技术领域technical field
本发明涉及终端领域,尤其涉及一种用户数据的保护方法和移动终端。The invention relates to the field of terminals, in particular to a method for protecting user data and a mobile terminal.
背景技术Background technique
手机等智能终端是用户经常使用的工具,甚至成为了用户必不可少的生活用品。通过这些智能终端,用户可以进行沟通、消费、通信等行为,同时,这些行为也代表了用户数据的轨迹。Smart terminals such as mobile phones are tools that users often use, and even become indispensable daily necessities for users. Through these smart terminals, users can communicate, consume, communicate and other behaviors, and at the same time, these behaviors also represent the trajectory of user data.
随着智能终端对用户生活以及其他各种方面所带来的变化,人们与智能终端之间的关系更加紧密,智能终端也会将用户行为的各方面的数据进行记录,从而更加方便用户的使用。一旦智能终端丢失,用户除面临财产损失之外,用户的数据被盗用也会对用户带来更严重的影响。因此,智能终端的安全性,尤其是智能终端所记录的用户数据的安全性,对用户而言愈发重要。With the changes brought by smart terminals to users' lives and various other aspects, the relationship between people and smart terminals is getting closer, and smart terminals will also record data on various aspects of user behavior, making it more convenient for users to use . Once the smart terminal is lost, the user will not only face property loss, but also the theft of the user's data will have a more serious impact on the user. Therefore, the security of the smart terminal, especially the security of the user data recorded by the smart terminal, is becoming more and more important to the user.
因此,亟需一种在智能终端丢失后,能够保护用户数据不被泄露的方法。Therefore, there is an urgent need for a method that can protect user data from being leaked after the smart terminal is lost.
发明内容Contents of the invention
本发明实施例的目的是提供一种用户数据的保护方法和移动终端,以解决智能终端被用户丢失后保护用户数据不被泄露的问题。The purpose of the embodiments of the present invention is to provide a user data protection method and a mobile terminal, so as to solve the problem of protecting user data from being leaked after the smart terminal is lost by the user.
为了解决上述技术问题,本发明是这样实现的:In order to solve the problems of the technologies described above, the present invention is achieved in that:
第一方面,提供了一种用户数据的保护方法,所述方法包括:In a first aspect, a method for protecting user data is provided, the method comprising:
目标移动终端接收由第一移动终端发送的请求信息;The target mobile terminal receives the request information sent by the first mobile terminal;
当所述请求信息中的字符串包括预设的PIN码时,所述目标移动终端获取预先存储的与所述请求信息关联的锁定指令;When the character string in the request information includes a preset PIN code, the target mobile terminal acquires a pre-stored locking instruction associated with the request information;
目标移动终端执行所述锁定指令对所述目标移动终端内的SIM卡进行锁定。The target mobile terminal executes the locking instruction to lock the SIM card in the target mobile terminal.
第二方面,提供了一种移动终端,所述移动终端包括:In a second aspect, a mobile terminal is provided, and the mobile terminal includes:
接收模块,用于接收由第一移动终端发送的请求信息;A receiving module, configured to receive request information sent by the first mobile terminal;
获取模块,用于在所述请求信息中的字符串包括预设的PIN码时,获取预先存储的与所述请求信息关联的锁定指令;An acquisition module, configured to acquire a pre-stored locking instruction associated with the request information when the character string in the request information includes a preset PIN code;
执行模块,用于执行所述锁定指令对所述移动终端内的SIM卡进行锁定。An executing module, configured to execute the locking instruction to lock the SIM card in the mobile terminal.
第三方面,提供了一种移动终端,该移动终端包括处理器、存储器及存储在所述存储器上并可在所述处理器上运行的计算机程序,所述计算机程序被所述处理器执行时实现如第一方面所述的方法的步骤。In a third aspect, a mobile terminal is provided. The mobile terminal includes a processor, a memory, and a computer program stored in the memory and operable on the processor. When the computer program is executed by the processor The steps of the method described in the first aspect are realized.
第四方面,提供了一种计算机可读存储介质,所述计算机可读存储介质上存储计算机程序,所述计算机程序被处理器执行时实现如第一方面所述的方法的步骤。In a fourth aspect, a computer-readable storage medium is provided, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the steps of the method described in the first aspect are implemented.
在本发明实施例中,用户在丢失目标移动终端后,通过第一移动终端可以向丢失的目标移动终端发送一请求信息,目标移动终端在接收到该请求信息时,则获取预先存储的与该请求信息关联的锁定指令,并执行该锁定指令对丢失的目标移动终端内的用户数据进行保护,避免用户数据泄露;第一移动终端可以是任何一部用户可以使用的移动终端,从而使用户可以在丢失目标移动终端后及时的保护其内的用户数据;更进一步,用户还可以通过这些被保护的用户数据寻回该目标移动终端,避免财产损失。In the embodiment of the present invention, after the user loses the target mobile terminal, the first mobile terminal can send a request message to the lost target mobile terminal, and when the target mobile terminal receives the request message, it obtains the pre-stored Request a locking instruction associated with information, and execute the locking instruction to protect the user data in the lost target mobile terminal to avoid leakage of user data; the first mobile terminal can be any mobile terminal that the user can use, so that the user can After the target mobile terminal is lost, the user data in it can be protected in time; further, the user can find the target mobile terminal through these protected user data to avoid property loss.
附图说明Description of drawings
此处所说明的附图用来提供对本发明的进一步理解,构成本发明的一部分,本发明的示意性实施例及其说明用于解释本发明,并不构成对本发明的不当限定。在附图中:The accompanying drawings described here are used to provide a further understanding of the present invention, and constitute a part of the present invention. The schematic embodiments of the present invention and their descriptions are used to explain the present invention, and do not constitute improper limitations to the present invention. In the attached picture:
图1是根据本发明一实施例的用户数据的保护方法的流程图;FIG. 1 is a flowchart of a method for protecting user data according to an embodiment of the present invention;
图2是根据本发明另一实施例的用户数据的保护方法的流程图;FIG. 2 is a flowchart of a method for protecting user data according to another embodiment of the present invention;
图3是根据本发明再一实施例的用户数据的保护方法的流程图;FIG. 3 is a flow chart of a method for protecting user data according to yet another embodiment of the present invention;
图4是根据本发明一实施例的移动终端的结构示意图;FIG. 4 is a schematic structural diagram of a mobile terminal according to an embodiment of the present invention;
图5是根据本发明另一实施例的移动终端的结构示意图;FIG. 5 is a schematic structural diagram of a mobile terminal according to another embodiment of the present invention;
图6是根据本发明再一实施例的移动终端的结构示意图;FIG. 6 is a schematic structural diagram of a mobile terminal according to yet another embodiment of the present invention;
图7是根据本发明再一实施例的移动终端的结构示意图;FIG. 7 is a schematic structural diagram of a mobile terminal according to yet another embodiment of the present invention;
图8是根据本发明再一实施例的移动终端的结构示意图。Fig. 8 is a schematic structural diagram of a mobile terminal according to yet another embodiment of the present invention.
具体实施方式Detailed ways
为使本发明的目的、技术方案和优点更加清楚,下面将结合本发明具体实施例及相应的附图对本发明技术方案进行清楚、完整地描述。显然,所描述的实施例仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。In order to make the purpose, technical solution and advantages of the present invention clearer, the technical solution of the present invention will be clearly and completely described below in conjunction with specific embodiments of the present invention and corresponding drawings. Apparently, the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.
图1示出了根据本发明一实施例的用户数据的保护方法的流程图。如图1所示,该方法包括:Fig. 1 shows a flowchart of a method for protecting user data according to an embodiment of the present invention. As shown in Figure 1, the method includes:
步骤102,目标移动终端接收由第一移动终端发送的请求信息。Step 102, the target mobile terminal receives the request information sent by the first mobile terminal.
其中,目标移动终端可以对来自外部终端或服务器的所有信息进行检测,包括来自外部终端的短信、社交信息等,如通过微信、QQ或其它应用程序发送的信息,或者接收的短信信息。可以理解的是,外部终端可以是另一部手机等智能设备。Wherein, the target mobile terminal can detect all information from the external terminal or server, including short messages and social information from the external terminal, such as information sent through WeChat, QQ or other applications, or received short message information. It is understandable that the external terminal may be another smart device such as a mobile phone.
步骤104,当请求信息中的字符串包括预设的PIN码时,目标移动终端获取预先存储的与请求信息关联的锁定指令。Step 104, when the character string in the request information includes a preset PIN code, the target mobile terminal acquires a pre-stored locking instruction associated with the request information.
请求信息需要具有唯一性,其可以是预设的PIN码、手机号或账号中的至少一种或至少一种的组合。PIN码可以为目标移动终端内的SIM卡的PIN码,手机号可以为目标移动终端所使用的手机号。目标移动终端检测接收到外部终端或服务器发送的预设的请求信息时,基于该请求信息的唯一性,目标移动终端可以执行与该请求信息关联的锁定指令。可以理解的是,该锁定指令必然是由目标移动终端执行用于对其内的用户数据进行保护。The request information needs to be unique, and it can be at least one or a combination of at least one of a preset PIN code, mobile phone number or account number. The PIN code can be the PIN code of the SIM card in the target mobile terminal, and the mobile phone number can be the mobile phone number used by the target mobile terminal. When the target mobile terminal detects that the preset request information sent by the external terminal or server is received, based on the uniqueness of the request information, the target mobile terminal may execute a locking instruction associated with the request information. It can be understood that the locking instruction must be executed by the target mobile terminal to protect user data therein.
步骤106,目标移动终端执行锁定指令对目标移动终端内的SIM卡进行锁定。Step 106, the target mobile terminal executes the locking instruction to lock the SIM card in the target mobile terminal.
本实施例中,锁定指令可以是用于锁定目标移动终端内的SIM卡的指令,执行锁定指令则可以锁定SIM卡,避免用户将该SIM卡从丢失的目标移动终端中取出用于他用,对用户造成影响。In this embodiment, the locking instruction may be an instruction for locking the SIM card in the target mobile terminal, and executing the locking instruction may lock the SIM card to prevent the user from taking out the SIM card from the lost target mobile terminal for other purposes. impact on users.
在本发明实施例中,用户在丢失目标移动终端后,通过第一移动终端可以向丢失的目标移动终端发送一请求信息,目标移动终端在接收到该请求信息时,则获取预先存储的与该请求信息关联的锁定指令,并执行该锁定指令对丢失的目标移动终端内的用户数据进行保护,避免用户数据泄露;第一移动终端可以是任何一部用户可以使用的移动终端,从而使用户可以在丢失目标移动终端后及时的保护其内的用户数据;更进一步,用户还可以通过这些被保护的用户数据寻回该目标移动终端,避免财产损失。In the embodiment of the present invention, after the user loses the target mobile terminal, the first mobile terminal can send a request message to the lost target mobile terminal, and when the target mobile terminal receives the request message, it obtains the pre-stored Request a locking instruction associated with information, and execute the locking instruction to protect the user data in the lost target mobile terminal to avoid leakage of user data; the first mobile terminal can be any mobile terminal that the user can use, so that the user can After the target mobile terminal is lost, the user data in it can be protected in time; further, the user can find the target mobile terminal through these protected user data to avoid property loss.
本实施例的一实现方式中,目标移动终端执行锁定指令对其内的SIM卡进行锁定的同时,会向第一移动终端返回一用于解除该锁定指令的随机码,该随机码可以是目标移动终端对SIM卡的PIN码进行修改后的PIN码。In an implementation of this embodiment, when the target mobile terminal executes the lock command to lock the SIM card in it, it will return a random code for releasing the lock command to the first mobile terminal. The random code can be the target The mobile terminal modifies the PIN code of the SIM card.
图2示出了根据本发明另一实施例的用户数据的保护方法的流程图。如图2所示,该方法还包括:Fig. 2 shows a flowchart of a method for protecting user data according to another embodiment of the present invention. As shown in Figure 2, the method also includes:
步骤107,目标移动终端接收随机码解除对SIM卡的锁定。Step 107, the target mobile terminal receives the random code to unlock the SIM card.
例如,当用户通过另一移动终端向丢失的目标移动终端发送一请求信息后,丢失的目标移动终端会向用户使用的移动终端返回该随机码,在这里,该随机码是丢失的目标移动终端修改SIM卡的原PIN码后的PIN码。该随机码的唯一性,保证了该SIM卡不会被取出用作他用,以防止对用户的财产造成损失。For example, after the user sends a request message to the lost target mobile terminal through another mobile terminal, the lost target mobile terminal will return the random code to the mobile terminal used by the user, where the random code is the lost target mobile terminal Modify the PIN code after the original PIN code of the SIM card. The uniqueness of the random code ensures that the SIM card will not be taken out for other purposes, so as to prevent losses to the user's property.
基于丢失的目标移动终端返回的随机码的唯一性,用户对锁定指令的解除通常只有用户本人才可以实现。进一步可以理解的是,如果锁定指令被解除,则预示着用户已经找到了丢失的目标移动终端。Based on the uniqueness of the random code returned by the lost target mobile terminal, usually only the user himself can realize the release of the locking instruction by the user. It can be further understood that if the locking instruction is released, it indicates that the user has found the lost target mobile terminal.
图3示出了根据本发明再一实施例的用户数据的保护方法的流程图。如图3所示,步骤102之前,该方法还包括:Fig. 3 shows a flow chart of a method for protecting user data according to another embodiment of the present invention. As shown in Figure 3, before step 102, the method also includes:
步骤1011,目标移动终端检测内部存储的预设用户数据是否发生异常。Step 1011, the target mobile terminal detects whether the preset user data stored inside is abnormal.
用户数据可以是各种数据,包括用于解锁的数据,如指纹解锁数据、人脸解锁数据等;用于登录应用程序的登录账户数据,如登录支付宝、微信的账户数据;用户对移动终端的使用数据,如使用时间、地点等;还可以是图像数据,如摄像机拍摄的图片数据等。当然,用户数据还可以包括其他的形式和种类,本实施例在此不作具体的限定。User data can be various data, including data used for unlocking, such as fingerprint unlocking data, face unlocking data, etc.; login account data used to log in to applications, such as account data for logging in to Alipay and WeChat; Use data, such as time of use, location, etc.; it can also be image data, such as picture data taken by a camera, etc. Of course, the user data may also include other forms and types, which are not specifically limited in this embodiment.
步骤1012,若发生异常,目标移动终端则执行与所述用户数据对应的保护指令对所述用户数据进行保护。Step 1012, if an abnormality occurs, the target mobile terminal executes a protection instruction corresponding to the user data to protect the user data.
本实施例的一实现方式中,移动终端在判断用户数据异常启动保护指令后,可以触发对接收的外部信息的检测机制,该检测机制会使目标移动终端对接收的由第一移动终端发送的请求信息进行检测。In an implementation of this embodiment, after the mobile terminal determines that the user data is abnormal and activates the protection command, it can trigger a detection mechanism for the received external information. Request information for testing.
可以知道的是,用户在丢失移动终端后,不一定会立即采用另一移动终端发送请求信息,包括用户还不知道已经丢失,或者丢失后还没有获取另一移动终端,无法发送请求信息。为此,本实施例可以在用户丢失移动终端的同时,对用户数据进行保护。It can be known that after the user loses the mobile terminal, he may not immediately use another mobile terminal to send the request information, including that the user does not know that the mobile terminal has been lost, or has not obtained another mobile terminal after the loss, so the request information cannot be sent. Therefore, this embodiment can protect user data when the user loses the mobile terminal.
具体的,在移动终端丢失后,如果移动终端被其他用户操作,必然会导致用户数据的异常,如指纹数据的改变,解锁图案的修改等。这种用户数据的异常现象,则可以被移动终端所检测到,从而触发预先设置于移动终端内的保护指令。Specifically, after the mobile terminal is lost, if the mobile terminal is operated by other users, it will inevitably lead to abnormal user data, such as changes in fingerprint data, modification of unlocking patterns, and the like. The abnormal phenomenon of the user data can be detected by the mobile terminal, thereby triggering a protection instruction preset in the mobile terminal.
保护指令可以是锁屏指令、关机指令、加密指令等中的一个或至少一个的组合。保护指令为锁屏指令时,执行该锁屏指令则可以对移动终端进行锁屏以保护用户数据。保护指令为关机指令时,则可以使移动终端锁屏后进入关机。锁屏指令为加密指令时,则可以对相应的用户数据进行加密等。其中,保护指令的目的是在移动终端丢失时,对其内部的用户数据进行保护,防止用户数据的泄露对用户造成影响。应当理解的是,保护指令不限于以上所述各种不同的指令形式和内容。The protection instruction may be one or a combination of at least one of a screen-locking instruction, a shutdown instruction, an encryption instruction, and the like. When the protection command is a screen lock command, executing the screen lock command can lock the screen of the mobile terminal to protect user data. When the protection command is a shutdown command, the mobile terminal can be shut down after its screen is locked. When the screen lock instruction is an encryption instruction, the corresponding user data may be encrypted. Wherein, the purpose of the protection instruction is to protect the internal user data of the mobile terminal when it is lost, so as to prevent the leakage of the user data from affecting the user. It should be understood that the protection instruction is not limited to the various instruction forms and contents mentioned above.
本实施例的一实现方式中,用户数据可以通过预设的用户数据记录表进行存储,即用户数据可以为预设的用户数据记录表中的数据。进一步的,步骤1011可具体实现为:检测用户数据记录表中的用户数据是否发生异常。In an implementation manner of this embodiment, the user data may be stored in a preset user data record table, that is, the user data may be data in the preset user data record table. Further, step 1011 may be specifically implemented as: detecting whether the user data in the user data recording table is abnormal.
本实施例的另一实现方式中,用户数据记录表中的用户数据至少包括用户对移动终端的使用时间和地点、记录的用户账户信息、联系人信息中的一种或一种以上,需要指出的是,用户数据记录表中的用户数据可以被用于检测是否异常,从而使移动终端启动保护指令对这些用户数据进行保护。In another implementation of this embodiment, the user data in the user data record table includes at least one or more of the user's use time and location of the mobile terminal, recorded user account information, and contact information. Notably, the user data in the user data recording table can be used to detect whether there is an abnormality, so that the mobile terminal can activate a protection command to protect the user data.
本实施例的另一实现方式中,用户数据记录表中的用户数据为用户对移动终端的使用时间和地点时,步骤1011可具体实现为:In another implementation of this embodiment, when the user data in the user data record table is the user's use time and place of the mobile terminal, step 1011 can be specifically implemented as:
目标移动终端根据用户对所述目标移动终端的使用时间检测锁屏时长是否超出预设时间段;和/或The target mobile terminal detects whether the lock screen duration exceeds a preset time period according to the user's usage time of the target mobile terminal; and/or
目标移动终端检测用户对所述目标移动终端的使用地点是否为预设的地点;The target mobile terminal detects whether the location where the user uses the target mobile terminal is a preset location;
若锁屏时长超出预设时间段或/和使用地点不是预设的地点,则判断发生异常。If the lock screen duration exceeds the preset time period or/and the location of use is not the preset location, it is determined that an exception has occurred.
用户对移动终端的使用时间可以是移动终端最长的锁屏时间,或者是在某一段时间中最长的锁屏时间,如在上午、下午、晚上等不同时间段的锁屏时间。当在对应的某一时间段中,可以检测移动终端的锁屏时长是否超出预设时间段,从而判断移动终端的锁屏时间是否发生了异常。如果异常,则可能预示着移动终端的丢失,移动终端则执行保护指令进行锁屏等操作,以保护用户数据。The user's use time of the mobile terminal may be the longest screen lock time of the mobile terminal, or the longest screen lock time in a certain period of time, such as the lock screen time in different time periods such as morning, afternoon, and evening. In a corresponding certain time period, it can be detected whether the lock screen duration of the mobile terminal exceeds the preset time period, so as to determine whether the lock screen time of the mobile terminal is abnormal. If it is abnormal, it may indicate the loss of the mobile terminal, and the mobile terminal executes protection instructions to perform operations such as locking the screen to protect user data.
用户对移动终端的使用地点,可以是家、公司或者公园等用户经常使用的地点。可以检测用户对移动终端的使用地点是否为预设的地点,例如,检测用户对移动终端的使用地点是否为家、公司或者公园等这些预设地点,或者是否为这些预设地点的一定距离内,如一公里或者数公里的范围内。如果非预设的地点,则预示着移动终端可能丢失,移动终端则执行保护指令进行锁屏等操作,以保护用户数据。The place where the user uses the mobile terminal may be a place frequently used by the user, such as a home, a company, or a park. It is possible to detect whether the location where the user uses the mobile terminal is a preset location, for example, to detect whether the location where the user uses the mobile terminal is a preset location such as home, company or park, or whether it is within a certain distance of these preset locations , such as within a kilometer or several kilometers. If the location is not preset, it indicates that the mobile terminal may be lost, and the mobile terminal executes protection instructions to perform operations such as locking the screen to protect user data.
本实施例的另一实现方式中,用户数据记录表中的用户数据为记录的用户账户信息时,步骤1011可具体实现为:In another implementation of this embodiment, when the user data in the user data record table is recorded user account information, step 1011 can be specifically implemented as:
目标移动终端检测用户账户信号是否有增加、删除或更改;The target mobile terminal detects whether the user account signal is added, deleted or changed;
若有,则判断发生异常。If so, it is judged that an exception has occurred.
用户的账户信息,包括用于登录邮箱、支付宝、微信、微博、博客等所有的账户信息。通常用户的这些账户信息是不会变化的,因此,检测用户是否增加、删除或更改了用于登录的账户信息,可以判断该移动终端是否可能丢失。当移动终端丢失时,这些账户信息的异常,则往往预示着移动终端处于丢失状态。The user's account information, including all account information used to log in to email, Alipay, WeChat, Weibo, blog, etc. Usually the user's account information will not change, therefore, it can be judged whether the mobile terminal may be lost by detecting whether the user adds, deletes or changes the account information used for login. When the mobile terminal is lost, the abnormality of these account information often indicates that the mobile terminal is in a lost state.
本实施例的另一实现方式中,用户数据记录表中的用户数据为记录的联系人信息时,步骤1011可具体实现为:In another implementation of this embodiment, when the user data in the user data record table is recorded contact information, step 1011 can be specifically implemented as:
目标移动终端检测联系人信息是否有增加或者删除;The target mobile terminal detects whether contact information is added or deleted;
若有,则判断发生异常。If so, it is judged that an exception has occurred.
联系人信息可以是用户通信录中的联系人信息,也可以是微信等社交软件中的联系人信息,本实施例在此不作具体的限定,均在本实施例可以实现的范围之内。一般用户的联系人信息不会发生大的变化,因此,可以检测联系人信息是否有增加或者删除等操作,以检测联系人信息是否有异常。如果有异常,则该移动终端可能处于丢失状态,移动终端则执行保护指令进行锁屏等操作,以保护用户数据。The contact information may be the contact information in the user's address book, or the contact information in social software such as WeChat. This embodiment does not make specific limitations here, and all are within the scope of this embodiment. Generally, the contact information of the user does not change greatly. Therefore, it is possible to detect whether there is an operation such as adding or deleting the contact information, so as to detect whether the contact information is abnormal. If there is an abnormality, the mobile terminal may be in a lost state, and the mobile terminal executes protection instructions to perform operations such as locking the screen to protect user data.
可以理解的是,用户对移动终端的操作,本实施例允许用户数据存在某些异常,前提是这些异常均是用户本人的操作。这种情况下,本实施例所述方法则进一步检测保护指令是否被解除;若保护指令被解除,则将异常的用户数据添加至用户数据记录表中。It can be understood that this embodiment allows some abnormalities in the user data in the operation of the mobile terminal by the user, provided that these abnormalities are all operations of the user himself. In this case, the method described in this embodiment further detects whether the protection instruction is released; if the protection instruction is released, the abnormal user data is added to the user data record table.
可以理解的是,对保护指令的解除操作,是通过用户的相应操作解除移动终端对用户权限的限制。具体而言,当移动终端处于锁屏状态时,可以是对移动终端的解锁操作,如指纹解锁、人脸识别解锁、虹膜解锁等。当移动终端中的用户数据被加密时,可以对这些用户数据进行解密操作等。可以理解的是,这些解除操作是用于解除移动终端对用户相应权限的限制。在此,本实施例不再一一列举。It can be understood that, the release operation of the protection instruction is to release the restriction on the user's authority by the mobile terminal through a corresponding operation of the user. Specifically, when the mobile terminal is in a screen-locked state, it may be an unlocking operation on the mobile terminal, such as fingerprint unlocking, face recognition unlocking, iris unlocking, and the like. When the user data in the mobile terminal is encrypted, a decryption operation and the like can be performed on the user data. It can be understood that these release operations are used to release restrictions on the corresponding rights of the user by the mobile terminal. Here, this embodiment will not list them one by one.
当移动终端收到解除操作时,例如,指纹是匹配的,则对移动终端进行解锁,从而解除保护指令。When the mobile terminal receives the release operation, for example, the fingerprints match, the mobile terminal is unlocked, thereby releasing the protection instruction.
在此,可以理解的是,如果保护指令具有多种限制,如锁屏、加密等,则对应需要一一解除限制。解除限制的过程可以具有相应的解除次序,也可以随机选择。Here, it can be understood that if the protection command has multiple restrictions, such as screen lock, encryption, etc., the corresponding restrictions need to be released one by one. The process of lifting restrictions can have a corresponding lifting sequence, and can also be randomly selected.
如果是用户本身对移动终端的异常操作,用户自然可以对保护指令进行正常的解除,移动终端则会判断出该异常操作为用户的正常操作,则将该异常的用户数据添加至用户数据记录表中。If it is the user's own abnormal operation on the mobile terminal, the user can naturally release the protection instruction normally, and the mobile terminal will judge that the abnormal operation is the normal operation of the user, and then add the abnormal user data to the user data record table middle.
需要指出的是,该用户数据记录表会被循环用于检测用户数据是否异常,因此,可以对用户数据记录表进行正常的更新,避免移动终端对保护指令的异常执行。It should be pointed out that the user data record table will be recycled to detect whether the user data is abnormal. Therefore, the user data record table can be updated normally to avoid abnormal execution of the protection command by the mobile terminal.
用户在丢失移动终端后,移动终端可以根据用户数据是否异常启动保护指令对用户数据进行保护。After the user loses the mobile terminal, the mobile terminal can activate a protection command to protect the user data according to whether the user data is abnormal.
本实施例中,移动终端还可以检测用户对移动终端的操作是否为首次操作。In this embodiment, the mobile terminal may also detect whether the user's operation on the mobile terminal is the first operation.
无论用户使用的是二手机或者新机,在首次使用时,移动终端均会检测是否为用户的首次操作,如开机操作进入开机引导界面。Regardless of whether the user is using a second mobile phone or a new mobile phone, when using the mobile terminal for the first time, the mobile terminal will detect whether it is the first operation of the user, such as the boot operation to enter the boot guide interface.
若是首次操作,移动终端可以检测其内部是否存储有非法用户数据。If it is operated for the first time, the mobile terminal can detect whether illegal user data is stored inside it.
如果是用户对移动终端的首次操作,移动终端则可以检测其本身是否存储有非法用户数据。在这里,可以理解的是,非法用户数据是包括非首次使用者用户的所有数据。由于是对移动终端的首次使用,因此,移动终端内的用户数据应该是空的,因此,其内的所有用户数据均是非法的。If it is the user's first operation on the mobile terminal, the mobile terminal can detect whether illegal user data is stored in itself. Here, it can be understood that illegal user data includes all data of non-first-time user users. Since it is the first use of the mobile terminal, the user data in the mobile terminal should be empty, so all user data in the mobile terminal is illegal.
若没有存储非法用户数据,移动终端则可以对该用户预设的用户数据进行采集。If no illegal user data is stored, the mobile terminal may collect user data preset by the user.
如果移动终端内存储的非法的用户数据,用户则可以向销售方或者售后寻求帮助。如果移动终端没有存储非法用户数据,移动终端则可以采集用户输入的相关数据,如用户设置的指纹数据、加密数据、解锁图案数据、人脸识别的数据等。可以知道的是,移动终端可以对用户的所有数据进行采集,并不限于以上所列举的种种。可以理解的是,对于这些用户数据,通过本实施例可以有效的对这些用户数据进行保护。If there is illegal user data stored in the mobile terminal, the user can seek help from the seller or after-sales service. If the mobile terminal does not store illegal user data, the mobile terminal can collect relevant data input by the user, such as fingerprint data set by the user, encrypted data, unlock pattern data, face recognition data, and the like. It can be known that the mobile terminal can collect all data of the user, and is not limited to the ones listed above. It can be understood that, for these user data, the user data can be effectively protected through this embodiment.
可以知道的是,只有用户对保护指令和锁定指令全部解除后,该移动终端才可以正常使用。这也往往预示着用户已经找到该移动终端。It can be known that the mobile terminal can be used normally only after the user cancels all the protection instructions and the locking instructions. This also often indicates that the user has found the mobile terminal.
可以知道的是,用户的移动终端在丢失后,也可能存在着非法使用者对该移动终端进行重新烧写,达到删除移动终端中的用户数据并进行使用的目的。为此,本实施例的另一实现方式中,可以检测移动终端在关机状态下是否进入恢复模式;若进入恢复模式,则检测移动终端是否预先进行了寻回功能设置;若预先进行了寻回功能设置,则保留与寻回功能设置对应的用户数据。It can be known that after the user's mobile terminal is lost, there may also be illegal users who reprogram the mobile terminal to achieve the purpose of deleting user data in the mobile terminal and using it. For this reason, in another implementation of this embodiment, it can be detected whether the mobile terminal enters the recovery mode in the power-off state; function settings, the user data corresponding to the retrieval function settings will be retained.
寻回功能的设置,可以是位置信息等用户数据的设置,这些用户数据可以帮助用户在丢失该移动终端的情况下进一步寻回该移动终端。在这里,恢复模式是移动终端进入的recovery模式,具体是指关机时可以直接进入的恢复界面,不需要锁屏密码或者是指纹验证就可以进入的界面。非法使用者在对该移动终端进行重新烧写时,当移动终端进入recovery模式,删除用户数据时,与寻回功能设置对应的用户数据则不会被删除。The setting of the retrieval function may be the setting of user data such as location information, and these user data can help the user further find the mobile terminal in the case of losing the mobile terminal. Here, the recovery mode is the recovery mode that the mobile terminal enters, specifically refers to the recovery interface that can be directly entered when the mobile terminal is turned off, and can be entered without a lock screen password or fingerprint verification. When an illegal user reprograms the mobile terminal, when the mobile terminal enters the recovery mode and deletes user data, the user data corresponding to the recovery function setting will not be deleted.
以上结合图1至图3详细描述了根据本发明实施例的用户数据的保护方法。下面详细描述根据本发明实施例的移动终端。图4示出了根据本发明一实施例的移动终端,如图4所示,移动终端400包括:The method for protecting user data according to the embodiment of the present invention has been described in detail above with reference to FIG. 1 to FIG. 3 . A mobile terminal according to an embodiment of the present invention is described in detail below. FIG. 4 shows a mobile terminal according to an embodiment of the present invention. As shown in FIG. 4, the mobile terminal 400 includes:
接收模块402,用于接收由第一移动终端发送的请求信息;A receiving module 402, configured to receive request information sent by the first mobile terminal;
获取模块404,用于在所述请求信息中的字符串包括预设的PIN码时,获取预先存储的与所述请求信息关联的锁定指令;An acquisition module 404, configured to acquire a pre-stored locking instruction associated with the request information when the character string in the request information includes a preset PIN code;
执行模块406,用于执行所述锁定指令对所述移动终端内的SIM卡进行锁定。The executing module 406 is configured to execute the locking instruction to lock the SIM card in the mobile terminal.
在本发明实施例中,用户在丢失目标移动终端后,通过第一移动终端可以向丢失的目标移动终端发送一请求信息,目标移动终端在接收到该请求信息时,则获取预先存储的与该请求信息关联的锁定指令,并执行该锁定指令对丢失的目标移动终端内的用户数据进行保护,避免用户数据泄露;第一移动终端可以是任何一部用户可以使用的移动终端,从而使用户可以在丢失目标移动终端后及时的保护其内的用户数据;更进一步,用户还可以通过这些被保护的用户数据寻回该目标移动终端,避免财产损失。In the embodiment of the present invention, after the user loses the target mobile terminal, the first mobile terminal can send a request message to the lost target mobile terminal, and when the target mobile terminal receives the request message, it obtains the pre-stored Request a locking instruction associated with information, and execute the locking instruction to protect the user data in the lost target mobile terminal to avoid leakage of user data; the first mobile terminal can be any mobile terminal that the user can use, so that the user can After the target mobile terminal is lost, the user data in it can be protected in time; further, the user can find the target mobile terminal through these protected user data to avoid property loss.
图5示出了根据本发明另一实施例的移动终端,如图5所示,移动终端400还包括:FIG. 5 shows a mobile terminal according to another embodiment of the present invention. As shown in FIG. 5, the mobile terminal 400 further includes:
返回模块407,用于向第一移动终端返回一用于解除锁定指令的随机码,随机码为移动终端对SIM卡的PIN码进行修改后的PIN码;The return module 407 is used to return a random code for unlocking the instruction to the first mobile terminal, and the random code is the PIN code modified by the mobile terminal to the PIN code of the SIM card;
解除模块408,用于接收随机码解除对SIM卡的锁定。An unlocking module 408, configured to receive a random code to unlock the SIM card.
图6示出了根据本发明再一实施例的移动终端,如图6所示,移动终端400还包括:FIG. 6 shows a mobile terminal according to yet another embodiment of the present invention. As shown in FIG. 6, the mobile terminal 400 further includes:
检测模块401,用于检测移动终端内部存储的预设用户数据是否发生异常;The detection module 401 is used to detect whether the preset user data stored in the mobile terminal is abnormal;
执行模块406还用于在检测模块检测的结果为发生异常时,执行与用户数据对应的保护指令对用户数据进行保护。The execution module 406 is further configured to execute a protection instruction corresponding to the user data to protect the user data when the detection result of the detection module is abnormal.
可选地,作为一个实施例,用户数据为预设的用户数据记录表中的数据;Optionally, as an embodiment, the user data is data in a preset user data record table;
检测模块401具体用于:The detection module 401 is specifically used for:
目标移动终端检测用户数据记录表中的用户数据是否发生异常。The target mobile terminal detects whether the user data in the user data recording table is abnormal.
可选地,作为一个实施例,用户数据记录表中的数据至少包括用户对目标移动终端的使用时间和地点;Optionally, as an embodiment, the data in the user data record table at least includes the user's use time and place of the target mobile terminal;
检测模块401具体用于:The detection module 401 is specifically used for:
目标移动终端根据用户对目标移动终端的使用时间检测锁屏时长是否超出预设时间段;和/或The target mobile terminal detects whether the lock screen duration exceeds a preset time period according to the user's usage time of the target mobile terminal; and/or
目标移动终端检测用户对目标移动终端的使用地点是否为预设的地点;The target mobile terminal detects whether the place where the user uses the target mobile terminal is a preset place;
若锁屏时长超出预设时间段或/和使用地点不是预设的地点,则判断发生异常。If the lock screen duration exceeds the preset time period or/and the location of use is not the preset location, it is determined that an exception has occurred.
可选地,作为一个实施例,用户数据记录表中的数据还包括记录的用户账户信息;Optionally, as an embodiment, the data in the user data record table also includes recorded user account information;
检测模块401具体用于:The detection module 401 is specifically used for:
目标移动终端检测用户账户信号是否有增加、删除或更改;The target mobile terminal detects whether the user account signal is added, deleted or changed;
若有,则判断发生异常。If so, it is judged that an exception has occurred.
可选地,作为一个实施例,用户数据记录表中的数据还包括记录的联系人信息;Optionally, as an embodiment, the data in the user data record table also includes recorded contact information;
检测模块401具体用于:The detection module 401 is specifically used for:
目标移动终端检测联系人信息是否有增加或者删除;The target mobile terminal detects whether contact information is added or deleted;
若有,则判断发生异常。If so, it is judged that an exception has occurred.
图7示出了根据本发明再一实施例的移动终端,如图7所示,移动终端还包括:FIG. 7 shows a mobile terminal according to yet another embodiment of the present invention. As shown in FIG. 7, the mobile terminal further includes:
指令检测模块409,用于检测保护指令是否被解除;An instruction detection module 409, configured to detect whether the protection instruction is released;
添加模块410,用于在指令检测模块检测到保护指令被解除时,则将异常的用户数据添加至用户数据记录表中。The adding module 410 is configured to add abnormal user data to the user data record table when the instruction detection module detects that the protection instruction is released.
根据本发明实施例的移动终端可以参照对应本发明实施例的方法的流程,并且,该移动终端中的各个单元/模块和上述其他操作和/或功能分别为了实现以上方法中的相应流程,为了简洁,在此不再赘述。The mobile terminal according to the embodiment of the present invention can refer to the flow of the method corresponding to the embodiment of the present invention, and each unit/module in the mobile terminal and the above-mentioned other operations and/or functions are respectively to realize the corresponding flow in the above method, in order to It is concise and will not be repeated here.
图8为实现本发明各个实施例的一种移动终端的硬件结构示意图,该移动终端800包括但不限于:射频单元801、网络模块802、音频输出单元803、输入单元804、传感器805、显示单元806、用户输入单元807、接口单元808、存储器809、处理器810、以及电源811等部件。本领域技术人员可以理解,图8中示出的移动终端结构并不构成对移动终端的限定,移动终端可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。在本发明实施例中,移动终端包括但不限于手机、平板电脑、笔记本电脑、掌上电脑、车载终端、可穿戴设备、以及计步器等。8 is a schematic diagram of a hardware structure of a mobile terminal implementing various embodiments of the present invention, the mobile terminal 800 includes but not limited to: a radio frequency unit 801, a network module 802, an audio output unit 803, an input unit 804, a sensor 805, and a display unit 806, a user input unit 807, an interface unit 808, a memory 809, a processor 810, a power supply 811 and other components. Those skilled in the art can understand that the structure of the mobile terminal shown in Figure 8 does not constitute a limitation on the mobile terminal, and the mobile terminal may include more or less components than those shown in the figure, or combine some components, or different components layout. In the embodiment of the present invention, the mobile terminal includes, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palmtop computer, a vehicle terminal, a wearable device, and a pedometer.
其中,处理器810,用于:Wherein, the processor 810 is used for:
接收由第一移动终端发送的请求信息;receiving request information sent by the first mobile terminal;
当所述请求信息中的字符串包括预设的PIN码时,获取预先存储的与所述请求信息关联的锁定指令;When the character string in the request information includes a preset PIN code, acquire a pre-stored locking instruction associated with the request information;
执行所述锁定指令对所述目标移动终端内的SIM卡进行锁定。executing the locking instruction to lock the SIM card in the target mobile terminal.
在本发明实施例中,用户在丢失目标移动终端后,通过第一移动终端可以向丢失的目标移动终端发送一请求信息,目标移动终端在接收到该请求信息时,则获取预先存储的与该请求信息关联的锁定指令,并执行该锁定指令对丢失的目标移动终端内的用户数据进行保护,避免用户数据泄露;第一移动终端可以是任何一部用户可以使用的移动终端,从而使用户可以在丢失目标移动终端后及时的保护其内的用户数据;更进一步,用户还可以通过这些被保护的用户数据寻回该目标移动终端,避免财产损失。In the embodiment of the present invention, after the user loses the target mobile terminal, the first mobile terminal can send a request message to the lost target mobile terminal, and when the target mobile terminal receives the request message, it obtains the pre-stored Request a locking instruction associated with information, and execute the locking instruction to protect the user data in the lost target mobile terminal to avoid leakage of user data; the first mobile terminal can be any mobile terminal that the user can use, so that the user can After the target mobile terminal is lost, the user data in it can be protected in time; further, the user can find the target mobile terminal through these protected user data to avoid property loss.
应理解的是,本发明实施例中,射频单元801可用于收发信息或通话过程中,信号的接收和发送,具体的,将来自基站的下行数据接收后,给处理器810处理;另外,将上行的数据发送给基站。通常,射频单元801包括但不限于天线、至少一个放大器、收发信机、耦合器、低噪声放大器、双工器等。此外,射频单元801还可以通过无线通信系统与网络和其他设备通信。It should be understood that, in the embodiment of the present invention, the radio frequency unit 801 can be used for receiving and sending signals during sending and receiving information or during a call. Specifically, the downlink data from the base station is received and processed by the processor 810; in addition, the Uplink data is sent to the base station. Generally, the radio frequency unit 801 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 801 can also communicate with the network and other devices through a wireless communication system.
移动终端通过网络模块802为用户提供了无线的宽带互联网访问,如帮助用户收发电子邮件、浏览网页和访问流式媒体等。The mobile terminal provides users with wireless broadband Internet access through the network module 802, such as helping users send and receive emails, browse web pages, and access streaming media.
音频输出单元803可以将射频单元801或网络模块802接收的或者在存储器809中存储的音频数据转换成音频信号并且输出为声音。而且,音频输出单元803还可以提供与移动终端800执行的特定功能相关的音频输出(例如,呼叫信号接收声音、消息接收声音等等)。音频输出单元803包括扬声器、蜂鸣器以及受话器等。The audio output unit 803 may convert audio data received by the radio frequency unit 801 or the network module 802 or stored in the memory 809 into an audio signal and output as sound. Also, the audio output unit 803 can also provide audio output related to a specific function performed by the mobile terminal 800 (for example, call signal reception sound, message reception sound, etc.). The audio output unit 803 includes a speaker, a buzzer, a receiver, and the like.
输入单元804用于接收音频或视频信号。输入单元804可以包括图形处理器(Graphics Processing Unit,GPU)8041和麦克风8042,图形处理器8041对在视频捕获模式或图像捕获模式中由图像捕获装置(如摄像头)获得的静态图片或视频的图像数据进行处理。处理后的图像帧可以显示在显示单元806上。经图形处理器8041处理后的图像帧可以存储在存储器809(或其它存储介质)中或者经由射频单元801或网络模块802进行发送。麦克风8042可以接收声音,并且能够将这样的声音处理为音频数据。处理后的音频数据可以在电话通话模式的情况下转换为可经由射频单元801发送到移动通信基站的格式输出。The input unit 804 is used for receiving audio or video signals. The input unit 804 may include a graphics processing unit (Graphics Processing Unit, GPU) 8041 and a microphone 8042, and the graphics processing unit 8041 is used for still pictures or video images obtained by an image capture device (such as a camera) in a video capture mode or an image capture mode. The data is processed. The processed image frames may be displayed on the display unit 806 . The image frames processed by the graphics processor 8041 may be stored in the memory 809 (or other storage media) or sent via the radio frequency unit 801 or the network module 802 . The microphone 8042 can receive sound, and can process such sound into audio data. The processed audio data can be converted into a format that can be sent to a mobile communication base station via the radio frequency unit 801 for output in the case of a phone call mode.
移动终端800还包括至少一种传感器805,比如光传感器、运动传感器以及其他传感器。具体地,光传感器包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节显示面板8061的亮度,接近传感器可在移动终端800移动到耳边时,关闭显示面板8061和/或背光。作为运动传感器的一种,加速计传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别移动终端姿态(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等;传感器805还可以包括指纹传感器、压力传感器、虹膜传感器、分子传感器、陀螺仪、气压计、湿度计、温度计、红外线传感器等,在此不再赘述。The mobile terminal 800 also includes at least one sensor 805, such as a light sensor, a motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor and a proximity sensor, wherein the ambient light sensor can adjust the brightness of the display panel 8061 according to the brightness of the ambient light, and the proximity sensor can turn off the display panel 8061 and the / or backlighting. As a kind of motion sensor, the accelerometer sensor can detect the magnitude of acceleration in various directions (generally three axes), and can detect the magnitude and direction of gravity when it is still, and can be used to identify the posture of mobile terminals (such as horizontal and vertical screen switching, related games, etc.) , magnetometer posture calibration), vibration recognition-related functions (such as pedometer, knocking), etc.; the sensor 805 can also include fingerprint sensors, pressure sensors, iris sensors, molecular sensors, gyroscopes, barometers, hygrometers, thermometers, Infrared sensors, etc., will not be repeated here.
显示单元806用于显示由用户输入的信息或提供给用户的信息。显示单元806可包括显示面板1061,可以采用液晶显示器(Liquid Crystal Display,LCD)、有机发光二极管(Organic Light-Emitting Diode,OLED)等形式来配置显示面板8061。The display unit 806 is used to display information input by the user or information provided to the user. The display unit 806 may include a display panel 1061, and the display panel 8061 may be configured in the form of a liquid crystal display (Liquid Crystal Display, LCD), an organic light-emitting diode (Organic Light-Emitting Diode, OLED), or the like.
用户输入单元807可用于接收输入的数字或字符信息,以及产生与移动终端的用户设置以及功能控制有关的键信号输入。具体地,用户输入单元807包括触控面板8071以及其他输入设备8072。触控面板8071,也称为触摸屏,可收集用户在其上或附近的触摸操作(比如用户使用手指、触笔等任何适合的物体或附件在触控面板8071上或在触控面板8071附近的操作)。触控面板8071可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器810,接收处理器810发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触控面板8071。除了触控面板8071,用户输入单元807还可以包括其他输入设备8072。具体地,其他输入设备8072可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆,在此不再赘述。The user input unit 807 can be used to receive input numbers or character information, and generate key signal input related to user settings and function control of the mobile terminal. Specifically, the user input unit 807 includes a touch panel 8071 and other input devices 8072 . The touch panel 8071, also referred to as a touch screen, can collect touch operations of the user on or near it (for example, the user uses any suitable object or accessory such as a finger or a stylus on the touch panel 8071 or near the touch panel 8071). operate). The touch panel 8071 may include two parts, a touch detection device and a touch controller. Among them, the touch detection device detects the user's touch orientation, detects the signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts it into contact coordinates, and sends it to For the processor 810, receive the command sent by the processor 810 and execute it. In addition, the touch panel 8071 can be implemented in various types such as resistive, capacitive, infrared, and surface acoustic wave. In addition to the touch panel 8071 , the user input unit 807 may also include other input devices 8072 . Specifically, other input devices 8072 may include, but are not limited to, physical keyboards, function keys (such as volume control keys, switch keys, etc.), trackballs, mice, and joysticks, which will not be repeated here.
进一步的,触控面板8071可覆盖在显示面板8061上,当触控面板8071检测到在其上或附近的触摸操作后,传送给处理器810以确定触摸事件的类型,随后处理器810根据触摸事件的类型在显示面板8061上提供相应的视觉输出。虽然在图8中,触控面板8071与显示面板8061是作为两个独立的部件来实现移动终端的输入和输出功能,但是在某些实施例中,可以将触控面板8071与显示面板8061集成而实现移动终端的输入和输出功能,具体此处不做限定。Furthermore, the touch panel 8071 can be covered on the display panel 8061, and when the touch panel 8071 detects a touch operation on or near it, it will be sent to the processor 810 to determine the type of the touch event, and then the processor 810 will The type of event provides a corresponding visual output on the display panel 8061. Although in FIG. 8, the touch panel 8071 and the display panel 8061 are used as two independent components to realize the input and output functions of the mobile terminal, in some embodiments, the touch panel 8071 and the display panel 8061 can be integrated. The implementation of the input and output functions of the mobile terminal is not specifically limited here.
接口单元808为外部装置与移动终端800连接的接口。例如,外部装置可以包括有线或无线头戴式耳机端口、外部电源(或电池充电器)端口、有线或无线数据端口、存储卡端口、用于连接具有识别模块的装置的端口、音频输入/输出(I/O)端口、视频I/O端口、耳机端口等等。接口单元808可以用于接收来自外部装置的输入(例如,数据信息、电力等等)并且将接收到的输入传输到移动终端800内的一个或多个元件或者可以用于在移动终端800和外部装置之间传输数据。The interface unit 808 is an interface for connecting an external device to the mobile terminal 800 . For example, an external device may include a wired or wireless headset port, an external power (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device with an identification module, audio input/output (I/O) ports, video I/O ports, headphone ports, and more. The interface unit 808 can be used to receive input from an external device (for example, data information, power, etc.) transfer data between devices.
存储器809可用于存储软件程序以及各种数据。存储器809可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能、图像播放功能等)等;存储数据区可存储根据手机的使用所创建的数据(比如音频数据、电话本等)等。此外,存储器809可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。The memory 809 can be used to store software programs as well as various data. The memory 809 can mainly include a program storage area and a data storage area, wherein the program storage area can store an operating system, at least one application program required by a function (such as a sound playback function, an image playback function, etc.); Data created by the use of mobile phones (such as audio data, phonebook, etc.), etc. In addition, the memory 809 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid-state storage devices.
处理器810是移动终端的控制中心,利用各种接口和线路连接整个移动终端的各个部分,通过运行或执行存储在存储器809内的软件程序和/或模块,以及调用存储在存储器809内的数据,执行移动终端的各种功能和处理数据,从而对移动终端进行整体监控。处理器810可包括一个或多个处理单元;优选的,处理器810可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器810中。The processor 810 is the control center of the mobile terminal, which uses various interfaces and lines to connect various parts of the entire mobile terminal, by running or executing software programs and/or modules stored in the memory 809, and calling data stored in the memory 809 , execute various functions of the mobile terminal and process data, so as to monitor the mobile terminal as a whole. The processor 810 may include one or more processing units; preferably, the processor 810 may integrate an application processor and a modem processor, wherein the application processor mainly processes the operating system, user interface and application programs, etc., and the modem The processor mainly handles wireless communication. It can be understood that the foregoing modem processor may not be integrated into the processor 810 .
移动终端800还可以包括给各个部件供电的电源811(比如电池),优选的,电源811可以通过电源管理系统与处理器810逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。The mobile terminal 800 can also include a power supply 811 (such as a battery) for supplying power to various components. Preferably, the power supply 811 can be logically connected to the processor 810 through a power management system, so as to manage charging, discharging, and power consumption through the power management system. and other functions.
另外,移动终端800包括一些未示出的功能模块,在此不再赘述。In addition, the mobile terminal 800 includes some functional modules not shown, which will not be repeated here.
优选的,本发明实施例还提供一种移动终端,包括存储器809、处理器810及存储在存储器809上并可在处理器810上运行的计算机程序,该计算机程序被处理器810执行时实现上述用户数据的保护方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。Preferably, the embodiment of the present invention also provides a mobile terminal, including a memory 809, a processor 810, and a computer program stored in the memory 809 and operable on the processor 810. When the computer program is executed by the processor 810, the above-mentioned The various processes of the embodiment of the user data protection method can achieve the same technical effect, so in order to avoid repetition, details are not repeated here.
本发明实施例还提供一种计算机可读存储介质,计算机可读存储介质上存储有计算机程序,该计算机程序被处理器执行时实现上述用户数据的保护方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。其中,所述的计算机可读存储介质,如只读存储器(Read-Only Memory,简称ROM)、随机存取存储器(Random AccessMemory,简称RAM)、磁碟或者光盘等。The embodiment of the present invention also provides a computer-readable storage medium. A computer program is stored on the computer-readable storage medium. When the computer program is executed by a processor, each process of the above-mentioned user data protection method embodiment is realized, and the same To avoid repetition, the technical effects will not be repeated here. Wherein, the computer-readable storage medium is, for example, a read-only memory (Read-Only Memory, ROM for short), a random access memory (Random Access Memory, RAM for short), a magnetic disk or an optical disk, and the like.
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。It should be noted that, in this document, the term "comprising", "comprising" or any other variation thereof is intended to cover a non-exclusive inclusion such that a process, method, article or apparatus comprising a set of elements includes not only those elements, It also includes other elements not expressly listed, or elements inherent in the process, method, article, or device. Without further limitations, an element defined by the phrase "comprising a ..." does not preclude the presence of additional identical elements in the process, method, article, or apparatus comprising that element.
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本发明各个实施例所述的方法。Through the description of the above embodiments, those skilled in the art can clearly understand that the methods of the above embodiments can be implemented by means of software plus a necessary general-purpose hardware platform, and of course also by hardware, but in many cases the former is better implementation. Based on such an understanding, the essence of the technical solution of the present invention or the part that contributes to the prior art can be embodied in the form of software products, and the computer software products are stored in a storage medium (such as ROM/RAM, disk, CD) contains several instructions to make a terminal (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) execute the methods described in various embodiments of the present invention.
上面结合附图对本发明的实施例进行了描述,但是本发明并不局限于上述的具体实施方式,上述的具体实施方式仅仅是示意性的,而不是限制性的,本领域的普通技术人员在本发明的启示下,在不脱离本发明宗旨和权利要求所保护的范围情况下,还可做出很多形式,均属于本发明的保护之内。Embodiments of the present invention have been described above in conjunction with the accompanying drawings, but the present invention is not limited to the above-mentioned specific implementations, and the above-mentioned specific implementations are only illustrative, rather than restrictive, and those of ordinary skill in the art will Under the enlightenment of the present invention, without departing from the gist of the present invention and the protection scope of the claims, many forms can also be made, all of which belong to the protection of the present invention.
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201711204387.2ACN107948390A (en) | 2017-11-27 | 2017-11-27 | The guard method of user data and mobile terminal |
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201711204387.2ACN107948390A (en) | 2017-11-27 | 2017-11-27 | The guard method of user data and mobile terminal |
| Publication Number | Publication Date |
|---|---|
| CN107948390Atrue CN107948390A (en) | 2018-04-20 |
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201711204387.2APendingCN107948390A (en) | 2017-11-27 | 2017-11-27 | The guard method of user data and mobile terminal |
| Country | Link |
|---|---|
| CN (1) | CN107948390A (en) |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109117666A (en)* | 2018-07-27 | 2019-01-01 | 深圳市国通世纪科技开发有限公司 | Lose terminal safety protection method, computer equipment and storage medium |
| CN110795596A (en)* | 2019-11-07 | 2020-02-14 | 北京首钢自动化信息技术有限公司 | Information feedback method and device for client |
| WO2020142864A1 (en)* | 2019-01-07 | 2020-07-16 | Citrix Systems, Inc. | Subscriber identity management |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1407787A (en)* | 2001-09-08 | 2003-04-02 | 深圳市中兴通讯股份有限公司上海第二研究所 | Self-alarming and anti-theft method for mobile terminals |
| JP2008109306A (en)* | 2006-10-24 | 2008-05-08 | Sharp Corp | Mobile device |
| CN101917691A (en)* | 2010-08-12 | 2010-12-15 | 中国电信股份有限公司 | Method, system and terminal for setting terminal PIN (Personal Identification Number) code |
| CN102929807A (en)* | 2012-11-19 | 2013-02-13 | 周万荣 | Method for initiatively performing loss judgment and data processing and mobile terminal |
| CN103957322A (en)* | 2014-05-05 | 2014-07-30 | 深圳市中兴移动通信有限公司 | Mobile terminal and antitheft method thereof |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1407787A (en)* | 2001-09-08 | 2003-04-02 | 深圳市中兴通讯股份有限公司上海第二研究所 | Self-alarming and anti-theft method for mobile terminals |
| JP2008109306A (en)* | 2006-10-24 | 2008-05-08 | Sharp Corp | Mobile device |
| CN101917691A (en)* | 2010-08-12 | 2010-12-15 | 中国电信股份有限公司 | Method, system and terminal for setting terminal PIN (Personal Identification Number) code |
| CN102929807A (en)* | 2012-11-19 | 2013-02-13 | 周万荣 | Method for initiatively performing loss judgment and data processing and mobile terminal |
| CN103957322A (en)* | 2014-05-05 | 2014-07-30 | 深圳市中兴移动通信有限公司 | Mobile terminal and antitheft method thereof |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109117666A (en)* | 2018-07-27 | 2019-01-01 | 深圳市国通世纪科技开发有限公司 | Lose terminal safety protection method, computer equipment and storage medium |
| WO2020142864A1 (en)* | 2019-01-07 | 2020-07-16 | Citrix Systems, Inc. | Subscriber identity management |
| US10986085B2 (en) | 2019-01-07 | 2021-04-20 | Citrix Systems, Inc. | Subscriber identity management |
| US11647017B2 (en) | 2019-01-07 | 2023-05-09 | Citrix Systems, Inc. | Subscriber identity management |
| CN110795596A (en)* | 2019-11-07 | 2020-02-14 | 北京首钢自动化信息技术有限公司 | Information feedback method and device for client |
| Publication | Publication Date | Title |
|---|---|---|
| CN110287694B (en) | Application management method, mobile terminal and storage medium | |
| CN103488924B (en) | A kind of unlocking processing method of terminal, device and equipment | |
| CN107885985A (en) | A kind of application program account sharing method and terminal | |
| CN110851031A (en) | Display control method and electronic equipment | |
| CN110035183B (en) | Information sharing method and terminal | |
| CN106803027A (en) | Application function entrance starts method, device and mobile terminal | |
| CN108156537B (en) | A kind of remote operation method of mobile terminal and mobile terminal | |
| CN106845211A (en) | Mobile terminal and its application start method and device | |
| CN107609363B (en) | An unlocking method and mobile terminal | |
| CN108280337A (en) | A kind of message protection method and mobile terminal | |
| CN106874805A (en) | A kind of data guard method, device and mobile terminal | |
| CN108710806A (en) | A terminal unlocking method, mobile terminal | |
| CN107948390A (en) | The guard method of user data and mobile terminal | |
| CN107707554A (en) | A kind of login method and mobile terminal of application program account | |
| CN108109188A (en) | A kind of image processing method and mobile terminal | |
| CN109522741B (en) | Application program permission prompting method and terminal equipment thereof | |
| CN108600492B (en) | A screen unlocking method and terminal | |
| CN106874795B (en) | Mobile terminal and machine disassembly prevention method and device thereof | |
| CN110321731A (en) | A kind of information protecting method and mobile terminal | |
| CN111124537B (en) | Application starting method and electronic equipment | |
| CN111159738B (en) | Authority configuration method, application login method and device | |
| CN108171036A (en) | The control method and mobile terminal of a kind of application program | |
| CN106851623A (en) | A kind of locking means of mobile terminal, device and mobile terminal | |
| CN106407779A (en) | An information acquisition method, device and terminal | |
| CN108881481A (en) | A file retrieval method, device and terminal equipment thereof |
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| RJ01 | Rejection of invention patent application after publication | ||
| RJ01 | Rejection of invention patent application after publication | Application publication date:20180420 |