Terminal safety protection method and system

A technology for terminal security and secure contacts, which is applied in the field of terminal security protection methods and systems, and can solve the problems of cumbersome operation process, users forgetting passwords, forgetting security mailbox accounts and passwords, etc.

Active Publication Date: 2013-12-18
BEIJING QIHOO TECH CO LTD
View PDF13 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These methods of retrieving passwords also have problems such as users forgetting the answers to password questions, and fo...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal safety protection method and system
  • Terminal safety protection method and system
  • Terminal safety protection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0096] refer to figure 1 , which shows a schematic flowchart of Embodiment 1 of a terminal security protection method according to the present invention, which may specifically include:

[0097] Step 110, adding at least one first contact to the secure contact database for the target contact; wherein, the target contact corresponds to the target terminal;

[0098] In the embodiment of the present invention, a secure contact database may be preset in the target server in various manners, and the target contacts are in one-to-one correspondence with the secure contact database. In the embodiment of the present invention, both the first contact person and the target contact person can be mobile phone numbers.

[0099] In this embodiment of the present invention, the target terminal itself may also be the first terminal. Target contacts can be added to their own secure contact database.

[0100] Preferably, adding at least one first contact to the secure contact database for th...

Embodiment 2

[0138] refer to figure 2 , which shows a schematic flowchart of Embodiment 2 of a terminal security protection method according to the present invention, which may specifically include:

[0139] Step 210, adding at least one first contact to the secure contact database for the target contact; wherein, the target contact corresponds to the target terminal;

[0140] This step is similar to step 110 and will not be described in detail here.

[0141] Step 220, the first terminal logs in to the website where the target server is located;

[0142] The first terminal logs in the website where the target server is located through wifi, or GPRS, or other methods.

[0143] Step 230, the first terminal transmits information data including target contacts and security instructions to the target server through the webpage of the website;

[0144] After the first terminal opens the webpage of the website, it can input the target contact in the webpage and select the operation to be perf...

Embodiment 3

[0156] refer to image 3 , which shows a schematic flowchart of Embodiment 3 of a terminal security protection method according to the present invention, which may specifically include:

[0157] Step 310, adding at least one first contact to the secure contact database for the target contact; wherein, the target contact corresponds to the target terminal;

[0158] This step is similar to step 110 and will not be described in detail here.

[0159] Step 320, the first terminal sends a short message including a first predetermined format to the target server;

[0160] That is, the terminal can send a short message to the target server, wherein the short message needs to be edited according to the first predetermined format before the target server can perform subsequent processing.

[0161] In the embodiment of the present invention, it may be pre-agreed that character strings in the first predetermined format correspond to different operations. For example, "shanchu#verificat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a terminal safety protection method and system, and relates to the technical field of network communication. The method comprises the steps of adding at least one first contact into a safety contact library for target contacts, wherein the target contacts correspond to target terminals; analyzing the target contacts who are pointed by a target server according to information data received by the target server, judging whether the first contacts who the information data belong to belong to the safety contact library of the target contacts or not, and judging whether the contents of the information data are matched with the preset contents or not; if the first contacts corresponding to a first terminal belong to the safety contact library of the target contacts, and the contents of the information data are matched with the preset contents, informing the target terminals of starting the corresponding password reset operations or starting the corresponding safety protection operations according to the matched result. The safety of a user terminal is improved, the stolen possibility of the terminal is reduced, and reset of passwords of a user can be conveniently carried out.

Description

technical field [0001] The invention relates to the technical field of network communication, in particular to a terminal security protection method and system. Background technique [0002] With the development of information and data technology, people pay more and more attention to the security of information and data. If the user forgets the password or loses the mobile phone, he hopes to process the password or control the information, data or equipment in the mobile phone to ensure security. . [0003] For example, if the user forgets the password, he will not be able to enter the encrypted area. Generally speaking, the first contact person for privacy is usually the first contact person who is more important to the user, such as the order records of important customers, etc. If you cannot enter to view Communication records, such as for mobile phones, cannot be accessed to view text messages and call records, which will have a major impact on users. In the prior art...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08G06F21/60G06F17/30
Inventor 张旭
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products