WO2018232663A1 - 一种移动终端被盗处理方法和移动终端 - Google Patents

一种移动终端被盗处理方法和移动终端 Download PDF

Info

Publication number
WO2018232663A1
WO2018232663A1 PCT/CN2017/089447 CN2017089447W WO2018232663A1 WO 2018232663 A1 WO2018232663 A1 WO 2018232663A1 CN 2017089447 W CN2017089447 W CN 2017089447W WO 2018232663 A1 WO2018232663 A1 WO 2018232663A1
Authority
WO
WIPO (PCT)
Prior art keywords
mobile terminal
wifi
stolen
module
location information
Prior art date
Application number
PCT/CN2017/089447
Other languages
English (en)
French (fr)
Inventor
王苏娜
Original Assignee
深圳支点电子智能科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳支点电子智能科技有限公司 filed Critical 深圳支点电子智能科技有限公司
Priority to PCT/CN2017/089447 priority Critical patent/WO2018232663A1/zh
Publication of WO2018232663A1 publication Critical patent/WO2018232663A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to a mobile terminal stolen processing method and a mobile terminal.
  • mobile terminals are increasingly being used and used by users, and now the value of mobile terminals is getting higher and higher.
  • mobile terminals are often lost, such as being stolen.
  • the location information is transmitted to the server, for example, by the mobile terminal, and the server transmits the location information to the user according to the received location information, so that the user can find the mobile according to the location information. terminal.
  • the server since the user only retrieves the mobile terminal based on the location information, it is highly likely that the mobile terminal cannot be retrieved, which may result in information leakage. It can be seen that the security performance of mobile terminals is relatively low.
  • An object of the present invention is to provide a mobile terminal stolen processing method and a mobile terminal, which solves the problem that the security performance of the mobile terminal is relatively low.
  • an embodiment of the present invention provides a method for processing a stolen mobile terminal, which is characterized in that:
  • the mobile terminal detects the number of times the unlock verification fails, and determines whether the number of failures exceeds a preset number of times, and if so, collects location information of the mobile terminal;
  • the mobile terminal When the mobile terminal is in a stolen state, the mobile terminal hides an application specified on the mobile terminal that needs to be kept secret from being hidden on the interface, and prohibits the pre-designated application that needs to be kept secret, and The location information is sent to the pre-bound terminal device.
  • the method further includes:
  • the mobile terminal When the mobile terminal is in a stolen state, the mobile terminal quits the account that is logged in on the mobile terminal, and deletes the password record of the account.
  • the method further includes:
  • the mobile terminal When the mobile terminal is in a stolen state, when detecting that the mobile terminal logs in to the communication account, the related information of the communication account is sent to the pre-bound terminal device;
  • the mobile terminal issues, in the social webpage of the communication account, a notification message that the communication account is logged in on the mobile terminal that the user steals.
  • the method further includes:
  • the mobile terminal searches for a nearby WIFI signal and identifies a WIFI identifier of the nearby WIFI signal;
  • the mobile terminal queries the server for the WIFI registration information corresponding to the WIFI identifier;
  • the mobile terminal sends the WIFI identifier and the WIFI registration information to the pre-bound terminal device.
  • the method further includes:
  • the security information in the mobile terminal is encrypted.
  • the embodiment of the invention further provides a mobile terminal, including:
  • the collecting module is configured to detect, by the mobile terminal, the number of failed unlocking verifications, and determine whether the number of failed times exceeds a preset number of times, and if yes, collect location information of the mobile terminal;
  • a determining module configured to determine whether the location information belongs to a location range corresponding to a motion track pre-stored by the mobile terminal
  • a determining module configured to determine that the mobile terminal is in a stolen state if the location information does not belong to the location range
  • a first sending module configured to: when the mobile terminal is in a stolen state, the mobile terminal hides an application specified on the mobile terminal that needs to be kept secret from being hidden on the interface, and prohibits the pre-specified need to be kept secret.
  • the application runs and sends the location information to the pre-bound terminal device.
  • the mobile terminal further includes:
  • Deleting a module when the mobile terminal is in a stolen state, the mobile terminal logs in on the mobile terminal The account is logged out and the password record of the account is deleted.
  • the mobile terminal further includes:
  • a second sending module configured to send the related information of the communication account to the pre-bound terminal device when the mobile terminal detects that the mobile terminal has a communication account when it is in a stolen state
  • a publishing module configured to publish, in the social webpage of the communication account, a notification message that the communication account is logged in on the mobile terminal that the user steals.
  • the mobile terminal further includes:
  • a search module configured to search for a nearby WIFI signal, and identify a WIFI identifier of the nearby WIFI signal
  • a querying module configured to query, by the server, the WIFI registration information corresponding to the WIFI identifier
  • the third sending module is configured to send the WIFI identifier and the WIFI registration information to the pre-bound terminal device.
  • the mobile terminal further includes:
  • an encryption module configured to encrypt the security information in the mobile terminal if the mobile terminal is unlocked when the state is stolen.
  • the mobile terminal detects the number of failed unlocking verifications, and determines whether the number of failed times exceeds a preset number of times, and if so, collects location information of the mobile terminal; the mobile terminal determines whether the location information belongs to the location Determining, by the mobile terminal, a location range corresponding to a motion track pre-stored; if the location information does not belong to the location range, determining that the mobile terminal is in a stolen state; and when the mobile terminal is in a stolen state, the moving The terminal hides the pre-designated application that needs to be kept secret on the mobile terminal from being hidden on the interface, and prohibits the pre-specified application that needs to be kept from running, and sends the location information to the pre-bound terminal device. In this way, information that protects the application in time can be prevented from leaking, so as to improve the security performance of the mobile terminal.
  • FIG. 1 is a schematic flowchart of a method for processing a stolen mobile terminal according to an embodiment of the present invention
  • FIG. 2 is a schematic structural diagram of a mobile terminal according to an embodiment of the present invention.
  • FIG. 3 is a schematic structural diagram of another mobile terminal according to an embodiment of the present invention.
  • FIG. 4 is a schematic structural diagram of another mobile terminal according to an embodiment of the present invention.
  • FIG. 5 is a schematic structural diagram of another mobile terminal according to an embodiment of the present disclosure.
  • FIG. 6 is a schematic structural diagram of another mobile terminal according to an embodiment of the present invention.
  • FIG. 1 is a schematic flowchart of a method for processing a stolen mobile terminal according to an embodiment of the present invention. As shown in FIG. 1
  • the mobile terminal detects the number of times of the unlocking verification failure, and determines whether the number of failures exceeds a preset number of times. If yes, the location information of the mobile terminal is collected.
  • the mobile terminal determines whether the location information belongs to a location range corresponding to a motion track pre-stored by the mobile terminal.
  • the mobile terminal When the mobile terminal is in a stolen state, the mobile terminal hides an application specified on the mobile terminal that needs to be kept secret from being hidden on the interface, and prohibits the pre-designated application that needs to be kept from running, and The location information is sent to the pre-bound terminal device.
  • the application that needs to be kept secret is hidden on the interface, and the application that needs to be kept secret is prohibited from being operated, so that the information of the mobile terminal can be further protected. Moreover, these applications cannot be run, so that the information of the mobile terminal is effectively protected, thereby improving the information security of the mobile terminal.
  • the above application may be a payment application, a banking application, a communication chat application or a financial application, and the like.
  • the method further includes:
  • the mobile terminal When the mobile terminal is in a stolen state, the mobile terminal registers the account registered on the mobile terminal. Exit and delete the password record for the account.
  • the account of the application registered by the mobile terminal may be further deleted, thereby further protecting the security information to the mobile terminal.
  • the method further includes:
  • the mobile terminal When the mobile terminal is in a stolen state, when detecting that the mobile terminal logs in to the communication account, the related information of the communication account is sent to the pre-bound terminal device;
  • the mobile terminal issues, in the social webpage of the communication account, a notification message that the communication account is logged in on the mobile terminal that the user steals.
  • the communication account may be a communication account that the thief logs in after the mobile terminal is stolen, so that the notification message of logging in on the mobile terminal of the theft user by publishing the communication account in the social webpage of the communication account is performed. Therefore, the stealing of the stolen user is disclosed, thereby facilitating the stolen user not using the mobile terminal, thereby achieving the purpose of protecting the security information of the mobile terminal.
  • the method further includes:
  • the mobile terminal searches for a nearby WIFI signal and identifies a WIFI identifier of the nearby WIFI signal;
  • the mobile terminal queries the server for the WIFI registration information corresponding to the WIFI identifier;
  • the mobile terminal sends the WIFI identifier and the WIFI registration information to the pre-bound terminal device.
  • each WIFI signal may be authenticated by the server, so that the user can confirm the identity information of the person who steals the mobile terminal by using the WIFI identifier, so that the user can retrieve the mobile terminal.
  • the method further includes:
  • the security information in the mobile terminal is encrypted.
  • the security information in the mobile terminal is encrypted, thereby improving the security performance of the mobile terminal security information.
  • the security information may be security information preset by the mobile terminal, or may be pre-specified by the user. Of course, the mobile terminal may automatically recognize the stolen state when it detects the stolen state.
  • FIG. 2 is a schematic structural diagram of a mobile terminal according to an embodiment of the present invention, such as As shown in Figure 2, it includes:
  • the collecting module 201 is configured to detect, by the mobile terminal, the number of failed unlocking verifications, and determine whether the number of failed times exceeds a preset number of times, and if yes, collect location information of the mobile terminal;
  • the determining module 202 is configured to determine whether the location information belongs to a location range corresponding to a motion track pre-stored by the mobile terminal;
  • the determining module 203 is configured to determine that the mobile terminal is in a stolen state if the location information does not belong to the location range;
  • a first sending module 204 configured to: when the mobile terminal is in a stolen state, the mobile terminal hides an application specified on the mobile terminal that needs to be kept secret from being hidden on the interface, and prohibits the pre-designation from being confidential.
  • the application runs and sends the location information to the pre-bound terminal device.
  • the mobile terminal further includes:
  • the deleting module 205 is configured to: when the mobile terminal is in the stolen state, the mobile terminal quits the account that is logged in the mobile terminal, and deletes the password record of the account.
  • the mobile terminal further includes:
  • the second sending module 206 is configured to send the related information of the communication account to the pre-bound terminal device when the mobile terminal detects that the mobile terminal has a communication account when it is in a stolen state;
  • the issuing module 207 is configured to post, in the social webpage of the communication account, a notification message that the communication account is logged in on the mobile terminal that the user steals.
  • the mobile terminal further includes:
  • the search module 208 is configured to search for a nearby WIFI signal and identify a WIFI identifier of the nearby WIFI signal;
  • the querying module 209 is configured to query, by the server, the WIFI registration information corresponding to the WIFI identifier.
  • the third sending module 2010 is configured to send the WIFI identifier and the WIFI registration information to the pre-bound terminal device.
  • the mobile terminal further includes:
  • the encryption module 2011 is configured to encrypt the security information in the mobile terminal if the mobile terminal is unlocked when the state is stolen.
  • the mobile terminal detects the number of failed unlock verifications, and determines the number of failures. Whether the location information exceeds the preset number of times, and if so, the location information of the mobile terminal is collected; the mobile terminal determines whether the location information belongs to a location range corresponding to the motion track pre-stored by the mobile terminal; If the mobile terminal is in a stolen state, the mobile terminal hides an application specified on the mobile terminal that needs to be kept secret on the interface when the mobile terminal is in a stolen state. And prohibiting the pre-designated application running that needs to be kept secret, and transmitting the location information to the pre-bound terminal device. In this way, information that protects the application in time can be prevented from leaking, so as to improve the security performance of the mobile terminal.
  • the disclosed method and apparatus may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
  • each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may be physically included separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of hardware plus software functional units.
  • the above-described integrated unit implemented in the form of a software functional unit can be stored in a computer readable storage medium.
  • the above software functional unit is stored in a storage medium and includes a plurality of instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform part of the steps of the transceiving method of the various embodiments of the present invention.
  • the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like, and the program code can be stored. Medium.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)

Abstract

本发明提供一种移动终端被盗处理方法和移动终端,该方法包括:移动终端检测解锁验证失败次数,并判断所述失败次数是否超过预设次数,若是,则采集所述移动终端的位置信息;所述移动终端判断所述位置信息是否属于所述移动终端预先存储的运动轨迹所对应的位置范围;若所述位置信息不属于所述位置范围,则确定所述移动终端处于被盗状态;所述移动终端处于被盗状态时,所述移动终端将所述移动终端上安装的预先指定需要保密的应用程序在界面上隐藏,且禁止所述预先指定需要保密的应用程序运行,并将所述位置信息发送给预先绑定的终端设备。这样可以实现及时保护应用程序的信息不会泄露,以提高移动终端的安全性能。

Description

一种移动终端被盗处理方法和移动终端 技术领域
本发明涉及通信技术领域,尤其涉及一种移动终端被盗处理方法和移动终端。
背景技术
随着通信技术的发展,移动终端越来越被用户所喜爱并使用,且现在移动终端的价值也越来越高。在实际生活中经常会会出现移动终端丢失的情况,例如:被偷。然而,目前在移动终端被偷后,主要通过如是通过移动终端定位,再将位置信息发送给服务器,服务器根据接收到的位置信息,并传输给用户,这样用户根据就可以根据位置信息,查找移动终端。然而,由于用户仅是根据位置信息进行找回移动终端,这样很大可能是无法找回移动终端,这样就会可能会导致信息泄密。可见,目前移动终端的安全性能比较低。
发明内容
本发明的目的在于提供一种移动终端被盗处理方法和移动终端,解决了移动终端的安全性能比较低的问题。
为了达到上述目的,本发明实施例提供一种移动终端被盗处理方法,其特征在于,包括:
移动终端检测解锁验证失败次数,并判断所述失败次数是否超过预设次数,若是,则采集所述移动终端的位置信息;
所述移动终端判断所述位置信息是否属于所述移动终端预先存储的运动轨迹所对应的位置范围;
若所述位置信息不属于所述位置范围,则确定所述移动终端处于被盗状态;
所述移动终端处于被盗状态时,所述移动终端将所述移动终端上安装的预先指定需要保密的应用程序在界面上隐藏,且禁止所述预先指定需要保密的应用程序运行,并将所述位置信息发送给预先绑定的终端设备。
优选的,所述方法还包括:
所述移动终端处于被盗状态时,所述移动终端将所述移动终端上登录的账号退出,并删除所述账号的密码记录。
优选的,所述方法还包括:
所述移动终端处于被盗状态时,检测到所述移动终端登录有通信账号时,将所述通信账号的相关信息发送给预先绑定的终端设备;
所述移动终端在所述通信账号的社交网页中发布所述通信账号在用户偷盗的移动终端上登录的通知消息。
优选的,所述方法还包括:
所述移动终端搜索附近WIFI信号,并识别所述附近WIFI信号的WIFI标识;
所述移动终端在服务器查询所述WIFI标识对应的WIFI注册信息;
所述移动终端将所述WIFI标识和WIFI注册信息发送给预先绑定的终端设备。
优选的,所述方法还包括:
若所述处于被盗状态时,所述移动终端被解锁,则将所述移动终端中的安全信息进行加密。
本发明实施例还提供一种移动终端,包括:
采集模块,用于移动终端检测解锁验证失败次数,并判断所述失败次数是否超过预设次数,若是,则采集所述移动终端的位置信息;
判断模块,用于判断所述位置信息是否属于所述移动终端预先存储的运动轨迹所对应的位置范围;
确定模块,用于若所述位置信息不属于所述位置范围,则确定所述移动终端处于被盗状态;
第一发送模块,用于所述移动终端处于被盗状态时,所述移动终端将所述移动终端上安装的预先指定需要保密的应用程序在界面上隐藏,且禁止所述预先指定需要保密的应用程序运行,并将所述位置信息发送给预先绑定的终端设备。
优选的,所述移动终端还包括:
删除模块,用于处于被盗状态时,所述移动终端将所述移动终端上登录的 账号退出,并删除所述账号的密码记录。
优选的,所述移动终端还包括:
第二发送模块,用于处于被盗状态时,检测到所述移动终端登录有通信账号时,将所述通信账号的相关信息发送给预先绑定的终端设备;
发布模块,用于在所述通信账号的社交网页中发布所述通信账号在用户偷盗的移动终端上登录的通知消息。
优选的,所述移动终端还包括:
搜索模块,用于搜索附近WIFI信号,并识别所述附近WIFI信号的WIFI标识;
查询模块,用于在服务器查询所述WIFI标识对应的WIFI注册信息;
第三发送模块,用于将所述WIFI标识和WIFI注册信息发送给预先绑定的终端设备。
优选的,所述移动终端还包括:
加密模块,用于若所述处于被盗状态时,所述移动终端被解锁,则将所述移动终端中的安全信息进行加密。
本发明实施例中,移动终端检测解锁验证失败次数,并判断所述失败次数是否超过预设次数,若是,则采集所述移动终端的位置信息;所述移动终端判断所述位置信息是否属于所述移动终端预先存储的运动轨迹所对应的位置范围;若所述位置信息不属于所述位置范围,则确定所述移动终端处于被盗状态;所述移动终端处于被盗状态时,所述移动终端将所述移动终端上安装的预先指定需要保密的应用程序在界面上隐藏,且禁止所述预先指定需要保密的应用程序运行,并将所述位置信息发送给预先绑定的终端设备。这样可以实现及时保护应用程序的信息不会泄露,以提高移动终端的安全性能。
附图说明
为了更清楚地说明本发明实施例中的技术方案,下面将对实施例中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是本发明实施例提供的一种移动终端被盗处理方法的流程示意图;
图2是本发明实施例提供的一种移动终端的结构示意图;
图3是本发明实施例提供的另一种移动终端的结构示意图;
图4是本发明实施例提供的另一种移动终端的结构示意图;
图5是本发明实施例提供的另一种移动终端的结构示意图;
图6是本发明实施例提供的另一种移动终端的结构示意图。
具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
请参考图1,图1是本发明实施例提供的一种移动终端被盗处理方法的流程示意图,如图1所示,包括:
101、移动终端检测解锁验证失败次数,并判断所述失败次数是否超过预设次数,若是,则采集所述移动终端的位置信息;
103、移动终端判断所述位置信息是否属于所述移动终端预先存储的运动轨迹所对应的位置范围;
102、若所述位置信息不属于所述位置范围,则确定所述移动终端处于被盗状态;
104、所述移动终端处于被盗状态时,所述移动终端将所述移动终端上安装的预先指定需要保密的应用程序在界面上隐藏,且禁止所述预先指定需要保密的应用程序运行,并将所述位置信息发送给预先绑定的终端设备。
该实施方式中,通过上述步骤可以实现将需要保密的应用程序在界面上隐藏,且禁止所述预先指定需要保密的应用程序运行,这样可以更一步保护到移动终端的信息。且还无法运行这些应用程序,使得移动终端的信息得到有效的保护,从而达到提高移动终端的信息安全的目的。其中,上述应用程序可以是支付应用程序、银行应用程序、通讯聊天应用程序或者财经应用程序等等。
优选的,所述方法还包括:
所述移动终端处于被盗状态时,所述移动终端将所述移动终端上登录的账 号退出,并删除所述账号的密码记录。
该实施方式,进一步还可以删除移动终端登录的应用程序的账号,从而进一步保护到移动终端的安全信息。
优选的,所述方法还包括:
所述移动终端处于被盗状态时,检测到所述移动终端登录有通信账号时,将所述通信账号的相关信息发送给预先绑定的终端设备;
所述移动终端在所述通信账号的社交网页中发布所述通信账号在用户偷盗的移动终端上登录的通知消息。
该实施方式中,上述通信账号可以是移动终端被偷后,偷盗者登录的通信账号,这样通过在该通信账号的社交网页中发布所述通信账号在偷盗用户的移动终端上登录的通知消息,从而达到将该偷盗用户的偷盗形为公开,从而有利于该偷盗用户不使用该移动终端,进而达到保护移动终端的安全信息的目的。
优选的,所述方法还包括:
所述移动终端搜索附近WIFI信号,并识别所述附近WIFI信号的WIFI标识;
所述移动终端在服务器查询所述WIFI标识对应的WIFI注册信息;
所述移动终端将所述WIFI标识和WIFI注册信息发送给预先绑定的终端设备。
该实施方式中,各WIFI信号可以是在上述服务器认证的,这样通过上述WIFI标识,就用户就可以确认偷移动终端的人的身份相关信息,以方便用户找回移动终端。
优选的,所述方法还包括:
若所述处于被盗状态时,所述移动终端被解锁,则将所述移动终端中的安全信息进行加密。
通过上述步骤可以实现在检测到移动终端处于被盗状态时,将所述移动终端中的安全信息进行加密,从而提高移动终端安全信息的安全性能。其中,上述安全信息可以是移动终端预先设置的安全信息,或者用户预先指定,当然,也可以是移动终端在检测到处于被盗状态时自动识别的。
请参考图2,图2是本发明实施例提供的一种移动终端的结构示意图,如 图2所示,包括:
采集模块201,用于移动终端检测解锁验证失败次数,并判断所述失败次数是否超过预设次数,若是,则采集所述移动终端的位置信息;
判断模块202,用于判断所述位置信息是否属于所述移动终端预先存储的运动轨迹所对应的位置范围;
确定模块203,用于若所述位置信息不属于所述位置范围,则确定所述移动终端处于被盗状态;
第一发送模块204,用于所述移动终端处于被盗状态时,所述移动终端将所述移动终端上安装的预先指定需要保密的应用程序在界面上隐藏,且禁止所述预先指定需要保密的应用程序运行,并将所述位置信息发送给预先绑定的终端设备。
优选的,如图3所示,所述移动终端还包括:
删除模块205,用于处于被盗状态时,所述移动终端将所述移动终端上登录的账号退出,并删除所述账号的密码记录。
优选的,如图4所示,所述移动终端还包括:
第二发送模块206,用于处于被盗状态时,检测到所述移动终端登录有通信账号时,将所述通信账号的相关信息发送给预先绑定的终端设备;
发布模块207,用于在所述通信账号的社交网页中发布所述通信账号在用户偷盗的移动终端上登录的通知消息。
优选的,如图5所示,所述移动终端还包括:
搜索模块208,用于搜索附近WIFI信号,并识别所述附近WIFI信号的WIFI标识;
查询模块209,用于在服务器查询所述WIFI标识对应的WIFI注册信息;
第三发送模块2010,用于将所述WIFI标识和WIFI注册信息发送给预先绑定的终端设备。
优选的,如图6所示,所述移动终端还包括:
加密模块2011,用于若所述处于被盗状态时,所述移动终端被解锁,则将所述移动终端中的安全信息进行加密。
本发明实施例中,移动终端检测解锁验证失败次数,并判断所述失败次数 是否超过预设次数,若是,则采集所述移动终端的位置信息;所述移动终端判断所述位置信息是否属于所述移动终端预先存储的运动轨迹所对应的位置范围;若所述位置信息不属于所述位置范围,则确定所述移动终端处于被盗状态;所述移动终端处于被盗状态时,所述移动终端将所述移动终端上安装的预先指定需要保密的应用程序在界面上隐藏,且禁止所述预先指定需要保密的应用程序运行,并将所述位置信息发送给预先绑定的终端设备。这样可以实现及时保护应用程序的信息不会泄露,以提高移动终端的安全性能。
在本申请所提供的几个实施例中,应该理解到,所揭露方法和装置,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
另外,在本发明各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理包括,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用硬件加软件功能单元的形式实现。
上述以软件功能单元的形式实现的集成的单元,可以存储在一个计算机可读取存储介质中。上述软件功能单元存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本发明各个实施例所述收发方法的部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,简称ROM)、随机存取存储器(Random Access Memory,简称RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述是本发明的优选实施方式,应当指出,对于本技术领域的普通技术人员来说,在不脱离本发明所述原理的前提下,还可以作出若干改进和润饰,这些改进和润饰也应视为本发明的保护范围。

Claims (10)

  1. 一种移动终端被盗处理方法,其特征在于,包括:
    移动终端检测解锁验证失败次数,并判断所述失败次数是否超过预设次数,若是,则采集所述移动终端的位置信息;
    所述移动终端判断所述位置信息是否属于所述移动终端预先存储的运动轨迹所对应的位置范围;
    若所述位置信息不属于所述位置范围,则确定所述移动终端处于被盗状态;
    所述移动终端处于被盗状态时,所述移动终端将所述移动终端上安装的预先指定需要保密的应用程序在界面上隐藏,且禁止所述预先指定需要保密的应用程序运行,并将所述位置信息发送给预先绑定的终端设备。
  2. 如权利要求1所述的方法,其特征在于,所述方法还包括:
    所述移动终端处于被盗状态时,所述移动终端将所述移动终端上登录的账号退出,并删除所述账号的密码记录。
  3. 如权利要求2所述的方法,其特征在于,所述方法还包括:
    所述移动终端处于被盗状态时,检测到所述移动终端登录有通信账号时,将所述通信账号的相关信息发送给预先绑定的终端设备;
    所述移动终端在所述通信账号的社交网页中发布所述通信账号在用户偷盗的移动终端上登录的通知消息。
  4. 如权利要求1-3中任一项所述的方法,其特征在于,所述方法还包括:
    所述移动终端搜索附近WIFI信号,并识别所述附近WIFI信号的WIFI标识;
    所述移动终端在服务器查询所述WIFI标识对应的WIFI注册信息;
    所述移动终端将所述WIFI标识和WIFI注册信息发送给预先绑定的终端设备。
  5. 如权利要求1-3中任一项所述的方法,其特征在于,所述方法还包括:
    若所述处于被盗状态时,所述移动终端被解锁,则将所述移动终端中的安全信息进行加密。
  6. 一种移动终端,其特征在于,包括:
    采集模块,用于移动终端检测解锁验证失败次数,并判断所述失败次数是 否超过预设次数,若是,则采集所述移动终端的位置信息;
    判断模块,用于判断所述位置信息是否属于所述移动终端预先存储的运动轨迹所对应的位置范围;
    确定模块,用于若所述位置信息不属于所述位置范围,则确定所述移动终端处于被盗状态;
    第一发送模块,用于所述移动终端处于被盗状态时,所述移动终端将所述移动终端上安装的预先指定需要保密的应用程序在界面上隐藏,且禁止所述预先指定需要保密的应用程序运行,并将所述位置信息发送给预先绑定的终端设备。
  7. 如权利要求6所述的移动终端,其特征在于,所述移动终端还包括:
    删除模块,用于处于被盗状态时,所述移动终端将所述移动终端上登录的账号退出,并删除所述账号的密码记录。
  8. 如权利要求7所述的移动终端,其特征在于,所述移动终端还包括:
    第二发送模块,用于处于被盗状态时,检测到所述移动终端登录有通信账号时,将所述通信账号的相关信息发送给预先绑定的终端设备;
    发布模块,用于在所述通信账号的社交网页中发布所述通信账号在用户偷盗的移动终端上登录的通知消息。
  9. 如权利要求6-8中任一项所述的移动终端,其特征在于,所述移动终端还包括:
    搜索模块,用于搜索附近WIFI信号,并识别所述附近WIFI信号的WIFI标识;
    查询模块,用于在服务器查询所述WIFI标识对应的WIFI注册信息;
    第三发送模块,用于将所述WIFI标识和WIFI注册信息发送给预先绑定的终端设备。
  10. 如权利要求6-8中任一项所述的移动终端,其特征在于,所述移动终端还包括:
    加密模块,用于若所述处于被盗状态时,所述移动终端被解锁,则将所述移动终端中的安全信息进行加密。
PCT/CN2017/089447 2017-06-21 2017-06-21 一种移动终端被盗处理方法和移动终端 WO2018232663A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/089447 WO2018232663A1 (zh) 2017-06-21 2017-06-21 一种移动终端被盗处理方法和移动终端

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/089447 WO2018232663A1 (zh) 2017-06-21 2017-06-21 一种移动终端被盗处理方法和移动终端

Publications (1)

Publication Number Publication Date
WO2018232663A1 true WO2018232663A1 (zh) 2018-12-27

Family

ID=64737477

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/089447 WO2018232663A1 (zh) 2017-06-21 2017-06-21 一种移动终端被盗处理方法和移动终端

Country Status (1)

Country Link
WO (1) WO2018232663A1 (zh)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103246855A (zh) * 2012-02-07 2013-08-14 宇龙计算机通信科技(深圳)有限公司 终端和终端安全管理方法
CN106203012A (zh) * 2016-06-22 2016-12-07 中国联合网络通信集团有限公司 屏幕锁定的处理方法、装置和设备
CN106357876A (zh) * 2015-07-14 2017-01-25 中兴通讯股份有限公司 移动终端的数据显示方法及装置
CN106658489A (zh) * 2016-09-30 2017-05-10 广东欧珀移动通信有限公司 一种终端应用的处理方法、装置及移动终端

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103246855A (zh) * 2012-02-07 2013-08-14 宇龙计算机通信科技(深圳)有限公司 终端和终端安全管理方法
CN106357876A (zh) * 2015-07-14 2017-01-25 中兴通讯股份有限公司 移动终端的数据显示方法及装置
CN106203012A (zh) * 2016-06-22 2016-12-07 中国联合网络通信集团有限公司 屏幕锁定的处理方法、装置和设备
CN106658489A (zh) * 2016-09-30 2017-05-10 广东欧珀移动通信有限公司 一种终端应用的处理方法、装置及移动终端

Similar Documents

Publication Publication Date Title
US9608980B2 (en) Environment-aware security tokens
US8688980B2 (en) Trust verification schema based transaction authorization
TWI587672B (zh) Login authentication method, client, server and system
CN103945385B (zh) 移动终端防盗的方法及其装置
US7591004B2 (en) Using trusted communication channel to combat user name/password theft
US20220030432A1 (en) Secure communication platform
US20130191887A1 (en) Social network based trust verification Schema
US20130133054A1 (en) Relationship Based Trust Verification Schema
US20060112418A1 (en) Protection of information in computing devices
CN109285256A (zh) 基于区块链身份验证的机房进门权限给定方法
KR20150026587A (ko) 신규 기기로부터의 로그인 알림 기능 제공 장치, 방법 및 컴퓨터 판독 가능한 기록 매체
US10291609B2 (en) Vault appliance for identity verification and secure dispatch of rights
CN107577968A (zh) 一种移动终端被盗处理方法和移动终端
Van Oorschot et al. Countering identity theft through digital uniqueness, location cross-checking, and funneling
WO2018232663A1 (zh) 一种移动终端被盗处理方法和移动终端
US11381604B2 (en) Resilient self-detection of malicious exfiltration of sensitive data
KR100955880B1 (ko) Rfid 환경에서의 보안 방법, 이를 기록한 기록 매체 및그 시스템
WO2018232664A1 (zh) 一种移动终端安全信息保护方法和移动终端
CN112817833A (zh) 一种监测数据库的方法及装置
KR101195027B1 (ko) 서비스 보안시스템 및 그 방법
KR20010016070A (ko) 은닉된 개인인증암호를 내포한 일회용식별코드 및운용시스템
WO2018232660A1 (zh) 一种移动终端信息发布方法和移动终端
TW201349824A (zh) 使用裝置識別碼的身份驗證方法及其系統
Kaushik et al. Security and Privacy Issues in Fog/Edge/Pervasive Computing
MOSTAFA et al. FALSE ALARM REDUCTION SCHEME FOR DATABASE INTRUSION DETECTION SYSTEM.

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17914582

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 15-05-2020)

122 Ep: pct application non-entry in european phase

Ref document number: 17914582

Country of ref document: EP

Kind code of ref document: A1