CN111542047A - Data uploading method and device, storage medium and related equipment - Google Patents

Data uploading method and device, storage medium and related equipment Download PDF

Info

Publication number
CN111542047A
CN111542047A CN202010234660.1A CN202010234660A CN111542047A CN 111542047 A CN111542047 A CN 111542047A CN 202010234660 A CN202010234660 A CN 202010234660A CN 111542047 A CN111542047 A CN 111542047A
Authority
CN
China
Prior art keywords
terminal
uploading
target
server
target terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010234660.1A
Other languages
Chinese (zh)
Inventor
朱炼兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN202010234660.1A priority Critical patent/CN111542047A/en
Publication of CN111542047A publication Critical patent/CN111542047A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Telephone Function (AREA)

Abstract

The invention provides a data uploading method, a data uploading device, a storage medium and related equipment, wherein the method comprises the following steps: receiving an operation password input by a user under the condition that the user performs a preset operation; accumulating the operation times of inputting the wrong password by the user; and if the operation times are greater than the preset times, uploading the target data stored in the target terminal to a server. The predetermined operation may be an operation that a user is more likely to perform on the terminal in the case where the terminal is lost or stolen, or the like. If the user performs the predetermined operation and the number of times of the user's operation of inputting the wrong password is large, the terminal may be lost or stolen. Target data stored in the terminal is uploaded to the server, and a subsequent owner of the terminal can acquire the target data on the terminal through the server. Therefore, the method of the embodiment of the application can reduce the risk of user data loss caused by terminal loss or theft.

Description

Data uploading method and device, storage medium and related equipment
Technical Field
The invention relates to the field of terminals, in particular to a data uploading method, a data uploading device, a storage medium and related equipment.
Background
With the continuous development of science and technology, the mobile terminal is taken as a portable, fashionable and small communication tool, and is convenient for the life of people. The mobile terminal stores a lot of information related to all users of the mobile terminal, such as internet banking information, contact information and the like. The value of this information is often more important than the mobile terminal itself. However, with the loss of the mobile terminal, the information is lost, which brings great inconvenience to the life of the user.
Disclosure of Invention
In order to solve the above problem, embodiments of the present invention provide a data uploading method, apparatus, storage medium, and related device.
In a first aspect, an embodiment of the present invention provides a data uploading method, where the method is applied to a target terminal, and includes the following steps:
receiving an operation password input by a user under the condition that the user performs a preset operation;
accumulating the operation times of inputting the wrong password by the user;
and if the operation times are greater than the preset times, uploading the target data stored in the target terminal to a server.
Optionally, before the uploading the target data stored in the target terminal to a server, the method further includes:
detecting whether a network of the target terminal is started;
if not, starting the network of the target terminal;
the uploading of the target data stored in the target terminal to a server includes:
and uploading the target data to the server by utilizing the network of the target terminal.
Optionally, the uploading target data stored in the target terminal to a server includes:
and if the network of the target terminal cannot be started, uploading the target data to the server through a flashing port of the target terminal.
Optionally, the uploading target data stored in the target terminal to a server includes:
and uploading the target data to the server according to a preset priority.
Optionally, after uploading the target data stored in the target terminal to a server, the method further includes:
and deleting the target data stored on the target terminal.
Optionally, the method further comprises:
if the operation times are larger than the preset times, sending alarm information to a preset alarm terminal; wherein, the alarm information is used for prompting that the target terminal is possibly in a lost state.
Optionally, the method further comprises:
acquiring environmental parameters of the target terminal; wherein the environmental parameters include a location parameter and a time parameter;
the sending of the warning information to the preset warning terminal includes:
sending the alarm information to the preset alarm terminal; wherein the alarm information includes the environmental parameter.
In a second aspect, an embodiment of the present invention provides a data uploading apparatus, where the apparatus is applied to a target terminal, and includes:
a receiving unit configured to receive an operation password input by a user in a case where the user performs a predetermined operation;
the accumulation unit is used for accumulating the operation times of inputting the wrong password by the user;
and the uploading unit is used for uploading the target data stored in the target terminal to a server if the operation times are greater than the preset times.
In a third aspect, the present invention provides a computer-readable storage medium, on which a computer program is stored, which when executed by a processor implements the steps of any one of the above methods.
In a fourth aspect, an embodiment of the present invention provides an electronic device, including a memory, a processor, and a computer program stored on the memory and executable on the processor, where the processor implements the steps of any one of the above methods when executing the program.
In the embodiment of the application, an operation password input by a user is received under the condition that the user executes a preset operation; accumulating the operation times of inputting the wrong password by the user; and if the operation times are greater than the preset times, uploading the target data stored in the target terminal to a server. The predetermined operation may be an operation that a user is more likely to perform on the terminal in the case where the terminal is lost or stolen, or the like. If the user performs the predetermined operation and the number of times of the user's operation of inputting the wrong password is large, the terminal may be lost or stolen. At this time, the target data stored in the terminal is uploaded to the server, and the owner of the subsequent terminal can acquire the target data on the terminal through the server. Therefore, the method of the embodiment of the application can reduce the risk of user data loss caused by terminal loss or theft.
Drawings
Fig. 1 is a schematic view illustrating an application scenario of a data uploading method and apparatus provided by an embodiment of the present invention;
fig. 2 is a schematic flowchart of a data uploading method according to an embodiment of the present invention;
fig. 3 is a schematic flow chart of another data uploading method according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a data uploading apparatus according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
The present application is further described with reference to the following figures and examples.
In the following description, the terms "first" and "second" are used for descriptive purposes only and are not intended to indicate or imply relative importance. The following description provides embodiments of the invention, which may be combined or substituted for various embodiments, and this application is therefore intended to cover all possible combinations of the same and/or different embodiments described. Thus, if one embodiment includes feature A, B, C and another embodiment includes feature B, D, then this application should also be considered to include an embodiment that includes one or more of all other possible combinations of A, B, C, D, even though this embodiment may not be explicitly recited in text below.
The following description provides examples, and does not limit the scope, applicability, or examples set forth in the claims. Changes may be made in the function and arrangement of elements described without departing from the scope of the disclosure. Various examples may omit, substitute, or add various procedures or components as appropriate. For example, the described methods may be performed in an order different than the order described, and various steps may be added, omitted, or combined. Furthermore, features described with respect to some examples may be combined into other examples.
Fig. 1 shows an application scenario diagram of a data uploading method and device provided by an embodiment of the present invention. The scheme provided by the embodiment of the invention can comprise the following steps: a mobile terminal 11 and a server 12. The mobile terminal 11 receives an operation password input by a user when the user performs a predetermined operation; accumulating the operation times of inputting the wrong password by the user; and if the operation times are greater than the preset times, uploading the target data stored in the mobile terminal 11 to the server 12.
The operation that the user is more likely to execute on the terminal in the case where the terminal is lost or stolen, etc., can be set as the preset operation. The preset operation may include: shutdown, replacement of SIM (subscriber Identity Module) card, swiping, etc. If the user performs the predetermined operation and the number of times of the user's operation of inputting the wrong password is large, the terminal may be lost or stolen. At this time, the target data stored in the terminal 11 is uploaded to the server 12, and the owner of the subsequent terminal can acquire the target data on the terminal through the server 12. Even if the terminal is stolen or lost, the data on the terminal 11 can not be lost, and the loss suffered by the terminal user is reduced.
The above-mentioned mobile terminal 11 includes, but is not limited to, devices such as a mobile phone, a notebook computer, a digital broadcast receiver, a PDA (personal digital assistant), a PAD (tablet computer), a PMP (portable multimedia player), a vehicle-mounted terminal (e.g., a car navigation terminal), and the like.
Referring to fig. 2, fig. 2 is a schematic flowchart of a data uploading method provided in an embodiment of the present invention, where in the embodiment of the present invention, the method is applied to a target terminal, and the method includes:
s201, receiving an operation password input by a user under the condition that the user executes a preset operation.
The preset operation may be an operation that a user is more likely to perform on the terminal when the terminal is lost or stolen, or the like. The preset operation may include: shutdown, SIM card replacement, machine swiping and the like. If the user performs the predetermined operation and the number of times of the user's operation of inputting the wrong password is large, the terminal may be lost or stolen.
If the user performs the predetermined operation, the user is required to input an operation password, and the user is allowed to perform the predetermined operation only if the operation password is correct. The operation password may be set in various ways. The operation password may be a text password, a gesture password, a fingerprint password, a voice password, and the like. The system can flexibly set the operation password according to the selection of the user, and the embodiment of the application is not limited too much.
And S202, accumulating the operation times of the user for inputting the wrong password.
If the user performs the predetermined operation and the number of times of the user's operation of inputting the wrong password is large, the terminal may be lost or stolen. Therefore, the number of operations for the user to input an incorrect password needs to be accumulated.
It should be noted that the number of times counted by the present embodiment is the total number of times of inputting the wrong password before the user inputs the correct password. The total number of times the user inputs the wrong password is accumulated even if the user does not perform the same predetermined operation. For example, if the user performs a shutdown operation, the number of operations for inputting the wrong password is 3. And then the user performs the flashing operation again, the operation frequency of inputting the error password is 2 times, and the operation frequency of accumulating the error passwords by the user is 5 times.
And S203, if the operation times are more than the preset times, uploading the target data stored in the target terminal to a server.
The target data is user data stored in the terminal. The target data can be online bank data, contact data, chat data in various social software and the like. The target data can be set by the user or the system according to the information characteristics such as the sensitivity of the information.
The preset times can be set according to actual requirements. For example, the predetermined number of times may be 3 times or 5 times. If the preset number of times is set to be too small, the owner of the terminal may cause the terminal to perform the above step S203 due to a wrong operation while using the terminal, causing unnecessary trouble. If the preset times are set to be too large, the risk that the password of the terminal is cracked is increased after the terminal is lost, so that the data security in the terminal is threatened.
Optionally, the uploading target data stored in the target terminal to a server includes:
and uploading the target data to the server according to a preset priority.
The priority can be set by the user in the system according to the requirement, can also be set by the system according to the importance degree of the data, and can also be set in the system in advance by technicians. Generally, data with high priority is uploaded to a server preferentially, and data with low priority is uploaded after the data with high priority is uploaded. The method of the embodiment of the invention can ensure that the data with higher importance degree is backed up preferentially.
Optionally, after uploading the target data stored in the target terminal to a server, the method further includes:
and deleting the target data stored on the target terminal.
In order to prevent some illegal persons from using the lost mobile phone to acquire personal information of a mobile phone owner, target data stored in a target terminal is deleted after the target data is uploaded to a server. Therefore, the method of the embodiment of the invention can further ensure the safety of the user data while backing up the target data.
Optionally, the method further comprises:
if the operation times are larger than the preset times, sending alarm information to a preset alarm terminal; wherein, the alarm information is used for prompting that the target terminal is possibly in a lost state.
The preset alarm terminal can be a terminal which can be contacted urgently when the target terminal is set by a user at the target terminal and abnormal conditions occur at the target terminal. When the target terminal is probably in a lost or stolen state, the warning information is sent to the preset warning terminal, so that the user can be timely reminded that the target terminal is probably lost or stolen, the owner of the target terminal can take action in time, and the owner of the target terminal is prevented from suffering greater loss.
Optionally, the method further comprises:
acquiring environmental parameters of the target terminal; wherein the environmental parameters include a location parameter and a time parameter;
the sending of the warning information to the preset warning terminal includes:
sending the alarm information to the preset alarm terminal; wherein the alarm information includes the environmental parameter.
The alarm information sent to the alarm terminal contains position parameters and time parameters. Through the position parameter and the time parameter, the owner of the target terminal can know the current environmental information of the target terminal, so that the owner of the target terminal can conveniently take effective measures in time, and the probability of finding the lost terminal is increased.
According to the data uploading method provided by the embodiment of the invention, if the user executes the preset operation and the operation frequency of inputting the wrong password by the user is more, the terminal is more likely to be lost or stolen. Target data stored in the terminal is uploaded to the server, and an owner of a subsequent terminal can acquire the target data on the terminal through the server. Therefore, the method of the embodiment of the application can solve the problem that the user data is lost due to the fact that the terminal is lost or stolen.
Referring to fig. 3, fig. 3 is a schematic flowchart of a data uploading method provided in an embodiment of the present invention, where in the embodiment of the present invention, the method is applied to a target terminal, and the method includes:
s301, receiving an operation password input by a user under the condition that the user executes a preset operation.
And S302, accumulating the operation times of the user for inputting the wrong password.
And S303, if the operation times are more than the preset times, detecting whether the network of the target terminal is started.
And S304, if not, starting the network of the target terminal.
S305, uploading the target data to the server by using the network of the target terminal.
The network of the target terminal can be established in various ways, such as establishing a mobile network through an SIM card inserted into the terminal, and establishing the network through WIFI in the environment where the terminal is located. In summary, the manner in which the network connection can be established between the target terminal and the server so that the target terminal can upload the target data to the server through the network is within the scope of the present application.
Optionally, if the network of the target terminal cannot be started, the target data is uploaded to the server through a flashing port of the target terminal.
Under the condition that the network of the target terminal cannot be started, the data of the target terminal can be uploaded to the server by using the flashing port of the target terminal, so that the data in the target terminal can be backed up.
Before the target terminal uploads the target data to the server, whether the network of the target terminal is started or not is checked, if the network is not started, the network is started first, and then the target data is uploaded. The data uploading method provided by the embodiment of the invention can ensure that the target data is uploaded under the condition that the target terminal is started so as to ensure that the target terminal can successfully upload the target data.
After the mobile terminal is stolen, the mobile terminal acquirer closes the mobile terminal so that the mobile terminal cannot be controlled through a related server, and data of the mobile terminal is lost. After the mobile terminal is stolen, the mobile terminal acquirer can brush the information stored in the mobile terminal through the machine brushing, so that the mobile terminal cannot be controlled through a related server at the first time, and the data of the mobile terminal is lost. According to the method provided by the embodiment of the invention, the relevant password is set in the operations of shutdown, SIM card exchange, machine swiping and the like of the mobile terminal, so that the mobile terminal is protected, and once the mobile terminal is stolen, the data stored in the mobile terminal is uploaded to the relevant server at the first time and the personal sensitive information of the mobile terminal is deleted in time. In order to facilitate the understanding of the solution of the embodiment of the present invention, two specific embodiments are provided below. The first embodiment is applicable to the case that the mobile terminal has a SIM card, and comprises the following steps:
step one, the mobile terminal detects that the user performs the action of shutting down or replacing the SIM card, and prompts the user to input a relevant password. And if the password error times reach the set threshold value, the mobile terminal starts a stolen instruction.
And step two, checking whether the mobile terminal network is started, if not, starting the mobile terminal network, uploading the data in the mobile terminal to a related server according to the priority requirement preset by the user, and deleting the uploaded data in the mobile terminal.
The second embodiment is applicable to the case of no SIM card in the mobile terminal, and comprises the following steps:
step one, the mobile terminal detects that a user conducts a flashing-up action, prompts the user to input a relevant password, and starts a stolen instruction if the number of password errors reaches a set threshold value.
And step two, checking whether the mobile terminal network is started, and if not, starting the mobile terminal network. And simultaneously, uploading the data in the mobile terminal to a related server according to the priority requirement preset by the user, and deleting the uploaded data in the mobile terminal.
If the mobile terminal does not have the SIM card at the moment, the mobile terminal does not have a network, and the mobile terminal uploads the data in the mobile terminal to a related server through a flashing port according to the priority requirement preset by a user and deletes the uploaded data in the mobile terminal at the same time.
The method of the embodiment of the invention can backup the data of the mobile terminal to the related server at the first time after the terminal is stolen, delete the data uploaded in the terminal, further protect the data stored in the mobile terminal as much as possible, and well protect the personal data.
Referring to fig. 4, fig. 4 is a schematic structural diagram of a data uploading apparatus according to an embodiment of the present invention, and as shown in fig. 4, the apparatus is applied to a target terminal, and the data uploading apparatus includes:
a receiving unit 401 configured to receive an operation password input by a user when the user performs a predetermined operation;
an accumulation unit 402, configured to accumulate the number of times of operation for the user to input an error password;
an uploading unit 403, configured to upload, to a server, the target data stored in the target terminal if the operation frequency is greater than a preset frequency.
Optionally, the apparatus further comprises:
an opening unit 404, configured to detect whether a network of the target terminal is opened;
if not, starting the network of the target terminal;
the uploading unit 403 is specifically configured to:
and uploading the target data to the server by utilizing the network of the target terminal.
Optionally, the uploading unit 403 is specifically configured to:
and if the network of the target terminal cannot be started, uploading the target data to the server through a flashing port of the target terminal.
Optionally, the uploading unit 403 is specifically configured to:
and uploading the target data to the server according to a preset priority.
Optionally, the apparatus further comprises:
a deleting unit 405, configured to delete the target data stored on the target terminal.
Optionally, the apparatus further comprises:
an alarm unit 406, configured to send alarm information to a preset alarm terminal if the operation frequency is greater than the preset frequency; wherein, the alarm information is used for prompting that the target terminal is possibly in a lost state.
Optionally, the alarm unit 406 is specifically configured to:
acquiring environmental parameters of the target terminal; wherein the environmental parameters include a location parameter and a time parameter;
sending the alarm information to the preset alarm terminal; wherein the alarm information includes the environmental parameter.
It is clear to a person skilled in the art that the solution according to the embodiments of the invention can be implemented by means of software and/or hardware. The "unit" and "module" in this specification refer to software and/or hardware that can perform a specific function independently or in cooperation with other components, where the hardware may be, for example, an FPGA (Field-Programmable Gate Array), an IC (Integrated Circuit), or the like.
Each processing unit and/or module according to the embodiments of the present invention may be implemented by an analog circuit that implements the functions described in the embodiments of the present invention, or may be implemented by software that executes the functions described in the embodiments of the present invention.
The embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of the data uploading method. The computer-readable storage medium may include, but is not limited to, any type of disk including floppy disks, optical disks, DVD, CD-ROMs, microdrive, and magneto-optical disks, ROMs, RAMs, EPROMs, EEPROMs, DRAMs, VRAMs, flash memory devices, magnetic or optical cards, nanosystems (including molecular memory ICs), or any type of media or device suitable for storing instructions and/or data.
Referring to fig. 5, a schematic structural diagram of an electronic device according to an embodiment of the present invention is shown, where the electronic device may be used to implement the data uploading method provided in the foregoing embodiment. Specifically, the method comprises the following steps:
the memory 1020 may be used to store software programs and modules, and the processor 1080 executes various functional applications and data processing by operating the software programs and modules stored in the memory 1020. The memory 1020 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the terminal device, and the like. Further, the memory 1020 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. Accordingly, memory 1020 may also include a memory controller to provide access to memory 1020 by processor 1080 and input unit 1030.
The input unit 1030 may be used to receive input numeric or character information and generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function control. In particular, the input unit 1030 may include a touch-sensitive surface 1031 (e.g., a touch screen, a touchpad, or a touch frame). The touch-sensitive surface 1031, also referred to as a touch display screen or a touch pad, may collect touch operations by a user (such as operations by a user on or near the touch-sensitive surface 1031 using any suitable object or attachment, such as a finger, a stylus, etc.) on or near the touch-sensitive surface 1031 and drive the corresponding connection device according to a preset program. Optionally, the touch sensitive surface 1031 may comprise two parts, a touch detection means and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 1080, and can receive and execute commands sent by the processor 1080. In addition, the touch-sensitive surface 1031 may be implemented using various types of resistive, capacitive, infrared, and surface acoustic waves.
The display unit 1040 may be used to display information input by or provided to a user and various graphical user interfaces of the terminal device, which may be made up of graphics, text, icons, video, and any combination thereof. The Display unit 1040 may include a Display panel 1041, and optionally, the Display panel 1041 may be configured in the form of an LCD (Liquid Crystal Display), an OLED (Organic Light-Emitting Diode), or the like. Further, the touch-sensitive surface 1031 may overlay the display panel 1041, and when a touch operation is detected on or near the touch-sensitive surface 1031, the touch operation is transmitted to the processor 1080 for determining the type of the touch event, and the processor 1080 then provides a corresponding visual output on the display panel 1041 according to the type of the touch event. Although the touch-sensitive surface 1031 and the display panel 1041 may implement input and output functions as two separate components, in some embodiments, the touch-sensitive surface 1031 may be integrated with the display panel 1041 to implement input and output functions.
The processor 1080 is a control center of the terminal device, connects various parts of the whole terminal device by using various interfaces and lines, and executes various functions of the terminal device and processes data by operating or executing software programs and/or modules stored in the memory 1020 and calling data stored in the memory 1020, thereby monitoring the whole terminal device. Optionally, processor 1080 may include one or more processing cores; processor 1080 may integrate an application processor that handles operating system, user interfaces, applications, etc. and a modem processor that handles wireless communications. It is to be appreciated that the modem processor described above may not be integrated into processor 1080.
Specifically, in this embodiment, the display unit of the terminal device is a touch screen display, the terminal device further includes a memory and one or more programs, where the one or more programs are stored in the memory and configured to be executed by the one or more processors, and the one or more programs include steps for implementing the data uploading method.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described device embodiments are merely illustrative, for example, the division of the unit is only a logical functional division, and there may be other division ways in actual implementation, such as: multiple units or components may be combined, or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the coupling, direct coupling or communication connection between the components shown or discussed may be through some interfaces, and the indirect coupling or communication connection between the devices or units may be electrical, mechanical or other forms.
All functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may be separately used as one unit, or two or more units may be integrated into one unit; the integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A data uploading method is applied to a target terminal, and comprises the following steps:
receiving an operation password input by a user under the condition that the user performs a preset operation;
accumulating the operation times of inputting the wrong password by the user;
and if the operation times are greater than the preset times, uploading the target data stored in the target terminal to a server.
2. The method of claim 1, wherein prior to the uploading the target data stored in the target terminal to a server, the method further comprises:
detecting whether a network of the target terminal is started;
if not, starting the network of the target terminal;
the uploading of the target data stored in the target terminal to a server includes:
and uploading the target data to the server by utilizing the network of the target terminal.
3. The method of claim 2, wherein uploading the target data stored in the target terminal to a server comprises:
and if the network of the target terminal cannot be started, uploading the target data to the server through a flashing port of the target terminal.
4. The method of claim 1, wherein uploading target data stored in the target terminal to a server comprises:
and uploading the target data to the server according to a preset priority.
5. The method of claim 1, wherein after uploading the target data stored in the target terminal to a server, the method further comprises:
and deleting the target data stored on the target terminal.
6. The method of claim 1, further comprising:
if the operation times are larger than the preset times, sending alarm information to a preset alarm terminal; wherein, the alarm information is used for prompting that the target terminal is possibly in a lost state.
7. The method of claim 6, further comprising:
acquiring environmental parameters of the target terminal; wherein the environmental parameters include a location parameter and a time parameter;
the sending of the warning information to the preset warning terminal includes:
sending the alarm information to the preset alarm terminal; wherein the alarm information includes the environmental parameter.
8. A data uploading device is applied to a target terminal, and comprises:
a receiving unit configured to receive an operation password input by a user in a case where the user performs a predetermined operation;
the accumulation unit is used for accumulating the operation times of inputting the wrong password by the user;
and the uploading unit is used for uploading the target data stored in the target terminal to a server if the operation times are greater than the preset times.
9. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 7.
10. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the steps of the method of any of claims 1-7 are implemented when the program is executed by the processor.
CN202010234660.1A 2020-03-30 2020-03-30 Data uploading method and device, storage medium and related equipment Pending CN111542047A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010234660.1A CN111542047A (en) 2020-03-30 2020-03-30 Data uploading method and device, storage medium and related equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010234660.1A CN111542047A (en) 2020-03-30 2020-03-30 Data uploading method and device, storage medium and related equipment

Publications (1)

Publication Number Publication Date
CN111542047A true CN111542047A (en) 2020-08-14

Family

ID=71978420

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010234660.1A Pending CN111542047A (en) 2020-03-30 2020-03-30 Data uploading method and device, storage medium and related equipment

Country Status (1)

Country Link
CN (1) CN111542047A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110072520A1 (en) * 2003-08-23 2011-03-24 Softex Incorporated System And Method For Protecting Files Stored On An Electronic Device
CN105306716A (en) * 2015-10-29 2016-02-03 小米科技有限责任公司 Data processing method, device and system
CN106294023A (en) * 2016-08-11 2017-01-04 深圳市金立通信设备有限公司 A kind of method of data backup and terminal
CN107194291A (en) * 2017-05-16 2017-09-22 努比亚技术有限公司 Anti-theft method for mobile terminal, mobile terminal and computer-readable recording medium
CN107466031A (en) * 2017-08-08 2017-12-12 深圳市金立通信设备有限公司 A kind of method and terminal for protecting data
CN107734176A (en) * 2017-10-25 2018-02-23 深圳市金立通信设备有限公司 Loss guard method, terminal and the computer-readable recording medium of mobile terminal
CN108076426A (en) * 2017-12-11 2018-05-25 广东欧珀移动通信有限公司 Terminal tracing method, apparatus, storage medium and terminal device
CN110855833A (en) * 2019-11-12 2020-02-28 Oppo广东移动通信有限公司 Terminal retrieving method and device, terminal and storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110072520A1 (en) * 2003-08-23 2011-03-24 Softex Incorporated System And Method For Protecting Files Stored On An Electronic Device
CN105306716A (en) * 2015-10-29 2016-02-03 小米科技有限责任公司 Data processing method, device and system
CN106294023A (en) * 2016-08-11 2017-01-04 深圳市金立通信设备有限公司 A kind of method of data backup and terminal
CN107194291A (en) * 2017-05-16 2017-09-22 努比亚技术有限公司 Anti-theft method for mobile terminal, mobile terminal and computer-readable recording medium
CN107466031A (en) * 2017-08-08 2017-12-12 深圳市金立通信设备有限公司 A kind of method and terminal for protecting data
CN107734176A (en) * 2017-10-25 2018-02-23 深圳市金立通信设备有限公司 Loss guard method, terminal and the computer-readable recording medium of mobile terminal
CN108076426A (en) * 2017-12-11 2018-05-25 广东欧珀移动通信有限公司 Terminal tracing method, apparatus, storage medium and terminal device
CN110855833A (en) * 2019-11-12 2020-02-28 Oppo广东移动通信有限公司 Terminal retrieving method and device, terminal and storage medium

Similar Documents

Publication Publication Date Title
US20210357488A1 (en) Fingerprint Recognition Method and Apparatus, and Touchscreen Terminal
CN106599716B (en) Message content protection method and device and mobile terminal
US9734352B2 (en) Data protection based on user and gesture recognition
US9697375B2 (en) Fast data protection using dual file systems
US8863243B1 (en) Location-based access control for portable electronic device
CN106708734B (en) Software anomaly detection method and device
US10474849B2 (en) System for data protection in power off mode
EP3161701B1 (en) Data protection system based on user input patterns on device
WO2019101096A1 (en) Method and device for security verification and mobile terminal
US9940448B2 (en) Unlock processing method and device
CN106919824B (en) Fingerprint unlocking control method and device and computer equipment
CN108475136B (en) Fingerprint identification method and electronic equipment
CN108737638B (en) Application control method and device, mobile terminal and computer readable medium
CN106570370A (en) User identity identification method and device
CN108781234B (en) Function control method and terminal
CN107609407A (en) The guard method of information security and device in a kind of user terminal
US20200334356A1 (en) Apparatus and method for monitoring use history
CN108763884B (en) Authority management method, device, mobile terminal and storage medium
CN105912914A (en) Fingerprint unlocking method and terminal equipment
CN111542047A (en) Data uploading method and device, storage medium and related equipment
CN109800548B (en) Method and device for preventing personal information from being leaked
CN111556021A (en) Data transmission method, device, storage medium and related equipment
CN111880965A (en) Data backup method and device, storage medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200814