Specific embodiment
The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end
Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached
The embodiment of figure description is exemplary, and for explaining only the invention, and is not considered as limiting the invention.On the contrary, this
The embodiment of invention includes all changes fallen within the scope of the spiritual and intension of attached claims, modification and is equal
Object.
In the description of the present invention, it is to be understood that, term " first ", " second " etc. are used for description purposes only, without
It can be interpreted as indication or suggestion relative importance.In the description of the present invention, it should be noted that unless otherwise specific regulation
And restriction, term " connected ", " connection " shall be understood in a broad sense, for example, it may be being fixedly connected, may be a detachable connection,
Or it is integrally connected;It can be mechanical connection, be also possible to be electrically connected;It can be directly connected, intermediary can also be passed through
It is indirectly connected.For the ordinary skill in the art, the tool of above-mentioned term in the present invention can be understood with concrete condition
Body meaning.In addition, in the description of the present invention, unless otherwise indicated, the meaning of " plurality " is two or more.
Any process described otherwise above or method description are construed as in flow chart or herein, and expression includes
It is one or more for realizing specific logical function or process the step of executable instruction code module, segment or portion
Point, and the range of the preferred embodiment of the present invention includes other realization, wherein can not press shown or discussed suitable
Sequence, including according to related function by it is basic simultaneously in the way of or in the opposite order, Lai Zhihang function, this should be of the invention
Embodiment person of ordinary skill in the field understood.
Below with reference to the accompanying drawings remote lock method, the system, cloud server of terminal according to an embodiment of the present invention are described
And terminal.
After terminal is lost, user can preset booting login password at terminal, but be still unavoidable from end
End is caused default booting login password invalid, being repeated property of terminal is caused to use by brush machine again.The present invention is in view of such
Situation, is arranged cloud server, which records the identity information of first terminal, such as userspersonal information and first
The ID number of terminal, the identity information verifying stored by cloud server is for the locking request of first terminal to control first eventually
Restart at end, it is ensured that first terminal is not by brush machine.
For this purpose, proposing a kind of remote lock method of terminal, comprising: cloud server receives the identity for being directed to first terminal
Information, wherein first terminal provides identification verification function after receiving open command, in the user of first terminal by testing
First terminal starts after card;Cloud server receives the locking request for first terminal that second terminal is sent, wherein lock
It include identity information to be verified in fixed request;Cloud server verifies identity information to be verified according to identity information;With
And after being verified, cloud server control first terminal is restarted.
Fig. 1 is the flow chart of the remote lock method of terminal according to an embodiment of the invention.
As shown in Figure 1, the remote lock method of terminal includes:
S101, cloud server receive the identity information for being directed to first terminal, wherein first terminal refers to receiving unlatching
Identification verification function is provided after enabling, is started in the user of first terminal by first terminal after verifying.
In one embodiment of the invention, first terminal can for mobile phone, palm PC, car-mounted terminal, navigator or
Camera and video camera with network function etc..
Specifically, first terminal provides identification verification function after receiving open command, for example, user makes for the first time
Open command is sent when being restarted with first terminal or booting to first terminal to open identification verification function, later, first eventually
End is according to identification verification function to using the user of first terminal to verify.The user of first terminal can open in first terminal
Dynamic identification verification function and any time after authentication passes through input identity information to first terminal, pass through for the first end
Identity information is sent to cloud server by end, and identity information transmission is primary, and cloud server and first terminal can be deposited
Store up the identity information.It should be appreciated that the identity information of first terminal can also be uploaded to cloud server by other terminals.
In one embodiment of the invention, first terminal is being bought by user by the verifying password of identification verification function
It is arranged later or is provided to user when user buys after being generated by the manufacturer of first terminal.Wherein, verifying password is true
Fixed unique user can be the identity information of user.
In one embodiment of the invention, identity information may include personal attribute information (such as name, gender, birth
The fixed information such as date, occupation, address) and/or personal set information (information that can be changed such as password) and first terminal
ID number.Wherein, personal attribute information and/or personal set information are corresponding with the ID number of first terminal, and personal attribute information can
To be the essential information of user, changeability is little, and user is easy to remember, therefore, quantity is more, and reliability is stronger;Personal set
Information has the characteristics that changeability, randomness, and user is not easy to remember, but high safety.
S102, cloud server receive the locking request for first terminal that second terminal is sent, wherein locking request
In include identity information to be verified.
Specifically, after user has found that first terminal is lost, pass through using second terminal (such as mobile phone, computer etc.)
The modes such as short message, voice communication send the locking request for being directed to first terminal to cloud server, may include in locking request
The identity information to be verified of the ID number of the userspersonal information and/or first terminal of first terminal.
S103, cloud server verify identity information to be verified according to identity information.
Specifically, after cloud server receives the locking request for first terminal that second terminal is sent, judgement
Whether the identity information to be verified and the stored first terminal identity information that is directed in the locking request received are consistent, if
Unanimously, then by verifying, wherein identity information to be verified may include personal attribute information and/or personal set letter to be verified
Breath, and require the ID number of the first terminal of locking.
S104, after being verified, cloud server control first terminal is restarted.
In one embodiment of the invention, when first terminal is restarted by cloud server control, it is desirable that user's input
After the verification information that is switched on, can determine whether the userspersonal information of user's input and stored identity information are consistent, if
Unanimously, then by verifying, first terminal starts and can continue to use.If it is inconsistent, verifying does not pass through, first terminal is vertical
Shutdown is carved, normal use cannot be continued.
In one embodiment of the invention, booting verification information can be embedded in a kind of starting journey of first terminal
Sequence, and can be set to turn off or on.When being set off, only cloud server receives the needle that second terminal is sent
To the locking request of first terminal, after control first terminal is restarted, booting verification information can just switch to unlatching;When being set as
When unlatching, after being only verified, first terminal just be can be used normally.
In one embodiment of the present of invention, there is specific identifier, there are specific marks in judgement for first terminal in locking request
Restarted after knowing.Wherein, specific identifier can be the use for the prompt first terminal that cloud server is sent to first terminal
The warning information that the family first terminal will be restarted.After only cloud server is verified for identity information to be verified,
Warning information can be sent to first terminal just to remind the user of first terminal that the first terminal will be restarted.
The remote lock method of terminal according to an embodiment of the present invention, user, can benefits after discovery first terminal is lost
The locking request for being directed to first terminal is sent to cloud server with second terminal, so that cloud server is according to stored
Subscriber identity information verifies identity information to be verified, and after being verified, control first terminal is restarted, so that first is whole
End starting booting verification information program, avoids first terminal from resetting password by brush machine again, guarantees first terminal not by illegal benefit
With, operating process is convenient, succinctly, high safety.
In order to realize above-described embodiment, the present invention also proposes a kind of remote lock system of terminal.
A kind of remote lock system of terminal, comprising: first terminal, for providing identity after receiving open command
Authentication function is started in the user of first terminal by first terminal after verifying;Second terminal, for being sent out to cloud server
Send locking request;Cloud server for receiving the identity information for being directed to first terminal, and receives being directed to for second terminal transmission
The locking request of first terminal, wherein include identity information to be verified in locking request, and treated according to the identity information
Verifying identity information is verified, and after being verified, and control first terminal is restarted.
Fig. 2 is the structural block diagram of the remote lock system of terminal according to an embodiment of the invention.
As shown in Fig. 2, the remote lock system of terminal includes: first terminal 100, second terminal 200 and cloud server
300。
Specifically, first terminal 100 after receiving open command for providing identification verification function, in first terminal
100 user is started by first terminal 100 after verifying.More specifically, first terminal 100 is after receiving open command
Identification verification function is provided, for example, user sends open command to the when restarting for the first time using first terminal 100 or booting
One terminal 100 is to open identification verification function, and later, first terminal 100 is according to identification verification function to using first terminal 100
User verify.First terminal 100 can start identification verification function in first terminal 100 and pass through it in authentication
Identity information is sent to cloud service by first terminal 100 to first terminal 100 by any time input identity information afterwards
Device 300, identity information transmission is primary, and cloud server 300 and first terminal 100 can store the identity information.It should
Understand, the identity information of first terminal 100 can also be uploaded to cloud server 300 by other terminals.
In one embodiment of the invention, first terminal is being bought by user by the verifying password of identification verification function
It is arranged after 100 or is provided to user when user buys after being generated by the manufacturer of first terminal 100.Wherein, it verifies
Password determines unique user, can be the identity information of user.
In one embodiment of the invention, identity information may include personal attribute information (such as name, gender, birth
The fixed information such as date, occupation, address) and/or personal set information (information that can be changed such as password) and first terminal
ID number.Wherein, personal attribute information and/or personal set information are corresponding with the ID number of first terminal, and personal attribute information can
To be the essential information of user, changeability is little, and user is easy to remember, therefore, quantity is more, and reliability is stronger;Personal set
Information has the characteristics that changeability, randomness, and user is not easy to remember, but high safety.
In one embodiment of the invention, first terminal 100 can be mobile phone, palm PC, car-mounted terminal, navigator
Or camera with network function and video camera etc..
Second terminal 200 is used to send locking request to cloud server 300.When user has found that first terminal 100 is lost
Later, using second terminal 200(such as mobile phone, computer etc.) by modes such as short message, voice communications to cloud server 300
Send the locking request for being directed to first terminal 100.Wherein, locking request may include the userspersonal information of first terminal 100
And/or the identity information to be verified of the ID number of first terminal 100.
Cloud server 300 is used to receive the identity information for first terminal 100, and receives the transmission of second terminal 200
The locking request for first terminal 100, wherein include identity information to be verified in locking request, and according to the body
Part information verifies identity information to be verified, and after being verified, and control first terminal 100 is restarted.
100 user of first terminal is used to input for the first time for user more specifically, cloud server 300 is received and stored
Identity information.After user has found that first terminal 100 is lost, using second terminal 200(such as mobile phone, computer etc.) it is logical
It crosses the modes such as short message, voice communication and sends the locking request for being directed to first terminal 100 to cloud server 300, locking request can
Be include first terminal 100 userspersonal information and/or first terminal 100 ID number identity information to be verified.Cloud
After server 300 receives the locking request for first terminal 100 of the transmission of second terminal 200, it can determine whether to receive
Identity information to be verified in locking request with it is stored whether consistent for 100 identity information of first terminal, if unanimously,
Then by verifying, wherein identity information to be verified may include personal attribute information and/or personal set information to be verified, with
And require the ID number of the first terminal 100 of locking.
In one embodiment of the invention, when cloud server 300 is to the body to be verified in the locking request received
When part Information Authentication passes through, alarm sounds letter can be sent to first terminal 100 by the ID number of first terminal 100 in locking request
Breath controls first terminal 100 and restarts to remind the user of first terminal 100 that the first terminal 100 will be restarted.
In one embodiment of the invention, first terminal 100 restarts requirement user input by the control of cloud server 300
After the verification information that is switched on, can determine whether the identity information of user's input and stored identity information are consistent, if unanimously,
Then by verifying, first terminal 100 starts and can continue to use.If it is inconsistent, verifying does not pass through, first terminal 100
It shuts down at once, normal use cannot be continued.
In one embodiment of the invention, booting verification information can be embedded in a kind of starting of first terminal 100
Program, and can be set to turn off or on.When being set off, only cloud server 300 receives second terminal 200
The locking request for first terminal 100 sent, after control first terminal 100 is restarted, booting verification information could switch
At unlatching;When being set on, after being only verified, first terminal 100 just be can be used normally.
In one embodiment of the present of invention, there is specific identifier, there are specific in judgement for first terminal 100 in locking request
Restarted after mark.Wherein, specific identifier can be the prompt first that cloud server 300 is sent to first terminal 100
The warning information that the user of terminal 100 first terminal 100 will be restarted.
The remote lock system of terminal according to an embodiment of the present invention, user, can benefits after discovery first terminal is lost
The locking request for being directed to first terminal is sent to cloud server with second terminal, so that cloud server is according to stored
Subscriber identity information verifies identity information to be verified, and after being verified, control first terminal is restarted, so that first is whole
End starting booting verification information program, avoids first terminal from resetting password by brush machine again, guarantees first terminal not by illegal benefit
With, operating process is convenient, succinctly, high safety.
In order to realize above-described embodiment, the present invention also proposes a kind of cloud server.
A kind of cloud server, comprising: the first receiving module, for receiving the identity information for being directed to first terminal, wherein
First terminal provides identification verification function after receiving open command, passes through after verifying first in the user of first terminal
Terminal starting;Second receiving module, for receiving the locking request for first terminal of second terminal transmission, wherein locking
It include identity information to be verified in request;Authentication module, for being verified according to identity information to identity information to be verified;With
And control module, for after being verified, control first terminal to be restarted.
Fig. 3 is the structural block diagram of cloud server according to an embodiment of the invention.
As shown in figure 3, cloud server includes: the first receiving module 301, the second receiving module 302, authentication module 303
With control module 304.
Specifically, the first receiving module 301 is used to receive the identity information for first terminal, wherein first terminal exists
It receives open command and provides identification verification function later, started in the user of first terminal by first terminal after verifying.
More specifically, first terminal provides identification verification function after receiving open command, for example, user uses first for the first time
Terminal or booting send open command when restarting to first terminal to open identification verification function, later, first terminal according to
Identification verification function verifies the user for being applicable in first terminal.First receiving module 301 receives and stores first terminal use
Family starts the identity information of identification verification function and any time input after authentication passes through in first terminal.It should
Understand, the identity information of first terminal can also be uploaded to cloud server by other terminals.
In one embodiment of the invention, first terminal can for mobile phone, palm PC, car-mounted terminal, navigator or
Camera and video camera with network function etc..
In one embodiment of the invention, identity information may include personal attribute information (such as name, gender, birth
The fixed information such as date, occupation, address) and/or personal set information (information that can be changed such as password) and first terminal
ID number.Wherein, personal attribute information and/or personal set information are corresponding with the ID number of first terminal, and personal attribute information can
To be the essential information of user, changeability is little, and user is easy to remember, therefore, quantity is more, and reliability is stronger;Personal set
Information has the characteristics that changeability, randomness, and user is not easy to remember, but high safety.
Second receiving module 302 is used to receive the locking request for first terminal of second terminal transmission, wherein locking
It include identity information to be verified in request.More specifically, after user has found that first terminal is lost, using second terminal
(such as mobile phone, computer etc.) sends the locking request for first terminal by modes such as short message, voice communications and receives to second
Module 302, locking request may include the identity to be verified of the userspersonal information of first terminal and/or the ID number of first terminal
Information.
Authentication module 303 is for verifying identity information to be verified according to identity information.More specifically, authentication module
After 303 receive the locking request for first terminal of second terminal transmission by the second receiving module 302, the can determine whether
The identity information to be verified that two receiving modules 302 receive in locking request with the first receiving module 301 is stored is directed to
Whether first terminal identity information is consistent, if unanimously, by verifying, wherein identity information to be verified may include to be verified
Personal attribute information and/or personal set information, and require locking first terminal ID number.
Control module 304 is used for after being verified, and control first terminal is restarted.More specifically, working as authentication module 303
When being verified, cloud server can send alarm sounds letter to first terminal by the ID number of first terminal in locking request
Breath, and control first terminal and restart.
In one embodiment of the present of invention, there is specific identifier, there are specific marks in judgement for first terminal in locking request
Restarted after knowing.Wherein, specific identifier can be the use for the prompt first terminal that cloud server is sent to first terminal
The warning information that family machine will be restarted.
Cloud server according to an embodiment of the present invention, user is after discovery first terminal is lost, using control mould
Root tuber carries out control to first terminal according to the verification result of authentication module and restarts, so that first terminal starting booting verification information journey
Sequence avoids first terminal from resetting password by brush machine again, guarantees that first terminal is not illegally used, and operating process is convenient, succinctly,
High safety.
In order to realize above-described embodiment, the present invention also proposes a kind of terminal again.
A kind of terminal, comprising: module is provided, for providing identification verification function after receiving open command;Starting
Module, for the user in terminal by starting terminal after verifying;Sending module, for sending the identity information of terminal to cloud
Hold server;Receiving module, for receiving to be verified identity information of the cloud server according to identity information for locking request
The verification result verified;And restart module, for restarting terminal after being verified.
Fig. 4 is the structural block diagram of terminal according to an embodiment of the invention.
As shown in figure 4, terminal includes: to provide module 101, starting module 102, sending module 103,104 and of receiving module
Restart module 105.
Specifically, module 101 is provided for providing identification verification function after receiving open command.Wherein, terminal
Identification verification function is provided after receiving open command, for example, hair when user's first time using terminal or booting are restarted
Send open command to terminal to open identification verification function, later, terminal is according to identification verification function to the user of using terminal
It is verified.
In one embodiment of the invention, identity information can be by the verifying password of identification verification function, it can be by
User is provided to user when user buys after setting after buying terminal or by manufacturer's generation of terminal.
In one embodiment of the invention, terminal can be mobile phone, palm PC, car-mounted terminal, navigator or have
Camera and video camera of network function etc..
Starting module 102 is used for the user in terminal by starting terminal after verifying.Wherein, user is for offer module
The 101 identification verification function input identity informations provided are simultaneously verified, and the user of only terminal verifies it by identity information
Afterwards, terminal could start use.
Sending module 103 is used to send the identity information of terminal to cloud server.Wherein, user is for offer module
Identity information is simultaneously sent to cloud server, cloud server and end by the 101 identification verification function input identity informations provided
End can store the identity information.In one embodiment of the invention, identity information may include personal attribute information (such as surname
The fixed information such as name, gender, date of birth, occupation, address) and/or personal set information (such as variable information of password)
With the ID number of first terminal.Wherein, personal attribute information and/or personal set information are corresponding with the ID number of first terminal, a
Humanized information can be the essential information of user, and changeability is little, and user is easy to remember, therefore, quantity is more, and reliability is got over
By force;Personal set information has the characteristics that changeability, randomness, and user is not easy to remember, but high safety.
Receiving module 104 is used to receive the identity information to be verified that cloud server is directed to locking request according to identity information
The verification result verified.More specifically, utilizing other terminals (such as mobile phone, computer etc.) when user has found that terminal is lost
After sending the locking request for terminal to cloud server by modes such as short message, voice communications, cloud server judgement
Whether the identity information to be verified and the stored terminal identity information that is directed in the locking request received are consistent, if one
It causes, then by verifying, wherein identity information to be verified may include personal attribute information and/or personal set letter to be verified
Breath, and require the ID number of the first terminal of locking.When being verified, it is logical that receiving module 104 can receive cloud server
The alarm sounds information of ID number transmission of terminal in locking request is crossed to remind the user at kind of end that the terminal will be restarted.
Module 105 is restarted for restarting terminal after being verified.Wherein, receiving module 104 receives cloud service
Device according to identity information for the result being verified verified of identity information to be verified of locking request after, restart end
End.
In one embodiment of the invention, when terminal is restarted by cloud server control, it is desirable that user inputs booting
After verification information, can determine whether the userspersonal information of user's input and stored identity information are consistent, if unanimously,
Then by verifying, terminal starts and can continue to use.If it is inconsistent, verifying does not pass through, terminal is shut down at once, Bu Nengji
Continuous normal use.
In one embodiment of the invention, booting verification information can be embedded in a kind of startup program of terminal, and
It can be set to turn off or on.When being set off, only cloud server receives being directed to eventually for other terminals transmission
The locking request at end, after controlling terminal is restarted, booting verification information can just switch to unlatching;When being set on, only
After being verified, terminal just be can be used normally.
In one embodiment of the present of invention, in locking request have specific identifier, terminal judgement there are specific identifier it
After restarted.Wherein, user's machine that specific identifier can be the prompt terminal that cloud server is sent to terminal will be weighed
The warning information opened.
Terminal according to an embodiment of the present invention, user can be taken using other terminals to cloud after discovery terminal is lost
Business device sends the locking request for being directed to terminal, so that cloud server is according to stored subscriber identity information to body to be verified
Part information is verified, and after being verified, is restarted module and is restarted for terminal, so that terminal starting booting verification information
Program avoids terminal from resetting password by brush machine again, guarantees that terminal is not illegally used, and operating process is convenient, succinctly, safety
By force.
It should be appreciated that each section of the invention can be realized with hardware, software, firmware or their combination.Above-mentioned
In embodiment, software that multiple steps or method can be executed in memory and by suitable instruction execution system with storage
Or firmware is realized.It, and in another embodiment, can be under well known in the art for example, if realized with hardware
Any one of column technology or their combination are realized: having a logic gates for realizing logic function to data-signal
Discrete logic, with suitable combinational logic gate circuit specific integrated circuit, programmable gate array (PGA), scene
Programmable gate array (FPGA) etc..
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show
The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example
Point is included at least one embodiment or example of the invention.In the present specification, schematic expression of the above terms are not
Centainly refer to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be any
One or more embodiment or examples in can be combined in any suitable manner.
It although an embodiment of the present invention has been shown and described, for the ordinary skill in the art, can be with
A variety of variations, modification, replacement can be carried out to these embodiments without departing from the principles and spirit of the present invention by understanding
And modification, the scope of the present invention is by appended claims and its equivalent limits.