CN101141722A - Safety mobile telephone based on user vocal feature and implementing method thereof - Google Patents

Safety mobile telephone based on user vocal feature and implementing method thereof Download PDF

Info

Publication number
CN101141722A
CN101141722A CNA2006101276546A CN200610127654A CN101141722A CN 101141722 A CN101141722 A CN 101141722A CN A2006101276546 A CNA2006101276546 A CN A2006101276546A CN 200610127654 A CN200610127654 A CN 200610127654A CN 101141722 A CN101141722 A CN 101141722A
Authority
CN
China
Prior art keywords
mobile phone
user
feature
phonetic feature
stolen
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2006101276546A
Other languages
Chinese (zh)
Other versions
CN101141722B (en
Inventor
刘卫民
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Samsung Telecom R&D Center
Beijing Samsung Telecommunications Technology Research Co Ltd
Samsung Electronics Co Ltd
Original Assignee
Beijing Samsung Telecommunications Technology Research Co Ltd
Samsung Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Samsung Telecommunications Technology Research Co Ltd, Samsung Electronics Co Ltd filed Critical Beijing Samsung Telecommunications Technology Research Co Ltd
Priority to CN2006101276546A priority Critical patent/CN101141722B/en
Publication of CN101141722A publication Critical patent/CN101141722A/en
Application granted granted Critical
Publication of CN101141722B publication Critical patent/CN101141722B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present invention relates to a method for a safe mobile phone based on the user voice feature. The method comprised steps that the standard voice feature is stored in the mobile phone; the voice feature of the present user is extracted during talking; the mobile phone compares the voice feature of the present user with the standard voice feature; if the result compared is concordant, the mobile phone can be normally operated; if not, the mobile phone sends a message that the mobile phone is stolen to a destination preassigned by the mobile phone. According to the present invention, after the user finishes the setting, as long as the mobile phone is stolen, if only the mobile phone is continually operated, the mobile phone can start a security procedure, to help the loser to find out the mobile phone or to lock the mobile phone.

Description

Safe mobile phone and implementation method based on user vocal feature
Technical field
The present invention relates to communication system, particularly a kind of safe mobile phone and implementation method that has anti-theft feature based on the authorized user phonetic feature.
Background technology
In recent ten years, mobile communication has obtained swift and violent development in the whole world.Global Mobile Phone Users has reached 2,000,000,000 at present.Wherein only just there are mobile phone user 400,000,000 families in country of China, Personal Handyphone System user more than 9,000 ten thousand families.Mobile phone has become a lot of people's work, necessary tool in life, and mobile phone also becomes people's belongings.
Mobile phone on the one hand when the life of giving people offers convenience, on the other hand also because of its volume is little, use frequent, be worth higher and become burglar's crime target.Hand-set from stolen is of common occurrence at present, and a lot of people have the experience of hand-set from stolen, have not only caused economic loss, simultaneously, because of the useful information of being stored in the lost mobile phone, makes troubles for people's life.
The multiple technology that prevents hand-set from stolen is arranged at present.The way of password for example is set,, has only the correct password of input could continue to use mobile phone during start, have only the correct password of input normally to use when perhaps changing Subscriber Identity Module (as SIM card, UIM card etc.) by password is set on mobile phone; Increase the way of accessory device, to the auxiliary device of a special use of mobile phone outfit, in case mobile phone will be reported to the police away from this auxiliary device; By mobile network's way, mobile operator whereabouts of following the trail of mobile phone for example by the equipment identity register (EIR) of configure dedicated; With the method for mobile phone and a certain Subscriber Identity Module binding, whether be replaced the whether stolen method of mobile phone or the like of discerning by judging Subscriber Identity Module.
There is problem in various degree in above-mentioned theft preventing method.The method that password is set can make the burglar obtain behind the mobile phone because of not knowing that password can not use, but does not have help for giving mobile phone for change; Increase the way of accessory device, need the user to carry the antitheft mobile phone annex, both increased user cost, brought inconvenience to the user again; By mobile network's way, need operator to increase investment, the special-purpose network equipment is installed could be realized that this equipment is not installed by present most of operators, therefore most of users can not enjoy this service; By method with mobile phone and the binding of a certain Subscriber Identity Module, whether to change Subscriber Identity Module as judging that hand-set from stolen is a condition, the mobile phone that only is suitable for separation between machine and card, mobile phone for machine engaging one invalid (as being that machine engages a mobile phone in Korea S, it is machine engagings one that also there are several Personal Handyphone Systems of ten million in China).
Though some antitheft mobile phone schemes have been arranged now, because of using inconvenience or otherwise defective, it does not effectively satisfy the hope that people recover stolen mobile phone, and these antitheft schemes are not widely used yet.
Summary of the invention
The purpose of this invention is to provide a kind of based on the authorized user phonetic feature be simple and easy to, safe mobile phone and implementation method accurately and effectively.
According to an aspect of of the present present invention, a kind of method of the realization safe mobile phone based on user vocal feature comprises step:
Storage standards phonetic feature in mobile phone;
Mobile phone extracts current user's phonetic feature during conversation;
The more current user's of mobile phone phonetic feature and received pronunciation feature;
If unanimity as a result relatively, mobile phone normally uses;
If result relatively is inconsistent, then mobile phone preassigned destination on mobile phone sends the message of hand-set from stolen.
According to another aspect of the present invention, a kind of safe mobile phone based on user vocal feature comprises:
Antenna is used for receiving and the transmission wireless signal;
Wireless module is used for the transmission of conversion, radio frequency analog signal of baseband digital signal and radio frequency analog signal and reception etc., and wireless module links to each other with Signal Processing Element;
Signal Processing Element is used for the encoding and decoding of business datum, signaling, the spread spectrum of physical channel and despreading, modulation and demodulation etc.;
The phonetic feature identification module, the analysis by to the user speech sample characteristics imported extracts the corresponding exclusive characteristic value of this user speech;
Memory, data that the memory mobile phone operate as normal is essential and user's personal information;
Control module is controlled each correlation module in the mobile phone, enables cooperating;
Display unit shows various message, icon under the control of control module;
Keyboard is used for input information;
Microphone is used for user's voice signal is transformed into the signal of telecommunication, and is sent to controller.
Loud speaker is used for output sound;
Data input-output equipment is used for to data files such as mobile phone I/O image, sound, literal, programs;
Power module is for each module provides power supply.
According to the present invention, when the user after accomplishing the setting up, in case mobile phone is stolen, as long as mobile phone is continued to use, mobile phone will start security procedure, helps the owner of lost property to find lost handset or mobile phone is locked.
Description of drawings
Fig. 1 is the structured flowchart based on the safe mobile phone of user vocal feature of the embodiment of the invention;
Fig. 2 is the leaching process embodiment of authorized user phonetic feature;
Fig. 3 is based on the safe mobile phone operating process embodiment of user vocal feature.
Embodiment
Main purpose of the present invention is to realize a kind of safe mobile phone based on user vocal feature, and characteristics are that this mobile phone can extract authorized user, i.e. machine master's phonetic feature and storage.When mobile phone was in talking state, mobile phone extracted current user's phonetic feature and compares with the phonetic feature of being stored, and whether mobile phone is consistent according to the two, judges whether current user is authorized user.If inconsistent, judge that then this mobile phone is in stolen state, mobile phone will be handled according to the stolen post-processing approach that the machine master sets in advance.
In order to make theme clearer, in the following description, the detailed description of known function and structure will be omitted.
Fig. 1 has expressed the formation based on the safe mobile phone of user vocal feature.The basic function that part that safe mobile phone is included and each several part should be finished is as follows:
Antenna 101 is used for receiving and the transmission wireless signal.
Wireless module 102, the conversion of responsible baseband digital signal and radio frequency analog signal, the transmission of radio frequency analog signal and reception etc., wireless module links to each other with Signal Processing Element.
Signal Processing Element 103, its function comprises the encoding and decoding of business datum, signaling, the spread spectrum of physical channel and despreading, modulation and demodulation etc.
Phonetic feature identification module 104, the function of phonetic feature identification module comprise according to certain algorithm, and the analysis by to the user speech sample characteristics imported extracts the exclusive characteristic value of this user speech to correspondence.At present speech recognition technology uses on the commercial mobile phones of many moneys, and the functional requirement of the phonetic feature identification module among the present invention on the functional requirement of phonetic feature identification module and these commercial mobile phones is identical.
Memory 105, the data memory module in the mobile phone, data that the memory mobile phone operate as normal is essential and user's personal information are as telephone directory book etc.
Among the present invention, for realizing the safety of mobile phone, memory is also answered storage standards phonetic feature, stolen post-processing approach and other antitheft relevant settings, comprises following the tracks of the threshold value etc. that time counter, current user's phonetic feature and the inconsistent number of times of received pronunciation feature account for the ratio of total number of comparisons.
Control module 106, the integrated operation of this each assembly of module controls, for the application layer software in the mobile phone provides operation platform, the carrying application software module, finish transmission, reception and the processing of air interface signaling, the control of calling procedure etc., and each correlation module in the mobile phone controlled, enable cooperating.
Among the present invention, antitheft for realizing, control module also should realize following function: extract current user's speech samples, and be input to phonetic feature identification module 104 and handle.The user vocal feature that the phonetic feature identification module is extracted stores in the memory 105; The received pronunciation feature of storage in the user vocal feature that newly extracts and the memory 105 is compared, judge the two whether unanimity; Because the current speech resolution techniques can't reach absolutely accurately, may need repeatedly to extract active user's phonetic feature and the received pronunciation feature compares, could judge whether the user is authorized user.If the two inconsistent ratio reaches certain limit, judge that then current user is not an authorized user, handle according to predefined stolen post-processing approach, as dial specific number etc.In addition, controller also should be responsible for stolen post-processing approach and other antitheft relevant settings.Password that should first inspection user, the password back active user that upchecks becomes authorized user, and controller instructs authorized user to pass through man-machine interface 107,108,109 these settings of input, and is stored in the memory 105.
Display unit 107, display unit generally comprises LCD etc., can show various message, icon etc. under the control of control module.
Among the present invention, the anti-theft prompt information that display unit is sent control module is shown to the user, carries out security settings as the prompting user, perhaps warning etc. after entering stolen state.
Keyboard 108 is used for input information, and the information of user input is sent to control module, finishes the interface function of user and mobile phone jointly with display unit and loud speaker, microphone etc.
Microphone 109 is used for user's voice signal is transformed into the signal of telecommunication, and is sent to controller.
Loud speaker 110 is used for output sound, as prompt tone etc.Among the present invention, the prompting user carries out security settings, perhaps exports warning message etc. after entering stolen state.
Data input-output equipment 111 is used for to data files such as mobile phone I/O image, sound, literal, programs.
Power module 112 is for each module provides power supply.
Fig. 2 shows the leaching process of authorized user phonetic feature.
201 users start the phonetic feature abstraction function by man-machine interface, prepare the phonetic feature of input oneself in mobile phone;
202 user's operating command are delivered to controller, and controller is inputed password by man-machine interface prompting user;
203 users input password;
Employed password should be stored in the mobile phone in advance, is used for verifying user's identity.Should guarantee to have only real mobile phone machine master just can know this password.The method to set up of password has multiple.For example: can set in advance by mobile phone producer or operator, when the user buys mobile phone, inform the user; Be provided with when perhaps the user uses the phonetic feature abstraction function for the first time, also can after by other authentication means, be provided with by the user.
Whether the password of storing in the password of 204 controller inspection users inputs and the memory is identical.
If 205 inequality then end operations or get back to step 202 prompting user and input password once more until the maximum attempts that allows.
Confirm that if 206 passwords are identical this user is authorized user, and import speech samples by microphone by man-machine interface prompting user.
207 users pass through microphone talk.
208 controllers are delivered to the phonetic feature identification module with the user's voice sample, and the phonetic feature identification module is analyzed the voice of authorized user and extracted phonetic feature;
209 controllers with the phonetic feature of authorized user as the received pronunciation characteristic storage in memory.
Authorized user also can be input to existing phonetic feature file in the mobile phone by data input-output equipment 111, can save the phonetic feature leaching process in the foregoing description.Need obtain the mobile phone mandate through the password check when user's setting or change received pronunciation feature.
Fig. 3 shows antitheft mobile phone operating process embodiment.
301 machine masters are provided with and follow the tracks of time limit and stolen post-processing approach, start anti-theft modes.
Because the restriction of current speech resolution techniques accuracy can be avoided erroneous judgement by the method that increases number of comparisons.For example set in advance: if inconsistent number of times is more than or equal to m (0<m<n), think that then the user of this mobile phone has not been authorized user in n time is compared.Here n is called the tracking time limit, and m is called inconsistent thresholding;
302 with counter zero setting.Counter J is used for writing down active user's phonetic feature and the inconsistent number of times of received pronunciation feature comparative result, and K is used for writing down total number of comparisons;
303 when the user carries out voice call, the user's voice sample is delivered in the phonetic feature identification module extracted phonetic feature;
Whether 304 controllers comparison active user's phonetic feature consistent with the received pronunciation characteristic value of storage? if the two is inconsistent, forwards step 305 to, otherwise leap to step 306;
305 counter J increase by 1;
306 counter K increase by 1;
Do 307 judge whether K has arrived the tracking time limit? forward step 308 to if reached, otherwise forward step 303 to.
308 judge whether J has reached inconsistent thresholding, judge that promptly active user's phonetic feature compares the ratio that whether has reached certain with the inconsistent number of times of received pronunciation feature with total number of comparisons.If, forward step 309 to, carry out the next round tracking otherwise forward step 302 to.
309 according to the stolen post processing mode operation that sets in advance in the mobile phone.
Stolen post-processing approach can comprise multiple option, such as:
1) predefined telephone number dialing phone and play stolen information in mobile phone;
2) predefined telephone number sends specific short message in mobile phone;
3) predefined mailbox sends specific email in mobile phone;
4) information such as phonetic feature with the numbering directory stored in the mobile phone, note, user send to predefined telephone number, mailbox or upload to particular address etc.;
5) current location information of Correspondent Nodes report mobile phones such as the particular telephone of in mobile phone, storing in advance, mailbox;
6) delete the numbering directory stored in the mobile phone, note, user's personal informations such as phonetic feature immediately;
7) mobile phone enters the state of remote controlled, and mobile phone will be operated according to the instruction that the specific communications end points that receives is sent this moment;
8) immediately with the data stealth of storing in the mobile phone, stealthy back user can only be by just seeing behind the input specific cryptosystem;
9) remind the current user of phone that phone is returned to former master;
10) mobile phone can not normally be used, as can not dial, can not normally answer, locked mobile phone etc.
Above-mentioned processing method can only be carried out wherein a kind of, also can two or more methods combinations carry out.Aforesaid operations can be carried out under the situation that the active user can discover, and also can carry out under the situation that the active user can not discover.
Above-mentioned option 7) can further be explained as follows: after mobile phone entered the remote controlled state, the instruction that mobile phone can the receiving remote communication ends be sent was also operated according to instruction.The mode of handset identity control command has two kinds: the one, discern by the identification number of resolving the telecommunication end.Store specific identification number on the mobile phone in advance, as the equipment of the mobile phone of particular number or landline telephone, particular ip address, specific E-mail address, specific service identifiers number etc.Confirm phone stolen after, after receiving the information that these specific identification numbers are sent, both regarded as teleinstruction information.The command information that the telecommunication end is sent can be note, mail, character string, sound of specific format etc.The implication of teleinstruction information needs the mobile phone of agreement assurance in advance correctly to discern; The 2nd, discern by resolving note.If find that note has specific form, beginning adds " ##*** " sign as note, promptly thinks the Long-distance Control note.The instruction note is write according to the form of making an appointment, and represents specific implication.As delete the information on the mobile phone, the locked mobile phone of " 11 " representative etc. with " 00 " representative.Current phone is resolved note, operates according to the operational order that parses.
Mobile phone receive the operation of carrying out behind the teleinstruction that the user sends by other communication ends can be on canned data on the passback mobile phone, the deletion mobile phone information, play specific sound, locked mobile phone etc.
The password that needs inspection user when mobile phone being started or close anti-theft feature and relative operation has only the password unanimity could allow the user to carry out aforesaid operations.Be provided with by the user when initial password can obtain when the user buys mobile phone or be provided with first, the user can make amendment to password.
Among the embodiment shown in Figure 3, inconsistent thresholding can be provided with according to the accuracy of mobile phone speech feature comparison, can adjust the value of inconsistent thresholding according to accuracy relatively.If accuracy can reach 100%, then can just start stolen post processor in case inconsistent situation occurs.
Although be the example purpose, the preferred embodiments of the present invention are disclosed, those skilled in the art will recognize under situation about not deviating from as disclosed scope and spirit of the present invention in appended claims, various improvement, increase and replacement also are possible.Therefore, scope of the present invention should be not limited to the foregoing description, but limits according to appended claims and equivalence thereof.

Claims (17)

1. a realization comprises step based on the method for the safe mobile phone of user vocal feature:
Storage standards phonetic feature in mobile phone;
Mobile phone extracts current user's phonetic feature during conversation;
The more current user's of mobile phone phonetic feature and received pronunciation feature;
If unanimity as a result relatively, mobile phone normally uses;
If result relatively is inconsistent, then mobile phone sends the message of hand-set from stolen to the designated destination.
2. by the described method of claim 1, it is characterized in that described received pronunciation feature comes from the processing to the authorized user speech samples.
3. by the described method of claim 1, it is characterized in that described phonetic feature is to come from the existing phonetic feature file of authorized user.
4. by the described method of claim 1, it is characterized in that to be provided with and follow the tracks of the time limit, and when following the tracks of the time limit expiration, judge that by mobile phone active user's phonetic feature compares the ratio that whether has reached certain with the inconsistent number of times of received pronunciation feature with total number of comparisons, if inconsistent ratio reaches the predefined upper limit, mobile phone preassigned destination on mobile phone sends the message of hand-set from stolen.
5. by the described method of claim 1, it is characterized in that described mobile phone comprises one of following message to the message that the designated destination sends hand-set from stolen:
Predefined telephone number dialing phone and play stolen information in mobile phone;
Predefined telephone number sends specific short message in mobile phone;
Predefined mailbox sends specific email in mobile phone;
The numbering directory stored in the mobile phone, note, user's information such as phonetic feature are sent to predefined telephone number, mailbox or upload to particular address etc.;
The current location information of Correspondent Nodes such as the particular telephone of in mobile phone, storing in advance, mailbox report mobile phones.
6. by the described method of claim 1, it is characterized in that also comprising that teleinstruction that mobile phone sends according to the machine master carries out one of following action:
The numbering directory of storing in the deletion mobile phone, note, user's personal informations such as phonetic feature;
With the data stealth of storing in the mobile phone, stealthy back user can only be by just seeing behind the input specific cryptosystem;
Remind the current user of phone that phone is returned to former machine master;
Make that mobile phone can not dial, can not normally answer, locked mobile phone etc.
7. by the described method of claim 1, it is characterized in that the user starts/close anti-theft feature or setting/change received pronunciation feature need obtain the mobile phone mandate.
8. by the described method of claim 4, it is characterized in that, follow the tracks of the time limit and restart if inconsistent ratio does not reach the predefined upper limit.
9. by the described method of claim 1, it is characterized in that described mobile phone comprises to the message that the designated destination sends hand-set from stolen:
Operate or under the situation that the active user can not discover, operate under the situation that current use user can discover.
10. safe mobile phone based on user vocal feature comprises:
Antenna is used for receiving and the transmission wireless signal;
Wireless module is used for the transmission of conversion, radio frequency analog signal of baseband digital signal and radio frequency analog signal and reception etc., and wireless module links to each other with Signal Processing Element;
Signal Processing Element is used for the encoding and decoding of business datum, signaling, the spread spectrum of physical channel and despreading, modulation and demodulation etc.;
The phonetic feature identification module, the analysis by to the user speech sample characteristics imported extracts the corresponding exclusive characteristic value of this user speech;
Memory, data that the memory mobile phone operate as normal is essential and user's personal information;
Control module is controlled each correlation module in the mobile phone, enables cooperating;
Display unit shows various message, icon under the control of control module;
Keyboard is used for input information;
Microphone is used for user's voice signal is transformed into the signal of telecommunication, and is sent to controller.
Loud speaker is used for output sound;
Data input-output equipment is used for to data files such as mobile phone I/O image, sound, literal, programs;
Power module is for each module provides power supply.
11. by the described safe mobile phone of claim 10, it is characterized in that described phonetic feature identification module can be according to certain algorithm, analysis by to the user speech sample characteristics imported extracts the exclusive characteristic value of this user speech to correspondence, generates this user's voice feature.
12. by the described safe mobile phone of claim 10, it is characterized in that described memory also storage standards phonetic feature, stolen post-processing approach and other antitheft relevant settings, follow the tracks of the threshold value etc. that time counter, current user's phonetic feature and the inconsistent number of times of received pronunciation feature account for the ratio of total number of comparisons.
13. by the described safe mobile phone of claim 10, it is characterized in that described control module can follow the tracks of the user's communications behavior.
14. by the described safe mobile phone of claim 10, it is characterized in that described control module can extract current user's speech samples, and be input to the phonetic feature identification module and handle.
15., it is characterized in that described control module stores the user vocal feature that the phonetic feature identification module extracts in the memory into by the described safe mobile phone of claim 10.
16. by the described safe mobile phone of claim 10, it is characterized in that the received pronunciation feature of storing in user vocal feature that described control module will newly be extracted and the memory compares, judge the two whether unanimity.
17. by the described safe mobile phone of claim 10, the function that it is characterized in that described control module comprises if the inconsistent ratio of received pronunciation feature of storing in new user vocal feature that extracts and the memory reaches certain limit, then handles according to predefined stolen post-processing approach.
CN2006101276546A 2006-09-05 2006-09-05 Safety mobile telephone based on user vocal feature and implementing method thereof Active CN101141722B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2006101276546A CN101141722B (en) 2006-09-05 2006-09-05 Safety mobile telephone based on user vocal feature and implementing method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2006101276546A CN101141722B (en) 2006-09-05 2006-09-05 Safety mobile telephone based on user vocal feature and implementing method thereof

Publications (2)

Publication Number Publication Date
CN101141722A true CN101141722A (en) 2008-03-12
CN101141722B CN101141722B (en) 2012-07-11

Family

ID=39193410

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2006101276546A Active CN101141722B (en) 2006-09-05 2006-09-05 Safety mobile telephone based on user vocal feature and implementing method thereof

Country Status (1)

Country Link
CN (1) CN101141722B (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102084372A (en) * 2008-04-01 2011-06-01 优盖提特拜克有限公司 System for monitoring the unauthorized use of a device
CN102084371A (en) * 2008-04-02 2011-06-01 优盖提特拜克有限公司 System for mitigating the unauthorized use of a device
CN103034792A (en) * 2011-09-30 2013-04-10 纬创资通股份有限公司 Mobile device security method
CN103810447A (en) * 2012-11-07 2014-05-21 宏达国际电子股份有限公司 Method and apparatus for performing security control by using captured image
CN104363987A (en) * 2014-05-29 2015-02-18 华为技术有限公司 Method and device for selecting terminal modes
WO2015074411A1 (en) * 2013-11-20 2015-05-28 中兴通讯股份有限公司 Terminal unlocking method, apparatus and terminal
CN104853013A (en) * 2015-04-21 2015-08-19 努比亚技术有限公司 Mobile terminal and antitheft method and antitheft device thereof
CN105007565A (en) * 2015-07-02 2015-10-28 广东小天才科技有限公司 Loss-prevention method and device for wearable intelligent device
CN105050061A (en) * 2015-06-23 2015-11-11 广东欧珀移动通信有限公司 Method and device for sending messages on the basis of user voiceprint information
CN102084369B (en) * 2008-04-01 2016-01-27 优盖提特拜克有限公司 For monitoring the system used the unauthorized of equipment
CN105306664A (en) * 2014-06-24 2016-02-03 中兴通讯股份有限公司 Hidden application program display method, device and terminal
CN105827810A (en) * 2015-10-20 2016-08-03 南京步步高通信科技有限公司 Voiceprint recognition-based communication terminal retrieve method and communication terminal
CN106960667A (en) * 2017-03-08 2017-07-18 杭州联络互动信息科技股份有限公司 Position reminding methods, devices and systems
CN107077846A (en) * 2014-10-24 2017-08-18 索尼互动娱乐股份有限公司 Control device, control method, program and information storage medium
CN107451437A (en) * 2016-05-31 2017-12-08 百度在线网络技术(北京)有限公司 The locking means and device of a kind of mobile terminal
CN107862190A (en) * 2017-10-26 2018-03-30 广东欧珀移动通信有限公司 Based reminding method and Related product

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9881152B2 (en) 2008-04-01 2018-01-30 Yougetitback Limited System for monitoring the unauthorized use of a device
CN102084369B (en) * 2008-04-01 2016-01-27 优盖提特拜克有限公司 For monitoring the system used the unauthorized of equipment
CN102084372A (en) * 2008-04-01 2011-06-01 优盖提特拜克有限公司 System for monitoring the unauthorized use of a device
CN102084371A (en) * 2008-04-02 2011-06-01 优盖提特拜克有限公司 System for mitigating the unauthorized use of a device
CN103034792B (en) * 2011-09-30 2016-03-02 纬创资通股份有限公司 Mobile device security method
CN103034792A (en) * 2011-09-30 2013-04-10 纬创资通股份有限公司 Mobile device security method
CN103810447A (en) * 2012-11-07 2014-05-21 宏达国际电子股份有限公司 Method and apparatus for performing security control by using captured image
US9558338B2 (en) 2012-11-07 2017-01-31 Htc Corporation Method and apparatus for performing security control by using captured image
WO2015074411A1 (en) * 2013-11-20 2015-05-28 中兴通讯股份有限公司 Terminal unlocking method, apparatus and terminal
CN104363987A (en) * 2014-05-29 2015-02-18 华为技术有限公司 Method and device for selecting terminal modes
US10402572B2 (en) 2014-05-29 2019-09-03 Huawei Technologies Co., Ltd. Method and apparatus for selecting mode of terminal
CN105306664A (en) * 2014-06-24 2016-02-03 中兴通讯股份有限公司 Hidden application program display method, device and terminal
CN107077846A (en) * 2014-10-24 2017-08-18 索尼互动娱乐股份有限公司 Control device, control method, program and information storage medium
CN104853013B (en) * 2015-04-21 2019-06-21 努比亚技术有限公司 A kind of mobile terminal and its theft preventing method and device
CN104853013A (en) * 2015-04-21 2015-08-19 努比亚技术有限公司 Mobile terminal and antitheft method and antitheft device thereof
CN105050061A (en) * 2015-06-23 2015-11-11 广东欧珀移动通信有限公司 Method and device for sending messages on the basis of user voiceprint information
CN105007565A (en) * 2015-07-02 2015-10-28 广东小天才科技有限公司 Loss-prevention method and device for wearable intelligent device
CN105827810A (en) * 2015-10-20 2016-08-03 南京步步高通信科技有限公司 Voiceprint recognition-based communication terminal retrieve method and communication terminal
CN105827810B (en) * 2015-10-20 2019-09-24 南京步步高通信科技有限公司 A kind of communication terminal based on Application on Voiceprint Recognition recovers method and communication terminal
CN107451437A (en) * 2016-05-31 2017-12-08 百度在线网络技术(北京)有限公司 The locking means and device of a kind of mobile terminal
CN106960667A (en) * 2017-03-08 2017-07-18 杭州联络互动信息科技股份有限公司 Position reminding methods, devices and systems
CN107862190A (en) * 2017-10-26 2018-03-30 广东欧珀移动通信有限公司 Based reminding method and Related product

Also Published As

Publication number Publication date
CN101141722B (en) 2012-07-11

Similar Documents

Publication Publication Date Title
CN101141722B (en) Safety mobile telephone based on user vocal feature and implementing method thereof
CN101141721B (en) Safety mobile telephone based communication custom
US6782278B2 (en) Dialing method for dynamically simplifying international call in cellular phone
EP1601216B1 (en) Mobile communication terminal
US6751481B2 (en) Dialing method for effecting international call in intelligent cellular phone
KR101474568B1 (en) Method and apparatus for providing international telephone auto dialiing in mobile communication terminal
WO1997011546A9 (en) Automatic prefix dialing systems and methods for mobile radiotelephones
WO2008059324A1 (en) Portable communication having accidental key press filtering
CN101951432A (en) Method, device and mobile terminal for adding contact information into address book
CN1759595A (en) Emergency call-back for a wireless communication device equipped with a user removable module
US20030191646A1 (en) Method of setting voice processing parameters in a communication device
JP2002540731A (en) System and method for generating a sequence of numbers for use by a mobile phone
US20070197233A1 (en) Method of location-oriented call screening for communication apparatus
KR20010094229A (en) Method and system for operating a phone by voice recognition technique
KR20000051317A (en) Method for displaying the current time of called party in portalbe mobile teminal
CN105554223A (en) Connection establishment method and mobile terminal
US7336933B2 (en) Method of maintaining communication with a device
CN1302681C (en) Method for preventing burglarious of mobile phone and anti-theft mobile phone
CN103369506A (en) Card selection prompting method of multi-card terminal and multi-card mobile terminal
CN102217295A (en) Management method of voice message and device thereof
EP1472854B1 (en) In-bound call directed telephone station and method of directing a telephone station based on an in-bound call
JP2001016315A (en) Automatic programming method for voice mail system access number of radiotelephone
JP2005348240A (en) Telephone device
US20090104929A1 (en) Method and apparatus for muting a sounder device
JPH0984128A (en) Communication equipment with voice recognizing function

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant