[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN104143059A - Method and system for improving safety of mobile terminal - Google Patents

Method and system for improving safety of mobile terminal Download PDF

Info

Publication number
CN104143059A
CN104143059A CN201410374079.4A CN201410374079A CN104143059A CN 104143059 A CN104143059 A CN 104143059A CN 201410374079 A CN201410374079 A CN 201410374079A CN 104143059 A CN104143059 A CN 104143059A
Authority
CN
China
Prior art keywords
mobile terminal
processing
authorization information
unit
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410374079.4A
Other languages
Chinese (zh)
Inventor
罗亚峰
赵闽
刘强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Conew Network Technology Beijing Co Ltd
Original Assignee
Conew Network Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Conew Network Technology Beijing Co Ltd filed Critical Conew Network Technology Beijing Co Ltd
Priority to CN201410374079.4A priority Critical patent/CN104143059A/en
Publication of CN104143059A publication Critical patent/CN104143059A/en
Priority to PCT/CN2015/083457 priority patent/WO2016015551A1/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/81Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer by operating on the power supply, e.g. enabling or disabling power-on, sleep or resume operations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the invention provides a method and system for improving safety of a mobile terminal. According to the method, a verification information inputting interface can be displayed after a close-down instruction is received so that a user can carry out verification, if verification is passed, the mobile terminal is closed down, otherwise, the mobile terminal is closed down in a camouflage mode, and other safety processing is performed. According to the method and system for improving the safety of the mobile terminal, the mobile terminal is closed down in the camouflage mode if verification is not passed, so that a thief mistakenly assumes that the mobile terminal is already closed down. Under the condition, the mobile terminal can perform various kinds of safety processing without being perceived by the thief, and the safety of the mobile terminal can be effectively improved.

Description

Improve the method and system of security of mobile terminal
Technical field
The present invention relates to guarding against theft for mobile terminal technical field, particularly relate to the method and system that improve security of mobile terminal.
Background technology
Along with scientific and technological development, the mobile terminals such as mobile phone, panel computer have progressively entered into people's life.Owing to being worth higher and stealing easily, therefore the stolen situation of these mobile terminals also gets more and more.
In order to improve the security of mobile terminal, various fail-safe software manufacturer has released a large amount of antitheft software, can carry out multiple safety measures.Accordingly, the prevention awareness of stealer is also more and more higher, is poaching after mobile terminal, can shut down immediately, thereby make antitheft software ineffective.
Therefore the security that, how to improve mobile terminal is still a technical barrier urgently to be resolved hurrily.
Summary of the invention
The object of the embodiment of the present invention is to provide a kind of method and system that improve security of mobile terminal, to improve the security of mobile terminal.
For achieving the above object, the embodiment of the invention discloses a kind of method that improves security of mobile terminal, be applied to mobile terminal, described method comprises:
Receive shutdown command;
Show authorization information inputting interface, receive the authorization information of the current input of user, whether the authorization information that judges the current input of user is identical with default correct verification information, if, shut down, otherwise, to carry out disguised power-off and process and carry out the first processing, described disguised power-off is processed different from described the first processing.
Optionally, described disguised power-off is treated to: play shutdown video, after the described shutdown video of broadcasting, end response except other operations outside machine operation.
Optionally, described execution first is processed, and comprising:
In the time receiving the instruction that execution first that other equipment send processes, carry out described first and process.
Optionally, described execution first is processed, and comprising:
In the time that the current residing position of described mobile terminal is positioned at outside predeterminable area, carries out first and process.
Optionally, described first process and comprise one or more in following multiple processing:
Obtain the first information, the described first information is sent to other equipment, and the described first information comprises: any one in the fingerprint that the video that the image that the residing geographic position of described mobile terminal, described mobile terminal are taken, described mobile terminal are taken, the audio frequency that described mobile terminal is recorded, described mobile terminal gather or multiple;
The all or part of function of each application program in the default set of applications of locking, so that active user cannot use locked function;
Factory reset;
Remove sensitive data;
Sensitive information is sent to other equipment;
Play default audio frequency;
Send the stolen notice of mobile terminal to other equipment.
Optionally, carrying out after disguised power-off processing, described method also comprises:
Receive the start operation that active user makes;
Carrying out camouflage start according to described start operation processes.
Optionally, described camouflage start is treated to: play start video.
Optionally, carry out after camouflage start processing according to described start operation described, described method also comprises:
Show authorization information inputting interface, receive the authorization information of the current input of user;
Whether the authorization information that judges the current input of user is identical with default correct verification information, if so, stops the described first execution of processing, and controls described mobile terminal in normal operating condition, otherwise, maintain the described first execution of processing.
Optionally, described miscellaneous equipment is identified described mobile terminal by the international identification code IMEI of mobile device of described mobile terminal, to communicate with described mobile terminal.
Optionally, in the time that described mobile terminal shows authorization information inputting interface, described mobile terminal is in the lock state, receive at described mobile terminal after the authorization information of user's input, the lock-out state of described mobile terminal is cancelled, under described lock-out state, described mobile terminal only responds user's authorization information input operation.
A system that improves security of mobile terminal, is applied to mobile terminal, and described system comprises: command reception unit, shutdown authentication unit, normal shutdown unit, disguised power-off unit and the first processing unit,
Described command reception unit, for receiving shutdown command, triggers described authorization information receiving element;
Described shutdown authentication unit, be used for showing authorization information inputting interface, receive the authorization information of the current input of user, whether the authorization information that judges the current input of user is identical with default correct verification information, if, trigger described normal shutdown unit, otherwise, described disguised power-off unit and described the first processing unit triggered;
Described normal shutdown unit, processes for carrying out shutdown;
Described disguised power-off unit, for carrying out disguised power-off processing;
Described the first processing unit, for carrying out the first processing, described disguised power-off is processed different from described the first processing.
Optionally, response specifically for playing shutdown video, is ended except other operations outside machine operation in described disguised power-off unit after the described shutdown video of broadcasting.
Optionally, described the first processing unit, specifically in the time receiving the instruction that execution first that other equipment send processes, carries out described first and processes.
Optionally, described the first processing unit, when being positioned at outside predeterminable area in the current residing position of described mobile terminal, carrying out first and processes.
Optionally, described the first processing unit, comprises one or more in following multiple module, and described first processes and comprise one or more in the performed processing of the included each module of described the first processing unit:
First information sending module, be used for obtaining the first information, the described first information is sent to other equipment, and the described first information comprises: any one in the fingerprint that the video that the image that the residing geographic position of described mobile terminal, described mobile terminal are taken, described mobile terminal are taken, the audio frequency that described mobile terminal is recorded, described mobile terminal gather or multiple;
Locking module, for locking all or part of function of the default each application program of set of applications, so that active user cannot use locked function;
Recover module, for factory reset;
Data dump module, for removing sensitive data;
Sensitive information sending module, for sending to sensitive information other equipment;
Audio playing module, for playing default audio frequency;
Notice sending module, for sending the stolen notice of mobile terminal to other equipment.
Optionally, also comprise:
Start operation receiving element, for carrying out after disguised power-off processing in described disguised power-off unit, receives the start operation that active user makes;
Camouflage start-up unit, processes for carrying out camouflage start according to described start operation.
Optionally, described camouflage start-up unit, specifically for playing start video according to described start operation.
Optionally, also comprise: start authentication unit, after processing according to described start operation execution camouflage start in described camouflage start-up unit, shows authorization information inputting interface, the authorization information of the current input of reception user; Whether the authorization information that judges the current input of user is identical with default correct verification information, if, control described the first processing unit and stop the described first execution of processing, control described mobile terminal in normal operating condition, otherwise, control described the first processing unit and maintain the described first execution of processing.
Optionally, described miscellaneous equipment is identified described mobile terminal by the international identification code IMEI of mobile device of described mobile terminal, to communicate with described mobile terminal.
Optionally, in the time that described mobile terminal shows authorization information inputting interface, described mobile terminal is in the lock state, receive at described mobile terminal after the authorization information of user's input, the lock-out state of described mobile terminal is cancelled, under described lock-out state, described mobile terminal only responds user's authorization information input operation.
The method and system of the raising mobile device security that the embodiment of the present invention provides, can receive after shutdown command, show that authorization information inputting interface allows user verify, if the verification passes, shut down, otherwise, carry out disguised power-off and carry out other safe handlings.The present invention can checking not by time carry out disguised power-off, shut down thereby make stealer take for mobile terminal.In this case, mobile terminal just can carry out various safe handlings in the situation that stealer is not discovered.The present invention can effectively improve the security of mobile terminal.
Brief description of the drawings
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, to the accompanying drawing of required use in embodiment or description of the Prior Art be briefly described below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, do not paying under the prerequisite of creative work, can also obtain according to these accompanying drawings other accompanying drawing.
The process flow diagram of a kind of method that improves security of mobile terminal that Fig. 1 provides for the embodiment of the present invention;
The another kind that Fig. 2 provides for the embodiment of the present invention improves the process flow diagram of the method for security of mobile terminal;
The structural representation of a kind of system that improves security of mobile terminal that Fig. 3 provides for the embodiment of the present invention;
The another kind that Fig. 4 provides for the embodiment of the present invention improves the structural representation of the system of security of mobile terminal.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiment.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtaining under creative work prerequisite, belong to the scope of protection of the invention.
As shown in Figure 1, the embodiment of the present invention provides a kind of method that improves security of mobile terminal, is applied to mobile terminal, and the method can comprise:
S100, reception shutdown command;
S200, demonstration authorization information inputting interface;
Wherein, authorization information can be password, sound, fingerprint, head portrait etc., and wherein, password can be text password, pattern password etc.In the time that authorization information is sound, fingerprint or head portrait, authorization information inputting interface can be the prompting interface of prompting user input validation information, certainly, in authorization information inputting interface, can also show the authorization information that user inputs, as fingerprint, the head portrait of user's input simultaneously.Wherein, user can pass through microphone sound import, by camera input head picture, inputs fingerprint by Fingerprint Identification Unit.
In the time that mobile terminal shows authorization information inputting interface, described mobile terminal can be in the lock state, receive at described mobile terminal after the authorization information of user's input, the lock-out state of described mobile terminal is just cancelled, under described lock-out state, described mobile terminal only responds user's authorization information input operation.
Like this, user can only carry out after authorization information input, just having the possibility of carrying out subsequent operation.
The authorization information of S300, the current input of reception user, judges that whether the authorization information of the current input of user is identical with default correct verification information, if so, carries out S400, otherwise carries out S500;
S400, shut down;
The first processing is processed and carried out to S500, execution disguised power-off, and described disguised power-off is processed different with described the first processing.
Be understandable that, after mobile terminal is stolen, disguised power-off processing can make stealer think that mobile terminal shuts down.After disguised power-off is processed, mobile terminal is still in running order, and like this, mobile terminal just can send the safe handlings such as stolen notice, and is not realized by stealer.
Wherein, described disguised power-off processing can be: play shutdown video, after the described shutdown video of broadcasting, end response except other operations outside machine operation.
Optionally, described first process and can comprise one or more in following seven kinds of processing:
The first, the acquisition first information, the described first information is sent to other equipment, and the described first information comprises: any one in the fingerprint that the video that the image that the residing geographic position of described mobile terminal, described mobile terminal are taken, described mobile terminal are taken, the audio frequency that described mobile terminal is recorded, described mobile terminal gather or multiple.
The all or part of function of each application program in the second, the default set of applications of locking, so that active user cannot use locked function.
The third, factory reset.
The 4th kind, removing sensitive data.
The 5th kind, sensitive information is sent to other equipment.
The 6th kind, the default audio frequency of broadcasting.
The 7th kind, send mobile terminal stolen notice to other equipment.
Above-mentioned the first processing can send to other equipment by the geographic position of the information of stealer and/or stolen mobile terminal, like this, just provides important information for the lawful owner of mobile terminal recovers stolen mobile device.Wherein, other equipment that the first information sends to can be set in advance, for example: the equipment that security service is provided or friend's the mobile device etc. that are set as this mobile terminal manufacturer.
Above-mentioned the second processing can lock the function of application program in mobile terminal, like this, just can limit the use of stealer to mobile terminal.The lawful owner of mobile terminal can put into responsive application program default set of applications in advance, responsive application program can be for including the application program of lawful owner's personal information or lawful owner party information, as note, address list, Instant Messenger (IM) software etc.Certainly, for certain applications program, can only lock its partial function, as the application program of taking pictures have photograph taking, video capture and photo/video viewing function, the present invention can only lock photo/video viewing function, and does not lock photograph taking and video capture function.Like this, the application program of taking pictures just can normally be carried out photo or video capture.
Owing to may there is the important application program of a large amount of sensitive information (as account number cipher), sensitive document, user installation in mobile terminal, therefore, after mobile terminal is stolen, can also carries out above-mentioned the third and process, be i.e. factory reset.Like this, just the important application program of sensitive information, sensitive document, user installation all can be removed.Certainly, also can carry out the 4th kind of processing, only sensitive information be removed.In other embodiments of the invention, can also carry out the 5th kind of processing, sensitive information is sent to other equipment.Like this, sensitive information just can not lost because of the stolen of mobile terminal.
After mobile terminal is stolen, can also carry out the 6th kind of processing, play alert audio, so that surrounding population vigilance prevent the behavior of stealer.
The 7th kind of processing can send to other equipment by stolen notice, to remind related personnel.
Optionally, in embodiments of the present invention, miscellaneous equipment can be identified described mobile terminal by the international identification code IMEI of the mobile device of described mobile terminal, to communicate with described mobile terminal.
Stealer, stealing after mobile terminal, may carry out to mobile terminal the processing such as brush machine, the number of changing, and IMEI is unique, constant to each mobile terminal, therefore can continue to keep and the communicating by letter of mobile terminal according to IMEI.
Optionally, S500 can carry out the first processing in some cases again, and it is pre-conditioned etc. that the instruction that other equipment send as received or the current location of mobile terminal meet.
Therefore, the execution in above-mentioned S500 first is processed, and can comprise:
In the time receiving the instruction that execution first that other equipment send processes, carry out described first and process.
In another embodiment of the present invention, the execution in above-mentioned S500 first is processed, and can comprise:
In the time that the current residing position of described mobile terminal is positioned at outside predeterminable area, carries out first and process.
Wherein, predeterminable area can be set by lawful owner, for example: lawful owner lives in Beijing, predeterminable area is set as to Beijing.Certainly, predeterminable area can be determined according to the historical region in the Preset Time section of mobile terminal.
A kind of method that improves security of mobile terminal that the embodiment of the present invention provides, can receive after shutdown command, shows that authorization information inputting interface allows user verify, if the verification passes, shut down, otherwise, carry out disguised power-off and carry out other safe handlings.The present invention can checking not by time carry out disguised power-off, shut down thereby make stealer take for mobile terminal.In this case, mobile terminal just can carry out various safe handlings in the situation that stealer is not discovered.The present invention can effectively improve the security of mobile terminal.
As shown in Figure 2, the another kind that the embodiment of the present invention provides improves the method for security of mobile terminal, carries out after disguised power-off processing at S500, can also comprise:
The start operation that S600, reception active user make;
Optionally, start is operating as the length of power key by operation.
S700, carry out camouflage start according to described start operation and process.
Optionally, described camouflage start is treated to: play start video.
In other embodiments of the invention, after S700, embodiment illustrated in fig. 2 can also comprising:
Show authorization information inputting interface, receive the authorization information of the current input of user;
Whether the authorization information that judges the current input of user is identical with default correct verification information, if so, stops the described first execution of processing, and controls described mobile terminal in normal operating condition, otherwise, maintain the described first execution of processing.
Because mobile terminal lawful owner also may slip up and input wrong authorization information in the time shutting down, process and carry out the first processing thereby cause mobile terminal to carry out disguised power-off.In this case, lawful owner just need to shut down again.First, lawful owner need to control mobile terminal and pretend start, and then shuts down and input correct authorization information.In order to distinguish lawful owner and stealer, after camouflage start, can again verify, if the verification passes, control described mobile terminal in normal operating condition, user can normal running mobile terminal, as shuts down; If checking is not passed through, maintain the described first execution of processing, to improve the security of mobile terminal.
Embodiment is corresponding with said method, and the present invention also provides a kind of system that improves security of mobile terminal.
As shown in Figure 3, a kind of system that improves security of mobile terminal that the embodiment of the present invention provides, be applied to mobile terminal, this system can comprise: command reception unit 100, shutdown authentication unit 200, normal shutdown unit 300, disguised power-off unit 400 and the first processing unit 500
Described command reception unit 100, for receiving shutdown command, triggers described authorization information receiving element 200;
Described shutdown authentication unit 200, be used for showing authorization information inputting interface, receive the authorization information of the current input of user, whether the authorization information that judges the current input of user is identical with default correct verification information, if, trigger described normal shutdown unit 300, otherwise, described disguised power-off unit 400 and described the first processing unit 500 triggered;
In the time that mobile terminal shows authorization information inputting interface, described mobile terminal can be in the lock state, receive at described mobile terminal after the authorization information of user's input, the lock-out state of described mobile terminal is just cancelled, under described lock-out state, described mobile terminal only responds user's authorization information input operation.
Like this, user can only carry out after authorization information input, just having the possibility of carrying out subsequent operation.
Described normal shutdown unit 300, processes for carrying out shutdown;
Described disguised power-off unit 400, for carrying out disguised power-off processing;
Wherein, response can, specifically for playing shutdown video, be ended except other operations outside machine operation in described disguised power-off unit 400 after the described shutdown video of broadcasting.
Be understandable that, after mobile terminal is stolen, disguised power-off processing can make stealer think that mobile terminal shuts down.After disguised power-off is processed, mobile terminal is still in running order, and like this, mobile terminal just can send the safe handlings such as stolen notice, and is not realized by stealer.
Described the first processing unit 500, for carrying out the first processing, described disguised power-off is processed different from described the first processing.
Wherein, described the first processing unit 500, can comprise one or more in following multiple module, and described first processes and comprise one or more in the performed processing of the included each module of described the first processing unit:
First information sending module, be used for obtaining the first information, the described first information is sent to other equipment, and the described first information comprises: any one in the fingerprint that the video that the image that the residing geographic position of described mobile terminal, described mobile terminal are taken, described mobile terminal are taken, the audio frequency that described mobile terminal is recorded, described mobile terminal gather or multiple;
Locking module, for locking all or part of function of the default each application program of set of applications, so that active user cannot use locked function;
Recover module, for factory reset;
Data dump module, for removing sensitive data;
Sensitive information sending module, for sending to sensitive information other equipment;
Audio playing module, for playing default audio frequency;
Notice sending module, for sending the stolen notice of mobile terminal to other equipment.
Optionally, in embodiments of the present invention, miscellaneous equipment can be identified described mobile terminal by the international identification code IMEI of the mobile device of described mobile terminal, to communicate with described mobile terminal.
Stealer, stealing after mobile terminal, may carry out to mobile terminal the processing such as brush machine, the number of changing, and IMEI is unique, constant to each mobile terminal, therefore can continue to keep and the communicating by letter of mobile terminal according to IMEI.
Wherein, described the first processing unit 500, can be specifically for: in the time receiving the instruction that execution first that other equipment send processes, carry out described first and process.Wherein, these other equipment can be associate device, as mobile terminal of server, relatives etc.
Wherein, described the first processing unit 500, can be when being positioned at outside predeterminable area in the current residing position of described mobile terminal, carries out first and process.
A kind of system that improves security of mobile terminal that the embodiment of the present invention provides, can receive after shutdown command, shows that authorization information inputting interface allows user verify, if the verification passes, shut down, otherwise, carry out disguised power-off and carry out other safe handlings.The present invention can checking not by time carry out disguised power-off, shut down thereby make stealer take for mobile terminal.In this case, mobile terminal just can carry out various safe handlings in the situation that stealer is not discovered.The present invention can effectively improve the security of mobile terminal.
As shown in Figure 4, the another kind that the embodiment of the present invention provides improves the system of security of mobile terminal, can also comprise:
Start operation receiving element 600, for carrying out in described disguised power-off unit 400 after disguised power-off processing, receives the start operation that active user makes;
Camouflage start-up unit 700, processes for carrying out camouflage start according to described start operation.
Wherein, described camouflage start-up unit 700, can be specifically for playing start video according to described start operation.
In other embodiments of the invention, system shown in Figure 4 can also comprise: start authentication unit, after processing according to described start operation execution camouflage start in described camouflage start-up unit 700, show authorization information inputting interface, the authorization information of the current input of reception user; Whether the authorization information that judges the current input of user is identical with default correct verification information, if, control described the first processing unit 500 and stop the described first execution of processing, control described mobile terminal in normal operating condition, otherwise, control described the first processing unit 500 and maintain the described first execution of processing.
Because mobile terminal lawful owner also may slip up and input wrong authorization information in the time shutting down, process and carry out the first processing thereby cause mobile terminal to carry out disguised power-off.In this case, lawful owner just need to shut down again.First, lawful owner need to control mobile terminal and pretend start, and then shuts down and input correct authorization information.In order to distinguish lawful owner and stealer, after camouflage start, can again verify, if the verification passes, control described mobile terminal in normal operating condition, user can normal running mobile terminal, as shuts down; If checking is not passed through, maintain the described first execution of processing, to improve the security of mobile terminal.
It should be noted that, in this article, relational terms such as the first and second grades is only used for an entity or operation to separate with another entity or operational zone, and not necessarily requires or imply and between these entities or operation, have the relation of any this reality or sequentially.And, term " comprises ", " comprising " or its any other variant are intended to contain comprising of nonexcludability, thereby the process, method, article or the equipment that make to comprise a series of key elements not only comprise those key elements, but also comprise other key elements of clearly not listing, or be also included as the intrinsic key element of this process, method, article or equipment.The in the situation that of more restrictions not, the key element being limited by statement " comprising ... ", and be not precluded within process, method, article or the equipment that comprises described key element and also have other identical element.
Each embodiment in this instructions all adopts relevant mode to describe, between each embodiment identical similar part mutually referring to, what each embodiment stressed is and the difference of other embodiment.Especially,, for system embodiment, because it is substantially similar in appearance to embodiment of the method, so description is fairly simple, relevant part is referring to the part explanation of embodiment of the method.
The foregoing is only preferred embodiment of the present invention, be not intended to limit protection scope of the present invention.All any amendments of doing within the spirit and principles in the present invention, be equal to replacement, improvement etc., be all included in protection scope of the present invention.

Claims (20)

1. a method that improves security of mobile terminal, is characterized in that, is applied to mobile terminal, and described method comprises:
Receive shutdown command;
Show authorization information inputting interface, receive the authorization information of the current input of user, whether the authorization information that judges the current input of user is identical with default correct verification information, if, shut down, otherwise, to carry out disguised power-off and process and carry out the first processing, described disguised power-off is processed different from described the first processing.
2. method according to claim 1, is characterized in that, described disguised power-off is treated to: play shutdown video, after the described shutdown video of broadcasting, end response except other operations outside machine operation.
3. method according to claim 1, is characterized in that, described execution first is processed, and comprising:
In the time receiving the instruction that execution first that other equipment send processes, carry out described first and process.
4. method according to claim 1, is characterized in that, described execution first is processed, and comprising:
In the time that the current residing position of described mobile terminal is positioned at outside predeterminable area, carries out first and process.
5. according to the method described in any one in claim 1 to 4, it is characterized in that, described the first processing comprises one or more in following multiple processing:
Obtain the first information, the described first information is sent to other equipment, and the described first information comprises: any one in the fingerprint that the video that the image that the residing geographic position of described mobile terminal, described mobile terminal are taken, described mobile terminal are taken, the audio frequency that described mobile terminal is recorded, described mobile terminal gather or multiple;
The all or part of function of each application program in the default set of applications of locking, so that active user cannot use locked function;
Factory reset;
Remove sensitive data;
Sensitive information is sent to other equipment;
Play default audio frequency;
Send the stolen notice of mobile terminal to other equipment.
6. according to the method described in any one in claim 1 to 4, it is characterized in that, carrying out after disguised power-off processing, described method also comprises:
Receive the start operation that active user makes;
Carrying out camouflage start according to described start operation processes.
7. method according to claim 6, is characterized in that, described camouflage start is treated to: play start video.
8. method according to claim 6, is characterized in that, carries out after camouflage start processing according to described start operation described, and described method also comprises:
Show authorization information inputting interface, receive the authorization information of the current input of user;
Whether the authorization information that judges the current input of user is identical with default correct verification information, if so, stops the described first execution of processing, and controls described mobile terminal in normal operating condition, otherwise, maintain the described first execution of processing.
9. according to the method described in claim 3 or 5, it is characterized in that, described miscellaneous equipment is identified described mobile terminal by the international identification code IMEI of mobile device of described mobile terminal, to communicate with described mobile terminal.
10. according to the method described in any one in claim 1 to 9, it is characterized in that, in the time that described mobile terminal shows authorization information inputting interface, described mobile terminal is in the lock state, receive at described mobile terminal after the authorization information of user's input, the lock-out state of described mobile terminal is cancelled, and under described lock-out state, described mobile terminal only responds user's authorization information input operation.
11. 1 kinds are improved the system of security of mobile terminal, it is characterized in that, are applied to mobile terminal, and described system comprises: command reception unit, shutdown authentication unit, normal shutdown unit, disguised power-off unit and the first processing unit,
Described command reception unit, for receiving shutdown command, triggers described authorization information receiving element;
Described shutdown authentication unit, be used for showing authorization information inputting interface, receive the authorization information of the current input of user, whether the authorization information that judges the current input of user is identical with default correct verification information, if, trigger described normal shutdown unit, otherwise, described disguised power-off unit and described the first processing unit triggered;
Described normal shutdown unit, processes for carrying out shutdown;
Described disguised power-off unit, for carrying out disguised power-off processing;
Described the first processing unit, for carrying out the first processing, described disguised power-off is processed different from described the first processing.
12. systems according to claim 11, is characterized in that, response, specifically for playing shutdown video, is ended except other operations outside machine operation in described disguised power-off unit after the described shutdown video of broadcasting.
13. systems according to claim 11, is characterized in that, described the first processing unit, specifically in the time receiving the instruction that execution first that other equipment send processes, is carried out described first and processed.
14. systems according to claim 11, is characterized in that, described the first processing unit when being positioned at outside predeterminable area in the current residing position of described mobile terminal, being carried out first and processed.
15. according to claim 11 to the system described in any one in 14, it is characterized in that, described the first processing unit, comprises one or more in following multiple module, and described first processes and comprise one or more in the performed processing of the included each module of described the first processing unit:
First information sending module, be used for obtaining the first information, the described first information is sent to other equipment, and the described first information comprises: any one in the fingerprint that the video that the image that the residing geographic position of described mobile terminal, described mobile terminal are taken, described mobile terminal are taken, the audio frequency that described mobile terminal is recorded, described mobile terminal gather or multiple;
Locking module, for locking all or part of function of the default each application program of set of applications, so that active user cannot use locked function;
Recover module, for factory reset;
Data dump module, for removing sensitive data;
Sensitive information sending module, for sending to sensitive information other equipment;
Audio playing module, for playing default audio frequency;
Notice sending module, for sending the stolen notice of mobile terminal to other equipment.
16. according to claim 11 to the system described in any one in 14, it is characterized in that, also comprises:
Start operation receiving element, for carrying out after disguised power-off processing in described disguised power-off unit, receives the start operation that active user makes;
Camouflage start-up unit, processes for carrying out camouflage start according to described start operation.
17. systems according to claim 16, is characterized in that, described camouflage start-up unit, specifically for playing start video according to described start operation.
18. systems according to claim 16, it is characterized in that, also comprise: start authentication unit, after processing according to described start operation execution camouflage start in described camouflage start-up unit, show authorization information inputting interface, receive the authorization information of the current input of user; Whether the authorization information that judges the current input of user is identical with default correct verification information, if, control described the first processing unit and stop the described first execution of processing, control described mobile terminal in normal operating condition, otherwise, control described the first processing unit and maintain the described first execution of processing.
19. according to the system described in claim 14 or 16, it is characterized in that, described miscellaneous equipment is identified described mobile terminal by the international identification code IMEI of mobile device of described mobile terminal, to communicate with described mobile terminal.
20. according to claim 11 to the system described in any one in 19, it is characterized in that, in the time that described mobile terminal shows authorization information inputting interface, described mobile terminal is in the lock state, receive at described mobile terminal after the authorization information of user's input, the lock-out state of described mobile terminal is cancelled, and under described lock-out state, described mobile terminal only responds user's authorization information input operation.
CN201410374079.4A 2014-07-31 2014-07-31 Method and system for improving safety of mobile terminal Pending CN104143059A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201410374079.4A CN104143059A (en) 2014-07-31 2014-07-31 Method and system for improving safety of mobile terminal
PCT/CN2015/083457 WO2016015551A1 (en) 2014-07-31 2015-07-07 Method and system for improving safety of mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410374079.4A CN104143059A (en) 2014-07-31 2014-07-31 Method and system for improving safety of mobile terminal

Publications (1)

Publication Number Publication Date
CN104143059A true CN104143059A (en) 2014-11-12

Family

ID=51852229

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410374079.4A Pending CN104143059A (en) 2014-07-31 2014-07-31 Method and system for improving safety of mobile terminal

Country Status (2)

Country Link
CN (1) CN104143059A (en)
WO (1) WO2016015551A1 (en)

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104732150A (en) * 2015-03-05 2015-06-24 广东欧珀移动通信有限公司 Starting method and device for mobile terminal
CN104780279A (en) * 2015-05-07 2015-07-15 上海斐讯数据通信技术有限公司 Mobile phone and method used for supporting stolen tracking and locating
CN104834872A (en) * 2015-06-01 2015-08-12 上海斐讯数据通信技术有限公司 Mobile terminal antitheft control system and method
WO2016015551A1 (en) * 2014-07-31 2016-02-04 可牛网络技术(北京)有限公司 Method and system for improving safety of mobile terminal
CN105681574A (en) * 2016-02-26 2016-06-15 范浪波 Method for preventing illegal user from closing incoming call ringtone of mobile phone
CN105740677A (en) * 2016-02-29 2016-07-06 宇龙计算机通信科技(深圳)有限公司 Startup and shutdown method, system and intelligent mobile terminal
CN105787321A (en) * 2016-01-26 2016-07-20 宇龙计算机通信科技(深圳)有限公司 Terminal shutdown method and device as well as terminal
CN105827817A (en) * 2015-11-30 2016-08-03 维沃移动通信有限公司 Alarm method and mobile terminal
CN105844181A (en) * 2016-03-23 2016-08-10 深圳市金立通信设备有限公司 Key instruction processing method and terminal
CN105872212A (en) * 2016-03-28 2016-08-17 乐视控股(北京)有限公司 Mobile terminal power-off method and device
CN105975829A (en) * 2016-04-29 2016-09-28 青岛海信移动通信技术股份有限公司 Restarting method and apparatus for mobile device
CN106302957A (en) * 2015-05-25 2017-01-04 酷派软件技术(深圳)有限公司 Control method, device and the relevant device of the anti-lost contact of a kind of terminal
CN106304075A (en) * 2016-09-13 2017-01-04 中科创达软件股份有限公司 A kind of method and device improving mobile device safety
CN106506843A (en) * 2016-11-22 2017-03-15 奇酷互联网络科技(深圳)有限公司 A kind of theft preventing method and mobile terminal
CN107004074A (en) * 2014-12-23 2017-08-01 英特尔公司 The technology of enhanced user certification is carried out using advanced sensors monitoring
WO2017128422A1 (en) * 2016-01-31 2017-08-03 黄冠明 Method for powering off mobile phone, and mobile phone
CN107045598A (en) * 2016-12-14 2017-08-15 广东小天才科技有限公司 Anti-theft method and device for mobile equipment
CN108509778A (en) * 2018-02-07 2018-09-07 平安普惠企业管理有限公司 End message guard method, device, computer equipment and storage medium
CN111092987A (en) * 2018-10-24 2020-05-01 珠海格力电器股份有限公司 Mobile terminal positioning method and device

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106982297A (en) * 2017-04-01 2017-07-25 宇龙计算机通信科技(深圳)有限公司 Safety protecting method and system

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5714918B2 (en) * 2011-01-14 2015-05-07 京セラ株式会社 Portable electronic device, switching control method and control program
CN103873655A (en) * 2012-12-13 2014-06-18 深圳富泰宏精密工业有限公司 Mobile terminal anti-theft system and mobile terminal anti-theft method
CN103179272B (en) * 2013-03-07 2014-12-31 中兴通讯股份有限公司 Method and device for controlling mobile terminal
CN103458124B (en) * 2013-09-02 2016-03-30 小米科技有限责任公司 A kind of shutdown processing method of terminal, device and terminal equipment
CN104143059A (en) * 2014-07-31 2014-11-12 可牛网络技术(北京)有限公司 Method and system for improving safety of mobile terminal

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016015551A1 (en) * 2014-07-31 2016-02-04 可牛网络技术(北京)有限公司 Method and system for improving safety of mobile terminal
CN107004074A (en) * 2014-12-23 2017-08-01 英特尔公司 The technology of enhanced user certification is carried out using advanced sensors monitoring
CN104732150A (en) * 2015-03-05 2015-06-24 广东欧珀移动通信有限公司 Starting method and device for mobile terminal
CN104732150B (en) * 2015-03-05 2018-09-04 广东欧珀移动通信有限公司 A kind of mobile terminal-opening method and device
CN104780279A (en) * 2015-05-07 2015-07-15 上海斐讯数据通信技术有限公司 Mobile phone and method used for supporting stolen tracking and locating
CN106302957B (en) * 2015-05-25 2019-10-11 酷派软件技术(深圳)有限公司 A kind of control method, device and the relevant device of the anti-lost contact of terminal
CN106302957A (en) * 2015-05-25 2017-01-04 酷派软件技术(深圳)有限公司 Control method, device and the relevant device of the anti-lost contact of a kind of terminal
CN104834872A (en) * 2015-06-01 2015-08-12 上海斐讯数据通信技术有限公司 Mobile terminal antitheft control system and method
CN105827817A (en) * 2015-11-30 2016-08-03 维沃移动通信有限公司 Alarm method and mobile terminal
CN105787321A (en) * 2016-01-26 2016-07-20 宇龙计算机通信科技(深圳)有限公司 Terminal shutdown method and device as well as terminal
WO2017128422A1 (en) * 2016-01-31 2017-08-03 黄冠明 Method for powering off mobile phone, and mobile phone
CN105681574A (en) * 2016-02-26 2016-06-15 范浪波 Method for preventing illegal user from closing incoming call ringtone of mobile phone
CN105740677A (en) * 2016-02-29 2016-07-06 宇龙计算机通信科技(深圳)有限公司 Startup and shutdown method, system and intelligent mobile terminal
CN105740677B (en) * 2016-02-29 2018-09-14 宇龙计算机通信科技(深圳)有限公司 A kind of method for start-up and shutdown, system and intelligent mobile terminal
CN105844181A (en) * 2016-03-23 2016-08-10 深圳市金立通信设备有限公司 Key instruction processing method and terminal
WO2017166661A1 (en) * 2016-03-28 2017-10-05 乐视控股(北京)有限公司 Shutdown method, device and electronic apparatus for mobile terminal
CN105872212A (en) * 2016-03-28 2016-08-17 乐视控股(北京)有限公司 Mobile terminal power-off method and device
CN105975829A (en) * 2016-04-29 2016-09-28 青岛海信移动通信技术股份有限公司 Restarting method and apparatus for mobile device
CN106304075A (en) * 2016-09-13 2017-01-04 中科创达软件股份有限公司 A kind of method and device improving mobile device safety
CN106506843A (en) * 2016-11-22 2017-03-15 奇酷互联网络科技(深圳)有限公司 A kind of theft preventing method and mobile terminal
CN107045598A (en) * 2016-12-14 2017-08-15 广东小天才科技有限公司 Anti-theft method and device for mobile equipment
CN108509778A (en) * 2018-02-07 2018-09-07 平安普惠企业管理有限公司 End message guard method, device, computer equipment and storage medium
CN111092987A (en) * 2018-10-24 2020-05-01 珠海格力电器股份有限公司 Mobile terminal positioning method and device

Also Published As

Publication number Publication date
WO2016015551A1 (en) 2016-02-04

Similar Documents

Publication Publication Date Title
CN104143059A (en) Method and system for improving safety of mobile terminal
CN104200144A (en) Method and system for improving safety of mobile terminal
JP6571203B2 (en) Privacy protection method and protection device for mobile terminal, and mobile terminal
US11171784B2 (en) Systems and methods for providing a secured password and authentication mechanism for programming and updating software or firmware
US7480805B1 (en) Method and system for identifying and processing an unauthorized access request
EP3136273B1 (en) Intrusion security device with sms based notification and control
CN103370717A (en) Always-available embedded theft reaction subsystem
CN103034813A (en) Method and system for protecting data of mobile terminal
CN105046118A (en) System and method to access/restrict a security system for temporary users using a mobile application
CN104268453A (en) Method and device for application program safety management for terminal equipment, and terminal
CN107026935B (en) Mobile device and permission control method and device of mobile device
US20150047019A1 (en) Information processing method and electronic device
CN104820805A (en) Method and device for burglary prevention of user identity identification card information
CN106126986B (en) Unlocking processing method and device for locked data partition
JP2007247346A (en) Electronic lock system, method, program, electronic lock, server, and cellphone
WO2018006332A1 (en) Intelligent entrance guard management method and system based on mobile terminal
CN105809045A (en) Method and device for processing equipment systems during data reset
US20170337788A1 (en) Electronic device and anti-theft method
CN104156653A (en) Application protection method and device of mobile terminal
KR101580200B1 (en) Access control apparatus for automatic security restoration and method thereof
CN106778173A (en) The method and device that a kind of application lock based on intelligent operating system is set
CN104243476A (en) Account protection method and device
JP2006323475A (en) Operation managing device of monitoring controller
CN113704061A (en) Secret-related computer protection system
JPWO2009041387A1 (en) Authentication device, device authentication system and program

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20141112