CN104780279A - Mobile phone and method used for supporting stolen tracking and locating - Google Patents

Mobile phone and method used for supporting stolen tracking and locating Download PDF

Info

Publication number
CN104780279A
CN104780279A CN201510228633.2A CN201510228633A CN104780279A CN 104780279 A CN104780279 A CN 104780279A CN 201510228633 A CN201510228633 A CN 201510228633A CN 104780279 A CN104780279 A CN 104780279A
Authority
CN
China
Prior art keywords
mobile phone
unit
stolen
shutdown
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510228633.2A
Other languages
Chinese (zh)
Inventor
马坤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Feixun Data Communication Technology Co Ltd
Original Assignee
Shanghai Feixun Data Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Feixun Data Communication Technology Co Ltd filed Critical Shanghai Feixun Data Communication Technology Co Ltd
Priority to CN201510228633.2A priority Critical patent/CN104780279A/en
Publication of CN104780279A publication Critical patent/CN104780279A/en
Pending legal-status Critical Current

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The invention relates to a mobile phone and a method used for supporting stolen tracking and locating. When a first cell used for supplying power for the mobile phone is taken out or false shutdown passwords are input repeatedly when a shutdown is requested, it is judged that the mobile phone is stolen, a fake shutdown unit arranged for the mobile phone is started, and the mobile phone is controlled to output a fake shutdown interface then enters a put out state; in addition, a stolen unit arranged for the mobile phone is started, when a screen of the mobile phone is in the put out state, the stolen unit is operated in a backstage continuously, location information and shooting information are obtained through a locating unit and a camera unit and then sent to an e-mail address pre-set by a user through a communication unit, and the mobile phone is convenient to find. When the first cell is taken out, a built-in second cell which is additionally arranged in the mobile phone can supply the power for the fake shutdown unit and the stolen unit. A person who steals the mobile phone cannot totally shut down power of the mobile phone, and the problem that after the mobile phone is stolen and the power supply is removed, the mobile phone cannot be found by the tracking and the locating is solved.

Description

A kind of support stolen seek track location mobile phone and method
Technical field
The present invention relates to and a kind ofly support stolen mobile phone and method of seeking track location, mainly solve mobile phone and cannot seek track locate the problem given for change after stolen, when being removed power supply.
Background technology
Along with science and technology and the improving constantly of human living standard, the intelligent terminals such as mobile phone are more and more universal, and the price of high-end handsets is more and more higher, but hand-set from stolen situation gets more and more at present, and stolen after be difficult to give for change, cause very large loss to user, be not only economic loss, the more important thing is the important information that lost and be kept in mobile phone.How can navigate to mobile phone location after hand-set from stolen, to help getting back mobile phone to become everybody problem of paying close attention to all very much.
The patent No. is " a kind of antitheft mobile phone supporting to seek track location " of 201320415485.1, comprising unblock detecting unit, mobile phone MCU, positioning unit, camera unit, alarm unit and communication unit; Described positioning unit, camera unit and communication unit are connected with mobile phone MCU respectively, and unlock detecting unit and be connected with the collection signal input of mobile phone MCU, the control signal output of mobile phone MCU is connected with alarm unit.The prior art can send chimes of doom deterrence burglar when mobile phone is stolen; After stolen mobile phone is misunderstood lock, positioning unit can be started and obtain mobile phone position information, start camera to take pictures simultaneously, and positional information and picture can be sent to the mailbox or other addresses that user provides in advance, facilitate the police and the timely getting back mobile phone of user; After detecting that burglar misreads lock, triggering timing unit starts timing, and after reaching Preset Time, automatic control power supply managing chip cuts off cellular phone power supplies.But the limitation of above-mentioned prior art is, only after stolen mobile phone is misunderstood lock, what just can start that positioning unit or camera carry out being correlated with seeks track positioning action.But battery of mobile phone often will take out or shutdown at once by the people stealing mobile phone at present after pilferage mobile phone, makes mobile phone work, is difficult to the enforcement of supporting again to seek track positioning action.
Summary of the invention
The object of the present invention is to provide a kind of support stolen seek track location mobile phone and a kind of hand-set from stolen seek track localization method, by setting up internal battery and arranging pseudo-shutdown unit, Shut Down Password unit and corresponding program thereof, make the people of pilferage mobile phone cannot closing hand phone power supply, with mainly solve mobile phone after stolen, be removed power supply cannot seek track and locate the problem given for change.
In order to achieve the above object, a technical scheme of the present invention be to provide a kind of support stolen seek track location mobile phone, it comprises:
Pseudo-shutdown unit, it starts when mobile phone is subject to the operation of abnormal shutdown, controls to be in OFF state after mobile phone screen exports a false shutdown interface;
Stolen unit, it starts when mobile phone is subject to the operation of abnormal shutdown, and continues at running background when mobile phone screen is in OFF state, sends seek track locating information to user.
Preferably, comprise further in described mobile phone:
CPU, by stolen unit controls, sends and seeks the order of track positioning starting;
Positioning unit, seeks the order of track positioning starting to obtain the positional information of mobile phone described in reception;
Camera unit, seeks the order of track positioning starting and carries out taking and obtaining photographing information described in reception;
Communication unit, receiving package seeks track locating information containing positional information and/or photographing information, and sends it to the email address that user arranges in advance.
Preferably, be provided with Shut Down Password unit in described mobile phone, it comprises further with lower component:
Input unit, when arranging Shut Down Password and when asking shutdown, receives the password of user's input;
Memory cell, stores the password that user inputs when arranging Shut Down Password;
Display unit, when arranging Shut Down Password and when asking shutdown, make on the screen of mobile phone, output display one requires the prompting page of input Shut Down Password, and shows the password of user's input;
Comparing unit, when asking shutdown, transferring the password inputted when the password stored in memory cell shuts down with request and comparing; Password comparison makes mobile phone normal shutdown time consistent; When password comparison is inconsistent, judge that mobile phone is subject to the operation of abnormal shutdown, and make described puppet shutdown unit and stolen unit starting.
Preferably, described input unit is when arranging Shut Down Password, and be used for receiving a threshold value of user's input further, it is corresponding that this threshold value and permission code error input the maximum of number of times;
The threshold value that user inputs, when arranging Shut Down Password, stores by described memory cell further;
Described comparing unit, when asking shutdown, is transferred the password inputted when the password stored in memory cell shuts down with request and is compared, and when password comparison is inconsistent, make the numerical value of an entry add one; The threshold value that described comparing unit transfers storage further to compare with the numerical value of entry, if the numerical value of entry exceedes threshold value, then judges that mobile phone is subject to the operation of abnormal shutdown, and makes described puppet shutdown unit and stolen unit starting.
Described display unit, when comparing unit judges that the numerical value of entry is no more than threshold value, exports the page that Shut Down Password is re-entered in a prompting further on the screen of mobile phone.
Preferably, described mobile phone is provided with removable first battery, and in mobile phone built-in and with the second battery of the first cell parallel; The CPU of mobile phone carries out detecting to the first battery the testing result whether acquisition first battery exist;
When CPU obtains the testing result of expression first battery existence, control the first battery and mobile phone is powered; When CPU obtains expression first battery non-existent testing result, judge that mobile phone is subject to the operation of abnormal shutdown, and make described puppet shutdown unit and stolen unit starting, and control the second battery described pseudo-unit and the stolen unit of shutting down is powered.
Another technical scheme of the present invention is to provide a kind of hand-set from stolen and seeks track localization method, when first battery of powering for mobile phone is removed, or ask shutdown time input error Shut Down Password time, the puppet shutdown unit starting that mobile phone is arranged, controls to be in OFF state after mobile phone screen exports a false shutdown interface; Further, the stolen unit starting that mobile phone is arranged, continues when mobile phone screen is in OFF state at running background, sends seek track locating information to user.
Preferably, control after described stolen unit starting to the CPU of mobile phone, the positioning unit being ordered about mobile phone setting by CPU starts the positional information obtaining mobile phone, and the camera unit startup ordering about mobile phone is carried out taking and obtaining photographing information; The communication unit arranged by mobile phone, seeks track locating information by what comprise positional information and/or photographing information, is sent to the email address that user is arranged in advance.
Preferably, when asking shutdown, the password that the input unit arranged by mobile phone receives user's input is sent to comparing unit; The correct Shut Down Password being transferred mobile phone EMS memory storage by comparing unit to compare with the password of input, makes mobile phone normal shutdown, make pseudo-unit and the stolen unit starting of shutting down when both are inconsistent when both are consistent.
Preferably, when asking shutdown and comparing unit judges that the correct Shut Down Password of password and the storage inputted is inconsistent, the numerical value of an entry is made to add one; The expression that this comparing unit transfers mobile phone EMS memory storage further allows code error to input the threshold value of number of times maximum, comes to compare with the numerical value of entry; If the numerical value of entry exceedes threshold value, then make described puppet shutdown unit and stolen unit starting.
Preferably, whether the CPU of mobile phone detects the first battery and exists; When the first battery is removed, CPU obtains the non-existent testing result of the first battery, makes described puppet shutdown unit and stolen unit starting, and the second battery controlling embedded in mobile phone is described puppet shutdown unit and stolen unit powers.
Stolen mobile phone and the method for seeking track location of support of the present invention, its advantage is: the present invention sets up pseudo-shutdown unit in mobile phone, Shut Down Password unit also adds the second built-in battery in the mobile phone of replaceable battery, after making hand-set from stolen, stealer cannot reach by the gimmick taking out battery or the shutdown of pressing power key the object making mobile phone shutdown, then when stealer takes out battery of mobile phone or repeatedly inputs Shut Down Password by mistake, trigger mobile phone puppet shutdown unit starting and extinguish to control mobile phone screen the off-mode that disguises oneself as, make stolen unit open positioning unit and image unit simultaneously, collect locating information and photographing information and be sent to the mailbox or other addresses that user arranges in advance, facilitate the police and the timely getting back mobile phone of user.The present invention makes the people of pilferage mobile phone cannot real closing hand phone power supply, solves mobile phone and cannot seek track locate the problem given for change after stolen, when being removed power supply.
Accompanying drawing explanation
Fig. 1 is the stolen a kind of schematic diagram implementing structure seeking the mobile phone of track location of support of the present invention;
Fig. 2 is the stolen schematic diagram seeking a kind of implementing procedure of track localization method of the present invention.
Embodiment
As shown in Figure 1 and Figure 2, provided by the inventionly a kind ofly support stolen seeking in the mobile phone of track location, be provided with pseudo-shutdown unit 1.Described puppet shutdown unit 1 and corresponding program thereof, can when abnormal shutdown operates, control after the display unit 2 of mobile phone exports a false shutdown interface (signal language, picture, dynamic effect etc. shown when such as transferring normal shutdown) on mobile phone screen 3, the screen 3 of mobile phone is extinguished, but mobile phone does not shut down simultaneously, and at least ensure that the stolen unit 7 in mobile phone starts and continues at running background.
Described stolen unit 7 and corresponding program thereof, can mobile phone CPU8(control unit be passed through) the positioning unit 9(started in mobile phone is such as based on GPS, the locating modules such as the Big Dipper) obtain the positional information of mobile phone site, and to start that the camera unit 10 of mobile phone carries out taking (be such as the appearance by front camera shooting stealer, or the relevant information in place near mobile phone is taken by rear camera), the positional information of acquisition and/or photographing information be sent to via communication unit 11 mailbox or other addresses that user sets in advance, facilitate the police and the timely getting back mobile phone of user.
In order to judge that abnormal shutdown operates, the present invention sets up Shut Down Password unit and corresponding program in mobile phone, when needs shut down, and can closing hand phone just require that user inputs correct mobile phone shutdown password; If input Shut Down Password by mistake or repeatedly input Shut Down Password by mistake, think that mobile phone is stolen, can by Shut Down Password unit send corresponding signal, control described puppet shutdown unit 1 and stolen unit 7 start.
Described Shut Down Password unit, when arranging Shut Down Password, and start respectively when being shut down by mode such as pressing power key, power-off button etc., it realizes further by with the cooperation of lower component:
Input unit 4, by the virtual key that represents on mobile phone screen 3 or by the physical button of mobile phone or other input modes, when arranging Shut Down Password or when shutting down, is used for receiving the password of user's input.
Memory cell 5, what user inputted when arranging Shut Down Password can the proper password of normal shutdown store; The concrete form of this password is not limit, and can be numeral, word, symbol or its combination, also can be a certain gesture operation, voice instruction, fingerprint recording etc.
Display unit 2, make on the screen 3 of mobile phone, when arranging Shut Down Password or when shutting down, output display one the prompting page, this prompting page such as can comprise the cancel button, dummy keyboard etc. of the signal language of requirement input Shut Down Password, Password Input frame, cancellation power-off operation.This display unit 2 also on screen 3 with expressly or the password that inputs of dark text form display user.
Comparing unit 6, transfers the password inputted when the password stored in memory cell 5 shuts down with request and compares; Password comparison makes mobile phone normal shutdown time consistent; When password comparison is inconsistent, start pseudo-shutdown unit 1 and stolen unit 2.
Or, in another example, after the number of times that can also be set to input by mistake when shutting down password further reaches the threshold value preset, just start pseudo-shutdown unit 1 and stolen unit 2.For this reason, a threshold value can be inputted when arranging Shut Down Password by input unit 4 and represent the maximum allowing code error input number of times, and by this threshold value stored in memory cell 5.The password that comparing unit 6 inputs when the proper password of storage and user being shut down compare and inconsistent both finding time, on screen 3, the page re-entering password is pointed out by display unit 2, and make the numerical value of an entry add one, to represent the increase of code error input number of times simultaneously.The threshold value that comparing unit 6 transfers storage further to compare with the numerical value of entry: if the numerical value of entry exceedes threshold value, represent that the number of times of actual input error password is too much, exceed the maximum of permission, thus start pseudo-shutdown unit 1 and stolen unit 7.The numerical example of described entry as reset when mobile phone is started shooting at every turn or in the time of other settings.
Except the operation of extinguishing except making screen 3, pseudo-shutdown unit 1 can also carry out the operation of other necessity to the situation preventing mobile phone stealer discovery mobile phone backstage from running stolen unit 7, such as pseudo-shutdown unit 1 also makes mobile phone speaker close while extinguishing screen 3, prevents mobile phone from after sending shutdown music, sending other sound again; Or pseudo-shutdown unit 1 starts and after making screen 3 extinguish, also makes any operation (such as by physical button, virtual key, gesture operation etc.) that mobile phone screen 3 originally can be made again to light from black state no longer applicable; Or stolen unit 7 controls camera unit 10 when taking, pseudo-shutdown unit 1 can control photoflash lamp and not work and shutter sound is quiet, etc.
Certainly, the scene that this puppet shutdown unit 1 can be undertaken by cellphone subscriber or cell phone manufacturer etc. or long-range activation manipulation are closed, and this activation manipulation can be clicked by such as specific button or any form such as key combination, specific gesture operation, specific voice instruction, fingerprint recognition, firmware renewal realizes.After pseudo-shutdown unit 1 is closed, mobile phone screen 3 can be lighted again, and other are all recovered by the function that puppet shutdown unit 1 is closed.
Another kind of can assert the situation that mobile phone is stolen, be that the mobile phone of replaceable battery has been pulled out the situation of battery under abnormal shutdown state (normal shutdown be by inputting correct Shut Down Password, pressing closing key/power key realizes).To this, the present invention was originally provided with on the basis of first battery 12 at the mobile phone of replaceable battery, built-in second battery 13.Such as make the setting position of the second battery 13 comparatively hidden, after opening cell phone rear cover or opening battery cabin cap, directly can not find this second battery 13, this second battery 13 can not manually be removed easily.
The first described battery 12 and the second battery 13 belong to parallel connection, and the second battery 13 can be charged by the first battery 12 or charger for mobile phone.In first battery 12 and the simultaneous situation of the second battery 13, mobile phone uses the first battery 12 to power, and the second battery 13 is not powered.When mobile phone CPU8 cannot detect the first battery 12, that is, when the first battery 12 pulled out make mobile phone abnormal shutdown when, just can be switched to second battery 13 power state.Keep, to puppet shutdown unit 1, the program of stolen unit 7 and the power supply of correlation module (mobile phone CPU8, positioning unit 9, camera unit 10, communication unit 11 etc.), representing with P in Fig. 1 by the second battery 13.And for each mobile module of being closed by puppet shutdown unit 1, the second battery 13 can not powered.Such as, the second battery 13 just can not be powered to mobile phone screen 3, even if or power supply also make mobile phone screen 3 be in the OFF state of blank screen.
In sum, stolen mobile phone and the method for seeking track location of support of the present invention, foundation has pseudo-shutdown unit, Shut Down Password unit also adds the second built-in battery in the mobile phone of replaceable battery, after making hand-set from stolen, stealer cannot reach by the gimmick taking out battery or the shutdown of pressing power key the object making mobile phone shutdown, then when stealer takes out battery of mobile phone or repeatedly inputs Shut Down Password by mistake, trigger mobile phone puppet shutdown unit starting and extinguish to control mobile phone screen the off-mode that disguises oneself as, make stolen unit open positioning unit and image unit simultaneously, collect locating information and photographing information and be sent to the mailbox or other addresses that user arranges in advance, facilitate the police and the timely getting back mobile phone of user.
Although content of the present invention has done detailed introduction by above preferred embodiment, will be appreciated that above-mentioned description should not be considered to limitation of the present invention.After those skilled in the art have read foregoing, for multiple amendment of the present invention and substitute will be all apparent.Therefore, protection scope of the present invention should be limited to the appended claims.

Claims (10)

1. support the stolen mobile phone seeking track location, it is characterized in that, comprise:
Pseudo-shutdown unit, it starts when mobile phone is subject to the operation of abnormal shutdown, controls to be in OFF state after mobile phone screen exports a false shutdown interface;
Stolen unit, it starts when mobile phone is subject to the operation of abnormal shutdown, and continues at running background when mobile phone screen is in OFF state, sends seek track locating information to user.
2. support the stolen mobile phone seeking track location as claimed in claim 1, it is characterized in that, comprise further in described mobile phone:
CPU, by stolen unit controls, sends and seeks the order of track positioning starting;
Positioning unit, seeks the order of track positioning starting to obtain the positional information of mobile phone described in reception;
Camera unit, seeks the order of track positioning starting and carries out taking and obtaining photographing information described in reception;
Communication unit, receiving package seeks track locating information containing positional information and/or photographing information, and sends it to the email address that user arranges in advance.
3. support the stolen mobile phone seeking track location as claimed in claim 1 or 2, it is characterized in that,
Be provided with Shut Down Password unit in described mobile phone, it comprises further with lower component:
Input unit, when arranging Shut Down Password and when asking shutdown, receives the password of user's input;
Memory cell, stores the password that user inputs when arranging Shut Down Password;
Display unit, when arranging Shut Down Password and when asking shutdown, make on the screen of mobile phone, output display one requires the prompting page of input Shut Down Password, and shows the password of user's input;
Comparing unit, when asking shutdown, transferring the password inputted when the password stored in memory cell shuts down with request and comparing; Password comparison makes mobile phone normal shutdown time consistent; When password comparison is inconsistent, judge that mobile phone is subject to the operation of abnormal shutdown, and make described puppet shutdown unit and stolen unit starting.
4. support the stolen mobile phone seeking track location as claimed in claim 3, it is characterized in that,
Described input unit is when arranging Shut Down Password, and be used for receiving a threshold value of user's input further, it is corresponding that this threshold value and permission code error input the maximum of number of times;
The threshold value that user inputs, when arranging Shut Down Password, stores by described memory cell further;
Described comparing unit, when asking shutdown, is transferred the password inputted when the password stored in memory cell shuts down with request and is compared, and when password comparison is inconsistent, make the numerical value of an entry add one; The threshold value that described comparing unit transfers storage further to compare with the numerical value of entry, if the numerical value of entry exceedes threshold value, then judges that mobile phone is subject to the operation of abnormal shutdown, and makes described puppet shutdown unit and stolen unit starting;
Described display unit, when comparing unit judges that the numerical value of entry is no more than threshold value, exports the page that Shut Down Password is re-entered in a prompting further on the screen of mobile phone.
5., as supported the stolen mobile phone seeking track location in claim 1 ~ 4 as described in any one, it is characterized in that,
Described mobile phone is provided with removable first battery, and in mobile phone built-in and with the second battery of the first cell parallel; The CPU of mobile phone carries out detecting to the first battery the testing result whether acquisition first battery exist;
When CPU obtains the testing result of expression first battery existence, control the first battery and mobile phone is powered; When CPU obtains expression first battery non-existent testing result, judge that mobile phone is subject to the operation of abnormal shutdown, and make described puppet shutdown unit and stolen unit starting, and control the second battery described pseudo-unit and the stolen unit of shutting down is powered.
6. hand-set from stolen seeks a track localization method, it is characterized in that,
When first battery of powering for mobile phone is removed, or during the Shut Down Password of the input error when asking shutdown, puppet that mobile phone is arranged is shut down unit starting, controls to be in OFF state after mobile phone screen exports a false shutdown interface; Further, the stolen unit starting that mobile phone is arranged, continues when mobile phone screen is in OFF state at running background, sends seek track locating information to user.
7. hand-set from stolen as claimed in claim 6 seeks track localization method, it is characterized in that,
Control the CPU of mobile phone after described stolen unit starting, the positioning unit being ordered about mobile phone setting by CPU starts the positional information obtaining mobile phone, and the camera unit startup ordering about mobile phone is carried out taking and obtaining photographing information; The communication unit arranged by mobile phone, seeks track locating information by what comprise positional information and/or photographing information, is sent to the email address that user is arranged in advance.
8. hand-set from stolen as claimed in claim 6 seeks track localization method, it is characterized in that,
When asking shutdown, the password that the input unit arranged by mobile phone receives user's input is sent to comparing unit; The correct Shut Down Password being transferred mobile phone EMS memory storage by comparing unit to compare with the password of input, makes mobile phone normal shutdown, make pseudo-unit and the stolen unit starting of shutting down when both are inconsistent when both are consistent.
9. hand-set from stolen as claimed in claim 7 seeks track localization method, it is characterized in that,
When asking shutdown and comparing unit judges that the correct Shut Down Password of password and the storage inputted is inconsistent, the numerical value of an entry is made to add one; The expression that this comparing unit transfers mobile phone EMS memory storage further allows code error to input the threshold value of number of times maximum, comes to compare with the numerical value of entry; If the numerical value of entry exceedes threshold value, then make described puppet shutdown unit and stolen unit starting.
10. hand-set from stolen as claimed in claim 6 seeks track localization method, it is characterized in that,
Whether the CPU of mobile phone detects the first battery exists; When the first battery is removed, CPU obtains the non-existent testing result of the first battery, makes described puppet shutdown unit and stolen unit starting, and the second battery controlling embedded in mobile phone is described puppet shutdown unit and stolen unit powers.
CN201510228633.2A 2015-05-07 2015-05-07 Mobile phone and method used for supporting stolen tracking and locating Pending CN104780279A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510228633.2A CN104780279A (en) 2015-05-07 2015-05-07 Mobile phone and method used for supporting stolen tracking and locating

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510228633.2A CN104780279A (en) 2015-05-07 2015-05-07 Mobile phone and method used for supporting stolen tracking and locating

Publications (1)

Publication Number Publication Date
CN104780279A true CN104780279A (en) 2015-07-15

Family

ID=53621507

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510228633.2A Pending CN104780279A (en) 2015-05-07 2015-05-07 Mobile phone and method used for supporting stolen tracking and locating

Country Status (1)

Country Link
CN (1) CN104780279A (en)

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105120102A (en) * 2015-09-06 2015-12-02 郓小明 Mobile terminal and intelligent invisible locating anti-theft device used for same
CN105187640A (en) * 2015-08-21 2015-12-23 上海斐讯数据通信技术有限公司 Anti-theft method and system of mobile terminal
CN105262866A (en) * 2015-11-13 2016-01-20 上海斐讯数据通信技术有限公司 Anti-theft method, system and anti-theft handset
CN105391865A (en) * 2015-11-27 2016-03-09 上海斐讯数据通信技术有限公司 Method and system for starting anti-theft function of mobile terminal via shutdown mode
CN106027789A (en) * 2016-06-28 2016-10-12 上海哲奥实业有限公司 Anti-theft cellphone and anti-theft method for cellphone
CN106412331A (en) * 2016-11-17 2017-02-15 珠海市魅族科技有限公司 Data backup method and apparatus
CN106570385A (en) * 2016-10-28 2017-04-19 宇龙计算机通信科技(深圳)有限公司 Terminal control method and apparatus
CN106599642A (en) * 2016-12-19 2017-04-26 广东小天才科技有限公司 Information leakage prevention method and electronic terminal
CN106603814A (en) * 2016-11-17 2017-04-26 珠海格力电器股份有限公司 Method and apparatus for operating false shutdown of mobile terminal
CN107135307A (en) * 2017-04-25 2017-09-05 长治市星锐科技有限公司 The information feedback method that a kind of mobile phone surprisingly shuts down
CN107197455A (en) * 2017-05-10 2017-09-22 珠海市魅族科技有限公司 terminal control method, device, mobile terminal and storage medium
CN107370822A (en) * 2017-08-10 2017-11-21 上海青橙实业有限公司 The anti-theft processing method and mobile terminal of mobile terminal
CN107707754A (en) * 2017-09-29 2018-02-16 河南职业技术学院 A kind of intelligent terminal recovers method and apparatus
WO2018207123A1 (en) * 2017-05-10 2018-11-15 Agarwal Subham Tracking and locating lost, misplaced and stolen mobile devices using anti-theft technology
CN108875326A (en) * 2018-05-10 2018-11-23 广州大学 A kind of mobile device power supply method for closing and mobile device
WO2019041356A1 (en) * 2017-09-04 2019-03-07 深圳传音通讯有限公司 Method, apparatus, and computer readable storage medium for handling power loss of terminal
CN109714465A (en) * 2019-03-18 2019-05-03 深圳市道格恒通科技有限公司 A kind of intelligent mobile phone anti-theft method and system
CN111182128A (en) * 2018-11-12 2020-05-19 奇酷互联网络科技(深圳)有限公司 Method for searching target equipment and mobile terminal
CN111698368A (en) * 2020-06-12 2020-09-22 北京字节跳动网络技术有限公司 Terminal control method and device, terminal and storage medium
CN114205732A (en) * 2020-08-31 2022-03-18 南宁富联富桂精密工业有限公司 Method for retrieving mobile phone, electronic device and computer readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006001684A1 (en) * 2004-06-29 2006-01-05 Sk Telecom. Co., Ltd. Disguised power-off method for a mobile communication terminal
CN101778353A (en) * 2010-02-20 2010-07-14 华为终端有限公司 Automatic alarm method and terminal
CN103458124A (en) * 2013-09-02 2013-12-18 小米科技有限责任公司 Shutdown processing method, device and terminal equipment for terminal
CN103973892A (en) * 2014-05-12 2014-08-06 深圳市威富多媒体有限公司 Method and device for starting and stopping mobile terminal based on voice and face recognition
CN104143059A (en) * 2014-07-31 2014-11-12 可牛网络技术(北京)有限公司 Method and system for improving safety of mobile terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006001684A1 (en) * 2004-06-29 2006-01-05 Sk Telecom. Co., Ltd. Disguised power-off method for a mobile communication terminal
CN101778353A (en) * 2010-02-20 2010-07-14 华为终端有限公司 Automatic alarm method and terminal
CN103458124A (en) * 2013-09-02 2013-12-18 小米科技有限责任公司 Shutdown processing method, device and terminal equipment for terminal
CN103973892A (en) * 2014-05-12 2014-08-06 深圳市威富多媒体有限公司 Method and device for starting and stopping mobile terminal based on voice and face recognition
CN104143059A (en) * 2014-07-31 2014-11-12 可牛网络技术(北京)有限公司 Method and system for improving safety of mobile terminal

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105187640A (en) * 2015-08-21 2015-12-23 上海斐讯数据通信技术有限公司 Anti-theft method and system of mobile terminal
CN105120102B (en) * 2015-09-06 2018-07-20 郓小明 Intelligent invisible positioning anti-theft device and mobile terminal for mobile terminal
CN105120102A (en) * 2015-09-06 2015-12-02 郓小明 Mobile terminal and intelligent invisible locating anti-theft device used for same
CN105262866A (en) * 2015-11-13 2016-01-20 上海斐讯数据通信技术有限公司 Anti-theft method, system and anti-theft handset
CN105391865A (en) * 2015-11-27 2016-03-09 上海斐讯数据通信技术有限公司 Method and system for starting anti-theft function of mobile terminal via shutdown mode
CN106027789A (en) * 2016-06-28 2016-10-12 上海哲奥实业有限公司 Anti-theft cellphone and anti-theft method for cellphone
CN106570385A (en) * 2016-10-28 2017-04-19 宇龙计算机通信科技(深圳)有限公司 Terminal control method and apparatus
CN106412331A (en) * 2016-11-17 2017-02-15 珠海市魅族科技有限公司 Data backup method and apparatus
CN106603814A (en) * 2016-11-17 2017-04-26 珠海格力电器股份有限公司 Method and apparatus for operating false shutdown of mobile terminal
CN106599642A (en) * 2016-12-19 2017-04-26 广东小天才科技有限公司 Information leakage prevention method and electronic terminal
CN107135307A (en) * 2017-04-25 2017-09-05 长治市星锐科技有限公司 The information feedback method that a kind of mobile phone surprisingly shuts down
CN107197455A (en) * 2017-05-10 2017-09-22 珠海市魅族科技有限公司 terminal control method, device, mobile terminal and storage medium
WO2018207123A1 (en) * 2017-05-10 2018-11-15 Agarwal Subham Tracking and locating lost, misplaced and stolen mobile devices using anti-theft technology
CN107370822A (en) * 2017-08-10 2017-11-21 上海青橙实业有限公司 The anti-theft processing method and mobile terminal of mobile terminal
WO2019041356A1 (en) * 2017-09-04 2019-03-07 深圳传音通讯有限公司 Method, apparatus, and computer readable storage medium for handling power loss of terminal
CN107707754A (en) * 2017-09-29 2018-02-16 河南职业技术学院 A kind of intelligent terminal recovers method and apparatus
CN108875326A (en) * 2018-05-10 2018-11-23 广州大学 A kind of mobile device power supply method for closing and mobile device
CN111182128A (en) * 2018-11-12 2020-05-19 奇酷互联网络科技(深圳)有限公司 Method for searching target equipment and mobile terminal
CN109714465A (en) * 2019-03-18 2019-05-03 深圳市道格恒通科技有限公司 A kind of intelligent mobile phone anti-theft method and system
CN111698368A (en) * 2020-06-12 2020-09-22 北京字节跳动网络技术有限公司 Terminal control method and device, terminal and storage medium
CN114205732A (en) * 2020-08-31 2022-03-18 南宁富联富桂精密工业有限公司 Method for retrieving mobile phone, electronic device and computer readable storage medium

Similar Documents

Publication Publication Date Title
CN104780279A (en) Mobile phone and method used for supporting stolen tracking and locating
CN110336720B (en) Equipment control method and equipment
CN110807178B (en) Vehicle authorization management method and device, terminal and server
CN103763391B (en) The anti-lost method for realizing the anti-lost function of mobile device based on Context awareness
US10123196B2 (en) Method and device for alarm triggering
US20150208244A1 (en) Terminal device
CN101046913B (en) Multi-media radio security device
US20180157817A1 (en) Unlocking method and apparatus, and storage medium
CN102638628A (en) Mobile phone anti-theft system and method based on camera and GPS (Global Position System) of mobile phone
WO2013107395A1 (en) Mobile phone security protection method and device
CN111373380A (en) Data recovery method for terminal to restore factory settings and terminal
CN106470269A (en) A kind of method and apparatus of antitheft mobile phone
JP4284309B2 (en) Emergency operation execution method and electronic device
CN106027789A (en) Anti-theft cellphone and anti-theft method for cellphone
CN106778175A (en) A kind of interface locking means, device and terminal device
CN106878554B (en) A kind of theft preventing method of mobile terminal, device and mobile terminal
CN104639762A (en) Method and device of mobile phone authentication and alarm
US20160349779A1 (en) Method and device for controlling smart home power supply
CN105843708A (en) Data processing method and device
CN110341648A (en) Car door unlocking method, device and storage medium
CN110620847B (en) Anti-theft method of intelligent terminal and intelligent terminal
CN108551550A (en) Image control, the filming control method of camera applications, device and electronic equipment
WO2017185658A1 (en) Security protection method and apparatus, mobile terminal, and electronic device
CN105430639B (en) Information processing method and device
CN108549804A (en) Mode switching method and device, computer readable storage medium, terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination