CN106412325A - Mobile intelligent terminal theft prevention method based on on-off encryption verification - Google Patents
Mobile intelligent terminal theft prevention method based on on-off encryption verification Download PDFInfo
- Publication number
- CN106412325A CN106412325A CN201610958367.3A CN201610958367A CN106412325A CN 106412325 A CN106412325 A CN 106412325A CN 201610958367 A CN201610958367 A CN 201610958367A CN 106412325 A CN106412325 A CN 106412325A
- Authority
- CN
- China
- Prior art keywords
- intelligent terminal
- mobile intelligent
- checking
- information
- shutdown
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/161—Detection; Localisation; Normalisation
- G06V40/166—Detection; Localisation; Normalisation using acquisition arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72457—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to geographic location
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Abstract
The invention relates to a mobile intelligent terminal theft prevention method based on on-off encryption verification, which belongs to the field of mobile intelligent terminals. Power-off verification information is set, the terminal can not be power-off if the verification is not passed, positioning information is checked in real time through a monitoring end, and the stolen mobile intelligent terminal is positioned, tracked and recovered; the mobile intelligent terminal sends the positioning information to the monitoring end, and the problem that no information of the stolen mobile intelligent terminal can be acquired when the owner does not use the monitoring end can be solved; a sending frequency is set, the mobile intelligent terminal regularly sends the positioning information and the real-time time to the monitoring end, the positioning information with the real-time time can be obtained continuously, and the possibility of finding more cell phone stolen clues is increased; and through human face recognition, photographing is only carried out when a human face is recognized, power loss caused by invalid photographing is avoided, the power-on time of the cell phone is prolonged, and after the human face picture is acquired, the stolen mobile intelligent terminal can be recovered through directing finding the person.
Description
Technical field
The invention belongs to mobile intelligent terminal field is and in particular to a kind of intelligent movable based on switching on and shutting down encrypted authentication is whole
End theft preventing method.
Background technology
The mobile intelligent terminals such as smart mobile phone, PAD are most commonly seen meanss of communication in people's daily life, and it not only has
There is basic communication function, the development with development of Mobile Internet technology and the lifting of the hardware performance of mobile intelligent terminal, mobile phone
Become indispensable aid in a lot of people's live and works Deng mobile intelligent terminal.
The mobile intelligent terminals such as smart mobile phone, PAD have higher value and use value, but the spy because of its portability
Point, the case leading to the mobile intelligent terminals such as mobile phone, PAD stolen occurs again and again, flow of the people than larger, compare congested traffic
In instrument, such as:Subway, bus, train etc., or in flow of the people than larger public place, such as market, supermarket etc., theft
The case of the mobile intelligent terminals such as mobile phone is more common.The stolen loss such as smart mobile phone, PAD is not only caused economically to us
Loss, and in mobile intelligent terminal, the loss of capsule information more likely causes the loss that can not estimate.
In order to improve the security of mobile terminal, various manufacturers are proposed the theft-prevention applications of a large amount of mobile intelligent terminals, can
To carry out multiple safety measures, such as using mobile phone positioning function, location tracking is carried out to mobile phone, by obtaining the positioning letter of mobile phone
Breath, mobile phone location is shown on electronic map platform, but the shortcoming of prior art theft-prevention applications is not by theft-prevention applications and hand
The start of machine, shutdown combine, and so when being shut down at once after hand-set from stolen, cannot obtain any letter of stolen mobile phone
Breath, thus lose the best opportunity of getting back mobile phone.
, after the user discover that mobile phone is stolen on bus, the first reaction is that the mobile phone by means of others is dialled taking smart mobile phone as a example
Beat the number of lost mobile phone, determine the position of mobile phone by the tinkle of bells of mobile phone.If but the mobile phone lost is shut down, just at once
It has been to sever immediately upon impact by the firing pin this mobile phone to contact with extraneous, the owner of lost property also loses the best opportunity recovering mobile phone simultaneously.
At present, smart mobile phone on the market is typically all the integral structure mode that battery module is not directly dismantled, this
Effectively prevent mobile phone to be shut down by removing battery at once after pilferage.Therefore, in order to can be most possibly after hand-set from stolen
Getting back mobile phone, is highly desirable to a kind of scheme limiting malice shutdown at present, is especially that by the short time after hand-set from stolen
The scheme that cannot shut down, is difficult in the short time after hand-set from stolen have an opportunity carry out maliciously shutting down by external tool, this ensures that
Mobile phone electricity not using complete and do not taken apart by external tool lead to shutdown in the case of, mobile phone cannot shut down, on this basis
Carry out positioning, follow the trail of getting back mobile phone.
Therefore, the security how improving mobile intelligent terminal is still a technical barrier urgently to be resolved hurrily.
Content of the invention
In view of this, it is an object of the invention to overcoming the deficiencies in the prior art, a kind of encryption based on switching on and shutting down is provided to test
The mobile intelligent terminal theft preventing method of card, solves to be led to forfeiture to give movement for change due to shutting down immediately after mobile intelligent terminal is stolen
The problem of intelligent terminal best opportunity.
For realizing object above, the present invention adopts the following technical scheme that:
A kind of mobile intelligent terminal theft preventing method based on switching on and shutting down encrypted authentication, including:Described mobile intelligent terminal is opened
During machine, described mobile intelligent terminal receives start checking information, the start checking information that described mobile intelligent terminal is received with
The start checking information setting makees coupling checking, if coupling, enters described mobile intelligent terminal main operation interface;
During described mobile intelligent terminal shutdown, described mobile intelligent terminal receives shutdown checking information, by described mobile intelligence
Terminal the shutdown checking information receiving and the shutdown checking information setting can make to mate checking, if coupling, shut down;
When keeping open state, check the location information of described mobile intelligent terminal by the monitoring client setting, to institute
State mobile intelligent terminal location tracking.
Further, described mobile intelligent terminal includes smart mobile phone or PAD, described monitoring client be smart mobile phone and/or
Computer.
Further, described start checking information and described shutdown checking information are respectively encrypted message, touch action letter
At least one in breath, finger print information and face information.
Further, described start checking information is different or identical from described shutdown checking information.
Further, if the shutdown checking information of the shutdown checking information that receives of described mobile intelligent terminal and setting not
Join, location information is sent to the monitoring client of setting by described mobile intelligent terminal.
Further, before location information being sent in described mobile intelligent terminal the described monitoring client of setting, also set
The checking number of times threshold limit of fixed described shutdown checking information, when the checking number of times of described shutdown checking information exceedes described checking
During number of times threshold limit, location information is sent to the monitoring client of setting by described mobile intelligent terminal.
Further, when the checking number of times of described shutdown checking information exceedes described checking number of times threshold limit, described
Real-time time is also sent to the monitoring client of setting by mobile intelligent terminal simultaneously.
Further, when the checking number of times of described shutdown checking information exceedes described checking number of times threshold limit, described
Mobile intelligent terminal sets and sends location information and the transmission frequency of real-time time to described monitoring client, sends frequency according to described
Rate, described mobile intelligent terminal timing sends location information and real-time time to described monitoring client.
Further, when the checking number of times of described shutdown checking information exceedes described checking number of times threshold limit, described
Mobile intelligent terminal identifies face also by front-facing camera, and when recognizing face, described mobile intelligent terminal passes through preposition
Camera obtains human face photo, and described human face photo is sent to the described monitoring client of setting.
Further, when the checking number of times of described shutdown checking information exceedes described checking number of times threshold limit, described
The charge condition of described mobile intelligent terminal is also sent to the described monitoring client of setting by mobile intelligent terminal.
The present invention adopts above technical scheme, at least possesses following beneficial effect:
The present invention provides a kind of mobile intelligent terminal theft preventing method based on switching on and shutting down encrypted authentication, is tested by arranging shutdown
Card information, the coupling checking to shutdown checking information, if coupling checking is not passed through, mobile intelligent terminal cannot shut down, by prison
The location information of the stolen mobile intelligent terminal of control end real-time reception, carries out location tracking to stolen mobile intelligent terminal and gives for change;?
Shutdown checking information is obstructed out-of-date, and location information is sent to the monitoring client of setting, the positioning actively sending by mobile intelligent terminal
Information, as clue, solves the owner of lost property not using monitoring client, just cannot obtain asking of any information of stolen mobile intelligent terminal
Topic, increases the probability giving stolen mobile intelligent terminal for change;Setting transmission frequency, mobile intelligent terminal timing sends to monitoring client
Location information and real-time time, can constantly obtain the location information with real-time time, increased and find more mobile phone quilts
Steal the possibility of clue, improve the probability that mobile phone is retrieved further;By recognition of face, just clapped when recognizing face
According to, it is to avoid the invalid kwh loss leading to of taking pictures, the available machine time of extending cell phone, simultaneously after obtaining human face photo, Ke Yitong
Cross and directly look for people to give stolen mobile intelligent terminal for change.
Brief description
Fig. 1 starts shooting for the present invention and verifies the schematic diagram of flow process;
Fig. 2 shuts down for the present invention and verifies the schematic diagram of flow process.
Specific embodiment
Below by drawings and Examples, technical scheme is described in further detail.
As depicted in figs. 1 and 2, the present invention provides a kind of mobile intelligent terminal antitheft square based on switching on and shutting down encrypted authentication
Method, including:During described mobile intelligent terminal start, described mobile intelligent terminal receives start checking information, by described mobile intelligence
Terminal the start checking information receiving and the start checking information setting can make to mate checking, if coupling, enter described movement
Intelligent terminal main operation interface;
During described mobile intelligent terminal shutdown, described mobile intelligent terminal receives shutdown checking information, by described mobile intelligence
Terminal the shutdown checking information receiving and the shutdown checking information setting can make to mate checking, if coupling, shut down;
During open state, check the location information of described mobile intelligent terminal by the monitoring client setting, to described movement
Intelligent terminal location tracking.
With reference to concrete application scene, the present invention is further described, in the present invention in actual applications, described
Mobile intelligent terminal includes smart mobile phone and PAD etc., and described monitoring client is smart mobile phone and/or computer etc..
Below described mobile intelligent terminal taking the smart mobile phone that battery module is not directly dismantled as a example, can by hardware or
Software and hardware combining mode application such scheme of the present invention.After stolen, the acquisition of the location information of the present invention can pass through prior art
Network positions and/or GPS location realize, by the stolen smart mobile phone location information of monitoring client real time inspection, to stolen intelligence
Energy mobile phone carries out location tracking and gives for change.
Stealer is typically understood the very first time and is carried out power-off operation to smart mobile phone, is tracked with preventing from being positioned, but because stealing
Robber person is difficult to be shut down by external tool detaching mobile phones at short notice, thus may input shutdown checking information and carry out
Coupling checking, if checking is not passed through, smart mobile phone cannot shut down.The tracking to stolen smart mobile phone thus can be kept,
This is the best opportunity of getting back mobile phone, thus that improves stolen smart mobile phone gives probability for change.
In the present invention, described start checking information and described shutdown checking information can be encrypted message, touch action letter
At least one in breath, finger print information and face information.In addition, described start checking information is different from described shutdown checking information
Or identical, as preferred embodiment, preferably described start checking information and described shutdown checking in actual application
Information adopts different means modes, it is to avoid described start checking information adopts identical to verify hand with described shutdown checking information
Duan Shi, is cracked one of, another is also cracked simultaneously.
As shown in Fig. 2 the present invention, for obstructed out-of-date in shutdown checking, give a kind of raising and gives stolen smart mobile phone for change
The preferred version of probability, specially:The shutdown checking information that described mobile intelligent terminal receives and the shutdown checking information setting
If mismatching, location information is sent to the monitoring client of setting by described mobile intelligent terminal.
The monitoring client that location information is sent to setting by smart mobile phone can be triggered by such scheme, so setting is former
Because being, monitoring client could show the location information of stolen smart mobile phone by real-time tracing only when using, and is a kind of passive mode,
If the owner of lost property actively using monitoring client, just cannot not obtain any information of stolen smart mobile phone.To this such scheme of the present invention
It is a kind of improvement project of active trigger-type, when shutdown checking mismatches, real-time time is sent by triggering mobile intelligent terminal
To the monitoring client setting.So monitoring client can be designed as the alerting computer of public security organ in actual applications, when shutdown is tested
Card Information Authentication is obstructed out-of-date, and location information is sent to the alerting computer of the public security organ of setting by triggering mobile intelligent terminal,
Type of alarm can be passed through, the location information that smart mobile phone actively sends is supplied to police as clue, greatly increases and gives for change
The probability of the smart mobile phone lost.
When using such scheme normal shutdown, it is possible that because erroneous input checking information leads to smart mobile phone will position
Information be sent to setting monitoring client this unnecessary the occurrence of.In order to solve this problem, as shown in Fig. 2 the present invention
Before location information is sent to the described monitoring client of setting by described mobile intelligent terminal, also set described shutdown checking information
Checking number of times threshold limit, when described shutdown checking information checking number of times exceed described checking number of times threshold limit when, institute
State the monitoring client that location information is sent to setting by mobile intelligent terminal.
By setting this mode of checking number of times threshold limit of shutdown checking information, owner's normal shutdown can be avoided
When, lead to smart mobile phone that location information is sent to this unnecessary situation of monitoring client of setting because shutdown checking information mismatches
Generation.In actual use, the checking number of times of shutdown checking information is more few better, provides described shutdown and test in the present invention
The checking number of times threshold limit of card information is preferably twice.
Obstructed out-of-date, the scheme of the location information that mobile intelligent terminal actively sends for shutdown checking information checking, this
Scheme only provides location information, it is understood that there may be the incomplete problem of clue of offer, in order to improve what mobile intelligent terminal was given for change
Probability, as shown in Fig. 2 the present invention is exceeding described checking number of times threshold limit when the checking number of times of described shutdown checking information
When, real-time time is also sent to the monitoring client of setting by described mobile intelligent terminal simultaneously.It is understandable that and believed by positioning
Breath record position and exact time, so can obtain clue investigation definitely, increase and give the several of smart mobile phone for change
Rate.
For while the above-mentioned location information in transmission, also by the scheme of real-time time, the present invention gives and further changes
Enter, when the checking number of times of described shutdown checking information exceedes described checking number of times threshold limit, described mobile intelligent terminal sets
Orient described monitoring client and send location information and the transmission frequency of real-time time, according to described transmission frequency, described intelligent movable
Terminal timing sends location information and real-time time to described monitoring client.By this improvement project, intelligent movable presses setting eventually
Transmission frequency, regularly sends location information and real-time time to described monitoring client.By the program, in the non-power down condition of mobile phone
Under, can constantly obtain the location information with real-time time, increased the possibility finding more hand-set from stolen clues, enter one
Step improves the probability that mobile phone is retrieved.
Additionally, as shown in Fig. 2 the present invention, in order to improve the probability of giving for change of smart mobile phone, also provides following preferred version, when
When the checking number of times of described shutdown checking information exceedes described checking number of times threshold limit, described mobile intelligent terminal is also by front
Put camera identification face, when recognizing face, described mobile intelligent terminal obtains human face photo by front-facing camera, and
Described human face photo is sent to the described monitoring client of setting.
It is understood that face is identified by front-facing camera, when recognizing face, obtain human face photo, and will
Human face photo is sent to monitoring client, by recognition of face, it is possible to achieve only just taken pictures when recognizing face, this side
Formula can avoid invalid taking pictures to lead to smart mobile phone kwh loss, extends the available machine time of mobile phone, obtaining face simultaneously
It may be determined that theft suspicioner after photo, and give smart mobile phone for change by directly looking for people, this is also to give stolen smart mobile phone for change
More efficient method.
In addition, as shown in Fig. 2 when stolen smart mobile phone is looked for by such scheme of the present invention, formulating a series of schemes,
But actual conditions it may happen that stolen smart mobile phone not enough power supply lead to shutdown so that formulate scheme there is no specific aim.
In order to solve the above problems, the present invention also provides below scheme, when described shutdown checking information checking number of times exceed described in test
During card number of times threshold limit, the charge condition of described mobile intelligent terminal is also sent to the institute of setting by described mobile intelligent terminal
State monitoring client.The charge condition of stolen smart mobile phone so can be understood in time, to adopt according to smart mobile phone charge condition
Correspondence is taken effectively to look for measure.
Above-described specific embodiment, has been carried out to the purpose of the present invention, technical scheme and beneficial effect further
Describe in detail, be should be understood that the specific embodiment that the foregoing is only the present invention, be not intended to limit the present invention
Protection domain, all any modification, equivalent substitution and improvement within the spirit and principles in the present invention, done etc., all should comprise
Within protection scope of the present invention.
Claims (10)
1. a kind of mobile intelligent terminal theft preventing method based on switching on and shutting down encrypted authentication, including:Described mobile intelligent terminal start
When, described mobile intelligent terminal receives start checking information, the start checking information that described mobile intelligent terminal is received with set
Fixed start checking information makees coupling checking, if coupling, enters described mobile intelligent terminal main operation interface;
It is characterized in that:
During described mobile intelligent terminal shutdown, described mobile intelligent terminal receives shutdown checking information, by described intelligent movable eventually
The shutdown checking information that end receives is made to mate checking with the shutdown checking information setting, if coupling, is shut down;
When keeping open state, check the location information of described mobile intelligent terminal by the monitoring client setting, to described shifting
Dynamic intelligent terminal location tracking.
2. the mobile intelligent terminal theft preventing method based on switching on and shutting down encrypted authentication according to claim 1 it is characterised in that:
Described mobile intelligent terminal includes smart mobile phone or PAD, and described monitoring client is smart mobile phone and/or computer.
3. the mobile intelligent terminal theft preventing method based on switching on and shutting down encrypted authentication according to claim 1 it is characterised in that:
Described start checking information and described shutdown checking information are respectively encrypted message, touch action information, finger print information and face
At least one in information.
4. the mobile intelligent terminal theft preventing method based on switching on and shutting down encrypted authentication according to claim 1 it is characterised in that:
Described start checking information is different or identical from described shutdown checking information.
5. the mobile intelligent terminal theft preventing method based on switching on and shutting down encrypted authentication according to any one of Claims 1-4, its
It is characterised by:If the shutdown checking information that described mobile intelligent terminal receives is mismatched with the shutdown checking information setting, described
Location information is sent to the monitoring client of setting by mobile intelligent terminal.
6. the mobile intelligent terminal theft preventing method based on switching on and shutting down encrypted authentication according to claim 5 it is characterised in that:
Before location information is sent to the described monitoring client of setting by described mobile intelligent terminal, also set described shutdown checking information
Checking number of times threshold limit, when described shutdown checking information checking number of times exceed described checking number of times threshold limit when, institute
State the monitoring client that location information is sent to setting by mobile intelligent terminal.
7. the mobile intelligent terminal theft preventing method based on switching on and shutting down encrypted authentication according to claim 6 it is characterised in that:
When the checking number of times of described shutdown checking information exceedes described checking number of times threshold limit, described mobile intelligent terminal is also simultaneously
Real-time time is sent to the monitoring client of setting.
8. the mobile intelligent terminal theft preventing method based on switching on and shutting down encrypted authentication according to claim 7 it is characterised in that:
When described shutdown checking information checking number of times exceed described checking number of times threshold limit when, described mobile intelligent terminal set to
Described monitoring client sends location information and the transmission frequency of real-time time, according to described transmission frequency, described mobile intelligent terminal
Timing sends location information and real-time time to described monitoring client.
9. the mobile intelligent terminal theft preventing method based on switching on and shutting down encrypted authentication according to claim 7 it is characterised in that:
When described shutdown checking information checking number of times exceed described checking number of times threshold limit when, described mobile intelligent terminal also by
Front-facing camera identifies face, and when recognizing face, described mobile intelligent terminal obtains human face photo by front-facing camera,
And described human face photo is sent to the described monitoring client of setting.
10. the mobile intelligent terminal theft preventing method based on switching on and shutting down encrypted authentication according to claim 7, its feature exists
In:When the checking number of times of described shutdown checking information exceedes described checking number of times threshold limit, described mobile intelligent terminal is also
The charge condition of described mobile intelligent terminal is sent to the described monitoring client of setting.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610958367.3A CN106412325A (en) | 2016-11-03 | 2016-11-03 | Mobile intelligent terminal theft prevention method based on on-off encryption verification |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610958367.3A CN106412325A (en) | 2016-11-03 | 2016-11-03 | Mobile intelligent terminal theft prevention method based on on-off encryption verification |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106412325A true CN106412325A (en) | 2017-02-15 |
Family
ID=58014942
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610958367.3A Pending CN106412325A (en) | 2016-11-03 | 2016-11-03 | Mobile intelligent terminal theft prevention method based on on-off encryption verification |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106412325A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107707754A (en) * | 2017-09-29 | 2018-02-16 | 河南职业技术学院 | A kind of intelligent terminal recovers method and apparatus |
CN109362029A (en) * | 2018-10-29 | 2019-02-19 | 重庆邮电大学 | ESIM card hand machine long-range positioning system (Loran) and method based on the passive dual trigger mechanism of master |
CN109618046A (en) * | 2018-11-27 | 2019-04-12 | 维沃移动通信有限公司 | A kind of auxiliary finding method and mobile terminal |
CN109711127A (en) * | 2017-10-25 | 2019-05-03 | 中国电信股份有限公司 | Mobile terminal safety means of defence, device and its mobile terminal |
CN110598384A (en) * | 2019-09-16 | 2019-12-20 | Oppo(重庆)智能科技有限公司 | Information protection method, information protection device and mobile terminal |
CN111667347A (en) * | 2020-06-12 | 2020-09-15 | 吉林吉大通信设计院股份有限公司 | Big data type searching system based on 5G communication technology and searching method thereof |
US11256800B2 (en) | 2017-12-05 | 2022-02-22 | Wistron Corporation | Electronic apparatus and unlocking method thereof |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102929807A (en) * | 2012-11-19 | 2013-02-13 | 周万荣 | Method for initiatively performing loss judgment and data processing and mobile terminal |
CN104010088A (en) * | 2014-06-16 | 2014-08-27 | 中国地质大学(武汉) | Smart-phone anti-theft method and system |
CN106027789A (en) * | 2016-06-28 | 2016-10-12 | 上海哲奥实业有限公司 | Anti-theft cellphone and anti-theft method for cellphone |
-
2016
- 2016-11-03 CN CN201610958367.3A patent/CN106412325A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102929807A (en) * | 2012-11-19 | 2013-02-13 | 周万荣 | Method for initiatively performing loss judgment and data processing and mobile terminal |
CN104010088A (en) * | 2014-06-16 | 2014-08-27 | 中国地质大学(武汉) | Smart-phone anti-theft method and system |
CN106027789A (en) * | 2016-06-28 | 2016-10-12 | 上海哲奥实业有限公司 | Anti-theft cellphone and anti-theft method for cellphone |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107707754A (en) * | 2017-09-29 | 2018-02-16 | 河南职业技术学院 | A kind of intelligent terminal recovers method and apparatus |
CN109711127A (en) * | 2017-10-25 | 2019-05-03 | 中国电信股份有限公司 | Mobile terminal safety means of defence, device and its mobile terminal |
US11256800B2 (en) | 2017-12-05 | 2022-02-22 | Wistron Corporation | Electronic apparatus and unlocking method thereof |
CN109362029A (en) * | 2018-10-29 | 2019-02-19 | 重庆邮电大学 | ESIM card hand machine long-range positioning system (Loran) and method based on the passive dual trigger mechanism of master |
CN109618046A (en) * | 2018-11-27 | 2019-04-12 | 维沃移动通信有限公司 | A kind of auxiliary finding method and mobile terminal |
CN110598384A (en) * | 2019-09-16 | 2019-12-20 | Oppo(重庆)智能科技有限公司 | Information protection method, information protection device and mobile terminal |
CN111667347A (en) * | 2020-06-12 | 2020-09-15 | 吉林吉大通信设计院股份有限公司 | Big data type searching system based on 5G communication technology and searching method thereof |
CN111667347B (en) * | 2020-06-12 | 2023-11-07 | 吉林吉大通信设计院股份有限公司 | Big data type search system based on 5G communication technology and search method thereof |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106412325A (en) | Mobile intelligent terminal theft prevention method based on on-off encryption verification | |
CN103370717B (en) | Always-available embedded theft reaction subsystem | |
CN102546938A (en) | Cell phone capable of realizing safety protection by means of intelligently capturing human face images by aid of front-facing camera | |
CN107590404A (en) | Method for tracing and system and terminal device | |
CN106897594A (en) | A kind of long range positioning method, system and terminal for realizing terminal | |
CN105893823A (en) | Security protection method and device, and intelligent terminal | |
CN105278686A (en) | Safety prompt method and device for smart wearable device | |
US20190362068A1 (en) | Blockchain Oracle | |
CN105844181A (en) | Key instruction processing method and terminal | |
CN100502599C (en) | Security management method for mobile phone | |
CN103582184A (en) | Double-card smart phone high in safety performance | |
CN104652964A (en) | Intelligent RFID (Radio Frequency Identification Device) alarm lock device and intelligent alarm method thereof | |
CN107967731A (en) | Door-locking system based on two-dimensional code scanning unlock | |
CN108133129A (en) | A kind of unlocking method of application program, device and mobile terminal | |
CN101546467A (en) | Radio alarm system and radio alarm method with early warning function | |
CN105975825A (en) | Safety protection method and device, and mobile terminal | |
CN105335629A (en) | Real-time protection method of mobile equipment capable of combing with intelligent wearable equipment on the basis of sensor technology | |
CN100375103C (en) | Monitoring method of device having electronic label | |
CN106454730A (en) | Anti-theft method and system for mobile terminal, and the mobile terminal | |
CN206249460U (en) | A kind of recognition of face intelligent anti-theft is swiped the card door lock | |
CN110113423A (en) | A method of message is used based on internet push intelligent door lock | |
CN204926229U (en) | Multi -functional intelligent security fingerprint lock based on biological identification technique | |
CN205540170U (en) | Intelligence home safety burglar alarm communication system | |
CN108009450A (en) | The method, apparatus and terminal of terminal anti-theft | |
CN205910753U (en) | Electronic lock system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170215 |
|
RJ01 | Rejection of invention patent application after publication |