CN107819752B - File protection method, mobile terminal and computer readable storage medium - Google Patents
File protection method, mobile terminal and computer readable storage medium Download PDFInfo
- Publication number
- CN107819752B CN107819752B CN201711038213.3A CN201711038213A CN107819752B CN 107819752 B CN107819752 B CN 107819752B CN 201711038213 A CN201711038213 A CN 201711038213A CN 107819752 B CN107819752 B CN 107819752B
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- target
- mailbox account
- identifying
- target file
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Information Transfer Between Computers (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention provides a file protection method and a mobile terminal, wherein the method comprises the following steps: monitoring a mailbox account bound by the mobile terminal; if the mailbox account receives a preset instruction, identifying a target file stored by the mobile terminal; and locking the target file to prohibit output, reporting the target file to a cloud server associated with the mobile terminal, and destroying the target file. Therefore, the mobile terminal can upload the file information to the cloud server when the file information is lost and destroy the file information when the file information is uploaded, so that the leakage of the file information is avoided, and the protection effect on the file information is better.
Description
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a file protection method and a mobile terminal.
Background
With the development of mobile terminal technology, mobile terminals are becoming more and more an inseparable part of people's lives, bringing a lot of convenience to people, such as working, taking pictures or chatting by using the mobile terminals; along with this, these behaviors may generate or store some relevant data or information in the mobile terminal, and the data or information may relate to important information such as trade secret, personal privacy, etc. When a mobile terminal is lost, it is highly likely that such information is leaked, thereby causing a great loss to the user. In contrast, existing mobile terminals are generally provided with a screen locking mechanism to prevent someone other than the owner of the mobile terminal from stealing file information; although the method can protect the file information from being stolen to a certain extent, the mobile terminal is still in a lost state, so that the mobile terminal can be cracked at any time, and the file information can be leaked at any time. Therefore, the protection effect of the current mobile terminal on the file information is poor.
Disclosure of Invention
The embodiment of the invention provides a file protection method and a mobile terminal, and aims to solve the problem that the protection effect of the existing mobile terminal on file information is poor.
In order to solve the technical problem, the invention is realized as follows: a file protection method, comprising: monitoring a mailbox account bound by the mobile terminal; if the mailbox account receives a preset instruction, identifying a target file stored by the mobile terminal; and locking the target file to prohibit output, reporting the target file to a cloud server associated with the mobile terminal, and destroying the target file.
In a first aspect, an embodiment of the present invention provides a file protection method, including:
monitoring a mailbox account bound by the mobile terminal;
if the mailbox account receives a preset instruction, identifying a target file stored by the mobile terminal;
and locking the target file to prohibit output, reporting the target file to a cloud server associated with the mobile terminal, and destroying the target file.
In a second aspect, an embodiment of the present invention further provides a mobile terminal, including:
the monitoring module is used for monitoring the mailbox account bound by the mobile terminal;
the identification module is used for identifying a target file stored by the mobile terminal if the mailbox account receives a preset instruction;
and the locking module is used for locking the target file to prohibit output, reporting the target file to a cloud server associated with the mobile terminal, and destroying the target file.
In a third aspect, an embodiment of the present invention further provides a mobile terminal, including a processor, a memory, and a computer program stored on the memory and operable on the processor, where the computer program, when executed by the processor, implements the steps of the file protection method.
In a fourth aspect, an embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements the steps of the file protection method.
Thus, in the embodiment of the invention, the mailbox account bound by the mobile terminal is monitored; if the mailbox account receives a preset instruction, identifying a target file stored by the mobile terminal; locking the target file to prohibit output, reporting the target file to a cloud server associated with the mobile terminal, and destroying the target file; the mobile terminal can upload the file information to the cloud server when the file information is lost and destroy the file information when the file information is uploaded, so that the leakage of the file information is avoided, and the protection effect on the file information is better.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments of the present invention will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without inventive exercise.
Fig. 1 is a flowchart of a file protection method according to an embodiment of the present invention;
FIG. 2 is a flow chart of another file protection method provided by the embodiment of the invention;
FIG. 3 is a flow chart of another file protection method provided by the embodiment of the invention;
FIG. 4 is a flowchart of another file protection method provided by an embodiment of the present invention;
fig. 5 is a block diagram of a mobile terminal according to an embodiment of the present invention;
fig. 6 is a structural diagram of an identification module of a mobile terminal according to an embodiment of the present invention;
fig. 7 is a block diagram of an identification module of another mobile terminal according to an embodiment of the present invention;
fig. 8 is a block diagram of another mobile terminal according to an embodiment of the present invention;
fig. 9 is a block diagram of another mobile terminal according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, fig. 1 is a flowchart of a file protection method according to an embodiment of the present invention, and as shown in fig. 1, the method includes the following steps:
The mailbox account bound by the mobile terminal can be understood as an account of a mailbox which is set by a user and is associated with the mobile terminal; the monitoring of the mailbox account bound to the mobile terminal can be understood as that the mailbox associated with the mailbox account is monitored.
The preset instruction is sent through the mailbox account, so that the mobile terminal can be hidden, the application range is wider, even if the mobile terminal cannot be equipped with the SIM card or the SIM card is taken out, the preset instruction can be received through the network, the probability that the mobile terminal can receive the preset instruction is improved, and the probability that the file information lost by a user is retrieved is improved.
In addition, a background running program can be arranged on the mobile terminal to perform real-time monitoring. The relevant parameters of the program can be set on a setting interface of the mobile terminal, for example, a locking instruction, an uploading instruction, a destroying instruction and the like can be set on the setting interface; in addition, before setting the parameters of the program, the security password may be required to be input, specifically, the security password may be a fingerprint password input through a fingerprint identification module, or a security password composed of any number of digits. Therefore, monitoring is carried out through the background running program, and the user can conveniently carry out corresponding adjustment according to own habits.
And 102, identifying a target file stored by the mobile terminal if the mailbox account receives a preset instruction.
If the mailbox account receives a preset instruction, the judgment can be made as to whether the mailbox associated with the mailbox account receives the preset instruction.
The preset instruction can be understood as an instruction preset by a user and used for instructing the mobile terminal to lock, upload, destroy and the like the target file; specifically, the text information may be text information carrying some specific fields, for example, a text segment of "666 SD SC XH" preset by the user through the mobile terminal is a preset instruction, and as long as the mobile terminal receives the text segment of "666 SD SC XH" through a mailbox associated with the mailbox account, the target file stored by the mobile terminal may be identified. Of course, other character information, for example, "upload all files", "delete all files", etc., may be used, as long as the operation corresponding to the character information is set in advance.
In addition, the target file stored in the mobile terminal may be understood as a file stored in the mobile terminal and having a corresponding relationship with the preset instruction, and the files corresponding to the preset instruction are usually set in advance for the user, and the files may be files classified according to a certain logic rule; for example, if the preset instruction is set to "666 SD SC XHPHOTO", the mobile terminal recognizes all files classified as pictures on the mobile terminal after monitoring that the mailbox account receives "666 SD SC XH PHOTO".
And 103, locking the target file to prohibit output, reporting the target file to a cloud server associated with the mobile terminal, and destroying the target file.
The target file is locked, which can be understood as that the mobile terminal locks the identified target file; the output inhibition can be understood as that the target file locked by the mobile terminal cannot be displayed or played; for example, if the identified target file is a sound recording file on the mobile terminal, the sound recording file is hidden, and the sound recording file is prohibited from being played; therefore, the illegal owner of the mobile terminal can be prevented from viewing files which the user wants to protect or retrieve when the mobile terminal uploads and backs up the target files, and the protection effect of the mobile terminal on the file information is higher.
In addition, the cloud server associated with the mobile terminal can be a cloud server which is preset by a user and is bound with the mobile terminal, and the mobile terminal can have authority to log in the bound cloud server. For example, the mobile terminal is provided with a cloud server including a network disk a and a cloud disk B, the network disk a is bound with the mobile terminal by a user, the network disk a is the cloud server associated with the mobile terminal, the mobile terminal is authorized to log in the network disk a at the moment, the cloud disk B is still in a normal use mode, and the mobile terminal does not have permission to log in the cloud disk B.
The reporting of the target file and the destruction of the target file can be understood as that the mobile terminal uploads the target file to the cloud server and executes the operation of deleting the target file when the target file is uploaded; so that the user can retrieve the desired file.
The target file may be all files stored by the mobile terminal, or may also be a part of files stored by the mobile terminal; the partial files can be marked or classified files stored in the mobile terminal, such as files marked as private files; or the partial file may also be a partial file specified by the preset instruction.
In an embodiment of the present invention, the Mobile terminal may be a Mobile phone, a Tablet personal Computer (Tablet personal Computer), a Laptop Computer (Laptop Computer), a Personal Digital Assistant (PDA), a Mobile Internet Device (MID), a Wearable Device (Wearable Device), or the like.
In this way, in the embodiment of the present invention, the mailbox account bound to the mobile terminal is monitored; if the mailbox account receives a preset instruction, identifying a target file stored by the mobile terminal; and locking the target file to prohibit output, reporting the target file to a cloud server associated with the mobile terminal, and destroying the target file. The mobile terminal can upload the file information to the cloud server when the file information is lost and destroy the file information when the file information is uploaded, so that the leakage of the file information is avoided, and the protection effect on the file information is better.
Referring to fig. 2, fig. 2 is a flowchart of another file protection method according to an embodiment of the present invention. The main difference between this embodiment and the previous embodiment is that, if the mailbox account receives a preset instruction, the present embodiment identifies a pre-specified target file stored in the mobile terminal. As shown in fig. 2, the method comprises the following steps:
The related description of step 201 has been set forth in detail in the previous embodiment, and will not be repeated.
The pre-designated target file stored in the mobile terminal may be understood as a file pre-selected or designated by the mobile terminal when the mobile terminal is not lost, for example, a file marked by a user may be used, specifically, the user marks a text document with a certain secret as an important file, and simultaneously marks several private photos as the important file, so that after receiving a preset instruction, the mobile terminal locks, uploads and destroys all files marked as the important files in advance.
It should be noted that step 202 is optional, for example: step 202 may be replaced by identifying a target field included in a preset instruction and identifying a target file stored by the mobile terminal and corresponding to the target field if the mailbox account receives the preset instruction.
The target field may be a field corresponding to some specific files, which is set in advance for the mobile terminal. For example, if the preset instruction is "666 delete pictures", then "pictures" are the target fields, and the "pictures" field corresponds to all files classified as pictures on the mobile terminal.
Therefore, the file information on the mobile terminal can be protected more efficiently and more specifically.
And 203, locking the target file to prohibit output, reporting the target file to a cloud server associated with the mobile terminal, and destroying the target file.
The related description of step 203 has been set forth in detail in the above embodiment, and will not be repeated.
In an embodiment of the present invention, the Mobile terminal may be a Mobile phone, a Tablet personal Computer (Tablet personal Computer), a Laptop Computer (Laptop Computer), a Personal Digital Assistant (PDA), a Mobile Internet Device (MID), a Wearable Device (Wearable Device), or the like.
In this way, in the embodiment of the present invention, the mailbox account bound to the mobile terminal is monitored; if the mailbox account receives a preset instruction, identifying a target file stored by the mobile terminal; and locking the target file to prohibit output, reporting the target file to a cloud server associated with the mobile terminal, and destroying the target file. The mobile terminal can upload specific file information to the cloud server when the file information is lost, and destroy the file information after uploading is finished, so that leakage of the file information is avoided, and the file information is better protected.
Referring to fig. 3, fig. 3 is a flowchart of another file protection method according to an embodiment of the present invention. The main difference between this embodiment and the previous embodiment is that if the mailbox account receives a preset instruction, the target mailbox account that sends the preset instruction is identified; and judging whether the target mailbox account is a mailbox account predetermined by the mobile terminal. As shown in fig. 3, the method comprises the following steps:
and 301, monitoring the mailbox account bound by the mobile terminal.
The related description of step 301 is already described in detail in the first embodiment, and will not be repeated here.
Since any mailbox account can send the preset instruction, there is a risk that an illegal owner of the mobile terminal maliciously sends the preset instruction through any mailbox account under the condition that the illegal owner knows the preset instruction, and therefore whether a target mailbox account sending the preset instruction is a mailbox account designated by a user needs to be identified.
And step 303, judging whether the target mailbox account is a mailbox account predetermined by the mobile terminal.
The predetermined mailbox account number of the mobile terminal may be an account number set by the user according to own habits or requirements, for example, the user has a plurality of mailbox account numbers, and the standby mailbox account number of the mailbox account numbers may be set as the predetermined mailbox account number of the mobile terminal. Step 303 can be said to correspond to verifying the identity of the sender of the preset instruction.
It should be noted that if the target mailbox account is not the predetermined mailbox account of the mobile terminal, the determination may be continued, or the process may be ended, and fig. 3 in the implementation of the present invention is exemplified by ending the process.
And 304, identifying a target file stored by the mobile terminal if the target mailbox account is a mailbox account predetermined by the mobile terminal.
Step 304 represents that only if the mailbox account sending the preset instruction is identified as the mailbox account predetermined by the mobile terminal, the subsequent operation will be executed.
For example, a mobile phone of B is stolen by a first, the first and the second send a mail carrying a preset instruction to a mailbox bound by a mobile phone of B through an a mailbox and a B mailbox respectively, and B designates the B mailbox as a mailbox capable of enabling the instruction to take effect before the first, so that the preset instruction sent by any mailbox except the B mailbox cannot take effect, that is, the preset instruction maliciously sent by the stealer through the a mailbox is invalid.
And 305, locking the target file to prohibit output, reporting the target file to a cloud server associated with the mobile terminal, and destroying the target file.
The related description of step 305 has been set forth in detail in the first embodiment, and will not be repeated.
In an embodiment of the present invention, the Mobile terminal may be a Mobile phone, a Tablet personal Computer (Tablet personal Computer), a Laptop Computer (Laptop Computer), a Personal Digital Assistant (PDA), a Mobile Internet Device (MID), a Wearable Device (Wearable Device), or the like.
In this way, in the embodiment of the present invention, the mailbox account bound to the mobile terminal is monitored; if the mailbox account receives a preset instruction, identifying a target mailbox account which sends the preset instruction; judging whether the target mailbox account is a mailbox account predetermined by the mobile terminal; if the target mailbox account is a mailbox account predetermined by the mobile terminal, identifying a target file stored by the mobile terminal; and locking the target file to prohibit output, reporting the target file to a cloud server associated with the mobile terminal, and destroying the target file. The mobile terminal can upload specific file information to the cloud server when the file information is lost, and destroy the file information after uploading is finished, so that leakage of the file information is avoided, and the file information is better protected; and only if the mailbox account number for sending the preset instruction is identified to be the predetermined mailbox account number of the mobile terminal, the subsequent operation can be executed, so that the protection of the file information can be further improved.
Referring to fig. 4, fig. 4 is a flowchart of another file protection method according to an embodiment of the present invention. The main difference between this embodiment and the previous embodiment is that if the mailbox account receives a preset instruction, the target mailbox account that sends the preset instruction is identified; and judging whether the target mailbox account is a mailbox account predetermined by the mobile terminal. As shown in fig. 4, the method comprises the following steps:
The related description of step 401 has already been set forth in detail in the first embodiment, and will not be repeated here.
The location information may be global positioning system location information of the mobile terminal.
And step 403, judging whether the position information is a resident position recorded by the mobile terminal.
The resident position can be understood as a position where the mobile terminal stays for a long time and appears frequently; such as home and business, etc.
It should be noted that if the location information is a resident location recorded by the mobile terminal, the determination may be continued or the process may be ended, and fig. 4 in the implementation of the present invention exemplifies that the process is ended.
Optionally, after the step of determining whether the location information is a resident location recorded by the mobile terminal, the method further includes:
if the position information is a resident position recorded by the mobile terminal, initiating a call request to a target terminal pre-bound by the mobile terminal, and if a call connection is established with the target terminal, sending voice including the position information to the target terminal; or,
and if the position information is the resident position recorded by the mobile terminal, sending a short message to a target terminal bound in advance by the mobile terminal, wherein the short message comprises the position information.
Since the mobile terminal is usually in a relatively secure environment, such as a home, a classroom, etc., when it is in a resident location, there is a possibility that the mobile terminal may be directly retrieved in a short time, and sometimes the owner cannot remember the location of the mobile terminal, when the mobile terminal is in such a relatively secure environment, the mobile terminal may be directly retrieved by sending location information to the owner, which is also the most direct and effective way to protect file information.
For example, the xiaoming forgets the mobile phone in a classroom where people often attend a class carelessly, finds that the mobile phone is invisible after class, and immediately sends a preset instruction to the mobile phone of the xiaoming, and the xiaoming mobile phone is in a resident position, so that the xiaoming mobile phone dials the mobile phone of the xiaoming roommate and sends voice with information of the position where the xiaoming mobile phone is located, and then the xiaoming mobile phone can directly retrieve the mobile phone according to the voice.
Therefore, the file information of the mobile terminal can be protected more intelligently, directly and effectively.
And step 404, if the position information is not the resident position recorded by the mobile terminal, identifying a target file stored by the mobile terminal.
Because the owner of the mobile terminal carelessly forgets the mobile terminal to a safe environment at a certain place instead of the situation of real loss or theft, when the mobile terminal is located at a resident position, the mobile terminal is very likely to be in a safe and temporary forgetting situation, and the situation can be directly found back; if the mobile terminal is not located at the resident position, the mobile terminal is likely to be stolen or lost, and in such a case, the file information is easily leaked, so that if the location information is not the resident position recorded by the mobile terminal, the subsequent operation is performed.
For example, one day before Xiaoming, people drink more at night, people throw the mobile phone at home disorderly, and when the mobile phone wakes up the next day, the Xiaoming finds that the mobile phone is invisible, actually, the mobile phone is not really lost, only the Xiaoming forgets temporarily, the Xiaoming beats a brain bag, thinks that the mobile phone is dropped at a sandy place in the home, and because the resident position is at home, the file information does not need to be protected under the condition. However, if a user drinks more in the evening before xiaoming, and forgets to leave the mobile phone in a strange bar, after the user goes home, the user who happens to be in a bar picks up the xiaoming mobile phone and is based on the fact that the user is owned, and the bar does not belong to a resident position, the risk of losing file information is high, and the file information needs to be protected.
And 405, locking the target file to prohibit output, reporting the target file to a cloud server associated with the mobile terminal, and destroying the target file.
The related description of step 405 has already been set forth in detail in the first embodiment, and will not be repeated here.
In an embodiment of the present invention, the Mobile terminal may be a Mobile phone, a Tablet personal Computer (Tablet personal Computer), a Laptop Computer (Laptop Computer), a Personal Digital Assistant (PDA), a Mobile Internet Device (MID), a Wearable Device (Wearable Device), or the like.
In this way, in the embodiment of the present invention, the mailbox account bound to the mobile terminal is monitored; if the mailbox account receives a preset instruction, identifying the position information of the mobile terminal; judging whether the position information is a resident position recorded by the mobile terminal; if the position information is not the resident position recorded by the mobile terminal, identifying a target file stored by the mobile terminal; and locking the target file to prohibit output, reporting the target file to a cloud server associated with the mobile terminal, and destroying the target file. The mobile terminal can upload specific file information to the cloud server when the file information is lost, and destroy the file information after uploading is finished, so that leakage of the file information is avoided, and the file information is better protected; moreover, file information on the mobile terminal can be protected more flexibly and intelligently.
Referring to fig. 5, fig. 5 is a block diagram of a mobile terminal according to an embodiment of the present invention, as shown in fig. 3, a mobile terminal 500 includes a monitoring module 501, an identification module 502, and a locking module 503; wherein:
and the monitoring module 501 is configured to monitor the mailbox account bound to the mobile terminal.
An identifying module 502, configured to identify a target file stored by the mobile terminal if the mailbox account receives a preset instruction.
A locking module 503, configured to lock the target file to prohibit output, report the target file to a cloud server associated with the mobile terminal, and destroy the target file.
Optionally, the identifying module 502 is configured to identify a pre-specified target file stored in the mobile terminal;
or, the identifying module 502 is configured to identify a target field included in the preset instruction, and identify a target file stored in the mobile terminal and corresponding to the target field.
Optionally, as shown in fig. 6, the identifying module 502 includes:
the first identification unit 5021 is configured to identify a target mailbox account which sends a preset instruction if the mailbox account receives the preset instruction.
A first determining unit 5022, configured to determine whether the target mailbox account is a mailbox account predetermined by the mobile terminal.
A second identifying unit 5023, configured to identify a target file stored in the mobile terminal if the target mailbox account is a mailbox account predetermined by the mobile terminal.
Optionally, as shown in fig. 7, the identifying module 502 includes:
a third identification unit 5024, configured to identify location information of the mobile terminal if the mailbox account receives a preset instruction;
a second determining unit 5025, configured to determine whether the location information is a resident location recorded by the mobile terminal;
a fourth identifying unit 5026, configured to identify a target file stored in the mobile terminal if the location information is not a resident location recorded by the mobile terminal.
Optionally, as shown in fig. 8, the mobile terminal further includes:
a first sending module 504, configured to initiate a call request to a target terminal pre-bound to the mobile terminal if the location information is a resident location recorded by the mobile terminal, and send a voice including the location information to the target terminal if a call connection is established with the target terminal; or,
a second sending module 505, configured to send a short message to a target terminal pre-bound to the mobile terminal if the location information is a resident location recorded by the mobile terminal, where the short message includes the location information.
The mobile terminal 500 can implement each process implemented by the mobile terminal in the method embodiments of fig. 1 to fig. 4, and is not described herein again to avoid repetition.
The mobile terminal 500 of the embodiment of the invention can upload the file information to the cloud server when the file information is lost, and destroy the file information when the file information is uploaded, so that the leakage of the file information is avoided, and the protection effect on the file information is better.
Figure 9 is a schematic diagram of a hardware configuration of a mobile terminal implementing various embodiments of the present invention,
the mobile terminal 900 includes, but is not limited to: a radio frequency unit 901, a network module 902, an audio output unit 903, an input unit 904, a sensor 905, a display unit 906, a user input unit 907, an interface unit 908, a memory 909, a processor 910, and a power supply 911. Those skilled in the art will appreciate that the mobile terminal architecture shown in fig. 9 is not intended to be limiting of mobile terminals, and that a mobile terminal may include more or fewer components than shown, or some components may be combined, or a different arrangement of components. In the embodiment of the present invention, the mobile terminal includes, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted terminal, a wearable device, a pedometer, and the like.
The processor 910 is configured to monitor a mailbox account bound to the mobile terminal; if the mailbox account receives a preset instruction, identifying a target file stored by the mobile terminal; and locking the target file to prohibit output, reporting the target file to a cloud server associated with the mobile terminal, and destroying the target file.
Optionally, the identifying the target file stored by the mobile terminal, performed by the processor 910, includes:
identifying a pre-designated target file stored by the mobile terminal; or,
and identifying a target field contained in the preset instruction, and identifying a target file stored by the mobile terminal and corresponding to the target field.
Optionally, the identifying, performed by the processor 910, the target file stored by the mobile terminal if the mailbox account receives a preset instruction includes:
if the mailbox account receives a preset instruction, identifying a target mailbox account which sends the preset instruction;
judging whether the target mailbox account is a mailbox account predetermined by the mobile terminal;
and if the target mailbox account is a predetermined mailbox account of the mobile terminal, identifying a target file stored by the mobile terminal.
Optionally, the identifying, performed by the processor 910, the target file stored by the mobile terminal if the mailbox account receives a preset instruction includes:
if the mailbox account receives a preset instruction, identifying the position information of the mobile terminal;
judging whether the position information is a resident position recorded by the mobile terminal;
and if the position information is not the resident position recorded by the mobile terminal, identifying the target file stored by the mobile terminal.
Optionally, the processor 910 is further configured to initiate a call request to a target terminal pre-bound to the mobile terminal if the location information is a resident location recorded by the mobile terminal, and send a voice including the location information to the target terminal if a call connection is established with the target terminal; or,
and if the position information is the resident position recorded by the mobile terminal, sending a short message to a target terminal bound in advance by the mobile terminal, wherein the short message comprises the position information.
The mobile terminal 900 can implement the processes implemented by the mobile terminal in the foregoing embodiments, and in order to avoid repetition, the details are not described here.
Thus, the mobile terminal 900 according to the embodiment of the present invention can upload the file information to the cloud server when the file information is lost, and destroy the file information when the file information is uploaded, so that leakage of the file information is avoided, and the file information is protected better.
It should be understood that, in the embodiment of the present invention, the radio frequency unit 901 may be used for receiving and sending signals during a message transmission and reception process or a call process, and specifically, after receiving downlink data from a base station, the downlink data is processed by the processor 910; in addition, the uplink data is transmitted to the base station. Generally, the radio frequency unit 901 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 901 can also communicate with a network and other devices through a wireless communication system.
The mobile terminal provides the user with wireless broadband internet access via the network module 902, such as helping the user send and receive e-mails, browse web pages, and access streaming media.
The audio output unit 903 may convert audio data received by the radio frequency unit 901 or the network module 902 or stored in the memory 909 into an audio signal and output as sound. Also, the audio output unit 903 may also provide audio output related to a specific function performed by the mobile terminal 900 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 903 includes a speaker, a buzzer, a receiver, and the like.
The input unit 904 is used to receive audio or video signals. The input Unit 904 may include a Graphics Processing Unit (GPU) 9041 and a microphone 9042, and the Graphics processor 9041 processes image data of a still picture or video obtained by an image capturing device (such as a camera) in a video capture mode or an image capture mode. The processed image frames may be displayed on the display unit 906. The image frames processed by the graphic processor 9041 may be stored in the memory 909 (or other storage medium) or transmitted via the radio frequency unit 901 or the network module 902. The microphone 9042 can receive sounds and can process such sounds into audio data. The processed audio data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 901 in case of the phone call mode.
The mobile terminal 900 also includes at least one sensor 905, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor that can adjust the brightness of the display panel 9061 according to the brightness of ambient light, and a proximity sensor that can turn off the display panel 9061 and/or backlight when the mobile terminal 900 is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally three axes), detect the magnitude and direction of gravity when stationary, and can be used to identify the posture of the mobile terminal (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), and vibration identification related functions (such as pedometer, tapping); the sensors 905 may also include a fingerprint sensor, a pressure sensor, an iris sensor, a molecular sensor, a gyroscope, a barometer, a hygrometer, a thermometer, an infrared sensor, etc., which are not described in detail herein.
The display unit 906 is used to display information input by the user or information provided to the user. The Display unit 906 may include a Display panel 9061, and the Display panel 9061 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 907 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the mobile terminal. Specifically, the user input unit 907 includes a touch panel 9071 and other input devices 9072. The touch panel 9071, also referred to as a touch screen, may collect touch operations by a user on or near the touch panel 9071 (e.g., operations by a user on or near the touch panel 9071 using a finger, a stylus, or any other suitable object or accessory). The touch panel 9071 may include two parts, a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 910, receives a command from the processor 910, and executes the command. In addition, the touch panel 9071 may be implemented by using various types such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. The user input unit 907 may include other input devices 9072 in addition to the touch panel 9071. Specifically, the other input devices 9072 may include, but are not limited to, a physical keyboard, function keys (such as a volume control key, a switch key, and the like), a track ball, a mouse, and a joystick, which are not described herein again.
Further, the touch panel 9071 may be overlaid on the display panel 9061, and when the touch panel 9071 detects a touch operation on or near the touch panel 9071, the touch panel is transmitted to the processor 910 to determine the type of the touch event, and then the processor 910 provides a corresponding visual output on the display panel 9061 according to the type of the touch event. Although in fig. 9, the touch panel 9071 and the display panel 9061 are two independent components to implement the input and output functions of the mobile terminal, in some embodiments, the touch panel 9071 and the display panel 9061 may be integrated to implement the input and output functions of the mobile terminal, which is not limited herein.
The interface unit 908 is an interface through which an external device is connected to the mobile terminal 900. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 908 may be used to receive input from external devices (e.g., data information, power, etc.) and transmit the received input to one or more elements within the mobile terminal 900 or may be used to transmit data between the mobile terminal 900 and external devices.
The memory 909 may be used to store software programs as well as various data. The memory 909 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 909 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid-state storage device.
The processor 910 is a control center of the mobile terminal, connects various parts of the entire mobile terminal using various interfaces and lines, and performs various functions of the mobile terminal and processes data by running or executing software programs and/or modules stored in the memory 909 and calling data stored in the memory 909, thereby performing overall monitoring of the mobile terminal. Processor 910 may include one or more processing units; preferably, the processor 910 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It is to be appreciated that the modem processor described above may not be integrated into processor 910.
The mobile terminal 900 may also include a power supply 911 (e.g., a battery) for powering the various components, and preferably, the power supply 911 is logically connected to the processor 910 through a power management system that provides power management functions to manage charging, discharging, and power consumption.
In addition, the mobile terminal 900 includes some functional modules that are not shown, and thus will not be described in detail herein.
Preferably, an embodiment of the present invention further provides a mobile terminal, including a processor 910, a memory 909, and a computer program stored in the memory 909 and capable of running on the processor 910, where the computer program, when executed by the processor 910, implements each process of the above-mentioned file protection method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not described here again.
The embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements each process of the file protection method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.
Claims (8)
1. A file protection method is applied to a mobile terminal, and is characterized by comprising the following steps:
monitoring a mailbox account bound by the mobile terminal;
if the mailbox account receives a preset instruction, identifying a target file stored by the mobile terminal;
locking the target file to prohibit output, reporting the target file to a cloud server associated with the mobile terminal, and destroying the target file;
if the mailbox account receives a preset instruction, identifying a target file stored by the mobile terminal, wherein the step comprises the following steps:
if the mailbox account receives a preset instruction, identifying the position information of the mobile terminal;
judging whether the position information is a resident position recorded by the mobile terminal;
if the position information is not the resident position recorded by the mobile terminal, identifying a target file stored by the mobile terminal;
after the step of determining whether the location information is a resident location recorded by the mobile terminal, the method further includes:
if the position information is a resident position recorded by the mobile terminal, initiating a call request to a target terminal pre-bound by the mobile terminal, and if a call connection is established with the target terminal, sending voice including the position information to the target terminal; or,
and if the position information is the resident position recorded by the mobile terminal, sending a short message to a target terminal bound in advance by the mobile terminal, wherein the short message comprises the position information.
2. The method of claim 1, wherein the identifying the target file stored by the mobile terminal comprises:
identifying a pre-designated target file stored by the mobile terminal; or,
and identifying a target field contained in the preset instruction, and identifying a target file stored by the mobile terminal and corresponding to the target field.
3. The method of claim 1, wherein the step of identifying the target file stored by the mobile terminal if the mailbox account receives a preset instruction comprises:
if the mailbox account receives a preset instruction, identifying a target mailbox account which sends the preset instruction;
judging whether the target mailbox account is a mailbox account predetermined by the mobile terminal;
and if the target mailbox account is a predetermined mailbox account of the mobile terminal, identifying a target file stored by the mobile terminal.
4. A mobile terminal, comprising:
the monitoring module is used for monitoring the mailbox account bound by the mobile terminal;
the identification module is used for identifying a target file stored by the mobile terminal if the mailbox account receives a preset instruction;
the locking module is used for locking the target file to prohibit output, reporting the target file to a cloud server associated with the mobile terminal, and destroying the target file;
the identification module comprises:
the third identification unit is used for identifying the position information of the mobile terminal if the mailbox account receives a preset instruction;
a second judging unit, configured to judge whether the location information is a resident location recorded by the mobile terminal;
a fourth identification unit, configured to identify a target file stored by the mobile terminal if the location information is not a resident location recorded by the mobile terminal;
the mobile terminal further includes:
a first sending module, configured to initiate a call request to a target terminal pre-bound by the mobile terminal if the location information is a resident location recorded by the mobile terminal, and send a voice including the location information to the target terminal if a call connection is established with the target terminal; or,
and the second sending module is used for sending a short message to a target terminal pre-bound by the mobile terminal if the position information is the resident position recorded by the mobile terminal, wherein the short message comprises the position information.
5. The mobile terminal of claim 4, wherein the identifying module is configured to identify a pre-specified target file stored in the mobile terminal; or,
the identification module is used for identifying a target field contained in the preset instruction and identifying a target file stored by the mobile terminal and corresponding to the target field.
6. The mobile terminal of claim 4, wherein the identification module comprises:
the first identification unit is used for identifying a target mailbox account sending a preset instruction if the mailbox account receives the preset instruction;
the first judgment unit is used for judging whether the target mailbox account is a mailbox account predetermined by the mobile terminal;
and the second identification unit is used for identifying the target file stored by the mobile terminal if the target mailbox account is a mailbox account predetermined by the mobile terminal.
7. A mobile terminal, comprising: memory, processor and computer program stored on the memory and executable on the processor, the processor implementing the steps in the file protection method according to any one of claims 1 to 3 when executing the computer program.
8. A computer-readable storage medium, characterized in that a computer program is stored on the computer-readable storage medium, which computer program, when being executed by a processor, carries out the steps in the file protection method according to any one of claims 1-3.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711038213.3A CN107819752B (en) | 2017-10-30 | 2017-10-30 | File protection method, mobile terminal and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711038213.3A CN107819752B (en) | 2017-10-30 | 2017-10-30 | File protection method, mobile terminal and computer readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107819752A CN107819752A (en) | 2018-03-20 |
CN107819752B true CN107819752B (en) | 2020-06-30 |
Family
ID=61603365
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711038213.3A Active CN107819752B (en) | 2017-10-30 | 2017-10-30 | File protection method, mobile terminal and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107819752B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104486482A (en) * | 2014-11-18 | 2015-04-01 | 深圳市金立通信设备有限公司 | Mobile terminal anti-theft tracking method |
CN107194291A (en) * | 2017-05-16 | 2017-09-22 | 努比亚技术有限公司 | Anti-theft method for mobile terminal, mobile terminal and computer-readable recording medium |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101132546A (en) * | 2006-08-21 | 2008-02-27 | 翟俊琳 | System and method for deleting internal memory document in notebook computer by e-mail |
US8639922B2 (en) * | 2009-06-01 | 2014-01-28 | Dhananjay S. Phatak | System, method, and apparata for secure communications using an electrical grid network |
-
2017
- 2017-10-30 CN CN201711038213.3A patent/CN107819752B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104486482A (en) * | 2014-11-18 | 2015-04-01 | 深圳市金立通信设备有限公司 | Mobile terminal anti-theft tracking method |
CN107194291A (en) * | 2017-05-16 | 2017-09-22 | 努比亚技术有限公司 | Anti-theft method for mobile terminal, mobile terminal and computer-readable recording medium |
Also Published As
Publication number | Publication date |
---|---|
CN107819752A (en) | 2018-03-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108616652B (en) | Data protection method and device, terminal and computer readable storage medium | |
CN108510022B (en) | Two-dimensional code generation and verification method and server | |
CN109918930A (en) | An information protection method and terminal device | |
CN110188524B (en) | Information encryption method, information decryption method and terminal | |
CN110990849A (en) | Encryption and decryption method for private data and terminal | |
CN110035183B (en) | Information sharing method and terminal | |
CN108280337A (en) | A kind of message protection method and mobile terminal | |
US20210385323A1 (en) | Alert task processing method, terminal, and computer-readable storage medium | |
CN109446794B (en) | A password input method and mobile terminal thereof | |
CN108710806A (en) | A terminal unlocking method, mobile terminal | |
CN108629280B (en) | Face recognition method and mobile terminal | |
CN107786739B (en) | Information acquisition method and mobile terminal | |
CN109547330B (en) | Information sharing method and device | |
CN106791176A (en) | A kind of anti-theft method for mobile terminal, device and mobile terminal | |
CN107948390A (en) | The guard method of user data and mobile terminal | |
CN108600492A (en) | A kind of unlocking screen method and terminal | |
CN109451143B (en) | Call method and mobile terminal | |
CN107491685B (en) | Face recognition method and mobile terminal | |
CN106453526A (en) | Mobile terminal and short message secrecy maintaining method and device | |
CN107819752B (en) | File protection method, mobile terminal and computer readable storage medium | |
CN110781488A (en) | Password prompting method and terminal equipment | |
CN110717163B (en) | Interaction method and terminal equipment | |
CN107577931A (en) | Access Control Method and Related Products | |
CN110032861B (en) | A method and terminal device for setting a password | |
WO2018232652A1 (en) | Mobile terminal having high privacy level and related product |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |