CN102509033A - Processing method of communication terminal after being stolen and communication terminal - Google Patents

Processing method of communication terminal after being stolen and communication terminal Download PDF

Info

Publication number
CN102509033A
CN102509033A CN201110287877XA CN201110287877A CN102509033A CN 102509033 A CN102509033 A CN 102509033A CN 201110287877X A CN201110287877X A CN 201110287877XA CN 201110287877 A CN201110287877 A CN 201110287877A CN 102509033 A CN102509033 A CN 102509033A
Authority
CN
China
Prior art keywords
communication terminal
server
processing instruction
disposal route
video
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201110287877XA
Other languages
Chinese (zh)
Inventor
李治国
郭晓涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201110287877XA priority Critical patent/CN102509033A/en
Publication of CN102509033A publication Critical patent/CN102509033A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Studio Devices (AREA)

Abstract

The invention is suitable for the technical field of communication and provides a processing method of a communication terminal after being stolen and the communication terminal. The processing method comprises the following steps of: sending an anti-theft processing command to the communication terminal through a server; and carrying out messy code processing on data in the communication terminal by the communication terminal according to the anti-theft processing command. Therefore, after the communication terminal disclosed by the invention is stolen, when other people read the data of the communication terminal, the data is displayed in a messy code state, then the other people can be further prevented from illegally viewing or using private information of a user and safety of the information of the user can be effectively protected. In a better way, the communication terminal can automatically acquire physiological information of a suspected object according to the anti-theft processing command and uploads the physiological information of the suspected object to the server, so that possibility of getting the stolen communication terminal back by the user is increased.

Description

Disposal route after a kind of communication terminal is stolen and communication terminal
Technical field
The present invention relates to communication technical field, relate in particular to disposal route and the communication terminal of a kind of communication terminal after stolen.
Background technology
At present; After communication terminals such as user's mobile phone are lost, generally can be through server to communication losses terminal transmits information delete instruction, so that the user profile in the communication terminal is deleted; After avoiding other people illegally to obtain user's personal information, cause bigger infringement or hidden danger to the user.But prior art can not be obtained thief's physiologic informations such as figure and features characteristic, and this does not utilize the police to solve a case very much yet; If simultaneously with data Delete All in the communication terminal, when lost and found again as if the original subscriber, data all disappear.
Can know that to sum up the treatment technology after the existing communication terminal is stolen obviously exists inconvenience and defective, so be necessary to improve on reality is used.
Summary of the invention
To above-mentioned defective, disposal route and communication terminal after the object of the present invention is to provide a kind of communication terminal stolen, it can avoid other people illegally to check or use user's personal information, thereby has effectively protected the safety of user profile.
To achieve these goals, the disposal route after the present invention provides a kind of communication terminal stolen the treating method comprises:
Send the antitheft processing instruction through server to said communication terminal;
Said communication terminal carries out mess code with the data in the said communication terminal and handles according to said antitheft processing instruction.
According to disposal route of the present invention, saidly data in the communication terminal carried out the mess code processed steps comprise:
Through nonlinear function the data in the database of said communication terminal being carried out mess code handles.
According to disposal route of the present invention, also comprise before the said step of sending the antitheft processing instruction through server to said communication terminal:
Said communication terminal is provided with the antitheft business model in advance, to set up the interface channel between said server and the said communication terminal.
According to disposal route of the present invention, saidly further comprise to the step that said communication terminal sends the antitheft processing instruction through server:
Judge between said server and the said communication terminal and whether be in connection status;
If be in connection status, then said server sends said antitheft processing instruction to said communication terminal;
If be not in connection status, then said server regularly inquire about and said communication terminal between whether recover connection status, if recover connection status then send said antitheft processing instruction to said communication terminal.
According to disposal route of the present invention, said communication terminal carries out the mess code processed steps with the data in the said communication terminal and further comprises according to said antitheft processing instruction:
Automatically obtain the physiologic information of suspicion object;
Said communication terminal is uploaded to said server with the physiologic information of said suspicion object.
According to disposal route of the present invention, the said step of obtaining the physiologic information of suspicion object automatically comprises: automatic shooting generates picture or video;
Said communication terminal comprises the step that the physiologic information of said suspicion object is uploaded to said server:
Said communication terminal is uploaded to said server with said picture or video.
According to disposal route of the present invention, the step that said automatic shooting generates picture or video comprises:
Generate said picture or video with the silent mode automatic shooting;
Start preposition camera and/or rearmounted camera, automatic shooting generates said picture or video;
Automatic shooting generates said picture or video at interval on schedule; And/or
When said communication terminal was operated, automatic shooting generated said picture or video.
According to disposal route of the present invention, the said step of obtaining the physiologic information of suspicion object automatically also comprises:
Said communication terminal obtains the finger print information on the said communication terminal automatically according to said antitheft processing instruction;
Said communication terminal comprises the step that the physiologic information of said suspicion object is uploaded to said server:
Said communication terminal is uploaded to said server with said finger print information.
According to disposal route of the present invention, the step of the finger print information on the said automatic obtaining communication terminal comprises:
When said communication terminal is operated, obtain finger print information newly-increased on the said communication terminal automatically.
The present invention also provides a kind of communication terminal of realizing the disposal route of said communication terminal after stolen, and said communication terminal comprises:
The command reception module is used for the antitheft processing instruction that reception server is sent;
Message processing module is used for according to said antitheft processing instruction, the data in the said communication terminal is carried out mess code handle.
After stolen communication terminal of the present invention receives the antitheft processing instruction, can carry out mess code to the data in the communication terminal and handle, avoid other people illegally to check or use user's personal information, protect the safety of user profile conscientiously; If the user can give stolen communication terminal for change in the future, can also the data that said mess code is handled be recovered, avoid user profile to be deleted or destroy, thereby guaranteed completeness of user information.Preferably; Stolen terminal can obtain the physiologic information of suspicion object automatically according to the antitheft processing instruction that server is sent; For example the communication terminal automatic shooting generates image or video, obtains finger print information etc. automatically, and the physiologic information of the suspicion object that is obtained is uploaded to server automatically; The user can obtain the physiologic information of said suspicion object through server like this; And in time report to the police, thereby the possibility that the user gives stolen communication terminal for change, the security that has improved communication terminal have been increased as evidence.
Description of drawings
Fig. 1 is the structural representation of communication terminal of the present invention;
Fig. 2 is the structural representation of the preferred communication terminal of the present invention;
Fig. 3 is the structural representation of the disposal system of communication terminal of the present invention after stolen;
Fig. 4 is the process flow diagram of the disposal route of communication terminal of the present invention after stolen;
Fig. 5 is the process flow diagram of the disposal route of the preferred communication terminal of the present invention after stolen; And
Fig. 6 is the preferred flow charts that the present invention obtains the physiologic information step of suspicion object automatically.
Embodiment
In order to make the object of the invention, technical scheme and advantage clearer,, the present invention is further elaborated below in conjunction with accompanying drawing and embodiment.Should be appreciated that specific embodiment described herein only in order to explanation the present invention, and be not used in qualification the present invention.
Fig. 1 shows the structure of communication terminal of the present invention, and said communication terminal 100 can be mobile phone, PDA (Personal Digital Assistant, personal digital assistant), palm PC etc., comprises command reception module 10 and message processing module 20 at least, wherein:
Command reception module 10 is used for the antitheft processing instruction that reception server 200 is sent.After user's communications terminal 100 is stolen, can operate through clients such as web (webpage) client or PC (computer) clients, request server 200 sends said antitheft processing instruction to stolen communication terminal 100.
Message processing module 20; Be used for the antitheft processing instruction sent according to server 200; According to pre-defined rule the data in the communication terminal 100 being carried out mess code handles; Other people will be shown as the mess code state when reading the data of communication terminal 100 like this, illegally check or use user's personal information to avoid other people.Preferably, mess code processing module 40 is carried out mess code through nonlinear function to the data in the database of communication terminal 100 and is handled on the database aspect, and said nonlinear function can be a sin cos functions etc.If the user can give stolen communication terminal 100 for change in the future, mess code processing module 40 can also be recovered the data that said mess code is handled, and the user can normally check again and use said data, thereby guarantee completeness of user information.
Fig. 2 is the structural representation of the preferred communication terminal of the present invention, and said communication terminal 100 comprises command reception module 10, message processing module 20, information uploading module 30 and operation induction module 40, wherein:
Command reception module 10 is used for the antitheft processing instruction that reception server 200 is sent.After communication terminal 100 was stolen, the user can operate through various clients, and request server 200 sends said antitheft processing instruction and gives communication terminal 100.
Message processing module 20 comprises that further mess code processing sub 21 and information obtains submodule 22:
Mess code processing sub 21 is used for the antitheft processing instruction sent according to server 200, according to pre-defined rule the data in the communication terminal 100 is carried out mess code and handles.Preferably, mess code processing module 40 is carried out mess code through nonlinear function to the data in the database of communication terminal 100 and is handled on the database aspect, and said nonlinear function can be a sin cos functions etc.
Information is obtained submodule 22, is used for obtaining the physiologic information of suspicion object automatically according to said antitheft processing instruction.For example, after communication terminal 100 was stolen, information was obtained submodule 22 automatic shootings and is generated image or videos, has probably comprised the physiologic information of the figure and features characteristic of suspicion object in this image or the video; Perhaps, information is obtained the finger print information on the submodule 22 automatic obtaining communication terminals 100, and this finger print information probably is the fingerprint characteristic that the suspicion object stays.In case obtain the physiological characteristic of suspicion object, just can effectively clue and evidence be provided directly for the later stage solving criminal cases.Certainly, the physiologic information of said suspicion object can also comprise sound, DNA physiologic informations such as (Deoxyribonucleic acid, DNAs) that any information is obtained submodule 22 and can be obtained except comprising above-mentioned figure and features characteristic, finger print information.
Information is obtained submodule 22 and is preferably included and take submodule 221 and obtain submodule 222 with fingerprint:
Take submodule 221, be used for according to said antitheft processing instruction, automatic shooting generates picture or video, because this image or video are taken in communication terminal 100 stolen backs, has therefore probably comprised the figure and features characteristic of suspicion object.Preferably, take submodule 221 and generate picture or video, be not easy like this to be discovered by the suspicion object with the silent mode automatic shooting.Perhaps, take submodule 221 and automatically snap generation picture or video on schedule at interval, for example whenever took a film,fault at a distance from 2 minutes; Or, take preposition camera and/or rearmounted camera that submodule 221 starts communication terminal 100, automatic shooting generates picture or video.The photo that preposition camera is taken very likely photographs the head portrait of suspicion object, and rearmounted camera can photograph stolen communication terminal 100 present located environment, for giving for change of communication terminal 100 given a clue.
Fingerprint obtains submodule 222, is used for according to said antitheft processing instruction, automatically the finger print information on the obtaining communication terminal 100.Because this finger print information obtains after communication terminal 100 is stolen, so this finger print information probably is that the suspicion object stays.Fingerprint obtains submodule 222 and can adopt existing fingerprint collecting unit to realize; Example and this fingerprint obtain submodule 222 can be located at the screen of communication terminal 100, keyboard or other positions, and fingerprint obtains submodule 222 and gathers the finger print information that stays on screen or the keyboard.
Information uploading module 30, the physiologic information that is used for information is obtained the suspicion object that submodule 22 obtains is uploaded to server 200.Comprise shot picture or video are uploaded to server 200, perhaps the finger print information on the communication terminal that is obtained 100 is uploaded to server 200.Next; The user can operate through client; From server 200, obtain the physiologic information of the suspicion object of uploading by stolen communication terminal 100, and in time report to the police, thereby improved the possibility that the user gives stolen communication terminal 100 for change greatly as evidence.
Operation induction module 40 is used for after receiving the antitheft processing instruction that command reception module 10 transmits, and whether inductive communication terminal 100 is operated, and announcement information obtains the physiologic information that submodule 22 obtains the suspicion object if operated then.Deposit in the somewhere owing to possibly hide after after communication terminal 100 is stolen always, information is obtained the physiologic information that submodule 22 is difficult to obtain the suspicion object at this moment.When in case the suspicion object begins operation communication terminal 100; Be the best chance of obtaining the physiologic information of suspicion object at this moment; After operation induction module 40 senses communication terminal 100 quilt operations; Announcement information obtains submodule 22 work immediately, thereby can obtain the physiologic information of authentic and valid suspicion object.For example, when sensing communication terminal 100 by operation, take submodule 221 automatic shootings and generate picture or video, this picture or video will comprise the figure and features characteristic of suspicion object; Perhaps, when sensing communication terminal 100 by operation, fingerprint obtains finger print information newly-increased on the submodule 222 automatic obtaining communication terminals 100, and can confirm that basically this newly-increased finger print information is the finger print information of suspicion object.Said operation induction module 40 can adopt communication terminal 100 existing screen/keyboard sensing units, and for example, in case screen/keyboard sensing units sense arrives operational order, will think has people's operation communication terminal 100.Certainly, operation induction module 40 also can adopt other sensing apparatus such as pressure inductor, temperature inductor to realize.
In one embodiment; If the screen of communication terminal 100 is in the bright screen state; Thinking very likely has the people using this communication terminal 100, then opens the preposition and rearmounted camera of communication terminal 100 automatically, and quiet shooting was carried out once in 2 minutes in every interval; And with photo upload to the server of taking 200; The photo that preposition camera is taken very likely photographs thief's head portrait, and rearmounted camera can photograph stolen communication terminal 100 residing environment, for giving for change of communication terminal 100 given a clue.
Disposal system after the present invention also preferably provides a kind of communication terminal stolen, as shown in Figure 3, said disposal system comprises communication terminal 100 and server 200, wherein:
Server 200 is preferably Cloud Server, specifically comprises:
Service log-on module 210 is used for before communication terminal 100 is stolen, and user's registration antitheft business model to the server 200 is to set up the interface channel between server 200 and the communication terminal 100.After soon communication terminal 100 will be bound the business model of should guarding against theft; When if communication terminal 100 networks are in unimpeded state; Communication terminal 100 automatic Connection Service devices 200; Then server 200 can send instruction to communication terminal 100 at any time and wait operation, so that communication terminal 100 can carry out work according to instruction.After general antitheft business model was succeeded in registration, the user just can send the antitheft processing instruction to stolen communication terminal 100 through client-requested server 200.If the business model of not guarding against theft registration, it is unsafe just sending the antitheft processing instruction.
State detection module 220 is used to judge between server 200 and the communication terminal 100 whether be in connection status, if be in connection status, then steering order sending module 230 sends the antitheft processing instruction to communication terminal 100; If be not in connection status, then regularly whether recover connection status between querying server 200 and the communication terminal 100, send the antitheft processing instruction if recover connection status steering order sending module 230 to communication terminal 100.
Instruction sending module 230 is used for sending the antitheft processing instruction to stolen communication terminal 100.
Information receiving module 240, the physiologic information of the suspicion object that is used for uploading at received communication terminal 100.
Communication terminal 100 is preferably mobile phone, specifically comprises:
Command reception module 10 is used for the antitheft processing instruction that the instruction sending module 230 of reception server 200 is sent.
Message processing module 20 is used for the data in the said communication terminal being carried out mess code handling according to the antitheft processing instruction, will be shown as mess code when the suspicion object is checked these data like this.Perhaps, message processing module 20 obtains the physiologic information of suspicion object automatically, and for example automatic shooting generates the finger print information on picture or video or the automatic obtaining communication terminal 100.
Information uploading module 30 is used for the physiologic information of suspicion object is uploaded to the information receiving module 240 of server 200.
Fig. 4 is the process flow diagram of the disposal route of communication terminal of the present invention after stolen, said disposal route can through as Fig. 1 or communication terminal 100 realizations shown in Figure 2, comprise that at least step is following:
Step S401 sends the antitheft processing instruction through server 200 to communication terminal 100.After user's communications terminal 100 was stolen, the user can operate through various clients, and request server 200 sends said antitheft processing instruction and gives communication terminal 100, so that guard against theft processing.
Step S402; Communication terminal 100 is according to said antitheft processing instruction; Data in the communication terminal 100 are carried out mess code to be handled; Preferably the data in the database of communication terminal 100 are carried out mess code and handle, obtain and use the user data of in communication terminal 100, preserving with the object malice of saving oneself from suspicion through nonlinear function.
Preferably, step S402 can comprise that also communication terminal 100 according to said antitheft processing instruction, obtains the physiologic information of suspicion object automatically.For example, communication terminal 100 automatic shootings generate image or video, have probably comprised the figure and features characteristic of suspicion object in this image or the video; Perhaps, the finger print information on the communication terminal 100 automatic obtaining communication terminals 100, this finger print information probably is the fingerprint characteristic that the suspicion object stays.Then, communication terminal 100 is uploaded to server 200 with the physiologic information of suspicion object.The user can operate through client, from server 200, obtains the physiologic information of the suspicion object of being uploaded by stolen communication terminal 100, and the user can report a case to the security authorities to police unit according to these physiologic informations, is very beneficial for the quick solving criminal cases of police.
Fig. 5 is the process flow diagram of the disposal route of the preferred communication terminal of the present invention after stolen, said disposal route can through as Fig. 1 or communication terminal 100 realizations shown in Figure 2, comprise that specifically step is following:
Step S501, communication terminal 100 is provided with the antitheft business model in advance, to set up the interface channel between server 200 and the said communication terminal 100.Preferably, communication terminal 100 is registered the antitheft business model to server 200 before stolen, to set up the interface channel between server 200 and the communication terminal 100.The user on the server 200 communication terminal 100 bound should antitheft business model after; When if communication terminal 100 networks are in unimpeded state; Communication terminal 100 automatic Connection Service devices 200, then server 200 can send instruction to communication terminal 100 at any time and wait operation.
Step S502 after user's communications terminal 100 is stolen, can send the antitheft processing instructions through various client-requested servers 200.Here, number of the account and password that server 200 can require the user to input previous setting are verified, have checking only through just sending the antitheft processing instruction, to guarantee the safe handling of antitheft business model.
Step S503 judges between server 200 and the communication terminal 100 whether be in connection status by server 200, if be in then execution in step S505 of connection status, otherwise execution in step S504.
Whether step S504, server 200 regularly recover connection status between inquiry and the communication terminal 100, if recover connection status then send the processing instructions of guarding against theft to communication terminal 100.
Step S505, server 200 sends the antitheft processing instruction to communication terminal 100, and the content of this antitheft processing instruction can be preestablished by server 200; Can certainly set by user individual; Can require stolen communication terminal 100 automatic shooting photos, obtain finger print information and/or mess code processing etc. automatically, comprise whole said three antitheft processing actions in the present embodiment; Can certainly only select one of them or two, perhaps action is handled in other antitheft.
Step S506, communication terminal 100 is according to the antitheft processing instruction, and automatic shooting generates picture or video.Because this image or video are taken in communication terminal 100 stolen backs, have therefore probably comprised the figure and features characteristic of suspicion object.Preferably, communication terminal 100 generates picture or video with the silent mode automatic shooting; Communication terminal 100 starts preposition camera and/or rearmounted camera, and automatic shooting generates picture or video; Communication terminal 100 automatically snaps at interval on schedule and generates picture or video; And/or when communication terminal 100 was operated, communication terminal 100 automatic shootings generated picture or videos.
Step S507, communication terminal 100 is uploaded to server 200 with said picture or video.
Step S508, client is obtained said picture or video from server 200, and can in time report to the police as evidence.
Step S509, communication terminal 100 is according to antitheft processing instruction, the automatically finger print information on the obtaining communication terminal 100.Preferably, when communication terminal 100 is operated, the finger print information that increases newly on the obtaining communication terminal 100 automatically.Because this finger print information obtains after communication terminal 100 is stolen, so this finger print information probably is the important evidence that the suspicion object stays.
Step S510, communication terminal 100 is uploaded to server 200 with said finger print information.
Step S511, client is obtained said finger print information from server 200, and can in time report to the police as evidence.
Step S512; Communication terminal 100 is according to said antitheft processing instruction; Data in the communication terminal 100 are carried out mess code to be handled; Preferably the data in the database of communication terminal 100 are carried out mess code and handle, obtain and use the user data of in communication terminal 100, preserving with the object malice of saving oneself from suspicion through nonlinear function.
Fig. 6 is the preferred flow charts that the present invention obtains the physiologic information step of suspicion object automatically, comprises that step is following:
Step S601 judges whether communication terminal 100 is operated, and it is operated then execution in step S603 and step S604 by being realized by operation induction module 40 as if quilt, otherwise execution in step S602.Because when the suspicion object begins operation communication terminal 100; Obtain the best chance of the physiologic information of suspicion object exactly; After operation induction module 40 senses communication terminal 100 quilt operations; Announcement information obtains submodule 22 work immediately, thereby can obtain the physiologic information of authentic and valid suspicion object.
Step S602 wouldn't handle, and continues to turn back to step S601.
Step S603, communication terminal 100 automatic shootings generate picture or video.For example, when sensing communication terminal 100 by operation, take submodule 221 automatic shootings and generate picture or video, this picture or video will comprise the figure and features characteristic of suspicion object.
Step S604, the finger print information that increases newly on the communication terminal 100 automatic obtaining communication terminals 100.For example, when sensing communication terminal 100 by operation, fingerprint obtains finger print information newly-increased on the submodule 222 automatic obtaining communication terminals 100, and can confirm that basically this newly-increased finger print information is the finger print information of suspicion object.
In sum, after stolen communication terminal of the present invention receives the antitheft processing instruction, can carry out mess code to the data in the communication terminal and handle, avoid other people illegally to check or use user's personal information, protect the safety of user profile conscientiously; If the user can give stolen communication terminal for change in the future, can also the data that said mess code is handled be recovered, avoid user profile to be deleted or destroy, thereby guaranteed completeness of user information.Preferably; Stolen terminal can obtain the physiologic information of suspicion object automatically according to the antitheft processing instruction that server is sent; For example the communication terminal automatic shooting generates image or video, obtains finger print information etc. automatically, and the physiologic information of the suspicion object that is obtained is uploaded to server automatically; The user can obtain the physiologic information of said suspicion object through server like this; And in time report to the police, thereby the possibility that the user gives stolen communication terminal for change, the security that has improved communication terminal have been increased as evidence.
Certainly; The present invention also can have other various embodiments; Under the situation that does not deviate from spirit of the present invention and essence thereof; Those of ordinary skill in the art work as can make various corresponding changes and distortion according to the present invention, but these corresponding changes and distortion all should belong to the protection domain of the appended claim of the present invention.

Claims (10)

1. the disposal route of a communication terminal after stolen is characterized in that, the treating method comprises:
Send the antitheft processing instruction through server to said communication terminal;
Said communication terminal carries out mess code with the data in the said communication terminal and handles according to said antitheft processing instruction.
2. disposal route according to claim 1 is characterized in that, saidly data in the communication terminal are carried out the mess code processed steps comprises:
Through nonlinear function the data in the database of said communication terminal being carried out mess code handles.
3. disposal route according to claim 1 is characterized in that, also comprises before the said step of sending the antitheft processing instruction through server to said communication terminal:
Said communication terminal is provided with the antitheft business model in advance, to set up the interface channel between said server and the said communication terminal.
4. disposal route according to claim 3 is characterized in that, saidly further comprises to the step that said communication terminal sends the antitheft processing instruction through server:
Judge between said server and the said communication terminal and whether be in connection status;
If be in connection status, then said server sends said antitheft processing instruction to said communication terminal;
If be not in connection status, then said server regularly inquire about and said communication terminal between whether recover connection status, if recover connection status then send said antitheft processing instruction to said communication terminal.
5. disposal route according to claim 1 is characterized in that, said communication terminal carries out the mess code processed steps with the data in the said communication terminal and further comprises according to said antitheft processing instruction:
Automatically obtain the physiologic information of suspicion object;
Said communication terminal is uploaded to said server with the physiologic information of said suspicion object.
6. disposal route according to claim 5 is characterized in that, the said step of obtaining the physiologic information of suspicion object automatically comprises: automatic shooting generates picture or video;
Said communication terminal comprises the step that the physiologic information of said suspicion object is uploaded to said server:
Said communication terminal is uploaded to said server with said picture or video.
7. disposal route according to claim 6 is characterized in that, the step that said automatic shooting generates picture or video comprises:
Generate said picture or video with the silent mode automatic shooting;
Start preposition camera and/or rearmounted camera, automatic shooting generates said picture or video;
Automatic shooting generates said picture or video at interval on schedule; And/or
When said communication terminal was operated, automatic shooting generated said picture or video.
8. disposal route according to claim 5 is characterized in that, the said step of obtaining the physiologic information of suspicion object automatically also comprises:
Said communication terminal obtains the finger print information on the said communication terminal automatically according to said antitheft processing instruction;
Said communication terminal comprises the step that the physiologic information of said suspicion object is uploaded to said server:
Said communication terminal is uploaded to said server with said finger print information.
9. disposal route according to claim 8 is characterized in that, the step of the finger print information on the said automatic obtaining communication terminal comprises:
When said communication terminal is operated, obtain finger print information newly-increased on the said communication terminal automatically.
10. the communication terminal of a realization such as each said communication terminal of claim 1~9 disposal route after stolen is characterized in that said communication terminal comprises:
The command reception module is used for the antitheft processing instruction that reception server is sent;
Message processing module is used for according to said antitheft processing instruction, the data in the said communication terminal is carried out mess code handle.
CN201110287877XA 2011-09-26 2011-09-26 Processing method of communication terminal after being stolen and communication terminal Pending CN102509033A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110287877XA CN102509033A (en) 2011-09-26 2011-09-26 Processing method of communication terminal after being stolen and communication terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110287877XA CN102509033A (en) 2011-09-26 2011-09-26 Processing method of communication terminal after being stolen and communication terminal

Publications (1)

Publication Number Publication Date
CN102509033A true CN102509033A (en) 2012-06-20

Family

ID=46221116

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110287877XA Pending CN102509033A (en) 2011-09-26 2011-09-26 Processing method of communication terminal after being stolen and communication terminal

Country Status (1)

Country Link
CN (1) CN102509033A (en)

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102843436A (en) * 2012-09-14 2012-12-26 腾讯科技(深圳)有限公司 Method, equipment, server and system of equipment management
CN103634477A (en) * 2013-12-11 2014-03-12 深圳市亚略特生物识别科技有限公司 Method and system for preventing thievery of mobile phone with fingerprint device
CN103632111A (en) * 2013-12-17 2014-03-12 中科创达软件股份有限公司 Information processing method and device
CN103702317A (en) * 2013-12-13 2014-04-02 北京奇虎科技有限公司 Mobile terminal antitheft method and client
WO2014056302A1 (en) * 2012-10-12 2014-04-17 华为终端有限公司 Method and device for data secrecy based on embedded universal integrated circuit card
CN104751086A (en) * 2015-03-04 2015-07-01 深圳市金立通信设备有限公司 Terminal anti-theft method
CN104751087A (en) * 2015-03-04 2015-07-01 深圳市金立通信设备有限公司 Terminal
WO2015117315A1 (en) * 2014-07-23 2015-08-13 中兴通讯股份有限公司 Tracking method, tracking server and tracking system
CN105095802A (en) * 2014-04-25 2015-11-25 北京奇虎科技有限公司 Antitheft method for smart terminal device and smart terminal device
CN105227770A (en) * 2015-09-23 2016-01-06 中山市晶威电子科技有限公司 A kind of theft preventing method based on smart mobile phone
CN105468954A (en) * 2015-11-27 2016-04-06 东莞酷派软件技术有限公司 Intelligent terminal retrieving method and device
CN105491236A (en) * 2015-12-02 2016-04-13 小米科技有限责任公司 Terminal unlocking method and device
CN105791222A (en) * 2014-12-22 2016-07-20 北京壹人壹本信息科技有限公司 Secure communication method and system and communication terminal
WO2016123891A1 (en) * 2015-02-02 2016-08-11 中兴通讯股份有限公司 Antitheft processing method and device
CN105933374A (en) * 2016-03-30 2016-09-07 青岛海信移动通信技术股份有限公司 Mobile terminal data backup method, system and mobile terminal
US9462061B2 (en) 2012-09-14 2016-10-04 Tencent Technology (Shenzhen) Company Limited Method, device, server, and system for managing devices
CN106126984A (en) * 2016-06-23 2016-11-16 珠海市魅族科技有限公司 The method of adjustment of information attribute and device
CN107153562A (en) * 2017-06-01 2017-09-12 珠海市魅族科技有限公司 A kind of method, device and the storage medium of control of taking pictures
TWI630504B (en) * 2014-09-15 2018-07-21 群邁通訊股份有限公司 System and method of security monitoring
CN105101141B (en) * 2015-06-30 2019-05-21 北京奇虎科技有限公司 A kind of method, Intelligent lost-proof type equipment and system controlling Intelligent lost-proof type equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101437203A (en) * 2007-11-13 2009-05-20 鸿富锦精密工业(深圳)有限公司 Mobile communication equipment and message transmission method thereof
CA2757468A1 (en) * 2008-04-02 2009-10-08 Yougetitback Limited Method for mitigating the unauthorized use of a device
US20100241739A1 (en) * 2009-03-20 2010-09-23 Microsoft Corporation Mitigations for potentially compromised electronic devices

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101437203A (en) * 2007-11-13 2009-05-20 鸿富锦精密工业(深圳)有限公司 Mobile communication equipment and message transmission method thereof
CA2757468A1 (en) * 2008-04-02 2009-10-08 Yougetitback Limited Method for mitigating the unauthorized use of a device
US20100241739A1 (en) * 2009-03-20 2010-09-23 Microsoft Corporation Mitigations for potentially compromised electronic devices

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102843436A (en) * 2012-09-14 2012-12-26 腾讯科技(深圳)有限公司 Method, equipment, server and system of equipment management
WO2014040425A1 (en) * 2012-09-14 2014-03-20 Tencent Technology (Shenzhen) Company Limited A method, device, server, and system for managing devices
US9462061B2 (en) 2012-09-14 2016-10-04 Tencent Technology (Shenzhen) Company Limited Method, device, server, and system for managing devices
US9390277B2 (en) 2012-10-12 2016-07-12 Huawei Device Co., Ltd. Method and device for data confidentiality protection based on embedded universal integrated circuit card
WO2014056302A1 (en) * 2012-10-12 2014-04-17 华为终端有限公司 Method and device for data secrecy based on embedded universal integrated circuit card
CN103634477A (en) * 2013-12-11 2014-03-12 深圳市亚略特生物识别科技有限公司 Method and system for preventing thievery of mobile phone with fingerprint device
CN103702317B (en) * 2013-12-13 2017-11-10 北京奇虎科技有限公司 Anti-theft method for mobile terminal and client
CN103702317A (en) * 2013-12-13 2014-04-02 北京奇虎科技有限公司 Mobile terminal antitheft method and client
CN103632111A (en) * 2013-12-17 2014-03-12 中科创达软件股份有限公司 Information processing method and device
CN105095802A (en) * 2014-04-25 2015-11-25 北京奇虎科技有限公司 Antitheft method for smart terminal device and smart terminal device
WO2015117315A1 (en) * 2014-07-23 2015-08-13 中兴通讯股份有限公司 Tracking method, tracking server and tracking system
CN105282700A (en) * 2014-07-23 2016-01-27 中兴通讯股份有限公司 Tracking method, tracking server, and tracking system
TWI630504B (en) * 2014-09-15 2018-07-21 群邁通訊股份有限公司 System and method of security monitoring
CN105791222A (en) * 2014-12-22 2016-07-20 北京壹人壹本信息科技有限公司 Secure communication method and system and communication terminal
WO2016123891A1 (en) * 2015-02-02 2016-08-11 中兴通讯股份有限公司 Antitheft processing method and device
CN104751086A (en) * 2015-03-04 2015-07-01 深圳市金立通信设备有限公司 Terminal anti-theft method
CN104751087A (en) * 2015-03-04 2015-07-01 深圳市金立通信设备有限公司 Terminal
CN105101141B (en) * 2015-06-30 2019-05-21 北京奇虎科技有限公司 A kind of method, Intelligent lost-proof type equipment and system controlling Intelligent lost-proof type equipment
CN105227770A (en) * 2015-09-23 2016-01-06 中山市晶威电子科技有限公司 A kind of theft preventing method based on smart mobile phone
CN105468954A (en) * 2015-11-27 2016-04-06 东莞酷派软件技术有限公司 Intelligent terminal retrieving method and device
CN105491236A (en) * 2015-12-02 2016-04-13 小米科技有限责任公司 Terminal unlocking method and device
CN105933374A (en) * 2016-03-30 2016-09-07 青岛海信移动通信技术股份有限公司 Mobile terminal data backup method, system and mobile terminal
CN106126984A (en) * 2016-06-23 2016-11-16 珠海市魅族科技有限公司 The method of adjustment of information attribute and device
CN107153562A (en) * 2017-06-01 2017-09-12 珠海市魅族科技有限公司 A kind of method, device and the storage medium of control of taking pictures

Similar Documents

Publication Publication Date Title
CN102509033A (en) Processing method of communication terminal after being stolen and communication terminal
US10657238B2 (en) Systems and methods for identifying unauthorized users of an electronic device
US10348726B2 (en) Online identity verification platform and process
US10390203B2 (en) Multimedia centric adaptive emergency response messaging apparatus and method
US8483654B2 (en) System and method for reporting and tracking incidents with a mobile device
CN103634477B (en) There is theft preventing method and the system of the mobile phone of fingerprint device
CN105591744B (en) A kind of genuine cyber identification authentication method and system
JP2013538384A (en) Device communication
US7774023B2 (en) System and method for associating device information with digital images
US20160149886A1 (en) Method, device and system for account recovery with a durable code
AU2021282382A1 (en) A Method and System for Reporting, Securing and Controlling Mobile Phones Which are Lost (Misplaced\Stolen)
CN108573554A (en) A kind of automatic identification alarm method and system based on face lock
JP2017046193A (en) Camera system enabling privacy protection
JP5150572B2 (en) Privacy protection system and privacy protection method
JP2020201915A (en) General purpose id issuance management system
CN202503545U (en) Account security application system
US20210366216A1 (en) Video Doorbell Visitor Filtration Apparatuses and Date-Time System Methods of Operation
JP2011223364A (en) Moving image security authentication system
KR20130005469A (en) A service method for simultaneous exchange of personal information and system for the same
KR101458365B1 (en) Video recoder voice alarm system and operating method thereof
AU2013101014A4 (en) A Method for Reporting, Securing and Controlling Mobile Phones Which are Lost (Misplaced\Stolen)
AU2013101013A4 (en) A Method for Reporting, Securing and Controlling Mobile Phones Which are Lost (Misplaced\Stolen)
US11183035B2 (en) Video doorbell visitor filtration apparatuses and date-time system methods of operation
KR20140002863A (en) Service system of safety home-coming and method thereof
JP2017062701A (en) Content sharing system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20120620