CN109600519A - Mobile phone control method and system - Google Patents

Mobile phone control method and system Download PDF

Info

Publication number
CN109600519A
CN109600519A CN201910108667.6A CN201910108667A CN109600519A CN 109600519 A CN109600519 A CN 109600519A CN 201910108667 A CN201910108667 A CN 201910108667A CN 109600519 A CN109600519 A CN 109600519A
Authority
CN
China
Prior art keywords
mobile phone
information
owner
redemption
holder
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910108667.6A
Other languages
Chinese (zh)
Other versions
CN109600519B (en
Inventor
李信
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201910108667.6A priority Critical patent/CN109600519B/en
Publication of CN109600519A publication Critical patent/CN109600519A/en
Application granted granted Critical
Publication of CN109600519B publication Critical patent/CN109600519B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a kind of mobile phone control methods, it is characterized in that, mobile phone is controlled by remote operation instruction, wherein, the interface that the mobile phone control method generates substitutes original desktop, the method allows to set the access right of mobile phone operating system, operation beyond permission can trigger security system, the duration of call of mobile phone can be set by remote mode, conversation object, electricity limitation, short message item number, file operation power, right to use and use duration for arbitrarily applying etc., after mobile phone loss, the method executes following security function: hidden to take pictures, recording, video recording, it gives a warning, screen locking or blank screen some time, record current location route track, call monitoring.

Description

Mobile phone control method and system
Technical field
The present invention relates to field of mobile phones, more particularly, to a kind of mobile phone control method and system.
Background technique
Currently, the emergence of mobile phone especially smart phone, the function of mobile phone have obtained significant progress and progress.But phase It is preferable not yet for the use of control for the mobile phone of mobile phone user to solve for the rapid progress of cell-phone function and application program Certainly scheme.
For example, the very strong application of usage rates of the user such as wechat, microblogging now, since its Poisoning is very strong, including teenager Masses inside are easy to ultra-long time using mobile phone, and then influence the physical and mental health of people.
For another example user also lacks the solution of an effective getting back mobile phone in the case that mobile phone is lost.Due to working as The encryption of preceding mobile phone and booting lock function are very powerful, therefore the people for picking up lost mobile phone can not also open the hand of loss Machine, although the safety on the one hand increasing data in mobile phone also allows for the people for picking up mobile phone due to that can not open mobile phone Can not relate to mobile phone owner, therefore the information of many user's related preciousness when mobile phone is lost also is lost together to people Cause greater loss.
Summary of the invention
Technical problem to be solved by the present invention lies in a kind of mobile phone control method and system is provided, it is super which solve people The normal time using mobile phone and unhealthful problem and mobile phone consider handset security when losing and what mobile phone was difficult to withdraw ask Topic.
According to an aspect of the present invention, a kind of mobile phone control method is provided, which is characterized in that pass through remote operation instruction To control mobile phone, wherein the interface that the mobile phone control method generates substitutes original desktop, and the method allows to grasp mobile phone The access right for making system is set, and the operation beyond permission can trigger security system, can set hand by remote mode The duration of call of machine, conversation object, electricity limitation, short message item number, file operation power, the right to use arbitrarily applied and use duration Deng after mobile phone loss, the method executes following security function: it is hidden take pictures, record, recording a video, giving a warning, screen locking Or blank screen some time, record current location route track, call monitoring.
Preferably, it executes the cell phone system generated after the mobile phone control method and includes at least two display interfaces, point It is not main screen and password screen, the main screen includes: prompt information, including the casting of date-time, weather, short message abstract, missed electric Words, system notice, owner, contact information;Dialing button and short message button;Quick access icon, the password screen is by number With operator composition, user's input passes through encryption generation password including number and operator information, once Password Input mistake, The cell phone system starts security implementations immediately, and executes hidden authentication operation, and authentication mode includes face recognition, sound knowledge Not, fingerprint recognition etc., in verification process, by user from including that image authentication, sound authentication, finger print identifying etc. are one or more Select a kind of authentication mode in life-information authentication mode, the cell phone system monitoring camera, audio-frequency module, fingerprint module Input, when detecting the input of trusted users, that is, is considered as and authenticates successfully.Otherwise it is considered as visitor, and triggers anti-lost protection.
Preferably, system reserving machine is advocated peace the identity information of owner affiliated person, is specifically included: photo, name, number, list Position, address, occupation etc..Cell phone system can carry out two-sided information verification by voice or video.Wherein, cell phone system is also equipped with anti- Function is lost, and function is redeemed in starting in the case where mobile phone is unverified, is preset before function is redeemed in starting after losing Contact information, the contact information is shown in main screen information bar after mobile phone loss, also pre- before function is redeemed in starting If Third-party payment account information, redemption money, the shipping address etc. redeemed after losing for mobile phone redeem information, the redemption Information is shown in main screen information bar after mobile phone loss.
During executing redemption function, pass through the current location for collecting mobile phone holder, facial image, call note Record, short message record etc. determine mobile phone holder information, and request mobile phone holder inputs collecting account information, and mobile phone holder is same After meaning continues to execute redemption function, cell phone system notice Third-party payment platform freezes institute for Third-party payment account information State redemption money, owner, which receives, to be executed acknowledgement after the mobile phone sent by shipping address in cell phone system and operate and notify the Tripartite's payment platform is transferred to the redemption money to collecting account.
According to the another aspect that this originating party is bright, a kind of mobile phone control method is also provided, which is characterized in that including following step Rapid: life-information obtaining step obtains the life-information including facial image, fingerprint image;Locking condition setting procedure, to lock Fixed condition is set, and the locking condition includes pressing to lock key or human fatigue degree greater than preset value;Locking condition is sentenced Disconnected step, judges whether current phone state meets locking condition;Phone lock step meets in current phone situation Display alarm information when locking condition, and mobile phone is locked, mobile phone still retains its short message and call function in the locked state Energy;The life-information obtaining step of mobile phone holder;Life-information authenticating step, is authenticated according to life-information, and certification is logical It crosses, mobile phone is unlocked, authentification failure then executes loss processing step.
Preferably, the locking condition setting procedure includes the phone number that affiliated person is set in mobile phone, wherein described Losing processing step includes: the redemption that requirement mobile phone holder input includes redemption money, Third-party payment account, redemption mode Information;Send to the mobile phone of affiliated person includes current phone position, the cellphone information of capture image and redeeming including redemption information It returns hospitality and asks;Redemption request is confirmed on affiliated person's mobile phone, and pays redemption money to Third-party payment account;
If owner gets lost mobile phone, life-information is authenticated, certification is by then by Third-party payment account In redemption money pay mobile phone holder;
If owner does not get lost mobile phone, cell phone automatic dialing issues default letter to specified telephone number Breath.
Preferably, life-information is authenticated the following steps are included: to the facial image of owner and mobile phone holder, referring to Print image calculates separately corresponding image histogram;To the phase between the facial image and fingerprint image of owner and mobile phone holder It is calculated by the following formula like degree:
Wherein, GI, jFor the facial image histogram of owner, PI, jFor the facial image histogram of mobile phone holder, GN, mFor The fingerprint image histogram of owner, PN, mFor the fingerprint image histogram of mobile phone holder, ε,For preset constant, when Z be greater than it is pre- If when threshold value, then certification passes through, otherwise authentification failure,
Also, life-information authenticate further comprising the steps of:
Matching primitives are carried out to the sound of owner and mobile phone holder, specific formula for calculation is as follows:
Wherein, total distortion degree of the D [T, R] between owner's sound and the sound of mobile phone holder, T=T (1) ... T (n) } the N frame sound characteristic sequence of mobile phone holder is indicated, R={ R (1) ... R (m) } indicates the M frame sound characteristic sequence of owner Column, m and n are respectively the sound frame number of owner and mobile phone holder, and D [T (n), R (m)] indicates the distortion factor of any two frame,
As N=M total distortion degree directly can be calculated according to formula;It can be by set R={ R as N ≠ M1, R2, ...Rm..., RMWith linear expansion it is mapped to a N frame sequence R={ R1, R2... Rn..., RN, then new sequence is calculated frame by frame Column and T={ T1, T2... Tn..., TNBetween total distortion,
Wherein, linear expansion mapping calculation formula are as follows:
Wherein, when total distortion degree D [T, R] exceed a certain threshold value, then be considered as certification and pass through.
Preferably, the human fatigue degree is calculated by following formula:
D=t+ σ E+ μ T
Wherein, t is from elapsed time after mobile phone unlock, and E is electricity consumed by mobile phone after mobile phone unlocks, and T is hand The temperature change of mobile phone after machine unlock, σ, μ are preset constant.
According to another aspect of the present invention, a kind of cellphone control system is provided, comprising: life-information acquisition device is used for Obtain the life-information including facial image, fingerprint image;Locking condition setting device, for being set to locking condition, The locking condition includes pressing to lock key or human fatigue degree greater than preset value, and the human fatigue degree passes through following formula It calculates:
D=t+ σ E+ μ T
Wherein, t is from elapsed time after mobile phone unlock, and E is electricity consumed by mobile phone after mobile phone unlocks, and T is hand The temperature change of mobile phone after machine unlock, σ, μ are preset constant;
Locking condition judgment means, for judging whether current phone state meets locking condition;Phone lock Device for the display alarm information when current phone situation meets locking condition, and locks mobile phone;Life-information is recognized Card device authenticates the life-information, authenticates by being then unlocked to mobile phone, authentification failure then carries out at loss Reason.
Preferably, the locking condition setting device also sets the phone number of affiliated person, the mobile phone control System further include: redeem information setting device, include redemption money, Third-party payment account, redeem for mobile phone holder input The redemption information for the mode of returning;Sending device includes current phone position, the hand for capturing image for sending to the mobile phone of affiliated person Machine information and the request of the redemption including redeeming information;Redeem processing unit, it is desirable that affiliated person on its handset to redemption request into Row confirmation, and redemption money is paid to Third-party payment account, if owner obtains lost mobile phone, life-information is recognized Card is authenticated by then paying the redemption money in Third-party payment account to mobile phone holder;Warning device, if owner does not have Lost mobile phone is got, then cell phone automatic dialing is to specified telephone number, and issues presupposed information.
Preferably, the life-information authentication device is authenticated by following algorithm: to owner and mobile phone holder Facial image, fingerprint image calculate separately corresponding image histogram;To the facial image and fingerprint of owner and mobile phone holder Similarity between image is calculated by the following formula:
Wherein, GI, jFor the facial image histogram of owner, PI, jFor the facial image histogram of mobile phone holder, Gn,mFor The fingerprint image histogram of owner, PN, mFor the fingerprint image histogram of mobile phone holder, ε,For preset constant;When Z is greater than in advance If when threshold value, then certification passes through, otherwise authentification failure.
Detailed description of the invention
Fig. 1 is a kind of flow chart of mobile phone control method according to an embodiment of the present invention;
Fig. 2 is a kind of schematic diagram of cellphone control system according to an embodiment of the present invention.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and It is not used in the restriction present invention.
According to one embodiment of present invention, a kind of mobile phone control method is provided, which is characterized in that acceptable legitimate user Remote operation instruction control mobile phone (long-range control), the mobile phone control method can be present in mobile phone behaviour in a software form Make in system;Or it is present in mobile phone hardware in the form of chip module;Or it is used cooperatively with hardware external mode with mobile phone; Or (software and hardware or external) is used cooperatively using the above diversified forms.After cell phone system starting or screen light, this system It automatically turns on, and is shown in the top layer of graphical interfaces, and substitute original top layer and apply (screen locking or desktop), or directly It is embedded in mobile phone operating system in the form of mobile phone screen locking, desktop.
Executing the cell phone system that mobile phone control method according to the present invention generates allows the right to use to mobile phone operating system Limit is set, and the operation beyond permission can trigger security system, and trigger anti-lost protection, which can be with Access right, the duration of call, conversation object, electricity limitation, short message item number, the file operation power for setting mobile phone (contain photograph album, text The modification of the All Files such as shelves, music, video is deleted, is checked, transmitting) and any application program access right and use Duration.It is described to be calculated and be controlled by the human fatigue degree in following embodiment using duration.
Specific security implementations are for example: hidden to take pictures, record, recording a video;Give a warning (prompt tone, prompt information, splashette, Light, vibration);Screen locking or blank screen some time;Record current location route track;Call monitoring.
Cell phone system includes at least two display interfaces, is main screen and password screen respectively, the main screen is by following part structure At prompt information, including date-time information, Weather information, short message summary info, message registration information, system notification information, Owner's information, contact information;Background picture;Dialing button and short message button, fast access icon (is connected to cell phone system Arbitrarily can application item) and retain region (vacant or convert display different content with concrete scene).The password screen is by 0-9 number Word and oeprator composition, are free of letter, and have following feature: password set-up mode includes several digital and several for input The formula of operator, and operation result is obtained, password is obtained after encrypted;The input mode of password is input Any Digit and appoints The formula operation result for operator of anticipating.Start security implementations immediately after Password Input mistake.
Cell phone system is also equipped with hidden authentication function, and specific authentication mode includes face recognition, image recognition, fingerprint knowledge Not, voice recognition, action recognition, signal identification (contain bluetooth, wifi, NFC etc.), trusted users be added to address list selection or Trusted users title is voluntarily inputted, and the image, sound, fingerprint, movement, the signal that acquire trusted users are one or more, It selects and sets authentication mode.After screen lights in some time, system monitoring camera, audio-frequency module, signal identification mould The input of block, sensor module, fingerprint module is considered as and authenticates successfully when detecting the input of trusted users.Otherwise it triggers Anti-lost defencive function.
The identity information of advance reservation owner and owner donor or affiliated person are needed in above-mentioned cell phone system, it is specific to wrap It includes: the information such as photo, name, number, unit, address, occupation.System is settable to be associated with particular person, sets association People is associated with phone number, and owner's relationship, and carries out two-sided information verification by voice or video.
In a case where, cell phone system can star mobile phone and redeem function:
A) it is not authenticated by mobile phone;
B) super access right and Password Input mistake;
C) equipment exceeds safe distance range (can set 10-100 meters or map area);
D) after mobile phone is lost, it can check that security protection records on authorization affiliated person's mobile phone, comprising: the route rail of lost mobile phone Mark, the content checked and duration, the application used and function, call short message backup monitor call in real time and hidden take pictures The information such as recording, but it is not limited to this.
In a preferred embodiment, system reserving machine is advocated peace the identity information of owner affiliated person, is specifically included: photo, Name, number, unit, address, occupation etc..Cell phone system can carry out two-sided information verification by voice or video.Wherein, mobile phone System is also equipped with anti-lost function, and function is redeemed in starting in the case where mobile phone is unverified, before function is redeemed in starting Contact information after default loss, the contact information are shown in main screen information bar after mobile phone loss, redeem in starting Third-party payment account information, redemption money, the shipping address etc. redeemed after also default loss for mobile phone before function are redeemed Information, the redemption information are shown in main screen information bar after mobile phone loss.During executing redemption function, pass through collection The current location of mobile phone holder, facial image, message registration, short message record etc. determine mobile phone holder information, request hand Machine holder inputs collecting account information, and after mobile phone holder agrees to continue with execution redemption function, cell phone system notifies third Square payment platform freezes the redemption money for Third-party payment account information, and owner receives the hand sent by shipping address Acknowledgement is executed after machine in cell phone system to operate and Third-party payment platform is notified to be transferred to the redemption money to collecting account.
In another embodiment of the present invention, in above-mentioned redemption function, system can preset state and a system after loss Column operation, and it is lost state that mobile phone, which is arranged, can preset the contact person after losing and contact details data, contact number, and show Show in main screen information bar;Trading password, redemption money, examination address are shown in information bar of reporting lost property to the authorities after default loss;Can by pair The current location and track of currently used people, shooting photo, calling, short message, contact person etc. determine current holder information;Pass through Third-party payment mode enables holder determine the mode of doing business of meeting or mailing, system record and detection device status, holder Typing collecting account, name, typing trading password.Voluntarily the national authority mechanism official website of typing identity information carries out identity validation The amount of (this, which is not backed up only to make to verify, uses and inform that holder maintains secrecy) both sides' transaction freezes in system, until owner The password for receiving equipment and typing holder determines that system can be sent to holder's owner's preset password, then the funds on account that thaw arrive Holder's account accomplishes contractual transaction, and a side, which breaks one's promise, all loss, and does the evidence for the inspection that can alarm.
Fig. 1 is a kind of flow chart of mobile phone control method according to an embodiment of the present invention.
In step 101, life-information is obtained from mobile phone camera, obtaining includes facial image, fingerprint image, voice messaging Equal life-informations, can be shot with the more camera of mobile phone camera pixel.
In step 102, the locking condition of mobile phone is set, the locking condition includes pressing to lock key or user Fatigue strength is greater than preset value, and preset value whether can be greater than with set conversation duration, and whether electricity uses more than preset value waiting. The application program white list not constrained by locking condition can also be set.
In one embodiment of the invention, the human fatigue degree is calculated by following formula:
D=t+ σ E+ μ T
Wherein, t is from elapsed time after mobile phone unlock, and E is electricity consumed by mobile phone after mobile phone unlocks, and T is hand The temperature change of mobile phone after machine unlock, σ, μ are preset constant.That is, long-time using mobile phone communication, play game or clear It lookes in the case where website, the degree of fatigue of user is different, and the application programs such as the game of high concentration is needed usually to consume Electricity is larger, therefore we combine mobile phone to use the information energy such as consumption electricity using time and mobile phone temp variation and mobile phone Largely know the degree of fatigue of user.
In step 103, judge whether current phone state meets locking condition.
In step 104, the display alarm information when current phone situation meets locking condition, and mobile phone is locked. Warning message is usually displayed on the display screen of mobile phone, can also be made a sound while real warning message by loudspeaker It reminds.
After clicking power on button or cell phone system starting again or screen lights, this warning message is automatically turned on, and It is shown in the top layer of mobile phone desktop.It substitutes original top layer and applies (mobile phone screen locking desktop or mobile phone desktop).
In step 105, the life-information of mobile phone holder is obtained by mobile phone camera, the life-information also includes people The information such as face image information, finger print information and voice messaging.
In step 106, authenticated in mobile phone holder's life-information that step 105 obtains, certification is by then in step Mobile phone is unlocked in 107, authentification failure thens follow the steps 108 loss processing step.
According to one embodiment of present invention, life-information is authenticated in step 106, comprising the following steps: Corresponding image histogram is calculated separately to facial image, the fingerprint image of owner and mobile phone holder;Owner and mobile phone are held Similarity between the facial image and fingerprint image of someone is calculated by the following formula:
Wherein, GI, jFor the facial image histogram of owner, PI, jFor the facial image histogram of mobile phone holder, GN, mFor The fingerprint image histogram of owner, PN, mFor the fingerprint image histogram of mobile phone holder, ε,For preset constant, when Z be greater than it is pre- If when threshold value, then certification passes through, otherwise authentification failure.
In a preferred embodiment of the invention, life-information authenticate further comprising the steps of:
Matching primitives are carried out to the sound of owner and mobile phone holder, specific formula for calculation is as follows:
Wherein, total distortion degree of the D [T, R] between owner's sound and the sound of mobile phone holder, T=T (1) ... T (n) } the N frame sound characteristic sequence of mobile phone holder is indicated, R={ R (1) ... R (m) } indicates the M frame sound characteristic sequence of owner Column, m and n are respectively the sound frame number of owner and mobile phone holder, and D [T (n), R (m)] indicates the distortion factor of any two frame,
As N=M total distortion degree directly can be calculated according to formula;It can be by set R={ R as N ≠ M1, R2, ...Rm..., RMWith linear expansion it is mapped to a N frame sequence R={ R1, R2... Rn..., RN, then new sequence is calculated frame by frame Column and T={ T1, T2... Tn..., TNBetween total distortion,
Wherein, linear expansion mapping calculation formula are as follows:
Wherein, when total distortion degree D [T, R] exceed a certain threshold value, then be considered as certification and pass through.
Authenticating step can also be by identifying mobile phone received signal fingerprint (bluetooth, wifi, NFC).It is identified Method those skilled in the art should be easily applied the existing prior art.
It in one embodiment of the invention, in a step 102 further include the phone number that affiliated person is set in mobile phone The step of.Wherein, the step of processing is lost in the step 108, further includes: it is required that mobile phone holder input includes redeeming gold Volume, Third-party payment account, the redemption information for redeeming mode, due under Vehicles Collected from Market economic environment, if there is economic interests are driven It is dynamic to promote the holder for picking up mobile phone that the mobile phone of loss is returned owner as early as possible;Send to the mobile phone of affiliated person includes working as remote holder Set, capture cellphone information and the request of the redemption including redeeming information of image in seat in the plane;On affiliated person's mobile phone to redemption request into Row confirmation, and redemption money is paid to Third-party payment account;If owner gets lost mobile phone, life-information is recognized Card is authenticated by then paying the redemption money in Third-party payment account to mobile phone holder;It is lost if owner does not get It accidentally drops machine, then cell phone automatic dialing is to specified telephone number, and issues presupposed information.
It loses in processing step, the record of mobile phone mobile route track can also be carried out and opens the recording of mobile phone, record As function and it is transferred to remote data base, is used as act and deed.
Fig. 2 is a kind of schematic diagram of cellphone control system according to an embodiment of the present invention.
According to another aspect of the present invention, a kind of cellphone control system is additionally provided, comprising: life-information acquisition device 201, locking condition setting device 202, mobile phone condition judgement device 203, phone lock device 204, life-information authentication device 205, it redeems information setting device 206, sending device 207, redeem device 208, warning device 209.
The life acquisition device 201 obtains the life-information including facial image, fingerprint image;Locking condition setting dress Setting 202 pairs includes pressing locking key or human fatigue degree to set greater than the locking condition of preset value;Locking condition judgement Device 203 judges whether current phone state meets locking condition;Phone lock device 204 is full in current phone situation Display alarm information when sufficient locking condition, and mobile phone is locked;Life-information authentication device 205 to the life-information into Row certification, authenticates by being then unlocked to mobile phone, authentification failure then carries out loss processing.
In one embodiment of the invention, the human fatigue degree is calculated by following formula:
D=t+ σ E+ μ T
Wherein, t is from elapsed time after mobile phone unlock, and E is electricity consumed by mobile phone after mobile phone unlocks, and T is hand The temperature change of mobile phone after machine unlock, σ, μ are preset constant.
The locking condition setting device 203 also sets the phone number of affiliated person, the cellphone control system Further include: in redeeming information setting device 208, mobile phone holder input includes redemption money, Third-party payment account, redeems The redemption information of mode;It includes current phone position, the mobile phone letter for capturing image that sending device 207 is sent to the mobile phone of affiliated person Breath and the request of the redemption including redeeming information;Redeeming processing unit 208 requires affiliated person to carry out on its handset to redemption request Confirmation, and redemption money is paid to Third-party payment account, if owner obtains lost mobile phone, life-information is recognized Card is authenticated by then paying the redemption money in Third-party payment account to mobile phone holder;Warning device 209, if machine Master does not get lost mobile phone, then cell phone automatic dialing is to specified telephone number, and issues presupposed information.
The life-information authentication device 205 is authenticated by following algorithm: to the face of owner and mobile phone holder Image, fingerprint image calculate separately corresponding image histogram;To the facial image and fingerprint image of owner and mobile phone holder Between similarity be calculated by the following formula:
Wherein, GI, jFor the facial image histogram of owner, PI, jFor the facial image histogram of mobile phone holder, GN, mFor The fingerprint image histogram of owner, PN, mFor the fingerprint image histogram of mobile phone holder, ε,For preset constant;When Z is greater than in advance If when threshold value, then certification passes through, otherwise authentification failure.
In the embodiment of the present invention, preferably solve people since height collects using mobile phone fatigue strength by calculating name Middle spirit leads to the problem of adverse consequences to body and mind using mobile phone, while passing through the redemption scheme under a kind of mobile phone loss situation It solves the problems, such as that mobile phone is extremely difficult in the prior art to give for change, and solves loss by issuing alarm when mobile phone can not be redeemed The problem of lacking further information when mobile phone is not returned and can not taking further measures to it.Through the embodiment of the present invention, The body and mind of mobile phone user is easier to reach equilibrium state, while having ensured the problem of capable of giving for change as early as possible when mobile phone is lost.
The method of the embodiment of the present invention can be present in mobile phone operating system in a software form, or with chip module shape Formula is present in mobile phone hardware, or is used cooperatively with hardware external mode with mobile phone, can also be matched using the above diversified forms It closes and uses (software and hardware or external).
Taking the above-mentioned ideal embodiment according to the present invention as inspiration, through the above description, ordinary skill Personnel can carry out various changes and amendments without departing from the scope of the technological thought of the present invention' completely.This invention Technical scope be not limited to the contents of the specification, it is necessary to its technical model is determined according to scope of the claims It encloses.

Claims (3)

1. a kind of mobile phone control method, which is characterized in that control mobile phone by remote operation instruction, wherein the mobile phone control The interface that method processed generates substitutes original desktop, and the method allows to set the access right of mobile phone operating system, Operation beyond permission can trigger security system, and the duration of call, the conversation object, electricity of mobile phone can be set by remote mode Limitation, short message item number, file operation power, the right to use arbitrarily applied and use duration etc., after mobile phone loss, the method is held The following security function of row: it is hidden take pictures, record, recording a video, giving a warning, screen locking or blank screen some time, record present bit Set route track, call monitoring.
2. mobile phone control method according to claim 1, which is characterized in that execute generation after the mobile phone control method Cell phone system include at least two display interfaces, be main screen and password screen respectively, the main screen includes: prompt information, including Date-time, weather casting, short message abstract, missed call, system notice, owner, contact information;Dialing button and short message are pressed Button;Quick access icon, the password screen are made of number and operator, and user's input includes that number and operator information are logical It crosses encryption and generates password, once Password Input mistake, the cell phone system starts security implementations immediately, and executes hidden certification behaviour Make, authentication mode includes face recognition, voice recognition, fingerprint recognition etc., in verification process, is recognized by user from including image A kind of authentication mode, the mobile phone system are selected in one or more life-information authentication modes such as card, sound authentication, finger print identifying The input of system monitoring camera, audio-frequency module, fingerprint module is considered as and authenticates successfully when detecting the input of trusted users; Otherwise it is considered as visitor, and triggers anti-lost protection.
3. mobile phone control method according to claim 2, wherein system reserving machine advocate peace owner affiliated person identity letter Breath, specifically includes: photo, name, number, unit, address, occupation etc..Cell phone system can carry out both sides by voice or video Information is verified;Wherein, cell phone system is also equipped with anti-lost function, and function is redeemed in starting in the case where mobile phone is unverified, The contact information after losing is preset before function is redeemed in starting, the contact information is shown in main screen after mobile phone loss Information bar is used for Third-party payment account information, the redemption gold that mobile phone is redeemed before starting redemption function after also default loss Volume, shipping address etc. redeem information, and the redemption information is shown in main screen information bar after mobile phone loss;
Execute redeem function during, by collecting the current location of mobile phone holder, facial image, message registration, short Letter record etc. determines mobile phone holder information, and request mobile phone holder inputs collecting account information, mobile phone holder agree to after After function is redeemed in continuous execution, cell phone system notice Third-party payment platform freezes described redeem for Third-party payment account information The amount of money is returned, owner receives the mobile phone sent by shipping address, and execution acknowledgement operates and notifies third party in cell phone system later Payment platform is transferred to the redemption money to collecting account.
CN201910108667.6A 2016-09-29 2016-09-29 Mobile phone control method and system Active CN109600519B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910108667.6A CN109600519B (en) 2016-09-29 2016-09-29 Mobile phone control method and system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910108667.6A CN109600519B (en) 2016-09-29 2016-09-29 Mobile phone control method and system
CN201610864047.1A CN106453874B (en) 2016-09-29 2016-09-29 Mobile phone control method and system

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201610864047.1A Division CN106453874B (en) 2016-09-29 2016-09-29 Mobile phone control method and system

Publications (2)

Publication Number Publication Date
CN109600519A true CN109600519A (en) 2019-04-09
CN109600519B CN109600519B (en) 2021-01-05

Family

ID=58170955

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201610864047.1A Active CN106453874B (en) 2016-09-29 2016-09-29 Mobile phone control method and system
CN201910108667.6A Active CN109600519B (en) 2016-09-29 2016-09-29 Mobile phone control method and system

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201610864047.1A Active CN106453874B (en) 2016-09-29 2016-09-29 Mobile phone control method and system

Country Status (1)

Country Link
CN (2) CN106453874B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115235065A (en) * 2022-07-14 2022-10-25 小米科技(武汉)有限公司 Control method and device of desktop air conditioner and storage medium
CN115776538A (en) * 2021-09-06 2023-03-10 解文武 Method for realizing remote control after mobile phone is stolen

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20180126198A (en) * 2017-05-17 2018-11-27 엘지전자 주식회사 Mobile terminal
JP7065294B2 (en) * 2017-10-10 2022-05-12 パナソニックIpマネジメント株式会社 Manufacturing system and manufacturing method
CN107682347A (en) * 2017-10-16 2018-02-09 恒宝股份有限公司 A kind of communication equipment and its communication means
CN108154115B (en) * 2017-12-22 2021-06-29 北京奇虎科技有限公司 Object identification method and device based on camera scene and computing equipment
CN108174035A (en) * 2017-12-27 2018-06-15 中国地质大学(武汉) A kind of smart mobile phone double mechanism long-range control method, equipment and storage device
CN108537061A (en) * 2018-04-17 2018-09-14 辽宁工程技术大学 A kind of financial data security system
CN109376555A (en) * 2018-11-30 2019-02-22 成都知道创宇信息技术有限公司 A method of evidence obtaining is monitored for Brute Force laptop password
CN110417998A (en) * 2019-07-26 2019-11-05 肇泽 Information cuing method and device based on recognition of face
CN113037931B (en) * 2021-01-26 2024-01-12 视昀科技(深圳)有限公司 Data reporting system and method for application environment monitoring
CN114693306B (en) * 2022-04-28 2023-04-07 润芯微科技(江苏)有限公司 Payment early warning method and system suitable for unauthorized user

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101022610A (en) * 2006-02-15 2007-08-22 乐金电子(中国)研究开发中心有限公司 Cellphone with guard function and guard method
CN101198119A (en) * 2006-12-09 2008-06-11 北京三星通信技术研究有限公司 Automatic loss reporting method and portable terminal using the same
US20110273378A1 (en) * 2010-05-05 2011-11-10 Rachid Alameh Mobile device with temperature sensing capability and method of operating same
CN102693381A (en) * 2012-05-08 2012-09-26 张�林 Method, device and system for anti-theft of portable computer equipment
CN103905639A (en) * 2014-03-12 2014-07-02 上海天奕达电子科技有限公司 Method and system for locking and unlocking screen
CN104010088A (en) * 2014-06-16 2014-08-27 中国地质大学(武汉) Smart-phone anti-theft method and system
KR20150053076A (en) * 2013-11-07 2015-05-15 주식회사 이리언스 Mobile Device and System having Mobile Office Application Security Support Function, and Mobile Office Application Security Support Method
CN104660821A (en) * 2015-03-04 2015-05-27 深圳市中兴移动通信有限公司 Method for controlling using duration of terminal as well as mobile terminal
US20150269832A1 (en) * 2014-03-21 2015-09-24 John Candillier Systems and methods for facilitating the return of lost items to owners
CN105530594A (en) * 2014-09-30 2016-04-27 小米科技有限责任公司 Communication method and device based remote control

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102624982A (en) * 2012-03-12 2012-08-01 戴小天 Antitheft method for mobile phone and application
CN103634453A (en) * 2012-08-22 2014-03-12 上海景岩电子技术有限公司 Face recognition anti-theft mobile phone
JP6052004B2 (en) * 2013-03-27 2016-12-27 富士通株式会社 Terminal device and terminal control program
CN103581378A (en) * 2013-10-31 2014-02-12 中晟国计科技有限公司 Smart phone high in safety performance
CN104023133B (en) * 2014-05-23 2017-05-24 北京金山安全软件有限公司 Anti-theft method and device for mobile terminal

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101022610A (en) * 2006-02-15 2007-08-22 乐金电子(中国)研究开发中心有限公司 Cellphone with guard function and guard method
CN101198119A (en) * 2006-12-09 2008-06-11 北京三星通信技术研究有限公司 Automatic loss reporting method and portable terminal using the same
US20110273378A1 (en) * 2010-05-05 2011-11-10 Rachid Alameh Mobile device with temperature sensing capability and method of operating same
CN102693381A (en) * 2012-05-08 2012-09-26 张�林 Method, device and system for anti-theft of portable computer equipment
KR20150053076A (en) * 2013-11-07 2015-05-15 주식회사 이리언스 Mobile Device and System having Mobile Office Application Security Support Function, and Mobile Office Application Security Support Method
CN103905639A (en) * 2014-03-12 2014-07-02 上海天奕达电子科技有限公司 Method and system for locking and unlocking screen
US20150269832A1 (en) * 2014-03-21 2015-09-24 John Candillier Systems and methods for facilitating the return of lost items to owners
CN104010088A (en) * 2014-06-16 2014-08-27 中国地质大学(武汉) Smart-phone anti-theft method and system
CN105530594A (en) * 2014-09-30 2016-04-27 小米科技有限责任公司 Communication method and device based remote control
CN104660821A (en) * 2015-03-04 2015-05-27 深圳市中兴移动通信有限公司 Method for controlling using duration of terminal as well as mobile terminal

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115776538A (en) * 2021-09-06 2023-03-10 解文武 Method for realizing remote control after mobile phone is stolen
CN115776537A (en) * 2021-09-06 2023-03-10 解文武 Method for realizing full-intelligent security mobile phone
CN115941842A (en) * 2021-09-06 2023-04-07 解文武 Mobile phone safety realization method based on synchronous quick setting
CN115235065A (en) * 2022-07-14 2022-10-25 小米科技(武汉)有限公司 Control method and device of desktop air conditioner and storage medium
CN115235065B (en) * 2022-07-14 2023-12-12 小米科技(武汉)有限公司 Control method and device of desktop air conditioner and storage medium

Also Published As

Publication number Publication date
CN109600519B (en) 2021-01-05
CN106453874A (en) 2017-02-22
CN106453874B (en) 2020-01-03

Similar Documents

Publication Publication Date Title
CN109600519A (en) Mobile phone control method and system
CN106101138B (en) Method for processing business and device based on mobile terminal
CN103917727B (en) Utilize the locking device adding strong security of iris image
US8205249B2 (en) Method for carrying out a secure electronic transaction using a portable data support
JP4397827B2 (en) Authentication system for portable terminal device having electronic money function
US11074327B2 (en) Methods and systems for ensuring that an individual is authorized to conduct an activity
CN105447691A (en) E-card transaction authorization based on geographic location
CN103907328A (en) Mobile device-based authentication
US7389269B1 (en) System and method for activating financial cards via biometric recognition
CN102084369A (en) System for monitoring the unauthorized use of a device
WO2017178816A1 (en) Event tickets with user biometric verification on the user mobile terminal
US20150161595A1 (en) Digital payment card presentation systems, methods, and apparatuses
CN206522020U (en) A kind of intelligent door lock and system
CN105447696A (en) Automatic notification of transaction by bank card to customer device
JP2007016423A (en) Locker system using bar code or two-dimensional code
JP2008197710A (en) Authentication method and system, portable device, authentication server, and authentication requesting terminal
TWM439229U (en) Security apparatus with mulitple safety controls and system using the same
JP2007233609A (en) Authentication device, authentication system, and authentication method
JP2006227747A (en) Authentication system and method, and authenticating program
JP2005063342A (en) Card user verification system, card user verification method, and program of the same
CN105447701A (en) Using biometrics to recover password in customer mobile device
WO2022259569A1 (en) Authentication system, authentication device, authentication method, and program
KR102392147B1 (en) Method for Converging Facing and Non-facing Certification
WO2018006319A1 (en) Alarm method and system
Abu-Saymeh et al. An application security framework for near field communication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant