CN106127089A - Mobile terminal safety means of defence and device - Google Patents

Mobile terminal safety means of defence and device Download PDF

Info

Publication number
CN106127089A
CN106127089A CN201610517989.2A CN201610517989A CN106127089A CN 106127089 A CN106127089 A CN 106127089A CN 201610517989 A CN201610517989 A CN 201610517989A CN 106127089 A CN106127089 A CN 106127089A
Authority
CN
China
Prior art keywords
mobile terminal
proving program
stolen
defence
subscriber identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610517989.2A
Other languages
Chinese (zh)
Inventor
谢苏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENZHEN HIPAD COMMUNICATION TECHNOLOGY Co Ltd
Original Assignee
SHENZHEN HIPAD COMMUNICATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN HIPAD COMMUNICATION TECHNOLOGY Co Ltd filed Critical SHENZHEN HIPAD COMMUNICATION TECHNOLOGY Co Ltd
Priority to CN201610517989.2A priority Critical patent/CN106127089A/en
Publication of CN106127089A publication Critical patent/CN106127089A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/18Status alarms
    • G08B21/24Reminder alarms, e.g. anti-loss alarms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/60Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
    • H04M2203/6045Identity confirmation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/60Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
    • H04M2203/6054Biometric subscriber identification

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

Mobile terminal safety means of defence and device, relate to mobile terminal safety means of defence, the method, by setting up functional module construction, is controlled computer system by computer program instructions and completes, and these computer program instructions store in a computer-readable storage medium.The method is, detects when the Subscriber Identity Module in described mobile terminal is removed, and detects whether by card taking proving program, if otherwise sending alarm.If burglar does not takes out the Subscriber Identity Module in the mobile terminal stolen by force by card taking proving program, described mobile terminal will send alarm, such as sound and light alarm, to cause the owner of lost property and the attention of people around, if burglar does not takes out the Subscriber Identity Module in the mobile terminal stolen, the owner of lost property then can make stolen mobile terminal ring by the way of dialing its number, therefore, no matter whether burglar removes the Subscriber Identity Module in the mobile terminal stolen, and the owner of lost property has the bigger sound that may follow to give stolen mobile terminal for change.

Description

Mobile terminal safety means of defence and device
Technical field
The present invention relates to mobile terminal safety means of defence, the method is by setting up functional module construction, by computer journey Sequence instruction controls computer system and completes, and these computer program instructions store in a computer-readable storage medium.
Background technology
Smart machine development in recent years is swift and violent, and especially mobile terminal, such as smart mobile phone and panel computer, because it is portable Property characteristic, obtained greatly universal.Size of mobile terminals is small and exquisite, it is simple to carry, and also easily becomes because of the value of himself Target for burglar.Mobile terminal theft case major part be to occur at confusion closing or semiclosed place, such as bus, Subway and elevator etc., burglar is generally not capable of after going smoothly leaving scene at once, and due to this feature, the major part owner of lost property is mobile in discovery The number that can dial stolen mobile terminal after terminal is stolen makes its ring, it is intended to follows sound and gives for change, to this end, burglar is usual after going smoothly Can manage cut off mobile terminal signal of communication, to prevent from being found by the owner of lost property, remove battery and remove Subscriber Identity Module (SIM, UIM and USIM etc.) it is the most frequently used and effective manner.Nowadays, the mobile terminal of the overwhelming majority, for saving space, uses built-in The structure of battery, battery is non-dismountable, makes mobile terminal shut down by removing battery, forces its mode that cannot communicate the most not It is suitable for again.Therefore, removing Subscriber Identity Module becomes the important means that burglar cuts off the signal of communication of the mobile terminal stolen, stolen Mobile terminal in and Subscriber Identity Module is once removed by burglar, the owner of lost property gives the difficulty of stolen mobile terminal for change and is increased by ?.
Summary of the invention
In view of this, the present invention provides a kind of mobile terminal safety means of defence, and it can reduce the owner of lost property and give stolen shifting for change The difficulty of dynamic terminal, helps the owner of lost property quickly to give stolen mobile terminal for change.
For achieving the above object, the present invention provides techniques below scheme.
Mobile terminal safety means of defence, detects that, when the Subscriber Identity Module in described mobile terminal is removed, detection is No by card taking proving program, if otherwise sending alarm.
If burglar does not takes out the Subscriber Identity Module in the mobile terminal stolen, described shifting by force by card taking proving program Dynamic terminal will send alarm, such as sound and light alarm, causing the owner of lost property and the attention of people around, if burglar does not takes out and steals Subscriber Identity Module in mobile terminal, the owner of lost property then can make stolen mobile terminal ring by the way of dialing its number, because of This, no matter whether burglar removes the Subscriber Identity Module in the mobile terminal stolen, and the owner of lost property has the bigger sound that may follow to give for change Stolen mobile terminal, therefore the mobile terminal safety means of defence of the present invention can reduce the owner of lost property gives stolen mobile terminal for change Difficulty, helps the owner of lost property quickly to give stolen mobile terminal for change.
It is preferred that card taking proving program is the proving program of state of unlocking.For protection privacy, major part user can The proving program of the states that unlock such as screen locking password is set, only with just can the locking shape of deactivation system by this proving program State, the system that can enter operates, and is in lock-out state when the mobile terminal of the overwhelming majority is stolen, and burglar is not due to Know screen locking password or fingerprint etc. cannot be verified, it is impossible to releasing the lock-out state of the mobile terminal stolen, unlock state The proving program person that may also function as verification operation be whether the effect of owner, it therefore can be allowed to hold concurrently as card taking proving program, One can facilitate owner to carry out removing the operation of Subscriber Identity Module, and the lock-out state that only need to release mobile terminal is the most operable, no Must carry out extra checking again, two come also can simplified system, it is not necessary to the most separately set the module of card taking proving program.
During it is preferred that also comprise the steps: to detect power-off operation, start shutdown proving program, only by shutdown Just shutdown after proving program.Shutdown proving program is set, cuts off the communication of the mobile terminal stolen to prevent burglar from passing through shutdown Signal, reduces the owner of lost property further and gives the difficulty of stolen mobile terminal for change.
It is preferred that described proving program includes password authentification step and/or biological characteristic validation step.
Detailed description of the invention
Below in conjunction with specific embodiment, the present invention is elaborated.
The mobile terminal safety means of defence of the present embodiment predominantly, detects that the Subscriber Identity Module in mobile terminal is moved Except time, detect whether by card taking proving program, if by card taking proving program, being issued by alarm.Detection user knows Not blocking the mode whether being removed and have a variety of, such as detection may bring for draw-in groove mobile installing Subscriber Identity Module In testing circuit level change, detection Subscriber Identity Module communication state, detection be attached to described draw-in groove other devices (as SD card) state change etc., be certainly not limited to above-mentioned three kinds of modes, the most exhaustive at this.It is meant that by card taking proving program Card taking proving program is proved to be successful, specifically described herein similar by the implication of other proving programs, also refer in this checking Being proved to be successful in program, various proving programs specifically described herein all include the step of password authentification and/or biological characteristic validation, Password can be character password and gesture password etc., and biological characteristic may refer to stricture of vagina, iris, gene order, recognition of face harmony Whether sounds etc., because these features are all exclusive, it is possible to be owner for verification operation person.Send the form of alarm Be also not necessarily limited to one, most common be also maximally effective be sound and light alarm, it is also possible to be to the number specified or instant messaging account Number or mail account send alert message, or the number specified of calling, can be one or more combination above-mentioned.
One preferred embodiment is, card taking proving program is exactly that mobile terminal unlocks the proving program of state.Move Dynamic terminal is substantially the structure of touch screen, and for preventing maloperation, need not use when, user's lockable system extinguishes screen In curtain, or regular hour, operation then can not lock automatically, and now mobile terminal is just in the lock state, the need to Reusing mobile terminal, then need first to be unlocked, i.e. unlock state, user can arrange the state of unlocking time Time needs checking, i.e. arranges the proving program of the state that unlocks, only by this proving program, just can the state of unlocking enter Enter system, as it has been described above, the proving program unlocking lock-out state can include the step of password authentification and/or biological characteristic validation Suddenly, character password checking, gesture password authentification and fingerprint authentication it are most commonly used that.Nowadays preserve in mobile terminal much more very Privacy information, once reveals, may result in personal safety and safety of property occur threaten, for protection mobile terminal in privacy information, Major part user can arrange the proving program of the state of unlocking, and is frequently executed, and therefore, allows the state of unlocking Proving program is held concurrently as card taking proving program, and whether the person that can play verification operation is the effect of owner, and also can facilitate Owner carries out removing the operation of Subscriber Identity Module, it is only necessary to release the lock-out state of mobile terminal, it is not necessary to carry out extra again Checking, the most also can simplified system, it is not necessary to the most separately set the module of card taking proving program.But, also there is small part user not set Put the proving program of the state of unlocking, say, that unlock mobile terminal and be not required to checking, it is only necessary to simply grasp Work can unlock, such as slip screen etc., for this situation, it is necessary to separately set card taking proving program.
Additionally, the mobile terminal safety means of defence of the present invention may also include the step of shutdown checking, mobile terminal is in inspection When measuring power-off operation, starting shutdown proving program, only just shutdown after by shutdown proving program, if in shutdown checking journey Authentication failed in sequence, fails by shutdown proving program, then cannot shut down, to prevent burglar from passing through what shutdown cut-out was stolen The signal of communication of mobile terminal, reduces the owner of lost property further and gives the difficulty of stolen mobile terminal for change.
Method given herein, all or part of step therein can be by setting up functional module construction, by computer Programmed instruction controls computer system to be completed.These computer program instructions store in a computer-readable storage medium.
The above disclosed preferred embodiment being only the invention, can not limit present invention wound with this certainly The interest field made, the equivalent variations therefore made according to the invention claim, still belong to the invention and contained Scope.

Claims (8)

1. mobile terminal safety means of defence, is characterized in that, detects when the Subscriber Identity Module in described mobile terminal is removed, Detect whether by card taking proving program, if otherwise sending alarm.
Mobile terminal safety means of defence the most according to claim 1, is characterized in that, card taking proving program is for unlocking The proving program of state.
Mobile terminal safety means of defence the most according to claim 1, is characterized in that, also comprise the steps:
When power-off operation being detected, start shutdown proving program, only just shutdown after by shutdown proving program.
Mobile terminal safety means of defence the most according to claim 1, is characterized in that, described proving program includes that password is tested Card step and/or biological characteristic validation step.
5. mobile terminal safety preventer, is characterized in that, including:
Remove checking device: detect when the Subscriber Identity Module in described mobile terminal is removed, detect whether to pass through card taking Proving program;
Warning devices: if not by card taking proving program, then sending alarm.
Mobile terminal safety preventer the most according to claim 5, is characterized in that, card taking proving program is for unlocking The proving program of state.
Mobile terminal safety preventer the most according to claim 5, is characterized in that, also include:
Shutdown checking device: when power-off operation being detected, starts shutdown proving program, only just closes after by shutdown proving program Machine.
Mobile terminal safety preventer the most according to claim 5, is characterized in that, described proving program includes that password is tested Card device and/or biological characteristic verification device.
CN201610517989.2A 2016-07-01 2016-07-01 Mobile terminal safety means of defence and device Pending CN106127089A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610517989.2A CN106127089A (en) 2016-07-01 2016-07-01 Mobile terminal safety means of defence and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610517989.2A CN106127089A (en) 2016-07-01 2016-07-01 Mobile terminal safety means of defence and device

Publications (1)

Publication Number Publication Date
CN106127089A true CN106127089A (en) 2016-11-16

Family

ID=57469118

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610517989.2A Pending CN106127089A (en) 2016-07-01 2016-07-01 Mobile terminal safety means of defence and device

Country Status (1)

Country Link
CN (1) CN106127089A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107707754A (en) * 2017-09-29 2018-02-16 河南职业技术学院 A kind of intelligent terminal recovers method and apparatus
CN112583974A (en) * 2020-12-16 2021-03-30 珠海格力电器股份有限公司 Anti-theft method for SIM card in mobile terminal, mobile terminal and storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6105140A (en) * 1998-02-10 2000-08-15 Compaq Computer Corporation Secure power supply
CN200980102Y (en) * 2006-11-29 2007-11-21 中兴通讯股份有限公司 A mobile phone with theft-proof function
CN101340638A (en) * 2008-08-12 2009-01-07 青岛海信移动通信技术股份有限公司 Alarm control method of mobile communication apparatus and mobile communication apparatus
CN101420684A (en) * 2007-10-26 2009-04-29 英业达股份有限公司 Anti-theft system for mobile phone and method thereof
CN101764887A (en) * 2009-12-17 2010-06-30 上海华勤通讯技术有限公司 Anti-theft mobile phone and using method thereof
CN101808318A (en) * 2009-02-18 2010-08-18 深圳富泰宏精密工业有限公司 Data protection system and method for communication device
CN201594918U (en) * 2009-09-14 2010-09-29 深圳市戴文科技有限公司 Mobile terminal
CN104123514A (en) * 2013-04-26 2014-10-29 腾讯科技(深圳)有限公司 Shutdown validation method and device
CN105430164A (en) * 2015-10-30 2016-03-23 宁波萨瑞通讯有限公司 Contact person information scene switching method and mobile terminal

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6105140A (en) * 1998-02-10 2000-08-15 Compaq Computer Corporation Secure power supply
CN200980102Y (en) * 2006-11-29 2007-11-21 中兴通讯股份有限公司 A mobile phone with theft-proof function
CN101420684A (en) * 2007-10-26 2009-04-29 英业达股份有限公司 Anti-theft system for mobile phone and method thereof
CN101340638A (en) * 2008-08-12 2009-01-07 青岛海信移动通信技术股份有限公司 Alarm control method of mobile communication apparatus and mobile communication apparatus
CN101808318A (en) * 2009-02-18 2010-08-18 深圳富泰宏精密工业有限公司 Data protection system and method for communication device
CN201594918U (en) * 2009-09-14 2010-09-29 深圳市戴文科技有限公司 Mobile terminal
CN101764887A (en) * 2009-12-17 2010-06-30 上海华勤通讯技术有限公司 Anti-theft mobile phone and using method thereof
CN104123514A (en) * 2013-04-26 2014-10-29 腾讯科技(深圳)有限公司 Shutdown validation method and device
CN105430164A (en) * 2015-10-30 2016-03-23 宁波萨瑞通讯有限公司 Contact person information scene switching method and mobile terminal

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
陈吕洲: "《ARDUINO程序设计基础 第2版》", 28 February 2015, 北京航空航天大学出版社 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107707754A (en) * 2017-09-29 2018-02-16 河南职业技术学院 A kind of intelligent terminal recovers method and apparatus
CN112583974A (en) * 2020-12-16 2021-03-30 珠海格力电器股份有限公司 Anti-theft method for SIM card in mobile terminal, mobile terminal and storage medium

Similar Documents

Publication Publication Date Title
KR20150012989A (en) Method and apparatus for application protection
US8718602B2 (en) Method and system for remote control of smart card
US8726371B2 (en) Enhanced security for devices enabled for wireless communications
CN104537291A (en) Screen interface unlocking method and screen interface unlocking device
RU2556383C2 (en) Method of preventing unauthorised use of vehicle equipment
CN101287211A (en) Anti-theft method for mobile terminal
CN105376711B (en) Position indicating method, device and the wearable device of wearable device
EP2919499B1 (en) Version protection method and apparatus for mobile terminals
CN104820805B (en) A kind of method and device of subscriber identification card information theft-preventing
CN105630277B (en) Unlocking screen method and tripper for terminal
CN102883050A (en) Mobile terminal and unlocking method thereof
CN104021358A (en) Anti-theft control method and device for mobile terminal
CN105857246A (en) Control method, device and system for automobile starting lock
CN104036171A (en) Method for protecting mobile equipment and mobile equipment
CN105893811A (en) Method and device for verifying reset of electronic equipment
CN105184184A (en) Anti-theft method for terminal data
US11234114B2 (en) Device operation controller, device operation control method, and computer program
CN105653918B (en) Method for safely carrying out, safe operating device and terminal
CN106127089A (en) Mobile terminal safety means of defence and device
KR20140093556A (en) Security System Using Two factor Authentication And Security Method of Electronic Equipment Using Thereof
CN104598785B (en) A kind of method and device for entering different mode based on unlocking pin
CN104462929B (en) The method for secret protection and device of a kind of mobile device
CN105872218A (en) Anti-theft method and device and mobile phone
CN106506843A (en) A kind of theft preventing method and mobile terminal
CN107154999B (en) Terminal and unlocking method and storage device based on environmental information

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20161116

RJ01 Rejection of invention patent application after publication