CN102447777A - Operation method of mobile phone - Google Patents
Operation method of mobile phone Download PDFInfo
- Publication number
- CN102447777A CN102447777A CN2010105042089A CN201010504208A CN102447777A CN 102447777 A CN102447777 A CN 102447777A CN 2010105042089 A CN2010105042089 A CN 2010105042089A CN 201010504208 A CN201010504208 A CN 201010504208A CN 102447777 A CN102447777 A CN 102447777A
- Authority
- CN
- China
- Prior art keywords
- mobile phone
- webpage
- user
- keyword
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Telephonic Communication Services (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention provides an operation method of a mobile phone. The method comprises the following steps of setting a keyword, a destination webpage and certification time on the mobile phone through a user interface; connecting the mobile phone with the destination webpage through a network and reading special field information from the destination webpage; and authenticating the special field information and the keyword by the mobile phone to identify whether to execute a specific motion. With the adoption of the method provided by the invention, when the mobile phone of a user is lost, assistance of other persons or telecommunication workers is not required for treating subsequent matters about the lost matter, and an additionally installed server is not required as well, so that the convenience and the flexibility of the user on operating the mobile phone can be greatly improved.
Description
Technical field
The present invention relates to a kind of mobile phone method of operation, and be particularly related to a kind of mobile phone method of operation of using network.
Background technology
Mobile phone is one of most important invention in recent years, and along with the popularity rate through mobile phone of time also increases day by day, everybody has the mobile phone more than even two on hand.And along with the progress of science and technology; The function of mobile phone is also more and more; For example be to take pictures, surf the Net, receive and dispatch note, vision signal and listen to the music or the like; Therefore in the mobile phone itself many personal informations about user itself are arranged, just in case loss or by person who is ambitious or tenacious of purpose deathwatch, just can let user's personal information partly let out because of carelessness.Very person, as stranger's free call on somebody else's expense through illegal means of finding or stealing mobile phone, extra especially increase user's loss.The unit price of some mobile phone is higher in addition, for example similarly is intelligent mobile phone, is had the inclination personage deathwatch more easily.Therefore develop mobile phone loss or stolen after processing method, avoiding by other people free call on sb. else's expense through illegal means mobile phone or to steal the situation that the data in the mobile phone cause pecuniary loss of user or data to leak, real direction of making great efforts for the dealer that is correlated with.
Summary of the invention
Technical problem to be solved by this invention is, a kind of mobile phone method of operation is provided, and uses network to come the mobile phone method of operation of authentication.
According to an aspect of the present invention, propose a kind of mobile phone method of operation, comprise through user's interface setting one keyword, a purpose webpage and an authenticated time in mobile phone.Mobile phone is connected to the purpose webpage and reads a specific fields information from the purpose webpage through a network at authenticated time.Mobile phone carries out authentication to judge whether to carry out a specific action with specific fields information and keyword.
Effect of the present invention is that the user needn't handle the follow-up matters of loss through other people or telecommunications dealer's assistance when mobile phone loss, also do not need in addition frame server again, can significantly promote operational convenience of user and elasticity.
Describe the present invention below in conjunction with accompanying drawing and specific embodiment, but not as to qualification of the present invention.
Description of drawings
Fig. 1 is the flow chart of the mobile phone method of operation of preferred embodiment of the present invention;
Fig. 2 is the flow chart of the mobile phone method of operation of first embodiment of the invention;
Fig. 3 is the flow chart of the mobile phone method of operation of second embodiment of the invention.
Embodiment
Below in conjunction with accompanying drawing structural principle of the present invention and operation principle are done concrete description:
The present invention provides a kind of mobile phone method of operation, and the use network comes authentication and judges whether to carry out the mobile phone method of operation of a specific action.
Please with reference to Fig. 1, it illustrates the flow chart according to the mobile phone method of operation of preferred embodiment of the present invention.In step S101, set a keyword (keyword), a purpose webpage and an authenticated time in mobile phone through a user interface (user interface).In step S102, mobile phone is connected to the purpose webpage at authenticated time through a network, and reads a specific fields information from the purpose webpage.In step S103, mobile phone carries out authentication to judge whether to carry out a specific action with specific fields information and keyword.Thus, the user can not need pass through third party or telecommunications dealer, just can control the state of mobile phone voluntarily by network, significantly promotes user's convenience and elasticity.
Illustrate further, in step S101, the user interface can be in mobile phone, and the user can pass through user's interface setting keyword, purpose webpage and authenticated time in mobile phone.The keyword that the user sets has only user itself to know, and the keyword of setting can have two groups, and whether one group be used for the authentication mobile phone and lose, and whether one group be used for the authentication mobile phone and give for change.Certainly, according to user's demand, the keyword that also can increase other group newly is to be used for carrying out other specific action or function.In addition; The user can set the purpose webpage; Make the mobile phone can be via network terminal in this purpose webpage reading of data, the purpose webpage can be a community webpage or a net annal webpage or other any website of grasping public information, for example is Facebook, Plurk, Twitter or wretch etc.The user also can set authenticated time, and this authenticated time one arrives, and mobile phone is just linked the purpose webpage through network.Authenticated time can be a special time or a special period, for example authenticated time can be set at the point in mornings 8 of every day, when starting shooting or every carried out authentication at a distance from 12 hours at every turn.If be not connected to the purpose webpage through network at authenticated time, then mobile phone continues to wait for up to being connected to the purpose webpage through network and reading specific fields information for carrying out authentication.
In step S102, mobile phone through a network, for example is to connect to network with the mode of 3G or WiFi at authenticated time, is connected to the purpose webpage and reads a specific fields information from the purpose webpage.Wherein, the source of specific fields information can be public information any on the network, particularly the information on community webpage or the net annal webpage.More detailed explanation; Specific fields information can be the title (title) of user's data (user information), user's state (user status) or net annal article, for example is user's data or the net annal article title of wretch on the Facebook.In addition, the network traffics that these specific fields information need be transmitted seldom can not cause the burden in mobile phone and the user's use.
In step S103, mobile phone carries out authentication to judge whether to carry out a specific action with specific fields information and keyword.Mobile phone can be compared keyword and specific fields information in order to carry out authentication, to judge whether to carry out specific action.Certainly, the user can set not on the same group keyword with corresponding to similar and different specific fields information, after the comparison authentication in order to carry out specific action.Thus, just can on mobile phone, design different keywords according to user's demand with corresponding different functions.Below enumerate respectively to lose and give two kinds of various embodiment of mobile phone for change and describe.
First embodiment
Lose mobile phone please with reference to Fig. 2, it illustrates the flow chart according to the mobile phone method of operation of first embodiment of the invention.Step S201 and step S202 are identical with step S101 and step S102 respectively, therefore will not give unnecessary details.Especially, the keyword that sets in the present embodiment is for when the mobile phone loss, and the content that lets the user can revise specific fields information makes itself and keyword comparison, impels authentification failure and then pins function of cellular phone.
Illustrate further, in step S203, carry out authentication and confirm that just whether authentication is successful, carries out specific action to judge mobile phone whether to lose.For instance, the user on mobile phone, to set one group of keyword be ' loss '.In addition, the purpose webpage of setting is the A webpage.And set be connected to the A webpage after, read the specific fields information in the A webpage.Specific fields information in the A webpage can be an information content or a message content of sending with user's number of the account.Set the title that specific fields information is the A webpage here, and setting webpage initial title is ' well '.Certainly, initial setting can be any character here, gets final product so long as not ' loss '.
Mobile phone can be connected to the A webpage and read title from the A webpage at authenticated time through network, carries out authentication in order to the keyword of setting on the comparison mobile phone.In the present embodiment, whether the comparison mode is identical for confirming the title that reads on keyword and the A webpage, if identical then for comparison meets, on the contrary, does not then meet for comparison as if incomplete same.Before mobile phone loss, the user can not remove to revise the title on the A webpage especially.Therefore, different through the keyword ' loss ' that network is set on ' well ' that read on the A webpage and mobile phone, cause comparison not meet, be judged as authentication success.Next like step S204, the specific action of execution is a state of keeping mobile phone.In the present embodiment, the state of keeping mobile phone is just kept the function of use of mobile phone for normal.
On the other hand, when mobile phone loss, the user is ' loss ' through the title of network change A webpage.At this moment; When mobile phone is connected to the A webpage through network and when the A webpage reads title at authenticated time; The keyword of setting on the comparison mobile phone is to carry out authentication; The keyword of setting on title ' loss ' on the discovery A webpage and the mobile phone ' loss ' is identical, so comparison meets, is judged as authentification failure.Behind the authentification failure, like step S205, the specific action of execution is for pinning function of cellular phone.Thus; When user one finds mobile phone loss; The content of the interface modification specific fields information that searching one can be surfed the Net; Make its with mobile phone in the keyword set identical, can carry out the function of authentication finger lock mobile phone at mobile phone, further can prevent intentionally personage's free call on sb. else's expense through illegal means or steal the data in the mobile phone.And on setting, only need the user voluntarily through network amendment, the function that can pin mobile phone, very convenient.
Second embodiment
Give mobile phone for change please with reference to Fig. 3, it illustrates the flow chart according to the mobile phone method of operation of second embodiment of the invention.Step S301 and step S302 are identical with step S101 and step S102 respectively, therefore will not give unnecessary details.Especially, the keyword that sets in the present embodiment is for when the mobile phone of losing is given for change, and the content of revising specific fields information is compared itself and keyword, impels authentication success and then recovers function of cellular phone.
Illustrate further, in step S303, carry out authentication and confirm that just whether authentication is successful, carries out specific action to judge mobile phone whether to give for change.For instance, suppose that user's mobile phone is lost, and the user has utilized someway function of cellular phone has been pinned.If the mobile phone of losing is in the near future given for change, the user is a network recovery function of cellular phone capable of using.For example, the user on mobile phone, to set one group of keyword be ' giving for change '.In addition, the purpose webpage of setting is the A webpage.And set be connected to the A webpage after, read the specific fields information in the A webpage, set the title that specific fields information is the A webpage here.Certainly, according to user's preference, this purpose webpage also can for example be set at the B webpage, and specific fields information for example is the title of B webpage.
After giving mobile phone for change, the title that the user revises the A webpage is ' giving for change '.At this moment, when mobile phone is connected to the A webpage through network and when the A webpage read title, perhaps the user can carry out authentication function immediately at authenticated time, in order to the title that reads on the keyword set on the comparison mobile phone and the A webpage to carry out authentication.In the present embodiment, whether the comparison mode is identical for confirming the title that reads on keyword and the A webpage, if identical then for comparison meets, on the contrary, does not then meet for comparison as if incomplete same.Comparison back find the title on the A webpage ' give for change ' with mobile phone on the keyword set ' give for change ' identically, so comparison meets, be judged as authentication success.Behind the authentication success, like step S304, the specific action of execution is for recovering function of cellular phone.
Certainly, if do not give mobile phone for change, the title that the user can not go to revise the A webpage is ' giving for change ', so can produce the incongruent result of comparison during comparison.In the present embodiment, comparison does not meet and promptly is judged as authentification failure.Like step S305, behind the authentification failure, the specific action of execution is a state of keeping mobile phone, and the state of keeping mobile phone here is and continues to pin function of cellular phone.Thus, the user does not need can remove the state that mobile phone is lockable voluntarily through the third party.And the people who finds or steal mobile phone ' gives for change ' because of the keyword of not knowing to recover function of cellular phone and the purpose webpage is the A webpage, can't unscrupulous use mobile phone.
Certainly; Know that mobile phone has the people of this keyword, purpose website and authenticated time set-up function; Can before mobile phone connects to network, just alter the content of these a little projects earlier, the keyword, purpose website or the authenticated time that let the user set for the risk of taking precautions against mobile phone loss originally can't be brought into play function.For fear of so facts generation, before also setting will be revised keyword, purpose webpage or authenticated time, mobile phone can carry out the action of an authentication earlier, the action that just can make amendment and set after the success to be certified.
Carry out authentication by apodictic before revising, can avoid the people who finds or steal mobile phone during mobile phone is started shooting the mobile phone online, to revise keyword, purpose webpage or authenticated time.Further; If the user is when finding that mobile phone loses; Just with the content modification of specific fields information become with mobile phone in the relevant keyword of loss; The people that also can make desire revise keyword, purpose webpage or authenticated time carries out authentication when desire is revised this a little project, cause the function of mobile phone to be lockable, and the mobile theft that ensures the user is beaten or the risk of the data that are stolen.
The method of above-mentioned explanation lets the user when mobile phone loss, needn't handle the follow-up matters of loss through other people or telecommunications dealer's assistance, does not also need in addition frame server again, can significantly promote operational convenience of user and elasticity.And the method for above-mentioned explanation; Need not pass through User Recognition model (Subscriber Identity Model; SIM) card can directly be controlled the function of mobile phone through network; Avoid losing and taken away the User Recognition model behind the mobile phone (Subscriber Identity Model, SIM) card just can't be controlled the situation of mobile phone.And not through User Recognition model (Subscriber Identity Model; SIM) card; The information that also can avoid the transmission of other people's malice can cause mobile phone to pin, or other people is transferred to the information relevant with pinning mobile phone because of carelessness unintentionally, causes the user inconvenient.And the mode through network, because keyword and purpose webpage all only have the user to know, so significantly reduced by the probability of the pinning function of cellular phone of person who is ambitious or tenacious of purpose's malice.
Certainly; The present invention also can have other various embodiments; Under the situation that does not deviate from spirit of the present invention and essence thereof; Those of ordinary skill in the art work as can make various corresponding changes and distortion according to the present invention, but these corresponding changes and distortion all should belong to the protection range of the appended claim of the present invention.
Claims (8)
1. a mobile phone method of operation is characterized in that, comprising:
Through user's interface setting one keyword, a purpose webpage and an authenticated time in this mobile phone;
This mobile phone is connected to this purpose webpage and reads a specific fields information from this purpose webpage through a network at this authenticated time; And
This mobile phone carries out authentication to judge whether to carry out a specific action with this specific fields information and this keyword.
2. method according to claim 1 is characterized in that, is carrying out authentication to judge whether to carry out in the step of this specific action; When authentication success; This specific action is for keeping this function of cellular phone, and when authentification failure, this specific action is for pinning the state of this mobile phone.
3. method according to claim 1 is characterized in that, is carrying out authentication to judge whether to carry out in the step of this specific action; When authentication success; This specific action is for recovering this function of cellular phone, and when authentification failure, this specific action is a state of keeping this mobile phone.
4. method according to claim 1 is characterized in that, this purpose webpage is a community webpage or a net annal webpage.
5. method according to claim 1, it is characterized in that revising this keyword, this purpose webpage or this authenticated time before, this mobile phone can carry out the action of an authentication earlier, the action that just can make amendment after the success to be certified and set.
6. method according to claim 1 is characterized in that, this authenticated time is a special time or a special period.
7. method according to claim 1; It is characterized in that; If be not connected to this purpose webpage through this network at this authenticated time, then this mobile phone continues to wait for up to being connected to this purpose webpage through this network and reading this specific fields information for carrying out authentication.
8. method according to claim 1 is characterized in that, this specific fields information is the title of user's data, user's state or net annal article.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010105042089A CN102447777A (en) | 2010-10-08 | 2010-10-08 | Operation method of mobile phone |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010105042089A CN102447777A (en) | 2010-10-08 | 2010-10-08 | Operation method of mobile phone |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102447777A true CN102447777A (en) | 2012-05-09 |
Family
ID=46009853
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2010105042089A Pending CN102447777A (en) | 2010-10-08 | 2010-10-08 | Operation method of mobile phone |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102447777A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5987609A (en) * | 1996-10-03 | 1999-11-16 | Kabushiki Kaisha Toshiba | System for remotely securing/locking a stolen wireless device via an Email message |
CN1541015A (en) * | 2003-10-31 | 2004-10-27 | 大唐微电子技术有限公司 | Method and system of preventing handset from theft by using international id code of mobile facilities |
CN1805372A (en) * | 2005-12-30 | 2006-07-19 | 赵颜 | Method for providing device and data security service for wireless mobile terminal users |
CN101043466A (en) * | 2006-03-21 | 2007-09-26 | 宏碁股份有限公司 | Information pickup method and hand-hold mobile communication device using the same |
CN101720072A (en) * | 2009-12-10 | 2010-06-02 | 候万春 | System and method for realizing antitheft of mobile phone |
-
2010
- 2010-10-08 CN CN2010105042089A patent/CN102447777A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5987609A (en) * | 1996-10-03 | 1999-11-16 | Kabushiki Kaisha Toshiba | System for remotely securing/locking a stolen wireless device via an Email message |
CN1541015A (en) * | 2003-10-31 | 2004-10-27 | 大唐微电子技术有限公司 | Method and system of preventing handset from theft by using international id code of mobile facilities |
CN1805372A (en) * | 2005-12-30 | 2006-07-19 | 赵颜 | Method for providing device and data security service for wireless mobile terminal users |
CN101043466A (en) * | 2006-03-21 | 2007-09-26 | 宏碁股份有限公司 | Information pickup method and hand-hold mobile communication device using the same |
CN101720072A (en) * | 2009-12-10 | 2010-06-02 | 候万春 | System and method for realizing antitheft of mobile phone |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8832815B2 (en) | Accessory based data distribution | |
CN100391282C (en) | Method for locking mobile telecommunication terminal | |
CN102880560A (en) | User privacy data protection method and mobile terminal using user privacy data protection method | |
WO2013000150A1 (en) | Method, apparatus and computer program product for retrieval of lost or forgotten passwords | |
CN103064515A (en) | Method and device capable of achieving fast entering function based on fingerprint recognition | |
CN104901805B (en) | A kind of identification authentication methods, devices and systems | |
CN100407831C (en) | Method of intelligent mobile terminal user staged managing | |
WO2012155620A1 (en) | Method and mobile communication terminal for protecting near field communication security | |
CN101155212A (en) | Method for limiting use of mobile terminal | |
CN101163290A (en) | Method of limiting use of mobile terminal through machine-card mutual authentication | |
US8364793B2 (en) | Communication terminal, user data transferring system and user data transferring method | |
CN102393805A (en) | Operating method of terminal screen lock interface, and device and terminal | |
CN102984388A (en) | Smart phone with fingerprint identification function | |
CN108235293A (en) | Business card interaction method and device and intelligent terminal | |
CN107133500A (en) | The encryption method and mobile terminal of a kind of application program | |
CN109635531A (en) | It is a kind of using identity information certification as the information authentication method of carrier and device | |
CN103369456A (en) | Mobile phone antitheft system and method thereof | |
CN111669744A (en) | Information processing method and device and electronic equipment | |
CN102231776B (en) | Method, mobile terminals and system for equipment matching among mobile terminals | |
CN103619053A (en) | Method for using user identification cards and communication system | |
JP2003530630A (en) | Electronic financial transaction systems and processes | |
KR20080030723A (en) | Methods for performing credit card associated service using communication terminal | |
TW200840305A (en) | Account security system with communication mechanism | |
CN101370052A (en) | Multi-reminding tone implementing method based on NFC and mobile terminal | |
CN102447777A (en) | Operation method of mobile phone |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20120509 |