CN106412325A - Mobile intelligent terminal theft prevention method based on on-off encryption verification - Google Patents

Mobile intelligent terminal theft prevention method based on on-off encryption verification Download PDF

Info

Publication number
CN106412325A
CN106412325A CN201610958367.3A CN201610958367A CN106412325A CN 106412325 A CN106412325 A CN 106412325A CN 201610958367 A CN201610958367 A CN 201610958367A CN 106412325 A CN106412325 A CN 106412325A
Authority
CN
China
Prior art keywords
intelligent terminal
mobile intelligent
checking
information
shutdown
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610958367.3A
Other languages
Chinese (zh)
Inventor
罗志华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201610958367.3A priority Critical patent/CN106412325A/en
Publication of CN106412325A publication Critical patent/CN106412325A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/161Detection; Localisation; Normalisation
    • G06V40/166Detection; Localisation; Normalisation using acquisition arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72457User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to geographic location
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The invention relates to a mobile intelligent terminal theft prevention method based on on-off encryption verification, which belongs to the field of mobile intelligent terminals. Power-off verification information is set, the terminal can not be power-off if the verification is not passed, positioning information is checked in real time through a monitoring end, and the stolen mobile intelligent terminal is positioned, tracked and recovered; the mobile intelligent terminal sends the positioning information to the monitoring end, and the problem that no information of the stolen mobile intelligent terminal can be acquired when the owner does not use the monitoring end can be solved; a sending frequency is set, the mobile intelligent terminal regularly sends the positioning information and the real-time time to the monitoring end, the positioning information with the real-time time can be obtained continuously, and the possibility of finding more cell phone stolen clues is increased; and through human face recognition, photographing is only carried out when a human face is recognized, power loss caused by invalid photographing is avoided, the power-on time of the cell phone is prolonged, and after the human face picture is acquired, the stolen mobile intelligent terminal can be recovered through directing finding the person.

Description

A kind of mobile intelligent terminal theft preventing method based on switching on and shutting down encrypted authentication
Technical field
The invention belongs to mobile intelligent terminal field is and in particular to a kind of intelligent movable based on switching on and shutting down encrypted authentication is whole End theft preventing method.
Background technology
The mobile intelligent terminals such as smart mobile phone, PAD are most commonly seen meanss of communication in people's daily life, and it not only has There is basic communication function, the development with development of Mobile Internet technology and the lifting of the hardware performance of mobile intelligent terminal, mobile phone Become indispensable aid in a lot of people's live and works Deng mobile intelligent terminal.
The mobile intelligent terminals such as smart mobile phone, PAD have higher value and use value, but the spy because of its portability Point, the case leading to the mobile intelligent terminals such as mobile phone, PAD stolen occurs again and again, flow of the people than larger, compare congested traffic In instrument, such as:Subway, bus, train etc., or in flow of the people than larger public place, such as market, supermarket etc., theft The case of the mobile intelligent terminals such as mobile phone is more common.The stolen loss such as smart mobile phone, PAD is not only caused economically to us Loss, and in mobile intelligent terminal, the loss of capsule information more likely causes the loss that can not estimate.
In order to improve the security of mobile terminal, various manufacturers are proposed the theft-prevention applications of a large amount of mobile intelligent terminals, can To carry out multiple safety measures, such as using mobile phone positioning function, location tracking is carried out to mobile phone, by obtaining the positioning letter of mobile phone Breath, mobile phone location is shown on electronic map platform, but the shortcoming of prior art theft-prevention applications is not by theft-prevention applications and hand The start of machine, shutdown combine, and so when being shut down at once after hand-set from stolen, cannot obtain any letter of stolen mobile phone Breath, thus lose the best opportunity of getting back mobile phone.
, after the user discover that mobile phone is stolen on bus, the first reaction is that the mobile phone by means of others is dialled taking smart mobile phone as a example Beat the number of lost mobile phone, determine the position of mobile phone by the tinkle of bells of mobile phone.If but the mobile phone lost is shut down, just at once It has been to sever immediately upon impact by the firing pin this mobile phone to contact with extraneous, the owner of lost property also loses the best opportunity recovering mobile phone simultaneously.
At present, smart mobile phone on the market is typically all the integral structure mode that battery module is not directly dismantled, this Effectively prevent mobile phone to be shut down by removing battery at once after pilferage.Therefore, in order to can be most possibly after hand-set from stolen Getting back mobile phone, is highly desirable to a kind of scheme limiting malice shutdown at present, is especially that by the short time after hand-set from stolen The scheme that cannot shut down, is difficult in the short time after hand-set from stolen have an opportunity carry out maliciously shutting down by external tool, this ensures that Mobile phone electricity not using complete and do not taken apart by external tool lead to shutdown in the case of, mobile phone cannot shut down, on this basis Carry out positioning, follow the trail of getting back mobile phone.
Therefore, the security how improving mobile intelligent terminal is still a technical barrier urgently to be resolved hurrily.
Content of the invention
In view of this, it is an object of the invention to overcoming the deficiencies in the prior art, a kind of encryption based on switching on and shutting down is provided to test The mobile intelligent terminal theft preventing method of card, solves to be led to forfeiture to give movement for change due to shutting down immediately after mobile intelligent terminal is stolen The problem of intelligent terminal best opportunity.
For realizing object above, the present invention adopts the following technical scheme that:
A kind of mobile intelligent terminal theft preventing method based on switching on and shutting down encrypted authentication, including:Described mobile intelligent terminal is opened During machine, described mobile intelligent terminal receives start checking information, the start checking information that described mobile intelligent terminal is received with The start checking information setting makees coupling checking, if coupling, enters described mobile intelligent terminal main operation interface;
During described mobile intelligent terminal shutdown, described mobile intelligent terminal receives shutdown checking information, by described mobile intelligence Terminal the shutdown checking information receiving and the shutdown checking information setting can make to mate checking, if coupling, shut down;
When keeping open state, check the location information of described mobile intelligent terminal by the monitoring client setting, to institute State mobile intelligent terminal location tracking.
Further, described mobile intelligent terminal includes smart mobile phone or PAD, described monitoring client be smart mobile phone and/or Computer.
Further, described start checking information and described shutdown checking information are respectively encrypted message, touch action letter At least one in breath, finger print information and face information.
Further, described start checking information is different or identical from described shutdown checking information.
Further, if the shutdown checking information of the shutdown checking information that receives of described mobile intelligent terminal and setting not Join, location information is sent to the monitoring client of setting by described mobile intelligent terminal.
Further, before location information being sent in described mobile intelligent terminal the described monitoring client of setting, also set The checking number of times threshold limit of fixed described shutdown checking information, when the checking number of times of described shutdown checking information exceedes described checking During number of times threshold limit, location information is sent to the monitoring client of setting by described mobile intelligent terminal.
Further, when the checking number of times of described shutdown checking information exceedes described checking number of times threshold limit, described Real-time time is also sent to the monitoring client of setting by mobile intelligent terminal simultaneously.
Further, when the checking number of times of described shutdown checking information exceedes described checking number of times threshold limit, described Mobile intelligent terminal sets and sends location information and the transmission frequency of real-time time to described monitoring client, sends frequency according to described Rate, described mobile intelligent terminal timing sends location information and real-time time to described monitoring client.
Further, when the checking number of times of described shutdown checking information exceedes described checking number of times threshold limit, described Mobile intelligent terminal identifies face also by front-facing camera, and when recognizing face, described mobile intelligent terminal passes through preposition Camera obtains human face photo, and described human face photo is sent to the described monitoring client of setting.
Further, when the checking number of times of described shutdown checking information exceedes described checking number of times threshold limit, described The charge condition of described mobile intelligent terminal is also sent to the described monitoring client of setting by mobile intelligent terminal.
The present invention adopts above technical scheme, at least possesses following beneficial effect:
The present invention provides a kind of mobile intelligent terminal theft preventing method based on switching on and shutting down encrypted authentication, is tested by arranging shutdown Card information, the coupling checking to shutdown checking information, if coupling checking is not passed through, mobile intelligent terminal cannot shut down, by prison The location information of the stolen mobile intelligent terminal of control end real-time reception, carries out location tracking to stolen mobile intelligent terminal and gives for change;? Shutdown checking information is obstructed out-of-date, and location information is sent to the monitoring client of setting, the positioning actively sending by mobile intelligent terminal Information, as clue, solves the owner of lost property not using monitoring client, just cannot obtain asking of any information of stolen mobile intelligent terminal Topic, increases the probability giving stolen mobile intelligent terminal for change;Setting transmission frequency, mobile intelligent terminal timing sends to monitoring client Location information and real-time time, can constantly obtain the location information with real-time time, increased and find more mobile phone quilts Steal the possibility of clue, improve the probability that mobile phone is retrieved further;By recognition of face, just clapped when recognizing face According to, it is to avoid the invalid kwh loss leading to of taking pictures, the available machine time of extending cell phone, simultaneously after obtaining human face photo, Ke Yitong Cross and directly look for people to give stolen mobile intelligent terminal for change.
Brief description
Fig. 1 starts shooting for the present invention and verifies the schematic diagram of flow process;
Fig. 2 shuts down for the present invention and verifies the schematic diagram of flow process.
Specific embodiment
Below by drawings and Examples, technical scheme is described in further detail.
As depicted in figs. 1 and 2, the present invention provides a kind of mobile intelligent terminal antitheft square based on switching on and shutting down encrypted authentication Method, including:During described mobile intelligent terminal start, described mobile intelligent terminal receives start checking information, by described mobile intelligence Terminal the start checking information receiving and the start checking information setting can make to mate checking, if coupling, enter described movement Intelligent terminal main operation interface;
During described mobile intelligent terminal shutdown, described mobile intelligent terminal receives shutdown checking information, by described mobile intelligence Terminal the shutdown checking information receiving and the shutdown checking information setting can make to mate checking, if coupling, shut down;
During open state, check the location information of described mobile intelligent terminal by the monitoring client setting, to described movement Intelligent terminal location tracking.
With reference to concrete application scene, the present invention is further described, in the present invention in actual applications, described Mobile intelligent terminal includes smart mobile phone and PAD etc., and described monitoring client is smart mobile phone and/or computer etc..
Below described mobile intelligent terminal taking the smart mobile phone that battery module is not directly dismantled as a example, can by hardware or Software and hardware combining mode application such scheme of the present invention.After stolen, the acquisition of the location information of the present invention can pass through prior art Network positions and/or GPS location realize, by the stolen smart mobile phone location information of monitoring client real time inspection, to stolen intelligence Energy mobile phone carries out location tracking and gives for change.
Stealer is typically understood the very first time and is carried out power-off operation to smart mobile phone, is tracked with preventing from being positioned, but because stealing Robber person is difficult to be shut down by external tool detaching mobile phones at short notice, thus may input shutdown checking information and carry out Coupling checking, if checking is not passed through, smart mobile phone cannot shut down.The tracking to stolen smart mobile phone thus can be kept, This is the best opportunity of getting back mobile phone, thus that improves stolen smart mobile phone gives probability for change.
In the present invention, described start checking information and described shutdown checking information can be encrypted message, touch action letter At least one in breath, finger print information and face information.In addition, described start checking information is different from described shutdown checking information Or identical, as preferred embodiment, preferably described start checking information and described shutdown checking in actual application Information adopts different means modes, it is to avoid described start checking information adopts identical to verify hand with described shutdown checking information Duan Shi, is cracked one of, another is also cracked simultaneously.
As shown in Fig. 2 the present invention, for obstructed out-of-date in shutdown checking, give a kind of raising and gives stolen smart mobile phone for change The preferred version of probability, specially:The shutdown checking information that described mobile intelligent terminal receives and the shutdown checking information setting If mismatching, location information is sent to the monitoring client of setting by described mobile intelligent terminal.
The monitoring client that location information is sent to setting by smart mobile phone can be triggered by such scheme, so setting is former Because being, monitoring client could show the location information of stolen smart mobile phone by real-time tracing only when using, and is a kind of passive mode, If the owner of lost property actively using monitoring client, just cannot not obtain any information of stolen smart mobile phone.To this such scheme of the present invention It is a kind of improvement project of active trigger-type, when shutdown checking mismatches, real-time time is sent by triggering mobile intelligent terminal To the monitoring client setting.So monitoring client can be designed as the alerting computer of public security organ in actual applications, when shutdown is tested Card Information Authentication is obstructed out-of-date, and location information is sent to the alerting computer of the public security organ of setting by triggering mobile intelligent terminal, Type of alarm can be passed through, the location information that smart mobile phone actively sends is supplied to police as clue, greatly increases and gives for change The probability of the smart mobile phone lost.
When using such scheme normal shutdown, it is possible that because erroneous input checking information leads to smart mobile phone will position Information be sent to setting monitoring client this unnecessary the occurrence of.In order to solve this problem, as shown in Fig. 2 the present invention Before location information is sent to the described monitoring client of setting by described mobile intelligent terminal, also set described shutdown checking information Checking number of times threshold limit, when described shutdown checking information checking number of times exceed described checking number of times threshold limit when, institute State the monitoring client that location information is sent to setting by mobile intelligent terminal.
By setting this mode of checking number of times threshold limit of shutdown checking information, owner's normal shutdown can be avoided When, lead to smart mobile phone that location information is sent to this unnecessary situation of monitoring client of setting because shutdown checking information mismatches Generation.In actual use, the checking number of times of shutdown checking information is more few better, provides described shutdown and test in the present invention The checking number of times threshold limit of card information is preferably twice.
Obstructed out-of-date, the scheme of the location information that mobile intelligent terminal actively sends for shutdown checking information checking, this Scheme only provides location information, it is understood that there may be the incomplete problem of clue of offer, in order to improve what mobile intelligent terminal was given for change Probability, as shown in Fig. 2 the present invention is exceeding described checking number of times threshold limit when the checking number of times of described shutdown checking information When, real-time time is also sent to the monitoring client of setting by described mobile intelligent terminal simultaneously.It is understandable that and believed by positioning Breath record position and exact time, so can obtain clue investigation definitely, increase and give the several of smart mobile phone for change Rate.
For while the above-mentioned location information in transmission, also by the scheme of real-time time, the present invention gives and further changes Enter, when the checking number of times of described shutdown checking information exceedes described checking number of times threshold limit, described mobile intelligent terminal sets Orient described monitoring client and send location information and the transmission frequency of real-time time, according to described transmission frequency, described intelligent movable Terminal timing sends location information and real-time time to described monitoring client.By this improvement project, intelligent movable presses setting eventually Transmission frequency, regularly sends location information and real-time time to described monitoring client.By the program, in the non-power down condition of mobile phone Under, can constantly obtain the location information with real-time time, increased the possibility finding more hand-set from stolen clues, enter one Step improves the probability that mobile phone is retrieved.
Additionally, as shown in Fig. 2 the present invention, in order to improve the probability of giving for change of smart mobile phone, also provides following preferred version, when When the checking number of times of described shutdown checking information exceedes described checking number of times threshold limit, described mobile intelligent terminal is also by front Put camera identification face, when recognizing face, described mobile intelligent terminal obtains human face photo by front-facing camera, and Described human face photo is sent to the described monitoring client of setting.
It is understood that face is identified by front-facing camera, when recognizing face, obtain human face photo, and will Human face photo is sent to monitoring client, by recognition of face, it is possible to achieve only just taken pictures when recognizing face, this side Formula can avoid invalid taking pictures to lead to smart mobile phone kwh loss, extends the available machine time of mobile phone, obtaining face simultaneously It may be determined that theft suspicioner after photo, and give smart mobile phone for change by directly looking for people, this is also to give stolen smart mobile phone for change More efficient method.
In addition, as shown in Fig. 2 when stolen smart mobile phone is looked for by such scheme of the present invention, formulating a series of schemes, But actual conditions it may happen that stolen smart mobile phone not enough power supply lead to shutdown so that formulate scheme there is no specific aim. In order to solve the above problems, the present invention also provides below scheme, when described shutdown checking information checking number of times exceed described in test During card number of times threshold limit, the charge condition of described mobile intelligent terminal is also sent to the institute of setting by described mobile intelligent terminal State monitoring client.The charge condition of stolen smart mobile phone so can be understood in time, to adopt according to smart mobile phone charge condition Correspondence is taken effectively to look for measure.
Above-described specific embodiment, has been carried out to the purpose of the present invention, technical scheme and beneficial effect further Describe in detail, be should be understood that the specific embodiment that the foregoing is only the present invention, be not intended to limit the present invention Protection domain, all any modification, equivalent substitution and improvement within the spirit and principles in the present invention, done etc., all should comprise Within protection scope of the present invention.

Claims (10)

1. a kind of mobile intelligent terminal theft preventing method based on switching on and shutting down encrypted authentication, including:Described mobile intelligent terminal start When, described mobile intelligent terminal receives start checking information, the start checking information that described mobile intelligent terminal is received with set Fixed start checking information makees coupling checking, if coupling, enters described mobile intelligent terminal main operation interface;
It is characterized in that:
During described mobile intelligent terminal shutdown, described mobile intelligent terminal receives shutdown checking information, by described intelligent movable eventually The shutdown checking information that end receives is made to mate checking with the shutdown checking information setting, if coupling, is shut down;
When keeping open state, check the location information of described mobile intelligent terminal by the monitoring client setting, to described shifting Dynamic intelligent terminal location tracking.
2. the mobile intelligent terminal theft preventing method based on switching on and shutting down encrypted authentication according to claim 1 it is characterised in that: Described mobile intelligent terminal includes smart mobile phone or PAD, and described monitoring client is smart mobile phone and/or computer.
3. the mobile intelligent terminal theft preventing method based on switching on and shutting down encrypted authentication according to claim 1 it is characterised in that: Described start checking information and described shutdown checking information are respectively encrypted message, touch action information, finger print information and face At least one in information.
4. the mobile intelligent terminal theft preventing method based on switching on and shutting down encrypted authentication according to claim 1 it is characterised in that: Described start checking information is different or identical from described shutdown checking information.
5. the mobile intelligent terminal theft preventing method based on switching on and shutting down encrypted authentication according to any one of Claims 1-4, its It is characterised by:If the shutdown checking information that described mobile intelligent terminal receives is mismatched with the shutdown checking information setting, described Location information is sent to the monitoring client of setting by mobile intelligent terminal.
6. the mobile intelligent terminal theft preventing method based on switching on and shutting down encrypted authentication according to claim 5 it is characterised in that: Before location information is sent to the described monitoring client of setting by described mobile intelligent terminal, also set described shutdown checking information Checking number of times threshold limit, when described shutdown checking information checking number of times exceed described checking number of times threshold limit when, institute State the monitoring client that location information is sent to setting by mobile intelligent terminal.
7. the mobile intelligent terminal theft preventing method based on switching on and shutting down encrypted authentication according to claim 6 it is characterised in that: When the checking number of times of described shutdown checking information exceedes described checking number of times threshold limit, described mobile intelligent terminal is also simultaneously Real-time time is sent to the monitoring client of setting.
8. the mobile intelligent terminal theft preventing method based on switching on and shutting down encrypted authentication according to claim 7 it is characterised in that: When described shutdown checking information checking number of times exceed described checking number of times threshold limit when, described mobile intelligent terminal set to Described monitoring client sends location information and the transmission frequency of real-time time, according to described transmission frequency, described mobile intelligent terminal Timing sends location information and real-time time to described monitoring client.
9. the mobile intelligent terminal theft preventing method based on switching on and shutting down encrypted authentication according to claim 7 it is characterised in that: When described shutdown checking information checking number of times exceed described checking number of times threshold limit when, described mobile intelligent terminal also by Front-facing camera identifies face, and when recognizing face, described mobile intelligent terminal obtains human face photo by front-facing camera, And described human face photo is sent to the described monitoring client of setting.
10. the mobile intelligent terminal theft preventing method based on switching on and shutting down encrypted authentication according to claim 7, its feature exists In:When the checking number of times of described shutdown checking information exceedes described checking number of times threshold limit, described mobile intelligent terminal is also The charge condition of described mobile intelligent terminal is sent to the described monitoring client of setting.
CN201610958367.3A 2016-11-03 2016-11-03 Mobile intelligent terminal theft prevention method based on on-off encryption verification Pending CN106412325A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610958367.3A CN106412325A (en) 2016-11-03 2016-11-03 Mobile intelligent terminal theft prevention method based on on-off encryption verification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610958367.3A CN106412325A (en) 2016-11-03 2016-11-03 Mobile intelligent terminal theft prevention method based on on-off encryption verification

Publications (1)

Publication Number Publication Date
CN106412325A true CN106412325A (en) 2017-02-15

Family

ID=58014942

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610958367.3A Pending CN106412325A (en) 2016-11-03 2016-11-03 Mobile intelligent terminal theft prevention method based on on-off encryption verification

Country Status (1)

Country Link
CN (1) CN106412325A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107707754A (en) * 2017-09-29 2018-02-16 河南职业技术学院 A kind of intelligent terminal recovers method and apparatus
CN109362029A (en) * 2018-10-29 2019-02-19 重庆邮电大学 ESIM card hand machine long-range positioning system (Loran) and method based on the passive dual trigger mechanism of master
CN109618046A (en) * 2018-11-27 2019-04-12 维沃移动通信有限公司 A kind of auxiliary finding method and mobile terminal
CN109711127A (en) * 2017-10-25 2019-05-03 中国电信股份有限公司 Mobile terminal safety means of defence, device and its mobile terminal
CN110598384A (en) * 2019-09-16 2019-12-20 Oppo(重庆)智能科技有限公司 Information protection method, information protection device and mobile terminal
CN111667347A (en) * 2020-06-12 2020-09-15 吉林吉大通信设计院股份有限公司 Big data type searching system based on 5G communication technology and searching method thereof
US11256800B2 (en) 2017-12-05 2022-02-22 Wistron Corporation Electronic apparatus and unlocking method thereof

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102929807A (en) * 2012-11-19 2013-02-13 周万荣 Method for initiatively performing loss judgment and data processing and mobile terminal
CN104010088A (en) * 2014-06-16 2014-08-27 中国地质大学(武汉) Smart-phone anti-theft method and system
CN106027789A (en) * 2016-06-28 2016-10-12 上海哲奥实业有限公司 Anti-theft cellphone and anti-theft method for cellphone

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102929807A (en) * 2012-11-19 2013-02-13 周万荣 Method for initiatively performing loss judgment and data processing and mobile terminal
CN104010088A (en) * 2014-06-16 2014-08-27 中国地质大学(武汉) Smart-phone anti-theft method and system
CN106027789A (en) * 2016-06-28 2016-10-12 上海哲奥实业有限公司 Anti-theft cellphone and anti-theft method for cellphone

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107707754A (en) * 2017-09-29 2018-02-16 河南职业技术学院 A kind of intelligent terminal recovers method and apparatus
CN109711127A (en) * 2017-10-25 2019-05-03 中国电信股份有限公司 Mobile terminal safety means of defence, device and its mobile terminal
US11256800B2 (en) 2017-12-05 2022-02-22 Wistron Corporation Electronic apparatus and unlocking method thereof
CN109362029A (en) * 2018-10-29 2019-02-19 重庆邮电大学 ESIM card hand machine long-range positioning system (Loran) and method based on the passive dual trigger mechanism of master
CN109618046A (en) * 2018-11-27 2019-04-12 维沃移动通信有限公司 A kind of auxiliary finding method and mobile terminal
CN110598384A (en) * 2019-09-16 2019-12-20 Oppo(重庆)智能科技有限公司 Information protection method, information protection device and mobile terminal
CN111667347A (en) * 2020-06-12 2020-09-15 吉林吉大通信设计院股份有限公司 Big data type searching system based on 5G communication technology and searching method thereof
CN111667347B (en) * 2020-06-12 2023-11-07 吉林吉大通信设计院股份有限公司 Big data type search system based on 5G communication technology and search method thereof

Similar Documents

Publication Publication Date Title
CN106412325A (en) Mobile intelligent terminal theft prevention method based on on-off encryption verification
CN103370717B (en) Always-available embedded theft reaction subsystem
CN102546938A (en) Cell phone capable of realizing safety protection by means of intelligently capturing human face images by aid of front-facing camera
CN107590404A (en) Method for tracing and system and terminal device
CN106897594A (en) A kind of long range positioning method, system and terminal for realizing terminal
CN105893823A (en) Security protection method and device, and intelligent terminal
CN105278686A (en) Safety prompt method and device for smart wearable device
US20190362068A1 (en) Blockchain Oracle
CN105844181A (en) Key instruction processing method and terminal
CN100502599C (en) Security management method for mobile phone
CN103582184A (en) Double-card smart phone high in safety performance
CN104652964A (en) Intelligent RFID (Radio Frequency Identification Device) alarm lock device and intelligent alarm method thereof
CN107967731A (en) Door-locking system based on two-dimensional code scanning unlock
CN108133129A (en) A kind of unlocking method of application program, device and mobile terminal
CN101546467A (en) Radio alarm system and radio alarm method with early warning function
CN105975825A (en) Safety protection method and device, and mobile terminal
CN105335629A (en) Real-time protection method of mobile equipment capable of combing with intelligent wearable equipment on the basis of sensor technology
CN100375103C (en) Monitoring method of device having electronic label
CN106454730A (en) Anti-theft method and system for mobile terminal, and the mobile terminal
CN206249460U (en) A kind of recognition of face intelligent anti-theft is swiped the card door lock
CN110113423A (en) A method of message is used based on internet push intelligent door lock
CN204926229U (en) Multi -functional intelligent security fingerprint lock based on biological identification technique
CN205540170U (en) Intelligence home safety burglar alarm communication system
CN108009450A (en) The method, apparatus and terminal of terminal anti-theft
CN205910753U (en) Electronic lock system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170215

RJ01 Rejection of invention patent application after publication