CN101141721B - Safety mobile telephone based communication custom - Google Patents

Safety mobile telephone based communication custom Download PDF

Info

Publication number
CN101141721B
CN101141721B CN200610127653A CN200610127653A CN101141721B CN 101141721 B CN101141721 B CN 101141721B CN 200610127653 A CN200610127653 A CN 200610127653A CN 200610127653 A CN200610127653 A CN 200610127653A CN 101141721 B CN101141721 B CN 101141721B
Authority
CN
China
Prior art keywords
mobile phone
telex network
user
stolen
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN200610127653A
Other languages
Chinese (zh)
Other versions
CN101141721A (en
Inventor
刘卫民
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Samsung Telecommunications Technology Research Co Ltd
Samsung Electronics Co Ltd
Original Assignee
Beijing Samsung Telecommunications Technology Research Co Ltd
Samsung Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Samsung Telecommunications Technology Research Co Ltd, Samsung Electronics Co Ltd filed Critical Beijing Samsung Telecommunications Technology Research Co Ltd
Priority to CN200610127653A priority Critical patent/CN101141721B/en
Publication of CN101141721A publication Critical patent/CN101141721A/en
Application granted granted Critical
Publication of CN101141721B publication Critical patent/CN101141721B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present invention discloses a method for a safe mobile phone based on the user communication habit. The method comprises steps that a user communication habit die plate is arranged in a mobile phone; the mobile phone compares whether the call records matches with the stored user communication habit die plate or not; if matches, the mobile phone can be normally operated; if not, the mobile phone sends a message that the mobile phone is stolen to a destination preassigned by the mobile phone. The present invention directly correlates with the operating habit of the owner of the mobile phone, and the operating habit is individual and can not be copied by the others, and can effectively determine whether the mobile phone is in the owner operating state or others operating state. After the user finishes the setting, once the mobile phone is stolen, as long as the mobile phone is continually operated, the mobile phone can start an anti-theft procedure, to help the loser to find out the mobile phone or to lock the mobile phone.

Description

Safe mobile phone based on communication custom
Technical field
The present invention relates to communication system, particularly a kind of safe mobile phone that has anti-theft feature based on the telex network custom.
Background technology
In recent ten years, mobile communication has obtained swift and violent development in the whole world.Global Mobile Phone Users has reached 2,000,000,000 at present.Wherein only just there are mobile phone user 400,000,000 families in country of China, Personal Handyphone System user more than 9,000 ten thousand families.Mobile phone has become much human work, necessary tool in life, and mobile phone also becomes people's belongings.
Mobile phone on the one hand when the life of giving people offers convenience, on the other hand also because of its volume is little, use frequent, be worth higher and become the burglar do the case target.Hand-set from stolen is of common occurrence at present, and much human all has the experience of hand-set from stolen, has not only caused economic loss, simultaneously, because of the useful information of being stored in the lost mobile phone is lost together, makes troubles for people's life.
The multiple technology that prevents hand-set from stolen is arranged at present.The way of password for example is set,, has only the correct password of input could continue to use mobile phone during start, have only the correct password of input normally to use when perhaps changing Subscriber Identity Module (like SIM, UIM card etc.) through password is set on mobile phone; Increase the way of accessory device, to the auxiliary device of a special use of mobile phone outfit, in case mobile phone will be reported to the police away from this auxiliary device; By mobile network's way, mobile operator whereabouts of following the trail of mobile phone for example through the equipment identity register (EIR) of configure dedicated; Whether the method with mobile phone and the binding of a certain Subscriber Identity Module is replaced the method whether mobile phone is stolen of discerning through the judges identification card.
There is problem in various degree in above-mentioned theft preventing method.The method that password is set can make the burglar obtain behind the mobile phone because of not knowing that password can not use, but does not have help for giving mobile phone for change; Increase the way of accessory device, need the user to carry the antitheft mobile phone annex, both increased user cost, brought inconvenience to the user again; By mobile network's way, need operator to increase investment, the special-purpose network equipment is installed could be realized that this equipment is not installed by present most of operators, therefore most of users can not enjoy this service; Through method with mobile phone and the binding of a certain Subscriber Identity Module; Whether to change Subscriber Identity Module as judging that hand-set from stolen is a condition; The mobile phone that only is suitable for separation between machine and card; Mobile phone for machine engaging one invalid (as being that machine engages a mobile phone in Korea S, it is machine engagings one that also there are several Personal Handyphone Systems of ten million in China).
Though some antitheft mobile phone schemes have been arranged now, because of using inconvenience or otherwise defective, it does not effectively satisfy the hope that people recover stolen mobile phone, and these antitheft schemes are not widely used yet.
Summary of the invention
The purpose of this invention is to provide a kind of based on telex network custom be simple and easy to, safe mobile phone and implementation method accurately and effectively.
According to one side of the present invention, a kind of realization comprises step based on the method for the safe mobile phone of telex network custom:
Telex network custom template is set in mobile phone;
Whether the telex network custom template of mobile phone comparison telex network the other side's telephone number and storage matees;
If coupling, mobile phone normally uses;
If do not match, the mobile phone message that hand-set from stolen is sent in preassigned destination on mobile phone.
According to another aspect of the present invention, a kind of safe mobile phone based on the telex network custom comprises:
Antenna is used for receiving and the transmission wireless signal;
Wireless module is used for transmission and the reception etc. of conversion, the radio frequency analog signal of baseband digital signal and radio frequency analog signal, and wireless module links to each other with Signal Processing Element;
Signal Processing Element is used for the encoding and decoding of business datum, signaling, the spread spectrum of physical channel and despreading, modulation and demodulation etc.
Control module is used to control the integrated operation of each assembly;
Memory is used for essential data of memory mobile phone operate as normal and user's personal information;
Display unit under the control of control module, shows various message, icon etc.;
Keyboard is used for input information;
Loud speaker is used for output sound;
Power module is for each module provides power supply.
The present invention's use habit mobile phone is direct and the machine master is associated, and use habit varies with each individual, and other people can't duplicate, and can judge effectively whether mobile phone is in former machine instigator with state or other people user mode.When the user after accomplishing the setting up, in case mobile phone is stolen, as long as mobile phone is continued to use, mobile phone will start anti-theft program, helps the owner of lost property to find mobile phone or cell-phone lock is waited indefinitely.
Description of drawings
Fig. 1 is the structured flowchart based on the safe mobile phone of communication custom of the embodiment of the invention;
Fig. 2 is based on the safe mobile phone operating process embodiment 1 of communication custom---and the machine master manually is provided with contact directory commonly used;
Fig. 3 is based on the safe mobile phone operating process embodiment 2 of communication custom---and the machine master manually is provided with contact directory commonly used;
Fig. 4 is based on the safe mobile phone operating process embodiment 3 of communication custom---and mobile phone is provided with contact directory commonly used automatically;
Fig. 5 is based on the safe mobile phone operating process embodiment 4 of communication custom---and use numbering directory to be accustomed to template as telex network;
Fig. 6 is based on the safe mobile phone operating process embodiment 5 of communication custom---each communication back inspection.
Embodiment
Main purpose of the present invention is to realize a kind of safe mobile phone based on the telex network custom, and characteristics are whether this mobile phone can change according to the user's communications custom, judges that this mobile phone is with state or be in stolen state former machine instigator.If this mobile phone is in stolen state, mobile phone will be handled according to the stolen post-processing approach that the machine master is provided with in advance.
In order to make theme clearer, in the following description, with the detailed description of omitting known function and structure.
Fig. 1 has expressed the formation based on the safe mobile phone of communication custom.The basic function that part that safe mobile phone is included and each several part should be accomplished is following:
Antenna 101 is used for receiving and the transmission wireless signal.
Wireless module 102, the conversion of responsible baseband digital signal and radio frequency analog signal, the transmission of radio frequency analog signal and reception etc., wireless module links to each other with Signal Processing Element.
Signal Processing Element 103, its function comprises the encoding and decoding of business datum, signaling, the spread spectrum of physical channel and despreading, modulation and demodulation etc.
Control module 104; The integrated operation of this each assembly of module controls for the application layer software in the mobile phone provides operation platform, is carried application software module; Accomplish transmission, reception and the processing of air interface signaling; The control of calling procedure etc., and each correlation module in the mobile phone controlled, enable cooperating.
Among the present invention, for realizing antitheft, control module also should realize following function: generate user's communications custom template; Follow the tracks of the user's communications behavior; The telex network behavior is analyzed, and whether the communication custom of judges change has taken place; If change has taken place in the user's communications custom, assert that promptly mobile phone is in the unauthorized user user mode, perhaps claim stolen state, handle according to predefined stolen post-processing approach, as dial specific number etc.
Memory 105, the data memory module in the mobile phone, data that the memory mobile phone operate as normal is essential and user's personal information are like telephone directory book etc.
Among the present invention, be the realization antitheft, memory also should be stored user's communications custom template, the track record of telex network behavior, stolen post-processing approach and the relevant setting of other antitheft, like tracking cycle, tracking time counter etc.
Display unit 106, display unit generally comprises LCD etc., can under the control of control module, show various message, icon etc.
Among the present invention, the anti-theft prompt information that display unit is sent control module is shown to the user, carries out security settings like the prompting user, perhaps warning etc. after getting into stolen state.
Keyboard 107 is used for input information, and the information of user input is sent to control module, with common interface functions of accomplishing user and mobile phone such as display unit and loud speaker, microphones.
Loud speaker 108 is used for output sound, like prompt tone etc.Among the present invention, the prompting user carries out security settings, perhaps after getting into stolen state, exports warning message etc.
Power module 109 is for each module provides power supply.
Also microphone etc. should be arranged in addition, not shown.
Under the control of control module 104, the user is through man-machine interface 106,107,108 input telex network custom templates, and perhaps mobile phone is set up telex network custom template and stolen post-processing approach automatically, is stored in the memory 105.After starting anti-theft feature, control module 104 is in the anti-theft feature opening.In this state, control module 104 is followed the tracks of user's message registration, and compares with the telex network custom template of storage in the memory 105, if its matching degree reaches predetermined conditions, judges that then mobile phone is in normal condition; Otherwise assert that change has taken place the user's communications custom, promptly mobile phone is in the unauthorized user user mode, handles according to the stolen post-processing approach of storage in the memory 105.For the ease of following the tracks of; After the user deletes message registration; On display unit 106, should be shown as communications records and delete, in memory 105, should continue to keep communications records till control module 104 does not re-use these communications records and telex network custom template is compared.
Telex network custom template generally is made up of the contact number that the user uses always, and the number number can be limited to certain scope.Contact number commonly used can be imported by the user by hand, also can result from the numbering directory of storing in the mobile phone.
The matching degree of message registration and telex network custom template mainly is that whether number is identical in the two number of comparison, comprises identical number number, frequency that duplicate numbers occurs in communications records etc., can think coupling if reach particular value.
Stolen post-processing approach can comprise multiple option, such as:
1) predefined telephone number dialing phone and play stolen information in mobile phone;
2) predefined telephone number sends specific short message in mobile phone;
3) predefined mailbox sends specific email in mobile phone;
4) information such as the numbering directory of storing in the mobile phone, note, message registration are sent to predefined telephone number, mailbox or upload to particular address etc.;
The current location information of Correspondent Nodes such as the particular telephone of 5) in mobile phone, storing in advance, mailbox report mobile phones;
6) delete personal informations such as the numbering directory stored in the mobile phone, note, message registration immediately;
7) mobile phone gets into the state of remote controlled, and mobile phone will be operated according to the instruction that the specific communications end points that receives is sent this moment;
8) immediately that the data of storing in the mobile phone is stealthy, stealthy back user can only be through just seeing behind the input specific cryptosystem;
9) remind the current user of phone that phone is returned to former master;
10) mobile phone can not normally be used, as can not dial, can not normally answer, locked mobile phone etc.
Above-mentioned processing method can only be carried out wherein a kind of, also can two or more methods combinations carry out.Aforesaid operations can be carried out under the situation that the active user can discover, and also can under the situation that the active user can not discover, carry out.
Above-mentioned option 7) can further be explained as follows: after mobile phone got into the remote controlled state, the teleinstruction that mobile phone can the receiver master be sent through other communication ends was also operated according to instruction.The mode of handset identity control command has two kinds: the one, discern through the identification number of resolving the telecommunication end.Store specific identification number on the mobile phone in advance, like the equipment of the mobile phone of particular number or landline telephone, particular ip address, specific E-mail address, specific service identifiers number etc.Confirm phone stolen after, after receiving the information that these specific identification numbers are sent, both regarded as teleinstruction information.The command information that the telecommunication end is sent can be mail, character string, sound of specific format etc.The implication of teleinstruction information needs the mobile phone of agreement assurance in advance correctly to discern; The 2nd, discern through the short message content that parsing receives.If find that note has specific form, beginning adds " ##*** " sign like note, promptly thinks the Long-distance Control note.The instruction note is write according to the form of making an appointment, and represents specific implication.As deleting the information on the mobile phone with " 00 " representative, the locked mobile phone of " 11 " representative etc.Current phone is resolved note, operates according to the operational order that parses.
Mobile phone receive the operation of carrying out after the instruction that the telecommunication end sends can be on canned data on the passback mobile phone, the deletion mobile phone information, play specific sound, locked mobile phone etc.
The password that when mobile phone being started or close anti-theft feature and relative operation, needs inspection user has only password matching could allow the user to carry out aforesaid operations.Be provided with by the user when initial password can obtain when the user buys mobile phone or be provided with first, the user can make amendment to password, and in this patent, the user who grasps this password is authorized user, and the user who does not grasp this password is unauthorized user.
Fig. 2 has expressed the embodiment 1 of the antitheft mobile phone course of work.In this embodiment, telex network custom template is that contact directory commonly used by the machine primary input constitutes.Each operating procedure is following:
201 machine masters are provided with contact directory commonly used, follow the tracks of time limit and stolen post-processing approach.Mobile phone is used the contact directory always and is set to telex network custom template, starts anti-theft modes.Because the user's communications custom is to embody through a large amount of communication behaviors, only pass through tracking to the seldom number of times of telex network behavior, can not judge whether the user's communications custom change has taken place.Need to follow the tracks of the communication behavior of the certain number of times of user, could find the user's communications custom.What follow the tracks of here that the time limit refers to is exactly the number of times of required tracking, follows the tracks of the time limit and be by the user according to own communication custom setting.Following the tracks of the time limit is appreciated that also the communication counterpart number that can allow into mobile phone is not accustomed to the upper limit in the template in telex network.If exceed this upper limit, think that promptly mobile phone is in the unauthorized user user mode.For example user's first is got in touch frequently with the household, will inevitably have at least in per ten conversations or the transmitting-receiving note and once get in touch with the household that the other side is first, and then first can be got in touch with directory as using always with household's number, sets ten times for following the tracks of the time limit.The mobile phone of user's first is in a single day stolen like this, as long as this mobile phone is used more than ten times, mobile phone will change the unauthorized user user mode over to, and the message of hand-set from stolen is sent in preassigned destination on mobile phone.For example the communication object of user's second relatively disperses again, does not have the frequent especially communication object of contact, and then user's second can be set a plurality of telephone numbers in contact directory commonly used, and the tracking time limit also is provided with longer, for example is made as 50 times.Like this, as long as occur the telephone number of setting in the directory of getting in touch with commonly used in 50 contact with foreign countriess of user's second, just assert that mobile phone is in the authorized user user mode.The tracking time limit also can be preset on the mobile phone by cell phone manufacturer, because the communication custom of different user is widely different, needs according to a large number of users custom is investigated, and the value in tracking time limit can be provided with more greatly, to reduce the possibility of erroneous judgement.
202 mobile phones get into anti-theft modes, and K is changed to 0 with counter, is used to calculate tracking cycle;
203 when the user carries out a voice call or transmitting-receiving short message, and K increases by 1;
Whether 204 inspection K have reached the tracking time limit of setting, do not forward step 203 to if reach;
If 205 have reached the tracking time limit of setting, whether the telex network custom template of storing in the other side's number in the controller comparison communications records and the memory matees.If coupling forwards step 202 to;
If 206 do not match then start subsequent operation according to the stolen post-processing approach that is provided with in advance in the mobile phone.
The tracking time limit is based on the number of communications setting in the step 201, also can be according to time set, and this tracking cycle finished after promptly counter K reached certain hour.Following the tracks of the time limit also can be by producer's default settings in mobile phone.The method that the machine master is provided with contact directory commonly used can be to Enter Number or in existing address book, select.
In the embodiment shown in Figure 2, as long as message registration does not once match with telex network custom template, will start stolen post processor.2 couples of embodiment of embodiment shown in Figure 31 have carried out some modifications; In this embodiment, when certain did not match, further whether the nearest communicating number of inspection was in telephone directory book; If; Do not start stolen post processor immediately, have only when these two Rule of judgment do not satisfy or continuously during inferior not the matching of J (value of J is set in the mobile phone in advance), just can start stolen post processor.Each operating procedure is following:
301 machine masters are provided with contact directory commonly used, follow the tracks of time limit and stolen post-processing approach, and mobile phone is used the contact directory always and is set to telex network custom template, starts anti-theft modes;
302 mobile phones get into anti-theft modes, and K is changed to 0 with counter, is used to calculate tracking cycle;
303 when the user carries out a voice call or transmitting-receiving short message, and K increases by 1;
Whether 304 inspection K have reached the tracking time limit of setting;
If 305 have reached the tracking time limit of setting, whether the telex network custom template of storing in the other side's number in the controller comparison communications records and the memory matees.If coupling forwards step 302 to;
306 like then counter J increase by 1 (initial value of J is 0) that do not match, and J is used for writing down the number of times that do not match;
307 judge whether that reaching maximum allows the number of times that do not match, if then forward step 309 to;
Whether the communicating number that 308 inspections are nearest n time is in telephone directory book, if forward step 302 to; Otherwise forward step 309 to;
309 stolen post-processing approach operations according to machine master setting.
Fig. 4 has expressed the embodiment 3 of the antitheft mobile phone course of work.In this embodiment, telex network custom template is provided with by mobile phone automatically.Each operating procedure is following:
401 mobile phone tracking users' conversation behavior, extract in the special time period or the specific communications number of times in the most frequent number of contact be set to telex network custom template;
402 start anti-theft modes;
403 mobile phones get into anti-theft modes, and K is changed to 0 with counter, is used to calculate tracking cycle;
404 when the user carries out a voice call or transmitting-receiving short message, and K increases by 1;
Whether 405 inspection K have reached the tracking time limit of setting, do not turn to step 404 if reach;
If 406 have reached the tracking time limit of setting, whether the telex network custom template of storing in the other side's number in the controller comparison communications records and the memory matees.If coupling forwards step 402 to, otherwise forwards step 407 to;
407 according to the stolen post-processing approach operation that is provided with in advance.
In the above-mentioned steps, step 401 and step 402 can reverse the right order.
Mobile phone can continue to follow the tracks of user's message registration, extracts the maximum number of contact, when these numbers have notable difference with the telex network custom template of having stored, can use the number of new extraction to upgrade family communication custom template.Be the increase fail safe, but inspection user password when operating is upgraded in execution to family communication custom template.
Fig. 5 has expressed the embodiment 4 of the antitheft mobile phone course of work.In this embodiment, use numbering directory to be accustomed to template as telex network.Each operating procedure is following:
501 machine masters are provided with stolen post-processing approach, start anti-theft modes;
The current telephone directory book of 502 mobile phones is set to telex network custom template;
503 mobile phones get into anti-theft modes, and K is changed to 0 with counter, is used to calculate tracking cycle;
504 when a voice call of the every reception of user or short message, and K increases by 1.
Whether 505 inspection K have reached the tracking time limit of setting.Do not turn to step 504 if reach;
If 506 have reached the tracking time limit of setting, whether the telex network custom template of storing in the other side's number in the controller comparison communications records and the memory matees.If coupling forwards step 503 to; Otherwise forward step 507 to;
507 according to the stolen post-processing approach operation that is provided with in advance.
The user can use current telephone directory book to upgrade telex network custom template.Be the increase fail safe, but inspection user password when operating is upgraded in execution to telex network custom template.
The foregoing description is after number of communications reaches the tracking time limit, and whether the telex network custom template of just storing in the other side's number in the comparison communications records and the memory matees.Also can be to check immediately behind each sign off.Fig. 6 has expressed the embodiment 5 of the antitheft mobile phone course of work of checking behind each sign off.Each operating procedure is following:
601 are provided with contact directory commonly used and stolen post-processing approach, start anti-theft modes.Mobile phone will be used the contact directory always and be made as telex network custom template;
602 counter K are changed to 0;
603 when the user carries out a voice call or transmitting-receiving short message, and the other side's number and telex network custom template are compared;
If 604 the other side's numbers then turn to step 602 in telex network custom template;
605 otherwise counter K increases by 1;
Do not allow the number of times that do not match if 606 counter K reach maximum as yet, then turn to step 603.The maximum number of times that allows not match is preset in advance in the mobile phone or by the user by mobile phone producer and in step 601, sets;
607 otherwise according to the stolen post processing mode operation that is provided with in advance in the mobile phone.
The alter mode to embodiment 1 described in the embodiment 2 is equally applicable to other embodiment.
For improving fail safe; Above-mentioned other embodiment can be as embodiment 4; Can only check incoming calls record; Promptly no matter go whether to comprise the telephone number in the telex network custom template in the electricity,, think that promptly mobile phone is in the unauthorized user user mode as long as the telephone number in the telex network custom template do not occur in the incoming call (comprising phone and note) over a period to come.Like this, even if other people can crack out the content in the telex network custom template, but because can't simulate incoming call, anti-theft program can play a role equally.
Although be the example purpose; The preferred embodiments of the present invention are disclosed; Those skilled in the art will recognize under situation about not deviating from like disclosed scope of the present invention and spirit in appended claims, various improvement, increase and replacement also are possible.Therefore, scope of the present invention should be not limited to the foregoing description, but limits according to appended claims and equivalence thereof.

Claims (15)

1. a realization comprises step based on the method for the safe mobile phone of telex network custom:
Telex network custom template is set in mobile phone;
The telex network custom template of mobile phone comparison telex network the other side's number and storage judges whether the matching degree of the two has reached predetermined conditions;
If matching degree has reached predetermined conditions, mobile phone normally uses;
If matching degree does not reach predetermined conditions, the mobile phone message that hand-set from stolen is sent in preassigned destination on mobile phone.
2. by the described method of claim 1, it is characterized in that said telex network custom template comprises contact directory commonly used.
3. by the described method of claim 1, it is characterized in that said telex network custom template comprises the conversation behavior that comes from the mobile phone tracking user, the most frequent number of contact that extracts.
4. by the described method of claim 1, it is characterized in that said telex network custom template comprises current telephone directory book.
5. by the described method of claim 1, it is characterized in that said telex network custom template is provided with by the machine master or mobile phone is provided with automatically.
6. by the described method of claim 1; It is characterized in that the upper limit that do not match can be set in advance; Whether the telex network custom template by mobile phone comparison telex network record and storage matees; If unmatched number of times reaches the predefined upper limit, the mobile phone message that hand-set from stolen is sent in preassigned destination on mobile phone.
7. by the described method of claim 1, it is characterized in that the message of said mobile phone preassigned destination transmission hand-set from stolen on mobile phone comprises one of following message:
Predefined telephone number dialing phone and play stolen information in mobile phone;
Predefined telephone number sends specific short message in mobile phone;
Predefined mailbox sends specific email in mobile phone;
The numbering directory of storing in the mobile phone, note, message registration information are sent to predefined telephone number, mailbox or uploads to particular address;
Report the current location information of mobile phone to Correspondent Node based on the particular telephone of storing in advance in the mobile phone, mailbox.
8. by the described method of claim 1, it is characterized in that also comprising that mobile phone carries out one of following action according to machine master's the teleinstruction that sends:
Delete numbering directory, note, the message registration stored in the mobile phone immediately;
Immediately that the data of storing in the mobile phone is stealthy, stealthy back user can only be through just seeing behind the input specific cryptosystem;
Remind the current user of phone that phone is returned to former master;
Make that mobile phone can not dial, can not normally answer, locked mobile phone.
9. by the described method of claim 7, it is characterized in that the state of said mobile phone when message that other communication equipment of machine master sends hand-set from stolen comprises: operating under the situation that the active user can discover or under the situation that the active user can not discover, operating.
10. safe mobile phone based on telex network custom comprises:
Antenna is used for receiving and the transmission wireless signal;
Wireless module is used for the conversion of baseband digital signal and radio frequency analog signal, the transmission and the reception of radio frequency analog signal, and wireless module links to each other with Signal Processing Element;
Signal Processing Element is used for the encoding and decoding of business datum, signaling, the spread spectrum of physical channel and despreading, modulation and demodulation;
Control module is used to control the integrated operation of each assembly;
Memory is used for essential data of memory mobile phone operate as normal and user's personal information, and has stored telex network custom template;
Display unit under the control of control module, shows various message, icon;
Keyboard is used for input information;
Loud speaker is used for output sound;
Power module is for each module provides power supply;
The telex network custom template of wherein storing in control module comparison telex network the other side's number and the memory judges whether the matching degree of the two has reached predetermined conditions; If matching degree has reached predetermined conditions, mobile phone normally uses; If matching degree does not reach predetermined conditions, the message of hand-set from stolen is sent in preassigned destination on mobile phone.
11., it is characterized in that said control module can generate user's communications custom template by the described mobile phone of claim 10.
12. by the described mobile phone of claim 10, it is characterized in that said control module can follow the tracks of the user's communications behavior.
13. by the described mobile phone of claim 10, it is characterized in that said control module can analyze the telex network behavior, whether the communication custom of judges change has taken place.
14., it is characterized in that said control module can then be handled according to predefined stolen post-processing approach if change has taken place the user's communications custom by the described mobile phone of claim 13.
15. by the described mobile phone of claim 10, it is characterized in that said memory also should store the track record of telex network behavior, stolen post-processing approach and the relevant setting of other antitheft.
CN200610127653A 2006-09-05 2006-09-05 Safety mobile telephone based communication custom Active CN101141721B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200610127653A CN101141721B (en) 2006-09-05 2006-09-05 Safety mobile telephone based communication custom

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200610127653A CN101141721B (en) 2006-09-05 2006-09-05 Safety mobile telephone based communication custom

Publications (2)

Publication Number Publication Date
CN101141721A CN101141721A (en) 2008-03-12
CN101141721B true CN101141721B (en) 2012-08-29

Family

ID=39193409

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200610127653A Active CN101141721B (en) 2006-09-05 2006-09-05 Safety mobile telephone based communication custom

Country Status (1)

Country Link
CN (1) CN101141721B (en)

Families Citing this family (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8194831B2 (en) * 2008-07-01 2012-06-05 Avaya Inc. Determining a preferable mode of communicating with a called party
CN102104679A (en) * 2010-12-09 2011-06-22 中兴通讯股份有限公司 Method and device for preventing mobile terminal from being used by invalid user
CN102647508B (en) * 2011-12-15 2016-12-07 中兴通讯股份有限公司 A kind of mobile terminal and method for identifying ID
CN103188230A (en) * 2011-12-29 2013-07-03 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and data protection method thereof
CN102929807A (en) * 2012-11-19 2013-02-13 周万荣 Method for initiatively performing loss judgment and data processing and mobile terminal
CN103037310A (en) * 2012-12-14 2013-04-10 北京网秦天下科技有限公司 Mobile terminal intelligent anti-theft method and mobile terminal
CN103077356B (en) * 2013-01-11 2015-06-24 中国地质大学(武汉) Protecting and tracking method for primary information of mobile terminal based on user behavior pattern
CN103220646B (en) * 2013-04-24 2016-09-28 广东欧珀移动通信有限公司 A kind of method and system giving mobile terminal device based on note for change
CN103269399A (en) * 2013-05-07 2013-08-28 深圳市中兴移动通信有限公司 Processing method for movable terminal information and movable terminal
CN103957322B (en) * 2014-05-05 2019-05-03 努比亚技术有限公司 The theft preventing method and mobile terminal of mobile terminal
CN104021358A (en) * 2014-05-30 2014-09-03 可牛网络技术(北京)有限公司 Anti-theft control method and device for mobile terminal
CN105493094A (en) * 2014-06-27 2016-04-13 微软技术许可有限责任公司 Data protection system based on user input patterns on device
US10474849B2 (en) 2014-06-27 2019-11-12 Microsoft Technology Licensing, Llc System for data protection in power off mode
WO2015196447A1 (en) 2014-06-27 2015-12-30 Microsoft Technology Licensing, Llc Data protection based on user input during device boot-up, user login, and device shut-down states
CN104361303A (en) 2014-10-22 2015-02-18 小米科技有限责任公司 Terminal exception processing method and device and electronic equipment
CN104486646A (en) * 2014-11-28 2015-04-01 四川长虹电器股份有限公司 Television with tracking anti-theft function, cloud service platform and method
CN104751070B (en) * 2015-03-12 2018-07-27 小米科技有限责任公司 Picture library guard method and device
CN104767804A (en) * 2015-03-27 2015-07-08 联想(北京)有限公司 Information processing method and device
CN105744060B (en) * 2016-01-28 2019-03-15 Oppo广东移动通信有限公司 The self-protecting method and device of DSDS terminal based on EDGE
CN105634650B (en) * 2016-01-28 2018-12-11 广东欧珀移动通信有限公司 The self-protecting method and device of DSDS terminal based on GSM
CN105763727B (en) * 2016-02-16 2019-03-01 Oppo广东移动通信有限公司 Three mould DSDS mobile terminal guard methods and system
CN105825155B (en) * 2016-03-10 2019-01-29 Oppo广东移动通信有限公司 A kind of self-protecting method and device of CA terminal
CN107451437B (en) * 2016-05-31 2021-04-16 百度在线网络技术(北京)有限公司 Locking method and device of mobile terminal
CN107172299A (en) * 2017-06-26 2017-09-15 广东欧珀移动通信有限公司 Information processing method, device, computer equipment and computer-readable recording medium
CN109618342A (en) * 2018-12-27 2019-04-12 上海碳蓝网络科技有限公司 It is a kind of for determining the method and apparatus of the operation permission information of user

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1533130A (en) * 2003-03-19 2004-09-29 仪 刘 Special cell phone
CN1599396A (en) * 2003-09-16 2005-03-23 张岩 Method and software for preventing mobile phone burglar
WO2005074452A2 (en) * 2004-01-26 2005-08-18 Sbc Knowledge Ventures, L.P. Systems and methods for securing personal or private content stored in the internal memory of a mobile terminal
CN1753524A (en) * 2004-09-24 2006-03-29 华为技术有限公司 Intelligent alarming method of personal mobile terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1533130A (en) * 2003-03-19 2004-09-29 仪 刘 Special cell phone
CN1599396A (en) * 2003-09-16 2005-03-23 张岩 Method and software for preventing mobile phone burglar
WO2005074452A2 (en) * 2004-01-26 2005-08-18 Sbc Knowledge Ventures, L.P. Systems and methods for securing personal or private content stored in the internal memory of a mobile terminal
CN1753524A (en) * 2004-09-24 2006-03-29 华为技术有限公司 Intelligent alarming method of personal mobile terminal

Also Published As

Publication number Publication date
CN101141721A (en) 2008-03-12

Similar Documents

Publication Publication Date Title
CN101141721B (en) Safety mobile telephone based communication custom
CN101141722B (en) Safety mobile telephone based on user vocal feature and implementing method thereof
EP1601216B1 (en) Mobile communication terminal
CN1416257B (en) Communication equipment
EP3410257B1 (en) Method for quickly starting application service, and terminal
CN101951432A (en) Method, device and mobile terminal for adding contact information into address book
CN102163996B (en) Communication control system and method
US8078143B2 (en) Remotely controlling access to a wireless handset
CN105554223A (en) Connection establishment method and mobile terminal
EP1976247A1 (en) A call control method of telephone user and short message transmit
CN1141544A (en) Apparatus and method for message recording and receipt-of-message notification to cordless station operating as cellular telephone
CN1302681C (en) Method for preventing burglarious of mobile phone and anti-theft mobile phone
CN103369506A (en) Card selection prompting method of multi-card terminal and multi-card mobile terminal
CN101351000A (en) Method for showing information and communication terminal
CN102217295A (en) Management method of voice message and device thereof
CN1571459A (en) Gate inhibition system based on mobile communication network
CN101291502B (en) Anti-theft method for mobile phone
CN1394427A (en) Method for automatic concealed dialling reporting loss of mobile telephone
CN101340667A (en) Talking recording method for mobile communication apparatus
CN101179618B (en) Incoming call prompting method for terminal
JP3446040B2 (en) Telephone equipment
CN100391217C (en) Out-calling restriction setup method of mobile communication terminal
CN100592753C (en) Status prompting system and method
CN101291363B (en) Theft-use preventing method for mobile phone
JP2005348240A (en) Telephone device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant