CN103118177A - Anti-theft protection method based on movable terminal and movable terminal - Google Patents

Anti-theft protection method based on movable terminal and movable terminal Download PDF

Info

Publication number
CN103118177A
CN103118177A CN2013100158434A CN201310015843A CN103118177A CN 103118177 A CN103118177 A CN 103118177A CN 2013100158434 A CN2013100158434 A CN 2013100158434A CN 201310015843 A CN201310015843 A CN 201310015843A CN 103118177 A CN103118177 A CN 103118177A
Authority
CN
China
Prior art keywords
mobile terminal
stolen
password
release
flag bit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013100158434A
Other languages
Chinese (zh)
Inventor
赵兴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN2013100158434A priority Critical patent/CN103118177A/en
Publication of CN103118177A publication Critical patent/CN103118177A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Telephone Function (AREA)

Abstract

The invention discloses an anti-theft protection method based on a movable terminal. The method includes (1) detecting and judging whether transient acceleration exceeds an acceleration threshold value, (2) according to the judging result of the first step, locking and writing a zone bit to memorize a theft accident, (3) unlocking and judging whether unlocking is successful, (4) according to the judging result of the third step, judging whether the zone bit is true or false, and (5) according to the zone bit, starting a safety measure. Compared with the prior art, firstly whether the transient acceleration exceeds the acceleration threshold value is detected and judged; when the result is positive, the movable terminal is locked, and the zone bit is written in a system level to memorize the theft accident; then unlocking is carried out, and whether the zone bit is true or false is judged according to the unlocking result; and if the zone bit is false, then misjudging is indicated, and if the zone bit is true, the safe measure is started. Therefore, the privacy safety of the movable terminal is reliably and secretly protected. The invention meanwhile discloses the movable terminal with an anti-theft protection function.

Description

Stolen guard method and the mobile terminal thereof of movement-based terminal
Technical field
The present invention relates to a kind of technical field of burglary prevention of terminal, relate in particular to a kind of stolen guard method and mobile terminal thereof of movement-based terminal.
Background technology
In recent years, fast development along with mobile communication, hand-held mobile terminal is more and more to intelligentized future development, for example the function of touch screen type smart mobile phone is also more and more at present, be not only to satisfy the means of communication that people connect each other, more become very important mobile accessory terminal in people's daily life.Due to the portability of mobile terminal, the user often is accustomed to important personal information or file etc. are stored in the inner, and especially commercial mobile terminal is more being stored very important information.Certainly, due to the portability of mobile terminal, its loss or stolen probability are also larger, in case mobile terminal is lost or be stolen, may cause great loss to the user.
For this reason, people develop the stolen safeguard function of some mobile terminals.But existing stolen defencive function is reliable and hidden mostly not, and very easily stolen taker is found.
Therefore, be necessary to provide a kind of more reliable, hidden stolen guard method to solve the deficiencies in the prior art.
Summary of the invention
The object of the present invention is to provide a kind of stolen guard method of movement-based terminal, to protect more reliably, snugly the personal secrets of mobile terminal.
Another object of the present invention is to provide a kind of mobile terminal with stolen defencive function, to protect more reliably, snugly the personal secrets of mobile terminal.
For achieving the above object, the invention provides a kind of stolen guard method of movement-based terminal, comprise the steps:
(1) detect the threshold value whether instantaneous acceleration that judges mobile terminal surpasses the acceleration of described mobile terminal;
(2) judged result according to (1) locks described mobile terminal and writes flag bit to remember stolen event in the system level of described mobile terminal;
(3) described mobile terminal is carried out release;
(4) the described flag bit of release result judgement according to (3) is true or false;
(5) start safety measure according to described flag bit.
Compared with prior art; due to the stolen guard method that the present invention is based on mobile terminal; at first detect the threshold value whether instantaneous acceleration that judges mobile terminal surpasses acceleration; when surpassing; to lock mobile terminal and write flag bit to remember stolen event in system level; afterwards mobile terminal is carried out release; again according to the release true or false of judgement symbol position as a result; if the judgement symbol position is false; be expressed as erroneous judgement; if the judgement symbol position is for very starting safety measure, thereby the personal secrets of mobile terminal have been protected more reliably, snugly.
Particularly, also comprise before in step (1): the threshold value of default described acceleration.
Particularly, step (2) adopts the described mobile terminal of coded lock locking.
Particularly, step (3) specifically comprises:
(31) the input password judges also whether the password of inputting is correct;
(32) if the password of inputting correctly judges the release success, otherwise, carry out step (33);
(33) whether the number of times of judgement input password is greater than three times;
(34) if number of times greater than three times, judges release failure, otherwise, repeating step (31).
Alternatively, step (3) specifically comprises:
Obtain the root authority of described mobile terminal;
Set up being connected of described mobile terminal and computer;
Judge whether by the described coded lock of described computer deletion.
Particularly, described safety measure take for the camera that starts described mobile terminal the head portrait of stealing taker and send described head portrait to default security number or the positioning starting that starts described mobile terminal to obtain geographical coordinate information and to send described geographical coordinate information to security number.
Correspondingly, the present invention also provides a kind of mobile terminal with stolen defencive function, comprising:
Detect judge module, whether surpass the threshold value of the acceleration of described mobile terminal for detection of the instantaneous acceleration that judges mobile terminal;
The locking memory module is used for carrying out lock operation and writing flag bit to remember stolen event in system level according to the judged result of described detection judge module;
Separate lock module, be used for carrying out unlocking operation;
The flag bit judge module, the described flag bit of release result judgement that is used for according to described solution lock module is true or false; And
Start module, be used for starting safety measure according to the judged result of described flag bit judge module.
In a preferred embodiment of the present invention, described mobile terminal also comprises:
Module is set, is used for the threshold value of default described acceleration.
Particularly, described solution lock module specifically comprises:
The Password Input unit is used for the input password;
The first judging unit is used for judging whether the password of described Password Input unit inputting is correct;
The second judging unit is used for judged result according to described the first judging unit and judges that whether the number of times of the password that described Password Input unit is inputted is greater than three times;
Identifying unit, be used for successful and failed according to the judged result judgement release of described the second judging unit according to the judged result judgement release of described the first judging unit as a result.
Particularly, described safety measure take for the camera that starts described mobile terminal the head portrait of stealing taker and send described head portrait to default security number or the positioning starting that starts described mobile terminal to obtain geographical coordinate information and to send described geographical coordinate information to security number.
By following description also by reference to the accompanying drawings, it is more clear that the present invention will become, and these accompanying drawings are used for explaining embodiments of the invention.
Description of drawings
Fig. 1 is the flow chart that the present invention is based on stolen guard method one embodiment of mobile terminal.
Fig. 2 is the flow chart of the described step S104 of Fig. 1.
Fig. 3 is the structured flowchart of theft preventing mobile terminal of the present invention.
Embodiment
With reference now to accompanying drawing, describe embodiments of the invention, in accompanying drawing, similar element numbers represents similar element.
Please refer to Fig. 1, the stolen guard method that the present invention is based on mobile terminal mainly comprises the steps:
Step S101, the threshold value of the acceleration of default mobile terminal; Be specially, setting threshold is 20g;
Step S102, detect judge mobile terminal instantaneous acceleration whether over the threshold value of the acceleration of mobile terminal, if, execution in step S103, otherwise, repeating step S102; Be specially, the instantaneous acceleration that mobile terminal detected is 30g, whether judges 30g greater than threshold value 20g, due to instantaneous acceleration greater than threshold value, therefore, execution in step S103;
Step S103, the locking mobile terminal also writes flag bit to remember stolen event in the system level of mobile terminal; That is, when instantaneous acceleration surpasses threshold value, judges stolenly, reach and write flag bit to remember stolen event in system level thereby adopt the coded lock mode to lock mobile terminal;
Step S104 carries out release and judges whether success of release mobile terminal, if, execution in step S105, otherwise, execution in step S106;
Step S105, the judgement symbol position is the false and normal mobile terminal that uses; Be specially, mobile terminal thinks that step S103 is erroneous judgement, and the user can normally use mobile terminal, and enters the stolen event of remembering in mobile terminal removing step S103; It should be noted that when removing the stolen time of being remembered, need to verify by password;
S106, the judgement symbol position is true and starts safety measure; Wherein, safety measure take for the camera that starts mobile terminal the head portrait of stealing taker and send head portrait to default security number or the positioning starting that starts mobile terminal to obtain geographical coordinate information and to send geographical coordinate information to security number; It should be noted that it is true also can flag bit being set in the locking mobile terminal, like this, all can start safety measure as long as robber's taker carries out any operation.
Particularly, as shown in Figure 2, step S104 specifically comprises:
Step S1041, the input password;
Step S1042, whether the password inputted of judgement is correct, if correct, execution in step S1043, otherwise, execution in step S1044;
Step S1043, judgement release success and execution in step S105;
Whether step S1044, the number of times of judgement input password greater than three times, if greater than, execution in step S1045, otherwise, repeating step S1042.
Step S1045, judgement release failure and execution in step S106.
Need to prove, after adopting said method with mobile terminal locking, can carry out in the following way release: (1) obtains the root authority of described mobile terminal; (2) set up being connected of described mobile terminal and computer; (3) judge whether to delete coded lock by computer.If mobile terminal is judged the operation of deleting coded lock by computer, can judgement symbol the position be true and start safety measure.
As can be seen from the above description; the present invention is based on the stolen guard method of mobile terminal; at first detect the threshold value whether instantaneous acceleration that judges mobile terminal surpasses acceleration; when surpassing; to lock mobile terminal and write flag bit to remember stolen event in system level; afterwards mobile terminal is carried out release; again according to the release true or false of judgement symbol position as a result; if the judgement symbol position is false; be expressed as erroneous judgement; if the judgement symbol position is true and starts safety measure, thereby protected more reliably, snugly the personal secrets of mobile terminal.
Correspondingly, the present invention also provides a kind of mobile terminal 100 with stolen defencive function.Need to prove, mobile terminal described in the invention can be mobile phone, notebook computer, panel computer or PDA etc.
Particularly, as shown in Figure 3, this mobile terminal 100 with stolen defencive function comprises:
Module 10 is set, is used for the default threshold value of accelerating;
Detect judge module 11, whether surpass the threshold value of the acceleration of mobile terminal for detection of the instantaneous acceleration that judges mobile terminal;
Locking memory module 12 is used for carrying out lock operation and writing flag bit to remember stolen event in system level according to the judged result that detects judge module 11; Be specially, when judgment result is that of detection judge module 11 was, locking memory module 12 just can be started working;
Separate lock module 13, be used for carrying out unlocking operation;
Flag bit judge module 14, be used for according to the release of separating lock module 13 as a result the judgement symbol position be true or false; And
Start module 15, be used for starting safety measure according to the judged result of flag bit judge module 14; Be specially, judging flag bit when flag bit judge module 14 is true time, starts safety measure.Wherein, safety measure take for the camera that starts mobile terminal the head portrait of stealing taker and send head portrait to default security number or the positioning starting that starts mobile terminal to obtain geographical coordinate information and to send geographical coordinate information to security number.
Particularly, described solution lock module 13 specifically comprises:
Password Input unit 131 is used for the input password;
The first judging unit 132 is used for judging whether the password of inputting Password Input unit 131 is correct;
The second judging unit 133 is used for judged result according to the first judging unit 132 and judges that whether the number of times of the password that Password Input unit 131 is inputted is greater than three times; Be specially, when the first judging unit 132 judgement password mistake, the second 133 of judging units can judge further that whether the password number of times of inputting Password Input unit 131 is greater than three times; When the second judging unit 133 when the determination result is NO, whether correctly can indicate the first judging unit 132 to continue the password that judgement inputs;
Identifying unit 134 as a result, are used for successful and failed according to the judged result judgement release of the second judging unit 133 according to the judged result judgement release of the first judging unit 132; Be specially, when correct, 134 of identifying units can judge the release success as a result when the first judging unit 132 judgement password, and when the second judging unit 133 was judged the password number of times inputted greater than three times, 134 of identifying units can be judged the release failure as a result.。
Need to prove, separate lock module 13 and can carry out in the following way release: (1) obtains the root authority of described mobile terminal 100; (2) set up being connected of described mobile terminal 100 and computer; (3) judge whether to delete coded lock by computer.If mobile terminal 100 is judged the operation of deleting coded lock by computer, can judgement symbol the position be true and start safety measure.
As mentioned above, the present invention has the mobile terminal 100 of stolen defencive function, judge that by detecting judge module 11 detections whether instantaneous acceleration is over the default threshold value of module 10 is set, if surpass, can carry out lock operation and write flag bit to remember stolen event in system level by locking memory module 12, otherwise, detect 11 of judge modules and can continue to detect; Afterwards, carry out unlocking operations by separating lock module 13, flag bit judge module 14 according to release as a result the judgement symbol position be false or true; At last, the flag bit that judges according to flag bit judge module 14 by startup module 15 is that genuine result starts safety measure, thereby has protected more reliably, snugly the personal secrets of mobile terminal.
Above disclosed is only the preferred embodiments of the present invention, certainly can not limit with this interest field of the present invention, and the equivalent variations of therefore doing according to the present patent application the scope of the claims still belongs to the scope that the present invention is contained.

Claims (10)

1. the stolen guard method of a movement-based terminal, is characterized in that, comprises the steps:
(1) detect the threshold value whether instantaneous acceleration that judges mobile terminal surpasses the acceleration of described mobile terminal;
(2) judged result according to (1) locks described mobile terminal and writes flag bit to remember stolen event in the system level of described mobile terminal;
(3) described mobile terminal is carried out release;
(4) the described flag bit of release result judgement according to (3) is true or false;
(5) start safety measure according to described flag bit.
2. the stolen guard method of movement-based terminal as claimed in claim 1, is characterized in that, also comprises before in step (1): the threshold value of default described acceleration.
3. the stolen guard method of movement-based terminal as claimed in claim 1, is characterized in that, step (2) adopts the described mobile terminal of coded lock locking.
4. the stolen guard method of movement-based terminal as claimed in claim 3, is characterized in that, step (3) specifically comprises:
(31) the input password judges also whether the password of inputting is correct;
(32) if the password of inputting correctly judges the release success, otherwise, carry out step (33);
(33) whether the number of times of judgement input password is greater than three times;
(34) if number of times greater than three times, judges release failure, otherwise, repeating step (31).
5. the stolen guard method of movement-based terminal as claimed in claim 3, is characterized in that, step (3) specifically comprises:
Obtain the root authority of described mobile terminal;
Set up being connected of described mobile terminal and computer;
Judge whether by the described coded lock of described computer deletion.
6. the stolen guard method of movement-based terminal as described in claim 1 to 5 any one; it is characterized in that, described safety measure take for the camera that starts described mobile terminal the head portrait of stealing taker and send described head portrait to default security number or the positioning starting that starts described mobile terminal to obtain geographical coordinate information and to send described geographical coordinate information to security number.
7. the mobile terminal with stolen defencive function, is characterized in that, comprising:
Detect judge module, whether surpass the threshold value of the acceleration of described mobile terminal for detection of the instantaneous acceleration that judges mobile terminal;
The locking memory module is used for carrying out lock operation and writing flag bit to remember stolen event in system level according to the judged result of described detection judge module;
Separate lock module, be used for carrying out unlocking operation;
The flag bit judge module, the described flag bit of release result judgement that is used for according to described solution lock module is true or false; And
Start module, be used for starting safety measure according to the judged result of described flag bit judge module.
8. the mobile terminal with stolen defencive function as claimed in claim 7, is characterized in that, also comprises:
Module is set, is used for the threshold value of default described acceleration.
9. the mobile terminal with stolen defencive function as claimed in claim 7, is characterized in that, described solution lock module specifically comprises:
The Password Input unit is used for the input password;
The first judging unit is used for judging whether the password of described Password Input unit inputting is correct;
The second judging unit is used for judged result according to described the first judging unit and judges that whether the number of times of the password that described Password Input unit is inputted is greater than three times;
Identifying unit, be used for successful and failed according to the judged result judgement release of described the second judging unit according to the judged result judgement release of described the first judging unit as a result.
10. the mobile terminal with stolen defencive function as described in claim 7 to 9 any one; it is characterized in that, described safety measure take for the camera that starts described mobile terminal the head portrait of stealing taker and send described head portrait to default security number or the positioning starting that starts described mobile terminal to obtain geographical coordinate information and to send described geographical coordinate information to security number.
CN2013100158434A 2013-01-16 2013-01-16 Anti-theft protection method based on movable terminal and movable terminal Pending CN103118177A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013100158434A CN103118177A (en) 2013-01-16 2013-01-16 Anti-theft protection method based on movable terminal and movable terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013100158434A CN103118177A (en) 2013-01-16 2013-01-16 Anti-theft protection method based on movable terminal and movable terminal

Publications (1)

Publication Number Publication Date
CN103118177A true CN103118177A (en) 2013-05-22

Family

ID=48416447

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013100158434A Pending CN103118177A (en) 2013-01-16 2013-01-16 Anti-theft protection method based on movable terminal and movable terminal

Country Status (1)

Country Link
CN (1) CN103118177A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103957325A (en) * 2014-05-21 2014-07-30 深圳市金立通信设备有限公司 Terminal alarm method and terminal
CN104298927A (en) * 2014-09-24 2015-01-21 青岛海信移动通信技术股份有限公司 Terminal burglary prevention method and terminal
CN104980577A (en) * 2015-06-09 2015-10-14 张维秀 Mobile terminal positioning method and mobile terminal
CN105870995A (en) * 2016-03-30 2016-08-17 乐视控股(北京)有限公司 Charging method, charging device and charging system of data line with lock
CN106060214A (en) * 2016-07-18 2016-10-26 永德利硅橡胶科技(深圳)有限公司 Method for preventing mobile phone from being lost based on mobile phone shell
CN106657583A (en) * 2016-09-30 2017-05-10 努比亚技术有限公司 Alarm method, device and terminal
CN109391630A (en) * 2018-11-28 2019-02-26 平安科技(深圳)有限公司 Mobile terminal locking method and system
WO2019041143A1 (en) * 2017-08-29 2019-03-07 深圳传音通讯有限公司 Security control method for mobile terminal, terminal, and computer readable medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102256027A (en) * 2010-05-20 2011-11-23 英华达(上海)电子有限公司 Alarming method and alarming terminal
US20120309432A1 (en) * 2010-09-03 2012-12-06 Huizhou Tcl Mobile Communication Co., Ltd System and method for tracking stolen communication terminal, and communication terminal

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102256027A (en) * 2010-05-20 2011-11-23 英华达(上海)电子有限公司 Alarming method and alarming terminal
US20120309432A1 (en) * 2010-09-03 2012-12-06 Huizhou Tcl Mobile Communication Co., Ltd System and method for tracking stolen communication terminal, and communication terminal

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103957325A (en) * 2014-05-21 2014-07-30 深圳市金立通信设备有限公司 Terminal alarm method and terminal
CN103957325B (en) * 2014-05-21 2016-05-25 深圳市金立通信设备有限公司 Method and terminal that a kind of terminal is reported to the police
CN104298927A (en) * 2014-09-24 2015-01-21 青岛海信移动通信技术股份有限公司 Terminal burglary prevention method and terminal
CN104298927B (en) * 2014-09-24 2018-04-27 青岛海信移动通信技术股份有限公司 A kind of terminal anti-theft method and terminal
CN104980577A (en) * 2015-06-09 2015-10-14 张维秀 Mobile terminal positioning method and mobile terminal
CN105870995A (en) * 2016-03-30 2016-08-17 乐视控股(北京)有限公司 Charging method, charging device and charging system of data line with lock
CN106060214A (en) * 2016-07-18 2016-10-26 永德利硅橡胶科技(深圳)有限公司 Method for preventing mobile phone from being lost based on mobile phone shell
CN106060214B (en) * 2016-07-18 2018-11-27 永德利硅橡胶科技(深圳)有限公司 A method of prevent mobile phone from losing based on mobile phone shell
CN106657583A (en) * 2016-09-30 2017-05-10 努比亚技术有限公司 Alarm method, device and terminal
WO2019041143A1 (en) * 2017-08-29 2019-03-07 深圳传音通讯有限公司 Security control method for mobile terminal, terminal, and computer readable medium
CN109391630A (en) * 2018-11-28 2019-02-26 平安科技(深圳)有限公司 Mobile terminal locking method and system
CN109391630B (en) * 2018-11-28 2022-10-25 平安科技(深圳)有限公司 Mobile terminal locking method and system

Similar Documents

Publication Publication Date Title
CN103118177A (en) Anti-theft protection method based on movable terminal and movable terminal
RU2608243C2 (en) Method and device for screen and terminal unlocking
US9432367B2 (en) Processing method for piecing together fingerprint based on mobile terminal and mobile terminal
US20150156313A1 (en) Screen unlocking method and device for mobile terminal
US20170277881A1 (en) Method and system for improving security of a mobile terminal
US20150048943A1 (en) Anti-loss Systems and Methods for Mobile Devices
CN103034813A (en) Method and system for protecting data of mobile terminal
CN104679387A (en) Privacy information protection method and terminal
US20160134625A1 (en) Method and apparatus for controlling communications terminal and corresponding communications terminal
CN105530356A (en) Mobile communication terminal and data protection method and apparatus thereof
CN104820805B (en) A kind of method and device of subscriber identification card information theft-preventing
CN103391354A (en) Information security system and information security method
CN105512524A (en) Method and device for controlling access right on terminal device
CN103885772A (en) Unlocking method and electronic device
CN104714641A (en) Locking and unlocking method and device for application program
CN105488368A (en) Safety protection method and system of electronic device
CN104243708A (en) Mobile terminal and anti-theft method and device of mobile terminal
CN103729919A (en) Electronic access control system
CN104598785B (en) A kind of method and device for entering different mode based on unlocking pin
CN104462929A (en) Privacy protection method and device for mobile equipment
CN104732150A (en) Starting method and device for mobile terminal
US20170337788A1 (en) Electronic device and anti-theft method
CN104809418B (en) Personal electronic device and personal electronic device loss protection system and method
CN105872992A (en) Mobile terminal remotely locking method and system
CN105809022A (en) Password verification method and electronic apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20130522