CN101287234A - Anti-theft method and device for mobile communication terminal - Google Patents

Anti-theft method and device for mobile communication terminal Download PDF

Info

Publication number
CN101287234A
CN101287234A CNA2008101126618A CN200810112661A CN101287234A CN 101287234 A CN101287234 A CN 101287234A CN A2008101126618 A CNA2008101126618 A CN A2008101126618A CN 200810112661 A CN200810112661 A CN 200810112661A CN 101287234 A CN101287234 A CN 101287234A
Authority
CN
China
Prior art keywords
communication terminal
mobile communication
unit
current
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2008101126618A
Other languages
Chinese (zh)
Inventor
付助荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Techfaith Wireless Communication Technology Ltd
Original Assignee
China Techfaith Wireless Communication Technology Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Techfaith Wireless Communication Technology Ltd filed Critical China Techfaith Wireless Communication Technology Ltd
Priority to CNA2008101126618A priority Critical patent/CN101287234A/en
Publication of CN101287234A publication Critical patent/CN101287234A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Telephone Function (AREA)

Abstract

The invention relates to an anti-theft method of a mobile communication terminal and a device thereof, which pertains to the communication field; the method and the device aim at solving the problems that: the operation of the anti-theft mobile communication terminal of the prior art is complicated, and the mobile communication terminal is lost due to the failing startup by a careless user. The anti-theft method of the mobile communication terminal provided by the invention can ensure that only effective users can start up the mobile communication terminal and set up anti-theft information through such steps as identifying whether marking positions are consistent with the present numbers and whether the password is correct or not, etc. in the power-on stage. The beneficial effects of the invention are simply and conveniently realizing the anti-theft of the mobile communication terminal without needing to memorize a great quantity of control commands for a user.

Description

A kind of mobile communication terminal theft preventing method and device
Technical field
The present invention relates to the communications field, is a kind of mobile communication terminal theft preventing method and device specifically.
Background technology
Along with development of wireless communication devices and universal, the mobile phone of various communication standards, the mobile communication terminals such as notebook that can surf the Net have at any time more and more become people's daily life necessary tool.
Because the volume of existing mobile communication terminal is more and more littler, so that carry.But another kind of problem but occurred, promptly because the volume ratio of mobile communication terminal is less, the user probably forgets it, causes and loses.And stolen being robbed of mobile communication terminal also usually has generation.
Be directed to above problem, prior art provides the method for antitheft mobile phone, Chinese invention patent publication number CN101039346A for example, denomination of invention is " anti-theft method of mobile phone, equipment and the communication terminal that contains this equipment ", this disclosure of the Invention a kind of when in mobile phone, inserting new SIM card, when increasing the record to this number, notify another remote handset number, after remote handset sends corresponding grant commands, could normally use this mobile phone.And each insert after the new SIM card all of this scheme will be through as above process, and cumbersome in the use, the user confirms to use this mobile phone with another mobile phone.
Now, the user wishes to obtain a kind of mobile communication terminal with anti-theft feature, this mobile communication terminal is when leaving owner, the basic function of mobile phone all lost efficacy, so those are plundered, or the people who steals other mobile phone is just without any meaning, and those find the people of others' mobile phone, do not have any use value yet, initiatively return the owner of lost property and will be their best choice.And wish that antitheft function does not need the too much participation of user, have the high advantage of convenient operation and automation.
In the introducing mode above-mentioned technology contents is incorporated in the application.
Summary of the invention
The object of the present invention is to provide a kind of mobile communication terminal theft preventing method, be used for solving the complicated operation of prior art mobile communication terminal theft preventing method, and because the thinking little of of user, and cause the antitheft problem that can't implement.
Another object of the present invention is to provide a kind of mobile communication terminal anti-theft device, be used for solving the complicated operation of prior art mobile communication terminal anti-theft device, and because the thinking little of of user, and cause the antitheft problem that can't implement.
To achieve these goals, the embodiment of the invention provides a kind of mobile communication terminal theft preventing method, may further comprise the steps:
Step 101, mobile communication terminal when startup;
Step 102 reads the flag bit of described mobile communication terminal;
Step 103 judges whether described flag bit is effective, if effectively then enter step 104, otherwise enters step 106;
Step 104 reads the number information of current described mobile communication terminal;
Step 105 judges that described current number information is whether consistent with the number information of former mobile communication terminal in the memory, if unanimity then enter step 109, otherwise would enter step 106;
Step 106, the user inputs password, judges whether the password of described input is correct, if correctly then enter step 107, otherwise enters step 108;
Step 107, the user is provided with the number information of described password and far-end control end mobile communication terminal, and enters step 109;
Step 108, described flag bit is set to disarmed state, and carries out the function restriction;
Step 109, described mobile communication terminal enters holding state.
A further aspect according to a kind of mobile communication terminal theft preventing method of the present invention also comprises the step of clear flag position after step 107.
Another further aspect according to a kind of mobile communication terminal theft preventing method of the present invention, after the step of described clear flag position, also comprise, read the number information of current described mobile communication terminal, and upgrade the step of the number information of former mobile communication terminal with the number information of described current mobile communication terminal.
Another further aspect according to a kind of mobile communication terminal theft preventing method of the present invention, after described step 108, also comprise, read the number information of current described mobile communication terminal, send information to described far-end control end mobile communication terminal on the backstage of described mobile communication terminal.
According to another further aspect of a kind of mobile communication terminal theft preventing method of the present invention, described information comprises the number information of described current mobile communication terminal.
Another further aspect according to a kind of mobile communication terminal theft preventing method of the present invention, after described step 109, comprise that also described current mobile communication terminal receives the control information of described far-end control end mobile communication terminal, described current mobile communication terminal is carried out the function restriction.
According to another further aspect of a kind of mobile communication terminal theft preventing method of the present invention, described function restriction comprises, only allows current mobile communication terminal and described far-end control end mobile communication terminal address.
Another further aspect according to a kind of mobile communication terminal theft preventing method of the present invention, after sending information to described far-end control end mobile communication terminal, start a timer, on the screen of preset time, show original subscriber's information at described current mobile communication terminal.
According to another further aspect of a kind of mobile communication terminal theft preventing method of the present invention, described number information comprises the SIM card number information.
To achieve these goals, the embodiment of the invention also provides a kind of antitheft device of mobile communication terminal that is used for, and comprising: communication unit, processing unit, flag bit unit, function limiting unit, comparing unit, memory, password unit; Described processing unit is connected with password unit with described communication unit, flag bit unit, function limiting unit, comparing unit, memory respectively;
Described communication unit is responsible for current mobile communication terminal and extraneous communicating by letter, described processing unit according to the described current mobile communication terminal of described flag bit unit judges whether under original subscriber's control, whether the number of judging current mobile communication terminal by comparing unit is consistent with former mobile communication terminal number, whether the password by described password unit checking user input is correct, limits current mobile communication terminal and extraneous communicating by letter by the function limiting unit.
The beneficial effect of the embodiment of the invention is, allows the user pass through the mobile communication terminal that two simple steps just can loss of lock, and do not need the user to open anti-theft feature, and the inventive method just runs on the mobile phone end always.
Description of drawings
Accompanying drawing described herein is used to provide further understanding of the present invention, constitutes the application's a part, does not constitute limitation of the invention.In the accompanying drawings:
Figure 1 shows that the flow chart of mobile phone operate as normal of the present invention;
Figure 2 shows that the process chart when the inventive method validated user inserts new SIM card;
Figure 3 shows that the process chart when the inventive method inactive users is inserted new SIM card;
Figure 4 shows that the process chart that the inventive method validated user Activates Phone again;
Figure 5 shows that the flow chart of the method for the comprehensive above-mentioned Fig. 1-Fig. 4 of the inventive method;
Figure 6 shows that the inventive method triggers the process chart of short message event on mobile phone;
Figure 7 shows that the inventive method triggers the process chart of telephone event on mobile phone;
Figure 8 shows that the inventive method triggers the process chart of multi-media events on mobile phone;
Figure 9 shows that apparatus of the present invention structural representation;
Figure 10 shows that the embodiment schematic diagram when the present invention uses.
Embodiment
For making the purpose, technical solutions and advantages of the present invention clearer,, the present invention is described in further details below in conjunction with execution mode and accompanying drawing.At this, exemplary embodiment of the present invention and explanation thereof are used to explain the present invention, but not as a limitation of the invention.
The embodiment of the invention provides a kind of mobile communication terminal theft preventing method and device.Can be applied to multiple mobile communication terminal, following present specification embodiment with the mobile phone be example as an illustration.The present invention is described in detail below in conjunction with accompanying drawing.
Be illustrated in figure 1 as the flow chart of mobile phone operate as normal of the present invention, when mobile phone is just brought into use, in nonvolatile memory (for example EEPROM), store user's SIM card information.Step 101, mobile phone power-on.Step 102 reads the flag bit of mobile phone to the memory (for example EEPROM) of mobile phone.Step 103, flag bit is effective.Step 104, mobile phone read the SIM card information of this machine, the SIM card of this machine of registration in networks such as GSM or CDMA or WCDMA.Step 105 is when SIM card information of this machine and the consistent step 106 that enters of SIM card information in the memory.Step 106, mobile phone enters holding state.
Process chart when being illustrated in figure 2 as the inventive method validated user and inserting new SIM card.Comprise step 201, mobile phone power-on.Step 202 reads the flag bit of mobile phone to the memory (for example EEPROM) of mobile phone.Step 203, flag bit is effective.Step 204, mobile phone read current SIM card information, the current SIM card of registration in networks such as GSM or CDMA or WCDMA.Step 205 judges that the new information of inserting SIM card is whether consistent with former SIM card information in the memory, if unanimity then enter step 208, otherwise would enter step 206.Step 206 is listed the interface, allows the user input password, and the user inputs correct password, and the validated user of this user who inserts new SIM card for mobile phone is described here, just changes SIM card, and is preferred, can allow the user that three times password reader meeting is arranged.Step 207, the prompting user is provided with antitheft information about new SIM card, for example can comprise that far-end is controlled the phone number of this mobile phone when this mobile phone is lost, information such as password, with the information stores that is provided with in memory.Step 208, mobile phone enters holding state.
Process chart when being illustrated in figure 3 as the inventive method inactive users and inserting new SIM card.Comprise step 301, mobile phone power-on.Step 302 reads the flag bit of mobile phone to the memory (for example EEPROM) of mobile phone.Step 303, flag bit is effective.Step 304, mobile phone read current SIM card information, the current SIM card of registration in networks such as GSM or CDMA or WCDMA.Step 305 judges that the new current SIM card information of inserting is whether consistent with former SIM card information in the memory, if unanimity then enter step 309, otherwise would enter step 306.Step 306 is listed the interface, allows the user input password, and the user inputs incorrect password, illustrates that then current cellphone subscriber is not former cellphone subscriber, and promptly invalid user is inserting new SIM card and starting shooting.Step 307, the flag bit in the mobile phone memory is set to disarmed state, for example is 1 or is 0.Step 308 starts timer, points out owner of lost property's information of this mobile phone of user at a preset time on the interface, and comprises the SIM card number of current phone to the content of this short message of far-end control end phone number transmission short message on the backstage.Step 309, mobile phone enters holding state.
Be illustrated in figure 4 as the process chart that the inventive method validated user Activates Phone again.Comprise step 401, mobile phone power-on.Step 402 reads the flag bit of mobile phone to the memory (for example EEPROM) of mobile phone.Step 403, flag bit is invalid, illustrates that the current phone function can't use, and needs valid user mobile phone is activated and could use.Step 404 is listed the interface, allows the user input password, and the user inputs correct password, and the validated user of this user who inserts new SIM card for mobile phone is described here.Step 405, the prompting user is provided with antitheft information, for example can comprise that far-end is controlled the phone number of this mobile phone when this mobile phone is lost, information such as password, with the information stores that is provided with in memory.Step 406, the clear flag position for example can be that 0 flag bit is set to 1 originally, perhaps carried out opposite setting.Step 407, mobile phone read current SIM card information, the current SIM card of registration in networks such as GSM or CDMA or WCDMA.Step 408 is stored in the information of described SIM card in the memory.Step 409, mobile phone enters holding state.
Be illustrated in figure 5 as the flow chart of the method for the comprehensive above-mentioned Fig. 1-Fig. 4 of the inventive method.Comprise step 501, mobile phone power-on.Step 502 reads the flag bit of mobile phone to the memory (for example EEPROM) of mobile phone.Step 503, whether the judgement symbol position is effective, if effectively then enter step 504, otherwise enters step 506.Step 504, mobile phone read current SIM card information, the current SIM card of registration in networks such as GSM or CDMA or WCDMA.Step 505 judges that current SIM card information is whether consistent with former SIM card information in the memory, if unanimity then enter step 511, otherwise would enter step 506.Step 506 is listed the interface, allows the user input password, judges whether the password of described input is correct, if correctly then enter step 507, otherwise enters step 512.Step 507, the prompting user is provided with antitheft information, for example can comprise that far-end is controlled the phone number of this mobile phone when this mobile phone is lost, information such as password, with the information stores that is provided with in memory.Step 508, the clear flag position for example can be that 0 flag bit is set to 1 originally, perhaps carried out opposite setting.Step 509, mobile phone read current SIM card information, the current SIM card of registration in networks such as GSM or CDMA or WCDMA.Step 510 is stored in the information of described SIM card in the memory.Step 512, the flag bit in the mobile phone memory is set to disarmed state, for example is 1 or is 0.Step 513, mobile phone read current SIM card information, the current SIM card of registration in networks such as GSM or CDMA or WCDMA.Step 514 starts timer, point out owner of lost property's information of this mobile phone of user moving preset time on the interface, and on the backstage to far-end control end phone number transmission short message, the content of this short message comprises the SIM card number of current phone.Step 511, mobile phone enters holding state.
Be illustrated in figure 6 as the inventive method triggers short message event on mobile phone process chart, be example with the short message in this example, but be not restricted to short message.Comprise step 601, the user uses note, triggers the note response events.Step 602 judges that whether the flag bit in the memory is effectively, if for effectively then enter step 606, otherwise enters step 603.Step 603, judgement are to receive or the transmission short message, then enter step 605 if receive short message, then enter step 604 if send short message.Step 604, only allow to send short message to the far-end control end phone number of storage in advance, and send short message from the described far-end control end of trend phone number, the content of this short message comprises the SIM card number of current phone, and prompting validated user mobile phone is lost or is stolen, shows owner of lost property's information to the current phone user simultaneously.Step 605, only permission receives the short message of described far-end control end phone number, rejects other short messages.Step 606 judges whether the telephone number of the short message transmit leg receive is consistent with the far-end control end phone number of storage in advance, if unanimity then enter step 607, otherwise would enter step 608.Step 607, whether the content of judging the short message that is received meets predefined content, for example whether the content of short message is far-end control end phone number, perhaps whether be a string specific by the character string in the predefined sick storage of validated user and the memory, enter step 609 if the content of short message meets, otherwise enter step 608.Step 608 is carried out normal short message and is handled.Step 609, the flag bit in the mobile phone memory is set to disarmed state, for example is 1 or is 0.Step 610 is replied the affirmation short message of predetermined content to the phone number of note transmit leg, for example can be contents such as " target mobile phones are locked ".
Be illustrated in figure 7 as the inventive method triggers telephone event on mobile phone process chart.Comprise step 701, the user triggers telephony feature, triggers the note response events.Step 702 judges that whether the flag bit in the memory is effectively, if for effectively then enter step 706, otherwise enters step 703.Step 703, judgement are incoming call or outbound calling function, if Inbound Calls then enters step 705, if outbound calling then enters step 704.Step 704 only allows to the far-end control end phone number outbound calling of storage in advance.Step 705, only the Inbound Calls of described far-end control end phone number, other incoming calls of rejection are accepted in permission.Step 706 is carried out normal phone incoming call and exhalation.
Be illustrated in figure 8 as the inventive method triggers multi-media events on mobile phone process chart.Comprise step 801, the user triggers multimedia function, and for example mp3 function, video capability, camera-enabled, E-mail function, WAP function etc. trigger the multimedia response events.Step 802 judges that whether the flag bit in the memory is effectively, if for effectively then enter step 804, otherwise enters step 803.Step 803, to the far-end control end phone number transmission short message of storage in advance, the content of this short message comprises the SIM card number of current phone.
Be illustrated in figure 9 as apparatus of the present invention structural representation.Comprise communication unit 901, processing unit 902, flag bit unit 903, function limiting unit 904, comparing unit 905, memory 906, password unit 907.Described processing unit 902 is connected with described communication unit 901, flag bit unit 903, function limiting unit 904, comparing unit 905, memory 906 and password unit 907 respectively.
Described communication unit 901 is used for mobile phone and communicates by letter with extraneous.
Described flag bit unit 903, whether be used to identify current phone is exercisable, if flag bit unit 903 be masked as disarmed state, then illustrate current phone may for lose or stolen state under, if be effective status, illustrate that then current phone is a safe condition.
Described function limiting unit 904, be used to control the use of SMS, call function and the multimedia function of mobile phone, restriction SMS and call function can only connect with predefined far-end control end phone number, and forbid carrying out Multimedia Task.
Described comparing unit 905, be used for the SIM card information of current phone is compared with the SIM card information of storage in advance, if difference then call password unit 907 by processing unit 902 to carry out cryptographic core right, unit 904 carries out the function restriction if password not match is then calling function leaves unused, and communicate by letter with far-end control end phone number by communication unit 901, notify this this machine of far-end control end mobile phone current SIM card number.
Described memory 906 is used to store this machine SIM card number, far-end control end SIM cards of mobile phones number, operating parameters such as password.
Described password unit 907 is used for the password of user's input and the password of memory 906 are checked.
Processing unit 902 is used for calling corresponding units according to the result of each unit and is for further processing.
Embodiment schematic diagram when using for the present invention as shown in figure 10.Comprise local handset 1001, far-end control end mobile phone 1002.When the user uses local handset for the first time, at first insert SIM card, carry out process step as shown in Figure 2, the initial password of input handset, and new password and far-end control end SIM cards of mobile phones information are set, and flag bit is set for effectively, be stored in the memory of local handset 1001.Thus, the present invention can utilize far-end control end SIM cards of mobile phones number and the password that is provided with in the starting stage, and local handset 1001 is protected.
Then, the user uses the flow process process step as shown in Figure 1 of mobile phone, the judgement symbol position whether effectively after, normally use local handset 1001.
Then, when this cellphone subscriber normally changes SIM cards of mobile phones, carry out process step as shown in Figure 2.
Then, if the user loses local handset 1001 accidentally, perhaps local handset 1001 is stolen, when then not picking up the person and changing the SIM card of local handset 1001, local handset 1001 can carry out process step as shown in Figure 3, handle, dirty bit is a disarmed state, and the backstage sends the SIM card information of current local handset 1001 automatically to far-end control end mobile phone 1002.And, because flag bit is modified to disarmed state, then when this person of picking up uses the SMS of this local handset 1001, carry out respectively handling when telephony feature and multimedia function as the process step of Fig. 6, Fig. 7 and Fig. 8, outside only allowing local handset 1001 and described far-end control end mobile phone 1002 being communicated by letter, the communication and the multimedia function of forbidding other.
Then, after the cellphone subscriber receives the SMS Tip that above-mentioned mobile phone loses, can utilize far-end control end mobile phone 1002 to send short message to this local handset 1001, the content of this short message has only the SIM card number of this far-end control end mobile phone 1002, after local handset 1001 received this short message, the process step that carries out was as shown in Figure 6 handled.
Then, if when the person of picking up returns the user with mobile phone, this user inserts correct SIM card or other SIM card again, and the process step that local handset 1001 carries out is as shown in Figure 4 handled, and the sign of clear flag position is so that Activate Phone again.
Beneficial effect of the present invention is, allows the user pass through the mobile communication terminal that two simple steps just can loss of lock, and do not need the user to open anti-theft feature, and the inventive method just runs on the mobile phone end always.Point out user mobile phone current SIM card information by the mode of short message, so that the customer contact person of picking up, the user does not need to remember a plurality of control short messages, only need be with the telephone number input of far-end control end mobile phone, the transmission short message of being used as the mobile phone of far-end control end, all functions that then can the loss of lock mobile phone, easy to operate.
Above-described embodiment; purpose of the present invention, technical scheme and beneficial effect are further described; institute is understood that; the above only is the specific embodiment of the present invention; and be not intended to limit the scope of the invention; within the spirit and principles in the present invention all, any modification of being made, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. mobile communication terminal theft preventing method is characterized in that this method may further comprise the steps:
Step 101, mobile communication terminal when startup;
Step 102 reads the flag bit of described mobile communication terminal;
Step 103 judges whether described flag bit is effective, if effectively then enter step 104, otherwise enters step 106;
Step 104 reads the number information of current described mobile communication terminal;
Step 105 judges that described current number information is whether consistent with the number information of former mobile communication terminal in the memory, if unanimity then enter step 109, otherwise would enter step 106;
Step 106, the user inputs password, judges whether the password of described input is correct, if correctly then enter step 107, otherwise enters step 108;
Step 107, the user is provided with the number information of described password and far-end control end mobile communication terminal, and enters step 109;
Step 108, described flag bit is set to disarmed state, and carries out the function restriction;
Step 109, described mobile communication terminal enters holding state.
2. a kind of mobile communication terminal theft preventing method according to claim 1 is characterized in that, also comprises the step of clear flag position after step 107.
3. a kind of mobile communication terminal theft preventing method according to claim 2, it is characterized in that, after the step of described clear flag position, also comprise, read the number information of current described mobile communication terminal, and upgrade the step of the number information of former mobile communication terminal with the number information of described current mobile communication terminal.
4. a kind of mobile communication terminal theft preventing method according to claim 1, it is characterized in that, after described step 108, also comprise, read the number information of current described mobile communication terminal, send information to described far-end control end mobile communication terminal on the backstage of described mobile communication terminal.
5. a kind of mobile communication terminal theft preventing method according to claim 4 is characterized in that described information comprises the number information of described current mobile communication terminal.
6. a kind of mobile communication terminal theft preventing method according to claim 4, it is characterized in that, after described step 109, comprise that also described current mobile communication terminal receives the control information of described far-end control end mobile communication terminal, described current mobile communication terminal is carried out the function restriction.
7. according to claim 4 or 6 described a kind of mobile communication terminal theft preventing methods, it is characterized in that described function restriction comprises, only allows current mobile communication terminal and described far-end control end mobile communication terminal address.
8. a kind of mobile communication terminal theft preventing method according to claim 1, it is characterized in that, after sending information to described far-end control end mobile communication terminal, start a timer, on the screen of preset time, show original subscriber's information at described current mobile communication terminal.
9. according to any described a kind of mobile communication terminal theft preventing method of claim 1-8, it is characterized in that described number information comprises the SIM card number information.
10. one kind is used for the antitheft device of mobile communication terminal, it is characterized in that this device comprises: communication unit, processing unit, flag bit unit, function limiting unit, comparing unit, memory, password unit; Described processing unit is connected with password unit with described communication unit, flag bit unit, function limiting unit, comparing unit, memory respectively;
Described communication unit is responsible for current mobile communication terminal and extraneous communicating by letter, described processing unit according to the described current mobile communication terminal of described flag bit unit judges whether under original subscriber's control, whether the number of judging current mobile communication terminal by comparing unit is consistent with former mobile communication terminal number, whether the password by described password unit checking user input is correct, limits current mobile communication terminal and extraneous communicating by letter by the function limiting unit.
CNA2008101126618A 2008-05-26 2008-05-26 Anti-theft method and device for mobile communication terminal Pending CN101287234A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2008101126618A CN101287234A (en) 2008-05-26 2008-05-26 Anti-theft method and device for mobile communication terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2008101126618A CN101287234A (en) 2008-05-26 2008-05-26 Anti-theft method and device for mobile communication terminal

Publications (1)

Publication Number Publication Date
CN101287234A true CN101287234A (en) 2008-10-15

Family

ID=40059152

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2008101126618A Pending CN101287234A (en) 2008-05-26 2008-05-26 Anti-theft method and device for mobile communication terminal

Country Status (1)

Country Link
CN (1) CN101287234A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101815292A (en) * 2010-04-22 2010-08-25 中兴通讯股份有限公司 Device and method for protecting data of mobile terminal
CN102316407A (en) * 2010-07-06 2012-01-11 希姆通信息技术(上海)有限公司 Mobile phone and mobile phone stolen tracking method
CN102413456A (en) * 2011-09-02 2012-04-11 中国电信股份有限公司 User terminal anti-theft method, user terminal anti-theft device and user terminal anti-theft system based on operation network
CN102438221A (en) * 2011-11-01 2012-05-02 康佳集团股份有限公司 Self-destruction mobile phone method when the mobile phone is stolen and mobile phone capable of realizing self-destruction function
CN103702299A (en) * 2013-12-13 2014-04-02 北京奇虎科技有限公司 Mobile terminal antitheft method and client
CN104219393A (en) * 2014-09-30 2014-12-17 深圳市中兴移动通信有限公司 Password input method and device and mobile terminal
CN106921941A (en) * 2015-12-28 2017-07-04 镇江高科信息科技有限公司 A kind of system and method and communication terminal for pursuing stolen communication terminal
CN107734176A (en) * 2017-10-25 2018-02-23 深圳市金立通信设备有限公司 Loss guard method, terminal and the computer-readable recording medium of mobile terminal
WO2019061205A1 (en) * 2017-09-28 2019-04-04 深圳传音通讯有限公司 Registration method and terminal

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101815292B (en) * 2010-04-22 2014-04-30 中兴通讯股份有限公司 Device and method for protecting data of mobile terminal
WO2011130970A1 (en) * 2010-04-22 2011-10-27 中兴通讯股份有限公司 Device and method for protecting data of mobile terminal
CN101815292A (en) * 2010-04-22 2010-08-25 中兴通讯股份有限公司 Device and method for protecting data of mobile terminal
CN102316407A (en) * 2010-07-06 2012-01-11 希姆通信息技术(上海)有限公司 Mobile phone and mobile phone stolen tracking method
CN102316407B (en) * 2010-07-06 2016-05-18 希姆通信息技术(上海)有限公司 Mobile phone and hand-set from stolen tracking
CN102413456A (en) * 2011-09-02 2012-04-11 中国电信股份有限公司 User terminal anti-theft method, user terminal anti-theft device and user terminal anti-theft system based on operation network
CN102413456B (en) * 2011-09-02 2014-11-19 中国电信股份有限公司 User terminal anti-theft method, user terminal anti-theft device and user terminal anti-theft system based on operation network
CN102438221A (en) * 2011-11-01 2012-05-02 康佳集团股份有限公司 Self-destruction mobile phone method when the mobile phone is stolen and mobile phone capable of realizing self-destruction function
CN102438221B (en) * 2011-11-01 2018-03-20 康佳集团股份有限公司 The method of self-destruction mobile phone and the mobile phone of self-destroying function is realized during hand-set from stolen
CN103702299A (en) * 2013-12-13 2014-04-02 北京奇虎科技有限公司 Mobile terminal antitheft method and client
CN104219393A (en) * 2014-09-30 2014-12-17 深圳市中兴移动通信有限公司 Password input method and device and mobile terminal
CN104219393B (en) * 2014-09-30 2016-04-06 努比亚技术有限公司 A kind of method, device and mobile terminal inputting password
CN106921941A (en) * 2015-12-28 2017-07-04 镇江高科信息科技有限公司 A kind of system and method and communication terminal for pursuing stolen communication terminal
WO2019061205A1 (en) * 2017-09-28 2019-04-04 深圳传音通讯有限公司 Registration method and terminal
CN107734176A (en) * 2017-10-25 2018-02-23 深圳市金立通信设备有限公司 Loss guard method, terminal and the computer-readable recording medium of mobile terminal

Similar Documents

Publication Publication Date Title
CN101287234A (en) Anti-theft method and device for mobile communication terminal
EP1601216B1 (en) Mobile communication terminal
CN104967748B (en) A kind of method of safety operation application service
CN100401734C (en) Self-alarming and anti-theft method for mobile terminals
CN104185171B (en) The method and apparatus that a kind of virtual SIM card is realized
CN101815116A (en) Mobile telephone method and device based on multi-user
US20010016484A1 (en) Anti-theft protection for a radiotelephony device
CN105554223A (en) Connection establishment method and mobile terminal
CN101772017A (en) Method for remotely destroying information of communication terminal and communication terminal thereof
CN101287247A (en) Method for binding mobile phone to telephone card and anti-theft method for mobile phone
US8041340B2 (en) Personal information protecting method and mobile terminal
CN101656966A (en) Data protection method of mobile terminal, device thereof and mobile terminal
CN1477842B (en) Method for preventing user's identification module from being unallovably used
JP2001230858A (en) Mobile phone system and mobile phone
CN103338314A (en) Method for realizing information safety through conversation and mobile terminal thereof
CN100579145C (en) Mobile phone information remote inquiring method
CN103458394A (en) Mobile terminal, processing method and processing device for internal information of mobile terminal
JP2003264631A (en) Security method for sim card information
CN105744023A (en) Antitheft mobile phone and mobile phone theft prevention method
KR20090085319A (en) Method of controlling user lock in mobile telephone
CN101697643B (en) Method and device for backing up information in intelligent card for mobile communication terminal
JP2004363732A (en) Personal information protecting method, personal information protecting program and portable telephone terminal
CN106791130A (en) Self-destruction processing method and terminal after a kind of terminal robber
KR100950662B1 (en) A method of certifying smart card for Identification Module using Network
KR100474290B1 (en) Method for transmitting data stored in sim card

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20081015