CN109600519A - Mobile phone control method and system - Google Patents
Mobile phone control method and system Download PDFInfo
- Publication number
- CN109600519A CN109600519A CN201910108667.6A CN201910108667A CN109600519A CN 109600519 A CN109600519 A CN 109600519A CN 201910108667 A CN201910108667 A CN 201910108667A CN 109600519 A CN109600519 A CN 109600519A
- Authority
- CN
- China
- Prior art keywords
- mobile phone
- information
- owner
- redemption
- holder
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
- H04L67/025—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Human Computer Interaction (AREA)
- Computer Security & Cryptography (AREA)
- Telephone Function (AREA)
Abstract
The invention discloses a kind of mobile phone control methods, it is characterized in that, mobile phone is controlled by remote operation instruction, wherein, the interface that the mobile phone control method generates substitutes original desktop, the method allows to set the access right of mobile phone operating system, operation beyond permission can trigger security system, the duration of call of mobile phone can be set by remote mode, conversation object, electricity limitation, short message item number, file operation power, right to use and use duration for arbitrarily applying etc., after mobile phone loss, the method executes following security function: hidden to take pictures, recording, video recording, it gives a warning, screen locking or blank screen some time, record current location route track, call monitoring.
Description
Technical field
The present invention relates to field of mobile phones, more particularly, to a kind of mobile phone control method and system.
Background technique
Currently, the emergence of mobile phone especially smart phone, the function of mobile phone have obtained significant progress and progress.But phase
It is preferable not yet for the use of control for the mobile phone of mobile phone user to solve for the rapid progress of cell-phone function and application program
Certainly scheme.
For example, the very strong application of usage rates of the user such as wechat, microblogging now, since its Poisoning is very strong, including teenager
Masses inside are easy to ultra-long time using mobile phone, and then influence the physical and mental health of people.
For another example user also lacks the solution of an effective getting back mobile phone in the case that mobile phone is lost.Due to working as
The encryption of preceding mobile phone and booting lock function are very powerful, therefore the people for picking up lost mobile phone can not also open the hand of loss
Machine, although the safety on the one hand increasing data in mobile phone also allows for the people for picking up mobile phone due to that can not open mobile phone
Can not relate to mobile phone owner, therefore the information of many user's related preciousness when mobile phone is lost also is lost together to people
Cause greater loss.
Summary of the invention
Technical problem to be solved by the present invention lies in a kind of mobile phone control method and system is provided, it is super which solve people
The normal time using mobile phone and unhealthful problem and mobile phone consider handset security when losing and what mobile phone was difficult to withdraw ask
Topic.
According to an aspect of the present invention, a kind of mobile phone control method is provided, which is characterized in that pass through remote operation instruction
To control mobile phone, wherein the interface that the mobile phone control method generates substitutes original desktop, and the method allows to grasp mobile phone
The access right for making system is set, and the operation beyond permission can trigger security system, can set hand by remote mode
The duration of call of machine, conversation object, electricity limitation, short message item number, file operation power, the right to use arbitrarily applied and use duration
Deng after mobile phone loss, the method executes following security function: it is hidden take pictures, record, recording a video, giving a warning, screen locking
Or blank screen some time, record current location route track, call monitoring.
Preferably, it executes the cell phone system generated after the mobile phone control method and includes at least two display interfaces, point
It is not main screen and password screen, the main screen includes: prompt information, including the casting of date-time, weather, short message abstract, missed electric
Words, system notice, owner, contact information;Dialing button and short message button;Quick access icon, the password screen is by number
With operator composition, user's input passes through encryption generation password including number and operator information, once Password Input mistake,
The cell phone system starts security implementations immediately, and executes hidden authentication operation, and authentication mode includes face recognition, sound knowledge
Not, fingerprint recognition etc., in verification process, by user from including that image authentication, sound authentication, finger print identifying etc. are one or more
Select a kind of authentication mode in life-information authentication mode, the cell phone system monitoring camera, audio-frequency module, fingerprint module
Input, when detecting the input of trusted users, that is, is considered as and authenticates successfully.Otherwise it is considered as visitor, and triggers anti-lost protection.
Preferably, system reserving machine is advocated peace the identity information of owner affiliated person, is specifically included: photo, name, number, list
Position, address, occupation etc..Cell phone system can carry out two-sided information verification by voice or video.Wherein, cell phone system is also equipped with anti-
Function is lost, and function is redeemed in starting in the case where mobile phone is unverified, is preset before function is redeemed in starting after losing
Contact information, the contact information is shown in main screen information bar after mobile phone loss, also pre- before function is redeemed in starting
If Third-party payment account information, redemption money, the shipping address etc. redeemed after losing for mobile phone redeem information, the redemption
Information is shown in main screen information bar after mobile phone loss.
During executing redemption function, pass through the current location for collecting mobile phone holder, facial image, call note
Record, short message record etc. determine mobile phone holder information, and request mobile phone holder inputs collecting account information, and mobile phone holder is same
After meaning continues to execute redemption function, cell phone system notice Third-party payment platform freezes institute for Third-party payment account information
State redemption money, owner, which receives, to be executed acknowledgement after the mobile phone sent by shipping address in cell phone system and operate and notify the
Tripartite's payment platform is transferred to the redemption money to collecting account.
According to the another aspect that this originating party is bright, a kind of mobile phone control method is also provided, which is characterized in that including following step
Rapid: life-information obtaining step obtains the life-information including facial image, fingerprint image;Locking condition setting procedure, to lock
Fixed condition is set, and the locking condition includes pressing to lock key or human fatigue degree greater than preset value;Locking condition is sentenced
Disconnected step, judges whether current phone state meets locking condition;Phone lock step meets in current phone situation
Display alarm information when locking condition, and mobile phone is locked, mobile phone still retains its short message and call function in the locked state
Energy;The life-information obtaining step of mobile phone holder;Life-information authenticating step, is authenticated according to life-information, and certification is logical
It crosses, mobile phone is unlocked, authentification failure then executes loss processing step.
Preferably, the locking condition setting procedure includes the phone number that affiliated person is set in mobile phone, wherein described
Losing processing step includes: the redemption that requirement mobile phone holder input includes redemption money, Third-party payment account, redemption mode
Information;Send to the mobile phone of affiliated person includes current phone position, the cellphone information of capture image and redeeming including redemption information
It returns hospitality and asks;Redemption request is confirmed on affiliated person's mobile phone, and pays redemption money to Third-party payment account;
If owner gets lost mobile phone, life-information is authenticated, certification is by then by Third-party payment account
In redemption money pay mobile phone holder;
If owner does not get lost mobile phone, cell phone automatic dialing issues default letter to specified telephone number
Breath.
Preferably, life-information is authenticated the following steps are included: to the facial image of owner and mobile phone holder, referring to
Print image calculates separately corresponding image histogram;To the phase between the facial image and fingerprint image of owner and mobile phone holder
It is calculated by the following formula like degree:
Wherein, GI, jFor the facial image histogram of owner, PI, jFor the facial image histogram of mobile phone holder, GN, mFor
The fingerprint image histogram of owner, PN, mFor the fingerprint image histogram of mobile phone holder, ε,For preset constant, when Z be greater than it is pre-
If when threshold value, then certification passes through, otherwise authentification failure,
Also, life-information authenticate further comprising the steps of:
Matching primitives are carried out to the sound of owner and mobile phone holder, specific formula for calculation is as follows:
Wherein, total distortion degree of the D [T, R] between owner's sound and the sound of mobile phone holder, T=T (1) ... T
(n) } the N frame sound characteristic sequence of mobile phone holder is indicated, R={ R (1) ... R (m) } indicates the M frame sound characteristic sequence of owner
Column, m and n are respectively the sound frame number of owner and mobile phone holder, and D [T (n), R (m)] indicates the distortion factor of any two frame,
As N=M total distortion degree directly can be calculated according to formula;It can be by set R={ R as N ≠ M1, R2,
...Rm..., RMWith linear expansion it is mapped to a N frame sequence R={ R1, R2... Rn..., RN, then new sequence is calculated frame by frame
Column and T={ T1, T2... Tn..., TNBetween total distortion,
Wherein, linear expansion mapping calculation formula are as follows:
Wherein, when total distortion degree D [T, R] exceed a certain threshold value, then be considered as certification and pass through.
Preferably, the human fatigue degree is calculated by following formula:
D=t+ σ E+ μ T
Wherein, t is from elapsed time after mobile phone unlock, and E is electricity consumed by mobile phone after mobile phone unlocks, and T is hand
The temperature change of mobile phone after machine unlock, σ, μ are preset constant.
According to another aspect of the present invention, a kind of cellphone control system is provided, comprising: life-information acquisition device is used for
Obtain the life-information including facial image, fingerprint image;Locking condition setting device, for being set to locking condition,
The locking condition includes pressing to lock key or human fatigue degree greater than preset value, and the human fatigue degree passes through following formula
It calculates:
D=t+ σ E+ μ T
Wherein, t is from elapsed time after mobile phone unlock, and E is electricity consumed by mobile phone after mobile phone unlocks, and T is hand
The temperature change of mobile phone after machine unlock, σ, μ are preset constant;
Locking condition judgment means, for judging whether current phone state meets locking condition;Phone lock
Device for the display alarm information when current phone situation meets locking condition, and locks mobile phone;Life-information is recognized
Card device authenticates the life-information, authenticates by being then unlocked to mobile phone, authentification failure then carries out at loss
Reason.
Preferably, the locking condition setting device also sets the phone number of affiliated person, the mobile phone control
System further include: redeem information setting device, include redemption money, Third-party payment account, redeem for mobile phone holder input
The redemption information for the mode of returning;Sending device includes current phone position, the hand for capturing image for sending to the mobile phone of affiliated person
Machine information and the request of the redemption including redeeming information;Redeem processing unit, it is desirable that affiliated person on its handset to redemption request into
Row confirmation, and redemption money is paid to Third-party payment account, if owner obtains lost mobile phone, life-information is recognized
Card is authenticated by then paying the redemption money in Third-party payment account to mobile phone holder;Warning device, if owner does not have
Lost mobile phone is got, then cell phone automatic dialing is to specified telephone number, and issues presupposed information.
Preferably, the life-information authentication device is authenticated by following algorithm: to owner and mobile phone holder
Facial image, fingerprint image calculate separately corresponding image histogram;To the facial image and fingerprint of owner and mobile phone holder
Similarity between image is calculated by the following formula:
Wherein, GI, jFor the facial image histogram of owner, PI, jFor the facial image histogram of mobile phone holder, Gn,mFor
The fingerprint image histogram of owner, PN, mFor the fingerprint image histogram of mobile phone holder, ε,For preset constant;When Z is greater than in advance
If when threshold value, then certification passes through, otherwise authentification failure.
Detailed description of the invention
Fig. 1 is a kind of flow chart of mobile phone control method according to an embodiment of the present invention;
Fig. 2 is a kind of schematic diagram of cellphone control system according to an embodiment of the present invention.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right
The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and
It is not used in the restriction present invention.
According to one embodiment of present invention, a kind of mobile phone control method is provided, which is characterized in that acceptable legitimate user
Remote operation instruction control mobile phone (long-range control), the mobile phone control method can be present in mobile phone behaviour in a software form
Make in system;Or it is present in mobile phone hardware in the form of chip module;Or it is used cooperatively with hardware external mode with mobile phone;
Or (software and hardware or external) is used cooperatively using the above diversified forms.After cell phone system starting or screen light, this system
It automatically turns on, and is shown in the top layer of graphical interfaces, and substitute original top layer and apply (screen locking or desktop), or directly
It is embedded in mobile phone operating system in the form of mobile phone screen locking, desktop.
Executing the cell phone system that mobile phone control method according to the present invention generates allows the right to use to mobile phone operating system
Limit is set, and the operation beyond permission can trigger security system, and trigger anti-lost protection, which can be with
Access right, the duration of call, conversation object, electricity limitation, short message item number, the file operation power for setting mobile phone (contain photograph album, text
The modification of the All Files such as shelves, music, video is deleted, is checked, transmitting) and any application program access right and use
Duration.It is described to be calculated and be controlled by the human fatigue degree in following embodiment using duration.
Specific security implementations are for example: hidden to take pictures, record, recording a video;Give a warning (prompt tone, prompt information, splashette,
Light, vibration);Screen locking or blank screen some time;Record current location route track;Call monitoring.
Cell phone system includes at least two display interfaces, is main screen and password screen respectively, the main screen is by following part structure
At prompt information, including date-time information, Weather information, short message summary info, message registration information, system notification information,
Owner's information, contact information;Background picture;Dialing button and short message button, fast access icon (is connected to cell phone system
Arbitrarily can application item) and retain region (vacant or convert display different content with concrete scene).The password screen is by 0-9 number
Word and oeprator composition, are free of letter, and have following feature: password set-up mode includes several digital and several for input
The formula of operator, and operation result is obtained, password is obtained after encrypted;The input mode of password is input Any Digit and appoints
The formula operation result for operator of anticipating.Start security implementations immediately after Password Input mistake.
Cell phone system is also equipped with hidden authentication function, and specific authentication mode includes face recognition, image recognition, fingerprint knowledge
Not, voice recognition, action recognition, signal identification (contain bluetooth, wifi, NFC etc.), trusted users be added to address list selection or
Trusted users title is voluntarily inputted, and the image, sound, fingerprint, movement, the signal that acquire trusted users are one or more,
It selects and sets authentication mode.After screen lights in some time, system monitoring camera, audio-frequency module, signal identification mould
The input of block, sensor module, fingerprint module is considered as and authenticates successfully when detecting the input of trusted users.Otherwise it triggers
Anti-lost defencive function.
The identity information of advance reservation owner and owner donor or affiliated person are needed in above-mentioned cell phone system, it is specific to wrap
It includes: the information such as photo, name, number, unit, address, occupation.System is settable to be associated with particular person, sets association
People is associated with phone number, and owner's relationship, and carries out two-sided information verification by voice or video.
In a case where, cell phone system can star mobile phone and redeem function:
A) it is not authenticated by mobile phone;
B) super access right and Password Input mistake;
C) equipment exceeds safe distance range (can set 10-100 meters or map area);
D) after mobile phone is lost, it can check that security protection records on authorization affiliated person's mobile phone, comprising: the route rail of lost mobile phone
Mark, the content checked and duration, the application used and function, call short message backup monitor call in real time and hidden take pictures
The information such as recording, but it is not limited to this.
In a preferred embodiment, system reserving machine is advocated peace the identity information of owner affiliated person, is specifically included: photo,
Name, number, unit, address, occupation etc..Cell phone system can carry out two-sided information verification by voice or video.Wherein, mobile phone
System is also equipped with anti-lost function, and function is redeemed in starting in the case where mobile phone is unverified, before function is redeemed in starting
Contact information after default loss, the contact information are shown in main screen information bar after mobile phone loss, redeem in starting
Third-party payment account information, redemption money, the shipping address etc. redeemed after also default loss for mobile phone before function are redeemed
Information, the redemption information are shown in main screen information bar after mobile phone loss.During executing redemption function, pass through collection
The current location of mobile phone holder, facial image, message registration, short message record etc. determine mobile phone holder information, request hand
Machine holder inputs collecting account information, and after mobile phone holder agrees to continue with execution redemption function, cell phone system notifies third
Square payment platform freezes the redemption money for Third-party payment account information, and owner receives the hand sent by shipping address
Acknowledgement is executed after machine in cell phone system to operate and Third-party payment platform is notified to be transferred to the redemption money to collecting account.
In another embodiment of the present invention, in above-mentioned redemption function, system can preset state and a system after loss
Column operation, and it is lost state that mobile phone, which is arranged, can preset the contact person after losing and contact details data, contact number, and show
Show in main screen information bar;Trading password, redemption money, examination address are shown in information bar of reporting lost property to the authorities after default loss;Can by pair
The current location and track of currently used people, shooting photo, calling, short message, contact person etc. determine current holder information;Pass through
Third-party payment mode enables holder determine the mode of doing business of meeting or mailing, system record and detection device status, holder
Typing collecting account, name, typing trading password.Voluntarily the national authority mechanism official website of typing identity information carries out identity validation
The amount of (this, which is not backed up only to make to verify, uses and inform that holder maintains secrecy) both sides' transaction freezes in system, until owner
The password for receiving equipment and typing holder determines that system can be sent to holder's owner's preset password, then the funds on account that thaw arrive
Holder's account accomplishes contractual transaction, and a side, which breaks one's promise, all loss, and does the evidence for the inspection that can alarm.
Fig. 1 is a kind of flow chart of mobile phone control method according to an embodiment of the present invention.
In step 101, life-information is obtained from mobile phone camera, obtaining includes facial image, fingerprint image, voice messaging
Equal life-informations, can be shot with the more camera of mobile phone camera pixel.
In step 102, the locking condition of mobile phone is set, the locking condition includes pressing to lock key or user
Fatigue strength is greater than preset value, and preset value whether can be greater than with set conversation duration, and whether electricity uses more than preset value waiting.
The application program white list not constrained by locking condition can also be set.
In one embodiment of the invention, the human fatigue degree is calculated by following formula:
D=t+ σ E+ μ T
Wherein, t is from elapsed time after mobile phone unlock, and E is electricity consumed by mobile phone after mobile phone unlocks, and T is hand
The temperature change of mobile phone after machine unlock, σ, μ are preset constant.That is, long-time using mobile phone communication, play game or clear
It lookes in the case where website, the degree of fatigue of user is different, and the application programs such as the game of high concentration is needed usually to consume
Electricity is larger, therefore we combine mobile phone to use the information energy such as consumption electricity using time and mobile phone temp variation and mobile phone
Largely know the degree of fatigue of user.
In step 103, judge whether current phone state meets locking condition.
In step 104, the display alarm information when current phone situation meets locking condition, and mobile phone is locked.
Warning message is usually displayed on the display screen of mobile phone, can also be made a sound while real warning message by loudspeaker
It reminds.
After clicking power on button or cell phone system starting again or screen lights, this warning message is automatically turned on, and
It is shown in the top layer of mobile phone desktop.It substitutes original top layer and applies (mobile phone screen locking desktop or mobile phone desktop).
In step 105, the life-information of mobile phone holder is obtained by mobile phone camera, the life-information also includes people
The information such as face image information, finger print information and voice messaging.
In step 106, authenticated in mobile phone holder's life-information that step 105 obtains, certification is by then in step
Mobile phone is unlocked in 107, authentification failure thens follow the steps 108 loss processing step.
According to one embodiment of present invention, life-information is authenticated in step 106, comprising the following steps:
Corresponding image histogram is calculated separately to facial image, the fingerprint image of owner and mobile phone holder;Owner and mobile phone are held
Similarity between the facial image and fingerprint image of someone is calculated by the following formula:
Wherein, GI, jFor the facial image histogram of owner, PI, jFor the facial image histogram of mobile phone holder, GN, mFor
The fingerprint image histogram of owner, PN, mFor the fingerprint image histogram of mobile phone holder, ε,For preset constant, when Z be greater than it is pre-
If when threshold value, then certification passes through, otherwise authentification failure.
In a preferred embodiment of the invention, life-information authenticate further comprising the steps of:
Matching primitives are carried out to the sound of owner and mobile phone holder, specific formula for calculation is as follows:
Wherein, total distortion degree of the D [T, R] between owner's sound and the sound of mobile phone holder, T=T (1) ... T
(n) } the N frame sound characteristic sequence of mobile phone holder is indicated, R={ R (1) ... R (m) } indicates the M frame sound characteristic sequence of owner
Column, m and n are respectively the sound frame number of owner and mobile phone holder, and D [T (n), R (m)] indicates the distortion factor of any two frame,
As N=M total distortion degree directly can be calculated according to formula;It can be by set R={ R as N ≠ M1, R2,
...Rm..., RMWith linear expansion it is mapped to a N frame sequence R={ R1, R2... Rn..., RN, then new sequence is calculated frame by frame
Column and T={ T1, T2... Tn..., TNBetween total distortion,
Wherein, linear expansion mapping calculation formula are as follows:
Wherein, when total distortion degree D [T, R] exceed a certain threshold value, then be considered as certification and pass through.
Authenticating step can also be by identifying mobile phone received signal fingerprint (bluetooth, wifi, NFC).It is identified
Method those skilled in the art should be easily applied the existing prior art.
It in one embodiment of the invention, in a step 102 further include the phone number that affiliated person is set in mobile phone
The step of.Wherein, the step of processing is lost in the step 108, further includes: it is required that mobile phone holder input includes redeeming gold
Volume, Third-party payment account, the redemption information for redeeming mode, due under Vehicles Collected from Market economic environment, if there is economic interests are driven
It is dynamic to promote the holder for picking up mobile phone that the mobile phone of loss is returned owner as early as possible;Send to the mobile phone of affiliated person includes working as remote holder
Set, capture cellphone information and the request of the redemption including redeeming information of image in seat in the plane;On affiliated person's mobile phone to redemption request into
Row confirmation, and redemption money is paid to Third-party payment account;If owner gets lost mobile phone, life-information is recognized
Card is authenticated by then paying the redemption money in Third-party payment account to mobile phone holder;It is lost if owner does not get
It accidentally drops machine, then cell phone automatic dialing is to specified telephone number, and issues presupposed information.
It loses in processing step, the record of mobile phone mobile route track can also be carried out and opens the recording of mobile phone, record
As function and it is transferred to remote data base, is used as act and deed.
Fig. 2 is a kind of schematic diagram of cellphone control system according to an embodiment of the present invention.
According to another aspect of the present invention, a kind of cellphone control system is additionally provided, comprising: life-information acquisition device
201, locking condition setting device 202, mobile phone condition judgement device 203, phone lock device 204, life-information authentication device
205, it redeems information setting device 206, sending device 207, redeem device 208, warning device 209.
The life acquisition device 201 obtains the life-information including facial image, fingerprint image;Locking condition setting dress
Setting 202 pairs includes pressing locking key or human fatigue degree to set greater than the locking condition of preset value;Locking condition judgement
Device 203 judges whether current phone state meets locking condition;Phone lock device 204 is full in current phone situation
Display alarm information when sufficient locking condition, and mobile phone is locked;Life-information authentication device 205 to the life-information into
Row certification, authenticates by being then unlocked to mobile phone, authentification failure then carries out loss processing.
In one embodiment of the invention, the human fatigue degree is calculated by following formula:
D=t+ σ E+ μ T
Wherein, t is from elapsed time after mobile phone unlock, and E is electricity consumed by mobile phone after mobile phone unlocks, and T is hand
The temperature change of mobile phone after machine unlock, σ, μ are preset constant.
The locking condition setting device 203 also sets the phone number of affiliated person, the cellphone control system
Further include: in redeeming information setting device 208, mobile phone holder input includes redemption money, Third-party payment account, redeems
The redemption information of mode;It includes current phone position, the mobile phone letter for capturing image that sending device 207 is sent to the mobile phone of affiliated person
Breath and the request of the redemption including redeeming information;Redeeming processing unit 208 requires affiliated person to carry out on its handset to redemption request
Confirmation, and redemption money is paid to Third-party payment account, if owner obtains lost mobile phone, life-information is recognized
Card is authenticated by then paying the redemption money in Third-party payment account to mobile phone holder;Warning device 209, if machine
Master does not get lost mobile phone, then cell phone automatic dialing is to specified telephone number, and issues presupposed information.
The life-information authentication device 205 is authenticated by following algorithm: to the face of owner and mobile phone holder
Image, fingerprint image calculate separately corresponding image histogram;To the facial image and fingerprint image of owner and mobile phone holder
Between similarity be calculated by the following formula:
Wherein, GI, jFor the facial image histogram of owner, PI, jFor the facial image histogram of mobile phone holder, GN, mFor
The fingerprint image histogram of owner, PN, mFor the fingerprint image histogram of mobile phone holder, ε,For preset constant;When Z is greater than in advance
If when threshold value, then certification passes through, otherwise authentification failure.
In the embodiment of the present invention, preferably solve people since height collects using mobile phone fatigue strength by calculating name
Middle spirit leads to the problem of adverse consequences to body and mind using mobile phone, while passing through the redemption scheme under a kind of mobile phone loss situation
It solves the problems, such as that mobile phone is extremely difficult in the prior art to give for change, and solves loss by issuing alarm when mobile phone can not be redeemed
The problem of lacking further information when mobile phone is not returned and can not taking further measures to it.Through the embodiment of the present invention,
The body and mind of mobile phone user is easier to reach equilibrium state, while having ensured the problem of capable of giving for change as early as possible when mobile phone is lost.
The method of the embodiment of the present invention can be present in mobile phone operating system in a software form, or with chip module shape
Formula is present in mobile phone hardware, or is used cooperatively with hardware external mode with mobile phone, can also be matched using the above diversified forms
It closes and uses (software and hardware or external).
Taking the above-mentioned ideal embodiment according to the present invention as inspiration, through the above description, ordinary skill
Personnel can carry out various changes and amendments without departing from the scope of the technological thought of the present invention' completely.This invention
Technical scope be not limited to the contents of the specification, it is necessary to its technical model is determined according to scope of the claims
It encloses.
Claims (3)
1. a kind of mobile phone control method, which is characterized in that control mobile phone by remote operation instruction, wherein the mobile phone control
The interface that method processed generates substitutes original desktop, and the method allows to set the access right of mobile phone operating system,
Operation beyond permission can trigger security system, and the duration of call, the conversation object, electricity of mobile phone can be set by remote mode
Limitation, short message item number, file operation power, the right to use arbitrarily applied and use duration etc., after mobile phone loss, the method is held
The following security function of row: it is hidden take pictures, record, recording a video, giving a warning, screen locking or blank screen some time, record present bit
Set route track, call monitoring.
2. mobile phone control method according to claim 1, which is characterized in that execute generation after the mobile phone control method
Cell phone system include at least two display interfaces, be main screen and password screen respectively, the main screen includes: prompt information, including
Date-time, weather casting, short message abstract, missed call, system notice, owner, contact information;Dialing button and short message are pressed
Button;Quick access icon, the password screen are made of number and operator, and user's input includes that number and operator information are logical
It crosses encryption and generates password, once Password Input mistake, the cell phone system starts security implementations immediately, and executes hidden certification behaviour
Make, authentication mode includes face recognition, voice recognition, fingerprint recognition etc., in verification process, is recognized by user from including image
A kind of authentication mode, the mobile phone system are selected in one or more life-information authentication modes such as card, sound authentication, finger print identifying
The input of system monitoring camera, audio-frequency module, fingerprint module is considered as and authenticates successfully when detecting the input of trusted users;
Otherwise it is considered as visitor, and triggers anti-lost protection.
3. mobile phone control method according to claim 2, wherein system reserving machine advocate peace owner affiliated person identity letter
Breath, specifically includes: photo, name, number, unit, address, occupation etc..Cell phone system can carry out both sides by voice or video
Information is verified;Wherein, cell phone system is also equipped with anti-lost function, and function is redeemed in starting in the case where mobile phone is unverified,
The contact information after losing is preset before function is redeemed in starting, the contact information is shown in main screen after mobile phone loss
Information bar is used for Third-party payment account information, the redemption gold that mobile phone is redeemed before starting redemption function after also default loss
Volume, shipping address etc. redeem information, and the redemption information is shown in main screen information bar after mobile phone loss;
Execute redeem function during, by collecting the current location of mobile phone holder, facial image, message registration, short
Letter record etc. determines mobile phone holder information, and request mobile phone holder inputs collecting account information, mobile phone holder agree to after
After function is redeemed in continuous execution, cell phone system notice Third-party payment platform freezes described redeem for Third-party payment account information
The amount of money is returned, owner receives the mobile phone sent by shipping address, and execution acknowledgement operates and notifies third party in cell phone system later
Payment platform is transferred to the redemption money to collecting account.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910108667.6A CN109600519B (en) | 2016-09-29 | 2016-09-29 | Mobile phone control method and system |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910108667.6A CN109600519B (en) | 2016-09-29 | 2016-09-29 | Mobile phone control method and system |
CN201610864047.1A CN106453874B (en) | 2016-09-29 | 2016-09-29 | Mobile phone control method and system |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610864047.1A Division CN106453874B (en) | 2016-09-29 | 2016-09-29 | Mobile phone control method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109600519A true CN109600519A (en) | 2019-04-09 |
CN109600519B CN109600519B (en) | 2021-01-05 |
Family
ID=58170955
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610864047.1A Active CN106453874B (en) | 2016-09-29 | 2016-09-29 | Mobile phone control method and system |
CN201910108667.6A Active CN109600519B (en) | 2016-09-29 | 2016-09-29 | Mobile phone control method and system |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610864047.1A Active CN106453874B (en) | 2016-09-29 | 2016-09-29 | Mobile phone control method and system |
Country Status (1)
Country | Link |
---|---|
CN (2) | CN106453874B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115235065A (en) * | 2022-07-14 | 2022-10-25 | 小米科技(武汉)有限公司 | Control method and device of desktop air conditioner and storage medium |
CN115776538A (en) * | 2021-09-06 | 2023-03-10 | 解文武 | Method for realizing remote control after mobile phone is stolen |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20180126198A (en) * | 2017-05-17 | 2018-11-27 | 엘지전자 주식회사 | Mobile terminal |
JP7065294B2 (en) * | 2017-10-10 | 2022-05-12 | パナソニックIpマネジメント株式会社 | Manufacturing system and manufacturing method |
CN107682347A (en) * | 2017-10-16 | 2018-02-09 | 恒宝股份有限公司 | A kind of communication equipment and its communication means |
CN108154115B (en) * | 2017-12-22 | 2021-06-29 | 北京奇虎科技有限公司 | Object identification method and device based on camera scene and computing equipment |
CN108174035A (en) * | 2017-12-27 | 2018-06-15 | 中国地质大学(武汉) | A kind of smart mobile phone double mechanism long-range control method, equipment and storage device |
CN108537061A (en) * | 2018-04-17 | 2018-09-14 | 辽宁工程技术大学 | A kind of financial data security system |
CN109376555A (en) * | 2018-11-30 | 2019-02-22 | 成都知道创宇信息技术有限公司 | A method of evidence obtaining is monitored for Brute Force laptop password |
CN110417998A (en) * | 2019-07-26 | 2019-11-05 | 肇泽 | Information cuing method and device based on recognition of face |
CN113037931B (en) * | 2021-01-26 | 2024-01-12 | 视昀科技(深圳)有限公司 | Data reporting system and method for application environment monitoring |
CN114693306B (en) * | 2022-04-28 | 2023-04-07 | 润芯微科技(江苏)有限公司 | Payment early warning method and system suitable for unauthorized user |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101022610A (en) * | 2006-02-15 | 2007-08-22 | 乐金电子(中国)研究开发中心有限公司 | Cellphone with guard function and guard method |
CN101198119A (en) * | 2006-12-09 | 2008-06-11 | 北京三星通信技术研究有限公司 | Automatic loss reporting method and portable terminal using the same |
US20110273378A1 (en) * | 2010-05-05 | 2011-11-10 | Rachid Alameh | Mobile device with temperature sensing capability and method of operating same |
CN102693381A (en) * | 2012-05-08 | 2012-09-26 | 张�林 | Method, device and system for anti-theft of portable computer equipment |
CN103905639A (en) * | 2014-03-12 | 2014-07-02 | 上海天奕达电子科技有限公司 | Method and system for locking and unlocking screen |
CN104010088A (en) * | 2014-06-16 | 2014-08-27 | 中国地质大学(武汉) | Smart-phone anti-theft method and system |
KR20150053076A (en) * | 2013-11-07 | 2015-05-15 | 주식회사 이리언스 | Mobile Device and System having Mobile Office Application Security Support Function, and Mobile Office Application Security Support Method |
CN104660821A (en) * | 2015-03-04 | 2015-05-27 | 深圳市中兴移动通信有限公司 | Method for controlling using duration of terminal as well as mobile terminal |
US20150269832A1 (en) * | 2014-03-21 | 2015-09-24 | John Candillier | Systems and methods for facilitating the return of lost items to owners |
CN105530594A (en) * | 2014-09-30 | 2016-04-27 | 小米科技有限责任公司 | Communication method and device based remote control |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102624982A (en) * | 2012-03-12 | 2012-08-01 | 戴小天 | Antitheft method for mobile phone and application |
CN103634453A (en) * | 2012-08-22 | 2014-03-12 | 上海景岩电子技术有限公司 | Face recognition anti-theft mobile phone |
JP6052004B2 (en) * | 2013-03-27 | 2016-12-27 | 富士通株式会社 | Terminal device and terminal control program |
CN103581378A (en) * | 2013-10-31 | 2014-02-12 | 中晟国计科技有限公司 | Smart phone high in safety performance |
CN104023133B (en) * | 2014-05-23 | 2017-05-24 | 北京金山安全软件有限公司 | Anti-theft method and device for mobile terminal |
-
2016
- 2016-09-29 CN CN201610864047.1A patent/CN106453874B/en active Active
- 2016-09-29 CN CN201910108667.6A patent/CN109600519B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101022610A (en) * | 2006-02-15 | 2007-08-22 | 乐金电子(中国)研究开发中心有限公司 | Cellphone with guard function and guard method |
CN101198119A (en) * | 2006-12-09 | 2008-06-11 | 北京三星通信技术研究有限公司 | Automatic loss reporting method and portable terminal using the same |
US20110273378A1 (en) * | 2010-05-05 | 2011-11-10 | Rachid Alameh | Mobile device with temperature sensing capability and method of operating same |
CN102693381A (en) * | 2012-05-08 | 2012-09-26 | 张�林 | Method, device and system for anti-theft of portable computer equipment |
KR20150053076A (en) * | 2013-11-07 | 2015-05-15 | 주식회사 이리언스 | Mobile Device and System having Mobile Office Application Security Support Function, and Mobile Office Application Security Support Method |
CN103905639A (en) * | 2014-03-12 | 2014-07-02 | 上海天奕达电子科技有限公司 | Method and system for locking and unlocking screen |
US20150269832A1 (en) * | 2014-03-21 | 2015-09-24 | John Candillier | Systems and methods for facilitating the return of lost items to owners |
CN104010088A (en) * | 2014-06-16 | 2014-08-27 | 中国地质大学(武汉) | Smart-phone anti-theft method and system |
CN105530594A (en) * | 2014-09-30 | 2016-04-27 | 小米科技有限责任公司 | Communication method and device based remote control |
CN104660821A (en) * | 2015-03-04 | 2015-05-27 | 深圳市中兴移动通信有限公司 | Method for controlling using duration of terminal as well as mobile terminal |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115776538A (en) * | 2021-09-06 | 2023-03-10 | 解文武 | Method for realizing remote control after mobile phone is stolen |
CN115776537A (en) * | 2021-09-06 | 2023-03-10 | 解文武 | Method for realizing full-intelligent security mobile phone |
CN115941842A (en) * | 2021-09-06 | 2023-04-07 | 解文武 | Mobile phone safety realization method based on synchronous quick setting |
CN115235065A (en) * | 2022-07-14 | 2022-10-25 | 小米科技(武汉)有限公司 | Control method and device of desktop air conditioner and storage medium |
CN115235065B (en) * | 2022-07-14 | 2023-12-12 | 小米科技(武汉)有限公司 | Control method and device of desktop air conditioner and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN109600519B (en) | 2021-01-05 |
CN106453874A (en) | 2017-02-22 |
CN106453874B (en) | 2020-01-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109600519A (en) | Mobile phone control method and system | |
CN106101138B (en) | Method for processing business and device based on mobile terminal | |
CN103917727B (en) | Utilize the locking device adding strong security of iris image | |
US8205249B2 (en) | Method for carrying out a secure electronic transaction using a portable data support | |
JP4397827B2 (en) | Authentication system for portable terminal device having electronic money function | |
US11074327B2 (en) | Methods and systems for ensuring that an individual is authorized to conduct an activity | |
CN105447691A (en) | E-card transaction authorization based on geographic location | |
CN103907328A (en) | Mobile device-based authentication | |
US7389269B1 (en) | System and method for activating financial cards via biometric recognition | |
CN102084369A (en) | System for monitoring the unauthorized use of a device | |
WO2017178816A1 (en) | Event tickets with user biometric verification on the user mobile terminal | |
US20150161595A1 (en) | Digital payment card presentation systems, methods, and apparatuses | |
CN206522020U (en) | A kind of intelligent door lock and system | |
CN105447696A (en) | Automatic notification of transaction by bank card to customer device | |
JP2007016423A (en) | Locker system using bar code or two-dimensional code | |
JP2008197710A (en) | Authentication method and system, portable device, authentication server, and authentication requesting terminal | |
TWM439229U (en) | Security apparatus with mulitple safety controls and system using the same | |
JP2007233609A (en) | Authentication device, authentication system, and authentication method | |
JP2006227747A (en) | Authentication system and method, and authenticating program | |
JP2005063342A (en) | Card user verification system, card user verification method, and program of the same | |
CN105447701A (en) | Using biometrics to recover password in customer mobile device | |
WO2022259569A1 (en) | Authentication system, authentication device, authentication method, and program | |
KR102392147B1 (en) | Method for Converging Facing and Non-facing Certification | |
WO2018006319A1 (en) | Alarm method and system | |
Abu-Saymeh et al. | An application security framework for near field communication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |