WO2018232664A1 - 一种移动终端安全信息保护方法和移动终端 - Google Patents

一种移动终端安全信息保护方法和移动终端 Download PDF

Info

Publication number
WO2018232664A1
WO2018232664A1 PCT/CN2017/089448 CN2017089448W WO2018232664A1 WO 2018232664 A1 WO2018232664 A1 WO 2018232664A1 CN 2017089448 W CN2017089448 W CN 2017089448W WO 2018232664 A1 WO2018232664 A1 WO 2018232664A1
Authority
WO
WIPO (PCT)
Prior art keywords
mobile terminal
wifi
information
location information
location
Prior art date
Application number
PCT/CN2017/089448
Other languages
English (en)
French (fr)
Inventor
王苏娜
Original Assignee
深圳支点电子智能科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳支点电子智能科技有限公司 filed Critical 深圳支点电子智能科技有限公司
Priority to PCT/CN2017/089448 priority Critical patent/WO2018232664A1/zh
Publication of WO2018232664A1 publication Critical patent/WO2018232664A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/725Cordless telephones

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to a mobile terminal security information protection method and a mobile terminal.
  • the location information is transmitted to the server, for example, by the mobile terminal, and the server transmits the location information to the user according to the received location information, so that the user can find the mobile according to the location information. terminal.
  • security information such as identity photos or security accounts such as bank accounts or communication accounts. In this way, when the mobile terminal is not retrieved, it may cause the information to be leaked. It can be seen that the security performance of the security information of the mobile terminal is relatively low.
  • the object of the present invention is to provide a mobile terminal security information protection method and a mobile terminal, which solves the problem that the security performance of the security information of the mobile terminal is relatively low.
  • an embodiment of the present invention provides a method for protecting a security information of a mobile terminal, including:
  • the mobile terminal detects the number of times the unlock verification fails, and determines whether the number of failures exceeds a preset number of times, and if so, collects location information of the mobile terminal;
  • the security information in the mobile terminal is encrypted, and the location information is sent to the pre-bound terminal device.
  • the method further includes:
  • the mobile terminal searches for a nearby WIFI signal and identifies a WIFI identifier of the nearby WIFI signal;
  • the mobile terminal sends the location information to a pre-bound terminal device, including:
  • the mobile terminal sends the WIFI identifier and the location information to a pre-bound terminal device.
  • the method further includes:
  • the mobile terminal sends the WIFI identifier and the location information to the pre-bound terminal device, including:
  • the mobile terminal sends the WIFI identifier, the WIFI registration information, and the location information to a pre-bound terminal device.
  • the method further includes:
  • the mobile terminal records altitude information of a location where the mobile terminal is located;
  • the mobile terminal sends the WIFI identifier, the WIFI registration information, and the location information to the pre-bound terminal device, including:
  • the mobile terminal sends the WIFI identifier, the WIFI registration information, the location information, and the altitude information to a pre-bound terminal device.
  • the method further includes:
  • the mobile terminal hides an application specified on the mobile terminal that needs to be kept secret from being hidden on the interface, and prohibits the pre-designated application that needs to be kept from running;
  • the mobile terminal exits the account that is logged in on the mobile terminal, and deletes the password record of the account.
  • the embodiment of the invention further provides a mobile terminal, including:
  • the detecting module is configured to detect the number of failed unlocking verifications, and determine whether the number of failed times exceeds a preset number of times, and if yes, collect location information of the mobile terminal;
  • a determining module configured to determine whether the location information belongs to a location range corresponding to a motion track pre-stored by the mobile terminal
  • Determining a module if the location information does not belong to the location range, determining the mobile terminal The end is in a stolen state;
  • a sending module configured to encrypt the security information in the mobile terminal when the mobile terminal is unlocked, and send the location information to the pre-bound terminal device.
  • the mobile terminal further includes:
  • a search module configured to search for a nearby WIFI signal, and identify a WIFI identifier of the nearby WIFI signal
  • the sending module is configured to send the WIFI identifier and the location information to a pre-bound terminal device.
  • the mobile terminal further includes:
  • a querying module configured to query, by the server, the WIFI registration information corresponding to the WIFI identifier
  • the sending module is configured to send the WIFI identifier, the WIFI registration information, and the location information to a pre-bound terminal device.
  • the mobile terminal further includes:
  • a recording module configured to record altitude information of a location where the mobile terminal is located
  • the sending module is configured to send the WIFI identifier, the WIFI registration information, the location information, and the altitude information to a pre-bound terminal device.
  • the mobile terminal further includes:
  • a hiding module configured to: when the stolen state is in the stolen state, the mobile terminal hides an application specified on the mobile terminal that needs to be kept secret from being hidden on the interface, and prohibits the pre-specified application that needs to be kept from running ;
  • the mobile terminal detects the number of failed unlocking verifications, and determines whether the number of failed times exceeds a preset number of times, and if so, collects location information of the mobile terminal; the mobile terminal determines whether the location information belongs to the location Determining, by the mobile terminal, a location range corresponding to the motion track pre-stored; if the location information does not belong to the location range, determining that the mobile terminal is in a stolen state; if the location is in a stolen state, the mobile terminal When unlocked, the security information in the mobile terminal is encrypted, and the location information is sent to the pre-bound terminal device. In this way, when the mobile terminal is detected to be in a stolen state, the security information in the mobile terminal is encrypted. Improve the security performance of mobile terminal security information.
  • FIG. 1 is a schematic flowchart of a method for protecting a security information of a mobile terminal according to an embodiment of the present invention
  • FIG. 2 is a schematic structural diagram of a mobile terminal according to an embodiment of the present invention.
  • FIG. 3 is a schematic structural diagram of another mobile terminal according to an embodiment of the present invention.
  • FIG. 4 is a schematic structural diagram of another mobile terminal according to an embodiment of the present invention.
  • FIG. 5 is a schematic structural diagram of another mobile terminal according to an embodiment of the present disclosure.
  • FIG. 6 is a schematic structural diagram of another mobile terminal according to an embodiment of the present invention.
  • FIG. 1 is a schematic flowchart of a method for protecting a security information of a mobile terminal according to an embodiment of the present invention. As shown in FIG. 1
  • the mobile terminal detects the number of times of the unlocking verification failure, and determines whether the number of failures exceeds a preset number of times. If yes, the location information of the mobile terminal is collected.
  • the mobile terminal determines whether the location information belongs to a location range corresponding to a motion track pre-stored by the mobile terminal.
  • the location range may be a location area where the mobile terminal frequently moves.
  • the location is often not in the same location, because the user who steals the mobile terminal and the mobile terminal may not be the same location. For example, it is impossible to be the same cell.
  • the security information in the mobile terminal is encrypted, thereby improving the security performance of the mobile terminal security information.
  • the security information may be security information preset by the mobile terminal, or may be pre-specified by the user. Of course, the mobile terminal may automatically recognize the stolen state when it detects the stolen state.
  • the method further includes:
  • the mobile terminal searches for a nearby WIFI signal and identifies a WIFI identifier of the nearby WIFI signal;
  • the mobile terminal sends the location information to a pre-bound terminal device, including:
  • the mobile terminal sends the WIFI identifier and the location information to a pre-bound terminal device.
  • the foregoing WIFI signal may be a WIFI signal that can be found by the mobile terminal, and may further be a WIFI signal that is connected to the mobile terminal, and the foregoing steps may be performed when the mobile terminal is not unlocked, that is, locked, or the mobile terminal is After unlocking.
  • the user can retrieve the mobile terminal more easily based on the location information and the WIFI signal, because the connectable range of the WIFI signal is fixed, and the location of the WIFI signal is also fixed.
  • the method further includes:
  • the mobile terminal sends the WIFI identifier and the location information to the pre-bound terminal device, including:
  • the mobile terminal sends the WIFI identifier, the WIFI registration information, and the location information to a pre-bound terminal device.
  • each WIFI signal may be authenticated by the server, so that the identity information of the person stealing the mobile terminal may be further confirmed by the WIFI identifier to facilitate the user to retrieve the mobile terminal.
  • the method further includes:
  • the mobile terminal records altitude information of a location where the mobile terminal is located;
  • the mobile terminal sends the WIFI identifier, the WIFI registration information, and the location information to the pre- Terminal devices that are bound first, including:
  • the mobile terminal sends the WIFI identifier, the WIFI registration information, the location information, and the altitude information to a pre-bound terminal device.
  • the altitude information of the user terminal can be sent to the pre-bound terminal device in time, so as to further facilitate the user to retrieve the mobile terminal, that is, the probability of retrieving the mobile terminal is improved, for example, the specific information may be determined according to the altitude information. floor.
  • the method further includes:
  • the mobile terminal hides an application specified on the mobile terminal that needs to be kept secret from being hidden on the interface, and prohibits the pre-designated application that needs to be kept from running;
  • the mobile terminal exits the account that is logged in on the mobile terminal, and deletes the password record of the account.
  • the application that needs to be kept secret is hidden on the interface, and the application that needs to be kept secret is prohibited from being operated, so that the information of the mobile terminal can be further protected.
  • the security of the account that is logged in to the mobile terminal can be protected, so as to prevent others from using these accounts for malicious information distribution or stealing accounts. Information inside.
  • the mobile terminal detects the number of failed unlocking verifications, and determines whether the number of failed times exceeds a preset number of times, and if so, collects location information of the mobile terminal; the mobile terminal determines whether the location information belongs to the location Determining, by the mobile terminal, a location range corresponding to the motion track pre-stored; if the location information does not belong to the location range, determining that the mobile terminal is in a stolen state; if the location is in a stolen state, the mobile terminal When unlocked, the security information in the mobile terminal is encrypted, and the location information is sent to the pre-bound terminal device. In this way, when the mobile terminal is detected to be in a stolen state, the security information in the mobile terminal is encrypted, thereby improving the security performance of the mobile terminal security information.
  • FIG. 2 is a schematic structural diagram of a mobile terminal according to an embodiment of the present invention. As shown in FIG. 2, the method includes:
  • the detecting module 201 is configured to detect the number of failed unlocking verifications, and determine whether the number of failed times exceeds a preset number of times, and if yes, collect location information of the mobile terminal;
  • the determining module 202 is configured to determine whether the location information belongs to the mobile terminal pre-stored The range of positions corresponding to the motion trajectory;
  • the determining module 203 is configured to determine that the mobile terminal is in a stolen state if the location information does not belong to the location range;
  • the sending module 204 is configured to encrypt the security information in the mobile terminal when the mobile terminal is unlocked, and send the location information to the pre-bound terminal device.
  • the mobile terminal further includes:
  • the searching module 205 is configured to search for a nearby WIFI signal, and identify a WIFI identifier of the nearby WIFI signal;
  • the sending module 204 is configured to send the WIFI identifier and the location information to a pre-bound terminal device.
  • the mobile terminal further includes:
  • the query module 206 is configured to query, by the server, the WIFI registration information corresponding to the WIFI identifier.
  • the sending module 204 is configured to send the WIFI identifier, the WIFI registration information, and the location information to a pre-bound terminal device.
  • the mobile terminal further includes:
  • a recording module 207 configured to record altitude information of a location where the mobile terminal is located;
  • the sending module 204 is configured to send the WIFI identifier, the WIFI registration information, the location information, and the altitude information to a pre-bound terminal device.
  • the mobile terminal further includes:
  • a hiding module 208 configured to: when the stolen state is in the stolen state, the mobile terminal hides an application specified on the mobile terminal that needs to be kept secret from being hidden on the interface, and prohibits the pre-designated application that needs to be kept secret run;
  • the deleting module 209 is configured to: and the mobile terminal exits the account that is logged in the mobile terminal, and deletes the password record of the account.
  • the mobile terminal detects the number of failed unlocking verifications, and determines whether the number of failed times exceeds a preset number of times, and if so, collects location information of the mobile terminal; the mobile terminal determines whether the location information belongs to the location Determining, by the mobile terminal, a location range corresponding to the motion track pre-stored; if the location information does not belong to the location range, determining that the mobile terminal is in a stolen state; if the location is in a stolen state, the mobile terminal Is unlocked, then the security letter in the mobile terminal The information is encrypted and the location information is sent to the pre-bound terminal device. In this way, when the mobile terminal is detected to be in a stolen state, the security information in the mobile terminal is encrypted, thereby improving the security performance of the mobile terminal security information.
  • the disclosed method and apparatus may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
  • each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may be physically included separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of hardware plus software functional units.
  • the above-described integrated unit implemented in the form of a software functional unit can be stored in a computer readable storage medium.
  • the above software functional unit is stored in a storage medium and includes a plurality of instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform part of the steps of the transceiving method of the various embodiments of the present invention.
  • the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like, and the program code can be stored. Medium.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)

Abstract

本发明提供一种移动终端安全信息保护方法和移动终端,该方法包括:移动终端检测解锁验证失败次数,并判断所述失败次数是否超过预设次数,若是,则采集所述移动终端的位置信息;所述移动终端判断所述位置信息是否属于所述移动终端预先存储的运动轨迹所对应的位置范围;若所述位置信息不属于所述位置范围,则确定所述移动终端处于被盗状态;若所述处于被盗状态时,所述移动终端被解锁,则将所述移动终端中的安全信息进行加密,并将所述位置信息发送给预先绑定的终端设备。这样可以实现在检测到移动终端处于被盗状态时,将所述移动终端中的安全信息进行加密,从而提高移动终端安全信息的安全性能。

Description

一种移动终端安全信息保护方法和移动终端 技术领域
本发明涉及通信技术领域,尤其涉及一种移动终端安全信息保护方法和移动终端。
背景技术
随着通信技术的发展,移动终端越来越被用户所喜爱并使用,且现在移动终端的价值也越来越高。在实际生活中经常会会出现移动终端丢失的情况,例如:被偷。然而,目前在移动终端被偷后,主要通过如是通过移动终端定位,再将位置信息发送给服务器,服务器根据接收到的位置信息,并传输给用户,这样用户根据就可以根据位置信息,查找移动终端。然而,由于用户仅是根据位置信息进行找回移动终端,这样很大可能是无法找回移动终端,但现在移动终端往往都保存安全信息,例如:身份照片或者银行账号或者通讯账号等安全信息,这样移动终端没有找回时,就会可能会导致这些信息泄密。可见,目前移动终端的安全信息的安全性能比较低。
发明内容
本发明的目的在于提供一种移动终端安全信息保护方法和移动终端,解决了移动终端的安全信息的安全性能比较低的问题。
为了达到上述目的,本发明实施例提供一种移动终端安全信息保护方法,包括:
移动终端检测解锁验证失败次数,并判断所述失败次数是否超过预设次数,若是,则采集所述移动终端的位置信息;
所述移动终端判断所述位置信息是否属于所述移动终端预先存储的运动轨迹所对应的位置范围;
若所述位置信息不属于所述位置范围,则确定所述移动终端处于被盗状态;
若所述处于被盗状态时,所述移动终端被解锁,则将所述移动终端中的安全信息进行加密,并将所述位置信息发送给预先绑定的终端设备。
优选的,所述方法还包括:
所述移动终端搜索附近WIFI信号,并识别所述附近WIFI信号的WIFI标识;
所述移动终端将所述位置信息发送给预先绑定的终端设备,包括:
所述移动终端将所述WIFI标识和所述位置信息发送给预先绑定的终端设备。
优选的,所述方法还包括:
在服务器查询所述WIFI标识对应的WIFI注册信息;
所述移动终端将所述WIFI标识和所述位置信息发送给预先绑定的终端设备,包括:
所述移动终端将所述WIFI标识、WIFI注册信息和所述位置信息发送给预先绑定的终端设备。
优选的,所述方法还包括:
所述移动终端记录所述移动终端所处位置的海拔信息;
所述移动终端将所述WIFI标识、WIFI注册信息和所述位置信息发送给预先绑定的终端设备,包括:
所述移动终端将所述WIFI标识、WIFI注册信息、所述位置信息和所述海拔信息发送给预先绑定的终端设备。
优选的,所述方法还包括:
若所述处于被盗状态时,所述移动终端将所述移动终端上安装的预先指定需要保密的应用程序在界面上隐藏,且禁止所述预先指定需要保密的应用程序运行;
以及所述移动终端将所述移动终端上登录的账号退出,并删除所述账号的密码记录。
本发明实施例还提供一种移动终端,包括:
检测模块,用于检测解锁验证失败次数,并判断所述失败次数是否超过预设次数,若是,则采集所述移动终端的位置信息;
判断模块,用于判断所述位置信息是否属于所述移动终端预先存储的运动轨迹所对应的位置范围;
确定模块,用于若所述位置信息不属于所述位置范围,则确定所述移动终 端处于被盗状态;
发送模块,用于若所述处于被盗状态时,所述移动终端被解锁,则将所述移动终端中的安全信息进行加密,并将所述位置信息发送给预先绑定的终端设备。
优选的,所述移动终端还包括:
搜索模块,用于搜索附近WIFI信号,并识别所述附近WIFI信号的WIFI标识;
所述发送模块用于将所述WIFI标识和所述位置信息发送给预先绑定的终端设备。
优选的,所述移动终端还包括:
查询模块,用于在服务器查询所述WIFI标识对应的WIFI注册信息;
所述发送模块用于将所述WIFI标识、WIFI注册信息和所述位置信息发送给预先绑定的终端设备。
优选的,所述移动终端还包括:
记录模块,用于记录所述移动终端所处位置的海拔信息;
所述发送模块用于将所述WIFI标识、WIFI注册信息、所述位置信息和所述海拔信息发送给预先绑定的终端设备。
优选的,所述移动终端还包括:
隐藏模块,用于若所述处于被盗状态时,所述移动终端将所述移动终端上安装的预先指定需要保密的应用程序在界面上隐藏,且禁止所述预先指定需要保密的应用程序运行;
删除模块,用于以及所述移动终端将所述移动终端上登录的账号退出,并删除所述账号的密码记录。
本发明实施例中,移动终端检测解锁验证失败次数,并判断所述失败次数是否超过预设次数,若是,则采集所述移动终端的位置信息;所述移动终端判断所述位置信息是否属于所述移动终端预先存储的运动轨迹所对应的位置范围;若所述位置信息不属于所述位置范围,则确定所述移动终端处于被盗状态;若所述处于被盗状态时,所述移动终端被解锁,则将所述移动终端中的安全信息进行加密,并将所述位置信息发送给预先绑定的终端设备。这样可以实现在检测到移动终端处于被盗状态时,将所述移动终端中的安全信息进行加密,从 而提高移动终端安全信息的安全性能。
附图说明
为了更清楚地说明本发明实施例中的技术方案,下面将对实施例中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是本发明实施例提供的一种移动终端安全信息保护方法的流程示意图;
图2是本发明实施例提供的一种移动终端的结构示意图;
图3是本发明实施例提供的另一种移动终端的结构示意图;
图4是本发明实施例提供的另一种移动终端的结构示意图;
图5是本发明实施例提供的另一种移动终端的结构示意图;
图6是本发明实施例提供的另一种移动终端的结构示意图。
具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
请参考图1,图1是本发明实施例提供的一种移动终端安全信息保护方法的流程示意图,如图1所示,包括:
101、移动终端检测解锁验证失败次数,并判断所述失败次数是否超过预设次数,若是,则采集所述移动终端的位置信息;
102、移动终端判断所述位置信息是否属于所述移动终端预先存储的运动轨迹所对应的位置范围;
103、若所述位置信息不属于所述位置范围,则确定所述移动终端处于被盗状态;
104、若所述处于被盗状态时,所述移动终端被解锁,则将所述移动终端中的安全信息进行加密,并将所述位置信息发送给预先绑定的终端设备。
其中,上述位置范围可以是移动终端经常移动的位置区域,在实际应用中当移动终端被偷时,往往就不是在同一位置,因为偷移动终端和移动终端的用户往往不可能是同一位置的人,例如:不可能是同的小区。
通过上述步骤可以实现在检测到移动终端处于被盗状态时,将所述移动终端中的安全信息进行加密,从而提高移动终端安全信息的安全性能。其中,上述安全信息可以是移动终端预先设置的安全信息,或者用户预先指定,当然,也可以是移动终端在检测到处于被盗状态时自动识别的。
优选的,所述方法还包括:
所述移动终端搜索附近WIFI信号,并识别所述附近WIFI信号的WIFI标识;
所述移动终端将所述位置信息发送给预先绑定的终端设备,包括:
所述移动终端将所述WIFI标识和所述位置信息发送给预先绑定的终端设备。
其中,上述附近WIFI信号可以是移动终端可发现的WIFI信号,进一步可以是移动终端连接的WIFI信号,且上述步骤可以是移动终端未解锁,即锁定的状态下进行的,也可以是移动终端被解锁后进行的。
这样用户基于位置信息和WIFI信号就可以更加容易找回移动终端,因为WIFI信号的可连接的范围是固定的,且WIFI信号的位置也是固定的。
优选的,所述方法还包括:
在服务器查询所述WIFI标识对应的WIFI注册信息;
所述移动终端将所述WIFI标识和所述位置信息发送给预先绑定的终端设备,包括:
所述移动终端将所述WIFI标识、WIFI注册信息和所述位置信息发送给预先绑定的终端设备。
该实施方式中,各WIFI信号可以是在上述服务器认证的,这样通过上述WIFI标识,就可以进一步确认偷移动终端的人的身份相关信息,以方便用户找回移动终端。
优选的,所述方法还包括:
所述移动终端记录所述移动终端所处位置的海拔信息;
所述移动终端将所述WIFI标识、WIFI注册信息和所述位置信息发送给预 先绑定的终端设备,包括:
所述移动终端将所述WIFI标识、WIFI注册信息、所述位置信息和所述海拔信息发送给预先绑定的终端设备。
该实施方式中,可以实现及时将用户终端的海拔信息发送给预先绑定的终端设备,以进一步有利于用户找回移动终端,即提高找回移动终端的概率,例如根据海拔信息可以确定具体的楼层。
优选的,所述方法还包括:
若所述处于被盗状态时,所述移动终端将所述移动终端上安装的预先指定需要保密的应用程序在界面上隐藏,且禁止所述预先指定需要保密的应用程序运行;
以及所述移动终端将所述移动终端上登录的账号退出,并删除所述账号的密码记录。
该实施方式中,通过上述步骤可以实现将需要保密的应用程序在界面上隐藏,且禁止所述预先指定需要保密的应用程序运行,这样可以更一步保护到移动终端的信息。另外,通过将所述移动终端上登录的账号退出,并删除所述账号的密码记录,这样可以保护到移动终端登录的账号的安全,以避免别人使用这些账号进行恶意的信息发布或者盗取账号内的信息。
本发明实施例中,移动终端检测解锁验证失败次数,并判断所述失败次数是否超过预设次数,若是,则采集所述移动终端的位置信息;所述移动终端判断所述位置信息是否属于所述移动终端预先存储的运动轨迹所对应的位置范围;若所述位置信息不属于所述位置范围,则确定所述移动终端处于被盗状态;若所述处于被盗状态时,所述移动终端被解锁,则将所述移动终端中的安全信息进行加密,并将所述位置信息发送给预先绑定的终端设备。这样可以实现在检测到移动终端处于被盗状态时,将所述移动终端中的安全信息进行加密,从而提高移动终端安全信息的安全性能。
请参考图2,图2是本发明实施例提供的一种移动终端的结构示意图,如图2所示,包括:
检测模块201,用于检测解锁验证失败次数,并判断所述失败次数是否超过预设次数,若是,则采集所述移动终端的位置信息;
判断模块202,用于判断所述位置信息是否属于所述移动终端预先存储的 运动轨迹所对应的位置范围;
确定模块203,用于若所述位置信息不属于所述位置范围,则确定所述移动终端处于被盗状态;
发送模块204,用于若所述处于被盗状态时,所述移动终端被解锁,则将所述移动终端中的安全信息进行加密,并将所述位置信息发送给预先绑定的终端设备。
优选的,如图3所示,所述移动终端还包括:
搜索模块205,用于搜索附近WIFI信号,并识别所述附近WIFI信号的WIFI标识;
所述发送模块204用于将所述WIFI标识和所述位置信息发送给预先绑定的终端设备。
优选的,如图4所示,所述移动终端还包括:
查询模块206,用于在服务器查询所述WIFI标识对应的WIFI注册信息;
所述发送模块204用于将所述WIFI标识、WIFI注册信息和所述位置信息发送给预先绑定的终端设备。
优选的,如图5所示,所述移动终端还包括:
记录模块207,用于记录所述移动终端所处位置的海拔信息;
所述发送模块204用于将所述WIFI标识、WIFI注册信息、所述位置信息和所述海拔信息发送给预先绑定的终端设备。
优选的,如图6所示,所述移动终端还包括:
隐藏模块208,用于若所述处于被盗状态时,所述移动终端将所述移动终端上安装的预先指定需要保密的应用程序在界面上隐藏,且禁止所述预先指定需要保密的应用程序运行;
删除模块209,用于以及所述移动终端将所述移动终端上登录的账号退出,并删除所述账号的密码记录。
本发明实施例中,移动终端检测解锁验证失败次数,并判断所述失败次数是否超过预设次数,若是,则采集所述移动终端的位置信息;所述移动终端判断所述位置信息是否属于所述移动终端预先存储的运动轨迹所对应的位置范围;若所述位置信息不属于所述位置范围,则确定所述移动终端处于被盗状态;若所述处于被盗状态时,所述移动终端被解锁,则将所述移动终端中的安全信 息进行加密,并将所述位置信息发送给预先绑定的终端设备。这样可以实现在检测到移动终端处于被盗状态时,将所述移动终端中的安全信息进行加密,从而提高移动终端安全信息的安全性能。
在本申请所提供的几个实施例中,应该理解到,所揭露方法和装置,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
另外,在本发明各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理包括,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用硬件加软件功能单元的形式实现。
上述以软件功能单元的形式实现的集成的单元,可以存储在一个计算机可读取存储介质中。上述软件功能单元存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本发明各个实施例所述收发方法的部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,简称ROM)、随机存取存储器(Random Access Memory,简称RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述是本发明的优选实施方式,应当指出,对于本技术领域的普通技术人员来说,在不脱离本发明所述原理的前提下,还可以作出若干改进和润饰,这些改进和润饰也应视为本发明的保护范围。

Claims (10)

  1. 一种移动终端安全信息保护方法,其特征在于,包括:
    移动终端检测解锁验证失败次数,并判断所述失败次数是否超过预设次数,若是,则采集所述移动终端的位置信息;
    所述移动终端判断所述位置信息是否属于所述移动终端预先存储的运动轨迹所对应的位置范围;
    若所述位置信息不属于所述位置范围,则确定所述移动终端处于被盗状态;
    若所述处于被盗状态时,所述移动终端被解锁,则将所述移动终端中的安全信息进行加密,并将所述位置信息发送给预先绑定的终端设备。
  2. 如权利要求1所述的方法,其特征在于,所述方法还包括:
    所述移动终端搜索附近WIFI信号,并识别所述附近WIFI信号的WIFI标识;
    所述移动终端将所述位置信息发送给预先绑定的终端设备,包括:
    所述移动终端将所述WIFI标识和所述位置信息发送给预先绑定的终端设备。
  3. 如权利要求2所述的方法,其特征在于,所述方法还包括:
    在服务器查询所述WIFI标识对应的WIFI注册信息;
    所述移动终端将所述WIFI标识和所述位置信息发送给预先绑定的终端设备,包括:
    所述移动终端将所述WIFI标识、WIFI注册信息和所述位置信息发送给预先绑定的终端设备。
  4. 如权利要求3所述的方法,其特征在于,所述方法还包括:
    所述移动终端记录所述移动终端所处位置的海拔信息;
    所述移动终端将所述WIFI标识、WIFI注册信息和所述位置信息发送给预先绑定的终端设备,包括:
    所述移动终端将所述WIFI标识、WIFI注册信息、所述位置信息和所述海拔信息发送给预先绑定的终端设备。
  5. 如权利要求4所述的方法,其特征在于,所述方法还包括:
    若所述处于被盗状态时,所述移动终端将所述移动终端上安装的预先指定需要保密的应用程序在界面上隐藏,且禁止所述预先指定需要保密的应用程序 运行;
    以及所述移动终端将所述移动终端上登录的账号退出,并删除所述账号的密码记录。
  6. 一种移动终端,其特征在于,包括:
    检测模块,用于检测解锁验证失败次数,并判断所述失败次数是否超过预设次数,若是,则采集所述移动终端的位置信息;
    判断模块,用于判断所述位置信息是否属于所述移动终端预先存储的运动轨迹所对应的位置范围;
    确定模块,用于若所述位置信息不属于所述位置范围,则确定所述移动终端处于被盗状态;
    发送模块,用于若所述处于被盗状态时,所述移动终端被解锁,则将所述移动终端中的安全信息进行加密,并将所述位置信息发送给预先绑定的终端设备。
  7. 如权利要求6所述的移动终端,其特征在于,所述移动终端还包括:
    搜索模块,用于搜索附近WIFI信号,并识别所述附近WIFI信号的WIFI标识;
    所述发送模块用于将所述WIFI标识和所述位置信息发送给预先绑定的终端设备。
  8. 如权利要求7所述的移动终端,其特征在于,所述移动终端还包括:
    查询模块,用于在服务器查询所述WIFI标识对应的WIFI注册信息;
    所述发送模块用于将所述WIFI标识、WIFI注册信息和所述位置信息发送给预先绑定的终端设备。
  9. 如权利要求8所述的移动终端,其特征在于,所述移动终端还包括:
    记录模块,用于记录所述移动终端所处位置的海拔信息;
    所述发送模块用于将所述WIFI标识、WIFI注册信息、所述位置信息和所述海拔信息发送给预先绑定的终端设备。
  10. 如权利要求9所述的移动终端,其特征在于,所述移动终端还包括:
    隐藏模块,用于若所述处于被盗状态时,所述移动终端将所述移动终端上安装的预先指定需要保密的应用程序在界面上隐藏,且禁止所述预先指定需要保密的应用程序运行;
    删除模块,用于以及所述移动终端将所述移动终端上登录的账号退出,并删除所述账号的密码记录。
PCT/CN2017/089448 2017-06-21 2017-06-21 一种移动终端安全信息保护方法和移动终端 WO2018232664A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/089448 WO2018232664A1 (zh) 2017-06-21 2017-06-21 一种移动终端安全信息保护方法和移动终端

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/089448 WO2018232664A1 (zh) 2017-06-21 2017-06-21 一种移动终端安全信息保护方法和移动终端

Publications (1)

Publication Number Publication Date
WO2018232664A1 true WO2018232664A1 (zh) 2018-12-27

Family

ID=64737486

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/089448 WO2018232664A1 (zh) 2017-06-21 2017-06-21 一种移动终端安全信息保护方法和移动终端

Country Status (1)

Country Link
WO (1) WO2018232664A1 (zh)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104468466A (zh) * 2013-09-12 2015-03-25 深圳市腾讯计算机系统有限公司 网络账户的操作管理方法及装置
CN104539811A (zh) * 2015-01-23 2015-04-22 深圳市中兴移动通信有限公司 终端的防盗方法和移动终端
CN105306204A (zh) * 2014-07-04 2016-02-03 腾讯科技(深圳)有限公司 安全验证方法、装置及系统
CN105809048A (zh) * 2014-12-29 2016-07-27 富泰华工业(深圳)有限公司 防止信息泄露的系统及方法
CN106154943A (zh) * 2015-04-24 2016-11-23 北大方正集团有限公司 移动设备位置监控方法、装置及系统
CN106469284A (zh) * 2016-08-19 2017-03-01 广东欧珀移动通信有限公司 一种信息处理方法、装置和移动终端
US20170098073A1 (en) * 2014-11-18 2017-04-06 Shenzhen Huiding Technology Co., Ltd. Method and apparatus for identifying malicious operation in mobile terminal

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104468466A (zh) * 2013-09-12 2015-03-25 深圳市腾讯计算机系统有限公司 网络账户的操作管理方法及装置
CN105306204A (zh) * 2014-07-04 2016-02-03 腾讯科技(深圳)有限公司 安全验证方法、装置及系统
US20170098073A1 (en) * 2014-11-18 2017-04-06 Shenzhen Huiding Technology Co., Ltd. Method and apparatus for identifying malicious operation in mobile terminal
CN105809048A (zh) * 2014-12-29 2016-07-27 富泰华工业(深圳)有限公司 防止信息泄露的系统及方法
CN104539811A (zh) * 2015-01-23 2015-04-22 深圳市中兴移动通信有限公司 终端的防盗方法和移动终端
CN106154943A (zh) * 2015-04-24 2016-11-23 北大方正集团有限公司 移动设备位置监控方法、装置及系统
CN106469284A (zh) * 2016-08-19 2017-03-01 广东欧珀移动通信有限公司 一种信息处理方法、装置和移动终端

Similar Documents

Publication Publication Date Title
KR102307665B1 (ko) 신원 인증
EP3428819B1 (en) Mobile security countermeasures
US7559081B2 (en) Method and apparatus for authenticating a user at an access terminal
CN105939326B (zh) 处理报文的方法及装置
CN103945385B (zh) 移动终端防盗的方法及其装置
WO2015165423A1 (en) Account login method, apparatus, and system
US20180351956A1 (en) Integrated biometrics for application security
CN107864124B (zh) 一种终端信息安全保护方法、终端及蓝牙锁
KR102424142B1 (ko) 이동 통신 시스템에서 결제 관련 정보 인증 방법 및 장치
CN106162649A (zh) 一种识别无线接入点合法性的方法、终端及系统
KR20150026587A (ko) 신규 기기로부터의 로그인 알림 기능 제공 장치, 방법 및 컴퓨터 판독 가능한 기록 매체
CN109285256A (zh) 基于区块链身份验证的机房进门权限给定方法
US20220215093A1 (en) Event Monitoring
US20110162058A1 (en) System and Method for Providing Convergent Physical/Logical Location Aware Access Control
AU2021282382A1 (en) A Method and System for Reporting, Securing and Controlling Mobile Phones Which are Lost (Misplaced\Stolen)
CN112615716A (zh) 通过用户归档进行数字秘钥不良行为和女巫攻击检测的方法
US10548015B2 (en) Mobile device security lock
KR101268298B1 (ko) 위치정보 기반 인증 관제 시스템 및 방법
US10291609B2 (en) Vault appliance for identity verification and secure dispatch of rights
WO2015085942A1 (zh) 终端状态查询方法、终端防盗方法及相应的设备
KR101583698B1 (ko) 접속 시도 기기 인증 시스템 및 방법
WO2015085940A1 (zh) 移动终端防盗方法及客户端
WO2018232664A1 (zh) 一种移动终端安全信息保护方法和移动终端
CN115659359A (zh) 一种业务系统访问主动审计方法及系统
WO2018232663A1 (zh) 一种移动终端被盗处理方法和移动终端

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17914163

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 15.05.2020)

122 Ep: pct application non-entry in european phase

Ref document number: 17914163

Country of ref document: EP

Kind code of ref document: A1