CN101141721A - Safety mobile telephone based communication custom - Google Patents

Safety mobile telephone based communication custom Download PDF

Info

Publication number
CN101141721A
CN101141721A CN 200610127653 CN200610127653A CN101141721A CN 101141721 A CN101141721 A CN 101141721A CN 200610127653 CN200610127653 CN 200610127653 CN 200610127653 A CN200610127653 A CN 200610127653A CN 101141721 A CN101141721 A CN 101141721A
Authority
CN
China
Prior art keywords
phone
user
mobile phone
communication
habits
Prior art date
Application number
CN 200610127653
Other languages
Chinese (zh)
Other versions
CN101141721B (en
Inventor
刘卫民
Original Assignee
北京三星通信技术研究有限公司;三星电子株式会社
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京三星通信技术研究有限公司;三星电子株式会社 filed Critical 北京三星通信技术研究有限公司;三星电子株式会社
Priority to CN 200610127653 priority Critical patent/CN101141721B/en
Publication of CN101141721A publication Critical patent/CN101141721A/en
Application granted granted Critical
Publication of CN101141721B publication Critical patent/CN101141721B/en

Links

Abstract

The present invention discloses a method for a safe mobile phone based on the user communication habit. The method comprises steps that a user communication habit die plate is arranged in a mobile phone; the mobile phone compares whether the call records matches with the stored user communication habit die plate or not; if matches, the mobile phone can be normally operated; if not, the mobile phone sends a message that the mobile phone is stolen to a destination preassigned by the mobile phone. The present invention directly correlates with the operating habit of the owner of the mobile phone, and the operating habit is individual and can not be copied by the others, and can effectively determine whether the mobile phone is in the owner operating state or others operating state. After the user finishes the setting, once the mobile phone is stolen, as long as the mobile phone is continually operated, the mobile phone can start an anti-theft procedure, to help the loser to find out the mobile phone or to lock the mobile phone.

Description

基于通信习惯的安全手机技术领域本发明涉及通信系统,特别涉及一种基于用户通信习惯具有防盗功能的安全手机。 BACKGROUND Mobile communications security based diet of the present invention relates to communication systems, and more particularly to a mobile phone based on user security communication habits with anti-theft function. 背景技术近十几年来,移动通信在全球获得了迅猛的发展。 Background Over the last decade, mobile communications around the world has been rapid development. 目前全球移动电话用户已达到20亿。 The current global mobile phone users has reached 20 million. 其中仅中国一个国家就有移动电话用户4亿户,小灵通用户9千多万户。 Of which China alone will have 400 million mobile phone users, more than 9,000 million PHS users. 移动电话已成为很多人工作、生活上必不可少的工具,手机也成为人们的随身携带的物品。 Mobile phones have become a lot of people work, an indispensable tool life, the phone has become a people's belongings. 手机一方面在给人们的生活带来便利的同时,另一方面也因其体积小,使用频繁、价值较高而成为窃贼的做案目标。 On the one hand the phone to bring convenience to people's lives at the same time, on the other hand because of its small size, frequent, high value and become the crime target for thieves. 目前手机被盗已屡见不鲜,很多人都有手机被盗的经历,不仅造成了经济损失,同时,因丢失手机中所存储的有用信息一起丢失,给人们的生活带来不便。 At present mobile phone theft has been common, many people have cell phones stolen experience, not only caused economic losses, but, due to the loss of valuable information stored in the phone with the loss, inconvenience to people's lives. 目前有多种防止手机被盗的技术。 There are a variety of techniques to prevent mobile phone theft. 例如设置密码的办法,通过在手机上设置密码,开机时只有输入正确的密码才能继续使用手机,或者更换用户识别卡(如SIM卡、UIM卡等)时只有输入正确的密码才能正常使用; 增加附件设备的办法,给手机配备一个专用的附属设备, 一旦手机远离这个附属设备就会报警;借助移动网络的办法,例如移动运营商通过配置专用的设备识别寄存器(EIR)来追踪手机的行踪;将手机与某一用户识别卡绑定的方法,通过判断用户识别卡是否被更换来识别手机是否被窃的方法。 For example, only enter the correct password before setting way passwords, by setting a password on your phone boot only enter the correct password to continue using your phone, or replace the subscriber identity card (such as SIM cards, UIM cards, etc.) of normal use; increase approach accessory device to the mobile phone with a special accessory device, once the phone away from the accessory device will alarm; by way of a mobile network, such as a mobile phone operator to track the whereabouts of the special equipment configuration by the identification register (the EIR); method phone with a SIM card binding, by determining whether the user identification card to identify whether the method is to replace the stolen phone. 上述的防盗方法存在不同程度的问题。 Varying degrees of anti-theft method above-mentioned problems. 设置密码的方法可以使窃贼得到手机后因不知道密码而不能使用,但对于找回手机却没有帮助;增加附件设备的办法,需要用户随身携带手机防盗附件,既增加了用户成本, 又给用户带来了不便;借助移动网络的办法,需要运营商增加投资,安装专用的网络设备才能实现,目前大多数运营商并没有安装这种设备, The method can set a password so that the thieves get the phone because they do not know the password can not be used, but did not find the cell phone for help; a way to increase accessory device requires the user to carry the phone anti-theft accessories, not only increasing the cost of ownership, and gave users inconvenience; through means that mobile network operators need to increase investment, installing a dedicated network devices can be achieved, most carriers do not install this equipment,

因此大多数用户不能享用这种服务;通过将手机与某一用户识别卡绑定的方法,以是否更换用户识别卡作为判断手机被盜为条件,只适合于机卡分离的手机,对于机卡合一的手机无效(如在韩国为机卡合一手机, 中国也有几千万的小灵通是机卡合一的)。 Therefore, most users can not use such a service; phone by a method and a subscriber identification card is bound to replace the SIM card if the phone is stolen as a determination condition, only suitable for the card from the phone machine for the card in-one phone is invalid (as in South Korea for the unity of the phone card machine, China has tens of millions of PHS card machine is unity). 现在虽然有了一些手机防盗方案,但因其使用不方便或其他方面的缺陷并没有有效满足人们追回被盗手机的愿望,这些防盗方案也并没有被广泛使用。 Although there are now a number of mobile security solutions, but inconvenient to use because of its defects or otherwise does not meet the aspirations of the people effective recovery of stolen mobile phones, these anti-theft program is also not widely used. 发明内容本发明的目的是提供一种基于用户通信习惯的简单易用、准确有效的安全手机及实现方法。 Object of the present invention is to provide a communication based on user habits is easy to use, accurate and effective method to achieve security and mobile phones. 按照本发明的一方面, 一种实现基于用户通信习惯的安全手机的方法,包括步骤:在手机中设置用户通信习惯模板;手机比较用户通信对方电话号码和存储的用户通信习惯模板是否匹配;如果匹配,手机正常使用;如果不匹配,手机向手机上预先指定的目的地发送手机被盗的消息。 According to an aspect of the present invention, a method of communications based on user habits implemented security phone, comprising the steps of: setting the communication habits of the user template in the phone; Comparative whether the phone user and the communication partner telephone number stored in the communication habits of the user template matching; if match, the normal use of the mobile phone; If not, the phone is stolen phone to send a message to the destination previously designated phone. 按照本发明的另一方面, 一种基于用户通信习惯的安全手机,包括: 天线,用来接收和发送无线信号;无线模块,用于基带数字信号和射频模拟信号的转换、射频模拟信号的发送与接收等,无线模块与信号处理部件相连;信号处理部件,用于业务数据、信令的编码与解码,物理信道的扩频与解扩、调制与解调等。 According to another aspect of the present invention, a diet based on user communication security phone, comprising: an antenna for receiving and transmitting a wireless signal; a wireless module for converting the baseband digital signals and radio frequency analog signal and transmits the RF analog signals and reception, etc., a wireless module connected to the signal processing means; a signal processing means for data traffic, signaling encoding and decoding, spreading and despreading of physical channels, modulation and demodulation. 控制模块,用于控制各组件的整体操作;存储器,用于存储手机正常工作必需的数据以及用户的个人信息; 显示单元,在控制模块的控制下,显示各种消息、图标等; 键盘,用于输入信息; 扬声器,用于输出声音; 电源模块,为各模块提供电源。 A control module for controlling the overall operation of each component; a memory for storing data necessary for the work phone and the user's personal information is normal; display unit under the control of the control module, displays various messages and icons; keyboard, with to input information; a speaker for outputting sound; power supply module provides power to each module.

本发明将手机直接和机主本人的使用习惯相关联,而使用习惯是因人而异的,他人无法复制,可以有效判断手机是否处于在原机主使用状态或是他人使用状态。 The present invention directly to the phone and the owner's own habits associated with, and usage is personal, others can not be copied, can effectively determine whether the phone is in use in the original owner or others use. 当用户完成设置后, 一旦手机失窃,只要手机被继续使用,手机就会启动防盗程序,帮助失主找到手机或将手机锁死等。 When the user completes the setup, once the phone is stolen, as long as phones continue to be used, the phone will start the anti-theft program to help the owner find the phone or lock the phone and so on. 附图说明图l是本发明实施例的基于通信习惯的安全手机的结构框图; 图2是基于通信习惯的安全手机操作过程实施例1——机主手动设置常用联络号码表;图3是基于通信习惯的安全手机操作过程实施例2——机主手动设置常用联络号码表;图4是基于通信习惯的安全手机操作过程实施例3——手机自动设置常用联络号码表;图5是基于通信习惯的安全手机操作过程实施例4——使用号码簿作为用户通信习惯模板;图6是基于通信习惯的安全手机操作过程实施例5——每次通信后检具体实施方式本发明的主要目的是实现一种基于用户通信习惯的安全手机,特点是该手机可以根据用户的通信习惯是否发生改变,判断该手机是在原机主使用状态还是处于被盗状态。 BRIEF DESCRIPTION OF DRAWINGS Figure l is a block diagram of the safety phone based communication habits embodiment of the present invention; FIG. 2 is a diagram used to manually set the owner 1-- contact number table based on the process embodiment of secure communication mobile operating habits; FIG. 3 is based on Example 2 - manually set common owner contact number table during operation of mobile phone communications safety habits embodiment; FIG. 4 is a mobile phone based on the procedure of Example secure operation of the communication habits 3-- phone automatically set common contact number table; FIG. 5 is based on the communication process safety cell phone operator Example 4-- using a directory as a user accustomed to a communication template; FIG. 6 is a secure mobile phone based on the process operation of the communication habits embodiment, after each communication 5-- primary object of the subject embodiment of the present invention is based on the communication habits of the user to achieve security phone, the phone can be characterized according to whether the changed communication habits of the user, determines that the phone owner is in the original state or in a use of a stolen state. 如果该手机处于被盗状态,手机将会根据机主预先设置的被盗后处理方法进行处理。 If the phone is stolen state, the phone will be handled according to the stolen machine main processing method set in advance. 为了使主题更清楚,在以下的描述中,将省略已知功能和结构的详细描述。 For the subject matter more clearly in the following description, a detailed description will be omitted known functions and constructions. 图l表示出了基于通信习惯的安全手机的构成。 Figure l shows a constitution based communication habits safety of mobile phones. 安全手机所包括的部分及各部分应该完成的基本功能如下:天线101,用来接收和发送无线信号。 Safety phone basic function section included in each part should be completed as follows: an antenna 101 for receiving and transmitting wireless signals. 无线模块102,负责基带数字信号和射频模拟信号的转换、射频模拟信号的发送与接收等,无线模块与信号处理部件相连。 Wireless module 102 is responsible for converting the digital signal and the base band RF analog signals, the analog data transmission and reception of RF signals, the wireless module is connected to the signal processing section. 信号处理部件103,其功能包括业务数据、信令的编码与解码,物理信道的扩频与解扩、调制与解调等。 The signal processing section 103, which functions include traffic data, signaling encoding and decoding, spreading and despreading of physical channels, modulation and demodulation. 控制模块104,该模块控制各组件的整体操作,为手机中的应用层软件提供运行平台,承载应用软件模块,完成空中接口信令的发送、接收与处理,呼叫过程的控制等,以及对手机内各个相关模块进行控制,使之能够配合工作。 Control module 104, the module controls the overall operation of the components, to provide a platform for running phone application layer software, application software module carrier, the air interface signaling completion of sending, receiving and processing, call control process, and the phone each of the associated control module to enable it to work together. 本发明中,为实现防盗,控制模块还应实现以下功能:生成用户的通信习惯模板;跟踪用户的通信行为;对用户通信行为进行分析,判断用户的通信习惯是否发生了改变;如果用户的通信习惯发生了改变,即认定手机处于非授权用户使用状态,或者称被盗状态,按照预先设定的被盗后处理方法进行处理,如拨打特定的号码等。 The present invention, in order to achieve security, the control module should achieve the following functions: user generated communication habits template; tracking communication behavior of the user; user communication behavior analysis, determining whether the user's communication habits changed; if the user's communication habits have changed, that phone is identified unauthorized use, theft or said state, according to the processing method for processing a pre-set is stolen, such as dialing a specific number. 存储器105,手机中的数据存储模块,存储手机正常工作必需的数据以及用户的个人信息,如电话号码簿等。 Memory 105, data storage module of the mobile phone, work phone stores necessary data and the user's personal information, such as a telephone directory and the like. 本发明中,为实现防盗,存储器还应存储用户的通信习惯模板、用户通信行为的跟踪记录、被盗后处理方法以及其他防盗相关的设定,如跟踪周期、跟踪次数计数器等。 The present invention, in order to achieve security track record, the memory also stores a communication habits of the user template, the user's communication behavior, and other post-processing method theft security related settings, such as periodic tracking, track number counter and the like. 显示单元106,显示单元一般包括液晶显示器等,能够在控制模块的控制下,显示各种消息、图标等。 A display unit 106, the display unit typically includes a liquid crystal display or the like, can be controlled by the control module, displays various messages and icons. 本发明中,显示单元将控制模块发来的防盗提示信息显示给用户, 如提示用户进行防盗设置,或者在进入被盗状态后显示警告信息等。 In the present invention, the display unit of the control module to the alarm message sent to the user, such as prompting the user to set the alarm, displays a warning message or the like after entering a stolen state. 键盘107,用于输入信息,将用户输入的信息传送到控制模块,与显示单元以及扬声器、麦克风等共同完成用户与手机的界面功能。 A keyboard 107 for inputting information and transmitting the information input by the user to the control module, with the display unit and a speaker, a microphone and the like to complete a common user interface for the phone function. 扬声器108,用于输出声音,如提示音等。 A speaker 108 for outputting sound, such as a beep and the like. 本发明中,提示用户进行防盗设置,或者在进入被盗状态后输出警告信息等。 In the present invention, prompting the user to set security, or after entering a stolen state output warning information. 电源模块109,为各模块提供电源。 The power supply module 109 provides power to each module. 另外还应有麦克风等,图中未示出。 There should also be a microphone and the like, not shown in FIG. 在控制模块104的控制下,用户通过人机界面106、 107、 108输入用户通信习惯模板,或者手机自动建立用户通信习惯模板和被盗后处理方法,存储于存储器105中。 Under control of the control module 104, the user via the HMI 106, 107, 108 enter the communication habits of the user template, or the phone automatically establish communication habits templates and stolen processing method stored in the memory 105. 启动防盗功能后,控制模块104处于防盗功能开启状态。 After starting the anti-theft function, anti-theft function control module 104 is in the ON state. 在这种状态下,控制模块104跟踪用户的通话记录,并与存储 In this state, the tracking control module 104 records the user's call, and is stored

器105中存储的用户通信习惯模板相比较,如果其匹配程度达到预先设定的条件,则判定手机处于正常状态;否则认定用户的通信习惯发生了改变,即手机处于非授权用户使用状态,按照存储器105中存储的被盗后处理方法进行处理。 105 is stored in the communication habits of the user compared to templates, if the extent that it matches the predetermined condition, it is determined that the phone is in a normal state; otherwise identify the user's communication habits changed, i.e. the phone is in unauthorized use state, in accordance with post-processing method for processing stored in the memory 105 stolen. 为了便于跟踪,当用户删除通话记录后,在显示单元106上应显示为通信记录己删除,在存储器105中应继续保留通信记录直到控制模块104不再使用这些通信记录与用户通信习惯模板相比较为止。 For tracking purposes, when the user deletes the call records, on the display unit 106 displays the communication should have deleted record, the communication record should be retained in memory 105 until the control module 104 using the communication record is no longer communicating with the user habits compared to templates until. 用户通信习惯模板一般由用户常用的联络号码组成,号码个数可限定在一定的范围。 Usually the user communication habits templates used by the user's contact number composition, the number of numbers may be defined in a certain range. 常用的联络号码可以由用户手工输入,也可产生于手机中存储的号码簿。 The usual contact numbers can also be produced in numbers stored in the phone book manually by the user input. 通话记录与用户通信习惯模板的匹配程度主要是比较二者号码中号码是否相同,包括相同的号码个数、相同号码在通信记录中出现的频度等,如果达到特定值即可认为是匹配。 Call records matching degree with a user communication habits template mainly comparing the two numbers are the same in number, include the same number of numbers, the same number appears in the communication record degree frequency, if the reaches a certain value can be considered a match. 被盗后处理方法可以包含多种选项,比如:1) 向手机中预先设定的电话号码拨打电话并播放被盗提示信息;2) 向手机中预先设定的电话号码发送特定短消息;3) 向手机中预先设定的邮箱发送特定email;4) 将手机中存储的号码簿、短信、通话记录等信息发送给预先设定的电话号码、邮箱或上载到特定地址等;5) 向手机中预先存储的特定电话、邮箱等通信对端报告手机的当前位置信息;6) 立即删除手机中存储的号码簿、短信、通话记录等私人信息;7) 手机进入远程受控的状态,此时手机将根据接收到的特定通信端点发来的指令进行操作;8) 立即将手机中存储的资料隐形,隐形后使用者只能通过输入特定密码后才能看到;9) 提醒话机当前使用者将话机归还给原主;10) 使手机不能正常使用,如不能拨号、不能正常接听、锁死 Stolen processing method may comprise a variety of options, such as: 1) pre-set to the phone number of the phone call and message player stolen; 2) send specific messages to the mobile phone telephone number set in advance; 3 ) sent to a mailbox phone predetermined specific email; 4) transmits the stored phone number directory, SMS, call records and other information to a predetermined telephone number, email or uploaded to a specific address; 5) to the phone in particular pre-stored telephone, mail and other communications to end the current location information reporting phone; 6) immediately delete the personal information stored in the phone directory, SMS, call records; 7) phone into a remote-controlled state at this time the phone operates in accordance with instructions received specific communication endpoint sent; 8) immediately invisible information stored in the phone, the user can only be seen by invisible after entering a specific code; 9) to remind the user of the current telephone returned to the original main phone; 10) that the phone can not be used normally, if not dial, can not answer correctly, lock

手机等。 Mobile phones. 上述处理方法可以只执行其中的一种,也可以两种或多种方法组合执行。 The above-described processing method may perform only one of them, two or more methods may be performed in combination. 上述操作可以在当前用户能够察觉的情况下执行,也可以在当前用户不能察觉的情况下进行执行。 The above-described operation may be performed in a case where the current user is able to detect, it can also be performed in a case where the current user imperceptible. 上述选项7)可以进一步解释如下:手机进入远程受控状态后,手机可以接收机主通过其他通信端发来的远程指令并按照指令进行操作。 7 above options) may be further explained as follows: After the remote phone into a controlled state, the receiver may be a mobile phone by the master communication terminal sent by the other remote control command and follow the instructions. 手机识别控制指令的方式有两种: 一是通过解析远程通信端的标识号进行识别。 Mobile phone identifies the control command in two ways: one is identified by parsing the remote communication terminal identification number. 手机上预先存储特定的标识号,如特定号码的移动电话或固定电话、特定IP地址的设备、特定的电子邮箱、特定的服务标识号等。 Phone numbers previously stored specific identification, such as a specific number of a mobile phone or fixed telephone, device-specific IP address, the specific e-mail, the particular service identification number and the like. 手机确认被盗以后,当收到这些特定的标识号发来的信息后既认定为远程指令信息。 After confirming the phone is stolen, when after receiving information on these specific identification number sent by both identified as remote instruction information. 远程通信端发来的指令信息可以是特定格式的邮件、字符串、 声音等。 The remote communication terminal sent from the instruction information may be a specific message format, strings, sound, etc. 远程指令信息的含义需要提前约定保证手机能够正确识别;二是通过解析接收到的短信内容进行识别。 Meaning remote instruction agreed in advance to ensure that information required to correctly identify the phone; the second is identified by parsing the content of messages received. 如果发现短信具有特定的格式, 如短信开头加"##***"标识,即认为是远程控制短信。 If you find that text messaging has a specific format, such as the beginning of the message plus "## ***" logo, that is considered to be a remote control message. 指令短信按照预先约定的格式编写,代表特定的含义。 SMS command in accordance with pre-agreed format written on behalf of a specific meaning. 如用"00"代表删除手机上的信息,"11"代表锁死手机等。 Such as deleting information on the phone with "00", "11" represents the locked mobile phones. 当前手机解析短信,根据解析出的操作指令进行操作。 Current phone text messages parsing, operate according to the parsed operating instructions. 手机接收到远程通信端发来的指令后进行的操作可以是回传手机上存储的信息、删除手机上的信息、播放特定声音、锁死手机等。 Operation performed after the mobile phone receives an instruction sent from the remote communication terminal feedback information may be stored on the phone, delete the information on the phone, play a specific sound, like a mobile phone lock. 在对手机进行启动或关闭防盗功能及与其相关的操作时需要检验用户的密码,只有密码匹配才能允许用户进行上述操作。 When the phone to activate or deactivate anti-theft feature and its related operations need to verify the user's password, the password only to allow the user to match the above operations. 初始密码可在用户购买手机时获得或首次设置时由用户设置,用户可以对密码进行修改, 在本专利中,掌握该密码的用户即为授权用户,不掌握该密码的用户即为非授权用户。 The initial password is available when you buy your phone for the first time or when the settings set by the user, the user can modify the password, in this patent, the master user is the authorized user's password, do not have the user password is the non-authorized users . 图2表示出了防盗手机工作过程的实施例1。 Figure 2 shows an embodiment of a security phone during operation. 在该实施例中,用户通信习惯模板是由机主输入的常用联络号码表构成的。 In this embodiment, the communication habits of the user by the owner is input template common contact number table configuration. 各操作步骤如下: 201机主设置常用联络号码表、跟踪期限以及被盗后处理方法。 Each procedure is as follows: 201 owner to set common contact number table, tracking stolen and treatment duration. 手机将常用联络号码表设置为用户通信习惯模板,启动防盗模式。 The phone number used to contact the user table set to communication habits template, start anti-theft mode. 因为用户的通信习惯是通过大量的通信行为体现出来的, 仅通过对用户通信行为的很少次数的跟踪,并不能判定用户 Because the user's communications habits are reflected by the large number of communication behavior, communicating only by tracking user behavior rarely times, and can not determine the user

的通信习惯是否发生了改变。 Whether the communication habits change. 需要跟踪用户一定次数的通信行为,才能发现用户的通信习惯。 Communications need to track the behavior of a certain number of users, in order to discover the user's communication habits. 这里跟踪期限指的就是所需要跟踪的次数,跟踪期限是由用户根据自己的通信习惯设定的。 Here tracking period refers to the number of times you need to track, trace deadline by the user according to their own set of communication habits. 跟踪期限也可以理解为手机所能允许的通信对方号码不在用户通信习惯模板中的上限。 Tracking period may also be understood as a mobile phone can allow communication partner number is not used to limit user communication templates. 如果超出这个上限,即认为手机处于非授权用户使用状态。 If you exceed this limit, that is, the phone is considered unauthorized use. 例如用户甲跟家人联系频繁,每十次通话或收发短信中必然会至少有一次联络对方是甲的家人的,则甲可以将家人的号码作为常用联络号码表, 设定十次为跟踪期限。 For example, A can be used as the number of family members contact numbers Table A user contact with the family frequently, every ten calls or send and receive text messages bound to each other at least once contact is methyl family, set ten times as tracking period. 这样用户甲的手机一旦被盗,只要该手机被使用十次以上,手机就会转入非授权用户使用状态, 向手机上预先指定的目的地发送手机被盗的消息。 Once such a user A's phone has been stolen, as long as the phone is used more than ten times, the phone will turn unauthorized user usage state, sending a message to the phone is stolen phone destinations designated in advance. 再例如用户乙的通信对象比较分散,没有联系特别频繁的通信对象, 则用户乙可以在常用联络号码表中设定多个电话号码,跟踪期限也设置长一些,例如设为五十次。 As another example communication target user B's scattered, unrelated particularly frequent communication object, the user B can set a favorite contact number list multiple phone numbers, set the tracking period is longer, for example, is set to fifty times. 这样,只要用户乙的五十次对外联络中出现常用联络号码表中设定的电话号码, 就认定手机处于授权用户使用状态。 In this way, as long as the phone number commonly used contact numbers set in the table appear fifty times the user B's external relations, we find that the phone is in the state of authorized users. 跟踪期限也可以由手机厂商预置在手机上,由于不同用户的通信习惯差异很大,需要根据对大量用户习惯进行调査,跟踪期限的值可设置大--点,以减少误判的可能性。 Tracking period can be preset by the mobile phone manufacturers in the mobile phone, due to the large difference in communication habits of different users, based on the need for large numbers of users accustomed to investigate the value of tracking time limit can be set large - points to reduce the possibility of false positives sex. 202手机进入防盗模式,将计数器K置为O,用于计算跟踪周期; 203当用户进行一次语音通话或收发短消息时,K增加l; 204检查K是否已达到设定的跟踪期限,如果未达到转到步骤203; 205如果己达到设定的跟踪期限,控制器比较通信记录中的对方号码和存储器中存储的用户通信习惯模板是否匹配。 202 phone into theft mode, set the counter K is O, tracking period for calculating; 203 when the user performs a voice call or a short message when received, increasing L K; K 204 checks whether the tracking has reached the set period, if not reached proceeds to step 203; 205 if the track has reached the set period, the communication habits of the user communication controller compares the template record and the destination number stored in the memory matches. 如果匹配转到步骤202;206如果不匹配则按照手机中预先设置的被盗后处理方法启动后续操作。 If the match proceeds to step 202; 206 if no match is initiated subsequent follow stolen phone processing method set in advance. 步骤201中跟踪期限是基于通信次数设定,也可根据时间设定,即计数器K达到一定时间后本次跟踪周期结束。 Step 201 is a tracking period is set based on the number of communications, may be set according to the time, i.e. the end of this period the track counter K reaches a predetermined time. 跟踪期限也可由厂家在手机中缺省设定。 Tracking period may also be the factory default settings in your phone. 机主设置常用联络号码表的方法可以是输入号码或在已有的 Owner contact number table set common method may be the input or the existing number

通信簿中选择。 Selecting a communication book. 在图2所示的实施例中,只要通话记录有一次与用户通信习惯模板不匹配,就会启动被盗后处理程序。 In the embodiment illustrated in Figure 2, as long as there is a call record does not match the template user communication habits, starts stolen handler. 图3所示的实施例2对实施例1进行了一些修改,在该实施例中,当某次不匹配时,会进一步检查最近的通信号码是否在电话号码簿中,如果在,并不立即启动被盗后处理程序,只有当这两个判断条件都不满足时或连续J (J的值提前设定在手机中)次不匹配时,才会启动被盗后处理程序。 FIG embodiment shown in Figure 2 Example 3 Example 1 with some modifications, in this embodiment, when a particular mismatch, further checks whether the latest communication number in the telephone directory, if not immediately when you start stolen handler only when two conditions are not met or continuous J (J value is set in advance in the phone) does not match the times, will start the stolen handler. 各操作步骤如下:301机主设置常用联络号码表、跟踪期限以及被盗后处理方法,手机将常用联络号码表设置为用户通信习惯模板,启动防盗模式;302手机进入防盗模式,将计数器K置为0,用于计算跟踪周期; 303当用户进行一次语音通话或收发短消息时,K增加l; 304检査K是否已达到设定的跟踪期限;305如果已达到设定的跟踪期限,控制器比较通信记录中的对方号码和存储器中存储的用户通信习惯模板是否匹配。 Each procedure is as follows: 301 owner to set common contact number table, tracking stolen and treatment period, the phone contact number table used to set the communication habits of the user template, immobilizer mode; anti-theft mode phone 302, the counter K is set 0, for calculating a tracking cycle; 303 once when the user performs a voice call or short message received, increasing L K; K 304 checks whether the tracking has reached set period; trace 305 has been reached if the set period, whether the user communication habits template controller compares the communication records and other numbers stored in the memory of the match. 如果匹配转到步骤302;306 如不匹配则计数器J增加1 (J的初值为0) , J用来记录不匹配次数;307判断是否已达到最大允许不匹配次数,如果是,则转到步骤309;308 检査最近n次的通信号码是否在电话号码簿中,如果是,转到步骤302;否则转到步骤309;309 按照机主设置的被盗后处理方法操作。 If the match proceeds to step 302; if not match, the counter 306 increases. 1 J (J is the initial value is 0), J is used to record the number of mismatches; 307 determines whether or not has reached the maximum number of matches allowed, if yes, go to step 309; 308 check latest number is n times of the communication in the telephone directory, and if so, go to step 302; otherwise, go to step 309; 309 follow the processing method set owner stolen. 图4表示出了防盗手机工作过程的实施例3。 Figure 4 shows an embodiment of a security phone 3 during operation. 在该实施例中,用户通信习惯模板是由手机自动设置的。 In this embodiment, the communication habits of the user templates are automatically set by the mobile phone. 各操作步骤如下:401手机跟踪用户的通话行为,提取出特定时间段内或特定通信次数中联络最频繁的号码设置为用户通信习惯模板; 402启动防盗模式;403手机进入防盗模式,将计数器K置为0,用于计算跟踪周期; 404当用户进行一次语音通话或收发短消息时,K增加l;405检查K是否已达到设定的跟踪期限,如果未达到转向步骤404; 406如果已达到设定的跟踪期限,控制器比较通信记录中的对方号码和存储器中存储的用户通信习惯模板是否匹配。 Each procedure is as follows: 401 phone calls to track user behavior, the number of the extracted specific period of time or a particular communications contact numbers most frequently customary to user communication template; 402 immobilizer mode; anti-theft mode phone 403, the counter K is set to 0, for calculating a tracking cycle; 404 when the user performs a voice call or receive and send messages, increase K L; 405 checks whether K has reached the set tracking period, if not reached to step 404; if 406 the track reaches the set deadline, user communication habits template controller compares the communication records and other numbers stored in the memory matches. 如果匹配转到步骤402,否则转到步骤407; 407按照预先设置的被盗后处理方法操作。 If the match proceeds to step 402, otherwise, go to Step 407; 407 stolen follow the processing method set in advance. 上述步骤中,步骤401和步骤402可以颠倒次序。 The above steps, steps 401 and 402 may be reversed order. 手机可以继续跟踪用户的通话记录,提取出联络最多的号码,当这些号码与已存储的用户通信习惯模板有明显差异时,可以使用新提取的号码更新户通信习惯模板。 Phone can keep track of the user's call log, extracted the most contact numbers, these numbers when communicating with users accustomed to the stored template there are significant differences, can be used to update the user number used to communicate the new template extraction. 为增加安全性,对户通信习惯模板执行更新操作时可检验用户密码。 Is added security, update operations to the user communication templates can be used to verify the user's password. 图5表示出了防盗手机工作过程的实施例4。 Figure 5 shows an embodiment 4 of the working process phone theft. 在该实施例中,使用号码簿作为用户通信习惯模板。 In this embodiment, the address book as the communication habits of the user template. 各操作步骤如下: 501机主设置被盗后处理方法,启动防盗模式; 502手机将当前的电话号码簿设置为用户通信习惯模板; 503手机进入防盗模式,将计数器K置为O,用于计算跟踪周期; 504当用户每接收一次语音通话或短消息时,K增加l。 Each procedure is as follows: 501 main unit arranged stolen processing method immobilizer mode; phone 502 telephone directory is set to the current communication habits of the user template; anti-theft mode phone 503, the set counter K is O, it is used to calculate trace period; when a 504 when a user receives a voice call or a short message for each, K increase in l. 505检查K是否已达到设定的跟踪期限。 505 checks whether K has reached the track set deadline. 如果未达到转向步骤504; 506如果已达到设定的跟踪期限,控制器比较通信记录中的对方号码和存储器中存储的用户通信习惯模板是否匹配。 If not reached to step 504; 506 if the track has reached the set period, the communication habits of the user communication controller compares the template record and the destination number stored in the memory matches. 如果匹配转到步骤503;否则转到步骤507; 507按照预先设置的被盗后处理方法操作。 If a match go to step 503; otherwise, go to Step 507; 507 stolen follow the processing method set in advance. 用户可以使用当前的电话号码簿更新用户通信习惯模板。 Users can use the current telephone directory update user communication habits template. 为增加安全性,对用户通信习惯模板执行更新操作时可检验用户密码。 For added security, the implementation of user communication templates can be used to verify the user's password update operation. 上述实施例是在通信次数达到跟踪期限后,才比较通信记录中的对方号码和存储器中存储的用户通信习惯模板是否匹配。 After the above-described embodiment, the communication frequency is reached tracking period, before comparing whether the user communications in the communication record diet template and the destination number stored in the memory match. 也可以是每次通信结束后立即进行检査。 It can also be checked after each communication immediately. 图6表示出了每次通信结束后进行检查的防盗手机工作过程的实施例5。 Figure 6 shows an embodiment of a mobile phone theft 5 working process after the inspection of each communication. 各操作步骤如下:601设置常用联络号码表以及被盗后处理方法,启动防盗模式。 Each procedure is as follows: set common contact 601 and a processing method table number stolen, theft mode starts. 手机将常用联络号码表设为用户通信习惯模板; 602计数器K置为O;;603当用户进行一次语音通话或收发短消息时,将对方号码与用户通信习惯模板比较; 604如果对方号码在用户通信习惯模板中,则转向步骤602; 605否则计数器K增加1;606如果计数器K尚未达到最大允许不匹配次数,则转向步骤603。 The phone number used to contact the user table set communication habits template; 602 counter K is set to O ;; 603 when the user performs a voice call or receive and send messages, the other numbers compare with the user communication habits template; if the other 604 numbers user communication habits template, then go to step 602; otherwise, the counter 605 is incremented by 1 K; K if the counter 606 has not reached the maximum allowable number of times do not match, then go to step 603. 最大允许不匹配次数由手机厂家提前预置在手机中或由用户在步骤601中设定;607否则按照手机中预先设置的被盗后处理方式操作。 The maximum number of mismatches allowed by the mobile phone manufacturers preset in advance in the phone or set by the user in step 601; otherwise, 607 stolen phone according to a preset processing mode operation. 实施例2中所述的对实施例1的修改方式同样适用于其他实施例。 Example 2 In the modified embodiment of the embodiment 1 is also applicable to other embodiments. 为提高安全性,上述其他实施例都可以象实施例4一样,可仅检查来电记录,即无论去电中是否包含用户通信习惯模板中的电话号码,只要在一定时期内来电(包括电话和短信)中没有出现用户通信习惯模板中的电话号码,即认为手机处于非授权用户使用状态。 For added security, the above-described other embodiments can be the same as the embodiment 4, an incoming call can only check the recorded cases, i.e., whether an outgoing communication contains user habits template telephone number, an incoming call as long as a period of time (including telephone and SMS user communication habits template phone number) does not appear that the phone is considered unauthorized use. 这样,即便其他人能够破解出用户通信习惯模板中的内容,但因为无法模拟来电,防盗程序同样会发挥作用。 In this way, even if others can break out the contents of the user communication habits template, but because they can not simulate incoming calls, security program will also play a role. 尽管为示例目的,已经公开了本发明的优选实施例,本领域的技术人员将意识到在不背离如在所附权利要求书中公开的本发明的范围和精神的情况下,各种改进、增加和取代也是可能的。 While, for illustrative purposes, have been disclosed preferred embodiments of the present invention, those skilled in the art will recognize that in the case without departing from the scope and spirit of the appended claims as disclosed in the present invention, various modifications, additions and replacements are also possible. 因此,本发明的范围应当不限于上述实施例,而是根据所附权利要求书及其等效限定。 Accordingly, the scope of the invention should not be limited to the above embodiments, but by the appended claims and their equivalents define.

Claims (15)

1.一种实现基于用户通信习惯的安全手机的方法,包括步骤: 在手机中设置用户通信习惯模板; 手机比较用户通信对方号码和存储的用户通信习惯模板是否匹配; 如果匹配,手机正常使用; 如果不匹配,手机向手机上预先指定的目的地发送手机被盗的消息。 1. A method of communication based on the user's mobile phone habits to achieve security, including the steps of: providing user communication habits template in the phone; if the user communication templates used to compare mobile phone users communicate and store other numbers match; if matched, normal cell phone use; If not, the phone is stolen phone to send messages to mobile phone pre-specified destination.
2. 按权利要求l所述的方法,其特征在于所述用户通信习惯模板包括常用联络号码表。 2. The method as recited in claim l, wherein said template comprises user habits communication contact numbers common table.
3. 按权利要求l所述的方法,其特征在于所述用户通信习惯模板包括来自于手机跟踪用户的通话行为,提取出的联络最频繁的号码。 3. The method as recited in claim l, wherein said template comprises user communications from the mobile phone habits track user behavior calls, extracted most frequent contact numbers.
4. 按权利要求l所述的方法,其特征在于所述用户通信习惯模板包括当前的电话号码簿。 4. The method as recited in claim l, wherein said template comprises user communication habits of the current telephone directory.
5. 按权利要求l所述的方法,其特征在于所述用户通信习惯模板由机主设置或手机自动设置。 The method as recited in claim l, wherein said user communication habits template set or automatically set by the phone owner.
6. 按权利要求l所述的方法,其特征在于可预先设置不匹配上限,由手机比较用户通信记录和存储的用户通信习惯模板是否匹配,如果不匹配的次数达到预先设定的上限,手机向手机上预先指定的目的地发送手机被盗的消息。 6. The method as recited in claim l, characterized in that the upper limit may be set in advance do not match, the comparison matches by the handset user and the communication record stored in the communication habits of the user template, if the number of mismatches reaches the upper limit set in advance, the phone send a message to the cell phone stolen cell phone pre-specified destination.
7. 按权利要求l所述的方法,其特征在于所述手机向手机上预先指定的目的地发送手机被盗的消息包括如下消息之一:向手机中预先设定的电话号码拨打电话并播放被盗提示信息;向手机中预先设定的电话号码发送特定短消息;向手机中预先设定的邮箱发送特定email;将手机中存储的号码簿、短信、通话记录等信息发送给预先设定的电话号码、邮箱或上载到特定地址等;向手机中预先存储的特定电话、邮箱等通信对端报告手机的当前位置信息。 7. The method as recited in claim l, wherein said mobile phone to the phone handset sending destinations designated in advance stolen message comprises one of the following messages: a mobile phone call to the telephone number set in advance and play stolen message; send a specific message to your phone preset phone number; phone to a preset email send a specific email; send stored in the phone directory, text messages, phone records and other information to the pre-set telephone number, email or uploaded to a specific address; phone calls to specific pre-stored in the mailbox peer to peer communications handset reports the current position information.
8. 按权利要求l所述的方法,其特征在于还包括手机根据机主的发出的远程指令进行如下之一的动作: 立即删除手机中存储的号码簿、短信、通话记录等私人信息; 立即将手机中存储的资料隐形,隐形后使用者只能通过输入特定密码后才能看到;提醒话机当前使用者将话机归还给原主; 使手机不能不能拨号、不能正常接听、锁死手机等。 8. The method as recited in claim l, characterized by further comprising an operation of one of the following mobile phone according to the remote owner's instruction issued: delete private information stored in the phone directory, SMS, call records immediately; immediately the hidden information stored in the phone, the user can only be seen by stealth after entering a specific password; remind current phone users will return the phone to the original owners; can not dial the phone can not, can not answer properly, lock phones.
9. 按权利要求7所述的方法,其特征在于所述手机向机主的其它通信设备发送手机被盗的消息时的状态包括:在当前用户可以察觉的情况下进行操作或在当前用户不能察觉的情况下进行操作。 9. The method as claimed in claim 7, wherein when the state of the mobile phone owner's phone is stolen other communication device transmits a message comprising: operating in the current user-visible or not the current user a case where the operation to detect.
10. —种基于用户通信习惯的安全手机,包括: 天线,用来接收和发送无线信号;无线模块,用于基带数字信号和射频模拟信号的转换、射频模拟信号的发送与接收等,无线模块与信号处理部件相连;信号处理部件,用于业务数据、信令的编码与解码,物理信道的扩频与解扩、调制与解调等;控制模块,用于控制各组件的整体操作;存储器,用于存储手机正常工作必需的数据以及用户的个人信息; 显示单元,在控制模块的控制下,显示各种消息、图标等; 键盘,用于输入信息; 扬声器,用于输出声音; 电源模块,为各模块提供电源。 10. - kind of security based on user habits phone communications, comprising: an antenna for receiving and transmitting a wireless signal; a wireless module converts the baseband digital signals and radio frequency analog signal, transmitting and receiving radio frequency signals for the analog and the like, the wireless module connected to the signal processing section; the signal processing means, for traffic data, signaling, coding and decoding, the physical channel spreading and despreading, modulation and demodulation and the like; a control module for controlling the overall operation of each component; a memory for storing data necessary work phone and the user's personal information is normal; display unit under the control of the control module, displays various messages, icons, and the like; a keyboard, for inputting information; a speaker for outputting sound; power module to provide power to each module.
11. 按权利要求10所述的手机,其特征在于所述控制模块能够生成用户的通信习惯模板。 11. The handset according to claim 10, wherein said control module is capable of generating user communication habits template.
12. 按权利要求10所述的手机,其特征在于所述控制模块能够跟踪用户的通信行为。 12. The handset according to claim 10, wherein said control module is capable of tracking a user's communication behavior.
13. 按权利要求10所述的手机,其特征在于所述控制模块能够对用户通信行为进行分析,判断用户的通信习惯是否发生了改变。 13. The handset according to claim 10, wherein said control module to analyze the behavior of the user communication, the user determines whether communication has changed habits.
14. 按权利要求13所述的手机,其特征在于如果用户的通信习惯发生了改变,所述控制模块能够则按照预先设定的被盗后处理方法进行处理。 14. The mobile phone as claimed in claim 13, wherein if the user's communication habits changed, the control module can be treated according to the processing method after a predetermined stolen.
15.按权利要求10所述的手机,其特征在于所述存储器还应存储用户的通信习惯模板、用户通信行为的跟踪记录、被盗后处理方法以及其他防盗相关的设定,如跟踪周期、计数器等。 15. The handset according to claim 10, wherein said memory also stores the communication habits of the user templates, user communication behavior track record, stolen security processing method, and other relevant settings, such as a tracking period, counters.
CN 200610127653 2006-09-05 2006-09-05 Safety mobile telephone based communication custom CN101141721B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200610127653 CN101141721B (en) 2006-09-05 2006-09-05 Safety mobile telephone based communication custom

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200610127653 CN101141721B (en) 2006-09-05 2006-09-05 Safety mobile telephone based communication custom

Publications (2)

Publication Number Publication Date
CN101141721A true CN101141721A (en) 2008-03-12
CN101141721B CN101141721B (en) 2012-08-29

Family

ID=39193409

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200610127653 CN101141721B (en) 2006-09-05 2006-09-05 Safety mobile telephone based communication custom

Country Status (1)

Country Link
CN (1) CN101141721B (en)

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101621393A (en) * 2008-07-01 2010-01-06 阿瓦亚公司 Determining a preferable mode of communicating with a called party
CN102104679A (en) * 2010-12-09 2011-06-22 中兴通讯股份有限公司 Method and device for preventing mobile terminal from being used by invalid user
CN102647508A (en) * 2011-12-15 2012-08-22 中兴通讯股份有限公司 Mobile terminal and user identity identification method
CN102929807A (en) * 2012-11-19 2013-02-13 周万荣 Method for initiatively performing loss judgment and data processing and mobile terminal
CN103037310A (en) * 2012-12-14 2013-04-10 北京网秦天下科技有限公司 Mobile terminal intelligent anti-theft method and mobile terminal
CN103077356A (en) * 2013-01-11 2013-05-01 中国地质大学(武汉) Protecting and tracking method for primary information of mobile terminal based on user behavior pattern
CN103188230A (en) * 2011-12-29 2013-07-03 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and data protection method thereof
CN103220646A (en) * 2013-04-24 2013-07-24 广东欧珀移动通信有限公司 Method and system for finding mobile terminal device based on short message
CN103269399A (en) * 2013-05-07 2013-08-28 深圳市中兴移动通信有限公司 Processing method for movable terminal information and movable terminal
CN103957322A (en) * 2014-05-05 2014-07-30 深圳市中兴移动通信有限公司 Mobile terminal and antitheft method thereof
CN104021358A (en) * 2014-05-30 2014-09-03 可牛网络技术(北京)有限公司 Anti-theft control method and device for mobile terminal
CN104486646A (en) * 2014-11-28 2015-04-01 四川长虹电器股份有限公司 Television with tracking anti-theft function, cloud service platform and method
CN104751070A (en) * 2015-03-12 2015-07-01 小米科技有限责任公司 Method and device for protecting gallery
CN104767804A (en) * 2015-03-27 2015-07-08 联想(北京)有限公司 Information processing method and device
WO2015196449A1 (en) * 2014-06-27 2015-12-30 Microsoft Technology Licensing, Llc Data protection system based on user input patterns on device
WO2016061929A1 (en) * 2014-10-22 2016-04-28 小米科技有限责任公司 Terminal exception handling method and device, and electronic equipment
CN105634650A (en) * 2016-01-28 2016-06-01 广东欧珀移动通信有限公司 GSM-based self protection method and device for DSDS terminal
CN105744060A (en) * 2016-01-28 2016-07-06 广东欧珀移动通信有限公司 Self-protection method and device for DSDS (Dual Sim Dual Standby) terminal based on EDGE (Enhanced Data Rate for GSM Evolution)
CN105763727A (en) * 2016-02-16 2016-07-13 广东欧珀移动通信有限公司 Three-mode DSDS mobile terminal protection method and system
CN105825155A (en) * 2016-03-10 2016-08-03 广东欧珀移动通信有限公司 Self-protection method and device for CA terminal
CN107172299A (en) * 2017-06-26 2017-09-15 广东欧珀移动通信有限公司 Information processing method, device, computer equipment and computer-readable recording medium
US10372937B2 (en) 2014-06-27 2019-08-06 Microsoft Technology Licensing, Llc Data protection based on user input during device boot-up, user login, and device shut-down states
US10474849B2 (en) 2014-06-27 2019-11-12 Microsoft Technology Licensing, Llc System for data protection in power off mode

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1533130A (en) 2003-03-19 2004-09-29 仪 刘 Special cell phone
CN1599396A (en) 2003-09-16 2005-03-23 张岩 Method and software for preventing mobile phone burglar
US7406334B2 (en) 2004-01-26 2008-07-29 Sbc Knowledge Ventures, L.P. Systems and methods for securing personal or private content stored in the internal memory of a mobile terminal
CN100337504C (en) 2004-09-24 2007-09-12 华为技术有限公司 Intelligent alarming method of personal mobile terminal

Cited By (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101621393A (en) * 2008-07-01 2010-01-06 阿瓦亚公司 Determining a preferable mode of communicating with a called party
CN102104679A (en) * 2010-12-09 2011-06-22 中兴通讯股份有限公司 Method and device for preventing mobile terminal from being used by invalid user
WO2012075765A1 (en) * 2010-12-09 2012-06-14 中兴通讯股份有限公司 Method and device for preventing mobile terminal from illegal users
US9510198B2 (en) 2011-12-15 2016-11-29 Zte Corporation Mobile terminal and user identity recognition method
CN102647508A (en) * 2011-12-15 2012-08-22 中兴通讯股份有限公司 Mobile terminal and user identity identification method
CN102647508B (en) * 2011-12-15 2016-12-07 中兴通讯股份有限公司 A kind of mobile terminal and method for identifying ID
CN103188230A (en) * 2011-12-29 2013-07-03 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and data protection method thereof
CN102929807A (en) * 2012-11-19 2013-02-13 周万荣 Method for initiatively performing loss judgment and data processing and mobile terminal
WO2014089937A1 (en) * 2012-12-14 2014-06-19 北京网秦天下科技有限公司 Mobile terminal intelligent anti-theft method and mobile terminal
CN103037310A (en) * 2012-12-14 2013-04-10 北京网秦天下科技有限公司 Mobile terminal intelligent anti-theft method and mobile terminal
CN103077356B (en) * 2013-01-11 2015-06-24 中国地质大学(武汉) Protecting and tracking method for primary information of mobile terminal based on user behavior pattern
CN103077356A (en) * 2013-01-11 2013-05-01 中国地质大学(武汉) Protecting and tracking method for primary information of mobile terminal based on user behavior pattern
CN103220646A (en) * 2013-04-24 2013-07-24 广东欧珀移动通信有限公司 Method and system for finding mobile terminal device based on short message
CN103269399A (en) * 2013-05-07 2013-08-28 深圳市中兴移动通信有限公司 Processing method for movable terminal information and movable terminal
CN103957322A (en) * 2014-05-05 2014-07-30 深圳市中兴移动通信有限公司 Mobile terminal and antitheft method thereof
CN103957322B (en) * 2014-05-05 2019-05-03 努比亚技术有限公司 The theft preventing method and mobile terminal of mobile terminal
CN104021358A (en) * 2014-05-30 2014-09-03 可牛网络技术(北京)有限公司 Anti-theft control method and device for mobile terminal
US10372937B2 (en) 2014-06-27 2019-08-06 Microsoft Technology Licensing, Llc Data protection based on user input during device boot-up, user login, and device shut-down states
CN105493094A (en) * 2014-06-27 2016-04-13 微软技术许可有限责任公司 Data protection system based on user input patterns on device
US10423766B2 (en) 2014-06-27 2019-09-24 Microsoft Technology Licensing, Llc Data protection system based on user input patterns on device
WO2015196449A1 (en) * 2014-06-27 2015-12-30 Microsoft Technology Licensing, Llc Data protection system based on user input patterns on device
US10474849B2 (en) 2014-06-27 2019-11-12 Microsoft Technology Licensing, Llc System for data protection in power off mode
US9773105B2 (en) 2014-10-22 2017-09-26 Xiaomi Inc. Device security using user interaction anomaly detection
WO2016061929A1 (en) * 2014-10-22 2016-04-28 小米科技有限责任公司 Terminal exception handling method and device, and electronic equipment
CN104486646A (en) * 2014-11-28 2015-04-01 四川长虹电器股份有限公司 Television with tracking anti-theft function, cloud service platform and method
CN104751070A (en) * 2015-03-12 2015-07-01 小米科技有限责任公司 Method and device for protecting gallery
CN104767804A (en) * 2015-03-27 2015-07-08 联想(北京)有限公司 Information processing method and device
CN105634650A (en) * 2016-01-28 2016-06-01 广东欧珀移动通信有限公司 GSM-based self protection method and device for DSDS terminal
CN105744060B (en) * 2016-01-28 2019-03-15 Oppo广东移动通信有限公司 The self-protecting method and device of DSDS terminal based on EDGE
CN105744060A (en) * 2016-01-28 2016-07-06 广东欧珀移动通信有限公司 Self-protection method and device for DSDS (Dual Sim Dual Standby) terminal based on EDGE (Enhanced Data Rate for GSM Evolution)
CN105763727B (en) * 2016-02-16 2019-03-01 Oppo广东移动通信有限公司 Three mould DSDS mobile terminal guard methods and system
CN105763727A (en) * 2016-02-16 2016-07-13 广东欧珀移动通信有限公司 Three-mode DSDS mobile terminal protection method and system
CN105825155A (en) * 2016-03-10 2016-08-03 广东欧珀移动通信有限公司 Self-protection method and device for CA terminal
CN105825155B (en) * 2016-03-10 2019-01-29 Oppo广东移动通信有限公司 A kind of self-protecting method and device of CA terminal
CN107172299A (en) * 2017-06-26 2017-09-15 广东欧珀移动通信有限公司 Information processing method, device, computer equipment and computer-readable recording medium

Also Published As

Publication number Publication date
CN101141721B (en) 2012-08-29

Similar Documents

Publication Publication Date Title
US7181252B2 (en) System and method for performing security functions of a mobile station
CN1759595B (en) Emergency call-back for a wireless communication device equipped with a user removable module
EP1502421B1 (en) A method of remotely changing operating characteristics of a communications device
JP2004274310A (en) Mobile terminal device
RU2379854C2 (en) Method and device for pairwise bluetooth connection
TWI323999B (en)
US9723482B2 (en) Anti-theft protection method and device for cellular phone
JP2008527801A (en) System and method for releasing access to secret multimedia content
JP4838303B2 (en) How to disable a mobile device
KR101879251B1 (en) Apparatus and method for setting an interface
CN100401734C (en) Self-alarming and anti-theft method for mobile terminals
US20060199598A1 (en) Text message based mobile phone security method and device
ES2241367T3 (en) Access to a server computer.
EP2983065B1 (en) Method and terminal for quickly starting application service
US20060025177A1 (en) Mobile communication apparatus having anti-theft and auto-notification functions
US20070082705A1 (en) Mobile communication apparatus having anti-theft and auto-notification functions
US7991161B2 (en) System and method for automatic security authentication in wireless networks
US20060212938A1 (en) Electronic device, registration method thereof, and storage medium
CN104159226B (en) Method for connecting network and device
EP1601216A1 (en) Mobile communication terminal
JP2004159022A (en) Mobile phone, dial lock release method used for the same, and program thereof
TW200847757A (en) Apparatus and methods of sharing contact information between mobile communication devices using short message service
US8229399B2 (en) Communication apparatus
EP1590945A4 (en) Communication system for information security and recovery and method therefor
JP4451346B2 (en) Communication network system and its control method, mobile body, server, mobile body control program, server control program, and recording medium containing the program

Legal Events

Date Code Title Description
C06 Publication
C10 Request of examination as to substance
C14 Granted