CN105657147B - A kind of anti-theft method for mobile terminal and device - Google Patents

A kind of anti-theft method for mobile terminal and device Download PDF

Info

Publication number
CN105657147B
CN105657147B CN201510287466.9A CN201510287466A CN105657147B CN 105657147 B CN105657147 B CN 105657147B CN 201510287466 A CN201510287466 A CN 201510287466A CN 105657147 B CN105657147 B CN 105657147B
Authority
CN
China
Prior art keywords
mobile terminal
information
user
identity information
card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510287466.9A
Other languages
Chinese (zh)
Other versions
CN105657147A (en
Inventor
卞永军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201510287466.9A priority Critical patent/CN105657147B/en
Publication of CN105657147A publication Critical patent/CN105657147A/en
Application granted granted Critical
Publication of CN105657147B publication Critical patent/CN105657147B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Telephone Function (AREA)

Abstract

The application provides a kind of anti-theft method for mobile terminal and device, passes through the operational order for receiving user's input (operational order includes starting up's instruction or standby wakeup instruction);It is prestored in mobile terminal with the identity information of the legitimate user of mobile terminal binding and when with being provided with SIM card in the card information of the legal SIM card of identity information binding and mobile terminal when detecting, the card information of reading SIM card and the identity information for obtaining user;When the identity information prestored in the identity information and mobile terminal of the user got is not inconsistent, or the card information prestored in the card information and mobile terminal read is not when being inconsistent, forbid executing the mode of movement corresponding with operational order, it effectively prevents using user illegal when current mobile terminal, or SIM card in current mobile terminal it is illegal when, the case where mobile terminal execution instructs corresponding movement with aforesaid operations, and then the safety of data in mobile terminal has been effectively ensured.

Description

A kind of anti-theft method for mobile terminal and device
Technical field
This application involves guarding against theft for mobile terminal technical fields, more particularly to a kind of anti-theft method for mobile terminal and device.
Background technique
The communication tool that mobile terminal is portable as one kind, fashion is small and exquisite, it is more and more important to people's lives, Largely facilitate people's lives.However, although mobile terminal is provided convenience for people's lives, work as shifting It is also that cannot be neglected on influence caused by people's lives after dynamic lost terminal.
For example, being stored with much relevant to the mobile terminal user information (Web bank, contact person in mobile terminal Deng), after mobile terminal is lost, often there is mobile terminal winner and used using the data snooping mobile terminal in mobile terminal Family privacy carries out situations such as malfeasance, and then can generate bad influence to the life of mobile terminal user.
Therefore, a kind of anti-theft method for mobile terminal and device are needed, to guarantee the safety of data in mobile terminal.
Summary of the invention
In view of this, the application provides a kind of anti-theft method for mobile terminal and device, by currently used to mobile terminal The authentication of the card information of SIM card in the identity information and mobile terminal of user, to guarantee the safety of data in mobile terminal.
To achieve the goals above, technical solution provided in an embodiment of the present invention is as follows:
A kind of anti-theft method for mobile terminal, comprising:
The operational order of user's input is received, the operational order includes starting up's instruction or standby wakeup instruction;
When detect prestored in mobile terminal with the identity information of the legitimate user of the mobile terminal binding and with institute When stating the card information of the legal SIM card of identity information binding, detect in the mobile terminal whether be provided with SIM card;
When being provided with SIM card in the mobile terminal, reads the card information of the SIM card and obtain the identity letter of user Breath;
When the identity information prestored in the identity information and the mobile terminal of the user got is not inconsistent, or read When the card information prestored in the card information and the mobile terminal got is not inconsistent, forbid executing corresponding with the operational order Movement.
Preferably, when the identity information prestored in the identity information of the user got and the mobile terminal not Symbol, or when the card information that reads and the card information prestored in the mobile terminal are not inconsistent, this method further include:
Forbid executing movement corresponding with the deletion instruction received, the deletion instruction includes: that the shifting is deleted in instruction The identity information and/or card information prestored in dynamic terminal.
Preferably, when not set SIM card in the mobile terminal, this method further include:
Obtain the identity information of user;
When the identity information prestored in the identity information of the user got and the mobile terminal is not inconsistent, forbid Execute movement corresponding with the operational order.
Preferably, when the identity information prestored in the identity information of the user got and the mobile terminal is not inconsistent When, this method further include:
Forbid executing movement corresponding with the deletion instruction received, the deletion instruction includes: that the shifting is deleted in instruction The identity information and/or card information prestored in dynamic terminal.
Preferably, when detect prestored in mobile terminal and the identity of the legitimate user of the mobile terminal binding believe When ceasing and not prestoring the card information of SIM card, this method further include:
Obtain the identity information of user;
When the identity information prestored in the identity information of the user got and the mobile terminal is not inconsistent, forbid Execute movement corresponding with the operational order.
Preferably, when detect prestored in mobile terminal with the card information of the legal SIM card of the mobile terminal binding, And when the identity information of non-prestored user, this method further include:
It detects in the mobile terminal and whether is provided with SIM card;
When being provided with SIM card in the mobile terminal, the card information of the SIM card is read;
When the card information prestored in the card information that reads and the mobile terminal is not inconsistent, forbid executing with it is described The corresponding movement of operational order.
Preferably, when detecting the identity information of the card information and user that do not prestore SIM card in mobile terminal, the party Method further include:
Display is for prompting user to prestore the prompting message of identity information and/or card information;
The information of response user prestores operation, generation prestored information, the prestored information include: user identity information, Binding relationship letter between the card information of SIM card and the mobile terminal, the identity information of user and the card information of SIM card Breath.
A kind of guarding against theft for mobile terminal device, comprising:
Instruction receiving unit, for receiving the operational order of user's input, the operational order includes starting up's instruction Or standby wakeup instruction;
Detection unit detects the body prestored in mobile terminal with the legitimate user of the mobile terminal binding for working as When the card information of part information and the legal SIM card bound with the identity information, detects in the mobile terminal and whether be provided with SIM card;
Information acquisition unit, for reading the card information of the SIM card when being provided with SIM card in the mobile terminal And obtain the identity information of user;
First execution unit, for when the body prestored in the identity information and the mobile terminal of the user got Part information is not inconsistent, or when the card information read and the card information prestored in the mobile terminal are not inconsistent, forbids executing Movement corresponding with the operational order.
It preferably, further include the second execution unit,
Second execution unit, for being prestored when in the identity information and the mobile terminal of the user got Identity information be not inconsistent, or when the card information prestored in the card information read and the mobile terminal is not inconsistent, forbid Movement corresponding with the deletion instruction received is executed, the deletion instruction includes: to prestore in the instruction deletion mobile terminal Identity information and/or card information.
It preferably, further include third execution unit,
The third execution unit, for when not set SIM card in the mobile terminal, obtaining the identity letter of user Breath;And when the identity information prestored in the identity information of the user got and the mobile terminal is not inconsistent, forbid Execute movement corresponding with the operational order.
The application provides a kind of anti-theft method for mobile terminal and device, passes through the operational order (behaviour for receiving user's input Making instruction includes starting up's instruction or standby wakeup instruction);It is prestored in mobile terminal and mobile terminal binding when detecting Legitimate user identity information and with identity information binding legal SIM card card information and mobile terminal in be provided with SIM When card, the card information of reading SIM card and the identity information for obtaining user;When the identity information and mobile terminal of the user got In the identity information that prestores be not inconsistent, or when the card information prestored in the card information and mobile terminal read is not inconsistent, forbid holding The mode of row movement corresponding with operational order effectively prevents using user illegal when current mobile terminal, or works as When SIM card in preceding mobile terminal is illegal, the case where mobile terminal execution and aforesaid operations instruct corresponding movement, Jin Eryou Effect ensure that the safety of data in mobile terminal.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of invention for those of ordinary skill in the art without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of anti-theft method for mobile terminal flow chart that the embodiment of the present application one provides;
Fig. 2 is another anti-theft method for mobile terminal flow chart that the embodiment of the present application one provides;
Fig. 3 is another anti-theft method for mobile terminal flow chart that the embodiment of the present application one provides;
Fig. 4 is another anti-theft method for mobile terminal flow chart that the embodiment of the present application one provides;
Fig. 5 is another anti-theft method for mobile terminal flow chart that the embodiment of the present application one provides;
Fig. 6 is a kind of structural schematic diagram for guarding against theft for mobile terminal device that the embodiment of the present application two provides.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
Embodiment one:
Fig. 1 is a kind of anti-theft method for mobile terminal flow chart that the embodiment of the present application one provides.
As shown in Figure 1, this method comprises:
S101, the operational order for receiving user's input, operational order include starting up's instruction or standby wakeup instruction;
In the embodiment of the present application, it is preferred that receive the operational order of user's input, which includes starting up Instruction or standby wakeup instruction.
Preferably, user realizes input starting up's instruction by click starting up's key, defeated by double-clicking screen realization Enter standby wakeup instruction.Above is only the preferred embodiment of the embodiment of the present application, and inventor can arbitrarily set according to their own needs The mode that user inputs operation instruction is set, it is not limited here.
Specifically, instruction of starting up's instruction for instruction mobile terminal-opening;Standby wakeup instruction is mobile eventually for instruction It holds from standby screen lock state to the instruction for waking up unlocked state.
S102, it is prestored in mobile terminal and the identity information of the legitimate user of mobile terminal binding and and body when detecting When the card information of the legal SIM card of part information binding, detect in mobile terminal whether be provided with SIM card;It is mobile whole when detecting When being provided with SIM card in end, step S103 is executed;
In the embodiment of the present application, it is preferred that inventor can work as inspection in any setting steps S102 according to their own needs Mode of operation when not set SIM card in mobile terminal is measured, it is not limited here.
In the embodiment of the present application, it is preferred that after receiving the operational order of user's input, need to detect in mobile terminal The binding relationship whether being stored between identity information, card information and mobile terminal, identity information and card information.
Identity information and card information are stored in mobile terminal when detecting, and identity information is and mobile terminal binding Legitimate user identity information, and card information is the card information for the legal SIM card bound with the identity information of legitimate user When, detect in mobile terminal whether be provided with SIM card.
In the embodiment of the present application, it is preferred that in foundation mobile terminal, card information and identity information between the two Binding relationship, determine and be bound legal mutually between the two, e.g., user A and mobile terminal A are bound, then it is assumed that User A is the legitimate user of mobile terminal A;Mobile terminal A is also the proper mobile terminal of user A.
In the embodiment of the present application, it is preferred that the card information of SIM card is the information for characterizing the uniqueness of SIM card identity.And Preferably, the telephone number of SIM card can be regarded to the information of the uniqueness of characterization SIM card identity as, that is, by the phone of SIM card Card information of the number as SIM card.
Above is only the preferred embodiment of the embodiment of the present application, and SIM card can be arbitrarily arranged in inventor according to their own needs Card information specific manifestation form, the data that obtain after such as being encrypted the telephone number of SIM card according to preset algorithm make For the card information of SIM card, it is not limited here.
In the embodiment of the present application, it is preferred that the identity information of user is the information for indicating the uniqueness of user identity.
In the embodiment of the present application, it is preferred that identity information includes: face information, iris information and/or finger print information. That is, the identity information of user is face information, iris information and/or the finger print information of user.
Above is only the preferred embodiment of the embodiment of the present application, and identity letter can be arbitrarily arranged in inventor according to their own needs The specific manifestation form of breath, e.g., the data obtained after face information is encrypted according to preset algorithm as identity information, This is without limitation.
S103, reading SIM card card information and obtain the identity information of user;
In the embodiment of the present application, it is preferred that when detect be provided with SIM card in mobile terminal when, read the movement end The card information of SIM card in end, and obtain the identity information of user.
S104, it is not inconsistent when the identity information prestored in the identity information and mobile terminal of the user got, or reads To card information and mobile terminal in the card information that prestores be not inconsistent when, forbid executing movement corresponding with operational order.
In the embodiment of the present application, it is preferred that forbidding the process for executing movement corresponding with operational order includes: when operation When instruction includes starting up's instruction, forbid executing boot action corresponding with starting up's instruction;When operational order include to When machine wake up instruction, forbid executing standby wakeup movement corresponding with standby wakeup instruction.
The application provides a kind of anti-theft method for mobile terminal, by the operational order (operational order for receiving user's input Including starting up's instruction or standby wakeup instruction);When detect prestored in mobile terminal it is legal with mobile terminal binding When being provided with SIM card in the identity information of user and the card information for the legal SIM card bound with identity information and mobile terminal, The card information of reading SIM card and the identity information for obtaining user;When pre- in the identity information and mobile terminal of the user got The identity information deposited is not inconsistent, or when the card information prestored in the card information and mobile terminal read is not inconsistent, forbid executing with The mode of the corresponding movement of operational order effectively prevents using user illegal when current mobile terminal, or when Forward When SIM card in dynamic terminal is illegal, the case where mobile terminal execution is with aforesaid operations instruction corresponding movement, and then effectively protect The safety of data in mobile terminal is demonstrate,proved.
On the basis of a kind of anti-theft method for mobile terminal as shown in Figure 1 that the embodiment of the present application one provides, further It include: the card letter that the identity information prestored in the identity information and mobile terminal for work as the user got is not inconsistent, or reads When the card information prestored in breath and mobile terminal is not inconsistent, forbid executing movement corresponding with the deletion instruction received, deletion refers to Order includes: that the identity information and/or card information prestored in mobile terminal is deleted in instruction.
In the embodiment of the present application, it is preferred that when receiving the deletion instruction of user's input, need to judge that mobile terminal is worked as Preceding status.This judge mobile terminal be presently in the mode of state for judge the whether normally-open mobile terminal of user and/ Or standby wakeup mobile terminal, it is, judging in above-mentioned steps S104 whether to be " identity information of the user got and shifting The identity information prestored in dynamic terminal is not inconsistent, or the card information prestored in the card information and mobile terminal read is not inconsistent " State, when being, then it represents that forbid executing movement corresponding with operational order, also mean that, user fails normally-open movement Terminal and/or normal Standby wake up mobile terminal, then at this point, then forbidding executing corresponding with the deletion instruction received dynamic Make.
In the embodiment of the present application, pass through the setting " body prestored in the identity information and mobile terminal of the user got Part information is not inconsistent, or the card information prestored in the card information and mobile terminal read is not inconsistent, and forbids executing and receive It deletes and instructs corresponding movement, deleting instruction includes: that the identity information and/or card information prestored in mobile terminal is deleted in instruction." Step, ensure that the safety of the identity information and SIM card information that prestore in mobile terminal, and then further improve mobile whole The safety of data in end.
Fig. 2 is another anti-theft method for mobile terminal flow chart that the embodiment of the present application one provides.
As shown in Fig. 2, this method comprises:
S201, the operational order for receiving user's input, operational order include starting up's instruction or standby wakeup instruction;
S202, it is prestored in mobile terminal and the identity information of the legitimate user of mobile terminal binding and and body when detecting When the card information of the legal SIM card of part information binding, detect in mobile terminal whether be provided with SIM card;It is mobile whole when detecting When being provided with SIM card in end, step S203 is executed;When detecting not set SIM card in mobile terminal, step S205 is executed;
S203, reading SIM card card information and obtain the identity information of user;
In the embodiment of the present application, it is preferred that when detect be provided with SIM card in mobile terminal when, read the movement end The card information of SIM card in end, and obtain the identity information of user.
S204, it is not inconsistent when the identity information prestored in the identity information and mobile terminal of the user got, or reads To card information and mobile terminal in the card information that prestores be not inconsistent when, forbid executing movement corresponding with operational order;
In the embodiment of the present application, it is preferred that step S201-S204 and execution side the step of above-mentioned steps S101-S104 Formula is identical, and the detailed process about step S201-S204 refers to above-mentioned steps S101-S104, it is not limited here.
S205, the identity information for obtaining user;
In the embodiment of the present application, it is preferred that when detecting not set SIM card in mobile terminal, then obtain user's Identity information.
S206, when the identity information prestored in the identity information of the user got and mobile terminal is not inconsistent, forbid holding Row movement corresponding with operational order.
Further, in a kind of anti-theft method for mobile terminal provided by the embodiments of the present application, further includes: when what is got When the identity information prestored in the identity information and mobile terminal of user is not inconsistent, forbid executing corresponding with the deletion instruction received Movement, deleting instruction includes: that the identity information and/or card information that prestore in mobile terminal are deleted in instruction.
Fig. 3 is another anti-theft method for mobile terminal flow chart that the embodiment of the present application one provides.
As shown in figure 3, this method comprises:
S301, the operational order for receiving user's input, operational order include starting up's instruction or standby wakeup instruction;
In the embodiment of the present application, it is preferred that step S301 is identical as the implementation procedure of above-mentioned steps S101, related step The detailed process of S301 refers to above-mentioned steps S101, does not do detailed restriction herein.
S302, it prestores in mobile terminal with the identity information of the legitimate user of mobile terminal binding and not when detecting When prestoring the card information of SIM card, the identity information of user is obtained;
In the embodiment of the present application, it is preferred that it is pointed in step S302 " when detect prestored in mobile terminal with The identity information of the legitimate user of mobile terminal binding and when not prestoring the card information of SIM card " in prestore in detection mobile terminal Information content (e.g., detect mobile terminal in whether be stored with identity information, card information and mobile terminal, identity information and Binding relationship between card information) it is identical as the content in above-mentioned steps S102, difference is that the result detected is different, on Stating the result detected in step S102 is " identity information with the legitimate user of mobile terminal binding to be prestored in mobile terminal With the card information for the legal SIM card bound with identity information ", and the result detected in step S302 is " to detect mobile whole The card information of SIM card is prestored with the identity information of the legitimate user of mobile terminal binding and not prestored in end ".
S303, when the identity information prestored in the identity information of the user got and mobile terminal is not inconsistent, forbid holding Row movement corresponding with operational order.
Fig. 4 is another anti-theft method for mobile terminal flow chart that the embodiment of the present application one provides.
S401, the operational order for receiving user's input, operational order include starting up's instruction or standby wakeup instruction;
In the embodiment of the present application, it is preferred that step S401 is identical as the implementation procedure of above-mentioned steps S101, related step The detailed process of S401 refers to above-mentioned steps S101, does not do detailed restriction herein.
S402, it prestores in mobile terminal with the card information of the legal SIM card of mobile terminal binding and not pre- when detecting When depositing the identity information of user, detect in mobile terminal whether be provided with SIM card;SIM is provided in mobile terminal when detecting When card, step S403 is executed;
In the embodiment of the present application, it is preferred that inventor can work as inspection in any setting steps S402 according to their own needs Mode of operation when not set SIM card in mobile terminal is measured, it is not limited here.
In the embodiment of the present application, it is preferred that it is pointed in step S402 " when detect prestored in mobile terminal with When the card information and the identity information of non-prestored user of the legal SIM card of mobile terminal binding " in detection mobile terminal in prestore Information content (e.g., detect mobile terminal in whether be stored with identity information, card information and mobile terminal, identity information and Binding relationship between card information) it is identical as the content in above-mentioned steps S102, difference is that the result detected is different, on Stating the result detected in step S102 is " identity information with the legitimate user of mobile terminal binding to be prestored in mobile terminal With the card information for the legal SIM card bound with identity information ", and the result detected in step S402 is " to detect mobile whole The identity information with the card information of the legal SIM card of mobile terminal binding and non-prestored user is prestored in end ".
The card information of S403, reading SIM card;
S404, when the card information prestored in the card information and mobile terminal read is not inconsistent, forbid execute refer to operation Enable corresponding movement.
Fig. 5 is another anti-theft method for mobile terminal flow chart that the embodiment of the present application one provides.
As shown in figure 5, this method comprises:
S501, the operational order for receiving user's input, operational order include starting up's instruction or standby wakeup instruction;
In the embodiment of the present application, it is preferred that step S501 is identical as the implementation procedure of above-mentioned steps S101, related step The detailed process of S501 refers to above-mentioned steps S101, does not do detailed restriction herein.
S502, when detecting the identity information of the card information and user that do not prestore SIM card in mobile terminal, display use The prompting message of identity information and/or card information is prestored in prompt user;
In the embodiment of the present application, it is preferred that pointed in step S502 " not prestored when detecting in mobile terminal When the card information of SIM card and the identity information of user " in detection mobile terminal prestored information content (e.g., detection movement The binding relationship whether being stored in terminal between identity information, card information and mobile terminal, identity information and card information) Identical as the content in above-mentioned steps S102, difference is that the result detected is different, detects in above-mentioned steps S102 As a result for " prestored in mobile terminal and the identity information of the legitimate user of mobile terminal binding and with identity information binding conjunction The card information of method SIM card ", and the result detected in step S402 is " to detect the card letter for not prestoring SIM card in mobile terminal Breath and the identity information of user ".
In the embodiment of the present application, it is preferred that when detecting card information and the user for not prestoring SIM card in mobile terminal Identity information when, display alarm information, the prompting message is for prompting user to prestore identity information and/or card information.
S503, the information for responding user prestore operation, generation prestored information, prestored information include: user identity information, Binding relationship information between the card information and mobile terminal of SIM card, the identity information of user and the card information of SIM card.
Further, in the anti-theft method for mobile terminal that the embodiment of the present application one provides, further includes: mobile eventually in detection In end on the basis of prestored information, with reference to the setting of user, to realize guarding against theft for mobile terminal scheme.Such as, in the embodiment of the present application In the anti-theft method for mobile terminal as shown in Figure 1 provided, prestored in mobile terminal and mobile terminal binding when detecting When the identity information of legitimate user and the card information for the legal SIM card bound with identity information, whether inquiry is previously provided with inspection Survey mode, when being previously provided with detection mode (e.g., which is only to verify to the identity of user), even if detection The legal SIM with the identity information of the legitimate user of mobile terminal binding and with identity information binding is prestored into mobile terminal The card information of card at this point, being also not required to judge whether be provided with SIM card in mobile terminal, and when being provided with SIM card, executes step Rapid S103-S104, but it is only necessary to obtain the identity information of user, and judge whether the identity information got is whole with movement The identity information prestored in end is not inconsistent, when the identity information prestored in the identity information and mobile terminal of the user got is not inconsistent When, forbid executing movement corresponding with operational order.
In the embodiment of the present application, it is preferred that mobile terminal includes: mobile phone, PDA (Personal Digital Assistant, palm PC) etc..Above is only the preferred embodiment of the embodiment of the present application, and inventor can be according to their own needs The specific manifestation form of any setting mobile terminal, it is not limited here.
A kind of anti-theft method for mobile terminal provided by the embodiments of the present application is further described by above-mentioned, so that this Shen Please embodiment provide a kind of anti-theft method for mobile terminal be more clear, completely, be convenient for those skilled in the art understand that.
Embodiment two:
Fig. 6 is a kind of structural schematic diagram for guarding against theft for mobile terminal device that the embodiment of the present application two provides.
As shown in fig. 6, the device includes:
Instruction receiving unit 1, for receive user input operational order, operational order include starting up instruction or to Machine wake up instruction;
Detection unit 2 detects the identity prestored in mobile terminal with the legitimate user of mobile terminal binding for working as When the card information of information and the legal SIM card bound with identity information, detect in mobile terminal whether be provided with SIM card;
Information acquisition unit 3, for when being provided with SIM card in mobile terminal, the card information of reading SIM card simultaneously to obtain use The identity information at family;
First execution unit 4, for when the identity information prestored in the identity information and mobile terminal of the user got It is not inconsistent, or when the card information prestored in the card information and mobile terminal read is not inconsistent, forbids executing corresponding with operational order Movement.
It further, further include the second execution list in a kind of guarding against theft for mobile terminal device provided by the embodiments of the present application Member, second execution unit, for not being inconsistent when the identity information prestored in the identity information and mobile terminal of the user got, Or the card information prestored in the card information and mobile terminal read forbids the deletion instruction pair for executing with receiving when not being inconsistent The movement answered, deleting instruction includes: that the identity information and/or card information prestored in mobile terminal is deleted in instruction.
It further, further include that third executes list in a kind of guarding against theft for mobile terminal device provided by the embodiments of the present application Member, the third execution unit, for obtaining the identity information of user when not set SIM card in mobile terminal;And when acquisition To user identity information and mobile terminal in the identity information that prestores be not inconsistent when, forbid executing move corresponding with operational order Make.
The application provides a kind of guarding against theft for mobile terminal device, by the operational order (operational order for receiving user's input Including starting up's instruction or standby wakeup instruction);When detect prestored in mobile terminal it is legal with mobile terminal binding When being provided with SIM card in the identity information of user and the card information for the legal SIM card bound with identity information and mobile terminal, The card information of reading SIM card and the identity information for obtaining user;When pre- in the identity information and mobile terminal of the user got The identity information deposited is not inconsistent, or when the card information prestored in the card information and mobile terminal read is not inconsistent, forbid executing with The mode of the corresponding movement of operational order effectively prevents using user illegal when current mobile terminal, or when Forward When SIM card in dynamic terminal is illegal, the case where mobile terminal execution is with aforesaid operations instruction corresponding movement, and then effectively protect The safety of data in mobile terminal is demonstrate,proved.
Each embodiment in this specification is described in a progressive manner, the highlights of each of the examples are with other The difference of embodiment, the same or similar parts in each embodiment may refer to each other.For device disclosed in embodiment For, since it is corresponded to the methods disclosed in the examples, so being described relatively simple, related place is said referring to method part It is bright.
The above is only the preferred embodiment of the application, make skilled artisans appreciate that or realization the application.It is right A variety of modifications of these embodiments will be apparent to one skilled in the art, general original as defined herein Reason can be realized in other embodiments without departing from the spirit or scope of the application.Therefore, the application will not Be intended to be limited to the embodiments shown herein, and be to fit to it is consistent with the principles and novel features disclosed in this article most Wide range.

Claims (8)

1. a kind of anti-theft method for mobile terminal characterized by comprising
The operational order of user's input is received, the operational order includes starting up's instruction or standby wakeup instruction;
When detect prestored in mobile terminal with the identity information of the legitimate user of the mobile terminal binding and with the body When the card information of the legal SIM card of part information binding, detect in the mobile terminal whether be provided with SIM card;
When being provided with SIM card in the mobile terminal, reads the card information of the SIM card and obtain the identity information of user;
When the identity information prestored in the identity information and the mobile terminal of the user got is not inconsistent, or read The card information and the mobile terminal in the card information that prestores when not being inconsistent, forbid executing move corresponding with the operational order Make;
When not set SIM card in the mobile terminal, this method further include:
Obtain the identity information of user;
When the identity information prestored in the identity information of the user got and the mobile terminal is not inconsistent, forbid executing Movement corresponding with the operational order.
2. the method according to claim 1, wherein identity information and the shifting as the user got The identity information prestored in dynamic terminal is not inconsistent, or the card information read and the card information prestored in the mobile terminal When not being inconsistent, this method further include:
Forbid executing movement corresponding with the deletion instruction received, the deletion instruction includes: that instruction deletes the movement eventually The identity information and/or card information prestored in end.
3. the method according to claim 1, wherein identity information and the shifting as the user got When the identity information prestored in dynamic terminal is not inconsistent, this method further include:
Forbid executing movement corresponding with the deletion instruction received, the deletion instruction includes: that instruction deletes the movement eventually The identity information and/or card information prestored in end.
4. the method according to claim 1, wherein being prestored in mobile terminal with the movement eventually when detecting When holding the identity information of the legitimate user of binding and not prestoring the card information of SIM card, this method further include:
Obtain the identity information of user;
When the identity information prestored in the identity information of the user got and the mobile terminal is not inconsistent, forbid executing Movement corresponding with the operational order.
5. the method according to claim 1, wherein being prestored in mobile terminal with the movement eventually when detecting When holding the card information and the identity information of non-prestored user of the legal SIM card of binding, this method further include:
It detects in the mobile terminal and whether is provided with SIM card;
When being provided with SIM card in the mobile terminal, the card information of the SIM card is read;
When the card information prestored in the card information and the mobile terminal read is not inconsistent, forbid executing and the operation Instruct corresponding movement.
6. the method according to claim 1, wherein when detecting the card letter for not prestoring SIM card in mobile terminal When breath and the identity information of user, this method further include:
Display is for prompting user to prestore the prompting message of identity information and/or card information;
The information of response user prestores operation, generates prestored information, the prestored information includes: the identity information of user, SIM card Card information and the mobile terminal, the identity information of user and the card information of SIM card between binding relationship information.
7. a kind of guarding against theft for mobile terminal device characterized by comprising
Instruction receiving unit, for receive user input operational order, the operational order include starting up instruction or to Machine wake up instruction;
Detection unit, for when detect prestored in mobile terminal and the identity of the legitimate user of the mobile terminal binding believe When breath and the card information for the legal SIM card bound with the identity information, detect in the mobile terminal whether be provided with SIM Card;
Information acquisition unit, for when being provided with SIM card in the mobile terminal, reading the card information of the SIM card and obtaining Take the identity information at family;
First execution unit, for believing when the identity prestored in the identity information and the mobile terminal of the user got Breath is not inconsistent, or when the card information prestored in the card information read and the mobile terminal is not inconsistent, and forbids executing and institute State the corresponding movement of operational order;
Third execution unit, for obtaining the identity information of user when not set SIM card in the mobile terminal;And work as When the identity information prestored in the identity information of the user got and the mobile terminal is not inconsistent, forbid executing with it is described The corresponding movement of operational order.
8. device according to claim 7, which is characterized in that it further include the second execution unit,
Second execution unit, for when the body prestored in the identity information and the mobile terminal of the user got Part information is not inconsistent, or when the card information read and the card information prestored in the mobile terminal are not inconsistent, forbids executing Movement corresponding with the deletion instruction received, the deletion instruction include: that the body prestored in the mobile terminal is deleted in instruction Part information and/or card information.
CN201510287466.9A 2015-05-29 2015-05-29 A kind of anti-theft method for mobile terminal and device Active CN105657147B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510287466.9A CN105657147B (en) 2015-05-29 2015-05-29 A kind of anti-theft method for mobile terminal and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510287466.9A CN105657147B (en) 2015-05-29 2015-05-29 A kind of anti-theft method for mobile terminal and device

Publications (2)

Publication Number Publication Date
CN105657147A CN105657147A (en) 2016-06-08
CN105657147B true CN105657147B (en) 2019-10-11

Family

ID=56481613

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510287466.9A Active CN105657147B (en) 2015-05-29 2015-05-29 A kind of anti-theft method for mobile terminal and device

Country Status (1)

Country Link
CN (1) CN105657147B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108307674B (en) * 2016-12-02 2020-06-16 华为技术有限公司 Method and equipment for guaranteeing terminal safety
CN106507334A (en) * 2016-12-30 2017-03-15 维沃移动通信有限公司 A kind of identity identifying method and mobile terminal
CN106791171B (en) * 2017-01-16 2020-03-24 北京安云世纪科技有限公司 Card locking method and device of mobile terminal and mobile terminal
CN108134995A (en) * 2017-04-26 2018-06-08 黄策 The validity management method of the separation between machine and card type network terminal
CN107169384A (en) * 2017-05-15 2017-09-15 上海与德科技有限公司 A kind of guard method and system based on mobile terminal

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7031665B1 (en) * 1999-04-12 2006-04-18 Anders Trell Trust Method and device for utilization of mobile radio telephones for surveillance and/or control purposes
CN102231882A (en) * 2011-07-08 2011-11-02 康佳集团股份有限公司 Method and device for obtaining information in lost mobile communication terminal
CN102354353A (en) * 2011-09-27 2012-02-15 宇龙计算机通信科技(深圳)有限公司 Method for acquiring data and terminal
CN103607697A (en) * 2013-11-27 2014-02-26 宇龙计算机通信科技(深圳)有限公司 Terminal anti-theft method and system based on SIM card

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7031665B1 (en) * 1999-04-12 2006-04-18 Anders Trell Trust Method and device for utilization of mobile radio telephones for surveillance and/or control purposes
CN102231882A (en) * 2011-07-08 2011-11-02 康佳集团股份有限公司 Method and device for obtaining information in lost mobile communication terminal
CN102354353A (en) * 2011-09-27 2012-02-15 宇龙计算机通信科技(深圳)有限公司 Method for acquiring data and terminal
CN103607697A (en) * 2013-11-27 2014-02-26 宇龙计算机通信科技(深圳)有限公司 Terminal anti-theft method and system based on SIM card

Also Published As

Publication number Publication date
CN105657147A (en) 2016-06-08

Similar Documents

Publication Publication Date Title
CN105657147B (en) A kind of anti-theft method for mobile terminal and device
EP3314493B1 (en) Method and apparatus for enabling the touchscreen display of a mobile device
CN103079000B (en) Method and device for terminal unlocking
US9313321B2 (en) Screen unlocking method and device for mobile terminal
KR102005110B1 (en) Mobile device to detect unexpected behaviour
CN103092484B (en) The method of unlock screen, device and terminal
CN102413221B (en) Method for protecting privacy information and mobile terminal
JP2015130182A (en) Mobile device, security lock control method thereof, and program
EP2159727B1 (en) Securing a device based on atypical user behavior
CN103020553B (en) A kind of guarding against theft for mobile terminal guard method
CN101895633A (en) Mobile terminal and unlocking method thereof
CN103139354A (en) Method and device for unlocking cell phone
CN103324874A (en) Verification method and electronic device
CN104038613A (en) Method and apparatus for information security management
CN102799336A (en) Method, device and mobile terminal for unlocking touch screens
CN108537058A (en) The polygonal color application method and device, computer readable storage medium, terminal of terminal
CN105120062A (en) Communication establishing method and mobile terminal
CN104184874A (en) Method for switching mobile phone modes based on multiple unlocking conditions, and mobile phone thereof
CN103974249A (en) Communication method based on verification information and equipment thereof
CN105069344B (en) mobile terminal locking method and device
CN104134024A (en) Mobile terminal privacy protection method and system
CN108959868A (en) A kind of booting computer method, apparatus and computer
CN104462929A (en) Privacy protection method and device for mobile equipment
CN104392158A (en) Mobile terminal unlocking method and mobile terminal
CN103809897B (en) Terminal device and its control method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant