CN107370737A - Target terminal and its corresponding guard method, protection device - Google Patents
Target terminal and its corresponding guard method, protection device Download PDFInfo
- Publication number
- CN107370737A CN107370737A CN201710616918.2A CN201710616918A CN107370737A CN 107370737 A CN107370737 A CN 107370737A CN 201710616918 A CN201710616918 A CN 201710616918A CN 107370737 A CN107370737 A CN 107370737A
- Authority
- CN
- China
- Prior art keywords
- target terminal
- contact person
- event
- secure relationship
- relationship people
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Telephone Function (AREA)
Abstract
The application provides a kind of target terminal and its corresponding guard method, protection device.The guard method of the target terminal includes:At least one contact person is added to the secure relationship people storehouse of target terminal;Judge whether the event on target terminal is predeterminable event;When the target terminal produces predeterminable event, the information including preset content is sent at least one contact person in the secure relationship people storehouse.The protection device of the target terminal includes:Secure relationship people storehouse, for storing at least one contact person;Event judge module, for judging whether the event on target terminal is predeterminable event;Message processing module, for when the target terminal produces predeterminable event, the information including preset content to be sent at least one contact person in the secure relationship people storehouse.In the application, when predeterminable event occurs in target terminal, i.e., the contact person in relevant information to secure relationship people storehouse is actively sent, so as to effectively raise the security performance of target terminal.
Description
Technical field
The application is related to mobile communication technology field, more particularly to a kind of target terminal and its corresponding guard method,
Protection device.
Background technology
With the rapid development of communication technology, various intelligent terminals are widely used.And carry and use for convenience, eventually
Also there is less and less trend therewith in the volume at end.This also causes increasing terminal stolen or is lost.
By taking mobile phone as an example, hand-set from stolen or after losing, stealer or the person of picking up are continuing with this after can changing SIM card
Mobile phone, in addition to the loss of property, the important information inside mobile phone also can be lost or reveal so original owner.
At present, mobile phone is designed by the way of separation between machine and card, and PIN is typically taken in the protection for SIM cards of mobile phones
Code and PUK code prevent SIM card to be abused, and after mobile phone loss, although SIM card can be protected, can not prevent mobile phone sheet
Body is inserted into other SIM cards and used.Also, after current mobile phone is lost, the positional information of mobile phone can not be accurately obtained,
So as to add difficulty for getting back mobile phone.
The content of the invention
In view of the above the shortcomings that prior art, the purpose of the application is to provide a kind of target terminal and its corresponding
Guard method, protection device, for solving the problems, such as the security difference of terminal in the prior art.
In order to achieve the above objects and other related objects, a kind of first aspect of the application, there is provided protection of target terminal
Method, including:At least one contact person is added to the secure relationship people storehouse of target terminal;Judge whether is event on target terminal
For predeterminable event;When the target terminal produces predeterminable event, the information including preset content is sent to the safety and joined
It is at least one contact person in people storehouse.
It is described to send the information including preset content to the peace in some embodiments of the application first aspect
The step of at least one contact person in full contact library, includes:Obtain the positional information of the target terminal;By what is got
Positional information is sent at least one contact person in the secure relationship people storehouse as preset content.
In some embodiments of the application first aspect, the peace that at least one contact person is added to target terminal
The step of full contact library, includes:At least one contact person is added to the secure relationship people storehouse of target terminal based on selection instruction;
Or/and the frequency of usage according to contact person in target terminal, the contact person that will be above the default frequency add the safety of target terminal
Contact library.
In some embodiments of the application first aspect, whether the event judged on target terminal is default thing
The mode of part includes one or more of:
When in once unblock event, when the unblock frequency of failure of target terminal is more than the first predetermined threshold value, judgement mesh
The event marked in terminal is predeterminable event;Or,
When in once unblock event, the unblock frequency of failure of target terminal is more than the second predetermined threshold value and less than first
Predetermined threshold value, while the identification of the target terminal is stuck in when occurring abnormal in the first preset time, judges target terminal
On event be predeterminable event;Or,
When in the second preset time, target terminal to the abnormality processing number of incoming call more than three predetermined threshold values when, judge
Event on target terminal is predeterminable event;Or,
When the unused time of target terminal is more than three preset times, it is default thing to judge the event on target terminal
Part.
It is described to send the information including preset content to the peace in some embodiments of the application first aspect
The step of at least one contact person in full contact library, includes:According to pre-set priority order, preset content will be included successively
Information send to the contact person in the secure relationship people storehouse.
The second aspect of the application, there is provided a kind of protection device of target terminal, including:Secure relationship people storehouse, for depositing
Store up at least one contact person;Event judge module, for judging whether the event on target terminal is predeterminable event;Information processing
Module, for when the target terminal produces predeterminable event, the information including preset content to be sent to the secure relationship
At least one contact person in people storehouse.
In some embodiments of the application second aspect, described information processing module includes:Positional information obtains single
Member, for obtaining the positional information of the target terminal;Information transmitting unit, for using the positional information got as default
Content is sent at least one contact person in the secure relationship people storehouse.
In some embodiments of the application second aspect, the protection device of the target terminal also includes:Sort mould
Block, for being ranked up according to pre-set priority to the contact person in secure relationship people storehouse;Described information processing module is used for root
According to the ranking results of order module, the information including preset content is sent to the contact in the secure relationship people storehouse successively
People.
In some embodiments of the application second aspect, the protection device of the target terminal also includes:Contact person
Acquisition module, at least one contact person to be added to the secure relationship people storehouse of target terminal based on selection instruction;Or/and press
According to the frequency of usage of contact person in target terminal, the contact person that will be above the default frequency adds the secure relationship people of target terminal
Storehouse.
In some embodiments of the application second aspect, the event judge module includes:Comparing unit, for
The frequency of failure and the first predetermined threshold value are unlocked with comparing in once unblock event;Identifying unit, thing is once unlocked same for working as
In part, when the unblock frequency of failure of target terminal is more than the first predetermined threshold value, judge that the event on target terminal is predeterminable event.
In some embodiments of the application second aspect, the event judge module includes:Comparing unit, for
The frequency of failure and the first predetermined threshold value, the second predetermined threshold value are unlocked with being respectively compared in once unblock event;Identification card is known
Other unit, for being more than the second predetermined threshold value and when being less than the first predetermined threshold value when the unblock frequency of failure of target terminal, to mesh
The identification card of mark terminal is identified;Identifying unit, it is default for being stuck in first in the identification of the target terminal
When occurring abnormal in the time, judge that the event on target terminal is predeterminable event.
In some embodiments of the application second aspect, the comparing unit is additionally operable to right in the second preset time
The abnormality processing number of incoming call is compared with the 3rd predetermined threshold value;The identifying unit is additionally operable to when target terminal is to incoming call
When abnormality processing number is more than three predetermined threshold values, judge that the event on target terminal is predeterminable event;Or/and the comparison
Unit is additionally operable to unused time and the 3rd preset time of comparison object terminal, and the identifying unit is additionally operable to when target terminal
When unused time is more than three preset times, judge that the event on target terminal is predeterminable event.
The third aspect of the application, there is provided a kind of target terminal, including:The protection of target terminal described in foregoing any one
Device.
As described above, an object of the application terminal and its corresponding guard method, protection device, have below beneficial to effect
Fruit:
In an object of the application terminal and its corresponding guard method, protection device, default thing occurs on a target terminal
During part, then relevant information (such as positional information) is actively sent to the middle contact person in secure relationship people storehouse, with timely notice to correlation
Contact person, so as to improve the security of target terminal;Furthermore it is also possible to sent information to successively according to the order of pre-set priority
Related Contact, the success rate of transmission can be effectively improved by such mode, and then further improve target terminal
Security.
Brief description of the drawings
Fig. 1 is shown as the structural representation of an implementation of the protection device of the application target terminal.
Fig. 2 is shown as the structural representation of another implementation of the protection device of the application target terminal.
Fig. 3 is shown as the schematic flow sheet of an implementation of the guard method of the application target terminal.
Embodiment
Presently filed embodiment is illustrated by particular specific embodiment below, those skilled in the art can be by this explanation
Content disclosed by book understands other advantages and effect of the application easily.
In described below, refer to the attached drawing, accompanying drawing describes some embodiments of the application.It should be appreciated that also it can be used
Other embodiment, and can be carried out in the case of without departing substantially from spirit and scope of the present disclosure mechanical composition, structure, electrically with
And the detailed description below operational change should not be considered limiting, and the scope of embodiments herein
Only terms used herein are limited by the claims for the patent announced merely to describing specific embodiment, and be not
It is intended to limit the application.The term of space correlation, for example, " on ", " under ", "left", "right", " following ", " lower section ", " bottom ",
" top ", " top " etc., it can use in the text in order to illustrate an element shown in figure or feature and another element or spy
The relation of sign.
Although the grade of term first, second is used for describing various elements herein in some instances, these elements
It should not be limited by these terms.These terms are only used for making a distinction an element with another element.For example, first is pre-
If threshold value can be referred to as the second predetermined threshold value or the 3rd predetermined threshold value, and similarly, the second predetermined threshold value can be referred to as
First predetermined threshold value or the 3rd predetermined threshold value, without departing from the scope of various described embodiments.First predetermined threshold value and pre-
If threshold value is to describe a threshold value, but unless context otherwise explicitly points out, otherwise they are not same
Predetermined threshold value.Similar situation also includes the first preset time, the second preset time and the 3rd preset time etc..
Furthermore as used in herein, singulative " one ", "one" and "the" are intended to also include plural shape
Formula, unless having opposite instruction in context it will be further understood that term "comprising", " comprising " show described spy be present
Sign, step, operation, element, component, project, species, and/or group, but it is not excluded for other one or more features, step, behaviour
Work, element, component, project, the presence of species, and/or group, appearance or addition term "or" used herein and "and/or" quilt
Be construed to inclusive, or mean any one or any combinations therefore, " A, B or C " or " A, B and/or C " mean " with
Descend any one:A;B;C;A and B;A and C;B and C;A, B and C " are only when element, function, step or the combination of operation are in some sides
When inherently mutually exclusive under formula, the exception of this definition just occurs.
Referring to Fig. 1, Fig. 1 is shown as the structural representation of the protection device of the application target terminal, as illustrated, described
The protection device 1 of target terminal includes:
Secure relationship people storehouse 10 is used to store at least one contact person.In an embodiment, the secure relationship people storehouse 10
It can be realized by memory;Memory may include high-speed random access memory, and may also include nonvolatile memory, example
Such as one or more disk storage equipments, flash memory device or other non-volatile solid-state memory devices.In certain embodiments, deposit
Reservoir can also include the memory away from one or more processors, such as via RF circuits or outside port and communication network
Network (not shown) access network attached storage, wherein the communication network can be internet, one or more in-house networks,
LAN (LAN), wide area network (WLAN), storage area network (SAN) etc., or its is appropriately combined.Memory Controller is controllable to be set up
Access of standby such as CPU and Peripheral Interface etc the other assemblies to memory.
In the present embodiment, a contact person can be included in the secure relationship people storehouse 10, multiple contacts can also be included
People.Contact person in secure relationship people storehouse can be that the demand based on user is set or according in target terminal
The frequency of usage of contact person, the contact person with higher frequency of usage is added to secure relationship people storehouse.It is arranged at safe
It is that contact person in people storehouse can be the cell-phone number of kith and kin or another phone number of user etc. of the target terminal.
As shown in figure 1, the protection device 1 of the target terminal can also include:Contact person's acquisition module 40, for based on
Selection instruction adds at least one contact person in the secure relationship people storehouse of target terminal;Or/and according to contact person in target terminal
Frequency of usage, the contact person that will be above the default frequency adds the secure relationship people storehouse of target terminal.
The module of contact person's acquisition module 40 can be realized based on touch-screen etc. to the equipment of man-machine interaction, such as
Handset touch panel receives the input of user based on tactile and/or tactile contact.User interface, Yong Hujie are shown on the touchscreen
Multiple user interface objects are provided with face, the user interface object is the object of the user interface of constitution equipment, can be included
But it is not limited to text, image, icon, soft-key button (or " virtual push button "), drop-down menu, radio button, check box, optional list
Etc..Shown user interface object can include:Nonreciprocal pair for transmission information or composition user interface outward appearance
As, be available for user mutual interactive object or its combination.
Because touch-screen can form a touch sensitive surface for receiving user's input, therefore the touch-screen and touch-screen control
Contact on device (together with any associated module and/or instruction set in memory) processed detection touch-screen is (and described
Any movement or interruption touched), and by the contact transformation detected into showing such as one or more on the touchscreen
The interaction of the user interface object of soft-key button etc.In one exemplary embodiment, the contact point between touch-screen and user
Corresponding to one or more fingers of user.The touch-screen can use LCD (liquid crystal display) technologies or LPD (light-emissive polymers
Thing display) technology, but other Display Techniques can be used in other embodiments.Touch-screen and touch screen controller can use
Any one of a variety of Touch technologies include but is not limited to electricity to detect contact and its mobile or interruption, these Touch technologies
Appearance, resistance, infrared and surface acoustic wave techniques, and other proximity sensor arrays, or for determining what is be in contact with touch-screen
The other technologies of one or more points.Touch-screen shows the visual output from portable set, and touch plate does not provide visually
Output.Touch-screen can have the resolution ratio higher than 100dpi.In one exemplary embodiment, touch-screen can have about
168dpi resolution ratio.User can use any appropriate object or accessory, such as instruction pen, finger etc., be touched to contact
Screen.
In one exemplary embodiment, user to the user interface on touch-screen by inputting the instruction accordingly selected
(such as selecting a certain contact person as secure relationship people), so that demand of the user based on body body deposits at least one contact person
Storage is into secure relationship people storehouse 10.In another exemplary embodiment, target terminal makes to the contact person in certain period of time
It is ranked up with the frequency, frequency of usage highest contact person as secure relationship people and is stored into secure relationship people storehouse.When
So, can also will be multiple entirely without limitation by the use of the higher contact person of the frequency as secure relationship people, the application.
With continued reference to Fig. 1, the protection device of the target terminal also includes:Event judge module 20 and message processing module
30.The event judge module 20 is used to judge whether the event on target terminal is predeterminable event;Described information processing module
30 are used to, when the target terminal produces predeterminable event, the information including preset content is sent to the secure relationship people storehouse
In at least one contact person.
In the present embodiment, described information processing module can include:Location information acquiring unit and information transmitting unit (figure
Not shown in).The location information acquiring unit is used for the positional information for obtaining the target terminal;Described information transmitting element
For being sent the positional information got as preset content at least one contact person in the secure relationship people storehouse.
Specifically, by taking mobile phone as an example, the positional information can by GPS technology or mobile phone position service (LBS,
Location Based Services) to realize, the mobile phone position service is also known as Location Based Service, refer to pass through movement
Terminal and the cooperation of mobile network, determine the actual geographic position of mobile subscriber, there is provided position data to mobile subscriber or
Other people and communication system, realize the various business related to position.
In order to improve the security of target terminal, it is necessary to which the state that potential safety hazard (as stolen) to target terminal be present is carried out
Monitoring, with the Related Contact of the transmission relevant information of the timely active when there is potential safety hazard to secure relationship people storehouse.With hand
Exemplified by machine, when mobile phone has potential safety hazard (such as beneficial), it can be monitored by least following four event:First, one
Repeatedly unblock fails and (not unlocked yet successfully as unlocked 10 times) in secondary unblock event;Second, by repeatedly unblock, although predetermined
Unlocked successfully in number, but (such as three days) SIM card (Subscriber Identity Module, client within a short period of time
Identification module) it is replaced;Third, continuous several times (such as 10 times) are not handled incoming call, such as refuse to listen or do not connect;Fourth, shutdown shape
State exceedes the scheduled time (such as 3 days).By being monitored to above-mentioned event, the security of terminal can be effectively improved.
In one exemplary embodiment, the event judge module can include:Comparing unit and identifying unit are (in figure
It is not shown).The comparing unit is used in once unblock event compare the unblock frequency of failure and the first predetermined threshold value;It is described
Identifying unit is used to work as in once unblock event, when the unblock frequency of failure of target terminal is more than the first predetermined threshold value, sentences
The event to set the goal in terminal is predeterminable event.
For example, the first predetermined threshold value is set as 10;If in once unblock event, do not unlocked into yet more than 10 times
Work(, then the event for unlocking failure is sent out the information of correlation as predeterminable event, that is, as the condition for triggering transmission information
Deliver to the Related Contact in secure relationship people storehouse.
In a further exemplary embodiment, the event judge module can also include:Comparing unit, identification card are known
Other unit and identifying unit.The comparing unit is used in once unblock event be respectively compared the unblock frequency of failure and first
Predetermined threshold value, the second predetermined threshold value;The identification card recognition unit is used for when the unblock frequency of failure of target terminal is more than
Second predetermined threshold value and when being less than the first predetermined threshold value, the identification card of target terminal is identified;The identifying unit
For the identification of the target terminal be stuck in occur abnormal in the first preset time when, judge target terminal on event
For predeterminable event.
For example, the first predetermined threshold value is set as 10, and the second predetermined threshold value is 5;First preset time is 3 days;Simultaneously
The identification card (SIM card of such as mobile phone) of terminal is identified;If by 5 times with and 10 times within unlock successfully, then
After unlocking successfully continue that SIM card is identified in 3 days, if occurring SIM exceptions in 3 days, be such as replaced, then by new SIM
The positional information of terminal is obtained, and the information comprising positional information is sent to the Related Contact in secure relationship people storehouse.
Certainly, in other embodiments, the comparing unit is additionally operable in the second preset time to the exception of incoming call
Number is managed compared with the 3rd predetermined threshold value;The identifying unit is additionally operable to the abnormality processing number to incoming call when target terminal
During more than three predetermined threshold values, judge that the event on target terminal is predeterminable event;Or/and the comparing unit is additionally operable to compare
Unused time and the 3rd preset time compared with target terminal, the identifying unit are additionally operable to exceed when the unused time of target terminal
During three preset times, judge that the event on target terminal is predeterminable event.
For example, set for second scheduled time as 1 hour, the 3rd predetermined threshold value is 20;If within 1 hour, mesh
The incoming call (such as rejection or do not connect) of access failure in mark terminal is more than 20, then using this event as predeterminable event triggering, with
Send the Related Contact in relevant information to secure relationship people storehouse.
Or set the 3rd preset time as 2 days, if the unused time of target terminal more than 2 days, by this time shut down thing
Part triggers as predeterminable event, to send the Related Contact in relevant information to secure relationship people storehouse.
In a certain embodiment, the comparing unit is, for example, a comparison circuit, comparator or has conditional statement
Computer program realize.Comparing unit and judging unit are not the entirely different or independent device in physical significance herein
Part, in a particular application, the comparing unit and identifying unit can be realized by event monitor.
The event monitor can receive event information from peripheral interface.Foregoing predeterminable event can include on
A variety of subevents (for example, shutdown subevent, carry out electron event etc.).In certain embodiments, between event monitor is to make a reservation for
Send and ask every peripheral device interface.As response, peripheral interface transmitting event information.In other embodiments, only
When critical event (for example, receiving more than the scheduled time, more than pre-determined number) be present, peripheral interface ability transmission events
Information.
Described information processing module 30 can be realized by processor.Processor operationally with memory and/or non-volatile
Property storage device coupling.More specifically, processor can perform the instruction stored in memory and/or non-volatile memory device
To perform operation in computing device, such as generate view data and/or view data is transferred to electronic console.In this way,
Processor may include one or more general purpose microprocessors, one or more application specific processors (ASIC), one or more scenes
Programmable logic array (FPGA) or any combination of them.
Referring to Fig. 2, Fig. 2 is shown as the structural representation of another implementation of the protection device of the application target terminal
Figure, as illustrated, the protection device of the target terminal also includes:Order module 50.The order module 50 is used for according to pre-
Setting priority is ranked up to the contact person in secure relationship people storehouse;Described information processing module 30 is used for according to order module
Ranking results, the information including preset content is sent to the contact person in the secure relationship people storehouse successively.
In one exemplary embodiment, the order module 50 can be on the touch-screen of target terminal with user interface
Form is shown that user can be ranked up based on demand to the Affiliates List in secure relationship people storehouse, is such as set different
Priority, so, can be according to the order of priority, the first secure relationship to high priority when sending relevant information
People sends letter breath, so as to can not only improve transmitting efficiency, can also improve the success rate of information transmission, and then improve terminal
Security.
In another exemplary embodiment, the order module 50 is also based on each contact person in secure relationship people storehouse
Frequency of usage be ranked up, so, the priority of the high contact person of the frequency of usage contact person's low higher than frequency of usage is excellent
First level, so as to which when sending relevant information, the high contact person of frequency of usage can preferentially receive relevant information.
The protection device of the target terminal can be applied in portable mobile termianl, the portable mobile termianl
Including memory, Memory Controller, one or more processing units (CPU), Peripheral Interface, RF circuits, voicefrequency circuit, raise one's voice
Device, microphone, input/output (I/O) subsystem, touch-screen, other outputs or control device, and outside port.These groups
Part is communicated by one or more communication bus or signal wire.
The portable mobile termianl also includes being used for the power-supply system for various assemblies power supply.The power-supply system can wrap
Include power-supply management system, one or more power supplys (such as battery, alternating current (AC), charging system, power failure detection circuit,
Power supply changeover device or inverter, power supply status indicator (such as light emitting diode (LED), and with the electricity in portable set
Can other associated any components of generation, management and distribution.
In certain embodiments, the predetermined function set operation on the portable mobile termianl all by touch-screen or
Touch pad performs (if including touch pad in equipment).By the way that touch-screen and touch pad to be used as to the operation for equipment
Main input/control devices uses, it is possible to reduce being physically entered in equipment/control device (such as pressing button, dial
Etc.) quantity.In one embodiment, equipment include touch-screen, touch pad, for for equipment it is power on/off and locking
Pressing for equipment compresses switch, volume adjusting driving lever button, and for cutting the slide switch of ring configuration file.By pressing pressing
Button and the button is held in down state at preset time intervals, on/off equipment electricity can be carried out using the button
Source, or, by pressing button and discharging the button before by predetermined time interval, can be locked using the button
Equipment.In alternative embodiments, equipment can also receive phonetic entry by microphone, to activate or disable some work(
Energy.
The portable mobile termianl includes but is not limited to HPC, tablet personal computer, mobile phone, smart mobile phone, matchmaker
Body player, personal digital assistant (PDA) etc., include the combination of wherein two or multinomial.
Referring to Fig. 3, Fig. 3 is shown as flow signal of the guard method of the application target terminal in an implementation
Figure;As illustrated, the guard method of the target terminal includes:
Step S10, at least one contact person is added to the secure relationship people storehouse of target terminal;
The secure relationship people storehouse can be realized by memory;Memory may include high-speed random access memory, and
It may also include nonvolatile memory, such as one or more disk storage equipments, flash memory device or other nonvolatile solid states
Storage device.In certain embodiments, memory can also include away from one or more processors memory, such as via
The network attached storage that RF circuits or outside port and communication network (not shown) access, wherein the communication network can be with
It is internet, one or more in-house networks, LAN (LAN), wide area network (WLAN), storage area network (SAN) etc., or its is appropriate
Combination.Access of such as CPU and Peripheral Interface of Memory Controller controllable device etc the other assemblies to memory.
In the present embodiment, a contact person can be included in the secure relationship people storehouse, multiple contact persons can also be included.
Contact person in secure relationship people storehouse can be that the demand based on user is set or be contacted according in target terminal
The frequency of usage of people, the contact person with higher frequency of usage is added to secure relationship people storehouse.It is arranged at secure relationship people
Contact person in storehouse can be the cell-phone number of kith and kin or another phone number of user etc. of the target terminal.
In the present embodiment, it is described by least one contact person add target terminal secure relationship people storehouse the step of include:
At least one contact person is added to the secure relationship people storehouse of target terminal based on selection instruction;Or/and according to joining in target terminal
It is the frequency of usage of people, the contact person that will be above the default frequency adds the secure relationship people storehouse of target terminal.Specifically, the step
Contact person's acquisition module 40 that can be as shown in Figure 1 is realized.
The module of contact person's acquisition module 40 can be realized based on touch-screen etc. to the equipment of man-machine interaction, such as
Handset touch panel receives the input of user based on tactile and/or tactile contact.User interface, Yong Hujie are shown on the touchscreen
Multiple user interface objects are provided with face, the user interface object is the object of the user interface of constitution equipment, can be included
But it is not limited to text, image, icon, soft-key button (or " virtual push button "), drop-down menu, radio button, check box, optional list
Etc..Shown user interface object can include:Nonreciprocal pair for transmission information or composition user interface outward appearance
As, be available for user mutual interactive object or its combination.
Because touch-screen can form a touch sensitive surface for receiving user's input, therefore the touch-screen and touch-screen control
Contact on device (together with any associated module and/or instruction set in memory) processed detection touch-screen is (and described
Any movement or interruption touched), and by the contact transformation detected into showing such as one or more on the touchscreen
The interaction of the user interface object of soft-key button etc.In one exemplary embodiment, the contact point between touch-screen and user
Corresponding to one or more fingers of user.The touch-screen can use LCD (liquid crystal display) technologies or LPD (light-emissive polymers
Thing display) technology, but other Display Techniques can be used in other embodiments.Touch-screen and touch screen controller can use
Any one of a variety of Touch technologies include but is not limited to electricity to detect contact and its mobile or interruption, these Touch technologies
Appearance, resistance, infrared and surface acoustic wave techniques, and other proximity sensor arrays, or for determining what is be in contact with touch-screen
The other technologies of one or more points.Touch-screen shows the visual output from portable set, and touch plate does not provide visually
Output.Touch-screen can have the resolution ratio higher than 100dpi.In one exemplary embodiment, touch-screen can have about
168dpi resolution ratio.User can use any appropriate object or accessory, such as instruction pen, finger etc., be touched to contact
Screen.
In one exemplary embodiment, user to the user interface on touch-screen by inputting the instruction accordingly selected
(such as selecting a certain contact person as secure relationship people), so that demand of the user based on body body deposits at least one contact person
Storage is into secure relationship people storehouse 10.In another exemplary embodiment, target terminal makes to the contact person in certain period of time
It is ranked up with the frequency, frequency of usage highest contact person as secure relationship people and is stored into secure relationship people storehouse.When
So, can also will be multiple entirely without limitation by the use of the higher contact person of the frequency as secure relationship people, the application.
With continued reference to Fig. 3, step S20 is performed, judges whether the event on target terminal is predeterminable event;
When the target terminal produces predeterminable event, step S30 is performed, the information including preset content is sent to institute
State at least one contact person in secure relationship people storehouse.
Specifically, step S30:It is described to send the information including preset content into the secure relationship people storehouse at least
The step of one contact person, includes:Obtain the positional information of the target terminal;Using the positional information got as default interior
Hold and send at least one contact person in the secure relationship people storehouse.
In other embodiments, it is described to send the information including preset content into the secure relationship people storehouse at least
The step of one contact person, can also include:According to pre-set priority order, successively by the information including preset content send to
Contact person in the secure relationship people storehouse.
Specifically, order module 50 that can be as shown in Figure 2 realizes the sequence to the contact person in secure relationship people storehouse.
In one exemplary embodiment, the order module 50 can be shown on the touch-screen of target terminal in the form of user interface
Showing, user can be ranked up based on demand to the Affiliates List in secure relationship people storehouse, such as set different priority, this
Sample, when sending relevant information, letter breath can be sent to the secure relationship people of high priority according to the order of priority first,
So as to can not only improve transmitting efficiency, the success rate of information transmission can also be improved, and then improve the security of terminal.
In another exemplary embodiment, the order module 50 is also based on each contact person in secure relationship people storehouse
Frequency of usage be ranked up, so, the priority of the high contact person of the frequency of usage contact person's low higher than frequency of usage is excellent
First level, so as to which when sending relevant information, the high contact person of frequency of usage can preferentially receive relevant information.
In the present embodiment, step S20:The event judged on target terminal whether be predeterminable event mode include with
Lower one or more:
When in once unblock event, when the unblock frequency of failure of target terminal is more than the first predetermined threshold value, judgement mesh
The event marked in terminal is predeterminable event;Or,
When in once unblock event, the unblock frequency of failure of target terminal is more than the second predetermined threshold value and less than first
Predetermined threshold value, while the identification of the target terminal is stuck in when occurring abnormal in the first preset time, judges target terminal
On event be predeterminable event;Or,
When in the second preset time, target terminal to the abnormality processing number of incoming call more than three predetermined threshold values when, judge
Event on target terminal is predeterminable event;Or,
When the unused time of target terminal is more than three preset times, it is default thing to judge the event on target terminal
Part.
In order to improve the security of target terminal, it is necessary to which the state that potential safety hazard (as stolen) to target terminal be present is carried out
Monitoring, with the Related Contact of the transmission relevant information of the timely active when there is potential safety hazard to secure relationship people storehouse.With hand
Exemplified by machine, when mobile phone has potential safety hazard (such as beneficial), it can be monitored by least following four event:First, one
Repeatedly unblock fails and (not unlocked yet successfully as unlocked 10 times) in secondary unblock event;Second, by repeatedly unblock, although predetermined
Unlocked successfully in number, but (such as three days) SIM card (Subscriber Identity Module, client within a short period of time
Identification module) it is replaced;Third, continuous several times (such as 10 times) are not handled incoming call, such as refuse to listen or do not connect;Fourth, shutdown shape
State exceedes the scheduled time (such as 3 days).By being monitored to above-mentioned event, the security of terminal can be effectively improved.
Specifically, the monitoring of aforementioned events can be realized by event monitor.The event monitor can be from periphery
Equipment interface receives event information.Foregoing predeterminable event can be included on a variety of subevents (for example, shutdown subevent, incoming call
Subevent etc.).In certain embodiments, peripheral device interface sends request to event monitor at a predetermined interval.As sound
Should, peripheral interface transmitting event information.In other embodiments, only critical event be present (for example, receiving more than pre-
Fix time, more than pre-determined number) when, peripheral interface ability transmitting event information.
Abovementioned steps S30 can be as shown in Figure 1 message processing module realize.Described information processing module 30 can be by
Device is managed to realize.Processor operationally couples with memory and/or non-volatile memory device.More specifically, processor can be held
The instruction that row stores in memory and/or non-volatile memory device in computing device to perform operation, such as generation figure
Electronic console is transferred to as data and/or by view data.In this way, processor may include one or more general microprocessors
Device, one or more application specific processors (ASIC), one or more FPGAs (FPGA) or theirs is any
Combination.
In summary, the application target terminal and its corresponding guard method, protection device, by secure relationship people storehouse
It is middle that at least one contact person is set, with when target terminal produces predeterminable event, the transmission relevant information of active to contact person, no
The security of terminal is only effectively raised, and substantially increases the practicality of equipment.So the application effectively overcomes
Various shortcoming of the prior art and have high industrial utilization.
The principle and its effect of above-described embodiment only illustrative the application, not for limitation the application.It is any ripe
Know the personage of this technology all can without prejudice to spirit herein and under the scope of, modifications and changes are carried out to above-described embodiment.Cause
This, those of ordinary skill in the art is complete without departing from spirit disclosed herein and institute under technological thought such as
Into all equivalent modifications or change, should be covered by claims hereof.
Claims (10)
1. a kind of guard method of target terminal, it is characterised in that comprise the following steps:
At least one contact person is added to the secure relationship people storehouse of target terminal;
Judge whether the event on target terminal is predeterminable event;
When the target terminal produces predeterminable event, the information including preset content is sent into the secure relationship people storehouse
At least one contact person.
2. the guard method of target terminal according to claim 1, it is characterised in that described by the letter including preset content
Breath, which was sent to the step of at least one contact person in the secure relationship people storehouse, to be included:
Obtain the positional information of the target terminal;
Sent the positional information got as preset content at least one contact person in the secure relationship people storehouse.
3. the guard method of target terminal according to claim 1, it is characterised in that described to add at least one contact person
The step of secure relationship people storehouse for entering target terminal, includes:
At least one contact person is added to the secure relationship people storehouse of target terminal based on selection instruction;Or/and
According to the frequency of usage of contact person in target terminal, the contact person that will be above the default frequency adds the safety connection of target terminal
It is people storehouse.
4. the guard method of target terminal according to claim 1, it is characterised in that the thing judged on target terminal
Whether part is that the mode of predeterminable event includes one or more of:
When in once unblock event, when the unblock frequency of failure of target terminal is more than the first predetermined threshold value, judgement target is whole
Event on end is predeterminable event;Or,
When in once unblock event, the unblock frequency of failure of target terminal is more than the second predetermined threshold value and preset less than first
Threshold value, while the identification of the target terminal is stuck in when occurring abnormal in the first preset time, is judged on target terminal
Event is predeterminable event;Or,
When in the second preset time, target terminal to the abnormality processing number of incoming call more than three predetermined threshold values when, judge target
Event in terminal is predeterminable event;Or,
When the unused time of target terminal is more than three preset times, judge that the event on target terminal is predeterminable event.
5. the guard method of target terminal according to claim 1 or 2, it is characterised in that described to include preset content
Information send to the step of at least one contact person in the secure relationship people storehouse and include:
According to pre-set priority order, the information including preset content is sent to the contact in the secure relationship people storehouse successively
People.
A kind of 6. protection device of target terminal, it is characterised in that including:
Secure relationship people storehouse, for storing at least one contact person;
Event judge module, for judging whether the event on target terminal is predeterminable event;
Message processing module, for when the target terminal produce predeterminable event when, by the information including preset content send to
At least one contact person in the secure relationship people storehouse.
7. the protection device of target terminal according to claim 6, it is characterised in that described information processing module includes:
Location information acquiring unit, for obtaining the positional information of the target terminal;
Information transmitting unit, for being sent the positional information got as preset content into the secure relationship people storehouse
At least one contact person.
8. the protection device of the target terminal according to claim 6 or 7, it is characterised in that also include:Order module, use
In being ranked up according to pre-set priority to the contact person in secure relationship people storehouse;Described information processing module is used for according to sequence
The ranking results of module, the information including preset content is sent to the contact person in the secure relationship people storehouse successively.
9. the protection device of target terminal according to claim 6, it is characterised in that also include:Contact person's acquisition module,
For at least one contact person to be added to the secure relationship people storehouse of target terminal based on selection instruction;Or/and according to target terminal
The frequency of usage of middle contact person, the contact person that will be above the default frequency add the secure relationship people storehouse of target terminal.
A kind of 10. target terminal, it is characterised in that including:The protection device of target terminal as described in weighing any one of 6-9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710616918.2A CN107370737A (en) | 2017-07-26 | 2017-07-26 | Target terminal and its corresponding guard method, protection device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710616918.2A CN107370737A (en) | 2017-07-26 | 2017-07-26 | Target terminal and its corresponding guard method, protection device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107370737A true CN107370737A (en) | 2017-11-21 |
Family
ID=60307013
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710616918.2A Pending CN107370737A (en) | 2017-07-26 | 2017-07-26 | Target terminal and its corresponding guard method, protection device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107370737A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102378411A (en) * | 2010-08-26 | 2012-03-14 | 乐金电子(中国)研究开发中心有限公司 | Method for realizing retrieving function based on mobile terminal and mobile terminal |
CN102929807A (en) * | 2012-11-19 | 2013-02-13 | 周万荣 | Method for initiatively performing loss judgment and data processing and mobile terminal |
KR20130133114A (en) * | 2012-05-28 | 2013-12-06 | 강현철 | Oblivion smartphone applications where |
CN105450835A (en) * | 2014-08-26 | 2016-03-30 | 阿里巴巴集团控股有限公司 | Method and device for realizing emergency contact and smart terminal |
CN105611072A (en) * | 2016-02-24 | 2016-05-25 | 广东欧珀移动通信有限公司 | Mobile terminal theft-protection device, mobile terminal and theft-protection method |
-
2017
- 2017-07-26 CN CN201710616918.2A patent/CN107370737A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102378411A (en) * | 2010-08-26 | 2012-03-14 | 乐金电子(中国)研究开发中心有限公司 | Method for realizing retrieving function based on mobile terminal and mobile terminal |
KR20130133114A (en) * | 2012-05-28 | 2013-12-06 | 강현철 | Oblivion smartphone applications where |
CN102929807A (en) * | 2012-11-19 | 2013-02-13 | 周万荣 | Method for initiatively performing loss judgment and data processing and mobile terminal |
CN105450835A (en) * | 2014-08-26 | 2016-03-30 | 阿里巴巴集团控股有限公司 | Method and device for realizing emergency contact and smart terminal |
CN105611072A (en) * | 2016-02-24 | 2016-05-25 | 广东欧珀移动通信有限公司 | Mobile terminal theft-protection device, mobile terminal and theft-protection method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106778175B (en) | Interface locking method and device and terminal equipment | |
CN102830931B (en) | Method for checking notification information of smart terminal by shaking | |
CN104796275B (en) | Abnormal state processing method, system and device | |
CN106484555B (en) | The method and mobile terminal of abnormality detection and recovery | |
CN105022955B (en) | A kind of locking means and mobile terminal of application program | |
CN104767863A (en) | Terminal screen unlocking method and terminal | |
CN107729836A (en) | Face identification method and Related product | |
CN109241714A (en) | A kind of information image display methods and device | |
CN105892850B (en) | Open method, device and the mobile terminal of application program for mobile terminal | |
CN104901805A (en) | Identity authentication method and device and system | |
CN106445721B (en) | The method and mobile terminal of house dog fault-tolerant processing | |
CN109117619A (en) | Unlocked by fingerprint method and Related product | |
CN106817489B (en) | The reminding method and mobile terminal of message | |
CN107423598B (en) | A kind of solution lock control method and mobile terminal | |
CN106778169B (en) | Fingerprint unlocking method and device | |
CN102821190A (en) | Status switching method and device and electronic device | |
CN103902861A (en) | Status switching method and electronic device | |
CN108683809A (en) | screen locking method, device and system | |
CN108038359A (en) | Unlocking method and related product | |
CN107370737A (en) | Target terminal and its corresponding guard method, protection device | |
CN105843696A (en) | Touch screen restoration method and device | |
CN107608726A (en) | Monitoring method, device, electronic equipment and storage medium | |
CN105354465B (en) | One kind application securely achieves method, system and mobile terminal | |
CN108366168A (en) | Fall data application method and Related product | |
CN112380520A (en) | Screen unlocking method and device, storage medium and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171121 |
|
RJ01 | Rejection of invention patent application after publication |