CN106211070A - The anti-theft protection method of a kind of mobile terminal and mobile terminal - Google Patents
The anti-theft protection method of a kind of mobile terminal and mobile terminal Download PDFInfo
- Publication number
- CN106211070A CN106211070A CN201610515353.4A CN201610515353A CN106211070A CN 106211070 A CN106211070 A CN 106211070A CN 201610515353 A CN201610515353 A CN 201610515353A CN 106211070 A CN106211070 A CN 106211070A
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- information
- server
- finger print
- users
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
Embodiments provide anti-theft protection method and the mobile terminal of a kind of mobile terminal; described method includes: after described mobile terminal receives described antitheft instruction; described mobile terminal persistently receives the finger print information of other users, and stores the finger print information of other users described to described mobile terminal;The finger print information of other users of storage in mobile terminal described in comparison, and, the finger print information that in described server, other users of storage are preset;If consistent, then open the positioning function of described mobile terminal, and the location information of described mobile terminal is sent to server.The embodiment of the present invention is by the finger print information of other users of storage and the finger print information of other users of storage in server in mobile terminal described in comparison, after confirming the finger print information of other users, mobile terminal is carried out positioning action, determine the accurate location of mobile terminal, provide convenience for follow-up operation of giving for change.
Description
Technical field
The present invention relates to technical field of mobile terminals, particularly relate to anti-theft protection method and the one of a kind of mobile terminal
Mobile terminal.
Background technology
Along with the development of science and technology, increasingly advanced mobile terminal brings the facility that people are many, mobile terminal
Safety is subject to people's attention the most all the more, the loss of mobile terminal mean individual sensitive data lose protection, with
Time allow lawless person is organic to be taken advantage of.
Present most of mobile terminals have fingerprint identification function, by carrying out adopting of user finger print in advance
Collection, the identity of user is identified, mobile terminal can be unlocked, file or application program are encrypted with
And carry out the operations such as online payment.
In existing guarding against theft for mobile terminal guard method, conventional anti-theft protection method is to pass through global positioning system
(GPS, Global Positioning System) moves the location of terminal, it is thus achieved that the geographical position of mobile terminal, this
Outward, log in registered account by another mobile terminal or PC end, the mobile phone lost remotely is operated, such as
Obtain the telephone number after changing client identification module (SIM, Subscriber Identification Module) card, to working as
Front user is taken pictures.But, above-mentioned guarding against theft for mobile terminal guard method all cannot protect mobile terminal original user
The identity information of other users of mobile terminal (person of picking up etc. as after thief or loss) after private data and confirmation loss
Summary of the invention
In view of the above problems, in order to solve above-mentioned data safety and confirm the problem of other subscriber identity informations, the present invention
Embodiment proposes anti-theft protection method and the mobile terminal of a kind of mobile terminal.
In order to solve the problems referred to above, the embodiment of the invention discloses the anti-theft protection method of a kind of mobile terminal, described shifting
Dynamic terminal communicates with server, and in described server, record has the original user identity checking submitted to by described mobile terminal
Information, described server storage has the finger print information that other users are preset, and described method includes:
When server receives the mobile terminal loss instruction that third party device is submitted to, trigger described mobile terminal and enter
Anti-theft modes;Wherein, described mobile terminal loses instruction is that described third party device checking original user identity checking information is led to
Later the instruction submitted to;
Under described anti-theft modes, described server sends antitheft finger according to prefixed time interval to described mobile terminal
Order;
When described connection of mobile terminal into network and receive described antitheft instruction time, described server receive by described shifting
Dynamic terminal uploads its current-user data extracted;
After described mobile terminal receives described antitheft instruction, described mobile terminal persistently receives the fingerprint of other users
Information, and the finger print information of other users described is stored to described mobile terminal;
The finger print information of other users of storage in mobile terminal described in comparison, and, its of storage in described server
The finger print information that he user is preset;
If consistent, then open the positioning function of described mobile terminal, and the location information of described mobile terminal is sent extremely
Server.
The embodiment of the invention also discloses a kind of mobile terminal, described mobile terminal communicates with server, described clothes
In business device, record has the original user identity checking information submitted to by described mobile terminal, and described server storage has other users
Preset finger print information, described terminal includes:
Anti-theft modes trigger module, for receiving, when server, the mobile terminal loss instruction that third party device is submitted to
Time, trigger described mobile terminal and enter anti-theft modes;Wherein, described mobile terminal loses instruction for the checking of described third party device
The original user identity checking information instruction by rear submission;
Antitheft instruction sending module, under described anti-theft modes, described server according to prefixed time interval to institute
State mobile terminal and send antitheft instruction;
User data receiver module, when being used for when described connection of mobile terminal into network and receive described antitheft instruction,
Described server receives is uploaded its current-user data extracted by described mobile terminal;
Transmission module on finger print information, is used for after described mobile terminal receives described antitheft instruction, described mobile terminal
Persistently receive the finger print information of other users, and the finger print information of other users described is uploaded onto the server;
First finger print information comparing module, the finger print information of other users of storage in mobile terminal described in comparison,
And, the finger print information that in described server, other users of storage are preset;
Location information sending module, if for consistent, then opening the positioning function of described mobile terminal, and by described movement
The location information of terminal sends to server.
The embodiment of the present invention includes advantages below:
Third party device in the embodiment of the present invention sends mobile terminal and loses instruction, and in server, record has by described shifting
The original user identity checking information that dynamic terminal is submitted to, the verification original user identity after mobile terminal is lost, touches simultaneously
Sending out the mobile terminal lost and enter anti-theft modes, server is for sending antitheft from trend mobile terminal with prefixed time interval
Instruction, when connection of mobile terminal into network and when receiving antitheft instruction, server receives the active user that uploaded by mobile terminal
Data;The embodiment of the present invention carries out the authentication of original user, and the server that the data of original user upload to correspondence is deposited
Storage space, safe and reliable, there is the function of protection secure user data.
Further, the embodiment of the present invention by the finger print information of other users of storage in mobile terminal described in comparison with
And the finger print information of other users of storage in server, after confirming the finger print information of other users, it is fixed to carry out mobile terminal
Bit manipulation, determines the accurate location of mobile terminal, provides convenience for follow-up operation of giving for change.
Accompanying drawing explanation
Fig. 1 is the flow chart of steps of the anti-theft protection method embodiment one of a kind of mobile terminal of the embodiment of the present invention;
Fig. 2 is the flow chart of steps of the anti-theft protection method embodiment two of a kind of mobile terminal of the embodiment of the present invention;
Fig. 3 is the flow chart of steps of the anti-theft protection method embodiment three of a kind of mobile terminal of the embodiment of the present invention;
Fig. 4 is a kind of Account Registration process schematic in the embodiment of the present invention of the embodiment of the present invention;
Fig. 5 is the schematic flow sheet of a kind of server antitheft instruction of transmission of the embodiment of the present invention;
Fig. 6 is a kind of mobile terminal upload user data of the embodiment of the present invention and the schematic flow sheet cleared data;
Fig. 7 be the embodiment of the present invention a kind of mobile terminal by record user finger print information upload location information and
The schematic flow sheet of SIM card information;
The structured flowchart of a kind of mobile terminal that Fig. 8 provides for the embodiment of the present invention four;
The structured flowchart of a kind of mobile terminal that Fig. 9 provides for the embodiment of the present invention five;
The structured flowchart of a kind of mobile terminal that Figure 10 provides for the embodiment of the present invention six.
Detailed description of the invention
Understandable for enabling the above-mentioned purpose of the embodiment of the present invention, feature and advantage to become apparent from, below in conjunction with the accompanying drawings and
The embodiment of the present invention is described in further detail by detailed description of the invention.
In existing anti-theft protection method, conventional anti-theft protection method is the location by moving terminal, it is thus achieved that
The geographical position of mobile terminal, or, by miscellaneous equipment, the mobile phone lost remotely is operated, such as, obtain and make after losing
The telephone number of user or obtain the photo etc. of currently used person.But, above-mentioned guarding against theft for mobile terminal guard method all cannot
The identity information of other users of mobile terminal after the private data of protection mobile terminal original user and confirmation loss.
Embodiment one
With reference to Fig. 1, it is shown that the step of the anti-theft protection method embodiment one of a kind of mobile terminal of the embodiment of the present invention
Flow chart, in the present embodiment, described mobile terminal can communicate with server, and in described server, record has by described
The original user identity checking information that mobile terminal is submitted to, described server storage has the finger print information that other users are preset, this
Inventive embodiments specifically may include steps of:
Step 101: when server receives the mobile terminal loss instruction that third party device is submitted to, trigger described movement
Terminal enters anti-theft modes;Wherein, described mobile terminal loses instruction can be that described third party device verifies original user body
Part checking information instruction by rear submission;
In a kind of application scenarios of the embodiment of the present invention, original user is registered by mobile terminal, arranges account
And account password, then typing telephone number information, social account, ID (identity number) card No., international mobile equipment identification number and fingerprint
Information etc., form original user identity checking information.Typing has operated, and mobile terminal uploads original user identity to server
Checking information, server retains described original user identity checking information.After Account Registration completes, anti-theft feature is in shape of awaiting orders
State, if original user has lost mobile terminal, calling record in server has the original user identity submitted to by mobile terminal to test
Card information, user can verify information by third party device to its original user identity of server authentication, and hereafter third party sets
Preparation send mobile terminal to lose instruction, and server receives the mobile terminal loss instruction that third party device is submitted to, has triggered simultaneously
The mobile terminal lost enters anti-theft modes.
Step 102: under described anti-theft modes, described server sends to described mobile terminal according to prefixed time interval
Antitheft instruction;
In actual application, server sends antitheft instruction according to prefixed time interval to described mobile terminal, and the most every 10
Minute or every 1 hour server send the most antitheft instruction to mobile terminal, it should be noted that mobile terminal is system
Backstage receives antitheft instruction, and does not appears in screen or informing, does not the most generate announcement information, only receives anti-in system level
Steal instruction.
Step 103: when described connection of mobile terminal into network and receive described antitheft instruction time, described server receive
Its current-user data extracted is uploaded by described mobile terminal;
In being embodied as, mobile terminal needs access network, and described network can be wireless network, forth generation mobile communication
Technology (4G, the 4th Generation mobile communication) network, G mobile communication (3G,
The 3th Generation mobile communication) network or wireless network focus, the embodiment of the present invention is to this not
Impose any restrictions;Further, mobile terminal receives after the antitheft instruction of server, and mobile terminal can carry out a series of behaviour
Making to protect the data safety of user, such as, can be uploaded onto the server, by servicing in the data backstage of original user by mobile terminal
Device receives and preserves the user data of original user in server storage corresponding to original authentication information.
Step 104: after described mobile terminal receives described antitheft instruction, mobile terminal persistently receives other users'
Finger print information, and the finger print information of other users described is uploaded onto the server;
In actual application, other users may need be unlocked operation and utilize finger print information to enter when using mobile terminal
Row delivery operation and the use of some secret application;After mobile terminal receives antitheft instruction, mobile terminal constantly gathers also
Store the finger print information of other users, when the finger print information quantity gathered reaches certain upper limit, and mobile terminal can be to original
Finger print information carries out covering collection, and meanwhile, other user can use the account of mobile terminal one other user of registration, described
Other user account can store the finger print information that other users are preset, for time described on the memory space of corresponding server
Between be spaced, can be original user arrange voluntarily or system designer arrange, to this, the present invention is not intended to be limited in any.
Step 105: the finger print information of other users of storage in mobile terminal described in comparison, and, in described server
The preset finger print information of other users of storage;
It should be noted that after mobile terminal receives antitheft instruction, except other users of continuous collecting can be carried out
Outside the operation of finger print information;Further, other users can also register other affiliated user account, other user account bag described
Include the conventional registration information of this user, such as telephone number information, social account, ID (identity number) card No., international mobile equipment identification number
And finger print information etc., form other subscriber authentication information.Server also can open up a new storage for other users
Space, is used for storing other subscriber authentication information, and other subscriber authentication information described includes the fingerprint of other user
Information.Other subscriber authentication information described is stored in other user account corresponding, but this authentication information and account are not
There is the function again sending mobile terminal loss instruction to mobile terminal, only there is the storage function of routine.
Wherein, the finger print information of the every other user gathered in comparison mobile terminal and other use of storage in server
Family finger print information, confirmation of can comparing the most one by one, obtain comparison result;Number of times and the time interval of comparison are
Artificial setting, this is not intended to be limited in any by the embodiment of the present invention.
Step 106: if consistent, then open the positioning function of described mobile terminal, and the location of described mobile terminal is believed
Breath sends to server;
In actual application, described comparison result is sent to mobile terminal by server, if the result of comparison is consistent, then
The positioning function of mobile terminal is opened on backstage, and sends location information to server.
In the embodiment of the present invention, to the picture of original user, document, video, application program, message registration, note record
And the current-user data such as associated person information uploads onto the server, it is ensured that the safety of user data;By moving described in comparison
In the finger print information of other users stored in dynamic terminal and server, the finger print information of other users of storage, confirms other
After the finger print information of user, further, mobile terminal is carried out positioning action, determine the accurate location of mobile terminal, for follow-up
Operation of giving for change provide convenience.
Embodiment two
With reference to Fig. 2, it is shown that the step of the anti-theft protection method embodiment two of a kind of mobile terminal of the embodiment of the present invention
Flow chart, the embodiment of the present invention specifically may include steps of:
Step 201: when server receives the mobile terminal loss instruction that third party device is submitted to, trigger described movement
Terminal enters anti-theft modes;
Such as, described mobile terminal loses instruction is that described third party device checking original user identity checking information is passed through
The instruction of rear submission;
Wherein, described original user identity checking information is stored in corresponding original user account, described original user account
Including the conventional registration information of this user, as the finger print information of original user, telephone number information, register account number, account password,
ID (identity number) card No., social account and international mobile equipment identification number etc..Anti-theft modes be mobile terminal multiple contextual model it
One, after mobile terminal enters anti-theft modes, a series of operation can be performed in application layer, such as, mobile terminal can be uploaded
And in formatting the data of original user or forbidding that currently used person opens some application program or checks some data
Hold, and aforesaid operations will not be to show in informing or user's announcement information, and the display of correspondence and announcement information will not go out
Application layer now, or in system layer, perform a series of operation, and display and announcement information do not appear in application layer.
Step 202: under described anti-theft modes, described server sends to described mobile terminal according to prefixed time interval
Antitheft instruction;
In actual application, service receives after the mobile terminal loss instruction of third party device, can be according to certain
Time interval sends antitheft instruction to mobile terminal, and described prefixed time interval is that original user provides original user to server
Arranging voluntarily during authentication information, such as, prefixed time interval can be arranged 10 minutes or 30 minutes or 1 hour, this
This is not intended to be limited in any by invention.
Step 203: when described connection of mobile terminal into network and receive described antitheft instruction time, described server receive
Its current-user data extracted is uploaded by described mobile terminal.
Wherein, current-user data can include the picture of original user, document, video, application program, message registration,
Note record and associated person information etc., after mobile terminal carries out anti-theft modes, detect network signal intensity, and automatic or manual accesses
Network around, described network can be wireless network, 4G, the4th network, 3G network or wireless network focus, and by former
On the current-user data such as the picture of beginning user, document, video, application program, message registration, note record and associated person information
The original user identity reaching server is verified in the memory space that information is corresponding, recovers active user's number for follow-up original user
According to providing convenience, it should be noted that above-mentioned steps is that the execution of operation is all without in informing or user's announcement information
Display, it is ensured that the safety of current-user data.
The third party device of the embodiment of the present invention sends mobile terminal and loses instruction, and in server, record has by described movement
The original user identity checking information that terminal is submitted to, the verification original user identity after mobile terminal is lost, triggers simultaneously
The mobile terminal lost enters anti-theft modes, and when connection of mobile terminal into network and when receiving antitheft instruction, server receives
The current-user data uploaded by mobile terminal;The embodiment of the present invention carries out the authentication of original user, by original user
Data upload to the server storage of correspondence, safe and reliable, have the function of protection secure user data.
Embodiment three
With reference to Fig. 3, it is shown that the step of the anti-theft protection method embodiment three of a kind of mobile terminal of the embodiment of the present invention
Flow chart, described mobile terminal communicates with server, in described server record have by described mobile terminal submit to former
Beginning subscriber authentication information, described server storage has the finger print information that other users are preset, side described in the embodiment of the present invention
Method specifically may include steps of:
Step 301: when server receives the mobile terminal loss instruction that third party device is submitted to, trigger described movement
Terminal enters anti-theft modes;Wherein, described mobile terminal loses instruction can be that described third party device verifies original user body
Part checking information instruction by rear submission;
In the embodiment of the present invention, third party device can be PC (Personal Computer, PC) or other shiftings
Dynamic terminal, has the equipment receiving with sending informational function, and this is not intended to be limited in any by the present invention.If mobile terminal is lost
After, original user can pass through third party device game server, after checking original user identity checking information, sends institute
State mobile terminal and lose instruction.
Step 302: under described anti-theft modes, described server sends to described mobile terminal according to prefixed time interval
Antitheft instruction;
In being embodied as, service receives after the mobile terminal loss instruction of third party device, can be according to certain
Time interval sends antitheft instruction to mobile terminal, and described prefixed time interval is that original user provides original user to server
That arrange voluntarily during authentication information or be configured by other means, this is not made any limit by the embodiment of the present invention
System.
Step 303: when described connection of mobile terminal into network and receive described antitheft instruction time, described server receive
Its current-user data extracted is uploaded by described mobile terminal;
In actual application, after mobile terminal carries out anti-theft modes, detecting network signal intensity, automatic or manual accesses around
Network, and the current-user data of original user is uploaded onto the server original user identity checking corresponding the depositing of information
In storage space, recover current-user data for follow-up original user and provide convenience, it should be noted that above-mentioned steps is operation
Execution all without in informing or user's announcement information show, it is ensured that the safety of current-user data.
Step 304: after described mobile terminal receives described antitheft instruction, mobile terminal persistently receives other users'
Finger print information, and the finger print information of other users described is uploaded onto the server;
Specifically, other users may need be unlocked operation and utilize finger print information to carry out when using mobile terminal
Delivery operation and the use of some secret application;After mobile terminal receives antitheft instruction, mobile terminal constantly gathers and deposits
Store up the finger print information of other users, when the finger print information quantity gathered reaches certain upper limit, and mobile terminal can be to original finger
Stricture of vagina information carries out covering collection, and meanwhile, mobile terminal can be according to certain time interval by the finger of other users of above-mentioned collection
Stricture of vagina information uploads onto the server.
Step 305: the finger print information of other users of storage in mobile terminal described in comparison, and, in described server
The preset finger print information of other users of storage;
Wherein, after mobile terminal receives antitheft instruction, mobile terminal can carry out the fingerprint of other users of continuous collecting
The operation of information;Further, server can open up a new memory space for other users, be used for storing other user identity
Checking information, other subscriber authentication information described is stored in other user account corresponding, and other user account described includes
The conventional registration information of this user, only has the storage function of routine, and other subscriber authentication information described includes that other are used
The finger print information at family.
In actual application, finger print information, owing to it has unchangeable property, uniqueness and convenience, the most almost become to make a living
The synonym of thing feature identification.Fingerprint refers to the recessed uneven streakline produced of the finger tips positive surface skin epirelief of people.Streakline has rule
The arrangement of rule forms different stricture of vagina types.The details of the starting point of streakline, terminal, binding site and bifurcation, referred to as fingerprint;Refer to
Stricture of vagina identification i.e. refers to be differentiated by the details of relatively different fingerprints.Fingerprint identification technology relates to image procossing, mould
Numerous subjects such as formula identification, computer vision, mathematical morphology, wavelet analysis.
Wherein, the every other user's that the present invention gathers in using the mode comparison mobile terminal of fingerprint recognition in implementing
Finger print information and other user fingerprints information of storage, confirmation of can comparing the most one by one in server, obtain
Comparison result.
Step 306: if consistent, then extract the current SIM card information of described mobile terminal;
Wherein, client identification module card is called for short, and SIM (Subscriber Identification Module) blocks, also referred to as
For subscriber identification card, smart card, global system for mobile communications (GSM, Global System for Mobile
Communication) digital mobile telephone must be loaded onto this card and can use.Its computer chip stores digital mobile
The information of telephone customer, the content such as the key of encryption and telephone directory of user, being available for GSM network client identity differentiates,
And voice messaging when conversing client is encrypted.In the embodiment of the present invention, if the comparison result obtained is consistent, then carry
Taking the current SIM card information of described mobile terminal, described SIM card information includes the telephone number information of user.
Step 307: judge that described current SIM card information is the most consistent with described original SIM card information, the most then upload
SIM card information without change information to server, if it is not, then upload current SIM card information to server;
In actual application, the original SIM that server meeting comparison current SIM card information is corresponding with original authentication information
Card information is the most consistent, wherein it is possible to be telephone numbers information or the letter of digital mobile phone client of comparison user
Whether breath is consistent, then upload the SIM card information information without change to server, if it is not, upload current SIM card information to servicing
Device, can be telephone numbers information and/or the information of digital mobile phone client of upload user.
Step 308: described current SIM card information is notified original use via described third party device by described server
Family.
In being embodied as, server receives the current SIM card information of mobile terminal, by described current SIM card information
Pass to, in original user account corresponding in original user identity checking information, retransmit described current SIM card information to the 3rd
Method, apparatus, by above-mentioned step, original user is appreciated that the accurate information of the currently used person of the mobile terminal after loss,
Including telephone number and personally identifiable information.
In the embodiment of the present invention, original user current-user data is uploaded onto the server, it is ensured that original user data
Safety;By other of the finger print information of other users of storage in mobile terminal described in comparison and storage in server
The finger print information of user, after confirming the finger print information of other users, further, carries out mobile terminal extracting current SIM card letter
The operation of breath, determines the currently used SIM card information of mobile terminal, provides important foundation for follow-up operation of giving for change.
For making those skilled in the art be more fully understood that the embodiment of the present invention, illustrate below by way of a concrete example.
With reference to Fig. 4, it is shown that a kind of Account Registration process schematic in the embodiment of the present invention:
Step 01: open fingerprint anti-theft switch, this switch is that original user registration chooses whether to use finger print information to hold
Row retrieval operation, because some mobile terminal does not support fingerprint identification function;
Step 02: being persistence after this fingerprint typing of typing owner's fingerprint, remove need to be in computer end after step 03
Process.This fingerprint, as protection fingerprint, carries out the identity validation of original user after mobile terminal is recovered;
Step 03: registration original user account, the account for the protection of original user finger print information and data protection and
The transmission of guarding against theft for mobile terminal instruction.Including account and account password two parts, and after Account Registration (available mailbox, phone, social
Account Registration), form original user identity checking information.Original user account and original user identity checking information are at server
End retains, and international mobile equipment identification number and account upload server in the lump, original user, according to the password login account, is carried out
Data and the activation of anti-theft modes and amendment fingerprint;
Step 04: the server end record account.Typing finger print information, Account Registration complete after this anti-theft feature for treating
Life state.After mobile terminal is lost, user is come into force after PC end activates.When coming into force in equipment account function opening to other
User exists as the currently used person's information after device losses, now other subscriber authentication information of other user
And account exists upload server as evidence, not there is the function sending antitheft instruction.
With reference to Fig. 5, it is shown that the schematic flow sheet of a kind of server antitheft instruction of transmission:
Step 05: third party device logs in original user account.May select after login and reset, it is not necessary to re-registration account
Family, however it is necessary that and be authenticated in third party device input account password.The optional mobile terminal that sends loses instruction;
Step 06: after sending mobile terminal loss instruction, server receives described mobile terminal and loses instruction;
Step 07: server end sends antitheft instruction to the mobile terminal lost by intervals.Time interval can
Equipment vendors set and also can set to user.
With reference to Fig. 6, it is shown that a kind of mobile terminal upload user data and the schematic flow sheet cleared data:
Step 08: mobile terminal determines whether network, if there being net, enters step 09;If without net, then terminate;
Step 09: whether receive antitheft instruction, if having entrance, step 010;If nothing, terminate;
Step 010: mobile terminal by user data upload to server;
Step 011: judge whether mobile terminal is currently in use, it is judged that condition is to have a bright screen after anti-theft feature triggers;If
Have, enter step 012, if nothing, then enter step 013;
Step 012: mobile terminal camouflage prompting (system crash, loss of data, it is necessary to restart), mobile terminal formats,
Remove all data, but retain the finger print information of original user;
Step 013: mobile terminal direct formatting removes all data, does not remove the finger print information of original user.
With reference to Fig. 7, it is shown that a kind of mobile terminal uploads location information by record user finger print information and SIM is believed
The schematic flow sheet of breath:
Step 014: mobile terminal determines whether network;If there being net, enter step 015;If without net, then terminate;
Step 015: mobile terminal judges whether to receive antitheft instruction, if having, entering step 016, if nothing, then terminating;
Step 016: mobile terminal by user data upload to server;
Step 017: mobile terminal determines whether to use fingerprint, and use fingerprint here refers under bright screen state, and finger touches
Touch all fingerprint acquisition devices.After activating anti-theft modes, finger print information is i.e. in background acquisition state, and every have finger touching i.e.
Typing finger print information.Collect finger print information to reach during the upper limit, to do covering collection, retain up-to-date finger print information, if so, enter
018, if it is not, then enter 019;
Step 018: record finger print information upload server, retains up-to-date fingerprint letter when reaching the finger print information upper limit
Breath, by step 017, step 018, finally when recovering mobile terminal, fingerprint in mobile terminal and other in server
After the loss of account, (enter anti-theft modes after) typing finger print information is corresponding, shows that what original user searched out loses movement exactly
Other user of terminal;
Step 019: positioning service is opened on mobile terminal backstage, and location information is sent to server;
Step 020: judge that in mobile terminal, SIM is with or without replacing, if having, enters step 021;If nothing, then enter step
022;
Step 021: upload current SIM card number to server;
Step 022: upload SIM number without updating information to server.
It should be noted that for embodiment of the method, in order to be briefly described, therefore it is all expressed as a series of action group
Closing, but those skilled in the art should know, the embodiment of the present invention is not limited by described sequence of movement, because depending on
According to the embodiment of the present invention, some step can use other orders or carry out simultaneously.Secondly, those skilled in the art also should
Knowing, embodiment described in this description belongs to preferred embodiment, and the involved action not necessarily present invention implements
Necessary to example.
Embodiment four
Fig. 8 is the block diagram of the mobile terminal of one embodiment of the invention.Mobile terminal 800 shown in Fig. 8 includes antitheft mould
Transmission module 804 on formula trigger module 801, antitheft instruction sending module 802, user data receiver module 803, finger print information,
One finger print information comparing module 805, location information sending module 806.
Anti-theft modes trigger module 801, refers to for receiving the mobile terminal loss of third party device submission when server
When making, trigger described mobile terminal and enter anti-theft modes;Wherein, described mobile terminal is lost to instruct and is tested for described third party device
The card original user identity checking information instruction by rear submission.
Antitheft instruction sending module 802, under described anti-theft modes, described server according to prefixed time interval to
Described mobile terminal sends antitheft instruction.
User data receiver module 803, is used for when described connection of mobile terminal into network and receives described antitheft instruction
Time, described server receives is uploaded its current-user data extracted by described mobile terminal.
Transmission module 804 on finger print information, for after described mobile terminal receives described antitheft instruction, described mobile whole
Support continued access and receive the finger print information of other users, and the finger print information of other users described is uploaded onto the server;
First finger print information comparing module 805, the fingerprint letter of other users of storage in mobile terminal described in comparison
Breath, and, the finger print information that in described server, other users of storage are preset;
Location information sending module 806, if for consistent, then opening the positioning function of described mobile terminal, and by described
The location information of mobile terminal sends to server.
On the basis of Fig. 8, alternatively, mobile terminal 800 may also include operation signal judgement module, formatting processes control
Molding block, formatting commands sending module, location information notification module, the second finger print information comparing module, SIM card information are extracted
Transmission module and the second SIM in transmission module, the second SIM card information in module, SIM card information judge module, the first SIM card information
Information notification module.
Operation signal judgement module, is used for judging whether described mobile terminal received it after receiving described antitheft instruction
The operation information of he user.
Format processing and control module, generate camouflage information for the most then server, and to described mobile terminal
After sending described camouflage information, sending formatting commands to described mobile terminal, described formatting commands is described for controlling
The mobile terminal instruction to formatting process in addition to the finger print information of original user;Described camouflage information is used for covering
Described mobile terminal performs user's information during formatting commands.
Formatting commands sending module, for if it is not, then server is directly to described mobile terminal transmission formatting commands.
Location information notification module, for described server by the location information of described mobile terminal via described third party
Equipment notifies original user.
Second finger print information comparing module, the finger print information of other users of storage in mobile terminal described in comparison,
And, the finger print information of other users of storage in described server.
SIM card information extraction module, if for consistent, then extracting the current SIM card information of described mobile terminal.
SIM card information judge module, is used for judging described current SIM card information and described original SIM card information whether
Cause.
Transmission module in first SIM card information, for the most then uploading the SIM card information information without change to server.
Transmission module in second SIM card information, for if it is not, then upload current SIM card information to server.
Second SIM card information notification module, for described server by described current SIM card information via described third party
Equipment notifies original user.
Embodiment five
Fig. 9 is the block diagram of the mobile terminal of another embodiment of the present invention.Mobile terminal 900 shown in Fig. 9 includes: at least
One processor 901, memorizer 902, at least one network interface 904 and other user interfaces 903.In mobile terminal 900
Each assembly is coupled by bus system 905.It is understood that bus system 905 is for realizing the company between these assemblies
Connect letter.Bus system 905, in addition to including data/address bus, also includes power bus, controls bus and status signal bus in addition.But
It is for the sake of understanding explanation, in fig .9 various buses is all designated as bus system 905.
Wherein, user interface 903 can include display, keyboard or pointing device (such as, mouse, trace ball
(trackball), touch-sensitive plate or touch screen etc..
The memorizer 902 being appreciated that in the embodiment of the present invention can be volatile memory or nonvolatile memory,
Maybe can include volatibility and nonvolatile memory.Wherein, nonvolatile memory can be read only memory (Read-
OnlyMemory, ROM), programmable read only memory (ProgrammableROM, PROM), Erasable Programmable Read Only Memory EPROM
(ErasablePROM, EPROM), Electrically Erasable Read Only Memory (ElectricallyEPROM, EEPROM) or sudden strain of a muscle
Deposit.Volatile memory can be random access memory (RandomAccessMemory, RAM), and it is used as outside the most slow
Deposit.By exemplary but be not restricted explanation, the RAM of many forms can use, such as static RAM
(StaticRAM, SRAM), dynamic random access memory (DynamicRAM, DRAM), Synchronous Dynamic Random Access Memory
(SynchronousDRAM, SDRAM), double data speed synchronous dynamic RAM (DoubleDataRate
SDRAM, DDRSDRAM), enhancement mode Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronized links
Dynamic random access memory (SynchlinkDRAM, SLDRAM) and direct rambus random access memory
(DirectRambusRAM, DRRAM).The memorizer 902 of the system and method that the embodiment of the present invention describes is intended to include but does not limits
In these and the memorizer of any other applicable type.
In some embodiments, memorizer 902 stores following element, executable module or data structure, or
Their subset of person, or their superset: operating system 9021 and application program 9022.
Wherein, operating system 9021, comprise various system program, such as ccf layer, core library layer, driving layer etc., be used for
Realize various basic business and process hardware based task.Application program 9022, comprises various application program, such as media
Player (MediaPlayer), browser (Browser) etc., be used for realizing various applied business.Realize embodiment of the present invention side
The program of method may be embodied in application program 9022.
In embodiments of the present invention, by calling program or the instruction of memorizer 902 storage, concrete, can be application
The program stored in program 9022 or instruction, processor 901 is for receiving, when server, the mobile end that third party device is submitted to
When end loses instruction, trigger described mobile terminal and enter anti-theft modes;Wherein, described mobile terminal loses instruction for the described 3rd
The method, apparatus checking original user identity checking information instruction by rear submission;
Under described anti-theft modes, described server sends antitheft finger according to prefixed time interval to described mobile terminal
Order;
When described connection of mobile terminal into network and receive described antitheft instruction time, described server receive by described shifting
Dynamic terminal uploads its current-user data extracted;
After described mobile terminal receives described antitheft instruction, described mobile terminal persistently receives the fingerprint of other users
Information, and the finger print information of other users described is stored to described mobile terminal;
The finger print information of other users of storage in mobile terminal described in comparison, and, its of storage in described server
The finger print information that he user is preset;
If consistent, then open the positioning function of described mobile terminal, and the location information of described mobile terminal is sent extremely
Server.
The method that the invention described above embodiment discloses can apply in processor 901, or is realized by processor 901.
Processor 901 is probably a kind of IC chip, has the disposal ability of signal.During realizing, said method each
Step can be completed by the instruction of the integrated logic circuit of the hardware in processor 901 or software form.Above-mentioned process
Device 901 can be general processor, digital signal processor (DigitalSignalProcessor, DSP), special IC
(ApplicationSpecific IntegratedCircuit, ASIC), ready-made programmable gate array
(FieldProgrammableGateArray, FPGA) or other PLDs, discrete gate or transistor logic
Device, discrete hardware components.Can realize or perform disclosed each method, step and the box in the embodiment of the present invention
Figure.The processor etc. that general processor can be microprocessor or this processor can also be any routine.In conjunction with the present invention
The step of the method disclosed in embodiment can be embodied directly in hardware decoding processor and perform, or uses decoding processor
In hardware and software module combination execution complete.Software module may be located at random access memory, and flash memory, read only memory can
In the storage medium that this areas such as program read-only memory or electrically erasable programmable memorizer, depositor are ripe.This storage
Medium is positioned at memorizer 902, and processor 901 reads the information in memorizer 902, completes the step of said method in conjunction with its hardware
Suddenly.
It is understood that the embodiment of the present invention describe these embodiments can use hardware, software, firmware, middleware,
Microcode or a combination thereof realize.Realizing for hardware, processing unit can be implemented in one or more special IC
(ApplicationSpecificIntegratedCircuits, ASIC), digital signal processor
(DigitalSignalProcessing, DSP), digital signal processing appts (DSPDevice, DSPD), programmable logic device
(ProgrammableLogicDevice, PLD), field programmable gate array (Field-ProgrammableGateArray,
FPGA), general processor, controller, microcontroller, microprocessor, for performing other electronics list of herein described function
In unit or a combination thereof.
Software is realized, can come by performing the module (such as process, function etc.) of function described in the embodiment of the present invention
Realize the technology described in the embodiment of the present invention.Software code is storable in performing in memorizer and by processor.Memorizer can
Within a processor or to realize outside processor.
Alternatively, processor 901 is additionally operable to: judge whether described mobile terminal received after receiving described antitheft instruction
The operation information of other users;
Alternatively, the most then server generates camouflage information, and sends described camouflage prompting to described mobile terminal
After information, sending formatting commands to described mobile terminal, described formatting commands is for controlling described mobile terminal to except original
The instruction of process is formatted outside the finger print information of user;Described camouflage information is used for covering described mobile terminal and performs
User's information during formatting commands.
Alternatively, if it is not, then server is directly to described mobile terminal transmission formatting commands.
Alternatively, the location information of described mobile terminal is notified original via described third party device by described server
User.
In a kind of preferred embodiment in the embodiment of the present invention, described original user identity checking information includes original visitor
Family identification module, SIM card information, alternatively, the finger print information of other users of storage in mobile terminal described in comparison, and,
The finger print information of other users of storage in described server;
Alternatively, if unanimously, then extract the current SIM card information of described mobile terminal;
Alternatively, it is judged that described current SIM card information is the most consistent with described original SIM card information, the most then upload
SIM card information without change information to server, if it is not, then upload current SIM card information to server.
Alternatively, described current SIM card information is notified original user via described third party device by described server.
Mobile terminal 900 is capable of each process that in previous embodiment, mobile terminal realizes, for avoiding repeating, here
Repeat no more.
Third party device in the embodiment of the present invention sends mobile terminal and loses instruction, and in server, record has by described shifting
The original user identity checking information that dynamic terminal is submitted to, the verification original user identity after mobile terminal is lost, touches simultaneously
Sending out the mobile terminal lost and enter anti-theft modes, server is for sending antitheft from trend mobile terminal with prefixed time interval
Instruction, highly reliable.
Further, when connection of mobile terminal into network and receive antitheft instruction time, server receive by mobile terminal
The current-user data passed;The embodiment of the present invention carries out the authentication of original user, and it is right the data of original user to be uploaded to
The server storage answered, safe and reliable, there is the function of protection secure user data.
Embodiment six
Figure 10 is the structural representation of the mobile terminal of another embodiment of the present invention.Specifically, the mobile end in Figure 10
End 1000 can be mobile phone, panel computer, personal digital assistant (PersonalDigital Assistant, PDA) or vehicle-mounted
Computer etc..
Mobile terminal 1000 in Figure 10 includes radio frequency (RadioFrequency, RF) circuit 1010, memorizer 1020, defeated
Enter unit 1030, display unit 1040, processor 1060, voicefrequency circuit 1070, WiFi (WirelessFidelity) module
10100 and power supply 1090.
Wherein, input block 1030 can be used for receiving numeral or the character information of user's input, and produce and move eventually
The user setup of end 1000 and function control relevant signal input.Specifically, in the embodiment of the present invention, this input block
1030 can include contact panel 1031.Contact panel 1031, also referred to as touch screen, can collect user and thereon or neighbouring touch
Touch operation (such as user uses any applicable object such as finger, stylus or adnexa operation on contact panel 1031), and
Corresponding attachment means is driven according to formula set in advance.Optionally, contact panel 1031 can include touch detecting apparatus and
Two parts of touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect the letter that touch operation brings
Number, transmit a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into
Contact coordinate, then give this processor 1060, and order that processor 1060 sends can be received and performed.Furthermore, it is possible to
The polytypes such as resistance-type, condenser type, infrared ray and surface acoustic wave are used to realize contact panel 1031.Except contact panel
1031, input block 1030 can also include other input equipments 1032, and other input equipments 1032 can include but not limited to
One or many in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc.
Kind.
Wherein, display unit 1040 can be used for showing the information inputted by user or the information being supplied to user and movement
The various menu interfaces of terminal 1000.Display unit 1040 can include display floater 1041, optionally, can use LCD or have
The forms such as machine light emitting diode (OrganicLight-EmittingDiode, OLED) configure display floater 1041.
It should be noted that contact panel 1031 can cover display floater 1041, formed and touch display screen, when this touch display screen
Detect thereon or after neighbouring touch operation, send processor 1060 to determine the type of touch event, with post processing
Device 1060 provides corresponding visual output according to the type of touch event on touch display screen.
Touch display screen and include Application Program Interface viewing area and conventional control viewing area.This Application Program Interface viewing area
And the arrangement mode of this conventional control viewing area does not limit, can be arranged above and below, left-right situs etc. can be distinguished two and show
Show the arrangement mode in district.This Application Program Interface viewing area is displayed for the interface of application program.Each interface is permissible
The interface elements such as the icon and/or the widget desktop control that comprise at least one application program.This Application Program Interface viewing area
It can also be the empty interface not comprising any content.This conventional control viewing area is for showing the control that utilization rate is higher, such as,
The application icons etc. such as settings button, interface numbering, scroll bar, phone directory icon.
Wherein processor 1060 is the control centre of mobile terminal 1000, utilizes various interface and the whole mobile phone of connection
Various piece, be stored in the software program in first memory 1021 and/or module by running or performing, and call and deposit
Storage data in second memory 1022, perform the various functions of mobile terminal 1000 and process data, thus to moving eventually
End 1000 carries out integral monitoring.Optionally, processor 1060 can include one or more processing unit.
In embodiments of the present invention, by call the software program and/or module stored in this first memory 1021 and/
Or the data in this second memory 1022, processor 1060 is for receiving, when server, the mobile end that third party device is submitted to
When end loses instruction, trigger described mobile terminal and enter anti-theft modes;Wherein, described mobile terminal loses instruction for the described 3rd
The method, apparatus checking original user identity checking information instruction by rear submission;
Under described anti-theft modes, described server sends antitheft finger according to prefixed time interval to described mobile terminal
Order;
When described connection of mobile terminal into network and receive described antitheft instruction time, described server receive by described shifting
Dynamic terminal uploads its current-user data extracted;
After described mobile terminal receives described antitheft instruction, mobile terminal persistently receives the fingerprint letter of other users
Breath, and the finger print information of other users described is uploaded onto the server;
The finger print information of other users of storage in mobile terminal described in comparison, and, its of storage in described server
The finger print information of he user;
If consistent, then open the positioning function of described mobile terminal, and the location information of described mobile terminal is sent extremely
Server.
Alternatively, processor 1001 is additionally operable to: judge whether described mobile terminal receives after receiving described antitheft instruction
Cross the operation information of other users;
Alternatively, the most then server generates camouflage information, and sends described camouflage prompting to described mobile terminal
After information, sending formatting commands to described mobile terminal, described formatting commands is for controlling described mobile terminal to except original
The instruction of process is formatted outside the finger print information of user;Described camouflage information is used for covering described mobile terminal and performs
User's information during formatting commands.
Alternatively, if it is not, then server is directly to described mobile terminal transmission formatting commands.
Alternatively, the location information of described mobile terminal is notified original via described third party device by described server
User.
In a kind of preferred embodiment in the embodiment of the present invention, described original user identity checking information includes original visitor
Family identification module, SIM card information, alternatively, the finger print information of other users of storage in mobile terminal described in comparison, and,
The finger print information of other users of storage in described server;
Alternatively, if unanimously, then extract the current SIM card information of described mobile terminal;
Alternatively, it is judged that described current SIM card information is the most consistent with described original SIM card information, the most then upload
SIM card information without change information to server, if it is not, then upload current SIM card information to server.
Alternatively, described current SIM card information is notified original user via described third party device by described server.
Visible, in the embodiment of the present invention, to the picture of original user, document, video, application program, message registration, note
The current-user data such as record and associated person information upload onto the server, it is ensured that the safety of user data;By comparison institute
State in mobile terminal the finger print information of other users of storage in the finger print information of other users of storage and server, confirm
After the finger print information of other users, further, mobile terminal is carried out positioning action, determine the accurate location of mobile terminal, for
Follow-up operation of giving for change is provided convenience.
Further, mobile terminal carries out extracting the operation of existing customer identification module card information, determines mobile terminal
Currently used client identification module card information, give operation for change provide important foundation for follow-up.
Those of ordinary skill in the art are it is to be appreciated that combine that the disclosed embodiments in the embodiment of the present invention describe is each
The unit of example and algorithm steps, it is possible to being implemented in combination in of electronic hardware or computer software and electronic hardware.These
Function performs with hardware or software mode actually, depends on application-specific and the design constraint of technical scheme.Specialty
Technical staff specifically should can be used for using different methods to realize described function to each, but this realization should not
Think beyond the scope of this invention.
Those skilled in the art is it can be understood that arrive, for convenience and simplicity of description, the system of foregoing description,
The specific works process of device and unit, is referred to the corresponding process in preceding method embodiment, does not repeats them here.
In embodiment provided herein, it should be understood that disclosed apparatus and method, can be passed through other
Mode realizes.Such as, device embodiment described above is only schematically, such as, the division of described unit, it is only
A kind of logic function divides, actual can have when realizing other dividing mode, the most multiple unit or assembly can in conjunction with or
Person is desirably integrated into another system, or some features can be ignored, or does not performs.Another point, shown or discussed is mutual
Between coupling direct-coupling or communication connection can be the INDIRECT COUPLING by some interfaces, device or unit or communication link
Connect, can be electrical, machinery or other form.
The described unit illustrated as separating component can be or may not be physically separate, shows as unit
The parts shown can be or may not be physical location, i.e. may be located at a place, or can also be distributed to multiple
On NE.Some or all of unit therein can be selected according to the actual needs to realize the mesh of the present embodiment scheme
's.
It addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it is also possible to
It is that unit is individually physically present, it is also possible to two or more unit are integrated in a unit.
If described function is using the form realization of SFU software functional unit and as independent production marketing or use, permissible
It is stored in a computer read/write memory medium.Based on such understanding, technical scheme is the most in other words
The part contributing prior art or the part of this technical scheme can embody with the form of software product, this meter
Calculation machine software product is stored in a storage medium, including some instructions with so that a computer equipment (can be individual
People's computer, server, or the network equipment etc.) perform all or part of step of method described in each embodiment of the present invention.
And aforesaid storage medium includes: USB flash disk, portable hard drive, ROM, RAM, magnetic disc or CD etc. are various can store program code
Medium.
The above, the only detailed description of the invention of the present invention, but protection scope of the present invention is not limited thereto, and any
Those familiar with the art, in the technical scope that the invention discloses, can readily occur in change or replace, should contain
Cover within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with scope of the claims.
Claims (10)
1. the anti-theft protection method of a mobile terminal, it is characterised in that described mobile terminal communicates with server, described
In server, record has the original user identity checking information submitted to by described mobile terminal, and described server storage has other to use
The finger print information that family is preset, described method includes:
When server receives the mobile terminal loss instruction that third party device is submitted to, trigger described mobile terminal and enter antitheft
Pattern;Wherein, described mobile terminal loses instruction is after described third party device checking original user identity checking information is passed through
The instruction submitted to;
Under described anti-theft modes, described server sends antitheft instruction according to prefixed time interval to described mobile terminal;
When described connection of mobile terminal into network and when receiving described antitheft instruction, described server receive by described mobile eventually
End uploads its current-user data extracted;
After described mobile terminal receives described antitheft instruction, described mobile terminal persistently receives the fingerprint letter of other users
Breath, and the finger print information of other users described is stored to described mobile terminal;
The finger print information of other users of storage in mobile terminal described in comparison, and, other use of storage in described server
The finger print information that family is preset;
If consistent, then open the positioning function of described mobile terminal, and the location information of described mobile terminal is sent to service
Device.
Method the most according to claim 1, it is characterised in that described method also includes:
Judge whether described mobile terminal received the operation information of other users after receiving described antitheft instruction;
The most then server generates camouflage information, and after described mobile terminal sends described camouflage information, to institute
Stating mobile terminal and send formatting commands, described formatting commands is to control described mobile terminal to believe the fingerprint except original user
The outer instruction formatting process of breath;When described camouflage information is used for covering described mobile terminal execution formatting commands
User's information.
If it is not, then server directly sends formatting commands to described mobile terminal.
Method the most according to claim 1, it is characterised in that described method also includes:
The location information of described mobile terminal is notified original user via described third party device by described server.
Method the most according to claim 1, it is characterised in that described original user identity checking information includes original visitor
Family identification module, SIM card information, described method also includes:
The finger print information of other users of storage in mobile terminal described in comparison, and, other use of storage in described server
The finger print information at family;
If consistent, then extract the current SIM card information of described mobile terminal;
Judge that described current SIM card information is the most consistent with described original SIM card information, the most then upload SIM card information without becoming
Information more is to server, if it is not, then upload current SIM card information to server.
Method the most according to claim 4, it is characterised in that described method also includes:
Described current SIM card information is notified original user via described third party device by described server.
6. a mobile terminal, it is characterised in that described mobile terminal communicates with server, in described server, record has
The original user identity checking information submitted to by described mobile terminal, described server storage has the fingerprint letter that other users are preset
Breath, described terminal includes:
Anti-theft modes trigger module, for when server receives the mobile terminal loss instruction that third party device is submitted to, touching
Send out mobile terminal described and enter anti-theft modes;Wherein, described mobile terminal loses instruction is that the checking of described third party device is original
Subscriber authentication information is by the instruction of rear submission;
Antitheft instruction sending module, under described anti-theft modes, described server according to prefixed time interval to described shifting
Dynamic terminal sends antitheft instruction;
User data receiver module, when being used for when described connection of mobile terminal into network and receive described antitheft instruction, described
Server receives is uploaded its current-user data extracted by described mobile terminal;
Transmission module on finger print information, for after described mobile terminal receives described antitheft instruction, described mobile terminal continues
Receive the finger print information of other users, and the finger print information of other users described is uploaded onto the server;
First finger print information comparing module, the finger print information of other users of storage in mobile terminal described in comparison, and,
The finger print information that in described server, other users of storage are preset;
Location information sending module, if for consistent, then opening the positioning function of described mobile terminal, and by described mobile terminal
Location information send to server.
Terminal the most according to claim 6, it is characterised in that described terminal also includes:
Operation signal judgement module, is used for judging whether described mobile terminal received other and use after receiving described antitheft instruction
The operation information at family;
Format processing and control module, generate camouflage information for the most then server, and send to described mobile terminal
After described camouflage information, sending formatting commands to described mobile terminal, described formatting commands is for controlling described movement
The terminal instruction to formatting process in addition to the finger print information of original user;Described camouflage information is used for covering described
Mobile terminal performs user's information during formatting commands;
Formatting commands sending module, for if it is not, then server is directly to described mobile terminal transmission formatting commands.
Terminal the most according to claim 6, it is characterised in that described terminal also includes:
Location information notification module, for described server by the location information of described mobile terminal via described third party device
Notify original user.
Terminal the most according to claim 6, it is characterised in that described original user identity checking information includes original visitor
Family identification module, SIM card information, described terminal also includes:
Second finger print information comparing module, the finger print information of other users of storage in mobile terminal described in comparison, and,
The finger print information of other users of storage in described server;
SIM card information extraction module, if for consistent, then extracting the current SIM card information of described mobile terminal;
SIM card information judge module, is used for judging that described current SIM card information is the most consistent with described original SIM card information;
Transmission module in first SIM card information, for the most then uploading the SIM card information information without change to server;
Transmission module in second SIM card information, for if it is not, then upload current SIM card information to server.
Terminal the most according to claim 9, it is characterised in that described terminal also includes:
Second SIM card information notification module, for described server by described current SIM card information via described third party device
Notify original user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610515353.4A CN106211070B (en) | 2016-06-30 | 2016-06-30 | A kind of anti-theft protection method and mobile terminal of mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610515353.4A CN106211070B (en) | 2016-06-30 | 2016-06-30 | A kind of anti-theft protection method and mobile terminal of mobile terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106211070A true CN106211070A (en) | 2016-12-07 |
CN106211070B CN106211070B (en) | 2019-08-20 |
Family
ID=57465024
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610515353.4A Active CN106211070B (en) | 2016-06-30 | 2016-06-30 | A kind of anti-theft protection method and mobile terminal of mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106211070B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106921799A (en) * | 2017-02-24 | 2017-07-04 | 深圳市金立通信设备有限公司 | A kind of mobile terminal safety means of defence and mobile terminal |
CN110110512A (en) * | 2019-03-15 | 2019-08-09 | 深圳壹账通智能科技有限公司 | Theft preventing method, device, computer equipment and the storage medium of electronic equipment |
CN110401884A (en) * | 2019-07-31 | 2019-11-01 | RealMe重庆移动通信有限公司 | Method for tracing and device, storage medium, the communication terminal of communication terminal |
CN112272257A (en) * | 2020-08-24 | 2021-01-26 | 南京信息工程大学 | Protection method for personal information and property after mobile phone loss based on mobile payment environment |
CN112437401A (en) * | 2020-11-25 | 2021-03-02 | 维沃移动通信有限公司 | Operation control method and device and electronic equipment |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103559433A (en) * | 2013-10-31 | 2014-02-05 | 北京奇虎科技有限公司 | Mobile terminal antitheft method and device |
CN103634477A (en) * | 2013-12-11 | 2014-03-12 | 深圳市亚略特生物识别科技有限公司 | Method and system for preventing thievery of mobile phone with fingerprint device |
CN103702317A (en) * | 2013-12-13 | 2014-04-02 | 北京奇虎科技有限公司 | Mobile terminal antitheft method and client |
CN104486745A (en) * | 2014-11-18 | 2015-04-01 | 深圳市金立通信设备有限公司 | Mobile terminal anti-theft tracking device |
CN104751086A (en) * | 2015-03-04 | 2015-07-01 | 深圳市金立通信设备有限公司 | Terminal anti-theft method |
CN104869243A (en) * | 2015-05-08 | 2015-08-26 | 上海斐讯数据通信技术有限公司 | Mobile phone anti-theft tracking system and method |
-
2016
- 2016-06-30 CN CN201610515353.4A patent/CN106211070B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103559433A (en) * | 2013-10-31 | 2014-02-05 | 北京奇虎科技有限公司 | Mobile terminal antitheft method and device |
CN103634477A (en) * | 2013-12-11 | 2014-03-12 | 深圳市亚略特生物识别科技有限公司 | Method and system for preventing thievery of mobile phone with fingerprint device |
CN103702317A (en) * | 2013-12-13 | 2014-04-02 | 北京奇虎科技有限公司 | Mobile terminal antitheft method and client |
CN104486745A (en) * | 2014-11-18 | 2015-04-01 | 深圳市金立通信设备有限公司 | Mobile terminal anti-theft tracking device |
CN104751086A (en) * | 2015-03-04 | 2015-07-01 | 深圳市金立通信设备有限公司 | Terminal anti-theft method |
CN104869243A (en) * | 2015-05-08 | 2015-08-26 | 上海斐讯数据通信技术有限公司 | Mobile phone anti-theft tracking system and method |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106921799A (en) * | 2017-02-24 | 2017-07-04 | 深圳市金立通信设备有限公司 | A kind of mobile terminal safety means of defence and mobile terminal |
CN110110512A (en) * | 2019-03-15 | 2019-08-09 | 深圳壹账通智能科技有限公司 | Theft preventing method, device, computer equipment and the storage medium of electronic equipment |
CN110401884A (en) * | 2019-07-31 | 2019-11-01 | RealMe重庆移动通信有限公司 | Method for tracing and device, storage medium, the communication terminal of communication terminal |
CN112272257A (en) * | 2020-08-24 | 2021-01-26 | 南京信息工程大学 | Protection method for personal information and property after mobile phone loss based on mobile payment environment |
CN112437401A (en) * | 2020-11-25 | 2021-03-02 | 维沃移动通信有限公司 | Operation control method and device and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN106211070B (en) | 2019-08-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106211070A (en) | The anti-theft protection method of a kind of mobile terminal and mobile terminal | |
CN106357866B (en) | A kind of book management method and mobile intelligent terminal | |
CN104851164B (en) | Intelligent lock with biological feature recognition function and control method thereof | |
CN106778183A (en) | A kind of Terminal fingerprints know method for distinguishing and mobile terminal | |
CN206522020U (en) | A kind of intelligent door lock and system | |
CN106327193B (en) | A kind of system unlocking method and equipment | |
CN106293080A (en) | The method of a kind of user profile process and mobile terminal | |
CN106056015A (en) | Utilizing radio frequency identification tag to assess battery level of peripheral device | |
CN106372470A (en) | Method for reminding of inputting password and mobile terminal | |
CN107169326A (en) | A kind of unlocking screen method and mobile terminal | |
CN107818251A (en) | A kind of face identification method and mobile terminal | |
CN106909820A (en) | Mobile terminal and its finger print data treating method and apparatus | |
CN106507334A (en) | A kind of identity identifying method and mobile terminal | |
CN107862194A (en) | A kind of method, device and mobile terminal of safety verification | |
CN106126999A (en) | The unlocking method of a kind of Intelligent Recognition visitor and mobile terminal | |
CN207198943U (en) | Finger vein identification access control system based on intelligent management | |
CN107424274A (en) | The method, apparatus and intelligent door lock that a kind of intelligent door lock is unlocked | |
CN106203038A (en) | A kind of unlocking method and mobile terminal | |
CN106714162A (en) | Hotspot sharing method and mobile terminals | |
CN107632870A (en) | The startup method and terminal of a kind of application | |
CN109147104A (en) | A kind of electronic lock and its verification method of double verification | |
CN107609407A (en) | The guard method of information security and device in a kind of user terminal | |
CN106250757A (en) | The control method of a kind of application program and mobile terminal | |
CN106503997A (en) | A kind of method of payment authorization and mobile terminal | |
CN106803031A (en) | A kind of information protecting method and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |