CN101212239A - Method for providing mobile telephone anti-theft and safety function with separate accessories - Google Patents
Method for providing mobile telephone anti-theft and safety function with separate accessories Download PDFInfo
- Publication number
- CN101212239A CN101212239A CNA2006101566144A CN200610156614A CN101212239A CN 101212239 A CN101212239 A CN 101212239A CN A2006101566144 A CNA2006101566144 A CN A2006101566144A CN 200610156614 A CN200610156614 A CN 200610156614A CN 101212239 A CN101212239 A CN 101212239A
- Authority
- CN
- China
- Prior art keywords
- mobile phone
- separate accessories
- function
- information
- accessories
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides a method for providing antitheft safety function for a cell phone by adopting an accessory separated from the cell phone, which comprises the following processes: the cell phone detects whether at least one reliable independent accessory exists or not; if the independent accessory is detected, the information or function limited on the cell phone can be used. The user of the cell phone requires no frequent input passwords by adopting the independent accessory with antitheft information provided by the invention which is easy to utilize. The possibility that the cell phone and the independent accessory are lost simultaneously is small; even if the cell phone is lost, the information on the cell phone is protected by passwords or can be destroyed. The independent accessory can be customized as required by a user, so as to meet the individual requirements of the user.
Description
Technical field
The present invention relates to mobile communication, particularly utilize the annex that is independent of mobile phone that the method for mobile telephone anti-theft and safety function is provided.
Background technology
Existing antitheft mobile phone technology mainly contains:
● physics mode: as have the cell-phone cover of the electronic device of transducer, warning device, or have the cell-phone cover that mechanical antitheft parts such as high-intensity wire are made.
● software mode: need the input password, use canned data on cell-phone function or the visit mobile phone.
The antitheft mode of existing physics need be carried extra cell-phone cover, is subject to its volume, outward appearance, and a lot of people of this mode are difficult to accept.The mode of existing input password needs frequent password input process, and ease for use is relatively poor, particularly for the cellphone subscriber a little less than poor memory or the eyesight.
Summary of the invention
In order to address the above problem, the present invention proposes the method that annex that a kind of utilization is independent of mobile phone provides mobile telephone anti-theft and safety function.
For achieving the above object, the annex that a kind of utilization is independent of mobile phone provides the method for mobile telephone anti-theft and safety function, comprises step:
Whether mobile phone is surveyed reliable at least one separate accessories and is existed;
If detect separate accessories, then allow to use restricted information or function on the mobile phone.
The separate accessories that has antitheft information of the present invention makes the user frequently input password, is easy to use.The possibility that mobile phone and separate accessories are lost simultaneously is little, even mobile phone is lost, information still has cryptoguard on the mobile phone, perhaps can destroy.Separate accessories can customize by customer requirements, satisfies users ' individualized requirement.
Description of drawings
Fig. 1 is antitheft mobile phone and separate accessories schematic diagram;
Fig. 2 is antitheft software setting flow chart;
Fig. 3 is an anti-theft security software work pattern;
Course of work when Fig. 4 is the start of antitheft mobile phone software;
Course of work when Fig. 5 is antitheft mobile phone software normal mode of operation;
Course of work when Fig. 6 is antitheft mobile phone software security mode of operation.
Embodiment
System configuration with Fig. 1 among the present invention is that example is told about the method for utilizing the annex that is independent of mobile phone that mobile telephone anti-theft and safety function is provided.Whether (or a plurality of) 102 (or 103) separate accessories that focuses on having proposed by 101 anti-theft security mobile phones are surveyed through authentication in advance of the present invention exists, thereby confirm whether safety of 101 anti-theft security mobile phones, and determine the mode of operation of antitheft software.The original function of this 102 (or 103) separate accessories can keep fully, only needs correctly to be discerned its identity by 101 anti-theft security mobile phones and gets final product.When the contained identity identification information of 102 (or 103) separate accessories need change, should be simultaneously the authentication information through 102 separate accessories of pre-authentication of storing on 101 antitheft mobile phones be upgraded.
Hereinafter described secure operating mode means: the antitheft mobile phone software function is opened, and mobile phone can't detect the mode of operation under the state of reliable separate accessories.Normal mode of operation is meant that mobile phone can normally detect believable separate accessories and have under the situation mode of operation of cell phone software.
The 102nd, bluetooth earphone etc. have the annex of the discernible address of Bluetooth protocol.When using Bluetooth protocol to authenticate, require 101 antitheft mobile phones to possess corresponding Bluetooth communication protocol function.
The 103rd, post the separate accessories of the another kind of form of electronic tag.This moment, 101 antitheft mobile phones should possess the ability that reads the electronic tag on 103 separate accessories.
Shown in Fig. 1 example, here 102 separate accessories and 103 separate accessories are marked simultaneously, in fact any one existence can be carried out this anti-theft and safety function among both.
The function that 101 antitheft mobile phones will use this method to provide need be provided with in advance.Shown in Figure 2 as example, according to the kind of the separate accessories that adopts and the RM that mobile phone can provide (bluetooth or read electronic tag etc.), after 101 antitheft mobile phones successfully identify 102 (or 103) separate accessories identity, be provided with or confirm that this annex identity information is reliable identity identification information; Be arranged under the secure operating mode information category of limiting access, and the cell-phone function of restriction use; Be arranged under the normal mode of operation, whether when using the information of restricted function or restricted access, implement believable annex detection process (when this is set to open,, may have the user to use inconvenience) if detection time is longer; Be provided with simultaneously under the secure operating mode, the password that need provide when using the information of restricted function or restricted access, and this anti-theft feature will be closed, need the password that uses.
After the start of 101 antitheft mobile phones, whether active probe reliable 102 (or 103) separate accessories exists.The method of surveying can be the bluetooth equipment identification, or electronic tag reads, and other identity can be by 101 antitheft mobile phone identification mode.
101 antitheft mobile phones obtain to verify after the identity identification information of 102 (or 103) separate accessories whether the identity identification information of the believable separate accessories of identity identification information that inspection obtains and the storage of 101 antitheft mobile phones mates.
101 antitheft mobile phones recognize after 102 (or 103) separate accessories existence of believable identity, enter normal mode of operation.Under normal mode of operation, the user of mobile phone can visit the whole sensitive informations that are stored on 101 antitheft mobile phones, uses whole cell-phone functions.Whole sensitive informations of above-mentioned visit or use whole cell-phone functions mean that this theft preventing method to its restriction, does not adopt alternate manner that the use or the visit of above-mentioned information or function are limited but do not get rid of the user.Also to check believable annex if 101 antitheft mobile phones are provided with under the normal mode, then when each visit limited information or function, also will carry out believable annex detection process.
If can not detecting reliable separate accessories, 101 antitheft mobile phones exist, will setting in advance according to the antitheft mobile phone user, restriction to the sensitive information stored on 101 antitheft mobile phones (for example: mobile phone call history, address book, short message, Email, and other information etc.) conduct interviews, the specific function (for example: could not get on to the Net, can not breathe out etc.) of mobile phone is used in restriction simultaneously.
Whether no matter 101 antitheft mobile phones are under normal or the secure operating mode, all will periodically survey reliable separate accessories and exist.
If 101 antitheft mobile phones are under the secure operating mode, when the user need use the information of this method limiting access or limit the function of using, need manual input password.Correctly input password the user, after finish using above-mentioned information or the function, 101 antitheft mobile phones will come back to secure operating mode.
101 antitheft mobile phones require the user to input password under secure operating mode, if the password of user's continuous several times input error, 101 antitheft mobile phones will stop the user further to attempt decryption, and other contact method that the legal machine master of demonstration presets on screen, remind the user with legal machine master contact, perhaps, start the destruction program of sensitive information according to setting in advance.
After the identity identification information of 102 (or 103) separate accessories upgraded, the identity identification information of storing on 101 antitheft mobile phones through pre-authentication needed to upgrade synchronously.
The embodiment of first-selection of the present invention will be described below in conjunction with the accompanying drawings.In the following description, known function or structure will no longer describe in detail.
The annex that Fig. 1 is independent of mobile phone for utilization provides the schematic diagram of mobile telephone anti-theft and safety function.101 antitheft mobile phones are meant the mobile phone of the antitheft software function of this method, and 102 separate accessories are meant the annex of having stored identity identification information.101 antitheft mobile phones can read its identity identification information from 102 separate accessories, and it is reliable identity identification information that the machine master can specify the identity identification information of a certain 102 separate accessories, and 102 corresponding separate accessories are hereinafter referred to as believable annex.In 101 antitheft mobile phone uses, whether mobile phone is surveyed reliable annex and is existed, thereby determines the operating state of 101 antitheft mobile phones.Shown in Figure 1 as example, 103 separate accessories are the annexes that have electronic tag.102 or 103 separate accessories can individualism, finishes the described function of this method with 101 antitheft mobile phones.
The annex that Fig. 2 is independent of mobile phone for a kind of utilization provides the embodiment of the function setting process of mobile telephone anti-theft and safety function.In Fig. 2, when the user need use the described anti-theft feature of this method, need on mobile phone, open this function.At first, cell phone software is in 201 initial conditions, and the user carries out 202 and anti-theft feature is set is: open.According to the attribute of the separate accessories of the function of mobile phone and selection, the identification mode (as bluetooth, RFID etc.) of 203 separate accessories is set, detect cycle (as 5 seconds) then.
As shown in Figure 2, after 203 settings were finished, mobile phone began to survey the identity identification information of annex on every side according to the detection method of setting, so and the identity information that demonstration detects on mobile phone display screen.It is the identity identification informations that can trust that the user needs manual 204 which (or a plurality of) information of appointment.
Shown in Figure 2 as example, after 204 steps are finished, the information (for example: message registration, note, Email etc.) on the mobile phone of the antitheft software limitations visit of execution 205 settings, and the cell-phone function of restriction use (for example limiting exhalation, restriction online etc.).Limited information can be a category information, also can be a certain information specific or file.When the user also will specify 206 whether to use limited information or function simultaneously, must survey believable annex and whether exist.Under normal mode of operation, survey before use restricted function or the information, may cause time-delay, influence user's use to a certain extent.
After 206 steps were finished, the user needed 207 to be arranged under the secure operating mode, when using limited function or information, needed the password of input.Simultaneously the user can 208 self-defined different working modes under, the information of mobile phone.
As shown in Figure 2, be arranged under the safe mode, during the continuous input error of 209 passwords, information to display (as: other continuation modes of machine master, urge user and legal machine master continuous etc.).Be provided with whether start sensitive information destruction process this moment simultaneously, and the kind of destroying data, scope.
Shown in Figure 2 as example, last 210 are provided with in the time of need closing or reset this anti-theft feature, the password that needs.
The change of the identity identification information of 102 if (or 103) separate accessories, the cellphone subscriber can input password and reset.Method to set up is carried out step 203 shown in Figure 2,204.
Exemplary plot 3 is an antitheft mobile phone software work pattern diagram.After mobile phone power-on, antitheft software at first enters 301 initial conditions, begins to survey believable annex immediately.If antitheft mobile phone 302 is found believable annex, antitheft software will enter 304 normal mode of operation.Otherwise 303 do not find believable annex, enter 308 secure operating modes.
Under 304 normal mode of operation, antitheft software can be according to the time interval of user's setting, and whether 305 periodically survey believable annex exists.Perhaps also can be according to setting, 306 when visit limited information or function, activates the detection process of believable annex.If can find believable annex, the user can visit limited information or function.Carry out believable annex when surveying, if 307 do not find believable annex, then antitheft software enters 308 secure operating modes.
Under 308 secure operating modes, when the information that the user attempts the antitheft software limitations visit of 309 visits, when perhaps attempting to use the function of restriction use, the user will be required to provide password.If the password input is correct, information or function can visit or use, and come back to 308 secure operating modes in visit or after finishing using.
Under 308 secure operating modes, mobile phone is still attempted 310 and is periodically surveyed believable annex.If 311 obtain believable accessory information, mobile phone will enter 304 normal mode of operation.The cellphone subscriber can select to close detecting periodically, keeps secure operating mode always.
When example Figure 4 shows that start, antitheft mobile phone software was judged the process of mode of operation.Exist if can find reliable annex, antitheft software enters 405 normal mode of operation.Surpass maximum times if 406 survey believable annex, perhaps detection time is overtime, and antitheft software thinks that reliable annex does not exist, and then enters 407 secure operating modes.
Exemplary plot 5 is under the normal mode of operation, the course of work of antitheft mobile phone software.Under the normal mode of operation, antitheft software 502 is periodically surveyed believable annex and whether is had (step 503~506).If believable annex exists then keeps 501 normal mode of operation, otherwise 507 enter secure operating mode.
As shown in Figure 5, under 501 normal mode of operation, if the user is provided with when 508 use limited information or function, 509 need to check annex, then carry out 511 believable annex detection process.If find reliable annex, then 510 allow to use this information or function, and after finishing using, get back to 501 normal mode of operation.Otherwise, enter secure operating mode with 507.
Fig. 6 is under the secure operating mode, the course of work of antitheft mobile phone software.Under 601 secure operating modes,, will if 604 passwords are correct, will after 605 normal use information or function, be got back to 601 secure operating modes by 603 prompting input passwords if when 602 users attempt to use limited information or function.If the continuous input error of 606 passwords surpasses thresholding, then software 607 shows legal other continuation mode of machine master, urges user and machine master continuous; Perhaps destroy process according to setting in advance log-on message.
As shown in Figure 6, under 601 secure operating modes, software can periodically be surveyed believable software and whether have (step 608~610).If exist, then enter 611 normal mode of operation.Under the situation that separate accessories can not detect because of some reason, validated user can select to be provided with the detecting periodically process under the closed safe pattern.And reopen this function in due course.
Claims (10)
1. the utilization annex that is independent of mobile phone provides the method for mobile telephone anti-theft and safety function, comprises the step
Suddenly:
Whether mobile phone is surveyed reliable at least one separate accessories and is existed;
If detect separate accessories, then allow to use restricted information or function on the mobile phone.
2. method according to claim 1 is characterized in that described mobile phone discerns separate accessories by connectionless mode.
3. method according to claim 2, bluetooth equipment identification or electronic tag that the mode that it is characterized in that the handset identity separate accessories is based on Bluetooth protocol read.
4. method according to claim 1 is characterized in that described separate accessories keeps original practicality or ornamental.
5. method according to claim 4 is characterized in that the requirement customization of described separate accessories according to the user.
6. method according to claim 1, when the identity information that it is characterized in that described separate accessories upgrades, the relevant information of the separate accessories that the cellphone subscriber more stores on the new cell-phone.
7. method according to claim 1 is characterized in that also comprising, if attempt to close the detecting function of mobile phone, needs the input password.
8. method according to claim 1 is characterized in that the detection mode of described mobile phone appointment separate accessories or attempts surveying separate accessories one by one by mobile phone.
9. method according to claim 1 is characterized in that described mobile phone adopts periodic mode to survey separate accessories or based on use surveying separate accessories.
10. method according to claim 8, when it is characterized in that surveying separate accessories based on occupation mode, the detection condition be to a certain, some or a certain class customizing messages visit, to the use of certain mobile phone function or the combination of above-mentioned visit or use.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2006101566144A CN101212239A (en) | 2006-12-30 | 2006-12-30 | Method for providing mobile telephone anti-theft and safety function with separate accessories |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2006101566144A CN101212239A (en) | 2006-12-30 | 2006-12-30 | Method for providing mobile telephone anti-theft and safety function with separate accessories |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101212239A true CN101212239A (en) | 2008-07-02 |
Family
ID=39611963
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA2006101566144A Pending CN101212239A (en) | 2006-12-30 | 2006-12-30 | Method for providing mobile telephone anti-theft and safety function with separate accessories |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101212239A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102292932A (en) * | 2009-01-23 | 2011-12-21 | 微软公司 | Passive security enforcement |
CN103037082A (en) * | 2012-12-05 | 2013-04-10 | 浙江鸿程计算机系统有限公司 | Mobile phone anti-theft method based on near filed communication (NFC) |
CN103312881A (en) * | 2012-03-15 | 2013-09-18 | 联想(北京)有限公司 | Mobile terminal state control method, device, system and mobile terminal |
CN103929525A (en) * | 2013-01-10 | 2014-07-16 | 上海斐讯数据通信技术有限公司 | Mobile terminal, key, privacy protection system and method |
CN104318170A (en) * | 2014-09-29 | 2015-01-28 | 广东欧珀移动通信有限公司 | Multi-mobile terminal-based data security protection method and device |
-
2006
- 2006-12-30 CN CNA2006101566144A patent/CN101212239A/en active Pending
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102292932A (en) * | 2009-01-23 | 2011-12-21 | 微软公司 | Passive security enforcement |
US9641502B2 (en) | 2009-01-23 | 2017-05-02 | Microsoft Technology Licensing, Llc | Passive security enforcement |
US10389712B2 (en) | 2009-01-23 | 2019-08-20 | Microsoft Technology Licensing, Llc | Passive security enforcement |
CN103312881A (en) * | 2012-03-15 | 2013-09-18 | 联想(北京)有限公司 | Mobile terminal state control method, device, system and mobile terminal |
CN103037082A (en) * | 2012-12-05 | 2013-04-10 | 浙江鸿程计算机系统有限公司 | Mobile phone anti-theft method based on near filed communication (NFC) |
CN103929525A (en) * | 2013-01-10 | 2014-07-16 | 上海斐讯数据通信技术有限公司 | Mobile terminal, key, privacy protection system and method |
CN104318170A (en) * | 2014-09-29 | 2015-01-28 | 广东欧珀移动通信有限公司 | Multi-mobile terminal-based data security protection method and device |
CN104318170B (en) * | 2014-09-29 | 2018-02-16 | 广东欧珀移动通信有限公司 | A kind of method and device based on multi-mobile-terminal protection data safety |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7356835B2 (en) | Security monitor for PDA attached telephone | |
US8019321B2 (en) | Wireless mobile phone with authenticated mode of operation including heart beat profile based authentication | |
US20130137376A1 (en) | Systems and methods for recovering low power devices | |
EP1653753A1 (en) | Method for managing personal identification information of a subscriber identity module card in a mobile communication terminal | |
JP2007179343A (en) | Information processor with security function and program | |
CN101287211A (en) | Anti-theft method for mobile terminal | |
JP2005244589A (en) | Mobile phone with use-limiting function and method of limiting use thereof | |
CN101212239A (en) | Method for providing mobile telephone anti-theft and safety function with separate accessories | |
CN110049490B (en) | Safety protection method and device for wearable equipment, wearable equipment and medium | |
CN104820805A (en) | Method and device for burglary prevention of user identity identification card information | |
EP3737080A1 (en) | Doorbell, key management system, and intercom system | |
CN108537058A (en) | The polygonal color application method and device, computer readable storage medium, terminal of terminal | |
US9338624B2 (en) | Cellular telephone and computer program comprising means for generating and sending an alarm message | |
EP2780900B1 (en) | Systems and methods for recovering low power devices | |
CN107292208B (en) | Anti-theft method and device for mobile terminal | |
CN112464199A (en) | Biological feature recognition function control method and device, electronic equipment and storage medium | |
JP4065821B2 (en) | Mobile terminal and security management method for mobile terminal | |
CN106506843A (en) | A kind of theft preventing method and mobile terminal | |
JP2007329575A (en) | Mobile terminal | |
CN105989265A (en) | Early warning method and device and terminal equipment | |
US20060229062A1 (en) | Protection method using a password verifying schedule for a mobile communication device | |
JP2008048082A (en) | Cell phone unit and program | |
JP2008276367A (en) | Mobile terminal and control program | |
KR101348196B1 (en) | Computer security device linked with mobile phone | |
CN113312932A (en) | Mobile terminal information security protection method and device, storage medium and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Open date: 20080702 |