CN101212239A - Method for providing mobile telephone anti-theft and safety function with separate accessories - Google Patents

Method for providing mobile telephone anti-theft and safety function with separate accessories Download PDF

Info

Publication number
CN101212239A
CN101212239A CNA2006101566144A CN200610156614A CN101212239A CN 101212239 A CN101212239 A CN 101212239A CN A2006101566144 A CNA2006101566144 A CN A2006101566144A CN 200610156614 A CN200610156614 A CN 200610156614A CN 101212239 A CN101212239 A CN 101212239A
Authority
CN
China
Prior art keywords
mobile phone
separate accessories
function
information
accessories
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2006101566144A
Other languages
Chinese (zh)
Inventor
裴顺昌
李德涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Samsung Telecommunications Technology Research Co Ltd
Samsung Electronics Co Ltd
Original Assignee
Beijing Samsung Telecommunications Technology Research Co Ltd
Samsung Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Samsung Telecommunications Technology Research Co Ltd, Samsung Electronics Co Ltd filed Critical Beijing Samsung Telecommunications Technology Research Co Ltd
Priority to CNA2006101566144A priority Critical patent/CN101212239A/en
Publication of CN101212239A publication Critical patent/CN101212239A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a method for providing antitheft safety function for a cell phone by adopting an accessory separated from the cell phone, which comprises the following processes: the cell phone detects whether at least one reliable independent accessory exists or not; if the independent accessory is detected, the information or function limited on the cell phone can be used. The user of the cell phone requires no frequent input passwords by adopting the independent accessory with antitheft information provided by the invention which is easy to utilize. The possibility that the cell phone and the independent accessory are lost simultaneously is small; even if the cell phone is lost, the information on the cell phone is protected by passwords or can be destroyed. The independent accessory can be customized as required by a user, so as to meet the individual requirements of the user.

Description

Utilize separate accessories that the method for mobile telephone anti-theft and safety function is provided
Technical field
The present invention relates to mobile communication, particularly utilize the annex that is independent of mobile phone that the method for mobile telephone anti-theft and safety function is provided.
Background technology
Existing antitheft mobile phone technology mainly contains:
● physics mode: as have the cell-phone cover of the electronic device of transducer, warning device, or have the cell-phone cover that mechanical antitheft parts such as high-intensity wire are made.
● software mode: need the input password, use canned data on cell-phone function or the visit mobile phone.
The antitheft mode of existing physics need be carried extra cell-phone cover, is subject to its volume, outward appearance, and a lot of people of this mode are difficult to accept.The mode of existing input password needs frequent password input process, and ease for use is relatively poor, particularly for the cellphone subscriber a little less than poor memory or the eyesight.
Summary of the invention
In order to address the above problem, the present invention proposes the method that annex that a kind of utilization is independent of mobile phone provides mobile telephone anti-theft and safety function.
For achieving the above object, the annex that a kind of utilization is independent of mobile phone provides the method for mobile telephone anti-theft and safety function, comprises step:
Whether mobile phone is surveyed reliable at least one separate accessories and is existed;
If detect separate accessories, then allow to use restricted information or function on the mobile phone.
The separate accessories that has antitheft information of the present invention makes the user frequently input password, is easy to use.The possibility that mobile phone and separate accessories are lost simultaneously is little, even mobile phone is lost, information still has cryptoguard on the mobile phone, perhaps can destroy.Separate accessories can customize by customer requirements, satisfies users ' individualized requirement.
Description of drawings
Fig. 1 is antitheft mobile phone and separate accessories schematic diagram;
Fig. 2 is antitheft software setting flow chart;
Fig. 3 is an anti-theft security software work pattern;
Course of work when Fig. 4 is the start of antitheft mobile phone software;
Course of work when Fig. 5 is antitheft mobile phone software normal mode of operation;
Course of work when Fig. 6 is antitheft mobile phone software security mode of operation.
Embodiment
System configuration with Fig. 1 among the present invention is that example is told about the method for utilizing the annex that is independent of mobile phone that mobile telephone anti-theft and safety function is provided.Whether (or a plurality of) 102 (or 103) separate accessories that focuses on having proposed by 101 anti-theft security mobile phones are surveyed through authentication in advance of the present invention exists, thereby confirm whether safety of 101 anti-theft security mobile phones, and determine the mode of operation of antitheft software.The original function of this 102 (or 103) separate accessories can keep fully, only needs correctly to be discerned its identity by 101 anti-theft security mobile phones and gets final product.When the contained identity identification information of 102 (or 103) separate accessories need change, should be simultaneously the authentication information through 102 separate accessories of pre-authentication of storing on 101 antitheft mobile phones be upgraded.
Hereinafter described secure operating mode means: the antitheft mobile phone software function is opened, and mobile phone can't detect the mode of operation under the state of reliable separate accessories.Normal mode of operation is meant that mobile phone can normally detect believable separate accessories and have under the situation mode of operation of cell phone software.
The 102nd, bluetooth earphone etc. have the annex of the discernible address of Bluetooth protocol.When using Bluetooth protocol to authenticate, require 101 antitheft mobile phones to possess corresponding Bluetooth communication protocol function.
The 103rd, post the separate accessories of the another kind of form of electronic tag.This moment, 101 antitheft mobile phones should possess the ability that reads the electronic tag on 103 separate accessories.
Shown in Fig. 1 example, here 102 separate accessories and 103 separate accessories are marked simultaneously, in fact any one existence can be carried out this anti-theft and safety function among both.
The function that 101 antitheft mobile phones will use this method to provide need be provided with in advance.Shown in Figure 2 as example, according to the kind of the separate accessories that adopts and the RM that mobile phone can provide (bluetooth or read electronic tag etc.), after 101 antitheft mobile phones successfully identify 102 (or 103) separate accessories identity, be provided with or confirm that this annex identity information is reliable identity identification information; Be arranged under the secure operating mode information category of limiting access, and the cell-phone function of restriction use; Be arranged under the normal mode of operation, whether when using the information of restricted function or restricted access, implement believable annex detection process (when this is set to open,, may have the user to use inconvenience) if detection time is longer; Be provided with simultaneously under the secure operating mode, the password that need provide when using the information of restricted function or restricted access, and this anti-theft feature will be closed, need the password that uses.
After the start of 101 antitheft mobile phones, whether active probe reliable 102 (or 103) separate accessories exists.The method of surveying can be the bluetooth equipment identification, or electronic tag reads, and other identity can be by 101 antitheft mobile phone identification mode.
101 antitheft mobile phones obtain to verify after the identity identification information of 102 (or 103) separate accessories whether the identity identification information of the believable separate accessories of identity identification information that inspection obtains and the storage of 101 antitheft mobile phones mates.
101 antitheft mobile phones recognize after 102 (or 103) separate accessories existence of believable identity, enter normal mode of operation.Under normal mode of operation, the user of mobile phone can visit the whole sensitive informations that are stored on 101 antitheft mobile phones, uses whole cell-phone functions.Whole sensitive informations of above-mentioned visit or use whole cell-phone functions mean that this theft preventing method to its restriction, does not adopt alternate manner that the use or the visit of above-mentioned information or function are limited but do not get rid of the user.Also to check believable annex if 101 antitheft mobile phones are provided with under the normal mode, then when each visit limited information or function, also will carry out believable annex detection process.
If can not detecting reliable separate accessories, 101 antitheft mobile phones exist, will setting in advance according to the antitheft mobile phone user, restriction to the sensitive information stored on 101 antitheft mobile phones (for example: mobile phone call history, address book, short message, Email, and other information etc.) conduct interviews, the specific function (for example: could not get on to the Net, can not breathe out etc.) of mobile phone is used in restriction simultaneously.
Whether no matter 101 antitheft mobile phones are under normal or the secure operating mode, all will periodically survey reliable separate accessories and exist.
If 101 antitheft mobile phones are under the secure operating mode, when the user need use the information of this method limiting access or limit the function of using, need manual input password.Correctly input password the user, after finish using above-mentioned information or the function, 101 antitheft mobile phones will come back to secure operating mode.
101 antitheft mobile phones require the user to input password under secure operating mode, if the password of user's continuous several times input error, 101 antitheft mobile phones will stop the user further to attempt decryption, and other contact method that the legal machine master of demonstration presets on screen, remind the user with legal machine master contact, perhaps, start the destruction program of sensitive information according to setting in advance.
After the identity identification information of 102 (or 103) separate accessories upgraded, the identity identification information of storing on 101 antitheft mobile phones through pre-authentication needed to upgrade synchronously.
The embodiment of first-selection of the present invention will be described below in conjunction with the accompanying drawings.In the following description, known function or structure will no longer describe in detail.
The annex that Fig. 1 is independent of mobile phone for utilization provides the schematic diagram of mobile telephone anti-theft and safety function.101 antitheft mobile phones are meant the mobile phone of the antitheft software function of this method, and 102 separate accessories are meant the annex of having stored identity identification information.101 antitheft mobile phones can read its identity identification information from 102 separate accessories, and it is reliable identity identification information that the machine master can specify the identity identification information of a certain 102 separate accessories, and 102 corresponding separate accessories are hereinafter referred to as believable annex.In 101 antitheft mobile phone uses, whether mobile phone is surveyed reliable annex and is existed, thereby determines the operating state of 101 antitheft mobile phones.Shown in Figure 1 as example, 103 separate accessories are the annexes that have electronic tag.102 or 103 separate accessories can individualism, finishes the described function of this method with 101 antitheft mobile phones.
The annex that Fig. 2 is independent of mobile phone for a kind of utilization provides the embodiment of the function setting process of mobile telephone anti-theft and safety function.In Fig. 2, when the user need use the described anti-theft feature of this method, need on mobile phone, open this function.At first, cell phone software is in 201 initial conditions, and the user carries out 202 and anti-theft feature is set is: open.According to the attribute of the separate accessories of the function of mobile phone and selection, the identification mode (as bluetooth, RFID etc.) of 203 separate accessories is set, detect cycle (as 5 seconds) then.
As shown in Figure 2, after 203 settings were finished, mobile phone began to survey the identity identification information of annex on every side according to the detection method of setting, so and the identity information that demonstration detects on mobile phone display screen.It is the identity identification informations that can trust that the user needs manual 204 which (or a plurality of) information of appointment.
Shown in Figure 2 as example, after 204 steps are finished, the information (for example: message registration, note, Email etc.) on the mobile phone of the antitheft software limitations visit of execution 205 settings, and the cell-phone function of restriction use (for example limiting exhalation, restriction online etc.).Limited information can be a category information, also can be a certain information specific or file.When the user also will specify 206 whether to use limited information or function simultaneously, must survey believable annex and whether exist.Under normal mode of operation, survey before use restricted function or the information, may cause time-delay, influence user's use to a certain extent.
After 206 steps were finished, the user needed 207 to be arranged under the secure operating mode, when using limited function or information, needed the password of input.Simultaneously the user can 208 self-defined different working modes under, the information of mobile phone.
As shown in Figure 2, be arranged under the safe mode, during the continuous input error of 209 passwords, information to display (as: other continuation modes of machine master, urge user and legal machine master continuous etc.).Be provided with whether start sensitive information destruction process this moment simultaneously, and the kind of destroying data, scope.
Shown in Figure 2 as example, last 210 are provided with in the time of need closing or reset this anti-theft feature, the password that needs.
The change of the identity identification information of 102 if (or 103) separate accessories, the cellphone subscriber can input password and reset.Method to set up is carried out step 203 shown in Figure 2,204.
Exemplary plot 3 is an antitheft mobile phone software work pattern diagram.After mobile phone power-on, antitheft software at first enters 301 initial conditions, begins to survey believable annex immediately.If antitheft mobile phone 302 is found believable annex, antitheft software will enter 304 normal mode of operation.Otherwise 303 do not find believable annex, enter 308 secure operating modes.
Under 304 normal mode of operation, antitheft software can be according to the time interval of user's setting, and whether 305 periodically survey believable annex exists.Perhaps also can be according to setting, 306 when visit limited information or function, activates the detection process of believable annex.If can find believable annex, the user can visit limited information or function.Carry out believable annex when surveying, if 307 do not find believable annex, then antitheft software enters 308 secure operating modes.
Under 308 secure operating modes, when the information that the user attempts the antitheft software limitations visit of 309 visits, when perhaps attempting to use the function of restriction use, the user will be required to provide password.If the password input is correct, information or function can visit or use, and come back to 308 secure operating modes in visit or after finishing using.
Under 308 secure operating modes, mobile phone is still attempted 310 and is periodically surveyed believable annex.If 311 obtain believable accessory information, mobile phone will enter 304 normal mode of operation.The cellphone subscriber can select to close detecting periodically, keeps secure operating mode always.
When example Figure 4 shows that start, antitheft mobile phone software was judged the process of mode of operation.Exist if can find reliable annex, antitheft software enters 405 normal mode of operation.Surpass maximum times if 406 survey believable annex, perhaps detection time is overtime, and antitheft software thinks that reliable annex does not exist, and then enters 407 secure operating modes.
Exemplary plot 5 is under the normal mode of operation, the course of work of antitheft mobile phone software.Under the normal mode of operation, antitheft software 502 is periodically surveyed believable annex and whether is had (step 503~506).If believable annex exists then keeps 501 normal mode of operation, otherwise 507 enter secure operating mode.
As shown in Figure 5, under 501 normal mode of operation, if the user is provided with when 508 use limited information or function, 509 need to check annex, then carry out 511 believable annex detection process.If find reliable annex, then 510 allow to use this information or function, and after finishing using, get back to 501 normal mode of operation.Otherwise, enter secure operating mode with 507.
Fig. 6 is under the secure operating mode, the course of work of antitheft mobile phone software.Under 601 secure operating modes,, will if 604 passwords are correct, will after 605 normal use information or function, be got back to 601 secure operating modes by 603 prompting input passwords if when 602 users attempt to use limited information or function.If the continuous input error of 606 passwords surpasses thresholding, then software 607 shows legal other continuation mode of machine master, urges user and machine master continuous; Perhaps destroy process according to setting in advance log-on message.
As shown in Figure 6, under 601 secure operating modes, software can periodically be surveyed believable software and whether have (step 608~610).If exist, then enter 611 normal mode of operation.Under the situation that separate accessories can not detect because of some reason, validated user can select to be provided with the detecting periodically process under the closed safe pattern.And reopen this function in due course.

Claims (10)

1. the utilization annex that is independent of mobile phone provides the method for mobile telephone anti-theft and safety function, comprises the step
Suddenly:
Whether mobile phone is surveyed reliable at least one separate accessories and is existed;
If detect separate accessories, then allow to use restricted information or function on the mobile phone.
2. method according to claim 1 is characterized in that described mobile phone discerns separate accessories by connectionless mode.
3. method according to claim 2, bluetooth equipment identification or electronic tag that the mode that it is characterized in that the handset identity separate accessories is based on Bluetooth protocol read.
4. method according to claim 1 is characterized in that described separate accessories keeps original practicality or ornamental.
5. method according to claim 4 is characterized in that the requirement customization of described separate accessories according to the user.
6. method according to claim 1, when the identity information that it is characterized in that described separate accessories upgrades, the relevant information of the separate accessories that the cellphone subscriber more stores on the new cell-phone.
7. method according to claim 1 is characterized in that also comprising, if attempt to close the detecting function of mobile phone, needs the input password.
8. method according to claim 1 is characterized in that the detection mode of described mobile phone appointment separate accessories or attempts surveying separate accessories one by one by mobile phone.
9. method according to claim 1 is characterized in that described mobile phone adopts periodic mode to survey separate accessories or based on use surveying separate accessories.
10. method according to claim 8, when it is characterized in that surveying separate accessories based on occupation mode, the detection condition be to a certain, some or a certain class customizing messages visit, to the use of certain mobile phone function or the combination of above-mentioned visit or use.
CNA2006101566144A 2006-12-30 2006-12-30 Method for providing mobile telephone anti-theft and safety function with separate accessories Pending CN101212239A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2006101566144A CN101212239A (en) 2006-12-30 2006-12-30 Method for providing mobile telephone anti-theft and safety function with separate accessories

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2006101566144A CN101212239A (en) 2006-12-30 2006-12-30 Method for providing mobile telephone anti-theft and safety function with separate accessories

Publications (1)

Publication Number Publication Date
CN101212239A true CN101212239A (en) 2008-07-02

Family

ID=39611963

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2006101566144A Pending CN101212239A (en) 2006-12-30 2006-12-30 Method for providing mobile telephone anti-theft and safety function with separate accessories

Country Status (1)

Country Link
CN (1) CN101212239A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102292932A (en) * 2009-01-23 2011-12-21 微软公司 Passive security enforcement
CN103037082A (en) * 2012-12-05 2013-04-10 浙江鸿程计算机系统有限公司 Mobile phone anti-theft method based on near filed communication (NFC)
CN103312881A (en) * 2012-03-15 2013-09-18 联想(北京)有限公司 Mobile terminal state control method, device, system and mobile terminal
CN103929525A (en) * 2013-01-10 2014-07-16 上海斐讯数据通信技术有限公司 Mobile terminal, key, privacy protection system and method
CN104318170A (en) * 2014-09-29 2015-01-28 广东欧珀移动通信有限公司 Multi-mobile terminal-based data security protection method and device

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102292932A (en) * 2009-01-23 2011-12-21 微软公司 Passive security enforcement
US9641502B2 (en) 2009-01-23 2017-05-02 Microsoft Technology Licensing, Llc Passive security enforcement
US10389712B2 (en) 2009-01-23 2019-08-20 Microsoft Technology Licensing, Llc Passive security enforcement
CN103312881A (en) * 2012-03-15 2013-09-18 联想(北京)有限公司 Mobile terminal state control method, device, system and mobile terminal
CN103037082A (en) * 2012-12-05 2013-04-10 浙江鸿程计算机系统有限公司 Mobile phone anti-theft method based on near filed communication (NFC)
CN103929525A (en) * 2013-01-10 2014-07-16 上海斐讯数据通信技术有限公司 Mobile terminal, key, privacy protection system and method
CN104318170A (en) * 2014-09-29 2015-01-28 广东欧珀移动通信有限公司 Multi-mobile terminal-based data security protection method and device
CN104318170B (en) * 2014-09-29 2018-02-16 广东欧珀移动通信有限公司 A kind of method and device based on multi-mobile-terminal protection data safety

Similar Documents

Publication Publication Date Title
US7356835B2 (en) Security monitor for PDA attached telephone
US8019321B2 (en) Wireless mobile phone with authenticated mode of operation including heart beat profile based authentication
US20130137376A1 (en) Systems and methods for recovering low power devices
EP1653753A1 (en) Method for managing personal identification information of a subscriber identity module card in a mobile communication terminal
JP2007179343A (en) Information processor with security function and program
CN101287211A (en) Anti-theft method for mobile terminal
JP2005244589A (en) Mobile phone with use-limiting function and method of limiting use thereof
CN101212239A (en) Method for providing mobile telephone anti-theft and safety function with separate accessories
CN110049490B (en) Safety protection method and device for wearable equipment, wearable equipment and medium
CN104820805A (en) Method and device for burglary prevention of user identity identification card information
EP3737080A1 (en) Doorbell, key management system, and intercom system
CN108537058A (en) The polygonal color application method and device, computer readable storage medium, terminal of terminal
US9338624B2 (en) Cellular telephone and computer program comprising means for generating and sending an alarm message
EP2780900B1 (en) Systems and methods for recovering low power devices
CN107292208B (en) Anti-theft method and device for mobile terminal
CN112464199A (en) Biological feature recognition function control method and device, electronic equipment and storage medium
JP4065821B2 (en) Mobile terminal and security management method for mobile terminal
CN106506843A (en) A kind of theft preventing method and mobile terminal
JP2007329575A (en) Mobile terminal
CN105989265A (en) Early warning method and device and terminal equipment
US20060229062A1 (en) Protection method using a password verifying schedule for a mobile communication device
JP2008048082A (en) Cell phone unit and program
JP2008276367A (en) Mobile terminal and control program
KR101348196B1 (en) Computer security device linked with mobile phone
CN113312932A (en) Mobile terminal information security protection method and device, storage medium and mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20080702