[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN107194291A - Anti-theft method for mobile terminal, mobile terminal and computer-readable recording medium - Google Patents

Anti-theft method for mobile terminal, mobile terminal and computer-readable recording medium Download PDF

Info

Publication number
CN107194291A
CN107194291A CN201710343395.9A CN201710343395A CN107194291A CN 107194291 A CN107194291 A CN 107194291A CN 201710343395 A CN201710343395 A CN 201710343395A CN 107194291 A CN107194291 A CN 107194291A
Authority
CN
China
Prior art keywords
mobile terminal
instruction
cloud server
information
machine
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710343395.9A
Other languages
Chinese (zh)
Inventor
焦保存
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201710343395.9A priority Critical patent/CN107194291A/en
Publication of CN107194291A publication Critical patent/CN107194291A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • H04W8/24Transfer of terminal data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • H04W8/24Transfer of terminal data
    • H04W8/245Transfer of terminal data from a network towards a terminal

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of anti-theft method for mobile terminal, mobile terminal and computer-readable recording medium, including:The instruction that acquisition for mobile terminal the machine is lost;Internet resources are obtained according to the instruction, locally-stored material upload Cloud Server is deleted into local data simultaneously automatically;Opening locating device is simultaneously locked, and local out code is not received not getting the out code prelocalization device from Cloud Server;Positioner detects ownship position information in real time and the synchronous positional information is to Cloud Server.The present invention realizes that data on the mobile terminal lost automated back-up and can delete local data and ensure safety after the loss., moreover it is possible to allow user to obtain real time position residing for the mobile terminal lost, conveniently give the mobile terminal of loss for change.

Description

Anti-theft method for mobile terminal, mobile terminal and computer-readable recording medium
Technical field
The present invention relates to technical field of mobile terminals, more particularly to a kind of anti-theft method for mobile terminal, mobile terminal and Computer-readable recording medium.
Background technology
A feast for the eyes for the listing of anti-theft technique existing market, various to have, mode is also a lot, but how true Surely stolen method and stolen later processing method are difficult to have perfect.Such as only steal and send short messages, merely listen for ring Border, only changes cartoon and knows to be essentially all method of no avail, it is most important that, one is how to protect the data of oneself not let out Dew, whether two can attempt to recover.Also lock mobile phone, although can ensure that data is not revealed, but need operator's branch again Hold.Besides some antitheft softwares, no matter how outstanding these softwares are and intelligent, and user is stolen after brush software, or soft monitoring Part is deleted, and mobile phone appropriator of still leaving is used, it is impossible to given for change.
The content of the invention
It is a primary object of the present invention to propose a kind of anti-theft method for mobile terminal and mobile terminal and computer-readable Storage medium, it is intended to which solving the antitheft related design in existing mobile terminal can not accomplish not only to have prevented that data from divulging a secret but also can be compared with The problem of getting back mobile phone for convenience.
To achieve the above object, a kind of anti-theft method for mobile terminal that the present invention is provided, the described method comprises the following steps:
The instruction that acquisition for mobile terminal the machine is lost;
Internet resources are obtained according to the instruction, locally-stored material upload Cloud Server is deleted to local simultaneously automatically Data;
Opening locating device is simultaneously locked, and this is not received not getting the out code prelocalization device from Cloud Server Ground out code;
Positioner detects ownship position information in real time and the synchronous positional information is to Cloud Server.
Further, step is also included before the instruction that described step acquisition for mobile terminal the machine is lost:
User fingerprints information is enrolled, using finger print information as the unlocking cipher of mobile terminal, by the finger print information with moving The International Mobile Equipment Identity code binding of dynamic terminal, uploads the finger print information and International Mobile Equipment Identity code arrives cloud service Device.
Further, the instruction that described step acquisition for mobile terminal the machine is lost is specifically included:
When the number of times that mobile terminal obtains wrong unlocking cipher in setting time exceedes the setting upper limit, mobile terminal is obtained The instruction for taking the machine to lose;Or
The instruction that the machine of acquisition for mobile terminal from Cloud Server is lost;Or
It is mobile when obtaining the instruction of password replacement but not obtaining the information for confirming password replacement from stand-by equipment Terminal obtains the instruction of the machine loss;Or
When obtaining the instruction of SIM card change but not obtaining the information for the confirmation SIM card change that stand-by equipment is sent, move Dynamic terminal obtains the instruction of the machine loss;Or
The information that the machine of acquisition for mobile terminal from stand-by equipment is lost.
Further, the positioner detects ownship position information in real time and the synchronous positional information is to Cloud Server Afterwards, methods described also includes step:
The prompting message of the machine loss is sent to the default stand-by equipment of mobile terminal, the prompting message is comprising mobile whole End current location information, default prompting message, new insert SIM card number one or more.
Further, it is described that Internet resources are obtained according to the instruction, automatically by the material upload stored on mobile terminal Cloud Server, is specifically included while deleting local data:
Mobile data network is automatically turned on according to the instruction and will be stored by mobile data network on mobile terminal Material upload Cloud Server, while deleting local data;Or
It can be connected according to the instruction search with Wi-Fi wireless networks and automatically, pass through connected Wi-Fi wireless networks By the material upload Cloud Server stored on mobile terminal, while deleting local data.
Further, the positioner detects ownship position information in real time and the synchronous positional information is to Cloud Server Afterwards, methods described also includes step:
The instruction that the machine from Cloud Server has been given for change is received, backup information is downloaded from Cloud Server automatically, released Positioner opens the instruction of locking.
Further, the positioner detects ownship position information in real time and the synchronous positional information is to Cloud Server Afterwards, methods described also includes step:
Obtain the signal of mobile terminal shutdown, turning-off mobile terminal but the positioner continuous firing for keeping mobile terminal.
Further, the positioner detects ownship position information in real time and the synchronous positional information is to Cloud Server Afterwards, methods described also includes step:
When obtaining mobile terminal brush machine signal, the deposit of private partition is opened up comprising using in the hard disk of mobile terminal automatically User's identification program and information including the finger print information of family, and keep backstage automatic running and perform user's identification, until receiving The private partition is voluntarily destroyed after having given instruction for change to the machine from Cloud Server.
In addition, to achieve the above object, the present invention also proposes a kind of mobile terminal, including memory, processor and at least One is stored in the memory and is configured as by the application program of the computing device, it is characterised in that described At least one application program is configurable for performing the anti-theft method for mobile terminal described in any of the above-described claim.
And, to achieve the above object, the present invention also proposes a kind of computer-readable recording medium, described computer-readable Be stored with guarding against theft for mobile terminal program on storage medium, and the guarding against theft for mobile terminal program realizes above-mentioned when being executed by processor The step of one anti-theft method for mobile terminal.
A kind of anti-theft method for mobile terminal and mobile terminal and computer-readable recording medium proposed by the present invention, pass through Obtain after the instruction that clear and definite mobile terminal is lost, backup information to Cloud Server, the local data of deletion, while opening mobile whole The positioner at end implements synchronous current location information to Cloud Server, helps user fast and accurately to be given for change by positional information The mobile terminal of loss, is truly realized anti-theft and anti-losing.
Brief description of the drawings
Fig. 1 is the hardware architecture diagram for the mobile terminal for realizing each embodiment of the invention;
Fig. 2 is the wireless communication system schematic diagram of mobile terminal as shown in Figure 1;
The anti-theft method for mobile terminal schematic flow sheet that Fig. 3 provides for first embodiment of the invention;
The anti-theft method for mobile terminal schematic flow sheet that Fig. 4 provides for second embodiment of the invention;
The anti-theft method for mobile terminal schematic flow sheet that Fig. 5 provides for third embodiment of the invention;
The anti-theft method for mobile terminal schematic flow sheet that Fig. 6 provides for fourth embodiment of the invention;
The anti-theft method for mobile terminal schematic flow sheet that Fig. 7 provides for fifth embodiment of the invention.
The realization, functional characteristics and advantage of the object of the invention will be described further referring to the drawings in conjunction with the embodiments.
Embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In follow-up description, the suffix using such as " module ", " part " or " unit " for representing element is only Be conducive to the explanation of the present invention, itself there is no a specific meaning.Therefore, " module ", " part " or " unit " can be mixed Ground is used.
Terminal can be implemented in a variety of manners.For example, the terminal described in the present invention can include such as mobile phone, flat board Computer, notebook computer, palm PC, personal digital assistant (Personal Digital Assistant, PDA), portable Media player (Portable Media Player, PMP), guider, wearable device, Intelligent bracelet, pedometer etc. are moved Move the fixed terminals such as terminal, and numeral TV, desktop computer.
It will be illustrated in subsequent descriptions by taking mobile terminal as an example, it will be appreciated by those skilled in the art that except special Outside element for moving purpose, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Referring to Fig. 1, its hardware architecture diagram for a kind of mobile terminal of realization each embodiment of the invention, the shifting Dynamic terminal 100 can include:RF (Radio Frequency, radio frequency) unit 101, Wi-Fi module 102, audio output unit 103rd, A/V (audio/video) input block 104, sensor 105, display unit 106, user input unit 107, interface unit 108th, the part such as memory 109, processor 110 and power supply 111.It will be understood by those skilled in the art that shown in Fig. 1 Mobile terminal structure does not constitute the restriction to mobile terminal, and mobile terminal can be included than illustrating more or less parts, Either combine some parts or different parts arrangement.
The all parts of mobile terminal are specifically introduced with reference to Fig. 1:
Radio frequency unit 101 can be used for receiving and sending messages or communication process in, the reception and transmission of signal, specifically, by base station Downlink information receive after, handled to processor 110;In addition, up data are sent into base station.Generally, radio frequency unit 101 Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier, duplexer etc..In addition, penetrating Frequency unit 101 can also be communicated by radio communication with network and other equipment.Above-mentioned radio communication can use any communication Standard or agreement, including but not limited to GSM (Global System of Mobile communication, global system for mobile telecommunications System), GPRS (General Packet Radio Service, general packet radio service), CDMA2000 (Code Division Multiple Access 2000, CDMA 2000), WCDMA (Wideband Code Division Multiple Access, WCDMA), TD-SCDMA (Time Division-Synchronous Code Division Multiple Access, TD SDMA), FDD-LTE (Frequency Division Duplexing-Long Term Evolution, FDD Long Term Evolution) and TDD-LTE (Time Division Duplexi ng-Long Term Evolution, time division duplex Long Term Evolution) etc..
WiFi belongs to short range wireless transmission technology, and mobile terminal can help user's transmitting-receiving electricity by WiFi module 102 Sub- mail, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and accessed.Although Fig. 1 shows Go out WiFi module 102, but it is understood that, it is simultaneously not belonging to must be configured into for mobile terminal, completely can be according to need To be omitted in the essential scope for do not change invention.
Audio output unit 103 can be in call signal reception pattern, call mode, record mould in mobile terminal 1 00 When under the isotypes such as formula, speech recognition mode, broadcast reception mode, it is that radio frequency unit 101 or WiFi module 102 are received or The voice data stored in memory 109 is converted into audio signal and is output as sound.Moreover, audio output unit 103 The audio output related to the specific function that mobile terminal 1 00 is performed can also be provided (for example, call signal receives sound, disappeared Breath receives sound etc.).Audio output unit 103 can include loudspeaker, buzzer etc..
A/V input blocks 104 are used to receive audio or video signal.A/V input blocks 104 can include graphics processor (Graphics Processing Unit, GPU) 1041 and microphone 1042,1041 pairs of graphics processor is in video acquisition mode Or the view data progress of the static images or video obtained in image capture mode by image capture apparatus (such as camera) Reason.Picture frame after processing may be displayed on display unit 106.Picture frame after being handled through graphics processor 1041 can be deposited Storage is transmitted in memory 109 (or other storage mediums) or via radio frequency unit 101 or WiFi module 102.Mike Wind 1042 can connect in telephone calling model, logging mode, speech recognition mode etc. operational mode via microphone 1042 Quiet down sound (voice data), and can be voice data by such acoustic processing.Audio (voice) data after processing can To be converted to the form output that mobile communication base station can be sent to via radio frequency unit 101 in the case of telephone calling model. Microphone 1042 can implement various types of noises and eliminate (or suppression) algorithm to eliminate (or suppression) in reception and send sound The noise produced during frequency signal or interference.
Mobile terminal 1 00 also includes at least one sensor 105, such as optical sensor, motion sensor and other biographies Sensor.Specifically, optical sensor includes ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 1061, and proximity transducer can close when mobile terminal 1 00 is moved in one's ear Display panel 1061 and/or backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions (general For three axles) size of acceleration, size and the direction of gravity are can detect that when static, the application available for identification mobile phone posture (such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.; The fingerprint sensor that can also configure as mobile phone, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, The other sensors such as hygrometer, thermometer, infrared ray sensor, will not be repeated here.
Display unit 106 is used for the information for showing the information inputted by user or being supplied to user.Display unit 106 can be wrapped Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used Forms such as (Organic Light-Emitting Diode, OLED) configures display panel 1061.
User input unit 107 can be used for the numeral or character information for receiving input, and produce the use with mobile terminal The key signals input that family is set and function control is relevant.Specifically, user input unit 107 may include contact panel 1071 with And other input equipments 1072.Contact panel 1071, also referred to as touch-screen, collect touch operation of the user on or near it (such as user is using any suitable objects such as finger, stylus or annex on contact panel 1071 or in contact panel 1071 Neighbouring operation), and corresponding attachment means are driven according to formula set in advance.Contact panel 1071 may include touch detection Two parts of device and touch controller.Wherein, touch detecting apparatus detects the touch orientation of user, and detects touch operation band The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it It is converted into contact coordinate, then gives processor 110, and the order sent of reception processing device 110 and can be performed.In addition, can To realize contact panel 1071 using polytypes such as resistance-type, condenser type, infrared ray and surface acoustic waves.Except contact panel 1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can be wrapped Include but be not limited to physical keyboard, in function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc. One or more, do not limit herein specifically.
Further, contact panel 1071 can cover display panel 1061, detect thereon when contact panel 1071 or After neighbouring touch operation, processor 110 is sent to determine the type of touch event, with preprocessor 110 according to touch thing The type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, contact panel 1071 and display panel 1061 be input and the output function that mobile terminal is realized as two independent parts, but in certain embodiments, can By contact panel 1071 and the input that is integrated and realizing mobile terminal of display panel 1061 and output function, not do specifically herein Limit.
Interface unit 108 is connected the interface that can pass through as at least one external device (ED) with mobile terminal 1 00.For example, External device (ED) can include wired or wireless head-band earphone port, external power source (or battery charger) port, wired or nothing Line FPDP, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end Mouth, video i/o port, ear port etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, number It is believed that breath, electric power etc.) and the input received is transferred to one or more elements in mobile terminal 1 00 or can be with For transmitting data between mobile terminal 1 00 and external device (ED).
Memory 109 can be used for storage software program and various data.Memory 109 can mainly include storing program area And storage data field, wherein, application program (the such as sound that storing program area can be needed for storage program area, at least one function Sound playing function, image player function etc.) etc.;Storage data field can be stored uses created data (such as according to mobile phone Voice data, phone directory etc.) etc..In addition, memory 109 can include high-speed random access memory, it can also include non-easy The property lost memory, for example, at least one disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of mobile terminal, utilizes each of various interfaces and the whole mobile terminal of connection Individual part, by operation or performs and is stored in software program and/or module in memory 109, and calls and be stored in storage Data in device 109, perform the various functions and processing data of mobile terminal, so as to carry out integral monitoring to mobile terminal.Place Reason device 110 may include one or more processing units;It is preferred that, processor 110 can integrated application processor and modulatedemodulate mediate Device is managed, wherein, application processor mainly handles operating system, user interface and application program etc., and modem processor is main Handle radio communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
Mobile terminal 1 00 can also include the power supply 111 (such as battery) powered to all parts, it is preferred that power supply 111 Can be logically contiguous by power-supply management system and processor 110, so as to realize management charging by power-supply management system, put The function such as electricity and power managed.
Although Fig. 1 is not shown, mobile terminal 1 00 can also will not be repeated here including bluetooth module etc..
For the ease of understanding the embodiment of the present invention, the communications network system that the mobile terminal of the present invention is based on is entered below Row description.
Referring to Fig. 2, Fig. 2 is a kind of communications network system Organization Chart provided in an embodiment of the present invention, the communication network system Unite as the LTE system of universal mobile communications technology, UE (User Equipment, use of the LTE system including communicating connection successively Family equipment) 201, E-UTRAN (Evolved UMTS Terrestrial Radio Access Network, evolved UMTS lands Ground wireless access network) 202, EPC (Evolved Packet Core, evolved packet-based core networks) 203 and operator IP operation 204。
Specifically, UE201 can be above-mentioned terminal 100, and here is omitted.
E-UTRAN202 includes eNodeB2021 and other eNodeB2022 etc..Wherein, eNodeB2021 can be by returning Journey (backhaul) (such as X2 interface) is connected with other eNodeB2022, and eNodeB2021 is connected to EPC203, ENodeB2021 can provide UE201 to EPC203 access.
EPC203 can include MME (Mobility Management Entity, mobility management entity) 2031, HSS (Home Subscriber Server, home subscriber server) 2032, other MME2033, SGW (Serving Gate Way, Gateway) 2034, PGW (PDN Gate Way, grouped data network gateway) 2035 and PCRF (Policy and Charging Rules Function, policy and rate functional entity) 2036 etc..Wherein, MME2031 be processing UE201 and There is provided carrying and connection management for the control node of signaling between EPC203.HSS2032 is all to manage for providing some registers Such as function of attaching position register (not shown) etc, and some are preserved about the use such as service features, data rate The special information in family.All customer data can be transmitted by SGW2034, and PGW2035 can provide UE 201 IP Address is distributed and other functions, and PCRF2036 is strategy and the charging control strategic decision-making of business data flow and IP bearing resources Point, it selects and provided available strategy and charging control decision-making with charge execution function unit (not shown) for strategy.
IP operation 204 can include internet, Intranet, IMS (IP Multimedia Subsystem, IP multimedia System) or other IP operations etc..
Although above-mentioned be described by taking LTE system as an example, those skilled in the art it is to be understood that the present invention not only Suitable for LTE system, be readily applicable to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA with And following new network system etc., do not limit herein.
Based on above-mentioned mobile terminal hardware configuration and communications network system, each embodiment of the inventive method is proposed.
Embodiment one
First embodiment of the invention provides a kind of anti-theft method for mobile terminal, as shown in figure 3, methods described includes following step Suddenly:
S1, the instruction that acquisition for mobile terminal the machine is lost;
Confirm after the fact that mobile terminal is lost, mobile terminal starts anti-theft modes.General mobile terminal determines to lose The fact, it can voluntarily judge to learn according to the generation of some suspicious event for mobile terminal, can also be by receiving cloud service The loss of device or stand-by equipment instructs and judges to learn.Following several situations can specifically be included:
1st, when the number of times that mobile terminal obtains wrong unlocking cipher in setting time exceedes the setting upper limit, mobile terminal Obtain the instruction that the machine is lost.
The upper limit number of times statistics of mistake unlocking cipher input, should be the statistics in a setting time, the setting time Can be 24 hours or other times.The unlocking cipher can be finger-print cipher or numerical ciphers, for example, be set in 24 small When the interior 1071 input error unlocking cipher of contact panel by mobile terminal 1 00 10 times, that is, judged the mobile terminal 1 00 Not under proprietary control, as mobile terminal is lost.The setting upper limit of 10 times, can be independent finger-print cipher input The number of times of mistake or the number of times of independent numerical ciphers input error, or numerical ciphers and finger-print cipher are altogether Unlocking times.
2nd, the instruction that the machine of acquisition for mobile terminal from Cloud Server is lost.
When judging whether mobile terminal is lost, the order by receiving Cloud Server is a mode.Specifically, user Can be then whole to movement by personal account by logging in the personal account of Cloud Server with the account that customer mobile terminal is bound The client that end is sent on the instruction of mobile terminal loss, mobile terminal is received after the instruction, and mobile terminal is to obtain at the machine In the instruction of lost condition, and then start anti-theft modes.
3rd, the instruction that password is reset is being obtained, but when not obtaining the information for confirming password replacement from stand-by equipment, moved Dynamic terminal obtains the instruction of the machine loss.
Judge that the another way that mobile terminal is in lost condition is that mobile terminal cannot be introduced into operation because of code error Interface, can provide the guide of change of secret code, if currently used people tries to enter operation circle by changing the channel of password The authority in face, mobile terminal can propose whether checking user possesses the means for the authority for changing password, such as input original password, Or the answer of new password or input validation problem is received by other stand-by equipments or the identity of real-name authentication is inputted Information etc., but no matter which kind of mode, will by stand-by equipment to mobile terminal send confirm password modification instruction be defined, it is no Then to estimate this change of secret code illegal for mobile terminal, confirms that mobile terminal is in lost condition, starts anti-theft modes.
Stand-by equipment can be user in the default backup phone number of mobile terminal, standby email address, this is default Backup phone number, standby email address information upload Cloud Server and preserved simultaneously.
4th, when obtaining the instruction of SIM card change but not obtaining the information for the confirmation SIM card change that stand-by equipment is sent, The instruction that acquisition for mobile terminal the machine is lost.
When mobile terminal is replaced SIM card, to ensure that the action is user's operation, mobile terminal is from trend stand-by equipment Prompting message is sent, when acting legal instruction of the replacing SIM card is confirmed when stand-by equipment is sent, then mobile terminal is not in Under illegal control, when acting legal instruction of the replacing SIM card is confirmed when stand-by equipment is not sent, then mobile terminal is estimated This SIM card replacing action is illegal, confirms that mobile terminal is in lost condition, starts anti-theft modes.
5th, after the information for the machine loss that stand-by equipment is sent is obtained, the instruction that acquisition for mobile terminal the machine is lost.
When mobile terminal is lost, user can send loss to mobile device by default stand-by equipment and instruct, and move When dynamic terminal receives the instruction, confirm that the machine is in lost condition, start anti-theft modes.
S2, obtains Internet resources according to the instruction, automatically deletes locally-stored material upload Cloud Server simultaneously Local data;
When mobile terminal obtains the machine by above channel is in the instruction of lost condition, opening anti-theft pattern, i.e., certainly The dynamic network that passes through is by the material upload Cloud Server stored on mobile terminal, while local data is deleted, to protect user to store In the data security of mobile terminal;Due to mobile terminal probably due to departing from conventional Wi-Fi environment and closing data network and make Mobile terminal is in the state without network, and the instruction that now mobile terminal is in lost condition according to described the machine is automatically turned on Mobile data network or the unlatching search of Wi-Fi module 102 can be connected with Wi-Fi wireless networks and automatically, pass through mobile data Network or the Wi-Fi wireless networks that are connected are by the material upload Cloud Server stored on mobile terminal, while deleting local money Material.
S3, opening locating device is simultaneously locked, and is not connect not getting the out code prelocalization device from Cloud Server By local out code;
Receive after the instruction that the machine has been lost, mobile terminal will also be except data on the processing mobile terminal of safety The operation for starting and helping user to give mobile terminal for change is carved, concrete operations are:Opening locating device, the positioner is included but not It is limited to the localization function modules such as GPS, wireless network positioning, sensor positioning;Make positioner keep lasting to open, and do not connect Instructing for positioner is closed by local input, positioner is deliberately closed with the people of the tamper-proof mobile terminal hidden and chase after Track.As long as the owner of the mobile terminal from cloud server end log in personal account and to mobile terminal send the machine given for change or When closing positioner instruction, the positioner of mobile terminal just performs closing.In the case that mobile terminal shuts down, open The mobile terminal entrance for opening anti-theft modes is false off-mode, that is, shuts down but do not close positioner, be in positioner Running status, until electricity exhausts.But when mobile terminal is connected with the mains, positioner is waken up at once.
S4, positioner detects ownship position information in real time and the synchronous positional information is to Cloud Server.
Under anti-theft modes, positioner is opened and detects the location of mobile terminal information in real time, and by detection Positional information uploads to Cloud Server or other equipment authorized by network, so that the owner of mobile terminal passes through cloud service Device or the stand-by equipment of mandate consult the positional information, and find by positional information the mobile terminal of loss.What is authorized is standby Equipment includes terminal where spare mobile phone, default mailbox etc..For example by the positional information of detection by short message sending to standby Mobile phone, positional information that user is received by spare mobile phone, grasps the location of mobile terminal for losing, so as to give loss for change Mobile terminal;Or the positional information of detection by mail is sent to default mailbox, user is by logging in default mailbox Positional information is obtained, the location of the mobile terminal of loss is grasped, so as to give the mobile terminal of loss for change.Number of spare mobile phone Code and default mailbox need user to be set in anti-theft modes presupposed information, and the default information can all upload cloud service Device carries out backup preservation.
The anti-theft method for mobile terminal of implementation above, it is determined that mobile terminal be in lost condition after, opening anti-theft pattern, The local material upload Cloud Server of mobile terminal is backed up so that subscriber data is not lost, while deletion mobile terminal is locally provided Material obtains the real-time position information of mobile terminal and uploads to cloud service in order to avoid subscriber data leaks while opening positioner Device, to help user to give the mobile terminal of loss for change according to the positional information of acquisition.
Embodiment two
Second embodiment of the invention provides a kind of anti-theft method for mobile terminal, as shown in figure 4, methods described includes following step Suddenly:
S21, enrolls user fingerprints information, using finger print information as the unlocking cipher of mobile terminal, by the finger print information Bound with the International Mobile Equipment Identity code of mobile terminal, upload the finger print information and International Mobile Equipment Identity code to cloud clothes Business device.
The International Mobile Equipment Identity code of mobile terminal:(International Mobile Equipment Identity IMEI code) is abbreviated as, " the electronics string number " being made up of 15 bit digitals, it is a pair with every mobile phone 1 Should, and the code is that the whole world is unique.It is unique that each mobile phone will all be endowed a whole world after finishing assembly A sets of numbers, this number from producing to being delivered for use all will by manufacture production manufacturer record.
The International Mobile Equipment Identity code of user fingerprints information and mobile terminal is bound, and fingerprint is close as starting shooting Code, is the one-to-one corresponding in order to ensure mobile terminal and user, it is ensured that mobile terminal only has user to carry out one to be Row safety operation, for example:Unblock, Modify password, deletion important information, access privacy information etc..
S22, the instruction that acquisition for mobile terminal the machine is lost;
S23, obtains Internet resources according to the instruction, automatically deletes locally-stored material upload Cloud Server simultaneously Local data;
S24, opening locating device is simultaneously locked, and is not connect not getting the out code prelocalization device from Cloud Server By local out code;
S25, positioner detects ownship position information in real time and the synchronous positional information is to Cloud Server.
S26, the prompting message of the machine loss is sent to the default stand-by equipment of mobile terminal, and the prompting message includes shifting Dynamic current location information of terminal, default prompting message, new insert SIM card number one or more.
Can be that mobile terminal voluntarily confirms according to setting condition because determining that mobile terminal is in lost condition, so When lost condition is confirmed by mobile terminal self, user oneself is possible to have no knowledge about the mobile terminal loss of oneself, institute To confirm the mobile terminal lost after opening anti-theft pattern, except the positional information upload service for detecting positioner in real time Outside device, also the information that mobile terminal is lost is notified to user, allows a user to what very first time understanding mobile terminal had been lost The fact, is easy to user to begin look for mobile terminal as early as possible.
Specifically, the telephone number of the standby call set during by being initialized to anti-theft modes sends carrying for the machine loss Awake information, the prompting message includes mobile terminal current location information, default prompting message, newly inserts the one of SIM card number Item is multinomial.
Or, the standby E-mail address set during by being initialized to mobile terminal sends the prompting letter of the machine loss Breath, the prompting message comprising mobile terminal current location information, default prompting message, new insert SIM card number one or It is multinomial.
In addition to the prompting message, the real-time position information that can be detected with additional positioning device, so that mobile terminal Owner learn present situation that mobile terminal loses the very first time and the positional information consulted by stand-by equipment, and pass through position Information finds the mobile terminal of loss.Stand-by equipment includes the spare mobile phone of user, and user will be standby when anti-theft modes are initialized Set with the phone number of mobile phone and arrive mobile terminal.Mobile terminal uploads the information of detection after Cloud Server, also by detection Positional information to spare mobile phone, positional information that user is received by spare mobile phone, grasps the movement lost by short message sending The location of terminal, so as to give the mobile terminal of loss for change;Or be sent to the positional information of detection by mail default Mailbox, user obtains positional information by logging in default mailbox, the location of the mobile terminal of loss is grasped, so as to give for change The mobile terminal of loss.The number of spare mobile phone and default mailbox need user to be set in anti-theft modes presupposed information, should Default information can all upload Cloud Server and carry out backup preservation.
The anti-theft method for mobile terminal of implementation above, it is determined that mobile terminal be in lost condition after, opening anti-theft pattern, The local material upload Cloud Server of mobile terminal is backed up so that subscriber data is not lost, while deletion mobile terminal is locally provided Material obtains the real-time position information of mobile terminal and uploads to cloud service in order to avoid subscriber data leaks while opening positioner Device, and sent to stand-by equipment outside the prompting message that mobile terminal is lost, the real time position that can be detected with additional positioning device Information, so that the owner of mobile terminal learns the present situation of mobile terminal loss the very first time and consults the position by stand-by equipment Confidence ceases, and finds by positional information the mobile terminal of loss.
Embodiment three
Third embodiment of the invention provides a kind of anti-theft method for mobile terminal, as shown in figure 5, methods described includes following step Suddenly:
S31, enrolls user fingerprints information, using finger print information as the unlocking cipher of mobile terminal, by the finger print information Bound with the International Mobile Equipment Identity code of mobile terminal, upload the finger print information and International Mobile Equipment Identity code to cloud clothes Business device.
S32, the instruction that acquisition for mobile terminal the machine is lost;
S33, obtains Internet resources according to the instruction, automatically deletes locally-stored material upload Cloud Server simultaneously Local data;
S34, opening locating device is simultaneously locked, and is not connect not getting the out code prelocalization device from Cloud Server By local out code;
S35, positioner detects ownship position information in real time and the synchronous positional information is to Cloud Server;
S36, the prompting message of the machine loss is sent to the default stand-by equipment of mobile terminal, and the prompting message includes shifting Dynamic current location information of terminal, default prompting message, new insert SIM card number one or more;
S37, receives the instruction that the machine from Cloud Server has been given for change, downloads backup information from Cloud Server automatically, Release the instruction that positioner opens locking.
Specifically, to prevent the antecessor that works as the mobile terminal lost from releasing positioner from local by illegal means Locking, the mode such as brush machine, the order unlocked the ability that mobile terminal is defined to send by Cloud Server Release the positioner lock-out state of mobile terminal.When user gives the mobile terminal of loss for change by the positional information obtained in real time Afterwards, it is necessary to release the lock-out state of mobile terminal.User logs in Cloud Server personal account, mobile terminal is sent to mobile terminal The order of positioner locking is given or has released for change, given for change when the mobile terminal given for change receives the machine from Cloud Server Or the instruction of positioner locking is released, backup information is downloaded from Cloud Server automatically, the mobile terminal that aspect is given for change is returned to Use state before loss, while releasing the instruction that positioner opens locking, now the positioner of mobile terminal just can be with Terminate lasting open.
The anti-theft method for mobile terminal of implementation above, after mobile terminal is given for change, obtains from cloud service and gives instruction for change, and under The state that backup information returns to mobile terminal before losing is carried, is user-friendly, user experience is improved, released simultaneously The lasting locking of positioner, improves the security of mobile terminal.
Example IV
Fourth embodiment of the invention provides a kind of anti-theft method for mobile terminal, as shown in fig. 6, methods described includes following step Suddenly:
S41, enrolls user fingerprints information, using finger print information as the unlocking cipher of mobile terminal, by the finger print information Bound with the International Mobile Equipment Identity code of mobile terminal, upload the finger print information and International Mobile Equipment Identity code to cloud clothes Business device;
S42, the instruction that acquisition for mobile terminal the machine is lost;
S43, obtains Internet resources according to the instruction, automatically deletes locally-stored material upload Cloud Server simultaneously Local data;
S44, opening locating device is simultaneously locked, and is not connect not getting the out code prelocalization device from Cloud Server By local out code;
S45, positioner detects ownship position information in real time and the synchronous positional information is to Cloud Server;
S46, obtains the signal of mobile terminal shutdown, turning-off mobile terminal but the lasting work of positioner for keeping mobile terminal Make.
After mobile terminal is lost, when antecessor can typically cut off contacting for user and its mobile terminal by every possible means, Simplest method is exactly that first mobile terminal shuts down, and in current many ultra-thin mobile terminals, battery is embedded in mobile whole In end housing, and removing battery is not received, holder can only be shut down by closing key.So, setting mobile terminal starts Shutdown after anti-theft modes is false shutdown, i.e., surface is shut down, but the designated program on backstage does not terminate operation, and designated program is included But positioner, mixed-media network modules mixed-media are not limited to, mobile terminal is maintained positioner test position under the unspent state of electric power Information, and the positional information of detection is passed through into Network Synchronization to Cloud Server.The guard of eavesdropper can so be effectively reduced The heart, and user can be made to obtain mobile terminal present position from Cloud Server in time, therefore mobile terminal is found faster.
In addition to the real-time position information that the positioner is detected, it can also be sent to the stand-by equipment of user and remind letter Breath and positional information, so that the owner of mobile terminal learns the present situation of mobile terminal loss the very first time and by stand-by equipment The positional information is consulted, and finds by positional information the mobile terminal of loss.Stand-by equipment includes the spare mobile phone of user, uses The phone number of spare mobile phone is set and arrives mobile terminal by family when anti-theft modes are initialized.Mobile terminal is by the information of detection Pass after Cloud Server, also by the positional information of detection by short message sending to spare mobile phone, user is received by spare mobile phone The location of positional information, the mobile terminal for grasping loss, so as to give the mobile terminal of loss for change;Or by the position of detection Information through mail is sent to default mailbox, and user obtains positional information by logging in default mailbox, grasps the movement lost The location of terminal, so as to give the mobile terminal of loss for change.The number of spare mobile phone and default mailbox need user antitheft Set during pattern presupposed information, the default information can all upload Cloud Server and carry out backup preservation.
The theft preventing method of implementation above, by setting false shutdown, allows the mobile terminal of loss under false power down condition, Continue to operate positioner and mixed-media network modules mixed-media, so that user knows the position of mobile terminal and gives the mobile end of loss for change in time End, the probability for being retrieved mobile terminal is higher.
Embodiment five
Fifth embodiment of the invention provides a kind of anti-theft method for mobile terminal, as shown in fig. 7, methods described includes following step Suddenly:
S51, enrolls user fingerprints information, using finger print information as the unlocking cipher of mobile terminal, by the finger print information Bound with the International Mobile Equipment Identity code of mobile terminal, upload the finger print information and International Mobile Equipment Identity code to cloud clothes Business device;
S52, the instruction that acquisition for mobile terminal the machine is lost;
S53, obtains Internet resources according to the instruction, automatically deletes locally-stored material upload Cloud Server simultaneously Local data;
S54, opening locating device is simultaneously locked, and is not connect not getting the out code prelocalization device from Cloud Server By local out code;
S55, positioner detects ownship position information in real time and the synchronous positional information is to Cloud Server;
S56, obtains the signal of mobile terminal shutdown, turning-off mobile terminal but the lasting work of positioner for keeping mobile terminal Make;
S57, when obtaining mobile terminal brush machine signal, opens up a private partition deposit bag in the hard disk of mobile terminal automatically Containing the user's identification program and information including user fingerprints information, and keep backstage automatic running and perform user's identification, until Receive after the machine from Cloud Server has given instruction for change and voluntarily destroy the private partition.
User's identification, when being the interactive operation of user and mobile terminal in simple terms, mobile terminal issues the user with identity The request of checking, the legitimacy of user identity is recognized with this.Specific authentication means including but not limited to:Numerical ciphers are tested Card, finger-print cipher checking, safety problem checking, check code checking;According to the situation of user error, authentication is increased or decreased Means.When mobile terminal obtains mobile terminal brush machine signal under anti-theft modes opening, illustrate to steal mobile terminal People is ready for releasing the Software security protection of mobile terminal by way of resetting mobile terminal system, in order to ensure user security The safety of antitheft information, mobile terminal opens up a private partition deposit in the hard disk of mobile terminal automatically and includes user fingerprints letter User's identification program and information including breath, such as anti-theft modes and fingerprint recognition Verification System, and keep backstage automatic running With execution user's identification, the private partition is voluntarily destroyed until receiving after the machine from Cloud Server has given instruction for change.Make Even if the mobile terminal that must be lost faces ultimate threat as brush machine, security protection ability and loss still can be kept to look for The ability returned, makes the security performance of mobile terminal higher.
The theft preventing method of implementation above, even if making the mobile terminal of loss face ultimate threat as brush machine, still may be used To keep the ability that security protection ability and loss are given for change, make the security performance of mobile terminal higher.
Embodiment six
Sixth embodiment of the invention provides a kind of mobile terminal, as shown in figure 1, including memory 109, the and of processor 110 At least one is stored in the memory 109 and is configured as the anti-theft program performed by the processor 110, described anti- Robber's program is configurable for performing following steps:
The first step, the instruction that acquisition for mobile terminal the machine is lost;
Confirm after the fact that mobile terminal is lost, mobile terminal starts anti-theft modes.General mobile terminal determines to lose The fact, it can voluntarily judge to learn according to the generation of some suspicious event for mobile terminal, can also be by receiving cloud service The loss of device or stand-by equipment instructs and judges to learn.Following several situations can specifically be included:
1st, when the number of times that mobile terminal obtains wrong unlocking cipher in setting time exceedes the setting upper limit, mobile terminal Obtain the instruction that the machine is lost.
The upper limit number of times statistics of mistake unlocking cipher input, should be the statistics in a setting time, the setting time Can be 24 hours or other times.The unlocking cipher can be finger-print cipher or numerical ciphers, for example, be set in 24 small When interior mobile terminal 1 00 unlocking cipher 10 times of mistake is received by contact panel 1071, that is, judged the mobile terminal Not under proprietary control, as mobile terminal is lost.The setting upper limit of 10 times, can be independent finger-print cipher input The number of times of mistake or the number of times of independent numerical ciphers input error, or numerical ciphers and finger-print cipher are altogether Unlocking times.
2nd, the instruction that the machine of acquisition for mobile terminal from Cloud Server is lost.
When judging whether mobile terminal is lost, the order by receiving Cloud Server is a mode.Specifically, user Can be then whole to movement by personal account by logging in the personal account of Cloud Server with the account that customer mobile terminal is bound The client that end is sent on the instruction of mobile terminal loss, mobile terminal is received after the instruction, and mobile terminal is to obtain at the machine In the instruction of lost condition, and then start anti-theft modes.
3rd, the instruction that password is reset is being obtained, but when not obtaining the information for confirming password replacement from stand-by equipment, moved Dynamic terminal obtains the instruction of the machine loss.
Judge that the another way that mobile terminal is in lost condition is that mobile terminal cannot be introduced into operation because of code error Interface, can provide the guide of change of secret code, if currently used people tries to enter operation circle by changing the channel of password The authority in face, mobile terminal can propose whether checking user possesses the means for the authority for changing password, such as input original password, Or the answer of new password or input validation problem is received by other stand-by equipments or the identity of real-name authentication is inputted Information etc., but no matter which kind of mode, will by stand-by equipment to mobile terminal send confirm password modification instruction be defined, it is no Then to estimate this change of secret code illegal for mobile terminal, confirms that mobile terminal is in lost condition, starts anti-theft modes.
Stand-by equipment can be user in the default backup phone number of mobile terminal, standby email address, this is default Backup phone number, standby email address information upload Cloud Server and preserved simultaneously.
4th, when obtaining the instruction of SIM card change but not obtaining the information for the confirmation SIM card change that stand-by equipment is sent, The instruction that acquisition for mobile terminal the machine is lost.
When mobile terminal is replaced SIM card, to ensure that the action is user's operation, mobile terminal is from trend stand-by equipment Prompting message is sent, when acting legal instruction of the replacing SIM card is confirmed when stand-by equipment is sent, then mobile terminal is not in Under illegal control, when acting legal instruction of the replacing SIM card is confirmed when stand-by equipment is not sent, then mobile terminal is estimated This SIM card replacing action is illegal, confirms that mobile terminal is in lost condition, starts anti-theft modes.
5th, after the information for the machine loss that stand-by equipment is sent is obtained, the instruction that acquisition for mobile terminal the machine is lost.
When mobile terminal is lost, user can send loss to mobile device by default stand-by equipment and instruct, and move When dynamic terminal receives the instruction, confirm that the machine is in lost condition, start anti-theft modes.
Second step, obtains Internet resources, automatically by locally-stored material upload Cloud Server simultaneously according to the instruction Delete local data;
When mobile terminal obtains the machine by above channel is in the instruction of lost condition, opening anti-theft pattern, i.e., certainly The dynamic network that passes through is by the material upload Cloud Server stored on mobile terminal, while local data is deleted, to protect user to store In the data security of mobile terminal;Due to mobile terminal probably due to departing from conventional Wi-Fi environment and closing data network and make Mobile terminal is in the state without network, and now mobile terminal automatically turns on mobile data network or automatically turns on WiFi moulds The search of block 102 can be connected with Wi-Fi wireless networks and automatically, pass through mobile data network or the Wi-Fi wireless networks connected By the material upload Cloud Server stored on mobile terminal, while deleting local data.
3rd step, opening locating device is simultaneously locked, and the out code prelocalization device from Cloud Server is not being got Local out code is not received;
Receive after the instruction that the machine has been lost, mobile terminal will also be except data on the processing mobile terminal of safety The operation for starting and helping user to give mobile terminal for change is carved, concrete operations are:Opening locating device, the positioner is included but not It is limited to the functional modules such as GPS, wireless network positioning, sensor positioning;Make positioner keep lasting to open, and do not receive this The instruction of the closing positioner of ground input, deliberately closes positioner with the people of the tamper-proof mobile terminal and hides tracking.Only Will the owner of the mobile terminal log in personal account from cloud server end and send the machine to mobile terminal and given for change or closed When positioner is instructed, the positioner of mobile terminal just performs closing.In the case that mobile terminal shuts down, open anti- What the mobile terminal of robber's pattern entered is false off-mode, that is, shuts down but do not close positioner, positioner is in operation State, until electricity exhausts.But when mobile terminal is connected with the mains, positioner is waken up at once.
4th step, positioner detects ownship position information in real time and the synchronous positional information is to Cloud Server.
Under anti-theft modes, positioner is opened and detects the location of mobile terminal information in real time, and by detection Positional information uploads to Cloud Server or other equipment authorized by network, so that the owner of mobile terminal passes through cloud service Device or the stand-by equipment of mandate consult the positional information, and find by positional information the mobile terminal of loss.What is authorized is standby Equipment includes terminal where spare mobile phone, default mailbox etc..For example by the positional information of detection by short message sending to standby Mobile phone, positional information that user is received by spare mobile phone, grasps the location of mobile terminal for losing, so as to give loss for change Mobile terminal;Or the positional information of detection by mail is sent to default mailbox, user is by logging in default mailbox Positional information is obtained, the location of the mobile terminal of loss is grasped, so as to give the mobile terminal of loss for change.Number of spare mobile phone Code and default mailbox need user to be set in anti-theft modes presupposed information, and the default information can all upload cloud service Device carries out backup preservation.
The mobile terminal of implementation above, it is determined that mobile terminal is after lost condition, opening anti-theft pattern will be mobile whole The local material upload Cloud Server in end is backed up so that subscriber data is not lost, at the same delete the local data of mobile terminal so as not to Family data leaks, and obtains the real-time position information of mobile terminal while opening positioner and uploads to Cloud Server, to help User gives the mobile terminal of loss for change according to the positional information of acquisition.
Embodiment seven
Seventh embodiment of the invention provides a kind of mobile terminal, as shown in figure 1, including memory 109, the and of processor 110 At least one is stored in the memory 109 and is configured as the anti-theft program performed by the processor 110, described anti- Robber's program is configurable for performing embodiment two, embodiment three, example IV, the step of embodiment five any one theft preventing method Suddenly, it will not be repeated here.
Embodiment eight
Eighth embodiment of the invention is provided deposits on a kind of computer-readable recording medium, the computer-readable recording medium Guarding against theft for mobile terminal program is contained, the guarding against theft for mobile terminal program realizes following steps when being executed by processor:
The first step, the instruction that acquisition for mobile terminal the machine is lost;
Confirm after the fact that mobile terminal is lost, mobile terminal starts anti-theft modes.General mobile terminal determines to lose The fact, it can voluntarily judge to learn according to the generation of some suspicious event for mobile terminal, can also be by receiving cloud service The loss of device or stand-by equipment instructs and judges to learn.Following several situations can specifically be included:
1st, when the number of times that mobile terminal obtains wrong unlocking cipher in setting time exceedes the setting upper limit, mobile terminal Obtain the instruction that the machine is lost.
The upper limit number of times statistics of mistake unlocking cipher input, should be the statistics in a setting time, the setting time Can be 24 hours or other times.The unlocking cipher can be finger-print cipher or numerical ciphers, for example, be set in 24 small When drawback lock Password Input mistake 10 times, that is, judge the mobile terminal not under proprietary control, as it is mobile eventually Lose at end.The setting upper limit of 10 times, can be the number of times or independent numerical ciphers of independent finger-print cipher input error The number of times of input error, or numerical ciphers and the unlocking times of finger-print cipher altogether.
2nd, the instruction that the machine of acquisition for mobile terminal from Cloud Server is lost.
When judging whether mobile terminal is lost, the order by receiving Cloud Server is a mode.Specifically, user Can be then whole to movement by personal account by logging in the personal account of Cloud Server with the account that customer mobile terminal is bound The client that end is sent on the instruction of mobile terminal loss, mobile terminal is received after the instruction, and mobile terminal is to obtain at the machine In the instruction of lost condition, and then start anti-theft modes.
3rd, the instruction that password is reset is being obtained, but when not obtaining the information for confirming password replacement from stand-by equipment, moved Dynamic terminal obtains the instruction of the machine loss.
Judge that the another way that mobile terminal is in lost condition is that mobile terminal cannot be introduced into operation because of code error Interface, can provide the guide of change of secret code, if currently used people tries to enter operation circle by changing the channel of password The authority in face, mobile terminal can propose whether checking user possesses the means for the authority for changing password, such as input original password, Or the answer of new password or input validation problem is received by other stand-by equipments or the identity of real-name authentication is inputted Information etc., but no matter which kind of mode, will by stand-by equipment to mobile terminal send confirm password modification instruction be defined, it is no Then to estimate this change of secret code illegal for mobile terminal, confirms that mobile terminal is in lost condition, starts anti-theft modes.
Stand-by equipment can be user in the default backup phone number of mobile terminal, standby email address, this is default Backup phone number, standby email address information upload Cloud Server and preserved simultaneously.
4th, when obtaining the instruction of SIM card change but not obtaining the information for the confirmation SIM card change that stand-by equipment is sent, The instruction that acquisition for mobile terminal the machine is lost.
When mobile terminal is replaced SIM card, to ensure that the action is user's operation, mobile terminal is from trend stand-by equipment Prompting message is sent, when acting legal instruction of the replacing SIM card is confirmed when stand-by equipment is sent, then mobile terminal is not in Under illegal control, when acting legal instruction of the replacing SIM card is confirmed when stand-by equipment is not sent, then mobile terminal is estimated This SIM card replacing action is illegal, confirms that mobile terminal is in lost condition, starts anti-theft modes.
5th, after the information for the machine loss that stand-by equipment is sent is obtained, the instruction that acquisition for mobile terminal the machine is lost.
When mobile terminal is lost, user can send loss to mobile device by default stand-by equipment and instruct, and move When dynamic terminal receives the instruction, confirm that the machine is in lost condition, start anti-theft modes.
Second step, obtains Internet resources, automatically by locally-stored material upload Cloud Server simultaneously according to the instruction Delete local data;
When mobile terminal obtains the machine by above channel is in the instruction of lost condition, opening anti-theft pattern, i.e., certainly The dynamic network that passes through is by the material upload Cloud Server stored on mobile terminal, while local data is deleted, to protect user to store In the data security of mobile terminal;Due to mobile terminal probably due to departing from conventional Wi-Fi environment and closing data network and make Mobile terminal is in the state without network, and now mobile terminal, which automatically turns on mobile data network or search, can use Wi-Fi Wireless network is simultaneously connected automatically, will be stored by mobile data network or the Wi-Fi wireless networks connected on mobile terminal Material upload Cloud Server, while deleting local data.
3rd step, opening locating device is simultaneously locked, and the out code prelocalization device from Cloud Server is not being got Local out code is not received;
Receive after the instruction that the machine has been lost, mobile terminal will also be except data on the processing mobile terminal of safety The operation for starting and helping user to give mobile terminal for change is carved, concrete operations are:Opening locating device, the positioner is included but not It is limited to the functional modules such as GPS, wireless network positioning, sensor positioning, positioner is kept lasting and open, do not receive local defeated The instruction of the closing positioner entered, deliberately closes positioner with the people of the tamper-proof mobile terminal and hides tracking.As long as should The owner of mobile terminal logs in personal account and send the machine to mobile terminal from cloud server end has given or has closed positioning for change When device is instructed, the positioner of mobile terminal just performs closing.In the case that mobile terminal shuts down, opening anti-theft mould What the mobile terminal of formula entered is false off-mode, that is, shuts down but do not close positioner, positioner is in running status, Until electricity exhausts.But when mobile terminal is connected with the mains, positioner is waken up at once.
4th step, positioner detects ownship position information in real time and the synchronous positional information is to Cloud Server.
Under anti-theft modes, positioner is opened and detects the location of mobile terminal information in real time, and by detection Positional information uploads to Cloud Server or other equipment authorized by network, so that the owner of mobile terminal passes through cloud service Device or the stand-by equipment of mandate consult the positional information, and find by positional information the mobile terminal of loss.What is authorized is standby Equipment includes terminal where spare mobile phone, default mailbox etc..For example by the positional information of detection by short message sending to standby Mobile phone, positional information that user is received by spare mobile phone, grasps the location of mobile terminal for losing, so as to give loss for change Mobile terminal;Or the positional information of detection by mail is sent to default mailbox, user is by logging in default mailbox Positional information is obtained, the location of the mobile terminal of loss is grasped, so as to give the mobile terminal of loss for change.Number of spare mobile phone Code and default mailbox need user to be set in anti-theft modes presupposed information, and the default information can all upload cloud service Device carries out backup preservation.
The computer-readable recording medium of implementation above, when the guarding against theft for mobile terminal program of its storage is handled by least one After device is performed, following effect is realized:
It is determined that terminal residing for processor be in lost condition after, opening anti-theft pattern, by the material upload of terminal local Cloud Server is backed up so that subscriber data is not lost, while deletion terminal local data is opened in order to avoid subscriber data leaks simultaneously Positioner obtains the real-time position information of terminal and uploads to Cloud Server, to help user to be looked for according to the positional information of acquisition Return the terminal lost.
Embodiment nine
Ninth embodiment of the invention is provided deposits on a kind of computer-readable recording medium, the computer-readable recording medium Contain guarding against theft for mobile terminal program, the guarding against theft for mobile terminal program realized when being executed by processor embodiment two, embodiment three, The step of example IV, any one theft preventing method of embodiment five, it will not be repeated here.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row His property is included, so that process, method, article or device including a series of key elements not only include those key elements, and And also including other key elements being not expressly set out, or also include for this process, method, article or device institute inherently Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this Also there is other identical element in process, method, article or the device of key element.
The embodiments of the present invention are for illustration only, and the quality of embodiment is not represented.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Understood based on such, technical scheme is substantially done to prior art in other words Going out the part of contribution can be embodied in the form of software product, and the computer software product is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), including some instructions are to cause a station terminal (can be mobile phone, computer, service Device, air conditioner, or network equipment etc.) perform method described in each of the invention embodiment.
Embodiments of the invention are described above in conjunction with accompanying drawing, but the invention is not limited in above-mentioned specific Embodiment, above-mentioned embodiment is only schematical, rather than restricted, one of ordinary skill in the art Under the enlightenment of the present invention, in the case of present inventive concept and scope of the claimed protection is not departed from, it can also make a lot Form, these are belonged within the protection of the present invention.

Claims (10)

1. a kind of anti-theft method for mobile terminal, it is characterised in that:It the described method comprises the following steps:
The instruction that acquisition for mobile terminal the machine is lost;
Internet resources are obtained according to the instruction, locally-stored material upload Cloud Server is deleted to local money simultaneously automatically Material;
Opening locating device is simultaneously locked, and local pass is not received not getting the out code prelocalization device from Cloud Server Close instruction;
Positioner detects ownship position information in real time and the synchronous positional information is to Cloud Server.
2. anti-theft method for mobile terminal according to claim 1, it is characterised in that:Described acquisition for mobile terminal the machine is lost Instruction before, methods described also include step:
User fingerprints information is enrolled, it is using finger print information as the unlocking cipher of mobile terminal, the finger print information is whole with movement The International Mobile Equipment Identity code binding at end, uploads the finger print information and International Mobile Equipment Identity code arrives Cloud Server.
3. anti-theft method for mobile terminal according to claim 1, it is characterised in that:Described acquisition for mobile terminal the machine is lost Instruction specifically include:
When the number of times that mobile terminal obtains wrong unlocking cipher in setting time exceedes the setting upper limit, acquisition for mobile terminal sheet The instruction that machine is lost;Or
The instruction that the machine of acquisition for mobile terminal from Cloud Server is lost;Or
When obtaining the instruction of password replacement but not obtaining the information for confirming password replacement from stand-by equipment, mobile terminal Obtain the instruction that the machine is lost;Or
It is mobile whole when obtaining the instruction of SIM card change but not obtaining the information for the confirmation SIM card change that stand-by equipment is sent End obtains the instruction that the machine is lost;Or
The information that the machine of acquisition for mobile terminal from stand-by equipment is lost.
4. anti-theft method for mobile terminal according to claim 1, it is characterised in that:The positioner detects the machine in real time Positional information and the synchronous positional information are to after Cloud Server, and methods described also includes step:
The prompting message of the machine loss is sent to the default stand-by equipment of mobile terminal, the prompting message is worked as comprising mobile terminal Front position information, default prompting message, new insert SIM card number one or more.
5. anti-theft method for mobile terminal according to claim 1, it is characterised in that:The step is obtained according to the instruction Internet resources, automatically by the material upload Cloud Server stored on mobile terminal, are specifically included while deleting local data:
Mobile data network is automatically turned on and by mobile data network by the data stored on mobile terminal according to the instruction Cloud Server is uploaded, while deleting local data;Or
It can be connected according to the instruction search with Wi-Fi wireless networks and automatically, passing through connected Wi-Fi wireless networks will shifting The material upload Cloud Server stored in dynamic terminal, while deleting local data.
6. anti-theft method for mobile terminal according to claim 1, it is characterised in that:The positioner detects the machine in real time Positional information and the synchronous positional information are to after Cloud Server, and methods described also includes step:
The instruction that the machine from Cloud Server has been given for change is received, backup information is downloaded from Cloud Server automatically, positioning is released Device opens the instruction of locking.
7. anti-theft method for mobile terminal according to claim 1, it is characterised in that:The positioner detects the machine in real time Positional information and the synchronous positional information are to after Cloud Server, and methods described also includes step:
Obtain the signal of mobile terminal shutdown, turning-off mobile terminal but the positioner continuous firing for keeping mobile terminal.
8. anti-theft method for mobile terminal according to claim 1, it is characterised in that:The positioner detects the machine in real time Positional information and the synchronous positional information are to after Cloud Server, and methods described also includes step:
When obtaining mobile terminal brush machine signal, open up the deposit of private partition in the hard disk of mobile terminal automatically and refer to comprising user User's identification program and information including line information, and keep backstage automatic running and perform user's identification, come until receiving The private partition is voluntarily destroyed after having given instruction for change from the machine of Cloud Server.
9. a kind of mobile terminal, including memory, processor and at least one be stored in the memory and be configured as By the application program of the computing device, it is characterised in that at least one described application program is configurable for right of execution Profit requires the anti-theft method for mobile terminal described in any one of 1 to 8 claim.
10. a kind of computer-readable recording medium, it is characterised in that be stored with the computer-readable recording medium mobile whole Anti-theft program is held, is realized when the guarding against theft for mobile terminal program is executed by processor as any one of claim 1 to 8 The step of anti-theft method for mobile terminal.
CN201710343395.9A 2017-05-16 2017-05-16 Anti-theft method for mobile terminal, mobile terminal and computer-readable recording medium Pending CN107194291A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710343395.9A CN107194291A (en) 2017-05-16 2017-05-16 Anti-theft method for mobile terminal, mobile terminal and computer-readable recording medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710343395.9A CN107194291A (en) 2017-05-16 2017-05-16 Anti-theft method for mobile terminal, mobile terminal and computer-readable recording medium

Publications (1)

Publication Number Publication Date
CN107194291A true CN107194291A (en) 2017-09-22

Family

ID=59873695

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710343395.9A Pending CN107194291A (en) 2017-05-16 2017-05-16 Anti-theft method for mobile terminal, mobile terminal and computer-readable recording medium

Country Status (1)

Country Link
CN (1) CN107194291A (en)

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107493395A (en) * 2017-09-30 2017-12-19 陈银芳 The data destroying method and Related product of smart mobile phone
CN107610432A (en) * 2017-10-16 2018-01-19 李修球 A kind of intelligent alarm method, system and intelligent mobile terminal
CN107707746A (en) * 2017-09-25 2018-02-16 北京珠穆朗玛移动通信有限公司 Management method, electronic equipment and the storage medium of mobile terminal
CN107819752A (en) * 2017-10-30 2018-03-20 维沃移动通信有限公司 A kind of document protection method and mobile terminal
CN107908976A (en) * 2017-12-07 2018-04-13 珠海市横琴新区龙族科技有限公司 The concealed secret control device in electronic equipment backstage and its method
CN108241805A (en) * 2018-01-02 2018-07-03 联想(北京)有限公司 For handling the method for data, equipment and memory devices
CN108764409A (en) * 2018-05-31 2018-11-06 国网河南省电力公司检修公司 Secondary device machine account management system
CN108810239A (en) * 2017-12-24 2018-11-13 湛江正信科技服务有限公司 Method, apparatus, intelligent terminal and the storage medium that intelligent terminal is recovered
CN109117666A (en) * 2018-07-27 2019-01-01 深圳市国通世纪科技开发有限公司 Lose terminal safety protection method, computer equipment and storage medium
CN109379706A (en) * 2018-08-15 2019-02-22 深圳壹账通智能科技有限公司 Anti-theft method for mobile terminal, device, system and storage medium
CN109460648A (en) * 2018-11-13 2019-03-12 广东财经大学 A kind of computer data defence method
CN109561068A (en) * 2018-10-23 2019-04-02 芜湖汉科信息技术有限公司 A kind of information terminal safety system
CN109981894A (en) * 2019-02-28 2019-07-05 北京基软科技有限公司 A kind of anti-mobile phone loss device
CN110308874A (en) * 2019-06-27 2019-10-08 青海民族大学 A kind of portable intelligent storage device and method
CN110620847A (en) * 2019-10-21 2019-12-27 深圳传音控股股份有限公司 Anti-theft method of intelligent terminal and intelligent terminal
CN111132133A (en) * 2019-12-27 2020-05-08 珠海市魅族科技有限公司 Terminal searching method and device, storage medium and electronic device
CN111310247A (en) * 2020-03-11 2020-06-19 温州市音咯网络科技有限公司 Anti-theft device of information secrecy hard disk
CN111372239A (en) * 2020-02-26 2020-07-03 珠海市魅族科技有限公司 Anti-theft control method of intelligent terminal, intelligent terminal and anti-theft system of intelligent terminal
CN111523096A (en) * 2020-04-08 2020-08-11 深圳市筑泰防务智能科技有限公司 Security management and control method, device, terminal, system and readable storage medium for terminal user
CN111542047A (en) * 2020-03-30 2020-08-14 宇龙计算机通信科技(深圳)有限公司 Data uploading method and device, storage medium and related equipment
CN113076564A (en) * 2021-04-13 2021-07-06 山东北斗云信息技术有限公司 Hard disk protection method, device and equipment based on Beidou positioning and storage medium
CN113676244A (en) * 2021-08-10 2021-11-19 南京熊猫电子股份有限公司 Control method and system based on satellite mobile communication terminal
CN114157754A (en) * 2021-12-11 2022-03-08 天翼电信终端有限公司 Lost mobile phone retrieving method, system and storage medium based on eSIM card
CN114205734A (en) * 2020-09-01 2022-03-18 成都鼎桥通信技术有限公司 Control method, device and equipment of positioning function and storage medium
CN115706747A (en) * 2021-08-05 2023-02-17 北京小米移动软件有限公司 Terminal control method and device, electronic equipment and computer readable storage medium
CN116132570A (en) * 2023-04-13 2023-05-16 深圳市光速时代科技有限公司 Control method and system for remote interaction based on intelligent watch
CN116471129A (en) * 2023-06-20 2023-07-21 深圳市美力高集团有限公司 Security monitoring data secure storage system and method based on big data analysis

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101252703A (en) * 2008-03-28 2008-08-27 宇龙计算机通信科技(深圳)有限公司 Terminal data protecting method, system as well as mobile communication terminal
CN103220646A (en) * 2013-04-24 2013-07-24 广东欧珀移动通信有限公司 Method and system for finding mobile terminal device based on short message
CN105100383A (en) * 2014-05-22 2015-11-25 南京大五教育科技有限公司 Mobile phone antitheft and tracking positioning system
CN106060796A (en) * 2016-06-01 2016-10-26 宇龙计算机通信科技(深圳)有限公司 Method and device for destroying backups of terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101252703A (en) * 2008-03-28 2008-08-27 宇龙计算机通信科技(深圳)有限公司 Terminal data protecting method, system as well as mobile communication terminal
CN103220646A (en) * 2013-04-24 2013-07-24 广东欧珀移动通信有限公司 Method and system for finding mobile terminal device based on short message
CN105100383A (en) * 2014-05-22 2015-11-25 南京大五教育科技有限公司 Mobile phone antitheft and tracking positioning system
CN106060796A (en) * 2016-06-01 2016-10-26 宇龙计算机通信科技(深圳)有限公司 Method and device for destroying backups of terminal

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
《电子报》编辑部: "《2014年电子报合订本 下》", 30 November 2014, 电子科技大学出版社 *

Cited By (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107707746B (en) * 2017-09-25 2021-02-23 北京珠穆朗玛移动通信有限公司 Management method of mobile terminal, electronic device and storage medium
CN107707746A (en) * 2017-09-25 2018-02-16 北京珠穆朗玛移动通信有限公司 Management method, electronic equipment and the storage medium of mobile terminal
CN107493395A (en) * 2017-09-30 2017-12-19 陈银芳 The data destroying method and Related product of smart mobile phone
CN107610432A (en) * 2017-10-16 2018-01-19 李修球 A kind of intelligent alarm method, system and intelligent mobile terminal
CN107819752A (en) * 2017-10-30 2018-03-20 维沃移动通信有限公司 A kind of document protection method and mobile terminal
CN107819752B (en) * 2017-10-30 2020-06-30 维沃移动通信有限公司 File protection method, mobile terminal and computer readable storage medium
CN107908976A (en) * 2017-12-07 2018-04-13 珠海市横琴新区龙族科技有限公司 The concealed secret control device in electronic equipment backstage and its method
CN108810239A (en) * 2017-12-24 2018-11-13 湛江正信科技服务有限公司 Method, apparatus, intelligent terminal and the storage medium that intelligent terminal is recovered
CN108241805A (en) * 2018-01-02 2018-07-03 联想(北京)有限公司 For handling the method for data, equipment and memory devices
CN108241805B (en) * 2018-01-02 2021-12-24 联想(北京)有限公司 Method, device and memory device for processing data
CN108764409A (en) * 2018-05-31 2018-11-06 国网河南省电力公司检修公司 Secondary device machine account management system
CN109117666A (en) * 2018-07-27 2019-01-01 深圳市国通世纪科技开发有限公司 Lose terminal safety protection method, computer equipment and storage medium
CN109379706A (en) * 2018-08-15 2019-02-22 深圳壹账通智能科技有限公司 Anti-theft method for mobile terminal, device, system and storage medium
CN109561068A (en) * 2018-10-23 2019-04-02 芜湖汉科信息技术有限公司 A kind of information terminal safety system
CN109460648A (en) * 2018-11-13 2019-03-12 广东财经大学 A kind of computer data defence method
CN109460648B (en) * 2018-11-13 2021-06-22 广东财经大学 Computer data defense method
CN109981894A (en) * 2019-02-28 2019-07-05 北京基软科技有限公司 A kind of anti-mobile phone loss device
CN110308874A (en) * 2019-06-27 2019-10-08 青海民族大学 A kind of portable intelligent storage device and method
CN110620847A (en) * 2019-10-21 2019-12-27 深圳传音控股股份有限公司 Anti-theft method of intelligent terminal and intelligent terminal
CN110620847B (en) * 2019-10-21 2022-08-30 深圳传音控股股份有限公司 Anti-theft method of intelligent terminal and intelligent terminal
CN111132133A (en) * 2019-12-27 2020-05-08 珠海市魅族科技有限公司 Terminal searching method and device, storage medium and electronic device
CN111372239A (en) * 2020-02-26 2020-07-03 珠海市魅族科技有限公司 Anti-theft control method of intelligent terminal, intelligent terminal and anti-theft system of intelligent terminal
CN111310247A (en) * 2020-03-11 2020-06-19 温州市音咯网络科技有限公司 Anti-theft device of information secrecy hard disk
CN111542047A (en) * 2020-03-30 2020-08-14 宇龙计算机通信科技(深圳)有限公司 Data uploading method and device, storage medium and related equipment
CN111523096A (en) * 2020-04-08 2020-08-11 深圳市筑泰防务智能科技有限公司 Security management and control method, device, terminal, system and readable storage medium for terminal user
CN114205734A (en) * 2020-09-01 2022-03-18 成都鼎桥通信技术有限公司 Control method, device and equipment of positioning function and storage medium
CN113076564A (en) * 2021-04-13 2021-07-06 山东北斗云信息技术有限公司 Hard disk protection method, device and equipment based on Beidou positioning and storage medium
CN115706747A (en) * 2021-08-05 2023-02-17 北京小米移动软件有限公司 Terminal control method and device, electronic equipment and computer readable storage medium
CN113676244A (en) * 2021-08-10 2021-11-19 南京熊猫电子股份有限公司 Control method and system based on satellite mobile communication terminal
CN113676244B (en) * 2021-08-10 2022-09-02 南京熊猫电子股份有限公司 Control method and system based on satellite mobile communication terminal
CN114157754A (en) * 2021-12-11 2022-03-08 天翼电信终端有限公司 Lost mobile phone retrieving method, system and storage medium based on eSIM card
CN116132570A (en) * 2023-04-13 2023-05-16 深圳市光速时代科技有限公司 Control method and system for remote interaction based on intelligent watch
CN116471129A (en) * 2023-06-20 2023-07-21 深圳市美力高集团有限公司 Security monitoring data secure storage system and method based on big data analysis

Similar Documents

Publication Publication Date Title
CN107194291A (en) Anti-theft method for mobile terminal, mobile terminal and computer-readable recording medium
CN108289141A (en) A kind of the screen locking unlocking method and mobile terminal of mobile terminal
CN107315937A (en) A kind of method for secret protection, mobile terminal and computer-readable recording medium
CN107395850A (en) A kind of social communication information guard method, device and computer-readable recording medium
CN107862196A (en) Fingerprint verification method, mobile terminal and computer-readable recording medium
CN109618316A (en) Network share method, mobile terminal and storage medium
CN107122817A (en) Processing method and Quick Response Code terminal based on Quick Response Code
CN109522695A (en) Application program login method, computer end, mobile terminal, system and storage medium
CN109743696A (en) Identifying code encryption method, system and readable storage medium storing program for executing
CN108563959A (en) File encrypting method, device and computer storage media
CN108961489A (en) A kind of equipment wearing control method, terminal and computer readable storage medium
CN108063873A (en) A kind of application program authority configuring method, mobile terminal and storage medium
CN107343272A (en) A kind of data traffic sharing method and mobile terminal
CN108712567A (en) Theft preventing method, mobile terminal and the computer readable storage medium of mobile terminal
CN108206892A (en) Guard method, device, mobile terminal and the storage medium of contact person's privacy
CN107491682A (en) Terminal unlocking optimization method, terminal and computer-readable recording medium
CN107273738A (en) A kind of method of controlling security, terminal and computer-readable recording medium
CN108920917A (en) Log in end switching method, mobile terminal and computer readable storage medium
CN107516051A (en) A kind of data encryption storage method, device and computer-readable recording medium
CN107885988A (en) A kind of unlocking screen method, terminal and computer-readable recording medium
CN107707554A (en) A kind of login method and mobile terminal of application program account
CN107577961A (en) Mobile terminal and Related product available for security information protection
CN107562343A (en) A kind of interactive regulation and control method, equipment and computer-readable recording medium
CN108012270A (en) A kind of method of information processing, equipment and computer-readable recording medium
CN107220554A (en) A kind of file forwarding management method and corresponding system, terminal device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170922