WO2018232650A1 - Mobile terminal having communication account protection function and related product - Google Patents

Mobile terminal having communication account protection function and related product Download PDF

Info

Publication number
WO2018232650A1
WO2018232650A1 PCT/CN2017/089434 CN2017089434W WO2018232650A1 WO 2018232650 A1 WO2018232650 A1 WO 2018232650A1 CN 2017089434 W CN2017089434 W CN 2017089434W WO 2018232650 A1 WO2018232650 A1 WO 2018232650A1
Authority
WO
WIPO (PCT)
Prior art keywords
mobile terminal
communication account
communication
logged
account
Prior art date
Application number
PCT/CN2017/089434
Other languages
French (fr)
Chinese (zh)
Inventor
王苏娜
Original Assignee
深圳支点电子智能科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳支点电子智能科技有限公司 filed Critical 深圳支点电子智能科技有限公司
Priority to PCT/CN2017/089434 priority Critical patent/WO2018232650A1/en
Publication of WO2018232650A1 publication Critical patent/WO2018232650A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/725Cordless telephones

Definitions

  • the present invention relates to the field of communication technologies, and in particular, to a mobile terminal and related products having a communication account protection function.
  • the location information is sent to the server, for example, by the mobile terminal, and the server transmits the location information to the user according to the received location information, so that the user can search for the mobile terminal according to the location information.
  • the server since the user only retrieves the mobile terminal based on the location information, it is highly likely that the mobile terminal cannot be retrieved. It can be seen that the probability that the mobile terminal is lost and retrieved is relatively low.
  • the object of the present invention is to provide a mobile terminal information publishing method and a mobile terminal, which solves the problem that the probability of loss recovery of the mobile terminal is relatively low.
  • an embodiment of the present invention provides a method for publishing information of a mobile terminal, including:
  • the mobile terminal determines whether it is currently in a stolen state
  • the mobile terminal If the mobile terminal belongs to the stolen state, and the mobile terminal detects that the mobile terminal is abnormally unlocked, the mobile terminal detects whether the currently registered communication account is a communication account that has been logged in by the mobile terminal history;
  • the mobile terminal issues the communication account in the social webpage of the communication account and logs in on the mobile terminal that the user steals. Notifying the message, and transmitting the account information of the communication account to the pre-bound terminal device.
  • the method further includes:
  • the mobile terminal specially sets the notification message in the social webpage, and the special setting includes not being visible to the communication account itself.
  • the method further includes:
  • the mobile terminal sends a notification message to each communication contact person in the address book of the communication account, the communication account is logged in on the mobile terminal stolen by the user, and deletes the group record.
  • the mobile terminal determines whether it is currently in a stolen state, including:
  • the method further includes:
  • the mobile terminal When the mobile terminal is in a stolen state, the mobile terminal hides an application specified on the mobile terminal that needs to be kept secret from being hidden on the interface, and prohibits the pre-designated application that needs to be kept secret, and The location information is sent to the pre-bound terminal device.
  • the method further includes:
  • the mobile terminal matches the communication information included in the address book of the communication account with the communication information in the communication record of the communication account that the mobile terminal has logged in, and if the same communication information is matched, the communication is performed
  • the communication account corresponding to the information is sent a notification message that the communication account is logged in to the mobile terminal, and the notification message further includes a communication account that the mobile terminal has logged in to indicate that the mobile terminal is the mobile terminal.
  • the embodiment of the invention further provides a mobile terminal, including:
  • a judging module configured to determine whether the current status is stolen
  • a detecting module configured to: if the mobile terminal is in a stolen state, and the mobile terminal detects that the mobile terminal is abnormally unlocked, detecting whether the currently registered communication account is a communication account that has been logged in by the mobile terminal history ;
  • a publishing module configured to: the mobile terminal that is currently logged in is not the communication account that has been logged in by the mobile terminal history, and the mobile terminal publishes the communication account in the social webpage of the communication account and logs in on the mobile terminal that the user steals Notification message, and sending the communication to a pre-bound terminal device Account information of the account.
  • the mobile terminal further includes:
  • a setting module configured to perform special setting on the notification message in the social webpage, where the special setting comprises not being visible to the communication account itself.
  • the mobile terminal further includes:
  • the group sending module is configured to send, in the address book of the communication account, each communication contact group, the notification message that the communication account is logged in on the mobile terminal that the user steals, and delete the grouped record.
  • the determining module is configured to determine whether the location information of the mobile terminal belongs to a location range corresponding to a motion track pre-stored by the mobile terminal, and if the location information does not belong to the location range, determine the The mobile terminal is in a stolen state;
  • the mobile terminal further includes:
  • a hiding module when the mobile terminal is in a stolen state, the mobile terminal hides an application specified on the mobile terminal that needs to be kept secret from being hidden on the interface, and prohibits the pre-designated application that needs to be kept secret Run and send the location information to the pre-bound terminal device.
  • the mobile terminal further includes:
  • a sending module configured to: the mobile terminal matches the communication information included in the address book of the communication account with the communication information in the communication record of the communication account that the mobile terminal has logged in, if the same communication information is matched Transmitting, by the communication account corresponding to the communication information, a notification message that the communication account is logged in to the mobile terminal, and the notification message further includes a communication account that the mobile terminal has logged in to indicate the mobile terminal a mobile terminal that is a communication account that has been logged in by the mobile terminal history.
  • the embodiment of the invention further provides a mobile terminal, including:
  • processor configured to perform the following steps:
  • Determining whether the mobile terminal is currently in a stolen state if the mobile terminal belongs to a stolen state, and detecting that the mobile terminal is abnormally unlocked, detecting whether the currently logged-in communication account is a communication that has been logged in by the mobile terminal history If the currently registered communication account is not the communication account that has been logged in by the mobile terminal history, the notification message of the communication account being logged in on the mobile terminal stolen by the user is posted in the social webpage of the communication account, and The pre-bound terminal device sends the account information of the communication account.
  • the processor is further configured to: perform special setting on the notification message in the social webpage, where the special setting includes not being visible to the communication account itself.
  • the processor is further configured to: send, in the address book of the communication account, each communication contact group, the notification message that the communication account is logged in on the mobile terminal that the user steals, and delete the record of the group sending .
  • the processor is specifically configured to: determine whether the location information of the mobile terminal belongs to a location range corresponding to a motion track pre-stored by the mobile terminal, in determining whether the mobile terminal is currently in a stolen state; If the location information does not belong to the location range, determining that the mobile terminal is in a stolen state;
  • the processor is further configured to: when the mobile terminal is in a stolen state, hide an application specified on the mobile terminal that needs to be confidentially hidden on the interface, and prohibit the pre-designated application that needs to be kept secret Run and send the location information to the pre-bound terminal device.
  • the processor is further configured to: match the communication information included in the address book of the communication account with the communication information in the communication record of the communication account that the mobile terminal has logged in, if the match is the same Transmitting, by the communication account corresponding to the communication information, a notification message that the communication account is logged in to the mobile terminal, and the notification message further includes a communication account that the mobile terminal has logged in to indicate The mobile terminal is a mobile terminal of a communication account that has been logged in by the mobile terminal history.
  • the processor is further configured to: detect whether the mobile terminal generates a first ⁇ action event, and if the mobile terminal generates a first ⁇ action event, detecting whether the smart watch specified by the mobile terminal generates a second ⁇ action An event, if the second watch action event occurs in the smart watch, determining whether the first action action event and the second action action event include the same action direction, and if the action direction is the same, determining the first motion Whether the action event and the start time of the ⁇ action included in the second ⁇ action event are all within a preset duration, and determining whether the duration of the ⁇ action included in the first ⁇ action event and the second ⁇ action event are both located within the preset duration, if the first ⁇ action event and the second ⁇ action event include ⁇ action start time are both within a preset time period, and the first ⁇ action event and the second Determining the duration of the ⁇ action included in the ⁇ action event is within the preset duration, and determining the ⁇ action included in the first ⁇
  • the embodiment of the invention further provides a computer readable storage medium, the program readable storage medium storing program code, the program code comprising instructions for performing the following steps:
  • Determining whether the mobile terminal is currently in a stolen state if the mobile terminal belongs to a stolen state, and the mobile terminal detects that the mobile terminal is abnormally unlocked, detecting whether the currently registered communication account is the mobile terminal history
  • the registered communication account in the case that the currently registered communication account is not the communication account that the mobile terminal has logged in, the communication account is posted on the social page of the communication account and the mobile account is logged on the user's stolen mobile terminal.
  • the notification message, and the account information of the communication account is sent to the pre-bound terminal device.
  • the program code includes instructions for performing a special step of: setting, in the social webpage, the notification message, the special setting comprising not being visible to the communication account itself.
  • the program code includes instructions for performing the following steps: in the address book of the communication account, each communication contact group sends a notification message that the communication account is logged in on the mobile terminal that the user steals, and Delete the grouped records.
  • determining whether the mobile terminal is currently in the stolen state includes: determining whether the location information of the mobile terminal belongs to a location range corresponding to the motion track pre-stored by the mobile terminal; if the location information does not belong to the location a range, determining that the mobile terminal is in a stolen state;
  • the program code includes instructions for performing the following steps:
  • the mobile terminal When the mobile terminal is in a stolen state, the mobile terminal hides an application specified on the mobile terminal that needs to be kept secret from being hidden on the interface, and prohibits the pre-specified application that needs to be kept from running, and The location information is sent to a pre-bound terminal device.
  • the program code includes instructions for performing the following steps: the communication information included in the address book of the communication account and the communication record of the communication account registered by the mobile terminal history
  • the communication information in the matching is matched, and if the same communication information is matched, the notification message that the communication account is logged in on the mobile terminal is sent to the communication account corresponding to the communication information, and the notification message further includes the movement
  • the communication account that the terminal history has logged in to indicate that the mobile terminal is the mobile terminal of the communication account that the mobile terminal has logged in.
  • the mobile terminal determines whether the mobile terminal belongs to the stolen state; if the mobile terminal belongs to the stolen state, and the mobile terminal detects that the mobile terminal is abnormally unlocked, the mobile terminal detects the current login. Whether the communication account is a communication account that has been logged in by the mobile terminal history; if the communication account currently logged in by the mobile terminal is not a communication account that has been logged in by the mobile terminal history, the mobile terminal is socialized in the communication account.
  • the webpage publishes a notification message that the communication account is logged in on the mobile terminal that the user steals, and sends the account information of the communication account to the pre-bound terminal device. In this way, the user can directly contact the thief through the communication account to improve the probability of retrieving the mobile terminal.
  • FIG. 1 is a schematic flowchart of a method for publishing information of a mobile terminal according to an embodiment of the present invention
  • FIG. 2 is a schematic structural diagram of a mobile terminal according to an embodiment of the present invention.
  • FIG. 3 is a schematic structural diagram of another mobile terminal according to an embodiment of the present invention.
  • FIG. 4 is a schematic structural diagram of another mobile terminal according to an embodiment of the present invention.
  • FIG. 5 is a schematic structural diagram of another mobile terminal according to an embodiment of the present disclosure.
  • FIG. 6 is a schematic structural diagram of another mobile terminal according to an embodiment of the present disclosure.
  • FIG. 7 is a schematic structural diagram of another mobile terminal according to an embodiment of the present disclosure.
  • FIG. 8 is a schematic structural diagram of another mobile terminal according to an embodiment of the present invention.
  • FIG. 1 is a schematic flowchart of a method for publishing information of a mobile terminal according to an embodiment of the present invention. As shown in FIG. 1
  • the mobile terminal determines whether the current state is a stolen state
  • the mobile terminal detects whether the currently logged-in communication account is a communication that has been logged in by the mobile terminal history. account number;
  • the communication account currently registered by the mobile terminal is not a communication account that has been logged in by the mobile terminal history, and the mobile terminal issues the communication account on the mobile terminal of the communication account on the mobile terminal that the user steals.
  • the login notification message, and the account information of the communication account is sent to the pre-bound terminal device.
  • the stolen state may be that the user who uses the mobile terminal is not the user of the mobile terminal itself, that is, used by others.
  • the above abnormal unlocking can be understood as not using the unlocking of the unlocking code of the mobile terminal.
  • the notification message that the communication account is logged in on the mobile terminal that the user has stolen is released to the social webpage of the communication account, so that the stolen information of the mobile terminal can be released.
  • the user can view the stolen information of the mobile terminal, and send the account information of the communication account to the pre-bound terminal device, so that the user can directly find the thief according to the account, so as to conveniently retrieve the mobile terminal.
  • the method further includes:
  • the mobile terminal specially sets the notification message in the social webpage, and the special setting includes not being visible to the communication account itself.
  • setting the notification message in the social webpage to be invisible to the communication account itself may be beneficial to spread the notification message in the social network, so as to prevent the thief from the message from the social network. Deleted.
  • the method further includes:
  • the mobile terminal sends a notification message to each communication contact person in the address book of the communication account, the communication account is logged in on the mobile terminal stolen by the user, and deletes the group record.
  • the foregoing notification message is grouped in the address book, which is more advantageous for the diffusion of the notification province, so that the user can quickly view the notification message and retrieve the mobile terminal in time.
  • the mobile terminal determines whether it is currently in a stolen state, including:
  • the method further includes:
  • the mobile terminal When the mobile terminal is in a stolen state, the mobile terminal hides an application specified on the mobile terminal that needs to be kept secret from being hidden on the interface, and prohibits the pre-designated application that needs to be kept secret, and The location information is sent to the pre-bound terminal device.
  • the stolen state of the mobile terminal can be accurately determined through the foregoing steps, and the application that needs to be kept secret is hidden on the interface, and the application that needs to be kept secret is prohibited from being operated, and
  • the location information is sent to the pre-bound terminal device, so that the security information of the mobile terminal is effectively protected to prevent the security information from being leaked.
  • the location information is sent to the pre-bound terminal device, thereby facilitating the user to retrieve the mobile terminal.
  • the method further includes:
  • the mobile terminal matches the communication information included in the address book of the communication account with the communication information in the communication record of the communication account that the mobile terminal has logged in, and if the same communication information is matched, the communication is performed
  • the communication account corresponding to the information is sent a notification message that the communication account is logged in to the mobile terminal, and the notification message further includes a communication account that the mobile terminal has logged in to indicate that the mobile terminal is the mobile terminal.
  • the same communication information exists, that is, the two communication accounts have the same communication friend, so that the user is more convenient to retrieve the mobile terminal through the friend. Because, through this friend, you can directly contact the thief.
  • the mobile terminal may further detect whether the mobile terminal generates a first ⁇ action event, and if the mobile terminal generates a first ⁇ action event, detecting the mobile terminal designation Whether the smart watch has a second action event if the smart watch occurs a second ⁇ action event, determining whether the first ⁇ action event and the second ⁇ action event include the same ⁇ action direction, and if the ⁇ action direction is the same, determining the first ⁇ action event and the second ⁇ Whether the start time of the ⁇ action included in the action event is within a preset time period, and determining whether the duration of the ⁇ action included in the first ⁇ action event and the second ⁇ action event are both within the preset duration, if The first action event and the second action event include a start time of the click action, both of which are within a preset time period, and the first action event and the second action event include a continuous action The duration is both within the preset duration, and determining whether the difference between the first
  • the preset duration may be 11 seconds, 22 seconds, 30 seconds, 50 seconds, 72 seconds, 102 seconds, or other times.
  • the first preset threshold may be 3 seconds, 5 seconds, 10 seconds, 20 seconds, 50 seconds, 84 seconds, or other time.
  • the second preset threshold may be 13 seconds, 15 seconds, 22 seconds, 20 seconds, 54 seconds, 81 seconds, or other times.
  • the mobile terminal determines whether the mobile terminal belongs to the stolen state; if the mobile terminal belongs to the stolen state, and the mobile terminal detects that the mobile terminal is abnormally unlocked, the mobile terminal detects the current login. Whether the communication account is a communication account that has been logged in by the mobile terminal history; if the communication account currently logged in by the mobile terminal is not a communication account that has been logged in by the mobile terminal history, the mobile terminal is socialized in the communication account.
  • the webpage publishes a notification message that the communication account is logged in on the mobile terminal that the user steals, and sends the account information of the communication account to the pre-bound terminal device. In this way, the user can directly contact the thief through the communication account to improve the probability of retrieving the mobile terminal.
  • FIG. 2 is a schematic structural diagram of a mobile terminal according to an embodiment of the present invention. As shown in FIG. 2, the method includes:
  • the determining module 201 is configured to determine whether the current state is a stolen state
  • the detecting module 202 is configured to detect, if the mobile terminal belongs to a stolen state, and the mobile terminal detects that the mobile terminal is abnormally unlocked, whether the currently registered communication account is a communication that has been logged in by the mobile terminal history. account number;
  • a publishing module 203 configured to: when the currently registered communication account is not a communication account that has been logged in by the mobile terminal history, the mobile terminal issues the communication account in the social network page of the communication account on the mobile terminal that the user steals The login notification message, and the account information of the communication account is sent to the pre-bound terminal device.
  • the mobile terminal further includes:
  • the setting module 204 is configured to perform special setting on the notification message in the social webpage, where the special setting includes not being visible to the communication account itself.
  • the mobile terminal further includes:
  • the group sending module 205 is configured to send, in the address book of the communication account, each communication contact group, the notification message that the communication account is logged in on the mobile terminal that the user steals, and delete the grouped record.
  • the determining module 201 is configured to determine whether the location information of the mobile terminal belongs to a location range corresponding to a motion track pre-stored by the mobile terminal, and if the location information does not belong to the location range, determine the location The mobile terminal is in a stolen state;
  • the mobile terminal further includes:
  • a hiding module 206 configured to: when the mobile terminal is in a stolen state, the mobile terminal hides an application specified on the mobile terminal that needs to be kept secret from being hidden on the interface, and prohibits the pre-designated application that needs to be kept secret
  • the program runs and sends the location information to the pre-bound terminal device.
  • the mobile terminal further includes:
  • the sending module 207 is configured to: the mobile terminal matches the communication information included in the address book of the communication account with the communication information in the communication record of the communication account that the mobile terminal has logged in, if the same communication is matched And transmitting, to the communication account corresponding to the communication information, a notification message that the communication account is logged in on the mobile terminal, and the notification message further includes a communication account that the mobile terminal has logged in to indicate the movement
  • the terminal is a mobile terminal of a communication account that has been logged in by the mobile terminal history.
  • the mobile terminal determines whether the mobile terminal belongs to the stolen state; if the mobile terminal belongs to the stolen state, and the mobile terminal detects that the mobile terminal is abnormally unlocked, the mobile terminal detects the current login. Whether the communication account is a communication account that has been logged in by the mobile terminal history; if the communication account currently logged in by the mobile terminal is not a communication account that has been logged in by the mobile terminal history, the mobile terminal is socialized in the communication account.
  • the webpage publishes a notification message that the communication account is logged in on the mobile terminal that the user steals, and sends the account information of the communication account to the pre-bound terminal device. In this way, the user can directly contact the thief through the communication account to improve the probability of retrieving the mobile terminal.
  • an embodiment of the present invention further provides a mobile terminal 700, including: a processor 710 and a memory 720 coupled to each other; and the processor 710 is configured to perform the following steps:
  • Determining whether the mobile terminal is currently in a stolen state if the mobile terminal belongs to a stolen state, and detecting that the mobile terminal is abnormally unlocked, detecting whether the currently logged-in communication account is a communication that has been logged in by the mobile terminal history If the currently registered communication account is not the communication account that has been logged in by the mobile terminal history, the notification message of the communication account being logged in on the mobile terminal stolen by the user is posted in the social webpage of the communication account, and The pre-bound terminal device sends the account information of the communication account.
  • the processor is further configured to: perform special setting on the notification message in the social webpage, where the special setting includes not being visible to the communication account itself.
  • the processor is further configured to: send, in the address book of the communication account, each communication contact group, the notification message that the communication account is logged in on the mobile terminal that the user steals, and delete the record of the group sending .
  • the processor is specifically configured to: determine whether the location information of the mobile terminal belongs to a location range corresponding to a motion track pre-stored by the mobile terminal, in determining whether the mobile terminal is currently in a stolen state; If the location information does not belong to the location range, determining that the mobile terminal is in a stolen state;
  • the processor is further configured to: when the mobile terminal is in a stolen state, hide an application specified on the mobile terminal that needs to be confidentially hidden on the interface, and prohibit the pre-designated application that needs to be kept secret Run and send the location information to the pre-bound terminal device.
  • the processor is further configured to: use the communication information included in the address book of the communication account Correlating with the communication information in the communication record of the communication account that the mobile terminal has logged in, if the same communication information is matched, sending the communication account to the communication account corresponding to the communication information and logging in to the mobile terminal
  • the notification message further includes the communication account that the mobile terminal has logged in to indicate that the mobile terminal is the mobile terminal of the communication account that the mobile terminal has logged in.
  • the processor is further configured to: detect whether the mobile terminal generates a first ⁇ action event, and if the mobile terminal generates a first ⁇ action event, detecting whether the smart watch specified by the mobile terminal generates a second ⁇ action An event, if the second watch action event occurs in the smart watch, determining whether the first action action event and the second action action event include the same action direction, and if the action direction is the same, determining the first motion Whether the action event and the start time of the ⁇ action included in the second ⁇ action event are all within a preset duration, and determining whether the duration of the ⁇ action included in the first ⁇ action event and the second ⁇ action event are both located within the preset duration, if the first ⁇ action event and the second ⁇ action event include ⁇ action start time are both within a preset time period, and the first ⁇ action event and the second Determining the duration of the ⁇ action included in the ⁇ action event is within the preset duration, and determining the ⁇ action included in the first ⁇
  • the embodiment of the invention further provides a computer readable storage medium, the program readable storage medium storing program code, the program code comprising instructions for performing the following steps:
  • Determining whether the mobile terminal is currently in a stolen state if the mobile terminal belongs to a stolen state, and the mobile terminal detects that the mobile terminal is abnormally unlocked, detecting whether the currently registered communication account is the mobile terminal history
  • the registered communication account in the case that the currently registered communication account is not the communication account that the mobile terminal has logged in, the communication account is posted on the social page of the communication account and the mobile account is logged on the user's stolen mobile terminal.
  • Notification message, and to the pre-bound end The end device sends the account information of the communication account.
  • the program code includes instructions for performing a special step of: setting, in the social webpage, the notification message, the special setting comprising not being visible to the communication account itself.
  • the program code includes instructions for performing the following steps: in the address book of the communication account, each communication contact group sends a notification message that the communication account is logged in on the mobile terminal that the user steals, and Delete the grouped records.
  • determining whether the mobile terminal is currently in the stolen state includes: determining whether the location information of the mobile terminal belongs to a location range corresponding to the motion track pre-stored by the mobile terminal; if the location information does not belong to the location a range, determining that the mobile terminal is in a stolen state;
  • the program code includes instructions for performing the following steps:
  • the mobile terminal When the mobile terminal is in a stolen state, the mobile terminal hides an application specified on the mobile terminal that needs to be kept secret from being hidden on the interface, and prohibits the pre-specified application that needs to be kept from running, and The location information is sent to a pre-bound terminal device.
  • the program code includes instructions for performing the following steps: performing communication information included in an address book of the communication account with communication information in an address book of a communication account that has been historically registered by the mobile terminal. Matching, if the matching communication information is matched, sending a notification message that the communication account is logged in to the mobile terminal to the communication account corresponding to the communication information, and the notification message further includes the history of the mobile terminal being logged in.
  • the communication account is a mobile terminal that indicates that the mobile terminal is a communication account that has been logged in by the mobile terminal history.
  • the embodiment of the present invention further provides another mobile terminal.
  • FIG. 8 for the convenience of description, only parts related to the embodiment of the present invention are shown. If the specific technical details are not disclosed, please refer to the method part of the embodiment of the present invention.
  • the mobile terminal can be any terminal device including a mobile phone, a tablet computer, a PDA (Personal Digital Assistant), a POS (Point of Sales), an in-vehicle computer, and the mobile terminal is used as a mobile phone as an example:
  • FIG. 8 is a block diagram showing a partial structure of a mobile phone related to a mobile terminal provided by an embodiment of the present invention.
  • the mobile phone includes: a radio frequency (RF) circuit 910, a memory 920, an input unit 930, a sensor 950, an audio circuit 960, a Wireless Fidelity (WiFi) module 970, a processor 980, and a power supply 990.
  • RF radio frequency
  • the structure of the handset shown in FIG. 8 does not constitute a limitation to the handset, and may include more or fewer components than those illustrated, or some components may be combined, or different component arrangements.
  • the input unit 930 can be configured to receive input numeric or character information and to generate key signal inputs related to user settings and function controls of the handset.
  • the input unit 930 can include a touch display screen 933, a biometric device 931, and other input devices 932.
  • the biometric device 931 can be a fingerprint recognition device, or a face recognition device, or an iris recognition device or the like.
  • the input unit 930 can also include other input devices 932.
  • other input devices 932 may include, but are not limited to, one or more of physical buttons, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and the like.
  • the processor 980 is configured to acquire an image to be processed, the target area of the image to be processed is used to add a watermark pattern, determine first color information of the first image corresponding to the target area, and determine the first color.
  • the processor 980 is the control center of the handset, which connects various portions of the entire handset using various interfaces and lines, by executing or executing software programs and/or modules stored in the memory 920, and invoking data stored in the memory 920, executing The phone's various functions and processing data, so that the overall monitoring of the phone.
  • the processor 980 may include one or more processing units; optionally, the processor 980 may integrate a processor and a modem processor, where the processor mainly processes an operating system, a user interface, an application, and the like.
  • the modem processor primarily handles wireless communications. It will be appreciated that the above described modem processor may also not be integrated into the processor 980.
  • memory 920 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
  • the RF circuit 910 can be used for receiving and transmitting information.
  • RF circuit 910 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like.
  • LNA Low Noise Amplifier
  • RF circuitry 910 can also communicate with the network and other devices via wireless communication.
  • the above wireless communication may use any communication standard or protocol, including but not limited to Global System of Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (Code Division). Multiple Access, CDMA), Wideband Code Division Multiple Access (Wideband Code Division Multiple Access, WCDMA), Long Term Evolution (LTE), e-mail, Short Messaging Service (SMS), etc.
  • GSM Global System of Mobile communication
  • GPRS General Packet Radio Service
  • CDMA Code Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • LTE Long Term Evolution
  • SMS Short Messaging Service
  • the handset may also include at least one type of sensor 950, such as a light sensor, motion sensor, and other sensors.
  • the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor can adjust the brightness of the touch display screen according to the brightness of the ambient light, and the proximity sensor can turn off the touch display when the mobile phone moves to the ear. And / or backlight.
  • the accelerometer sensor can detect the magnitude of acceleration in all directions (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity.
  • the mobile phone can be used to identify the gesture of the mobile phone (such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping), etc.; as for the mobile phone can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.
  • the gesture of the mobile phone such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration
  • vibration recognition related functions such as pedometer, tapping
  • the mobile phone can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.
  • the audio circuit 960, the speaker 961, and the microphone 962 can provide an audio interface between the user and the mobile phone.
  • the audio circuit 960 can transmit the converted electrical data of the received audio data to the speaker 961 for conversion to the sound signal by the speaker 961; on the other hand, the microphone 962 converts the collected sound signal into an electrical signal by the audio circuit 960. After receiving, it is converted into audio data, and then processed by the audio data playback processor 980, sent to the other mobile phone via the RF circuit 910, or played back to the memory 920 for further processing.
  • WiFi is a short-range wireless transmission technology
  • the mobile phone can help users to send and receive emails, browse web pages, and access streaming media through the WiFi module 970, which provides users with wireless broadband Internet access.
  • FIG. 8 shows the WiFi module 970, it can be understood that it does not belong to the essential configuration of the mobile phone, and may be omitted as needed within the scope of not changing the essence of the invention.
  • the handset also includes a power supply 990 (such as a battery) that supplies power to the various components.
  • a power supply 990 (such as a battery) that supplies power to the various components.
  • the power supply can be logically coupled to the processor 980 via a power management system to manage charging, discharging, and power management functions through the power management system.
  • the mobile phone may further include a camera, a Bluetooth module, and the like, and details are not described herein again.
  • each step method flow can be implemented based on the structure of the mobile phone.
  • each unit function can be implemented based on the structure of the mobile phone.
  • Embodiments of the present invention also provide a computer program product comprising a non-transitory computer readable storage medium storing a computer program, the computer program being operative to cause a mobile terminal to perform the method as described in the above method embodiment Part or all of the steps of any one of the methods.
  • the disclosed method and apparatus may It is achieved in other ways.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
  • each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may be physically included separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of hardware plus software functional units.
  • the above-described integrated unit implemented in the form of a software functional unit can be stored in a computer readable storage medium.
  • the above software functional unit is stored in a storage medium and includes a plurality of instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform part of the steps of the transceiving method of the various embodiments of the present invention.
  • the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like, and the program code can be stored. Medium.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

Provided are a mobile terminal having a communication account protection function and a related product. The mobile terminal comprises a processor and a memory coupled to each other. The processor is used for executing the following steps: determining whether the mobile terminal is currently in a stolen state; if the mobile terminal is in a stolen state, and when the mobile terminal detects that the mobile terminal is not normally unlocked, detecting whether a communication account currently logged in to is a communication account historically logged in to by the mobile terminal; and if the communication account currently logged in to by the mobile terminal is not the communication account historically logged in to by the mobile terminal, releasing a notification message that the communication account has been logged in to on the stolen mobile terminal of a user in a social networking webpage of the communication account, and sending account information about the communication account to a pre-bound terminal device. In this way, a user can directly contact a thief by means of the communication account, so as to improve the probability of finding a mobile terminal.

Description

具有通信账号防护功能的移动终端和相关产品Mobile terminal and related products with communication account protection 技术领域Technical field
本发明涉及通信技术领域,尤其涉及具有通信账号防护功能的移动终端和相关产品。The present invention relates to the field of communication technologies, and in particular, to a mobile terminal and related products having a communication account protection function.
背景技术Background technique
随着通信技术的发展,移动终端越来越被用户所喜爱并使用,且现在移动终端的价值也越来越高。在实际生活中经常会会出现移动终端丢失的情况,例如:被偷或者跌落。然而,目前在移动终端丢失后,主要通过如是通过移动终端定位,再将位置信息发送给服务器,服务器根据接收到的位置信息,并传输给用户,这样用户根据就可以根据位置信息,查找移动终端。然而,由于用户仅是根据位置信息进行找回移动终端,这样很大可能是无法找回移动终端。可见,目前移动终端丢失找回的概率比较低。With the development of communication technologies, mobile terminals are increasingly being used and used by users, and now the value of mobile terminals is getting higher and higher. In real life, there are often cases where the mobile terminal is lost, such as being stolen or dropped. However, after the mobile terminal is lost, the location information is sent to the server, for example, by the mobile terminal, and the server transmits the location information to the user according to the received location information, so that the user can search for the mobile terminal according to the location information. . However, since the user only retrieves the mobile terminal based on the location information, it is highly likely that the mobile terminal cannot be retrieved. It can be seen that the probability that the mobile terminal is lost and retrieved is relatively low.
发明内容Summary of the invention
本发明的目的在于提供一种移动终端信息发布方法和移动终端,解决了移动终端丢失找回的概率比较低的问题。The object of the present invention is to provide a mobile terminal information publishing method and a mobile terminal, which solves the problem that the probability of loss recovery of the mobile terminal is relatively low.
为了达到上述目的,本发明实施例提供一种移动终端信息发布方法,包括:In order to achieve the above object, an embodiment of the present invention provides a method for publishing information of a mobile terminal, including:
移动终端判断当前是否属于被盗状态;The mobile terminal determines whether it is currently in a stolen state;
若所述移动终端属于被盗状态,且所述移动终端检测到所述移动终端被非正常解锁时,所述移动终端检测当前登录的通信账号是否为所述移动终端历史登录过的通信账号;If the mobile terminal belongs to the stolen state, and the mobile terminal detects that the mobile terminal is abnormally unlocked, the mobile terminal detects whether the currently registered communication account is a communication account that has been logged in by the mobile terminal history;
所述移动终端当前登录的通信账号不为所述移动终端历史登录过的通信账号,则所述移动终端在所述通信账号的社交网页中发布所述通信账号在用户偷盗的移动终端上登录的通知消息,以及向预先绑定的终端设备发送所述通信账号的账号信息。 If the communication account currently registered by the mobile terminal is not the communication account that has been logged in by the mobile terminal history, the mobile terminal issues the communication account in the social webpage of the communication account and logs in on the mobile terminal that the user steals. Notifying the message, and transmitting the account information of the communication account to the pre-bound terminal device.
优选的,所述方法还包括:Preferably, the method further includes:
所述移动终端在所述社交网页中对所述通知消息做特殊设置,所述特殊设置包括对所述通信账号本身不可见。The mobile terminal specially sets the notification message in the social webpage, and the special setting includes not being visible to the communication account itself.
优选的,所述方法还包括:Preferably, the method further includes:
所述移动终端在所述通信账号的通讯录中各通信联系人群发,所述通信账号在用户偷盗的移动终端上登录的通知消息,并删除所述群发的记录。The mobile terminal sends a notification message to each communication contact person in the address book of the communication account, the communication account is logged in on the mobile terminal stolen by the user, and deletes the group record.
优选的,所述移动终端判断当前是否属于被盗状态,包括:Preferably, the mobile terminal determines whether it is currently in a stolen state, including:
所述移动终端判断所述移动终端的位置信息是否属于所述移动终端预先存储的运动轨迹所对应的位置范围;Determining, by the mobile terminal, location information of the mobile terminal that belongs to a location range corresponding to a motion track pre-stored by the mobile terminal;
若所述位置信息不属于所述位置范围,则确定所述移动终端处于被盗状态;If the location information does not belong to the location range, determining that the mobile terminal is in a stolen state;
所述方法还包括:The method further includes:
所述移动终端处于被盗状态时,所述移动终端将所述移动终端上安装的预先指定需要保密的应用程序在界面上隐藏,且禁止所述预先指定需要保密的应用程序运行,并将所述位置信息发送给预先绑定的终端设备。When the mobile terminal is in a stolen state, the mobile terminal hides an application specified on the mobile terminal that needs to be kept secret from being hidden on the interface, and prohibits the pre-designated application that needs to be kept secret, and The location information is sent to the pre-bound terminal device.
优选的,所述方法还包括:Preferably, the method further includes:
所述移动终端将所述通信账号的通讯录中包括的通信信息与所述移动终端历史登录过的通信账号的通信录中的通信信息进行匹配,若匹配到相同的通信信息,则向该通信信息对应的通讯账号发送所述通信账号在所述移动终端上登录的通知消息,且该通知消息中还包括所述移动终端历史登录过的通信账号,以表示所述移动终端为所述移动终端历史登录过的通信账号的移动终端。The mobile terminal matches the communication information included in the address book of the communication account with the communication information in the communication record of the communication account that the mobile terminal has logged in, and if the same communication information is matched, the communication is performed The communication account corresponding to the information is sent a notification message that the communication account is logged in to the mobile terminal, and the notification message further includes a communication account that the mobile terminal has logged in to indicate that the mobile terminal is the mobile terminal. The mobile terminal of the communication account that has been logged in history.
本发明实施例还提供一种移动终端,包括:The embodiment of the invention further provides a mobile terminal, including:
判断模块,用于判断当前是否属于被盗状态;a judging module, configured to determine whether the current status is stolen;
检测模块,用于若所述移动终端属于被盗状态,且所述移动终端检测到所述移动终端被非正常解锁时,检测当前登录的通信账号是否为所述移动终端历史登录过的通信账号;a detecting module, configured to: if the mobile terminal is in a stolen state, and the mobile terminal detects that the mobile terminal is abnormally unlocked, detecting whether the currently registered communication account is a communication account that has been logged in by the mobile terminal history ;
发布模块,用于当前登录的通信账号不为所述移动终端历史登录过的通信账号,则所述移动终端在所述通信账号的社交网页中发布所述通信账号在用户偷盗的移动终端上登录的通知消息,以及向预先绑定的终端设备发送所述通信 账号的账号信息。a publishing module, configured to: the mobile terminal that is currently logged in is not the communication account that has been logged in by the mobile terminal history, and the mobile terminal publishes the communication account in the social webpage of the communication account and logs in on the mobile terminal that the user steals Notification message, and sending the communication to a pre-bound terminal device Account information of the account.
优选的,所述移动终端还包括:Preferably, the mobile terminal further includes:
设置模块,用于在所述社交网页中对所述通知消息做特殊设置,所述特殊设置包括对所述通信账号本身不可见。And a setting module, configured to perform special setting on the notification message in the social webpage, where the special setting comprises not being visible to the communication account itself.
优选的,所述移动终端还包括:Preferably, the mobile terminal further includes:
群发模块,用于在所述通信账号的通讯录中各通信联系人群发,所述通信账号在用户偷盗的移动终端上登录的通知消息,并删除所述群发的记录。The group sending module is configured to send, in the address book of the communication account, each communication contact group, the notification message that the communication account is logged in on the mobile terminal that the user steals, and delete the grouped record.
优选的,所述判断模块用于判断所述移动终端的位置信息是否属于所述移动终端预先存储的运动轨迹所对应的位置范围,若所述位置信息不属于所述位置范围,则确定所述移动终端处于被盗状态;Preferably, the determining module is configured to determine whether the location information of the mobile terminal belongs to a location range corresponding to a motion track pre-stored by the mobile terminal, and if the location information does not belong to the location range, determine the The mobile terminal is in a stolen state;
所述移动终端还包括:The mobile terminal further includes:
隐藏模块,用于所述移动终端处于被盗状态时,所述移动终端将所述移动终端上安装的预先指定需要保密的应用程序在界面上隐藏,且禁止所述预先指定需要保密的应用程序运行,并将所述位置信息发送给预先绑定的终端设备。a hiding module, when the mobile terminal is in a stolen state, the mobile terminal hides an application specified on the mobile terminal that needs to be kept secret from being hidden on the interface, and prohibits the pre-designated application that needs to be kept secret Run and send the location information to the pre-bound terminal device.
优选的,所述移动终端还包括:Preferably, the mobile terminal further includes:
发送模块,用于所述移动终端将所述通信账号的通讯录中包括的通信信息与所述移动终端历史登录过的通信账号的通信录中的通信信息进行匹配,若匹配到相同的通信信息,则向该通信信息对应的通讯账号发送所述通信账号在所述移动终端上登录的通知消息,且该通知消息中还包括所述移动终端历史登录过的通信账号,以表示所述移动终端为所述移动终端历史登录过的通信账号的移动终端。a sending module, configured to: the mobile terminal matches the communication information included in the address book of the communication account with the communication information in the communication record of the communication account that the mobile terminal has logged in, if the same communication information is matched Transmitting, by the communication account corresponding to the communication information, a notification message that the communication account is logged in to the mobile terminal, and the notification message further includes a communication account that the mobile terminal has logged in to indicate the mobile terminal a mobile terminal that is a communication account that has been logged in by the mobile terminal history.
本发明实施例还提供一种移动终端,包括:The embodiment of the invention further provides a mobile terminal, including:
相互耦合的处理器和存储器;所述处理器用于执行如下步骤:a processor and a memory coupled to each other; the processor is configured to perform the following steps:
判断移动终端当前是否处于被盗状态;若所述移动终端属于被盗状态,且检测到所述移动终端被非正常解锁时,检测当前登录的通信账号是否为所述移动终端历史登录过的通信账号;若当前登录的通信账号不为所述移动终端历史登录过的通信账号,则在所述通信账号的社交网页中发布所述通信账号在用户偷盗的移动终端上登录的通知消息,以及向预先绑定的终端设备发送所述通信账号的账号信息。 Determining whether the mobile terminal is currently in a stolen state; if the mobile terminal belongs to a stolen state, and detecting that the mobile terminal is abnormally unlocked, detecting whether the currently logged-in communication account is a communication that has been logged in by the mobile terminal history If the currently registered communication account is not the communication account that has been logged in by the mobile terminal history, the notification message of the communication account being logged in on the mobile terminal stolen by the user is posted in the social webpage of the communication account, and The pre-bound terminal device sends the account information of the communication account.
可选的,所述处理器还用于,在所述社交网页中对所述通知消息做特殊设置,所述特殊设置包括对所述通信账号本身不可见。Optionally, the processor is further configured to: perform special setting on the notification message in the social webpage, where the special setting includes not being visible to the communication account itself.
可选的,所述处理器还用于,在所述通信账号的通讯录中各通信联系人群发,所述通信账号在用户偷盗的移动终端上登录的通知消息,并删除所述群发的记录。Optionally, the processor is further configured to: send, in the address book of the communication account, each communication contact group, the notification message that the communication account is logged in on the mobile terminal that the user steals, and delete the record of the group sending .
可选的,在判断移动终端当前是否处于被盗状态的方面,所述处理器具体用于,判断所述移动终端的位置信息是否属于所述移动终端预先存储的运动轨迹所对应的位置范围;若所述位置信息不属于所述位置范围,则确定所述移动终端处于被盗状态;Optionally, the processor is specifically configured to: determine whether the location information of the mobile terminal belongs to a location range corresponding to a motion track pre-stored by the mobile terminal, in determining whether the mobile terminal is currently in a stolen state; If the location information does not belong to the location range, determining that the mobile terminal is in a stolen state;
所述处理器还用于,在所述移动终端处于被盗状态时,将所述移动终端上安装的预先指定需要保密的应用程序在界面上隐藏,且禁止所述预先指定需要保密的应用程序运行,并将所述位置信息发送给预先绑定的终端设备。The processor is further configured to: when the mobile terminal is in a stolen state, hide an application specified on the mobile terminal that needs to be confidentially hidden on the interface, and prohibit the pre-designated application that needs to be kept secret Run and send the location information to the pre-bound terminal device.
可选的,所述处理器还用于,将所述通信账号的通讯录中包括的通信信息与所述移动终端历史登录过的通信账号的通信录中的通信信息进行匹配,若匹配到相同的通信信息,则向该通信信息对应的通讯账号发送所述通信账号在所述移动终端上登录的通知消息,且该通知消息中还包括所述移动终端历史登录过的通信账号,以表示所述移动终端为所述移动终端历史登录过的通信账号的移动终端。Optionally, the processor is further configured to: match the communication information included in the address book of the communication account with the communication information in the communication record of the communication account that the mobile terminal has logged in, if the match is the same Transmitting, by the communication account corresponding to the communication information, a notification message that the communication account is logged in to the mobile terminal, and the notification message further includes a communication account that the mobile terminal has logged in to indicate The mobile terminal is a mobile terminal of a communication account that has been logged in by the mobile terminal history.
可选的,所述处理器还用于,检测所述移动终端是否发生第一甩动作事件,如果移动终端发生第一甩动作事件,检测所述移动终端指定的智能手表是否发生第二甩动作事件,若所述智能手表发生第二甩动作事件,判断所述第一甩动作事件和所述第二甩动作事件包括的甩动作方向是否相同,如果甩动作方向相同,判断所述第一甩动作事件和所述第二甩动作事件包括的甩动作起始时间是否均位于预设时长内,判断所述第一甩动作事件和所述第二甩动作事件包括的甩动作持续时长是否均位于所述预设时长内,如果所述第一甩动作事件和所述第二甩动作事件包括的甩动作起始时间均位于预设时长内,并且所述第一甩动作事件和所述第二甩动作事件包括的甩动作持续时长均位于所述预设时长之内,判断所述第一甩动作事件与所述第二甩动作事件包括的甩动作起始时间的差值是否小于第三预设阈值,如果所述第一甩动作事件与所述第二甩动作事件 包括的甩动作起始时间的差值小于第三预设阈值,判断所述第一甩动作事件与所述第二甩动作事件包括的甩动作持续时长的差值是否小于第四预设阈值,如果所述第一甩动作事件与所述第二甩动作事件包括的甩动作持续时长的差值小于第四预设阈值,确定所述移动终端和所述智能手表均在所述预设时长内发生同一动作事件。在确定所述移动终端和所述智能手表均在所述预设时长内发生同一动作事件的情况下,解除所述移动终端的被盗状态。Optionally, the processor is further configured to: detect whether the mobile terminal generates a first 甩 action event, and if the mobile terminal generates a first 甩 action event, detecting whether the smart watch specified by the mobile terminal generates a second 甩 action An event, if the second watch action event occurs in the smart watch, determining whether the first action action event and the second action action event include the same action direction, and if the action direction is the same, determining the first motion Whether the action event and the start time of the 甩 action included in the second 甩 action event are all within a preset duration, and determining whether the duration of the 包括 action included in the first 甩 action event and the second 甩 action event are both located Within the preset duration, if the first 甩 action event and the second 甩 action event include 甩 action start time are both within a preset time period, and the first 甩 action event and the second Determining the duration of the 甩 action included in the 甩 action event is within the preset duration, and determining the 包括 action included in the first 甩 action event and the second 甩 action event Start time difference is less than a third predetermined threshold value, if the first operation throw and the second rejection event actionable event Determining whether the difference between the start time of the 甩 action is less than the third preset threshold, and determining whether the difference between the duration of the 甩 action included by the first 甩 action event and the second 甩 action event is less than a fourth preset threshold, Determining that the mobile terminal and the smart watch are both within the preset duration if the difference between the first 甩 action event and the 甩 action duration duration included in the second 甩 action event is less than a fourth preset threshold The same action event occurred. And determining that the mobile terminal and the smart watch both cancel the stolen state of the mobile terminal if the same action event occurs within the preset duration.
本发明实施例还提供一种计算机可读存储介质,所述计算机可读存储介质存储了程序代码,所述程序代码包括的指令用于执行如下步骤:The embodiment of the invention further provides a computer readable storage medium, the program readable storage medium storing program code, the program code comprising instructions for performing the following steps:
判断移动终端当前是否处于被盗状态;若所述移动终端属于被盗状态,且所述移动终端检测到所述移动终端被非正常解锁时,检测当前登录的通信账号是否为所述移动终端历史登录过的通信账号;在当前登录的通信账号不为所述移动终端历史登录过的通信账号的情况下,在所述通信账号的社交网页中发布所述通信账号在用户偷盗的移动终端上登录的通知消息,以及向预先绑定的终端设备发送所述通信账号的账号信息。Determining whether the mobile terminal is currently in a stolen state; if the mobile terminal belongs to a stolen state, and the mobile terminal detects that the mobile terminal is abnormally unlocked, detecting whether the currently registered communication account is the mobile terminal history The registered communication account; in the case that the currently registered communication account is not the communication account that the mobile terminal has logged in, the communication account is posted on the social page of the communication account and the mobile account is logged on the user's stolen mobile terminal. The notification message, and the account information of the communication account is sent to the pre-bound terminal device.
可选的,所述程序代码包括的指令还用于执行如下步骤:在所述社交网页中对所述通知消息做特殊设置,所述特殊设置包括对所述通信账号本身不可见。Optionally, the program code includes instructions for performing a special step of: setting, in the social webpage, the notification message, the special setting comprising not being visible to the communication account itself.
可选的,所述程序代码包括的指令还用于执行如下步骤:在所述通信账号的通讯录中各通信联系人群发,所述通信账号在用户偷盗的移动终端上登录的通知消息,并删除所述群发的记录。Optionally, the program code includes instructions for performing the following steps: in the address book of the communication account, each communication contact group sends a notification message that the communication account is logged in on the mobile terminal that the user steals, and Delete the grouped records.
可选的,判断移动终端当前是否属于被盗状态包括:判断所述移动终端的位置信息是否属于所述移动终端预先存储的运动轨迹所对应的位置范围;若所述位置信息不属于所述位置范围,则确定所述移动终端处于被盗状态;Optionally, determining whether the mobile terminal is currently in the stolen state includes: determining whether the location information of the mobile terminal belongs to a location range corresponding to the motion track pre-stored by the mobile terminal; if the location information does not belong to the location a range, determining that the mobile terminal is in a stolen state;
所述程序代码包括的指令还用于执行如下步骤:The program code includes instructions for performing the following steps:
在所述移动终端处于被盗状态时,所述移动终端将所述移动终端上安装的预先指定需要保密的应用程序在界面上隐藏,且禁止所述预先指定需要保密的应用程序运行,并将所述位置信息发送给预先绑定的终端设备。When the mobile terminal is in a stolen state, the mobile terminal hides an application specified on the mobile terminal that needs to be kept secret from being hidden on the interface, and prohibits the pre-specified application that needs to be kept from running, and The location information is sent to a pre-bound terminal device.
可选的,所述程序代码包括的指令还用于执行如下步骤:将所述通信账号的通讯录中包括的通信信息与所述移动终端历史登录过的通信账号的通信录 中的通信信息进行匹配,若匹配到相同的通信信息,则向该通信信息对应的通讯账号发送所述通信账号在所述移动终端上登录的通知消息,且该通知消息中还包括所述移动终端历史登录过的通信账号,以表示所述移动终端为所述移动终端历史登录过的通信账号的移动终端。Optionally, the program code includes instructions for performing the following steps: the communication information included in the address book of the communication account and the communication record of the communication account registered by the mobile terminal history The communication information in the matching is matched, and if the same communication information is matched, the notification message that the communication account is logged in on the mobile terminal is sent to the communication account corresponding to the communication information, and the notification message further includes the movement The communication account that the terminal history has logged in to indicate that the mobile terminal is the mobile terminal of the communication account that the mobile terminal has logged in.
本发明实施例中,移动终端判断当前是否属于被盗状态;若所述移动终端属于被盗状态,且所述移动终端检测到所述移动终端被非正常解锁时,所述移动终端检测当前登录的通信账号是否为所述移动终端历史登录过的通信账号;所述移动终端当前登录的通信账号不为所述移动终端历史登录过的通信账号,则所述移动终端在所述通信账号的社交网页中发布所述通信账号在用户偷盗的移动终端上登录的通知消息,以及向预先绑定的终端设备发送所述通信账号的账号信息。这样可以实现用户可以通过该通信账号直接联系到偷盗者,以提高找回移动终端的概率。In the embodiment of the present invention, the mobile terminal determines whether the mobile terminal belongs to the stolen state; if the mobile terminal belongs to the stolen state, and the mobile terminal detects that the mobile terminal is abnormally unlocked, the mobile terminal detects the current login. Whether the communication account is a communication account that has been logged in by the mobile terminal history; if the communication account currently logged in by the mobile terminal is not a communication account that has been logged in by the mobile terminal history, the mobile terminal is socialized in the communication account. The webpage publishes a notification message that the communication account is logged in on the mobile terminal that the user steals, and sends the account information of the communication account to the pre-bound terminal device. In this way, the user can directly contact the thief through the communication account to improve the probability of retrieving the mobile terminal.
附图说明DRAWINGS
为了更清楚地说明本发明实施例中的技术方案,下面将对实施例中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings to be used in the embodiments will be briefly described below. It is obvious that the drawings in the following description are only some embodiments of the present invention. Those skilled in the art can also obtain other drawings based on these drawings without paying any creative work.
图1是本发明实施例提供的一种移动终端信息发布方法的流程示意图;1 is a schematic flowchart of a method for publishing information of a mobile terminal according to an embodiment of the present invention;
图2是本发明实施例提供的一种移动终端的结构示意图;2 is a schematic structural diagram of a mobile terminal according to an embodiment of the present invention;
图3是本发明实施例提供的另一种移动终端的结构示意图;3 is a schematic structural diagram of another mobile terminal according to an embodiment of the present invention;
图4是本发明实施例提供的另一种移动终端的结构示意图;4 is a schematic structural diagram of another mobile terminal according to an embodiment of the present invention;
图5是本发明实施例提供的另一种移动终端的结构示意图;FIG. 5 is a schematic structural diagram of another mobile terminal according to an embodiment of the present disclosure;
图6是本发明实施例提供的另一种移动终端的结构示意图;FIG. 6 is a schematic structural diagram of another mobile terminal according to an embodiment of the present disclosure;
图7是本发明实施例提供的另一种移动终端的结构示意图;FIG. 7 is a schematic structural diagram of another mobile terminal according to an embodiment of the present disclosure;
图8是本发明实施例提供的另一种移动终端的结构示意图。FIG. 8 is a schematic structural diagram of another mobile terminal according to an embodiment of the present invention.
具体实施方式Detailed ways
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅是本发明一部分实施例,而不是全 部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The technical solutions in the embodiments of the present invention are clearly and completely described in the following with reference to the accompanying drawings in the embodiments of the present invention. It is obvious that the described embodiments are only a part of the embodiments of the present invention, and not An embodiment of the department. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments of the present invention without creative efforts are within the scope of the present invention.
请参考图1,图1是本发明实施例提供的一种移动终端信息发布方法的流程示意图,如图1所示,包括:Please refer to FIG. 1. FIG. 1 is a schematic flowchart of a method for publishing information of a mobile terminal according to an embodiment of the present invention. As shown in FIG.
101、移动终端判断当前是否属于被盗状态;101. The mobile terminal determines whether the current state is a stolen state;
102、若所述移动终端属于被盗状态,且所述移动终端检测到所述移动终端被非正常解锁时,所述移动终端检测当前登录的通信账号是否为所述移动终端历史登录过的通信账号;102. If the mobile terminal belongs to a stolen state, and the mobile terminal detects that the mobile terminal is abnormally unlocked, the mobile terminal detects whether the currently logged-in communication account is a communication that has been logged in by the mobile terminal history. account number;
103、所述移动终端当前登录的通信账号不为所述移动终端历史登录过的通信账号,则所述移动终端在所述通信账号的社交网页中发布所述通信账号在用户偷盗的移动终端上登录的通知消息,以及向预先绑定的终端设备发送所述通信账号的账号信息。103. The communication account currently registered by the mobile terminal is not a communication account that has been logged in by the mobile terminal history, and the mobile terminal issues the communication account on the mobile terminal of the communication account on the mobile terminal that the user steals. The login notification message, and the account information of the communication account is sent to the pre-bound terminal device.
其中,上述被盗状态可以是使用移动终端的用户不是移动终端的本身用户,即被他人使用。另外,上述非正常解锁可以理解为不是使用移动终端的解锁密码的解锁。The stolen state may be that the user who uses the mobile terminal is not the user of the mobile terminal itself, that is, used by others. In addition, the above abnormal unlocking can be understood as not using the unlocking of the unlocking code of the mobile terminal.
本发明实施例中,通过上述步骤可以实现向通信账号的社交网页中发布所述通信账号在用户偷盗的移动终端上登录的通知消息,这样可以将该移动终端的被盗的信息发布出去,以方便用户查看到移动终端被盗的信息,且向预先绑定的终端设备发送所述通信账号的账号信息,这样用户就可以直接根据该账号查找到偷盗者,以方便找回移动终端。In the embodiment of the present invention, the notification message that the communication account is logged in on the mobile terminal that the user has stolen is released to the social webpage of the communication account, so that the stolen information of the mobile terminal can be released. The user can view the stolen information of the mobile terminal, and send the account information of the communication account to the pre-bound terminal device, so that the user can directly find the thief according to the account, so as to conveniently retrieve the mobile terminal.
优选的,所述方法还包括:Preferably, the method further includes:
所述移动终端在所述社交网页中对所述通知消息做特殊设置,所述特殊设置包括对所述通信账号本身不可见。The mobile terminal specially sets the notification message in the social webpage, and the special setting includes not being visible to the communication account itself.
该实施方式中,可以实现将社交网页中对所述通知消息设置成对所述通信账号本身不可见,这样可以有利于该通知消息在社交网络中扩散,以避免偷盗者将该消息从社交网络中删除。In this implementation manner, setting the notification message in the social webpage to be invisible to the communication account itself may be beneficial to spread the notification message in the social network, so as to prevent the thief from the message from the social network. Deleted.
优选的,所述方法还包括:Preferably, the method further includes:
所述移动终端在所述通信账号的通讯录中各通信联系人群发,所述通信账号在用户偷盗的移动终端上登录的通知消息,并删除所述群发的记录。 The mobile terminal sends a notification message to each communication contact person in the address book of the communication account, the communication account is logged in on the mobile terminal stolen by the user, and deletes the group record.
该实施方式中,在通讯录中群发上述通知消息,这样更加有利于上述通知省的扩散,以便用户快速查看到该通知消息,以及时找回移动终端。In this implementation manner, the foregoing notification message is grouped in the address book, which is more advantageous for the diffusion of the notification province, so that the user can quickly view the notification message and retrieve the mobile terminal in time.
优选的,所述移动终端判断当前是否属于被盗状态,包括:Preferably, the mobile terminal determines whether it is currently in a stolen state, including:
所述移动终端判断所述移动终端的位置信息是否属于所述移动终端预先存储的运动轨迹所对应的位置范围;Determining, by the mobile terminal, location information of the mobile terminal that belongs to a location range corresponding to a motion track pre-stored by the mobile terminal;
若所述位置信息不属于所述位置范围,则确定所述移动终端处于被盗状态;If the location information does not belong to the location range, determining that the mobile terminal is in a stolen state;
所述方法还包括:The method further includes:
所述移动终端处于被盗状态时,所述移动终端将所述移动终端上安装的预先指定需要保密的应用程序在界面上隐藏,且禁止所述预先指定需要保密的应用程序运行,并将所述位置信息发送给预先绑定的终端设备。When the mobile terminal is in a stolen state, the mobile terminal hides an application specified on the mobile terminal that needs to be kept secret from being hidden on the interface, and prohibits the pre-designated application that needs to be kept secret, and The location information is sent to the pre-bound terminal device.
该实施方式中,可以实现通过上述步骤准确地确定移动终端的被盗状态,且由于将上述预先指定需要保密的应用程序在界面上隐藏,且禁止所述预先指定需要保密的应用程序运行,并将所述位置信息发送给预先绑定的终端设备,这样有交效地保护了移动终端的安全信息,以防止安全信息泄密。另外,将上述位置信息发送给预先绑定的终端设备,从而更加有利于用户找回移动终端。In this implementation manner, the stolen state of the mobile terminal can be accurately determined through the foregoing steps, and the application that needs to be kept secret is hidden on the interface, and the application that needs to be kept secret is prohibited from being operated, and The location information is sent to the pre-bound terminal device, so that the security information of the mobile terminal is effectively protected to prevent the security information from being leaked. In addition, the location information is sent to the pre-bound terminal device, thereby facilitating the user to retrieve the mobile terminal.
优选的,所述方法还包括:Preferably, the method further includes:
所述移动终端将所述通信账号的通讯录中包括的通信信息与所述移动终端历史登录过的通信账号的通信录中的通信信息进行匹配,若匹配到相同的通信信息,则向该通信信息对应的通讯账号发送所述通信账号在所述移动终端上登录的通知消息,且该通知消息中还包括所述移动终端历史登录过的通信账号,以表示所述移动终端为所述移动终端历史登录过的通信账号的移动终端。The mobile terminal matches the communication information included in the address book of the communication account with the communication information in the communication record of the communication account that the mobile terminal has logged in, and if the same communication information is matched, the communication is performed The communication account corresponding to the information is sent a notification message that the communication account is logged in to the mobile terminal, and the notification message further includes a communication account that the mobile terminal has logged in to indicate that the mobile terminal is the mobile terminal. The mobile terminal of the communication account that has been logged in history.
该实施方式中,可以实现当上述通信账号和移动终端历史登录过的通信账号存在相同的通信信息,即两个通信账号有相同有通信好友,这样通过该好友就更加方便用户找回移动终端。因为,通过该好友可以直接友好的联系上偷盗者。In this implementation manner, when the communication account and the communication account that the mobile terminal has logged in, the same communication information exists, that is, the two communication accounts have the same communication friend, so that the user is more convenient to retrieve the mobile terminal through the friend. Because, through this friend, you can directly contact the thief.
可选的,在本发明的一些可能的实施方式中,所述移动终端还可检测所述移动终端是否发生第一甩动作事件,如果移动终端发生第一甩动作事件,检测所述移动终端指定的智能手表是否发生第二甩动作事件,若所述智能手表发生 第二甩动作事件,判断所述第一甩动作事件和所述第二甩动作事件包括的甩动作方向是否相同,如果甩动作方向相同,判断所述第一甩动作事件和所述第二甩动作事件包括的甩动作起始时间是否均位于预设时长内,判断所述第一甩动作事件和所述第二甩动作事件包括的甩动作持续时长是否均位于所述预设时长内,如果所述第一甩动作事件和所述第二甩动作事件包括的甩动作起始时间均位于预设时长内,并且所述第一甩动作事件和所述第二甩动作事件包括的甩动作持续时长均位于所述预设时长之内,判断所述第一甩动作事件与所述第二甩动作事件包括的甩动作起始时间的差值是否小于第三预设阈值,如果所述第一甩动作事件与所述第二甩动作事件包括的甩动作起始时间的差值小于第三预设阈值,判断所述第一甩动作事件与所述第二甩动作事件包括的甩动作持续时长的差值是否小于第四预设阈值,如果所述第一甩动作事件与所述第二甩动作事件包括的甩动作持续时长的差值小于第四预设阈值,确定所述移动终端和所述智能手表均在所述预设时长内发生同一动作事件。在确定所述移动终端和所述智能手表均在所述预设时长内发生同一动作事件的情况下,解除所述移动终端的被盗状态。Optionally, in some possible implementation manners of the present invention, the mobile terminal may further detect whether the mobile terminal generates a first 甩 action event, and if the mobile terminal generates a first 甩 action event, detecting the mobile terminal designation Whether the smart watch has a second action event if the smart watch occurs a second 甩 action event, determining whether the first 甩 action event and the second 甩 action event include the same 甩 action direction, and if the 甩 action direction is the same, determining the first 甩 action event and the second 甩Whether the start time of the 甩 action included in the action event is within a preset time period, and determining whether the duration of the 甩 action included in the first 甩 action event and the second 甩 action event are both within the preset duration, if The first action event and the second action event include a start time of the click action, both of which are within a preset time period, and the first action event and the second action event include a continuous action The duration is both within the preset duration, and determining whether the difference between the first 甩 action event and the 起始 action start time included in the second 甩 action event is less than a third preset threshold, if the first Determining, by the first action event and the second action event, the difference between the start event and the start time included in the second action event is less than a third preset threshold Whether the difference of the duration of the action is less than a fourth preset threshold, and if the difference between the duration of the first action event and the duration of the action included in the second action event is less than a fourth preset threshold, determining the movement Both the terminal and the smart watch have the same action event within the preset duration. And determining that the mobile terminal and the smart watch both cancel the stolen state of the mobile terminal if the same action event occurs within the preset duration.
可选的,所述预设时长可以是11秒、22秒、30秒、50秒、72秒、102秒或其它时间。Optionally, the preset duration may be 11 seconds, 22 seconds, 30 seconds, 50 seconds, 72 seconds, 102 seconds, or other times.
可选的,第一预设阈值可以是3秒、5秒、10秒、20秒、50秒、84秒或其它时间。Optionally, the first preset threshold may be 3 seconds, 5 seconds, 10 seconds, 20 seconds, 50 seconds, 84 seconds, or other time.
可选的,第二预设阈值可以是13秒、15秒、22秒、20秒、54秒、81秒或其它时间。Optionally, the second preset threshold may be 13 seconds, 15 seconds, 22 seconds, 20 seconds, 54 seconds, 81 seconds, or other times.
本发明实施例中,移动终端判断当前是否属于被盗状态;若所述移动终端属于被盗状态,且所述移动终端检测到所述移动终端被非正常解锁时,所述移动终端检测当前登录的通信账号是否为所述移动终端历史登录过的通信账号;所述移动终端当前登录的通信账号不为所述移动终端历史登录过的通信账号,则所述移动终端在所述通信账号的社交网页中发布所述通信账号在用户偷盗的移动终端上登录的通知消息,以及向预先绑定的终端设备发送所述通信账号的账号信息。这样可以实现用户可以通过该通信账号直接联系到偷盗者,以提高找回移动终端的概率。In the embodiment of the present invention, the mobile terminal determines whether the mobile terminal belongs to the stolen state; if the mobile terminal belongs to the stolen state, and the mobile terminal detects that the mobile terminal is abnormally unlocked, the mobile terminal detects the current login. Whether the communication account is a communication account that has been logged in by the mobile terminal history; if the communication account currently logged in by the mobile terminal is not a communication account that has been logged in by the mobile terminal history, the mobile terminal is socialized in the communication account. The webpage publishes a notification message that the communication account is logged in on the mobile terminal that the user steals, and sends the account information of the communication account to the pre-bound terminal device. In this way, the user can directly contact the thief through the communication account to improve the probability of retrieving the mobile terminal.
请参考图2,图2是本发明实施例提供的一种移动终端的结构示意图,如图2所示,包括: Please refer to FIG. 2. FIG. 2 is a schematic structural diagram of a mobile terminal according to an embodiment of the present invention. As shown in FIG. 2, the method includes:
判断模块201,用于判断当前是否属于被盗状态;The determining module 201 is configured to determine whether the current state is a stolen state;
检测模块202,用于若所述移动终端属于被盗状态,且所述移动终端检测到所述移动终端被非正常解锁时,检测当前登录的通信账号是否为所述移动终端历史登录过的通信账号;The detecting module 202 is configured to detect, if the mobile terminal belongs to a stolen state, and the mobile terminal detects that the mobile terminal is abnormally unlocked, whether the currently registered communication account is a communication that has been logged in by the mobile terminal history. account number;
发布模块203,用于当前登录的通信账号不为所述移动终端历史登录过的通信账号,则所述移动终端在所述通信账号的社交网页中发布所述通信账号在用户偷盗的移动终端上登录的通知消息,以及向预先绑定的终端设备发送所述通信账号的账号信息。a publishing module 203, configured to: when the currently registered communication account is not a communication account that has been logged in by the mobile terminal history, the mobile terminal issues the communication account in the social network page of the communication account on the mobile terminal that the user steals The login notification message, and the account information of the communication account is sent to the pre-bound terminal device.
优选的,如图3所示,所述移动终端还包括:Preferably, as shown in FIG. 3, the mobile terminal further includes:
设置模块204,用于在所述社交网页中对所述通知消息做特殊设置,所述特殊设置包括对所述通信账号本身不可见。The setting module 204 is configured to perform special setting on the notification message in the social webpage, where the special setting includes not being visible to the communication account itself.
优选的,如图4所示,所述移动终端还包括:Preferably, as shown in FIG. 4, the mobile terminal further includes:
群发模块205,用于在所述通信账号的通讯录中各通信联系人群发,所述通信账号在用户偷盗的移动终端上登录的通知消息,并删除所述群发的记录。The group sending module 205 is configured to send, in the address book of the communication account, each communication contact group, the notification message that the communication account is logged in on the mobile terminal that the user steals, and delete the grouped record.
优选的,所述判断模块201用于判断所述移动终端的位置信息是否属于所述移动终端预先存储的运动轨迹所对应的位置范围,若所述位置信息不属于所述位置范围,则确定所述移动终端处于被盗状态;Preferably, the determining module 201 is configured to determine whether the location information of the mobile terminal belongs to a location range corresponding to a motion track pre-stored by the mobile terminal, and if the location information does not belong to the location range, determine the location The mobile terminal is in a stolen state;
如图5所示,所述移动终端还包括:As shown in FIG. 5, the mobile terminal further includes:
隐藏模块206,用于所述移动终端处于被盗状态时,所述移动终端将所述移动终端上安装的预先指定需要保密的应用程序在界面上隐藏,且禁止所述预先指定需要保密的应用程序运行,并将所述位置信息发送给预先绑定的终端设备。a hiding module 206, configured to: when the mobile terminal is in a stolen state, the mobile terminal hides an application specified on the mobile terminal that needs to be kept secret from being hidden on the interface, and prohibits the pre-designated application that needs to be kept secret The program runs and sends the location information to the pre-bound terminal device.
优选的,如图6所示,所述移动终端还包括:Preferably, as shown in FIG. 6, the mobile terminal further includes:
发送模块207,用于所述移动终端将所述通信账号的通讯录中包括的通信信息与所述移动终端历史登录过的通信账号的通信录中的通信信息进行匹配,若匹配到相同的通信信息,则向该通信信息对应的通讯账号发送所述通信账号在所述移动终端上登录的通知消息,且该通知消息中还包括所述移动终端历史登录过的通信账号,以表示所述移动终端为所述移动终端历史登录过的通信账号的移动终端。 The sending module 207 is configured to: the mobile terminal matches the communication information included in the address book of the communication account with the communication information in the communication record of the communication account that the mobile terminal has logged in, if the same communication is matched And transmitting, to the communication account corresponding to the communication information, a notification message that the communication account is logged in on the mobile terminal, and the notification message further includes a communication account that the mobile terminal has logged in to indicate the movement The terminal is a mobile terminal of a communication account that has been logged in by the mobile terminal history.
本发明实施例中,移动终端判断当前是否属于被盗状态;若所述移动终端属于被盗状态,且所述移动终端检测到所述移动终端被非正常解锁时,所述移动终端检测当前登录的通信账号是否为所述移动终端历史登录过的通信账号;所述移动终端当前登录的通信账号不为所述移动终端历史登录过的通信账号,则所述移动终端在所述通信账号的社交网页中发布所述通信账号在用户偷盗的移动终端上登录的通知消息,以及向预先绑定的终端设备发送所述通信账号的账号信息。这样可以实现用户可以通过该通信账号直接联系到偷盗者,以提高找回移动终端的概率。In the embodiment of the present invention, the mobile terminal determines whether the mobile terminal belongs to the stolen state; if the mobile terminal belongs to the stolen state, and the mobile terminal detects that the mobile terminal is abnormally unlocked, the mobile terminal detects the current login. Whether the communication account is a communication account that has been logged in by the mobile terminal history; if the communication account currently logged in by the mobile terminal is not a communication account that has been logged in by the mobile terminal history, the mobile terminal is socialized in the communication account. The webpage publishes a notification message that the communication account is logged in on the mobile terminal that the user steals, and sends the account information of the communication account to the pre-bound terminal device. In this way, the user can directly contact the thief through the communication account to improve the probability of retrieving the mobile terminal.
参见图7,本发明实施例还提供一种移动终端700,包括:相互耦合的处理器710和存储器720;所述处理器710用于执行如下步骤:Referring to FIG. 7, an embodiment of the present invention further provides a mobile terminal 700, including: a processor 710 and a memory 720 coupled to each other; and the processor 710 is configured to perform the following steps:
判断移动终端当前是否处于被盗状态;若所述移动终端属于被盗状态,且检测到所述移动终端被非正常解锁时,检测当前登录的通信账号是否为所述移动终端历史登录过的通信账号;若当前登录的通信账号不为所述移动终端历史登录过的通信账号,则在所述通信账号的社交网页中发布所述通信账号在用户偷盗的移动终端上登录的通知消息,以及向预先绑定的终端设备发送所述通信账号的账号信息。Determining whether the mobile terminal is currently in a stolen state; if the mobile terminal belongs to a stolen state, and detecting that the mobile terminal is abnormally unlocked, detecting whether the currently logged-in communication account is a communication that has been logged in by the mobile terminal history If the currently registered communication account is not the communication account that has been logged in by the mobile terminal history, the notification message of the communication account being logged in on the mobile terminal stolen by the user is posted in the social webpage of the communication account, and The pre-bound terminal device sends the account information of the communication account.
可选的,所述处理器还用于,在所述社交网页中对所述通知消息做特殊设置,所述特殊设置包括对所述通信账号本身不可见。Optionally, the processor is further configured to: perform special setting on the notification message in the social webpage, where the special setting includes not being visible to the communication account itself.
可选的,所述处理器还用于,在所述通信账号的通讯录中各通信联系人群发,所述通信账号在用户偷盗的移动终端上登录的通知消息,并删除所述群发的记录。Optionally, the processor is further configured to: send, in the address book of the communication account, each communication contact group, the notification message that the communication account is logged in on the mobile terminal that the user steals, and delete the record of the group sending .
可选的,在判断移动终端当前是否处于被盗状态的方面,所述处理器具体用于,判断所述移动终端的位置信息是否属于所述移动终端预先存储的运动轨迹所对应的位置范围;若所述位置信息不属于所述位置范围,则确定所述移动终端处于被盗状态;Optionally, the processor is specifically configured to: determine whether the location information of the mobile terminal belongs to a location range corresponding to a motion track pre-stored by the mobile terminal, in determining whether the mobile terminal is currently in a stolen state; If the location information does not belong to the location range, determining that the mobile terminal is in a stolen state;
所述处理器还用于,在所述移动终端处于被盗状态时,将所述移动终端上安装的预先指定需要保密的应用程序在界面上隐藏,且禁止所述预先指定需要保密的应用程序运行,并将所述位置信息发送给预先绑定的终端设备。The processor is further configured to: when the mobile terminal is in a stolen state, hide an application specified on the mobile terminal that needs to be confidentially hidden on the interface, and prohibit the pre-designated application that needs to be kept secret Run and send the location information to the pre-bound terminal device.
可选的,所述处理器还用于,将所述通信账号的通讯录中包括的通信信息 与所述移动终端历史登录过的通信账号的通信录中的通信信息进行匹配,若匹配到相同的通信信息,则向该通信信息对应的通讯账号发送所述通信账号在所述移动终端上登录的通知消息,且该通知消息中还包括所述移动终端历史登录过的通信账号,以表示所述移动终端为所述移动终端历史登录过的通信账号的移动终端。Optionally, the processor is further configured to: use the communication information included in the address book of the communication account Correlating with the communication information in the communication record of the communication account that the mobile terminal has logged in, if the same communication information is matched, sending the communication account to the communication account corresponding to the communication information and logging in to the mobile terminal And the notification message further includes the communication account that the mobile terminal has logged in to indicate that the mobile terminal is the mobile terminal of the communication account that the mobile terminal has logged in.
可选的,所述处理器还用于,检测所述移动终端是否发生第一甩动作事件,如果移动终端发生第一甩动作事件,检测所述移动终端指定的智能手表是否发生第二甩动作事件,若所述智能手表发生第二甩动作事件,判断所述第一甩动作事件和所述第二甩动作事件包括的甩动作方向是否相同,如果甩动作方向相同,判断所述第一甩动作事件和所述第二甩动作事件包括的甩动作起始时间是否均位于预设时长内,判断所述第一甩动作事件和所述第二甩动作事件包括的甩动作持续时长是否均位于所述预设时长内,如果所述第一甩动作事件和所述第二甩动作事件包括的甩动作起始时间均位于预设时长内,并且所述第一甩动作事件和所述第二甩动作事件包括的甩动作持续时长均位于所述预设时长之内,判断所述第一甩动作事件与所述第二甩动作事件包括的甩动作起始时间的差值是否小于第三预设阈值,如果所述第一甩动作事件与所述第二甩动作事件包括的甩动作起始时间的差值小于第三预设阈值,判断所述第一甩动作事件与所述第二甩动作事件包括的甩动作持续时长的差值是否小于第四预设阈值,如果所述第一甩动作事件与所述第二甩动作事件包括的甩动作持续时长的差值小于第四预设阈值,确定所述移动终端和所述智能手表均在所述预设时长内发生同一动作事件。在确定所述移动终端和所述智能手表均在所述预设时长内发生同一动作事件的情况下,解除所述移动终端的被盗状态。Optionally, the processor is further configured to: detect whether the mobile terminal generates a first 甩 action event, and if the mobile terminal generates a first 甩 action event, detecting whether the smart watch specified by the mobile terminal generates a second 甩 action An event, if the second watch action event occurs in the smart watch, determining whether the first action action event and the second action action event include the same action direction, and if the action direction is the same, determining the first motion Whether the action event and the start time of the 甩 action included in the second 甩 action event are all within a preset duration, and determining whether the duration of the 包括 action included in the first 甩 action event and the second 甩 action event are both located Within the preset duration, if the first 甩 action event and the second 甩 action event include 甩 action start time are both within a preset time period, and the first 甩 action event and the second Determining the duration of the 甩 action included in the 甩 action event is within the preset duration, and determining the 包括 action included in the first 甩 action event and the second 甩 action event Whether the difference of the initial time is less than the third preset threshold, and if the difference between the first 甩 action event and the 起始 action start time included in the second 甩 action event is less than a third preset threshold, determining the first Whether the difference between the action event and the duration of the 甩 action included in the second 甩 action event is less than a fourth predetermined threshold, if the 甩 action included in the first 甩 action event and the second 甩 action event continues The difference between the durations is less than the fourth preset threshold, and it is determined that the mobile terminal and the smart watch both generate the same action event within the preset duration. And determining that the mobile terminal and the smart watch both cancel the stolen state of the mobile terminal if the same action event occurs within the preset duration.
本发明实施例还提供一种计算机可读存储介质,所述计算机可读存储介质存储了程序代码,所述程序代码包括的指令用于执行如下步骤:The embodiment of the invention further provides a computer readable storage medium, the program readable storage medium storing program code, the program code comprising instructions for performing the following steps:
判断移动终端当前是否处于被盗状态;若所述移动终端属于被盗状态,且所述移动终端检测到所述移动终端被非正常解锁时,检测当前登录的通信账号是否为所述移动终端历史登录过的通信账号;在当前登录的通信账号不为所述移动终端历史登录过的通信账号的情况下,在所述通信账号的社交网页中发布所述通信账号在用户偷盗的移动终端上登录的通知消息,以及向预先绑定的终 端设备发送所述通信账号的账号信息。Determining whether the mobile terminal is currently in a stolen state; if the mobile terminal belongs to a stolen state, and the mobile terminal detects that the mobile terminal is abnormally unlocked, detecting whether the currently registered communication account is the mobile terminal history The registered communication account; in the case that the currently registered communication account is not the communication account that the mobile terminal has logged in, the communication account is posted on the social page of the communication account and the mobile account is logged on the user's stolen mobile terminal. Notification message, and to the pre-bound end The end device sends the account information of the communication account.
可选的,所述程序代码包括的指令还用于执行如下步骤:在所述社交网页中对所述通知消息做特殊设置,所述特殊设置包括对所述通信账号本身不可见。Optionally, the program code includes instructions for performing a special step of: setting, in the social webpage, the notification message, the special setting comprising not being visible to the communication account itself.
可选的,所述程序代码包括的指令还用于执行如下步骤:在所述通信账号的通讯录中各通信联系人群发,所述通信账号在用户偷盗的移动终端上登录的通知消息,并删除所述群发的记录。Optionally, the program code includes instructions for performing the following steps: in the address book of the communication account, each communication contact group sends a notification message that the communication account is logged in on the mobile terminal that the user steals, and Delete the grouped records.
可选的,判断移动终端当前是否属于被盗状态包括:判断所述移动终端的位置信息是否属于所述移动终端预先存储的运动轨迹所对应的位置范围;若所述位置信息不属于所述位置范围,则确定所述移动终端处于被盗状态;Optionally, determining whether the mobile terminal is currently in the stolen state includes: determining whether the location information of the mobile terminal belongs to a location range corresponding to the motion track pre-stored by the mobile terminal; if the location information does not belong to the location a range, determining that the mobile terminal is in a stolen state;
所述程序代码包括的指令还用于执行如下步骤:The program code includes instructions for performing the following steps:
在所述移动终端处于被盗状态时,所述移动终端将所述移动终端上安装的预先指定需要保密的应用程序在界面上隐藏,且禁止所述预先指定需要保密的应用程序运行,并将所述位置信息发送给预先绑定的终端设备。When the mobile terminal is in a stolen state, the mobile terminal hides an application specified on the mobile terminal that needs to be kept secret from being hidden on the interface, and prohibits the pre-specified application that needs to be kept from running, and The location information is sent to a pre-bound terminal device.
可选的,所述程序代码包括的指令还用于执行如下步骤:将所述通信账号的通讯录中包括的通信信息与所述移动终端历史登录过的通信账号的通信录中的通信信息进行匹配,若匹配到相同的通信信息,则向该通信信息对应的通讯账号发送所述通信账号在所述移动终端上登录的通知消息,且该通知消息中还包括所述移动终端历史登录过的通信账号,以表示所述移动终端为所述移动终端历史登录过的通信账号的移动终端。Optionally, the program code includes instructions for performing the following steps: performing communication information included in an address book of the communication account with communication information in an address book of a communication account that has been historically registered by the mobile terminal. Matching, if the matching communication information is matched, sending a notification message that the communication account is logged in to the mobile terminal to the communication account corresponding to the communication information, and the notification message further includes the history of the mobile terminal being logged in. The communication account is a mobile terminal that indicates that the mobile terminal is a communication account that has been logged in by the mobile terminal history.
本发明实施例还提供了另一移动终端,如图8所示,为了便于说明,仅示出了与本发明实施例相关的部分,具体技术细节未揭示的,请参照本发明实施例方法部分。该移动终端可以为包括手机、平板电脑、PDA(Personal Digital Assistant,个人数字助理)、POS(Point of Sales,销售终端)、车载电脑等任意终端设备,以移动终端为手机为例:The embodiment of the present invention further provides another mobile terminal. As shown in FIG. 8 , for the convenience of description, only parts related to the embodiment of the present invention are shown. If the specific technical details are not disclosed, please refer to the method part of the embodiment of the present invention. . The mobile terminal can be any terminal device including a mobile phone, a tablet computer, a PDA (Personal Digital Assistant), a POS (Point of Sales), an in-vehicle computer, and the mobile terminal is used as a mobile phone as an example:
图8示出的是与本发明实施例提供的移动终端相关的手机的部分结构的框图。参考图8,手机包括:射频(Radio Frequency,RF)电路910、存储器920、输入单元930、传感器950、音频电路960、无线保真(Wireless Fidelity,WiFi)模块970、处理器980、以及电源990等部件。本领域技术人员可以理 解,图8中示出的手机结构并不构成对手机的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。FIG. 8 is a block diagram showing a partial structure of a mobile phone related to a mobile terminal provided by an embodiment of the present invention. Referring to FIG. 8, the mobile phone includes: a radio frequency (RF) circuit 910, a memory 920, an input unit 930, a sensor 950, an audio circuit 960, a Wireless Fidelity (WiFi) module 970, a processor 980, and a power supply 990. And other components. Those skilled in the art can understand Solution, the structure of the handset shown in FIG. 8 does not constitute a limitation to the handset, and may include more or fewer components than those illustrated, or some components may be combined, or different component arrangements.
下面结合图8对手机的各个构成部件进行具体的介绍:The following describes the components of the mobile phone in detail with reference to FIG. 8:
输入单元930可用于接收输入的数字或字符信息,以及产生与手机的用户设置以及功能控制有关的键信号输入。具体地,输入单元930可包括触控显示屏933、生物识别装置931以及其他输入设备932。生物识别装置931可为指纹识别装置,或者,人脸识别装置,或者,虹膜识别装置等等。输入单元930还可以包括其他输入设备932。具体地,其他输入设备932可以包括但不限于物理按键、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆等中的一种或多种。其中,所述处理器980用于获取待处理图像,所述待处理图像的目标区域用于添加水印图案;确定所述目标区域对应的第一图像的第一颜色信息;确定所述第一颜色信息与所述水印图案的第二颜色信息之间的颜色差的绝对值;在所述绝对值小于预设阈值时,对所述第一图像和/或所述水印图案进行颜色调整,且调整后的所述第二颜色信息与所述第一颜色信息之间的颜色差处于预设范围;将调整后的所述待处理图像和所述水印图案进行合成,得到输出图像。The input unit 930 can be configured to receive input numeric or character information and to generate key signal inputs related to user settings and function controls of the handset. Specifically, the input unit 930 can include a touch display screen 933, a biometric device 931, and other input devices 932. The biometric device 931 can be a fingerprint recognition device, or a face recognition device, or an iris recognition device or the like. The input unit 930 can also include other input devices 932. Specifically, other input devices 932 may include, but are not limited to, one or more of physical buttons, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and the like. The processor 980 is configured to acquire an image to be processed, the target area of the image to be processed is used to add a watermark pattern, determine first color information of the first image corresponding to the target area, and determine the first color. An absolute value of a color difference between the information and the second color information of the watermark pattern; when the absolute value is less than a preset threshold, performing color adjustment on the first image and/or the watermark pattern, and adjusting The color difference between the second color information and the first color information is in a preset range; and the adjusted image to be processed and the watermark pattern are combined to obtain an output image.
处理器980是手机的控制中心,利用各种接口和线路连接整个手机的各个部分,通过运行或执行存储在存储器920内的软件程序和/或模块,以及调用存储在存储器920内的数据,执行手机的各种功能和处理数据,从而对手机进行整体监控。可选的,处理器980可包括一个或多个处理单元;可选的,处理器980可集成处理器和调制解调处理器,其中,处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器980中。The processor 980 is the control center of the handset, which connects various portions of the entire handset using various interfaces and lines, by executing or executing software programs and/or modules stored in the memory 920, and invoking data stored in the memory 920, executing The phone's various functions and processing data, so that the overall monitoring of the phone. Optionally, the processor 980 may include one or more processing units; optionally, the processor 980 may integrate a processor and a modem processor, where the processor mainly processes an operating system, a user interface, an application, and the like. The modem processor primarily handles wireless communications. It will be appreciated that the above described modem processor may also not be integrated into the processor 980.
此外,存储器920可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。Moreover, memory 920 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
RF电路910可用于信息的接收和发送。通常,RF电路910包括但不限于天线、至少一个放大器、收发信机、耦合器、低噪声放大器(LowNoiseAmplifier,LNA)、双工器等。此外,RF电路910还可以通过无线通信与网络和其他设备通信。上述无线通信可以使用任一通信标准或协议,包括但不限于全球移动通讯系统(Global System of Mobile communication,GSM)、通用分组无线服务(General Packet Radio Service,GPRS)、码分多址(Code Division Multiple Access,CDMA)、宽带码分多址(Wideband Code Division Multiple Access, WCDMA)、长期演进(Long Term Evolution,LTE)、电子邮件、短消息服务(Short Messaging Service,SMS)等。The RF circuit 910 can be used for receiving and transmitting information. Generally, RF circuit 910 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, RF circuitry 910 can also communicate with the network and other devices via wireless communication. The above wireless communication may use any communication standard or protocol, including but not limited to Global System of Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (Code Division). Multiple Access, CDMA), Wideband Code Division Multiple Access (Wideband Code Division Multiple Access, WCDMA), Long Term Evolution (LTE), e-mail, Short Messaging Service (SMS), etc.
手机还可包括至少一种传感器950,比如光传感器、运动传感器以及其他传感器。具体地,光传感器可包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节触控显示屏的亮度,接近传感器可在手机移动到耳边时,关闭触控显示屏和/或背光。作为运动传感器的一种,加速计传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别手机姿态的应用(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等;至于手机还可配置的陀螺仪、气压计、湿度计、温度计、红外线传感器等其他传感器,在此不再赘述。The handset may also include at least one type of sensor 950, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor can adjust the brightness of the touch display screen according to the brightness of the ambient light, and the proximity sensor can turn off the touch display when the mobile phone moves to the ear. And / or backlight. As a kind of motion sensor, the accelerometer sensor can detect the magnitude of acceleration in all directions (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity. It can be used to identify the gesture of the mobile phone (such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping), etc.; as for the mobile phone can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.
其中,音频电路960、扬声器961,传声器962可提供用户与手机之间的音频接口。音频电路960可将接收到的音频数据转换后的电信号,传输到扬声器961,由扬声器961转换为声音信号播放;另一方面,传声器962将收集的声音信号转换为电信号,由音频电路960接收后转换为音频数据,再将音频数据播放处理器980处理后,经RF电路910以发送给比如另一手机,或者将音频数据播放至存储器920以便进一步处理。Among them, the audio circuit 960, the speaker 961, and the microphone 962 can provide an audio interface between the user and the mobile phone. The audio circuit 960 can transmit the converted electrical data of the received audio data to the speaker 961 for conversion to the sound signal by the speaker 961; on the other hand, the microphone 962 converts the collected sound signal into an electrical signal by the audio circuit 960. After receiving, it is converted into audio data, and then processed by the audio data playback processor 980, sent to the other mobile phone via the RF circuit 910, or played back to the memory 920 for further processing.
WiFi属于短距离无线传输技术,手机通过WiFi模块970可以帮助用户收发电子邮件、浏览网页和访问流式媒体等,它为用户提供了无线的宽带互联网访问。虽然图8示出了WiFi模块970,但是可以理解的是,其并不属于手机的必须构成,完全可以根据需要在不改变发明的本质的范围内而省略。WiFi is a short-range wireless transmission technology, and the mobile phone can help users to send and receive emails, browse web pages, and access streaming media through the WiFi module 970, which provides users with wireless broadband Internet access. Although FIG. 8 shows the WiFi module 970, it can be understood that it does not belong to the essential configuration of the mobile phone, and may be omitted as needed within the scope of not changing the essence of the invention.
手机还包括给各个部件供电的电源990(比如电池),可选的,电源可以通过电源管理系统与处理器980逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。The handset also includes a power supply 990 (such as a battery) that supplies power to the various components. Alternatively, the power supply can be logically coupled to the processor 980 via a power management system to manage charging, discharging, and power management functions through the power management system.
尽管未示出,手机还可以包括摄像头、蓝牙模块等,在此不再赘述。Although not shown, the mobile phone may further include a camera, a Bluetooth module, and the like, and details are not described herein again.
前述图1所示的实施例中,各步骤方法流程可以基于该手机的结构实现。In the foregoing embodiment shown in FIG. 1, each step method flow can be implemented based on the structure of the mobile phone.
前述图2~图6所示的实施例中,各单元功能可以基于该手机的结构实现。In the foregoing embodiments shown in FIGS. 2 to 6, each unit function can be implemented based on the structure of the mobile phone.
本发明实施例还提供一种计算机程序产品,所述计算机程序产品包括存储了计算机程序的非瞬时性计算机可读存储介质,所述计算机程序可操作来使移动终端执行如上述方法实施例中记载的任何一种方法的部分或全部步骤。Embodiments of the present invention also provide a computer program product comprising a non-transitory computer readable storage medium storing a computer program, the computer program being operative to cause a mobile terminal to perform the method as described in the above method embodiment Part or all of the steps of any one of the methods.
在本申请所提供的几个实施例中,应该理解到,所揭露方法和装置,可以 通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。In several embodiments provided by the present application, it should be understood that the disclosed method and apparatus may It is achieved in other ways. For example, the device embodiments described above are merely illustrative. For example, the division of the unit is only a logical function division. In actual implementation, there may be another division manner, for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed. In addition, the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
另外,在本发明各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理包括,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用硬件加软件功能单元的形式实现。In addition, each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may be physically included separately, or two or more units may be integrated into one unit. The above integrated unit can be implemented in the form of hardware or in the form of hardware plus software functional units.
上述以软件功能单元的形式实现的集成的单元,可以存储在一个计算机可读取存储介质中。上述软件功能单元存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本发明各个实施例所述收发方法的部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,简称ROM)、随机存取存储器(Random Access Memory,简称RAM)、磁碟或者光盘等各种可以存储程序代码的介质。The above-described integrated unit implemented in the form of a software functional unit can be stored in a computer readable storage medium. The above software functional unit is stored in a storage medium and includes a plurality of instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform part of the steps of the transceiving method of the various embodiments of the present invention. The foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like, and the program code can be stored. Medium.
以上所述是本发明的优选实施方式,应当指出,对于本技术领域的普通技术人员来说,在不脱离本发明所述原理的前提下,还可以作出若干改进和润饰,这些改进和润饰也应视为本发明的保护范围。 The above is a preferred embodiment of the present invention, and it should be noted that those skilled in the art can also make several improvements and retouchings without departing from the principles of the present invention. It should be considered as the scope of protection of the present invention.

Claims (10)

  1. 一种移动终端,其特征在于,包括:相互耦合的处理器和存储器;所述处理器用于执行如下步骤:判断移动终端当前是否处于被盗状态;若所述移动终端属于被盗状态,且检测到所述移动终端被非正常解锁时,检测当前登录的通信账号是否为所述移动终端历史登录过的通信账号;若当前登录的通信账号不为所述移动终端历史登录过的通信账号,则在所述通信账号的社交网页中发布所述通信账号在用户偷盗的移动终端上登录的通知消息,以及向预先绑定的终端设备发送所述通信账号的账号信息。A mobile terminal, comprising: a processor and a memory coupled to each other; the processor is configured to perform the following steps: determining whether the mobile terminal is currently in a stolen state; if the mobile terminal belongs to a stolen state, and detecting When the mobile terminal is abnormally unlocked, it is detected whether the currently registered communication account is a communication account that has been logged in by the mobile terminal history; if the currently registered communication account is not the communication account that the mobile terminal has logged in, And issuing, in the social webpage of the communication account, a notification message that the communication account is logged in on the mobile terminal that the user steals, and sending the account information of the communication account to the pre-bound terminal device.
  2. 如权利要求1所述的移动终端,其特征在于,所述处理器还用于,在所述社交网页中对所述通知消息做特殊设置,所述特殊设置包括对所述通信账号本身不可见。The mobile terminal according to claim 1, wherein the processor is further configured to: perform special setting on the notification message in the social webpage, where the special setting comprises not being visible to the communication account itself. .
  3. 如权利要求1或2所述的移动终端,其特征在于,A mobile terminal according to claim 1 or 2, characterized in that
    所述处理器还用于,在所述通信账号的通讯录中各通信联系人群发,所述通信账号在用户偷盗的移动终端上登录的通知消息,并删除所述群发的记录。The processor is further configured to: in the address book of the communication account, each communication contact group sends a notification message that the communication account is logged in on the mobile terminal that the user steals, and deletes the grouped record.
  4. 如权利要求3所述的移动终端,其特征在于,在判断移动终端当前是否处于被盗状态的方面,所述处理器具体用于,判断所述移动终端的位置信息是否属于所述移动终端预先存储的运动轨迹所对应的位置范围;若所述位置信息不属于所述位置范围,则确定所述移动终端处于被盗状态;The mobile terminal according to claim 3, wherein the processor is specifically configured to determine whether the location information of the mobile terminal belongs to the mobile terminal in advance, in determining whether the mobile terminal is currently in a stolen state. a location range corresponding to the stored motion track; if the location information does not belong to the location range, determining that the mobile terminal is in a stolen state;
    所述处理器还用于,在所述移动终端处于被盗状态时,将所述移动终端上安装的预先指定需要保密的应用程序在界面上隐藏,且禁止所述预先指定需要保密的应用程序运行,并将所述位置信息发送给预先绑定的终端设备。The processor is further configured to: when the mobile terminal is in a stolen state, hide an application specified on the mobile terminal that needs to be confidentially hidden on the interface, and prohibit the pre-designated application that needs to be kept secret Run and send the location information to the pre-bound terminal device.
  5. 如权利要求4所述的移动终端,其特征在于,所述处理器还用于,将所述通信账号的通讯录中包括的通信信息与所述移动终端历史登录过的通信账号的通信录中的通信信息进行匹配,若匹配到相同的通信信息,则向该通信信息对应的通讯账号发送所述通信账号在所述移动终端上登录的通知消息,且该通知消息中还包括所述移动终端历史登录过的通信账号,以表示所述移动终端为所述移动终端历史登录过的通信账号的移动终端。The mobile terminal according to claim 4, wherein the processor is further configured to: use the communication information included in the address book of the communication account and the communication record of the communication account whose history of the mobile terminal has been logged in The communication information is matched, and if the same communication information is matched, the notification message that the communication account is logged in to the mobile terminal is sent to the communication account corresponding to the communication information, and the notification message further includes the mobile terminal The historically registered communication account is a mobile terminal indicating that the mobile terminal is a communication account that has been logged in by the history of the mobile terminal.
  6. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存 储了程序代码,所述程序代码包括的指令用于执行如下步骤:A computer readable storage medium, wherein the computer readable storage medium is stored The program code is stored, and the program code includes instructions for performing the following steps:
    判断移动终端当前是否处于被盗状态;若所述移动终端属于被盗状态,且所述移动终端检测到所述移动终端被非正常解锁时,检测当前登录的通信账号是否为所述移动终端历史登录过的通信账号;在当前登录的通信账号不为所述移动终端历史登录过的通信账号的情况下,在所述通信账号的社交网页中发布所述通信账号在用户偷盗的移动终端上登录的通知消息,以及向预先绑定的终端设备发送所述通信账号的账号信息。Determining whether the mobile terminal is currently in a stolen state; if the mobile terminal belongs to a stolen state, and the mobile terminal detects that the mobile terminal is abnormally unlocked, detecting whether the currently registered communication account is the mobile terminal history The registered communication account; in the case that the currently registered communication account is not the communication account that the mobile terminal has logged in, the communication account is posted on the social page of the communication account and the mobile account is logged on the user's stolen mobile terminal. The notification message, and the account information of the communication account is sent to the pre-bound terminal device.
  7. 如权利要求6所述的计算机可读存储介质,其特征在于,所述程序代码包括的指令还用于执行如下步骤:在所述社交网页中对所述通知消息做特殊设置,所述特殊设置包括对所述通信账号本身不可见。The computer readable storage medium of claim 6, wherein the program code comprises instructions for performing the special step of: setting the notification message in the social web page, the special setting Including the communication account itself is not visible.
  8. 如权利要求6或7所述的计算机可读存储介质,其特征在于,所述程序代码包括的指令还用于执行如下步骤:在所述通信账号的通讯录中各通信联系人群发,所述通信账号在用户偷盗的移动终端上登录的通知消息,并删除所述群发的记录。The computer readable storage medium according to claim 6 or 7, wherein the program code comprises instructions for performing the step of: transmitting, in the address book of the communication account, each communication contact group, The notification message that the communication account is logged in on the mobile terminal stolen by the user, and deletes the record of the group transmission.
  9. 如权利要求8所述的计算机可读存储介质,其特征在于,判断移动终端当前是否属于被盗状态包括:判断所述移动终端的位置信息是否属于所述移动终端预先存储的运动轨迹所对应的位置范围;若所述位置信息不属于所述位置范围,则确定所述移动终端处于被盗状态;The computer readable storage medium according to claim 8, wherein determining whether the mobile terminal currently belongs to the stolen state comprises: determining whether the location information of the mobile terminal belongs to a motion track pre-stored by the mobile terminal a location range; if the location information does not belong to the location range, determining that the mobile terminal is in a stolen state;
    所述程序代码包括的指令还用于执行如下步骤:在所述移动终端处于被盗状态时,所述移动终端将所述移动终端上安装的预先指定需要保密的应用程序在界面上隐藏,且禁止所述预先指定需要保密的应用程序运行,并将所述位置信息发送给预先绑定的终端设备。The program code includes instructions for performing the following steps: when the mobile terminal is in a stolen state, the mobile terminal hides an application specified on the mobile terminal that needs to be kept secret from being hidden on the interface, and The pre-designated application that needs to be kept secret is prohibited from being run, and the location information is sent to the pre-bound terminal device.
  10. 如权利要求9所述的计算机可读存储介质,其特征在于,所述程序代码包括的指令还用于执行如下步骤:将所述通信账号的通讯录中包括的通信信息与所述移动终端历史登录过的通信账号的通信录中的通信信息进行匹配,若匹配到相同的通信信息,则向该通信信息对应的通讯账号发送所述通信账号在所述移动终端上登录的通知消息,且该通知消息中还包括所述移动终端历史登录过的通信账号,以表示所述移动终端为所述移动终端历史登录过的通信账号的移动终端。 The computer readable storage medium of claim 9, wherein the program code comprises instructions for performing the step of: communicating communication information included in an address book of the communication account with the history of the mobile terminal The communication information in the address book of the registered communication account is matched, and if the same communication information is matched, the notification message of the communication account registered on the mobile terminal is sent to the communication account corresponding to the communication information, and the notification message is sent to the mobile terminal. The notification message further includes a communication account that the mobile terminal has logged in to indicate that the mobile terminal is a mobile terminal of a communication account that has been logged in by the mobile terminal history.
PCT/CN2017/089434 2017-06-21 2017-06-21 Mobile terminal having communication account protection function and related product WO2018232650A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/089434 WO2018232650A1 (en) 2017-06-21 2017-06-21 Mobile terminal having communication account protection function and related product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/089434 WO2018232650A1 (en) 2017-06-21 2017-06-21 Mobile terminal having communication account protection function and related product

Publications (1)

Publication Number Publication Date
WO2018232650A1 true WO2018232650A1 (en) 2018-12-27

Family

ID=64735875

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/089434 WO2018232650A1 (en) 2017-06-21 2017-06-21 Mobile terminal having communication account protection function and related product

Country Status (1)

Country Link
WO (1) WO2018232650A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113362084A (en) * 2021-06-09 2021-09-07 广州智会云科技发展有限公司 Client data tracking method, device, equipment and computer readable storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103491236A (en) * 2012-06-13 2014-01-01 鸿富锦精密工业(深圳)有限公司 Electronic device with theft tracking function and theft tracking method
CN103581441A (en) * 2013-10-31 2014-02-12 中国电子科技集团公司第十五研究所 Mobile terminal tracking anti-theft system and method
CN103973876A (en) * 2013-02-05 2014-08-06 联想移动通信科技有限公司 Mobile terminal and tracking method for lost mobile terminal
US20150207917A1 (en) * 2012-12-14 2015-07-23 Beijing Netqin Technology Co., Ltd. Mobile terminal intelligent anti-theft method and mobile terminal
CN105915714A (en) * 2016-05-24 2016-08-31 北京小米移动软件有限公司 Method and device for prompting terminal loss
CN106161514A (en) * 2015-03-31 2016-11-23 小米科技有限责任公司 Information processing method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103491236A (en) * 2012-06-13 2014-01-01 鸿富锦精密工业(深圳)有限公司 Electronic device with theft tracking function and theft tracking method
US20150207917A1 (en) * 2012-12-14 2015-07-23 Beijing Netqin Technology Co., Ltd. Mobile terminal intelligent anti-theft method and mobile terminal
CN103973876A (en) * 2013-02-05 2014-08-06 联想移动通信科技有限公司 Mobile terminal and tracking method for lost mobile terminal
CN103581441A (en) * 2013-10-31 2014-02-12 中国电子科技集团公司第十五研究所 Mobile terminal tracking anti-theft system and method
CN106161514A (en) * 2015-03-31 2016-11-23 小米科技有限责任公司 Information processing method and device
CN105915714A (en) * 2016-05-24 2016-08-31 北京小米移动软件有限公司 Method and device for prompting terminal loss

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113362084A (en) * 2021-06-09 2021-09-07 广州智会云科技发展有限公司 Client data tracking method, device, equipment and computer readable storage medium

Similar Documents

Publication Publication Date Title
US11269981B2 (en) Information displaying method for terminal device and terminal device
US10657238B2 (en) Systems and methods for identifying unauthorized users of an electronic device
WO2016134630A1 (en) Method and device for recognizing malicious call
CN107346397B (en) Information processing method and related product
CN106506820B (en) Backup method and device for mobile terminal data
WO2019011109A1 (en) Permission control method and related product
CN107466041B (en) Method and device for identifying pseudo base station and mobile terminal
WO2019019837A1 (en) Biological identification method and related product
CN107743108B (en) Method and device for identifying medium access control address
US11775625B2 (en) Alert task processing method, terminal, and computer-readable storage medium
JP6974620B2 (en) Notification message processing method and terminal
WO2018161538A1 (en) Encryption key writing method and mobile terminal
WO2019041143A1 (en) Security control method for mobile terminal, terminal, and computer readable medium
WO2018232650A1 (en) Mobile terminal having communication account protection function and related product
US10321399B1 (en) Activating a function in response to sensor readings
WO2018232652A1 (en) Mobile terminal having high privacy level and related product
WO2019052287A1 (en) Facial information preview method and related product
CN113194198B (en) Message processing method and message processing device
CN107707736A (en) Mobile terminal and relevant device with stolen safeguard function
CN109409068B (en) Operation execution method and terminal
WO2018232647A1 (en) Electronic device having high privacy protection level and related product
CN107341391B (en) Information processing method and related product
CN107682527A (en) Mobile terminal and Related product with communications account safeguard function
WO2018232646A1 (en) Mobile terminal with adaptive playing capability and related product
WO2018232651A1 (en) Mobile terminal and related program product

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17914159

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 15.05.2020)

122 Ep: pct application non-entry in european phase

Ref document number: 17914159

Country of ref document: EP

Kind code of ref document: A1