CN105657147B - A kind of anti-theft method for mobile terminal and device - Google Patents
A kind of anti-theft method for mobile terminal and device Download PDFInfo
- Publication number
- CN105657147B CN105657147B CN201510287466.9A CN201510287466A CN105657147B CN 105657147 B CN105657147 B CN 105657147B CN 201510287466 A CN201510287466 A CN 201510287466A CN 105657147 B CN105657147 B CN 105657147B
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- information
- user
- identity information
- card
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Telephone Function (AREA)
Abstract
The application provides a kind of anti-theft method for mobile terminal and device, passes through the operational order for receiving user's input (operational order includes starting up's instruction or standby wakeup instruction);It is prestored in mobile terminal with the identity information of the legitimate user of mobile terminal binding and when with being provided with SIM card in the card information of the legal SIM card of identity information binding and mobile terminal when detecting, the card information of reading SIM card and the identity information for obtaining user;When the identity information prestored in the identity information and mobile terminal of the user got is not inconsistent, or the card information prestored in the card information and mobile terminal read is not when being inconsistent, forbid executing the mode of movement corresponding with operational order, it effectively prevents using user illegal when current mobile terminal, or SIM card in current mobile terminal it is illegal when, the case where mobile terminal execution instructs corresponding movement with aforesaid operations, and then the safety of data in mobile terminal has been effectively ensured.
Description
Technical field
This application involves guarding against theft for mobile terminal technical fields, more particularly to a kind of anti-theft method for mobile terminal and device.
Background technique
The communication tool that mobile terminal is portable as one kind, fashion is small and exquisite, it is more and more important to people's lives,
Largely facilitate people's lives.However, although mobile terminal is provided convenience for people's lives, work as shifting
It is also that cannot be neglected on influence caused by people's lives after dynamic lost terminal.
For example, being stored with much relevant to the mobile terminal user information (Web bank, contact person in mobile terminal
Deng), after mobile terminal is lost, often there is mobile terminal winner and used using the data snooping mobile terminal in mobile terminal
Family privacy carries out situations such as malfeasance, and then can generate bad influence to the life of mobile terminal user.
Therefore, a kind of anti-theft method for mobile terminal and device are needed, to guarantee the safety of data in mobile terminal.
Summary of the invention
In view of this, the application provides a kind of anti-theft method for mobile terminal and device, by currently used to mobile terminal
The authentication of the card information of SIM card in the identity information and mobile terminal of user, to guarantee the safety of data in mobile terminal.
To achieve the goals above, technical solution provided in an embodiment of the present invention is as follows:
A kind of anti-theft method for mobile terminal, comprising:
The operational order of user's input is received, the operational order includes starting up's instruction or standby wakeup instruction;
When detect prestored in mobile terminal with the identity information of the legitimate user of the mobile terminal binding and with institute
When stating the card information of the legal SIM card of identity information binding, detect in the mobile terminal whether be provided with SIM card;
When being provided with SIM card in the mobile terminal, reads the card information of the SIM card and obtain the identity letter of user
Breath;
When the identity information prestored in the identity information and the mobile terminal of the user got is not inconsistent, or read
When the card information prestored in the card information and the mobile terminal got is not inconsistent, forbid executing corresponding with the operational order
Movement.
Preferably, when the identity information prestored in the identity information of the user got and the mobile terminal not
Symbol, or when the card information that reads and the card information prestored in the mobile terminal are not inconsistent, this method further include:
Forbid executing movement corresponding with the deletion instruction received, the deletion instruction includes: that the shifting is deleted in instruction
The identity information and/or card information prestored in dynamic terminal.
Preferably, when not set SIM card in the mobile terminal, this method further include:
Obtain the identity information of user;
When the identity information prestored in the identity information of the user got and the mobile terminal is not inconsistent, forbid
Execute movement corresponding with the operational order.
Preferably, when the identity information prestored in the identity information of the user got and the mobile terminal is not inconsistent
When, this method further include:
Forbid executing movement corresponding with the deletion instruction received, the deletion instruction includes: that the shifting is deleted in instruction
The identity information and/or card information prestored in dynamic terminal.
Preferably, when detect prestored in mobile terminal and the identity of the legitimate user of the mobile terminal binding believe
When ceasing and not prestoring the card information of SIM card, this method further include:
Obtain the identity information of user;
When the identity information prestored in the identity information of the user got and the mobile terminal is not inconsistent, forbid
Execute movement corresponding with the operational order.
Preferably, when detect prestored in mobile terminal with the card information of the legal SIM card of the mobile terminal binding,
And when the identity information of non-prestored user, this method further include:
It detects in the mobile terminal and whether is provided with SIM card;
When being provided with SIM card in the mobile terminal, the card information of the SIM card is read;
When the card information prestored in the card information that reads and the mobile terminal is not inconsistent, forbid executing with it is described
The corresponding movement of operational order.
Preferably, when detecting the identity information of the card information and user that do not prestore SIM card in mobile terminal, the party
Method further include:
Display is for prompting user to prestore the prompting message of identity information and/or card information;
The information of response user prestores operation, generation prestored information, the prestored information include: user identity information,
Binding relationship letter between the card information of SIM card and the mobile terminal, the identity information of user and the card information of SIM card
Breath.
A kind of guarding against theft for mobile terminal device, comprising:
Instruction receiving unit, for receiving the operational order of user's input, the operational order includes starting up's instruction
Or standby wakeup instruction;
Detection unit detects the body prestored in mobile terminal with the legitimate user of the mobile terminal binding for working as
When the card information of part information and the legal SIM card bound with the identity information, detects in the mobile terminal and whether be provided with
SIM card;
Information acquisition unit, for reading the card information of the SIM card when being provided with SIM card in the mobile terminal
And obtain the identity information of user;
First execution unit, for when the body prestored in the identity information and the mobile terminal of the user got
Part information is not inconsistent, or when the card information read and the card information prestored in the mobile terminal are not inconsistent, forbids executing
Movement corresponding with the operational order.
It preferably, further include the second execution unit,
Second execution unit, for being prestored when in the identity information and the mobile terminal of the user got
Identity information be not inconsistent, or when the card information prestored in the card information read and the mobile terminal is not inconsistent, forbid
Movement corresponding with the deletion instruction received is executed, the deletion instruction includes: to prestore in the instruction deletion mobile terminal
Identity information and/or card information.
It preferably, further include third execution unit,
The third execution unit, for when not set SIM card in the mobile terminal, obtaining the identity letter of user
Breath;And when the identity information prestored in the identity information of the user got and the mobile terminal is not inconsistent, forbid
Execute movement corresponding with the operational order.
The application provides a kind of anti-theft method for mobile terminal and device, passes through the operational order (behaviour for receiving user's input
Making instruction includes starting up's instruction or standby wakeup instruction);It is prestored in mobile terminal and mobile terminal binding when detecting
Legitimate user identity information and with identity information binding legal SIM card card information and mobile terminal in be provided with SIM
When card, the card information of reading SIM card and the identity information for obtaining user;When the identity information and mobile terminal of the user got
In the identity information that prestores be not inconsistent, or when the card information prestored in the card information and mobile terminal read is not inconsistent, forbid holding
The mode of row movement corresponding with operational order effectively prevents using user illegal when current mobile terminal, or works as
When SIM card in preceding mobile terminal is illegal, the case where mobile terminal execution and aforesaid operations instruct corresponding movement, Jin Eryou
Effect ensure that the safety of data in mobile terminal.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
The embodiment of invention for those of ordinary skill in the art without creative efforts, can also basis
The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of anti-theft method for mobile terminal flow chart that the embodiment of the present application one provides;
Fig. 2 is another anti-theft method for mobile terminal flow chart that the embodiment of the present application one provides;
Fig. 3 is another anti-theft method for mobile terminal flow chart that the embodiment of the present application one provides;
Fig. 4 is another anti-theft method for mobile terminal flow chart that the embodiment of the present application one provides;
Fig. 5 is another anti-theft method for mobile terminal flow chart that the embodiment of the present application one provides;
Fig. 6 is a kind of structural schematic diagram for guarding against theft for mobile terminal device that the embodiment of the present application two provides.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
Embodiment one:
Fig. 1 is a kind of anti-theft method for mobile terminal flow chart that the embodiment of the present application one provides.
As shown in Figure 1, this method comprises:
S101, the operational order for receiving user's input, operational order include starting up's instruction or standby wakeup instruction;
In the embodiment of the present application, it is preferred that receive the operational order of user's input, which includes starting up
Instruction or standby wakeup instruction.
Preferably, user realizes input starting up's instruction by click starting up's key, defeated by double-clicking screen realization
Enter standby wakeup instruction.Above is only the preferred embodiment of the embodiment of the present application, and inventor can arbitrarily set according to their own needs
The mode that user inputs operation instruction is set, it is not limited here.
Specifically, instruction of starting up's instruction for instruction mobile terminal-opening;Standby wakeup instruction is mobile eventually for instruction
It holds from standby screen lock state to the instruction for waking up unlocked state.
S102, it is prestored in mobile terminal and the identity information of the legitimate user of mobile terminal binding and and body when detecting
When the card information of the legal SIM card of part information binding, detect in mobile terminal whether be provided with SIM card;It is mobile whole when detecting
When being provided with SIM card in end, step S103 is executed;
In the embodiment of the present application, it is preferred that inventor can work as inspection in any setting steps S102 according to their own needs
Mode of operation when not set SIM card in mobile terminal is measured, it is not limited here.
In the embodiment of the present application, it is preferred that after receiving the operational order of user's input, need to detect in mobile terminal
The binding relationship whether being stored between identity information, card information and mobile terminal, identity information and card information.
Identity information and card information are stored in mobile terminal when detecting, and identity information is and mobile terminal binding
Legitimate user identity information, and card information is the card information for the legal SIM card bound with the identity information of legitimate user
When, detect in mobile terminal whether be provided with SIM card.
In the embodiment of the present application, it is preferred that in foundation mobile terminal, card information and identity information between the two
Binding relationship, determine and be bound legal mutually between the two, e.g., user A and mobile terminal A are bound, then it is assumed that
User A is the legitimate user of mobile terminal A;Mobile terminal A is also the proper mobile terminal of user A.
In the embodiment of the present application, it is preferred that the card information of SIM card is the information for characterizing the uniqueness of SIM card identity.And
Preferably, the telephone number of SIM card can be regarded to the information of the uniqueness of characterization SIM card identity as, that is, by the phone of SIM card
Card information of the number as SIM card.
Above is only the preferred embodiment of the embodiment of the present application, and SIM card can be arbitrarily arranged in inventor according to their own needs
Card information specific manifestation form, the data that obtain after such as being encrypted the telephone number of SIM card according to preset algorithm make
For the card information of SIM card, it is not limited here.
In the embodiment of the present application, it is preferred that the identity information of user is the information for indicating the uniqueness of user identity.
In the embodiment of the present application, it is preferred that identity information includes: face information, iris information and/or finger print information.
That is, the identity information of user is face information, iris information and/or the finger print information of user.
Above is only the preferred embodiment of the embodiment of the present application, and identity letter can be arbitrarily arranged in inventor according to their own needs
The specific manifestation form of breath, e.g., the data obtained after face information is encrypted according to preset algorithm as identity information,
This is without limitation.
S103, reading SIM card card information and obtain the identity information of user;
In the embodiment of the present application, it is preferred that when detect be provided with SIM card in mobile terminal when, read the movement end
The card information of SIM card in end, and obtain the identity information of user.
S104, it is not inconsistent when the identity information prestored in the identity information and mobile terminal of the user got, or reads
To card information and mobile terminal in the card information that prestores be not inconsistent when, forbid executing movement corresponding with operational order.
In the embodiment of the present application, it is preferred that forbidding the process for executing movement corresponding with operational order includes: when operation
When instruction includes starting up's instruction, forbid executing boot action corresponding with starting up's instruction;When operational order include to
When machine wake up instruction, forbid executing standby wakeup movement corresponding with standby wakeup instruction.
The application provides a kind of anti-theft method for mobile terminal, by the operational order (operational order for receiving user's input
Including starting up's instruction or standby wakeup instruction);When detect prestored in mobile terminal it is legal with mobile terminal binding
When being provided with SIM card in the identity information of user and the card information for the legal SIM card bound with identity information and mobile terminal,
The card information of reading SIM card and the identity information for obtaining user;When pre- in the identity information and mobile terminal of the user got
The identity information deposited is not inconsistent, or when the card information prestored in the card information and mobile terminal read is not inconsistent, forbid executing with
The mode of the corresponding movement of operational order effectively prevents using user illegal when current mobile terminal, or when Forward
When SIM card in dynamic terminal is illegal, the case where mobile terminal execution is with aforesaid operations instruction corresponding movement, and then effectively protect
The safety of data in mobile terminal is demonstrate,proved.
On the basis of a kind of anti-theft method for mobile terminal as shown in Figure 1 that the embodiment of the present application one provides, further
It include: the card letter that the identity information prestored in the identity information and mobile terminal for work as the user got is not inconsistent, or reads
When the card information prestored in breath and mobile terminal is not inconsistent, forbid executing movement corresponding with the deletion instruction received, deletion refers to
Order includes: that the identity information and/or card information prestored in mobile terminal is deleted in instruction.
In the embodiment of the present application, it is preferred that when receiving the deletion instruction of user's input, need to judge that mobile terminal is worked as
Preceding status.This judge mobile terminal be presently in the mode of state for judge the whether normally-open mobile terminal of user and/
Or standby wakeup mobile terminal, it is, judging in above-mentioned steps S104 whether to be " identity information of the user got and shifting
The identity information prestored in dynamic terminal is not inconsistent, or the card information prestored in the card information and mobile terminal read is not inconsistent "
State, when being, then it represents that forbid executing movement corresponding with operational order, also mean that, user fails normally-open movement
Terminal and/or normal Standby wake up mobile terminal, then at this point, then forbidding executing corresponding with the deletion instruction received dynamic
Make.
In the embodiment of the present application, pass through the setting " body prestored in the identity information and mobile terminal of the user got
Part information is not inconsistent, or the card information prestored in the card information and mobile terminal read is not inconsistent, and forbids executing and receive
It deletes and instructs corresponding movement, deleting instruction includes: that the identity information and/or card information prestored in mobile terminal is deleted in instruction."
Step, ensure that the safety of the identity information and SIM card information that prestore in mobile terminal, and then further improve mobile whole
The safety of data in end.
Fig. 2 is another anti-theft method for mobile terminal flow chart that the embodiment of the present application one provides.
As shown in Fig. 2, this method comprises:
S201, the operational order for receiving user's input, operational order include starting up's instruction or standby wakeup instruction;
S202, it is prestored in mobile terminal and the identity information of the legitimate user of mobile terminal binding and and body when detecting
When the card information of the legal SIM card of part information binding, detect in mobile terminal whether be provided with SIM card;It is mobile whole when detecting
When being provided with SIM card in end, step S203 is executed;When detecting not set SIM card in mobile terminal, step S205 is executed;
S203, reading SIM card card information and obtain the identity information of user;
In the embodiment of the present application, it is preferred that when detect be provided with SIM card in mobile terminal when, read the movement end
The card information of SIM card in end, and obtain the identity information of user.
S204, it is not inconsistent when the identity information prestored in the identity information and mobile terminal of the user got, or reads
To card information and mobile terminal in the card information that prestores be not inconsistent when, forbid executing movement corresponding with operational order;
In the embodiment of the present application, it is preferred that step S201-S204 and execution side the step of above-mentioned steps S101-S104
Formula is identical, and the detailed process about step S201-S204 refers to above-mentioned steps S101-S104, it is not limited here.
S205, the identity information for obtaining user;
In the embodiment of the present application, it is preferred that when detecting not set SIM card in mobile terminal, then obtain user's
Identity information.
S206, when the identity information prestored in the identity information of the user got and mobile terminal is not inconsistent, forbid holding
Row movement corresponding with operational order.
Further, in a kind of anti-theft method for mobile terminal provided by the embodiments of the present application, further includes: when what is got
When the identity information prestored in the identity information and mobile terminal of user is not inconsistent, forbid executing corresponding with the deletion instruction received
Movement, deleting instruction includes: that the identity information and/or card information that prestore in mobile terminal are deleted in instruction.
Fig. 3 is another anti-theft method for mobile terminal flow chart that the embodiment of the present application one provides.
As shown in figure 3, this method comprises:
S301, the operational order for receiving user's input, operational order include starting up's instruction or standby wakeup instruction;
In the embodiment of the present application, it is preferred that step S301 is identical as the implementation procedure of above-mentioned steps S101, related step
The detailed process of S301 refers to above-mentioned steps S101, does not do detailed restriction herein.
S302, it prestores in mobile terminal with the identity information of the legitimate user of mobile terminal binding and not when detecting
When prestoring the card information of SIM card, the identity information of user is obtained;
In the embodiment of the present application, it is preferred that it is pointed in step S302 " when detect prestored in mobile terminal with
The identity information of the legitimate user of mobile terminal binding and when not prestoring the card information of SIM card " in prestore in detection mobile terminal
Information content (e.g., detect mobile terminal in whether be stored with identity information, card information and mobile terminal, identity information and
Binding relationship between card information) it is identical as the content in above-mentioned steps S102, difference is that the result detected is different, on
Stating the result detected in step S102 is " identity information with the legitimate user of mobile terminal binding to be prestored in mobile terminal
With the card information for the legal SIM card bound with identity information ", and the result detected in step S302 is " to detect mobile whole
The card information of SIM card is prestored with the identity information of the legitimate user of mobile terminal binding and not prestored in end ".
S303, when the identity information prestored in the identity information of the user got and mobile terminal is not inconsistent, forbid holding
Row movement corresponding with operational order.
Fig. 4 is another anti-theft method for mobile terminal flow chart that the embodiment of the present application one provides.
S401, the operational order for receiving user's input, operational order include starting up's instruction or standby wakeup instruction;
In the embodiment of the present application, it is preferred that step S401 is identical as the implementation procedure of above-mentioned steps S101, related step
The detailed process of S401 refers to above-mentioned steps S101, does not do detailed restriction herein.
S402, it prestores in mobile terminal with the card information of the legal SIM card of mobile terminal binding and not pre- when detecting
When depositing the identity information of user, detect in mobile terminal whether be provided with SIM card;SIM is provided in mobile terminal when detecting
When card, step S403 is executed;
In the embodiment of the present application, it is preferred that inventor can work as inspection in any setting steps S402 according to their own needs
Mode of operation when not set SIM card in mobile terminal is measured, it is not limited here.
In the embodiment of the present application, it is preferred that it is pointed in step S402 " when detect prestored in mobile terminal with
When the card information and the identity information of non-prestored user of the legal SIM card of mobile terminal binding " in detection mobile terminal in prestore
Information content (e.g., detect mobile terminal in whether be stored with identity information, card information and mobile terminal, identity information and
Binding relationship between card information) it is identical as the content in above-mentioned steps S102, difference is that the result detected is different, on
Stating the result detected in step S102 is " identity information with the legitimate user of mobile terminal binding to be prestored in mobile terminal
With the card information for the legal SIM card bound with identity information ", and the result detected in step S402 is " to detect mobile whole
The identity information with the card information of the legal SIM card of mobile terminal binding and non-prestored user is prestored in end ".
The card information of S403, reading SIM card;
S404, when the card information prestored in the card information and mobile terminal read is not inconsistent, forbid execute refer to operation
Enable corresponding movement.
Fig. 5 is another anti-theft method for mobile terminal flow chart that the embodiment of the present application one provides.
As shown in figure 5, this method comprises:
S501, the operational order for receiving user's input, operational order include starting up's instruction or standby wakeup instruction;
In the embodiment of the present application, it is preferred that step S501 is identical as the implementation procedure of above-mentioned steps S101, related step
The detailed process of S501 refers to above-mentioned steps S101, does not do detailed restriction herein.
S502, when detecting the identity information of the card information and user that do not prestore SIM card in mobile terminal, display use
The prompting message of identity information and/or card information is prestored in prompt user;
In the embodiment of the present application, it is preferred that pointed in step S502 " not prestored when detecting in mobile terminal
When the card information of SIM card and the identity information of user " in detection mobile terminal prestored information content (e.g., detection movement
The binding relationship whether being stored in terminal between identity information, card information and mobile terminal, identity information and card information)
Identical as the content in above-mentioned steps S102, difference is that the result detected is different, detects in above-mentioned steps S102
As a result for " prestored in mobile terminal and the identity information of the legitimate user of mobile terminal binding and with identity information binding conjunction
The card information of method SIM card ", and the result detected in step S402 is " to detect the card letter for not prestoring SIM card in mobile terminal
Breath and the identity information of user ".
In the embodiment of the present application, it is preferred that when detecting card information and the user for not prestoring SIM card in mobile terminal
Identity information when, display alarm information, the prompting message is for prompting user to prestore identity information and/or card information.
S503, the information for responding user prestore operation, generation prestored information, prestored information include: user identity information,
Binding relationship information between the card information and mobile terminal of SIM card, the identity information of user and the card information of SIM card.
Further, in the anti-theft method for mobile terminal that the embodiment of the present application one provides, further includes: mobile eventually in detection
In end on the basis of prestored information, with reference to the setting of user, to realize guarding against theft for mobile terminal scheme.Such as, in the embodiment of the present application
In the anti-theft method for mobile terminal as shown in Figure 1 provided, prestored in mobile terminal and mobile terminal binding when detecting
When the identity information of legitimate user and the card information for the legal SIM card bound with identity information, whether inquiry is previously provided with inspection
Survey mode, when being previously provided with detection mode (e.g., which is only to verify to the identity of user), even if detection
The legal SIM with the identity information of the legitimate user of mobile terminal binding and with identity information binding is prestored into mobile terminal
The card information of card at this point, being also not required to judge whether be provided with SIM card in mobile terminal, and when being provided with SIM card, executes step
Rapid S103-S104, but it is only necessary to obtain the identity information of user, and judge whether the identity information got is whole with movement
The identity information prestored in end is not inconsistent, when the identity information prestored in the identity information and mobile terminal of the user got is not inconsistent
When, forbid executing movement corresponding with operational order.
In the embodiment of the present application, it is preferred that mobile terminal includes: mobile phone, PDA (Personal Digital
Assistant, palm PC) etc..Above is only the preferred embodiment of the embodiment of the present application, and inventor can be according to their own needs
The specific manifestation form of any setting mobile terminal, it is not limited here.
A kind of anti-theft method for mobile terminal provided by the embodiments of the present application is further described by above-mentioned, so that this Shen
Please embodiment provide a kind of anti-theft method for mobile terminal be more clear, completely, be convenient for those skilled in the art understand that.
Embodiment two:
Fig. 6 is a kind of structural schematic diagram for guarding against theft for mobile terminal device that the embodiment of the present application two provides.
As shown in fig. 6, the device includes:
Instruction receiving unit 1, for receive user input operational order, operational order include starting up instruction or to
Machine wake up instruction;
Detection unit 2 detects the identity prestored in mobile terminal with the legitimate user of mobile terminal binding for working as
When the card information of information and the legal SIM card bound with identity information, detect in mobile terminal whether be provided with SIM card;
Information acquisition unit 3, for when being provided with SIM card in mobile terminal, the card information of reading SIM card simultaneously to obtain use
The identity information at family;
First execution unit 4, for when the identity information prestored in the identity information and mobile terminal of the user got
It is not inconsistent, or when the card information prestored in the card information and mobile terminal read is not inconsistent, forbids executing corresponding with operational order
Movement.
It further, further include the second execution list in a kind of guarding against theft for mobile terminal device provided by the embodiments of the present application
Member, second execution unit, for not being inconsistent when the identity information prestored in the identity information and mobile terminal of the user got,
Or the card information prestored in the card information and mobile terminal read forbids the deletion instruction pair for executing with receiving when not being inconsistent
The movement answered, deleting instruction includes: that the identity information and/or card information prestored in mobile terminal is deleted in instruction.
It further, further include that third executes list in a kind of guarding against theft for mobile terminal device provided by the embodiments of the present application
Member, the third execution unit, for obtaining the identity information of user when not set SIM card in mobile terminal;And when acquisition
To user identity information and mobile terminal in the identity information that prestores be not inconsistent when, forbid executing move corresponding with operational order
Make.
The application provides a kind of guarding against theft for mobile terminal device, by the operational order (operational order for receiving user's input
Including starting up's instruction or standby wakeup instruction);When detect prestored in mobile terminal it is legal with mobile terminal binding
When being provided with SIM card in the identity information of user and the card information for the legal SIM card bound with identity information and mobile terminal,
The card information of reading SIM card and the identity information for obtaining user;When pre- in the identity information and mobile terminal of the user got
The identity information deposited is not inconsistent, or when the card information prestored in the card information and mobile terminal read is not inconsistent, forbid executing with
The mode of the corresponding movement of operational order effectively prevents using user illegal when current mobile terminal, or when Forward
When SIM card in dynamic terminal is illegal, the case where mobile terminal execution is with aforesaid operations instruction corresponding movement, and then effectively protect
The safety of data in mobile terminal is demonstrate,proved.
Each embodiment in this specification is described in a progressive manner, the highlights of each of the examples are with other
The difference of embodiment, the same or similar parts in each embodiment may refer to each other.For device disclosed in embodiment
For, since it is corresponded to the methods disclosed in the examples, so being described relatively simple, related place is said referring to method part
It is bright.
The above is only the preferred embodiment of the application, make skilled artisans appreciate that or realization the application.It is right
A variety of modifications of these embodiments will be apparent to one skilled in the art, general original as defined herein
Reason can be realized in other embodiments without departing from the spirit or scope of the application.Therefore, the application will not
Be intended to be limited to the embodiments shown herein, and be to fit to it is consistent with the principles and novel features disclosed in this article most
Wide range.
Claims (8)
1. a kind of anti-theft method for mobile terminal characterized by comprising
The operational order of user's input is received, the operational order includes starting up's instruction or standby wakeup instruction;
When detect prestored in mobile terminal with the identity information of the legitimate user of the mobile terminal binding and with the body
When the card information of the legal SIM card of part information binding, detect in the mobile terminal whether be provided with SIM card;
When being provided with SIM card in the mobile terminal, reads the card information of the SIM card and obtain the identity information of user;
When the identity information prestored in the identity information and the mobile terminal of the user got is not inconsistent, or read
The card information and the mobile terminal in the card information that prestores when not being inconsistent, forbid executing move corresponding with the operational order
Make;
When not set SIM card in the mobile terminal, this method further include:
Obtain the identity information of user;
When the identity information prestored in the identity information of the user got and the mobile terminal is not inconsistent, forbid executing
Movement corresponding with the operational order.
2. the method according to claim 1, wherein identity information and the shifting as the user got
The identity information prestored in dynamic terminal is not inconsistent, or the card information read and the card information prestored in the mobile terminal
When not being inconsistent, this method further include:
Forbid executing movement corresponding with the deletion instruction received, the deletion instruction includes: that instruction deletes the movement eventually
The identity information and/or card information prestored in end.
3. the method according to claim 1, wherein identity information and the shifting as the user got
When the identity information prestored in dynamic terminal is not inconsistent, this method further include:
Forbid executing movement corresponding with the deletion instruction received, the deletion instruction includes: that instruction deletes the movement eventually
The identity information and/or card information prestored in end.
4. the method according to claim 1, wherein being prestored in mobile terminal with the movement eventually when detecting
When holding the identity information of the legitimate user of binding and not prestoring the card information of SIM card, this method further include:
Obtain the identity information of user;
When the identity information prestored in the identity information of the user got and the mobile terminal is not inconsistent, forbid executing
Movement corresponding with the operational order.
5. the method according to claim 1, wherein being prestored in mobile terminal with the movement eventually when detecting
When holding the card information and the identity information of non-prestored user of the legal SIM card of binding, this method further include:
It detects in the mobile terminal and whether is provided with SIM card;
When being provided with SIM card in the mobile terminal, the card information of the SIM card is read;
When the card information prestored in the card information and the mobile terminal read is not inconsistent, forbid executing and the operation
Instruct corresponding movement.
6. the method according to claim 1, wherein when detecting the card letter for not prestoring SIM card in mobile terminal
When breath and the identity information of user, this method further include:
Display is for prompting user to prestore the prompting message of identity information and/or card information;
The information of response user prestores operation, generates prestored information, the prestored information includes: the identity information of user, SIM card
Card information and the mobile terminal, the identity information of user and the card information of SIM card between binding relationship information.
7. a kind of guarding against theft for mobile terminal device characterized by comprising
Instruction receiving unit, for receive user input operational order, the operational order include starting up instruction or to
Machine wake up instruction;
Detection unit, for when detect prestored in mobile terminal and the identity of the legitimate user of the mobile terminal binding believe
When breath and the card information for the legal SIM card bound with the identity information, detect in the mobile terminal whether be provided with SIM
Card;
Information acquisition unit, for when being provided with SIM card in the mobile terminal, reading the card information of the SIM card and obtaining
Take the identity information at family;
First execution unit, for believing when the identity prestored in the identity information and the mobile terminal of the user got
Breath is not inconsistent, or when the card information prestored in the card information read and the mobile terminal is not inconsistent, and forbids executing and institute
State the corresponding movement of operational order;
Third execution unit, for obtaining the identity information of user when not set SIM card in the mobile terminal;And work as
When the identity information prestored in the identity information of the user got and the mobile terminal is not inconsistent, forbid executing with it is described
The corresponding movement of operational order.
8. device according to claim 7, which is characterized in that it further include the second execution unit,
Second execution unit, for when the body prestored in the identity information and the mobile terminal of the user got
Part information is not inconsistent, or when the card information read and the card information prestored in the mobile terminal are not inconsistent, forbids executing
Movement corresponding with the deletion instruction received, the deletion instruction include: that the body prestored in the mobile terminal is deleted in instruction
Part information and/or card information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510287466.9A CN105657147B (en) | 2015-05-29 | 2015-05-29 | A kind of anti-theft method for mobile terminal and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510287466.9A CN105657147B (en) | 2015-05-29 | 2015-05-29 | A kind of anti-theft method for mobile terminal and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105657147A CN105657147A (en) | 2016-06-08 |
CN105657147B true CN105657147B (en) | 2019-10-11 |
Family
ID=56481613
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510287466.9A Active CN105657147B (en) | 2015-05-29 | 2015-05-29 | A kind of anti-theft method for mobile terminal and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105657147B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108307674B (en) * | 2016-12-02 | 2020-06-16 | 华为技术有限公司 | Method and equipment for guaranteeing terminal safety |
CN106507334A (en) * | 2016-12-30 | 2017-03-15 | 维沃移动通信有限公司 | A kind of identity identifying method and mobile terminal |
CN106791171B (en) * | 2017-01-16 | 2020-03-24 | 北京安云世纪科技有限公司 | Card locking method and device of mobile terminal and mobile terminal |
CN108134995A (en) * | 2017-04-26 | 2018-06-08 | 黄策 | The validity management method of the separation between machine and card type network terminal |
CN107169384A (en) * | 2017-05-15 | 2017-09-15 | 上海与德科技有限公司 | A kind of guard method and system based on mobile terminal |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7031665B1 (en) * | 1999-04-12 | 2006-04-18 | Anders Trell Trust | Method and device for utilization of mobile radio telephones for surveillance and/or control purposes |
CN102231882A (en) * | 2011-07-08 | 2011-11-02 | 康佳集团股份有限公司 | Method and device for obtaining information in lost mobile communication terminal |
CN102354353A (en) * | 2011-09-27 | 2012-02-15 | 宇龙计算机通信科技(深圳)有限公司 | Method for acquiring data and terminal |
CN103607697A (en) * | 2013-11-27 | 2014-02-26 | 宇龙计算机通信科技(深圳)有限公司 | Terminal anti-theft method and system based on SIM card |
-
2015
- 2015-05-29 CN CN201510287466.9A patent/CN105657147B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7031665B1 (en) * | 1999-04-12 | 2006-04-18 | Anders Trell Trust | Method and device for utilization of mobile radio telephones for surveillance and/or control purposes |
CN102231882A (en) * | 2011-07-08 | 2011-11-02 | 康佳集团股份有限公司 | Method and device for obtaining information in lost mobile communication terminal |
CN102354353A (en) * | 2011-09-27 | 2012-02-15 | 宇龙计算机通信科技(深圳)有限公司 | Method for acquiring data and terminal |
CN103607697A (en) * | 2013-11-27 | 2014-02-26 | 宇龙计算机通信科技(深圳)有限公司 | Terminal anti-theft method and system based on SIM card |
Also Published As
Publication number | Publication date |
---|---|
CN105657147A (en) | 2016-06-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105657147B (en) | A kind of anti-theft method for mobile terminal and device | |
EP3314493B1 (en) | Method and apparatus for enabling the touchscreen display of a mobile device | |
CN103079000B (en) | Method and device for terminal unlocking | |
US9313321B2 (en) | Screen unlocking method and device for mobile terminal | |
KR102005110B1 (en) | Mobile device to detect unexpected behaviour | |
CN103092484B (en) | The method of unlock screen, device and terminal | |
CN102413221B (en) | Method for protecting privacy information and mobile terminal | |
JP2015130182A (en) | Mobile device, security lock control method thereof, and program | |
EP2159727B1 (en) | Securing a device based on atypical user behavior | |
CN103020553B (en) | A kind of guarding against theft for mobile terminal guard method | |
CN101895633A (en) | Mobile terminal and unlocking method thereof | |
CN103139354A (en) | Method and device for unlocking cell phone | |
CN103324874A (en) | Verification method and electronic device | |
CN104038613A (en) | Method and apparatus for information security management | |
CN102799336A (en) | Method, device and mobile terminal for unlocking touch screens | |
CN108537058A (en) | The polygonal color application method and device, computer readable storage medium, terminal of terminal | |
CN105120062A (en) | Communication establishing method and mobile terminal | |
CN104184874A (en) | Method for switching mobile phone modes based on multiple unlocking conditions, and mobile phone thereof | |
CN103974249A (en) | Communication method based on verification information and equipment thereof | |
CN105069344B (en) | mobile terminal locking method and device | |
CN104134024A (en) | Mobile terminal privacy protection method and system | |
CN108959868A (en) | A kind of booting computer method, apparatus and computer | |
CN104462929A (en) | Privacy protection method and device for mobile equipment | |
CN104392158A (en) | Mobile terminal unlocking method and mobile terminal | |
CN103809897B (en) | Terminal device and its control method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |