CN104239805B - A kind of anti-theft method of mobile phone and device - Google Patents

A kind of anti-theft method of mobile phone and device Download PDF

Info

Publication number
CN104239805B
CN104239805B CN201410437273.2A CN201410437273A CN104239805B CN 104239805 B CN104239805 B CN 104239805B CN 201410437273 A CN201410437273 A CN 201410437273A CN 104239805 B CN104239805 B CN 104239805B
Authority
CN
China
Prior art keywords
mobile phone
smart mobile
instruction
secret protection
sent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201410437273.2A
Other languages
Chinese (zh)
Other versions
CN104239805A (en
Inventor
梁强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201410437273.2A priority Critical patent/CN104239805B/en
Publication of CN104239805A publication Critical patent/CN104239805A/en
Application granted granted Critical
Publication of CN104239805B publication Critical patent/CN104239805B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality

Abstract

The embodiment of the invention discloses a kind of anti-theft method of mobile phone and device, this method includes:Monitoring is sent to the instruction of smart mobile phone by data network;If listen to the default secret protection for being used to delete privacy information sent with the network terminal of smart mobile phone binding to instruct; corresponding privacy information in the smart mobile phone is then deleted according to the default secret protection instruction; the problem of mobile phone is lost or stolen rear private file is revealed is avoided that, the security of cellphone information can be improved.

Description

A kind of anti-theft method of mobile phone and device
Technical field
The present invention relates to computer security technique field, and in particular to a kind of anti-theft method of mobile phone and device.
Background technology
Make with mobile network's terminal such as development and the improvement of people's living standards, smart mobile phone of mobile communication technology With increasingly popularizing, smart mobile phone has become indispensable instrument in people's life & amusement exchange at present.Connection on mobile phone It is that people, photo, video recording and private document etc. are to be related to the important information of individual privacy, if hand-set from stolen or lost, These important informations on mobile phone are easy for being exposed to others, therefore mobile phone information safety is extremely important.
With the gradual enhancing that people's secret protection is realized, cellphone subscriber is also becoming increasingly recognized that the important of information security Property, therefore the privacy from mobile phone development business to mobile phone software vendor all after trying every possible means to solve user mobile phone loss or be stolen is let out Dew problem.For example, in the prior art, there is a kind of technology by being lost or stolen mobile phone remotely sends the form of preset SMS and deleted Except privacy information.But when mobile phone stealer or when being reluctant that the people for giving back lost objects takes mobile phone, if the very first time is changed Mobile phone card, is lost or stolen mobile phone can not receive the preset SMS and can not be automatically deleted privacy because cell-phone number changes Information.
The content of the invention
In view of this, the embodiment of the present invention provides a kind of anti-theft method of mobile phone and device, to avoid mobile phone from losing or be stolen The problem of private file is revealed afterwards.
In a first aspect, the embodiments of the invention provide a kind of anti-theft method of mobile phone, including:
Monitoring is sent to the instruction of smart mobile phone by data network;
If listen to the default privacy for being used to delete privacy information sent with the network terminal of smart mobile phone binding Protection instruction, then corresponding privacy information in the smart mobile phone is deleted according to the default secret protection instruction.
Second aspect, the embodiment of the present invention additionally provide a kind of anti-stealing device for handset, including:
Monitoring unit is instructed, is sent for monitoring by data network to the instruction of smart mobile phone;
Privacy information deletes unit, if being used to delete with what the network terminal of smart mobile phone binding was sent for listening to Except the default secret protection of privacy information instructs, then deleted according to the default secret protection instruction corresponding in the smart mobile phone Privacy information.
The technical scheme of the embodiment of the present invention is sent to the instruction of smart mobile phone by data network by monitoring, according to being It is no to listen to default secret protection instruction, to determine whether to delete the privacy information in smart mobile phone, to avoid mobile phone from losing or After stolen, it can not receive the preset SMS because of cell-phone number change and privacy information can not be automatically deleted and cause private file The problem of leakage, the security of cellphone information can be improved.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, institute in being described below to the embodiment of the present invention The accompanying drawing needed to use is briefly described, it should be apparent that, drawings in the following description are only some implementations of the present invention Example, for those of ordinary skill in the art, on the premise of not paying creative work, it can also be implemented according to the present invention The content of example and these accompanying drawings obtain other accompanying drawings.
Fig. 1 is the anti-theft method of mobile phone flow chart described in the embodiment of the present invention one;
Fig. 2 is the anti-theft method of mobile phone flow chart described in the embodiment of the present invention two;
Fig. 3 is the anti-theft method of mobile phone flow chart described in the embodiment of the present invention three;
Fig. 4 is the structured flowchart of the anti-stealing device for handset described in the embodiment of the present invention four;
Fig. 5 is the structured flowchart of the anti-stealing device for handset described in the embodiment of the present invention five.
Embodiment
For make present invention solves the technical problem that, the technical scheme that uses and the technique effect that reaches it is clearer, below The technical scheme of the embodiment of the present invention will be described in further detail with reference to accompanying drawing, it is clear that described embodiment is only It is part of the embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, those skilled in the art exist The every other embodiment obtained under the premise of creative work is not made, belongs to the scope of protection of the invention.
Further illustrate technical scheme below in conjunction with the accompanying drawings and by embodiment.
Embodiment one
Fig. 1 is the anti-theft method of mobile phone flow chart that the embodiment of the present invention one provides, and the present embodiment is applicable to smart mobile phone When losing or be stolen, the situation of the privacy information in the smart mobile phone is remotely deleted, it is desirable to which this is lost or stolen mobile phone is in net Network connection status, this method can be performed by configuring the anti-stealing device for handset in smart mobile phone, in the anti-stealing device for handset Program be internally stored program.
As shown in figure 1, the anti-theft method of mobile phone described in the present embodiment includes:
S101, monitoring are sent to the instruction of smart mobile phone by data network.
It should be noted that the program that the present embodiment requires to perform the instruction snoop-operations is internally stored program, it is not required to Want user manually opened and monitor purpose in real time to reach.
In the present embodiment, the instruction is to be sent by data network to smart mobile phone, and is not based on China Mobile, connection The instruction of the short message form of the short message forwarding platform forwarding of the offers such as logical, telecommunications.Because when mobile phone stealer or it is reluctant to give back something lost When the people of lost article product takes mobile phone, if the very first time changes Mobile phone card, lost or be stolen smart mobile phone because phone number Change and the instruction of the short message form can not be received, therefore the purpose for deleting privacy information can not be realized.
If S102, listen to the network terminal transmission of smart mobile phone binding for deleting the default of privacy information Secret protection instructs, then deletes corresponding privacy information in the smart mobile phone according to the default secret protection instruction.
In the present embodiment, the default secret protection instruction includes deletion contact person instruction, deletes photo instruction, deletes in advance Specify at least one in private document instruction.
It should be noted that the network terminal described in the present embodiment includes but is not limited to mobile phone, tablet personal computer, desktop Brain etc., if energy operation program, and network service can be carried out.For example, mobile phone and desktop computer are bound, if mobile phone is lost Lose or stolen, default secret protection can be sent to the mobile phone by the desktop computer and instructed.In the present embodiment, the network terminal is excellent Elect smart mobile phone as, so, can be by described in the present embodiment after two or more smart mobile phones establish binding relationship Method mutually carry out deleting the control of privacy information because mobile phone has the characteristic carried with, lost or stolen in a side When can make binding it is another can be more convenient the very first time carry out timely processing.
The technical scheme of the present embodiment is sent to the instruction of smart mobile phone by monitoring by data network, according to whether prison Default secret protection instruction is heard, to determine whether to delete the privacy information in smart mobile phone, to avoid mobile phone from losing or be stolen Afterwards, the preset SMS can not be received because of cell-phone number change and privacy information can not be automatically deleted and cause private file to be revealed The problem of, the security of cellphone information can be improved.
Embodiment two
On the basis of embodiment one, the present embodiment requires that mobile phone has GPS positioning device, and Fig. 2 is implementation of the present invention Anti-theft method of mobile phone flow chart described in example two, as shown in Fig. 2 the anti-theft method of mobile phone described in the present embodiment includes:
Step S201, monitor and sent by data network to the instruction of smart mobile phone.
Step S202, listen to the network terminal transmission of smart mobile phone binding for deleting the pre- of privacy information If secret protection instructs.
Step S203, corresponding privacy information in the smart mobile phone is deleted according to the default secret protection instruction.
Step S204, control the global position system GPS positioner acquisition of the smart mobile phone true for current location Fixed GPS information.
GPS navigation system be based on global 24 positioning satellites, to all parts of the world it is round-the-clock three-dimensional is provided A kind of radio-navigation positioning system of the information such as position, three-dimensional velocity.It is made up of three parts, when ground control segment, It is made up of master station, ground-plane antenna, monitoring station and communication accessory system;Second, space segment, is made up of 24 satellites, is distributed in 6 orbit planes;Third, user's set part, is made up of GPS and satellite antenna.Civilian positioning precision is up to 10 meters It is interior.
The GPS positioning device of the smart mobile phone, its major function can be captured as selected by certain satellite angle of cut-off The satellite to be measured selected, and track the operation of these satellites.After GPS positioning device captures the satellite-signal of tracking, so that it may survey Smart mobile phone is measured to the pseudo-distance of satellite and the rate of change of distance, demodulates the data such as satellite orbit parameter.According to these numbers According to the microprocessor computer in GPS positioning device can carry out location Calculation by positioning calculation method, calculate the intelligent hand Machine is currently located the information such as the longitude and latitude in geographical position, height, speed, time.
Step S205, the GPS information is sent to the network terminal, to provide the clue for giving smart mobile phone for change.
, can be with it should be noted that the sequential relationship of step S203 and step S204-S205 operation is not limited to this Be step S204-S205 operation preceding, step S203 operation is rear.
On the basis of embodiment one, the present embodiment is by listening to the network terminal bound with the smart mobile phone After the default secret protection instruction for being used to delete privacy information sent, the global positioning system of the smart mobile phone is controlled GPS positioning device obtains the GPS information determined for current location, and the GPS information is sent into the network terminal, can be Further provide for giving for change the clue of smart mobile phone when smart mobile phone is stolen or loses, the possibility of getting back mobile phone can be increased.
Embodiment three
Fig. 3 is the anti-theft method of mobile phone flow chart described in the embodiment of the present invention three, as shown in figure 3, described in the present embodiment Anti-theft method of mobile phone includes:
Step S301, monitor and sent by data network to the instruction of smart mobile phone.
Step S302, judge whether to listen to and be used to delete with what other smart mobile phones of smart mobile phone binding were sent The default secret protection instruction of privacy information, if then performing step S303, otherwise return to step S301.
Step S303, corresponding privacy information in the smart mobile phone is deleted according to the default secret protection instruction.
Step S304, judge whether that listening to the holding of changing that other described smart mobile phones are sent shows instruction, if then performing Step S305, otherwise return to step S301.
Step S305, the pre- of the privacy information for deleting other smart mobile phones is sent to other described smart mobile phones If secret protection instructs.
Instruction is shown in the holding of changing that this operating procedure can be used to listen to other smart mobile phones transmission when smart mobile phone, then The default secret protection sent to other described smart mobile phones for deleting privacy information instructs, so that other described smart mobile phones In the very first time according to corresponding to deleting the default secret protection instruction privacy information.
Step S306, judge whether to detect the smart mobile phone change Mobile phone card, if then performing step S307, otherwise Return to step S301.
Specifically, detecting the smart mobile phone and whether changing Mobile phone card and can be can also met in advance by periodically detecting Detected during first specified requirements, such as detected during mobile phone power-on.
Because periodically detection needs to take the substantial amounts of CPU time slice of smart mobile phone and internal memory, and smart mobile phone changes After Mobile phone card, it certainly will need to turn back on ability normal use, therefore, preferably, detecting whether the smart mobile phone changes The operation of Mobile phone card may include:When smart mobile phone start, then the current cell-phone number of the smart mobile phone is obtained, by the hand Machine number is compared with the cell-phone number to prestore, determines whether the smart mobile phone changes Mobile phone card according to comparison result.
Because the international mobile equipment identity number of mobile phone is the build-in attribute of mobile phone, will not change with the replacing of the Mobile phone card of mobile phone, because This, is if the network terminal is other smart mobile phones, the mobile device that the smart mobile phone passes through other smart mobile phones International identity code international mobile equipment identity number, verify the binding relationship between the smart mobile phone and other described smart mobile phones.
Step S307, the smart mobile phone log-on data network is controlled, by the data network to described in bound Other smart mobile phones, which are sent, default to be changed holding and shows instruction.
This operating procedure can be used for, when mobile phone stealer or when being reluctant that the people for giving back lost objects takes mobile phone, if One time changed Mobile phone card, and this operating procedure can voluntarily start the stolen or data network by loss mobile phone, and pass through the number Sent according to network to other bound smart mobile phones (another or the more than one mobile phone of such as establishing binding relationship) default Change holding and show instruction, be used to delete privacy to trigger other smart mobile phones described in the binding and be stolen to this or sent by loss mobile phone The default secret protection instruction of information.
It should be noted that step S302-S303 operation, step S304-S305 operation, with step S306-S307 The sequential relationship of operation be not limited to this, after the operation that can also be step S302-S303, perform S306-S307 and S304-S305 operation;After can also be step S304-S305, step S302-S303 and S306-S307 operation are performed; After can also be step S304-S305, step S306-S307 S302-S303 operation is performed;It can also be step After S306-S307, step S302-S303 operation and step S304-S305 operation are performed;It can also be step S306- After S307, step S304-S305 and step S302-S303 operation is performed.
The present embodiment is on the basis of embodiment one and embodiment two, by other smart mobile phones of the network terminal Example, add when detection smart mobile phone change Mobile phone card, control the smart mobile phone log-on data network, pass through the data network Network to bound other smart mobile phones send it is default changes the step of instruction is shown in holding, and if adding and listening to other intelligence When what mobile phone was sent changes holding and show instruction, the default secret protection for deleting privacy information is sent to other described smart mobile phones Instruction.When the present embodiment can be replaced Mobile phone card after smart mobile phone is stolen or is lost, other bound smart mobile phones are triggered It is stolen to this or default secret protection instruction is sent by loss mobile phone.And can be because bound hand-set from stolen or being lost and being received Instructed to default secret protection when changing holding and showing instruction, sent for deleting privacy information, so that the intelligence that is stolen or being lost Can mobile phone privacy information according to corresponding to deleting the default secret protection instruction.
Example IV
Fig. 4 is the structured flowchart of the anti-stealing device for handset described in the embodiment of the present invention four, as shown in figure 4, the present embodiment institute The anti-stealing device for handset stated includes:
Monitoring unit 401 is instructed, is sent for monitoring by data network to the instruction of smart mobile phone;
Privacy information deletes unit 402, if for listening to the use sent with the network terminal of smart mobile phone binding In the default secret protection instruction for deleting privacy information, then deleted according to the default secret protection instruction in the smart mobile phone Corresponding privacy information.
Further, the default secret protection instruction includes deletion contact person instruction, deletes photo instruction, deletes finger in advance Determine at least one in private document instruction.
Further, described device also includes GPS information transmitting element 403, for listening to and the smart mobile phone After the default secret protection for being used to delete privacy information that the network terminal of binding is sent instructs, the smart mobile phone is controlled Global position system GPS positioner obtains the GPS information determined for current location, the GPS information is sent to described The network terminal, to provide the clue for giving smart mobile phone for change.
The anti-stealing device for handset that the present embodiment provides can perform the mobile phone that the embodiment of the present invention one and embodiment two are provided Theft preventing method, possess the corresponding functional module of execution method and beneficial effect.
Embodiment five
Fig. 5 is the structured flowchart of the anti-stealing device for handset described in the embodiment of the present invention five, as shown in figure 5, the present embodiment institute The anti-stealing device for handset stated includes:
Monitoring unit 501 is instructed, is sent for monitoring by data network to the instruction of smart mobile phone;
Privacy information deletes unit 502, if for listening to the use sent with the network terminal of smart mobile phone binding In the default secret protection instruction for deleting privacy information, then deleted according to the default secret protection instruction in the smart mobile phone Corresponding privacy information.
Further, the default secret protection instruction includes deletion contact person instruction, deletes photo instruction, deletes finger in advance Determine at least one in private document instruction.
Further, described device also includes GPS information transmitting element 503, for listening to and the smart mobile phone After the default secret protection for being used to delete privacy information that the network terminal of binding is sent instructs, the smart mobile phone is controlled Global position system GPS positioner obtains the GPS information determined for current location, the GPS information is sent to described The network terminal, to provide the clue for giving smart mobile phone for change.
Further, described device also includes:
Mobile phone card alteration detection unit 504, for detecting whether the smart mobile phone changes Mobile phone card;
Mobile phone card changes alarm unit 505, if for detecting the smart mobile phone change Mobile phone card, controls the intelligence Can mobile phone log-on data network, by the data network to the bound network terminal send it is default change holding and show instruction, with The bound network terminal of prompting sends the default secret protection to the smart mobile phone and instructed.
Further, the Mobile phone card alteration detection unit 504 is specifically used for:When smart mobile phone start, then obtain The current cell-phone number of the smart mobile phone, the cell-phone number is compared with the cell-phone number to prestore, determined according to comparison result Whether the smart mobile phone changes Mobile phone card.
Further, the network terminal with smart mobile phone binding includes other smart mobile phones;
Described device also includes secret protection instruction sending unit 506, if for listening to other smart mobile phones hair Instruction is shown in the holding of changing sent, then privacy information for deleting other smart mobile phones is sent to other described smart mobile phones Default secret protection instruction.
Further, the network terminal is other smart mobile phones, and the smart mobile phone passes through other described smart mobile phones Mobile device international identity code international mobile equipment identity number, verify the binding relationship between the smart mobile phone and other described smart mobile phones.
Further, described device also includes binding relationship authentication unit, for the shifting by other smart mobile phones Dynamic equipment international identity code international mobile equipment identity number, verifies the binding relationship between smart mobile phone and other described smart mobile phones.
The anti-stealing device for handset that the present embodiment provides can perform the embodiment of the present invention one, embodiment two and embodiment three and be carried The anti-theft method of mobile phone of confession, possess the corresponding functional module of execution method and beneficial effect.
Above example provide technical scheme in all or part of content can be realized by software programming, its software Program storage is in the storage medium that can be read, and storage medium is for example:Hard disk, CD or floppy disk in computer.
Pay attention to, above are only presently preferred embodiments of the present invention and institute's application technology principle.It will be appreciated by those skilled in the art that The invention is not restricted to specific embodiment described here, can carry out for a person skilled in the art various obvious changes, Readjust and substitute without departing from protection scope of the present invention.Therefore, although being carried out by above example to the present invention It is described in further detail, but the present invention is not limited only to above example, without departing from the inventive concept, also Other more equivalent embodiments can be included, and the scope of the present invention is determined by scope of the appended claims.

Claims (10)

  1. A kind of 1. anti-theft method of mobile phone, it is characterised in that including:
    Monitored by internally stored program and sent by data network to the instruction of smart mobile phone, wherein, the instruction is not base In the instruction of the short message form of short message forwarding platform forwarding;
    If listen to the default secret protection for being used to delete privacy information sent with the network terminal of smart mobile phone binding Instruction, then corresponding privacy information in the smart mobile phone is deleted according to the default secret protection instruction;The network terminal For other smart mobile phones;
    Wherein, methods described also includes:
    Detect whether the smart mobile phone changes Mobile phone card;
    If detecting the smart mobile phone change Mobile phone card, the smart mobile phone log-on data network is controlled, passes through the number According to network to the bound network terminal send it is default change holding and show instruction, with the network terminal bound in prompting to the intelligence Mobile phone sends the default secret protection instruction;
    Methods described also includes, if listening to the holding of changing that other described smart mobile phones are sent shows instruction, to other described intelligence Energy mobile phone sends the default secret protection instruction of the privacy information for deleting other smart mobile phones.
  2. 2. anti-theft method of mobile phone according to claim 1, it is characterised in that the default secret protection instruction includes deleting It is at least one in contact person's instruction, the instruction of deletion photo, deletion preassignment private document instruction.
  3. 3. anti-theft method of mobile phone according to claim 1 or 2, it is characterised in that methods described also includes:Listen to After the default secret protection for being used to delete privacy information that the network terminal of the smart mobile phone binding is sent instructs, institute is controlled The global position system GPS positioner for stating smart mobile phone obtains the GPS information determined for current location, and the GPS is believed Breath is sent to the network terminal, to provide the clue for giving smart mobile phone for change.
  4. 4. anti-theft method of mobile phone according to claim 1, it is characterised in that detect whether the smart mobile phone changes mobile phone The operation of card specifically includes:When smart mobile phone start, then the current cell-phone number of the smart mobile phone is obtained, by the mobile phone Number it is compared with the cell-phone number to prestore, determines whether the smart mobile phone changes Mobile phone card according to comparison result.
  5. 5. anti-theft method of mobile phone according to claim 1, it is characterised in that the smart mobile phone passes through other described intelligence The mobile device international identity code international mobile equipment identity number of mobile phone, verify that the binding between the smart mobile phone and other described smart mobile phones is closed System.
  6. A kind of 6. anti-stealing device for handset, it is characterised in that including:
    Monitoring unit is instructed, is sent for being monitored by internally stored program by data network to the instruction of smart mobile phone, its In, the instruction is not based on the instruction of the short message form of short message forwarding platform forwarding;
    Privacy information deletes unit, if hidden for deleting with the network terminal transmission of smart mobile phone binding for listening to The default secret protection instruction of personal letter breath, then deleted according to the default secret protection instruction corresponding hidden in the smart mobile phone Personal letter ceases;The network terminal is other smart mobile phones;
    Described device also includes:
    Mobile phone card alteration detection unit, for detecting whether the smart mobile phone changes Mobile phone card;
    Mobile phone card changes alarm unit, if for detecting the smart mobile phone change Mobile phone card, controls the smart mobile phone Log-on data network, by the data network to the bound network terminal send it is default change holding and show instruction, to prompt The network terminal of binding sends the default secret protection to the smart mobile phone and instructed;
    Secret protection instruction sending unit, if showing instruction for listening to the holding of changing that other described smart mobile phones are sent, to Other described smart mobile phones send the default secret protection instruction of the privacy information for deleting other smart mobile phones.
  7. 7. anti-stealing device for handset according to claim 6, it is characterised in that the default secret protection instruction includes deleting It is at least one in contact person's instruction, the instruction of deletion photo, deletion preassignment private document instruction.
  8. 8. the anti-stealing device for handset according to claim 6 or 7, it is characterised in that described device also includes GPS information and sent Unit, for listening to the default privacy for being used to delete privacy information sent with the network terminal of smart mobile phone binding After protection instruction, the global position system GPS positioner of the smart mobile phone is controlled to obtain what is determined for current location GPS information, the GPS information is sent to the network terminal, to provide the clue for giving smart mobile phone for change.
  9. 9. anti-stealing device for handset according to claim 6, it is characterised in that the Mobile phone card alteration detection unit is specifically used In:When smart mobile phone start, then the current cell-phone number of the smart mobile phone is obtained, by the cell-phone number and the mobile phone to prestore Number it is compared, determines whether the smart mobile phone changes Mobile phone card according to comparison result.
  10. 10. anti-stealing device for handset according to claim 6, it is characterised in that described device also includes binding relationship and verified Unit, for the mobile device international identity code international mobile equipment identity number by other smart mobile phones, checking smart mobile phone with it is described Binding relationship between other smart mobile phones.
CN201410437273.2A 2014-08-29 2014-08-29 A kind of anti-theft method of mobile phone and device Expired - Fee Related CN104239805B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410437273.2A CN104239805B (en) 2014-08-29 2014-08-29 A kind of anti-theft method of mobile phone and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410437273.2A CN104239805B (en) 2014-08-29 2014-08-29 A kind of anti-theft method of mobile phone and device

Publications (2)

Publication Number Publication Date
CN104239805A CN104239805A (en) 2014-12-24
CN104239805B true CN104239805B (en) 2018-01-19

Family

ID=52227846

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410437273.2A Expired - Fee Related CN104239805B (en) 2014-08-29 2014-08-29 A kind of anti-theft method of mobile phone and device

Country Status (1)

Country Link
CN (1) CN104239805B (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106162607A (en) * 2015-03-24 2016-11-23 中兴通讯股份有限公司 The management method of a kind of virtual SIM card, device and system
CN106154943A (en) * 2015-04-24 2016-11-23 北大方正集团有限公司 Position of mobile equipment monitoring method, Apparatus and system
CN104881612A (en) * 2015-05-06 2015-09-02 百度在线网络技术(北京)有限公司 Data deleting method and apparatus
CN106302603A (en) * 2015-06-05 2017-01-04 腾讯科技(深圳)有限公司 The method and apparatus remotely deleting information
CN106250049B (en) * 2015-06-15 2020-08-04 数据通信科学技术研究所 Method for clearing mobile phone data, management terminal and mobile phone
CN105184143A (en) * 2015-09-01 2015-12-23 广东欧珀移动通信有限公司 Antitheft locking method and apparatus for mobile terminal
CN105760766B (en) * 2016-02-17 2018-10-23 青岛海信移动通信技术股份有限公司 A kind of image guard method and device based on recognition of face
CN105813021A (en) * 2016-05-30 2016-07-27 维沃移动通信有限公司 Mobile terminal retrieving method, mobile terminal and server
CN106162604A (en) * 2016-06-14 2016-11-23 努比亚技术有限公司 A kind of mobile terminal and protecting information safety method thereof
CN106529319A (en) * 2016-11-30 2017-03-22 广东欧珀移动通信有限公司 File protection method and device, and terminal
CN108174035A (en) * 2017-12-27 2018-06-15 中国地质大学(武汉) A kind of smart mobile phone double mechanism long-range control method, equipment and storage device
CN111641746A (en) * 2019-03-02 2020-09-08 宁波团团工业设计有限公司 Mobile phone anti-theft method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101222692A (en) * 2007-01-09 2008-07-16 中兴通讯股份有限公司 Terminal anti-theft method based on terminal management service
CN101389100A (en) * 2008-10-24 2009-03-18 Tcl天一移动通信(深圳)有限公司 Personal information protecting method for mobile communication terminal equipment
CN102739868A (en) * 2012-06-18 2012-10-17 奇智软件(北京)有限公司 Mobile terminal loss processing method and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101222692A (en) * 2007-01-09 2008-07-16 中兴通讯股份有限公司 Terminal anti-theft method based on terminal management service
CN101389100A (en) * 2008-10-24 2009-03-18 Tcl天一移动通信(深圳)有限公司 Personal information protecting method for mobile communication terminal equipment
CN102739868A (en) * 2012-06-18 2012-10-17 奇智软件(北京)有限公司 Mobile terminal loss processing method and system

Also Published As

Publication number Publication date
CN104239805A (en) 2014-12-24

Similar Documents

Publication Publication Date Title
CN104239805B (en) A kind of anti-theft method of mobile phone and device
US10623963B2 (en) Proactive security for mobile devices
US9104865B2 (en) Threat condition management
US8682349B2 (en) Location based asynchronous thread communications
KR101825653B1 (en) Method and apparatus for performing lost mode of communication terminal
US7890135B2 (en) System and method for protecting data based on geographic presence of a restricted device
TW200847696A (en) Apparatus and methods for locating, tracking and/or recovering a wireless communication device
US20100130178A1 (en) Enabling Remote And Anonymous Control Of Mobile And Portable Multimedia Devices For Security, Tracking And Recovery
TW201328395A (en) Apparatus for deleting data of mobile phone
CN102685106A (en) Safety verification method and equipment
CN105306204A (en) Security verification method, device and system
CN102131143A (en) Method and mobile terminal for sending distress message
JP2012525794A (en) Remote positioning and command of mobile devices
CN103581441B (en) Mobile terminal follows the trail of burglary-resisting system and method
Kuppusamy et al. A model for remote access and protection of smartphones using short message service
CN103118087B (en) A kind of mobile communication terminal and its data guard method, system
CN103561384A (en) Data protection method based on geographical location information of mobile intelligent terminal
CN105095708B (en) A kind of unlocking method and device of mobile terminal
CN106453056A (en) Mobile terminal and method for safely sharing picture
WO2018207123A1 (en) Tracking and locating lost, misplaced and stolen mobile devices using anti-theft technology
CN112804240B (en) Function control method, device, server, storage medium and product
CN103987022A (en) Position information checking method and system based on mobile terminal and mobile terminal
CN108040335A (en) A kind of Internet of Things communication number management method and system based on smart card
CN105554264A (en) function limiting method and system of mobile terminal
CN106331035A (en) Tracking prevention method and terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Patentee after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Patentee before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

CP01 Change in the name or title of a patent holder
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180119

CF01 Termination of patent right due to non-payment of annual fee