CN101141721A - Safety mobile telephone based communication custom - Google Patents

Safety mobile telephone based communication custom Download PDF

Info

Publication number
CN101141721A
CN101141721A CNA2006101276531A CN200610127653A CN101141721A CN 101141721 A CN101141721 A CN 101141721A CN A2006101276531 A CNA2006101276531 A CN A2006101276531A CN 200610127653 A CN200610127653 A CN 200610127653A CN 101141721 A CN101141721 A CN 101141721A
Authority
CN
China
Prior art keywords
mobile phone
user
telex network
stolen
custom
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2006101276531A
Other languages
Chinese (zh)
Other versions
CN101141721B (en
Inventor
刘卫民
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Samsung Telecom R&D Center
Beijing Samsung Telecommunications Technology Research Co Ltd
Samsung Electronics Co Ltd
Original Assignee
Beijing Samsung Telecommunications Technology Research Co Ltd
Samsung Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Samsung Telecommunications Technology Research Co Ltd, Samsung Electronics Co Ltd filed Critical Beijing Samsung Telecommunications Technology Research Co Ltd
Priority to CN200610127653A priority Critical patent/CN101141721B/en
Publication of CN101141721A publication Critical patent/CN101141721A/en
Application granted granted Critical
Publication of CN101141721B publication Critical patent/CN101141721B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present invention discloses a method for a safe mobile phone based on the user communication habit. The method comprises steps that a user communication habit die plate is arranged in a mobile phone; the mobile phone compares whether the call records matches with the stored user communication habit die plate or not; if matches, the mobile phone can be normally operated; if not, the mobile phone sends a message that the mobile phone is stolen to a destination preassigned by the mobile phone. The present invention directly correlates with the operating habit of the owner of the mobile phone, and the operating habit is individual and can not be copied by the others, and can effectively determine whether the mobile phone is in the owner operating state or others operating state. After the user finishes the setting, once the mobile phone is stolen, as long as the mobile phone is continually operated, the mobile phone can start an anti-theft procedure, to help the loser to find out the mobile phone or to lock the mobile phone.

Description

Safe mobile phone based on communication custom
Technical field
The present invention relates to communication system, particularly a kind of safe mobile phone that has anti-theft feature based on the telex network custom.
Background technology
In recent ten years, mobile communication has obtained swift and violent development in the whole world.Global Mobile Phone Users has reached 2,000,000,000 at present.Wherein only just there are mobile phone user 400,000,000 families in country of China, Personal Handyphone System user more than 9,000 ten thousand families.Mobile phone has become a lot of people's work, necessary tool in life, and mobile phone also becomes people's belongings.
Mobile phone on the one hand when the life of giving people offers convenience, on the other hand also because of its volume is little, use frequent, be worth higher and become the burglar do the case target.Hand-set from stolen is of common occurrence at present, and a lot of people have the experience of hand-set from stolen, have not only caused economic loss, simultaneously, because of the useful information of being stored in the lost mobile phone is lost together, makes troubles for people's life.
The multiple technology that prevents hand-set from stolen is arranged at present.The way of password for example is set,, has only the correct password of input could continue to use mobile phone during start, have only the correct password of input normally to use when perhaps changing Subscriber Identity Module (as SIM card, UIM card etc.) by password is set on mobile phone; Increase the way of accessory device, to the auxiliary device of a special use of mobile phone outfit, in case mobile phone will be reported to the police away from this auxiliary device; By mobile network's way, mobile operator whereabouts of following the trail of mobile phone for example by the equipment identity register (EIR) of configure dedicated; With the method for mobile phone and a certain Subscriber Identity Module binding, whether be replaced the whether stolen method of mobile phone of discerning by judging Subscriber Identity Module.
There is problem in various degree in above-mentioned theft preventing method.The method that password is set can make the burglar obtain behind the mobile phone because of not knowing that password can not use, but does not have help for giving mobile phone for change; Increase the way of accessory device, need the user to carry the antitheft mobile phone annex, both increased user cost, brought inconvenience to the user again; By mobile network's way, need operator to increase investment, the special-purpose network equipment is installed could be realized that this equipment is not installed by present most of operators, therefore most of users can not enjoy this service; By method with mobile phone and the binding of a certain Subscriber Identity Module, whether to change Subscriber Identity Module as judging that hand-set from stolen is a condition, the mobile phone that only is suitable for separation between machine and card, mobile phone for machine engaging one invalid (as being that machine engages a mobile phone in Korea S, it is machine engagings one that also there are several Personal Handyphone Systems of ten million in China).
Though some antitheft mobile phone schemes have been arranged now, because of using inconvenience or otherwise defective, it does not effectively satisfy the hope that people recover stolen mobile phone, and these antitheft schemes are not widely used yet.
Summary of the invention
The purpose of this invention is to provide a kind of based on telex network custom be simple and easy to, safe mobile phone and implementation method accurately and effectively.
According to an aspect of of the present present invention, a kind of realization comprises step based on the method for the safe mobile phone of telex network custom:
Telex network custom template is set in mobile phone;
Whether the telex network custom template of mobile phone comparison telex network the other side's telephone number and storage mates;
If coupling, mobile phone normally uses;
If do not match, mobile phone preassigned destination on mobile phone sends the message of hand-set from stolen.
According to another aspect of the present invention, a kind of safe mobile phone based on the telex network custom comprises:
Antenna is used for receiving and the transmission wireless signal;
Wireless module is used for the transmission of conversion, radio frequency analog signal of baseband digital signal and radio frequency analog signal and reception etc., and wireless module links to each other with Signal Processing Element;
Signal Processing Element is used for the encoding and decoding of business datum, signaling, the spread spectrum of physical channel and despreading, modulation and demodulation etc.
Control module is used to control the integrated operation of each assembly;
Memory is used for essential data of memory mobile phone operate as normal and user's personal information;
Display unit under the control of control module, shows various message, icon etc.;
Keyboard is used for input information;
Loud speaker is used for output sound;
Power module is for each module provides power supply.
The present invention's use habit mobile phone is direct and the machine master is associated, and use habit varies with each individual, and other people can't duplicate, and can judge effectively whether mobile phone is in former machine instigator and uses state or other people user mode.When the user after accomplishing the setting up, in case mobile phone is stolen, as long as mobile phone is continued to use, mobile phone will start anti-theft program, helps the owner of lost property to find mobile phone or cell-phone lock is waited indefinitely.
Description of drawings
Fig. 1 is the structured flowchart based on the safe mobile phone of communication custom of the embodiment of the invention;
Fig. 2 is based on the safe mobile phone operating process embodiment 1 of communication custom---and the machine master manually is provided with contact directory commonly used;
Fig. 3 is based on the safe mobile phone operating process embodiment 2 of communication custom---and the machine master manually is provided with contact directory commonly used;
Fig. 4 is based on the safe mobile phone operating process embodiment 3 of communication custom---and mobile phone is provided with contact directory commonly used automatically;
Fig. 5 is based on the safe mobile phone operating process embodiment 4 of communication custom---and use numbering directory to be accustomed to template as telex network;
Fig. 6 is based on the safe mobile phone operating process embodiment 5 of communication custom---and each communication back is checked.
Embodiment
Main purpose of the present invention is to realize a kind of safe mobile phone based on the telex network custom, and characteristics are whether this mobile phone can change according to the user's communications custom, judges that this mobile phone is with state or be in stolen state former machine instigator.If this mobile phone is in stolen state, mobile phone will be handled according to the stolen post-processing approach that the machine master sets in advance.
In order to make theme clearer, in the following description, the detailed description of known function and structure will be omitted.
Fig. 1 has expressed the formation based on the safe mobile phone of communication custom.The basic function that part that safe mobile phone is included and each several part should be finished is as follows:
Antenna 101 is used for receiving and the transmission wireless signal.
Wireless module 102, the conversion of responsible baseband digital signal and radio frequency analog signal, the transmission of radio frequency analog signal and reception etc., wireless module links to each other with Signal Processing Element.
Signal Processing Element 103, its function comprises the encoding and decoding of business datum, signaling, the spread spectrum of physical channel and despreading, modulation and demodulation etc.
Control module 104, the integrated operation of this each assembly of module controls, for the application layer software in the mobile phone provides operation platform, the carrying application software module, finish transmission, reception and the processing of air interface signaling, the control of calling procedure etc., and each correlation module in the mobile phone controlled, enable cooperating.
Among the present invention, antitheft for realizing, control module also should realize following function: generate user's communications custom template; Follow the tracks of the user's communications behavior; The telex network behavior is analyzed, judged whether the user's communications custom change has taken place; If change has taken place in the user's communications custom, assert that promptly mobile phone is in the unauthorized user user mode, perhaps claim stolen state, handle according to predefined stolen post-processing approach, as dial specific number etc.
Memory 105, the data memory module in the mobile phone, data that the memory mobile phone operate as normal is essential and user's personal information are as telephone directory book etc.
Among the present invention, antitheft for realizing, memory also should be stored user's communications custom template, the track record of telex network behavior, stolen post-processing approach and other antitheft relevant settings, as tracking cycle, tracking time counter etc.
Display unit 106, display unit generally comprises LCD etc., can show various message, icon etc. under the control of control module.
Among the present invention, the anti-theft prompt information that display unit is sent control module is shown to the user, carries out security settings as the prompting user, perhaps warning etc. after entering stolen state.
Keyboard 107 is used for input information, and the information of user input is sent to control module, finishes the interface function of user and mobile phone jointly with display unit and loud speaker, microphone etc.
Loud speaker 108 is used for output sound, as prompt tone etc.Among the present invention, the prompting user carries out security settings, perhaps exports warning message etc. after entering stolen state.
Power module 109 is for each module provides power supply.
Also microphone etc. should be arranged in addition, not shown.
Under the control of control module 104, the user is by man-machine interface 106,107,108 input telex network custom templates, and perhaps mobile phone is set up telex network custom template and stolen post-processing approach automatically, is stored in the memory 105.After starting anti-theft feature, control module 104 is in the anti-theft feature opening.In this state, control module 104 is followed the tracks of user's message registration, and compares with the telex network custom template of storage in the memory 105, if its matching degree reaches predetermined conditions, judges that then mobile phone is in normal condition; Otherwise assert that change has taken place the user's communications custom, promptly mobile phone is in the unauthorized user user mode, handles according to the stolen post-processing approach of storage in the memory 105.For the ease of following the tracks of, after the user deletes message registration, on display unit 106, should be shown as communications records and delete, in memory 105, should continue to keep communications records till control module 104 does not re-use these communications records and telex network custom template is compared.
Telex network custom template generally is made up of the contact number that the user uses always, and the number number can be limited to certain scope.Contact number commonly used can be imported by hand by the user, also can result from the numbering directory of storing in the mobile phone.
The matching degree of message registration and telex network custom template mainly is that whether number is identical in the two number of comparison, comprises identical number number, frequency that duplicate numbers occurs in communications records etc., can think coupling if reach particular value.
Stolen post-processing approach can comprise multiple option, such as:
1) predefined telephone number dialing phone and play stolen information in mobile phone;
2) predefined telephone number sends specific short message in mobile phone;
3) predefined mailbox sends specific email in mobile phone;
4) information such as the numbering directory stored in the mobile phone, note, message registration are sent to predefined telephone number, mailbox or upload to particular address etc.;
5) current location information of Correspondent Nodes report mobile phones such as the particular telephone of in mobile phone, storing in advance, mailbox;
6) delete personal informations such as the numbering directory stored in the mobile phone, note, message registration immediately;
7) mobile phone enters the state of remote controlled, and mobile phone will be operated according to the instruction that the specific communications end points that receives is sent this moment;
8) immediately with the data stealth of storing in the mobile phone, stealthy back user can only be by just seeing behind the input specific cryptosystem;
9) remind the current user of phone that phone is returned to former master;
10) mobile phone can not normally be used, as can not dial, can not normally answer, locked mobile phone etc.
Above-mentioned processing method can only be carried out wherein a kind of, also can two or more methods combinations carry out.Aforesaid operations can be carried out under the situation that the active user can discover, and also can carry out under the situation that the active user can not discover.
Above-mentioned option 7) can further be explained as follows: after mobile phone entered the remote controlled state, the teleinstruction that mobile phone can the receiver master be sent by other communication ends was also operated according to instruction.The mode of handset identity control command has two kinds: the one, discern by the identification number of resolving the telecommunication end.Store specific identification number on the mobile phone in advance, as the equipment of the mobile phone of particular number or landline telephone, particular ip address, specific E-mail address, specific service identifiers number etc.Confirm phone stolen after, after receiving the information that these specific identification numbers are sent, both regarded as teleinstruction information.The command information that the telecommunication end is sent can be mail, character string, sound of specific format etc.The implication of teleinstruction information needs the mobile phone of agreement assurance in advance correctly to discern; The 2nd, discern by the short message content that parsing receives.If find that note has specific form, beginning adds " ##*** " sign as note, promptly thinks the Long-distance Control note.The instruction note is write according to the form of making an appointment, and represents specific implication.As delete the information on the mobile phone, the locked mobile phone of " 11 " representative etc. with " 00 " representative.Current phone is resolved note, operates according to the operational order that parses.
Mobile phone receive the operation of carrying out after the instruction that the telecommunication end sends can be on canned data on the passback mobile phone, the deletion mobile phone information, play specific sound, locked mobile phone etc.
The password that needs inspection user when mobile phone being started or close anti-theft feature and relative operation has only the password coupling could allow the user to carry out aforesaid operations.Be provided with by the user when initial password can obtain when the user buys mobile phone or be provided with first, the user can make amendment to password, and in this patent, the user who grasps this password is authorized user, and the user who does not grasp this password is unauthorized user.
Fig. 2 has expressed the embodiment 1 of the antitheft mobile phone course of work.In this embodiment, telex network custom template is that contact directory commonly used by the machine primary input constitutes.Each operating procedure is as follows:
201 machine masters are provided with contact directory commonly used, follow the tracks of time limit and stolen post-processing approach.Mobile phone is used the contact directory always and is set to telex network custom template, starts anti-theft modes.Because the user's communications custom is to embody by a large amount of communication behaviors, only pass through tracking to the seldom number of times of telex network behavior, can not judge whether the user's communications custom change has taken place.Need to follow the tracks of the communication behavior of the certain number of times of user, could find the user's communications custom.What follow the tracks of here that the time limit refers to is exactly the number of times of required tracking, follows the tracks of the time limit and be by the user according to own communication custom setting.Following the tracks of the time limit also can be understood as communication counterpart number that mobile phone can allow and is not accustomed to the upper limit in the template in telex network.If exceed this upper limit, think that promptly mobile phone is in the unauthorized user user mode.For example user's first is got in touch frequently with the household, will inevitably have at least in per ten conversations or the transmitting-receiving note and once get in touch with the household that the other side is first, and then first can be got in touch with directory as using always with household's number, sets ten times for following the tracks of the time limit.The mobile phone of user's first is in a single day stolen like this, as long as this mobile phone is used more than ten times, mobile phone will change the unauthorized user user mode over to, and preassigned destination sends the message of hand-set from stolen on mobile phone.For example the communication object of user's second relatively disperses again, does not have the frequent especially communication object of contact, and then user's second can be set a plurality of telephone numbers in contact directory commonly used, and the tracking time limit also is provided with longer, for example is made as 50 times.Like this, as long as occur the telephone number of setting in the directory of getting in touch with commonly used in 50 contact with foreign countriess of user's second, just assert that mobile phone is in the authorized user user mode.The tracking time limit also can be preset on the mobile phone by cell phone manufacturer, because the communication custom of different user is widely different, needs according to a large number of users custom is investigated, and the value in tracking time limit can be provided with more greatly, to reduce the possibility of erroneous judgement.
202 mobile phones enter anti-theft modes, and K is changed to 0 with counter, are used to calculate tracking cycle;
203 when the user carries out a voice call or transmitting-receiving short message, and K increases by 1;
204 check that whether K has reached the tracking time limit of setting, does not forward step 203 to if reach;
If 205 have reached the tracking time limit of setting, whether the telex network custom template of storing in the other side's number in the controller comparison communications records and the memory mates.If coupling forwards step 202 to;
If 206 do not match then start subsequent operation according to the stolen post-processing approach that sets in advance in the mobile phone.
The tracking time limit is based on the number of communications setting in the step 201, also can be according to time set, and this tracking cycle finished after promptly counter K reached certain hour.Following the tracks of the time limit also can be by producer's default settings in mobile phone.The method that the machine master is provided with contact directory commonly used can be to Enter Number or select in existing address book.
In the embodiment shown in Figure 2, as long as message registration does not once match with telex network custom template, will start stolen post processor.2 couples of embodiment of embodiment shown in Figure 31 have carried out some modifications, in this embodiment, when certain does not match, can further check that nearest communicating number is whether in telephone directory book, if, do not start stolen post processor immediately, have only when these two Rule of judgment do not satisfy or continuously during inferior not the matching of J (value of J is set in the mobile phone in advance), just can start stolen post processor.Each operating procedure is as follows:
301 machine masters are provided with contact directory commonly used, follow the tracks of time limit and stolen post-processing approach, and mobile phone is used the contact directory always and is set to telex network custom template, starts anti-theft modes;
302 mobile phones enter anti-theft modes, and K is changed to 0 with counter, are used to calculate tracking cycle;
303 when the user carries out a voice call or transmitting-receiving short message, and K increases by 1;
304 check whether K has reached the tracking time limit of setting;
If 305 have reached the tracking time limit of setting, whether the telex network custom template of storing in the other side's number in the controller comparison communications records and the memory mates.If coupling forwards step 302 to;
306 as then counter J increase by 1 (initial value of J is 0) that do not match, and J is used for writing down the number of times that do not match;
307 judge whether that reaching maximum allows the number of times that do not match, if then forward step 309 to;
308 check that nearest n time communicating number is whether in telephone directory book, if forward step 302 to; Otherwise forward step 309 to;
309 stolen post-processing approach operations according to machine master setting.
Fig. 4 has expressed the embodiment 3 of the antitheft mobile phone course of work.In this embodiment, telex network custom template is provided with automatically by mobile phone.Each operating procedure is as follows:
401 mobile phone tracking users' conversation behavior, extract in the special time period or the specific communications number of times in the most frequent number of contact be set to telex network custom template;
402 start anti-theft modes;
403 mobile phones enter anti-theft modes, and K is changed to 0 with counter, are used to calculate tracking cycle;
404 when the user carries out a voice call or transmitting-receiving short message, and K increases by 1;
405 check that whether K has reached the tracking time limit of setting, does not turn to step 404 if reach; If 406 have reached the tracking time limit of setting, whether the telex network custom template of storing in the other side's number in the controller comparison communications records and the memory mates.If coupling forwards step 402 to, otherwise forwards step 407 to;
407 according to the stolen post-processing approach operation that sets in advance.
In the above-mentioned steps, step 401 and step 402 can reverse the right order.
Mobile phone can continue to follow the tracks of user's message registration, extracts the maximum number of contact, when these numbers have notable difference with the telex network custom template of having stored, can use the number of new extraction to upgrade family communication custom template.Be the increase fail safe, but inspection user password when operating is upgraded in execution to family communication custom template.
Fig. 5 has expressed the embodiment 4 of the antitheft mobile phone course of work.In this embodiment, use numbering directory to be accustomed to template as telex network.Each operating procedure is as follows:
501 machine masters are provided with stolen post-processing approach, start anti-theft modes;
The current telephone directory book of 502 mobile phones is set to telex network custom template;
503 mobile phones enter anti-theft modes, and K is changed to 0 with counter, are used to calculate tracking cycle;
504 when a voice call of the every reception of user or short message, and K increases by 1.
505 check whether K has reached the tracking time limit of setting.Do not turn to step 504 if reach;
If 506 have reached the tracking time limit of setting, whether the telex network custom template of storing in the other side's number in the controller comparison communications records and the memory mates.If coupling forwards step 503 to; Otherwise forward step 507 to;
507 according to the stolen post-processing approach operation that sets in advance.
The user can use current telephone directory book to upgrade telex network custom template.Be the increase fail safe, but inspection user password when operating is upgraded in execution to telex network custom template.
The foregoing description is after number of communications reaches the tracking time limit, and just whether the telex network custom template of storing in the other side's number in the comparison communications records and the memory mates.Also can be to check immediately behind each sign off.Fig. 6 has expressed the embodiment 5 of the antitheft mobile phone course of work of checking behind each sign off.Each operating procedure is as follows:
601 are provided with contact directory commonly used and stolen post-processing approach, start anti-theft modes.Mobile phone will be used the contact directory always and be made as telex network custom template;
602 counter K are changed to 0;
603 when the user carries out a voice call or transmitting-receiving short message, and the other side's number and telex network custom template are compared;
If 604 the other side's numbers then turn to step 602 in telex network custom template;
605 otherwise counter K increases by 1;
Do not allow the number of times that do not match if 606 counter K reach maximum as yet, then turn to step 603.
The maximum number of times that allows not match is preset in advance in the mobile phone or by the user by mobile phone producer and sets in step 601;
607 otherwise according to the stolen post processing mode operation that sets in advance in the mobile phone.
The alter mode to embodiment 1 described in the embodiment 2 is equally applicable to other embodiment.
For improving fail safe, above-mentioned other embodiment can be as embodiment 4, can only check incoming calls record, promptly no matter remove whether to comprise in the electricity telephone number in the telex network custom template, as long as do not occur the telephone number in the telex network custom template over a period to come in the incoming call (comprising phone and note), think that promptly mobile phone is in the unauthorized user user mode.Like this, even if other people can crack out the content in the telex network custom template, but because can't simulate incoming call, anti-theft program can play a role equally.
Although be the example purpose, the preferred embodiments of the present invention are disclosed, those skilled in the art will recognize under situation about not deviating from as disclosed scope and spirit of the present invention in appended claims, various improvement, increase and replacement also are possible.Therefore, scope of the present invention should be not limited to the foregoing description, but limits according to appended claims and equivalence thereof.

Claims (15)

1. a realization comprises step based on the method for the safe mobile phone of telex network custom:
Telex network custom template is set in mobile phone;
Whether the telex network custom template of mobile phone comparison telex network the other side's number and storage mates;
If coupling, mobile phone normally uses;
If do not match, mobile phone preassigned destination on mobile phone sends the message of hand-set from stolen.
2. by the described method of claim 1, it is characterized in that described telex network custom template comprises contact directory commonly used.
3. by the described method of claim 1, it is characterized in that described telex network custom template comprises the conversation behavior that comes from the mobile phone tracking user, the most frequent number of contact that extracts.
4. by the described method of claim 1, it is characterized in that described telex network custom template comprises current telephone directory book.
5. by the described method of claim 1, it is characterized in that described telex network custom template is provided with by the machine master or mobile phone is provided with automatically.
6. by the described method of claim 1, it is characterized in that to set in advance the upper limit that do not match, whether the telex network custom template by mobile phone comparison telex network record and storage mates, if unmatched number of times reaches the predefined upper limit, mobile phone preassigned destination on mobile phone sends the message of hand-set from stolen.
7. by the described method of claim 1, it is characterized in that the message of described mobile phone preassigned destination transmission hand-set from stolen on mobile phone comprises one of following message:
Predefined telephone number dialing phone and play stolen information in mobile phone;
Predefined telephone number sends specific short message in mobile phone;
Predefined mailbox sends specific email in mobile phone;
Information such as the numbering directory stored in the mobile phone, note, message registration are sent to predefined telephone number, mailbox or upload to particular address etc.;
The current location information of Correspondent Nodes such as the particular telephone of in mobile phone, storing in advance, mailbox report mobile phones.
8. by the described method of claim 1, it is characterized in that also comprising that mobile phone carries out one of following action according to machine master's the teleinstruction that sends:
Delete personal informations such as the numbering directory stored in the mobile phone, note, message registration immediately;
With the data stealth of storing in the mobile phone, stealthy back user can only be by just seeing behind the input specific cryptosystem immediately;
Remind the current user of phone that phone is returned to former master;
Make that mobile phone can not be able to not dial, can not normally answer, locked mobile phone etc.
9. by the described method of claim 7, it is characterized in that the state of described mobile phone when other communication equipment of machine master sends the message of hand-set from stolen comprises: operating under the situation that the active user can discover or under the situation that the active user can not discover, operating.
10. safe mobile phone based on telex network custom comprises:
Antenna is used for receiving and the transmission wireless signal;
Wireless module is used for the transmission of conversion, radio frequency analog signal of baseband digital signal and radio frequency analog signal and reception etc., and wireless module links to each other with Signal Processing Element;
Signal Processing Element is used for the encoding and decoding of business datum, signaling, the spread spectrum of physical channel and despreading, modulation and demodulation etc.;
Control module is used to control the integrated operation of each assembly;
Memory is used for essential data of memory mobile phone operate as normal and user's personal information;
Display unit under the control of control module, shows various message, icon etc.;
Keyboard is used for input information;
Loud speaker is used for output sound;
Power module is for each module provides power supply.
11., it is characterized in that described control module can generate user's communications custom template by the described mobile phone of claim 10.
12. by the described mobile phone of claim 10, it is characterized in that described control module can follow the tracks of the user's communications behavior.
13. by the described mobile phone of claim 10, it is characterized in that described control module can analyze the telex network behavior, judge whether the user's communications custom change has taken place.
14., it is characterized in that described control module can then be handled according to predefined stolen post-processing approach if change has taken place the user's communications custom by the described mobile phone of claim 13.
15. by the described mobile phone of claim 10, it is characterized in that described memory also should store user's communications custom template, the track record of telex network behavior, stolen post-processing approach and other antitheft relevant settings, as tracking cycle, counter etc.
CN200610127653A 2006-09-05 2006-09-05 Safety mobile telephone based communication custom Active CN101141721B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200610127653A CN101141721B (en) 2006-09-05 2006-09-05 Safety mobile telephone based communication custom

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200610127653A CN101141721B (en) 2006-09-05 2006-09-05 Safety mobile telephone based communication custom

Publications (2)

Publication Number Publication Date
CN101141721A true CN101141721A (en) 2008-03-12
CN101141721B CN101141721B (en) 2012-08-29

Family

ID=39193409

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200610127653A Active CN101141721B (en) 2006-09-05 2006-09-05 Safety mobile telephone based communication custom

Country Status (1)

Country Link
CN (1) CN101141721B (en)

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101621393A (en) * 2008-07-01 2010-01-06 阿瓦亚公司 Determining a preferable mode of communicating with a called party
CN102104679A (en) * 2010-12-09 2011-06-22 中兴通讯股份有限公司 Method and device for preventing mobile terminal from being used by invalid user
CN102647508A (en) * 2011-12-15 2012-08-22 中兴通讯股份有限公司 Mobile terminal and user identity identification method
CN102929807A (en) * 2012-11-19 2013-02-13 周万荣 Method for initiatively performing loss judgment and data processing and mobile terminal
CN103037310A (en) * 2012-12-14 2013-04-10 北京网秦天下科技有限公司 Mobile terminal intelligent anti-theft method and mobile terminal
CN103077356A (en) * 2013-01-11 2013-05-01 中国地质大学(武汉) Protecting and tracking method for primary information of mobile terminal based on user behavior pattern
CN103188230A (en) * 2011-12-29 2013-07-03 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and data protection method thereof
CN103220646A (en) * 2013-04-24 2013-07-24 广东欧珀移动通信有限公司 Method and system for finding mobile terminal device based on short message
CN103269399A (en) * 2013-05-07 2013-08-28 深圳市中兴移动通信有限公司 Processing method for movable terminal information and movable terminal
CN103957322A (en) * 2014-05-05 2014-07-30 深圳市中兴移动通信有限公司 Mobile terminal and antitheft method thereof
CN104021358A (en) * 2014-05-30 2014-09-03 可牛网络技术(北京)有限公司 Anti-theft control method and device for mobile terminal
CN104486646A (en) * 2014-11-28 2015-04-01 四川长虹电器股份有限公司 Television with tracking anti-theft function, cloud service platform and method
CN104751070A (en) * 2015-03-12 2015-07-01 小米科技有限责任公司 Method and device for protecting gallery
CN104767804A (en) * 2015-03-27 2015-07-08 联想(北京)有限公司 Information processing method and device
WO2015196449A1 (en) * 2014-06-27 2015-12-30 Microsoft Technology Licensing, Llc Data protection system based on user input patterns on device
WO2016061929A1 (en) * 2014-10-22 2016-04-28 小米科技有限责任公司 Terminal exception handling method and device, and electronic equipment
CN105634650A (en) * 2016-01-28 2016-06-01 广东欧珀移动通信有限公司 GSM-based self protection method and device for DSDS terminal
CN105744060A (en) * 2016-01-28 2016-07-06 广东欧珀移动通信有限公司 Self-protection method and device for DSDS (Dual Sim Dual Standby) terminal based on EDGE (Enhanced Data Rate for GSM Evolution)
CN105763727A (en) * 2016-02-16 2016-07-13 广东欧珀移动通信有限公司 Three-mode DSDS mobile terminal protection method and system
CN105825155A (en) * 2016-03-10 2016-08-03 广东欧珀移动通信有限公司 Self-protection method and device for CA terminal
CN107172299A (en) * 2017-06-26 2017-09-15 广东欧珀移动通信有限公司 Information processing method, device, computer equipment and computer-readable recording medium
CN107451437A (en) * 2016-05-31 2017-12-08 百度在线网络技术(北京)有限公司 The locking means and device of a kind of mobile terminal
CN109618342A (en) * 2018-12-27 2019-04-12 上海碳蓝网络科技有限公司 It is a kind of for determining the method and apparatus of the operation permission information of user
US10372937B2 (en) 2014-06-27 2019-08-06 Microsoft Technology Licensing, Llc Data protection based on user input during device boot-up, user login, and device shut-down states
US10474849B2 (en) 2014-06-27 2019-11-12 Microsoft Technology Licensing, Llc System for data protection in power off mode

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1533130A (en) * 2003-03-19 2004-09-29 仪 刘 Special cell phone
CN1599396A (en) * 2003-09-16 2005-03-23 张岩 Method and software for preventing mobile phone burglar
US7406334B2 (en) * 2004-01-26 2008-07-29 Sbc Knowledge Ventures, L.P. Systems and methods for securing personal or private content stored in the internal memory of a mobile terminal
CN100337504C (en) * 2004-09-24 2007-09-12 华为技术有限公司 Intelligent alarming method of personal mobile terminal

Cited By (38)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101621393A (en) * 2008-07-01 2010-01-06 阿瓦亚公司 Determining a preferable mode of communicating with a called party
CN102104679A (en) * 2010-12-09 2011-06-22 中兴通讯股份有限公司 Method and device for preventing mobile terminal from being used by invalid user
WO2012075765A1 (en) * 2010-12-09 2012-06-14 中兴通讯股份有限公司 Method and device for preventing mobile terminal from illegal users
CN102647508A (en) * 2011-12-15 2012-08-22 中兴通讯股份有限公司 Mobile terminal and user identity identification method
US9510198B2 (en) 2011-12-15 2016-11-29 Zte Corporation Mobile terminal and user identity recognition method
CN102647508B (en) * 2011-12-15 2016-12-07 中兴通讯股份有限公司 A kind of mobile terminal and method for identifying ID
CN103188230A (en) * 2011-12-29 2013-07-03 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and data protection method thereof
CN102929807A (en) * 2012-11-19 2013-02-13 周万荣 Method for initiatively performing loss judgment and data processing and mobile terminal
CN103037310A (en) * 2012-12-14 2013-04-10 北京网秦天下科技有限公司 Mobile terminal intelligent anti-theft method and mobile terminal
WO2014089937A1 (en) * 2012-12-14 2014-06-19 北京网秦天下科技有限公司 Mobile terminal intelligent anti-theft method and mobile terminal
CN103077356B (en) * 2013-01-11 2015-06-24 中国地质大学(武汉) Protecting and tracking method for primary information of mobile terminal based on user behavior pattern
CN103077356A (en) * 2013-01-11 2013-05-01 中国地质大学(武汉) Protecting and tracking method for primary information of mobile terminal based on user behavior pattern
CN103220646A (en) * 2013-04-24 2013-07-24 广东欧珀移动通信有限公司 Method and system for finding mobile terminal device based on short message
CN103269399A (en) * 2013-05-07 2013-08-28 深圳市中兴移动通信有限公司 Processing method for movable terminal information and movable terminal
CN103957322B (en) * 2014-05-05 2019-05-03 努比亚技术有限公司 The theft preventing method and mobile terminal of mobile terminal
CN103957322A (en) * 2014-05-05 2014-07-30 深圳市中兴移动通信有限公司 Mobile terminal and antitheft method thereof
CN104021358A (en) * 2014-05-30 2014-09-03 可牛网络技术(北京)有限公司 Anti-theft control method and device for mobile terminal
CN105493094A (en) * 2014-06-27 2016-04-13 微软技术许可有限责任公司 Data protection system based on user input patterns on device
US10474849B2 (en) 2014-06-27 2019-11-12 Microsoft Technology Licensing, Llc System for data protection in power off mode
US10372937B2 (en) 2014-06-27 2019-08-06 Microsoft Technology Licensing, Llc Data protection based on user input during device boot-up, user login, and device shut-down states
US10423766B2 (en) 2014-06-27 2019-09-24 Microsoft Technology Licensing, Llc Data protection system based on user input patterns on device
WO2015196449A1 (en) * 2014-06-27 2015-12-30 Microsoft Technology Licensing, Llc Data protection system based on user input patterns on device
WO2016061929A1 (en) * 2014-10-22 2016-04-28 小米科技有限责任公司 Terminal exception handling method and device, and electronic equipment
US9773105B2 (en) 2014-10-22 2017-09-26 Xiaomi Inc. Device security using user interaction anomaly detection
CN104486646A (en) * 2014-11-28 2015-04-01 四川长虹电器股份有限公司 Television with tracking anti-theft function, cloud service platform and method
CN104751070A (en) * 2015-03-12 2015-07-01 小米科技有限责任公司 Method and device for protecting gallery
CN104767804A (en) * 2015-03-27 2015-07-08 联想(北京)有限公司 Information processing method and device
CN105744060A (en) * 2016-01-28 2016-07-06 广东欧珀移动通信有限公司 Self-protection method and device for DSDS (Dual Sim Dual Standby) terminal based on EDGE (Enhanced Data Rate for GSM Evolution)
CN105634650A (en) * 2016-01-28 2016-06-01 广东欧珀移动通信有限公司 GSM-based self protection method and device for DSDS terminal
CN105744060B (en) * 2016-01-28 2019-03-15 Oppo广东移动通信有限公司 The self-protecting method and device of DSDS terminal based on EDGE
CN105763727A (en) * 2016-02-16 2016-07-13 广东欧珀移动通信有限公司 Three-mode DSDS mobile terminal protection method and system
CN105763727B (en) * 2016-02-16 2019-03-01 Oppo广东移动通信有限公司 Three mould DSDS mobile terminal guard methods and system
CN105825155A (en) * 2016-03-10 2016-08-03 广东欧珀移动通信有限公司 Self-protection method and device for CA terminal
CN105825155B (en) * 2016-03-10 2019-01-29 Oppo广东移动通信有限公司 A kind of self-protecting method and device of CA terminal
CN107451437A (en) * 2016-05-31 2017-12-08 百度在线网络技术(北京)有限公司 The locking means and device of a kind of mobile terminal
CN107451437B (en) * 2016-05-31 2021-04-16 百度在线网络技术(北京)有限公司 Locking method and device of mobile terminal
CN107172299A (en) * 2017-06-26 2017-09-15 广东欧珀移动通信有限公司 Information processing method, device, computer equipment and computer-readable recording medium
CN109618342A (en) * 2018-12-27 2019-04-12 上海碳蓝网络科技有限公司 It is a kind of for determining the method and apparatus of the operation permission information of user

Also Published As

Publication number Publication date
CN101141721B (en) 2012-08-29

Similar Documents

Publication Publication Date Title
CN101141721B (en) Safety mobile telephone based communication custom
CN101141722B (en) Safety mobile telephone based on user vocal feature and implementing method thereof
EP1601216B1 (en) Mobile communication terminal
CN101287298B (en) Authentication method and system for mobile communication terminal
CN100488215C (en) Communication device, server possessing telephone antiinterference function and its method
CN100401734C (en) Self-alarming and anti-theft method for mobile terminals
CN101841786B (en) Mobile phone system and method thereof for preventing mistaken dialing
US8078143B2 (en) Remotely controlling access to a wireless handset
CN105554223A (en) Connection establishment method and mobile terminal
CN1302681C (en) Method for preventing burglarious of mobile phone and anti-theft mobile phone
CN101515968A (en) Method and device for answer the calling from communication terminal
CN103338314A (en) Method for realizing information safety through conversation and mobile terminal thereof
CN101351000A (en) Method for showing information and communication terminal
CN102217295A (en) Management method of voice message and device thereof
CN101291502B (en) Anti-theft method for mobile phone
CN1394427A (en) Method for automatic concealed dialling reporting loss of mobile telephone
CN101330535A (en) Method for dialing telephone number sequence
JPH11331366A (en) Portable telephone set
CN100391217C (en) Out-calling restriction setup method of mobile communication terminal
CN101291363B (en) Theft-use preventing method for mobile phone
CN101179618B (en) Incoming call prompting method for terminal
CN101651745A (en) Method and system for operating mobile terminal and mobile terminal
JP2005348240A (en) Telephone device
CN101097650A (en) Theftproof system and method
JPH11355424A (en) Telephone system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant