WO2023024888A1 - 数据处理方法、装置、设备及存储介质 - Google Patents

数据处理方法、装置、设备及存储介质 Download PDF

Info

Publication number
WO2023024888A1
WO2023024888A1 PCT/CN2022/111028 CN2022111028W WO2023024888A1 WO 2023024888 A1 WO2023024888 A1 WO 2023024888A1 CN 2022111028 W CN2022111028 W CN 2022111028W WO 2023024888 A1 WO2023024888 A1 WO 2023024888A1
Authority
WO
WIPO (PCT)
Prior art keywords
mobile terminal
server
distance
data
determining
Prior art date
Application number
PCT/CN2022/111028
Other languages
English (en)
French (fr)
Inventor
祖金伟
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2023024888A1 publication Critical patent/WO2023024888A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup

Definitions

  • the embodiments of the present application relate to the technical field of data security, for example, to a data processing method, device, device, and storage medium.
  • Smart wearable device is a general term for applying wearable technology to intelligently design daily wear and develop wearable devices, such as watches, bracelets, glasses and clothing. Smart wearable devices are usually used in conjunction with mobile terminals.
  • Data security refers to protecting users' hardware, software and data from being damaged, changed and leaked due to accidental and malicious reasons. It is particularly important to realize the protection of mobile terminal data security through smart wearable devices.
  • the main way for smart wearable devices to communicate with mobile terminal devices is Bluetooth transmission. Due to the limitations of Bluetooth connection technology itself, the communication distance of devices is limited, making the protection of data security in mobile terminals less reliable.
  • Embodiments of the present application provide a data processing method, device, device, and storage medium, which can protect data in a mobile terminal and improve data security.
  • the embodiment of the present application discloses a data processing method, the method is executed by a mobile terminal, including:
  • the embodiment of the present application discloses a data processing method, the method is executed by a smart wearable device, including:
  • the embodiment of the present application discloses a data processing device, the device is set in a mobile terminal, including:
  • the distance determination module is configured to determine the distance between the bound smart wearable device
  • a mobile terminal locking module configured to lock the mobile terminal in response to determining that the distance exceeds a first set threshold
  • the data processing module is configured to upload the user data in the mobile terminal to the server in response to determining that the number of failed unlocking of the mobile terminal exceeds a second set threshold or receiving a data protection instruction sent by the server, and The user data is deleted from the mobile terminal.
  • the embodiment of the present application discloses a data processing device, the device is set in a smart wearable device, including:
  • a distance determining module configured to determine the distance between the bound mobile terminal
  • a random unlocking key generation module configured to periodically generate a random unlocking key in response to determining that the distance exceeds a first set threshold, and send the random unlocking key to the server;
  • a data protection instruction sending module configured to send the data protection instruction to the server in response to determining that a user-triggered data protection instruction is detected, so that the server sends the data protection instruction to the mobile terminal, so that The mobile terminal uploads the user data to the server, and deletes the user data from the mobile terminal.
  • the embodiment of the present application discloses a computer device, which includes a memory, a processor, and a computer program stored on the memory and operable on the processor.
  • the processor executes the program, it implements the data processing method.
  • the embodiment of the present application discloses a computer-readable storage medium, on which a computer program is stored, and when the program is executed by a processor, the data processing method as described in the embodiment of the present application is implemented.
  • FIG. 1 is a flow chart of a data processing method provided in an embodiment of the present application
  • Fig. 2 is a schematic diagram of a data processing system provided by an embodiment of the present application.
  • FIG. 3 is a flow chart of a data processing method provided by an embodiment of the present application.
  • FIG. 4 is a schematic structural diagram of a data processing device provided in an embodiment of the present application.
  • FIG. 5 is a schematic structural diagram of a data processing device provided in an embodiment of the present application.
  • Fig. 6 is a schematic structural diagram of a computer device provided by an embodiment of the present application.
  • FIG. 1 is a flow chart of a data processing method provided in an embodiment of the present application.
  • the method can be applied to the situation of performing security protection on the data in the mobile terminal.
  • the method can be performed by a mobile terminal. As shown in Fig. 1, the method includes S110-S130.
  • smart wearable devices may include smart watches, smart bracelets, smart glasses and smart clothing.
  • smart wearable devices can be divided into two categories: sports and fitness outdoor fields and healthcare fields.
  • the field of outdoor sports and fitness can include smart watches, smart bracelets, and smart accessories
  • the field of healthcare can include medical vests, belts, and implanted chips.
  • the wearable device and the mobile terminal device perform data interaction through the server, and log in by sharing an account in the server.
  • the positioning module of the mobile terminal reports the real-time location, and multiple mobile terminals use International Mobile Equipment Identity (IMEI) for unique identification.
  • FIG. 2 is a schematic diagram of a data processing system in this embodiment.
  • IMEI International Mobile Equipment Identity
  • the system includes a mobile terminal, a smart wearable device, and a server.
  • the server is provided with a cloud database for storing data, and data interaction between the mobile terminal and the smart wearable device is realized through the server.
  • the smart wearable device and the mobile terminal are bound through the server and can share the same account or different accounts. If the smart wearable device and the mobile terminal device share different accounts, since the two have a binding relationship, the smart wearable device can access the account of the mobile terminal, and the mobile terminal can also access the account of the smart wearable device. You can log in to the corresponding account in the login module of the respective device. Generate a list of mobile terminals on the operation interface of the smart wearable device to facilitate subsequent operations.
  • the users can also set the safety distance and monitoring attributes for each mobile terminal on the operation interface of the smart wearable device.
  • the monitoring attribute may include whether to perform security monitoring on the mobile terminal, a method of security monitoring, and the like.
  • the way of safety monitoring may include starting safety monitoring regularly or starting safety monitoring at a fixed location. When the safety monitoring is turned on, the safety distance set by the user is the first set threshold.
  • the positioning module of the mobile terminal locates the mobile terminal to obtain the current location information of the mobile terminal, and the mobile terminal sends the location information to the server, and the server sends the location information to the smart wearable device.
  • the positioning module in the smart wearable device locates the smart wearable device, obtains the current location information of the smart wearable device, and the smart wearable device sends the location information to the server, and the server sends the location information to the mobile terminal.
  • the positioning module may be a Global Positioning System (Global Positioning System, GPS) or a Big Dipper positioning system.
  • the method of determining the distance to the bound smart wearable device may be: obtaining the first location information where the mobile terminal is currently located; sending the first location information to the server; obtaining the current location of the bound smart wearable device from the server; The second location information where you are: determining the distance to the smart wearable device according to the first location information and the second location information.
  • the first location information and the second location information may be represented by latitude and longitude, and the straight-line distance between the mobile terminal and the smart wearable device may be calculated through the latitude and longitude information.
  • the first set threshold can be set by the user.
  • Locking the mobile terminal can be understood as performing an off-screen operation on the mobile terminal, and a key is required to unlock it when it is woken up again.
  • the following steps are further included: controlling the positioning module to remain on and disabling the operation switch of the positioning module.
  • controlling the positioning module to remain in the on state can be understood as forcing the positioning module to be in the on state.
  • Disabling the operation switch of the positioning module can be understood as the user cannot operate the switch of the positioning module.
  • the advantage of this is to prevent the positioning module from being turned off by criminals after the mobile terminal is lost, so that the location information cannot be sent to the smart wearable device.
  • an unlock key is required to unlock the mobile terminal. If the user uses the correct unlocking key to unlock, the unlocking will be successful. If the user uses the wrong unlocking key to unlock, the unlocking will fail.
  • the data protection instruction is triggered by the user through the smart wearable device, and sent to the server, and then sent to the mobile terminal by the server.
  • the process of unlocking the mobile terminal may be: receiving the first unlocking key input by the user; obtaining the second unlocking key from the server; judging whether the first unlocking key matches the second unlocking key, based on the first unlocking key Based on the judging result that the first unlocking key matches the second unlocking key, the unlocking is successful; based on the judging result that the first unlocking key does not match the second unlocking key, the unlocking fails.
  • the first unlocking key may be directly input by the user into the mobile terminal.
  • the second unlocking key may be randomly generated by the smart wearable device and sent to the server.
  • the smart wearable device when the distance between the smart wearable device and the mobile terminal exceeds the first set threshold, the smart wearable device randomly generates a second unlock key periodically, and sends the second unlock key to the server for further processing. Stored so that the mobile terminal can obtain it from the server when it is unlocked.
  • the user data in the mobile terminal is uploaded to the server, and the user data is deleted from the mobile terminal .
  • the user data may be data generated by the user when using the mobile terminal.
  • it can be set to upload all user data to the server and delete it from the mobile terminal, or it can be set to upload the user data in the set field to the server and delete it from the mobile terminal. It can be set according to the actual needs of the user, and there is no limitation here.
  • the user data in motion is backed up to the database in the server, and the local data is cleared at the same time, so as to protect the user data.
  • each mobile terminal is set with a fixed number of times of unlocking, and at the same time, the operation interface of the smart wearable device also has the operation function of data protection, which are represented by fixed fields in the database. 0 or the user changes the field value of the data protection function through the operation module of the smart wearable device, the mobile terminal local data backup is stored in the database with the IMEI number identification, and then the local data is deleted to protect the user data security.
  • the way of triggering the data protection instruction may be that the user modifies the field value of the number of times of unlocking to 0 on the operation interface of the smart wearable device.
  • the technical solution of the embodiment of the present application determines the distance between the bound smart wearable device; when the distance exceeds the first set threshold, locks the mobile terminal; when it is detected that the number of failed unlocking of the mobile terminal exceeds the second set threshold Or when receiving the data protection instruction sent by the server, upload the user data in the mobile terminal to the server, and delete the user data from the mobile terminal.
  • the data processing method provided by the embodiment of the present application can realize the protection of the data in the mobile terminal, and can improve the security of the data.
  • FIG. 3 is a flowchart of a data processing method provided by an embodiment of the present application.
  • the method can be applied to the situation of performing security protection on the data in the mobile terminal.
  • the method can be executed by a smart wearable device. As shown in Fig. 1, the method includes S210-S230.
  • the mobile terminal may be a smart phone or a tablet.
  • the smart wearable device and the mobile terminal device have a binding relationship, and can share the same account or different accounts. If the smart wearable device and the mobile terminal device share different accounts, since the two have a binding relationship, the smart wearable device can access the account of the mobile terminal, and the mobile terminal can also access the account of the smart wearable device. The two can log in to the corresponding account in the login module of their respective devices. Generate a list of mobile terminals on the operation interface of the smart wearable device to facilitate subsequent operations. Users can also set the safety distance and monitoring attributes for each mobile terminal on the operation interface of the smart wearable device. Wherein, the monitoring attribute may include whether to perform security monitoring on the mobile terminal, a method of security monitoring, and the like. The way of safety monitoring may include starting safety monitoring regularly or starting safety monitoring at a fixed location. When the safety monitoring is turned on, the safety distance set by the user is the first set threshold.
  • the positioning module of the mobile terminal locates the mobile terminal to obtain the current location information of the mobile terminal, and the mobile terminal sends the location information to the server, and the server sends the location information to the smart wearable device.
  • the positioning module in the smart wearable device locates the smart wearable device, obtains the current location information of the smart wearable device, and the smart wearable device sends the location information to the server, and the server sends the location information to the mobile terminal.
  • the method of determining the distance to the bound mobile terminal may be: obtaining the first location information of the bound mobile terminal from the server; obtaining the second location information of the smart wearable device; The second location information is sent to the server; the distance to the mobile terminal is determined according to the first location information and the second location information.
  • the first location information and the second location information may be represented by latitude and longitude, and the straight-line distance between the mobile terminal and the smart wearable device may be calculated through the latitude and longitude information.
  • the generation method of the random unlocking key may be generated according to any random generation algorithm, which is not limited here.
  • the smart wearable device when the distance exceeds the first set threshold, the smart wearable device generates reminder information to remind the user.
  • the reminder information may be a sound reminder or a vibration reminder.
  • the embodiment of the present application further includes the following steps: displaying the random unlocking key and the first location information, so that the user can find the mobile terminal according to the first location information, and unlock the mobile terminal according to the random unlocking key.
  • the first location information may be obtained by the smart wearable device from the server.
  • the way of triggering the user data protection instruction may be that the user modifies the field value of the number of times of unlocking to 0 on the operation interface of the smart wearable device.
  • each mobile terminal is set with a fixed number of times of unlocking, and at the same time, the operation interface of the smart wearable device also has the operation function of data protection, which are represented by fixed fields in the database.
  • the operation module changes the field value of the data protection function, and the data backup of the mobile terminal is stored in the database with the IMEI number identification, and then the data of the local machine is deleted to protect the security of user data.
  • the calculation scheme of the embodiment of the present application determines the distance between the bound mobile terminal; when the distance exceeds the first set threshold, a random unlock key is periodically generated, and the random unlock key is sent to the server; when the detected When a data protection instruction is triggered by the user, the data protection instruction is sent to the server, so that the server sends the data protection instruction to the mobile terminal, so that the mobile terminal uploads the user data to the server and deletes the user data from the mobile terminal.
  • the protection of the data in the mobile terminal can be realized, and the security of the data can be improved.
  • FIG. 4 is a schematic structural diagram of a data processing device provided in an embodiment of the present application.
  • the device is set in a mobile terminal and includes:
  • the distance determining module 410 is configured to determine the distance between the bound smart wearable device
  • the mobile terminal locking module 420 is configured to lock the mobile terminal when the distance exceeds the first set threshold
  • the data processing module 430 is configured to upload the user data in the mobile terminal to the server when it detects that the number of unlock failures to the mobile terminal exceeds a second set threshold or receives a data protection instruction sent by the server, and uploads the user data from the deleted from the mobile terminal.
  • the distance determination module 410 is also set to:
  • the data processing device further includes: an operation switch disabling module of the positioning module, which is set to:
  • the data processing device further includes: an unlocking module, configured to:
  • Fig. 5 is a schematic structural diagram of a data processing device provided in an embodiment of the present application, the device is set in a smart wearable device, including:
  • the distance determining module 510 is configured to determine the distance between the bound mobile terminal
  • the random unlocking key generating module 520 is configured to periodically generate a random unlocking key when the distance exceeds a first set threshold, and send the random unlocking key to the server;
  • the data protection instruction sending module 530 is configured to send the data protection instruction to the server when detecting the data protection instruction triggered by the user, so that the server sends the data protection instruction to the mobile terminal, so that the mobile terminal uploads the user data to the server, and Delete user data from the mobile terminal.
  • the distance determination module 510 is also set to:
  • the distance to the mobile terminal is determined according to the first location information and the second location information.
  • the data processing device further includes: a reminder module, configured to, when the distance exceeds the first set threshold, the smart wearable device generates reminder information to remind the user.
  • a reminder module configured to, when the distance exceeds the first set threshold, the smart wearable device generates reminder information to remind the user.
  • the data processing device also includes: a display module, configured to:
  • the random unlocking key and the first location information are displayed, so that the user searches for the mobile terminal according to the first location information, and unlocks the mobile terminal according to the random unlocking key.
  • FIG. 6 is a schematic structural diagram of a computer device provided in an embodiment of the present application.
  • the device provided by this application includes: a processor 310 and a memory 320 .
  • the number of processors 310 in the device may be one or more, and one processor 310 is taken as an example in FIG. 6 .
  • the number of memory 320 in the device may be one or more, and one memory 320 is taken as an example in FIG. 6 .
  • the processor 310 and the memory 320 of the device may be connected through a bus or in other ways, and connection through a bus is taken as an example in FIG. 6 .
  • the device is a computer device.
  • the memory 320 can be configured to store software programs, computer-executable programs, and modules, such as program instructions/modules corresponding to the equipment in any embodiment of the present application (for example, encoding modules in the data transmission device and first sending module).
  • the memory 320 may include a program storage area and a data storage area, wherein the program storage area may store an operating system and an application program required by at least one function; the data storage area may store data created according to usage of the device, and the like.
  • the memory 320 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid-state storage devices.
  • the memory 320 may further include memory located remotely from the processor 310, and these remote memories may be connected to the device through a network.
  • Examples of the aforementioned networks include, but are not limited to, the Internet, intranets, local area networks, mobile communication networks, and combinations thereof.
  • the device provided above may be configured to execute the data processing method provided by any of the above embodiments, and have corresponding functions and effects.
  • the program stored in the corresponding memory 320 may be a program instruction/module corresponding to the interrupt processing method provided by the embodiment of the present application.
  • the processor 310 executes the computer device by running the software program, instruction and module stored in the memory 320.
  • One or more functional applications and data processing are to implement the associated query method applied to data in the above method embodiments. It can be understood that, when the above-mentioned device is the receiving end, it can execute the compensation method applied to the camera display area under the screen provided by any embodiment of the present application, and has corresponding functions and effects.
  • the embodiment of the present application also provides a storage medium containing computer-executable instructions.
  • the computer-executable instructions are executed by a computer processor, the computer-executable instructions are configured to execute a data processing method.
  • the method includes: When the distance exceeds the first set threshold, lock the mobile terminal; when it is detected that the number of unlocking failures of the mobile terminal exceeds the second set threshold or a data protection instruction sent by the server is received, uploading the user data in the mobile terminal to a server, and deleting the user data from the mobile terminal.
  • user equipment covers any suitable type of wireless user equipment, such as a mobile phone, a portable data processing device, a portable web browser or a vehicle-mounted mobile station.
  • the various embodiments of the present application can be implemented in hardware or special purpose circuits, software, logic or any combination thereof.
  • some aspects may be implemented in hardware, while other aspects may be implemented in firmware or software, which may be executed by a controller, microprocessor or other computing device, although the application is not limited thereto.
  • Computer program instructions may be assembly instructions, Instruction Set Architecture (ISA) instructions, machine instructions, machine-related instructions, microcode, firmware instructions, state setting data, or written in any combination of one or more programming languages source or object code.
  • ISA Instruction Set Architecture
  • Any logic flow block diagrams in the drawings of the present application may represent program steps, or may represent interconnected logic circuits, modules and functions, or may represent a combination of program steps and logic circuits, modules and functions.
  • Computer programs can be stored on memory.
  • the memory may be of any type suitable for the local technical environment and may be implemented using any suitable data storage technology, such as but not limited to Read-Only Memory (ROM), Random Access Memory (RAM), Optical Memory devices and systems (Digital Video Disc (DVD) or Compact Disk (CD)), etc.
  • Computer readable media may include non-transitory storage media.
  • Data processors can be of any type suitable for the local technical environment, such as but not limited to general purpose computers, special purpose computers, microprocessors, digital signal processors (Digital Signal Processing, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC ), programmable logic devices (Field-Programmable Gate Array, FGPA), and processors based on multi-core processor architectures.
  • DSP Digital Signal Processing
  • ASIC Application Specific Integrated Circuit
  • FGPA programmable logic devices
  • processors based on multi-core processor architectures such as but not limited to general purpose computers, special purpose computers, microprocessors, digital signal processors (Digital Signal Processing, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC ), programmable logic devices (Field-Programmable Gate Array, FGPA), and processors based on multi-core processor architectures.
  • DSP Digital Signal Processing
  • ASIC Application Specific Integrated Circuit
  • FGPA programmable logic devices
  • Computer program instructions may be assembly instructions, instruction set architecture (ISA) instructions, machine instructions, machine-dependent instructions, microcode, firmware instructions, state setting data, or source code written in any combination of one or more programming languages or destination code.
  • ISA instruction set architecture

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Telephone Function (AREA)

Abstract

本申请实施例公开了一种数据处理方法、装置、设备及存储介质。该方法由移动终端执行,包括:确定与绑定的智能穿戴设备间的距离;响应于确定距离超过第一设定阈值,锁定移动终端;响应于确定检测到对移动终端的解锁失败次数超过第二设定阈值或者接收到服务器发送的数据保护指令,将移动终端中的用户数据上传至服务器,并将用户数据从移动终端中删除。

Description

数据处理方法、装置、设备及存储介质 技术领域
本申请实施例涉及数据安全技术领域,例如涉及一种数据处理方法、装置、设备及存储介质。
背景技术
智能穿戴设备是应用穿戴式技术对日常穿戴进行智能化设计、开发出可以穿戴的设备的总称,如:手表、手环、眼镜及服饰等。智能穿戴设备通常与移动终端匹配使用。
数据安全是指保护用户的硬件、软件和数据不因偶然和恶意的原因遭到破坏、更改及泄露。通过智能穿戴设备实现对移动终端数据安全的保护显得尤为重要。目前,智能穿戴设备与移动终端设备通信的主要方式是蓝牙传输,受到蓝牙连接技术本身的局限,设备的通信距离受到限制,使得对移动终端中的数据安全的保护的可靠性不高。
发明内容
本申请实施例提供了一种数据处理方法、装置、设备及存储介质,可以实现对移动终端中数据的保护,可以提高数据的安全性。
本申请实施例公开了一种数据处理方法,所述方法由移动终端执行,包括:
确定与绑定的智能穿戴设备间的距离;
响应于确定所述距离超过第一设定阈值,锁定所述移动终端;
响应于确定检测到对所述移动终端的解锁失败次数超过第二设定阈值或者接收到服务器发送的数据保护指令,将所述移动终端中的用户数据上传至服务器,并将所述用户数据从所述移动终端中删除。
本申请实施例公开了一种数据处理方法,所述方法由智能穿戴设备执行,包括:
确定与绑定的移动终端间的距离;
响应于确定所述距离超过第一设定阈值,周期性的生成随机解锁秘钥,并将所述随机解锁秘钥发送至服务器;
响应于确定检测到用户触发的数据保护指令,将所述数据保护指令发送至所述服务器,使得所述服务器将所述数据保护指令发送至所述移动终端,以便所述移动终端将用户数据上传至服务器,并将所述用户数据从所述移动终端中删除。
本申请实施例公开了一种数据处理装置,所述装置设置于移动终端中,包括:
距离确定模块,设置为确定与绑定的智能穿戴设备间的距离;
移动终端锁定模块,设置为响应于确定所述距离超过第一设定阈值,锁定所述移动终端;
数据处理模块,设置为响应于确定检测到对所述移动终端的解锁失败次数超过第二设定阈值或者接收到服务器发送的数据保护指令,将所述移动终端中的用户数据上传至服务器, 并将所述用户数据从所述移动终端中删除。
本申请实施例公开了一种数据处理装置,所述装置设置于智能穿戴设备中,包括:
距离确定模块,设置为确定与绑定的移动终端间的距离;
随机解锁秘钥生成模块,设置为响应于确定所述距离超过第一设定阈值,周期性的生成随机解锁秘钥,并将所述随机解锁秘钥发送至服务器;
数据保护指令发送模块,设置为响应于确定检测到用户触发的数据保护指令,将所述数据保护指令发送至所述服务器,使得所述服务器将所述数据保护指令发送至所述移动终端,以便所述移动终端将用户数据上传至服务器,并将所述用户数据从所述移动终端中删除。
本申请实施例公开了一种计算机设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述程序时实现如本申请实施例所述的数据处理方法。
本申请实施例公开了一种计算机可读存储介质,其上存储有计算机程序,该程序被处理器执行时实现如本申请实施例所述的数据处理方法。
附图说明
图1是本申请实施例提供的一种数据处理方法的流程图;
图2是本申请实施例提供的数据处理系统的示意图;
图3是本申请实施例提供的一种数据处理方法的流程图;
图4是本申请实施例提供的一种数据处理装置的结构示意图;
图5是本申请实施例提供的一种数据处理装置的结构示意图;
图6是本申请实施例提供的一种计算机设备的结构示意图。
具体实施方式
应当理解,此处所描述的具体实施例仅仅用以解释本申请,并不用于限定本申请。
在后续的描述中,使用用于表示元件的诸如“模块”、“部件”或“单元”的后缀仅为了有利于本申请的说明,其本身没有特有的意义。因此,“模块”、“部件”或“单元”可以混合地使用。
在一个实施例中,图1为本申请实施例提供的一种数据处理方法的流程图。该方法可以适用对移动终端中的数据进行安全保护的情况。该方法可以由移动终端来执行。如图1所示,该方法包括S110-S130。
S110,确定与绑定的智能穿戴设备间的距离。
其中,智能穿戴设备可以包括智能手表、智能手环、智能眼镜及智能服饰等。从应用领域来分,智能穿戴设备可以分为两大类:运动健身户外领域和医疗保健领域。其中,运动健身户外领域可以包括智能手表、智能手环及智能配饰等,医疗保健领域可以包括医疗背心、腰带及植入式芯片等。本实施例中,能穿戴设备与移动终端设备通过服务器进行数据交互,通过在服务器中共享账户的方式登录,以智能穿戴设备为主体,移动终端的定位模块上报实 时位置,多移动终端之间使用国际移动设备识别码(International Mobile Equipment Identity,IMEI)进行唯一性识别。示例性的,图2是本实施例中的数据处理系统的示意图。如图2所示,该系统包括移动终端、智能穿戴设备及服务器,服务器中设置有云端数据库,用于存储数据,移动终端与智能穿戴设备间通过服务器实现数据交互。智能穿戴设备和移动终端通过服务器绑定,可以共享同一账户或者不同的账户。若智能穿戴设备和移动终端设备共享不同的账户,由于二者存在绑定关系,则智能穿戴设备可以访问移动终端的账户,移动终端也可以访问智能穿戴设备的账户。可以在各自设备的登录模块登录相应的账户。在智能穿戴设备的操作界面生成移动终端列表,便于后续操作。用户还可以在智能穿戴设备的操作界面设置每一个移动终端设置安全距离以及监测属性。其中,监测属性可以包括是否对移动终端进行安全监测以及安全监测的方式等。安全监测的方式可以包括定时启动安全监测或者定地点启动安全监测。当安全监测开启时,用户设置的安全距离即为第一设定阈值。
本申请实施例中,移动终端的定位模块对移动终端进行定位,获得移动终端当前所处的位置信息,移动终端将并该位置信息发送至服务器,服务器将该位置信息发送至智能穿戴设备。智能穿戴设备中的定位模块对智能穿戴设备进行定位,获得智能穿戴设备当前所处的位置信息,智能穿戴设备并将该位置信息发送至服务器,服务器将该位置信息发送至移动终端。从而实现了移动终端和智能穿戴设备间的位置共享。其中,定位模块可以是全球定位系统(Global Positioning System,GPS)或者北斗星定位系统。
例如,确定与绑定的智能穿戴设备间的距离的方式可以是:获取移动终端当前所处的第一位置信息;并将第一位置信息发送至服务器;从服务器获取绑定的智能穿戴设备当前所处的第二位置信息;根据第一位置信息和第二位置信息确定与智能穿戴设备间的距离。
其中,第一位置信息和第二位置信息可以由经纬度表征,通过经纬度信息可以计算出移动终端与智能穿戴设备间的直线距离。
S120,当距离超过第一设定阈值时,锁定移动终端。
其中,第一设定阈值可以由用户设置。锁定移动终端可以理解为对移动终端执行灭屏操作,再次唤醒时需要秘钥解锁。
例如,当距离超过第一设定阈值时,还包括如下步骤:控制定位模块保持在开启状态并禁用定位模块的操作开关。
本实施例中,控制定位模块保持在开启状态可以理解为强制定位模块处于开启状态。禁用定位模块的操作开关可以理解为用户无法操作定位模块的开关,这样做的好处是,以防移动终端丢失后,被不法分子将定位模块关掉,而无法将位置信息发送至智能穿戴设备。
S130,当检测到对移动终端的解锁失败次数超过第二设定阈值或者接收到服务器发送的数据保护指令时,将移动终端中的用户数据上传至服务器,并将用户数据从移动终端中删除。
当移动终端锁定后,需要解锁秘钥解锁移动终端。若用户使用正确的解锁秘钥解锁,就可以解锁成功,若用户使用错误的解锁秘钥解锁,就会解锁失败。
其中,数据保护指令是由用户通过智能穿戴设备触发的,并发送至服务器,再由服务器 发送至移动终端。
本实施例中,对移动终端解锁的过程可以是:接收用户输入的第一解锁秘钥;从服务器获取第二解锁秘钥;判断第一解锁秘钥与第二解锁秘钥是否匹配,基于第一解锁秘钥与第二解锁秘钥匹配匹配的判断结果,解锁成功;基于第一解锁秘钥与第二解锁秘钥不匹配的判断结果,解锁失败。
其中,第一解锁秘钥可以用户直接输入至移动终端的。第二解锁秘钥可以是由智能穿戴设备随机生成并发送至服务器的。
本申请实施例中,当智能穿戴设备与移动终端之间的距离超过第一设定阈值时,智能穿戴设备周期性的随机生成第二解锁秘钥,并将第二解锁秘钥发送至服务器进行存储,以便移动终端在解锁时从服务器中获取。
具体的,当检测到对移动终端的解锁失败次数超过第二设定阈值或者接收到服务器发送的数据保护指令时,将移动终端中的用户数据上传至服务器,并将用户数据从移动终端中删除。
其中,用户数据可以是用户在使用移动终端时产生的数据。本实施例中,可以设置将所有的用户数据上传至服务器,并从移动终端中删除,或者,设置将设定字段的用户数据上传至服务器,并从移动终端中删除。可以根据用户的实际需求进行设置,此处不做限定。本申请实施例中,将移动中的用户数据备份至服务器中的数据库,同时清除本机数据,可以保护用户数据。
本申请实施例中,每一台移动终端都设置了固定的解锁次数,同时在智能穿戴设备操作界面也有数据保护的操作功能,这些都使用数据库中的固定字段表示,当解锁次数的字段值归0或者用户通过智能穿戴设备的操作模块改变了数据保护功能的字段值,移动终端本机数据备份用IMEI号标识存储至数据库,随后将本机数据删除,以保护用户数据安全。
其中,数据保护指令触发的方式可以是用户通过在智能穿戴设备操作界面将解锁次数的字段值修改为0。
本申请实施例的技术方案,确定与绑定的智能穿戴设备间的距离;当距离超过第一设定阈值时,锁定移动终端;当检测到对移动终端的解锁失败次数超过第二设定阈值或者接收到服务器发送的数据保护指令时,将移动终端中的用户数据上传至服务器,并将用户数据从移动终端中删除。本申请实施例提供的数据处理方法,可以实现对移动终端中数据的保护,可以提高数据的安全性。
图3为本申请实施例提供的一种数据处理方法的流程图。该方法可以适用对移动终端中的数据进行安全保护的情况。该方法可以由智能穿戴设备来执行。如图1所示,该方法包括S210-S230。
S210,确定与绑定的移动终端间的距离。
其中,移动终端可以是智能手机或者平板等。
本申请实施例中,智能穿戴设备和移动终端设备具有绑定关系,可以共享同一账户或者 不同的账户。若智能穿戴设备和移动终端设备共享不同的账户,由于二者存在绑定关系,则智能穿戴设备可以访问移动终端的账户,移动终端也可以访问智能穿戴设备的账户。二者可以在各自设备的登录模块登录相应的账户。在智能穿戴设备的操作界面生成移动终端列表,便于后续操作。用户还可以在智能穿戴设备的操作界面设置每一个移动终端设置安全距离以及监测属性。其中,监测属性可以包括是否对移动终端进行安全监测以及安全监测的方式等。安全监测的方式可以包括定时启动安全监测或者定地点启动安全监测。当安全监测开启时,用户设置的安全距离即为第一设定阈值。
本申请实施例中,移动终端的定位模块对移动终端进行定位,获得移动终端当前所处的位置信息,移动终端将并该位置信息发送至服务器,服务器将该位置信息发送至智能穿戴设备。智能穿戴设备中的定位模块对智能穿戴设备进行定位,获得智能穿戴设备当前所处的位置信息,智能穿戴设备并将该位置信息发送至服务器,服务器将该位置信息发送至移动终端。从而实现了移动终端和智能穿戴设备间的位置共享。
例如,确定与绑定的移动终端间的距离的方式可以是:从服务器获取绑定的移动终端当前所处的第一位置信息;获取智能穿戴设备当前所处的第二位置信息;并将第二位置信息发送至服务器;根据第一位置信息和第二位置信息确定与移动终端间的距离。
其中,第一位置信息和第二位置信息可以由经纬度表征,通过经纬度信息可以计算出移动终端与智能穿戴设备间的直线距离。
S220,当距离超过第一设定阈值时,周期性的生成随机解锁秘钥,并将随机解锁秘钥发送至服务器。
其中,随机解锁秘钥的生成方式可以是按照任意的随机生成算法生成,此处不做限定。
例如,当距离超过第一设定阈值时,智能穿戴设备生成提醒信息,以提醒用户。
其中,提醒信息可以是声音提醒或者振动提醒。
例如,本申请实施例还包括如下步骤:将随机解锁秘钥和第一位置信息进行显示,使得用户根据第一位置信息寻找移动终端,根据随机解锁秘钥对移动终端进行解锁。
其中,第一位置信息可以是由智能穿戴设备从服务器获得的。
S230,当检测到用户触发的数据保护指令时,将数据保护指令发送至服务器,使得服务器将数据保护指令发送至移动终端,以便移动终端将用户数据上传至服务器,并将用户数据从移动终端中删除。
其中,用户数据保护指令触发的方式可以是用户通过在智能穿戴设备操作界面将解锁次数的字段值修改为0。
本申请实施例中,每一台移动终端都设置了固定的解锁次数,同时在智能穿戴设备操作界面也有数据保护的操作功能,这些都使用数据库中的固定字段表示,当用户通过智能穿戴设备的操作模块改变了数据保护功能的字段值,移动终端本机数据备份用IMEI号标识存储至数据库,随后将本机数据删除,以保护用户数据安全。
本申请实施例的计算方案,确定与绑定的移动终端间的距离;当距离超过第一设定阈值 时,周期性的生成随机解锁秘钥,并将随机解锁秘钥发送至服务器;当检测到用户触发的数据保护指令时,将数据保护指令发送至服务器,使得服务器将数据保护指令发送至移动终端,以便移动终端将用户数据上传至服务器,并将用户数据从移动终端中删除。可以实现对移动终端中数据的保护,可以提高数据的安全性。
图4是本申请实施例提供的一种数据处理装置的结构示意图,该装置设置于移动终端中,包括:
距离确定模块410,设置为确定与绑定的智能穿戴设备间的距离;
移动终端锁定模块420,设置为当距离超过第一设定阈值时,锁定移动终端;
数据处理模块430,设置为当检测到对移动终端的解锁失败次数超过第二设定阈值或者接收到服务器发送的数据保护指令时,将移动终端中的用户数据上传至服务器,并将用户数据从移动终端中删除。
例如,距离确定模块410,还设置为:
获取移动终端当前所处的第一位置信息;并将第一位置信息发送至服务器;
从服务器获取绑定的智能穿戴设备当前所处的第二位置信息;
根据第一位置信息和第二位置信息确定与智能穿戴设备间的距离。
例如,数据处理装置还包括:定位模块的操作开关禁用模块,设置为:
控制定位模块保持在开启状态并禁用定位模块的操作开关。
例如,数据处理装置还包括:解锁模块,设置为:
接收用户输入的第一解锁秘钥;
从服务器获取第二解锁秘钥;
判断第一解锁秘钥与第二解锁秘钥是否匹配,基于第一解锁秘钥与第二解锁秘钥匹配的判断结果,解锁成功;基于第一解锁秘钥与第二解锁秘钥不匹配的判断结果,解锁失败。
图5是本申请实施例提供的一种数据处理装置的结构示意图,该装置设置于智能穿戴设备中,包括:
距离确定模块510,设置为确定与绑定的移动终端间的距离;
随机解锁秘钥生成模块520,设置为当距离超过第一设定阈值时,周期性的生成随机解锁秘钥,并将随机解锁秘钥发送至服务器;
数据保护指令发送模块530,设置为当检测到用户触发的数据保护指令时,将数据保护指令发送至服务器,使得服务器将数据保护指令发送至移动终端,以便移动终端将用户数据上传至服务器,并将用户数据从移动终端中删除。
例如,距离确定模块510,还设置为:
从服务器获取绑定的移动终端当前所处的第一位置信息;
获取智能穿戴设备当前所处的第二位置信息;并将第二位置信息发送至服务器;
根据第一位置信息和第二位置信息确定与移动终端间的距离。
例如,数据处理装置还包括:提醒模块,设置为当距离超过第一设定阈值时,智能穿戴 设备生成提醒信息,以提醒用户。
例如,数据处理装置还包括:显示模块,设置为:
将随机解锁秘钥和第一位置信息进行显示,使得用户根据第一位置信息寻找移动终端,根据随机解锁秘钥对移动终端进行解锁。
在一个实施例中,图6是本申请实施例提供的一种计算机设备的结构示意图。如图6所示,本申请提供的设备,包括:处理器310以及存储器320。该设备中处理器310的数量可以是一个或者多个,图6中以一个处理器310为例。该设备中存储器320的数量可以是一个或者多个,图6中以一个存储器320为例。该设备的处理器310以及存储器320可以通过总线或者其他方式连接,图6中以通过总线连接为例。实施例中,该设备为计算机设备。
存储器320作为一种计算机可读存储介质,可设置为存储软件程序、计算机可执行程序以及模块,如本申请任意实施例的设备对应的程序指令/模块(例如,数据传输装置中的编码模块和第一发送模块)。存储器320可包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序;存储数据区可存储根据设备的使用所创建的数据等。此外,存储器320可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他非易失性固态存储器件。在一些实例中,存储器320可进一步包括相对于处理器310远程设置的存储器,这些远程存储器可以通过网络连接至设备。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。
上述提供的设备可设置为执行上述任意实施例提供的应用于数据处理方法,具备相应的功能和效果。
对应存储器320中存储的程序可以是本申请实施例所提供应用于中断处理方法对应的程序指令/模块,处理器310通过运行存储在存储器320中的软件程序、指令以及模块,从而执行计算机设备的一种或多种功能应用以及数据处理,即实现上述方法实施例中应用于数据的关联查询方法。可以理解的是,上述设备为接收端时,可执行本申请任意实施例所提供的应用于屏下摄像显示区域的补偿方法,且具备相应的功能和效果。
本申请实施例还提供一种包含计算机可执行指令的存储介质,计算机可执行指令在由计算机处理器执行时设置为执行一种数据处理方法,该方法包括:确定与绑定的智能穿戴设备间的距离;当所述距离超过第一设定阈值时,锁定所述移动终端;当检测到对所述移动终端的解锁失败次数超过第二设定阈值或者接收到服务器发送的数据保护指令时,将所述移动终端中的用户数据上传至服务器,并将所述用户数据从所述移动终端中删除。或者,确定与绑定的移动终端间的距离;当所述距离超过第一设定阈值时,周期性的生成随机解锁秘钥,并将所述随机解锁秘钥发送至服务器;当检测到用户触发的数据保护指令时,将所述数据保护指令发送至所述服务器,使得所述服务器将所述数据保护指令发送至所述移动终端,以便所述移动终端将用户数据上传至服务器,并将所述用户数据从所述移动终端中删除。
本领域内的技术人员应明白,术语用户设备涵盖任何适合类型的无线用户设备,例如移 动电话、便携数据处理装置、便携网络浏览器或车载移动台。
一般来说,本申请的多种实施例可以在硬件或专用电路、软件、逻辑或其任何组合中实现。例如,一些方面可以被实现在硬件中,而其它方面可以被实现在可以被控制器、微处理器或其它计算装置执行的固件或软件中,尽管本申请不限于此。
本申请的实施例可以通过移动装置的数据处理器执行计算机程序指令来实现,例如在处理器实体中,或者通过硬件,或者通过软件和硬件的组合。计算机程序指令可以是汇编指令、指令集架构(Instruction Set Architecture,ISA)指令、机器指令、机器相关指令、微代码、固件指令、状态设置数据、或者以一种或多种编程语言的任意组合编写的源代码或目标代码。
本申请附图中的任何逻辑流程的框图可以表示程序步骤,或者可以表示相互连接的逻辑电路、模块和功能,或者可以表示程序步骤与逻辑电路、模块和功能的组合。计算机程序可以存储在存储器上。存储器可以具有任何适合于本地技术环境的类型并且可以使用任何适合的数据存储技术实现,例如但不限于只读存储器(Read-Only Memory,ROM)、随机访问存储器(Random Access Memory,RAM)、光存储器装置和系统(数码多功能光碟(Digital Video Disc,DVD)或光盘(Compact Disk,CD))等。计算机可读介质可以包括非瞬时性存储介质。数据处理器可以是任何适合于本地技术环境的类型,例如但不限于通用计算机、专用计算机、微处理器、数字信号处理器(Digital Signal Processing,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、可编程逻辑器件(Field-Programmable Gate Array,FGPA)以及基于多核处理器架构的处理器。
以上所述,仅为本申请的示例性实施例而已,并非用于限定本申请的保护范围。
本申请的实施例可以通过移动装置的数据处理器执行计算机程序指令来实现,例如在处理器实体中,或者通过硬件,或者通过软件和硬件的组合。计算机程序指令可以是汇编指令、指令集架构(ISA)指令、机器指令、机器相关指令、微代码、固件指令、状态设置数据、或者以一种或多种编程语言的任意组合编写的源代码或目的代码。

Claims (12)

  1. 一种数据处理方法,所述方法由移动终端执行,包括:
    确定与绑定的智能穿戴设备间的距离;
    响应于确定所述距离超过第一设定阈值,锁定所述移动终端;
    响应于确定检测到对所述移动终端的解锁失败次数超过第二设定阈值或者接收到服务器发送的数据保护指令,将所述移动终端中的用户数据上传至服务器,并将所述用户数据从所述移动终端中删除。
  2. 根据权利要求1所述的方法,其中,所述确定与绑定的智能穿戴设备间的距离,包括:
    获取所述移动终端当前所处的第一位置信息;并将所述第一位置信息发送至所述服务器;
    从所述服务器获取绑定的智能穿戴设备当前所处的第二位置信息;
    根据所述第一位置信息和所述第二位置信息确定与所述智能穿戴设备间的距离。
  3. 根据权利要求2所述的方法,还包括:
    响应于确定所述距离超过第一设定阈值,控制定位模块保持在开启状态并禁用所述定位模块的操作开关。
  4. 根据权利要求1所述的方法,还包括:对所述移动终端进行解锁,
    所述对所述移动终端进行解锁,包括:
    接收用户输入的第一解锁秘钥;
    从所述服务器获取第二解锁秘钥;
    判断所述第一解锁秘钥与所述第二解锁秘钥是否匹配,基于所述第一解锁秘钥与所述第二解锁秘钥匹配的判断结果,解锁成功;基于所述第一解锁秘钥与所述第二解锁秘钥不匹配的判断结果,解锁失败。
  5. 一种数据处理方法,所述方法由智能穿戴设备执行,包括:
    确定与绑定的移动终端间的距离;
    响应于确定所述距离超过第一设定阈值,周期性的生成随机解锁秘钥,并将所述随机解锁秘钥发送至服务器;
    响应于确定检测到用户触发的数据保护指令,将所述数据保护指令发送至所述服务器,使得所述服务器将所述数据保护指令发送至所述移动终端,以使所述移动终端将用户数据上传至服务器,并将所述用户数据从所述移动终端中删除。
  6. 根据权利要求5所述的方法,其中,所述确定与绑定的移动终端间的距离,包括:
    从所述服务器获取绑定的移动终端当前所处的第一位置信息;
    获取所述智能穿戴设备当前所处的第二位置信息;并将所述第二位置信息发送至所述服务器;
    根据所述第一位置信息和所述第二位置信息确定与所述移动终端间的距离。
  7. 根据权利要求5所述的方法,还包括:
    响应于确定所述距离超过第一设定阈值,生成提醒信息,以提醒用户。
  8. 根据权利要求6所述的方法,还包括:
    将所述随机解锁秘钥和所述第一位置信息进行显示,使得用户根据所述第一位置信息寻找所述移动终端,根据所述随机解锁秘钥对所述移动终端进行解锁。
  9. 一种数据处理装置,所述装置设置于移动终端中,包括:
    距离确定模块,设置为确定与绑定的智能穿戴设备间的距离;
    移动终端锁定模块,设置为响应于确定所述距离超过第一设定阈值,锁定所述移动终端;
    数据处理模块,设置为响应于确定检测到对所述移动终端的解锁失败次数超过第二设定阈值或者接收到服务器发送的数据保护指令,将所述移动终端中的用户数据上传至服务器,并将所述用户数据从所述移动终端中删除。
  10. 一种数据处理装置,所述装置设置于智能穿戴设备中,包括:
    距离确定模块,设置为确定与绑定的移动终端间的距离;
    随机解锁秘钥生成模块,设置为响应于确定所述距离超过第一设定阈值,周期性的生成随机解锁秘钥,并将所述随机解锁秘钥发送至服务器;
    数据保护指令发送模块,设置为响应于确定检测到用户触发的数据保护指令,将所述数据保护指令发送至所述服务器,使得所述服务器将所述数据保护指令发送至所述移动终端,以便所述移动终端将用户数据上传至服务器,并将所述用户数据从所述移动终端中删除。
  11. 一种计算机设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述程序时实现如权利要求1-8中任一所述的数据处理方法。
  12. 一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器执行时实现如权利要求1-8中任一所述的数据处理方法。
PCT/CN2022/111028 2021-08-24 2022-08-09 数据处理方法、装置、设备及存储介质 WO2023024888A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110975368.X 2021-08-24
CN202110975368.XA CN115718924A (zh) 2021-08-24 2021-08-24 数据处理方法、装置、设备及存储介质

Publications (1)

Publication Number Publication Date
WO2023024888A1 true WO2023024888A1 (zh) 2023-03-02

Family

ID=85253472

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/111028 WO2023024888A1 (zh) 2021-08-24 2022-08-09 数据处理方法、装置、设备及存储介质

Country Status (2)

Country Link
CN (1) CN115718924A (zh)
WO (1) WO2023024888A1 (zh)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103118087A (zh) * 2013-01-22 2013-05-22 Tcl集团股份有限公司 一种移动通信终端及其数据保护方法、系统
JP2015194988A (ja) * 2014-03-26 2015-11-05 株式会社Nttドコモ ウェアラブル端末及びウェアラブル端末の制御方法
CN105530356A (zh) * 2015-12-21 2016-04-27 珠海格力电器股份有限公司 移动通讯终端及其数据保护方法和装置
CN108811181A (zh) * 2018-04-27 2018-11-13 努比亚技术有限公司 智能穿戴设备、防盗控制方法及计算机可读存储介质

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103118087A (zh) * 2013-01-22 2013-05-22 Tcl集团股份有限公司 一种移动通信终端及其数据保护方法、系统
JP2015194988A (ja) * 2014-03-26 2015-11-05 株式会社Nttドコモ ウェアラブル端末及びウェアラブル端末の制御方法
CN105530356A (zh) * 2015-12-21 2016-04-27 珠海格力电器股份有限公司 移动通讯终端及其数据保护方法和装置
CN108811181A (zh) * 2018-04-27 2018-11-13 努比亚技术有限公司 智能穿戴设备、防盗控制方法及计算机可读存储介质

Also Published As

Publication number Publication date
CN115718924A (zh) 2023-02-28

Similar Documents

Publication Publication Date Title
US10447839B2 (en) Device locator disable authentication
US10341390B2 (en) Aggregation of asynchronous trust outcomes in a mobile device
US20180357846A1 (en) Intelligent vehicular electronic key system
US10129381B2 (en) Disablement of lost or stolen device
US11212283B2 (en) Method for authentication and authorization and authentication server using the same for providing user management mechanism required by multiple applications
US20180157817A1 (en) Unlocking method and apparatus, and storage medium
US10638320B2 (en) Wireless network type detection method and apparatus, and electronic device
BR112014017739B1 (pt) Método, aparelho e dispositivo de processo de destravamento para um terminal
US10548538B2 (en) Electronic device and alarm control method
CN103778381A (zh) 一种基于安卓系统的应用锁屏方法及装置
US20190163931A1 (en) Devices, systems, and methods for securely storing and managing sensitive information
CN111866885A (zh) 验证信息共享方法、装置及电子设备
WO2016115760A1 (zh) 一种终端系统的控制方法、装置和终端
CN110855833A (zh) 终端找回方法、装置、终端及存储介质
US20150373051A1 (en) Dynamic authentication using distributed mobile sensors
US11106779B2 (en) Method and system for improved data control and access
CN109241783B (zh) 移动终端管控策略的实施方法及装置
CN114697007B (zh) 一种密钥管理的方法、相应装置及系统
CN111782722B (zh) 一种数据管理方法、装置、电子设备及存储介质
WO2023024888A1 (zh) 数据处理方法、装置、设备及存储介质
KR20190033930A (ko) 보안 정보를 암호화하는 전자 장치 및 그 작동 방법
CN114980025B (zh) 安全芯片的信息查看方法及安全芯片装置
KR20160038478A (ko) 블루투스 장치의 분실 및 도난 방지 시스템
CN107256151A (zh) 页面渲染的处理方法、装置及终端
US20150082445A1 (en) Information processing method and electronic device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22860234

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE