CN107370737A - Target terminal and its corresponding guard method, protection device - Google Patents

Target terminal and its corresponding guard method, protection device Download PDF

Info

Publication number
CN107370737A
CN107370737A CN201710616918.2A CN201710616918A CN107370737A CN 107370737 A CN107370737 A CN 107370737A CN 201710616918 A CN201710616918 A CN 201710616918A CN 107370737 A CN107370737 A CN 107370737A
Authority
CN
China
Prior art keywords
target terminal
contact person
event
secure relationship
relationship people
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710616918.2A
Other languages
Chinese (zh)
Inventor
张俊鹤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Spreadrise Technologies Co Ltd
Original Assignee
Shanghai Spreadrise Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Spreadrise Technologies Co Ltd filed Critical Shanghai Spreadrise Technologies Co Ltd
Priority to CN201710616918.2A priority Critical patent/CN107370737A/en
Publication of CN107370737A publication Critical patent/CN107370737A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephone Function (AREA)

Abstract

The application provides a kind of target terminal and its corresponding guard method, protection device.The guard method of the target terminal includes:At least one contact person is added to the secure relationship people storehouse of target terminal;Judge whether the event on target terminal is predeterminable event;When the target terminal produces predeterminable event, the information including preset content is sent at least one contact person in the secure relationship people storehouse.The protection device of the target terminal includes:Secure relationship people storehouse, for storing at least one contact person;Event judge module, for judging whether the event on target terminal is predeterminable event;Message processing module, for when the target terminal produces predeterminable event, the information including preset content to be sent at least one contact person in the secure relationship people storehouse.In the application, when predeterminable event occurs in target terminal, i.e., the contact person in relevant information to secure relationship people storehouse is actively sent, so as to effectively raise the security performance of target terminal.

Description

Target terminal and its corresponding guard method, protection device
Technical field
The application is related to mobile communication technology field, more particularly to a kind of target terminal and its corresponding guard method, Protection device.
Background technology
With the rapid development of communication technology, various intelligent terminals are widely used.And carry and use for convenience, eventually Also there is less and less trend therewith in the volume at end.This also causes increasing terminal stolen or is lost.
By taking mobile phone as an example, hand-set from stolen or after losing, stealer or the person of picking up are continuing with this after can changing SIM card Mobile phone, in addition to the loss of property, the important information inside mobile phone also can be lost or reveal so original owner.
At present, mobile phone is designed by the way of separation between machine and card, and PIN is typically taken in the protection for SIM cards of mobile phones Code and PUK code prevent SIM card to be abused, and after mobile phone loss, although SIM card can be protected, can not prevent mobile phone sheet Body is inserted into other SIM cards and used.Also, after current mobile phone is lost, the positional information of mobile phone can not be accurately obtained, So as to add difficulty for getting back mobile phone.
The content of the invention
In view of the above the shortcomings that prior art, the purpose of the application is to provide a kind of target terminal and its corresponding Guard method, protection device, for solving the problems, such as the security difference of terminal in the prior art.
In order to achieve the above objects and other related objects, a kind of first aspect of the application, there is provided protection of target terminal Method, including:At least one contact person is added to the secure relationship people storehouse of target terminal;Judge whether is event on target terminal For predeterminable event;When the target terminal produces predeterminable event, the information including preset content is sent to the safety and joined It is at least one contact person in people storehouse.
It is described to send the information including preset content to the peace in some embodiments of the application first aspect The step of at least one contact person in full contact library, includes:Obtain the positional information of the target terminal;By what is got Positional information is sent at least one contact person in the secure relationship people storehouse as preset content.
In some embodiments of the application first aspect, the peace that at least one contact person is added to target terminal The step of full contact library, includes:At least one contact person is added to the secure relationship people storehouse of target terminal based on selection instruction; Or/and the frequency of usage according to contact person in target terminal, the contact person that will be above the default frequency add the safety of target terminal Contact library.
In some embodiments of the application first aspect, whether the event judged on target terminal is default thing The mode of part includes one or more of:
When in once unblock event, when the unblock frequency of failure of target terminal is more than the first predetermined threshold value, judgement mesh The event marked in terminal is predeterminable event;Or,
When in once unblock event, the unblock frequency of failure of target terminal is more than the second predetermined threshold value and less than first Predetermined threshold value, while the identification of the target terminal is stuck in when occurring abnormal in the first preset time, judges target terminal On event be predeterminable event;Or,
When in the second preset time, target terminal to the abnormality processing number of incoming call more than three predetermined threshold values when, judge Event on target terminal is predeterminable event;Or,
When the unused time of target terminal is more than three preset times, it is default thing to judge the event on target terminal Part.
It is described to send the information including preset content to the peace in some embodiments of the application first aspect The step of at least one contact person in full contact library, includes:According to pre-set priority order, preset content will be included successively Information send to the contact person in the secure relationship people storehouse.
The second aspect of the application, there is provided a kind of protection device of target terminal, including:Secure relationship people storehouse, for depositing Store up at least one contact person;Event judge module, for judging whether the event on target terminal is predeterminable event;Information processing Module, for when the target terminal produces predeterminable event, the information including preset content to be sent to the secure relationship At least one contact person in people storehouse.
In some embodiments of the application second aspect, described information processing module includes:Positional information obtains single Member, for obtaining the positional information of the target terminal;Information transmitting unit, for using the positional information got as default Content is sent at least one contact person in the secure relationship people storehouse.
In some embodiments of the application second aspect, the protection device of the target terminal also includes:Sort mould Block, for being ranked up according to pre-set priority to the contact person in secure relationship people storehouse;Described information processing module is used for root According to the ranking results of order module, the information including preset content is sent to the contact in the secure relationship people storehouse successively People.
In some embodiments of the application second aspect, the protection device of the target terminal also includes:Contact person Acquisition module, at least one contact person to be added to the secure relationship people storehouse of target terminal based on selection instruction;Or/and press According to the frequency of usage of contact person in target terminal, the contact person that will be above the default frequency adds the secure relationship people of target terminal Storehouse.
In some embodiments of the application second aspect, the event judge module includes:Comparing unit, for The frequency of failure and the first predetermined threshold value are unlocked with comparing in once unblock event;Identifying unit, thing is once unlocked same for working as In part, when the unblock frequency of failure of target terminal is more than the first predetermined threshold value, judge that the event on target terminal is predeterminable event.
In some embodiments of the application second aspect, the event judge module includes:Comparing unit, for The frequency of failure and the first predetermined threshold value, the second predetermined threshold value are unlocked with being respectively compared in once unblock event;Identification card is known Other unit, for being more than the second predetermined threshold value and when being less than the first predetermined threshold value when the unblock frequency of failure of target terminal, to mesh The identification card of mark terminal is identified;Identifying unit, it is default for being stuck in first in the identification of the target terminal When occurring abnormal in the time, judge that the event on target terminal is predeterminable event.
In some embodiments of the application second aspect, the comparing unit is additionally operable to right in the second preset time The abnormality processing number of incoming call is compared with the 3rd predetermined threshold value;The identifying unit is additionally operable to when target terminal is to incoming call When abnormality processing number is more than three predetermined threshold values, judge that the event on target terminal is predeterminable event;Or/and the comparison Unit is additionally operable to unused time and the 3rd preset time of comparison object terminal, and the identifying unit is additionally operable to when target terminal When unused time is more than three preset times, judge that the event on target terminal is predeterminable event.
The third aspect of the application, there is provided a kind of target terminal, including:The protection of target terminal described in foregoing any one Device.
As described above, an object of the application terminal and its corresponding guard method, protection device, have below beneficial to effect Fruit:
In an object of the application terminal and its corresponding guard method, protection device, default thing occurs on a target terminal During part, then relevant information (such as positional information) is actively sent to the middle contact person in secure relationship people storehouse, with timely notice to correlation Contact person, so as to improve the security of target terminal;Furthermore it is also possible to sent information to successively according to the order of pre-set priority Related Contact, the success rate of transmission can be effectively improved by such mode, and then further improve target terminal Security.
Brief description of the drawings
Fig. 1 is shown as the structural representation of an implementation of the protection device of the application target terminal.
Fig. 2 is shown as the structural representation of another implementation of the protection device of the application target terminal.
Fig. 3 is shown as the schematic flow sheet of an implementation of the guard method of the application target terminal.
Embodiment
Presently filed embodiment is illustrated by particular specific embodiment below, those skilled in the art can be by this explanation Content disclosed by book understands other advantages and effect of the application easily.
In described below, refer to the attached drawing, accompanying drawing describes some embodiments of the application.It should be appreciated that also it can be used Other embodiment, and can be carried out in the case of without departing substantially from spirit and scope of the present disclosure mechanical composition, structure, electrically with And the detailed description below operational change should not be considered limiting, and the scope of embodiments herein Only terms used herein are limited by the claims for the patent announced merely to describing specific embodiment, and be not It is intended to limit the application.The term of space correlation, for example, " on ", " under ", "left", "right", " following ", " lower section ", " bottom ", " top ", " top " etc., it can use in the text in order to illustrate an element shown in figure or feature and another element or spy The relation of sign.
Although the grade of term first, second is used for describing various elements herein in some instances, these elements It should not be limited by these terms.These terms are only used for making a distinction an element with another element.For example, first is pre- If threshold value can be referred to as the second predetermined threshold value or the 3rd predetermined threshold value, and similarly, the second predetermined threshold value can be referred to as First predetermined threshold value or the 3rd predetermined threshold value, without departing from the scope of various described embodiments.First predetermined threshold value and pre- If threshold value is to describe a threshold value, but unless context otherwise explicitly points out, otherwise they are not same Predetermined threshold value.Similar situation also includes the first preset time, the second preset time and the 3rd preset time etc..
Furthermore as used in herein, singulative " one ", "one" and "the" are intended to also include plural shape Formula, unless having opposite instruction in context it will be further understood that term "comprising", " comprising " show described spy be present Sign, step, operation, element, component, project, species, and/or group, but it is not excluded for other one or more features, step, behaviour Work, element, component, project, the presence of species, and/or group, appearance or addition term "or" used herein and "and/or" quilt Be construed to inclusive, or mean any one or any combinations therefore, " A, B or C " or " A, B and/or C " mean " with Descend any one:A;B;C;A and B;A and C;B and C;A, B and C " are only when element, function, step or the combination of operation are in some sides When inherently mutually exclusive under formula, the exception of this definition just occurs.
Referring to Fig. 1, Fig. 1 is shown as the structural representation of the protection device of the application target terminal, as illustrated, described The protection device 1 of target terminal includes:
Secure relationship people storehouse 10 is used to store at least one contact person.In an embodiment, the secure relationship people storehouse 10 It can be realized by memory;Memory may include high-speed random access memory, and may also include nonvolatile memory, example Such as one or more disk storage equipments, flash memory device or other non-volatile solid-state memory devices.In certain embodiments, deposit Reservoir can also include the memory away from one or more processors, such as via RF circuits or outside port and communication network Network (not shown) access network attached storage, wherein the communication network can be internet, one or more in-house networks, LAN (LAN), wide area network (WLAN), storage area network (SAN) etc., or its is appropriately combined.Memory Controller is controllable to be set up Access of standby such as CPU and Peripheral Interface etc the other assemblies to memory.
In the present embodiment, a contact person can be included in the secure relationship people storehouse 10, multiple contacts can also be included People.Contact person in secure relationship people storehouse can be that the demand based on user is set or according in target terminal The frequency of usage of contact person, the contact person with higher frequency of usage is added to secure relationship people storehouse.It is arranged at safe It is that contact person in people storehouse can be the cell-phone number of kith and kin or another phone number of user etc. of the target terminal.
As shown in figure 1, the protection device 1 of the target terminal can also include:Contact person's acquisition module 40, for based on Selection instruction adds at least one contact person in the secure relationship people storehouse of target terminal;Or/and according to contact person in target terminal Frequency of usage, the contact person that will be above the default frequency adds the secure relationship people storehouse of target terminal.
The module of contact person's acquisition module 40 can be realized based on touch-screen etc. to the equipment of man-machine interaction, such as Handset touch panel receives the input of user based on tactile and/or tactile contact.User interface, Yong Hujie are shown on the touchscreen Multiple user interface objects are provided with face, the user interface object is the object of the user interface of constitution equipment, can be included But it is not limited to text, image, icon, soft-key button (or " virtual push button "), drop-down menu, radio button, check box, optional list Etc..Shown user interface object can include:Nonreciprocal pair for transmission information or composition user interface outward appearance As, be available for user mutual interactive object or its combination.
Because touch-screen can form a touch sensitive surface for receiving user's input, therefore the touch-screen and touch-screen control Contact on device (together with any associated module and/or instruction set in memory) processed detection touch-screen is (and described Any movement or interruption touched), and by the contact transformation detected into showing such as one or more on the touchscreen The interaction of the user interface object of soft-key button etc.In one exemplary embodiment, the contact point between touch-screen and user Corresponding to one or more fingers of user.The touch-screen can use LCD (liquid crystal display) technologies or LPD (light-emissive polymers Thing display) technology, but other Display Techniques can be used in other embodiments.Touch-screen and touch screen controller can use Any one of a variety of Touch technologies include but is not limited to electricity to detect contact and its mobile or interruption, these Touch technologies Appearance, resistance, infrared and surface acoustic wave techniques, and other proximity sensor arrays, or for determining what is be in contact with touch-screen The other technologies of one or more points.Touch-screen shows the visual output from portable set, and touch plate does not provide visually Output.Touch-screen can have the resolution ratio higher than 100dpi.In one exemplary embodiment, touch-screen can have about 168dpi resolution ratio.User can use any appropriate object or accessory, such as instruction pen, finger etc., be touched to contact Screen.
In one exemplary embodiment, user to the user interface on touch-screen by inputting the instruction accordingly selected (such as selecting a certain contact person as secure relationship people), so that demand of the user based on body body deposits at least one contact person Storage is into secure relationship people storehouse 10.In another exemplary embodiment, target terminal makes to the contact person in certain period of time It is ranked up with the frequency, frequency of usage highest contact person as secure relationship people and is stored into secure relationship people storehouse.When So, can also will be multiple entirely without limitation by the use of the higher contact person of the frequency as secure relationship people, the application.
With continued reference to Fig. 1, the protection device of the target terminal also includes:Event judge module 20 and message processing module 30.The event judge module 20 is used to judge whether the event on target terminal is predeterminable event;Described information processing module 30 are used to, when the target terminal produces predeterminable event, the information including preset content is sent to the secure relationship people storehouse In at least one contact person.
In the present embodiment, described information processing module can include:Location information acquiring unit and information transmitting unit (figure Not shown in).The location information acquiring unit is used for the positional information for obtaining the target terminal;Described information transmitting element For being sent the positional information got as preset content at least one contact person in the secure relationship people storehouse.
Specifically, by taking mobile phone as an example, the positional information can by GPS technology or mobile phone position service (LBS, Location Based Services) to realize, the mobile phone position service is also known as Location Based Service, refer to pass through movement Terminal and the cooperation of mobile network, determine the actual geographic position of mobile subscriber, there is provided position data to mobile subscriber or Other people and communication system, realize the various business related to position.
In order to improve the security of target terminal, it is necessary to which the state that potential safety hazard (as stolen) to target terminal be present is carried out Monitoring, with the Related Contact of the transmission relevant information of the timely active when there is potential safety hazard to secure relationship people storehouse.With hand Exemplified by machine, when mobile phone has potential safety hazard (such as beneficial), it can be monitored by least following four event:First, one Repeatedly unblock fails and (not unlocked yet successfully as unlocked 10 times) in secondary unblock event;Second, by repeatedly unblock, although predetermined Unlocked successfully in number, but (such as three days) SIM card (Subscriber Identity Module, client within a short period of time Identification module) it is replaced;Third, continuous several times (such as 10 times) are not handled incoming call, such as refuse to listen or do not connect;Fourth, shutdown shape State exceedes the scheduled time (such as 3 days).By being monitored to above-mentioned event, the security of terminal can be effectively improved.
In one exemplary embodiment, the event judge module can include:Comparing unit and identifying unit are (in figure It is not shown).The comparing unit is used in once unblock event compare the unblock frequency of failure and the first predetermined threshold value;It is described Identifying unit is used to work as in once unblock event, when the unblock frequency of failure of target terminal is more than the first predetermined threshold value, sentences The event to set the goal in terminal is predeterminable event.
For example, the first predetermined threshold value is set as 10;If in once unblock event, do not unlocked into yet more than 10 times Work(, then the event for unlocking failure is sent out the information of correlation as predeterminable event, that is, as the condition for triggering transmission information Deliver to the Related Contact in secure relationship people storehouse.
In a further exemplary embodiment, the event judge module can also include:Comparing unit, identification card are known Other unit and identifying unit.The comparing unit is used in once unblock event be respectively compared the unblock frequency of failure and first Predetermined threshold value, the second predetermined threshold value;The identification card recognition unit is used for when the unblock frequency of failure of target terminal is more than Second predetermined threshold value and when being less than the first predetermined threshold value, the identification card of target terminal is identified;The identifying unit For the identification of the target terminal be stuck in occur abnormal in the first preset time when, judge target terminal on event For predeterminable event.
For example, the first predetermined threshold value is set as 10, and the second predetermined threshold value is 5;First preset time is 3 days;Simultaneously The identification card (SIM card of such as mobile phone) of terminal is identified;If by 5 times with and 10 times within unlock successfully, then After unlocking successfully continue that SIM card is identified in 3 days, if occurring SIM exceptions in 3 days, be such as replaced, then by new SIM The positional information of terminal is obtained, and the information comprising positional information is sent to the Related Contact in secure relationship people storehouse.
Certainly, in other embodiments, the comparing unit is additionally operable in the second preset time to the exception of incoming call Number is managed compared with the 3rd predetermined threshold value;The identifying unit is additionally operable to the abnormality processing number to incoming call when target terminal During more than three predetermined threshold values, judge that the event on target terminal is predeterminable event;Or/and the comparing unit is additionally operable to compare Unused time and the 3rd preset time compared with target terminal, the identifying unit are additionally operable to exceed when the unused time of target terminal During three preset times, judge that the event on target terminal is predeterminable event.
For example, set for second scheduled time as 1 hour, the 3rd predetermined threshold value is 20;If within 1 hour, mesh The incoming call (such as rejection or do not connect) of access failure in mark terminal is more than 20, then using this event as predeterminable event triggering, with Send the Related Contact in relevant information to secure relationship people storehouse.
Or set the 3rd preset time as 2 days, if the unused time of target terminal more than 2 days, by this time shut down thing Part triggers as predeterminable event, to send the Related Contact in relevant information to secure relationship people storehouse.
In a certain embodiment, the comparing unit is, for example, a comparison circuit, comparator or has conditional statement Computer program realize.Comparing unit and judging unit are not the entirely different or independent device in physical significance herein Part, in a particular application, the comparing unit and identifying unit can be realized by event monitor.
The event monitor can receive event information from peripheral interface.Foregoing predeterminable event can include on A variety of subevents (for example, shutdown subevent, carry out electron event etc.).In certain embodiments, between event monitor is to make a reservation for Send and ask every peripheral device interface.As response, peripheral interface transmitting event information.In other embodiments, only When critical event (for example, receiving more than the scheduled time, more than pre-determined number) be present, peripheral interface ability transmission events Information.
Described information processing module 30 can be realized by processor.Processor operationally with memory and/or non-volatile Property storage device coupling.More specifically, processor can perform the instruction stored in memory and/or non-volatile memory device To perform operation in computing device, such as generate view data and/or view data is transferred to electronic console.In this way, Processor may include one or more general purpose microprocessors, one or more application specific processors (ASIC), one or more scenes Programmable logic array (FPGA) or any combination of them.
Referring to Fig. 2, Fig. 2 is shown as the structural representation of another implementation of the protection device of the application target terminal Figure, as illustrated, the protection device of the target terminal also includes:Order module 50.The order module 50 is used for according to pre- Setting priority is ranked up to the contact person in secure relationship people storehouse;Described information processing module 30 is used for according to order module Ranking results, the information including preset content is sent to the contact person in the secure relationship people storehouse successively.
In one exemplary embodiment, the order module 50 can be on the touch-screen of target terminal with user interface Form is shown that user can be ranked up based on demand to the Affiliates List in secure relationship people storehouse, is such as set different Priority, so, can be according to the order of priority, the first secure relationship to high priority when sending relevant information People sends letter breath, so as to can not only improve transmitting efficiency, can also improve the success rate of information transmission, and then improve terminal Security.
In another exemplary embodiment, the order module 50 is also based on each contact person in secure relationship people storehouse Frequency of usage be ranked up, so, the priority of the high contact person of the frequency of usage contact person's low higher than frequency of usage is excellent First level, so as to which when sending relevant information, the high contact person of frequency of usage can preferentially receive relevant information.
The protection device of the target terminal can be applied in portable mobile termianl, the portable mobile termianl Including memory, Memory Controller, one or more processing units (CPU), Peripheral Interface, RF circuits, voicefrequency circuit, raise one's voice Device, microphone, input/output (I/O) subsystem, touch-screen, other outputs or control device, and outside port.These groups Part is communicated by one or more communication bus or signal wire.
The portable mobile termianl also includes being used for the power-supply system for various assemblies power supply.The power-supply system can wrap Include power-supply management system, one or more power supplys (such as battery, alternating current (AC), charging system, power failure detection circuit, Power supply changeover device or inverter, power supply status indicator (such as light emitting diode (LED), and with the electricity in portable set Can other associated any components of generation, management and distribution.
In certain embodiments, the predetermined function set operation on the portable mobile termianl all by touch-screen or Touch pad performs (if including touch pad in equipment).By the way that touch-screen and touch pad to be used as to the operation for equipment Main input/control devices uses, it is possible to reduce being physically entered in equipment/control device (such as pressing button, dial Etc.) quantity.In one embodiment, equipment include touch-screen, touch pad, for for equipment it is power on/off and locking Pressing for equipment compresses switch, volume adjusting driving lever button, and for cutting the slide switch of ring configuration file.By pressing pressing Button and the button is held in down state at preset time intervals, on/off equipment electricity can be carried out using the button Source, or, by pressing button and discharging the button before by predetermined time interval, can be locked using the button Equipment.In alternative embodiments, equipment can also receive phonetic entry by microphone, to activate or disable some work( Energy.
The portable mobile termianl includes but is not limited to HPC, tablet personal computer, mobile phone, smart mobile phone, matchmaker Body player, personal digital assistant (PDA) etc., include the combination of wherein two or multinomial.
Referring to Fig. 3, Fig. 3 is shown as flow signal of the guard method of the application target terminal in an implementation Figure;As illustrated, the guard method of the target terminal includes:
Step S10, at least one contact person is added to the secure relationship people storehouse of target terminal;
The secure relationship people storehouse can be realized by memory;Memory may include high-speed random access memory, and It may also include nonvolatile memory, such as one or more disk storage equipments, flash memory device or other nonvolatile solid states Storage device.In certain embodiments, memory can also include away from one or more processors memory, such as via The network attached storage that RF circuits or outside port and communication network (not shown) access, wherein the communication network can be with It is internet, one or more in-house networks, LAN (LAN), wide area network (WLAN), storage area network (SAN) etc., or its is appropriate Combination.Access of such as CPU and Peripheral Interface of Memory Controller controllable device etc the other assemblies to memory.
In the present embodiment, a contact person can be included in the secure relationship people storehouse, multiple contact persons can also be included. Contact person in secure relationship people storehouse can be that the demand based on user is set or be contacted according in target terminal The frequency of usage of people, the contact person with higher frequency of usage is added to secure relationship people storehouse.It is arranged at secure relationship people Contact person in storehouse can be the cell-phone number of kith and kin or another phone number of user etc. of the target terminal.
In the present embodiment, it is described by least one contact person add target terminal secure relationship people storehouse the step of include: At least one contact person is added to the secure relationship people storehouse of target terminal based on selection instruction;Or/and according to joining in target terminal It is the frequency of usage of people, the contact person that will be above the default frequency adds the secure relationship people storehouse of target terminal.Specifically, the step Contact person's acquisition module 40 that can be as shown in Figure 1 is realized.
The module of contact person's acquisition module 40 can be realized based on touch-screen etc. to the equipment of man-machine interaction, such as Handset touch panel receives the input of user based on tactile and/or tactile contact.User interface, Yong Hujie are shown on the touchscreen Multiple user interface objects are provided with face, the user interface object is the object of the user interface of constitution equipment, can be included But it is not limited to text, image, icon, soft-key button (or " virtual push button "), drop-down menu, radio button, check box, optional list Etc..Shown user interface object can include:Nonreciprocal pair for transmission information or composition user interface outward appearance As, be available for user mutual interactive object or its combination.
Because touch-screen can form a touch sensitive surface for receiving user's input, therefore the touch-screen and touch-screen control Contact on device (together with any associated module and/or instruction set in memory) processed detection touch-screen is (and described Any movement or interruption touched), and by the contact transformation detected into showing such as one or more on the touchscreen The interaction of the user interface object of soft-key button etc.In one exemplary embodiment, the contact point between touch-screen and user Corresponding to one or more fingers of user.The touch-screen can use LCD (liquid crystal display) technologies or LPD (light-emissive polymers Thing display) technology, but other Display Techniques can be used in other embodiments.Touch-screen and touch screen controller can use Any one of a variety of Touch technologies include but is not limited to electricity to detect contact and its mobile or interruption, these Touch technologies Appearance, resistance, infrared and surface acoustic wave techniques, and other proximity sensor arrays, or for determining what is be in contact with touch-screen The other technologies of one or more points.Touch-screen shows the visual output from portable set, and touch plate does not provide visually Output.Touch-screen can have the resolution ratio higher than 100dpi.In one exemplary embodiment, touch-screen can have about 168dpi resolution ratio.User can use any appropriate object or accessory, such as instruction pen, finger etc., be touched to contact Screen.
In one exemplary embodiment, user to the user interface on touch-screen by inputting the instruction accordingly selected (such as selecting a certain contact person as secure relationship people), so that demand of the user based on body body deposits at least one contact person Storage is into secure relationship people storehouse 10.In another exemplary embodiment, target terminal makes to the contact person in certain period of time It is ranked up with the frequency, frequency of usage highest contact person as secure relationship people and is stored into secure relationship people storehouse.When So, can also will be multiple entirely without limitation by the use of the higher contact person of the frequency as secure relationship people, the application.
With continued reference to Fig. 3, step S20 is performed, judges whether the event on target terminal is predeterminable event;
When the target terminal produces predeterminable event, step S30 is performed, the information including preset content is sent to institute State at least one contact person in secure relationship people storehouse.
Specifically, step S30:It is described to send the information including preset content into the secure relationship people storehouse at least The step of one contact person, includes:Obtain the positional information of the target terminal;Using the positional information got as default interior Hold and send at least one contact person in the secure relationship people storehouse.
In other embodiments, it is described to send the information including preset content into the secure relationship people storehouse at least The step of one contact person, can also include:According to pre-set priority order, successively by the information including preset content send to Contact person in the secure relationship people storehouse.
Specifically, order module 50 that can be as shown in Figure 2 realizes the sequence to the contact person in secure relationship people storehouse. In one exemplary embodiment, the order module 50 can be shown on the touch-screen of target terminal in the form of user interface Showing, user can be ranked up based on demand to the Affiliates List in secure relationship people storehouse, such as set different priority, this Sample, when sending relevant information, letter breath can be sent to the secure relationship people of high priority according to the order of priority first, So as to can not only improve transmitting efficiency, the success rate of information transmission can also be improved, and then improve the security of terminal.
In another exemplary embodiment, the order module 50 is also based on each contact person in secure relationship people storehouse Frequency of usage be ranked up, so, the priority of the high contact person of the frequency of usage contact person's low higher than frequency of usage is excellent First level, so as to which when sending relevant information, the high contact person of frequency of usage can preferentially receive relevant information.
In the present embodiment, step S20:The event judged on target terminal whether be predeterminable event mode include with Lower one or more:
When in once unblock event, when the unblock frequency of failure of target terminal is more than the first predetermined threshold value, judgement mesh The event marked in terminal is predeterminable event;Or,
When in once unblock event, the unblock frequency of failure of target terminal is more than the second predetermined threshold value and less than first Predetermined threshold value, while the identification of the target terminal is stuck in when occurring abnormal in the first preset time, judges target terminal On event be predeterminable event;Or,
When in the second preset time, target terminal to the abnormality processing number of incoming call more than three predetermined threshold values when, judge Event on target terminal is predeterminable event;Or,
When the unused time of target terminal is more than three preset times, it is default thing to judge the event on target terminal Part.
In order to improve the security of target terminal, it is necessary to which the state that potential safety hazard (as stolen) to target terminal be present is carried out Monitoring, with the Related Contact of the transmission relevant information of the timely active when there is potential safety hazard to secure relationship people storehouse.With hand Exemplified by machine, when mobile phone has potential safety hazard (such as beneficial), it can be monitored by least following four event:First, one Repeatedly unblock fails and (not unlocked yet successfully as unlocked 10 times) in secondary unblock event;Second, by repeatedly unblock, although predetermined Unlocked successfully in number, but (such as three days) SIM card (Subscriber Identity Module, client within a short period of time Identification module) it is replaced;Third, continuous several times (such as 10 times) are not handled incoming call, such as refuse to listen or do not connect;Fourth, shutdown shape State exceedes the scheduled time (such as 3 days).By being monitored to above-mentioned event, the security of terminal can be effectively improved.
Specifically, the monitoring of aforementioned events can be realized by event monitor.The event monitor can be from periphery Equipment interface receives event information.Foregoing predeterminable event can be included on a variety of subevents (for example, shutdown subevent, incoming call Subevent etc.).In certain embodiments, peripheral device interface sends request to event monitor at a predetermined interval.As sound Should, peripheral interface transmitting event information.In other embodiments, only critical event be present (for example, receiving more than pre- Fix time, more than pre-determined number) when, peripheral interface ability transmitting event information.
Abovementioned steps S30 can be as shown in Figure 1 message processing module realize.Described information processing module 30 can be by Device is managed to realize.Processor operationally couples with memory and/or non-volatile memory device.More specifically, processor can be held The instruction that row stores in memory and/or non-volatile memory device in computing device to perform operation, such as generation figure Electronic console is transferred to as data and/or by view data.In this way, processor may include one or more general microprocessors Device, one or more application specific processors (ASIC), one or more FPGAs (FPGA) or theirs is any Combination.
In summary, the application target terminal and its corresponding guard method, protection device, by secure relationship people storehouse It is middle that at least one contact person is set, with when target terminal produces predeterminable event, the transmission relevant information of active to contact person, no The security of terminal is only effectively raised, and substantially increases the practicality of equipment.So the application effectively overcomes Various shortcoming of the prior art and have high industrial utilization.
The principle and its effect of above-described embodiment only illustrative the application, not for limitation the application.It is any ripe Know the personage of this technology all can without prejudice to spirit herein and under the scope of, modifications and changes are carried out to above-described embodiment.Cause This, those of ordinary skill in the art is complete without departing from spirit disclosed herein and institute under technological thought such as Into all equivalent modifications or change, should be covered by claims hereof.

Claims (10)

1. a kind of guard method of target terminal, it is characterised in that comprise the following steps:
At least one contact person is added to the secure relationship people storehouse of target terminal;
Judge whether the event on target terminal is predeterminable event;
When the target terminal produces predeterminable event, the information including preset content is sent into the secure relationship people storehouse At least one contact person.
2. the guard method of target terminal according to claim 1, it is characterised in that described by the letter including preset content Breath, which was sent to the step of at least one contact person in the secure relationship people storehouse, to be included:
Obtain the positional information of the target terminal;
Sent the positional information got as preset content at least one contact person in the secure relationship people storehouse.
3. the guard method of target terminal according to claim 1, it is characterised in that described to add at least one contact person The step of secure relationship people storehouse for entering target terminal, includes:
At least one contact person is added to the secure relationship people storehouse of target terminal based on selection instruction;Or/and
According to the frequency of usage of contact person in target terminal, the contact person that will be above the default frequency adds the safety connection of target terminal It is people storehouse.
4. the guard method of target terminal according to claim 1, it is characterised in that the thing judged on target terminal Whether part is that the mode of predeterminable event includes one or more of:
When in once unblock event, when the unblock frequency of failure of target terminal is more than the first predetermined threshold value, judgement target is whole Event on end is predeterminable event;Or,
When in once unblock event, the unblock frequency of failure of target terminal is more than the second predetermined threshold value and preset less than first Threshold value, while the identification of the target terminal is stuck in when occurring abnormal in the first preset time, is judged on target terminal Event is predeterminable event;Or,
When in the second preset time, target terminal to the abnormality processing number of incoming call more than three predetermined threshold values when, judge target Event in terminal is predeterminable event;Or,
When the unused time of target terminal is more than three preset times, judge that the event on target terminal is predeterminable event.
5. the guard method of target terminal according to claim 1 or 2, it is characterised in that described to include preset content Information send to the step of at least one contact person in the secure relationship people storehouse and include:
According to pre-set priority order, the information including preset content is sent to the contact in the secure relationship people storehouse successively People.
A kind of 6. protection device of target terminal, it is characterised in that including:
Secure relationship people storehouse, for storing at least one contact person;
Event judge module, for judging whether the event on target terminal is predeterminable event;
Message processing module, for when the target terminal produce predeterminable event when, by the information including preset content send to At least one contact person in the secure relationship people storehouse.
7. the protection device of target terminal according to claim 6, it is characterised in that described information processing module includes:
Location information acquiring unit, for obtaining the positional information of the target terminal;
Information transmitting unit, for being sent the positional information got as preset content into the secure relationship people storehouse At least one contact person.
8. the protection device of the target terminal according to claim 6 or 7, it is characterised in that also include:Order module, use In being ranked up according to pre-set priority to the contact person in secure relationship people storehouse;Described information processing module is used for according to sequence The ranking results of module, the information including preset content is sent to the contact person in the secure relationship people storehouse successively.
9. the protection device of target terminal according to claim 6, it is characterised in that also include:Contact person's acquisition module, For at least one contact person to be added to the secure relationship people storehouse of target terminal based on selection instruction;Or/and according to target terminal The frequency of usage of middle contact person, the contact person that will be above the default frequency add the secure relationship people storehouse of target terminal.
A kind of 10. target terminal, it is characterised in that including:The protection device of target terminal as described in weighing any one of 6-9.
CN201710616918.2A 2017-07-26 2017-07-26 Target terminal and its corresponding guard method, protection device Pending CN107370737A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710616918.2A CN107370737A (en) 2017-07-26 2017-07-26 Target terminal and its corresponding guard method, protection device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710616918.2A CN107370737A (en) 2017-07-26 2017-07-26 Target terminal and its corresponding guard method, protection device

Publications (1)

Publication Number Publication Date
CN107370737A true CN107370737A (en) 2017-11-21

Family

ID=60307013

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710616918.2A Pending CN107370737A (en) 2017-07-26 2017-07-26 Target terminal and its corresponding guard method, protection device

Country Status (1)

Country Link
CN (1) CN107370737A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102378411A (en) * 2010-08-26 2012-03-14 乐金电子(中国)研究开发中心有限公司 Method for realizing retrieving function based on mobile terminal and mobile terminal
CN102929807A (en) * 2012-11-19 2013-02-13 周万荣 Method for initiatively performing loss judgment and data processing and mobile terminal
KR20130133114A (en) * 2012-05-28 2013-12-06 강현철 Oblivion smartphone applications where
CN105450835A (en) * 2014-08-26 2016-03-30 阿里巴巴集团控股有限公司 Method and device for realizing emergency contact and smart terminal
CN105611072A (en) * 2016-02-24 2016-05-25 广东欧珀移动通信有限公司 Mobile terminal theft-protection device, mobile terminal and theft-protection method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102378411A (en) * 2010-08-26 2012-03-14 乐金电子(中国)研究开发中心有限公司 Method for realizing retrieving function based on mobile terminal and mobile terminal
KR20130133114A (en) * 2012-05-28 2013-12-06 강현철 Oblivion smartphone applications where
CN102929807A (en) * 2012-11-19 2013-02-13 周万荣 Method for initiatively performing loss judgment and data processing and mobile terminal
CN105450835A (en) * 2014-08-26 2016-03-30 阿里巴巴集团控股有限公司 Method and device for realizing emergency contact and smart terminal
CN105611072A (en) * 2016-02-24 2016-05-25 广东欧珀移动通信有限公司 Mobile terminal theft-protection device, mobile terminal and theft-protection method

Similar Documents

Publication Publication Date Title
CN106778175B (en) Interface locking method and device and terminal equipment
CN102830931B (en) Method for checking notification information of smart terminal by shaking
CN104796275B (en) Abnormal state processing method, system and device
CN106484555B (en) The method and mobile terminal of abnormality detection and recovery
CN105022955B (en) A kind of locking means and mobile terminal of application program
CN104767863A (en) Terminal screen unlocking method and terminal
CN107729836A (en) Face identification method and Related product
CN109241714A (en) A kind of information image display methods and device
CN105892850B (en) Open method, device and the mobile terminal of application program for mobile terminal
CN104901805A (en) Identity authentication method and device and system
CN106445721B (en) The method and mobile terminal of house dog fault-tolerant processing
CN109117619A (en) Unlocked by fingerprint method and Related product
CN106817489B (en) The reminding method and mobile terminal of message
CN107423598B (en) A kind of solution lock control method and mobile terminal
CN106778169B (en) Fingerprint unlocking method and device
CN102821190A (en) Status switching method and device and electronic device
CN103902861A (en) Status switching method and electronic device
CN108683809A (en) screen locking method, device and system
CN108038359A (en) Unlocking method and related product
CN107370737A (en) Target terminal and its corresponding guard method, protection device
CN105843696A (en) Touch screen restoration method and device
CN107608726A (en) Monitoring method, device, electronic equipment and storage medium
CN105354465B (en) One kind application securely achieves method, system and mobile terminal
CN108366168A (en) Fall data application method and Related product
CN112380520A (en) Screen unlocking method and device, storage medium and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20171121

RJ01 Rejection of invention patent application after publication