CN102438221B - The method of self-destruction mobile phone and the mobile phone of self-destroying function is realized during hand-set from stolen - Google Patents
The method of self-destruction mobile phone and the mobile phone of self-destroying function is realized during hand-set from stolen Download PDFInfo
- Publication number
- CN102438221B CN102438221B CN201110339753.1A CN201110339753A CN102438221B CN 102438221 B CN102438221 B CN 102438221B CN 201110339753 A CN201110339753 A CN 201110339753A CN 102438221 B CN102438221 B CN 102438221B
- Authority
- CN
- China
- Prior art keywords
- mobile phone
- self
- destruction
- stolen
- short message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 31
- 230000000903 blocking effect Effects 0.000 claims description 3
- 230000007812 deficiency Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Abstract
The invention discloses the method for self-destruction mobile phone during hand-set from stolen and the mobile phone of self-destroying function is realized, its method includes:Obtain current mobile phone card number automatically when mobile phone is opened, and judge whether the mobile phone card number of current mobile phone card number and owner are identical;When number is identical, directly start shooting, send the short message of hand-set from stolen to the cell-phone number of setting during number difference;When receiving the short message for requiring mobile phone self-destruction, control mobile phone enters self-destruction pattern, and automatic shutdown so that robber's mobile phone of reselling loses meaning, so as to greatly reduce the probability of hand-set from stolen.
Description
Technical field
The present invention relates to the method for self-destruction mobile phone during a kind of mobile phone technique field, more particularly to hand-set from stolen and realize self-destruction
The mobile phone of function.
Background technology
With the development and the improvement of people's living standards of mobile phone technique, the application of mobile phone is more and more extensive, at present mobile phone
The state of human hand one has been basically reached, people get used to carry with mobile phone in trip, but so to mobile phone steathily
Robber create many chances.Either in the public transport that people squeezes people, or in lively size restaurant etc. one
Place more than a little stream of peoples, all easily occurs robbery accident.
Stolen mobile phone has flowed into second-hand mobile phone market mostly, is sold with low price, in order to prevent such bad wind
Gas, if the self-destroying function of mobile phone can be developed so that only real owner just possesses the right using mobile phone, and allows robber to steal
It can not be changed hands after stealing mobile phone, allow pilferage mobile phone to become meaningless, can so reduce the probability of hand-set from stolen.
The content of the invention
In view of in place of above-mentioned the deficiencies in the prior art, it is an object of the invention to provide self-destruction mobile phone during a kind of hand-set from stolen
Method and realize the mobile phone of self-destroying function, the self-destroying function of mobile phone can be realized after hand-set from stolen.
In order to achieve the above object, this invention takes following technical scheme:
A kind of method of self-destruction mobile phone during hand-set from stolen, wherein, described method includes:
A, mobile phone is opened, obtains current mobile phone card number;
B, judge whether the mobile phone card number of current mobile phone card number and owner are identical;If it is, directly start shooting;Otherwise,
Perform step C;
C, the short message of hand-set from stolen is sent to the cell-phone number of setting;
D, when receiving the short message for requiring mobile phone self-destruction, control mobile phone enters self-destruction pattern, and automatic shutdown.
During above-mentioned hand-set from stolen in the method for self-destruction mobile phone, the step D is specifically included:
When D1, mobile phone receive short message, the short message is intercepted;
D2, the parsing short message, and judge whether short message content requires handset starting self-destroying function;If it is, perform
Step D3;Otherwise, step D4 is performed;
D3, start mobile phone self-destruction pattern, and make mobile phone shutdown;
D4, according to the demand of short message content perform corresponding function.
During above-mentioned hand-set from stolen in the method for self-destruction mobile phone, after the step D3, described method is further wrapped
Include:When mobile phone enters self-destruction pattern, flag bit is set automatically, indicates hand-set from stolen.
During above-mentioned hand-set from stolen in the method for self-destruction mobile phone, after the step D3, described method is further wrapped
Include:After mobile phone shutdown, control mobile phone can not start shooting again.
During above-mentioned hand-set from stolen in the method for self-destruction mobile phone, before the step C, described method also includes:If
Put the cell-phone number or email address that short message is received after hand-set from stolen.
The mobile phone of self-destroying function is realized during a kind of hand-set from stolen, wherein,
Mobile phone card number acquisition module, for obtaining current mobile phone card number;
Identification module, for judging whether the mobile phone card number of current mobile phone card number and owner is identical;
Short message transmitting-receiving module, for sending the short message of hand-set from stolen to the cell-phone number of setting, and receive and require mobile phone certainly
The short message ruined;
Self-destruction module, for controlling mobile phone to enter self-destruction pattern, and control mobile phone automatic shutdown;
Self-destruction setup module, for opening or closing the function of self-destruction module.
In the mobile phone that self-destroying function is realized during above-mentioned hand-set from stolen, in addition to:
Blocking module, the short message received for intercepting mobile phone;
Parsing module, the short message is parsed, and judge whether the content of short message requires handset starting self-destroying function.
In the mobile phone that self-destroying function is realized during above-mentioned hand-set from stolen, in addition to setup module, for mobile phone enter from
When ruining pattern, flag bit is set automatically, indicates hand-set from stolen.
In the mobile phone that self-destroying function is realized during above-mentioned hand-set from stolen, the setup module is additionally operable to after setting hand-set from stolen
Receive the cell-phone number or email address of short message.
In the mobile phone that self-destroying function is realized during above-mentioned hand-set from stolen, the self-destruction module is additionally operable to after mobile phone shutdown,
Control mobile phone can not start shooting again.
The method of self-destruction mobile phone and the hand of self-destroying function is realized compared to prior art, during hand-set from stolen provided by the invention
Machine, obtain current mobile phone card number automatically when mobile phone is opened, and judge that the mobile phone card number of current mobile phone card number and owner is
It is no identical;When number is identical, directly start shooting, send the short message of hand-set from stolen to the cell-phone number of setting during number difference;Receiving
During to the short message for requiring mobile phone self-destruction, control mobile phone enters self-destruction pattern, and automatic shutdown so that robber's mobile phone of reselling loses
Meaning, so as to greatly reduce the probability of hand-set from stolen.
Brief description of the drawings
The method flow diagram of self-destruction mobile phone when Fig. 1 is hand-set from stolen provided by the invention.
Embodiment
The method of self-destruction mobile phone and the mobile phone of self-destroying function is realized when the present invention provides a kind of hand-set from stolen, to make the present invention
Purpose, technical scheme and effect it is clearer, clear and definite, the embodiment that develops simultaneously referring to the drawings to the present invention further specifically
It is bright.It should be appreciated that specific embodiment described herein is not intended to limit the present invention only to explain the present invention.
Referring to Fig. 1, the method for self-destruction mobile phone includes during hand-set from stolen provided in an embodiment of the present invention:
S110, mobile phone is opened, obtain current mobile phone card number;
S120, judge whether the mobile phone card number of current mobile phone card number and owner are identical;If it is, directly start shooting;It is no
Then, step S130 is performed;
S130, to setting cell-phone number send hand-set from stolen short message;
S140, when receiving the short message for requiring mobile phone self-destruction, control mobile phone enter self-destruction pattern, and automatic shutdown.
Wherein, before step S130, described method also includes:Set hand-set from stolen after receive short message cell-phone number or
Email address, after hand-set from stolen, the cell-phone number or mailbox that the short message sending of hand-set from stolen to user can be pre-set
In.
In the embodiment of the present invention, the step S140 is specifically included:
A, when mobile phone receives short message, the short message is intercepted;The cell-phone number that the short message is pre-set by owner is sent, user Ke Tong
Cross send spcial character short message come control open mobile phone self-destroying function, send other short messages control mobile phone realize and its phase
The function of answering;
B, the short message is parsed, and judges whether short message content requires handset starting self-destroying function;If it is, perform step
Rapid c;Otherwise, step d is performed;
C, start mobile phone self-destruction pattern, and make mobile phone shutdown;
D, corresponding function is performed according to the demand of short message content.
Wherein, after the step c, described method also includes:It is automatic that mark is set when mobile phone enters self-destruction pattern
Will position, indicate hand-set from stolen.When robber gives stolen mobile phone to manufacturer and formats upgrading software, manufacturer is set to lead to
The flag bit of self-destruction pattern setting is crossed, judges current phone for stolen mobile phone, refusal upgrading software.
In a further embodiment, after the step c, self-destruction hand during hand-set from stolen provided in an embodiment of the present invention
The method of machine further comprises:After mobile phone shutdown, control mobile phone can not start shooting again, so that mobile phone can not reuse so that
Pilferage loses meaning.
Based on above-mentioned method, a kind of also corresponding mobile phone that self-destroying function is realized when hand-set from stolen is provided of the present invention it include
Mobile phone card number acquisition module, identification module, short message transmitting-receiving module, self-destruction module and self-destruction setup module.
Wherein, mobile phone card number acquisition module is used to obtain current mobile phone card number;Identification module is used to judge current hand
Whether machine card number and the mobile phone card number of owner are identical;Short message transmitting-receiving module is used to send the short of hand-set from stolen to the cell-phone number of setting
Letter, and receive the short message for requiring mobile phone self-destruction;Self-destruction module is used to control mobile phone to enter self-destruction pattern, and controls mobile phone automatic
Shutdown, and after mobile phone shutdown, control mobile phone can not start shooting again.The self-destruction setup module is used to opening or closing self-destruction
The function of module, and set self-destruction module function when, it is necessary to user set password, only in password authentification by rear,
The function of self-destruction module can be just turned on or off.
In the embodiment of the present invention, described mobile phone also includes blocking module, parsing module and setup module, the interception mould
Block is used to intercept the short message that mobile phone receives;Parsing module parses the short message, and judges whether short message content requires handset starting
Self-destroying function.The setup module is used for when mobile phone enters self-destruction pattern, sets flag bit automatically, indicates hand-set from stolen;With
And the cell-phone number or email address of reception short message after hand-set from stolen are set.
In summary, the method for self-destruction mobile phone and the mobile phone of self-destroying function is realized during hand-set from stolen provided by the invention,
Mobile phone obtains current mobile phone card number automatically when opening, and judge current mobile phone card number and owner mobile phone card number whether phase
Together;When number is identical, directly start shooting, send the short message of hand-set from stolen to the cell-phone number of setting during number difference;Will receiving
When seeking the short message of mobile phone self-destruction, control mobile phone enters self-destruction pattern, and automatic shutdown so that robber's mobile phone of reselling loses meaning
Justice, so as to greatly reduce the probability of hand-set from stolen.
It is understood that for those of ordinary skills, can be with technique according to the invention scheme and its hair
Bright design is subject to equivalent substitution or change, and all these changes or replacement should all belong to the guarantor of appended claims of the invention
Protect scope.
Claims (2)
1. a kind of method of self-destruction mobile phone during hand-set from stolen, it is characterised in that described method includes:
A, mobile phone is opened, obtains current mobile phone card number;
B, judge whether the mobile phone card number of current mobile phone card number and owner are identical;If it is, directly start shooting;Otherwise, perform
Step C;
C, the short message of hand-set from stolen is sent to the cell-phone number of setting;
D, when receiving the short message for requiring mobile phone self-destruction, control mobile phone enters self-destruction pattern, sets flag bit automatically, indicates mobile phone
It is stolen, and automatic shutdown;
The step D is specifically included:
When D1, mobile phone receive short message, the short message is intercepted;
D2, the parsing short message, and judge whether short message content requires handset starting self-destroying function;If it is, perform step
D3;Otherwise, step D4 is performed;
D3, start mobile phone self-destruction pattern, flag bit is set automatically, indicate hand-set from stolen, and make mobile phone shutdown;
D4, according to the demand of short message content perform corresponding function;
After the step D3, described method further comprises:After mobile phone shutdown, control mobile phone can not start shooting again;
Before the step C, described method also includes:Cell-phone number or the mailbox of short message are received after setting hand-set from stolen
Location;
The flag bit is used for, and manufacturer is judged current phone by the flag bit for stolen mobile phone, refusal upgrading
Software;
The self-destruction pattern is, it is necessary to user pre-sets password, only in password authentification by rear, can just be turned on or off from
Ruin function.
2. the mobile phone of self-destroying function is realized during a kind of hand-set from stolen, it is characterised in that including:
Mobile phone card number acquisition module, for obtaining current mobile phone card number;
Identification module, for judging whether the mobile phone card number of current mobile phone card number and owner is identical;
Short message transmitting-receiving module, for sending the short message of hand-set from stolen to the cell-phone number of setting, and receive and require mobile phone self-destruction
Short message;
Self-destruction module, for controlling mobile phone to enter self-destruction pattern, and control mobile phone automatic shutdown;
Self-destruction setup module, for opening or closing the function of self-destruction module;When setting the function of the self-destruction module, need
Want user that password is set, only in password authentification by rear, can just be turned on or off the function of self-destruction module;
Setup module, for when mobile phone enters self-destruction pattern, setting flag bit automatically, indicate hand-set from stolen;
Also include:
Blocking module, the short message received for intercepting mobile phone;
Parsing module, the short message is parsed, and judge whether the content of short message requires handset starting self-destroying function;
The setup module is additionally operable to the cell-phone number or email address of reception short message after setting hand-set from stolen;
The self-destruction module is additionally operable to after mobile phone shutdown, and control mobile phone can not start shooting again;
The flag bit is used for, and manufacturer is judged current phone by the flag bit for stolen mobile phone, refusal upgrading
Software.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110339753.1A CN102438221B (en) | 2011-11-01 | 2011-11-01 | The method of self-destruction mobile phone and the mobile phone of self-destroying function is realized during hand-set from stolen |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110339753.1A CN102438221B (en) | 2011-11-01 | 2011-11-01 | The method of self-destruction mobile phone and the mobile phone of self-destroying function is realized during hand-set from stolen |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102438221A CN102438221A (en) | 2012-05-02 |
CN102438221B true CN102438221B (en) | 2018-03-20 |
Family
ID=45986058
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201110339753.1A Active CN102438221B (en) | 2011-11-01 | 2011-11-01 | The method of self-destruction mobile phone and the mobile phone of self-destroying function is realized during hand-set from stolen |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102438221B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5705203B2 (en) | 2012-12-28 | 2015-04-22 | キヤノン株式会社 | COMMUNICATION DEVICE, COMMUNICATION TERMINAL, ITS CONTROL METHOD, PROGRAM |
CN106791130A (en) * | 2016-12-28 | 2017-05-31 | 宇龙计算机通信科技(深圳)有限公司 | Self-destruction processing method and terminal after a kind of terminal robber |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1694548A (en) * | 2004-05-11 | 2005-11-09 | 天时达中科电子(深圳)有限公司 | Method for preventing burglarious of mobile phone and anti-theft mobile phone |
CN1710976A (en) * | 2005-06-23 | 2005-12-21 | 上海贝豪通讯电子有限公司 | Method for preventing hand-set from stolen |
CN101083816A (en) * | 2007-07-30 | 2007-12-05 | 中兴通讯股份有限公司 | Wireless terminal and method for mutual locking and unlocking with user recognition card |
CN101287234A (en) * | 2008-05-26 | 2008-10-15 | 德信无线通讯科技(北京)有限公司 | Anti-theft method and device for mobile communication terminal |
CN101448261A (en) * | 2008-12-26 | 2009-06-03 | 深圳华为通信技术有限公司 | Method for locking mobile terminal with user identification card, equipment and system |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2842059B1 (en) * | 2002-07-04 | 2004-12-24 | Cit Alcatel | METHOD FOR LOCKING A MOBILE TELECOMMUNICATION TERMINAL |
-
2011
- 2011-11-01 CN CN201110339753.1A patent/CN102438221B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1694548A (en) * | 2004-05-11 | 2005-11-09 | 天时达中科电子(深圳)有限公司 | Method for preventing burglarious of mobile phone and anti-theft mobile phone |
CN1710976A (en) * | 2005-06-23 | 2005-12-21 | 上海贝豪通讯电子有限公司 | Method for preventing hand-set from stolen |
CN101083816A (en) * | 2007-07-30 | 2007-12-05 | 中兴通讯股份有限公司 | Wireless terminal and method for mutual locking and unlocking with user recognition card |
CN101287234A (en) * | 2008-05-26 | 2008-10-15 | 德信无线通讯科技(北京)有限公司 | Anti-theft method and device for mobile communication terminal |
CN101448261A (en) * | 2008-12-26 | 2009-06-03 | 深圳华为通信技术有限公司 | Method for locking mobile terminal with user identification card, equipment and system |
Also Published As
Publication number | Publication date |
---|---|
CN102438221A (en) | 2012-05-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2016082483A1 (en) | Pseudo base station discrimination method and apparatus | |
WO2016000636A1 (en) | Communications processing method and system | |
US20110077033A1 (en) | Method for automatically responding to mobile phone short messages | |
CN105812550A (en) | Voice call anti-interference method, voice call anti-interference device and terminal | |
CN102780813A (en) | Mobile terminal-based alarm method and system | |
CN101163290A (en) | Method of limiting use of mobile terminal through machine-card mutual authentication | |
CN103619020A (en) | Mobile payment security system for wireless data private network physical isolation internet | |
CN101212241A (en) | Wireless head-band earphone operating method | |
CN104506711A (en) | Communication information processing method and device for terminal | |
WO2012092728A1 (en) | Short message processing method and terminal | |
CN104580652B (en) | Mobile terminal and its session authentication method based on DTMF | |
CN102438221B (en) | The method of self-destruction mobile phone and the mobile phone of self-destroying function is realized during hand-set from stolen | |
CN103491515B (en) | A kind of international roaming service is closed based reminding method, device and mobile terminal | |
CN104168546B (en) | Automatic answering device and auto-answer method | |
WO2017020598A1 (en) | Contact information management method, apparatus and terminal | |
CN101854608A (en) | Remote power-off method of mobile phones | |
CN106791130A (en) | Self-destruction processing method and terminal after a kind of terminal robber | |
CN201860458U (en) | Device for keeping cellphone number under communication state | |
CN101163289A (en) | Method of limiting use region of mobile terminal | |
US20090247143A1 (en) | Mobile phone, and method of limiting operations of mobile phone | |
CN107153790A (en) | Mobile terminal safety means of defence, device and mobile terminal | |
CN105046779A (en) | Multifunctional door controlling method based on short message | |
CN104954556A (en) | Message prompting method and device | |
WO2011134200A1 (en) | Method for locking cell and subscriber identity module card thereof | |
WO2016011614A1 (en) | Method and device for blocking harassment number |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20190313 Address after: 644000 Sichuan Yibin Port-Lingang Economic and Technological Development Zone Patentee after: Sichuan Kangjia Intelligent Terminal Technology Co., Ltd. Address before: 518053 Overseas Chinese Town, Nanshan District, Shenzhen City, Guangdong Province Patentee before: Konka Group Co., Ltd. |
|
TR01 | Transfer of patent right |