CN107370872A - Method, terminal and the control device of a kind of terminal lock machine and control terminal lock machine - Google Patents
Method, terminal and the control device of a kind of terminal lock machine and control terminal lock machine Download PDFInfo
- Publication number
- CN107370872A CN107370872A CN201710433101.1A CN201710433101A CN107370872A CN 107370872 A CN107370872 A CN 107370872A CN 201710433101 A CN201710433101 A CN 201710433101A CN 107370872 A CN107370872 A CN 107370872A
- Authority
- CN
- China
- Prior art keywords
- terminal
- response message
- default
- message
- lock machine
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72454—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/42—User authentication using separate channels for security data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
- H04M1/67—Preventing unauthorised calls from a telephone set by electronic means
- H04M1/673—Preventing unauthorised calls from a telephone set by electronic means the user being required to key in a code
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72457—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to geographic location
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
- H04W4/14—Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/20—Transfer of user or subscriber data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/22—Processing or transfer of terminal data, e.g. status or physical capabilities
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Human Computer Interaction (AREA)
- Environmental & Geological Engineering (AREA)
- Databases & Information Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Telephone Function (AREA)
Abstract
The embodiment of the invention discloses a kind of terminal lock machine and method, terminal and the control device of control terminal lock machine, wherein, terminal lock machine method includes:The solicited message that receiving terminal is sent, the solicited message that the solicited message is generated by the terminal when monitoring default trigger event;Corresponding response message is sent to the terminal according to the solicited message so that response message described in the terminal-pair is hidden and performs lock machine operation according to the response message.The embodiment of the present invention receives the response message that the control device returns by sending solicited message to control device, and the response message sent to control device is hidden, so realize terminal without prompting lock machine.
Description
Technical field
The present invention relates to electronic technology field, more particularly to method, the terminal of a kind of terminal lock machine and control terminal lock machine
And control device.
Background technology
Nowadays, terminal (such as mobile phone, tablet personal computer etc.) have become in people's life & amusement or work and study can not or
Scarce instrument.Although existing terminal can by setting the modes such as screen-lock password to prevent other people direct using terminals,
, can be by changing client identification module SIM card (Subscriber Identification ModuleCard) after terminal is stolen
Or obtain terminal authorization and close the functions such as its lookup or tracking, realize the normal use of terminal.
Therefore, it is necessary to a kind of new technical scheme is proposed, to solve above-mentioned technical problem.
The content of the invention
The embodiment of the present invention provides method, terminal and the control device of a kind of terminal lock machine and control terminal lock machine, can be with
To control device send response message be hidden, and then realize terminal without prompting lock machine.
In a first aspect, the embodiments of the invention provide a kind of method of terminal lock machine, this method includes:
Default trigger event is monitored;
If monitoring the default trigger event, solicited message is sent to control device;
The response message that the control device returns is received, and the response message is hidden;
Lock machine operation is performed according to the response message.
Second aspect, the embodiments of the invention provide a kind of method for controlling terminal lock machine, this method includes:
The solicited message that receiving terminal is sent, the solicited message are monitoring default trigger event when institute for the terminal
The solicited message of generation;
Corresponding response message is sent to the terminal according to the solicited message so that letter is responded described in the terminal-pair
Breath is hidden and performs lock machine operation according to the response message.
The third aspect, the embodiments of the invention provide a kind of terminal, the terminal includes:
Monitoring unit, for being monitored to default trigger event;
Transmitting element, if for monitoring the default trigger event, solicited message is sent to control device;
Receiving unit, the response message returned for receiving the control device, and the response message is hidden;
Execution unit, for performing lock machine operation according to the response message.
Fourth aspect, the embodiments of the invention provide a kind of control device, the control device includes:
Information receiving unit, the solicited message sent for receiving terminal, the solicited message are that the terminal is monitoring
The solicited message generated during to default trigger event;
First information transmitting element, for sending corresponding response message to the terminal according to the solicited message, make
Response message described in the terminal-pair is obtained to be hidden and perform lock machine operation according to the response message.
5th aspect, the embodiments of the invention provide another terminal, including processor, input equipment, output equipment and
Memory, the processor, input equipment, output equipment and memory are connected with each other, wherein, the memory is used to store branch
The application program that terminal performs the above method is held, the processor is arranged to the method for performing above-mentioned first aspect.
6th aspect, the embodiments of the invention provide a kind of computer-readable recording medium, the computer-readable storage medium
Computer program is stored with, the computer program includes programmed instruction, and described program instruction makes institute when being executed by a processor
The method for stating the above-mentioned first aspect of computing device.
7th aspect, the embodiments of the invention provide another control device, including processor, input equipment, output are set
Standby and memory, the processor, input equipment, output equipment and memory are connected with each other, wherein, the memory is used to deposit
Storage supports terminal to perform the application program of the above method, and the processor is arranged to the method for performing above-mentioned second aspect.
Fourth aspect, the embodiments of the invention provide a kind of computer-readable recording medium, the computer-readable storage medium
Computer program is stored with, the computer program includes programmed instruction, and described program instruction makes institute when being executed by a processor
The method for stating the above-mentioned second aspect of computing device.
The embodiment of the present invention to default trigger event by being monitored;If monitoring the default trigger event, to
Control device sends solicited message;The response message that the control device returns is received, and the response message is hidden;
Lock machine operation is performed according to the response message, the response message that can be sent to control device is hidden, and then is realized eventually
End without prompting lock machine.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, it is required in being described below to embodiment to use
Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the present invention, general for this area
For logical technical staff, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of schematic flow diagram of the method for terminal lock machine provided in an embodiment of the present invention;
Fig. 2 is a kind of schematic flow diagram of the method for terminal lock machine that another embodiment of the present invention provides;
Fig. 3 is a kind of schematic flow diagram of the method for control terminal lock machine provided in an embodiment of the present invention;
Fig. 4 is a kind of schematic block diagram of terminal provided in an embodiment of the present invention;
Fig. 5 is a kind of schematic block diagram for terminal that another embodiment of the present invention provides;
Fig. 6 is a kind of schematic block diagram of control device provided in an embodiment of the present invention;
Fig. 7 is a kind of terminal schematic block diagram that yet another embodiment of the invention provides;
Fig. 8 is another control device schematic block diagram that yet another embodiment of the invention provides.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation describes, it is clear that described embodiment is part of the embodiment of the present invention, rather than whole embodiments.Based on this hair
Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained under the premise of creative work is not made
Example, belongs to the scope of protection of the invention.
It should be appreciated that ought be in this specification and in the appended claims in use, term " comprising " and "comprising" instruction
Described feature, entirety, step, operation, the presence of element and/or component, but it is not precluded from one or more of the other feature, whole
Body, step, operation, element, component and/or its presence or addition for gathering.
It is also understood that the term used in this description of the invention is merely for the sake of the mesh for describing specific embodiment
And be not intended to limit the present invention.As used in description of the invention and appended claims, unless on
Other situations are hereafter clearly indicated, otherwise " one " of singulative, "one" and "the" are intended to include plural form.
It will be further appreciated that the term "and/or" used in description of the invention and appended claims is
Refer to any combinations of one or more of the associated item listed and be possible to combine, and including these combinations.
As used in this specification and in the appended claims, term " if " can be according to context quilt
Be construed to " when ... " or " once " or " in response to determining " or " in response to detecting ".Similarly, phrase " if it is determined that " or
" if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true
It is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
In the specific implementation, the terminal described in the embodiment of the present invention is including but not limited to such as with touch sensitive surface
The mobile phone, laptop computer or tablet PC of (for example, touch-screen display and/or touch pad) etc it is other just
Portable device.It is to be further understood that in certain embodiments, the equipment is not portable communication device, but with tactile
Touch the desktop computer of sensing surface (for example, touch-screen display and/or touch pad).
In discussion below, the terminal including display and touch sensitive surface is described.It is, however, to be understood that
It is that terminal can include one or more of the other physical user-interface device of such as physical keyboard, mouse and/or control-rod.
Terminal supports various application programs, such as one or more of following:Drawing application program, demonstration application journey
Sequence, word-processing application, website create application program, disk imprinting application program, spreadsheet applications, game application
Program, telephony application, videoconference application, email application, instant messaging applications, exercise
Support application program, photo management application program, digital camera application program, digital camera application program, web-browsing application
Program, digital music player application and/or video frequency player application program.
The various application programs that can be performed in terminal can use at least one public of such as touch sensitive surface
Physical user-interface device.It can adjust and/or change among applications and/or in corresponding application programs and touch sensitive table
The corresponding information shown in the one or more functions and terminal in face.So, the public physical structure of terminal is (for example, touch
Sensing surface) the various application programs with user interface directly perceived and transparent for a user can be supported.
It is that the embodiment of the present invention provides a kind of schematic flow diagram of the method for terminal lock machine, as shown in figure 1, eventually referring to Fig. 1
The method of end lock machine may include:
S101:Default trigger event is monitored.
In step S101, default trigger event can change including client identification module SIM card information, preset and answer
With being prohibited to run or unload the default application.
Default trigger event is monitored and can detected by the sensor in terminal, or by application module
Detected.
For example, the sensor in terminal can be the biography for detection terminal SIM card slot state or SIM card information
Sensor, application module can with detection mobile network, data traffic and speech path network network management module, or SIM card
Management module.
For example, application module can be clock module, calendaring module or the weather module run with terminal operating
Deng.
The default trigger event is used for the event for describing change terminal ownership information, or by obtaining terminal system
After ROOT authorities, to being used for the operation for ensureing that the application of user information safety is disabled in system.
Can detect in real time as when default trigger event is detected, or including but not limited to following two scenes.
Scene 1:
User Activity track is counted, by the current location of positioning terminal, judges current location whether in user
In event trace, if it is not, being then monitored to default trigger event.
For example, only include place A, place B and place C between date, in User Activity track.When detecting end
The current location at end is place X, and place X is then monitored not in User Activity track to default trigger event.
Scene 2:
When the ROOT authorities for detecting the terminal current system are acquired, default trigger event is monitored.
For example, when the terminal is connected with computer, and obtain by brush machine instrument the ROOT authorities of terminal system, then it is right
Default trigger event is monitored.
S102:If monitoring the default trigger event, solicited message is sent to control device.
In step s 102, if monitoring the default trigger event, and default trigger event is that SIM card information becomes
Change, then send solicited message to control device.Wherein, the client identification module SIM card information changes, and reflects described
Whether the SIM card in terminal is artificially extracted, or is changed.The information of current SIM card is carried in the solicited message.Need
It can include it is noted that SIM card information changes:Digital coding in SIM card changes, corresponding to SIM card
Telephone number changes, the speech path network corresponding to SIM card changes or SIM card corresponding to data network become
Change.The information of current SIM card comprises at least:The real-name authentication information of telephone number, SIM card corresponding to SIM card, SIM card
One or more in operator's informaiton corresponding to information of home location and SIM card.
It is understood that password can be password, user-defined password or the random cipher of systemic presupposition.
As a kind of possibility realized of the present embodiment, to control device send solicited message can be by default application to
Control device sends the solicited message.It is described default when sending the solicited message to control device by default application
Using with communication authority, and for detecting the SIM card information of the terminal, wherein, communication authority can include:Send information
Authority, the authority of receive information, the authority for initiating to reserved number call request, or the authority of incoming call answering.
It is understood that default application can be social networking application, can be specifically instant messaging application or non-instant
Communications applications.
Change to change for the telephone number corresponding to SIM card with the SIM card information of the terminal and illustrated
Illustrate, if the telephone number corresponding to SIM card changes, need by obtaining the telephone number corresponding to current SIM card,
And the telephone number generation solicited message according to corresponding to current SIM card, and then send the solicited message to control device.
S103:The response message that the control device returns is received, and the response message is hidden.
In step s 103, response message carries lock machine instruction and/or password, and lock machine is instructed for controlling terminal to perform
Lock machine operates.
Solicited message is sent to control device so that the control device is generated according to the current SIM card information and responded
Information, and return to the response message.After terminal is by identifying the response message, response message is hidden.
It is embodied in it is understood that being hidden to response message when receiving the response message, does not prompt the sound
Information is answered, or the response message is hidden in information list, i.e., does not show the response in information list
Information.
S104:Lock machine operation is performed according to the response message.
In step S104, lock machine operation includes screen locking, shutdown or performs deactivation operation to port.
It is understood that in order to ensure the stability of lock machine state, lock machine operation is being performed according to the response message
While, " forbid performing is not task of data interaction is carried out with control device " can also be realized, and/or " forbid obtaining
ROOT authorities ".
In such scheme, by being monitored to default trigger event;If the default trigger event is monitored, to control
Control equipment sends solicited message;The response message that the control device returns is received, and the response message is hidden;Root
Lock machine operation is performed according to the response message, the response message that can be sent to control device is hidden, and then realizes terminal
Without prompting lock machine.
It is a kind of schematic flow diagram of the method for terminal lock machine that another embodiment of the present invention provides referring to Fig. 2, such as Fig. 2
Shown, the method for terminal lock machine may include:
S201:Default trigger event is monitored.
It is understood that step S201 is identical with the step S101 in above-described embodiment, step S101 for details, reference can be made to
Associated description, will not be repeated here.
S202:If monitoring the default trigger event, solicited message is sent to control device.
In step S202, if monitoring, the default trigger event changes for client identification module SIM card information,
Then solicited message is sent to control device.The information of current SIM card is carried in the solicited message.
In the present embodiment, the current SIM card information includes destination number and target IMEI code.By the way that request is referred to
Make, the destination number and the target IMEI code compile the information content, to generate the solicited message.
It should be noted that IMEI code (International Mobile Equipment Identity) Chinese is entitled:
International Mobile Equipment Identity code, it is the abbreviation of International Mobile Equipment Identity code, international mobile equipment identification code, is by 15 bit digitals
" the electronics string number " of composition.
Single or multiple IMEI codes corresponding to each terminal differ, i.e., IMEI code has uniqueness.Single terminal
An IMEI code, two IMEI codes or multiple IMEI codes can be corresponded to simultaneously.When terminal can support that multimode is conversed, that is, support
During more cartoon communication services, then the terminal can correspond to multiple IMEI codes.
So that terminal can only use a SIM card as an example, when the SIM card information of terminal changes, by described in acquisition
Destination number, target IMEI code corresponding with the current SIM card corresponding to current SIM card;By request instruction, described current
SIM card number and the target IMEI code compile the solicited message, and the form of solicited message can enter shown in following table.
Request instruction | Target IMEI code | Current SIM card number |
For example, request instruction is " SIM change ", IMEI code are the combination of any 15 character strings, raw information
Content is specifically as follows:SIM change*IMEI codes * 13612345678.Wherein, " SIM change " are the request instruction,
" 13612345678 " are the destination number of the current SIM card, and " * " is the character for segmentation.
Terminal can use two SIM cards simultaneously, when a SIM card information of terminal changes, be worked as by obtaining
The destination number of preceding SIM card, specifically obtains the number of new SIM card after SIM card information change, and by the new SIM card
Number Reorganization be destination number.
For example, terminal uses two SIM cards simultaneously, the number of the first SIM card is " 13612345678 ", the second SIM card
Number is " 18512345678 ", and the IMEI code corresponding to the first SIM card is " 1234567890abcde ", and the second SIM card institute is right
The IMEI code answered is " 0987654321edcba ".When detecting that terminal only has the information of the first SIM card to change, and the
The number of one SIM card becomes from " 13612345678 " when turning to " 13787654321 ", by the destination number that gets be for
" 13787654321 ", target IMEI code corresponding with the current SIM card are " 1234567890abcde ", corresponding request letter
The content of breath is " SIM change*1234567890abcde*13787654321 ".
As a kind of possibility realized of the present embodiment, to control device send solicited message can be by default application to
Control device sends solicited message.I.e. by request instruction, the destination number and the target IMEI code in default application
The information content is compiled, to generate the solicited message, the solicited message is sent to the control by the default application
Equipment.
It should be noted that sent by default application to control device in the scene of solicited message, the default triggering
Event can also be that default application is prohibited to run or unloads the default application.
When detecting the default trigger event, and the default trigger event is prohibited to run or unloaded for default application
The default application is carried, then lock machine operation is performed according to default upper lock mechanism.Wherein, the default application operation is forbidden in detection,
Or the unloading default application, can be specifically to be detected by application module in terminal system.
In order to improve the accuracy that above-mentioned event occurs for detection, the application module for detecting above-mentioned event can be terminal
Application module normally opened in system, or being run always with terminal.For example, clock module, calendaring module, weather module or feelings
Scape intelligent object.
It should be noted that default upper lock mechanism can be that predetermined system is locked in terminal system, when detection forbid it is described
Default application operation, or during the unloading default application, then call the system lock to perform lock machine by the terminal and operate.Its
In, it can be by obtaining System Privileges to forbid the default application operation, and disabling setting is carried out to default application.Described in unloading
Default application, can directly be unloaded by pulling icon, or unloaded by force by obtaining system ROOT authorities.
It is understood that after locking execution lock machine operation by calling system, can be by carrying out system to the terminal
Refitting, or the mode of brush machine are recovered.
If it is to forbid the default application to run by the default trigger event, or the default trigger event is unloading
The default application, then lock machine operation is performed according to default upper lock mechanism so that when default application is unloaded, remain able to touch
Lock mechanism forbids terminal to be used on hair.
In actual applications, it can also prevent that default application is disabled or is unloaded by way of hiding default application.
So that default application is AntiTheftTrack.apk as an example, looked into " the application list " in terminal " setting "
" AntiTheftTrack.apk " is found, " AntiTheftTrack.apk " is hidden by selection so that should
Icon corresponding to " AntiTheftTrack.apk " do not show in the display interface of terminal, realizes pair
AntiTheftTrack.apk's hides.
S203:The response message that the control device returns is received, and the response message is hidden.
In step S203, terminal receives the response message that the control device returns, and the response message is carried out
Hide.
The response message is corresponding with the solicited message, and the content of the response message specifically can be such as following table institute
Show.
Lock machine instructs | Target IMEI code |
Lock machine instruction can be the instruction for calling system lock, or control the instruction of the terminal progress lock machine.
Lock machine instruction can include keyword or key character, by identifying response message, and then obtain corresponding crucial
Word, lock machine instructs according to corresponding to can obtaining the keyword.
So that lock machine instruction is the instruction for calling system lock as an example, lock machine instruction can be " lock phone ".For example,
The content of response message is specifically as follows:lock phone*1234567890abcde.Wherein, " lock phone " refer to for lock machine
The keyword of order, " 1234567890abcde " are the IMEI code, and " * " is the character for segmentation.
It is understood that response message can also include password, for being used to judge that unlocking pin is in releasing process
No correct, the password can be password, user-defined password or the random cipher by generating of systemic presupposition.
Step S203 can specifically include:Judge whether the response message includes the first default mark, described first is pre-
If it is identified as the title for performing the process for receiving the response message operation;If it is default that the response message includes described first
Mark, then be hidden to the response message.
It should be noted that the first default title for being identified as the process for performing the reception response message operation, works as inspection
Measuring has first to preset mark in the information header of response message, then determines that execution receives the response and believed according to the first default mark
The process of operation is ceased, and operation is hidden to the process, even the implementation procedure and result of the process be not in screen
Display.
S204:Lock machine operation is performed according to the response message.
It is understood that step S204 is identical with the step S104 in above-described embodiment, step S104 for details, reference can be made to
Associated description, will not be repeated here.
S205:Receive that the control device sends short message is corresponding unlocks short message with the response, and according to the solution
Short message is locked, performs unblock operation.
In step S205, the unlocking information carries the second default mark, unlock instruction, target IMEI code and unblock
Password.
It should be noted that it is identified and is hidden for the ease of unlocking information, described in being carried in unlocking information
Second default mark, can trigger the operation being hidden to the information while unlocking information is identified.
It is understood that the described second default title for being identified as the process for performing the reception unlocking information operation,
The step of to being hidden in step S203 to response message, is similar, therefore here is omitted.
In the present embodiment, unlock instruction can be the instruction for stopping calling system lock, or control the terminal
The instruction being unlocked.The content of the unlocking information specifically can be with as shown in the table.
Unlock instruction | Target IMEI code | Password |
It is understood that unlocking pin can be for the password of systemic presupposition, user-defined password or by generating
Random cipher.
So that unlock instruction is for stopping the instruction of calling system lock as an example, unlock instruction can be " unlock
phone”.For example, the content of unlocking information is specifically as follows:unlock phone*1234567890abcde*123456.Its
In, " unlock phone " are the keyword of unlock instruction, and " 1234567890abcde " is the IMEI code, and " 123456 " are
The unlocking pin, " * " are the character for segmentation.
When carrying out lock machine by calling system, it is allowed to which user is unlocked by inputting the unlocking pin.
It is understood that in all embodiments of the invention, in solicited message, response message and unlocking information
Settable default mark, request is believed by identifying solicited message, response message or unlocking information, and then according to default mark
Breath, response message or unlocking information are hidden.Wherein, please when receiving and dispatching solicited message, response message or unlocking information
Ask information, response message and unlocking information to give tacit consent to be hidden, user can take solicited message and unlocking information by setting
Blanking is hidden.
As a kind of mode in the cards of the present embodiment, when the communicating number change of control device, control device is write from memory
Recognize to the terminal and send information for changing reserved number, the information includes the number after control device change, described
Original reserved number is revised as number after change by terminal according to the information for being used to change the reserved number
Code.
It should be noted that before the solicited message is sent to control device according to reserved number, institute is not received
State the information for changing the reserved number, it is determined that the reserved number does not change, then according to reserved number to control
Control equipment sends the solicited message.When receiving the information for being used to change the reserved number, it is determined that described to prestore
Number is changed, then sends the solicited message to control device according to the number after change.
In such scheme, by being monitored to default trigger event;If the default trigger event is monitored, to control
Control equipment sends solicited message;The response message that the control device returns is received, and the response message is hidden;Root
Lock machine operation is performed according to the response message, the response message that can be sent to control device is hidden, and then realizes terminal
Without prompting lock machine.
By receiving that the control device sends and short message is corresponding unlocks short message for the response, and according to the unblock
Short message, unblock operation is performed, and then realize unblock.
If the default trigger event is default described default to unload using operation, or the default trigger event to forbid
Using then according to default upper lock mechanism execution lock machine operation so that when default application is unloaded, remain able to trigger lock machine
System carries out lock machine to terminal.
It is a kind of schematic flow diagram of method for controlling terminal lock machine provided in an embodiment of the present invention referring to Fig. 3, such as Fig. 3
Shown, the method for control terminal lock machine may include:
S301:The solicited message that receiving terminal is sent, the solicited message are that the terminal is monitoring default triggering thing
The solicited message generated during part.
In step S301, the client identification module SIM card information changes, and reflects the SIM in the terminal
Whether card is artificially extracted, or changes.The information of current SIM card is carried in the solicited message.Response message carries
Lock machine instruction and/or password, lock machine are instructed for controlling terminal to perform lock machine operation.
It can include it should be noted that SIM card information changes:Digital coding in SIM card changes, SIM
The corresponding telephone number of card changes, the speech path network corresponding to SIM card changes or SIM card corresponding to data
Network changes.The information of current SIM card comprises at least:The real-name authentication letter of telephone number, SIM card corresponding to SIM card
One or more in breath, the information of home location of SIM card and operator's informaiton corresponding to SIM card.
In the present embodiment, the current SIM card information includes destination number and target IMEI code.By the way that request is referred to
Make, the destination number and the target IMEI code compile the information content, to generate the solicited message.
It should be noted that IMEI code (International Mobile Equipment Identity) Chinese is entitled:
International Mobile Equipment Identity code, it is the abbreviation of International Mobile Equipment Identity code, international mobile equipment identification code, is by 15 bit digitals
" the electronics string number " of composition.
Single or multiple IMEI codes corresponding to each terminal differ, i.e., IMEI code has uniqueness.Single terminal
An IMEI code, two IMEI codes or multiple IMEI codes can be corresponded to simultaneously.When terminal can support that multimode is conversed, that is, support
During more cartoon communication services, then the terminal can correspond to multiple IMEI codes.
As a kind of mode realized of the present embodiment, before step S301, including:Sent to the terminal for changing
The information of the reserved number, the terminal is set to change reserved number according to described information.
Step S301 is specifically included:The solicited message that receiving terminal is sent according to new preset number.
It is understood that when the communicating number change of control device, control device, which is given tacit consent to send to the terminal, to be used
In the information of modification reserved number, the information includes the number after control device change, and the terminal is used to repair according to described
Change the information of the reserved number, original reserved number is revised as the number after change.
It should be noted that before the solicited message that receiving terminal is sent according to reserved number, do not sent out to terminal
Send the information for being used to change the reserved number, it is determined that the reserved number does not change so that terminal can root
The solicited message is sent according to reserved number.Described it is used to change described prestore when the control device have sent to the terminal
The information of number, it is determined that the reserved number is changed, then receives what the terminal was sent according to the number after change
The solicited message.
S302:Corresponding response message is sent to the terminal according to the solicited message so that described in the terminal-pair
Response message is hidden and performs lock machine operation according to the response message.
The response message is corresponding with the solicited message, and the content of the response message specifically can be such as following table institute
Show.
Lock machine instructs | Target IMEI code |
Lock machine instruction can be the instruction for calling system lock, or control the instruction of the terminal progress lock machine.
Lock machine instruction can include keyword or key character, by identifying response message, and then obtain corresponding crucial
Word, lock machine instructs according to corresponding to can obtaining the keyword.
So that lock machine instruction is the instruction for calling system lock as an example, lock machine instruction can be " lock phone ".For example,
The content of response message is specifically as follows:lock phone*1234567890abcde.Wherein, " lock phone " refer to for lock machine
The keyword of order, " 1234567890abcde " are the IMEI code, and " * " is the character for segmentation.
It is understood that response message can also include password, for being used to judge that unlocking pin is in releasing process
No correct, the password can be password, user-defined password or the random cipher by generating of systemic presupposition.
As a kind of possibility realized of the present embodiment, step S302 can specifically include:According to the solicited message to institute
State terminal and send corresponding response message so that response message described in the terminal-pair is identified, if the terminal detects
There is the first default mark in the information header of the response message, then response message described in the terminal-pair is hidden, and described the
The one default title for being identified as the terminal and performing the process for receiving the response message operation.
It should be noted that the first default title for being identified as the process for performing the reception response message operation, works as inspection
Measuring has first to preset mark in the information header of response message, then determines that execution receives the response and believed according to the first default mark
The process of operation is ceased, and operation is hidden to the process, even the implementation procedure and result of the process be not in screen
Display.
S303:Sent to the terminal and respond that short message is corresponding unlocks short message with described, make the terminal according to the solution
Lock short message and perform unblock operation.
In step S303, the unlocking information carries the second default mark, unlock instruction, target IMEI code and unblock
Password.
It should be noted that it is identified and is hidden for the ease of unlocking information, described in being carried in unlocking information
Second default mark, can trigger the operation being hidden to the information while unlocking information is identified.
It is understood that the step of to being hidden in step S302 to response message, is similar, the described second pre- bidding
Know to perform the title for the process for receiving the unlocking information operation.
In the present embodiment, unlock instruction can be the instruction for stopping calling system lock, or control the terminal
The instruction being unlocked.The content of the unlocking information specifically can be with as shown in the table.
Unlock instruction | Target IMEI code | Password |
It is understood that unlocking pin can be for the password of systemic presupposition, user-defined password or by generating
Random cipher.
So that unlock instruction is for stopping the instruction of calling system lock as an example, unlock instruction can be " unlock
phone”.For example, the content of unlocking information is specifically as follows:unlock phone*1234567890abcde*123456.Its
In, " unlock phone " are the keyword of unlock instruction, and " 1234567890abcde " is the IMEI code, and " 123456 " are
The unlocking pin, " * " are the character for segmentation.
When carrying out lock machine by calling system, it is allowed to which user is unlocked by inputting the unlocking pin.
It is understood that in all embodiments of the invention, in solicited message, response message and unlocking information
Settable default mark, request is believed by identifying solicited message, response message or unlocking information, and then according to default mark
Breath, response message or unlocking information are hidden.Wherein, please when receiving and dispatching solicited message, response message or unlocking information
Ask information, response message and unlocking information to give tacit consent to be hidden, user can take solicited message and unlocking information by setting
Blanking is hidden.
In such scheme, by the solicited message of receiving terminal transmission, the solicited message is that the terminal is monitoring
The solicited message generated during default trigger event;Corresponding response message is sent to the terminal according to the solicited message,
So that response message described in the terminal-pair is hidden and performs lock machine operation according to the response message.So that terminal can be with
To control device send response message be hidden, and then realize terminal without prompting lock machine.
Referring to Fig. 4, Fig. 4 is a kind of schematic block diagram of terminal provided in an embodiment of the present invention.Terminal 400 can be intelligence
The mobile terminals such as mobile phone, tablet personal computer.The each unit that the terminal 400 of the present embodiment includes is used to perform embodiment corresponding to Fig. 1
In each step, referring specifically to the associated description in embodiment corresponding to Fig. 1 and Fig. 1, do not repeat herein.The present embodiment
Terminal 400 includes:Monitoring unit 401, transmitting element 402, receiving unit 403 and execution unit 404.
Monitoring unit 401, for being monitored to default trigger event, and monitoring result is sent to transmitting element 402.
For example, monitoring unit 401 is monitored to default trigger event, and monitoring result is sent to transmitting element 402.
Transmitting element 402, for receiving the monitoring result of the transmission of monitoring unit 401, and if monitoring the default triggering
Event, then send solicited message to control device.
For example, transmitting element 402 receives the monitoring result that monitoring unit 401 is sent, and if monitoring the default triggering
Event, then send solicited message to control device.
Receiving unit 403, the response message returned for receiving the control device, and the response message is carried out hidden
Hide.
For example, receiving unit 403 receives the response message that the control device returns, and the response message is carried out hidden
Hide.
Execution unit 404, for performing lock machine operation according to the response message.
Operated for example, execution unit 402 performs lock machine according to the response message.
In such scheme, by being monitored to default trigger event;If the default trigger event is monitored, to control
Control equipment sends solicited message;The response message that the control device returns is received, and the response message is hidden;Root
Lock machine operation is performed according to the response message, the response message that can be sent to control device is hidden, and then realizes terminal
Without prompting lock machine.
Referring to Fig. 5, Fig. 5 is a kind of schematic block diagram for terminal that another embodiment of the present invention provides.Terminal 500 can be
The mobile terminals such as smart mobile phone, tablet personal computer.The each unit that the terminal 500 of the present embodiment includes is used to perform real corresponding to Fig. 2
Each step in example is applied, referring specifically to the associated description in embodiment corresponding to Fig. 2 and Fig. 2, is not repeated herein.This implementation
The terminal 500 of example includes:Monitoring unit 501, transmitting element 502, receiving unit 503, execution unit 504, unlocking unit 505 with
And default lock machine unit 506.
Monitoring unit 501, for being monitored to default trigger event, and monitoring result is sent to transmitting element 502.
For example, monitoring unit 501 is monitored to default trigger event, and monitoring result is sent to transmitting element 502.
Transmitting element 502, for receiving the monitoring result of the transmission of monitoring unit 501, and if monitoring the default triggering
Event, then send solicited message to control device.
For example, transmitting element 502 receives the monitoring result that monitoring unit 501 is sent, and if monitoring the default triggering
Event, then send solicited message to control device.
Further, as a kind of possibility realized of the present embodiment, if testing result for default application be prohibited operation or
Person unloads the default application, then testing result is sent into default lock machine unit 506.
Transmitting element 502 is additionally operable to, if testing result is prohibited to run or unloads the default application for default application,
Testing result is then sent to default lock machine unit 506.
If being prohibited to run or unloading the default application for example, the testing result of transmitting element 502 is default application,
Testing result is sent to default lock machine unit 506.
Receiving unit 503, the response message returned for receiving the control device, and the response message is carried out hidden
Hide.
For example, receiving unit 503 receives the response message that the control device returns, and the response message is carried out hidden
Hide.
Receiving unit 503 is specifically used for, and receives the response message that the control device returns, and judge the response message
Whether first default mark, the described first default title that is identified as execution receives the process of the response message operation are included;
If the response message includes the described first default mark, the response message is hidden.
For example, receiving unit 503 receives the response message that the control device returns, and whether judge the response message
Including the first default mark, the described first default title for being identified as the process for performing the reception response message operation;If institute
Stating response message includes the described first default mark, then the response message is hidden.
Execution unit 504, for performing lock machine operation according to the response message.
Operated for example, execution unit 504 performs lock machine according to the response message.
Unlocking unit 505, for receive that the control device sends it is corresponding with the response short message unlock short message, and
According to the unblock short message, unblock operation is performed.
For example, unlocking unit 505 receive that the control device sends it is corresponding with the response short message unlock short message, and
According to the unblock short message, unblock operation is performed.
Default lock machine unit 506, if it is to forbid default application operation for the default trigger event, or it is described default tactile
Hair event then performs lock machine operation to unload the default application according to default upper lock mechanism.
If for example, the 506 default trigger event of lock machine unit is preset to forbid default application operation, or described preset to touch
Hair event then performs lock machine operation to unload the default application according to default upper lock mechanism.
In such scheme, by being monitored to default trigger event;If the default trigger event is monitored, to control
Control equipment sends solicited message;The response message that the control device returns is received, and the response message is hidden;Root
Lock machine operation is performed according to the response message, the response message that can be sent to control device is hidden, and then realizes terminal
Without prompting lock machine.
By receiving that the control device sends and short message is corresponding unlocks short message for the response, and according to the unblock
Short message, unblock operation is performed, and then realize unblock.
If the default trigger event is default described default to unload using operation, or the default trigger event to forbid
Using then according to default upper lock mechanism execution lock machine operation so that when default application is unloaded, remain able to trigger lock machine
System carries out lock machine to terminal.
Referring to Fig. 6, Fig. 6 is a kind of schematic block diagram of control device provided in an embodiment of the present invention.Control device 600 can
Think the mobile terminals such as smart mobile phone, tablet personal computer, can also be server.The control device 600 of the present embodiment includes each
Unit is used to perform each step in embodiment corresponding to Fig. 3, referring specifically to the phase in embodiment corresponding to Fig. 3 and Fig. 3
Description is closed, is not repeated herein.The control device 600 of the present embodiment includes:Information receiving unit 601 and first information transmitting element
602。
Information receiving unit 601, the solicited message sent for receiving terminal, the solicited message are that the terminal is being supervised
Measure the solicited message generated during default trigger event.
For example, the solicited message that the receiving terminal of information receiving unit 60 is sent, the solicited message is that the terminal is being supervised
Measure the solicited message generated during default trigger event.
First information transmitting element 602, for sending corresponding response message to the terminal according to the solicited message,
So that response message described in the terminal-pair is hidden and performs lock machine operation according to the response message.
For example, first information transmitting element 602 sends corresponding response message according to the solicited message to the terminal,
So that response message described in the terminal-pair is hidden and performs lock machine operation according to the response message.
Further, control device 600 also includes:
Second information transmitting unit 603, for sending corresponding response message to the terminal according to the solicited message,
So that response message described in the terminal-pair is hidden, and lock machine operation is performed according to the response message.
For example, the second information transmitting unit 603 sends corresponding response message according to the solicited message to the terminal,
So that response message described in the terminal-pair is hidden, and lock machine operation is performed according to the response message.
As a kind of possibility realized of the present embodiment, control device 600 can also include changing unit 604.
Changing unit 604, for sending the information for changing the reserved number to the terminal, make the terminal root
Reserved number is changed according to described information.
For example, changing unit 604 sends the information for changing the reserved number to the terminal, make the terminal root
Reserved number is changed according to described information.
Information receiving unit 601 is specifically used for, the solicited message that receiving terminal is sent according to new preset number.
For example, the solicited message that the receiving terminal of information receiving unit 601 is sent according to new preset number.
In such scheme, by the solicited message of receiving terminal transmission, the solicited message is that the terminal is monitoring
The solicited message generated during default trigger event;Corresponding response message is sent to the terminal according to the solicited message,
So that response message described in the terminal-pair is hidden and performs lock machine operation according to the response message.So that terminal can be with
To control device send response message be hidden, and then realize terminal without prompting lock machine.
It is a kind of terminal schematic block diagram that yet another embodiment of the invention provides referring to Fig. 7.In the present embodiment as depicted
Terminal can include:One or more processors 701;One or more input equipments 702, one or more output equipments
703 and memory 704.Above-mentioned processor 701, input equipment 702, output equipment 703 and memory 704 are connected by bus 705
Connect.Memory 702 is used to store, and computer program includes instruction, and processor 701 is by calling the calculating that memory 702 stores
Machine program performs following operation:
Processor 701 is used for:Default trigger event is monitored.
Processor 701 is used for:If monitoring the default trigger event, solicited message is sent to control device.
Processor 701 is used for:The response message that the control device returns is received, and the response message is carried out hidden
Hide.
Processor 701 is used for:Lock machine operation is performed according to the response message.
Processor 701 is additionally operable to:Receive that the control device sends it is corresponding with the response short message unlock short message, and
According to the unblock short message, unblock operation is performed.
Processor 701 is specifically used for:Judge whether the response message includes the first default mark, the described first pre- bidding
Know to perform the title for the process for receiving the response message operation;If the response message includes the described first pre- bidding
Know, then the response message is hidden.
Processor 701 is specifically used for:By request instruction, the current SIM card number and institute in the default application
State target IMEI code and compile the solicited message;Solicited message is sent from default apply to control device;By default
The response message returned using the control device is received, and the response message is hidden;Basis is applied by default
The response message performs lock machine operation.
Processor 701 is additionally operable to:If the default trigger event is default using operation, or the default triggering thing to forbid
Part then performs lock machine operation to unload the default application according to default upper lock mechanism.
It should be appreciated that in embodiments of the present invention, alleged processor 701 can be CPU (Central
Processing Unit, CPU), the processor can also be other general processors, digital signal processor (Digital
Signal Processor, DSP), application specific integrated circuit (Application Specific Integrated Circuit,
ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other FPGAs
Device, discrete gate or transistor logic, discrete hardware components etc..General processor can be microprocessor or this at
It can also be any conventional processor etc. to manage device.
Input equipment 702 can include Trackpad, fingerprint adopt sensor (finger print information that is used to gathering user and fingerprint
Directional information), microphone etc., output equipment 703 can include display (LCD etc.), loudspeaker etc..
The memory 704 can include read-only storage and random access memory, and to processor 701 provide instruction and
Data.The a part of of memory 704 can also include nonvolatile RAM.For example, memory 704 can also be deposited
Store up the information of device type.
In the specific implementation, processor 701, input equipment 702, the output equipment 703 described in the embodiment of the present invention can
Described in the first embodiment and second embodiment for performing a kind of method of control terminal lock machine provided in an embodiment of the present invention
Implementation, also can perform the embodiment of the present invention described by terminal implementation, will not be repeated here.
A kind of computer-readable recording medium, the computer-readable storage medium are provided in another embodiment of the invention
Matter is stored with computer program, and the computer program is realized when being executed by processor:
Default trigger event is monitored.
If monitoring the default trigger event, solicited message is sent to control device.
The response message that the control device returns is received, and the response message is hidden.
Lock machine operation is performed according to the response message.
The computer program is also realized when being executed by processor:
Receive the corresponding with the response short message of the control device transmission and unlock short message, and it is short according to the unblock
Letter, perform unblock operation.
The computer program is also realized when being executed by processor:
Judge whether the response message is preset including first to identify, the described first default be identified as performs the reception sound
Answer the title of the process of information operation.
If the response message includes the described first default mark, the response message is hidden.
The computer program is also realized when being executed by processor:
Destination number, target corresponding with the current SIM card corresponding to the current SIM card are obtained by default application
IMEI code.
Request instruction, the current SIM card number and the target IMEI code are compiled in the default application
The solicited message.
Solicited message is sent from default apply to control device.
The response message of the control device return is received by default application, and the response message is hidden.
Lock machine is performed by default application according to the response message to operate.
The computer program is also realized when being executed by processor:
If the default trigger event is default described default to unload using operation, or the default trigger event to forbid
Using then according to default upper lock mechanism execution lock machine operation.
In such scheme, by being monitored to default trigger event;If the default trigger event is monitored, to control
Control equipment sends solicited message;The response message that the control device returns is received, and the response message is hidden;Root
Lock machine operation is performed according to the response message, the response message that can be sent to control device is hidden, and then realizes terminal
Without prompting lock machine.
By receiving that the control device sends and short message is corresponding unlocks short message for the response, and according to the unblock
Short message, unblock operation is performed, and then realize unblock.
The computer-readable recording medium can be the internal storage unit of the terminal described in foregoing any embodiment, example
Such as the hard disk or internal memory of terminal.The computer-readable recording medium can also be the External memory equipment of the terminal, such as
The plug-in type hard disk being equipped with the terminal, intelligent memory card (Smart Media Card, SMC), secure digital (Secure
Digital, SD) card, flash card (Flash Card) etc..Further, the computer-readable recording medium can also be wrapped both
Including the internal storage unit of the terminal also includes External memory equipment.The computer-readable recording medium is described for storing
Other programs and data needed for computer program and the terminal.The computer-readable recording medium can be also used for temporarily
When store the data that has exported or will export.
It is a kind of control device schematic block diagram that yet another embodiment of the invention provides referring to Fig. 8.This implementation as depicted
Control device in example can include:One or more processors 801;One or more input equipments 802, it is one or more defeated
Go out equipment 803 and memory 804.Above-mentioned processor 801, input equipment 802, output equipment 803 and memory 804 pass through bus
805 connections.Memory 802 is used to store, and computer program includes instruction, what processor 801 was stored by calling memory 802
Computer program performs following operation:
Processor 801 is used for:Receiving terminal send solicited message, the solicited message be the terminal monitor it is pre-
If the solicited message generated during trigger event.
Processor 801 is used for:Corresponding response message is sent to the terminal according to the solicited message so that the end
End is hidden to the response message and performs lock machine operation according to the response message.
Processor 801 is used for:Sent to the terminal and respond that short message is corresponding unlocks short message with described, make the terminal root
Unblock operation is performed according to the unblock short message.
Processor 801 is additionally operable to:The information for changing the reserved number is sent to the terminal, makes the terminal root
Reserved number is changed according to described information.
Processor 801 is specifically used for:The solicited message that receiving terminal is sent according to new preset number.
In such scheme, by the solicited message of receiving terminal transmission, the solicited message is that the terminal is monitoring
The solicited message generated during default trigger event;Corresponding response message is sent to the terminal according to the solicited message,
So that response message described in the terminal-pair is hidden and performs lock machine operation according to the response message.So that terminal can be with
To control device send response message be hidden, and then realize terminal without prompting lock machine.
It should be appreciated that in embodiments of the present invention, alleged processor 801 can be CPU (Central
Processing Unit, CPU), the processor can also be other general processors, digital signal processor (Digital
Signal Processor, DSP), application specific integrated circuit (Application Specific Integrated Circuit,
ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other FPGAs
Device, discrete gate or transistor logic, discrete hardware components etc..General processor can be microprocessor or this at
It can also be any conventional processor etc. to manage device.
Input equipment 802 can include Trackpad, fingerprint adopt sensor (finger print information that is used to gathering user and fingerprint
Directional information), microphone etc., output equipment 803 can include display (LCD etc.), loudspeaker etc..
The memory 804 can include read-only storage and random access memory, and to processor 801 provide instruction and
Data.The a part of of memory 804 can also include nonvolatile RAM.For example, memory 804 can also be deposited
Store up the information of device type.
In the specific implementation, processor 801, input equipment 802, the output equipment 803 described in the embodiment of the present invention can
Described in the first embodiment and second embodiment for performing a kind of method of control terminal lock machine provided in an embodiment of the present invention
Implementation, also can perform the embodiment of the present invention described by terminal implementation, will not be repeated here.
A kind of computer-readable recording medium, the computer-readable storage medium are provided in another embodiment of the invention
Matter is stored with computer program, and the computer program is realized when being executed by processor:
The solicited message that receiving terminal is sent, the solicited message are monitoring default trigger event when institute for the terminal
The solicited message of generation.
Corresponding response message is sent to the terminal according to the solicited message so that letter is responded described in the terminal-pair
Breath is hidden and performs lock machine operation according to the response message.
The computer program is also realized when being executed by processor:
Sent to the terminal and respond that short message is corresponding unlocks short message with described, make the terminal according to the unblock short message
Perform unblock operation.
The computer program is also realized when being executed by processor:
The information for changing the reserved number is sent to the terminal, the terminal is changed according to described information pre-
Deposit number.
The solicited message that receiving terminal is sent according to new preset number.
In such scheme, by the solicited message of receiving terminal transmission, the solicited message is that the terminal is monitoring
The solicited message generated during default trigger event;Corresponding response message is sent to the terminal according to the solicited message,
So that response message described in the terminal-pair is hidden and performs lock machine operation according to the response message.So that terminal can be with
To control device send response message be hidden, and then realize terminal without prompting lock machine.
The computer-readable recording medium can be the internal storage unit of the terminal described in foregoing any embodiment, example
Such as the hard disk or internal memory of terminal.The computer-readable recording medium can also be the External memory equipment of the terminal, such as
The plug-in type hard disk being equipped with the terminal, intelligent memory card (Smart Media Card, SMC), secure digital (Secure
Digital, SD) card, flash card (Flash Card) etc..Further, the computer-readable recording medium can also be wrapped both
Including the internal storage unit of the terminal also includes External memory equipment.The computer-readable recording medium is described for storing
Other programs and data needed for computer program and the terminal.The computer-readable recording medium can be also used for temporarily
When store the data that has exported or will export.
Those of ordinary skill in the art are it is to be appreciated that the list of each example described with reference to the embodiments described herein
Member and algorithm steps, it can be realized with electronic hardware, computer software or the combination of the two, in order to clearly demonstrate hardware
With the interchangeability of software, the composition and step of each example are generally described according to function in the above description.This
A little functions are performed with hardware or software mode actually, application-specific and design constraint depending on technical scheme.Specially
Industry technical staff can realize described function using distinct methods to each specific application, but this realization is not
It is considered as beyond the scope of this invention.
It is apparent to those skilled in the art that for convenience of description and succinctly, the end of foregoing description
End and the specific work process of unit, may be referred to the corresponding process in preceding method embodiment, will not be repeated here.
In several embodiments provided herein, it should be understood that disclosed system, terminal and method, can be with
Realize by another way.For example, device embodiment described above is only schematical, for example, the unit
Division, only a kind of division of logic function, can there is other dividing mode, such as multiple units or component when actually realizing
Another system can be combined or be desirably integrated into, or some features can be ignored, or do not perform.In addition, shown or beg for
The mutual coupling of opinion or direct-coupling or communication connection can be the INDIRECT COUPLINGs by some interfaces, device or unit
Or communication connection or electricity, the connection of mechanical or other forms.
The unit illustrated as separating component can be or may not be physically separate, show as unit
The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple
On NE.Some or all of unit therein can be selected to realize scheme of the embodiment of the present invention according to the actual needs
Purpose.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, can also
It is that unit is individually physically present or two or more units are integrated in a unit.It is above-mentioned integrated
Unit can both be realized in the form of hardware, can also be realized in the form of SFU software functional unit.
If the integrated unit is realized in the form of SFU software functional unit and is used as independent production marketing or use
When, it can be stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially
The part to be contributed in other words to prior art, or all or part of the technical scheme can be in the form of software product
Embody, the computer software product is stored in a storage medium, including some instructions are causing a computer
Equipment (can be personal computer, server, or network equipment etc.) performs the complete of each embodiment methods described of the present invention
Portion or part steps.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only
Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey
The medium of sequence code.
The foregoing is only a specific embodiment of the invention, but protection scope of the present invention is not limited thereto, any
Those familiar with the art the invention discloses technical scope in, various equivalent modifications can be readily occurred in or replaced
Change, these modifications or substitutions should be all included within the scope of the present invention.Therefore, protection scope of the present invention should be with right
It is required that protection domain be defined.
Claims (10)
- A kind of 1. method of terminal lock machine, it is characterised in that methods described includes:Default trigger event is monitored;If monitoring the default trigger event, solicited message is sent to control device;The response message that the control device returns is received, and the response message is hidden;Lock machine operation is performed according to the response message.
- 2. according to the method for claim 1, it is characterised in that it is described that the response message is hidden, including:Whether include first default mark, described first default be identified as execution and receive the response letter if judging the response message Cease the title of the process of operation;If the response message includes the described first default mark, the response message is hidden.
- A kind of 3. method for controlling terminal lock machine, it is characterised in that methods described includes:The solicited message that receiving terminal is sent, the solicited message are generated by the terminal when monitoring default trigger event Solicited message;Corresponding response message is sent to the terminal according to the solicited message so that response message described in the terminal-pair is entered Row is hidden and performs lock machine operation according to the response message.
- 4. according to the method for claim 3, it is characterised in that described that phase is sent to the terminal according to the solicited message The response message answered so that response message described in the terminal-pair is hidden and performs lock machine behaviour according to the response message Make, including:Corresponding response message is sent to the terminal according to the solicited message so that the terminal judges the response message Whether first default mark is included, described first presets the title for being identified as and performing the process for receiving the response message operation, If the response message includes the described first default mark, the response message is hidden.
- A kind of 5. terminal, it is characterised in that including:Monitoring unit, for being monitored to default trigger event;Transmitting element, if for monitoring the default trigger event, solicited message is sent to control device;Receiving unit, the response message returned for receiving the control device, and the response message is hidden;Execution unit, for performing lock machine operation according to the response message.
- A kind of 6. control device, it is characterised in that including:Information receiving unit, for receiving terminal send solicited message, the solicited message be the terminal monitor it is pre- If the solicited message generated during trigger event;First information transmitting element, for sending corresponding response message to the terminal according to the solicited message so that institute Response message described in terminal-pair is stated to be hidden and perform lock machine operation according to the response message.
- 7. a kind of terminal, it is characterised in that the processor, defeated including processor, input equipment, output equipment and memory Enter equipment, output equipment and memory to be connected with each other, wherein, the memory is used to store computer program, the processor It is arranged to call the computer program, performs method as claimed in claim 1 or 2.
- 8. a kind of computer-readable recording medium, it is characterised in that the computer-readable storage medium is stored with computer program, institute Stating computer program includes programmed instruction, and described program instruction makes the computing device such as right will when being executed by a processor Seek the method described in 1 or 2.
- A kind of 9. control device, it is characterised in that including processor, input equipment, output equipment and memory, the processing Device, input equipment, output equipment and memory are connected with each other, wherein, the memory is used to store computer program, the place Reason device is arranged to call the computer program, performs the method as described in claim 3 or 4.
- A kind of 10. computer-readable recording medium, it is characterised in that the computer-readable storage medium is stored with computer program, The computer program includes programmed instruction, and described program instruction makes the computing device such as right when being executed by a processor It is required that the method described in 3 or 4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710433101.1A CN107370872A (en) | 2017-06-09 | 2017-06-09 | Method, terminal and the control device of a kind of terminal lock machine and control terminal lock machine |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710433101.1A CN107370872A (en) | 2017-06-09 | 2017-06-09 | Method, terminal and the control device of a kind of terminal lock machine and control terminal lock machine |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107370872A true CN107370872A (en) | 2017-11-21 |
Family
ID=60304840
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710433101.1A Withdrawn CN107370872A (en) | 2017-06-09 | 2017-06-09 | Method, terminal and the control device of a kind of terminal lock machine and control terminal lock machine |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107370872A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108171084A (en) * | 2018-01-30 | 2018-06-15 | 江苏信源达科技有限公司 | Method, apparatus, mobile terminal and the readable storage medium storing program for executing of safeguards system safety |
CN108307463A (en) * | 2018-01-30 | 2018-07-20 | 江苏信源达科技有限公司 | mode switching method, system and access control system |
CN108843972A (en) * | 2018-06-25 | 2018-11-20 | 西安华为技术有限公司 | Fuel Delivery System, exhaust apparatus, fuel oil delivery method and controller |
CN110696503A (en) * | 2019-10-11 | 2020-01-17 | 杭州珐珞斯科技有限公司 | Control device, method and equipment of printing equipment |
CN112383913A (en) * | 2020-11-12 | 2021-02-19 | 深圳市锐尔觅移动通信有限公司 | Terminal card locking control method and device, terminal equipment and storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120244839A1 (en) * | 2010-01-21 | 2012-09-27 | Zte Corporation | Anti-theft mobile terminal and anti-theft method for mobile terminal |
CN102929807A (en) * | 2012-11-19 | 2013-02-13 | 周万荣 | Method for initiatively performing loss judgment and data processing and mobile terminal |
-
2017
- 2017-06-09 CN CN201710433101.1A patent/CN107370872A/en not_active Withdrawn
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120244839A1 (en) * | 2010-01-21 | 2012-09-27 | Zte Corporation | Anti-theft mobile terminal and anti-theft method for mobile terminal |
CN102929807A (en) * | 2012-11-19 | 2013-02-13 | 周万荣 | Method for initiatively performing loss judgment and data processing and mobile terminal |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108171084A (en) * | 2018-01-30 | 2018-06-15 | 江苏信源达科技有限公司 | Method, apparatus, mobile terminal and the readable storage medium storing program for executing of safeguards system safety |
CN108307463A (en) * | 2018-01-30 | 2018-07-20 | 江苏信源达科技有限公司 | mode switching method, system and access control system |
CN108171084B (en) * | 2018-01-30 | 2019-01-29 | 江苏信源达科技有限公司 | Method, apparatus, mobile terminal and the readable storage medium storing program for executing of safeguards system safety |
CN108843972A (en) * | 2018-06-25 | 2018-11-20 | 西安华为技术有限公司 | Fuel Delivery System, exhaust apparatus, fuel oil delivery method and controller |
CN110696503A (en) * | 2019-10-11 | 2020-01-17 | 杭州珐珞斯科技有限公司 | Control device, method and equipment of printing equipment |
CN110696503B (en) * | 2019-10-11 | 2021-08-31 | 杭州珐珞斯科技有限公司 | Control device, method and equipment of printing equipment |
CN112383913A (en) * | 2020-11-12 | 2021-02-19 | 深圳市锐尔觅移动通信有限公司 | Terminal card locking control method and device, terminal equipment and storage medium |
CN112383913B (en) * | 2020-11-12 | 2024-05-14 | 深圳市锐尔觅移动通信有限公司 | Terminal card locking control method and device, terminal equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107370872A (en) | Method, terminal and the control device of a kind of terminal lock machine and control terminal lock machine | |
CN110651270B (en) | Data access method and device | |
US20090126021A1 (en) | Secure initialization of intrusion detection system | |
CN107704765A (en) | A kind of interface access method, server and computer-readable recording medium | |
CN107862194B (en) | A kind of method, device and mobile terminal of safety verification | |
CN104866752B (en) | A kind of application guard method and user terminal | |
CN104901805B (en) | A kind of identification authentication methods, devices and systems | |
CN105574437A (en) | Method and device for protecting privacy information and electronic equipment | |
CN107466031A (en) | A kind of method and terminal for protecting data | |
CN106959754A (en) | Control the method and mobile terminal of mobile terminal | |
CN106790727A (en) | Information push method and device | |
CN104598836A (en) | Method and device for managing communication content on mobile terminal as well as mobile terminal | |
CN107169343A (en) | A kind of method and terminal of control application program | |
CN107026933A (en) | A kind of information management method, device and intelligent terminal for opening application more | |
CN108737638A (en) | Application control method, apparatus, mobile terminal and computer-readable medium | |
CN107341376A (en) | The anti-misinformation of picture and glance prevention method and electronic equipment | |
US9398450B2 (en) | Mobile survey tools with added security | |
CN106341379B (en) | Information processing method, device and system | |
CN108520186A (en) | Record screen method, mobile terminal and computer readable storage medium | |
CN106326768A (en) | Method and device for managing information and intelligent terminal | |
CN107248078A (en) | Mobile payment means of defence, mobile terminal and computer-readable recording medium | |
CN107391987A (en) | Application guard method, device and electronic equipment based on living things feature recognition | |
CN107368735A (en) | One kind applies installation method, mobile terminal and computer-readable recording medium | |
CN104995635B (en) | Picture sending method and device and terminal device | |
CN106778297B (en) | Application program running method and device and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20171121 |
|
WW01 | Invention patent application withdrawn after publication |