Disclosure of Invention
The invention provides a new technical scheme based on the problems, and when the terminal is abnormal, the data in the terminal can be prevented from being leaked, so that the safety of the terminal is improved.
In view of this, a first aspect of the present invention provides a terminal control method, including: monitoring the running state of the terminal; when the running state of the terminal meets a preset condition, starting a freezing function of the terminal, wherein the freezing function comprises one or a combination of the following functions: controlling a Subscriber Identity Module (SIM) card of the terminal to be in an unavailable state, closing an application program running in the terminal, prohibiting using a data transmission function of the terminal, and prohibiting reading and writing data stored in the terminal.
In the technical scheme, when the terminal is in an abnormal state, the SIM card of the terminal is controlled to be in an unavailable state so as to stop CS service and PS service, wherein the CS: circuit Switch, CS services include voice and fax, PS: packet Switch, Packet switched, PS services include data services; and by closing the application program running in the terminal, forbidding the use of the data transmission function of the terminal and forbidding the reading and writing of the data stored in the terminal, time for sufficient virus searching and killing can be provided for a user or a field for a technician to keep a complete analysis problem is reserved, so that the data in the terminal is prevented from being leaked, and the safety of the terminal is improved.
Of course, when the user judges that the terminal is abnormal, the freezing function can be manually started.
In the above technical solution, preferably, the preset condition includes one or a combination of the following: and when the consumption of the flow is larger than a preset threshold value within a preset time, virus invasion occurs, and the read-write file is abnormal.
In the technical scheme, if the fact that the consumption of the flow in the preset time is larger than the preset threshold value is detected, and the terminal is invaded by viruses and the read files are abnormal, the freezing function is started. Preferably, when it is detected that the consumption of the flow within the preset time is greater than a preset threshold, the detection terminal plays a video or downloads a file, and if not, the freezing function is started. Of course, whether the interface of the application program is normal or not can be detected, for example, advertisements and malicious information are popped out in the chat interface of the WeChat, and the freezing function can also be automatically started.
In any one of the above technical solutions, preferably, before the step of monitoring the operation state of the terminal, the method includes: after the terminal is started, acquiring first identity information of a first user, and verifying whether the first user has the use authority of the SIM card according to the first identity information; and monitoring the running state of the terminal when the first user is verified to have the use right of the SIM card, and starting the freezing function of the terminal when the first user is verified not to have the use right of the SIM card.
In the technical scheme, after the terminal is started, a first user using the terminal at present is verified to determine whether the first user has the use permission of the terminal SIM card, so that the use safety of the terminal SIM card is ensured. Meanwhile, when the first user is verified not to have the right of using the SIM card, the freezing function is started, so that the illegal user is prevented from using the SIM card, and the safety of the terminal is further ensured.
In any of the above technical solutions, preferably, the method further includes: judging whether the current verification times for verifying that the first user does not have the use authority of the SIM card are greater than preset times or not; and if the current verification times are greater than the preset times, starting the freezing function.
In the technical scheme, errors may occur when the user inputs the identity information, so that the user is provided with the opportunity of performing multiple times of verification, and if the multiple times of verification fail, the user is determined to be an illegal user, and the freezing function is started, so that the reliability of the user using the terminal is ensured.
For example, when the user inputs identity information twice before, the user fails to be verified, the identity information of the user is collected for the third time, and if the verification fails, the freezing function is started.
In any of the above technical solutions, preferably, after the step of starting the freezing function of the terminal, the method includes: receiving a unfreezing request, collecting second identity information of a second user, and determining whether to close the freezing function of the terminal according to the second identity information.
In the technical scheme, after the terminal is repaired, whether the freezing function of the terminal is closed or not is determined by authenticating a second user currently using the terminal, so that the terminal is restored to a normal working state, and the user can normally use the terminal.
The first identity information and the second identity information in the above scheme include, but are not limited to, one or a combination of the following: password, fingerprint information, iris information, face information, and palm print information.
A second aspect of the present invention provides a terminal control apparatus, including: the monitoring unit is used for monitoring the running state of the terminal; a first control unit, configured to start a freezing function of the terminal when the operating state of the terminal satisfies a preset condition, where the freezing function includes one or a combination of the following: controlling an SIM card of the terminal to be in an unavailable state, closing an application program running in the terminal, forbidding to use a data transmission function of the terminal, and forbidding to read and write data stored in the terminal.
In the technical scheme, when the operation state of the terminal meets the preset condition, which indicates that the terminal is in an abnormal state, the SIM card of the terminal is controlled to be in an unavailable state to stop the CS service and the PS service, wherein the CS: circuit Switch, CS services include voice and fax, PS: packet Switch, Packet switched, PS services include data services; and by closing the application program running in the terminal, forbidding the use of the data transmission function of the terminal and forbidding the reading and writing of the data stored in the terminal, time for sufficient virus searching and killing can be provided for a user or a field for a technician to keep a complete analysis problem is reserved, so that the data in the terminal is prevented from being leaked, and the safety of the terminal is improved.
Of course, when the user judges that the terminal is abnormal, the freezing function can be manually started.
In the above technical solution, preferably, the preset condition includes one or a combination of the following: and when the consumption of the flow is larger than a preset threshold value within a preset time, virus invasion occurs, and the read-write file is abnormal.
In the technical scheme, if the fact that the consumption of the flow in the preset time is larger than the preset threshold value is detected, and the terminal is invaded by viruses and the read files are abnormal, the freezing function is started. Preferably, when it is detected that the consumption of the flow within the preset time is greater than a preset threshold, the detection terminal plays a video or downloads a file, and if not, the freezing function is started. Of course, whether the interface of the application program is normal or not can be detected, for example, advertisements and malicious information are popped out in the chat interface of the WeChat, and the freezing function can also be automatically started.
In any of the above technical solutions, preferably, the method further includes: the verification unit is used for acquiring first identity information of a first user after the terminal is started, and verifying whether the first user has the use authority of the SIM card according to the first identity information; and the second control unit is used for monitoring the running state of the terminal when the first user is verified to have the use right of the SIM card, and starting the freezing function of the terminal when the first user is verified not to have the use right of the SIM card.
In the technical scheme, after the terminal is started, a first user using the terminal at present is verified to determine whether the first user has the use permission of the terminal SIM card, so that the use safety of the terminal SIM card is ensured. Meanwhile, when the first user is verified not to have the right of using the SIM card, the freezing function is started, so that the illegal user is prevented from using the SIM card, and the safety of the terminal is further ensured.
In any of the above technical solutions, preferably, the method further includes: the judging unit is used for judging whether the current verification times for verifying that the first user does not have the use authority of the SIM card is greater than the preset times or not; the second control unit is specifically configured to start the freezing function if the current verification number is greater than the preset number.
In the technical scheme, errors may occur when the user inputs the identity information, so that the user is provided with the opportunity of performing multiple times of verification, and if the multiple times of verification fail, the user is determined to be an illegal user, and the freezing function is started, so that the reliability of the user using the terminal is ensured.
For example, when the user inputs identity information twice before, the user fails to be verified, the identity information of the user is collected for the third time, and if the verification fails, the freezing function is started.
In any of the above technical solutions, preferably, the method further includes: and the unfreezing unit is used for receiving the unfreezing request, acquiring second identity information of a second user, and determining whether to close the freezing function of the terminal according to the second identity information.
In the technical scheme, after the terminal is repaired, whether the freezing function of the terminal is closed or not is determined by authenticating a second user currently using the terminal, so that the terminal is restored to a normal working state, and the user can normally use the terminal.
The first identity information and the second identity information in the above scheme include, but are not limited to, one or a combination of the following: password, fingerprint information, iris information, face information, and palm print information.
A third aspect of the present invention provides a terminal, including the terminal control apparatus according to any one of the above technical solutions, so that the terminal has the same technical effects as the terminal control apparatus according to any one of the above technical solutions, and details thereof are not repeated herein.
Through the technical scheme of the invention, when the terminal is abnormal, the data in the terminal can be prevented from being leaked, so that the safety of the terminal is improved.
Detailed Description
So that the manner in which the above recited objects, features and advantages of the present invention can be understood in detail, a more particular description of the invention, briefly summarized above, may be had by reference to the embodiments thereof which are illustrated in the appended drawings. It should be noted that the embodiments and features of the embodiments of the present application may be combined with each other without conflict.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, however, the present invention may be practiced in other ways than those specifically described herein, and therefore the scope of the present invention is not limited by the specific embodiments disclosed below.
Fig. 1 shows a flowchart illustrating a terminal control method according to an embodiment of the present invention.
As shown in fig. 1, a terminal control method according to an embodiment of the present invention includes:
and 102, monitoring the running state of the terminal.
Step 104, when the operation state of the terminal meets a preset condition, starting a freezing function of the terminal, wherein the freezing function comprises one or a combination of the following functions: controlling an SIM card of the terminal to be in an unavailable state, closing an application program running in the terminal, forbidding to use a data transmission function of the terminal, and forbidding to read and write data stored in the terminal.
In the technical scheme, when the operation state of the terminal meets the preset condition, which indicates that the terminal is in an abnormal state, the SIM card of the terminal is controlled to be in an unavailable state to stop the CS service and the PS service, wherein the CS: circuit Switch, CS services include voice and fax, PS: packet Switch, Packet switched, PS services include data services; and by closing the application program running in the terminal, forbidding the use of the data transmission function of the terminal and forbidding the reading and writing of the data stored in the terminal, time for sufficient virus searching and killing can be provided for a user or a field for a technician to keep a complete analysis problem is reserved, so that the data in the terminal is prevented from being leaked, and the safety of the terminal is improved.
Of course, when the user judges that the terminal is abnormal, the freezing function can be manually started.
In the above technical solution, preferably, the preset condition includes one or a combination of the following: and when the consumption of the flow is larger than a preset threshold value within a preset time, virus invasion occurs, and the read-write file is abnormal.
In the technical scheme, if the fact that the consumption of the flow in the preset time is larger than the preset threshold value is detected, and the terminal is invaded by viruses and the read files are abnormal, the freezing function is started. Preferably, when it is detected that the consumption of the flow within the preset time is greater than a preset threshold, the detection terminal plays a video or downloads a file, and if not, the freezing function is started. Of course, whether the interface of the application program is normal or not can be detected, for example, advertisements and malicious information are popped out in the chat interface of the WeChat, and the freezing function can also be automatically started.
In any of the above solutions, preferably, before the step 102, the method includes: after the terminal is started, acquiring first identity information of a first user, and verifying whether the first user has the use authority of the SIM card according to the first identity information; and monitoring the running state of the terminal when the first user is verified to have the use right of the SIM card, and starting the freezing function of the terminal when the first user is verified not to have the use right of the SIM card.
In the technical scheme, after the terminal is started, the first user is verified to determine whether the first user has the use permission of the terminal SIM card, so that the use safety of the terminal SIM card is ensured. Meanwhile, when the first user is verified not to have the right of using the SIM card, the freezing function is started, so that the illegal user is prevented from using the SIM card, and the safety of the terminal is further ensured.
In any of the above technical solutions, preferably, the method further includes: judging whether the current verification times for verifying that the first user does not have the use authority of the SIM card are greater than preset times or not; and if the current verification times are greater than the preset times, starting the freezing function.
In the technical scheme, errors may occur when the user inputs the identity information, so that the user is provided with the opportunity of performing multiple times of verification, and if the multiple times of verification fail, the user is determined to be an illegal user, and the freezing function is started, so that the reliability of the user using the terminal is ensured.
For example, when the user inputs identity information twice before, the user fails to be verified, the identity information of the user is collected for the third time, and if the verification fails, the freezing function is started.
In any of the above solutions, preferably, after the step 104, the method includes: receiving a unfreezing request, collecting second identity information of a second user, and determining whether to close the freezing function of the terminal according to the second identity information.
In the technical scheme, after the terminal is repaired, whether the freezing function of the terminal is closed or not is determined by authenticating a user, so that the terminal is restored to a normal working state, and the user can normally use the terminal.
The first identity information and the second identity information in the above scheme include, but are not limited to, one or a combination of the following: password, fingerprint information, iris information, face information, and palm print information.
Fig. 2 shows a flowchart illustrating a terminal control method according to another embodiment of the present invention; fig. 3 shows a schematic diagram of a freezing function of a terminal according to an embodiment of the present invention.
As shown in fig. 2, a terminal control method according to another embodiment of the present invention includes:
step 202, determine whether the eSIM (embedded identity module) account password is correct? If yes, go to step 206, otherwise go to step 204.
Step 204, re-enter the password for 2 times and then determine if the password is correct? If yes, go to step 206, otherwise, go to step 212.
Step 206, the system operates normally.
In step 208, another thread is started to monitor whether the phone is abnormal? When the mobile phone is monitored to be abnormal, the step 212 is entered, otherwise, the step 206 is entered, wherein the mobile phone abnormality includes: and when the consumption of the flow in the preset time is larger than a preset threshold value, the mobile phone is invaded by virus, and the file in the read-write mobile phone is abnormal.
Step 210, if the user finds that the mobile phone is abnormal, a freezing instruction sent by the user is received.
Step 212, a freeze function is initiated.
As shown in fig. 3, the freezing function includes: controlling the eSIM card to be in an unavailable state, specifically, prohibiting dialing a telephone and sending out a short message; the mobile phone transmission prohibition function specifically means prohibition of WIFI (Wireless Fidelity, Wireless local area network based on ieee802.11b standard), Bluetooth (Bluetooth), NFC (Near Field Communication ), USB (Universal Serial Bus), and OTA (Over-the-air technology) functions; forbidding the operation of the third-party application program, specifically, identifying whether the third-party application program is the third-party application program or not through the package name of the data package, and forbidding reading, writing and deleting of related data of the third-party application program; and forbidding the propagation of the sensitive information of the system, in particular forbidding the reading, writing and deleting of the sensitive information.
Fig. 4 shows a schematic structural diagram of a terminal control device according to an embodiment of the present invention.
As shown in fig. 4, a terminal control apparatus 400 according to an embodiment of the present invention includes: a monitoring unit 402 and a first control unit 404, wherein the monitoring unit 402 is used for monitoring the operation state of the terminal; a first control unit 404, configured to start a freezing function of the terminal when the operating state of the terminal satisfies a preset condition, where the freezing function includes one or a combination of the following: controlling an SIM card of the terminal to be in an unavailable state, closing an application program running in the terminal, forbidding to use a data transmission function of the terminal, and forbidding to read and write data stored in the terminal.
In the technical scheme, when the operation state of the terminal meets the preset condition, which indicates that the terminal is in an abnormal state, the SIM card of the terminal is controlled to be in an unavailable state to stop the CS service and the PS service, wherein the CS: circuit Switch, CS services include voice and fax, PS: packet Switch, Packet switched, PS services include data services; and by closing the application program running in the terminal, forbidding the use of the data transmission function of the terminal and forbidding the reading and writing of the data stored in the terminal, time for sufficient virus searching and killing can be provided for a user or a field for a technician to keep a complete analysis problem is reserved, so that the data in the terminal is prevented from being leaked, and the safety of the terminal is improved.
Of course, when the user judges that the terminal is abnormal, the freezing function can be manually started.
In the above technical solution, preferably, the preset condition includes one or a combination of the following: and when the consumption of the flow is larger than a preset threshold value within a preset time, virus invasion occurs, and the read-write file is abnormal.
In the technical scheme, if the fact that the consumption of the flow in the preset time is larger than the preset threshold value is detected, and the terminal is invaded by viruses and the read files are abnormal, the freezing function is started. Preferably, when it is detected that the consumption of the flow within the preset time is greater than a preset threshold, the detection terminal plays a video or downloads a file, and if not, the freezing function is started. Of course, whether the interface of the application program is normal or not can be detected, for example, advertisements and malicious information are popped out in the chat interface of the WeChat, and the freezing function can also be automatically started.
In any of the above technical solutions, preferably, the method further includes: a verification unit 406, configured to collect first identity information of a first user after the terminal is powered on, and verify whether the first user has the usage right of the SIM card according to the first identity information; a second control unit 408, configured to monitor the operating status of the terminal when it is verified that the first user has the usage right of the SIM card, and start the freezing function of the terminal when it is verified that the first user does not have the usage right of the SIM card.
In the technical scheme, after the terminal is started, the first user is verified to determine whether the first user has the use permission of the terminal SIM card, so that the use safety of the terminal SIM card is ensured. Meanwhile, when the first user is verified not to have the right of using the SIM card, the freezing function is started, so that the illegal user is prevented from using the SIM card, and the safety of the terminal is further ensured.
In any of the above technical solutions, preferably, the method further includes: a determining unit 410, configured to determine whether a current verification time for verifying that the first user does not have the usage permission of the SIM card is greater than a preset time; the second control unit 408 is specifically configured to start the freezing function if the current verification time is greater than the preset time.
In the technical scheme, errors may occur when the user inputs the identity information, so that the user is provided with the opportunity of performing multiple times of verification, and if the multiple times of verification fail, the user is determined to be an illegal user, and the freezing function is started, so that the reliability of the user using the terminal is ensured.
For example, when the user inputs identity information twice before, the user fails to be verified, the identity information of the user is collected for the third time, and if the verification fails, the freezing function is started.
In any of the above technical solutions, preferably, the method further includes: the unfreezing unit 412 is configured to receive an unfreezing request, acquire second identity information of a second user, and determine whether to close the freezing function of the terminal according to the second identity information.
In the technical scheme, after the terminal is repaired, whether the freezing function of the terminal is closed or not is determined by authenticating a user, so that the terminal is restored to a normal working state, and the user can normally use the terminal.
The first identity information and the second identity information in the above scheme include, but are not limited to, one or a combination of the following: password, fingerprint information, iris information, face information, and palm print information.
Fig. 5 shows a schematic structural diagram of a terminal according to an embodiment of the present invention.
As shown in fig. 5, a terminal 500 according to an embodiment of the present invention includes the terminal control apparatus 400 according to any one of the above technical solutions, and therefore, the terminal 500 has the same technical effects as the terminal control apparatus 400 according to any one of the above technical solutions, and is not described herein again.
The technical scheme of the invention is described in detail in combination with the attached drawings, and through the technical scheme of the invention, when the terminal is abnormal, the data in the terminal can be prevented from being leaked, so that the safety of the terminal is improved.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.