CN103118177A - Anti-theft protection method based on movable terminal and movable terminal - Google Patents
Anti-theft protection method based on movable terminal and movable terminal Download PDFInfo
- Publication number
- CN103118177A CN103118177A CN2013100158434A CN201310015843A CN103118177A CN 103118177 A CN103118177 A CN 103118177A CN 2013100158434 A CN2013100158434 A CN 2013100158434A CN 201310015843 A CN201310015843 A CN 201310015843A CN 103118177 A CN103118177 A CN 103118177A
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- stolen
- password
- release
- flag bit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Telephone Function (AREA)
Abstract
The invention discloses an anti-theft protection method based on a movable terminal. The method includes (1) detecting and judging whether transient acceleration exceeds an acceleration threshold value, (2) according to the judging result of the first step, locking and writing a zone bit to memorize a theft accident, (3) unlocking and judging whether unlocking is successful, (4) according to the judging result of the third step, judging whether the zone bit is true or false, and (5) according to the zone bit, starting a safety measure. Compared with the prior art, firstly whether the transient acceleration exceeds the acceleration threshold value is detected and judged; when the result is positive, the movable terminal is locked, and the zone bit is written in a system level to memorize the theft accident; then unlocking is carried out, and whether the zone bit is true or false is judged according to the unlocking result; and if the zone bit is false, then misjudging is indicated, and if the zone bit is true, the safe measure is started. Therefore, the privacy safety of the movable terminal is reliably and secretly protected. The invention meanwhile discloses the movable terminal with an anti-theft protection function.
Description
Technical field
The present invention relates to a kind of technical field of burglary prevention of terminal, relate in particular to a kind of stolen guard method and mobile terminal thereof of movement-based terminal.
Background technology
In recent years, fast development along with mobile communication, hand-held mobile terminal is more and more to intelligentized future development, for example the function of touch screen type smart mobile phone is also more and more at present, be not only to satisfy the means of communication that people connect each other, more become very important mobile accessory terminal in people's daily life.Due to the portability of mobile terminal, the user often is accustomed to important personal information or file etc. are stored in the inner, and especially commercial mobile terminal is more being stored very important information.Certainly, due to the portability of mobile terminal, its loss or stolen probability are also larger, in case mobile terminal is lost or be stolen, may cause great loss to the user.
For this reason, people develop the stolen safeguard function of some mobile terminals.But existing stolen defencive function is reliable and hidden mostly not, and very easily stolen taker is found.
Therefore, be necessary to provide a kind of more reliable, hidden stolen guard method to solve the deficiencies in the prior art.
Summary of the invention
The object of the present invention is to provide a kind of stolen guard method of movement-based terminal, to protect more reliably, snugly the personal secrets of mobile terminal.
Another object of the present invention is to provide a kind of mobile terminal with stolen defencive function, to protect more reliably, snugly the personal secrets of mobile terminal.
For achieving the above object, the invention provides a kind of stolen guard method of movement-based terminal, comprise the steps:
(1) detect the threshold value whether instantaneous acceleration that judges mobile terminal surpasses the acceleration of described mobile terminal;
(2) judged result according to (1) locks described mobile terminal and writes flag bit to remember stolen event in the system level of described mobile terminal;
(3) described mobile terminal is carried out release;
(4) the described flag bit of release result judgement according to (3) is true or false;
(5) start safety measure according to described flag bit.
Compared with prior art; due to the stolen guard method that the present invention is based on mobile terminal; at first detect the threshold value whether instantaneous acceleration that judges mobile terminal surpasses acceleration; when surpassing; to lock mobile terminal and write flag bit to remember stolen event in system level; afterwards mobile terminal is carried out release; again according to the release true or false of judgement symbol position as a result; if the judgement symbol position is false; be expressed as erroneous judgement; if the judgement symbol position is for very starting safety measure, thereby the personal secrets of mobile terminal have been protected more reliably, snugly.
Particularly, also comprise before in step (1): the threshold value of default described acceleration.
Particularly, step (2) adopts the described mobile terminal of coded lock locking.
Particularly, step (3) specifically comprises:
(31) the input password judges also whether the password of inputting is correct;
(32) if the password of inputting correctly judges the release success, otherwise, carry out step (33);
(33) whether the number of times of judgement input password is greater than three times;
(34) if number of times greater than three times, judges release failure, otherwise, repeating step (31).
Alternatively, step (3) specifically comprises:
Obtain the root authority of described mobile terminal;
Set up being connected of described mobile terminal and computer;
Judge whether by the described coded lock of described computer deletion.
Particularly, described safety measure take for the camera that starts described mobile terminal the head portrait of stealing taker and send described head portrait to default security number or the positioning starting that starts described mobile terminal to obtain geographical coordinate information and to send described geographical coordinate information to security number.
Correspondingly, the present invention also provides a kind of mobile terminal with stolen defencive function, comprising:
Detect judge module, whether surpass the threshold value of the acceleration of described mobile terminal for detection of the instantaneous acceleration that judges mobile terminal;
The locking memory module is used for carrying out lock operation and writing flag bit to remember stolen event in system level according to the judged result of described detection judge module;
Separate lock module, be used for carrying out unlocking operation;
The flag bit judge module, the described flag bit of release result judgement that is used for according to described solution lock module is true or false; And
Start module, be used for starting safety measure according to the judged result of described flag bit judge module.
In a preferred embodiment of the present invention, described mobile terminal also comprises:
Module is set, is used for the threshold value of default described acceleration.
Particularly, described solution lock module specifically comprises:
The Password Input unit is used for the input password;
The first judging unit is used for judging whether the password of described Password Input unit inputting is correct;
The second judging unit is used for judged result according to described the first judging unit and judges that whether the number of times of the password that described Password Input unit is inputted is greater than three times;
Identifying unit, be used for successful and failed according to the judged result judgement release of described the second judging unit according to the judged result judgement release of described the first judging unit as a result.
Particularly, described safety measure take for the camera that starts described mobile terminal the head portrait of stealing taker and send described head portrait to default security number or the positioning starting that starts described mobile terminal to obtain geographical coordinate information and to send described geographical coordinate information to security number.
By following description also by reference to the accompanying drawings, it is more clear that the present invention will become, and these accompanying drawings are used for explaining embodiments of the invention.
Description of drawings
Fig. 1 is the flow chart that the present invention is based on stolen guard method one embodiment of mobile terminal.
Fig. 2 is the flow chart of the described step S104 of Fig. 1.
Fig. 3 is the structured flowchart of theft preventing mobile terminal of the present invention.
Embodiment
With reference now to accompanying drawing, describe embodiments of the invention, in accompanying drawing, similar element numbers represents similar element.
Please refer to Fig. 1, the stolen guard method that the present invention is based on mobile terminal mainly comprises the steps:
Step S101, the threshold value of the acceleration of default mobile terminal; Be specially, setting threshold is 20g;
Step S102, detect judge mobile terminal instantaneous acceleration whether over the threshold value of the acceleration of mobile terminal, if, execution in step S103, otherwise, repeating step S102; Be specially, the instantaneous acceleration that mobile terminal detected is 30g, whether judges 30g greater than threshold value 20g, due to instantaneous acceleration greater than threshold value, therefore, execution in step S103;
Step S103, the locking mobile terminal also writes flag bit to remember stolen event in the system level of mobile terminal; That is, when instantaneous acceleration surpasses threshold value, judges stolenly, reach and write flag bit to remember stolen event in system level thereby adopt the coded lock mode to lock mobile terminal;
Step S104 carries out release and judges whether success of release mobile terminal, if, execution in step S105, otherwise, execution in step S106;
Step S105, the judgement symbol position is the false and normal mobile terminal that uses; Be specially, mobile terminal thinks that step S103 is erroneous judgement, and the user can normally use mobile terminal, and enters the stolen event of remembering in mobile terminal removing step S103; It should be noted that when removing the stolen time of being remembered, need to verify by password;
S106, the judgement symbol position is true and starts safety measure; Wherein, safety measure take for the camera that starts mobile terminal the head portrait of stealing taker and send head portrait to default security number or the positioning starting that starts mobile terminal to obtain geographical coordinate information and to send geographical coordinate information to security number; It should be noted that it is true also can flag bit being set in the locking mobile terminal, like this, all can start safety measure as long as robber's taker carries out any operation.
Particularly, as shown in Figure 2, step S104 specifically comprises:
Step S1041, the input password;
Step S1042, whether the password inputted of judgement is correct, if correct, execution in step S1043, otherwise, execution in step S1044;
Step S1043, judgement release success and execution in step S105;
Whether step S1044, the number of times of judgement input password greater than three times, if greater than, execution in step S1045, otherwise, repeating step S1042.
Step S1045, judgement release failure and execution in step S106.
Need to prove, after adopting said method with mobile terminal locking, can carry out in the following way release: (1) obtains the root authority of described mobile terminal; (2) set up being connected of described mobile terminal and computer; (3) judge whether to delete coded lock by computer.If mobile terminal is judged the operation of deleting coded lock by computer, can judgement symbol the position be true and start safety measure.
As can be seen from the above description; the present invention is based on the stolen guard method of mobile terminal; at first detect the threshold value whether instantaneous acceleration that judges mobile terminal surpasses acceleration; when surpassing; to lock mobile terminal and write flag bit to remember stolen event in system level; afterwards mobile terminal is carried out release; again according to the release true or false of judgement symbol position as a result; if the judgement symbol position is false; be expressed as erroneous judgement; if the judgement symbol position is true and starts safety measure, thereby protected more reliably, snugly the personal secrets of mobile terminal.
Correspondingly, the present invention also provides a kind of mobile terminal 100 with stolen defencive function.Need to prove, mobile terminal described in the invention can be mobile phone, notebook computer, panel computer or PDA etc.
Particularly, as shown in Figure 3, this mobile terminal 100 with stolen defencive function comprises:
Detect judge module 11, whether surpass the threshold value of the acceleration of mobile terminal for detection of the instantaneous acceleration that judges mobile terminal;
Locking memory module 12 is used for carrying out lock operation and writing flag bit to remember stolen event in system level according to the judged result that detects judge module 11; Be specially, when judgment result is that of detection judge module 11 was, locking memory module 12 just can be started working;
Flag bit judge module 14, be used for according to the release of separating lock module 13 as a result the judgement symbol position be true or false; And
Particularly, described solution lock module 13 specifically comprises:
The first judging unit 132 is used for judging whether the password of inputting Password Input unit 131 is correct;
The second judging unit 133 is used for judged result according to the first judging unit 132 and judges that whether the number of times of the password that Password Input unit 131 is inputted is greater than three times; Be specially, when the first judging unit 132 judgement password mistake, the second 133 of judging units can judge further that whether the password number of times of inputting Password Input unit 131 is greater than three times; When the second judging unit 133 when the determination result is NO, whether correctly can indicate the first judging unit 132 to continue the password that judgement inputs;
Identifying unit 134 as a result, are used for successful and failed according to the judged result judgement release of the second judging unit 133 according to the judged result judgement release of the first judging unit 132; Be specially, when correct, 134 of identifying units can judge the release success as a result when the first judging unit 132 judgement password, and when the second judging unit 133 was judged the password number of times inputted greater than three times, 134 of identifying units can be judged the release failure as a result.。
Need to prove, separate lock module 13 and can carry out in the following way release: (1) obtains the root authority of described mobile terminal 100; (2) set up being connected of described mobile terminal 100 and computer; (3) judge whether to delete coded lock by computer.If mobile terminal 100 is judged the operation of deleting coded lock by computer, can judgement symbol the position be true and start safety measure.
As mentioned above, the present invention has the mobile terminal 100 of stolen defencive function, judge that by detecting judge module 11 detections whether instantaneous acceleration is over the default threshold value of module 10 is set, if surpass, can carry out lock operation and write flag bit to remember stolen event in system level by locking memory module 12, otherwise, detect 11 of judge modules and can continue to detect; Afterwards, carry out unlocking operations by separating lock module 13, flag bit judge module 14 according to release as a result the judgement symbol position be false or true; At last, the flag bit that judges according to flag bit judge module 14 by startup module 15 is that genuine result starts safety measure, thereby has protected more reliably, snugly the personal secrets of mobile terminal.
Above disclosed is only the preferred embodiments of the present invention, certainly can not limit with this interest field of the present invention, and the equivalent variations of therefore doing according to the present patent application the scope of the claims still belongs to the scope that the present invention is contained.
Claims (10)
1. the stolen guard method of a movement-based terminal, is characterized in that, comprises the steps:
(1) detect the threshold value whether instantaneous acceleration that judges mobile terminal surpasses the acceleration of described mobile terminal;
(2) judged result according to (1) locks described mobile terminal and writes flag bit to remember stolen event in the system level of described mobile terminal;
(3) described mobile terminal is carried out release;
(4) the described flag bit of release result judgement according to (3) is true or false;
(5) start safety measure according to described flag bit.
2. the stolen guard method of movement-based terminal as claimed in claim 1, is characterized in that, also comprises before in step (1): the threshold value of default described acceleration.
3. the stolen guard method of movement-based terminal as claimed in claim 1, is characterized in that, step (2) adopts the described mobile terminal of coded lock locking.
4. the stolen guard method of movement-based terminal as claimed in claim 3, is characterized in that, step (3) specifically comprises:
(31) the input password judges also whether the password of inputting is correct;
(32) if the password of inputting correctly judges the release success, otherwise, carry out step (33);
(33) whether the number of times of judgement input password is greater than three times;
(34) if number of times greater than three times, judges release failure, otherwise, repeating step (31).
5. the stolen guard method of movement-based terminal as claimed in claim 3, is characterized in that, step (3) specifically comprises:
Obtain the root authority of described mobile terminal;
Set up being connected of described mobile terminal and computer;
Judge whether by the described coded lock of described computer deletion.
6. the stolen guard method of movement-based terminal as described in claim 1 to 5 any one; it is characterized in that, described safety measure take for the camera that starts described mobile terminal the head portrait of stealing taker and send described head portrait to default security number or the positioning starting that starts described mobile terminal to obtain geographical coordinate information and to send described geographical coordinate information to security number.
7. the mobile terminal with stolen defencive function, is characterized in that, comprising:
Detect judge module, whether surpass the threshold value of the acceleration of described mobile terminal for detection of the instantaneous acceleration that judges mobile terminal;
The locking memory module is used for carrying out lock operation and writing flag bit to remember stolen event in system level according to the judged result of described detection judge module;
Separate lock module, be used for carrying out unlocking operation;
The flag bit judge module, the described flag bit of release result judgement that is used for according to described solution lock module is true or false; And
Start module, be used for starting safety measure according to the judged result of described flag bit judge module.
8. the mobile terminal with stolen defencive function as claimed in claim 7, is characterized in that, also comprises:
Module is set, is used for the threshold value of default described acceleration.
9. the mobile terminal with stolen defencive function as claimed in claim 7, is characterized in that, described solution lock module specifically comprises:
The Password Input unit is used for the input password;
The first judging unit is used for judging whether the password of described Password Input unit inputting is correct;
The second judging unit is used for judged result according to described the first judging unit and judges that whether the number of times of the password that described Password Input unit is inputted is greater than three times;
Identifying unit, be used for successful and failed according to the judged result judgement release of described the second judging unit according to the judged result judgement release of described the first judging unit as a result.
10. the mobile terminal with stolen defencive function as described in claim 7 to 9 any one; it is characterized in that, described safety measure take for the camera that starts described mobile terminal the head portrait of stealing taker and send described head portrait to default security number or the positioning starting that starts described mobile terminal to obtain geographical coordinate information and to send described geographical coordinate information to security number.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2013100158434A CN103118177A (en) | 2013-01-16 | 2013-01-16 | Anti-theft protection method based on movable terminal and movable terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2013100158434A CN103118177A (en) | 2013-01-16 | 2013-01-16 | Anti-theft protection method based on movable terminal and movable terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103118177A true CN103118177A (en) | 2013-05-22 |
Family
ID=48416447
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2013100158434A Pending CN103118177A (en) | 2013-01-16 | 2013-01-16 | Anti-theft protection method based on movable terminal and movable terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103118177A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103957325A (en) * | 2014-05-21 | 2014-07-30 | 深圳市金立通信设备有限公司 | Terminal alarm method and terminal |
CN104298927A (en) * | 2014-09-24 | 2015-01-21 | 青岛海信移动通信技术股份有限公司 | Terminal burglary prevention method and terminal |
CN104980577A (en) * | 2015-06-09 | 2015-10-14 | 张维秀 | Mobile terminal positioning method and mobile terminal |
CN105870995A (en) * | 2016-03-30 | 2016-08-17 | 乐视控股(北京)有限公司 | Charging method, charging device and charging system of data line with lock |
CN106060214A (en) * | 2016-07-18 | 2016-10-26 | 永德利硅橡胶科技(深圳)有限公司 | Method for preventing mobile phone from being lost based on mobile phone shell |
CN106657583A (en) * | 2016-09-30 | 2017-05-10 | 努比亚技术有限公司 | Alarm method, device and terminal |
CN109391630A (en) * | 2018-11-28 | 2019-02-26 | 平安科技(深圳)有限公司 | Mobile terminal locking method and system |
WO2019041143A1 (en) * | 2017-08-29 | 2019-03-07 | 深圳传音通讯有限公司 | Security control method for mobile terminal, terminal, and computer readable medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102256027A (en) * | 2010-05-20 | 2011-11-23 | 英华达(上海)电子有限公司 | Alarming method and alarming terminal |
US20120309432A1 (en) * | 2010-09-03 | 2012-12-06 | Huizhou Tcl Mobile Communication Co., Ltd | System and method for tracking stolen communication terminal, and communication terminal |
-
2013
- 2013-01-16 CN CN2013100158434A patent/CN103118177A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102256027A (en) * | 2010-05-20 | 2011-11-23 | 英华达(上海)电子有限公司 | Alarming method and alarming terminal |
US20120309432A1 (en) * | 2010-09-03 | 2012-12-06 | Huizhou Tcl Mobile Communication Co., Ltd | System and method for tracking stolen communication terminal, and communication terminal |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103957325A (en) * | 2014-05-21 | 2014-07-30 | 深圳市金立通信设备有限公司 | Terminal alarm method and terminal |
CN103957325B (en) * | 2014-05-21 | 2016-05-25 | 深圳市金立通信设备有限公司 | Method and terminal that a kind of terminal is reported to the police |
CN104298927A (en) * | 2014-09-24 | 2015-01-21 | 青岛海信移动通信技术股份有限公司 | Terminal burglary prevention method and terminal |
CN104298927B (en) * | 2014-09-24 | 2018-04-27 | 青岛海信移动通信技术股份有限公司 | A kind of terminal anti-theft method and terminal |
CN104980577A (en) * | 2015-06-09 | 2015-10-14 | 张维秀 | Mobile terminal positioning method and mobile terminal |
CN105870995A (en) * | 2016-03-30 | 2016-08-17 | 乐视控股(北京)有限公司 | Charging method, charging device and charging system of data line with lock |
CN106060214A (en) * | 2016-07-18 | 2016-10-26 | 永德利硅橡胶科技(深圳)有限公司 | Method for preventing mobile phone from being lost based on mobile phone shell |
CN106060214B (en) * | 2016-07-18 | 2018-11-27 | 永德利硅橡胶科技(深圳)有限公司 | A method of prevent mobile phone from losing based on mobile phone shell |
CN106657583A (en) * | 2016-09-30 | 2017-05-10 | 努比亚技术有限公司 | Alarm method, device and terminal |
WO2019041143A1 (en) * | 2017-08-29 | 2019-03-07 | 深圳传音通讯有限公司 | Security control method for mobile terminal, terminal, and computer readable medium |
CN109391630A (en) * | 2018-11-28 | 2019-02-26 | 平安科技(深圳)有限公司 | Mobile terminal locking method and system |
CN109391630B (en) * | 2018-11-28 | 2022-10-25 | 平安科技(深圳)有限公司 | Mobile terminal locking method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103118177A (en) | Anti-theft protection method based on movable terminal and movable terminal | |
RU2608243C2 (en) | Method and device for screen and terminal unlocking | |
US9432367B2 (en) | Processing method for piecing together fingerprint based on mobile terminal and mobile terminal | |
US20150156313A1 (en) | Screen unlocking method and device for mobile terminal | |
US20170277881A1 (en) | Method and system for improving security of a mobile terminal | |
US20150048943A1 (en) | Anti-loss Systems and Methods for Mobile Devices | |
CN103034813A (en) | Method and system for protecting data of mobile terminal | |
CN104679387A (en) | Privacy information protection method and terminal | |
US20160134625A1 (en) | Method and apparatus for controlling communications terminal and corresponding communications terminal | |
CN105530356A (en) | Mobile communication terminal and data protection method and apparatus thereof | |
CN104820805B (en) | A kind of method and device of subscriber identification card information theft-preventing | |
CN103391354A (en) | Information security system and information security method | |
CN105512524A (en) | Method and device for controlling access right on terminal device | |
CN103885772A (en) | Unlocking method and electronic device | |
CN104714641A (en) | Locking and unlocking method and device for application program | |
CN105488368A (en) | Safety protection method and system of electronic device | |
CN104243708A (en) | Mobile terminal and anti-theft method and device of mobile terminal | |
CN103729919A (en) | Electronic access control system | |
CN104598785B (en) | A kind of method and device for entering different mode based on unlocking pin | |
CN104462929A (en) | Privacy protection method and device for mobile equipment | |
CN104732150A (en) | Starting method and device for mobile terminal | |
US20170337788A1 (en) | Electronic device and anti-theft method | |
CN104809418B (en) | Personal electronic device and personal electronic device loss protection system and method | |
CN105872992A (en) | Mobile terminal remotely locking method and system | |
CN105809022A (en) | Password verification method and electronic apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20130522 |