CN105657147A - Mobile terminal anti-theft method and device - Google Patents

Mobile terminal anti-theft method and device Download PDF

Info

Publication number
CN105657147A
CN105657147A CN201510287466.9A CN201510287466A CN105657147A CN 105657147 A CN105657147 A CN 105657147A CN 201510287466 A CN201510287466 A CN 201510287466A CN 105657147 A CN105657147 A CN 105657147A
Authority
CN
China
Prior art keywords
mobile terminal
identity information
information
user
card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510287466.9A
Other languages
Chinese (zh)
Other versions
CN105657147B (en
Inventor
卞永军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201510287466.9A priority Critical patent/CN105657147B/en
Publication of CN105657147A publication Critical patent/CN105657147A/en
Application granted granted Critical
Publication of CN105657147B publication Critical patent/CN105657147B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention provides a mobile terminal anti-theft method and device. An operation instruction (the operation instruction comprises a powerboot instruction or a standby waking instruction) input by a user is received; when detecting that the identity information of a legal user bound with the mobile terminal and the card information of a legal SIM card bound with the identity information are pre-stored in the mobile terminal and an SIM card is arranged in the mobile terminal, the card information of the SIM card is read; the identity information of a user is obtained; when the obtained identity information of the user does not conform to that pre-stored in the mobile terminal, or the read card information does not conform to that pre-stored in the mobile terminal, the action corresponding to the operation instruction is forbidden; in this way, when the current using user of the mobile terminal is illegal, or when the current SIM card in the mobile terminal is illegal, the condition that the mobile terminal executes the action corresponding to the operation instruction is effectively avoided; and the security of the data in the mobile terminal is effectively ensured.

Description

A kind of anti-theft method for mobile terminal and device
Technical field
The application relates to guarding against theft for mobile terminal technical field, particularly relates to a kind of anti-theft method for mobile terminal and device.
Background technology
Mobile terminal is as a kind of communication tool that carry with, that fashion is small and exquisite, and the life of people is more and more important, facilitates the life of people largely. But, although the life that mobile terminal is people is provided convenience, but, after mobile terminal is lost, the impact that the life of people produces also be can not be ignored.
Such as, mobile terminal stores a lot of information relevant to this mobile phone users (Web bank, contact people etc.), after mobile terminal is lost, often there is mobile terminal acquisition person to utilize the pry mobile phone users privacy of the data in mobile terminal, carry out the situations such as malpractice, and then the life of mobile phone users can be produced severe impact.
Therefore, need a kind of anti-theft method for mobile terminal and device badly, to ensure the security of data in mobile terminal.
Summary of the invention
In view of this, the application provides a kind of anti-theft method for mobile terminal and device, by mobile terminal currently uses the authentication of the card information of SIM card in the identity information of user and mobile terminal, to ensure the security of data in mobile terminal.
In order to realize above-mentioned purpose, the technical scheme that the embodiment of the present invention provides is as follows:
A kind of anti-theft method for mobile terminal, comprising:
Receiving the operational order of user's input, described operational order comprises starting up's instruction or standby wakeup instruction;
When the identity information prestoring the legal user with described mobile terminal binding in mobile terminal being detected and with the card information of the legal SIM card of described identity information binding, detect and whether described mobile terminal is provided with SIM card;
When described mobile terminal is provided with SIM card, reads the card information of described SIM card and obtain the identity information of user;
When the identity information prestored in the identity information and described mobile terminal of the described user got is not inconsistent, or when the card information prestored in the described card information read and described mobile terminal is not inconsistent, forbid performing the action corresponding with described operational order.
Preferably, when the identity information prestored in the identity information and described mobile terminal of the described user got is not inconsistent, or when the card information prestored in the described card information read and described mobile terminal is not inconsistent, the method also comprises:
Forbidding performing the action corresponding with the delete instruction received, described delete instruction comprises: the identity information and/or card information that prestore are deleted in described mobile terminal in instruction.
Preferably, when not arranging SIM card in described mobile terminal, the method also comprises:
Obtain the identity information of user;
When the identity information prestored in the identity information and described mobile terminal of the described user got is not inconsistent, forbid performing the action corresponding with described operational order.
Preferably, when the identity information prestored in the identity information and described mobile terminal of the described user got is not inconsistent, the method also comprises:
Forbidding performing the action corresponding with the delete instruction received, described delete instruction comprises: the identity information and/or card information that prestore are deleted in described mobile terminal in instruction.
Preferably, when the card information of the identity information prestoring the legal user with described mobile terminal binding in mobile terminal and the SIM card that do not prestore being detected, the method also comprises:
Obtain the identity information of user;
When the identity information prestored in the identity information and described mobile terminal of the described user got is not inconsistent, forbid performing the action corresponding with described operational order.
Preferably, when the identity information of card information and the non-prestored user prestoring the legal SIM card with described mobile terminal binding in mobile terminal being detected, the method also comprises:
Detect and whether described mobile terminal is provided with SIM card;
When described mobile terminal is provided with SIM card, read the card information of described SIM card;
When the card information prestored in the described card information read and described mobile terminal is not inconsistent, forbid performing the action corresponding with described operational order.
Preferably, when the identity information of the card information of the SIM card that do not prestore in mobile terminal and user being detected, the method also comprises:
The prompting information of display for pointing out user to prestore identity information and/or card information;
The information of response user prestores operation, and generation prestores information, described in prestore information: the identity information of user, the card information of SIM card, and the binding relationship information between described mobile terminal, the identity information of user and the card information of SIM card.
A kind of guarding against theft for mobile terminal device, comprising:
Instruction reception unit, for receiving the operational order of user's input, described operational order comprises starting up's instruction or standby wakeup instruction;
Detecting unit, for when the identity information prestoring the legal user with described mobile terminal binding in mobile terminal being detected and with the card information of the legal SIM card of described identity information binding, detecting and whether be provided with SIM card in described mobile terminal;
Information acquisition unit, for when being provided with SIM card in described mobile terminal, reads the card information of described SIM card and obtains the identity information of user;
First actuator unit, for not being inconsistent when the identity information prestored in the identity information of the described user got and described mobile terminal, or when the card information prestored in the described card information read and described mobile terminal is not inconsistent, forbid performing the action corresponding with described operational order.
Preferably, also comprise the 2nd actuator unit,
Described 2nd actuator unit, for not being inconsistent when the identity information prestored in the identity information of the described user got and described mobile terminal, or when the card information prestored in the described card information read and described mobile terminal is not inconsistent, forbidding performing the action corresponding with the delete instruction received, described delete instruction comprises: the identity information and/or card information that prestore are deleted in described mobile terminal in instruction.
Preferably, also comprise the 3rd actuator unit,
Described 3rd actuator unit, for when not arranging SIM card in described mobile terminal, obtaining the identity information of user; And when the identity information prestored in the identity information and described mobile terminal of the described user got is not inconsistent, forbid performing the action corresponding with described operational order.
The application provides a kind of anti-theft method for mobile terminal and device, by receiving the operational order (this operational order comprises starting up's instruction or standby wakeup instruction) of user's input; When detect the identity information prestoring the legal user with mobile terminal binding in mobile terminal and with the card information of legal SIM card of identity information binding and mobile terminal in be provided with SIM card time, the card information of reading SIM card also obtains the identity information of user; When the identity information prestored in the identity information and mobile terminal of the user got is not inconsistent, or when the card information prestored in the card information read and mobile terminal is not inconsistent, forbid performing the mode of the action corresponding with operational order, effectively prevent the use user when current mobile terminal illegal, or when the SIM card in current mobile terminal is illegal, mobile terminal performs the situation of the action corresponding with aforesaid operations instruction, and then effectively ensure that the security of data in mobile terminal.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, it is briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is only embodiments of the invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, it is also possible to obtain other accompanying drawing according to the accompanying drawing provided.
A kind of anti-theft method for mobile terminal schema that Fig. 1 provides for the embodiment of the present application one;
Another kind of anti-theft method for mobile terminal schema that Fig. 2 provides for the embodiment of the present application one;
Another anti-theft method for mobile terminal schema that Fig. 3 provides for the embodiment of the present application one;
Another anti-theft method for mobile terminal schema that Fig. 4 provides for the embodiment of the present application one;
Another anti-theft method for mobile terminal schema that Fig. 5 provides for the embodiment of the present application one;
The structural representation of a kind of guarding against theft for mobile terminal device that Fig. 6 provides for the embodiment of the present application two.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is only the present invention's part embodiment, instead of whole embodiments. Based on the embodiment in the present invention, those of ordinary skill in the art, not making other embodiments all obtained under creative work prerequisite, belong to the scope of protection of the invention.
Embodiment one:
A kind of anti-theft method for mobile terminal schema that Fig. 1 provides for the embodiment of the present application one.
As shown in Figure 1, the method comprises:
S101, the operational order receiving user's input, operational order comprises starting up's instruction or standby wakeup instruction;
In the embodiment of the present application, it is preferable that, receiving the operational order of user's input, this operational order comprises starting up's instruction or standby wakeup instruction.
Preferably, by clicking, starting up's key realizes input starting up's instruction to user, realizes input standby wakeup instruction by double-clicking screen. Below being only the optimal way of the embodiment of the present application, contriver can arrange arbitrarily, according to the demand of oneself, the mode that user enters the operating instructions, and does not limit at this.
Concrete, starting up's instruction is the instruction of indicating mobile terminal start; Standby wakeup instruction is that indicating mobile terminal is from standby screen lock state to the instruction waking released state up.
S102, when the identity information prestoring the legal user with mobile terminal binding in mobile terminal being detected and with the card information of legal SIM card of identity information binding, detect in mobile terminal whether be provided with SIM card; When detect mobile terminal is provided with SIM card time, perform step S103;
In the embodiment of the present application, it is preferable that, contriver can according in any setting steps S102 of the demand of oneself when operating method when not arranging SIM card in mobile terminal being detected, do not limit at this.
In the embodiment of the present application, it is preferable that, when after the operational order receiving user's input, the identity information that whether stores in mobile terminal, card information need to be detected, and the binding relationship between mobile terminal, identity information and card information.
When detecting, mobile terminal stores identity information and card information, and identity information is the identity information of the legal user with mobile terminal binding, and during the card information of the legal SIM card that card information is the identity information with legal user binds, whether detection mobile terminal is provided with SIM card.
In the embodiment of the present application, it is preferable that, according to mobile terminal, card information, and the binding relationship between the two in identity information, it is determined that bound is legal mutually between the two, as, user A and mobile terminal A is bound, so can think that user A is the legal user of mobile terminal A; Mobile terminal A is also the legal mobile terminal of user A.
In the embodiment of the present application, it is preferable that, the card information of SIM card is the information of the uniqueness characterizing SIM clamp part. And preferred, the telephone number of SIM card can be regarded as the information of the uniqueness of sign SIM clamp part, also it is exactly using the card information of the telephone number of SIM card as SIM card.
Below it is only the optimal way of the embodiment of the present application, contriver can arrange arbitrarily the concrete manifestation form of the card information of SIM card according to the demand of oneself, if the data obtained after being encrypted according to preset algorithm by the telephone number of SIM card are as the card information of SIM card, do not limit at this.
In the embodiment of the present application, it is preferable that, the identity information of user is the information of the uniqueness of indicating user identity.
In the embodiment of the present application, it is preferable that, identity information: face information, iris information and/or finger print information. Namely, also the identity information of user is the face information of user, iris information and/or finger print information.
Below being only the optimal way of the embodiment of the present application, contriver can arrange arbitrarily the concrete manifestation form of identity information according to the demand of oneself, and e.g., the data obtained after face information being encrypted according to preset algorithm, as identity information, do not limit at this.
The card information of S103, reading SIM card also obtains the identity information of user;
In the embodiment of the present application, it is preferable that, when detect mobile terminal is provided with SIM card time, read the card information of the SIM card in this mobile terminal, and obtain the identity information of user.
S104, it is not inconsistent when the identity information prestored in the identity information and mobile terminal of the user got, or when the card information prestored in the card information read and mobile terminal is not inconsistent, forbids performing the action corresponding with operational order.
In the embodiment of the present application, it is preferable that, forbid that the process performing the action corresponding with operational order comprises: when operational order comprises starting up's instruction, forbid performing the boot action corresponding with starting up's instruction; When operational order comprises standby wakeup instruction, forbid performing the standby wakeup action corresponding with standby wakeup instruction.
The application provides a kind of anti-theft method for mobile terminal, by receiving the operational order (this operational order comprises starting up's instruction or standby wakeup instruction) of user's input; When detect the identity information prestoring the legal user with mobile terminal binding in mobile terminal and with the card information of legal SIM card of identity information binding and mobile terminal in be provided with SIM card time, the card information of reading SIM card also obtains the identity information of user; When the identity information prestored in the identity information and mobile terminal of the user got is not inconsistent, or when the card information prestored in the card information read and mobile terminal is not inconsistent, forbid performing the mode of the action corresponding with operational order, effectively prevent the use user when current mobile terminal illegal, or when the SIM card in current mobile terminal is illegal, mobile terminal performs the situation of the action corresponding with aforesaid operations instruction, and then effectively ensure that the security of data in mobile terminal.
On the basis of a kind of anti-theft method for mobile terminal as shown in Figure 1 of the embodiment of the present application one offer, comprise further: when the identity information prestored in the identity information and mobile terminal of the user got is not inconsistent, or when the card information prestored in the card information read and mobile terminal is not inconsistent, forbidding performing the action corresponding with the delete instruction received, delete instruction comprises: the identity information and/or card information that prestore are deleted in mobile terminal in instruction.
In the embodiment of the present application, it is preferable that, when receiving the delete instruction of user's input, mobile terminal currently residing state need to be judged. this judges that whether normally the mode of the current residing state of mobile terminal for judging user's unlatching mobile terminal and/or standby wakeup mobile terminal, also it is exactly, judge in above-mentioned steps S104 to be whether that " the identity information prestored in the identity information of the user got and mobile terminal is not inconsistent, or the card information prestored in the card information read and mobile terminal is not inconsistent " state, when being, then represent and forbid performing the action corresponding with operational order, also just represent, user fails normally to open mobile terminal and/or normal Standby and wakes mobile terminal up, so now, then forbid performing the action corresponding with the delete instruction received.
In the embodiment of the present application, by arranging " the identity information prestored in the identity information of the user got and mobile terminal is not inconsistent; or the card information prestored in the card information read and mobile terminal is not inconsistent; and forbidding performing the action corresponding with the delete instruction received, delete instruction comprises: indicate the identity information and/or card information that prestore in deletion mobile terminal. " step, ensure that the security of identity information and the SIM card information prestored in mobile terminal, and then further increase the security of data in mobile terminal.
Another kind of anti-theft method for mobile terminal schema that Fig. 2 provides for the embodiment of the present application one.
As shown in Figure 2, the method comprises:
S201, the operational order receiving user's input, operational order comprises starting up's instruction or standby wakeup instruction;
S202, when the identity information prestoring the legal user with mobile terminal binding in mobile terminal being detected and with the card information of legal SIM card of identity information binding, detect in mobile terminal whether be provided with SIM card; When detect mobile terminal is provided with SIM card time, perform step S203; When detect mobile terminal does not arrange SIM card time, perform step S205;
The card information of S203, reading SIM card also obtains the identity information of user;
In the embodiment of the present application, it is preferable that, when detect mobile terminal is provided with SIM card time, read the card information of the SIM card in this mobile terminal, and obtain the identity information of user.
S204, it is not inconsistent when the identity information prestored in the identity information and mobile terminal of the user got, or when the card information prestored in the card information read and mobile terminal is not inconsistent, forbids performing the action corresponding with operational order;
In the embodiment of the present application, it is preferable that, step S201-S204 is identical with the executive mode of the step of above-mentioned steps S101-S104, and the detailed process about step S201-S204 refers to above-mentioned steps S101-S104, does not limit at this.
S205, the identity information obtaining user;
In the embodiment of the present application, it is preferable that, when detect mobile terminal does not arrange SIM card time, then obtain the identity information of user.
S206, when the identity information prestored in the identity information and mobile terminal of the user got is not inconsistent, forbid performing the action corresponding with operational order.
Further, in a kind of anti-theft method for mobile terminal that the embodiment of the present application provides, also comprise: when the identity information prestored in the identity information and mobile terminal of the user got is not inconsistent, forbidding performing the action corresponding with the delete instruction received, delete instruction comprises: the identity information and/or card information that prestore are deleted in mobile terminal in instruction.
Another anti-theft method for mobile terminal schema that Fig. 3 provides for the embodiment of the present application one.
As shown in Figure 3, the method comprises:
S301, the operational order receiving user's input, operational order comprises starting up's instruction or standby wakeup instruction;
In the embodiment of the present application, it is preferable that, step S301 is identical with the execution process of above-mentioned steps S101, and the detailed process about step S301 refers to above-mentioned steps S101, does not do detailed restriction at this.
S302, when the card information of the identity information prestoring the legal user with mobile terminal binding in mobile terminal and the SIM card that do not prestore being detected, obtain user identity information;
In the embodiment of the present application, preferably, in step S302 pointed " when the identity information prestoring the legal user with mobile terminal binding in mobile terminal being detected, and during the card information of the SIM card that do not prestore " in detection mobile terminal prestores information content (as, whether detection mobile terminal stores identity information, card information, and mobile terminal, binding relationship between identity information and card information) identical with the content in above-mentioned steps S102, its difference is that the result detected out is different, the result detected out in above-mentioned steps S102 be " mobile terminal prestores the legal user with mobile terminal binding identity information and with the card information of legal SIM card of identity information binding ", and the result detected in step S302 is " the identity information prestoring the legal user with mobile terminal binding in mobile terminal detected, and the card information of the SIM card that do not prestore ".
S303, when the identity information prestored in the identity information and mobile terminal of the user got is not inconsistent, forbid performing the action corresponding with operational order.
Another anti-theft method for mobile terminal schema that Fig. 4 provides for the embodiment of the present application one.
S401, the operational order receiving user's input, operational order comprises starting up's instruction or standby wakeup instruction;
In the embodiment of the present application, it is preferable that, step S401 is identical with the execution process of above-mentioned steps S101, and the detailed process about step S401 refers to above-mentioned steps S101, does not do detailed restriction at this.
S402, when the identity information of card information and the non-prestored user prestoring the legal SIM card with mobile terminal binding in mobile terminal being detected, detection mobile terminal in whether be provided with SIM card; When detect mobile terminal is provided with SIM card time, perform step S403;
In the embodiment of the present application, it is preferable that, contriver can according in any setting steps S402 of the demand of oneself when operating method when not arranging SIM card in mobile terminal being detected, do not limit at this.
In the embodiment of the present application, preferably, in step S402 pointed " when the card information prestoring the legal SIM card with mobile terminal binding in mobile terminal being detected, and during the identity information of non-prestored user " in detection mobile terminal prestores information content (as, whether detection mobile terminal stores identity information, card information, and mobile terminal, binding relationship between identity information and card information) identical with the content in above-mentioned steps S102, its difference is that the result detected out is different, the result detected out in above-mentioned steps S102 be " mobile terminal prestores the legal user with mobile terminal binding identity information and with the card information of legal SIM card of identity information binding ", and the result detected in step S402 is " the card information prestoring the legal SIM card with mobile terminal binding in mobile terminal detected, and the identity information of non-prestored user ".
The card information of S403, reading SIM card;
S404, when the card information prestored in the card information read and mobile terminal is not inconsistent, forbid performing the action corresponding with operational order.
Another anti-theft method for mobile terminal schema that Fig. 5 provides for the embodiment of the present application one.
As shown in Figure 5, the method comprises:
S501, the operational order receiving user's input, operational order comprises starting up's instruction or standby wakeup instruction;
In the embodiment of the present application, it is preferable that, step S501 is identical with the execution process of above-mentioned steps S101, and the detailed process about step S501 refers to above-mentioned steps S101, does not do detailed restriction at this.
S502, when the identity information of the card information of the SIM card that do not prestore in mobile terminal and user being detected, the prompting information of display for pointing out user to prestore identity information and/or card information;
In the embodiment of the present application, preferably, in step S502 pointed " when the identity information of the card information of the SIM card that do not prestore in mobile terminal and user being detected " in detect the information that prestores in mobile terminal content (as, whether detection mobile terminal stores identity information, card information, and mobile terminal, binding relationship between identity information and card information) identical with the content in above-mentioned steps S102, its difference is that the result detected out is different, the result detected out in above-mentioned steps S102 be " mobile terminal prestores the legal user with mobile terminal binding identity information and with the card information of legal SIM card of identity information binding ", and the result detected in step S402 is " the card information of the SIM card that do not prestore in mobile terminal and the identity information of user being detected ".
In the embodiment of the present application, it is preferable that, when the identity information of the card information of the SIM card that do not prestore in mobile terminal and user being detected, display alarm information, this prompting information prestores identity information and/or card information for pointing out user.
The information of S503, response user prestores operation, and generation prestores information, and prestore information: the identity information of user, the card information of SIM card, and the binding relationship information between mobile terminal, the identity information of user and the card information of SIM card.
Further, in the anti-theft method for mobile terminal that the embodiment of the present application one provides, also comprise: on the basis of the information that prestores in detection mobile terminal, with reference to the setting of user, to realize guarding against theft for mobile terminal scheme. as, in the anti-theft method for mobile terminal as shown in Figure 1 that the embodiment of the present application provides, when the identity information prestoring the legal user with mobile terminal binding in mobile terminal being detected and with the card information of the legal SIM card of identity information binding, whether inquiry is previously provided with detection mode, when be previously provided with detection mode (as, this detection mode is only the identity of user verified) time, even if the identity information prestoring the legal user with mobile terminal binding in mobile terminal and the card information of the legal SIM card with the binding of identity information being detected, now, do not need to judge whether mobile terminal is provided with SIM card yet, and when being provided with SIM card, perform step S103-S104, but only need to obtain the identity information of user, and judge that whether the identity information that gets be not inconsistent with the identity information that prestores in mobile terminal, when the identity information prestored in the identity information and mobile terminal of the user got is not inconsistent, forbid performing the action corresponding with operational order.
In the embodiment of the present application, it is preferable that, mobile terminal comprises: mobile phone, PDA (PersonalDigitalAssistant, palm PC) etc. Below being only the optimal way of the embodiment of the present application, contriver can arrange arbitrarily the concrete manifestation form of mobile terminal according to the demand of oneself, does not limit at this.
By the above-mentioned further introduction to a kind of anti-theft method for mobile terminal that the embodiment of the present application provides so that a kind of anti-theft method for mobile terminal that the embodiment of the present application provides is more clear, complete, it is convenient to those skilled in the art and understands.
Embodiment two:
The structural representation of a kind of guarding against theft for mobile terminal device that Fig. 6 provides for the embodiment of the present application two.
As shown in Figure 6, this device comprises:
Instruction reception unit 1, for receiving the operational order of user's input, operational order comprises starting up's instruction or standby wakeup instruction;
Whether detecting unit 2, for when the identity information prestoring the legal user with mobile terminal binding in mobile terminal being detected and with the card information of the legal SIM card of identity information binding, being provided with SIM card in detection mobile terminal;
Information acquisition unit 3, for when being provided with SIM card in mobile terminal, the card information of reading SIM card also obtains the identity information of user;
First actuator unit 4, for not being inconsistent when the identity information prestored in the identity information of user that get with mobile terminal, or when the card information prestored in the card information read and mobile terminal is not inconsistent, forbids the action that execution is corresponding with operational order.
Further, in a kind of guarding against theft for mobile terminal device that the embodiment of the present application provides, also comprise the 2nd actuator unit, 2nd actuator unit, for not being inconsistent when the identity information prestored in the identity information of the user got and mobile terminal, or when the card information prestored in the card information read and mobile terminal is not inconsistent, forbidding performing the action corresponding with the delete instruction received, delete instruction comprises: the identity information prestored in instruction deletion mobile terminal and/or card information.
Further, in a kind of guarding against theft for mobile terminal device that the embodiment of the present application provides, also comprise the 3rd actuator unit, the 3rd actuator unit, for when mobile terminal does not arrange SIM card, obtaining the identity information of user; And when the identity information prestored in the identity information and mobile terminal of the user got is not inconsistent, forbid performing the action corresponding with operational order.
The application provides a kind of guarding against theft for mobile terminal device, by receiving the operational order (this operational order comprises starting up's instruction or standby wakeup instruction) of user's input; When detect the identity information prestoring the legal user with mobile terminal binding in mobile terminal and with the card information of legal SIM card of identity information binding and mobile terminal in be provided with SIM card time, the card information of reading SIM card also obtains the identity information of user; When the identity information prestored in the identity information and mobile terminal of the user got is not inconsistent, or when the card information prestored in the card information read and mobile terminal is not inconsistent, forbid performing the mode of the action corresponding with operational order, effectively prevent the use user when current mobile terminal illegal, or when the SIM card in current mobile terminal is illegal, mobile terminal performs the situation of the action corresponding with aforesaid operations instruction, and then effectively ensure that the security of data in mobile terminal.
In this specification sheets, each embodiment adopts the mode gone forward one by one to describe, and what each embodiment emphasis illustrated is the difference with other embodiments, between each embodiment identical similar portion mutually see. For device disclosed in embodiment, owing to it corresponds to the method disclosed in Example, so what describe is fairly simple, relevant part illustrates see method part.
Below it is only the preferred implementation of the application, enables those skilled in the art understand or realize the application. To be apparent to one skilled in the art to the multiple amendment of these embodiments, General Principle as defined herein when not departing from the spirit or scope of the application, can realize in other embodiments. Therefore, the application can not be limited in these embodiments shown in this article, but be met the widest scope consistent with principle disclosed herein and features of novelty.

Claims (10)

1. an anti-theft method for mobile terminal, it is characterised in that, comprising:
Receiving the operational order of user's input, described operational order comprises starting up's instruction or standby wakeup instruction;
When the identity information prestoring the legal user with described mobile terminal binding in mobile terminal being detected and with the card information of the legal SIM card of described identity information binding, detect and whether described mobile terminal is provided with SIM card;
When described mobile terminal is provided with SIM card, reads the card information of described SIM card and obtain the identity information of user;
When the identity information prestored in the identity information and described mobile terminal of the described user got is not inconsistent, or when the card information prestored in the described card information read and described mobile terminal is not inconsistent, forbid performing the action corresponding with described operational order.
2. method according to claim 1, it is characterized in that, when the identity information prestored in the identity information and described mobile terminal of the described user got is not inconsistent, or when the card information prestored in the described card information read and described mobile terminal is not inconsistent, the method also comprises:
Forbidding performing the action corresponding with the delete instruction received, described delete instruction comprises: the identity information and/or card information that prestore are deleted in described mobile terminal in instruction.
3. method according to claim 1-2 any one, it is characterised in that, when not arranging SIM card in described mobile terminal, the method also comprises:
Obtain the identity information of user;
When the identity information prestored in the identity information and described mobile terminal of the described user got is not inconsistent, forbid performing the action corresponding with described operational order.
4. method according to claim 3, it is characterised in that, when the identity information prestored in the identity information and described mobile terminal of the described user got is not inconsistent, the method also comprises:
Forbidding performing the action corresponding with the delete instruction received, described delete instruction comprises: the identity information and/or card information that prestore are deleted in described mobile terminal in instruction.
5. method according to claim 1, it is characterised in that, when the card information of the identity information prestoring the legal user with described mobile terminal binding in mobile terminal and the SIM card that do not prestore being detected, the method also comprises:
Obtain the identity information of user;
When the identity information prestored in the identity information and described mobile terminal of the described user got is not inconsistent, forbid performing the action corresponding with described operational order.
6. method according to claim 1, it is characterised in that, when the identity information of card information and the non-prestored user prestoring the legal SIM card with described mobile terminal binding in mobile terminal being detected, the method also comprises:
Detect and whether described mobile terminal is provided with SIM card;
When described mobile terminal is provided with SIM card, read the card information of described SIM card;
When the card information prestored in the described card information read and described mobile terminal is not inconsistent, forbid performing the action corresponding with described operational order.
7. method according to claim 1, it is characterised in that, when the identity information of the card information of the SIM card that do not prestore in mobile terminal and user being detected, the method also comprises:
The prompting information of display for pointing out user to prestore identity information and/or card information;
The information of response user prestores operation, and generation prestores information, described in prestore information: the identity information of user, the card information of SIM card, and the binding relationship information between described mobile terminal, the identity information of user and the card information of SIM card.
8. a guarding against theft for mobile terminal device, it is characterised in that, comprising:
Instruction reception unit, for receiving the operational order of user's input, described operational order comprises starting up's instruction or standby wakeup instruction;
Detecting unit, for when the identity information prestoring the legal user with described mobile terminal binding in mobile terminal being detected and with the card information of the legal SIM card of described identity information binding, detecting and whether be provided with SIM card in described mobile terminal;
Information acquisition unit, for when being provided with SIM card in described mobile terminal, reads the card information of described SIM card and obtains the identity information of user;
First actuator unit, for not being inconsistent when the identity information prestored in the identity information of the described user got and described mobile terminal, or when the card information prestored in the described card information read and described mobile terminal is not inconsistent, forbid performing the action corresponding with described operational order.
9. device according to claim 8, it is characterised in that, also comprise the 2nd actuator unit,
Described 2nd actuator unit, for not being inconsistent when the identity information prestored in the identity information of the described user got and described mobile terminal, or when the card information prestored in the described card information read and described mobile terminal is not inconsistent, forbidding performing the action corresponding with the delete instruction received, described delete instruction comprises: the identity information and/or card information that prestore are deleted in described mobile terminal in instruction.
10. device according to claim 8-9 any one, it is characterised in that, also comprise the 3rd actuator unit,
Described 3rd actuator unit, for when not arranging SIM card in described mobile terminal, obtaining the identity information of user; And when the identity information prestored in the identity information and described mobile terminal of the described user got is not inconsistent, forbid performing the action corresponding with described operational order.
CN201510287466.9A 2015-05-29 2015-05-29 A kind of anti-theft method for mobile terminal and device Active CN105657147B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510287466.9A CN105657147B (en) 2015-05-29 2015-05-29 A kind of anti-theft method for mobile terminal and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510287466.9A CN105657147B (en) 2015-05-29 2015-05-29 A kind of anti-theft method for mobile terminal and device

Publications (2)

Publication Number Publication Date
CN105657147A true CN105657147A (en) 2016-06-08
CN105657147B CN105657147B (en) 2019-10-11

Family

ID=56481613

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510287466.9A Active CN105657147B (en) 2015-05-29 2015-05-29 A kind of anti-theft method for mobile terminal and device

Country Status (1)

Country Link
CN (1) CN105657147B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106507334A (en) * 2016-12-30 2017-03-15 维沃移动通信有限公司 A kind of identity identifying method and mobile terminal
CN106791171A (en) * 2017-01-16 2017-05-31 北京奇虎科技有限公司 A kind of card-locking method of mobile terminal, device and mobile terminal
CN107169384A (en) * 2017-05-15 2017-09-15 上海与德科技有限公司 A kind of guard method and system based on mobile terminal
CN108134995A (en) * 2017-04-26 2018-06-08 黄策 The validity management method of the separation between machine and card type network terminal
CN108307674A (en) * 2016-12-02 2018-07-20 华为技术有限公司 A kind of method and apparatus ensureing terminal security

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7031665B1 (en) * 1999-04-12 2006-04-18 Anders Trell Trust Method and device for utilization of mobile radio telephones for surveillance and/or control purposes
CN102231882A (en) * 2011-07-08 2011-11-02 康佳集团股份有限公司 Method and device for obtaining information in lost mobile communication terminal
CN102354353A (en) * 2011-09-27 2012-02-15 宇龙计算机通信科技(深圳)有限公司 Method for acquiring data and terminal
CN103607697A (en) * 2013-11-27 2014-02-26 宇龙计算机通信科技(深圳)有限公司 Terminal anti-theft method and system based on SIM card

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7031665B1 (en) * 1999-04-12 2006-04-18 Anders Trell Trust Method and device for utilization of mobile radio telephones for surveillance and/or control purposes
CN102231882A (en) * 2011-07-08 2011-11-02 康佳集团股份有限公司 Method and device for obtaining information in lost mobile communication terminal
CN102354353A (en) * 2011-09-27 2012-02-15 宇龙计算机通信科技(深圳)有限公司 Method for acquiring data and terminal
CN103607697A (en) * 2013-11-27 2014-02-26 宇龙计算机通信科技(深圳)有限公司 Terminal anti-theft method and system based on SIM card

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108307674A (en) * 2016-12-02 2018-07-20 华为技术有限公司 A kind of method and apparatus ensureing terminal security
CN108307674B (en) * 2016-12-02 2020-06-16 华为技术有限公司 Method and equipment for guaranteeing terminal safety
CN106507334A (en) * 2016-12-30 2017-03-15 维沃移动通信有限公司 A kind of identity identifying method and mobile terminal
CN106791171A (en) * 2017-01-16 2017-05-31 北京奇虎科技有限公司 A kind of card-locking method of mobile terminal, device and mobile terminal
CN106791171B (en) * 2017-01-16 2020-03-24 北京安云世纪科技有限公司 Card locking method and device of mobile terminal and mobile terminal
CN108134995A (en) * 2017-04-26 2018-06-08 黄策 The validity management method of the separation between machine and card type network terminal
CN107169384A (en) * 2017-05-15 2017-09-15 上海与德科技有限公司 A kind of guard method and system based on mobile terminal

Also Published As

Publication number Publication date
CN105657147B (en) 2019-10-11

Similar Documents

Publication Publication Date Title
US8375422B2 (en) Remote disablement of a communication device
CN105657147A (en) Mobile terminal anti-theft method and device
CN201828919U (en) Remote control lock using mobile phone blue tooth
CN104091133A (en) Method for protecting security of terminal, terminal and system
CN101616495A (en) The method and system of individual privacy in the protection mobile phone
CN103064607A (en) Method and system for unlocking device with touch screen
CN103064622A (en) Screen unlocking method and device for mobile terminal
CN103488918A (en) Application encrypting method and device for intelligent terminal
CN107615294A (en) A kind of identifying code short message display method and mobile terminal
CN105224194B (en) A kind of data processing method and terminal
CN103699860A (en) Terminal antitheft method and equipment
CN107835320A (en) A kind of short message display method of anti-leak
CN103885772A (en) Unlocking method and electronic device
CN105912911A (en) Method and system for managing application programs of mobile equipment
CN105549826A (en) Mobile terminal and locking method of slide page thereof
CN103488936A (en) Mobile terminal and mobile terminal security code validation method and device
CN101877848B (en) Mobile terminal, mobile terminal data protection method and mobile terminal monitoring system
CN103902882B (en) A kind of prevent user profile from leaking terminal and method
CN102857913B (en) Method and device for authenticating in safety channel establishing process as well as intelligent card and terminal
CN105069344B (en) mobile terminal locking method and device
CN104156653B (en) A kind of application guard method and the device of mobile terminal
CN102098386A (en) Unlocking method and device of terminal
CN104134024A (en) Mobile terminal privacy protection method and system
CN104392158A (en) Mobile terminal unlocking method and mobile terminal
CN104462929A (en) Privacy protection method and device for mobile equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant