CN105282337A - Intelligent mobile phone encryption method - Google Patents
Intelligent mobile phone encryption method Download PDFInfo
- Publication number
- CN105282337A CN105282337A CN201510730572.XA CN201510730572A CN105282337A CN 105282337 A CN105282337 A CN 105282337A CN 201510730572 A CN201510730572 A CN 201510730572A CN 105282337 A CN105282337 A CN 105282337A
- Authority
- CN
- China
- Prior art keywords
- mobile phone
- password
- groups
- shut down
- interface
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Telephone Function (AREA)
Abstract
The invention discloses an intelligent mobile phone encryption method. A mobile phone battery and a mobile phone body are not detachable. A verification module is provided for storing four groups of shutdown passwords, a predetermined sequence of the four groups of shutdown passwords, and an emergency contact number. When a power key is touched continuously for a certain time, the verification module pops up a password input interface on a mobile phone interface; if four groups of current passwords are not consistent with the four groups of shutdown passwords, and/or a current sequence is not consistent with the predetermined sequence, a mobile phone is kept in a started-up state and sends a short message and GPS positioning data to the emergency contact number, the mobile phone is kept in a power saving mode, and sends GPS positioning data to the emergency contact number every 20 to 30 minutes. According to the intelligent mobile phone encryption method, the mobile phone cannot be shut down if the passwords are input incorrectly or in an incorrect sequence, the GPS positioning data is sent to the emergency contact number, and the GPS positioning data is continuously sent to the emergency contact number at a certain interval, therefore the emergency contact person can know the whereabouts of the mobile phone.
Description
Technical field
The present invention relates to a kind of smart mobile phone encryption method, particularly relate to a kind of mobile phone that prevents by the encryption method of maliciously shutting down, be specially adapted to the situation of hand-set from stolen.
Background technology
After hand-set from stolen, mobile phone shutdown is directly changed hands to peddle away by thief again, and after shutdown, owner just again cannot find mobile phone.Current existing smart mobile phone encryption technology is all for preventing other people from tackling information on mobile phone, and then prevents the property safety of the user endangering mobile phone.The problem that present encryption technology occurs when but can not solve aforementioned hand-set from stolen.
Summary of the invention
For above-mentioned technical problem, the present invention has designed and developed a kind of mobile phone that prevents and has been shut down in situation without permission, to improve the smart mobile phone encryption method of the fail safe of mobile phone.
Technical scheme provided by the invention is:
A kind of smart mobile phone encryption method, battery of mobile phone and mobile phone body are unremovably, and method comprises:
One authentication module is provided, this authentication module is installed and is run on mobile phone, and the emergency interconnection number that the predefined procedure and for storing four groups of Shut Down Password and the four groups of Shut Down Password preset by user is preset by user, wherein one group of Shut Down Password is all made up of numeral, another group Shut Down Password is all made up of letter, one group of Shut Down Password is all made up of Chinese character again, then one group of Shut Down Password is all made up of symbol;
When power key is continued to touch certain hour, authentication module ejects an interface for password input on mobile phone interface; When keying in four groups of current passwords successively to this interface for password input, as current order is consistent with predefined procedure, and four groups of current passwords are consistent with four groups of Shut Down Password, then shut down; As four groups of current passwords and four groups of Shut Down Password inconsistent, and/or current order and predefined procedure inconsistent, then keep open state, start GPS locating module, and transfer to emergency interconnection phone to emergency interconnection number, send note to this emergency interconnection number simultaneously, GPS locator data is sent to this emergency interconnection number, mobile phone is kept to be in battery saving mode afterwards, in a power-save mode, a mobile phone holding module, SMS module and GPS locating module are in running status, and send GPS locator data every 20 ~ 30 points of clockwise emergency interconnection numbers;
When the direct icon knocking authentication module on mobile phone interface, this authentication module ejects interface for password input on mobile phone interface, when keying in four groups of current passwords successively to this interface for password input, as current order is consistent with predefined procedure, and four groups of current passwords are consistent with four groups of Shut Down Password, then enter to the control inerface of this authentication module, this control inerface has the button of this authentication module out of service.
Preferably, encryption method for handsets in, send GPS locator datas every 30 points of clockwise emergency interconnection numbers.
Preferably, encryption method for handsets in, when power key is continued 5 second of shake-up, authentication module ejects interface for password input on mobile phone interface.
Preferably, encryption method for handsets in, interface for password input is divided into four Password Input districts, one of them Password Input district is all made up of numerical key, another Password Input district is all made up of letter key, and for keying in the password be made up of letter, another Password Input district is all made up of letter key, for inputting the password be made up of Chinese character, another Password Input district is all made up of symbol.
Preferably, encryption method for handsets in, four Password Input districts arrange from top to bottom with the order inconsistent with predefined procedure.
In smart mobile phone encryption method of the present invention, first battery of mobile phone and mobile phone body is made to be unremovably, there is provided again an authentication module, this authentication module is installed and is run on mobile phone, stores the predefined procedure of four groups of Shut Down Password and the four groups of Shut Down Password preset by user.When hand-set from stolen, thief's very first time can by mobile phone shutdown, prevent mobile phone found, then now, authentication module ejects interface for password input on mobile phone interface, Password Input is incorrect or input sequence is incorrect, all can not realize shutdown, and then GPS locating module starts, emergency interconnection phone is transferred to emergency interconnection number, send note to emergency interconnection number simultaneously, GPS locator data is sent to emergency interconnection number, also continue to send GPS locator data at interval of certain hour afterwards, thus enable the emergency interconnection personnel of user know the whereabouts of mobile phone, can take to report to the police or the measure such as searching mobile phone in person.Mobile phone is in power down mode always afterwards, then ensure that mobile phone is standby as far as possible for a long time.Only have when four groups of Shut Down Password are transfused to according to predefined procedure, just may realize shutdown, this satisfies the needs of the daily normal use mobile phone of user.When direct on mobile phone interface knock the icon of this authentication module time, also need to key in four groups of correct Shut Down Password with predefined procedure, just can stop the work of authentication module.
Embodiment
The present invention is described in further detail below, can implement according to this with reference to specification word to make those skilled in the art.
The invention provides a kind of smart mobile phone encryption method, battery of mobile phone and mobile phone body are unremovably, method comprises: provide an authentication module, this authentication module is installed and is run on mobile phone, and the emergency interconnection number that the predefined procedure and for storing four groups of Shut Down Password and the four groups of Shut Down Password preset by user is preset by user, wherein one group of Shut Down Password is all made up of numeral, another group Shut Down Password is all made up of letter, one group of Shut Down Password is all made up of Chinese character again, then one group of Shut Down Password is all made up of symbol; When power key is continued to touch certain hour, authentication module ejects an interface for password input on mobile phone interface; When keying in four groups of current passwords successively to this interface for password input, as current order is consistent with predefined procedure, and four groups of current passwords are consistent with four groups of Shut Down Password, then shut down; As four groups of current passwords and four groups of Shut Down Password inconsistent, and/or current order and predefined procedure inconsistent, then keep open state, start GPS locating module, and transfer to emergency interconnection phone to emergency interconnection number, send note to this emergency interconnection number simultaneously, GPS locator data is sent to this emergency interconnection number, mobile phone is kept to be in battery saving mode afterwards, in a power-save mode, a mobile phone holding module, SMS module and GPS locating module are in running status, and send GPS locator data every 20 ~ 30 points of clockwise emergency interconnection numbers.
Work as hand-set from stolen, can attempt mobile phone shutdown in thief's very first time.When attempting shutdown, when power key is continued to touch a period of time, authentication module can eject an interface for password input on mobile phone interface.When four groups of passwords or key entry order incorrect, all can cause shutting down.And GPS locating module can be activated, GPS locator data is sent to emergency interconnection number by with note form, emergency contact is made to know the current location of mobile phone, as being now by owner (i.e. user) false touch power key, then emergency contact can be conversed with owner, be confirmed whether false touch, if not being that owner and emergency contact are conversed, then emergency contact also can recognize hand-set from stolen in time.Mobile phone is kept in a power-save mode afterwards, an i.e. holding module, SMS module and GPS locating module, the GPS locator data upgraded is sent every 20 ~ 30 points of clockwise emergency interconnection numbers, make emergency contact understand the position of mobile phone at any time, emergency contact can determine whether report to the police or continue searching mobile phone.Battery saving mode can the stand-by time of extending cell phone as much as possible.
Have employed four groups of Shut Down Password in the present invention, be respectively and be all made up of numeral, be all made up of letter, be all made up of Chinese character, and be all made up of symbol, user can the concrete Shut Down Password of sets itself.Further, the present invention can also set the predefined procedure of four groups of Shut Down Password, to reduce the possibility that password is cracked, improves the fail safe of mobile phone.
Only have when four groups of Shut Down Password are transfused to according to predefined procedure, just may realize shutdown, this satisfies the needs of the daily normal use mobile phone of user.
When the direct icon knocking authentication module on mobile phone interface, this authentication module ejects interface for password input on mobile phone interface, when keying in four groups of current passwords successively to this interface for password input, as current order is consistent with predefined procedure, and four groups of current passwords are consistent with four groups of Shut Down Password, then enter to the control inerface of this authentication module, this control inerface has the button of this authentication module out of service.Based on this setting, owner can temporarily stop using this authentication module, or the operations such as password of modifying.
Encryption method for handsets in, send GPS locator datas every 30 points of clockwise emergency interconnection numbers.
Encryption method for handsets in, when power key is continued 5 second of shake-up, authentication module ejects interface for password input on mobile phone interface.
Encryption method for handsets in, interface for password input is divided into four Password Input districts, one of them Password Input district is all made up of numerical key, another Password Input district is all made up of letter key, for keying in the password be made up of letter, another Password Input district is all made up of letter key, and for inputting the password be made up of Chinese character, another Password Input district is all made up of symbol.In order to improve the fail safe of mobile phone further, prevent cell phone password to be cracked, interface for password input is divided into four Password Input districts, and does not adopt the conventional input keyboard used in prior art.
Encryption method for handsets in, four Password Input districts arrange from top to bottom with the order inconsistent with predefined procedure.Such as the predefined procedure of four groups of Shut Down Password is numeral, letter, Chinese character, symbol, the arrangement mode in four Password Input districts may be digital block, sign field, alphabetical district, Chinese character district from top to bottom.This also can reduce the possibility that mobile phone is attacked, is cracked.
Although embodiment of the present invention are open as above, but it is not restricted to listed in specification and execution mode utilization, it can be applied to various applicable the field of the invention completely, for those skilled in the art, can easily realize other amendment, therefore do not deviating under the universal that claim and equivalency range limit, the present invention is not limited to specific details.
Claims (5)
1. a smart mobile phone encryption method, is characterized in that, battery of mobile phone and mobile phone body are unremovably, and method comprises:
One authentication module is provided, this authentication module is installed and is run on mobile phone, and the emergency interconnection number that the predefined procedure and for storing four groups of Shut Down Password and the four groups of Shut Down Password preset by user is preset by user, wherein one group of Shut Down Password is all made up of numeral, another group Shut Down Password is all made up of letter, one group of Shut Down Password is all made up of Chinese character again, then one group of Shut Down Password is all made up of symbol;
When power key is continued to touch certain hour, authentication module ejects an interface for password input on mobile phone interface; When keying in four groups of current passwords successively to this interface for password input, as current order is consistent with predefined procedure, and four groups of current passwords are consistent with four groups of Shut Down Password, then shut down; As four groups of current passwords and four groups of Shut Down Password inconsistent, and/or current order and predefined procedure inconsistent, then keep open state, start GPS locating module, and transfer to emergency interconnection phone to emergency interconnection number, send note to this emergency interconnection number simultaneously, GPS locator data is sent to this emergency interconnection number, mobile phone is kept to be in battery saving mode afterwards, in a power-save mode, a mobile phone holding module, SMS module and GPS locating module are in running status, and send GPS locator data every 20 ~ 30 points of clockwise emergency interconnection numbers;
When the direct icon knocking authentication module on mobile phone interface, this authentication module ejects interface for password input on mobile phone interface, when keying in four groups of current passwords successively to this interface for password input, as current order is consistent with predefined procedure, and four groups of current passwords are consistent with four groups of Shut Down Password, then enter to the control inerface of this authentication module, this control inerface has the button of this authentication module out of service.
2. smart mobile phone encryption method as claimed in claim 1, is characterized in that, sends GPS locator data every 30 points of clockwise emergency interconnection numbers.
3. smart mobile phone encryption method as claimed in claim 1, is characterized in that, when power key is continued 5 second of shake-up, authentication module ejects interface for password input on mobile phone interface.
4. smart mobile phone encryption method as claimed in claim 1, it is characterized in that, interface for password input is divided into four Password Input districts, one of them Password Input district is all made up of numerical key, another Password Input district is all made up of letter key, and for keying in the password be made up of letter, another Password Input district is all made up of letter key, for inputting the password be made up of Chinese character, another Password Input district is all made up of symbol.
5. smart mobile phone encryption method as claimed in claim 4, it is characterized in that, four Password Input districts arrange from top to bottom with the order inconsistent with predefined procedure.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510730572.XA CN105282337A (en) | 2015-10-31 | 2015-10-31 | Intelligent mobile phone encryption method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510730572.XA CN105282337A (en) | 2015-10-31 | 2015-10-31 | Intelligent mobile phone encryption method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105282337A true CN105282337A (en) | 2016-01-27 |
Family
ID=55150628
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510730572.XA Pending CN105282337A (en) | 2015-10-31 | 2015-10-31 | Intelligent mobile phone encryption method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105282337A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105785401A (en) * | 2016-02-25 | 2016-07-20 | 中国人民解放军海军医学研究所 | Big dipper lifesaving device and application method thereof |
CN106027789A (en) * | 2016-06-28 | 2016-10-12 | 上海哲奥实业有限公司 | Anti-theft cellphone and anti-theft method for cellphone |
WO2017128422A1 (en) * | 2016-01-31 | 2017-08-03 | 黄冠明 | Method for powering off mobile phone, and mobile phone |
CN108875326A (en) * | 2018-05-10 | 2018-11-23 | 广州大学 | A kind of mobile device power supply method for closing and mobile device |
CN109362029A (en) * | 2018-10-29 | 2019-02-19 | 重庆邮电大学 | ESIM card hand machine long-range positioning system (Loran) and method based on the passive dual trigger mechanism of master |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101330681A (en) * | 2008-06-24 | 2008-12-24 | 上海华勤通讯技术有限公司 | Mobile phone anti-theft method and anti-theft mobile phone thereof |
CN101626422A (en) * | 2009-08-10 | 2010-01-13 | 上海闻泰电子科技有限公司 | Anti-theft method of mobile phone |
US20100009658A1 (en) * | 2008-07-08 | 2010-01-14 | Hong Fu Jin Precision Industry (Shenzhen) Co., Ltd. | Method for identity authentication by mobile terminal |
CN102253803A (en) * | 2011-07-06 | 2011-11-23 | 汉王科技股份有限公司 | Unlocking method and device for touch screen |
CN104010088A (en) * | 2014-06-16 | 2014-08-27 | 中国地质大学(武汉) | Smart-phone anti-theft method and system |
-
2015
- 2015-10-31 CN CN201510730572.XA patent/CN105282337A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101330681A (en) * | 2008-06-24 | 2008-12-24 | 上海华勤通讯技术有限公司 | Mobile phone anti-theft method and anti-theft mobile phone thereof |
US20100009658A1 (en) * | 2008-07-08 | 2010-01-14 | Hong Fu Jin Precision Industry (Shenzhen) Co., Ltd. | Method for identity authentication by mobile terminal |
CN101626422A (en) * | 2009-08-10 | 2010-01-13 | 上海闻泰电子科技有限公司 | Anti-theft method of mobile phone |
CN102253803A (en) * | 2011-07-06 | 2011-11-23 | 汉王科技股份有限公司 | Unlocking method and device for touch screen |
CN104010088A (en) * | 2014-06-16 | 2014-08-27 | 中国地质大学(武汉) | Smart-phone anti-theft method and system |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017128422A1 (en) * | 2016-01-31 | 2017-08-03 | 黄冠明 | Method for powering off mobile phone, and mobile phone |
CN105785401A (en) * | 2016-02-25 | 2016-07-20 | 中国人民解放军海军医学研究所 | Big dipper lifesaving device and application method thereof |
CN105785401B (en) * | 2016-02-25 | 2018-03-06 | 中国人民解放军海军医学研究所 | Big Dipper lifesaving appliance and its application method |
CN106027789A (en) * | 2016-06-28 | 2016-10-12 | 上海哲奥实业有限公司 | Anti-theft cellphone and anti-theft method for cellphone |
CN108875326A (en) * | 2018-05-10 | 2018-11-23 | 广州大学 | A kind of mobile device power supply method for closing and mobile device |
CN109362029A (en) * | 2018-10-29 | 2019-02-19 | 重庆邮电大学 | ESIM card hand machine long-range positioning system (Loran) and method based on the passive dual trigger mechanism of master |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105282337A (en) | Intelligent mobile phone encryption method | |
EP2503806B1 (en) | Anti-theft mobile terminal and anti-theft method for mobile terminal | |
CN102289623A (en) | Anti-leakage laptop | |
CN102883049A (en) | Hidden alarm unlocking method for mobile terminal, and mobile terminal | |
JP2004102682A (en) | Terminal lock system and terminal lock method | |
CN105530356A (en) | Mobile communication terminal and data protection method and device thereof | |
CN202694329U (en) | Wireless storage equipment | |
WO2015117332A1 (en) | Method and device for enabling interface in usb debugging mode, and terminal | |
WO2015004415A1 (en) | Mobile-device security | |
CN104182707A (en) | Anti-theft method and device for handheld intelligent mobile terminal | |
CN102855451A (en) | Portable computer terminal with safe anti-secret-disclosing function | |
CN102799336A (en) | Method, device and mobile terminal for unlocking touch screens | |
CN107767514A (en) | Key of safety encryption matrix contact type electronic lock | |
CN202815852U (en) | Portable computer terminal with safety and secrecy | |
CN201465117U (en) | Mobile storage device with remote self-destruction function | |
CN201600704U (en) | Hard disk remote destruction anti-theft system | |
CN104298931A (en) | Information processing method and information processing device | |
CN103195301B (en) | Electronic lock control device | |
CN102685326A (en) | Message encryption method and device and mobile terminal | |
CN104156670A (en) | Data protection method and device | |
CN203276262U (en) | Portable storage device with encryption lock function | |
CN106446629A (en) | Security encryption method and system for intelligent mobile terminal | |
CN104168367A (en) | Method for unlocking smartphone | |
US20150135335A1 (en) | Computer system and method for protecting data from external threats | |
CN204216909U (en) | Special service system information safety device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160127 |