CN103699860A - Terminal antitheft method and equipment - Google Patents

Terminal antitheft method and equipment Download PDF

Info

Publication number
CN103699860A
CN103699860A CN201310687619.XA CN201310687619A CN103699860A CN 103699860 A CN103699860 A CN 103699860A CN 201310687619 A CN201310687619 A CN 201310687619A CN 103699860 A CN103699860 A CN 103699860A
Authority
CN
China
Prior art keywords
terminal
stolen
unlock command
password
screen
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310687619.XA
Other languages
Chinese (zh)
Inventor
范国峰
黄铮
张炅轩
闫学松
镡云宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201310687619.XA priority Critical patent/CN103699860A/en
Publication of CN103699860A publication Critical patent/CN103699860A/en
Priority to PCT/CN2014/093638 priority patent/WO2015085942A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

The invention provides a terminal antitheft method and equipment, wherein the terminal antitheft method comprises the steps of when the condition that a terminal is stolen is determined, generating a password-free screen lock screen interface and displaying; refusing an screen unlocking operation when an unlocking command is received and obtaining recognizable information of an unlocking command sending party. According to the embodiment, the password-free interface is generated to relax the vigilance of a thief, so the terminal is unlocked, then the recognizable information of the unlocking command sending party is obtained, the possibility that the terminal is found back by a user can be increased according to the recognizable information, and the property safety of the user can be reasonably and effectively ensured.

Description

Terminal anti-theft method and equipment
Technical field
The present invention relates to internet, applications field, particularly relate to a kind of terminal anti-theft method and equipment.
Background technology
Along with the develop rapidly of intelligent terminal and network, terminal (comprising the plurality of devices such as computer, mobile phone, flat board) role in people's life is also more and more important, more and more becomes indispensable comprehensive " assistant " in people's work and life.For convenience of using, people conventionally can directly be stored in terminal by information such as various account information, private chat record and picture photos when using the application of terminal.Therefore,, if lost terminal not only can be brought property loss to user, what is more important user is stored in the personal information in terminal, such as financial information such as account number ciphers.If these personal informations are revealed, the loss that user is caused is difficult to estimate.Therefore, terminal is antitheft very important.
In prior art, the theft preventing method of terminal is mainly realized by locking mobile device screen.Fig. 1 shows the interface schematic diagram of antitheft mobile phone input validation information in prior art.As shown in Figure 1, after hand-set from stolen, occur interface prompt mobile phone opening anti-theft function, user needs input validation information to carry out release to mobile phone screen.In Fig. 1, it is that kith and kin's number of 138 carries out release to mobile phone that user need to input beginning.When release failure, as shown in Figure 1, mobile phone, in interface prompt release promoter release failure, please wait for that owner contacts.In addition, when mobile phone cannot release, also cannot open application wherein.In prior art, for example only have, when repeatedly release failure (3 times) of stolen mobile phone, just can carry out the evidence obtaining of taking pictures to release promoter.
And in the prior art, if release failure, terminal anti-theft interface there will be caveat conventionally, points out this terminal in stolen state.Stealer can be enhanced your vigilance according to these caveat, and owing to not knowing release authorization information, may abandon the release of input validation code, and even may directly take out battery assurance oneself can be not tracked.
From above-mentioned prior art, existing terminal anti-theft method can increase the vigilant degree of stealer, utilizes take pictures time interval of evidence obtaining of terminal self longer, has correspondingly increased difficulty and the stolen difficulty of solving a case of terminal that terminal is recovered.
Summary of the invention
In view of the above problems, the present invention has been proposed to provide a kind of terminal anti-theft method that overcomes the problems referred to above or address the above problem at least in part and corresponding terminal anti-theft equipment.
According to one aspect of the present invention, a kind of terminal anti-theft method is provided, comprising: determine when terminal is stolen, generate without password screen locking screen interface and show; While receiving unlock command, the operation of refusal unlocking screen, and obtain unlock command initiator can identifying information.
Alternatively, described definite terminal is stolen, comprising: while receiving the stolen notification instruction of trusted party transmission, determine that described terminal is stolen; Or the SIM card that described terminal detected is replaced, determine that described terminal is stolen.
Alternatively, described in obtain unlock command initiator can identifying information after, also comprise: by described, can be sent to described trusted party by identifying information.
Alternatively, described in obtain unlock command initiator can identifying information, comprising: utilize terminal camera to take pictures to described unlock command initiator, obtain photo; Record described unlock command initiator's fingerprint.
Alternatively, described identical with described terminal acquiescence locking screen interface without password screen locking screen interface.
Alternatively, after described refusal unlocking screen operation, also comprise: generate and need the screen locking screen interface of input password and show; And the password that receives input, judge that whether password is correct; If so, carry out unlocking screen operation; If not, keep screen by lock status.
According to another aspect of the present invention, a kind of terminal anti-theft client is also provided, comprising: antitheft trigger module, be configured to determine when terminal is stolen, trigger interface display module; Described interface display module, is configured to generate without password screen locking screen interface and shows; Processing module, while being configured to receive unlock command, refusal unlocking screen operation, and obtain unlock command initiator can identifying information.
Alternatively, described antitheft trigger module is also configured to: while receiving the stolen notification instruction of trusted party transmission, determine that described terminal is stolen; Or the SIM card that described terminal detected is replaced, determine that described terminal is stolen.
Alternatively, described terminal anti-theft client also comprises: sending module, described in being configured to, obtain unlock command initiator can identifying information after, by described, can be sent to described trusted party by identifying information.
Alternatively, described processing module also comprises: utilize terminal camera to take pictures to described unlock command initiator, obtain photo; Record described unlock command initiator's fingerprint.
Alternatively, described identical with described terminal acquiescence locking screen interface without password screen locking screen interface.
Alternatively, described interface display module generates and needs the screen locking screen interface of input password and show after being also configured to described refusal unlocking screen operation; Described processing module is also configured to receive the password of input, judges that whether password is correct; If so, carry out unlocking screen operation; If not, keep screen by lock status.
In embodiments of the present invention, determine when terminal is stolen, generate without password screen locking screen interface and show.Stealer checks that this interface is when without password screen locking screen interface, cannot find that terminal opened anti-theft feature, can lose vigilance and directly carry out unlocking operation.Therefore, the embodiment of the present invention can delay to solve in prior art stealer and be shown and found terminal time of opening anti-theft function by terminal interface, avoids stealer to extract end cell, closing a terminal etc. is unfavorable for giving for change the operation of stolen terminal.Can be after receiving unlock command according to the embodiment of the present invention, refusal release, and obtain unlock command initiator can identifying information.Therefore, adopt the embodiment of the present invention can solve the problem of only having release failure just can take pictures afterwards and collect evidence in prior art.The embodiment of the present invention can avoid because of the time interval of the evidence obtaining of taking pictures longer, cause missing the problem of obtaining the best opportunity that stealer can identifying information.The embodiment of the present invention can generate without cryptographic interface stealer is lost vigilance.When stealer carries out release to terminal, what the embodiment of the present invention can get this unlock command initiator (being stealer) immediately can identifying information, need not wait for the evidence obtaining of just taking pictures after repeatedly release failure, and shortening is taken pictures the evidence obtaining time.Therefore, the method providing according to the embodiment of the present invention can increase the possibility that user gives terminal for change, more rationally effectively guarantees user's property safety.
Above-mentioned explanation is only the general introduction of technical solution of the present invention, in order to better understand technological means of the present invention, and can be implemented according to the content of instructions, and for above and other objects of the present invention, feature and advantage can be become apparent, below especially exemplified by the specific embodiment of the present invention.
According to the detailed description to the specific embodiment of the invention by reference to the accompanying drawings below, those skilled in the art will understand above-mentioned and other objects, advantage and feature of the present invention more.
Accompanying drawing explanation
By reading below detailed description of the preferred embodiment, various other advantage and benefits will become cheer and bright for those of ordinary skills.Accompanying drawing is only for the object of preferred implementation is shown, and do not think limitation of the present invention.And in whole accompanying drawing, by identical reference symbol, represent identical parts.In the accompanying drawings:
Fig. 1 shows the interface schematic diagram of antitheft mobile phone input validation code in prior art;
Fig. 2 shows the processing flow chart of terminal anti-theft method according to an embodiment of the invention;
Fig. 3 shows the processing flow chart of terminal anti-theft method in accordance with a preferred embodiment of the present invention;
Fig. 4 shows mobile phone acquiescence locking screen interface schematic diagram according to an embodiment of the invention;
Fig. 5 shows according to an embodiment of the invention without password screen interface schematic diagram; And
Fig. 6 shows the structural representation of terminal anti-theft client according to an embodiment of the invention.
Embodiment
Exemplary embodiment of the present disclosure is described below with reference to accompanying drawings in more detail.Although shown exemplary embodiment of the present disclosure in accompanying drawing, yet should be appreciated that and can realize the disclosure and the embodiment that should do not set forth limits here with various forms.On the contrary, it is in order more thoroughly to understand the disclosure that these embodiment are provided, and can by the scope of the present disclosure complete convey to those skilled in the art.
In correlation technique, mention, after terminal is stolen, stealer can identify terminal opening anti-theft function according to terminal display interface, abandons terminal to carry out release, what cause obtaining in time stealer can identifying information, and then cannot give for change after causing terminal stolen.
For solving the problems of the technologies described above, the embodiment of the present invention provides a kind of terminal anti-theft method.Fig. 2 shows the processing flow chart of terminal anti-theft method according to an embodiment of the invention.As shown in Figure 2, this flow process at least comprises that step S202 is to step S204.
Step S202, determine when terminal is stolen, generate without password screen locking screen interface and show.
Step S204, while receiving unlock command, the operation of refusal unlocking screen, and obtain unlock command initiator can identifying information.
In embodiments of the present invention, determine when terminal is stolen, generate without password screen locking screen interface and show.Stealer checks that this interface is when without password screen locking screen interface, cannot find that terminal opened anti-theft feature, can lose vigilance and directly carry out unlocking operation.Therefore, the embodiment of the present invention can delay in prior art stealer and be shown and found terminal time of opening anti-theft function by terminal interface, avoids stealer to extract end cell, closing a terminal etc. is unfavorable for giving for change the operation of stolen terminal.Can be after receiving unlock command according to the embodiment of the present invention, refusal release, and obtain unlock command initiator can identifying information.Therefore, adopt the embodiment of the present invention can solve the problem of only having release failure just can take pictures afterwards and collect evidence in prior art.The embodiment of the present invention can avoid because of the time interval of the evidence obtaining of taking pictures longer, cause missing the problem of obtaining the best opportunity that stealer can identifying information.The embodiment of the present invention can generate without cryptographic interface stealer is lost vigilance.When stealer carries out release to terminal, what the embodiment of the present invention can get this unlock command initiator (being stealer) immediately can identifying information, need not wait for the evidence obtaining of just taking pictures after repeatedly release failure, and shortening is taken pictures the evidence obtaining time.Therefore, the method providing according to the embodiment of the present invention can increase the possibility that user gives terminal for change, more rationally effectively guarantees user's property safety.
When the embodiment of the present invention receives the stolen notification instruction of trusted party transmission, determine that terminal is stolen.Wherein, trusted party can be server, can also be kith and kin's number that user arranges when using this terminal.Now the identity with trusted party describes respectively.
First, to adopting server, be that trusted party describes.In this example, after user finds that terminal is stolen, game server, the state to terminal in server identifies, and SOT state of termination is revised as stolen.Subsequently, server sends stolen instruction to terminal, informs that terminal is stolen.
Secondly, to adopting kith and kin's number, be that trusted party describes.Kith and kin's number in this example refers to the trusted number with stolen terminal binding, for example the commonly used telephone number in address list, appointment white list number etc.During enforcement, by kith and kin's number, send stolen instruction to stolen terminal, confirm that in time terminal is stolen.
Although identity of trusted parties is different, performed step is also different, and both serve the same role in embodiments of the present invention,, determine that terminal is stolen that is.After determining, carry out again other operations, avoid because sending stolen instruction not in time, cause lawless person to have an opportunity to take advantage of and terminal is carried out to the ill effect that the operations such as brush machine cause stolen terminal to give for change.
In addition, whether the embodiment of the present invention can also be replaced by user identification module (Subscriber Identity Module, hereinafter to be referred as the SIM) card of terminal being detected, determines that whether terminal is stolen.Thief, when using stolen terminal, conventionally can change SIM card, otherwise easily be traced back to, and therefore, whether detection SIM card is replaced is to determine a whether stolen effective means of terminal.Adopt the embodiment of the present invention can guarantee that the owner of lost property does not find, in the stolen situation of terminal, to find that in time terminal is stolen, and in time stolen terminal is made to respective handling.
After the embodiment of the present invention determines that terminal is stolen, carry out step S202 as shown in Figure 2, generate without password locking screen interface and show.Demonstration is without after password locking screen interface, if receive unlock command, carries out step S204 as shown in the figure, the operation of refusal unlocking screen, and obtain unlock command initiator can identifying information.In the embodiment of the present invention, after lost terminal, enter screen lock state.When picking up the attempt of terminal person or stealer, terminal is carried out to unlocking screen operation, what the embodiment of the present invention can be obtained unlock command initiator can identifying information, and generating cipher inputting interface, and prompting need to be inputted correct password so that screen is carried out to release.Interface for password input needs user to input password can release, if terminal receives correct password, the embodiment of the present invention is carried out unlocking screen operation, if terminal receives wrong password, the embodiment of the present invention keeps screen by lock status.If one time Password Input is wrong, conventionally can allow again to input.For example, if repeatedly Password Input (more than 3 times) is all incorrect, for guaranteeing terminal security, may forbid within a certain period of time Password Input and other any operations.
In the embodiment of the present invention, can identifying information can the obtaining by terminal of above-mentioned unlock command initiator, unlock command initiator's arbitrarily can identifying information.Preferably, in the embodiment of the present invention, can utilize the front-facing camera of terminal to take pictures to unlock command initiator, obtain photo, can also record unlock command initiator's fingerprint.The unlock command initiator's who gets in the embodiment of the present invention photo or fingerprint are for everyone is distinctive.Therefore, the identifying information getting by the embodiment of the present invention can be directly, fast and effectively search out the person of picking up or the stealer of stolen terminal, guarantees that stolen terminal is given for change, and then can reduce terminal loss by theft rate and reduce and steal crime rate.
As described above, the embodiment of the present invention get unlock command initiator can identifying information after, the embodiment of the present invention can send can identifying information to trusted party, can also preserve above-mentioned can processing by identifying information products for further.Preferably, the embodiment of the present invention get can identifying information after, send this can identifying information to trusted party, for example kith and kin's number of server or stolen terminal binding or other trusted party, what guarantee that stolen user can get stealer in time can identifying information, and can arrest stealer by identifying information according to this, give stolen terminal for change.
In addition, it should be noted that, for the terminal of different terminals and employing different operating system, layout and the element of terminal acquiescence locking screen interface there are differences.For example, the solution locking key of some terminals acquiescence locking screen interface by pinning below in screen is to the surrounding release of sliding.Again for example, some terminal acquiescence locking screen interfaces carry out release by dragging from left to right slide block to screen.The locking screen interface of different terminals also has some layout details there are differences, for example obtain the desktop wallpaper picture resource of user's Set For Current, or add the concrete mode in desktop clock space etc., all can there are differences because of operating system different in different terminals and terminal.Therefore the layout without password screen, generating in the embodiment of the present invention can there are differences according to the different operating system adopting in different terminals and terminal.
In the embodiment of the present invention, according to layout and the element of terminal acquiescence locking screen interface, can generate identically with terminal acquiescence locking screen interface without password screen, can also generate different from from terminal acquiescence locking screen interface password screen.The embodiment of the present invention preferably generates identical with terminal acquiescence locking screen interface without password screen.
Generate with terminal and give tacit consent to different easily being identified terminal by stealer without password screen and opened anti-theft feature of locking screen interface, cause missing and obtain the chance that stealer can identifying information.To sum up; in the embodiment of the present invention, without password screen, be preferably identical with terminal acquiescence locking screen interface, identification degree is low, and prevents that stealer from identifying terminal and having opened anti-theft feature; and then the possibility of stolen terminal, efficient and rational protection user property safety are given in increase for change.
The terminal anti-theft method now with specific embodiment, the embodiment of the present invention being provided describes.
Embodiment mono-
Fig. 3 shows the processing flow chart of terminal anti-theft method in accordance with a preferred embodiment of the present invention, for supporting above-mentioned terminal anti-theft method, above-mentioned terminal anti-theft method is set forth more clear understandablely.It should be noted that, for the embodiment of the present invention being set forth succinctly understandable, in this preferred embodiment, terminal is set to mobile phone and describes.Referring to Fig. 3, the preferred embodiment at least comprises that step S302 is to step S312.
Step S302, handset binding kith and kin number.
Particularly, user buys after mobile phone, kith and kin number can be set, these kith and kin number can be other phone numbers of user oneself, it can also be user's household or friend's phone number, after guaranteeing that user mobile phone is lost, can use in time kith and kin number to send antitheft processing instruction to stolen mobile phone.
Step S304, receive the stolen notification instruction that kith and kin number send, determine hand-set from stolen.
After user finds hand-set from stolen, by the kith and kin number that bind in step S302, send stolen notification instruction to stolen mobile phone.Stolen mobile phone can be determined hand-set from stolen after receiving the stolen notification instruction of kith and kin's number transmission.
Step S306, generation show without password screen interface, wait for unlock command.
Mobile phone determine stolen after, generate with acquiescence locking screen interface same or analogously without password screen, wait for that the person that picks up mobile phone or stealer carry out unlocking operation to mobile phone.As Fig. 4 shows mobile phone acquiescence locking screen interface schematic diagram according to an embodiment of the invention, Fig. 5 shows according to an embodiment of the invention without password screen interface schematic diagram.From Fig. 4 and Fig. 5, contrasted, what this preferred embodiment generated contains identical element without password screen with acquiescence locking screen interface.And as shown in FIG. 4 and 5, what generate in this preferred embodiment is identical wallpaper without password screen with the wallpaper of acquiescence locking screen interface.
Step S308, receive unlock command, obtaining can identifying information, prompt cipher input.
After mobile phone receives unlock command, utilize terminal camera to take pictures to unlock command initiator, obtain the photo of the person that picks up mobile phone or stealer, in addition, can also record unlock command initiator's fingerprint, by what get, can be saved to mobile phone by identifying information, and generate the screen locking screen interface need to input password and show, prompting unlock command initiator carries out Password Input.
Step S310, judge that whether Password Input is correct.
After receiving the password of unlock command initiator input, judge that whether Password Input is correct, if the password of input is correct, carry out unlocking screen operation, flow process finishes.If Password Input mistake, keeps screen by lock status, and performs step S312.
Step S312, by what get, can be sent to kith and kin number by identifying information.
After confirming that written notes are stolen, this preferred embodiment send get can identifying information to kith and kin number, flow process finishes.
By this preferred embodiment, can be in the situation that determining hand-set from stolen, get photo and/or the fingerprint of the mobile phone person of picking up or stealer, according to photo and/or fingerprint, can find the mobile phone person of picking up or stealer, guarantee user's timely getting back mobile phone after mobile phone is lost, further reduce mobile phone loss by theft rate, reduce and steal crime.
Terminal anti-theft method based on above each preferred embodiment provides, based on same inventive concept, the embodiment of the present invention provides a kind of terminal anti-theft client, for realizing above-mentioned terminal anti-theft method.
Fig. 6 shows the structural representation of terminal anti-theft client according to an embodiment of the invention.Referring to Fig. 6, at least the comprising of the terminal anti-theft client of the embodiment of the present invention: antitheft trigger module 610, interface display module 620 and processing module 630.
Now introduce each device of terminal anti-theft client or the function of composition and the annexation between each several part of the embodiment of the present invention:
Antitheft trigger module 610, is configured to determine when terminal is stolen, triggers interface display module 620.
Interface display module 620, is coupled with antitheft trigger module 610, is configured to generate without password screen locking screen interface and shows.
Processing module 630, is coupled with interface display module 620, while being configured to receive unlock command, refusal unlocking screen operation, and obtain unlock command initiator can identifying information.
In embodiments of the present invention, determine when terminal is stolen, generate without password screen locking screen interface and show.Stealer checks that this interface is when without password screen locking screen interface, cannot find that terminal opened anti-theft feature, can lose vigilance and directly carry out unlocking operation.Therefore, the embodiment of the present invention can delay in prior art stealer and be shown and found terminal time of opening anti-theft function by terminal interface, avoids stealer to extract end cell, closing a terminal etc. is unfavorable for giving for change the operation of stolen terminal.Can be after receiving unlock command according to the embodiment of the present invention, refusal release, and obtain unlock command initiator can identifying information.Therefore, adopt the embodiment of the present invention can solve the problem of only having release failure just can take pictures afterwards and collect evidence in prior art.The embodiment of the present invention can avoid because of the time interval of the evidence obtaining of taking pictures longer, cause missing the problem of obtaining the best opportunity that stealer can identifying information.The embodiment of the present invention can generate without cryptographic interface stealer is lost vigilance.When stealer carries out release to terminal, what the embodiment of the present invention can get this unlock command initiator (being stealer) immediately can identifying information, need not wait for the evidence obtaining of just taking pictures after repeatedly release failure, and shortening is taken pictures the evidence obtaining time.Therefore, the method providing according to the embodiment of the present invention can increase the possibility that user gives terminal for change, more rationally effectively guarantees user's property safety.
In the embodiment of the present invention, when antitheft trigger module as shown in Figure 6 receives the stolen notification instruction of trusted party transmission, determine that terminal is stolen.Wherein, trusted party can be server, can also be kith and kin's number that user arranges when using this terminal.Now the identity with trusted party describes respectively.
First, to adopting server, be that trusted party describes.In this example, after user finds that terminal is stolen, can game server, in server, confirm the state of terminal to identify, SOT state of termination is revised as stolen.Subsequently, and send stolen instruction to terminal by server, confirm to inform that terminal is stolen.
Secondly, to adopting kith and kin's number, be that trusted party describes.Kith and kin's number in this example refers to the trusted number with stolen terminal binding.For example the commonly used telephone number in address list, specify white list number etc.During enforcement, by kith and kin's number, send stolen instruction to terminal, confirm that in time terminal is stolen.
Although identity of trusted parties is different, performed step is also different, and both serve the same role in embodiments of the present invention,, determine that terminal is stolen that is.After determining, carry out again other operations, avoid because sending stolen instruction not in time, cause lawless person to have an opportunity to take advantage of and terminal is carried out to the ill effect that the operations such as brush machine cause stolen terminal to give for change.
In addition, whether the antitheft trigger module 610 in the embodiment of the present invention can also be replaced by the SIM card of terminal being detected, determines that whether terminal is stolen.Thief, when using stolen terminal, conventionally can change SIM card, otherwise easily be traced back to, and therefore, whether detection SIM card is replaced is to determine a whether stolen effective means of terminal.Adopt the embodiment of the present invention can guarantee that the owner of lost property does not find in the stolen situation of terminal, can find in time that terminal is stolen, and in time stolen terminal be made to respective handling.
Antitheft trigger module 610 triggers interface display module 620 after determining that terminal is stolen.After interface display module 620 is triggered, generate without password locking screen interface and show.Interface display module 620 shows without after password locking screen interface, processing module 630 reception screen locking instructions.When processing module 630 receives screen locking instruction, the operation of processing module 630 refusal unlocking screens, and obtain unlock command initiator can identifying information.In the embodiment of the present invention, after lost terminal, enter screen lock state.When picking up terminal person or stealer, attempt terminal to carry out unlocking screen operation, processing module 630 generating cipher inputting interfaces, prompting need to be inputted correct password so that screen is carried out to release.Interface for password input needs user to input password can release, if terminal receives correct password, processing module 630 is carried out unlocking screen operation.If terminal receives wrong password, processing module 630 keeps screen by lock status.If one time Password Input is wrong, conventionally can allow again to input.For example, if repeatedly Password Input (more than 3 times) is all incorrect, for guaranteeing terminal security, may forbid within a certain period of time Password Input and other any operations.
In the embodiment of the present invention, can identifying information can the obtaining by terminal of this unlock command initiator, unlock command initiator's arbitrarily can identifying information.Preferably, in the embodiment of the present invention, can utilize the front-facing camera of terminal to take pictures to unlock command initiator, obtain photo, can also record unlock command initiator's fingerprint.The unlock command initiator's who gets in the embodiment of the present invention photo or fingerprint are for everyone is distinctive.Therefore, the identifying information getting by the embodiment of the present invention can be directly, fast and effectively search out the person of picking up or the stealer of stolen terminal, guarantees that stolen terminal is given for change, and then can reduce terminal loss by theft rate and reduce and steal crime rate.
Processing module 630 get unlock command initiator can identifying information after, the embodiment of the present invention can send by sending module 640 as shown in Figure 6 can identifying information to trusted party, can also preserve above-mentioned can processing by identifying information products for further.Preferably, in the embodiment of the present invention, processing module 630 get can identifying information after, sending module 640 send this can identifying information to trusted party.Wherein, this trusted party comprises kith and kin's number or other trusted party of server or stolen terminal binding.The preferred sending module of the embodiment of the present invention 640 send can identifying information to trusted party, what guarantee that stolen user can get stealer in time can identifying information, and can arrest stealer by identifying information according to this, gives stolen terminal for change.
In addition, it should be noted that, for the terminal of different terminals and employing different operating system, layout and the element of terminal acquiescence locking screen interface there are differences.For example, the solution locking key of some terminals acquiescence locking screen interface by pinning below in screen is to the surrounding release of sliding.Again for example, some terminal acquiescence locking screen interfaces carry out release by dragging from left to right slide block to screen.The locking screen interface of different terminals also has some layout details there are differences, for example obtain the desktop wallpaper picture resource of user's Set For Current, or add the concrete mode in desktop clock space etc., all can there are differences because of operating system different in different terminals and terminal.Therefore the layout without password screen, generating in the embodiment of the present invention can there are differences according to the different operating system adopting in different terminals and terminal.
In the embodiment of the present invention, when the definite terminal of antitheft trigger module 610 is stolen, what generate with the interface display module 620 of its coupling can be identical without password screen and terminal acquiescence locking screen interface, can also be different.Preferably, in the embodiment of the present invention, without password screen, be identical with terminal acquiescence locking screen interface.Generate with terminal and give tacit consent to different easily being identified terminal by stealer without password screen and opened anti-theft feature of locking screen interface, cause missing and obtain the chance that stealer can identifying information.To sum up; in the embodiment of the present invention, without password screen, be preferably identical with terminal acquiescence locking screen interface, identification degree is low, and prevents that stealer from identifying terminal and having opened anti-theft feature; and then the possibility of stolen terminal, efficient and rational protection user property safety are given in increase for change.
According to the combination of above-mentioned any one preferred embodiment or a plurality of preferred embodiments, the embodiment of the present invention can reach following beneficial effect:
In embodiments of the present invention, determine when terminal is stolen, generate without password screen locking screen interface and show.Stealer checks that this interface is when without password screen locking screen interface, cannot find that terminal opened anti-theft feature, can lose vigilance and directly carry out unlocking operation.Therefore, the embodiment of the present invention can delay to solve in prior art stealer and be shown and found terminal time of opening anti-theft function by terminal interface, avoids stealer to extract end cell, closing a terminal etc. is unfavorable for giving for change the operation of stolen terminal.Can be after receiving unlock command according to the embodiment of the present invention, refusal release, and obtain unlock command initiator can identifying information.Therefore, adopt the embodiment of the present invention can solve the problem of only having release failure just can take pictures afterwards and collect evidence in prior art.The embodiment of the present invention can avoid because of the time interval of the evidence obtaining of taking pictures longer, cause missing the problem of obtaining the best opportunity that stealer can identifying information.The embodiment of the present invention can generate without cryptographic interface stealer is lost vigilance.When stealer carries out release to terminal, what the embodiment of the present invention can get this unlock command initiator (being stealer) immediately can identifying information, need not wait for the evidence obtaining of just taking pictures after repeatedly release failure, and shortening is taken pictures the evidence obtaining time.Therefore, the method providing according to the embodiment of the present invention can increase the possibility that user gives terminal for change, more rationally effectively guarantees user's property safety.
In the instructions that provided herein, a large amount of details have been described.Yet, can understand, embodiments of the invention can not put into practice in the situation that there is no these details.In some instances, be not shown specifically known method, structure and technology, so that not fuzzy understanding of this description.
Similarly, be to be understood that, in order to simplify the disclosure and to help to understand one or more in each inventive aspect, in the above in the description of exemplary embodiment of the present invention, each feature of the present invention is grouped together into single embodiment, figure or sometimes in its description.Yet, the method for the disclosure should be construed to the following intention of reflection: the present invention for required protection requires than the more feature of feature of clearly recording in each claim.Or rather, as reflected in claims below, inventive aspect is to be less than all features of disclosed single embodiment above.Therefore, claims of following embodiment are incorporated to this embodiment thus clearly, and wherein each claim itself is as independent embodiment of the present invention.
Those skilled in the art are appreciated that and can the module in the equipment in embodiment are adaptively changed and they are arranged in one or more equipment different from this embodiment.Module in embodiment or unit or assembly can be combined into a module or unit or assembly, and can put them into a plurality of submodules or subelement or sub-component in addition.At least some in such feature and/or process or unit are mutually repelling, and can adopt any combination to combine all processes or the unit of disclosed all features in this instructions (comprising claim, summary and the accompanying drawing followed) and disclosed any method like this or equipment.Unless clearly statement in addition, in this instructions (comprising claim, summary and the accompanying drawing followed) disclosed each feature can be by providing identical, be equal to or the alternative features of similar object replaces.
In addition, those skilled in the art can understand, although embodiment more described herein comprise some feature rather than further feature included in other embodiment, the combination of the feature of different embodiment means within scope of the present invention and forms different embodiment.For example, in claims, the one of any of embodiment required for protection can be used with array mode arbitrarily.
All parts embodiment of the present invention can realize with hardware, or realizes with the software module moved on one or more processor, or realizes with their combination.It will be understood by those of skill in the art that and can use in practice microprocessor or digital signal processor (DSP) to realize according to the some or all functions of the some or all parts in the terminal anti-theft equipment of the embodiment of the present invention.The present invention for example can also be embodied as, for carrying out part or all equipment or device program (, computer program and computer program) of method as described herein.Realizing program of the present invention and can be stored on computer-readable medium like this, or can there is the form of one or more signal.Such signal can be downloaded and obtain from internet website, or provides on carrier signal, or provides with any other form.
It should be noted above-described embodiment the present invention will be described rather than limit the invention, and those skilled in the art can design alternative embodiment in the situation that do not depart from the scope of claims.In the claims, any reference symbol between bracket should be configured to limitations on claims.Word " comprises " not to be got rid of existence and is not listed as element or step in the claims.Being positioned at word " " before element or " one " does not get rid of and has a plurality of such elements.The present invention can be by means of including the hardware of some different elements and realizing by means of the computing machine of suitably programming.In having enumerated the unit claim of some devices, several in these devices can be to carry out imbody by same hardware branch.The use of word first, second and C grade does not represent any order.Can be title by these word explanations.
So far, those skilled in the art will recognize that, although detailed, illustrate and described a plurality of exemplary embodiment of the present invention herein, but, without departing from the spirit and scope of the present invention, still can directly determine or derive many other modification or the modification that meets the principle of the invention according to content disclosed by the invention.Therefore, scope of the present invention should be understood and regard as and cover all these other modification or modifications.
The embodiment of the invention also discloses A1, a kind of terminal anti-theft method, comprising:
Determine when terminal is stolen, generate without password screen locking screen interface and show;
While receiving unlock command, the operation of refusal unlocking screen, and obtain unlock command initiator can identifying information.
A2, according to the method described in A1, described definite terminal is stolen, comprising:
While receiving the stolen notification instruction of trusted party transmission, determine that described terminal is stolen; Or
The SIM card that described terminal detected is replaced, and determines that described terminal is stolen.
A3, according to the method described in A2, wherein, described in obtain unlock command initiator can identifying information after, also comprise: by described, can be sent to described trusted party by identifying information.
A4, according to the method described in A1 to A3 any one, wherein, described in obtain unlock command initiator can identifying information, comprising:
Utilize terminal camera to take pictures to described unlock command initiator, obtain photo;
Record described unlock command initiator's fingerprint.
A5, according to the method described in A1 to A4 any one, wherein, described identical with described terminal acquiescence locking screen interface without password screen locking screen interface.
A6, according to the method described in A1 to A5 any one, wherein, after the operation of described refusal unlocking screen, also comprise: generate and need the screen locking screen interface of input password and show; And
The password that receives input, judges that whether password is correct;
If so, carry out unlocking screen operation;
If not, keep screen by lock status.
The embodiment of the invention also discloses B7, a kind of terminal anti-theft client, comprising:
Antitheft trigger module, is configured to determine when terminal is stolen, triggers interface display module;
Described interface display module, is configured to generate without password screen locking screen interface and shows;
Processing module, while being configured to receive unlock command, refusal unlocking screen operation, and obtain unlock command initiator can identifying information.
B8, according to the client described in B7, described antitheft trigger module is also configured to:
While receiving the stolen notification instruction of trusted party transmission, determine that described terminal is stolen; Or
The SIM card that described terminal detected is replaced, and determines that described terminal is stolen.
B9, according to the client described in B8, wherein, also comprise:
Sending module, described in being configured to, obtain unlock command initiator can identifying information after, by described, can be sent to described trusted party by identifying information.
B10, according to the client described in B7 to B9 any one, wherein, described processing module also comprises:
Utilize terminal camera to take pictures to described unlock command initiator, obtain photo;
Record described unlock command initiator's fingerprint.
B11, according to the client described in B7 to B10 any one, wherein, described identical with described terminal acquiescence locking screen interface without password screen locking screen interface.
B12, according to the client described in B7 to B11 any one, wherein, after described interface display module is also configured to the operation of described refusal unlocking screen, generates and need the screen locking screen interface of input password and show;
Described processing module is also configured to receive the password of input, judges that whether password is correct; If so, carry out unlocking screen operation; If not, keep screen by lock status.

Claims (10)

1. a terminal anti-theft method, comprising:
Determine when terminal is stolen, generate without password screen locking screen interface and show;
While receiving unlock command, the operation of refusal unlocking screen, and obtain unlock command initiator can identifying information.
2. method according to claim 1, described definite terminal is stolen, comprising:
While receiving the stolen notification instruction of trusted party transmission, determine that described terminal is stolen; Or
The SIM card that described terminal detected is replaced, and determines that described terminal is stolen.
3. method according to claim 2, wherein, described in obtain unlock command initiator can identifying information after, also comprise: by described, can be sent to described trusted party by identifying information.
4. according to the method described in claims 1 to 3 any one, wherein, described in obtain unlock command initiator can identifying information, comprising:
Utilize terminal camera to take pictures to described unlock command initiator, obtain photo;
Record described unlock command initiator's fingerprint.
5. according to the method described in claim 1 to 4 any one, wherein, described identical with described terminal acquiescence locking screen interface without password screen locking screen interface.
6. according to the method described in claim 1 to 5 any one, wherein, after described refusal unlocking screen operation, also comprise: generate and need the screen locking screen interface of input password and show; And
The password that receives input, judges that whether password is correct;
If so, carry out unlocking screen operation;
If not, keep screen by lock status.
7. a terminal anti-theft client, comprising:
Antitheft trigger module, is configured to determine when terminal is stolen, triggers interface display module;
Described interface display module, is configured to generate without password screen locking screen interface and shows;
Processing module, while being configured to receive unlock command, refusal unlocking screen operation, and obtain unlock command initiator can identifying information.
8. client according to claim 7, described antitheft trigger module is also configured to:
While receiving the stolen notification instruction of trusted party transmission, determine that described terminal is stolen; Or
The SIM card that described terminal detected is replaced, and determines that described terminal is stolen.
9. client according to claim 8, wherein, also comprises:
Sending module, described in being configured to, obtain unlock command initiator can identifying information after, by described, can be sent to described trusted party by identifying information.
10. according to the client described in claim 7 to 9 any one, wherein, described processing module also comprises:
Utilize terminal camera to take pictures to described unlock command initiator, obtain photo;
Record described unlock command initiator's fingerprint.
CN201310687619.XA 2013-12-13 2013-12-13 Terminal antitheft method and equipment Pending CN103699860A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201310687619.XA CN103699860A (en) 2013-12-13 2013-12-13 Terminal antitheft method and equipment
PCT/CN2014/093638 WO2015085942A1 (en) 2013-12-13 2014-12-11 Terminal status query method, terminal anti-theft method and corresponding device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310687619.XA CN103699860A (en) 2013-12-13 2013-12-13 Terminal antitheft method and equipment

Publications (1)

Publication Number Publication Date
CN103699860A true CN103699860A (en) 2014-04-02

Family

ID=50361384

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310687619.XA Pending CN103699860A (en) 2013-12-13 2013-12-13 Terminal antitheft method and equipment

Country Status (1)

Country Link
CN (1) CN103699860A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104657640A (en) * 2015-02-10 2015-05-27 苏州天平先进数字科技有限公司 Secret unlocking method for mobile terminal
WO2015085942A1 (en) * 2013-12-13 2015-06-18 北京奇虎科技有限公司 Terminal status query method, terminal anti-theft method and corresponding device
CN105095802A (en) * 2014-04-25 2015-11-25 北京奇虎科技有限公司 Antitheft method for smart terminal device and smart terminal device
WO2016034090A1 (en) * 2014-09-05 2016-03-10 可牛网络技术(北京)有限公司 Method and system for improving security of mobile terminal
CN105554227A (en) * 2014-10-31 2016-05-04 东莞宇龙通信科技有限公司 Method and apparatus for improving terminal information security, and terminal
CN105868658A (en) * 2015-11-26 2016-08-17 乐视致新电子科技(天津)有限公司 Image information acquisition method, user equipment and server
CN105868600A (en) * 2015-12-14 2016-08-17 乐视移动智能信息技术(北京)有限公司 Terminal control method and apparatus
CN106920163A (en) * 2016-08-23 2017-07-04 阿里巴巴集团控股有限公司 The method and apparatus for releasing account restriction
CN107707746A (en) * 2017-09-25 2018-02-16 北京珠穆朗玛移动通信有限公司 Management method, electronic equipment and the storage medium of mobile terminal
CN109714465A (en) * 2019-03-18 2019-05-03 深圳市道格恒通科技有限公司 A kind of intelligent mobile phone anti-theft method and system
CN109819101A (en) * 2018-12-18 2019-05-28 法信公证云(厦门)科技有限公司 A kind of evidence collecting method and Specialised mobile terminal of collecting evidence

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101706707A (en) * 2009-12-18 2010-05-12 中兴通讯股份有限公司 Method and device for unlocking screen of touch screen equipment
US20100248689A1 (en) * 2009-03-30 2010-09-30 Teng Stephanie E Unlock Screen
CN101969493A (en) * 2010-10-28 2011-02-09 深圳市五巨科技有限公司 Anti-theft method and device for mobile terminal
CN102413456A (en) * 2011-09-02 2012-04-11 中国电信股份有限公司 User terminal anti-theft method, user terminal anti-theft device and user terminal anti-theft system based on operation network
CN102880398A (en) * 2012-09-24 2013-01-16 惠州Tcl移动通信有限公司 Mobile phone unlocking method based on random digital arrays and mobile phone
CN103220637A (en) * 2012-01-19 2013-07-24 腾讯科技(深圳)有限公司 Mobile phone anti-theft protection method and mobile phone anti-theft protection device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100248689A1 (en) * 2009-03-30 2010-09-30 Teng Stephanie E Unlock Screen
CN101706707A (en) * 2009-12-18 2010-05-12 中兴通讯股份有限公司 Method and device for unlocking screen of touch screen equipment
CN101969493A (en) * 2010-10-28 2011-02-09 深圳市五巨科技有限公司 Anti-theft method and device for mobile terminal
CN102413456A (en) * 2011-09-02 2012-04-11 中国电信股份有限公司 User terminal anti-theft method, user terminal anti-theft device and user terminal anti-theft system based on operation network
CN103220637A (en) * 2012-01-19 2013-07-24 腾讯科技(深圳)有限公司 Mobile phone anti-theft protection method and mobile phone anti-theft protection device
CN102880398A (en) * 2012-09-24 2013-01-16 惠州Tcl移动通信有限公司 Mobile phone unlocking method based on random digital arrays and mobile phone

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015085942A1 (en) * 2013-12-13 2015-06-18 北京奇虎科技有限公司 Terminal status query method, terminal anti-theft method and corresponding device
CN105095802A (en) * 2014-04-25 2015-11-25 北京奇虎科技有限公司 Antitheft method for smart terminal device and smart terminal device
WO2016034090A1 (en) * 2014-09-05 2016-03-10 可牛网络技术(北京)有限公司 Method and system for improving security of mobile terminal
CN105554227B (en) * 2014-10-31 2020-02-21 东莞宇龙通信科技有限公司 Method and device for improving terminal information security and terminal
CN105554227A (en) * 2014-10-31 2016-05-04 东莞宇龙通信科技有限公司 Method and apparatus for improving terminal information security, and terminal
CN104657640A (en) * 2015-02-10 2015-05-27 苏州天平先进数字科技有限公司 Secret unlocking method for mobile terminal
CN105868658A (en) * 2015-11-26 2016-08-17 乐视致新电子科技(天津)有限公司 Image information acquisition method, user equipment and server
WO2017088419A1 (en) * 2015-11-26 2017-06-01 乐视控股(北京)有限公司 Method for acquiring image information, and user equipment and server
CN105868600A (en) * 2015-12-14 2016-08-17 乐视移动智能信息技术(北京)有限公司 Terminal control method and apparatus
CN106920163A (en) * 2016-08-23 2017-07-04 阿里巴巴集团控股有限公司 The method and apparatus for releasing account restriction
CN107707746A (en) * 2017-09-25 2018-02-16 北京珠穆朗玛移动通信有限公司 Management method, electronic equipment and the storage medium of mobile terminal
CN107707746B (en) * 2017-09-25 2021-02-23 北京珠穆朗玛移动通信有限公司 Management method of mobile terminal, electronic device and storage medium
CN109819101A (en) * 2018-12-18 2019-05-28 法信公证云(厦门)科技有限公司 A kind of evidence collecting method and Specialised mobile terminal of collecting evidence
CN109714465A (en) * 2019-03-18 2019-05-03 深圳市道格恒通科技有限公司 A kind of intelligent mobile phone anti-theft method and system

Similar Documents

Publication Publication Date Title
CN103699860A (en) Terminal antitheft method and equipment
US11394555B2 (en) Mobile terminal privacy protection method and protection apparatus, and mobile terminal
CN103728894B (en) The long-range control method of a kind of terminal unit and system
US8433068B2 (en) Method and apparatus for communication based on pseudo-contact information
CN110651270B (en) Data access method and device
CN104978109B (en) A kind of Application Program Interface display methods and terminal
CN102693381B (en) Method, device and system for anti-theft of portable computer equipment
US20150089666A1 (en) Apparatus and method for protecting privacy in terminal
CN103702331A (en) Mobile terminal antitheft method and client
CN103702317A (en) Mobile terminal antitheft method and client
CN102880560A (en) User privacy data protection method and mobile terminal using user privacy data protection method
CN107113613B (en) Server, mobile terminal, network real-name authentication system and method
AU2018238203B2 (en) A system and method for providing user accounts through which users are able to operate computing devices
EP3367286A1 (en) Methods, apparatuses, computer program and recording medium for protecting information
Pell You can't always get what you want: how will law enforcement get what it needs in a post-CALEA, Cybsecurity-Centric Encryption Era
CN105657147A (en) Mobile terminal anti-theft method and device
CN106778225A (en) The method and apparatus for processing password
US20090106845A1 (en) Systems and methods for securing data in an electronic apparatus
CN108121904A (en) Unlocking method, device, electronic equipment and server
CN108540591B (en) Address book management method, address book management device and electronic equipment
KR101087698B1 (en) Method for authenticating security of smart-phone
CN103780756B (en) The method of client identification card data secrecy and mobile terminal thereof
CN103729604B (en) A kind of method and apparatus in customer access area territory
WO2010067263A2 (en) A system for protection and backup of information in a mobile cell unit
JP2008227831A (en) Portable terminal, method for controlling displaying of individual information in the same, program, and recording medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20140402

RJ01 Rejection of invention patent application after publication