CN103679070A - Anti-theft method and device of terminal and terminal equipment - Google Patents

Anti-theft method and device of terminal and terminal equipment Download PDF

Info

Publication number
CN103679070A
CN103679070A CN201310654309.8A CN201310654309A CN103679070A CN 103679070 A CN103679070 A CN 103679070A CN 201310654309 A CN201310654309 A CN 201310654309A CN 103679070 A CN103679070 A CN 103679070A
Authority
CN
China
Prior art keywords
terminal
touch control
prompting
control operation
duration
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310654309.8A
Other languages
Chinese (zh)
Inventor
王义春
石新明
底浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiaomi Inc
Original Assignee
Xiaomi Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaomi Inc filed Critical Xiaomi Inc
Priority to CN201310654309.8A priority Critical patent/CN103679070A/en
Publication of CN103679070A publication Critical patent/CN103679070A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures

Abstract

The invention discloses an anti-theft method and device of a terminal and terminal equipment. The anti-theft method and device of the terminal and the terminal equipment can prevent the terminal from being stolen right the first time, and effectively reduce the risk that the terminal is stolen. The anti-theft method comprises the steps of obtaining touch operation, judging whether the time length of the obtained touch operation is larger than a preset time length or not, detecting the number of unlocking operation times when the time length of the touch operation is judged to be not smaller than the preset time length, judging whether the number of the unlocking operation times is larger than the number of preset unlocking times or not, and outputting information prompting that the terminal is stolen when the number of the unlocking operation times exceeds the number of the preset unlocking times.

Description

A kind of theft preventing method of terminal, device and terminal device
Technical field
The disclosure is directed to intelligent terminal technical field, especially about a kind of theft preventing method, device and terminal device of terminal.
Background technology
Along with the continuous increase of intelligent terminal (such as smart mobile phone, panel computer etc.) function, intelligent terminal is greatly changing people's life style and working method.For example, people can use that intelligent terminal receiving and dispatching mail is handled official business, shopping online, social interaction etc.Once stolen, will have a huge impact individual life, work, make troubles, even entail dangers to is to individual property safety.Instantly, the stolen event of intelligent terminal is more and more, yet have good scheme in correlation technique, does not address this problem, and has become technical matters urgently to be resolved hurrily at present.
Summary of the invention
For overcoming the problem existing in correlation technique, the disclosure provides a kind of theft preventing method, device and terminal device of terminal, can take precautions against terminal in the very first time stolen, effectively reduces the stolen risk of terminal.
On the one hand, the disclosure provides a kind of theft preventing method of terminal, comprising:
Obtain touch control operation;
The duration of touch control operation and the size of default duration that judgement is obtained;
When judging the duration of described touch control operation and be not less than described default duration, detect the number of times of unlocking operation;
Judge the number of times and the size of setting release number of times of described unlocking operation;
When judging the number of times of described unlocking operation over described setting release number of times, the stolen information of output prompting.
Beneficial effects more of the present disclosure can comprise: when judging the number of times of unlocking operation over setting release number of times, by the stolen information of terminal output prompting, user can obtain information in the very first time, effectively reduces the stolen risk of terminal.
Described theft preventing method also comprises:
Distance between testing and setting terminal;
When detecting while surpassing the first predeterminable range with the distance of described setting terminal, send the stolen information of prompting to described setting terminal.
Beneficial effects more of the present disclosure can comprise: can terminal be carried out associated with setting terminal, when the distance between terminal and setting terminal surpasses the first predeterminable range, send the stolen information of prompting to setting terminal, user can obtain information from setting terminal in the very first time, effectively reduces the stolen risk of terminal.
Described obtain touch control operation before, described theft preventing method also comprises:
Detect and object between distance be less than the second predeterminable range.
Beneficial effects more of the present disclosure can comprise: when detect and object between distance while being less than the second predeterminable range, detect whether there is touch control operation, the loss that can economize on resources, increasing terminal can stand-by time.
Described unlocking operation comprises being unlocked by fingerprint operation or unlock password operation.
Unlocking operation of the present disclosure can comprise various ways, to meet user's different demands.
When judging the number of times of described unlocking operation over described setting release number of times, the stolen information of output prompting, comprising:
Export the stolen information of prompting to described setting terminal or server.
Beneficial effects more of the present disclosure can comprise: user can receive information by the setting terminal beyond terminal in time, and strick precaution terminal is stolen.
The stolen information of described prompting comprises vibration prompt, prompt tone, lights screen prompt, in short message prompt any or multiple.
The disclosure can point out strick precaution terminal stolen in several ways.
On the other hand, the disclosure provides a kind of anti-theft device of terminal, comprising:
Acquisition module, for obtaining touch control operation;
The first judge module, for judging the size of duration and the default duration of the touch control operation obtaining;
First detection module, for when judging the duration of described touch control operation and be not less than described default duration, detects the number of times of unlocking operation;
The second judge module, for judging the number of times and the size of setting release number of times of described unlocking operation;
Reminding module, for when judging the number of times of described unlocking operation over described setting release number of times, the stolen information of output prompting.
Described anti-theft device also comprises:
The second detection module, for detection of and setting terminal between distance;
Sending module, for when detecting while surpassing the first predeterminable range with the distance of described setting terminal, sends the stolen information of prompting to described setting terminal.
Described anti-theft device also comprises:
Detection module, before obtaining touch control operation at described acquisition module, detect and object between distance be less than the second predeterminable range.
Described reminding module comprises:
Prompting submodule, for exporting the stolen information of prompting to described setting terminal or server.
On the other hand, the disclosure provides a kind of terminal device, terminal device includes storer, and one or more than one program, the above program of one of them or one is stored in storer, and is configured to carry out described one or above routine package containing for carrying out the instruction of following operation by one or above processor:
Obtain touch control operation;
The duration of touch control operation and the size of default duration that judgement is obtained;
When judging the duration of described touch control operation and be not less than described default duration, detect the number of times of unlocking operation;
Judge the number of times and the size of setting release number of times of described unlocking operation;
When judging the number of times of described unlocking operation over described setting release number of times, the stolen information of output prompting.
Should be understood that, it is only exemplary that above general description and details are hereinafter described, and can not limit the disclosure.
Accompanying drawing explanation
Accompanying drawing described herein is used to provide further understanding of the disclosure, forms the application's a part, does not form restriction of the present disclosure.In the accompanying drawings:
Fig. 1 is the exemplary process diagram of the theft preventing method of the terminal that provides of the disclosure;
Fig. 2 is the structural representation of the anti-theft circuit that provides of the disclosure;
Fig. 3 is the exemplary process diagram of the embodiment mono-that provides of the disclosure;
Fig. 4 A is the exemplary process diagram of the embodiment bis-that provides of the disclosure;
Fig. 4 B is the exemplary process diagram of the embodiment tri-that provides of the disclosure;
Fig. 5 is the exemplary block diagram of the anti-theft device of the terminal that provides of the disclosure;
Fig. 6 is a kind of detailed example structural drawing of the anti-theft device of the terminal that provides of the disclosure;
Fig. 7 is the another kind of detailed example structural drawing of the anti-theft device of the terminal that provides of the disclosure;
Fig. 8 is the exemplary block diagram of reminding module in the anti-theft device of the terminal that provides of the disclosure;
Fig. 9 is the structural representation of the terminal device that provides of the disclosure.
By above-mentioned accompanying drawing, the embodiment that the disclosure is clear and definite has been shown, will there is more detailed description hereinafter.These accompanying drawings and text description are not in order to limit the scope of disclosure design by any mode, but by reference to specific embodiment for those skilled in the art illustrate concept of the present disclosure.
Embodiment
For making object of the present disclosure, technical scheme and advantage clearer, below in conjunction with embodiment and accompanying drawing, the disclosure is described in further details.At this, exemplary embodiment of the present disclosure and explanation thereof are used for explaining the disclosure, but not as to restriction of the present disclosure.
Disclosure embodiment provides a kind of theft preventing method, device and terminal device of terminal, below in conjunction with accompanying drawing, the disclosure is elaborated.
In disclosure embodiment, by the stolen information of terminal output prompting, user can obtain information in the very first time, effectively reduces the stolen risk of terminal.
In one embodiment, as shown in Figure 1, a kind of theft preventing method of terminal comprises the following steps:
In step 101, obtain touch control operation, the method for the present embodiment can be used for the terminal devices such as smart mobile phone, panel computer.
Wherein, touch control operation can be the operation of object touch terminal, for example, can in terminal, design an anti-theft circuit for detection of whether there being object touch terminal.As shown in Figure 2, this anti-theft circuit is mainly comprised of anti-theft circuit master chip 21 and plate condenser 22, the upper and lower two-layer bonding jumper 23 being arranged on terminal enclosure inside surface and the sheet metal 24 of simulating object of being respectively of plate condenser 22, anti-theft circuit master chip 21 is connected with bonding jumper 23.The capacitance computing formula of plate condenser is as follows:
C = ϵ 0 S d
Wherein, the capacitance that C is plate condenser, ε 0for permittivity of vacuum, S is the area of plate condenser plate, and d is the distance between plate condenser two plates.As shown from the above formula, the capacitance C of plate condenser is directly proportional to the area S of plate condenser plate, distance d between the capacitance C of plate condenser and plate condenser two plates is inversely proportional to, and whether the capacitance C of plate condenser and plate condenser be charged irrelevant, only relevant with the planform of plate condenser itself.
When object near terminal until contact process in, the distance d being equivalent between plate condenser two plates reduces gradually, the capacitance of plate condenser increases gradually; When object touch terminal (being the outside surface of object touch terminal shell), distance d between plate condenser two plates is equivalent to the thickness of terminal enclosure, capacitance is now maximum, deposits in anti-theft circuit master chip, as threshold value capacitance after capacitance is now calculated and surveyed.When anti-theft circuit master chip detects the variation of capacitance and reaches threshold value capacitance, judge and now have object to touch terminal.In addition, can also adopt alternate manner to detect whether there is object touch terminal, not enumerate herein.
In one embodiment, because anti-theft circuit need to be in running order for detection of whether having object touch terminal all the time, can bring larger resource loss, for the loss that economizes on resources, increasing terminal can stand-by time, before execution step 101, also can comprise the following steps A:
Steps A, detect and object between distance be less than the second predeterminable range.
Can utilize range sensor sense terminals in terminal and the distance between object, when distance between terminal and object being detected and be less than the second predeterminable range, the information that range sensor is less than the second predeterminable range by the distance between terminal and object sends to processor, after the information that processor receiving range sensor sends, send instruction and start anti-theft circuit.Wherein, range sensor utilizes the distance between optical principle sense terminals and object, and concrete testing process is: range sensor emits beam, the distance of the path that light is reflected by the object back to range sensor between terminal and object.In addition, can also adopt the distance between alternate manner sense terminals and object, not enumerate herein.
In step 102, the duration of touch control operation and the size of default duration that judgement is obtained.
In step 103, when judging the duration of touch control operation and be not less than default duration, detect the number of times of unlocking operation.
Wherein, unlocking operation can be fingerprint unlocking operation, or can be also unlock password operation.Unlocking screen is set and can has various ways: for example, by key combination, carry out unlocking screen; According to fixation locus, carry out touch operation, unlocking screen is realized in region that release element is moved to fill in the blanks to target area; Can also carry out according to characteristics of human body the unlocking screen of terminal, as carried out unlocking screen by features such as identification people face, fingerprint, sound.In addition, can also unlocking screen be set by alternate manner.
In step 104, the number of times of judgement unlocking operation and the size of setting release number of times.
In step 105, when judging the number of times of unlocking operation over setting release number of times, the stolen information of output prompting.
Wherein, pointing out stolen information can be vibration prompt; Or can be prompt tone, as specific music, specific buzzer or default voice etc.; Or can be to light screen prompt, while lighting screen, can also on the screen of terminal, show for the pattern reminded and/or word etc.; Or can also be short message prompt; Or can also be vibration prompt, prompt tone, light the arbitrary combination in screen prompt, short message prompt.In addition, other can be used for the stolen information of alerting strick precaution terminal and is all applicable to the present embodiment, does not enumerate herein.
In one embodiment, terminal and setting terminal can be carried out associatedly, before step 101 or after step 105, also can comprise the following steps B1-B2:
Distance between step B1, testing and setting terminal.
Step B2, when detecting while surpassing the first predeterminable range with the distance of setting terminal, send the stolen information of prompting to setting terminal.
Like this, when the distance between terminal and setting terminal surpasses the first predeterminable range, send the stolen information of prompting to setting terminal, user can obtain information from setting terminal in the very first time, effectively reduces the stolen risk of terminal.
In one embodiment, above-mentioned steps 105 can comprise the following steps C:
Step C, export the stolen information of prompting to setting terminal or server.
For example, can export the stolen information of prompting to bluetooth earphone, by bluetooth earphone output information, like this, user can receive information in time, and strick precaution terminal is stolen.
In disclosure embodiment, by the stolen information of terminal output prompting, user can obtain information in the very first time, effectively reduces the stolen risk of terminal; And, terminal and setting terminal are carried out associated, when the distance between terminal and setting terminal surpasses the first predeterminable range, send the stolen information of prompting to setting terminal, user can obtain information from setting terminal in the very first time, effectively reduces the stolen risk of terminal.
More than introduce the multiple implementation of each link in the embodiment shown in Fig. 1, below by several embodiment, introduced in detail implementation procedure.
Embodiment mono-
In embodiment mono-, utilize range sensor sense terminals in terminal and the distance between object, when distance between terminal and object being detected and be less than the second predeterminable range, by the anti-theft circuit (as shown in Figure 2) designing in terminal, detect whether there is object touch terminal.As shown in Figure 3, a kind of theft preventing method of terminal comprises the following steps:
In step 301, terminal detect and object between distance be less than the second predeterminable range, the method for the present embodiment can be used for the terminal devices such as smart mobile phone, panel computer.
Can utilize range sensor sense terminals in terminal and the distance between object, when distance between terminal and object being detected and be less than the second predeterminable range, the information that range sensor is less than the second predeterminable range by the distance between terminal and object sends to processor, after the information that processor receiving range sensor sends, send instruction and start anti-theft circuit.
In step 302, terminal is obtained touch control operation.
Wherein, touch control operation can be the operation of object touch terminal, for example, can utilize the anti-theft circuit designing in terminal to detect whether there is object touch terminal.Specifically can, referring to abovementioned steps 101, repeat no longer one by one herein.
In step 303, whether the duration of the touch control operation that terminal judges is obtained is more than or equal to default duration, if so, continues step 304; Otherwise, return and continue execution step 303.
In step 304, terminal detects the number of times of unlocking operation.Wherein, unlocking operation can be fingerprint unlocking operation, or can be also unlock password operation.
In step 305, whether the number of times of terminal judges unlocking operation surpasses is set release number of times, if so, continues execution step 306; Otherwise, return to execution step 301.
In step 306, the stolen information of terminal output prompting.
Wherein, pointing out stolen information can be vibration prompt; Or can be prompt tone, as specific music, specific buzzer or default voice etc.; Or can be to light screen prompt, while lighting screen, can also on the screen of terminal, show for the pattern reminded and/or word etc.; Or can also be short message prompt; Or can also be vibration prompt, prompt tone, light the arbitrary combination in screen prompt, short message prompt.In addition, other can be used for the stolen information of alerting strick precaution terminal and is all applicable to the present embodiment, does not enumerate herein.
In the present embodiment one, by the stolen information of terminal output prompting, user can obtain information in the very first time, effectively reduces the stolen risk of terminal; And utilize range sensor sense terminals in terminal and the distance between object, when distance between terminal and object being detected and be less than the second predeterminable range, the information that range sensor is less than the second predeterminable range by the distance between terminal and object sends to processor, after the information that processor receiving range sensor sends, send instruction and start anti-theft circuit, do not need opening anti-theft circuit all the time, the loss that economizes on resources, increasing terminal can stand-by time.
Embodiment bis-
In embodiment bis-, terminal and setting terminal are carried out associated, when the distance between terminal and setting terminal surpasses the first predeterminable range, send the stolen information of prompting to setting terminal, user can obtain information from setting terminal in the very first time, effectively reduces the stolen risk of terminal.As shown in Figure 4 A, a kind of theft preventing method of terminal comprises the following steps:
In step 401, the distance between terminal testing and setting terminal, the method for the present embodiment can be used for the terminal devices such as smart mobile phone, panel computer.
In step 402, when detecting while surpassing the first predeterminable range with the distance of setting terminal, terminal sends the stolen information of prompting to setting terminal.
In step 403, terminal is obtained touch control operation.
Wherein, touch control operation can be the operation of object touch terminal, for example, can utilize the anti-theft circuit designing in terminal to detect whether there is object touch terminal.Specifically can, referring to abovementioned steps 101, repeat no longer one by one herein.
In step 404, whether the duration of the touch control operation that terminal judges is obtained is more than or equal to default duration, if so, continues step 405; Otherwise, return and continue execution step 404.
In step 405, terminal detects the number of times of unlocking operation.Wherein, unlocking operation can be fingerprint unlocking operation, or can be also unlock password operation.
In step 406, whether the number of times of terminal judges unlocking operation surpasses is set release number of times, if so, continues execution step 407; Otherwise, return to execution step 401.
In step 407, the stolen information of terminal output prompting.
In implementation process, above-mentioned steps 401 to step 402 can also, after step 407, repeat herein no longer one by one.
In the present embodiment two, terminal is carried out associated with setting terminal, when the distance between terminal and setting terminal surpasses the first predeterminable range, send the stolen information of prompting to setting terminal, user can obtain information from setting terminal in the very first time, effectively reduces the stolen risk of terminal.
Embodiment tri-
In embodiment tri-, export the stolen information of prompting to setting terminal or server, by setting terminal or server output information, like this, user can receive information in time, and strick precaution terminal is stolen.As shown in Figure 4 B, a kind of theft preventing method of terminal comprises the following steps:
In step 411, terminal detect and object between distance be less than the second predeterminable range, the method for the present embodiment can be used for the terminal devices such as smart mobile phone, panel computer.
In step 412, terminal is obtained touch control operation.
In step 413, whether the duration of the touch control operation that terminal judges is obtained is more than or equal to default duration, if so, continues step 414; Otherwise, return and continue execution step 413.
In step 414, terminal detects the number of times of unlocking operation.
In step 415, whether the number of times of terminal judges unlocking operation surpasses is set release number of times, if so, continues execution step 416; Otherwise, return to execution step 411.
In step 416, terminal exports the stolen information of prompting to setting terminal or server.
Can export the stolen information of prompting to bluetooth earphone, by bluetooth earphone output information, like this, user can receive information in time, and strick precaution terminal is stolen.
In step 417, the distance between terminal testing and setting terminal.
In step 418, when detecting while surpassing the first predeterminable range with the distance of setting terminal, terminal sends the stolen information of prompting to setting terminal.
In the present embodiment three, export the stolen information of prompting to setting terminal or server, by setting terminal or server output information, like this, user can receive information in time, and strick precaution terminal is stolen.
It should be noted that, in practical application, above-mentioned all optional embodiments can adopt the mode combination in any of combination, form optional embodiment of the present disclosure, and this is no longer going to repeat them.
By above description, understood the theft preventing method implementation procedure of terminal, this process can be realized by device, below inner structure and the function of device is introduced.
In one embodiment, as shown in Figure 5, a kind of anti-theft device of terminal comprises: acquisition module 501, the first judge module 502, first detection module 503, the second judge module 504 and reminding module 505.
Acquisition module 501, for obtaining touch control operation;
The first judge module 502, for judging the size of duration and the default duration of the touch control operation obtaining;
First detection module 503, for when judging the duration of touch control operation and be not less than default duration, detects the number of times of unlocking operation;
The second judge module 504, for judging the number of times and the size of setting release number of times of unlocking operation;
Reminding module 505, for when judging the number of times of unlocking operation over setting release number of times, the stolen information of output prompting.
In one embodiment, as shown in Figure 6, the anti-theft device that above-mentioned Fig. 5 shows also can comprise:
The second detection module 601, for detection of and setting terminal between distance;
Sending module 602, for when detecting while surpassing the first predeterminable range with the distance of setting terminal, sends the stolen information of prompting to setting terminal.
In one embodiment, as shown in Figure 7, the anti-theft device that above-mentioned Fig. 5 shows also can comprise:
Detection module 701, before obtaining touch control operation at acquisition module 501, detect and object between distance be less than the second predeterminable range.
In one embodiment, unlocking operation comprises being unlocked by fingerprint operation or unlock password operation.
In one embodiment, as shown in Figure 8, above-mentioned reminding module 505 can comprise:
Prompting submodule 801, for exporting the stolen information of prompting to setting terminal or server.
In one embodiment, point out stolen information to comprise vibration prompt, prompt tone, light screen prompt, in short message prompt any or multiple.
In one embodiment, a kind of terminal, comprises above-mentioned arbitrary anti-theft device.
Fig. 9 is the structural representation of terminal device in disclosure embodiment.Referring to Fig. 9, this terminal can be for the method for implementing to provide in above-described embodiment.Preferred:
Terminal device 800 can comprise communication unit 110, includes the storer 120 of one or more computer-readable recording mediums, input block 130, display unit 140, sensor 150, voicefrequency circuit 160, wireless communication unit 170, include the parts such as or above processor 180 of processing core and power supply 190.It will be understood by those skilled in the art that the terminal device structure shown in Fig. 9 does not form the restriction to terminal device, can comprise the parts more more or less than diagram, or combine some parts, or different parts are arranged.Wherein:
Communication unit 110 can be used for receiving and sending messages or communication process in, the reception of signal and transmission, this communication unit 110 can be RF(Radio Frequency, radio frequency) circuit, router, modulator-demodular unit, etc. network communication equipment.Especially, when communication unit 110 is RF circuit, after the downlink information of base station is received, transfer to one or above processor 180 processing; In addition, by relating to up data, send to base station.Conventionally, RF circuit as communication unit includes but not limited to antenna, at least one amplifier, tuner, one or more oscillator, subscriber identity module (SIM) card, transceiver, coupling mechanism, LNA(Low Noise Amplifier, low noise amplifier), diplexer etc.In addition, communication unit 110 can also be by radio communication and network and other devices communicatings.Radio communication can be used arbitrary communication standard or agreement, include but not limited to GSM(Global System of Mobile communication, global system for mobile communications), GPRS(General Packet Radio Service, general packet radio service), CDMA(Code Division Multiple Access, CDMA), WCDMA(Wideband Code Division Multiple Access, Wideband Code Division Multiple Access (WCDMA)), LTE(Long Term Evolution, Long Term Evolution), Email, SMS(Short Messaging Service, Short Message Service) etc.Storer 120 can be used for storing software program and module, and processor 180 is stored in software program and the module of storer 120 by operation, thereby carries out various function application and data processing.Storer 120 can mainly comprise storage program district and storage data field, wherein, and the application program (such as sound-playing function, image player function etc.) that storage program district can storage operation system, at least one function is required etc.; The data (such as voice data, phone directory etc.) that create according to the use of terminal device 800 etc. can be stored in storage data field.In addition, storer 120 can comprise high-speed random access memory, can also comprise nonvolatile memory, for example at least one disk memory, flush memory device or other volatile solid-state parts.Correspondingly, storer 120 can also comprise Memory Controller, so that the access of processor 180 and 130 pairs of storeies 120 of input block to be provided.
Input block 130 can be used for receiving numeral or the character information of input, and generation arranges with user and function is controlled relevant keyboard, mouse, control lever, optics or the input of trace ball signal.Preferably, input block 130 can comprise touch-sensitive surperficial 131 and other input equipments 132.Touch-sensitive surperficial 131, also referred to as touch display screen or Trackpad, can collect user or near touch operation (using any applicable object or near the operations of annex on touch-sensitive surperficial 131 or touch-sensitive surperficial 131 such as finger, stylus such as user) thereon, and drive corresponding coupling arrangement according to predefined formula.Optionally, touch-sensitive surperficial 131 can comprise touch detecting apparatus and two parts of touch controller.Wherein, touch detecting apparatus detects user's touch orientation, and detects the signal that touch operation is brought, and sends signal to touch controller; Touch controller receives touch information from touch detecting apparatus, and converts it to contact coordinate, then gives processor 180, and the order that energy receiving processor 180 is sent is also carried out.In addition, can adopt the polytypes such as resistance-type, condenser type, infrared ray and surface acoustic wave to realize touch-sensitive surperficial 131.Except touch-sensitive surperficial 131, input block 130 can also comprise other input equipments 132.Preferably, other input equipments 132 can include but not limited to one or more in physical keyboard, function key (controlling button, switch key etc. such as volume), trace ball, mouse, control lever etc.
Display unit 140 can be used for showing the information inputted by user or the various graphical user interface of the information that offers user and terminal device 800, and these graphical user interface can consist of figure, text, icon, video and its combination in any.Display unit 140 can comprise display panel 141, optionally, can adopt LCD(Liquid Crystal Display, liquid crystal display), OLED(Organic Light-Emitting Diode, Organic Light Emitting Diode) etc. form configure display panel 141.Further, touch-sensitive surperficial 131 can cover display panel 141, when touch-sensitive surperficial 131 detect thereon or near touch operation after, send processor 180 to determine the type of touch event, corresponding vision output is provided according to the type of touch event with preprocessor 180 on display panel 141.Although in Fig. 9, touch-sensitive surperficial 131 with display panel 141 be as two independently parts realize input and input function, in certain embodiments, can by touch-sensitive surperficial 131 and display panel 141 integrated and realize input and output function.
Terminal device 800 also can comprise at least one sensor 150, such as optical sensor, motion sensor and other sensors.Optical sensor can comprise ambient light sensor and proximity transducer, wherein, ambient light sensor can regulate according to the light and shade of ambient light the brightness of display panel 141, and proximity transducer can, when terminal device 800 moves in one's ear, cut out display panel 141 and/or backlight.A kind of as motion sensor, Gravity accelerometer can detect the size of the acceleration that (is generally three axles) in all directions, when static, can detect size and the direction of gravity, can be used for identifying application (such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as passometer, knock) of mobile phone attitude etc.; As for terminal device 800 other sensors such as configurable gyroscope, barometer, hygrometer, thermometer, infrared ray sensor also, do not repeat them here.
Voicefrequency circuit 160, loudspeaker 161, microphone 162 can provide the audio interface between user and terminal device 800.Voicefrequency circuit 160 can be transferred to loudspeaker 161 by the electric signal after the voice data conversion receiving, and is converted to voice signal exports by loudspeaker 161; On the other hand, microphone 162 is converted to electric signal by the voice signal of collection, after being received by voicefrequency circuit 160, be converted to voice data, after again voice data output processor 180 being processed, through RF circuit 110, to send to such as another terminal device, or export voice data to storer 120 to further process.Voicefrequency circuit 160 also may comprise earphone jack, so that communicating by letter of peripheral hardware earphone and terminal device 800 to be provided.
In order to realize radio communication, on this terminal device, can dispose wireless communication unit 170, this wireless communication unit 170 can be WIFI(Wireless Fidelity, Wireless Fidelity) module.WIFI belongs to short range wireless transmission technology, terminal device 800 by wireless communication unit 170 can help that user sends and receive e-mail, browsing page and access streaming video etc., it provides wireless broadband internet access for user.Although wireless communication unit 170 has been shown in Fig. 9, be understandable that, it does not belong to must forming of terminal device 800, completely can be as required in not changing the essential scope of invention and omit.
Processor 180 is control centers of terminal device 800, utilize the various piece of various interface and the whole mobile phone of connection, by moving or carry out software program and/or the module being stored in storer 120, and call the data that are stored in storer 120, carry out various functions and the deal with data of terminal device 800, thereby mobile phone is carried out to integral monitoring.Optionally, processor 180 can comprise one or more processing cores; Preferably, processor 180 can integrated application processor and modem processor, and wherein, application processor is mainly processed operating system, user interface and application program etc., and modem processor is mainly processed radio communication.Be understandable that, above-mentioned modem processor also can not be integrated in processor 180.
Terminal device 800 also comprises that the power supply 190(powering to all parts is such as battery), preferably, power supply can be connected with processor 180 logics by power-supply management system, thereby realizes the functions such as management charging, electric discharge and power managed by power-supply management system.Power supply 190 can also comprise the random component such as one or more direct current or AC power, recharging system, power failure detection circuit, power supply changeover device or inverter, power supply status indicator.
Although not shown, terminal device 800 can also comprise camera, bluetooth module etc., does not repeat them here.In the present embodiment, terminal device also includes storer, and one or more than one program, the above program of one of them or one is stored in storer, and is configured to carry out one or above routine package containing for carrying out the instruction of the method that disclosure embodiment provides by one or above processor:
Obtain touch control operation;
The duration of touch control operation and the size of default duration that judgement is obtained;
When judging the duration of touch control operation and be not less than default duration, detect the number of times of unlocking operation;
The number of times of judgement unlocking operation and the size of setting release number of times;
When judging the number of times of unlocking operation over setting release number of times, the stolen information of output prompting.
Storer can also comprise the instruction of carrying out following operation:
Theft preventing method also comprises:
Distance between testing and setting terminal;
When detecting while surpassing the first predeterminable range with the distance of setting terminal, send the stolen information of prompting to setting terminal.
Storer can also comprise the instruction of carrying out following operation:
Before obtaining touch control operation, theft preventing method also comprises:
Detect and object between distance be less than the second predeterminable range.
Storer can also comprise the instruction of carrying out following operation:
Unlocking operation comprises being unlocked by fingerprint operation or unlock password operation.
Storer can also comprise the instruction of carrying out following operation:
When judging the number of times of unlocking operation over setting release number of times, the stolen information of output prompting, comprising:
Export the stolen information of prompting to setting terminal or server.
Storer can also comprise the instruction of carrying out following operation:
Point out stolen information to comprise vibration prompt, prompt tone, light screen prompt, in short message prompt any or multiple.
In disclosure embodiment, by the stolen information of terminal output prompting, user can obtain information in the very first time, effectively reduces the stolen risk of terminal; And, terminal and setting terminal are carried out associated, when the distance between terminal and setting terminal surpasses the first predeterminable range, send the stolen information of prompting to setting terminal, user can obtain information from setting terminal in the very first time, effectively reduces the stolen risk of terminal.
In addition, typically, the mobile terminal described in the disclosure can be various hand-held terminal devices, such as mobile phone, PDA(Personal Digital Assistant) etc., and therefore protection domain of the present disclosure should not be defined as the mobile terminal of certain particular type.
In addition, according to method of the present disclosure, can also be implemented as the computer program of being carried out by central processor CPU.When this computer program is carried out by CPU, carry out the above-mentioned functions limiting in method of the present disclosure.
In addition, said method step and system unit also can utilize controller and realize for storing the computer readable storage devices of the computer program that makes controller realize above-mentioned steps or Elementary Function.
In addition, should be understood that, computer readable storage devices as herein described (for example, storer) can be volatile memory or nonvolatile memory, or can comprise volatile memory and nonvolatile memory.And nonrestrictive, nonvolatile memory can comprise ROM (read-only memory) (ROM), programming ROM (PROM), electrically programmable ROM(EPROM as an example), electrically erasable programmable ROM(EEPROM) or flash memory.Volatile memory can comprise random-access memory (ram), and this RAM can serve as External Cache storer.As an example and nonrestrictive, RAM can obtain in a variety of forms, such as synchronous random access memory (DRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate SDRAM(DDR SDRAM), strengthen SDRAM(ESDRAM), synchronization link DRAM(SLDRAM) and direct Rambus RAM(DRRAM).The memory device of disclosed aspect is intended to include but not limited to the storer of these and other suitable type.
Those skilled in the art will also understand is that, in conjunction with the described various illustrative logical blocks of disclosure herein, module, circuit and algorithm steps, may be implemented as electronic hardware, computer software or both combinations.For this interchangeability of hardware and software is clearly described, with regard to the function of various exemplary components, square, module, circuit and step, it has been carried out to general description.This function is implemented as software or is implemented as hardware and depends on concrete application and the design constraint that imposes on whole system.Those skilled in the art can realize described function in every way for every kind of concrete application, but this realization determines should not be interpreted as causing departing from the scope of the present disclosure.
In conjunction with the described various illustrative logical blocks of disclosure herein, module and circuit, can utilize the following parts that are designed to carry out function described here to realize or carry out: general processor, digital signal processor (DSP), special IC (ASIC), field programmable gate array (FPGA) or other programmable logic device (PLD), discrete gate or transistor logic, discrete nextport hardware component NextPort or any combination of these parts.General processor can be microprocessor, but alternatively, processor can be any conventional processors, controller, microcontroller or state machine.Processor also may be implemented as the combination of computing equipment, and for example, the combination of DSP and microprocessor, multi-microprocessor, one or more microprocessor are in conjunction with DSP core or any other this configuration.
Step in conjunction with the described method of disclosure herein or algorithm can directly be included in the software module of carrying out in hardware, by processor or in the two combination.Software module can reside in the storage medium of RAM storer, flash memory, ROM storer, eprom memory, eeprom memory, register, hard disk, removable dish, CD-ROM or any other form known in the art.Exemplary storage medium is coupled to processor, make processor can be from this storage medium reading information or to this storage medium writing information.In an alternative, described storage medium can be integral to the processor together.Processor and storage medium can reside in ASIC.ASIC can reside in user terminal.In an alternative, processor and storage medium can be used as discrete assembly and reside in user terminal.
In one or more exemplary design, described function can realize in hardware, software, firmware or its combination in any.If realized in software, described function can be transmitted on computer-readable medium or by computer-readable medium as one or more instructions or code storage.Computer-readable medium comprises computer-readable storage medium and communication media, and this communication media comprises and contributes to computer program to be sent to from a position any medium of another position.Storage medium can be can be by any usable medium of universal or special computer access.As an example and nonrestrictive, this computer-readable medium can comprise RAM, ROM, EEPROM, CD-ROM or other optical disc memory apparatus, disk storage device or other magnetic storage apparatus, or can for carry or file layout be instruction or data structure required program code and can be by any other medium of universal or special computing machine or universal or special processor access.In addition, any connection can suitably be called computer-readable medium.For example, if with coaxial cable, optical fiber cable, twisted-pair feeder, Digital Subscriber Line or such as the wireless technology of infrared ray, radio and microwave come from website, server or other remote source send software, above-mentioned coaxial cable, optical fiber cable, twisted-pair feeder, DSL or include the definition at medium such as the wireless technology of infrared first, radio and microwave.As used herein, disk and CD comprise compact disk (CD), laser disk, CD, digital versatile disc (DVD), floppy disk, Blu-ray disc, disk rendering data magnetically conventionally wherein, and cd-rom using laser optics ground rendering data.The combination of foregoing also should be included in the scope of computer-readable medium.
Although disclosed content shows exemplary embodiment of the present disclosure above, it should be noted that under the prerequisite of the scope of the present disclosure that does not deviate from claim restriction, can carry out multiple change and modification.According to the function of the claim to a method of disclosed embodiment described herein, step and/or action, need not carry out with any particular order.In addition, although element of the present disclosure can be with individual formal description or requirement, also it is contemplated that a plurality of, unless be clearly restricted to odd number.
Above-described embodiment; object of the present disclosure, technical scheme and beneficial effect are further described; institute is understood that; the foregoing is only embodiment of the present disclosure; and be not used in and limit protection domain of the present disclosure; all within spirit of the present disclosure and principle, any modification of making, be equal to replacement, improvement etc., within all should being included in protection domain of the present disclosure.

Claims (11)

1. a theft preventing method for terminal, is characterized in that, comprising:
Obtain touch control operation;
The duration of touch control operation and the size of default duration that judgement is obtained;
When judging the duration of described touch control operation and be not less than described default duration, detect the number of times of unlocking operation;
Judge the number of times and the size of setting release number of times of described unlocking operation;
When judging the number of times of described unlocking operation over described setting release number of times, the stolen information of output prompting.
2. theft preventing method according to claim 1, is characterized in that, described theft preventing method also comprises:
Distance between testing and setting terminal;
When detecting while surpassing the first predeterminable range with the distance of described setting terminal, send the stolen information of prompting to described setting terminal.
3. theft preventing method according to claim 1, is characterized in that, described in obtain touch control operation before, described theft preventing method also comprises:
Detect and object between distance be less than the second predeterminable range.
4. theft preventing method according to claim 1, is characterized in that, described unlocking operation comprises being unlocked by fingerprint operation or unlock password operation.
5. theft preventing method according to claim 1, is characterized in that, when judging the number of times of described unlocking operation over described setting release number of times, the stolen information of output prompting, comprising:
Export the stolen information of prompting to described setting terminal or server.
6. theft preventing method according to claim 1, is characterized in that, the stolen information of described prompting comprises vibration prompt, prompt tone, lights screen prompt, in short message prompt any or multiple.
7. an anti-theft device for terminal, is characterized in that, comprising:
Acquisition module, for obtaining touch control operation;
The first judge module, for judging the size of duration and the default duration of the touch control operation obtaining;
First detection module, for when judging the duration of described touch control operation and be not less than described default duration, detects the number of times of unlocking operation;
The second judge module, for judging the number of times and the size of setting release number of times of described unlocking operation;
Reminding module, for when judging the number of times of described unlocking operation over described setting release number of times, the stolen information of output prompting.
8. anti-theft device according to claim 7, is characterized in that, described anti-theft device also comprises:
The second detection module, for detection of and setting terminal between distance;
Sending module, for when detecting while surpassing the first predeterminable range with the distance of described setting terminal, sends the stolen information of prompting to described setting terminal.
9. anti-theft device according to claim 7, is characterized in that, described anti-theft device also comprises:
Detection module, before obtaining touch control operation at described acquisition module, detect and object between distance be less than the second predeterminable range.
10. anti-theft device according to claim 7, is characterized in that, described reminding module comprises:
Prompting submodule, for exporting the stolen information of prompting to described setting terminal or server.
11. 1 kinds of terminal devices, it is characterized in that, terminal device includes storer, and one or more than one program, the above program of one of them or one is stored in storer, and is configured to carry out described one or above routine package containing for carrying out the instruction of following operation by one or above processor:
Obtain touch control operation;
The duration of touch control operation and the size of default duration that judgement is obtained;
When judging the duration of described touch control operation and be not less than described default duration, detect the number of times of unlocking operation;
Judge the number of times and the size of setting release number of times of described unlocking operation;
When judging the number of times of described unlocking operation over described setting release number of times, the stolen information of output prompting.
CN201310654309.8A 2013-12-05 2013-12-05 Anti-theft method and device of terminal and terminal equipment Pending CN103679070A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310654309.8A CN103679070A (en) 2013-12-05 2013-12-05 Anti-theft method and device of terminal and terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310654309.8A CN103679070A (en) 2013-12-05 2013-12-05 Anti-theft method and device of terminal and terminal equipment

Publications (1)

Publication Number Publication Date
CN103679070A true CN103679070A (en) 2014-03-26

Family

ID=50316575

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310654309.8A Pending CN103679070A (en) 2013-12-05 2013-12-05 Anti-theft method and device of terminal and terminal equipment

Country Status (1)

Country Link
CN (1) CN103679070A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104392157A (en) * 2014-11-18 2015-03-04 深圳市腾讯计算机系统有限公司 Method and device for locking screen by using passwords
CN105007571A (en) * 2015-05-28 2015-10-28 广东欧珀移动通信有限公司 Information processing method and service equipment
CN105260666A (en) * 2015-09-28 2016-01-20 小米科技有限责任公司 Password unlocking method and apparatus
CN105827810A (en) * 2015-10-20 2016-08-03 南京步步高通信科技有限公司 Voiceprint recognition-based communication terminal retrieve method and communication terminal
CN105989262A (en) * 2015-01-30 2016-10-05 联想(北京)有限公司 Fingerprint information processing apparatus, method and device and electronic device
CN106327758A (en) * 2016-09-05 2017-01-11 珠海格力电器股份有限公司 Anti-theft system
CN106982287A (en) * 2016-01-16 2017-07-25 平安科技(深圳)有限公司 The monitoring method and mobile terminal of unblock behavior
CN107533624A (en) * 2015-04-24 2018-01-02 微软技术许可有限责任公司 Detect and prevent the illegal use of equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101330678A (en) * 2007-06-21 2008-12-24 鸿富锦精密工业(深圳)有限公司 Mobile communication terminal as well as anti-theft alarm method and system thereof
CN101819505A (en) * 2010-04-26 2010-09-01 威盛电子股份有限公司 Electronic system with touch control screen and operation method thereof
CN101859467A (en) * 2009-04-11 2010-10-13 深圳富泰宏精密工业有限公司 Electronic device
CN102857622A (en) * 2011-06-28 2013-01-02 希姆通信息技术(上海)有限公司 Anti-theft mobile phone and method for realizing mobile phone guard
WO2013155771A1 (en) * 2012-04-18 2013-10-24 中兴通讯股份有限公司 Method and device for unlocking touch screen,

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101330678A (en) * 2007-06-21 2008-12-24 鸿富锦精密工业(深圳)有限公司 Mobile communication terminal as well as anti-theft alarm method and system thereof
CN101859467A (en) * 2009-04-11 2010-10-13 深圳富泰宏精密工业有限公司 Electronic device
CN101819505A (en) * 2010-04-26 2010-09-01 威盛电子股份有限公司 Electronic system with touch control screen and operation method thereof
CN102857622A (en) * 2011-06-28 2013-01-02 希姆通信息技术(上海)有限公司 Anti-theft mobile phone and method for realizing mobile phone guard
WO2013155771A1 (en) * 2012-04-18 2013-10-24 中兴通讯股份有限公司 Method and device for unlocking touch screen,

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104392157A (en) * 2014-11-18 2015-03-04 深圳市腾讯计算机系统有限公司 Method and device for locking screen by using passwords
CN105989262A (en) * 2015-01-30 2016-10-05 联想(北京)有限公司 Fingerprint information processing apparatus, method and device and electronic device
CN107533624A (en) * 2015-04-24 2018-01-02 微软技术许可有限责任公司 Detect and prevent the illegal use of equipment
CN107533624B (en) * 2015-04-24 2020-07-10 微软技术许可有限责任公司 Detecting and preventing illegal use of devices
CN105007571A (en) * 2015-05-28 2015-10-28 广东欧珀移动通信有限公司 Information processing method and service equipment
CN105260666A (en) * 2015-09-28 2016-01-20 小米科技有限责任公司 Password unlocking method and apparatus
CN105827810A (en) * 2015-10-20 2016-08-03 南京步步高通信科技有限公司 Voiceprint recognition-based communication terminal retrieve method and communication terminal
CN106982287A (en) * 2016-01-16 2017-07-25 平安科技(深圳)有限公司 The monitoring method and mobile terminal of unblock behavior
CN106327758A (en) * 2016-09-05 2017-01-11 珠海格力电器股份有限公司 Anti-theft system

Similar Documents

Publication Publication Date Title
CN103679070A (en) Anti-theft method and device of terminal and terminal equipment
CN103677899B (en) The method and apparatus of application program is installed
CN103812090A (en) Electronic device and battery protection method and device
CN105278937A (en) Method and device for displaying pop-up box messages
CN103632165A (en) Picture processing method, device and terminal equipment
CN103942113A (en) System restarting reason detection method, device and terminal equipment
CN103281687A (en) Network flow management method and device of double-card terminal
CN104519485A (en) Communication method between terminals, devices and system
CN103543913A (en) Terminal device operation method and device, and terminal device
CN103559516A (en) NFC data transmission method, terminal equipment and server
CN103683437B (en) A kind of charger and terminal equipment
CN104301315A (en) Method and device for limiting information access
CN105681161A (en) Method, device and system for adding friend account
CN104636047A (en) Method and device for operating objects in list and touch screen terminal
CN104135502B (en) A kind of method, relevant device and system realizing application message and remind
CN104852885A (en) Method, device and system for verifying verification code
CN104901805A (en) Identity authentication method and device and system
CN106131930A (en) A kind of WiFi network connection control method, device and terminal
CN103678605A (en) Information transmission method and device and terminal device
CN103368828B (en) A kind of message temporary storage and system
CN104717125A (en) Graphic code storage method and device
CN106293308A (en) A kind of unlocking screen method and device
CN103577733A (en) Safety protection method and device for terminal equipment and terminal equipment
CN103472998A (en) Method, device and terminal equipment for character selection
CN103747130A (en) Control method of terminal equipment, device and terminal equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20140326