[go: up one dir, main page]

CN105873028B - Terminal control method, terminal control device and terminal - Google Patents

Terminal control method, terminal control device and terminal Download PDF

Info

Publication number
CN105873028B
CN105873028B CN201610182517.6A CN201610182517A CN105873028B CN 105873028 B CN105873028 B CN 105873028B CN 201610182517 A CN201610182517 A CN 201610182517A CN 105873028 B CN105873028 B CN 105873028B
Authority
CN
China
Prior art keywords
terminal
user
sim card
freezing function
identity information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610182517.6A
Other languages
Chinese (zh)
Other versions
CN105873028A (en
Inventor
张明臣
张刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Foshan Tongxin Technology Co.,Ltd.
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201610182517.6A priority Critical patent/CN105873028B/en
Publication of CN105873028A publication Critical patent/CN105873028A/en
Application granted granted Critical
Publication of CN105873028B publication Critical patent/CN105873028B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/04Arrangements for maintaining operational condition

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Computer Interaction (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)

Abstract

本发明提出了一种终端控制方法、终端控制装置和终端,其中,所述终端控制方法包括:监测终端的运行状态;当所述终端的所述运行状态满足预设条件时,启动所述终端的冻结功能,其中,所述冻结功能包括以下之一或其组合:控制所述终端的SIM卡处于不可用状态、关闭所述终端中运行的应用程序、禁止使用所述终端的数据传输功能、禁止读写所述终端中存储的数据。通过本发明的技术方案,在终端出现异常时,可以避免终端内的数据遭到泄露,从而提高终端的安全性。

Figure 201610182517

The present invention provides a terminal control method, a terminal control device and a terminal, wherein the terminal control method includes: monitoring the running state of the terminal; when the running state of the terminal satisfies a preset condition, starting the terminal The freezing function, wherein the freezing function includes one or a combination of the following: controlling the SIM card of the terminal to be in an unavailable state, closing the application program running in the terminal, prohibiting the use of the data transmission function of the terminal, Reading and writing of data stored in the terminal is prohibited. Through the technical scheme of the present invention, when an abnormality occurs in the terminal, data in the terminal can be prevented from being leaked, thereby improving the security of the terminal.

Figure 201610182517

Description

Terminal control method, terminal control device and terminal
Technical Field
The present invention relates to the field of terminal technologies, and in particular, to a terminal control method, a terminal control device, and a terminal.
Background
At present, terminals such as mobile phones and ipads become essential articles for life of users, and great convenience is brought to life of the users. Of course, many important data are stored in the terminal, and when the terminal is abnormal, for example, the terminal is invaded by virus, controlled by an illegal user, and the like, the data in the terminal is easily leaked, so that the personal privacy of the user is also leaked, and the security of the terminal is reduced.
Therefore, how to avoid the data leakage in the terminal when the terminal is abnormal becomes an urgent problem to be solved.
Disclosure of Invention
The invention provides a new technical scheme based on the problems, and when the terminal is abnormal, the data in the terminal can be prevented from being leaked, so that the safety of the terminal is improved.
In view of this, a first aspect of the present invention provides a terminal control method, including: monitoring the running state of the terminal; when the running state of the terminal meets a preset condition, starting a freezing function of the terminal, wherein the freezing function comprises one or a combination of the following functions: controlling a Subscriber Identity Module (SIM) card of the terminal to be in an unavailable state, closing an application program running in the terminal, prohibiting using a data transmission function of the terminal, and prohibiting reading and writing data stored in the terminal.
In the technical scheme, when the terminal is in an abnormal state, the SIM card of the terminal is controlled to be in an unavailable state so as to stop CS service and PS service, wherein the CS: circuit Switch, CS services include voice and fax, PS: packet Switch, Packet switched, PS services include data services; and by closing the application program running in the terminal, forbidding the use of the data transmission function of the terminal and forbidding the reading and writing of the data stored in the terminal, time for sufficient virus searching and killing can be provided for a user or a field for a technician to keep a complete analysis problem is reserved, so that the data in the terminal is prevented from being leaked, and the safety of the terminal is improved.
Of course, when the user judges that the terminal is abnormal, the freezing function can be manually started.
In the above technical solution, preferably, the preset condition includes one or a combination of the following: and when the consumption of the flow is larger than a preset threshold value within a preset time, virus invasion occurs, and the read-write file is abnormal.
In the technical scheme, if the fact that the consumption of the flow in the preset time is larger than the preset threshold value is detected, and the terminal is invaded by viruses and the read files are abnormal, the freezing function is started. Preferably, when it is detected that the consumption of the flow within the preset time is greater than a preset threshold, the detection terminal plays a video or downloads a file, and if not, the freezing function is started. Of course, whether the interface of the application program is normal or not can be detected, for example, advertisements and malicious information are popped out in the chat interface of the WeChat, and the freezing function can also be automatically started.
In any one of the above technical solutions, preferably, before the step of monitoring the operation state of the terminal, the method includes: after the terminal is started, acquiring first identity information of a first user, and verifying whether the first user has the use authority of the SIM card according to the first identity information; and monitoring the running state of the terminal when the first user is verified to have the use right of the SIM card, and starting the freezing function of the terminal when the first user is verified not to have the use right of the SIM card.
In the technical scheme, after the terminal is started, a first user using the terminal at present is verified to determine whether the first user has the use permission of the terminal SIM card, so that the use safety of the terminal SIM card is ensured. Meanwhile, when the first user is verified not to have the right of using the SIM card, the freezing function is started, so that the illegal user is prevented from using the SIM card, and the safety of the terminal is further ensured.
In any of the above technical solutions, preferably, the method further includes: judging whether the current verification times for verifying that the first user does not have the use authority of the SIM card are greater than preset times or not; and if the current verification times are greater than the preset times, starting the freezing function.
In the technical scheme, errors may occur when the user inputs the identity information, so that the user is provided with the opportunity of performing multiple times of verification, and if the multiple times of verification fail, the user is determined to be an illegal user, and the freezing function is started, so that the reliability of the user using the terminal is ensured.
For example, when the user inputs identity information twice before, the user fails to be verified, the identity information of the user is collected for the third time, and if the verification fails, the freezing function is started.
In any of the above technical solutions, preferably, after the step of starting the freezing function of the terminal, the method includes: receiving a unfreezing request, collecting second identity information of a second user, and determining whether to close the freezing function of the terminal according to the second identity information.
In the technical scheme, after the terminal is repaired, whether the freezing function of the terminal is closed or not is determined by authenticating a second user currently using the terminal, so that the terminal is restored to a normal working state, and the user can normally use the terminal.
The first identity information and the second identity information in the above scheme include, but are not limited to, one or a combination of the following: password, fingerprint information, iris information, face information, and palm print information.
A second aspect of the present invention provides a terminal control apparatus, including: the monitoring unit is used for monitoring the running state of the terminal; a first control unit, configured to start a freezing function of the terminal when the operating state of the terminal satisfies a preset condition, where the freezing function includes one or a combination of the following: controlling an SIM card of the terminal to be in an unavailable state, closing an application program running in the terminal, forbidding to use a data transmission function of the terminal, and forbidding to read and write data stored in the terminal.
In the technical scheme, when the operation state of the terminal meets the preset condition, which indicates that the terminal is in an abnormal state, the SIM card of the terminal is controlled to be in an unavailable state to stop the CS service and the PS service, wherein the CS: circuit Switch, CS services include voice and fax, PS: packet Switch, Packet switched, PS services include data services; and by closing the application program running in the terminal, forbidding the use of the data transmission function of the terminal and forbidding the reading and writing of the data stored in the terminal, time for sufficient virus searching and killing can be provided for a user or a field for a technician to keep a complete analysis problem is reserved, so that the data in the terminal is prevented from being leaked, and the safety of the terminal is improved.
Of course, when the user judges that the terminal is abnormal, the freezing function can be manually started.
In the above technical solution, preferably, the preset condition includes one or a combination of the following: and when the consumption of the flow is larger than a preset threshold value within a preset time, virus invasion occurs, and the read-write file is abnormal.
In the technical scheme, if the fact that the consumption of the flow in the preset time is larger than the preset threshold value is detected, and the terminal is invaded by viruses and the read files are abnormal, the freezing function is started. Preferably, when it is detected that the consumption of the flow within the preset time is greater than a preset threshold, the detection terminal plays a video or downloads a file, and if not, the freezing function is started. Of course, whether the interface of the application program is normal or not can be detected, for example, advertisements and malicious information are popped out in the chat interface of the WeChat, and the freezing function can also be automatically started.
In any of the above technical solutions, preferably, the method further includes: the verification unit is used for acquiring first identity information of a first user after the terminal is started, and verifying whether the first user has the use authority of the SIM card according to the first identity information; and the second control unit is used for monitoring the running state of the terminal when the first user is verified to have the use right of the SIM card, and starting the freezing function of the terminal when the first user is verified not to have the use right of the SIM card.
In the technical scheme, after the terminal is started, a first user using the terminal at present is verified to determine whether the first user has the use permission of the terminal SIM card, so that the use safety of the terminal SIM card is ensured. Meanwhile, when the first user is verified not to have the right of using the SIM card, the freezing function is started, so that the illegal user is prevented from using the SIM card, and the safety of the terminal is further ensured.
In any of the above technical solutions, preferably, the method further includes: the judging unit is used for judging whether the current verification times for verifying that the first user does not have the use authority of the SIM card is greater than the preset times or not; the second control unit is specifically configured to start the freezing function if the current verification number is greater than the preset number.
In the technical scheme, errors may occur when the user inputs the identity information, so that the user is provided with the opportunity of performing multiple times of verification, and if the multiple times of verification fail, the user is determined to be an illegal user, and the freezing function is started, so that the reliability of the user using the terminal is ensured.
For example, when the user inputs identity information twice before, the user fails to be verified, the identity information of the user is collected for the third time, and if the verification fails, the freezing function is started.
In any of the above technical solutions, preferably, the method further includes: and the unfreezing unit is used for receiving the unfreezing request, acquiring second identity information of a second user, and determining whether to close the freezing function of the terminal according to the second identity information.
In the technical scheme, after the terminal is repaired, whether the freezing function of the terminal is closed or not is determined by authenticating a second user currently using the terminal, so that the terminal is restored to a normal working state, and the user can normally use the terminal.
The first identity information and the second identity information in the above scheme include, but are not limited to, one or a combination of the following: password, fingerprint information, iris information, face information, and palm print information.
A third aspect of the present invention provides a terminal, including the terminal control apparatus according to any one of the above technical solutions, so that the terminal has the same technical effects as the terminal control apparatus according to any one of the above technical solutions, and details thereof are not repeated herein.
Through the technical scheme of the invention, when the terminal is abnormal, the data in the terminal can be prevented from being leaked, so that the safety of the terminal is improved.
Drawings
Fig. 1 shows a flow diagram of a terminal control method according to an embodiment of the invention;
fig. 2 shows a flowchart illustrating a terminal control method according to another embodiment of the present invention;
fig. 3 shows a schematic diagram of a freeze function of a terminal according to an embodiment of the invention;
fig. 4 shows a schematic configuration diagram of a terminal control apparatus according to an embodiment of the present invention;
fig. 5 shows a schematic structural diagram of a terminal according to an embodiment of the present invention.
Detailed Description
So that the manner in which the above recited objects, features and advantages of the present invention can be understood in detail, a more particular description of the invention, briefly summarized above, may be had by reference to the embodiments thereof which are illustrated in the appended drawings. It should be noted that the embodiments and features of the embodiments of the present application may be combined with each other without conflict.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, however, the present invention may be practiced in other ways than those specifically described herein, and therefore the scope of the present invention is not limited by the specific embodiments disclosed below.
Fig. 1 shows a flowchart illustrating a terminal control method according to an embodiment of the present invention.
As shown in fig. 1, a terminal control method according to an embodiment of the present invention includes:
and 102, monitoring the running state of the terminal.
Step 104, when the operation state of the terminal meets a preset condition, starting a freezing function of the terminal, wherein the freezing function comprises one or a combination of the following functions: controlling an SIM card of the terminal to be in an unavailable state, closing an application program running in the terminal, forbidding to use a data transmission function of the terminal, and forbidding to read and write data stored in the terminal.
In the technical scheme, when the operation state of the terminal meets the preset condition, which indicates that the terminal is in an abnormal state, the SIM card of the terminal is controlled to be in an unavailable state to stop the CS service and the PS service, wherein the CS: circuit Switch, CS services include voice and fax, PS: packet Switch, Packet switched, PS services include data services; and by closing the application program running in the terminal, forbidding the use of the data transmission function of the terminal and forbidding the reading and writing of the data stored in the terminal, time for sufficient virus searching and killing can be provided for a user or a field for a technician to keep a complete analysis problem is reserved, so that the data in the terminal is prevented from being leaked, and the safety of the terminal is improved.
Of course, when the user judges that the terminal is abnormal, the freezing function can be manually started.
In the above technical solution, preferably, the preset condition includes one or a combination of the following: and when the consumption of the flow is larger than a preset threshold value within a preset time, virus invasion occurs, and the read-write file is abnormal.
In the technical scheme, if the fact that the consumption of the flow in the preset time is larger than the preset threshold value is detected, and the terminal is invaded by viruses and the read files are abnormal, the freezing function is started. Preferably, when it is detected that the consumption of the flow within the preset time is greater than a preset threshold, the detection terminal plays a video or downloads a file, and if not, the freezing function is started. Of course, whether the interface of the application program is normal or not can be detected, for example, advertisements and malicious information are popped out in the chat interface of the WeChat, and the freezing function can also be automatically started.
In any of the above solutions, preferably, before the step 102, the method includes: after the terminal is started, acquiring first identity information of a first user, and verifying whether the first user has the use authority of the SIM card according to the first identity information; and monitoring the running state of the terminal when the first user is verified to have the use right of the SIM card, and starting the freezing function of the terminal when the first user is verified not to have the use right of the SIM card.
In the technical scheme, after the terminal is started, the first user is verified to determine whether the first user has the use permission of the terminal SIM card, so that the use safety of the terminal SIM card is ensured. Meanwhile, when the first user is verified not to have the right of using the SIM card, the freezing function is started, so that the illegal user is prevented from using the SIM card, and the safety of the terminal is further ensured.
In any of the above technical solutions, preferably, the method further includes: judging whether the current verification times for verifying that the first user does not have the use authority of the SIM card are greater than preset times or not; and if the current verification times are greater than the preset times, starting the freezing function.
In the technical scheme, errors may occur when the user inputs the identity information, so that the user is provided with the opportunity of performing multiple times of verification, and if the multiple times of verification fail, the user is determined to be an illegal user, and the freezing function is started, so that the reliability of the user using the terminal is ensured.
For example, when the user inputs identity information twice before, the user fails to be verified, the identity information of the user is collected for the third time, and if the verification fails, the freezing function is started.
In any of the above solutions, preferably, after the step 104, the method includes: receiving a unfreezing request, collecting second identity information of a second user, and determining whether to close the freezing function of the terminal according to the second identity information.
In the technical scheme, after the terminal is repaired, whether the freezing function of the terminal is closed or not is determined by authenticating a user, so that the terminal is restored to a normal working state, and the user can normally use the terminal.
The first identity information and the second identity information in the above scheme include, but are not limited to, one or a combination of the following: password, fingerprint information, iris information, face information, and palm print information.
Fig. 2 shows a flowchart illustrating a terminal control method according to another embodiment of the present invention; fig. 3 shows a schematic diagram of a freezing function of a terminal according to an embodiment of the present invention.
As shown in fig. 2, a terminal control method according to another embodiment of the present invention includes:
step 202, determine whether the eSIM (embedded identity module) account password is correct? If yes, go to step 206, otherwise go to step 204.
Step 204, re-enter the password for 2 times and then determine if the password is correct? If yes, go to step 206, otherwise, go to step 212.
Step 206, the system operates normally.
In step 208, another thread is started to monitor whether the phone is abnormal? When the mobile phone is monitored to be abnormal, the step 212 is entered, otherwise, the step 206 is entered, wherein the mobile phone abnormality includes: and when the consumption of the flow in the preset time is larger than a preset threshold value, the mobile phone is invaded by virus, and the file in the read-write mobile phone is abnormal.
Step 210, if the user finds that the mobile phone is abnormal, a freezing instruction sent by the user is received.
Step 212, a freeze function is initiated.
As shown in fig. 3, the freezing function includes: controlling the eSIM card to be in an unavailable state, specifically, prohibiting dialing a telephone and sending out a short message; the mobile phone transmission prohibition function specifically means prohibition of WIFI (Wireless Fidelity, Wireless local area network based on ieee802.11b standard), Bluetooth (Bluetooth), NFC (Near Field Communication ), USB (Universal Serial Bus), and OTA (Over-the-air technology) functions; forbidding the operation of the third-party application program, specifically, identifying whether the third-party application program is the third-party application program or not through the package name of the data package, and forbidding reading, writing and deleting of related data of the third-party application program; and forbidding the propagation of the sensitive information of the system, in particular forbidding the reading, writing and deleting of the sensitive information.
Fig. 4 shows a schematic structural diagram of a terminal control device according to an embodiment of the present invention.
As shown in fig. 4, a terminal control apparatus 400 according to an embodiment of the present invention includes: a monitoring unit 402 and a first control unit 404, wherein the monitoring unit 402 is used for monitoring the operation state of the terminal; a first control unit 404, configured to start a freezing function of the terminal when the operating state of the terminal satisfies a preset condition, where the freezing function includes one or a combination of the following: controlling an SIM card of the terminal to be in an unavailable state, closing an application program running in the terminal, forbidding to use a data transmission function of the terminal, and forbidding to read and write data stored in the terminal.
In the technical scheme, when the operation state of the terminal meets the preset condition, which indicates that the terminal is in an abnormal state, the SIM card of the terminal is controlled to be in an unavailable state to stop the CS service and the PS service, wherein the CS: circuit Switch, CS services include voice and fax, PS: packet Switch, Packet switched, PS services include data services; and by closing the application program running in the terminal, forbidding the use of the data transmission function of the terminal and forbidding the reading and writing of the data stored in the terminal, time for sufficient virus searching and killing can be provided for a user or a field for a technician to keep a complete analysis problem is reserved, so that the data in the terminal is prevented from being leaked, and the safety of the terminal is improved.
Of course, when the user judges that the terminal is abnormal, the freezing function can be manually started.
In the above technical solution, preferably, the preset condition includes one or a combination of the following: and when the consumption of the flow is larger than a preset threshold value within a preset time, virus invasion occurs, and the read-write file is abnormal.
In the technical scheme, if the fact that the consumption of the flow in the preset time is larger than the preset threshold value is detected, and the terminal is invaded by viruses and the read files are abnormal, the freezing function is started. Preferably, when it is detected that the consumption of the flow within the preset time is greater than a preset threshold, the detection terminal plays a video or downloads a file, and if not, the freezing function is started. Of course, whether the interface of the application program is normal or not can be detected, for example, advertisements and malicious information are popped out in the chat interface of the WeChat, and the freezing function can also be automatically started.
In any of the above technical solutions, preferably, the method further includes: a verification unit 406, configured to collect first identity information of a first user after the terminal is powered on, and verify whether the first user has the usage right of the SIM card according to the first identity information; a second control unit 408, configured to monitor the operating status of the terminal when it is verified that the first user has the usage right of the SIM card, and start the freezing function of the terminal when it is verified that the first user does not have the usage right of the SIM card.
In the technical scheme, after the terminal is started, the first user is verified to determine whether the first user has the use permission of the terminal SIM card, so that the use safety of the terminal SIM card is ensured. Meanwhile, when the first user is verified not to have the right of using the SIM card, the freezing function is started, so that the illegal user is prevented from using the SIM card, and the safety of the terminal is further ensured.
In any of the above technical solutions, preferably, the method further includes: a determining unit 410, configured to determine whether a current verification time for verifying that the first user does not have the usage permission of the SIM card is greater than a preset time; the second control unit 408 is specifically configured to start the freezing function if the current verification time is greater than the preset time.
In the technical scheme, errors may occur when the user inputs the identity information, so that the user is provided with the opportunity of performing multiple times of verification, and if the multiple times of verification fail, the user is determined to be an illegal user, and the freezing function is started, so that the reliability of the user using the terminal is ensured.
For example, when the user inputs identity information twice before, the user fails to be verified, the identity information of the user is collected for the third time, and if the verification fails, the freezing function is started.
In any of the above technical solutions, preferably, the method further includes: the unfreezing unit 412 is configured to receive an unfreezing request, acquire second identity information of a second user, and determine whether to close the freezing function of the terminal according to the second identity information.
In the technical scheme, after the terminal is repaired, whether the freezing function of the terminal is closed or not is determined by authenticating a user, so that the terminal is restored to a normal working state, and the user can normally use the terminal.
The first identity information and the second identity information in the above scheme include, but are not limited to, one or a combination of the following: password, fingerprint information, iris information, face information, and palm print information.
Fig. 5 shows a schematic structural diagram of a terminal according to an embodiment of the present invention.
As shown in fig. 5, a terminal 500 according to an embodiment of the present invention includes the terminal control apparatus 400 according to any one of the above technical solutions, and therefore, the terminal 500 has the same technical effects as the terminal control apparatus 400 according to any one of the above technical solutions, and is not described herein again.
The technical scheme of the invention is described in detail in combination with the attached drawings, and through the technical scheme of the invention, when the terminal is abnormal, the data in the terminal can be prevented from being leaked, so that the safety of the terminal is improved.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (7)

1. A terminal control method, comprising:
monitoring the running state of the terminal;
when the running state of the terminal meets a preset condition, starting a freezing function of the terminal, wherein the freezing function comprises one or a combination of the following functions: controlling an SIM card of the terminal to be in an unavailable state, closing an application program running in the terminal, forbidding to use a data transmission function of the terminal, and forbidding to read and write data stored in the terminal;
before the step of monitoring the operation state of the terminal, the method comprises the following steps:
after the terminal is started, acquiring first identity information of a first user, and verifying whether the first user has the use authority of the SIM card according to the first identity information;
monitoring the operation state of the terminal when the first user is verified to have the use right of the SIM card, and starting the freezing function of the terminal when the first user is verified not to have the use right of the SIM card;
receiving a unfreezing request, collecting second identity information of a second user, and determining whether to close the freezing function of the terminal according to the second identity information.
2. The terminal control method according to claim 1, wherein the preset condition comprises one or a combination of the following: and when the consumption of the flow is larger than a preset threshold value within a preset time, virus invasion occurs, and the read-write file is abnormal.
3. The terminal control method according to claim 1, further comprising:
judging whether the current verification times for verifying that the first user does not have the use authority of the SIM card are greater than preset times or not;
and if the current verification times are greater than the preset times, starting the freezing function.
4. A terminal control apparatus, comprising:
the monitoring unit is used for monitoring the running state of the terminal;
a first control unit, configured to start a freezing function of the terminal when the operating state of the terminal satisfies a preset condition, where the freezing function includes one or a combination of the following: controlling an SIM card of the terminal to be in an unavailable state, closing an application program running in the terminal, forbidding to use a data transmission function of the terminal, and forbidding to read and write data stored in the terminal;
the verification unit is used for acquiring first identity information of a first user after the terminal is started, and verifying whether the first user has the use authority of the SIM card according to the first identity information;
a second control unit, configured to monitor the operating status of the terminal when it is verified that the first user has the usage right of the SIM card, and start the freezing function of the terminal when it is verified that the first user does not have the usage right of the SIM card;
and the unfreezing unit is used for receiving the unfreezing request, acquiring second identity information of a second user, and determining whether to close the freezing function of the terminal according to the second identity information.
5. The terminal control device according to claim 4, wherein the preset condition comprises one or a combination of the following: and when the consumption of the flow is larger than a preset threshold value within a preset time, virus invasion occurs, and the read-write file is abnormal.
6. The terminal control device according to claim 4, further comprising:
the judging unit is used for judging whether the current verification times for verifying that the first user does not have the use authority of the SIM card is greater than the preset times or not;
the second control unit is specifically configured to start the freezing function if the current verification number is greater than the preset number.
7. A terminal, comprising: the terminal control device according to any one of claims 4 to 6.
CN201610182517.6A 2016-03-28 2016-03-28 Terminal control method, terminal control device and terminal Active CN105873028B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610182517.6A CN105873028B (en) 2016-03-28 2016-03-28 Terminal control method, terminal control device and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610182517.6A CN105873028B (en) 2016-03-28 2016-03-28 Terminal control method, terminal control device and terminal

Publications (2)

Publication Number Publication Date
CN105873028A CN105873028A (en) 2016-08-17
CN105873028B true CN105873028B (en) 2020-05-19

Family

ID=56626165

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610182517.6A Active CN105873028B (en) 2016-03-28 2016-03-28 Terminal control method, terminal control device and terminal

Country Status (1)

Country Link
CN (1) CN105873028B (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106325993A (en) * 2016-08-22 2017-01-11 宇龙计算机通信科技(深圳)有限公司 Freezing method of application program and terminal
CN106339630B (en) * 2016-08-24 2019-06-11 宇龙计算机通信科技(深圳)有限公司 A kind of method, apparatus and terminal for freezing application
CN106572523B (en) * 2016-10-31 2022-04-19 宇龙计算机通信科技(深圳)有限公司 Application program operation control method, device and terminal
CN106599641A (en) * 2016-12-13 2017-04-26 广东欧珀移动通信有限公司 A method, device and terminal for restricting terminal locking
CN106709369A (en) * 2016-12-26 2017-05-24 宇龙计算机通信科技(深圳)有限公司 Data processing method and data processing apparatus for terminal exception
CN107392013A (en) * 2017-06-12 2017-11-24 努比亚技术有限公司 A kind of terminal safety protection method, terminal and computer-readable recording medium
CN107621977B (en) * 2017-09-28 2021-06-18 努比亚技术有限公司 Application control method, terminal and computer readable storage medium
CN107704737A (en) * 2017-10-25 2018-02-16 维沃移动通信有限公司 Method, apparatus, mobile terminal and the computer-readable recording medium of safety verification
CN111163215A (en) * 2019-12-11 2020-05-15 上海传英信息技术有限公司 Application running method, terminal and computer-readable storage medium
CN111147662A (en) * 2019-12-11 2020-05-12 上海传英信息技术有限公司 Terminal locking method, terminal and computer readable storage medium
CN114780282A (en) * 2022-05-30 2022-07-22 林金娜 A computer security protection system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1912453A2 (en) * 2006-10-13 2008-04-16 Samsung Electronics Co., Ltd. Apparatus and method for managing tool kit menu of portable terminal in roaming condition
CN101252703A (en) * 2008-03-28 2008-08-27 宇龙计算机通信科技(深圳)有限公司 Terminal data protecting method, system as well as mobile communication terminal
CN101489228A (en) * 2008-01-15 2009-07-22 孙大奎 Data protection apparatus for portable wireless communication product
CN101588578A (en) * 2008-05-23 2009-11-25 捷德(中国)信息科技有限公司 Attack test method and device
CN103634268A (en) * 2012-08-20 2014-03-12 中国联合网络通信集团有限公司 A safety control method and an apparatus
CN104135561A (en) * 2013-07-08 2014-11-05 腾讯科技(深圳)有限公司 Method and device of reminding user of flow of terminal as well as terminal
CN104580744A (en) * 2015-01-29 2015-04-29 深圳酷派技术有限公司 Terminal and control method and device thereof

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1912453A2 (en) * 2006-10-13 2008-04-16 Samsung Electronics Co., Ltd. Apparatus and method for managing tool kit menu of portable terminal in roaming condition
CN101489228A (en) * 2008-01-15 2009-07-22 孙大奎 Data protection apparatus for portable wireless communication product
CN101252703A (en) * 2008-03-28 2008-08-27 宇龙计算机通信科技(深圳)有限公司 Terminal data protecting method, system as well as mobile communication terminal
CN101588578A (en) * 2008-05-23 2009-11-25 捷德(中国)信息科技有限公司 Attack test method and device
CN103634268A (en) * 2012-08-20 2014-03-12 中国联合网络通信集团有限公司 A safety control method and an apparatus
CN104135561A (en) * 2013-07-08 2014-11-05 腾讯科技(深圳)有限公司 Method and device of reminding user of flow of terminal as well as terminal
CN104580744A (en) * 2015-01-29 2015-04-29 深圳酷派技术有限公司 Terminal and control method and device thereof

Also Published As

Publication number Publication date
CN105873028A (en) 2016-08-17

Similar Documents

Publication Publication Date Title
CN105873028B (en) Terminal control method, terminal control device and terminal
US9143922B2 (en) Method and system for controlling communication between an UICC and an external application
CN104767713B (en) Account binding method, server and system
US20150050913A1 (en) Method and device for preventing recording during a conversation
JP2015092374A5 (en)
EP1884132A2 (en) Apparatus and methods for protecting data on a wireless device
CN111835689A (en) Identity authentication method, terminal device and medium of digital key
WO2013184799A1 (en) Evaluating whether to block or allow installation of a software application
CN109446234B (en) Data processing method, device and electronic device
CN107852603B (en) Method and device for terminal authentication
EP2829996A1 (en) Authentication method, authentication apparatus and authentication device
CN107277878A (en) Network switching method, device and mobile terminal
Yu et al. Remotely wiping sensitive data on stolen smartphones
US20250016551A1 (en) System and method for temporary provisioning of esim profile on a secondary device
CN104185161B (en) Universal embedded integrated circuit card, the switching method of user signing contract information and system
KR101416717B1 (en) System for preventing malicious intrusion based on smart device and method thereof
CN106484796A (en) File management method, document management apparatus and mobile terminal
CN102387494A (en) Android-mobile-platform-based remote automatic information exchange and control solution
US10412585B2 (en) User identity authentication method and device
KR20160096646A (en) Method and device for managing blacklist
CN107070878B (en) System and method for virus isolation of monitored application
CN107153790A (en) Mobile terminal safety means of defence, device and mobile terminal
CN106454776B (en) Pseudo base station protection method and device
KR102279293B1 (en) Method and apparatus for detecting null-ciphering channels
KR101915718B1 (en) PS-LTE terminal device and PS-LTE communication network security method and system thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20250704

Address after: 528000 Guangdong Province Foshan City Shunde District Ronggui Street Rongbian Community Tianhe Industrial Avenue No. 1 Third Floor D342 (Residential Registration)

Patentee after: Foshan Tongxin Technology Co.,Ltd.

Country or region after: China

Address before: 518040 Guangdong city in Shenzhen Province, Che Kung Temple Tian An Digital City, the innovation and Technology Square, B Building 8 floor

Patentee before: YULONG COMPUTER TELECOMMUNICATION SCIENTIFIC (SHENZHEN) Co.,Ltd.

Country or region before: China