CN106210272A - A kind of method preventing mobile phone malice brush machine based on ID - Google Patents
A kind of method preventing mobile phone malice brush machine based on ID Download PDFInfo
- Publication number
- CN106210272A CN106210272A CN201610482897.5A CN201610482897A CN106210272A CN 106210272 A CN106210272 A CN 106210272A CN 201610482897 A CN201610482897 A CN 201610482897A CN 106210272 A CN106210272 A CN 106210272A
- Authority
- CN
- China
- Prior art keywords
- check information
- safety check
- template
- information
- security
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 20
- 230000008859 change Effects 0.000 description 6
- 238000012795 verification Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 235000002595 Solanum tuberosum Nutrition 0.000 description 1
- 244000061456 Solanum tuberosum Species 0.000 description 1
- 230000002159 abnormal effect Effects 0.000 description 1
- 238000007630 basic procedure Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 239000007795 chemical reaction product Substances 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 235000013372 meat Nutrition 0.000 description 1
- 235000012015 potatoes Nutrition 0.000 description 1
- 230000032258 transport Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
- G06F21/126—Interacting with the operating system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6281—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database at program execution time, where the protection is within the operating system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72406—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by software upgrading or downloading
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Human Computer Interaction (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Databases & Information Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Telephone Function (AREA)
Abstract
The invention discloses a kind of method preventing mobile phone malice brush machine based on ID, the method includes: pre-set maltilevel security check information based on ID;Set up the security template corresponding to different level of securitys;Obtain the geographical location information of mobile terminal in real time;According to acquired mobile terminal geographic position information, determine current safety template, and this mobile terminal is applied this template.According to the present invention it is possible to realize mobile phone safe that is safer and that become more meticulous management.
Description
Technical field
The present invention relates to intelligent terminal field, particularly to a kind of side preventing mobile phone malice brush machine based on ID
Method.
Background technology
Along with the arrival in 4G epoch, mobile phone has become as requisite instrument in people's daily life.It meets people
Many demands of voice/video phone and multimedia data service etc. whenever and wherever possible.End product function is more and more richer
Rich, it is possible to meet the different demands of different geographical different user.
In mobile phone, storage has the guiding journey included for realizing the program of mobile phone bottom control function, loading mobile phone kernel
Sequence, kernel, system file etc., kernel is operating system meat and potatoes, transports after being loaded into internal memory in internal memory the most always
OK, the loading of related content in system file in interior nuclear control, system file then store this mobile phone various application programs and
The configuration data of related application.
Brush machine is exactly a kind of behavior changing mobile phone operating system, is equivalent to load onto the windows of different editions to computer
Or computer refitting system, namely brush mobile phone operating system.The brush machine the most often said is exactly with " change substituted for some figures
Software version after sheet, the tinkle of bells or menu " process.Along with the appearance of various brush machine softwares, user can be changed by brush machine maintenance
Kernel on mobile phone and system file.But, after this kernel is modified, amended kernel may be caused correctly not add
Loading system file;After system file is modified, then corresponding systemic-function also can change therewith, thus may cause mobile phone
Systemic-function can not normally use.Particularly, in some brush machine scheme, the mobile phone after brush machine may be loaded non-by malicious user
The software data of official, such as, install non-pre-installed software to make profit, and after causing start, Installed System Memory is not enough, and reaction is slow;Or distort
System file, causes partial function to lose efficacy, and makes system stability and safety occur abnormal, even makes the terminal cannot be the most normally opened
Machine, safety is relatively low.Further, after mobile terminal is lost or be stolen, pick up taker or stealer can be by entering mobile terminal
The operation such as row brush machine unlocks this mobile terminal, thus causes the private information of the owner of lost property to be revealed.
In the various schemes preventing malice brush machine proposed in prior art, it is the most all that brush secret is set by single
The mode of code realizes user's verification, and once password is revealed or is easily cracked, and security performance is poor, and security management is thicker
Put.
Based on this, be badly in need of a kind of can safer and become more meticulous prevent mobile phone malice brush machine method.
Summary of the invention
The technical problem to be solved is: how to realize mobile phone safe that is safer and that become more meticulous management.For
This, the present invention proposes a kind of method preventing mobile phone malice brush machine based on ID, can solve due to prior art fully
Restriction and one or more problems of causing of defect.
Additional advantages of the present invention, purpose and characteristic, a part will be elucidated in the following description, and another portion
Divide for those of ordinary skill in the art by the investigation of description below be will be apparent from or from the enforcement of the present invention
Acquire.Can realize by the structure particularly pointed out in the specification and claims of word and accompanying drawing and obtain the present invention
Purpose and advantage.
The invention provides a kind of method preventing mobile phone malice brush machine based on ID, comprise the steps:
Step S101, pre-sets maltilevel security check information based on ID;Described maltilevel security check information
Including the first safety check information, the second safety check information, the 3rd safety check information, the 4th safety check information and the 5th
Safety check information.
Step S102, sets up the security template corresponding to different level of securitys;In the first security template, when end being detected
Hold after being connected with the foundation of brush machine instrument, need the first safety check information of user is verified, be verified and can carry out
Follow-up brush machine operation;In the second security template, after detecting that terminal is connected with the foundation of brush machine instrument, need user's
First safety check information and the second safety check information are verified, are verified and can carry out follow-up brush machine operation;?
In 3rd security template, after detecting that terminal and brush machine instrument are set up and be connected, need the first safety check information to user,
Second safety check information and the 3rd safety check information are verified, are verified and can carry out follow-up brush machine operation;?
In 4th security template, after detecting that terminal and brush machine instrument are set up and be connected, need the first safety check information to user,
Second safety check information, the 3rd safety check information and the 4th safety check information are verified, are verified and can carry out
Follow-up brush machine operation;In the 5th security template, after detecting that terminal is connected with the foundation of brush machine instrument, need user's
First safety check information, the second safety check information, the 3rd safety check information, the 4th safety check information and the 5th safety
Check information is verified, is verified and can carry out follow-up brush machine operation;
Step S103, obtains the geographical location information of mobile terminal in real time.
Step S104, according to acquired mobile terminal geographic position information, determines current safety template, and moves this
This template of terminal applies.
Preferably, described step S103, specifically include: when mobile terminal current location and center set in advance
When distance is less than first threshold D1, determine that current safety template is the first security template;When mobile terminal current location and in advance
Set center distance more than first threshold D1, less than Second Threshold D2 time, determine that current safety template is the second peace
Full template;When the distance of mobile terminal current location and center set in advance is more than Second Threshold D2, less than the 3rd threshold
During value D3, determine that current safety template is the 3rd security template;When mobile terminal current location and center set in advance
Distance more than the 3rd threshold value D3, less than four threshold values D4 time, determine that current safety template is the 4th security template;When mobile whole
When the distance of end current location and center set in advance is more than four threshold values D4, determine that current safety template is the 5th peace
Full template.
Preferably, described first safety check information is key information, and the second safety check information is palmprint information, the 3rd
Safety check information is finger print information, and the 4th safety check information is iris information, and the 5th safety check information is acoustic information.
Preferably, described first security template, the second security template, the 3rd security template, the 4th security template, the 5th peace
Full level of security corresponding to template raises successively.
Preferably, its geographical location information is obtained in real time by the GPS module of mobile terminal.
Accompanying drawing explanation
Fig. 1 is the basic procedure schematic diagram of the method according to first embodiment of the invention.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Describe wholely.Should be appreciated that specific embodiment described herein is only the exemplary embodiment of the present invention, in order to explain this
Invention rather than all embodiment, be not limited to the present invention.Based on the embodiment in the present invention, ordinary skill
The every other embodiment that personnel are obtained on the premise of not making creative work, broadly falls into the model of present invention protection
Enclose.In the case of not conflicting, the feature in the embodiment in the present invention i.e. embodiment can mutual combination in any.
As it is shown in figure 1, be the schematic flow sheet of the method according to first embodiment of the invention, specifically can include walking as follows
Rapid:
S101: pre-set maltilevel security check information based on ID.
In this step, maltilevel security check information based on ID, described maltilevel security verification letter are pre-set
Breath includes the first safety check information, the second safety check information, the 3rd safety check information, the 4th safety check information and the
Five safety check information.Concrete, described first safety check information is key information, and the second safety check information is palmmprint letter
Breath, the 3rd safety check information is finger print information, and the 4th safety check information is iris information, and the 5th safety check information is sound
Message ceases.
S102: set up the security template corresponding to different level of securitys.
In this step, the security template corresponding to different level of securitys is set up.Concrete, at described first security template
In, after detecting that terminal is connected with the foundation of brush machine instrument, need the first safety check information of user is verified, checking
Operate by follow-up brush machine can be carried out;In described second security template, when detecting that terminal is set up even with brush machine instrument
After connecing, need the first safety check information to user and the second safety check information to verify, be verified and can carry out
Follow-up brush machine operation;In described 3rd security template, after detecting that terminal and brush machine instrument are set up and be connected, needs to
The first safety check information at family, the second safety check information and the 3rd safety check information are verified, being verified can
Carry out follow-up brush machine operation;In described 4th security template, after detecting that terminal is connected with the foundation of brush machine instrument, need
The first safety check information, the second safety check information, the 3rd safety check information and the 4th safety check information to user
Verify, be verified and can carry out follow-up brush machine operation;In described 5th security template, when terminal and brush being detected
Machine instrument is set up after connecting, and needs the first safety check information to user, the second safety check information, the 3rd safety check letter
Breath, the 4th safety check information and the 5th safety check information are verified, are verified and can carry out follow-up brush machine operation.
Corresponding to above-mentioned first security template, the second security template, the 3rd security template, the 4th security template, the 5th security template
Level of security raises successively.
Above step is preset by program, it is also possible to set by User Defined, and this template can according to circumstances be entered by user
Row change.
S103: obtain the geographical location information of mobile terminal in real time.
The geographical position of real time tracking mobile terminal, concrete, can be obtained in real time by the GPS module of mobile terminal
Its geographical location information.
S104: according to acquired mobile terminal geographic position information, determines current safety template, and to this mobile terminal
Apply this template.
According to acquired mobile terminal geographic position information, determine the security template of mobile terminal, and this is moved end
End applies this template.Concrete, when the distance of mobile terminal current location and center set in advance is less than first threshold
During D1, determine that current safety template is the first security template;When mobile terminal current location and center set in advance
Distance more than first threshold D1, less than Second Threshold D2 time, determine that current safety template is the second security template;Work as mobile terminal
The distance of current location and center set in advance more than Second Threshold D2, less than three threshold values D3 time, determine current peace
Full template is the 3rd security template;When the distance of mobile terminal current location and center set in advance is more than the 3rd threshold value
D3, less than four threshold values D4 time, determine that current safety template is the 4th security template;When mobile terminal current location and set in advance
When the distance of fixed center is more than four threshold values D4, determine that current safety template is the 5th security template.
The flow process of method according to a second embodiment of the present invention, specifically may include steps of:
S201: pre-set maltilevel security check information based on ID.
In this step, maltilevel security check information based on ID, described maltilevel security verification letter are pre-set
Breath includes the first safety check information, the second safety check information, the 3rd safety check information, the 4th safety check information and the
Five safety check information.Concrete, described first safety check information is key information, and the second safety check information is palmmprint letter
Breath, the 3rd safety check information is finger print information, and the 4th safety check information is iris information, and the 5th safety check information is sound
Message ceases.
S202: set up the security template corresponding to different level of securitys.
In this step, the security template corresponding to different level of securitys is set up.Concrete, at described first security template
In, after detecting that terminal is connected with the foundation of brush machine instrument, need the first safety check information of user is verified, checking
Operate by follow-up brush machine can be carried out;In described second security template, when detecting that terminal is set up even with brush machine instrument
After connecing, need the first safety check information to user and the second safety check information to verify, be verified and can carry out
Follow-up brush machine operation;In described 3rd security template, after detecting that terminal and brush machine instrument are set up and be connected, needs to
The first safety check information at family, the second safety check information and the 3rd safety check information are verified, being verified can
Carry out follow-up brush machine operation;In described 4th security template, after detecting that terminal is connected with the foundation of brush machine instrument, need
The first safety check information, the second safety check information, the 3rd safety check information and the 4th safety check information to user
Verify, be verified and can carry out follow-up brush machine operation;In described 5th security template, when terminal and brush being detected
Machine instrument is set up after connecting, and needs the first safety check information to user, the second safety check information, the 3rd safety check letter
Breath, the 4th safety check information and the 5th safety check information are verified, are verified and can carry out follow-up brush machine operation.
Corresponding to above-mentioned first security template, the second security template, the 3rd security template, the 4th security template, the 5th security template
Level of security raises successively.
Above step is preset by program, it is also possible to set by User Defined, and this template can according to circumstances be entered by user
Row change.
S203: obtain the associated person information of mobile terminal or default account information, according to associated person information or preset
Account information determines secure relationship people.
Obtain the associated person information of mobile terminal or default account information, believe according to associated person information or default account
Breath determines secure relationship people, concrete, user preassign secure relationship people's account, when the not specified secure relationship of user is acknowledged a debt
Number time, it is also possible to according to mobile phone contact information, the connection of each contact person's account stored in statistics mobile phone and this mobile terminal
It is frequency, determines secure relationship people according to contact frequency.Wherein, mobile phone contact account can be the mobile phone in cell phone address book
Number, it is also possible to even if being communication contact people's account, such as micro-signal, No. QQ etc..
S204: when detecting that terminal is connected with the foundation of brush machine instrument, mobile terminal sends safety to this secure relationship people
Template solicited message, afterwards, determines current safety template according to feedback information, and this mobile terminal is applied this template.
When detecting that mobile terminal is connected with the foundation of brush machine instrument, mobile terminal sends safe mould to this secure relationship people
Plate solicited message, afterwards, determines current safety template according to receiving feedback information at secure relationship people, and this is moved end
End applies this template.Concrete, described security template solicited message comprises alternative security template list information, safety
Contact person sends feedback information according to the security template list carried in security template solicited message, comprises this peace in feedback information
Full security template information selected by contact person.Further, when mobile terminal does not receives feedback information in the given time, stop
Brush machine;When mobile terminal receives feedback information in the given time, determine current safety template according to feedback information.
The schematic flow sheet of method according to a third embodiment of the present invention, specifically may include steps of:
S301: pre-set maltilevel security check information based on ID.
In this step, maltilevel security check information based on ID, described maltilevel security verification letter are pre-set
Breath includes the first safety check information, the second safety check information, the 3rd safety check information, the 4th safety check information and the
Five safety check information.Concrete, described first safety check information is key information, and the second safety check information is palmmprint letter
Breath, the 3rd safety check information is finger print information, and the 4th safety check information is iris information, and the 5th safety check information is sound
Message ceases.
S302: set up the security template corresponding to different level of securitys.
In this step, the security template corresponding to different level of securitys is set up.Concrete, at described first security template
In, after detecting that terminal is connected with the foundation of brush machine instrument, need the first safety check information of user is verified, checking
Operate by follow-up brush machine can be carried out;In described second security template, when detecting that terminal is set up even with brush machine instrument
After connecing, need the first safety check information to user and the second safety check information to verify, be verified and can carry out
Follow-up brush machine operation;In described 3rd security template, after detecting that terminal and brush machine instrument are set up and be connected, needs to
The first safety check information at family, the second safety check information and the 3rd safety check information are verified, being verified can
Carry out follow-up brush machine operation;In described 4th security template, after detecting that terminal is connected with the foundation of brush machine instrument, need
The first safety check information, the second safety check information, the 3rd safety check information and the 4th safety check information to user
Verify, be verified and can carry out follow-up brush machine operation;In described 5th security template, when terminal and brush being detected
Machine instrument is set up after connecting, and needs the first safety check information to user, the second safety check information, the 3rd safety check letter
Breath, the 4th safety check information and the 5th safety check information are verified, are verified and can carry out follow-up brush machine operation.
Corresponding to above-mentioned first security template, the second security template, the 3rd security template, the 4th security template, the 5th security template
Level of security raises successively.
Above step is preset by program, it is also possible to set by User Defined, and this template can according to circumstances be entered by user
Row change.
S303: set up the SIM card information list corresponding to different level of trusts.
Setting up the SIM card information list corresponding to different level of trusts, wherein said SIM information can be the collection of SIM
Become circuit card identification code (ICCID) or international mobile subscriber identity (IMSI) information.Can add in advance and can trust
SIM information, and the just described SIM information MAP that can trust is to different level of trusts, concrete, described level of trust
The first level of trust, the second level of trust, the 3rd level of trust, the 4th level of trust, the 5th level of trust, its institute can be included
Corresponding level of trust reduces successively.
S304: when detecting that terminal is connected with the foundation of brush machine instrument, the SIM card information of detection mobile terminal, according to institute
The SIM card information of detection determines current safety template, and this mobile terminal is applied this template.
Concrete, when SIM card information being detected, or the SIM card information detected is not at described SIM information list
Time middle, stop brush machine;When the level of trust that detected SIM information is corresponding is the first level of trust, determine current safety
Template is the first security template;When the level of trust that detected SIM information is corresponding is the second level of trust, determine current
Security template is the second security template;When the level of trust that detected SIM information is corresponding is three level of trust, determine
Current safety template is the 3rd security template;When the level of trust that detected SIM information is corresponding is four level of trust,
Determine that current safety template is the 4th security template;When the level of trust that detected SIM information is corresponding is the 5th level of trust
Time other, determine that current safety template is the 5th security template.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment can
Realizing with the hardware relevant by programmed instruction, program can store in a computer-readable storage medium, storage medium bag
Include RAM, ROM, flash memory, disk or CD etc..
Above content is only presently preferred embodiments of the present invention, for those of ordinary skill in the art, according to the present invention's
Thought, the most all will change, and this specification content should not be construed as the present invention
Restriction.
Claims (5)
1. the method preventing mobile phone malice brush machine based on ID, comprises the steps:
Step S101, pre-sets maltilevel security check information based on ID;Described maltilevel security check information includes
First safety check information, the second safety check information, the 3rd safety check information, the 4th safety check information and the 5th safety
Check information;
Step S102, sets up the security template corresponding to different level of securitys;In the first security template, when detect terminal with
Brush machine instrument set up connect after, need the first safety check information of user is verified, be verified can carry out follow-up
Brush machine operation;In the second security template, after detecting that terminal is connected with the foundation of brush machine instrument, need to user first
Safety check information and the second safety check information are verified, are verified and can carry out follow-up brush machine operation;The 3rd
In security template, after detecting that terminal and brush machine instrument are set up and be connected, need the first safety check information to user, second
Safety check information and the 3rd safety check information are verified, are verified and can carry out follow-up brush machine operation;The 4th
In security template, after detecting that terminal and brush machine instrument are set up and be connected, need the first safety check information to user, second
Safety check information, the 3rd safety check information and the 4th safety check information are verified, be verified can carry out follow-up
Brush machine operation;In the 5th security template, after detecting that terminal is connected with the foundation of brush machine instrument, need to user first
Safety check information, the second safety check information, the 3rd safety check information, the 4th safety check information and the 5th safety check
Information is verified, is verified and can carry out follow-up brush machine operation;
Step S103, obtains the geographical location information of mobile terminal in real time;
Step S104, according to acquired mobile terminal geographic position information, determines current safety template, and to this mobile terminal
Apply this template.
Method the most according to claim 1, it is characterised in that described step S103, specifically includes: when mobile terminal is current
When the distance of position and center set in advance is less than first threshold D1, determine that current safety template is the first safe mould
Plate;When the distance of mobile terminal current location and center set in advance is more than first threshold D1, less than Second Threshold D2
Time, determine that current safety template is the second security template;When mobile terminal current location and center set in advance away from
From more than Second Threshold D2, less than three threshold values D3 time, determine that current safety template is the 3rd security template;When mobile terminal is worked as
The distance of front position and center set in advance more than the 3rd threshold value D3, less than four threshold values D4 time, determine current safety
Template is the 4th security template;When the distance of mobile terminal current location and center set in advance is more than the 4th threshold value D4
Time, determine that current safety template is the 5th security template.
Method the most according to claim 1, it is characterised in that described first safety check information is key information, second
Safety check information is palmprint information, and the 3rd safety check information is finger print information, and the 4th safety check information is iris information,
5th safety check information is acoustic information.
Method the most according to claim 1, it is characterised in that described first security template, the second security template, the 3rd peace
Full level of security corresponding to template, the 4th security template, the 5th security template raises successively.
Method the most according to claim 1, it is characterised in that obtain its ground in real time by the GPS module of mobile terminal
Reason positional information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610482897.5A CN106210272A (en) | 2016-06-27 | 2016-06-27 | A kind of method preventing mobile phone malice brush machine based on ID |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610482897.5A CN106210272A (en) | 2016-06-27 | 2016-06-27 | A kind of method preventing mobile phone malice brush machine based on ID |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106210272A true CN106210272A (en) | 2016-12-07 |
Family
ID=57461389
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610482897.5A Pending CN106210272A (en) | 2016-06-27 | 2016-06-27 | A kind of method preventing mobile phone malice brush machine based on ID |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106210272A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107169349A (en) * | 2017-04-26 | 2017-09-15 | 深圳天珑无线科技有限公司 | The brush machine testing method and its system of mobile device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1455499A1 (en) * | 2003-03-03 | 2004-09-08 | Nokia Corporation | Security element commanding method and mobile terminal |
CN104199688A (en) * | 2014-08-15 | 2014-12-10 | 深圳市中兴移动通信有限公司 | Mobile terminal and system reinstallation control method and device thereof |
CN104717063A (en) * | 2013-12-16 | 2015-06-17 | 毛秀允 | Software security protection method of mobile terminal |
CN105245346A (en) * | 2015-10-19 | 2016-01-13 | 宇龙计算机通信科技(深圳)有限公司 | Identity authentication method and user terminal |
CN105306204A (en) * | 2014-07-04 | 2016-02-03 | 腾讯科技(深圳)有限公司 | Security verification method, device and system |
-
2016
- 2016-06-27 CN CN201610482897.5A patent/CN106210272A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1455499A1 (en) * | 2003-03-03 | 2004-09-08 | Nokia Corporation | Security element commanding method and mobile terminal |
CN104717063A (en) * | 2013-12-16 | 2015-06-17 | 毛秀允 | Software security protection method of mobile terminal |
CN105306204A (en) * | 2014-07-04 | 2016-02-03 | 腾讯科技(深圳)有限公司 | Security verification method, device and system |
CN104199688A (en) * | 2014-08-15 | 2014-12-10 | 深圳市中兴移动通信有限公司 | Mobile terminal and system reinstallation control method and device thereof |
CN105245346A (en) * | 2015-10-19 | 2016-01-13 | 宇龙计算机通信科技(深圳)有限公司 | Identity authentication method and user terminal |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107169349A (en) * | 2017-04-26 | 2017-09-15 | 深圳天珑无线科技有限公司 | The brush machine testing method and its system of mobile device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104205721B (en) | The adaptive authentication method of context aware and device | |
EP2579141B1 (en) | Method and device for unlocking operating system | |
US20180203986A1 (en) | Fingerprint Recognition Method and Apparatus, and Touchscreen Terminal | |
US8359008B2 (en) | Security system and method for an electronic device | |
CN100428820C (en) | User recognition module and method capable of realizing mobile terminal area locking | |
CN109639724B (en) | Password retrieving method, password retrieving device, computer device and storage medium | |
CN104767713B (en) | Account binding method, server and system | |
CN105530356A (en) | Mobile communication terminal and data protection method and device thereof | |
EP1810093A2 (en) | Actuating a security system using a wireless device | |
CN104486727A (en) | Mobile phone anti-theft method and system based on Android system | |
CN101316167A (en) | Registration and login method of safety authentication, system and mobile terminal | |
CN110546641B (en) | Access control method and device, intelligent device and storage medium | |
CN109784031A (en) | A kind of account authentication process method and device | |
WO2009051336A1 (en) | Apparatus and method for managing terminal users | |
CN102243698A (en) | Method for realizing information security of intelligent terminal and intelligent terminal | |
CN108234507A (en) | Talk back equipment sharing method, talk back equipment and readable storage medium storing program for executing | |
CN105488372B (en) | Verification method and device | |
CN106469284A (en) | A kind of information processing method, device and mobile terminal | |
CN107133056A (en) | The method and apparatus of smart machine upgrading restoring subregion | |
CN101616416A (en) | The smart card verification method and the equipment of communication terminal | |
CN105978899A (en) | SIM card binding method for preventing malicious mobile phone flash | |
CN106131819A (en) | A kind of multistage authentication prevents the method for mobile phone malice brush machine | |
CN106210272A (en) | A kind of method preventing mobile phone malice brush machine based on ID | |
CN105306691A (en) | Personal information protection method and terminal | |
CN106211163A (en) | The method and apparatus of safe networking |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20161207 |