CN106127089A - Mobile terminal safety means of defence and device - Google Patents
Mobile terminal safety means of defence and device Download PDFInfo
- Publication number
- CN106127089A CN106127089A CN201610517989.2A CN201610517989A CN106127089A CN 106127089 A CN106127089 A CN 106127089A CN 201610517989 A CN201610517989 A CN 201610517989A CN 106127089 A CN106127089 A CN 106127089A
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- proving program
- stolen
- defence
- subscriber identity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/88—Detecting or preventing theft or loss
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/18—Status alarms
- G08B21/24—Reminder alarms, e.g. anti-loss alarms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2203/00—Aspects of automatic or semi-automatic exchanges
- H04M2203/60—Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
- H04M2203/6045—Identity confirmation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2203/00—Aspects of automatic or semi-automatic exchanges
- H04M2203/60—Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
- H04M2203/6054—Biometric subscriber identification
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Business, Economics & Management (AREA)
- Emergency Management (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
Mobile terminal safety means of defence and device, relate to mobile terminal safety means of defence, the method, by setting up functional module construction, is controlled computer system by computer program instructions and completes, and these computer program instructions store in a computer-readable storage medium.The method is, detects when the Subscriber Identity Module in described mobile terminal is removed, and detects whether by card taking proving program, if otherwise sending alarm.If burglar does not takes out the Subscriber Identity Module in the mobile terminal stolen by force by card taking proving program, described mobile terminal will send alarm, such as sound and light alarm, to cause the owner of lost property and the attention of people around, if burglar does not takes out the Subscriber Identity Module in the mobile terminal stolen, the owner of lost property then can make stolen mobile terminal ring by the way of dialing its number, therefore, no matter whether burglar removes the Subscriber Identity Module in the mobile terminal stolen, and the owner of lost property has the bigger sound that may follow to give stolen mobile terminal for change.
Description
Technical field
The present invention relates to mobile terminal safety means of defence, the method is by setting up functional module construction, by computer journey
Sequence instruction controls computer system and completes, and these computer program instructions store in a computer-readable storage medium.
Background technology
Smart machine development in recent years is swift and violent, and especially mobile terminal, such as smart mobile phone and panel computer, because it is portable
Property characteristic, obtained greatly universal.Size of mobile terminals is small and exquisite, it is simple to carry, and also easily becomes because of the value of himself
Target for burglar.Mobile terminal theft case major part be to occur at confusion closing or semiclosed place, such as bus,
Subway and elevator etc., burglar is generally not capable of after going smoothly leaving scene at once, and due to this feature, the major part owner of lost property is mobile in discovery
The number that can dial stolen mobile terminal after terminal is stolen makes its ring, it is intended to follows sound and gives for change, to this end, burglar is usual after going smoothly
Can manage cut off mobile terminal signal of communication, to prevent from being found by the owner of lost property, remove battery and remove Subscriber Identity Module (SIM,
UIM and USIM etc.) it is the most frequently used and effective manner.Nowadays, the mobile terminal of the overwhelming majority, for saving space, uses built-in
The structure of battery, battery is non-dismountable, makes mobile terminal shut down by removing battery, forces its mode that cannot communicate the most not
It is suitable for again.Therefore, removing Subscriber Identity Module becomes the important means that burglar cuts off the signal of communication of the mobile terminal stolen, stolen
Mobile terminal in and Subscriber Identity Module is once removed by burglar, the owner of lost property gives the difficulty of stolen mobile terminal for change and is increased by
?.
Summary of the invention
In view of this, the present invention provides a kind of mobile terminal safety means of defence, and it can reduce the owner of lost property and give stolen shifting for change
The difficulty of dynamic terminal, helps the owner of lost property quickly to give stolen mobile terminal for change.
For achieving the above object, the present invention provides techniques below scheme.
Mobile terminal safety means of defence, detects that, when the Subscriber Identity Module in described mobile terminal is removed, detection is
No by card taking proving program, if otherwise sending alarm.
If burglar does not takes out the Subscriber Identity Module in the mobile terminal stolen, described shifting by force by card taking proving program
Dynamic terminal will send alarm, such as sound and light alarm, causing the owner of lost property and the attention of people around, if burglar does not takes out and steals
Subscriber Identity Module in mobile terminal, the owner of lost property then can make stolen mobile terminal ring by the way of dialing its number, because of
This, no matter whether burglar removes the Subscriber Identity Module in the mobile terminal stolen, and the owner of lost property has the bigger sound that may follow to give for change
Stolen mobile terminal, therefore the mobile terminal safety means of defence of the present invention can reduce the owner of lost property gives stolen mobile terminal for change
Difficulty, helps the owner of lost property quickly to give stolen mobile terminal for change.
It is preferred that card taking proving program is the proving program of state of unlocking.For protection privacy, major part user can
The proving program of the states that unlock such as screen locking password is set, only with just can the locking shape of deactivation system by this proving program
State, the system that can enter operates, and is in lock-out state when the mobile terminal of the overwhelming majority is stolen, and burglar is not due to
Know screen locking password or fingerprint etc. cannot be verified, it is impossible to releasing the lock-out state of the mobile terminal stolen, unlock state
The proving program person that may also function as verification operation be whether the effect of owner, it therefore can be allowed to hold concurrently as card taking proving program,
One can facilitate owner to carry out removing the operation of Subscriber Identity Module, and the lock-out state that only need to release mobile terminal is the most operable, no
Must carry out extra checking again, two come also can simplified system, it is not necessary to the most separately set the module of card taking proving program.
During it is preferred that also comprise the steps: to detect power-off operation, start shutdown proving program, only by shutdown
Just shutdown after proving program.Shutdown proving program is set, cuts off the communication of the mobile terminal stolen to prevent burglar from passing through shutdown
Signal, reduces the owner of lost property further and gives the difficulty of stolen mobile terminal for change.
It is preferred that described proving program includes password authentification step and/or biological characteristic validation step.
Detailed description of the invention
Below in conjunction with specific embodiment, the present invention is elaborated.
The mobile terminal safety means of defence of the present embodiment predominantly, detects that the Subscriber Identity Module in mobile terminal is moved
Except time, detect whether by card taking proving program, if by card taking proving program, being issued by alarm.Detection user knows
Not blocking the mode whether being removed and have a variety of, such as detection may bring for draw-in groove mobile installing Subscriber Identity Module
In testing circuit level change, detection Subscriber Identity Module communication state, detection be attached to described draw-in groove other devices (as
SD card) state change etc., be certainly not limited to above-mentioned three kinds of modes, the most exhaustive at this.It is meant that by card taking proving program
Card taking proving program is proved to be successful, specifically described herein similar by the implication of other proving programs, also refer in this checking
Being proved to be successful in program, various proving programs specifically described herein all include the step of password authentification and/or biological characteristic validation,
Password can be character password and gesture password etc., and biological characteristic may refer to stricture of vagina, iris, gene order, recognition of face harmony
Whether sounds etc., because these features are all exclusive, it is possible to be owner for verification operation person.Send the form of alarm
Be also not necessarily limited to one, most common be also maximally effective be sound and light alarm, it is also possible to be to the number specified or instant messaging account
Number or mail account send alert message, or the number specified of calling, can be one or more combination above-mentioned.
One preferred embodiment is, card taking proving program is exactly that mobile terminal unlocks the proving program of state.Move
Dynamic terminal is substantially the structure of touch screen, and for preventing maloperation, need not use when, user's lockable system extinguishes screen
In curtain, or regular hour, operation then can not lock automatically, and now mobile terminal is just in the lock state, the need to
Reusing mobile terminal, then need first to be unlocked, i.e. unlock state, user can arrange the state of unlocking time
Time needs checking, i.e. arranges the proving program of the state that unlocks, only by this proving program, just can the state of unlocking enter
Enter system, as it has been described above, the proving program unlocking lock-out state can include the step of password authentification and/or biological characteristic validation
Suddenly, character password checking, gesture password authentification and fingerprint authentication it are most commonly used that.Nowadays preserve in mobile terminal much more very
Privacy information, once reveals, may result in personal safety and safety of property occur threaten, for protection mobile terminal in privacy information,
Major part user can arrange the proving program of the state of unlocking, and is frequently executed, and therefore, allows the state of unlocking
Proving program is held concurrently as card taking proving program, and whether the person that can play verification operation is the effect of owner, and also can facilitate
Owner carries out removing the operation of Subscriber Identity Module, it is only necessary to release the lock-out state of mobile terminal, it is not necessary to carry out extra again
Checking, the most also can simplified system, it is not necessary to the most separately set the module of card taking proving program.But, also there is small part user not set
Put the proving program of the state of unlocking, say, that unlock mobile terminal and be not required to checking, it is only necessary to simply grasp
Work can unlock, such as slip screen etc., for this situation, it is necessary to separately set card taking proving program.
Additionally, the mobile terminal safety means of defence of the present invention may also include the step of shutdown checking, mobile terminal is in inspection
When measuring power-off operation, starting shutdown proving program, only just shutdown after by shutdown proving program, if in shutdown checking journey
Authentication failed in sequence, fails by shutdown proving program, then cannot shut down, to prevent burglar from passing through what shutdown cut-out was stolen
The signal of communication of mobile terminal, reduces the owner of lost property further and gives the difficulty of stolen mobile terminal for change.
Method given herein, all or part of step therein can be by setting up functional module construction, by computer
Programmed instruction controls computer system to be completed.These computer program instructions store in a computer-readable storage medium.
The above disclosed preferred embodiment being only the invention, can not limit present invention wound with this certainly
The interest field made, the equivalent variations therefore made according to the invention claim, still belong to the invention and contained
Scope.
Claims (8)
1. mobile terminal safety means of defence, is characterized in that, detects when the Subscriber Identity Module in described mobile terminal is removed,
Detect whether by card taking proving program, if otherwise sending alarm.
Mobile terminal safety means of defence the most according to claim 1, is characterized in that, card taking proving program is for unlocking
The proving program of state.
Mobile terminal safety means of defence the most according to claim 1, is characterized in that, also comprise the steps:
When power-off operation being detected, start shutdown proving program, only just shutdown after by shutdown proving program.
Mobile terminal safety means of defence the most according to claim 1, is characterized in that, described proving program includes that password is tested
Card step and/or biological characteristic validation step.
5. mobile terminal safety preventer, is characterized in that, including:
Remove checking device: detect when the Subscriber Identity Module in described mobile terminal is removed, detect whether to pass through card taking
Proving program;
Warning devices: if not by card taking proving program, then sending alarm.
Mobile terminal safety preventer the most according to claim 5, is characterized in that, card taking proving program is for unlocking
The proving program of state.
Mobile terminal safety preventer the most according to claim 5, is characterized in that, also include:
Shutdown checking device: when power-off operation being detected, starts shutdown proving program, only just closes after by shutdown proving program
Machine.
Mobile terminal safety preventer the most according to claim 5, is characterized in that, described proving program includes that password is tested
Card device and/or biological characteristic verification device.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610517989.2A CN106127089A (en) | 2016-07-01 | 2016-07-01 | Mobile terminal safety means of defence and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610517989.2A CN106127089A (en) | 2016-07-01 | 2016-07-01 | Mobile terminal safety means of defence and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106127089A true CN106127089A (en) | 2016-11-16 |
Family
ID=57469118
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610517989.2A Pending CN106127089A (en) | 2016-07-01 | 2016-07-01 | Mobile terminal safety means of defence and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106127089A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107707754A (en) * | 2017-09-29 | 2018-02-16 | 河南职业技术学院 | A kind of intelligent terminal recovers method and apparatus |
CN112583974A (en) * | 2020-12-16 | 2021-03-30 | 珠海格力电器股份有限公司 | Anti-theft method for SIM card in mobile terminal, mobile terminal and storage medium |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6105140A (en) * | 1998-02-10 | 2000-08-15 | Compaq Computer Corporation | Secure power supply |
CN200980102Y (en) * | 2006-11-29 | 2007-11-21 | 中兴通讯股份有限公司 | A mobile phone with theft-proof function |
CN101340638A (en) * | 2008-08-12 | 2009-01-07 | 青岛海信移动通信技术股份有限公司 | Alarm control method of mobile communication apparatus and mobile communication apparatus |
CN101420684A (en) * | 2007-10-26 | 2009-04-29 | 英业达股份有限公司 | Anti-theft system for mobile phone and method thereof |
CN101764887A (en) * | 2009-12-17 | 2010-06-30 | 上海华勤通讯技术有限公司 | Anti-theft mobile phone and using method thereof |
CN101808318A (en) * | 2009-02-18 | 2010-08-18 | 深圳富泰宏精密工业有限公司 | Data protection system and method for communication device |
CN201594918U (en) * | 2009-09-14 | 2010-09-29 | 深圳市戴文科技有限公司 | Mobile terminal |
CN104123514A (en) * | 2013-04-26 | 2014-10-29 | 腾讯科技(深圳)有限公司 | Shutdown validation method and device |
CN105430164A (en) * | 2015-10-30 | 2016-03-23 | 宁波萨瑞通讯有限公司 | Contact person information scene switching method and mobile terminal |
-
2016
- 2016-07-01 CN CN201610517989.2A patent/CN106127089A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6105140A (en) * | 1998-02-10 | 2000-08-15 | Compaq Computer Corporation | Secure power supply |
CN200980102Y (en) * | 2006-11-29 | 2007-11-21 | 中兴通讯股份有限公司 | A mobile phone with theft-proof function |
CN101420684A (en) * | 2007-10-26 | 2009-04-29 | 英业达股份有限公司 | Anti-theft system for mobile phone and method thereof |
CN101340638A (en) * | 2008-08-12 | 2009-01-07 | 青岛海信移动通信技术股份有限公司 | Alarm control method of mobile communication apparatus and mobile communication apparatus |
CN101808318A (en) * | 2009-02-18 | 2010-08-18 | 深圳富泰宏精密工业有限公司 | Data protection system and method for communication device |
CN201594918U (en) * | 2009-09-14 | 2010-09-29 | 深圳市戴文科技有限公司 | Mobile terminal |
CN101764887A (en) * | 2009-12-17 | 2010-06-30 | 上海华勤通讯技术有限公司 | Anti-theft mobile phone and using method thereof |
CN104123514A (en) * | 2013-04-26 | 2014-10-29 | 腾讯科技(深圳)有限公司 | Shutdown validation method and device |
CN105430164A (en) * | 2015-10-30 | 2016-03-23 | 宁波萨瑞通讯有限公司 | Contact person information scene switching method and mobile terminal |
Non-Patent Citations (1)
Title |
---|
陈吕洲: "《ARDUINO程序设计基础 第2版》", 28 February 2015, 北京航空航天大学出版社 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107707754A (en) * | 2017-09-29 | 2018-02-16 | 河南职业技术学院 | A kind of intelligent terminal recovers method and apparatus |
CN112583974A (en) * | 2020-12-16 | 2021-03-30 | 珠海格力电器股份有限公司 | Anti-theft method for SIM card in mobile terminal, mobile terminal and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR20150012989A (en) | Method and apparatus for application protection | |
US8718602B2 (en) | Method and system for remote control of smart card | |
US8726371B2 (en) | Enhanced security for devices enabled for wireless communications | |
CN104537291A (en) | Screen interface unlocking method and screen interface unlocking device | |
RU2556383C2 (en) | Method of preventing unauthorised use of vehicle equipment | |
CN101287211A (en) | Anti-theft method for mobile terminal | |
CN105376711B (en) | Position indicating method, device and the wearable device of wearable device | |
EP2919499B1 (en) | Version protection method and apparatus for mobile terminals | |
CN104820805B (en) | A kind of method and device of subscriber identification card information theft-preventing | |
CN105630277B (en) | Unlocking screen method and tripper for terminal | |
CN102883050A (en) | Mobile terminal and unlocking method thereof | |
CN104021358A (en) | Anti-theft control method and device for mobile terminal | |
CN105857246A (en) | Control method, device and system for automobile starting lock | |
CN104036171A (en) | Method for protecting mobile equipment and mobile equipment | |
CN105893811A (en) | Method and device for verifying reset of electronic equipment | |
CN105184184A (en) | Anti-theft method for terminal data | |
US11234114B2 (en) | Device operation controller, device operation control method, and computer program | |
CN105653918B (en) | Method for safely carrying out, safe operating device and terminal | |
CN106127089A (en) | Mobile terminal safety means of defence and device | |
KR20140093556A (en) | Security System Using Two factor Authentication And Security Method of Electronic Equipment Using Thereof | |
CN104598785B (en) | A kind of method and device for entering different mode based on unlocking pin | |
CN104462929B (en) | The method for secret protection and device of a kind of mobile device | |
CN105872218A (en) | Anti-theft method and device and mobile phone | |
CN106506843A (en) | A kind of theft preventing method and mobile terminal | |
CN107154999B (en) | Terminal and unlocking method and storage device based on environmental information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20161116 |
|
RJ01 | Rejection of invention patent application after publication |