CN105827817A - Alarm method and mobile terminal - Google Patents

Alarm method and mobile terminal Download PDF

Info

Publication number
CN105827817A
CN105827817A CN201510863910.7A CN201510863910A CN105827817A CN 105827817 A CN105827817 A CN 105827817A CN 201510863910 A CN201510863910 A CN 201510863910A CN 105827817 A CN105827817 A CN 105827817A
Authority
CN
China
Prior art keywords
mobile terminal
user
identification
information
operational order
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510863910.7A
Other languages
Chinese (zh)
Inventor
邓伟成
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201510863910.7A priority Critical patent/CN105827817A/en
Publication of CN105827817A publication Critical patent/CN105827817A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Telephone Function (AREA)

Abstract

The invention provides an alarm method and a mobile terminal, and relates to the field of communications. The invention solves the problem that when the mobile terminal is lost, the position information of the mobile terminal cannot be timely acquired. The alarm method comprises the steps of receiving an operation instruction input by a user; if the operation instruction is a startup instruction, recognizing the identify of the user when the mobile terminal is in a working state; if the operation instruction is a shutdown instruction, recognizing the identify of the user before the mobile terminal executes the shutdown instruction; when the number of failed identity recognition operations reaches a preset value, sending out the alarm information, wherein the alarm information includes the location information of the mobile terminal. The technical scheme of the invention is mainly applied to the loss-preventing technology of the mobile terminal.

Description

Alarm method and mobile terminal
Technical field
The present embodiments relate to the communications field, and more particularly, to a kind of alarm method and mobile terminal.
Background technology
Mobile terminal has become as essential communication apparatus in people's daily life.Mobile terminal saves all more important personal information of user, once mobile terminal is stolen or loses, daily life can be caused serious inconvenience;If the information leakage such as personal information, evidence for payment is then it is also possible to cause heavy losses to personal property.
Prior art provides the method that mobile terminal is anti-lost.But, in the prior art, if mobile terminal is lost, owner can not find that mobile terminal is lost timely, then utilize the scheme of prior art cannot obtain the positional information of mobile terminal timely.
Summary of the invention
The embodiment of the present invention provides a kind of alarm method and mobile terminal, in order to the problem solving can not obtain location information of mobile terminal in time after mobile terminal is lost.
First aspect, it is provided that a kind of alarm method, described method is applied to mobile terminal, and described method includes:
Receive the operational order of user's input;
If described operational order is start-up command, then when described mobile terminal is in running order, described user is carried out identification;If described operational order is shutdown command, then before described mobile terminal performs shutdown command, described user is carried out identification;
When the number of times that identification is failed reaches preset value, alert, described warning message includes the positional information of described mobile terminal.
Second aspect, it is provided that a kind of mobile terminal, including:
Receiver module, for receiving the operational order of user's input;
Processing module, for when described operational order is start-up command, carries out identification when described mobile terminal is in running order to described user;When the described operational order of fruit is shutdown command, before described mobile terminal performs shutdown command, described user is carried out identification;
Sending module, is used for when the number of times that identification is failed reaches preset value, alert, includes the positional information of described mobile terminal at described warning message.
So, in the embodiment of the present invention, if mobile terminal is lost, when mobile terminal is in running order, user can be carried out identification when the operational order of the active user of mobile terminal is start-up command;When the operational order of the active user of mobile terminal is shutdown command, before mobile terminal performs shutdown command, user is carried out identification.If identification failure, send warning message, include the positional information of described mobile terminal at described warning message.As seen from the above, utilize the scheme of the embodiment of the present invention, if user has carried out start or power-off operation to mobile terminal after mobile terminal is lost, and user identity identification failure, location information of mobile terminal can be obtained timely, find that mobile terminal loss just removes to obtain the positional information of mobile terminal without owner by the time.
Accompanying drawing explanation
In order to be illustrated more clearly that the technical scheme of the embodiment of the present invention, the accompanying drawing used required in embodiment or description of the prior art will be briefly described below, apparently, accompanying drawing in describing below is only some embodiments of the present invention, for those of ordinary skill in the art, on the premise of not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the flow chart of the information processing method of first embodiment of the invention;
Fig. 2 is the flow chart of the information processing method of second embodiment of the invention;
Fig. 3 is the schematic diagram of the mobile terminal of third embodiment of the invention;
Fig. 4 is the schematic diagram of the mobile terminal of fourth embodiment of the invention.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is a part of embodiment of the present invention rather than whole embodiments.Based on the embodiment in the present invention, the every other embodiment that those of ordinary skill in the art are obtained under not making creative work premise, broadly fall into the scope of protection of the invention.
First embodiment
As it is shown in figure 1, the alarm method of first embodiment of the invention, it is applied to mobile terminal, including:
Step 11, the operational order of reception user's input.
In actual applications, the user of mobile terminal can carry out various operation to mobile terminal.But, generally, after mobile terminal is stolen or loses, first mobile terminal user now can expect mobile terminal is carried out power-off operation;If or now mobile terminal has been switched off, user is if it is desired to use mobile terminal then terminal can be booted up operation.Therefore, operational order in embodiments of the present invention generally refers to user to the start-up command of mobile terminal or shutdown command.
In a particular application, mobile terminal can be shut down by user by the shutdown software in normal shutdown mode that mobile terminal provides or mobile terminal.Such as user can grow by closing key, and selects to carry out power-off operation according to the prompting of mobile terminal.Now, be equivalent to user and have input shutdown command to mobile terminal.In embodiments of the present invention, the shutdown command that user sends in this way is referred to as normal shutdown instruction.Or, the battery of mobile terminal also directly can be taken off and be shut down by mobile terminal by user.Now, also correspond to user and have input shutdown command to mobile terminal.In embodiments of the present invention, shutdown command user sent in this way is referred to as abnormal shutdown command.
If step 12 operational order is start-up command, then when mobile terminal is in running order, user is carried out identification;If operational order is shutdown command, then before mobile terminal performs shutdown command, user is carried out identification.
In embodiments of the present invention, according to the difference of operational order, the opportunity that user carries out identification is different.If operational order is start-up command, then when mobile terminal is in running order, user is carried out identification.If operational order is shutdown command, then before mobile terminal performs shutdown command, user is carried out identification.But whether operational order is shutdown command or start-up command, the process that user carries out identification is all identical.
Concrete, in this step, when user is carried out identification, first can obtain store in mobile terminal or the default identity identification information of high in the clouds storage according to operational order, obtain the identity identification information of user simultaneously.Then, the identity identification information of default identity identification information and user is mated.Identification success when the matching degree of default identity identification information and the identity identification information of user meets pre-conditioned, to user;The otherwise identification failure to user.Wherein, the default identity identification information in mobile terminal can be the identity identification information of owner, it is also possible to be the identity identification information of that specified by owner or arbitrarily selected all other men.
In a particular application, identification can include fingerprint recognition, eyeprint identification etc..Wherein, eyeprint identification is the uniqueness that make use of sclera (the namely white of the eye) upper vascular lake distribution.Although the eyeball of people can be because allergy, seeing red or the situation such as be still drank after a night of staying up late occurs congested situation, but these can't affect blood vessel arrangement on iris, thus eyeprint is adapted to do bio-identification.
As a example by user is carried out eyeprint identification, in a particular application, the owner of mobile terminal can be previously stored its eyeprint information.Then eyeprint information can be stored in high in the clouds or mobile terminal itself by the photographic head shooting of mobile terminal its eyeprint information lower by such as owner.In order to ensure the safety of eyeprint information, owner is typically eyeprint information is stored in mobile terminal itself.
When mating, owner's eyeprint information that is that first mobile terminal obtains itself storage or that store beyond the clouds.If on mobile terminal, mobile terminal can directly read its memory module can obtain owner's eyeprint information.If on high in the clouds, mobile terminal can send request message to high in the clouds, and to high in the clouds, request obtains the owner's eyeprint information corresponding to this mobile terminal.Then the response message sent by high in the clouds obtains owner's eyeprint information.Preferably, in this manner, for further enhancing safety, high in the clouds can return owner's eyeprint information of encryption to mobile terminal, and it is decrypted after receiving owner's eyeprint information of encryption by mobile terminal can obtain owner's eyeprint information.Cipher mode between mobile terminal and high in the clouds can use any one cipher mode to realize, as long as mobile terminal can decipher the information that high in the clouds returns.
Meanwhile, start the photographic head of mobile terminal, obtained the eyeprint information of user by the photographic head of mobile terminal.Then, the eyeprint information of owner's eyeprint information and user is mated.When the matching degree of owner's eyeprint information and the eyeprint information of user meets pre-conditioned, it is believed that the eyeprint identification success to user;Otherwise it is assumed that the eyeprint recognition failures to user.
In a particular application, above-mentioned pre-conditioned can arbitrarily arrange, such as, can be matching degree threshold value.Such as, when the matching degree of owner's eyeprint information and the eyeprint information of user is more than 95%, it is believed that the match is successful for the two, otherwise it is assumed that it fails to match.
Step 13, when the number of times that identification is failed reaches preset value, alert, include the positional information of mobile terminal at warning message.
In a particular application, this preset value can arbitrarily be arranged, such as, be set to 1 time or for repeatedly.So, when the number of times that identification is failed reaches preset value, the positional information obtaining mobile terminal and the warning contact method pre-set, then send warning message according to warning contact method, include the positional information of mobile terminal at warning message.Wherein this warning contact method can be the contact method of owner, or the contact method etc. of any one individual specified by owner.Wherein this warning message can be to send alarm sound, and sends the warning message of the positional information including mobile terminal.
As a example by eyeprint identification in step 12, when the number of times of eyeprint recognition failures reaches this preset value, by the positioning function of mobile terminal itself being obtained the positional information of mobile terminal, and obtain owner's contact method that owner pre-sets.Wherein, owner's contact method can be stored in advance in the data base of mobile terminal, or can also be stored in an encrypted document of mobile terminal.This owner's contact method can include the cell-phone number of owner, name, mailbox etc..
Then, send warning message according to owner's contact method to owner, include the positional information of mobile terminal in warning.Additionally, the information of the user in order to further understand mobile terminal, this warning message be may also include photo of user of being shot by the photographic head of mobile terminal etc..
As seen from the above, in the embodiment of the present invention, if mobile terminal is lost, when mobile terminal is in running order, user can be carried out identification when the operational order of the active user of mobile terminal is start-up command;When the operational order of the active user of mobile terminal is shutdown command, before mobile terminal performs shutdown command, user is carried out identification.If identification failure, send warning message, include the positional information of mobile terminal at warning message.Therefore, utilize the scheme of the embodiment of the present invention, if user has carried out start or power-off operation to mobile terminal after mobile terminal is lost, and user identity identification failure, location information of mobile terminal can be obtained timely, find that mobile terminal loss just removes to obtain the positional information of mobile terminal without owner by the time.
Second embodiment
In a second embodiment, process is realized by identification for describe alarm method as a example by eyeprint identification.Assume that user has carried out power-off operation to mobile terminal in this embodiment.
As in figure 2 it is shown, the alarm method of the embodiment of the present invention two, it is applied to mobile terminal, including:
Eyeprint information and owner's contact method are stored in the terminal by step 21, the owner of mobile terminal.
Step 22, receive user's shutdown command to mobile terminal of mobile terminal.
Step 23, determine the type of shutdown command.If normal shutdown, then perform step 24-215;If abnormal shutdown, then perform step 216-221.
Wherein the detailed process of step 21-23 can refer to the description of first embodiment.
Step 24, user is carried out eyeprint identification.
Concrete, in this step, obtain owner's eyeprint information of storage in mobile terminal according to shutdown command, obtained the eyeprint information of user by the photographic head of mobile terminal, then the eyeprint information of owner's eyeprint information and user is mated.
Step 25, in embodiments of the present invention, when the matching degree of owner's eyeprint information and the eyeprint information of user is more than 95%, it is believed that the identification success to user's eyeprint.If identifying successfully, then perform step 29-215;Otherwise perform step 26.
Step 26, determine whether the number of times to user's eyeprint recognition failures meets preset requirement.
In this embodiment, described preset requirement can be setting value.That is, can determine that whether the number of times to user's eyeprint identification reaches setting value in this step.If reaching setting value, then perform step 27-28, otherwise return step 24.Wherein this setting value can arbitrarily be arranged, and may be configured as 2 in this embodiment.
Certainly, in embodiments of the present invention, even if being provided with setting value, it is possible to the number of times at recognition failures reaches to be carried out step 27-28 during certain preset value, wherein this setting value is more than this preset value.It is assumed that certain setting value is set to 5, then just can perform step 27-28 when determining when the number of times to user's eyeprint identification reaches 3 times.
Step 27, the positional information obtaining mobile terminal and the owner's contact method pre-set, send warning message according to owner's contact method to owner, include the positional information of mobile terminal at warning message.
Step 28, mobile terminal switching to false off-mode, wherein false off-mode refers to mobile terminal sleep and can not be waken up state.
In embodiments of the present invention, when mobile terminal is in false off-mode, mobile terminal will not display to the user that any information or user is carried out any prompting.Such as, now the screen of mobile terminal is closed, for incoming call or note, application program the information mobile terminal such as notice all without user is pointed out, in terms of user perspective, the state of mobile terminal is consistent with mobile terminal off-mode information.But mobile terminal still can obtain the positional information of mobile device, and can perform to take pictures action on backstage, obtain current user information.
Step 29, to mobile terminal shut down.
Step 210, the off-mode information of memory mobile terminal.
Here, the off-mode information of mobile terminal is stored as normal shutdown.
Step 211, reception user's start-up command to mobile terminal.
Step 212, user is carried out eyeprint identification.
Step 213, in embodiments of the present invention, when the matching degree of owner's eyeprint information and the eyeprint information of user is more than 95%, it is believed that the identification success to user's eyeprint.If identifying successfully, then normally enter the system of mobile terminal, otherwise perform step 214.
Step 214, determine whether the number of times to user's eyeprint recognition failures meets preset requirement.
In this embodiment, described preset requirement can be setting value.That is, can determine that whether the number of times to user's eyeprint identification reaches setting value in this step.If reaching setting value, then perform step 215, otherwise return step 212.Wherein this setting value can arbitrarily be arranged, and may be configured as 2 in this embodiment.
Certainly, in embodiments of the present invention, even if being provided with setting value, it is possible to the number of times at recognition failures reaches to be carried out step 215 during certain preset value, wherein this setting value is more than this preset value.It is assumed that certain setting value is set to 5, then just can perform step 215 when determining when the number of times to user's eyeprint identification reaches 3 times.
Step 215, send warning message to the owner of mobile terminal, include the positional information of mobile terminal at warning message.Meanwhile, mobile terminal is set to guest mode.Wherein, under guest mode, this mobile terminal can be regarded as a brand-new terminal, and now, user cannot obtain any information of owner.Such as, the system that the system of mobile terminal is arranged under guest mode when can be to dispatch from the factory is arranged.
Step 216, the off-mode information of memory mobile terminal.
Step 217, receive user's start-up command to mobile terminal.
Step 218, according to start-up command, user is carried out eyeprint identification.
Step 219, in embodiments of the present invention, when the matching degree of owner's eyeprint information and the eyeprint information of user is more than 95%, it is believed that the identification success to user's eyeprint.When identifying successfully, normally enter the system of mobile terminal;Step 220 is performed when recognition failures.
Step 220, determine whether the number of times to user's eyeprint recognition failures meets preset requirement.
In this embodiment, described preset requirement can be setting value.That is, can determine that whether the number of times to user's eyeprint identification reaches setting value in this step.If reaching setting value, then perform step 221, otherwise return step 218.Wherein this setting value can arbitrarily be arranged, and may be configured as 2 in this embodiment.
Certainly, in embodiments of the present invention, even if being provided with setting value, it is possible to the number of times at recognition failures reaches to be carried out step 221 during certain preset value, wherein this setting value is more than this preset value.It is assumed that certain setting value is set to 5, then just can perform step 221 when determining when the number of times to user's eyeprint identification reaches 3 times.
Step 221, send warning message to the owner of mobile terminal, include the positional information of mobile terminal at warning message.Meanwhile, arranging mobile terminal makes mobile terminal present guest mode to user.Wherein, under guest mode, this mobile terminal can be regarded as a brand-new terminal, and now, user cannot obtain any information of owner.
As seen from the above, in the embodiment of the present invention, if mobile terminal is lost, when mobile terminal is in running order, user can be carried out identification when the operational order of the active user of mobile terminal is start-up command;When the operational order of the active user of mobile terminal is shutdown command, before mobile terminal performs shutdown command, user is carried out identification.If identification failure, send warning message, include the positional information of mobile terminal at warning message.Therefore, utilize the scheme of the embodiment of the present invention, if user has carried out start or power-off operation to mobile terminal after mobile terminal is lost, and user identity identification failure, location information of mobile terminal can be obtained timely, find that mobile terminal loss just removes to obtain the positional information of mobile terminal without owner by the time.
And in embodiments of the present invention, mobile terminal can be placed in false off-mode or guest mode when the number of times that user carries out eyeprint recognition failures meets preset requirement, thus prevent the destruction to mobile terminal, further ensure the safety of user information in mobile terminal.
3rd embodiment
Fig. 3 is the block diagram of the mobile terminal of third embodiment of the invention.Mobile terminal 30 shown in Fig. 3 includes: receiver module 31, processing module 32, sending module 33.
Wherein, receiver module 31, for receiving the operational order of user's input;Processing module 32, for when operational order is start-up command, carries out identification when mobile terminal is in running order to user;When fruit operational order is shutdown command, before mobile terminal performs shutdown command, user is carried out identification;Sending module 33, is used for when the number of times that identification is failed reaches preset value, alert, includes the positional information of mobile terminal at warning message.
Wherein, processing module 32 comprises the steps that the first acquisition submodule, for obtaining store in mobile terminal or the default identity identification information of high in the clouds storage according to operational order;Second obtains submodule, for obtaining the identity identification information of user;Process submodule, for being mated by the identity identification information of default identity identification information and user;Identification success when the matching degree of default identity identification information and the identity identification information of user meets pre-conditioned, to user;The otherwise identification failure to user.
In order to improve the safety of mobile terminal, it is ensured that data safety in mobile terminal, when operational order is shutdown command, processing module 32 is additionally operable to, and mobile terminal switches to false off-mode, and false off-mode is dormancy and can not be waken up state.Or, processing module 32 is additionally operable to, and when operational order is shutdown command, mobile terminal is switched to guest mode.Wherein the implication of false off-mode and guest mode can refer to the description of preceding method embodiment.
In a particular application, sending module 33 comprises the steps that acquisition of information submodule, is used for when the number of times that identification is failed reaches preset value, the positional information obtaining mobile terminal and the warning contact method pre-set;Information sends submodule, for sending warning message according to warning contact method, includes the positional information of mobile terminal at warning message.
Mobile terminal 30 is capable of each process that in the embodiment of the method for Fig. 1 to Fig. 2, mobile terminal realizes, and for avoiding repeating, repeats no more here.
As seen from the above, in the embodiment of the present invention, if mobile terminal is lost, when mobile terminal is in running order, user can be carried out identification when the operational order of the active user of mobile terminal is start-up command;When the operational order of the active user of mobile terminal is shutdown command, before mobile terminal performs shutdown command, user is carried out identification.If identification failure, send warning message, include the positional information of mobile terminal at warning message.Therefore, utilize the scheme of the embodiment of the present invention, if user has carried out start or power-off operation to mobile terminal after mobile terminal is lost, and user identity identification failure, location information of mobile terminal can be obtained timely, find that mobile terminal loss just removes to obtain the positional information of mobile terminal without owner by the time.
And in embodiments of the present invention, mobile terminal can be placed in false off-mode or guest mode when the number of times that user carries out eyeprint recognition failures meets preset requirement, thus prevent the destruction to mobile terminal, further ensure the safety of user information in mobile terminal.
4th embodiment
Fig. 4 is the block diagram of the mobile terminal of fourth embodiment of the invention.Mobile terminal 400 shown in Fig. 4 includes: at least one processor 401, memorizer 402, at least one network interface 404 and other user interfaces 403.Each assembly in mobile terminal 400 is coupled by bus system 405.It is understood that bus system 405 is for realizing the connection communication between these assemblies.Bus system 405, in addition to including data/address bus, also includes power bus, controls bus and status signal bus in addition.But for the sake of understanding explanation, in the diagram various buses are all designated as bus system 405.
Wherein, user interface 403 can include display, keyboard or pointing device (such as, mouse, trace ball (trackball), touch-sensitive plate or touch screen etc..
The memorizer 402 being appreciated that in the embodiment of the present invention can be volatile memory or nonvolatile memory, maybe can include volatibility and nonvolatile memory.Wherein, nonvolatile memory can be read only memory (Read-OnlyMemory, ROM), programmable read only memory (ProgrammableROM, PROM), Erasable Programmable Read Only Memory EPROM (ErasablePROM, EPROM), Electrically Erasable Read Only Memory (ElectricallyEPROM, EEPROM) or flash memory.Volatile memory can be random access memory (RandomAccessMemory, RAM), and it is used as External Cache.nullBy exemplary but be not restricted explanation,The RAM of many forms can use,Such as static RAM (StaticRAM,SRAM)、Dynamic random access memory (DynamicRAM,DRAM)、Synchronous Dynamic Random Access Memory (SynchronousDRAM,SDRAM)、Double data speed synchronous dynamic RAM (DoubleDataRateSDRAM,DDRSDRAM)、Enhancement mode Synchronous Dynamic Random Access Memory (EnhancedSDRAM,ESDRAM)、Synchronized links dynamic random access memory (SynchlinkDRAM,And direct rambus random access memory (DirectRambusRAM SLDRAM),DRRAM).The memorizer 402 of system and method described herein is intended to include but not limited to these and the memorizer of other applicable type any.
In some embodiments, memorizer 402 stores following element, executable module or data structure, or their subset, or their superset: operating system 4021 and application program 4022.
Wherein, operating system 4021, comprise various system program, such as ccf layer, core library layer, driving layer etc., be used for realizing various basic business and processing hardware based task.Application program 4022, comprises various application program, and such as media player (MediaPlayer), browser (Browser) etc., be used for realizing various applied business.The program realizing embodiment of the present invention method may be embodied in application program 4022.
In embodiments of the present invention, by calling program or the instruction of memorizer 402 storage, concrete, can be program or the instruction of storage in application program 4022, processor 401 is for receiving the operational order of user's input;If operational order is start-up command, then when mobile terminal is in running order, user is carried out identification;If operational order is shutdown command, then before mobile terminal performs shutdown command, user is carried out identification;When the number of times that identification is failed reaches preset value, alert, the positional information of mobile terminal is included at warning message
The method that the invention described above embodiment discloses can apply in processor 401, or is realized by processor 401.Processor 401 is probably a kind of IC chip, has the disposal ability of signal.During realizing, each step of said method can be completed by the instruction of the integrated logic circuit of the hardware in processor 401 or software form.Above-mentioned processor 401 can be general processor, digital signal processor (DigitalSignalProcessor, DSP), special IC (ApplicationSpecificIntegratedCircuit, ASIC), ready-made programmable gate array (FieldProgrammableGateArray, FPGA) or other PLDs, discrete gate or transistor logic, discrete hardware components.Can realize or perform disclosed each method, step and the logic diagram in the embodiment of the present invention.The processor etc. that general processor can be microprocessor or this processor can also be any routine.Hardware decoding processor can be embodied directly in conjunction with the step of the method disclosed in the embodiment of the present invention to have performed, or combine execution by the hardware in decoding processor and software module and complete.Software module may be located at random access memory, flash memory, read only memory, in the storage medium that this area such as programmable read only memory or electrically erasable programmable memorizer, depositor is ripe.This storage medium is positioned at memorizer 402, and processor 401 reads the information in memorizer 402, completes the step of said method in conjunction with its hardware.
It is understood that embodiments described herein can realize by hardware, software, firmware, middleware, microcode or a combination thereof.Hardware is realized, processing unit can be implemented in one or more special IC (ApplicationSpecificIntegratedCircuits, ASIC), digital signal processor (DigitalSignalProcessing, DSP), digital signal processing appts (DSPDevice, DSPD), programmable logic device (ProgrammableLogicDevice, PLD), field programmable gate array (Field-ProgrammableGateArray, FPGA), general processor, controller, microcontroller, microprocessor, in other electronic unit performing the application function or a combination thereof.
Software is realized, technology herein can be realized by the module (such as process, function etc.) performing function herein.Software code is storable in performing in memorizer and by processor.Memorizer can within a processor or realize outside processor.
Alternatively, processor 401, when user is carried out identification, is used for: obtain store in mobile terminal or the default identity identification information of high in the clouds storage;Obtain the identity identification information of user;The identity identification information of default identity identification information and user is mated;Identification success when the matching degree of default identity identification information and the identity identification information of user meets pre-conditioned, to user;The otherwise identification failure to user.
Alternatively, as another embodiment, processor 401 is additionally operable to when operational order is shutdown command, and mobile terminal switches to false off-mode, and false off-mode is dormancy and can not be waken up state.
Alternatively, as another embodiment, processor 401 is additionally operable to, when operational order is shutdown command, mobile terminal be switched to guest mode.
Alternatively, processor 401 is when the number of times that identification is failed reaches preset value, alert, when warning message includes the positional information of mobile terminal, it is additionally operable to: when the number of times that identification is failed reaches preset value, the positional information obtaining mobile terminal and the warning contact method pre-set;Send warning message according to warning contact method, include the positional information of mobile terminal at warning message.
Mobile terminal 400 is capable of each process that in previous embodiment, mobile terminal realizes, and for avoiding repeating, repeats no more here.
As seen from the above, in the embodiment of the present invention, if mobile terminal is lost, when mobile terminal is in running order, user can be carried out identification when the operational order of the active user of mobile terminal is start-up command;When the operational order of the active user of mobile terminal is shutdown command, before mobile terminal performs shutdown command, user is carried out identification.If identification failure, send warning message, include the positional information of mobile terminal at warning message.Therefore, utilize the scheme of the embodiment of the present invention, if user has carried out start or power-off operation to mobile terminal after mobile terminal is lost, and user identity identification failure, location information of mobile terminal can be obtained timely, find that mobile terminal loss just removes to obtain the positional information of mobile terminal without owner by the time.
And in embodiments of the present invention, mobile terminal can be placed in false off-mode or guest mode when the number of times that user carries out eyeprint recognition failures meets preset requirement, thus prevent the destruction to mobile terminal, further ensure the safety of user information in mobile terminal.
Those of ordinary skill in the art are it is to be appreciated that combine the unit of each example and the algorithm steps that the embodiments described herein describes, it is possible to being implemented in combination in of electronic hardware or computer software and electronic hardware.These functions perform with hardware or software mode actually, depend on application-specific and the design constraint of technical scheme.Professional and technical personnel can use different methods to realize described function to each specifically should being used for, but this realization is it is not considered that beyond the scope of this invention.
Those skilled in the art is it can be understood that arrive, for convenience and simplicity of description, the specific works process of the system of foregoing description, device and unit, it is referred to the corresponding process in preceding method embodiment, does not repeats them here.
In embodiment provided herein, it should be understood that disclosed apparatus and method, can realize by another way.Such as, device embodiment described above is only schematically, such as, the division of unit, be only a kind of logic function to divide, actual can have when realizing other dividing mode, the most multiple unit or assembly can in conjunction with or be desirably integrated into another system, or some features can ignore, or do not perform.Another point, shown or discussed coupling each other or direct-coupling or communication connection can be the INDIRECT COUPLING by some interfaces, device or unit or communication connection, can be electrical, machinery or other form.
The unit illustrated as separating component can be or may not be physically separate, and the parts shown as unit can be or may not be physical location, i.e. may be located at a place, or can also be distributed on multiple NE.Some or all of unit therein can be selected according to the actual needs to realize the purpose of the present embodiment scheme.
It addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it is also possible to be that unit is individually physically present, it is also possible to two or more unit are integrated in a unit.
If function is using the form realization of SFU software functional unit and as independent production marketing or use, can be stored in a computer read/write memory medium.Based on such understanding, part or the part of this technical scheme that prior art is contributed by technical scheme the most in other words can embody with the form of software product, this computer software product is stored in a storage medium, including some instructions with so that a computer equipment (can be personal computer, server, or the network equipment etc.) perform all or part of step of each embodiment method of the present invention.And aforesaid storage medium includes: the various media that can store program code such as USB flash disk, portable hard drive, ROM, RAM, magnetic disc or CDs.
Above; being only the detailed description of the invention of the present invention, but protection scope of the present invention is not limited thereto, any those familiar with the art is in the technical scope that the invention discloses; change can be readily occurred in or replace, all should contain within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with scope of the claims.

Claims (10)

1. an alarm method, is applied to mobile terminal, it is characterised in that including:
Receive the operational order of user's input;
If described operational order is start-up command, then when described mobile terminal is in running order, described user is carried out identification;If described operational order is shutdown command, then before described mobile terminal performs shutdown command, described user is carried out identification;
When the number of times that identification is failed reaches preset value, alert, described warning message includes the positional information of described mobile terminal.
Method the most according to claim 1, it is characterised in that described described user is carried out identification, including:
Obtain store in described mobile terminal or the default identity identification information of high in the clouds storage;
Obtain the identity identification information of described user;
The identity identification information of described default identity identification information and described user is mated;Identification success when the matching degree of described default identity identification information and the identity identification information of described user meets pre-conditioned, to described user;The otherwise identification failure to described user.
Method the most according to claim 1, it is characterised in that if described operational order is shutdown command, when the described number of times failed when identification reaches preset value, alert, described warning message includes the step of the positional information of described mobile terminal, also includes:
Described mobile terminal switches to false off-mode, and described false off-mode is dormancy and can not be waken up state.
Method the most according to claim 1, it is characterised in that if described operational order is start-up command, when the described number of times failed when identification reaches preset value, alert, described warning message includes the step of the positional information of described mobile terminal, also includes:
Described mobile terminal is switched to guest mode.
5. according to the arbitrary described method of claim 1-4, it is characterised in that when the described number of times failed when identification reaches preset value, alert, the step of the positional information of described mobile terminal is included at described warning message, including:
When the number of times that identification is failed reaches preset value, the positional information obtaining described mobile terminal and the warning contact method pre-set;
Send warning message according to described warning contact method, include the positional information of described mobile terminal at described warning message.
6. a mobile terminal, it is characterised in that including:
Receiver module, for receiving the operational order of user's input;
Processing module, for when described operational order is start-up command, carries out identification when described mobile terminal is in running order to described user;When the described operational order of fruit is shutdown command, before described mobile terminal performs shutdown command, described user is carried out identification;
Sending module, is used for when the number of times that identification is failed reaches preset value, alert, includes the positional information of described mobile terminal at described warning message.
Mobile terminal the most according to claim 6, it is characterised in that described processing module includes:
First obtains submodule, for obtaining store in described mobile terminal or the default identity identification information of high in the clouds storage according to described operational order;
Second obtains submodule, for obtaining the identity identification information of described user;
Process submodule, for being mated by the identity identification information of described default identity identification information and described user;Identification success when the matching degree of described default identity identification information and the identity identification information of described user meets pre-conditioned, to described user;The otherwise identification failure to described user.
Mobile terminal the most according to claim 6, it is characterized in that, described processing module is additionally operable to, when the number of times that identification is failed reaches preset value, if described operational order is shutdown command, described mobile terminal switches to false off-mode, and described false off-mode is dormancy and can not be waken up state.
Mobile terminal the most according to claim 6, it is characterised in that described processing module is additionally operable to:
When the number of times that identification is failed reaches preset value, if described operational order is start-up command, described mobile terminal is switched to guest mode.
10. according to the arbitrary described mobile terminal of claim 6-9, it is characterised in that described sending module includes:
Acquisition of information submodule, is used for when the number of times that identification is failed reaches preset value, the positional information obtaining described mobile terminal and the warning contact method pre-set;
Information sends submodule, for sending warning message according to described warning contact method, includes the positional information of described mobile terminal at described warning message.
CN201510863910.7A 2015-11-30 2015-11-30 Alarm method and mobile terminal Pending CN105827817A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510863910.7A CN105827817A (en) 2015-11-30 2015-11-30 Alarm method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510863910.7A CN105827817A (en) 2015-11-30 2015-11-30 Alarm method and mobile terminal

Publications (1)

Publication Number Publication Date
CN105827817A true CN105827817A (en) 2016-08-03

Family

ID=56514973

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510863910.7A Pending CN105827817A (en) 2015-11-30 2015-11-30 Alarm method and mobile terminal

Country Status (1)

Country Link
CN (1) CN105827817A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106572439A (en) * 2016-10-31 2017-04-19 努比亚技术有限公司 Terminal tracking method, device and mobile terminal
CN108197509A (en) * 2017-12-22 2018-06-22 深圳天珑无线科技有限公司 A kind of theft preventing method, electric terminal and storage device
CN108920928A (en) * 2018-09-14 2018-11-30 算丰科技(北京)有限公司 Personal identification method, device, electronic equipment and computer readable storage medium
CN109284138A (en) * 2018-09-25 2019-01-29 沈文策 A kind of the power supply method for closing and device of intelligent terminal
CN113436411A (en) * 2021-06-30 2021-09-24 南昌逸勤科技有限公司 Communication method, communication apparatus, and computer-readable storage medium
CN115052065A (en) * 2022-08-03 2022-09-13 南昌龙旗信息技术有限公司 Watch anti-drop method and device, anti-drop watch and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103179272A (en) * 2013-03-07 2013-06-26 中兴通讯股份有限公司 Method and device for controlling mobile terminal
CN103607697A (en) * 2013-11-27 2014-02-26 宇龙计算机通信科技(深圳)有限公司 Terminal anti-theft method and system based on SIM card
CN104143059A (en) * 2014-07-31 2014-11-12 可牛网络技术(北京)有限公司 Method and system for improving safety of mobile terminal
CN104391712A (en) * 2014-10-24 2015-03-04 小米科技有限责任公司 Shutdown method and device
CN104639762A (en) * 2015-02-27 2015-05-20 上海天奕达电子科技有限公司 Method and device of mobile phone authentication and alarm
CN104866816A (en) * 2015-04-24 2015-08-26 成都腾悦科技有限公司 Novel image and fingerprint boot identification method of mobile phone

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103179272A (en) * 2013-03-07 2013-06-26 中兴通讯股份有限公司 Method and device for controlling mobile terminal
CN103607697A (en) * 2013-11-27 2014-02-26 宇龙计算机通信科技(深圳)有限公司 Terminal anti-theft method and system based on SIM card
CN104143059A (en) * 2014-07-31 2014-11-12 可牛网络技术(北京)有限公司 Method and system for improving safety of mobile terminal
CN104391712A (en) * 2014-10-24 2015-03-04 小米科技有限责任公司 Shutdown method and device
CN104639762A (en) * 2015-02-27 2015-05-20 上海天奕达电子科技有限公司 Method and device of mobile phone authentication and alarm
CN104866816A (en) * 2015-04-24 2015-08-26 成都腾悦科技有限公司 Novel image and fingerprint boot identification method of mobile phone

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106572439A (en) * 2016-10-31 2017-04-19 努比亚技术有限公司 Terminal tracking method, device and mobile terminal
CN106572439B (en) * 2016-10-31 2019-10-25 努比亚技术有限公司 Terminal tracing method, device and mobile terminal
CN108197509A (en) * 2017-12-22 2018-06-22 深圳天珑无线科技有限公司 A kind of theft preventing method, electric terminal and storage device
CN108920928A (en) * 2018-09-14 2018-11-30 算丰科技(北京)有限公司 Personal identification method, device, electronic equipment and computer readable storage medium
CN109284138A (en) * 2018-09-25 2019-01-29 沈文策 A kind of the power supply method for closing and device of intelligent terminal
CN113436411A (en) * 2021-06-30 2021-09-24 南昌逸勤科技有限公司 Communication method, communication apparatus, and computer-readable storage medium
CN113436411B (en) * 2021-06-30 2023-03-31 南昌逸勤科技有限公司 Communication method, communication apparatus, and computer-readable storage medium
CN115052065A (en) * 2022-08-03 2022-09-13 南昌龙旗信息技术有限公司 Watch anti-drop method and device, anti-drop watch and storage medium
CN115052065B (en) * 2022-08-03 2023-06-13 南昌龙旗信息技术有限公司 Watch anti-drop method and device, anti-drop watch and storage medium

Similar Documents

Publication Publication Date Title
CN105827817A (en) Alarm method and mobile terminal
CN104641669B (en) The device and method of control switching for the electronic access client in the case where not requiring network to access
US20170098073A1 (en) Method and apparatus for identifying malicious operation in mobile terminal
CN104239140A (en) Mobile terminal as well as method and device for controlling switching of operation systems of mobile terminal
WO2015007116A1 (en) Anti-theft method for data after loss of cell phone
US20140025964A1 (en) Mobile terminal encryption method, hardware encryption device and mobile terminal
CN102567135B (en) Refreshing/recovering method and electronic equipment
CN109979047B (en) Multi-network intelligent door lock control method, storage medium, controller and fingerprint lock
US20160191697A1 (en) Mobile terminal and method for switching unlocking modes
CN104079724A (en) Mobile phone card losing recovery method and mobile terminal applying mobile phone card
CN104008345A (en) Method and device for protecting user privacy data of application program
US20230083327A1 (en) Systems and methods for system recovery
CN101764887A (en) Anti-theft mobile phone and using method thereof
CN105554226A (en) Mode switching method and system, and terminal
CN105225113B (en) A kind of information processing method and electronic equipment
WO2016072833A1 (en) System and method to disable factory reset
CN104809046A (en) Application program networking control method and application program networking control device
CN110427296B (en) Hardware WDT-based monitoring method, hardware WDT-based monitoring equipment and readable medium
US8336111B2 (en) Communication device and method for securing data
CN106951771B (en) Mobile terminal using method of android operating system
CN112989851A (en) NFC card activation method and device and electronic equipment
CN105824666B (en) Data Recapture Unit and method
CN107197075B (en) Clean boot means of defence, device and computer readable storage medium
US20080070629A1 (en) Method and mobile communication device for resuming a functioning of a subscriber identity module
CN204883719U (en) System for it is external to cell -phone control and protect file through iris recognition device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160803