+

CN103457991B - A kind of terminal safety protection method and system - Google Patents

A kind of terminal safety protection method and system Download PDF

Info

Publication number
CN103457991B
CN103457991B CN201310207141.6A CN201310207141A CN103457991B CN 103457991 B CN103457991 B CN 103457991B CN 201310207141 A CN201310207141 A CN 201310207141A CN 103457991 B CN103457991 B CN 103457991B
Authority
CN
China
Prior art keywords
contact
target
information data
terminal
library
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310207141.6A
Other languages
Chinese (zh)
Other versions
CN103457991A (en
Inventor
张旭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201310207141.6A priority Critical patent/CN103457991B/en
Publication of CN103457991A publication Critical patent/CN103457991A/en
Application granted granted Critical
Publication of CN103457991B publication Critical patent/CN103457991B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Alarm Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

本发明公开了一种终端安全保护方法和系统,涉及网络通信技术领域。所述方法包括:将至少一个第一联系人加入针对目标联系人的安全联系人库;其中,所述目标联系人对应目标终端;针对目标服务器收到的信息数据,解析其所指向的目标联系人,并判断该信息数据所属的第一联系人是否属于所述目标联系人的安全联系人库,且判断所述信息数据的内容是否匹配预定内容;如果所述第一终端对应的第一联系人属于所述目标联系人的安全联系人库,且所述信息数据的内容匹配预定内容,则根据匹配结果通知目标终端启动相应的密码重置操作或者启动相应的安全保护操作。提高用户终端的安全性,降低终端被盗几率,并且可以方便的对用户的密码进行重置。

The invention discloses a terminal safety protection method and system, and relates to the technical field of network communication. The method includes: adding at least one first contact to a secure contact database for the target contact; wherein, the target contact corresponds to the target terminal; and analyzing the target contact pointed to by the information data received by the target server and determine whether the first contact to which the information data belongs belongs to the secure contact database of the target contact, and determine whether the content of the information data matches the predetermined content; if the first contact corresponding to the first terminal If the person belongs to the secure contact database of the target contact, and the content of the information data matches the predetermined content, the target terminal is notified to start the corresponding password reset operation or start the corresponding security protection operation according to the matching result. Improve the security of the user terminal, reduce the chance of the terminal being stolen, and easily reset the user's password.

Description

一种终端安全保护方法和系统A terminal security protection method and system

技术领域technical field

本发明涉及网络通信技术领域,具体涉及一种终端安全保护方法和系统。The invention relates to the technical field of network communication, in particular to a terminal security protection method and system.

背景技术Background technique

随着信息数据技术的发展,人们越来越关注信息数据的安全问题,如果用户遗忘了密码或者是手机丢失,则希望对密码进行处理或者对手机中的信息数据或者设备进行控制,保证安全性。With the development of information and data technology, people pay more and more attention to the security of information and data. If the user forgets the password or loses the mobile phone, he hopes to process the password or control the information, data or equipment in the mobile phone to ensure security. .

比如,如果用户忘记了密码,那就无法进入该加密区域,一般来说,隐私第一联系人一般都是用户比较重要的第一联系人,比如重要客户的订单记录等等,如果无法进入查看通讯记录,比如对于手机来说,无法进入查看短信和通话记录,会对用户造成重大影响。现有技术中,基本上为以下几种密码找回的方式:1.在用户的终端中,针对加密区域设置密码问题,当用户忘记密码时,激活密码问题重置流程,通过回答终端中的密码问题,重置密码。2.设置一个与终端关联的安全邮箱,当用户忘记密码时,激活邮箱密码重置流程,通过自动生成一个新密码,调用邮箱接口,发送到用户的安全邮箱中。这几种密码找回方式,同样存在用户忘记了密码问题答案、忘记了安全邮箱帐号和密码的问题;特别是针对忘记关联安全邮箱帐号和密码的情况,如果设置了通过服务提供商找回安全邮箱的功能,其操作过程繁琐。For example, if the user forgets the password, he will not be able to enter the encrypted area. Generally speaking, the first contact person for privacy is usually the first contact person who is more important to the user, such as the order records of important customers, etc. If you cannot enter to view Communication records, such as for mobile phones, cannot be accessed to view text messages and call records, which will have a major impact on users. In the prior art, there are basically the following ways to retrieve the password: 1. In the user's terminal, set a password question for the encrypted area. When the user forgets the password, activate the password question reset process, and answer the password question in the terminal. Password question, reset password. 2. Set up a secure mailbox associated with the terminal. When the user forgets the password, activate the mailbox password reset process, automatically generate a new password, call the mailbox interface, and send it to the user's secure mailbox. These methods of retrieving passwords also have problems such as users forgetting the answers to password questions, and forgetting the account number and password of the secure mailbox; The function of the mailbox, its operation process is cumbersome.

又比如,如果用户丢失了手机,其就无法对其手机中的信息数据或者设备进行控制,保证其安全性。For another example, if the user loses his mobile phone, he will not be able to control the information, data or equipment in his mobile phone to ensure its security.

发明内容Contents of the invention

鉴于上述问题,提出了本发明以便提供一种克服上述问题或者至少部分地解决上述问题的一种终端安全保护的装置和相应的一种终端安全保护方法。In view of the above problems, the present invention is proposed to provide a terminal security protection device and a corresponding terminal security protection method that overcome the above problems or at least partially solve the above problems.

依据本发明的一个方面,提供了一种终端安全保护方法,包括:According to one aspect of the present invention, a terminal security protection method is provided, including:

将至少一个第一联系人加入针对目标联系人的安全联系人库;其中,所述目标联系人对应目标终端;adding at least one first contact to the secure contact database for the target contact; wherein, the target contact corresponds to the target terminal;

针对目标服务器收到的信息数据,解析其所指向的目标联系人,并判断该信息数据所属的第一联系人是否属于所述目标联系人的安全联系人库,且判断所述信息数据的内容是否匹配预定内容;For the information data received by the target server, analyze the target contact it points to, and determine whether the first contact to which the information data belongs belongs to the secure contact database of the target contact, and determine the content of the information data Whether it matches the predetermined content;

如果所述第一终端对应的第一联系人属于所述目标联系人的安全联系人库,且所述信息数据的内容匹配预定内容,则根据匹配结果通知目标终端启动相应的密码重置操作或者启动相应的安全保护操作。If the first contact corresponding to the first terminal belongs to the secure contact database of the target contact, and the content of the information data matches the predetermined content, then notify the target terminal to start a corresponding password reset operation according to the matching result or Start the corresponding security protection operation.

可选的,所述将至少一个第一联系人加入针对目标联系人的安全联系人库包括:Optionally, adding at least one first contact to the secure contact database for the target contact includes:

通过目标联系人登录目标服务器的网页,将待加入安全联系人库的第一联系人发送给目标服务器;所述目标服务器将所述第一联系人加入对应该目标联系人的安全联系人库;Log in the web page of the target server through the target contact, and send the first contact to be added to the safe contact database to the target server; the target server adds the first contact to the safe contact database corresponding to the target contact;

或者,通知至少一个安全联系人标识对应的第一终端,发送指定安全验证信息数据至目标服务器;当所述标服务器接收到任一第一终端发送的信息数据后,判断所述信息数据是否为所述指定安全验证信息数据,如果是,则将所述第一终端对应的第一联系人加入对应的安全联系人库。Or, notify the first terminal corresponding to at least one security contact identifier, and send the specified security verification information data to the target server; when the target server receives the information data sent by any first terminal, it determines whether the information data is If the designated security verification information data is yes, adding the first contact corresponding to the first terminal into the corresponding security contact database.

可选的,所述通过目标联系人登录目标服务器的网站,将待加入安全联系人库的第一联系人发送给目标服务器包括:Optionally, the logging into the website of the target server through the target contact, and sending the first contact to be added to the secure contact database to the target server includes:

通过目标终端调用其通讯录接口,从通讯录中选择待加入安全联系人库的第一联系人,并将其发送至目标服务器;Call its address book interface through the target terminal, select the first contact to be added to the secure contact database from the address book, and send it to the target server;

所述通知至少一个安全联系人标识对应的第一终端,发送指定安全验证信息数据至目标服务器包括:The notifying the first terminal corresponding to at least one security contact identifier, and sending the specified security verification information data to the target server includes:

通过目标终端调用其通讯录接口,从通讯录中选择第一联系人并通知对应所述第一联系人的第一终端发送指定安全验证信息数据至目标服务器。The target terminal invokes its address book interface, selects a first contact from the address book, and notifies the first terminal corresponding to the first contact to send designated security verification information data to the target server.

可选的,所述针对目标服务器收到的信息数据,解析其所指向的目标联系人,并判断该信息数据所属的第一联系人是否属于所述目标联系人的安全联系人库,且判断所述信息数据的内容是否匹配预定内容包括:Optionally, analyzing the target contact pointed to by the information data received by the target server, and judging whether the first contact to which the information data belongs belongs to the secure contact database of the target contact, and judging Whether the content of the information data matches the predetermined content includes:

针对目标服务器收到的信息数据,解析所述信息数据指向的目标联系人,并根据所述目标联系人查找对应的安全联系人库;For the information data received by the target server, analyze the target contact pointed to by the information data, and search for a corresponding security contact database according to the target contact;

判断发送所述信息数据的第一终端对应的第一联系人是否属于所述安全联系人库;judging whether the first contact corresponding to the first terminal sending the information data belongs to the secure contact database;

如果所述第一联系人属于安全联系人库,则将所述信息数据中的内容与目标服务器中记录的预定内容进行匹配。If the first contact belongs to a secure contact database, matching the content in the information data with the predetermined content recorded in the target server.

可选的,所述通知目标终端启动对目标终端安全保护操作包括:Optionally, the notifying the target terminal to start a security protection operation on the target terminal includes:

通知目标终端将指定存储区域中的个性化信息数据,进行删除;Notify the target terminal to delete the personalized information data in the specified storage area;

和/或,通知目标终端将指定区域中的个性化信息数据上传至指定服务器,并将目标终端中所述个性化信息数据进行删除;And/or, notify the target terminal to upload the personalized information data in the specified area to the specified server, and delete the personalized information data in the target terminal;

和/或,通知目标终端将位置信息数据发送至指定的第二终端;And/or, notify the target terminal to send the location information data to the designated second terminal;

和/或,通知目标终端将屏幕进行锁定;And/or, notify the target terminal to lock the screen;

和/或,通知目标终端启动摄像头进行拍照和/或录像;And/or, notify the target terminal to start the camera to take pictures and/or video;

和/或,通知目标终端启动声音系统进行报警。And/or, notify the target terminal to activate the sound system for alarming.

可选的,在针对目标服务器收到的信息数据,解析其所指向的目标联系人,并判断该信息数据所属的第一联系人是否属于所述目标联系人的安全联系人库,且判断所述信息数据的内容是否匹配预定内容之前还包括:Optionally, for the information data received by the target server, analyze the target contact pointed to by it, and determine whether the first contact to which the information data belongs belongs to the secure contact database of the target contact, and determine whether Before checking whether the content of the above information data matches the predetermined content, it also includes:

通知目标联系人标识对应的安全联系人库中的至少一个第一联系人对应的第一终端,发送包括第一预定字符串格式和目标联系人的信息数据至目标服务器。Informing the target contact to identify the first terminal corresponding to at least one first contact in the corresponding secure contact database, and sending the information data including the first predetermined character string format and the target contact to the target server.

可选的,所述通知目标联系人标识对应的安全联系人库中的至少一个第一联系人对应的第一终端,发送包括第一预定字符串格式和目标联系人的信息数据至目标服务器包括:Optionally, the notifying the target contact identifies the first terminal corresponding to at least one first contact in the corresponding security contact database, and sending the information data including the first predetermined character string format and the target contact to the target server includes :

生成验证字符串;generate the authentication string;

从目标联系人对应的安全联系人库中选择至少一个第一联系人,并通知所述各第一联系人对应的第一终端发送包括第一预定字符串格式和目标联系人的信息数据至目标服务器,所述信息数据还包括所述验证字符串。Select at least one first contact from the secure contact library corresponding to the target contact, and notify the first terminal corresponding to each first contact to send information data including the first predetermined character string format and the target contact to the target server, the information data further includes the verification string.

可选的,所述判断所述信息数据的内容是否匹配预定内容包括:Optionally, the judging whether the content of the information data matches the predetermined content includes:

判断所述信息数据中的字符串中,是否包括所述验证字符串;judging whether the verification character string is included in the character string in the information data;

如果所述信息数据中的字符串中包括所述验证字符串,则通知目标终端启动相应的密码重置操作或者启动相应的安全保护操作。If the character string in the information data includes the verification character string, notify the target terminal to start a corresponding password reset operation or start a corresponding security protection operation.

可选的,在通知目标终端启动相应的密码重置操作或者启动相应的安全保护操作之前,还包括:Optionally, before informing the target terminal to start a corresponding password reset operation or start a corresponding security protection operation, it may further include:

判断目标服务器发送所述通知的时刻,至目标服务器系统当前的时刻之间的时间段是否超过时间阈值;Judging whether the time period between the time when the target server sends the notification and the current time of the target server system exceeds the time threshold;

如果所述时间段未超过,则将相应的第一联系人进行计数;if the time period has not been exceeded, counting the corresponding first contact;

如果所述时间段超过,则不将相应的第一联系人进行计数。If the time period exceeds, the corresponding first contact is not counted.

可选的,所述如果所述信息数据中的字符串与目标服务器中记录的所述第一预定字符串格式匹配上之后,还包括:Optionally, after the character string in the information data matches the first predetermined character string format recorded in the target server, it further includes:

判断已经匹配上的信息数据的,且属于安全联系人库的第一联系人的个数是否达到数量阈值,如果达到,则根据匹配结果通知目标终端启动相应的密码重置操作或者启动相应的安全保护操作。Judging whether the number of first contacts belonging to the security contact database that have been matched with the information data reaches the threshold value, if so, notify the target terminal to start the corresponding password reset operation or start the corresponding security contact according to the matching result. protection operation.

根据本发明的另一方面,提供了一种终端安全保护系统,包括:According to another aspect of the present invention, a terminal security protection system is provided, including:

安全联系人库预置模块,适于将至少一个第一联系人加入针对目标联系人的安全联系人库;其中,所述目标联系人对应目标终端;The secure contact library preset module is adapted to add at least one first contact to the secure contact library for the target contact; wherein, the target contact corresponds to the target terminal;

信息数据处理模块,适于针对目标服务器收到的信息数据,解析其所指向的目标联系人,并判断该信息数据所属的第一联系人是否属于所述目标联系人的安全联系人库,且判断所述信息数据的内容是否匹配预定内容;The information data processing module is adapted to analyze the target contact pointed to by the information data received by the target server, and determine whether the first contact to which the information data belongs belongs to the secure contact database of the target contact, and judging whether the content of the information data matches the predetermined content;

第一通知模块,适于如果所述第一终端对应的第一联系人属于所述目标联系人的安全联系人库,且所述信息数据的内容匹配预定内容,则根据匹配结果通知目标终端启动相应的密码重置操作或者启动相应的安全保护操作。The first notification module is adapted to notify the target terminal to activate A corresponding password reset operation or a corresponding security protection operation is started.

可选的,在目标终端中包括:网页预置模块,适于通过目标联系人登录目标服务器的网页,将待加入安全联系人库的第一联系人发送给目标服务器;Optionally, the target terminal includes: a webpage preset module, adapted to log in the webpage of the target server through the target contact, and send the first contact to be added to the secure contact database to the target server;

进一步的,在目标服务器中,所述安全联系人库预置模块包括:Further, in the target server, the secure contact library preset module includes:

第一添加模块,适于所述目标服务器将所述第一联系人加入对应该目标联系人的安全联系人库;A first adding module, adapted for the target server to add the first contact to a secure contact database corresponding to the target contact;

或者,在目标终端中包括:Alternatively, in the target terminal include:

进一步的,在目标服务器中,所述安全联系人库预置模块包括:Further, in the target server, the secure contact library preset module includes:

第二添加模块,适于当所述标服务器接收到任一第一终端发送的信息数据后,判断所述信息数据是否为所述指定安全验证信息数据,如果是,则将所述第一终端对应的第一联系人加入对应的安全联系人库。The second adding module is adapted to determine whether the information data is the specified security verification information data after the label server receives the information data sent by any first terminal, and if so, send the first terminal The corresponding first contact is added to the corresponding secure contact database.

可选的,所述网站的网页预置模块包括:Optionally, the web page preset module of the website includes:

第一调用模块,适于通过目标终端调用其通讯录接口,从通讯录中选择第一联系人并通知对应的第一终端发送指定安全验证信息数据至目标终端或者目标服务器;The first calling module is adapted to call its address book interface through the target terminal, select the first contact from the address book and notify the corresponding first terminal to send specified security verification information data to the target terminal or target server;

所述第二通知模块包括:The second notification module includes:

第二调用模块,适于通过目标终端调用其通讯录接口,从通讯录中选择第一联系人并通知对应所述第一联系人的第一终端发送指定安全验证信息数据至目标服务器。The second calling module is adapted to call its address book interface through the target terminal, select the first contact from the address book, and notify the first terminal corresponding to the first contact to send specified security verification information data to the target server.

可选的,所述信息数据处理模块包括:Optionally, the information data processing module includes:

解析模块,适于针对目标服务器收到的信息数据,解析所述信息数据指向的目标联系人,并根据所述目标联系人查找对应的安全联系人库;The parsing module is adapted to analyze the target contact pointed to by the information data received by the target server, and search for a corresponding security contact database according to the target contact;

安全联系人判断模块,适于判断发送所述信息数据的第一终端对应的第一联系人是否属于所述安全联系人库;A safe contact judging module, adapted to judge whether the first contact corresponding to the first terminal sending the information data belongs to the safe contact database;

内容匹配模块,适于如果所述第一联系人属于安全联系人库,则将所述信息数据中的内容与目标服务器中记录的预定内容进行匹配。The content matching module is adapted to match the content in the information data with the predetermined content recorded in the target server if the first contact belongs to a secure contact database.

可选的,所述第一通知模块包括:Optionally, the first notification module includes:

信息数据删除模块,适于通知目标终端将指定存储区域中的个性化信息数据,进行删除;The information data deletion module is suitable for notifying the target terminal to delete the personalized information data in the specified storage area;

和/或,信息数据上传删除模块,适于通知目标终端将指定区域中的个性化信息数据上传至指定服务器,并将目标终端中所述个性化信息数据进行删除;And/or, the information data upload and delete module is adapted to notify the target terminal to upload the personalized information data in the specified area to the specified server, and delete the personalized information data in the target terminal;

和/或,定位模块,适于通知目标终端将位置信息数据发送至指定的第二终端;And/or, the positioning module is adapted to notify the target terminal to send the position information data to the designated second terminal;

和/或,锁定模块,适于通知目标终端将屏幕进行锁定;And/or, a locking module, adapted to notify the target terminal to lock the screen;

和/或,拍摄模块,适于通知目标终端启动摄像头进行拍照和/或录像;And/or, the shooting module is adapted to notify the target terminal to start the camera to take pictures and/or video;

和/或,报警模块,适于通知目标终端启动声音系统进行报警。And/or, the alarm module is adapted to notify the target terminal to activate the sound system for alarming.

可选的,所述在所述信息数据处理模块之前还包括:Optionally, the said information data processing module also includes:

第三通知模块,适于通知目标联系人标识对应的安全联系人库中的至少一个第一联系人对应的第一终端,发送包括第一预定字符串格式和目标联系人的信息数据至目标服务器。The third notification module is adapted to notify the first terminal corresponding to at least one first contact in the security contact library corresponding to the target contact identification, and send the information data including the first predetermined character string format and the target contact to the target server .

可选的,所述第三通知模块包括:Optionally, the third notification module includes:

验证字符串生成模块,适于生成验证字符串;A verification string generation module, adapted to generate a verification string;

第四通知模块,适于从目标联系人对应的安全联系人库中选择至少一个安全第一联系人,并通知所述各第一联系人对应的第一终端发送包括第一预定字符串格式的信息数据和目标联系人至目标终端,所述信息数据还包括所述验证字符串。The fourth notification module is adapted to select at least one secure first contact from the secure contact library corresponding to the target contact, and notify the first terminal corresponding to each first contact to send a message including the first predetermined character string format. The information data and the target contact are sent to the target terminal, and the information data also includes the verification character string.

可选的,所述第四信息数据处理模块包括:Optionally, the fourth information data processing module includes:

验证字符串判断模块,适于判断所述信息数据中的字符串中,是否包括所述验证字符串;如果所述信息数据中的字符串中包括所述验证字符串,则根据匹配结果通知目标终端启动相应的密码重置操作或者启动相应的安全保护操作。The verification character string judging module is adapted to judge whether the verification character string is included in the character string in the information data; if the verification character string is included in the character string in the information data, notify the target according to the matching result The terminal starts a corresponding password reset operation or starts a corresponding security protection operation.

可选的,所述第四信息数据处理模块包括:Optionally, the fourth information data processing module includes:

判断目标服务器发送所述通知的时刻,至目标服务器系统当前的时刻之间的时间段是否超过时间阈值;Judging whether the time period between the time when the target server sends the notification and the current time of the target server system exceeds the time threshold;

如果所述时间段未超过,则将相应的第一联系人进行计数;if the time period has not been exceeded, counting the corresponding first contact;

如果所述时间段超过,则不将相应的第一联系人进行计数。If the time period exceeds, the corresponding first contact is not counted.

可选的,在第一通知模块之前还包括:Optionally, before the first notification module, it also includes:

阈值判断模块,适于判断已经匹配上的信息数据的,且属于安全联系人库的第一联系人的个数是否达到数量阈值,如果达到,则根据匹配结果通知目标终端启动相应的密码重置操作或者启动相应的安全保护操作。The threshold judging module is suitable for judging whether the number of first contacts belonging to the secure contact database of the matched information data reaches the quantity threshold, and if so, notifies the target terminal to start corresponding password reset according to the matching result Operate or start the corresponding security protection operation.

根据本发明的一种终端安全保护方法和系统,可以基于预置的安全联系人库,通过目标服务器接收针对终端各种操作的信息数据,并解析所述信息数据,如果所述第一终端对应的第一联系人属于所述目标联系人的安全联系人库,且所述信息数据的内容匹配预定内容,则通知目标终端启动密码重置操作或者启动对目标终端安全保护操作,,然后目标终端则根据通知进行相应操作,比如进行密码重置操作,删除照片,删除短信,备忘录,索取手机定位信息数据、对手机进行锁定、控制手机进行报警等等,由此解决了用户手机遗失后的信息数据安全问题,被盗手机寻找困难的问题,也解决了忘记了密码问题答案、忘记了安全邮箱帐号和密码的问题,密码重置操作繁琐的问题,取得了提高手机等用户终端的安全性,降低终端被盗几率,保证了用户终端信息数据的安全,并且可以简单、方便的对用户的密码进行重置的有益效果。According to a terminal security protection method and system of the present invention, based on the preset security contact database, the target server can receive information data for various operations of the terminal, and analyze the information data. If the first terminal corresponds to If the first contact of the target contact belongs to the security contact database of the target contact, and the content of the information data matches the predetermined content, the target terminal is notified to start a password reset operation or start a security protection operation for the target terminal, and then the target terminal Then perform corresponding operations according to the notification, such as performing password reset operations, deleting photos, deleting text messages, memos, requesting mobile phone location information data, locking the mobile phone, controlling the mobile phone to alarm, etc., thus solving the problem of lost mobile phone information The problem of data security, the difficulty of finding a stolen mobile phone, and the problem of forgetting the answer to the password question, forgetting the account number and password of the safe mailbox, and the problem of cumbersome password reset operation have been solved, and the security of mobile phones and other user terminals has been improved. The probability of the terminal being stolen is reduced, the security of the user terminal information data is ensured, and the user's password can be easily and conveniently reset.

上述说明仅是本发明技术方案的概述,为了能够更清楚了解本发明的技术手段,而可依照说明书的内容予以实施,并且为了让本发明的上述和其它目的、特征和优点能够更明显易懂,以下特举本发明的具体实施方式。The above description is only an overview of the technical solution of the present invention. In order to better understand the technical means of the present invention, it can be implemented according to the contents of the description, and in order to make the above and other purposes, features and advantages of the present invention more obvious and understandable , the specific embodiments of the present invention are enumerated below.

附图说明Description of drawings

通过阅读下文优选实施方式的详细描述,各种其他的优点和益处对于本领域普通技术人员将变得清楚明了。附图仅适于示出优选实施方式的目的,而并不认为是对本发明的限制。而且在整个附图中,用相同的参考符号表示相同的部件。在附图中:Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiment. The drawings are only for the purpose of illustrating a preferred embodiment and are not to be considered as limiting the invention. Also throughout the drawings, the same reference numerals are used to designate the same parts. In the attached picture:

图1示出了根据本发明一个实施例一的一种终端安全保护方法的流程示意图;FIG. 1 shows a schematic flowchart of a terminal security protection method according to Embodiment 1 of the present invention;

图2示出了根据本发明一个实施例二的一种终端安全保护方法的流程示意图;FIG. 2 shows a schematic flowchart of a terminal security protection method according to Embodiment 2 of the present invention;

图3示出了根据本发明一个实施例三的一种终端安全保护方法的流程示意图;FIG. 3 shows a schematic flowchart of a terminal security protection method according to Embodiment 3 of the present invention;

图4示出了根据本发明一个实施例四的一种终端安全保护方法的流程示意图;FIG. 4 shows a schematic flowchart of a terminal security protection method according to Embodiment 4 of the present invention;

图5示出了根据本发明一个实施例五的一种终端安全保护方法的流程示意图;FIG. 5 shows a schematic flowchart of a terminal security protection method according to Embodiment 5 of the present invention;

图6示出了根据本发明一个实施例六的一种终端安全保护的装置的结构示意图;FIG. 6 shows a schematic structural diagram of a device for terminal security protection according to Embodiment 6 of the present invention;

图7示出了根据本发明一个实施例七的一种终端安全保护的装置的结构示意图;FIG. 7 shows a schematic structural diagram of an apparatus for terminal security protection according to Embodiment 7 of the present invention;

图8示出了根据本发明一个实施例八的一种终端安全保护的装置的结构示意图;FIG. 8 shows a schematic structural diagram of an apparatus for terminal security protection according to Embodiment 8 of the present invention;

图9示出了根据本发明一个实施例九的一种终端安全保护的装置的结构示意图;FIG. 9 shows a schematic structural diagram of a device for terminal security protection according to Embodiment 9 of the present invention;

图10示出了根据本发明一个实施例九的一种终端安全保护的装置的结构示意图。FIG. 10 shows a schematic structural diagram of an apparatus for terminal security protection according to Embodiment 9 of the present invention.

具体实施方式detailed description

下面将参照附图更详细地描述本公开的示例性实施例。虽然附图中显示了本公开的示例性实施例,然而应当理解,可以以各种形式实现本公开而不应被这里阐述的实施例所限制。相反,提供这些实施例是为了能够更透彻地理解本公开,并且能够将本公开的范围完整的传达给本领域的技术人员。Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

本发明的核心思想之一是:将目标终端指定的并且对方同意的安全第一联系人加入对应该安全第一联系人的安全联系人库;然后通过目标服务器接收针对终端各种操作的信息数据,并解析所述信息数据,如果所述第一终端对应的第一联系人属于所述目标联系人的安全联系人库,且所述信息数据的内容匹配预定内容时,则启动对目标终端的密码重置操作或者启动对目标终端安全保护操作,比如重置手机中的加密区域的密码、删除手机中的照片、删除手机中的短信、删除手机中的备忘录等信息数据、锁定手机屏幕、发送手机位置信息数据等。One of the core ideas of the present invention is: add the first security contact designated by the target terminal and agreed by the other party to the security contact database corresponding to the first security contact; and then receive information data for various operations of the terminal through the target server , and parse the information data, if the first contact corresponding to the first terminal belongs to the secure contact database of the target contact, and the content of the information data matches the predetermined content, start the target terminal Password reset operations or start security protection operations on the target terminal, such as resetting the password of the encrypted area in the mobile phone, deleting photos in the mobile phone, deleting text messages in the mobile phone, deleting memos and other information data in the mobile phone, locking the mobile phone screen, sending Mobile phone location information data, etc.

实施例一Embodiment one

参照图1,其示出了本发明一种终端安全保护方法实施例一的流程示意图,具体可以包括:Referring to FIG. 1 , it shows a schematic flowchart of Embodiment 1 of a terminal security protection method according to the present invention, which may specifically include:

步骤110,将至少一个第一联系人加入针对目标联系人的安全联系人库;其中,所述目标联系人对应目标终端;Step 110, adding at least one first contact to the secure contact database for the target contact; wherein, the target contact corresponds to the target terminal;

在本发明实施例中,可预先在目标服务器中预置安全联系人库,其预置的方式可以有多种,目标联系人与安全联系人库一一对应。在本发明实施例中,第一联系人和目标联系人均可为手机号。In the embodiment of the present invention, a secure contact database may be preset in the target server in various manners, and the target contacts are in one-to-one correspondence with the secure contact database. In the embodiment of the present invention, both the first contact person and the target contact person can be mobile phone numbers.

在本发明实施例中,目标终端本身也可为第一终端。目标联系人可加入自己的安全联系人库。In this embodiment of the present invention, the target terminal itself may also be the first terminal. Target contacts can be added to their own secure contact database.

优选的,所述将至少一个第一联系人加入针对目标联系人的安全联系人库包括:Preferably, adding at least one first contact to the secure contact database for the target contact includes:

步骤S101,通过目标联系人登录目标服务器的网站,将待加入安全联系人库的第一联系人发送给目标服务器;所述目标服务器将所述第一联系人加入对应该目标联系人的安全联系人库;Step S101, log in the website of the target server through the target contact, and send the first contact to be added to the secure contact database to the target server; the target server adds the first contact to the security contact corresponding to the target contact People library;

第一种方式是由当前用户登录目标服务器的网站,在该网站的网页中输入需要加入其安全联系人库的第一联系人,比如其亲友的手机号等,然后服务器收到这些第一联系人后,即可将第一联系人加入与该用户的手机号(即目标联系人)对应的安全联系人库中。The first method is that the current user logs in to the website of the target server, and enters the first contacts that need to be added to its secure contact database on the web page of the website, such as the mobile phone numbers of their relatives and friends, and then the server receives these first contacts After the user is identified, the first contact can be added to the secure contact database corresponding to the user's mobile phone number (ie, the target contact).

可选的,所述通过目标联系人登录目标服务器的网站,将待加入安全联系人库的第一联系人发送给目标服务器包括:Optionally, the logging into the website of the target server through the target contact, and sending the first contact to be added to the secure contact database to the target server includes:

步骤S1011,通过目标终端调用其通讯录接口,从通讯录中选择待加入安全联系人库的第一联系人,并将其发送至目标服务器。In step S1011, the target terminal invokes its address book interface, selects the first contact to be added to the secure contact database from the address book, and sends it to the target server.

用户在使用目标终端(比如手机)登录目标服务器的网站后,可在目标终端中调用通讯录,选择其中的联系人输入网网页,然后发送至目标服务器,目标服务器可将接收到的第一联系人加入该手机号的安全联系人库。After using the target terminal (such as a mobile phone) to log in to the website of the target server, the user can call the address book in the target terminal, select the contacts in the input web page, and then send it to the target server, and the target server can send the first contact received. People can be added to the secure contact database of the mobile phone number.

或者,步骤S102,通知至少一个安全联系人标识对应的第一终端,发送指定安全验证信息数据至目标服务器;当所述标服务器接收到任一第一终端发送的信息数据后,判断所述信息数据是否为所述指定安全验证信息数据,如果是,则将所述第一终端对应的第一联系人加入对应的安全联系人库。Or, step S102, notify the first terminal corresponding to at least one security contact identifier, and send the specified security verification information data to the target server; when the target server receives the information data sent by any first terminal, judge the information Whether the data is the specified security verification information data, and if so, adding the first contact corresponding to the first terminal into the corresponding secure contact database.

第二种方式,是当前用户通知其他用户采用其手机(即第一终端)发送安全验证信息至目标服务器,那么服务器则将发送了符合要求的安全验证信息的手机号,加入对应该用户手机号的安全联系人库。The second method is that the current user notifies other users to send security verification information to the target server using their mobile phone (namely the first terminal), then the server will send the mobile phone number that meets the requirements of the security verification information, and add the mobile phone number corresponding to the user secure contact library.

为了预置安全联系人库,则当前用户可通过其手机向某一个或者某些个手机号码发送短信,通知这些手机号码所在的手机设备(第一终端)向目标服务器发送安全验证信息数据,比如发送指定的验证字符串和/或第二预定字符串格式的信息数据。其中验证字符串可由当前用户的手机设备生成,第二预定字符串格式也可预先约定,比如约定其他手机发送“***验证字符串%%%”格式的短信,至目标服务器。In order to preset the secure contact database, the current user can send a short message to one or some mobile phone numbers through his mobile phone, and notify the mobile device (first terminal) where these mobile phone numbers are located to send security verification information data to the target server, such as Sending the specified verification character string and/or the information data in the format of the second predetermined character string. Wherein the verification character string can be generated by the current user's mobile phone device, and the second predetermined character string format can also be pre-agreed, such as agreeing to other mobile phones to send a short message in the format of "*** verification character string %%%" to the target server.

当目标服务器接收到任一第一终端发送的信息数据后,判断所述信息数据是否为所述指定安全验证信息数据,如果是,则将所述第一终端对应的第一联系人加入安全联系人库;所述指定安全验证信息数据包括:验证字符串和/或第二预定字符串格式的信息数据。After receiving the information data sent by any first terminal, the target server judges whether the information data is the specified security verification information data, and if so, adds the first contact corresponding to the first terminal to the security contact Person database; the specified security verification information data includes: verification character string and/or information data in a second predetermined character string format.

可选的,所述通知至少一个安全联系人标识对应的第一终端,发送指定安全验证信息数据至目标服务器包括:Optionally, the notifying the first terminal corresponding to at least one security contact identifier, and sending the specified security verification information data to the target server includes:

步骤S1021,通过目标终端调用其通讯录接口,从通讯录中选择第一联系人并通知对应所述第一联系人的第一终端发送指定安全验证信息数据至目标服务器。In step S1021, the target terminal invokes its address book interface, selects a first contact from the address book, and notifies the first terminal corresponding to the first contact to send designated security verification information data to the target server.

比如当前用户登录网站后,在手机中调用通讯录接口,从通讯录中选择第一联系人,然后发送给目标服务器,目标服务器则向这些第一联系人发送“发送指定安全验证信息数据至目标服务器”类似信息的通知。还比如,当前用户直接在手机中调用通讯录接口,从通讯录中选择第一联系人,然后直向第一联系人的手机“发送指定安全验证信息数据至目标服务器”类似信息的通知短信,比如***请求让你成为他的安全第一联系人,如果您确认,则发送格式为“***验证字符串%%%”的信息数据至该手机号码(或者目标服务器),其中安全验证字符串为*****)。For example, after the current user logs in to the website, he calls the address book interface in the mobile phone, selects the first contact from the address book, and then sends it to the target server, and the target server sends the "send specified security verification information data to the target" to these first contacts Server" notification of similar information. For another example, the current user directly calls the address book interface in the mobile phone, selects the first contact from the address book, and then directly sends a notification message similar to "send the specified security verification information data to the target server" to the first contact's mobile phone, For example, *** requests you to be his first security contact. If you confirm, then send information data in the format of "*** verification string %%%" to the mobile phone number (or target server), where security The verification string is *****).

步骤120,针对目标服务器收到的信息数据,解析其所指向的目标联系人,并判断该信息数据所属的第一联系人是否属于所述目标联系人的安全联系人库,且判断所述信息数据的内容是否匹配预定内容;Step 120, analyzing the target contact pointed to by the information data received by the target server, and judging whether the first contact to which the information data belongs belongs to the secure contact database of the target contact, and judging that the information Whether the content of the data matches the predetermined content;

在本发明实施例中,第一联系人可以通过多种方式可以向目标服务器发送信息数据,比如通过第一联系人登录目标服务器,然后以网页数据的形式向目标服务器发送信息数据;目标服务器则解析网页数据形式的信息数据,解析其所指向的目标联系人,根据该目标联系人查找安全联系人库,然后判断该信息数据所属的第一联系人是否属于所述该安全联系人库;判断该信息数据的内容是否匹配预定内容。比如在预先约定的网页数据行驶的内容中是否包括相应字符串。In the embodiment of the present invention, the first contact person can send information data to the target server in various ways, such as logging in the target server through the first contact person, and then sending the information data to the target server in the form of webpage data; the target server then Analyzing the information data in the form of web page data, analyzing the target contact it points to, searching the safe contact database according to the target contact, and then judging whether the first contact to which the information data belongs belongs to the described safe contact database; judging Whether the content of the information data matches the predetermined content. For example, whether the corresponding character string is included in the content of the pre-agreed web page data travel.

又比如,第一联系人直接采用第一终端发送短信至目标服务器。目标服务器则解析该短信,判断短信中所指向的目标联系人,根据该目标联系人查找安全联系人库,然后判断发送该短信的第一联系人是否属于所述该安全联系人库;判断该短信的字符串格式是否匹配预定字符串格式。For another example, the first contact directly uses the first terminal to send a short message to the target server. The target server then parses the note, judges the target contact pointed to in the note, searches the safe contact database according to the target contact, and then judges whether the first contact who sends the note belongs to the safe contact database; Whether the string format of the SMS matches the predetermined string format.

可选的,所述针对目标服务器收到的信息数据,解析其所指向的目标联系人,并判断该信息数据所属的第一联系人是否属于所述目标联系人的安全联系人库,且判断所述信息数据的内容是否匹配预定内容包括:Optionally, analyzing the target contact pointed to by the information data received by the target server, and judging whether the first contact to which the information data belongs belongs to the secure contact database of the target contact, and judging Whether the content of the information data matches the predetermined content includes:

步骤S121,针对目标服务器收到的信息数据,解析所述信息数据指向的目标联系人,并根据所述目标联系人查找对应的安全联系人库;Step S121, for the information data received by the target server, analyze the target contact pointed to by the information data, and search the corresponding secure contact database according to the target contact;

在本发明实施例中,由于每个第一联系人可能会被多个目标联系人设置为其安全联系库中的第一联系人。因此,在第一终端发送信息数据时,也需指明其所指向的目标联系人,如果查到目标联系人,则查找对应的安全联系人库。如果未查到,则停止后续处理。In the embodiment of the present invention, since each first contact may be set as the first contact in its secure contact database by multiple target contacts. Therefore, when the first terminal sends information data, it also needs to specify the target contact it points to, and if the target contact is found, then search the corresponding secure contact database. If not found, then stop subsequent processing.

步骤S122,判断发送所述信息数据的第一终端对应的第一联系人是否属于所述安全联系人库;Step S122, judging whether the first contact corresponding to the first terminal sending the information data belongs to the secure contact database;

当查到安全联系人库后,则判断该信息数据对应的第一联系人是否属于该安全联系人库,如果属于,则进入步骤S123,如果不属于,则停止后续处理。When the secure contact database is found, it is judged whether the first contact corresponding to the information data belongs to the secure contact database, if yes, then enter step S123, if not, then stop subsequent processing.

步骤S123,如果所述第一联系人属于安全联系人库,则将所述信息数据中的内容与目标服务器中记录的预定内容进行匹配。Step S123, if the first contact belongs to the secure contact database, match the content in the information data with the predetermined content recorded in the target server.

比如对于网页数据形式的信息数据,则可判断其中是否包括预定指令比如“suoding”的字词等;比如对于短信,则可判断其字符串格式是否为“suoding#”等。For example, for information data in the form of web page data, it can be judged whether it includes predetermined instructions such as words such as "suoding"; for example, for short messages, it can be judged whether its string format is "suoding#".

步骤130,如果所述第一终端对应的第一联系人属于所述目标联系人的安全联系人库,且所述信息数据的内容匹配预定内容,则根据匹配结果通知目标终端启动相应的密码重置操作或者启动相应的安全保护操作。Step 130: If the first contact corresponding to the first terminal belongs to the target contact's secure contact database, and the content of the information data matches the predetermined content, notify the target terminal to start the corresponding password reset according to the matching result. Configure the operation or start the corresponding security protection operation.

在本发明实施例中,可能存在多种预定内容,每种预定内容又可对应某种通知,那么本发明实施例中则根据匹配结果选择相应类型的通知,然后在通知目标终端执行相应操作。然后在目标终端中,也会设置相应的执行模块,以根据通知执行相应操作。在本发明中所述操作比如进行密码重置操作,删除照片,删除短信,删除备忘录,索取手机定位信息数据、对手机进行锁定、控制手机进行报警等等。在本发明实施例中,即由服务器发送指令通知目标终端启动密码重置相关线程以执行秘密重置操作或者启动相应的安全保护相关线程以执行安全保护操作。In the embodiment of the present invention, there may be multiple types of predetermined content, and each predetermined content may correspond to a certain notification. In the embodiment of the present invention, the corresponding type of notification is selected according to the matching result, and then the corresponding operation is performed on the notification target terminal. Then, in the target terminal, a corresponding execution module will also be set to perform corresponding operations according to the notification. The operations described in the present invention are such as performing a password reset operation, deleting photos, deleting short messages, deleting memos, requesting mobile phone location information data, locking the mobile phone, controlling the mobile phone to give an alarm, and the like. In the embodiment of the present invention, the server sends an instruction to notify the target terminal to start a password reset related thread to perform a secret reset operation or start a corresponding security protection related thread to perform a security protection operation.

可选的,所述通知目标终端启动对目标终端安全保护操作包括:Optionally, the notifying the target terminal to start a security protection operation on the target terminal includes:

通知目标终端将指定存储区域中的个性化信息数据,进行删除;Notify the target terminal to delete the personalized information data in the specified storage area;

和/或,通知目标终端将指定区域中的个性化信息数据上传至指定服务器,并将目标终端中所述个性化信息数据进行删除;And/or, notify the target terminal to upload the personalized information data in the specified area to the specified server, and delete the personalized information data in the target terminal;

和/或,通知目标终端将位置信息数据发送至指定的第二终端;And/or, notify the target terminal to send the location information data to the designated second terminal;

和/或,通知目标终端将屏幕进行锁定;And/or, notify the target terminal to lock the screen;

和/或,通知目标终端启动摄像头进行拍照和/或录像;And/or, notify the target terminal to start the camera to take pictures and/or video;

和/或,通知目标终端启动声音系统进行报警。And/or, notify the target terminal to activate the sound system for alarming.

在本发明实施例中,目标服务器的每种通知均可理解为一种指令,在目标终端会设置相应的模块,能获取目标终端系统的执行权限,当接收到前述指令后,即可执行相应的动作。In the embodiment of the present invention, each notification from the target server can be understood as an instruction, and a corresponding module will be installed on the target terminal to obtain the execution authority of the target terminal system. After receiving the aforementioned instruction, the corresponding module can be executed. Actions.

可选的,所述如果所述信息数据中的字符串与目标服务器中记录的所述第一预定字符串格式匹配上之后,还包括:Optionally, after the character string in the information data matches the first predetermined character string format recorded in the target server, it further includes:

步骤A120,判断已经匹配上的信息数据的,且属于安全联系人库的第一联系人的个数是否达到数量阈值,如果达到,则根据匹配结果通知目标终端启动相应的密码重置操作或者启动相应的安全保护操作。Step A120, judging whether the number of first contacts that have been matched with the information data and belonging to the secure contact database reaches the quantity threshold, and if so, notify the target terminal to start the corresponding password reset operation or start the password reset operation according to the matching result. corresponding security protection operations.

本发明实施例中,为了降低目标终端的误操作,则需要目标服务器在发送通知时,针对每个目标终端统计发送信息数据给服务器的属于第一联系人的终端的个数,在达到个数之后,才根据匹配结果通知目标终端启动相应的密码重置操作或者启动相应的安全保护操作。In the embodiment of the present invention, in order to reduce the misoperation of the target terminal, the target server needs to count the number of terminals belonging to the first contact that send information data to the server for each target terminal when sending the notification, and when the number reaches Then, according to the matching result, the target terminal is notified to start a corresponding password reset operation or start a corresponding security protection operation.

本发明实施例,可以基于预置的安全联系人库,通过目标服务器接收针对终端各种操作的信息数据,并解析所述信息数据,如果所述第一终端对应的第一联系人属于所述目标联系人的安全联系人库,且所述信息数据的内容匹配预定内容,则通知目标终端启动密码重置操作或者启动对目标终端安全保护操作,,然后目标终端则根据通知进行相应操作,比如进行密码重置操作,删除照片,删除短信,备忘录,索取手机定位信息数据、对手机进行锁定、控制手机进行报警等等,由此解决了用户手机遗失后的信息数据安全问题,被盗手机寻找困难的问题,也解决了忘记了密码问题答案、忘记了安全邮箱帐号和密码的问题,密码重置操作繁琐的问题,取得了提高手机等用户终端的安全性,降低终端被盗几率,保证了用户终端信息数据的安全,并且可以简单、方便的对用户的密码进行重置的有益效果。In the embodiment of the present invention, based on the preset secure contact database, the target server may receive information data for various operations of the terminal, and analyze the information data. If the first contact corresponding to the first terminal belongs to the The target contact’s security contact database, and the content of the information data matches the predetermined content, then notify the target terminal to start the password reset operation or start the target terminal security protection operation, and then the target terminal performs corresponding operations according to the notification, such as Perform password reset operations, delete photos, delete text messages, memos, request mobile phone location information data, lock mobile phones, control mobile phones to alarm, etc., thus solving the problem of information and data security after the user's mobile phone is lost Difficult problems, but also solve the problems of forgetting the answer to the password question, forgetting the account number and password of the secure mailbox, and the problem of cumbersome password reset operation, which improves the security of user terminals such as mobile phones, reduces the probability of terminal theft, and ensures The user terminal information data is safe, and the user's password can be easily and conveniently reset.

实施例二Embodiment two

参照图2,其示出了本发明一种终端安全保护方法实施例二的流程示意图,具体可以包括:Referring to FIG. 2 , it shows a schematic flowchart of Embodiment 2 of a terminal security protection method according to the present invention, which may specifically include:

步骤210,将至少一个第一联系人加入针对目标联系人的安全联系人库;其中,所述目标联系人对应目标终端;Step 210, adding at least one first contact to the secure contact database for the target contact; wherein, the target contact corresponds to the target terminal;

本步骤与步骤110类似,在此不再详述。This step is similar to step 110 and will not be described in detail here.

步骤220,第一终端登录目标服务器所在的网站;Step 220, the first terminal logs in to the website where the target server is located;

第一终端过wifi、或者GPRS、或者其他方式登录目标服务器所在的网站。The first terminal logs in the website where the target server is located through wifi, or GPRS, or other methods.

步骤230,第一终端通过所述网站的网页将包括目标联系人和安全指令的信息数据传送给目标服务器;Step 230, the first terminal transmits information data including target contacts and security instructions to the target server through the webpage of the website;

第一终端打开所述网站的网页后,即可在网页中输入目标联系人,选择其要执行的操作,比如进行密码重置操作,删除照片,删除短信,备忘录,索取手机定位信息数据、对手机进行锁定、控制手机进行报警等,然后将这些网页形式的信息数据传送给目标服务器。After the first terminal opens the webpage of the website, it can input the target contact in the webpage and select the operation to be performed, such as performing a password reset operation, deleting photos, deleting text messages, memos, requesting mobile phone location information data, Lock the mobile phone, control the mobile phone to alarm, etc., and then transmit the information data in the form of web pages to the target server.

在本发明实施例中,可预先在网页中设置前述各种操作的选项,以待用户选择。In the embodiment of the present invention, the aforementioned various operation options may be pre-set in the webpage, waiting for the user to select.

步骤240,针对目标服务器收到的信息数据,解析所述信息数据指向的目标联系人,并根据所述目标联系人查找对应的安全联系人库;Step 240, for the information data received by the target server, analyze the target contact pointed to by the information data, and search the corresponding secure contact database according to the target contact;

目标服务器则解析上述信息数据中的目标联系人,以该目标联系人查找对应的安全联系人库;如果查到,则进入步骤250,如果没查到,则可停止后续处理。The target server analyzes the target contact in the above information data, and uses the target contact to search for the corresponding security contact database; if found, proceed to step 250; if not found, then stop subsequent processing.

步骤250,根据第一终端的登录信息,判断该第一终端对应的第一联系人是否属于所述安全联系人库;Step 250, according to the login information of the first terminal, judge whether the first contact corresponding to the first terminal belongs to the secure contact database;

如果查到相应的安全联系人库,则根据第一终端登录后的cookie等信息,提取第一终端对应的第一联系人,判断其是否属于所述安全联系人库;如果属于,则进入步骤260,如果不属于,则可停止后续处理。If the corresponding secure contact database is found, then according to information such as cookies after the first terminal logs in, extract the first contact corresponding to the first terminal, and judge whether it belongs to the secure contact database; if it does, then enter the step 260. If not, the subsequent processing may be stopped.

步骤260,如果所述第一联系人属于安全联系人库,则将所述信息数据中的内容与目标服务器中记录的预定内容进行匹配。Step 260, if the first contact belongs to the secure contact database, match the content in the information data with the predetermined content recorded in the target server.

在本发明实施例中,则提取信息数据中的与操作相关的内容,比如进行密码重置操作,删除照片,删除短信,删除备忘录,索取手机定位信息数据、对手机进行锁定等某个内容,然后与预定的内容进行匹配,匹配上了,则进入步骤270。匹配不上,则可停止后续处理。In the embodiment of the present invention, the content related to the operation in the information data is extracted, such as performing password reset operations, deleting photos, deleting text messages, deleting memos, requesting mobile phone location information data, locking the mobile phone, etc. Then match with the predetermined content, if matched, then enter step 270 . If there is no match, the subsequent processing can be stopped.

步骤270,则根据匹配结果通知目标终端启动相应的密码重置操作或者启动相应的安全保护操作。In step 270, the target terminal is notified to start a corresponding password reset operation or start a corresponding security protection operation according to the matching result.

该步骤与步骤130类似,在此不再详述。This step is similar to step 130 and will not be described in detail here.

本发明实施例中,终端可以登录目标服务器的网站进行相应操作。解决了用户手机遗失后的信息数据安全问题,被盗手机寻找困难的问题,也解决了忘记了密码问题答案、忘记了安全邮箱帐号和密码的问题,密码重置操作繁琐的问题。In the embodiment of the present invention, the terminal can log in to the website of the target server to perform corresponding operations. It solves the problem of information and data security after the user's mobile phone is lost, and the problem of difficulty in finding a stolen mobile phone. It also solves the problem of forgetting the answer to the password question, forgetting the account number and password of the secure mailbox, and the problem of cumbersome password reset operations.

实施例三Embodiment Three

参照图3,,其示出了本发明一种终端安全保护方法实施例三的流程示意图,具体可以包括:Referring to FIG. 3 , it shows a schematic flowchart of Embodiment 3 of a terminal security protection method according to the present invention, which may specifically include:

步骤310,将至少一个第一联系人加入针对目标联系人的安全联系人库;其中,所述目标联系人对应目标终端;Step 310, adding at least one first contact to the secure contact database for the target contact; wherein, the target contact corresponds to the target terminal;

本步骤与步骤110类似,在此不再详述。This step is similar to step 110 and will not be described in detail here.

步骤320,第一终端发送包括第一预定格式的短信至目标服务器;Step 320, the first terminal sends a short message including a first predetermined format to the target server;

即终端可以发送短信至目标服务器,其中,短信需按第一预定格式进行编辑,目标服务器才能进行后续处理。That is, the terminal can send a short message to the target server, wherein the short message needs to be edited according to the first predetermined format before the target server can perform subsequent processing.

本发明实施例中,可预先约定第一预定格式的字符串对应不同的操作。比如“shanchu#验证字符串”对应将目标终端中指定存储区域中的个性化信息数据,进行删除;“suoding#验证字符串”对应将目标终端的屏幕进行锁定;“paishe#验证字符串”对应启动目标终端的摄像头进行拍照和/或录像;“baojing#验证字符串”对应,启动目标终端的声音系统进行报警等。In the embodiment of the present invention, it may be pre-agreed that character strings in the first predetermined format correspond to different operations. For example, "shanchu#verification string" corresponds to deleting the personalized information data in the specified storage area of the target terminal; "suoding#verification string" corresponds to locking the screen of the target terminal; "paishe#verification string" corresponds to Start the camera of the target terminal to take pictures and/or record videos; corresponding to "baojing#verification string", start the sound system of the target terminal to send an alarm, etc.

在本发明实施例中,第一预定格式还可增加目标联系人的发送格式,比如“mubiao#手机号”。In the embodiment of the present invention, the first predetermined format may also add the sending format of the target contact, such as "mubiao#mobile phone number".

步骤330,针对目标服务器收到的短信,解析短信所指向的目标联系人,并根据所述目标联系人查找对应的安全联系人库;Step 330, for the short message received by the target server, analyze the target contact pointed to by the short message, and search the corresponding secure contact database according to the target contact;

如前所述,则解析短信“mubiao#手机号”中的手机号码,然后查找该手机号码对应的安全联系人库;如果查到,则进入步骤340,如果差不到,则可停止后续处理。As previously mentioned, then analyze the mobile phone number in the short message "mubiao#mobile phone number", and then search for the corresponding safe contact library of the mobile phone number; if found, then enter step 340, if the difference is less than, then the follow-up processing can be stopped .

步骤340,提取发送所述短信的第一设备所对应的第一联系人,判断所述第一联系人是否属于所述安全联系人库;Step 340, extracting the first contact corresponding to the first device that sent the short message, and judging whether the first contact belongs to the secure contact database;

每条短信均可提取其对应的发送的手机号码,如此则可判断所述手机号码是否属于所述安全联系人库;如果是,则进入步骤350,如果不是则可停止后续处理。Each short message can extract its corresponding mobile phone number sent, so it can be judged whether the mobile phone number belongs to the safe contact database; if yes, then enter step 350, if not, then stop subsequent processing.

步骤350,如果所述第一联系人属于安全联系人库,则将所述短信的字符串与目标服务器中记录的第一预定格式字符串进行匹配;Step 350, if the first contact belongs to the secure contact database, match the character string of the short message with the first predetermined format character string recorded in the target server;

比如短信内容中是否包括“shanchu#验证字符串”,如果包括,则进入步骤360,如果不包括则停止后续处理。For example, whether "shanchu#verification character string" is included in the content of the short message, if included, then enter step 360, if not included, then stop subsequent processing.

步骤360,则根据匹配结果通知目标终端启动相应的密码重置操作或者启动相应的安全保护操作。In step 360, the target terminal is notified to start a corresponding password reset operation or start a corresponding security protection operation according to the matching result.

该步骤与步骤130类似,在此不再详述。This step is similar to step 130 and will not be described in detail here.

本发明实施例中,终端以发送短信的形式至目标服务器,然后目标服务器进行分析和通知。解决了用户手机遗失后的信息数据安全问题,被盗手机寻找困难的问题,也解决了忘记了密码问题答案、忘记了安全邮箱帐号和密码的问题,密码重置操作繁琐的问题。In the embodiment of the present invention, the terminal sends a short message to the target server, and then the target server performs analysis and notification. It solves the problem of information and data security after the user's mobile phone is lost, and the problem of difficulty in finding a stolen mobile phone. It also solves the problem of forgetting the answer to the password question, forgetting the account number and password of the secure mailbox, and the problem of cumbersome password reset operations.

实施例四Embodiment Four

参照图4,,其示出了本发明一种终端安全保护方法实施例四的流程示意图,具体可以包括:Referring to FIG. 4 , it shows a schematic flowchart of Embodiment 4 of a terminal security protection method according to the present invention, which may specifically include:

步骤410,将至少一个第一联系人加入针对目标联系人的安全联系人库;其中,所述目标联系人对应目标终端;Step 410, adding at least one first contact to the secure contact database for the target contact; wherein, the target contact corresponds to the target terminal;

步骤420,通知目标联系人标识对应的安全联系人库中的至少一个第一联系人对应的第一终端,发送包括第一预定字符串格式和目标联系人的信息数据至目标服务器。Step 420, notify the target contact to identify the first terminal corresponding to at least one first contact in the corresponding secure contact database, and send the information data including the first predetermined character string format and the target contact to the target server.

在本发明实施例中,比如目标终端需要重置其中某个加密区域的密码,则可通过本端发送短信至各安全联系人库中的第一联系人对应的第一终端中,通知其发送包括第一预定字符串格式和目标联系人的信息数据至目标服务器。In the embodiment of the present invention, for example, if the target terminal needs to reset the password of one of the encrypted areas, it can send a short message to the first terminal corresponding to the first contact in each secure contact database through the local terminal, informing it to send Information data including the first predetermined character string format and the target contact is sent to the target server.

如果用户手机被盗,还可通过其他方式通知安全联系人库中的至少一个第一联系人对应的第一终端至目标服务器,比如采用其他终端发送短信给安全联系人库中的至少一个第一联系人对应的第一终端。If the user's mobile phone is stolen, the first terminal corresponding to at least one first contact in the safe contact database can also be notified to the target server in other ways, such as using other terminals to send text messages to at least one first contact in the safe contact database. The first terminal corresponding to the contact.

可选的,所述通知目标联系人标识对应的安全联系人库中的至少一个第一联系人对应的第一终端,发送包括第一预定字符串格式和目标联系人的信息数据至目标服务器包括:Optionally, the notifying the target contact identifies the first terminal corresponding to at least one first contact in the corresponding security contact database, and sending the information data including the first predetermined character string format and the target contact to the target server includes :

步骤S421,生成验证字符串;Step S421, generating a verification character string;

在本发明实施例中,可要求第一终端发送包括验证字符串的第一指定格式字符串的信息。比如123.In this embodiment of the present invention, the first terminal may be required to send the information including the first specified format string of the verification string. Such as 123.

当然在本发明实施例中该步骤可以去除,采用恒定的验证字符串,比如采用用户设置的防盗密码。Of course, this step can be eliminated in the embodiment of the present invention, and a constant verification character string is used, such as an anti-theft password set by the user.

步骤S422,从目标联系人对应的安全联系人库中选择至少一个第一联系人,并通知所述各第一联系人对应的第一终端发送包括第一预定字符串格式和目标联系人的信息数据至目标服务器,所述信息数据还包括所述验证字符串。Step S422, select at least one first contact from the secure contact library corresponding to the target contact, and notify the first terminal corresponding to each first contact to send information including the first predetermined character string format and the target contact data to the target server, the information data also includes the verification string.

比如用户需要锁定手机屏幕,则通知第一联系人发送suoding#123给目标服务器。For example, if the user needs to lock the screen of the mobile phone, the first contact is notified to send suoding#123 to the target server.

步骤430,针对目标服务器收到的信息数据,解析其所指向的目标联系人,并判断该信息数据所属的第一联系人是否属于所述目标联系人的安全联系人库,且判断所述信息数据的内容是否匹配预定内容;Step 430: Analyze the target contact pointed to by the information data received by the target server, and determine whether the first contact to which the information data belongs belongs to the secure contact database of the target contact, and determine whether the information data Whether the content of the data matches the predetermined content;

在本发明实施例中,可先解析其所指向的目标联系人,然后判断该信息数据所属的第一联系人是否属于所述目标联系人的安全联系人库,再将所述信息中的字符串与目标终端中记录的所述第一预定字符串格式进行匹配。In the embodiment of the present invention, the target contact pointed to by it can be analyzed first, and then it is judged whether the first contact to which the information data belongs belongs to the secure contact database of the target contact, and then the characters in the information The string is matched with the first predetermined string format recorded in the target terminal.

对应步骤S422,可选的,所述判断所述信息数据的内容是否匹配预定内容包括:Corresponding to step S422, optionally, the judging whether the content of the information data matches the predetermined content includes:

步骤S431,判断所述信息数据中的字符串中,是否包括所述验证字符串;Step S431, judging whether the character string in the information data includes the verification character string;

判断所述第一预定格式字符串中是否包括123。It is judged whether the first predetermined format string includes 123.

步骤S432,如果所述信息数据中的字符串中包括所述验证字符串,则进入步骤440。Step S432, if the character string in the information data includes the verification character string, go to step 440.

可选的,在通知目标终端启动相应的密码重置操作或者启动相应的安全保护操作之前,还包括:Optionally, before informing the target terminal to start a corresponding password reset operation or start a corresponding security protection operation, it may further include:

步骤S433,判断目标服务器发送所述通知的时刻,至目标服务器系统当前的时刻之间的时间段是否超过时间阈值;Step S433, judging whether the time period between the time when the target server sends the notification and the current time of the target server system exceeds the time threshold;

如果所述时间段未超过,则将相应的第一联系人进行计数;if the time period has not been exceeded, counting the corresponding first contact;

如果所述时间段超过,则不将相应的第一联系人进行计数。If the time period exceeds, the corresponding first contact is not counted.

比如,如果发送通知的时间为某日的11:00,但接收的时间为次日的12:00,而时间阈值为24小时之内,那么则不将相应的第一联系人进行计数;如果发送通知的时间为某日的11:00,但接收的时间为次日的9:00,而时间阈值为24小时之内,那么则将相应的第一联系人进行计数,即计数+1。For example, if the notification is sent at 11:00 of a certain day but received at 12:00 of the next day, and the time threshold is within 24 hours, then the corresponding first contact will not be counted; if If the notification is sent at 11:00 of a certain day, but the notification is received at 9:00 of the next day, and the time threshold is within 24 hours, then the corresponding first contact is counted, that is, the count is +1.

如此,可降低目标终端误操作的几率。In this way, the probability of misoperation of the target terminal can be reduced.

可选的,所述如果所述信息数据中的字符串与目标服务器中记录的所述第一预定字符串格式匹配上之后,还包括:Optionally, after the character string in the information data matches the first predetermined character string format recorded in the target server, it further includes:

步骤S435,判断已经匹配上的信息数据的,且属于安全联系人库的第一联系人的个数是否达到数量阈值,如果达到,则进入步骤440。Step S435 , judging whether the number of first contacts that have been matched with the information data and belonging to the secure contact database reaches the quantity threshold, and if so, proceed to step 440 .

本步骤可设置了第一联系人的个数阈值,比如3个,当判断已经匹配上的信息数据对应的第一联系人个数达到数量阈值,则启动对目标终端的密码重置操作或者启动对目标终端安全保护操作,可进一步降低目标终端的误操作。This step can set the number threshold of the first contact, such as 3, when it is judged that the number of the first contact corresponding to the matched information data reaches the threshold, start the password reset operation on the target terminal or start The security protection operation of the target terminal can further reduce the misoperation of the target terminal.

步骤440,如果所述第一终端对应的第一联系人属于所述目标联系人的安全联系人库,且所述信息数据的内容匹配预定内容,则根据匹配结果通知目标终端启动相应的密码重置操作或者启动相应的安全保护操作。Step 440: If the first contact corresponding to the first terminal belongs to the secure contact database of the target contact, and the content of the information data matches the predetermined content, notify the target terminal to start the corresponding password reset according to the matching result. Configure the operation or start the corresponding security protection operation.

如前所述,本发明实施例中对目标终端有多种处理方式,各种方式或者某几种方式的组合均可对应一个第一预定字符串格式的类型。比如“shanchu#验证字符串”对应将目标终端中指定存储区域中的个性化信息数据,进行删除;“suoding#验证字符串”对应将目标终端的屏幕进行锁定;“paishe#验证字符串”对应启动目标终端的摄像头进行拍照和/或录像;“baojing#验证字符串”对应,启动目标终端的声音系统进行报警等。As mentioned above, in the embodiment of the present invention, there are multiple processing methods for the target terminal, and various methods or combinations of several methods can correspond to a type of the first predetermined character string format. For example, "shanchu#verification string" corresponds to deleting the personalized information data in the specified storage area of the target terminal; "suoding#verification string" corresponds to locking the screen of the target terminal; "paishe#verification string" corresponds to Start the camera of the target terminal to take pictures and/or record videos; corresponding to "baojing#verification string", start the sound system of the target terminal to send an alarm, etc.

即在本发明实施例中,目标服务器根据所述第一预定字符串格式的类型,通知目标终端启动相应的密码重置操作或者启动相应的对目标终端安全保护操作;其中,不同的第一预定字符串格式与相应的密码重置操作或者安全保护操作对应。That is, in the embodiment of the present invention, the target server notifies the target terminal to start a corresponding password reset operation or start a corresponding security protection operation for the target terminal according to the type of the first predetermined string format; wherein, different first predetermined The string format corresponds to the corresponding password reset operation or security protection operation.

其中,所述通知目标终端启动对目标终端安全保护操作包括:Wherein, the notifying the target terminal to start the security protection operation for the target terminal includes:

通知目标终端将指定存储区域中的个性化信息数据,进行删除;Notify the target terminal to delete the personalized information data in the specified storage area;

和/或,通知目标终端将指定区域中的个性化信息数据上传至指定服务器,并将目标终端中所述个性化信息数据进行删除;And/or, notify the target terminal to upload the personalized information data in the specified area to the specified server, and delete the personalized information data in the target terminal;

和/或,通知目标终端将位置信息数据发送至指定的第二终端;And/or, notify the target terminal to send the location information data to the designated second terminal;

和/或,通知目标终端将屏幕进行锁定;And/or, notify the target terminal to lock the screen;

和/或,通知目标终端启动摄像头进行拍照和/或录像;And/or, notify the target terminal to start the camera to take pictures and/or video;

和/或,通知目标终端启动声音系统进行报警。And/or, notify the target terminal to activate the sound system for alarming.

在本发明实施例中,在目标终端会设置相应的模块,能获取目标终端系统的执行权限,当接收到前述指令后,即可执行相应的动作。In the embodiment of the present invention, a corresponding module is installed on the target terminal, which can obtain the execution authority of the target terminal system, and can execute the corresponding action after receiving the aforementioned instruction.

实施例五Embodiment five

参照图5,其示出了本发明一种终端安全保护方法实施例六的流程示意图,具体可以包括:Referring to FIG. 5 , it shows a schematic flowchart of Embodiment 6 of a terminal security protection method according to the present invention, which may specifically include:

步骤500,将至少一个第一联系人加入针对目标联系人的安全联系人库;其中,所述目标联系人对应目标终端;Step 500, adding at least one first contact to the secure contact database for the target contact; wherein, the target contact corresponds to the target terminal;

该步骤与步骤110类似,在此不再详述。This step is similar to step 110 and will not be described in detail here.

步骤510,从字符串格式库中随机选择所述第一预定字符串格式;Step 510, randomly selecting the first predetermined string format from the string format library;

在本发明实施例中,可预置一个字符串格式库,其中可包括多种字符串格式,比如包括:以*reset*”开头、以#reset#开头、以&&reset¥¥开头等等,那么用户启用本发明的流程后,目标服务器则随机从字符串格式库中选择第一预定字符串格式,比如选择了以#reset#开头的字符串格式。In the embodiment of the present invention, a string format library can be preset, which can include a variety of string formats, such as: start with *reset*", start with #reset#, start with &&reset¥¥, etc., then After the user activates the process of the present invention, the target server randomly selects the first predetermined string format from the string format library, for example, the string format beginning with #reset# is selected.

步骤520,生成验证字符串;Step 520, generating a verification character string;

本发明实施例中,为了提高安全性和降低日常信息数据的干扰,还可生成验证字符串,比如随机生成437131这个字符串。In the embodiment of the present invention, in order to improve security and reduce the interference of daily information data, a verification character string can also be generated, for example, the character string 437131 is randomly generated.

步骤530,通知目标联系人对应的安全联系人库中的至少一个安全第一联系人对应的第一终端发送包括第一预定字符串格式的信息数据和目标联系人至目标服务器,所述信息数据还包括所述验证字符串。Step 530, notify the first terminal corresponding to at least one secure first contact in the secure contact library corresponding to the target contact to send the information data including the first predetermined character string format and the target contact to the target server, the information data Also includes the verification string.

在本发明实施例中,在目标服务器会存储第一预定字符串格式,该第一预定字符串格式基本上可将用户的信息数据与通常的信息数据区别开来。其中,所述的终端包括手机等智能终端。In the embodiment of the present invention, the target server will store a first predetermined character string format, and the first predetermined character string format can basically distinguish the user's information data from common information data. Wherein, the terminal includes smart terminals such as mobile phones.

在本发明实施例中,目标终端的用户可登录目标服务器的网站进行上述通知。In the embodiment of the present invention, the user of the target terminal may log in to the website of the target server to perform the above notification.

在前述步骤中选择了第一预定字符串格式,如以#reset#开头,得到了随机验证字符串,如437131,那么本步骤则从安全联系人库中选择至少一个安全第一联系人,并通知安全第一联系人对应的第一终端指定字符串格式的信息数据至目标服务器,所述信息数据还包括所述验证字符串。比如通知隐私第一联系人的手机发送以#reset#开头的短信,并在短信中把验证字符串437131放在#reset#之后的某个位置,如#reset#437131的短信,其目标联系人为13100001121。In the preceding steps, the first predetermined string format is selected, such as starting with #reset#, and a random verification string is obtained, such as 437131, then in this step, at least one safe first contact is selected from the safe contact library, and Informing the first terminal corresponding to the security first contact of the information data in the specified string format to the target server, where the information data further includes the verification string. For example, the mobile phone that notifies the first contact of privacy sends a text message starting with #reset#, and puts the verification string 437131 in a certain position after #reset# in the text message, such as the text message of #reset#437131, and its target contact is 13100001121.

步骤540,针对目标服务器接收的每条信息数据,解析该条信息数据指向的目标联系人,并根据所述目标联系人查找对应的安全联系人库;Step 540, for each piece of information data received by the target server, analyze the target contact pointed to by the piece of information data, and search the corresponding secure contact database according to the target contact;

那么本发明实施例则分析各第一终端发送到目标服务器的每条信息数据。当目标服务器收到信息数据时,则首先解析该条信息数据指向的目标联系人,并根据所述目标联系人查找对应的安全联系人库。Then, in the embodiment of the present invention, each piece of information data sent by each first terminal to the target server is analyzed. When the target server receives the information data, it first analyzes the target contact pointed to by the piece of information data, and searches the corresponding secure contact database according to the target contact.

步骤550,判断发送所述信息数据的终端对应的第一联系人是否属于所述安全联系人库;Step 550, judging whether the first contact corresponding to the terminal sending the information data belongs to the secure contact database;

监控发送该信息数据的第一联系人是不是属于目标联系人对应的安全联系人库。如果属于,则进入步骤660,如果不属于,不对该条短信进行后续处理。It is monitored whether the first contact who sends the information data belongs to the secure contact database corresponding to the target contact. If it belongs, then enter step 660, if not, do not perform subsequent processing on the short message.

步骤560,如果所述第一联系人属于安全联系人库,则解析所述信息数据的字符串;Step 560, if the first contact belongs to the secure contact database, then parse the character string of the information data;

对于一条信息数据,获取发送该条信息数据的第一联系人后,若判断其属于安全联系人库,那么可解析该信息数据的字符串,比如对于手机来说,对接收到的短信,判断发送该短信的手机号码是否属于隐私第一联系人,如果是,则提取获取短信的字符串。For a piece of information data, after obtaining the first contact who sent the piece of information data, if it is determined that it belongs to the secure contact database, then the character string of the information data can be parsed. For example, for a mobile phone, for a received text message, judge Whether the mobile phone number sending the short message belongs to the privacy first contact, if so, then extract the character string for obtaining the short message.

步骤570,将所述解析得到的字符串与目标服务器中记录的所述第一预定字符串格式进行匹配;如果所述解析得到的字符串与目标服务器中记录的所述第一预定字符串格式匹配上,则进入步骤571;Step 570, matching the parsed character string with the first predetermined character string format recorded in the target server; if the parsed character string is in accordance with the first predetermined character string format recorded in the target server If it matches, go to step 571;

如前述例子,当从字符串格式库中选择了#reset#,那么即将解析得到的字符串与#reset#进行匹配,如果匹配上,则进入步骤571,如果未匹配上,则结束对该条信息数据的处理。As in the aforementioned example, when #reset# is selected from the string format library, the parsed string will be matched with #reset#. If it matches, then enter step 571. If it does not match, then end this item. Information Data Processing.

步骤571,判断所述解析得到的字符串中,是否包括所述验证字符串;如果所述解析得到的字符串中包括所述验证字符串,则进入步骤572;Step 571, judging whether the analyzed character string includes the verification character string; if the parsed character string includes the verification character string, proceed to step 572;

在对信息数据进行解析得到的字符串中,将验证字符串与该解析得到的字符串进行匹配,如果匹配上,则可判断所述解析得到的字符串中,包括所述验证字符串,则进入步骤572。如果匹配不上,则可判断所述解析得到的字符串中,不包括所述验证字符串,则结束对该条信息数据的处理。In the character string obtained by parsing the information data, the verification character string is matched with the character string obtained by the parsing. If they match, it can be judged that the character string obtained by parsing includes the verification character string, then Go to step 572. If no match is found, it may be determined that the verified character string is not included in the character string obtained through parsing, and the processing of the piece of information data ends.

步骤572,判断目标服务器通知第一终端发送第一预定字符串格式信息数据的时刻,至目标服务器当前的时刻之间的时间段是否超过时间阈值;如果所述时间段未超过,则进入步骤580;Step 572, judging whether the time period between the time when the target server notifies the first terminal to send the first predetermined character string format information data and the current time of the target server exceeds the time threshold; if the time period does not exceed, proceed to step 580 ;

在本发明实施例中,可记录发送“通知所述各安全第一联系人对应的第一终端指定字符串格式的信息数据至目标服务器”的发送时刻,在判断所述解析得到的字符串中,是否包括所述验证字符串时,如果验证包括验证字符串,则计算所述发送时刻和当前的系统时刻之间的时间段,然后判断该时间段是否超过时间阈值(比如1天),如果未超过,则进入步骤580;如果超过,则将该条信息数据的计数作废,不将相应的第一联系人进行计数。In the embodiment of the present invention, the sending time of "notifying the first terminal corresponding to each security first contact to specify the information data in the string format to the target server" can be recorded, and in judging the string obtained by the analysis , whether to include the verification character string, if the verification includes the verification character string, calculate the time period between the sending time and the current system time, and then judge whether the time period exceeds the time threshold (such as 1 day), if If it is not exceeded, go to step 580; if it is exceeded, the count of the piece of information data will be invalidated, and the corresponding first contact will not be counted.

当然,如果在某个实施例中没有记录发送“通知所述各安全第一联系人对应的第一终端指定字符串格式的信息数据至目标服务器”的发送时刻,该步骤572、步骤580可以去掉。Of course, if there is no record in an embodiment of the sending time of "notifying the first terminal corresponding to each security first contact to specify the information data in the format of a character string to the target server", step 572 and step 580 can be removed. .

步骤580,判断有效的、已经匹配上的信息数据对应的第一联系人个数是否达到数量阈值,如果达到,则进入步骤590;Step 580, judging whether the number of valid first contacts corresponding to the matched information data reaches the quantity threshold, and if so, proceed to step 590;

通过前述步骤,对于属于安全第一联系人的、信息数据的字符串格式与预订字符串格式匹配的、还包括所述随机字符串的信息数据,如果不超过时间段阈值的信息数据,则为有效的、已经匹配上的信息数据;如果超过时间段阈值的信息数据,则为无效的、已经匹配上的信息数据。那么本步骤则统计有效的、已经匹配上的信息数据对应的第一联系人个数是否超过数量阈值,比如设置所述数量阈值为3,那么如果有3个有效的、已经匹配上的信息数据对应的第一联系人,则进入步骤590。Through the preceding steps, for the information data belonging to the security first contact, the string format of the information data matches the predetermined string format, and also includes the random string, if the information data does not exceed the time period threshold, then it is Valid and matched information data; if the information data exceeds the time period threshold, it is invalid and matched information data. Then this step counts whether the number of first contacts corresponding to the valid and matched information data exceeds the quantity threshold. For example, if the number threshold is set to 3, then if there are 3 valid and matched information data For the corresponding first contact, go to step 590.

本步骤为了避免同一安全第一联系人的终端多次发生符合要求的信息数据而设置,进一步提高安全性。This step is set in order to prevent the terminal of the same security first contact from repeatedly generating information data that meets the requirements, so as to further improve security.

另外,在上述判断过程中,如果属于安全第一联系人对应的第一终端发送的信息数据,但是后续判断条件不符合要求,可提示用户安全联系人库中的第一联系人对应的用户发送信息数据但不符合格式要求。In addition, in the above judgment process, if it belongs to the information data sent by the first terminal corresponding to the first security contact, but the subsequent judgment conditions do not meet the requirements, the user can be prompted to send the data to the user corresponding to the first contact in the safe contact database. Informational data but does not meet formatting requirements.

比如如果不符合条件,可以给用户显示一些友好的说明(可选),例如如果用户已经选择了重置密码,但是隐私第一联系人发过来的短信格式不符合重置密码短信的格式,那么给出提示:“您选择找回密码之后,您的隐私第一联系人向您发送了一条短信,但该短信不符合重置密码的条件”。For example, if the conditions are not met, some friendly instructions (optional) can be displayed to the user. For example, if the user has chosen to reset the password, but the format of the SMS sent by the privacy first contact does not conform to the format of the reset password SMS, then Give a prompt: "After you choose to retrieve your password, your privacy first contact sent you a text message, but the text message does not meet the conditions for resetting your password."

步骤590,启动对目标终端的密码重置操作。Step 590, start a password reset operation on the target terminal.

在本发明实施例中,针对预置的加密存储区域,启动密码重置流程包括:In the embodiment of the present invention, for the preset encrypted storage area, starting the password reset process includes:

步骤S592,自动生成一个新密码替换原有密码,并提示用户新密码。In step S592, a new password is automatically generated to replace the original password, and the user is prompted for the new password.

或者,步骤S593,提示用户输入新密码;接收用户输入的新密码替换原有密码。Alternatively, in step S593, the user is prompted to input a new password; the new password input by the user is received to replace the original password.

即重置密码的方式,可以是系统自动生成一个新的密码,显示给用户,让用户以新密码登录;或者也可以直接让用户输入一个新密码,并将新密码保存为登录密码。That is, the way to reset the password can be that the system automatically generates a new password and displays it to the user, allowing the user to log in with the new password; or the user can directly enter a new password and save the new password as the login password.

在本发明实施例中,用户在终端中设置专用的加密区域存储与安全联系人库中的第一联系人对应的用户的通讯记录的情况下,比如用户将某个或者某些个手机号码设置为隐私第一联系人,然后对应设置加密存储空间的密码,若用户的手机与隐私第一联系人的短信、电话等通讯记录则可存入预设的加密存储空间中。那么当用户遗忘了该密码,则只需激活本发明的系统,然后通知至少一个安全第一联系人(比如隐私第一联系人)对应的终端(比如手机)发送包括第一预定字符串格式的信息数据至目标服务器。本发明实施例提供了一种新的密码找回方式,以用户的隐私第一联系人(安全第一联系人)作为“证明人”发送验证信息数据给用户使用的终端,那么通过上述技术方案,用户不用记忆任何同于找回密码的验证,也不用记忆验证邮箱的账户、密码等适于找回密码的提示信息数据,只需启用本发明,通知隐私第一联系人所在的终端发送第一预定字符串格式的信息数据至该用户的终端,达到条件即可重置密码,对于该用户来说密码找回的操作过程简单、方便,也可不用记忆任何适于找回密码的提示信息数据,也可降低目标终端误操作的几率。In the embodiment of the present invention, when the user sets a dedicated encrypted area in the terminal to store the user's communication records corresponding to the first contact in the secure contact database, for example, the user sets one or some mobile phone numbers to For the privacy first contact, and then correspondingly set the password of the encrypted storage space, if the user's mobile phone and the privacy first contact's SMS, phone and other communication records can be stored in the preset encrypted storage space. Then when the user forgets the password, he only needs to activate the system of the present invention, and then notify the terminal (such as a mobile phone) corresponding to at least one safe first contact (such as the privacy first contact) to send a message including the first predetermined character string format. information data to the target server. The embodiment of the present invention provides a new password retrieval method, using the user's privacy first contact (safety first contact) as a "certifier" to send verification information data to the terminal used by the user, then through the above technical solution , the user does not need to memorize any verification that is the same as retrieving the password, and does not need to memorize the prompt information data such as the account and password of the verification mailbox that are suitable for retrieving the password, but only needs to enable the present invention to notify the terminal where the first privacy contact is located to send the second The information data in a predetermined string format is sent to the user's terminal, and the password can be reset when the conditions are met. For the user, the operation process of password retrieval is simple and convenient, and there is no need to memorize any prompt information suitable for password retrieval Data can also reduce the probability of misoperation of the target terminal.

实施例六Embodiment six

参照图6,其示出了本发明一种终端安全保护的装置实施例六的结构示意图,具体可以包括:Referring to FIG. 6 , it shows a schematic structural diagram of Embodiment 6 of an apparatus for terminal security protection according to the present invention, which may specifically include:

安全联系人库预置模块610,适于将至少一个第一联系人加入针对目标联系人的安全联系人库;其中,所述目标联系人对应目标终端;The secure contact library preset module 610 is adapted to add at least one first contact to the secure contact library for the target contact; wherein the target contact corresponds to the target terminal;

信息数据处理模块620,适于针对目标服务器收到的信息数据,解析其所指向的目标联系人,并判断该信息数据所属的第一联系人是否属于所述目标联系人的安全联系人库,且判断所述信息数据的内容是否匹配预定内容;The information data processing module 620 is adapted to analyze the target contact pointed to by the information data received by the target server, and determine whether the first contact to which the information data belongs belongs to the secure contact database of the target contact, And judging whether the content of the information data matches the predetermined content;

第一通知模块630,适于如果所述第一终端对应的第一联系人属于所述目标联系人的安全联系人库,且所述信息数据的内容匹配预定内容,则根据匹配结果通知目标终端启动相应的密码重置操作或者启动相应的安全保护操作。The first notification module 630 is adapted to notify the target terminal according to the matching result if the first contact corresponding to the first terminal belongs to the safe contact database of the target contact and the content of the information data matches predetermined content Start the corresponding password reset operation or start the corresponding security protection operation.

可选的,在目标终端中包括:网页预置模块,适于通过目标联系人登录目标服务器的网页,将待加入安全联系人库的第一联系人发送给目标服务器;Optionally, the target terminal includes: a webpage preset module, adapted to log in the webpage of the target server through the target contact, and send the first contact to be added to the secure contact database to the target server;

进一步的,在目标服务器中,所述安全联系人库预置模块包括:Further, in the target server, the secure contact library preset module includes:

第一添加模块,适于所述目标服务器将所述第一联系人加入对应该目标联系人的安全联系人库;A first adding module, adapted for the target server to add the first contact to a secure contact database corresponding to the target contact;

或者,在目标终端中包括:Alternatively, in the target terminal include:

进一步的,在目标服务器中,所述安全联系人库预置模块包括:Further, in the target server, the secure contact library preset module includes:

第二添加模块,适于当所述标服务器接收到任一第一终端发送的信息数据后,判断所述信息数据是否为所述指定安全验证信息数据,如果是,则将所述第一终端对应的第一联系人加入对应的安全联系人库。The second adding module is adapted to determine whether the information data is the specified security verification information data after the label server receives the information data sent by any first terminal, and if so, send the first terminal The corresponding first contact is added to the corresponding secure contact database.

可选的,所述网站的网页预置模块包括:Optionally, the web page preset module of the website includes:

第一调用模块,适于通过目标终端调用其通讯录接口,从通讯录中选择第一联系人并通知对应的第一终端发送指定安全验证信息数据至目标终端或者目标服务器;The first calling module is adapted to call its address book interface through the target terminal, select the first contact from the address book and notify the corresponding first terminal to send specified security verification information data to the target terminal or target server;

所述第二通知模块包括:The second notification module includes:

第二调用模块,适于通过目标终端调用其通讯录接口,从通讯录中选择第一联系人并通知对应所述第一联系人的第一终端发送指定安全验证信息数据至目标服务器。The second calling module is adapted to call its address book interface through the target terminal, select the first contact from the address book, and notify the first terminal corresponding to the first contact to send specified security verification information data to the target server.

可选的,解析模块,适于针对目标服务器收到的信息数据,解析所述信息数据指向的目标联系人,并根据所述目标联系人查找对应的安全联系人库;Optionally, the parsing module is adapted to analyze the target contact pointed to by the information data received by the target server, and search for a corresponding security contact database according to the target contact;

安全联系人判断模块,适于判断发送所述信息数据的第一终端对应的第一联系人是否属于所述安全联系人库;A safe contact judging module, adapted to judge whether the first contact corresponding to the first terminal sending the information data belongs to the safe contact database;

内容匹配模块,适于如果所述第一联系人属于安全联系人库,则将所述信息数据中的内容与目标服务器中记录的预定内容进行匹配。The content matching module is adapted to match the content in the information data with the predetermined content recorded in the target server if the first contact belongs to a secure contact database.

可选的,信息数据删除模块,适于通知目标终端将指定存储区域中的个性化信息数据,进行删除;Optionally, the information data deletion module is adapted to notify the target terminal to delete the personalized information data in the specified storage area;

和/或,信息数据上传删除模块,适于通知目标终端将指定区域中的个性化信息数据上传至指定服务器,并将目标终端中所述个性化信息数据进行删除;And/or, the information data upload and delete module is adapted to notify the target terminal to upload the personalized information data in the specified area to the specified server, and delete the personalized information data in the target terminal;

和/或,定位模块,适于通知目标终端将位置信息数据发送至指定的第二终端;And/or, the positioning module is adapted to notify the target terminal to send the position information data to the designated second terminal;

和/或,锁定模块,适于通知目标终端将屏幕进行锁定;And/or, a locking module, adapted to notify the target terminal to lock the screen;

和/或,拍摄模块,适于通知目标终端启动摄像头进行拍照和/或录像;And/or, the shooting module is adapted to notify the target terminal to start the camera to take pictures and/or video;

和/或,报警模块,适于通知目标终端启动声音系统进行报警。And/or, the alarm module is adapted to notify the target terminal to activate the sound system for alarming.

可选的,在第一通知模块之前还包括:Optionally, before the first notification module, it also includes:

阈值判断模块,适于判断已经匹配上的信息数据的,且属于安全联系人库的第一联系人的个数是否达到数量阈值,如果达到,则根据匹配结果通知目标终端启动相应的密码重置操作或者启动相应的安全保护操作。The threshold judging module is suitable for judging whether the number of first contacts belonging to the secure contact database of the matched information data reaches the quantity threshold, and if so, notifies the target terminal to start corresponding password reset according to the matching result Operate or start the corresponding security protection operation.

实施例七Embodiment seven

参照图7,其示出了本发明一种终端安全保护的装置实施例七的结构示意图,具体可以包括:Referring to FIG. 7 , it shows a schematic structural diagram of Embodiment 7 of an apparatus for terminal security protection according to the present invention, which may specifically include:

目标服务器710,第一终端720,目标终端730;Target server 710, first terminal 720, target terminal 730;

所述第一终端720包括:The first terminal 720 includes:

登录模块721,适于第一终端登录目标服务器所在的网站;The login module 721 is suitable for the first terminal to log in to the website where the target server is located;

传输模块722,适于第一终端通过所述网站的网页将包括目标联系人和安全指令的信息数据传送给目标服务器;The transmission module 722 is suitable for the first terminal to transmit the information data including the target contact person and the security instruction to the target server through the webpage of the website;

所述目标服务器710包括:The target server 710 includes:

第一安全联系人库预置模块711,适于将至少一个第一联系人加入针对目标联系人的安全联系人库;其中,所述目标联系人对应目标终端;The first secure contact library preset module 711 is adapted to add at least one first contact to the secure contact library for the target contact; wherein the target contact corresponds to the target terminal;

第一解析模块712,适于针对目标服务器收到的信息数据,解析所述信息数据指向的目标联系人,并根据所述目标联系人查找对应的安全联系人库;The first parsing module 712 is adapted to analyze the target contact pointed to by the information data received by the target server, and search for a corresponding secure contact database according to the target contact;

第一安全联系人判断模块713,适于根据第一终端的登录信息,判断该第一终端对应的第一联系人是否属于所述安全联系人库;The first secure contact judging module 713 is adapted to judge whether the first contact corresponding to the first terminal belongs to the secure contact database according to the login information of the first terminal;

第一内容匹配模块714,适于如果所述第一联系人属于安全联系人库,则将所述信息数据中的内容与目标服务器中记录的预定内容进行匹配。The first content matching module 714 is adapted to match the content in the information data with the predetermined content recorded in the target server if the first contact belongs to a secure contact database.

第一通知模块715,适于根据匹配结果通知目标终端启动相应的密码重置操作或者启动相应的安全保护操作。The first notification module 715 is adapted to notify the target terminal to start a corresponding password reset operation or start a corresponding security protection operation according to the matching result.

实施例八Embodiment eight

参照图8,其示出了本发明一种终端安全保护的装置实施例八的结构示意图,具体可以包括:Referring to FIG. 8 , it shows a schematic structural diagram of Embodiment 8 of an apparatus for terminal security protection according to the present invention, which may specifically include:

目标服务器810,目标终端830,第一终端820;Target server 810, target terminal 830, first terminal 820;

所述第一终端820包括:The first terminal 820 includes:

第一发送模块821,适于第一终端发送包括第一预定格式的短信至目标服务器;The first sending module 821 is suitable for the first terminal to send the short message including the first predetermined format to the target server;

所述目标服务器810包括:The target server 810 includes:

第二安全联系人库预置模块811,适于将至少一个第一联系人加入针对目标联系人的安全联系人库;其中,所述目标联系人对应目标终端;The second secure contact library preset module 811 is adapted to add at least one first contact to the secure contact library for the target contact; wherein the target contact corresponds to the target terminal;

第二解析模块712,适于针对目标服务器收到的短信,解析短信所指向的目标联系人,并根据所述目标联系人查找对应的安全联系人库;The second parsing module 712 is adapted to analyze the target contact pointed to by the short message for the short message received by the target server, and search for a corresponding secure contact database according to the target contact;

第二安全联系人判断模块713,适于提取发送所述短信的第一设备所对应的第一联系人,判断所述第一联系人是否属于所述安全联系人库;The second safe contact judging module 713 is adapted to extract the first contact corresponding to the first device sending the short message, and judge whether the first contact belongs to the safe contact database;

第二内容匹配模块714,适于如果所述第一联系人属于安全联系人库,则将所述短信的字符串与目标服务器中记录的第一预定格式字符串进行匹配;The second content matching module 714 is adapted to match the character string of the short message with the first predetermined format character string recorded in the target server if the first contact belongs to the secure contact database;

第二通知模块715,适于根据匹配结果通知目标终端启动相应的密码重置操作或者启动相应的安全保护操作。The second notification module 715 is adapted to notify the target terminal to start a corresponding password reset operation or start a corresponding security protection operation according to the matching result.

实施例九Embodiment nine

参照图9,其示出了本发明一种终端安全保护的装置实施例七的结构示意图,具体可以包括:Referring to FIG. 9 , it shows a schematic structural diagram of Embodiment 7 of an apparatus for terminal security protection according to the present invention, which may specifically include:

安全联系人库预置模块910,适于将至少一个第一联系人加入针对目标联系人的安全联系人库;其中,所述目标联系人对应目标终端;The secure contact library preset module 910 is adapted to add at least one first contact to the secure contact library for the target contact; wherein the target contact corresponds to the target terminal;

第三通知模块920,适于通知目标联系人标识对应的安全联系人库中的至少一个第一联系人对应的第一终端,发送包括第一预定字符串格式和目标联系人的信息数据至目标服务器。The third notification module 920 is adapted to notify the first terminal corresponding to at least one first contact in the security contact database corresponding to the target contact identification, and send the information data including the first predetermined character string format and the target contact to the target server.

信息数据处理模块930,适于针对目标服务器收到的信息数据,解析其所指向的目标联系人,并判断该信息数据所属的第一联系人是否属于所述目标联系人的安全联系人库,且判断所述信息数据的内容是否匹配预定内容;The information data processing module 930 is adapted to analyze the target contact pointed to by the information data received by the target server, and determine whether the first contact to which the information data belongs belongs to the secure contact database of the target contact, And judging whether the content of the information data matches the predetermined content;

第一通知模块940,适于如果所述第一终端对应的第一联系人属于所述目标联系人的安全联系人库,且所述信息数据的内容匹配预定内容,则根据匹配结果通知目标终端启动相应的密码重置操作或者启动相应的安全保护操作。The first notification module 940 is adapted to notify the target terminal according to the matching result if the first contact corresponding to the first terminal belongs to the safe contact database of the target contact and the content of the information data matches the predetermined content Start the corresponding password reset operation or start the corresponding security protection operation.

可选的,所述第三通知模块包括:Optionally, the third notification module includes:

验证字符串生成模块,适于生成验证字符串;A verification string generation module, adapted to generate a verification string;

第四通知模块,适于从目标联系人对应的安全联系人库中选择至少一个安全第一联系人,并通知所述各第一联系人对应的第一终端发送包括第一预定字符串格式的信息数据和目标联系人至目标终端,所述信息数据还包括所述验证字符串。The fourth notification module is adapted to select at least one secure first contact from the secure contact library corresponding to the target contact, and notify the first terminal corresponding to each first contact to send a message including the first predetermined character string format. The information data and the target contact are sent to the target terminal, and the information data also includes the verification character string.

可选的,,所述第四信息数据处理模块包括:Optionally, the fourth information data processing module includes:

验证字符串判断模块,适于判断所述信息数据中的字符串中,是否包括所述验证字符串;如果所述信息数据中的字符串中包括所述验证字符串,则根据匹配结果通知目标终端启动相应的密码重置操作或者启动相应的安全保护操作。The verification character string judging module is adapted to judge whether the verification character string is included in the character string in the information data; if the verification character string is included in the character string in the information data, notify the target according to the matching result The terminal starts a corresponding password reset operation or starts a corresponding security protection operation.

可选的,所述第四信息数据处理模块包括:Optionally, the fourth information data processing module includes:

判断目标服务器发送所述通知的时刻,至目标服务器系统当前的时刻之间的时间段是否超过时间阈值;Judging whether the time period between the time when the target server sends the notification and the current time of the target server system exceeds the time threshold;

如果所述时间段未超过,则将相应的第一联系人进行计数;if the time period has not been exceeded, counting the corresponding first contact;

如果所述时间段超过,则不将相应的第一联系人进行计数。If the time period exceeds, the corresponding first contact is not counted.

可选的,在第一通知模块之前还包括:Optionally, before the first notification module, it also includes:

阈值判断模块,适于判断已经匹配上的信息数据的,且属于安全联系人库的第一联系人的个数是否达到数量阈值,如果达到,则根据匹配结果通知目标终端启动相应的密码重置操作或者启动相应的安全保护操作。The threshold judging module is suitable for judging whether the number of first contacts belonging to the secure contact database of the matched information data reaches the quantity threshold, and if so, notifies the target terminal to start corresponding password reset according to the matching result Operate or start the corresponding security protection operation.

实施例十Embodiment ten

参照图10,其示出了本发明一种终端安全保护的装置实施例十二的结构示意图,具体可以包括:Referring to Figure 10, it shows a schematic structural diagram of Embodiment 12 of a device for terminal security protection according to the present invention, which may specifically include:

第四安全库预置模块S1210,适于通知至少一个安全第一联系人对应的第一终端,发送指定安全验证信息数据至目标服务器,并预置安全联系人库;所述安全联系人库中包括至少一个安全第一联系人;The fourth security database preset module S1210 is adapted to notify the first terminal corresponding to at least one security first contact, send specified security verification information data to the target server, and preset the security contact database; the security contact database Include at least one Safety First Contact;

第四通知模块S1220,所述第四通知模块包括:The fourth notification module S1220, the fourth notification module includes:

第四字符串格式选择模块1221,适于从字符串格式库中随机选择所述第一预定字符串格式;The fourth string format selection module 1221 is adapted to randomly select the first predetermined string format from the string format library;

第四验证字符串生成模块1222,适于生成验证字符串;The fourth verification character string generating module 1222 is adapted to generate a verification character string;

第五通知模块1223,适于从目标联系人对应的安全联系人库中选择至少一个安全第一联系人,并通知所述各第一联系人对应的第一终端发送包括第一预定字符串格式的信息数据和目标联系人至目标终端,所述信息数据还包括所述验证字符串;The fifth notification module 1223 is adapted to select at least one secure first contact from the secure contact library corresponding to the target contact, and notify the first terminal corresponding to each first contact to send a message containing the first predetermined character string format The information data and the target contact person are sent to the target terminal, and the information data also includes the verification character string;

第四信息数据判断模块S1230,所述第四信息数据判断模块包括:The fourth information data judging module S1230, the fourth information data judging module includes:

第四查询模块1231,适于针对目标服务器接收的每条信息数据,解析该条信息数据指向的目标联系人,并根据所述目标联系人查找对应的安全联系人库;The fourth query module 1231 is adapted for each piece of information data received by the target server, analyzing the target contact pointed to by the piece of information data, and searching the corresponding secure contact database according to the target contact;

第四第一联系人判断模块1232,适于针对目标服务器接收的每条信息数据,判断发送所述信息数据的终端对应的第一联系人是否属于所述安全联系人库;The fourth first contact judging module 1232 is adapted to judge whether the first contact corresponding to the terminal sending the information data belongs to the secure contact database for each piece of information data received by the target server;

第四格式匹配模块1233,适于当判断所述第一联系人属于安全联系人库,则将所述信息数据中的字符串与目标终端中记录的所述第一预定字符串格式进行匹配;The fourth format matching module 1233 is adapted to match the character string in the information data with the first predetermined character string format recorded in the target terminal when it is judged that the first contact belongs to the secure contact database;

第四字符解析模块1234,适于解析所述信息数据中的字符串;The fourth character parsing module 1234 is suitable for parsing character strings in the information data;

第四验证字符串判断模块1235,适于当判断所述信息数据中的字符串与目标服务器中记录的所述第一预定字符串格式匹配上后,判断所述信息数据中的字符串中,是否包括所述验证字符串;如果所述信息数据中的字符串中包括所述验证字符串,则进入信息数据处理模块;The fourth verification character string judging module 1235 is adapted to judge whether the character string in the information data matches the first predetermined character string format recorded in the target server, Whether to include the verification character string; if the character string in the information data includes the verification character string, enter the information data processing module;

第四时间判断模块1236,适于判断目标服务器生成所述验证字符串的时刻,至目标服务器当前的时刻之间的时间段是否超过时间阈值;如果所述时间段未超过,则通知目标终端启动相应的密码重置操作或者启动相应的安全保护操作;The fourth time judging module 1236 is adapted to judge whether the time period between the time when the target server generates the verification character string and the current time of the target server exceeds the time threshold; if the time period does not exceed, notify the target terminal to start Resetting the corresponding password or starting the corresponding security protection operation;

第四阈值判断模块1237适于在所述信息数据中的字符串与目标服务器中记录的所述第一预定字符串格式匹配上之后,判断已经匹配上的信息数据对应的第一联系人个数是否达到数量阈值,如果达到,则进入第四信息数据处理模块1240;The fourth threshold judging module 1237 is adapted to judge the number of first contacts corresponding to the matched information data after the character string in the information data matches the first predetermined character string format recorded in the target server Whether to reach the quantity threshold, if so, enter the fourth information data processing module 1240;

第四信息数据处理模块1240,适于当判断所述信息数据是由安全联系人库中的安全第一联系人对应的第一终端设备发送的、并且包括第一预定字符串格式的信息数据,则通知目标终端启动相应的密码重置操作或者启动相应的安全保护操作。The fourth information data processing module 1240 is adapted to determine that the information data is sent by the first terminal device corresponding to the secure first contact in the secure contact database and includes information data in a first predetermined character string format, Then notify the target terminal to start a corresponding password reset operation or start a corresponding security protection operation.

在此提供的算法和显示不与任何特定计算机、虚拟系统或者其它设备固有相关。各种通用系统也可以与基于在此的示教一起使用。根据上面的描述,构造这类系统所要求的结构是显而易见的。此外,本发明也不针对任何特定编程语言。应当明白,可以利用各种编程语言实现在此描述的本发明的内容,并且上面对特定语言所做的描述是为了披露本发明的最佳实施方式。The algorithms and displays presented herein are not inherently related to any particular computer, virtual system, or other device. Various generic systems can also be used with the teachings based on this. The structure required to construct such a system is apparent from the above description. Furthermore, the present invention is not specific to any particular programming language. It should be understood that various programming languages can be used to implement the contents of the present invention described herein, and the above description of specific languages is for disclosing the best mode of the present invention.

在此处所提供的说明书中,说明了大量具体细节。然而,能够理解,本发明的实施例可以在没有这些具体细节的情况下实践。在一些实例中,并未详细示出公知的方法、结构和技术,以便不模糊对本说明书的理解。In the description provided herein, numerous specific details are set forth. However, it is understood that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure the understanding of this description.

类似地,应当理解,为了精简本公开并帮助理解各个发明方面中的一个或多个,在上面对本发明的示例性实施例的描述中,本发明的各个特征有时被一起分组到单个实施例、图、或者对其的描述中。然而,并不应将该公开的方法解释成反映如下意图:即所要求保护的本发明要求比在每个权利要求中所明确记载的特征更多的特征。更确切地说,如下面的权利要求书所反映的那样,发明方面在于少于前面公开的单个实施例的所有特征。因此,遵循具体实施方式的权利要求书由此明确地并入该具体实施方式,其中每个权利要求本身都作为本发明的单独实施例。Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, in order to streamline this disclosure and to facilitate an understanding of one or more of the various inventive aspects, various features of the invention are sometimes grouped together in a single embodiment, figure, or its description. This method of disclosure, however, is not to be interpreted as reflecting an intention that the claimed invention requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the Detailed Description are hereby expressly incorporated into this Detailed Description, with each claim standing on its own as a separate embodiment of this invention.

本领域那些技术人员可以理解,可以对实施例中的设备中的模块进行自适应性地改变并且把它们设置在与该实施例不同的一个或多个设备中。可以把实施例中的模块或单元或组件组合成一个模块或单元或组件,以及此外可以把它们分成多个子模块或子单元或子组件。除了这样的特征和/或过程或者单元中的至少一些是相互排斥之外,可以采用任何组合对本说明书(包括伴随的权利要求、摘要和附图)中公开的所有特征以及如此公开的任何方法或者设备的所有过程或单元进行组合。除非另外明确陈述,本说明书(包括伴随的权利要求、摘要和附图)中公开的每个特征可以由提供相同、等同或相似目的替代特征来代替。Those skilled in the art can understand that the modules in the device in the embodiment can be adaptively changed and arranged in one or more devices different from the embodiment. Modules or units or components in the embodiments may be combined into one module or unit or component, and furthermore may be divided into a plurality of sub-modules or sub-units or sub-assemblies. All features disclosed in this specification (including accompanying claims, abstract and drawings) and any method or method so disclosed may be used in any combination, except that at least some of such features and/or processes or units are mutually exclusive. All processes or units of equipment are combined. Each feature disclosed in this specification (including accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.

此外,本领域的技术人员能够理解,尽管在此所述的一些实施例包括其它实施例中所包括的某些特征而不是其它特征,但是不同实施例的特征的组合意味着处于本发明的范围之内并且形成不同的实施例。例如,在下面的权利要求书中,所要求保护的实施例的任意之一都可以以任意的组合方式来使用。Furthermore, those skilled in the art will understand that although some embodiments described herein include some features included in other embodiments but not others, combinations of features from different embodiments are meant to be within the scope of the invention. and form different embodiments. For example, in the following claims, any of the claimed embodiments may be used in any combination.

本发明的各个部件实施例可以以硬件实现,或者以在一个或者多个处理器上运行的软件模块实现,或者以它们的组合实现。本领域的技术人员应当理解,可以在实践中使用微处理器或者数字信号处理器(DSP)来实现根据本发明实施例的一种终端安全保护设备中的一些或者全部部件的一些或者全部功能。本发明还可以实现为适于执行这里所描述的方法的一部分或者全部的设备或者装置程序(例如,计算机程序和计算机程序产品)。这样的实现本发明的程序可以存储在计算机可读介质上,或者可以具有一个或者多个信号的形式。这样的信号可以从因特网网站上下载得到,或者在载体信号上提供,或者以任何其他形式提供。The various component embodiments of the present invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art should understand that a microprocessor or a digital signal processor (DSP) may be used in practice to implement some or all functions of some or all components in a terminal security protection device according to an embodiment of the present invention. The present invention can also be implemented as an apparatus or an apparatus program (for example, a computer program and a computer program product) adapted to perform a part or all of the methods described herein. Such a program for realizing the present invention may be stored on a computer-readable medium, or may be in the form of one or more signals. Such a signal may be downloaded from an Internet site, or provided on a carrier signal, or provided in any other form.

应该注意的是上述实施例对本发明进行说明而不是对本发明进行限制,并且本领域技术人员在不脱离所附权利要求的范围的情况下可设计出替换实施例。在权利要求中,不应将位于括号之间的任何参考符号构造成对权利要求的限制。单词“包含”不排除存在未列在权利要求中的元件或步骤。位于元件之前的单词“一”或“一个”不排除存在多个这样的元件。本发明可以借助于包括有若干不同元件的硬件以及借助于适当编程的计算机来实现。在列举了若干装置的单元权利要求中,这些装置中的若干个可以是通过同一个硬件项来具体体现。单词第一、第二、以及第三等的使用不表示任何顺序。可将这些单词解释为名称。It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention can be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In a unit claim enumerating several means, several of these means can be embodied by one and the same item of hardware. The use of the words first, second, and third, etc. does not indicate any order. These words can be interpreted as names.

本发明还公开了A1、一种终端安全保护方法,包括:The present invention also discloses A1, a terminal security protection method, including:

将至少一个第一联系人加入针对目标联系人的安全联系人库;其中,所述目标联系人对应目标终端;adding at least one first contact to the secure contact database for the target contact; wherein, the target contact corresponds to the target terminal;

针对目标服务器收到的信息数据,解析其所指向的目标联系人,并判断该信息数据所属的第一联系人是否属于所述目标联系人的安全联系人库,且判断所述信息数据的内容是否匹配预定内容;For the information data received by the target server, analyze the target contact it points to, and determine whether the first contact to which the information data belongs belongs to the secure contact database of the target contact, and determine the content of the information data Whether it matches the predetermined content;

如果所述第一终端对应的第一联系人属于所述目标联系人的安全联系人库,且所述信息数据的内容匹配预定内容,则根据匹配结果通知目标终端启动相应的密码重置操作或者启动相应的安全保护操作。If the first contact corresponding to the first terminal belongs to the secure contact database of the target contact, and the content of the information data matches the predetermined content, then notify the target terminal to start a corresponding password reset operation according to the matching result or Start the corresponding security protection operation.

A2、如A1所述的方法,所述将至少一个第一联系人加入针对目标联系人的安全联系人库包括:A2. The method as described in A1, adding at least one first contact to the secure contact database for the target contact includes:

通过目标联系人登录目标服务器的网页,将待加入安全联系人库的第一联系人发送给目标服务器;所述目标服务器将所述第一联系人加入对应该目标联系人的安全联系人库;Log in the web page of the target server through the target contact, and send the first contact to be added to the safe contact database to the target server; the target server adds the first contact to the safe contact database corresponding to the target contact;

或者,通知至少一个安全联系人标识对应的第一终端,发送指定安全验证信息数据至目标服务器;当所述标服务器接收到任一第一终端发送的信息数据后,判断所述信息数据是否为所述指定安全验证信息数据,如果是,则将所述第一终端对应的第一联系人加入对应的安全联系人库。Or, notify the first terminal corresponding to at least one security contact identifier, and send the specified security verification information data to the target server; when the target server receives the information data sent by any first terminal, it determines whether the information data is If the designated security verification information data is yes, adding the first contact corresponding to the first terminal into the corresponding security contact database.

A3、如A1所述的方法,A3. The method described in A1,

所述通过目标联系人登录目标服务器的网站,将待加入安全联系人库的第一联系人发送给目标服务器包括:Said logging into the website of the target server through the target contact, and sending the first contact to be added to the secure contact database to the target server includes:

通过目标终端调用其通讯录接口,从通讯录中选择待加入安全联系人库的第一联系人,并将其发送至目标服务器;Call its address book interface through the target terminal, select the first contact to be added to the secure contact database from the address book, and send it to the target server;

所述通知至少一个安全联系人标识对应的第一终端,发送指定安全验证信息数据至目标服务器包括:The notifying the first terminal corresponding to at least one security contact identifier, and sending the specified security verification information data to the target server includes:

通过目标终端调用其通讯录接口,从通讯录中选择第一联系人并通知对应所述第一联系人的第一终端发送指定安全验证信息数据至目标服务器。The target terminal invokes its address book interface, selects a first contact from the address book, and notifies the first terminal corresponding to the first contact to send specified security verification information data to the target server.

A4、如A1所述的方法,所述针对目标服务器收到的信息数据,解析其所指向的目标联系人,并判断该信息数据所属的第一联系人是否属于所述目标联系人的安全联系人库,且判断所述信息数据的内容是否匹配预定内容包括:A4. The method as described in A1, wherein the information data received by the target server is analyzed for the target contact it points to, and it is judged whether the first contact to which the information data belongs belongs to the security contact of the target contact People database, and judging whether the content of the information data matches the predetermined content includes:

针对目标服务器收到的信息数据,解析所述信息数据指向的目标联系人,并根据所述目标联系人查找对应的安全联系人库;For the information data received by the target server, analyze the target contact pointed to by the information data, and search for a corresponding security contact database according to the target contact;

判断发送所述信息数据的第一终端对应的第一联系人是否属于所述安全联系人库;judging whether the first contact corresponding to the first terminal sending the information data belongs to the secure contact database;

如果所述第一联系人属于安全联系人库,则将所述信息数据中的内容与目标服务器中记录的预定内容进行匹配。If the first contact belongs to a secure contact database, matching the content in the information data with the predetermined content recorded in the target server.

A5、如A1所述的方法,所述通知目标终端启动对目标终端安全保护操作包括:A5. The method described in A1, the notifying the target terminal to start the security protection operation on the target terminal includes:

通知目标终端将指定存储区域中的个性化信息数据,进行删除;Notify the target terminal to delete the personalized information data in the specified storage area;

和/或,通知目标终端将指定区域中的个性化信息数据上传至指定服务器,并将目标终端中所述个性化信息数据进行删除;And/or, notify the target terminal to upload the personalized information data in the specified area to the specified server, and delete the personalized information data in the target terminal;

和/或,通知目标终端将位置信息数据发送至指定的第二终端;And/or, notify the target terminal to send the location information data to the designated second terminal;

和/或,通知目标终端将屏幕进行锁定;And/or, notify the target terminal to lock the screen;

和/或,通知目标终端启动摄像头进行拍照和/或录像;And/or, notify the target terminal to start the camera to take pictures and/or video;

和/或,通知目标终端启动声音系统进行报警。And/or, notify the target terminal to activate the sound system for alarming.

A6、如A1所述的方法,在针对目标服务器收到的信息数据,解析其所指向的目标联系人,并判断该信息数据所属的第一联系人是否属于所述目标联系人的安全联系人库,且判断所述信息数据的内容是否匹配预定内容之前还包括:A6. In the method described in A1, for the information data received by the target server, analyze the target contact it points to, and determine whether the first contact to which the information data belongs belongs to the security contact of the target contact Library, and before judging whether the content of the information data matches the predetermined content, it also includes:

通知目标联系人标识对应的安全联系人库中的至少一个第一联系人对应的第一终端,发送包括第一预定字符串格式和目标联系人的信息数据至目标服务器。Informing the target contact to identify the first terminal corresponding to at least one first contact in the corresponding secure contact database, and sending the information data including the first predetermined character string format and the target contact to the target server.

A7、如A6所述的方法,所述通知目标联系人标识对应的安全联系人库中的至少一个第一联系人对应的第一终端,发送包括第一预定字符串格式和目标联系人的信息数据至目标服务器包括:A7. The method described in A6, wherein the notification target contact identifies the first terminal corresponding to at least one first contact in the corresponding security contact database, and sends information including the first predetermined character string format and the target contact Data to target server includes:

生成验证字符串;generate the authentication string;

从目标联系人对应的安全联系人库中选择至少一个第一联系人,并通知所述各第一联系人对应的第一终端发送包括第一预定字符串格式和目标联系人的信息数据至目标服务器,所述信息数据还包括所述验证字符串。Select at least one first contact from the secure contact library corresponding to the target contact, and notify the first terminal corresponding to each first contact to send information data including the first predetermined character string format and the target contact to the target server, the information data further includes the verification string.

A8、如A7所述的方法,所述判断所述信息数据的内容是否匹配预定内容包括:A8. The method as described in A7, the judging whether the content of the information data matches the predetermined content includes:

判断所述信息数据中的字符串中,是否包括所述验证字符串;judging whether the verification character string is included in the character string in the information data;

如果所述信息数据中的字符串中包括所述验证字符串,则通知目标终端启动相应的密码重置操作或者启动相应的安全保护操作。If the character string in the information data includes the verification character string, notify the target terminal to start a corresponding password reset operation or start a corresponding security protection operation.

A9、如A8所述的方法,在通知目标终端启动相应的密码重置操作或者启动相应的安全保护操作之前,还包括:A9. The method as described in A8, before informing the target terminal to start the corresponding password reset operation or start the corresponding security protection operation, further includes:

判断目标服务器发送所述通知的时刻,至目标服务器系统当前的时刻之间的时间段是否超过时间阈值;Judging whether the time period between the time when the target server sends the notification and the current time of the target server system exceeds the time threshold;

如果所述时间段未超过,则将相应的第一联系人进行计数;if the time period has not been exceeded, counting the corresponding first contact;

如果所述时间段超过,则不将相应的第一联系人进行计数。If the time period exceeds, the corresponding first contact is not counted.

A10、如A1或A9其中之一所述的方法,所述如果所述信息数据中的字符串与目标服务器中记录的所述第一预定字符串格式匹配上之后,还包括:A10. The method described in one of A1 or A9, if the character string in the information data matches the first predetermined character string format recorded in the target server, it further includes:

判断已经匹配上的信息数据的,且属于安全联系人库的第一联系人的个数是否达到数量阈值,如果达到,则根据匹配结果通知目标终端启动相应的密码重置操作或者启动相应的安全保护操作。Judging whether the number of first contacts belonging to the security contact database that have been matched with the information data reaches the threshold value, if so, notify the target terminal to start the corresponding password reset operation or start the corresponding security contact according to the matching result. protection operation.

本发明还公开了B11、一种终端安全保护系统,包括:The present invention also discloses B11, a terminal security protection system, including:

安全联系人库预置模块,适于将至少一个第一联系人加入针对目标联系人的安全联系人库;其中,所述目标联系人对应目标终端;The secure contact library preset module is adapted to add at least one first contact to the secure contact library for the target contact; wherein, the target contact corresponds to the target terminal;

信息数据处理模块,适于针对目标服务器收到的信息数据,解析其所指向的目标联系人,并判断该信息数据所属的第一联系人是否属于所述目标联系人的安全联系人库,且判断所述信息数据的内容是否匹配预定内容;The information data processing module is adapted to analyze the target contact pointed to by the information data received by the target server, and determine whether the first contact to which the information data belongs belongs to the secure contact database of the target contact, and judging whether the content of the information data matches the predetermined content;

第一通知模块,适于如果所述第一终端对应的第一联系人属于所述目标联系人的安全联系人库,且所述信息数据的内容匹配预定内容,则根据匹配结果通知目标终端启动相应的密码重置操作或者启动相应的安全保护操作。The first notification module is adapted to notify the target terminal to activate A corresponding password reset operation or a corresponding security protection operation is started.

B12、如B11所述的系统,B12. A system as described in B11,

在目标终端中包括:网页预置模块,适于通过目标联系人登录目标服务器的网页,将待加入安全联系人库的第一联系人发送给目标服务器;The target terminal includes: a webpage preset module, adapted to log in the webpage of the target server through the target contact, and send the first contact to be added to the secure contact database to the target server;

进一步的,在目标服务器中,所述安全联系人库预置模块包括:Further, in the target server, the secure contact library preset module includes:

第一添加模块,适于所述目标服务器将所述第一联系人加入对应该目标联系人的安全联系人库;A first adding module, adapted for the target server to add the first contact to a secure contact database corresponding to the target contact;

或者,在目标终端中包括:Alternatively, in the target terminal include:

进一步的,在目标服务器中,所述安全联系人库预置模块包括:Further, in the target server, the secure contact library preset module includes:

第二添加模块,适于当所述标服务器接收到任一第一终端发送的信息数据后,判断所述信息数据是否为所述指定安全验证信息数据,如果是,则将所述第一终端对应的第一联系人加入对应的安全联系人库。The second adding module is adapted to determine whether the information data is the specified security verification information data after the label server receives the information data sent by any first terminal, and if so, send the first terminal The corresponding first contact is added to the corresponding secure contact database.

B13、如B11所述的系统,B13. A system as described in B11,

所述网站的网页预置模块包括:The web page preset modules of the website include:

第一调用模块,适于通过目标终端调用其通讯录接口,从通讯录中选择第一联系人并通知对应的第一终端发送指定安全验证信息数据至目标终端或者目标服务器;The first calling module is adapted to call its address book interface through the target terminal, select the first contact from the address book and notify the corresponding first terminal to send specified security verification information data to the target terminal or target server;

所述第二通知模块包括:The second notification module includes:

第二调用模块,适于通过目标终端调用其通讯录接口,从通讯录中选择第一联系人并通知对应所述第一联系人的第一终端发送指定安全验证信息数据至目标服务器。The second calling module is adapted to call its address book interface through the target terminal, select the first contact from the address book, and notify the first terminal corresponding to the first contact to send specified security verification information data to the target server.

B14、如B11所述的系统,所述信息数据处理模块包括:B14, the system as described in B11, described information data processing module comprises:

解析模块,适于针对目标服务器收到的信息数据,解析所述信息数据指向的目标联系人,并根据所述目标联系人查找对应的安全联系人库;The parsing module is adapted to analyze the target contact pointed to by the information data received by the target server, and search for a corresponding security contact database according to the target contact;

安全联系人判断模块,适于判断发送所述信息数据的第一终端对应的第一联系人是否属于所述安全联系人库;A safe contact judging module, adapted to judge whether the first contact corresponding to the first terminal sending the information data belongs to the safe contact database;

内容匹配模块,适于如果所述第一联系人属于安全联系人库,则将所述信息数据中的内容与目标服务器中记录的预定内容进行匹配。The content matching module is adapted to match the content in the information data with the predetermined content recorded in the target server if the first contact belongs to a secure contact database.

B15、如B11所述的系统,所述第一通知模块包括:B15, the system as described in B11, the first notification module includes:

信息数据删除模块,适于通知目标终端将指定存储区域中的个性化信息数据,进行删除;The information data deletion module is suitable for notifying the target terminal to delete the personalized information data in the specified storage area;

和/或,信息数据上传删除模块,适于通知目标终端将指定区域中的个性化信息数据上传至指定服务器,并将目标终端中所述个性化信息数据进行删除;And/or, the information data upload and delete module is adapted to notify the target terminal to upload the personalized information data in the specified area to the specified server, and delete the personalized information data in the target terminal;

和/或,定位模块,适于通知目标终端将位置信息数据发送至指定的第二终端;And/or, the positioning module is adapted to notify the target terminal to send the position information data to the designated second terminal;

和/或,锁定模块,适于通知目标终端将屏幕进行锁定;And/or, a locking module, adapted to notify the target terminal to lock the screen;

和/或,拍摄模块,适于通知目标终端启动摄像头进行拍照和/或录像;And/or, the shooting module is adapted to notify the target terminal to start the camera to take pictures and/or video;

和/或,报警模块,适于通知目标终端启动声音系统进行报警。And/or, the alarm module is adapted to notify the target terminal to activate the sound system for alarming.

B16、如B11所述的系统,所述在所述信息数据处理模块之前还包括:B16, the system as described in B11, described also includes before described information data processing module:

第三通知模块,适于通知目标联系人标识对应的安全联系人库中的至少一个第一联系人对应的第一终端,发送包括第一预定字符串格式和目标联系人的信息数据至目标服务器。The third notification module is adapted to notify the first terminal corresponding to at least one first contact in the security contact library corresponding to the target contact identification, and send the information data including the first predetermined character string format and the target contact to the target server .

B17、如B16所述的系统,所述第三通知模块包括:B17, the system as described in B16, the third notification module includes:

验证字符串生成模块,适于生成验证字符串;A verification string generation module, adapted to generate a verification string;

第四通知模块,适于从目标联系人对应的安全联系人库中选择至少一个安全第一联系人,并通知所述各第一联系人对应的第一终端发送包括第一预定字符串格式的信息数据和目标联系人至目标终端,所述信息数据还包括所述验证字符串。The fourth notification module is adapted to select at least one secure first contact from the secure contact library corresponding to the target contact, and notify the first terminal corresponding to each first contact to send a message including the first predetermined character string format. The information data and the target contact are sent to the target terminal, and the information data also includes the verification character string.

B18、如B17所述的系统,所述第四信息数据处理模块包括:B18, the system as described in B17, described the 4th information data processing module comprises:

验证字符串判断模块,适于判断所述信息数据中的字符串中,是否包括所述验证字符串;如果所述信息数据中的字符串中包括所述验证字符串,则根据匹配结果通知目标终端启动相应的密码重置操作或者启动相应的安全保护操作。The verification character string judging module is adapted to judge whether the verification character string is included in the character string in the information data; if the verification character string is included in the character string in the information data, notify the target according to the matching result The terminal starts a corresponding password reset operation or starts a corresponding security protection operation.

B19、如B18所述的系统,所述第四信息数据处理模块包括:B19, the system as described in B18, the fourth information data processing module includes:

判断目标服务器发送所述通知的时刻,至目标服务器系统当前的时刻之间的时间段是否超过时间阈值;Judging whether the time period between the time when the target server sends the notification and the current time of the target server system exceeds the time threshold;

如果所述时间段未超过,则将相应的第一联系人进行计数;if the time period has not been exceeded, counting the corresponding first contact;

如果所述时间段超过,则不将相应的第一联系人进行计数。If the time period exceeds, the corresponding first contact is not counted.

B20、如B11至B19其中之一所述的系统,在第一通知模块之前还包括:B20, the system as described in one of B11 to B19, also includes before the first notification module:

阈值判断模块,适于判断已经匹配上的信息数据的,且属于安全联系人库的第一联系人的个数是否达到数量阈值,如果达到,则根据匹配结果通知目标终端启动相应的密码重置操作或者启动相应的安全保护操作。The threshold judging module is suitable for judging whether the number of first contacts belonging to the secure contact database of the matched information data reaches the quantity threshold, and if so, notifies the target terminal to start corresponding password reset according to the matching result Operate or start the corresponding security protection operation.

Claims (19)

1. A terminal security protection method comprises the following steps:
adding at least one first contact into a safe contact library aiming at a target contact; the target contact corresponds to a target terminal;
analyzing a target contact person pointed by information data received by a target server, judging whether a first contact person to which the information data belongs to a safety contact person library of the target contact person, judging whether the content of the information data is matched with preset content, logging in a website of the target server by the first contact person, and then sending the information data to the target server in a webpage data mode;
and if the first contact corresponding to the first terminal belongs to the safety contact library of the target contact and the content of the information data is matched with the preset content, informing the target terminal to start the corresponding password resetting operation or starting the corresponding safety protection operation according to the matching result.
2. The method of claim 1, the joining at least one first contact to a secure contact library for a target contact comprising:
logging in a website of a target server through a target contact person, and sending a first contact person to be added into a safety contact person library to the target server; the target server adds the first contact person into a safe contact person library corresponding to the target contact person;
or, notifying the first terminal corresponding to at least one safety contact person identifier, and sending appointed safety verification information data to the target server; and after the beacon server receives the information data sent by any first terminal, judging whether the information data is the designated safety verification information data, and if so, adding a first contact corresponding to the first terminal into a corresponding safety contact library.
3. The method of claim 2, wherein the first and second light sources are selected from the group consisting of a red light source, a green light source, and a blue light source,
the step of logging in a website of a target server through a target contact person and sending a first contact person to be added into a safe contact person library to the target server comprises the following steps:
calling an address book interface of the target terminal, selecting a first contact person to be added into the safe contact person library from the address book, and sending the first contact person to the target server;
the notifying the first terminal corresponding to the at least one security contact identification, and the sending of the designated security verification information data to the target server includes:
and calling an address list interface of the target terminal through the target terminal, selecting a first contact from the address list, and informing the first terminal corresponding to the first contact to send appointed safety verification information data to the target server.
4. The method of claim 1, wherein the analyzing the target contact pointed to by the information data received by the target server, and determining whether the first contact to which the information data belongs to the secure contact library of the target contact, and the determining whether the content of the information data matches the predetermined content comprises:
aiming at information data received by a target server, analyzing a target contact person pointed by the information data, and searching a corresponding safety contact person library according to the target contact person;
judging whether a first contact corresponding to a first terminal which sends the information data belongs to the safety contact library or not;
and if the first contact belongs to a safety contact library, matching the content in the information data with the preset content recorded in the target server.
5. The method of claim 1, the notifying the target terminal to initiate a security protection operation for the target terminal comprising:
informing the target terminal to delete the personalized information data in the designated storage area;
and/or informing the target terminal to upload the personalized information data in the designated area to a designated server and deleting the personalized information data in the target terminal;
and/or informing the target terminal to send the position information data to the appointed second terminal;
and/or, informing the target terminal to lock the screen;
and/or, informing the target terminal to start a camera for photographing and/or recording;
and/or informing the target terminal to start a sound system to alarm.
6. The method as claimed in claim 1, before parsing the target contact pointed to by the information data received by the target server, and determining whether the first contact to which the information data belongs to the secure contact library of the target contact, and determining whether the content of the information data matches the predetermined content, further comprising:
and informing a first terminal corresponding to at least one first contact in a safety contact library corresponding to the target contact identification, and sending information data including a first preset character string format and the target contact to a target server.
7. The method of claim 6, wherein notifying the first terminal corresponding to the at least one first contact in the secure contact library corresponding to the target contact identification, and wherein sending the information data including the first predetermined string format and the target contact to the target server comprises:
generating a verification string;
selecting at least one first contact from a safety contact library corresponding to a target contact, and informing a first terminal corresponding to each first contact to send information data including a first preset character string format and the target contact to a target server, wherein the information data further includes the verification character string.
8. The method of claim 7, the determining whether the content of the information data matches a predetermined content comprising:
judging whether the character string in the information data comprises the verification character string;
and if the character string in the information data comprises the verification character string, informing the target terminal to start corresponding password resetting operation or starting corresponding safety protection operation.
9. The method of claim 8, before notifying the target terminal to initiate a corresponding password reset operation or to initiate a corresponding security protection operation, further comprising:
judging whether the time period from the moment when the target server sends the notification to the current moment of the target server system exceeds a time threshold or not;
if the time period is not exceeded, counting the corresponding first contact;
if the time period is exceeded, the corresponding first contact is not counted.
10. The method according to one of claims 9, further comprising, after matching a string in the information data with the first predetermined string format recorded in the target server:
and judging whether the number of the first contact persons belonging to the safety contact person library and matched information data reaches a number threshold value, and if so, informing the target terminal to start corresponding password resetting operation or corresponding safety protection operation according to the matching result.
11. A terminal security protection system comprising:
the safety contact person library presetting module is suitable for adding at least one first contact person into a safety contact person library aiming at a target contact person; the target contact corresponds to a target terminal;
the information data processing module is suitable for analyzing a target contact person pointed by the information data received by the target server, judging whether a first contact person to which the information data belongs to a safety contact person library of the target contact person, judging whether the content of the information data is matched with preset content, logging in a website of the target server through the first contact person, and then sending the information data to the target server in a webpage data mode;
and the first notification module is suitable for notifying the target terminal to start corresponding password resetting operation or corresponding safety protection operation according to a matching result if the first contact corresponding to the first terminal belongs to the safety contact library of the target contact and the content of the information data is matched with preset content.
12. The system of claim 11, wherein the first and second sensors are arranged in a single unit,
the target terminal comprises: the webpage presetting module is suitable for logging in a website of the target server through the target contact person and sending the first contact person to be added into the safe contact person library to the target server;
further, the preset module of the safe contact library in the target server comprises:
the first adding module is suitable for the target server to add the first contact person into a safety contact person library corresponding to the target contact person;
or,
further, the preset module of the safe contact library in the target server comprises:
and the second adding module is suitable for judging whether the information data is designated safety verification information data or not after the beacon server receives the information data sent by any first terminal, and adding the first contact corresponding to the first terminal into the corresponding safety contact library if the information data is designated safety verification information data.
13. The system of claim 11, the information data processing module comprising:
the analysis module is suitable for analyzing the target contact person pointed by the information data aiming at the information data received by the target server and searching a corresponding safety contact person library according to the target contact person;
the safety contact judging module is suitable for judging whether a first contact corresponding to the first terminal for sending the information data belongs to the safety contact library or not;
and the content matching module is suitable for matching the content in the information data with the preset content recorded in the target server if the first contact belongs to the safe contact library.
14. The system of claim 11, the first notification module comprising:
the information data deleting module is suitable for informing the target terminal to delete the personalized information data in the designated storage area;
and/or the information data uploading and deleting module is suitable for informing the target terminal to upload the personalized information data in the designated area to the designated server and delete the personalized information data in the target terminal;
and/or, the positioning module is suitable for informing the target terminal to send the position information data to the appointed second terminal;
and/or, the locking module is suitable for informing the target terminal to lock the screen;
and/or the shooting module is suitable for informing the target terminal to start a camera to shoot and/or record;
and/or the alarm module is suitable for informing the target terminal to start a sound system to alarm.
15. The system of claim 11, further comprising:
and the third notification module is suitable for notifying the first terminal corresponding to at least one first contact in the safety contact library corresponding to the target contact identification before the information data processing module executes, and sending the information data comprising the first preset character string format and the target contact to the target server.
16. The system of claim 15, the third notification module comprising:
the verification character string generation module is suitable for generating a verification character string;
and the fourth notification module is suitable for selecting at least one safe first contact from a safe contact library corresponding to the target contact, notifying a first terminal corresponding to each first contact to send information data comprising a first preset character string format and the target contact to a target server, wherein the information data further comprises the verification character string.
17. The system of claim 16, the information data processing module comprising:
the verification character string judging module is suitable for judging whether the character string in the information data comprises the verification character string; and if the character string in the information data comprises the verification character string, informing the target terminal to start corresponding password resetting operation or corresponding safety protection operation according to the matching result.
18. The system of claim 17, the information data processing module comprising:
judging whether the time period from the moment when the target server sends the notification to the current moment of the target server system exceeds a time threshold or not;
if the time period is not exceeded, counting the corresponding first contact;
if the time period is exceeded, the corresponding first contact is not counted.
19. The system of one of the claims 11 to 18, further comprising:
and the threshold value judging module is suitable for judging whether the number of the matched information data and the first contact persons belonging to the safety contact person library reaches a number threshold value or not before the first notification module executes, and if so, notifying the target terminal to start corresponding password resetting operation or corresponding safety protection operation according to the matching result.
CN201310207141.6A 2013-05-29 2013-05-29 A kind of terminal safety protection method and system Active CN103457991B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310207141.6A CN103457991B (en) 2013-05-29 2013-05-29 A kind of terminal safety protection method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310207141.6A CN103457991B (en) 2013-05-29 2013-05-29 A kind of terminal safety protection method and system

Publications (2)

Publication Number Publication Date
CN103457991A CN103457991A (en) 2013-12-18
CN103457991B true CN103457991B (en) 2017-03-15

Family

ID=49739937

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310207141.6A Active CN103457991B (en) 2013-05-29 2013-05-29 A kind of terminal safety protection method and system

Country Status (1)

Country Link
CN (1) CN103457991B (en)

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9355244B2 (en) 2013-12-24 2016-05-31 Tencent Technology (Shenzhen) Company Limited Systems and methods for password reset
CN104618314B (en) * 2013-12-24 2018-03-09 腾讯科技(深圳)有限公司 A kind of password remapping method, device and system
CN105095802A (en) * 2014-04-25 2015-11-25 北京奇虎科技有限公司 Intelligent terminal equipment anti-theft method and intelligent terminal equipment
CN105100022A (en) * 2014-05-20 2015-11-25 阿里巴巴集团控股有限公司 Cipher processing method, server and system
CN105450410A (en) * 2014-08-06 2016-03-30 阿里巴巴集团控股有限公司 Verifying method and device
CN104182666B (en) * 2014-08-25 2017-05-24 广东欧珀移动通信有限公司 Password resetting method and device
CN104298901B (en) * 2014-09-12 2017-12-15 厦门美图移动科技有限公司 The unlocking method and equipment of a kind of mobile terminal
CN104202171A (en) * 2014-09-28 2014-12-10 张忠义 Password reset method employed after user password forgotten
CN104239779A (en) * 2014-10-12 2014-12-24 张忠义 Resetting method used after user password forgetting
CN104468748B (en) * 2014-11-24 2018-06-19 中国联合网络通信集团有限公司 A kind of method and device of remote acquisition terminal information
CN104598831B (en) * 2014-12-05 2018-08-21 深圳天珑无线科技有限公司 A kind of guard method of data safety and terminal
CN104573534B (en) * 2014-12-24 2018-01-16 北京奇虎科技有限公司 A kind of method and apparatus for handling private data in a mobile device
CN106161739A (en) * 2015-04-01 2016-11-23 宇龙计算机通信科技(深圳)有限公司 A kind of communication message processing method for dual system and device
CN105159531A (en) * 2015-08-27 2015-12-16 广东欧珀移动通信有限公司 Application starting method and mobile terminal
CN105488368A (en) * 2015-11-30 2016-04-13 上海斐讯数据通信技术有限公司 Safety protection method and system of electronic device
CN106066968A (en) * 2016-05-30 2016-11-02 北京小米移动软件有限公司 Data guard method and device
CN106534157B (en) * 2016-11-30 2019-08-23 Oppo广东移动通信有限公司 A kind of data transmission method, device and terminal
CN106921781A (en) * 2017-04-01 2017-07-04 北京奇虎科技有限公司 A kind of anti-theft modes start method and apparatus and mobile terminal
CN115333733A (en) * 2022-08-12 2022-11-11 维沃移动通信有限公司 Unlocking method and device, electronic equipment and readable storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101150629A (en) * 2007-10-22 2008-03-26 孙国仲 Contact book management system and method
CN101616495A (en) * 2008-06-23 2009-12-30 网秦无限(北京)科技有限公司 The method and system of individual privacy in the protection mobile phone
CN102843405A (en) * 2011-06-24 2012-12-26 基信康信息技术(上海)有限公司 Mobile terminal, network server and method for anti-theft service of mobile terminal

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3596518B2 (en) * 2001-11-29 2004-12-02 日本電気株式会社 Mobile phone terminal
US8374996B2 (en) * 2004-11-12 2013-02-12 Enr Services Inc. Managing media contact and content data
CN100471312C (en) * 2005-11-11 2009-03-18 华为技术有限公司 Mobile terminal and method for protecting information in mobile terminal
CN100466861C (en) * 2006-10-19 2009-03-04 宇龙计算机通信科技(深圳)有限公司 Mobile phone anti-theft method
CN101184257A (en) * 2007-12-07 2008-05-21 宇龙计算机通信科技(深圳)有限公司 Method for fast transmitting message, system and mobile terminal and network server
CN101227650B (en) * 2008-01-25 2012-05-23 中兴通讯股份有限公司 System and method for implementing ask for help by mobile terminal
CN101969493A (en) * 2010-10-28 2011-02-09 深圳市五巨科技有限公司 Anti-theft method and device for mobile terminal
CN102739868B (en) * 2012-06-18 2016-07-13 北京奇虎科技有限公司 Method and system for handling loss of mobile terminal
CN103037310A (en) * 2012-12-14 2013-04-10 北京网秦天下科技有限公司 Mobile terminal intelligent anti-theft method and mobile terminal
CN103118357A (en) * 2013-02-20 2013-05-22 上海斐讯数据通信技术有限公司 Antitheft system and antitheft method for mobile terminals

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101150629A (en) * 2007-10-22 2008-03-26 孙国仲 Contact book management system and method
CN101616495A (en) * 2008-06-23 2009-12-30 网秦无限(北京)科技有限公司 The method and system of individual privacy in the protection mobile phone
CN102843405A (en) * 2011-06-24 2012-12-26 基信康信息技术(上海)有限公司 Mobile terminal, network server and method for anti-theft service of mobile terminal

Also Published As

Publication number Publication date
CN103457991A (en) 2013-12-18

Similar Documents

Publication Publication Date Title
CN103457991B (en) A kind of terminal safety protection method and system
CN103338443B (en) A kind of terminal safety protection method and system
CN103581166B (en) Location aware certification
US9940482B1 (en) Electronic alerts for confidential content disclosures
US11093303B2 (en) Notification message processing method and apparatus
US10873547B2 (en) Methods and systems for providing mobile consent verification
EP2438548B1 (en) A method for monitoring activities of a first user on any of a plurality of platforms
WO2015188739A1 (en) Message processing method and apparatus
CN110347862B (en) Recording processing method, device, equipment, system and audio equipment
US20180034750A1 (en) Instant messaging method, server, and storage medium
JP6474886B2 (en) Terminal loss presentation method and device
RU2673401C2 (en) Method and device for obtaining certification document
US10872168B1 (en) Method and system for providing user notification when personal information is used in voice control device
CN103581441A (en) Mobile terminal tracking anti-theft system and method
WO2018171572A1 (en) Malicious web address identification method, computer apparatus and storage medium
WO2018209897A1 (en) Sensitive information display method and apparatus, storage medium and computer device
US11216900B1 (en) Investigation systems and methods employing positioning information from non-resident devices used for communications with controlled-environment facility residents
WO2024045969A1 (en) Queuing number management method and apparatus, electronic device, and readable medium
US20250131119A1 (en) Secure data access for electronic devices
WO2017059679A1 (en) Account processing method and apparatus
US20230061236A1 (en) Targeted venue based message and communication distribution based on proximity data
US20140245431A1 (en) GUI-Based Authentication for a Computing System
CN108900525A (en) The processing method and device of identifying code request
CN111343231A (en) A data extraction method, device, computer system and readable storage medium for instant messaging
CN106658437A (en) Information interception method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20220719

Address after: Room 801, 8th floor, No. 104, floors 1-19, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing 100015

Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co.,Ltd.

TR01 Transfer of patent right
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载