Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for monitoring safety of terminals

A technology for monitoring terminal and security, applied in the field of electronic information, can solve the problems of occupying user time and reducing the security of terminal equipment, and achieve the effect of preventing random use and improving security.

Inactive Publication Date: 2014-10-08
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF4 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in practical applications, users need to frequently enter passwords in the process of using terminal equipment, which takes up a lot of time for users
For the convenience of use, many users cancel the multiple passwords or multiple unlocking settings in the terminal device. Once the terminal device is stolen by a malicious person, the malicious person can obtain the data on the terminal device and use the application of the terminal device, resulting in This reduces the security of the terminal device; and in many cases, although the terminal device sets different permissions for different users, thereby dividing users with different identities to use different functions, once the terminal device is stolen by malicious people, Malicious people can pretend to be the original user of the terminal device and use the original user's authority to maliciously obtain data or maliciously use restricted applications and functions, which will still cause a decrease in the security of the terminal device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for monitoring safety of terminals
  • Method and device for monitoring safety of terminals
  • Method and device for monitoring safety of terminals

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0023] In the embodiment of the present invention, the first terminal may be a terminal device such as a PAD or a smart phone, and the second terminal may be a terminal device such as a smart watch or a smart phone that is convenient for the user to carry. The first terminal and the second terminal can communicate with each other through wireless communication methods such as Wi-Fi and Bluetooth. And like Figure 1a As shown, the first te...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a method and device for monitoring the safety of terminals and relates to the technical field of electronic information. Through the method and device, applications and functions of a terminal device can be restricted when a user is hard to control the terminal device, so that the terminal device is prevented from being embezzled by a malicious person, and the safety of the terminal device is improved. The method comprises the first step of obtaining the communication condition between the first terminal and the second terminal, wherein the communication condition at least includes the communication distance between the first terminal and the second terminal, and / or includes whether the first terminal is disconnected with the second terminal, and the second step of starting the safety protection function of the first terminal if the communication distance exceeds a threshold value or the first terminal is disconnected with the second terminal. The method and device are applicable to monitoring the use condition of the terminals.

Description

Technical field [0001] The present invention relates to the field of electronic information technology, and in particular to a method and device for monitoring terminal security. Background technique [0002] At present, in order to improve the security of the terminal device when in use, multiple passwords or usage permissions are set in the terminal device. The user can set a corresponding password for each application in the terminal device. When the user needs to run one of the applications When programming, you need to enter the password corresponding to the application before the application can run normally; or the user needs to obtain the usage rights of the corresponding application before the application can run normally. [0003] However, in practical applications, users need to frequently input passwords when using terminal devices, which takes up a lot of time for users. For ease of use, many users have cancelled the multiple password or multiple unlock settings in th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/50
CPCG06F21/50G06F21/74G06F2221/2105
Inventor 陈祥常娟陈方荣
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD