Nothing Special   »   [go: up one dir, main page]

CN106210272A - A kind of method preventing mobile phone malice brush machine based on ID - Google Patents

A kind of method preventing mobile phone malice brush machine based on ID Download PDF

Info

Publication number
CN106210272A
CN106210272A CN201610482897.5A CN201610482897A CN106210272A CN 106210272 A CN106210272 A CN 106210272A CN 201610482897 A CN201610482897 A CN 201610482897A CN 106210272 A CN106210272 A CN 106210272A
Authority
CN
China
Prior art keywords
check information
safety check
template
information
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610482897.5A
Other languages
Chinese (zh)
Inventor
张俤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Light Horse Network Technology Co Ltd
Original Assignee
Chengdu Light Horse Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Light Horse Network Technology Co Ltd filed Critical Chengdu Light Horse Network Technology Co Ltd
Priority to CN201610482897.5A priority Critical patent/CN106210272A/en
Publication of CN106210272A publication Critical patent/CN106210272A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
    • G06F21/126Interacting with the operating system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6281Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database at program execution time, where the protection is within the operating system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72406User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by software upgrading or downloading

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a kind of method preventing mobile phone malice brush machine based on ID, the method includes: pre-set maltilevel security check information based on ID;Set up the security template corresponding to different level of securitys;Obtain the geographical location information of mobile terminal in real time;According to acquired mobile terminal geographic position information, determine current safety template, and this mobile terminal is applied this template.According to the present invention it is possible to realize mobile phone safe that is safer and that become more meticulous management.

Description

A kind of method preventing mobile phone malice brush machine based on ID
Technical field
The present invention relates to intelligent terminal field, particularly to a kind of side preventing mobile phone malice brush machine based on ID Method.
Background technology
Along with the arrival in 4G epoch, mobile phone has become as requisite instrument in people's daily life.It meets people Many demands of voice/video phone and multimedia data service etc. whenever and wherever possible.End product function is more and more richer Rich, it is possible to meet the different demands of different geographical different user.
In mobile phone, storage has the guiding journey included for realizing the program of mobile phone bottom control function, loading mobile phone kernel Sequence, kernel, system file etc., kernel is operating system meat and potatoes, transports after being loaded into internal memory in internal memory the most always OK, the loading of related content in system file in interior nuclear control, system file then store this mobile phone various application programs and The configuration data of related application.
Brush machine is exactly a kind of behavior changing mobile phone operating system, is equivalent to load onto the windows of different editions to computer Or computer refitting system, namely brush mobile phone operating system.The brush machine the most often said is exactly with " change substituted for some figures Software version after sheet, the tinkle of bells or menu " process.Along with the appearance of various brush machine softwares, user can be changed by brush machine maintenance Kernel on mobile phone and system file.But, after this kernel is modified, amended kernel may be caused correctly not add Loading system file;After system file is modified, then corresponding systemic-function also can change therewith, thus may cause mobile phone Systemic-function can not normally use.Particularly, in some brush machine scheme, the mobile phone after brush machine may be loaded non-by malicious user The software data of official, such as, install non-pre-installed software to make profit, and after causing start, Installed System Memory is not enough, and reaction is slow;Or distort System file, causes partial function to lose efficacy, and makes system stability and safety occur abnormal, even makes the terminal cannot be the most normally opened Machine, safety is relatively low.Further, after mobile terminal is lost or be stolen, pick up taker or stealer can be by entering mobile terminal The operation such as row brush machine unlocks this mobile terminal, thus causes the private information of the owner of lost property to be revealed.
In the various schemes preventing malice brush machine proposed in prior art, it is the most all that brush secret is set by single The mode of code realizes user's verification, and once password is revealed or is easily cracked, and security performance is poor, and security management is thicker Put.
Based on this, be badly in need of a kind of can safer and become more meticulous prevent mobile phone malice brush machine method.
Summary of the invention
The technical problem to be solved is: how to realize mobile phone safe that is safer and that become more meticulous management.For This, the present invention proposes a kind of method preventing mobile phone malice brush machine based on ID, can solve due to prior art fully Restriction and one or more problems of causing of defect.
Additional advantages of the present invention, purpose and characteristic, a part will be elucidated in the following description, and another portion Divide for those of ordinary skill in the art by the investigation of description below be will be apparent from or from the enforcement of the present invention Acquire.Can realize by the structure particularly pointed out in the specification and claims of word and accompanying drawing and obtain the present invention Purpose and advantage.
The invention provides a kind of method preventing mobile phone malice brush machine based on ID, comprise the steps:
Step S101, pre-sets maltilevel security check information based on ID;Described maltilevel security check information Including the first safety check information, the second safety check information, the 3rd safety check information, the 4th safety check information and the 5th Safety check information.
Step S102, sets up the security template corresponding to different level of securitys;In the first security template, when end being detected Hold after being connected with the foundation of brush machine instrument, need the first safety check information of user is verified, be verified and can carry out Follow-up brush machine operation;In the second security template, after detecting that terminal is connected with the foundation of brush machine instrument, need user's First safety check information and the second safety check information are verified, are verified and can carry out follow-up brush machine operation;? In 3rd security template, after detecting that terminal and brush machine instrument are set up and be connected, need the first safety check information to user, Second safety check information and the 3rd safety check information are verified, are verified and can carry out follow-up brush machine operation;? In 4th security template, after detecting that terminal and brush machine instrument are set up and be connected, need the first safety check information to user, Second safety check information, the 3rd safety check information and the 4th safety check information are verified, are verified and can carry out Follow-up brush machine operation;In the 5th security template, after detecting that terminal is connected with the foundation of brush machine instrument, need user's First safety check information, the second safety check information, the 3rd safety check information, the 4th safety check information and the 5th safety Check information is verified, is verified and can carry out follow-up brush machine operation;
Step S103, obtains the geographical location information of mobile terminal in real time.
Step S104, according to acquired mobile terminal geographic position information, determines current safety template, and moves this This template of terminal applies.
Preferably, described step S103, specifically include: when mobile terminal current location and center set in advance When distance is less than first threshold D1, determine that current safety template is the first security template;When mobile terminal current location and in advance Set center distance more than first threshold D1, less than Second Threshold D2 time, determine that current safety template is the second peace Full template;When the distance of mobile terminal current location and center set in advance is more than Second Threshold D2, less than the 3rd threshold During value D3, determine that current safety template is the 3rd security template;When mobile terminal current location and center set in advance Distance more than the 3rd threshold value D3, less than four threshold values D4 time, determine that current safety template is the 4th security template;When mobile whole When the distance of end current location and center set in advance is more than four threshold values D4, determine that current safety template is the 5th peace Full template.
Preferably, described first safety check information is key information, and the second safety check information is palmprint information, the 3rd Safety check information is finger print information, and the 4th safety check information is iris information, and the 5th safety check information is acoustic information.
Preferably, described first security template, the second security template, the 3rd security template, the 4th security template, the 5th peace Full level of security corresponding to template raises successively.
Preferably, its geographical location information is obtained in real time by the GPS module of mobile terminal.
Accompanying drawing explanation
Fig. 1 is the basic procedure schematic diagram of the method according to first embodiment of the invention.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Describe wholely.Should be appreciated that specific embodiment described herein is only the exemplary embodiment of the present invention, in order to explain this Invention rather than all embodiment, be not limited to the present invention.Based on the embodiment in the present invention, ordinary skill The every other embodiment that personnel are obtained on the premise of not making creative work, broadly falls into the model of present invention protection Enclose.In the case of not conflicting, the feature in the embodiment in the present invention i.e. embodiment can mutual combination in any.
As it is shown in figure 1, be the schematic flow sheet of the method according to first embodiment of the invention, specifically can include walking as follows Rapid:
S101: pre-set maltilevel security check information based on ID.
In this step, maltilevel security check information based on ID, described maltilevel security verification letter are pre-set Breath includes the first safety check information, the second safety check information, the 3rd safety check information, the 4th safety check information and the Five safety check information.Concrete, described first safety check information is key information, and the second safety check information is palmmprint letter Breath, the 3rd safety check information is finger print information, and the 4th safety check information is iris information, and the 5th safety check information is sound Message ceases.
S102: set up the security template corresponding to different level of securitys.
In this step, the security template corresponding to different level of securitys is set up.Concrete, at described first security template In, after detecting that terminal is connected with the foundation of brush machine instrument, need the first safety check information of user is verified, checking Operate by follow-up brush machine can be carried out;In described second security template, when detecting that terminal is set up even with brush machine instrument After connecing, need the first safety check information to user and the second safety check information to verify, be verified and can carry out Follow-up brush machine operation;In described 3rd security template, after detecting that terminal and brush machine instrument are set up and be connected, needs to The first safety check information at family, the second safety check information and the 3rd safety check information are verified, being verified can Carry out follow-up brush machine operation;In described 4th security template, after detecting that terminal is connected with the foundation of brush machine instrument, need The first safety check information, the second safety check information, the 3rd safety check information and the 4th safety check information to user Verify, be verified and can carry out follow-up brush machine operation;In described 5th security template, when terminal and brush being detected Machine instrument is set up after connecting, and needs the first safety check information to user, the second safety check information, the 3rd safety check letter Breath, the 4th safety check information and the 5th safety check information are verified, are verified and can carry out follow-up brush machine operation. Corresponding to above-mentioned first security template, the second security template, the 3rd security template, the 4th security template, the 5th security template Level of security raises successively.
Above step is preset by program, it is also possible to set by User Defined, and this template can according to circumstances be entered by user Row change.
S103: obtain the geographical location information of mobile terminal in real time.
The geographical position of real time tracking mobile terminal, concrete, can be obtained in real time by the GPS module of mobile terminal Its geographical location information.
S104: according to acquired mobile terminal geographic position information, determines current safety template, and to this mobile terminal Apply this template.
According to acquired mobile terminal geographic position information, determine the security template of mobile terminal, and this is moved end End applies this template.Concrete, when the distance of mobile terminal current location and center set in advance is less than first threshold During D1, determine that current safety template is the first security template;When mobile terminal current location and center set in advance Distance more than first threshold D1, less than Second Threshold D2 time, determine that current safety template is the second security template;Work as mobile terminal The distance of current location and center set in advance more than Second Threshold D2, less than three threshold values D3 time, determine current peace Full template is the 3rd security template;When the distance of mobile terminal current location and center set in advance is more than the 3rd threshold value D3, less than four threshold values D4 time, determine that current safety template is the 4th security template;When mobile terminal current location and set in advance When the distance of fixed center is more than four threshold values D4, determine that current safety template is the 5th security template.
The flow process of method according to a second embodiment of the present invention, specifically may include steps of:
S201: pre-set maltilevel security check information based on ID.
In this step, maltilevel security check information based on ID, described maltilevel security verification letter are pre-set Breath includes the first safety check information, the second safety check information, the 3rd safety check information, the 4th safety check information and the Five safety check information.Concrete, described first safety check information is key information, and the second safety check information is palmmprint letter Breath, the 3rd safety check information is finger print information, and the 4th safety check information is iris information, and the 5th safety check information is sound Message ceases.
S202: set up the security template corresponding to different level of securitys.
In this step, the security template corresponding to different level of securitys is set up.Concrete, at described first security template In, after detecting that terminal is connected with the foundation of brush machine instrument, need the first safety check information of user is verified, checking Operate by follow-up brush machine can be carried out;In described second security template, when detecting that terminal is set up even with brush machine instrument After connecing, need the first safety check information to user and the second safety check information to verify, be verified and can carry out Follow-up brush machine operation;In described 3rd security template, after detecting that terminal and brush machine instrument are set up and be connected, needs to The first safety check information at family, the second safety check information and the 3rd safety check information are verified, being verified can Carry out follow-up brush machine operation;In described 4th security template, after detecting that terminal is connected with the foundation of brush machine instrument, need The first safety check information, the second safety check information, the 3rd safety check information and the 4th safety check information to user Verify, be verified and can carry out follow-up brush machine operation;In described 5th security template, when terminal and brush being detected Machine instrument is set up after connecting, and needs the first safety check information to user, the second safety check information, the 3rd safety check letter Breath, the 4th safety check information and the 5th safety check information are verified, are verified and can carry out follow-up brush machine operation. Corresponding to above-mentioned first security template, the second security template, the 3rd security template, the 4th security template, the 5th security template Level of security raises successively.
Above step is preset by program, it is also possible to set by User Defined, and this template can according to circumstances be entered by user Row change.
S203: obtain the associated person information of mobile terminal or default account information, according to associated person information or preset Account information determines secure relationship people.
Obtain the associated person information of mobile terminal or default account information, believe according to associated person information or default account Breath determines secure relationship people, concrete, user preassign secure relationship people's account, when the not specified secure relationship of user is acknowledged a debt Number time, it is also possible to according to mobile phone contact information, the connection of each contact person's account stored in statistics mobile phone and this mobile terminal It is frequency, determines secure relationship people according to contact frequency.Wherein, mobile phone contact account can be the mobile phone in cell phone address book Number, it is also possible to even if being communication contact people's account, such as micro-signal, No. QQ etc..
S204: when detecting that terminal is connected with the foundation of brush machine instrument, mobile terminal sends safety to this secure relationship people Template solicited message, afterwards, determines current safety template according to feedback information, and this mobile terminal is applied this template.
When detecting that mobile terminal is connected with the foundation of brush machine instrument, mobile terminal sends safe mould to this secure relationship people Plate solicited message, afterwards, determines current safety template according to receiving feedback information at secure relationship people, and this is moved end End applies this template.Concrete, described security template solicited message comprises alternative security template list information, safety Contact person sends feedback information according to the security template list carried in security template solicited message, comprises this peace in feedback information Full security template information selected by contact person.Further, when mobile terminal does not receives feedback information in the given time, stop Brush machine;When mobile terminal receives feedback information in the given time, determine current safety template according to feedback information.
The schematic flow sheet of method according to a third embodiment of the present invention, specifically may include steps of:
S301: pre-set maltilevel security check information based on ID.
In this step, maltilevel security check information based on ID, described maltilevel security verification letter are pre-set Breath includes the first safety check information, the second safety check information, the 3rd safety check information, the 4th safety check information and the Five safety check information.Concrete, described first safety check information is key information, and the second safety check information is palmmprint letter Breath, the 3rd safety check information is finger print information, and the 4th safety check information is iris information, and the 5th safety check information is sound Message ceases.
S302: set up the security template corresponding to different level of securitys.
In this step, the security template corresponding to different level of securitys is set up.Concrete, at described first security template In, after detecting that terminal is connected with the foundation of brush machine instrument, need the first safety check information of user is verified, checking Operate by follow-up brush machine can be carried out;In described second security template, when detecting that terminal is set up even with brush machine instrument After connecing, need the first safety check information to user and the second safety check information to verify, be verified and can carry out Follow-up brush machine operation;In described 3rd security template, after detecting that terminal and brush machine instrument are set up and be connected, needs to The first safety check information at family, the second safety check information and the 3rd safety check information are verified, being verified can Carry out follow-up brush machine operation;In described 4th security template, after detecting that terminal is connected with the foundation of brush machine instrument, need The first safety check information, the second safety check information, the 3rd safety check information and the 4th safety check information to user Verify, be verified and can carry out follow-up brush machine operation;In described 5th security template, when terminal and brush being detected Machine instrument is set up after connecting, and needs the first safety check information to user, the second safety check information, the 3rd safety check letter Breath, the 4th safety check information and the 5th safety check information are verified, are verified and can carry out follow-up brush machine operation. Corresponding to above-mentioned first security template, the second security template, the 3rd security template, the 4th security template, the 5th security template Level of security raises successively.
Above step is preset by program, it is also possible to set by User Defined, and this template can according to circumstances be entered by user Row change.
S303: set up the SIM card information list corresponding to different level of trusts.
Setting up the SIM card information list corresponding to different level of trusts, wherein said SIM information can be the collection of SIM Become circuit card identification code (ICCID) or international mobile subscriber identity (IMSI) information.Can add in advance and can trust SIM information, and the just described SIM information MAP that can trust is to different level of trusts, concrete, described level of trust The first level of trust, the second level of trust, the 3rd level of trust, the 4th level of trust, the 5th level of trust, its institute can be included Corresponding level of trust reduces successively.
S304: when detecting that terminal is connected with the foundation of brush machine instrument, the SIM card information of detection mobile terminal, according to institute The SIM card information of detection determines current safety template, and this mobile terminal is applied this template.
Concrete, when SIM card information being detected, or the SIM card information detected is not at described SIM information list Time middle, stop brush machine;When the level of trust that detected SIM information is corresponding is the first level of trust, determine current safety Template is the first security template;When the level of trust that detected SIM information is corresponding is the second level of trust, determine current Security template is the second security template;When the level of trust that detected SIM information is corresponding is three level of trust, determine Current safety template is the 3rd security template;When the level of trust that detected SIM information is corresponding is four level of trust, Determine that current safety template is the 4th security template;When the level of trust that detected SIM information is corresponding is the 5th level of trust Time other, determine that current safety template is the 5th security template.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment can Realizing with the hardware relevant by programmed instruction, program can store in a computer-readable storage medium, storage medium bag Include RAM, ROM, flash memory, disk or CD etc..
Above content is only presently preferred embodiments of the present invention, for those of ordinary skill in the art, according to the present invention's Thought, the most all will change, and this specification content should not be construed as the present invention Restriction.

Claims (5)

1. the method preventing mobile phone malice brush machine based on ID, comprises the steps:
Step S101, pre-sets maltilevel security check information based on ID;Described maltilevel security check information includes First safety check information, the second safety check information, the 3rd safety check information, the 4th safety check information and the 5th safety Check information;
Step S102, sets up the security template corresponding to different level of securitys;In the first security template, when detect terminal with Brush machine instrument set up connect after, need the first safety check information of user is verified, be verified can carry out follow-up Brush machine operation;In the second security template, after detecting that terminal is connected with the foundation of brush machine instrument, need to user first Safety check information and the second safety check information are verified, are verified and can carry out follow-up brush machine operation;The 3rd In security template, after detecting that terminal and brush machine instrument are set up and be connected, need the first safety check information to user, second Safety check information and the 3rd safety check information are verified, are verified and can carry out follow-up brush machine operation;The 4th In security template, after detecting that terminal and brush machine instrument are set up and be connected, need the first safety check information to user, second Safety check information, the 3rd safety check information and the 4th safety check information are verified, be verified can carry out follow-up Brush machine operation;In the 5th security template, after detecting that terminal is connected with the foundation of brush machine instrument, need to user first Safety check information, the second safety check information, the 3rd safety check information, the 4th safety check information and the 5th safety check Information is verified, is verified and can carry out follow-up brush machine operation;
Step S103, obtains the geographical location information of mobile terminal in real time;
Step S104, according to acquired mobile terminal geographic position information, determines current safety template, and to this mobile terminal Apply this template.
Method the most according to claim 1, it is characterised in that described step S103, specifically includes: when mobile terminal is current When the distance of position and center set in advance is less than first threshold D1, determine that current safety template is the first safe mould Plate;When the distance of mobile terminal current location and center set in advance is more than first threshold D1, less than Second Threshold D2 Time, determine that current safety template is the second security template;When mobile terminal current location and center set in advance away from From more than Second Threshold D2, less than three threshold values D3 time, determine that current safety template is the 3rd security template;When mobile terminal is worked as The distance of front position and center set in advance more than the 3rd threshold value D3, less than four threshold values D4 time, determine current safety Template is the 4th security template;When the distance of mobile terminal current location and center set in advance is more than the 4th threshold value D4 Time, determine that current safety template is the 5th security template.
Method the most according to claim 1, it is characterised in that described first safety check information is key information, second Safety check information is palmprint information, and the 3rd safety check information is finger print information, and the 4th safety check information is iris information, 5th safety check information is acoustic information.
Method the most according to claim 1, it is characterised in that described first security template, the second security template, the 3rd peace Full level of security corresponding to template, the 4th security template, the 5th security template raises successively.
Method the most according to claim 1, it is characterised in that obtain its ground in real time by the GPS module of mobile terminal Reason positional information.
CN201610482897.5A 2016-06-27 2016-06-27 A kind of method preventing mobile phone malice brush machine based on ID Pending CN106210272A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610482897.5A CN106210272A (en) 2016-06-27 2016-06-27 A kind of method preventing mobile phone malice brush machine based on ID

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610482897.5A CN106210272A (en) 2016-06-27 2016-06-27 A kind of method preventing mobile phone malice brush machine based on ID

Publications (1)

Publication Number Publication Date
CN106210272A true CN106210272A (en) 2016-12-07

Family

ID=57461389

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610482897.5A Pending CN106210272A (en) 2016-06-27 2016-06-27 A kind of method preventing mobile phone malice brush machine based on ID

Country Status (1)

Country Link
CN (1) CN106210272A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107169349A (en) * 2017-04-26 2017-09-15 深圳天珑无线科技有限公司 The brush machine testing method and its system of mobile device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1455499A1 (en) * 2003-03-03 2004-09-08 Nokia Corporation Security element commanding method and mobile terminal
CN104199688A (en) * 2014-08-15 2014-12-10 深圳市中兴移动通信有限公司 Mobile terminal and system reinstallation control method and device thereof
CN104717063A (en) * 2013-12-16 2015-06-17 毛秀允 Software security protection method of mobile terminal
CN105245346A (en) * 2015-10-19 2016-01-13 宇龙计算机通信科技(深圳)有限公司 Identity authentication method and user terminal
CN105306204A (en) * 2014-07-04 2016-02-03 腾讯科技(深圳)有限公司 Security verification method, device and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1455499A1 (en) * 2003-03-03 2004-09-08 Nokia Corporation Security element commanding method and mobile terminal
CN104717063A (en) * 2013-12-16 2015-06-17 毛秀允 Software security protection method of mobile terminal
CN105306204A (en) * 2014-07-04 2016-02-03 腾讯科技(深圳)有限公司 Security verification method, device and system
CN104199688A (en) * 2014-08-15 2014-12-10 深圳市中兴移动通信有限公司 Mobile terminal and system reinstallation control method and device thereof
CN105245346A (en) * 2015-10-19 2016-01-13 宇龙计算机通信科技(深圳)有限公司 Identity authentication method and user terminal

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107169349A (en) * 2017-04-26 2017-09-15 深圳天珑无线科技有限公司 The brush machine testing method and its system of mobile device

Similar Documents

Publication Publication Date Title
CN104205721B (en) The adaptive authentication method of context aware and device
EP2579141B1 (en) Method and device for unlocking operating system
US20180203986A1 (en) Fingerprint Recognition Method and Apparatus, and Touchscreen Terminal
US8359008B2 (en) Security system and method for an electronic device
CN100428820C (en) User recognition module and method capable of realizing mobile terminal area locking
CN109639724B (en) Password retrieving method, password retrieving device, computer device and storage medium
CN104767713B (en) Account binding method, server and system
CN105530356A (en) Mobile communication terminal and data protection method and device thereof
EP1810093A2 (en) Actuating a security system using a wireless device
CN104486727A (en) Mobile phone anti-theft method and system based on Android system
CN101316167A (en) Registration and login method of safety authentication, system and mobile terminal
CN110546641B (en) Access control method and device, intelligent device and storage medium
CN109784031A (en) A kind of account authentication process method and device
WO2009051336A1 (en) Apparatus and method for managing terminal users
CN102243698A (en) Method for realizing information security of intelligent terminal and intelligent terminal
CN108234507A (en) Talk back equipment sharing method, talk back equipment and readable storage medium storing program for executing
CN105488372B (en) Verification method and device
CN106469284A (en) A kind of information processing method, device and mobile terminal
CN107133056A (en) The method and apparatus of smart machine upgrading restoring subregion
CN101616416A (en) The smart card verification method and the equipment of communication terminal
CN105978899A (en) SIM card binding method for preventing malicious mobile phone flash
CN106131819A (en) A kind of multistage authentication prevents the method for mobile phone malice brush machine
CN106210272A (en) A kind of method preventing mobile phone malice brush machine based on ID
CN105306691A (en) Personal information protection method and terminal
CN106211163A (en) The method and apparatus of safe networking

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20161207