifier.
- the sending module 204 is configured to send the WIFI identifier, the WIFI registration information, and the location information to a pre-bound terminal device.
- the mobile terminal further includes:
- a recording module 207 configured to record altitude information of a location where the mobile terminal is located;
- the sending module 204 is configured to send the WIFI identifier, the WIFI registration information, the location information, and the altitude information to a pre-bound terminal device.
- the mobile terminal further includes:
- a hiding module 208 configured to: when the stolen state is in the stolen state, the mobile terminal hides an application specified on the mobile terminal that needs to be kept secret from being hidden on the interface, and prohibits the pre-designated application that needs to be kept secret run;
- the deleting module 209 is configured to: and the mobile terminal exits the account that is logged in the mobile terminal, and deletes the password record of the account.
- the mobile terminal detects the number of failed unlocking verifications, and determines whether the number of failed times exceeds a preset number of times, and if so, collects location information of the mobile terminal; the mobile terminal determines whether the location information belongs to the location Determining, by the mobile terminal, a location range corresponding to the motion track pre-stored; if the location information does not belong to the location range, determining that the mobile terminal is in a stolen state; if the location is in a stolen state, the mobile terminal When unlocked, the security information in the mobile terminal is encrypted, and the location information is sent to the pre-bound terminal device. In this way, when the mobile terminal is detected to be in a stolen state, the security information in the mobile terminal is encrypted, thereby improving the security performance of the mobile terminal security information.
- an embodiment of the present invention further provides another mobile terminal 700, including: a processor 710 and a memory 720 coupled to each other; and the processor 710 is configured to perform the following steps:
- the security in the mobile terminal is The full information is encrypted, and the location information is sent to the pre-bound terminal device.
- the processor is further configured to: search for a nearby WIFI signal, and identify a WIFI identifier of the nearby WIFI signal;
- the sending the location information to the pre-bound terminal device includes: sending the WIFI identifier and the location information to a pre-bound terminal device.
- the processor is further configured to: query, by the server, the WIFI registration information corresponding to the WIFI identifier;
- the sending the WIFI identifier and the location information to the pre-bound terminal device includes: sending the WIFI identifier, the WIFI registration information, and the location information to the pre-bound terminal device.
- the processor is further configured to: record altitude information of a location where the mobile terminal is located;
- Sending the WIFI identifier, the WIFI registration information, and the location information to the pre-bound terminal device including: sending the WIFI identifier, the WIFI registration information, the location information, and the altitude information to a pre-bound Terminal Equipment.
- the processor is further configured to: if the stolen state is, the pre-designated application that needs to be kept secret on the mobile terminal is hidden on the interface, and the pre-designation needs to be kept secret.
- the application runs; and quits the account logged in on the mobile terminal, and deletes the password record of the account.
- the processor is further configured to detect whether the mobile terminal generates a first ⁇ action event, and if the mobile terminal generates a first ⁇ action event, detecting the mobile terminal Whether the specified smart watch generates a second action event, and if the smart watch generates a second action event, determining whether the first action action event and the second action event include the same action direction, if Determining whether the first ⁇ action event and the second ⁇ action event include a ⁇ action start time within a preset time period, and determining the first ⁇ action event and the second ⁇ action Whether the duration of the ⁇ action included in the event is all within the preset duration, if the first ⁇ action event and the second ⁇ action event include ⁇ action start time are both within a preset duration, and Determining the first ⁇ action event and the duration of the ⁇ action included in the first ⁇ action event and the second ⁇ action event are all within the preset duration Whether the difference between the start time of the
- the embodiment of the present invention further provides a computer readable storage medium, where the computer readable storage medium stores program code, and the program code includes instructions for performing the following steps: detecting an unlock verification failure number, and determining the failure Whether the number of times exceeds a preset number of times, and if so, collecting location information of the mobile terminal;
- the security information in the mobile terminal is encrypted, and the location information is sent to the pre-bound terminal device.
- the program code includes instructions for performing: searching for a nearby WIFI signal, and identifying a WIFI identifier of the nearby WIFI signal; and sending the WIFI identifier and the location information to a pre-bound Terminal Equipment.
- the program code includes the following steps: performing the following steps: querying, by the server, the WIFI registration information corresponding to the WIFI identifier;
- the sending the WIFI identifier and the location information to the pre-bound terminal device includes: sending the WIFI identifier, the WIFI registration information, and the location information to the pre-bound terminal device. .
- the program code includes instructions for performing the following steps: recording altitude information of a location where the mobile terminal is located;
- Sending the WIFI identifier, the WIFI registration information, and the location information to the pre-bound terminal device including: sending the WIFI identifier, the WIFI registration information, the location information, and the altitude information to a pre-bound Terminal Equipment.
- the program code includes instructions for performing the following steps: if the stolen state is used, the pre-designated application that needs to be kept on the mobile terminal is hidden on the interface. And prohibiting the pre-designation of an application that needs to be kept secret; and exiting the account that is logged in on the mobile terminal, and deleting the password record of the account.
- the embodiment of the present invention further provides another mobile terminal.
- FIG. 8 for the convenience of description, only parts related to the embodiment of the present invention are shown. If the specific technical details are not disclosed, please refer to the method part of the embodiment of the present invention.
- the mobile terminal can be any terminal device including a mobile phone, a tablet computer, a PDA (Personal Digital Assistant), a POS (Point of Sales), an in-vehicle computer, and the mobile terminal is used as a mobile phone as an example:
- FIG. 8 is a block diagram showing a partial structure of a mobile phone related to a mobile terminal provided by an embodiment of the present invention.
- the mobile phone includes: a radio frequency (RF) circuit 910, a memory 920, an input unit 930, a sensor 950, an audio circuit 960, a Wireless Fidelity (WiFi) module 970, a processor 980, and a power supply 990.
- RF radio frequency
- RF radio frequency
- memory 920 includes: a radio frequency (RF) circuit 910, a memory 920, an input unit 930, a sensor 950, an audio circuit 960, a Wireless Fidelity (WiFi) module 970, a processor 980, and a power supply 990.
- WiFi Wireless Fidelity
- the structure of the handset shown in FIG. 8 does not constitute a limitation to the handset, and may include more or less components than those illustrated, or some components may be combined, or different component arrangements.
- the input unit 930 can be configured to receive input numeric or character information and to generate key signal inputs related to user settings and function controls of the handset.
- the input unit 930 can include a touch display screen 933, a biometric device 931, and other input devices 932.
- the biometric device 931 can be a fingerprint recognition device, or a face recognition device, or an iris recognition device or the like.
- the input unit 930 can also include other input devices 932.
- other input devices 932 may include, but are not limited to, one or more of physical buttons, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and the like.
- the processor 980 is configured to acquire an image to be processed, the target area of the image to be processed is used to add a watermark pattern, determine first color information of the first image corresponding to the target area, and determine the first color.
- the processor 980 is the control center of the handset, which connects various portions of the entire handset using various interfaces and lines, by executing or executing software programs and/or modules stored in the memory 920, and invoking data stored in the memory 920, executing Mobile phone's various functions and processing data, thus moving into the phone Overall monitoring.
- the processor 980 may include one or more processing units; optionally, the processor 980 may integrate a processor and a modem processor, where the processor mainly processes an operating system, a user interface, an application, and the like.
- the modem processor primarily handles wireless communications. It will be appreciated that the above described modem processor may also not be integrated into the processor 980.
- memory 920 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
- the RF circuit 910 can be used for receiving and transmitting information.
- RF circuit 910 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like.
- LNA Low Noise Amplifier
- RF circuitry 910 can also communicate with the network and other devices via wireless communication.
- the above wireless communication may use any communication standard or protocol, including but not limited to Global System of Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (Code Division). Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), E-mail, Short Messaging Service (SMS), and the like.
- GSM Global System of Mobile communication
- GPRS General Packet Radio Service
- CDMA Code Division Multiple Access
- WCDMA Wideband Code Division Multiple Access
- LTE Long Term Evolution
- E-mail Short Messaging Service
- the handset may also include at least one type of sensor 950, such as a light sensor, motion sensor, and other sensors.
- the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor can adjust the brightness of the touch display screen according to the brightness of the ambient light, and the proximity sensor can turn off the touch display when the mobile phone moves to the ear. And / or backlight.
- the accelerometer sensor can detect the magnitude of acceleration in all directions (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity.
- the mobile phone can be used to identify the gesture of the mobile phone (such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping), etc.; as for the mobile phone can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.
- the gesture of the mobile phone such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration
- vibration recognition related functions such as pedometer, tapping
- the mobile phone can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.
- the audio circuit 960, the speaker 961, and the microphone 962 can provide an audio interface between the user and the mobile phone.
- the audio circuit 960 can transmit the converted electrical data of the received audio data to the speaker 961 for conversion to the sound signal by the speaker 961; on the other hand, the microphone 962 converts the collected sound signal into an electrical signal by the audio circuit 960. After receiving, it is converted into audio data, and then processed by the audio data playback processor 980, sent to the other mobile phone via the RF circuit 910, or played back to the memory 920 for further processing.
- WiFi is a short-range wireless transmission technology
- the mobile phone can help users to send and receive emails, browse web pages, and access streaming media through the WiFi module 970, which provides users with wireless broadband Internet access.
- FIG. 8 shows the WiFi module 970, it can be understood that it does not belong to the essential configuration of the mobile phone, and may be omitted as needed within the scope of not changing the essence of the invention.
- the handset also includes a power supply 990 (such as a battery) that supplies power to the various components.
- a power supply 990 (such as a battery) that supplies power to the various components.
- the power supply can be logically coupled to the processor 980 via a power management system to manage charging, discharging, and power management functions through the power management system.
- the mobile phone may further include a camera, a Bluetooth module, and the like, and details are not described herein again.
- each step method flow can be implemented based on the structure of the mobile phone.
- each unit function can be implemented based on the structure of the mobile phone.
- Embodiments of the present invention also provide a computer program product comprising a non-transitory computer readable storage medium storing a computer program, the computer program being operative to cause a mobile terminal to perform the method as described in the above method embodiment Part or all of the steps of any one of the methods.
- the disclosed method and apparatus may be implemented in other manners.
- the device embodiments described above are merely illustrative.
- the division of the unit is only a logical function division.
- there may be another division manner for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed.
- the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
- each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may be physically included separately, or two or more units may be integrated into one unit.
- the above integrated unit can be implemented in the form of hardware or in the form of hardware plus software functional units.
- the above-described integrated unit implemented in the form of a software functional unit can be stored in a computer readable storage medium.
- the above software functional unit is stored in a storage medium and includes a plurality of instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform part of the steps of the transceiving method of the various embodiments of the present invention.
- the foregoing storage medium includes: a USB flash drive, a mobile hard disk, a read-only memory (ROM), and a random access memory. (Random Access Memory, RAM for short), various media such as a disk or an optical disk that can store program code.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephone Function (AREA)
Abstract
L'invention concerne un terminal mobile pouvant être utilisé pour la protection d'informations de sécurité. Le terminal mobile comprend un processeur et une mémoire couplés l'un à l'autre. Le processeur est utilisé pour exécuter les étapes suivantes consistant : à détecter le nombre de fois où une vérification de déverrouillage échoue, et à déterminer si le nombre de fois où la vérification échoue dépasse un nombre de fois prédéfini, et, si tel est le cas, à collecter des informations de position concernant le terminal mobile; à déterminer si les informations de position appartiennent à une plage de positions correspondant à une trajectoire de mouvement pré-mémorisée par le terminal mobile; si les informations de position n'appartiennent pas à la plage de positions, à déterminer que le terminal mobile a été volé; et si le terminal mobile a été volé, à déverrouiller le terminal mobile, et à chiffrer des informations de sécurité dans le terminal mobile, et à envoyer les informations de position à un dispositif terminal préalablement lié. De cette manière, lorsqu'il est détecté qu'un terminal mobile a été volé, des informations de sécurité se trouvant dans le terminal mobile peuvent être chiffrées, ce qui améliore les performances de sécurité des informations de sécurité dans le terminal mobile.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2017/089438 WO2018232654A1 (fr) | 2017-06-21 | 2017-06-21 | Terminal mobile pouvant être utilisé pour la protection d'informations de sécurité et produit associé |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2017/089438 WO2018232654A1 (fr) | 2017-06-21 | 2017-06-21 | Terminal mobile pouvant être utilisé pour la protection d'informations de sécurité et produit associé |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018232654A1 true WO2018232654A1 (fr) | 2018-12-27 |
Family
ID=64735878
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2017/089438 WO2018232654A1 (fr) | 2017-06-21 | 2017-06-21 | Terminal mobile pouvant être utilisé pour la protection d'informations de sécurité et produit associé |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2018232654A1 (fr) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105187640A (zh) * | 2015-08-21 | 2015-12-23 | 上海斐讯数据通信技术有限公司 | 移动终端的防盗方法及系统 |
CN106203012A (zh) * | 2016-06-22 | 2016-12-07 | 中国联合网络通信集团有限公司 | 屏幕锁定的处理方法、装置和设备 |
CN106658489A (zh) * | 2016-09-30 | 2017-05-10 | 广东欧珀移动通信有限公司 | 一种终端应用的处理方法、装置及移动终端 |
-
2017
- 2017-06-21 WO PCT/CN2017/089438 patent/WO2018232654A1/fr active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105187640A (zh) * | 2015-08-21 | 2015-12-23 | 上海斐讯数据通信技术有限公司 | 移动终端的防盗方法及系统 |
CN106203012A (zh) * | 2016-06-22 | 2016-12-07 | 中国联合网络通信集团有限公司 | 屏幕锁定的处理方法、装置和设备 |
CN106658489A (zh) * | 2016-09-30 | 2017-05-10 | 广东欧珀移动通信有限公司 | 一种终端应用的处理方法、装置及移动终端 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11269981B2 (en) | Information displaying method for terminal device and terminal device | |
US10867025B2 (en) | Opportunistically collecting sensor data from a mobile device to facilitate user identification | |
US9654978B2 (en) | Asset accessibility with continuous authentication for mobile devices | |
CN102461128B (zh) | 基于接近而配对移动设备的方法和装置 | |
US20160154950A1 (en) | Systems and methods for identifying unauthorized users of an electronic device | |
US10251056B2 (en) | Electronic device with gesture actuation of companion devices, and corresponding systems and methods | |
WO2017084288A1 (fr) | Procédé et dispositif de vérification d'identité | |
CN111475841A (zh) | 一种访问控制的方法、相关装置、设备、系统及存储介质 | |
WO2018161743A1 (fr) | Procédé de reconnaissance d'empreintes digitales et produit associé | |
CN107466041B (zh) | 识别伪基站方法、装置及移动终端 | |
CN106255102B (zh) | 一种终端设备的鉴定方法及相关设备 | |
US20150089631A1 (en) | Unlock processing method and device | |
WO2019019837A1 (fr) | Procédé d'identification biologique et produit associé | |
WO2015010578A1 (fr) | Procédé et dispositif de contrôle d'accès d'une application | |
CN107786739B (zh) | 一种信息获取方法及移动终端 | |
CN108629280B (zh) | 人脸识别方法及移动终端 | |
WO2021031695A1 (fr) | Procédé de commande de terminal et terminal | |
CN107577961A (zh) | 可用于安全信息保护的移动终端和相关产品 | |
WO2019095156A1 (fr) | Procédé de recherche d'information, terminal, dispositif de réseau, et système | |
CN108710806A (zh) | 一种终端解锁方法、移动终端 | |
KR101595897B1 (ko) | 디지털 도어록 및 그 제어방법, 이를 수행하기 위한 기록매체 | |
CN106874795B (zh) | 一种移动终端的防拆机方法、装置及移动终端 | |
CN107491685B (zh) | 一种人脸识别方法和移动终端 | |
WO2018232652A1 (fr) | Terminal mobile comportant un niveau de confidentialité élevé et produit associé | |
WO2019052287A1 (fr) | Procédé de prévisualisation d'informations de visage et produit associé |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17914326 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 15-05-2020) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 17914326 Country of ref document: EP Kind code of ref document: A1 |