CN106506785B - Terminal and encryption method for realizing terminal theft prevention - Google Patents

Terminal and encryption method for realizing terminal theft prevention Download PDF

Info

Publication number
CN106506785B
CN106506785B CN201610932467.9A CN201610932467A CN106506785B CN 106506785 B CN106506785 B CN 106506785B CN 201610932467 A CN201610932467 A CN 201610932467A CN 106506785 B CN106506785 B CN 106506785B
Authority
CN
China
Prior art keywords
unlocking
terminal
mode
encryption
encryption mode
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610932467.9A
Other languages
Chinese (zh)
Other versions
CN106506785A (en
Inventor
彭生全
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201610932467.9A priority Critical patent/CN106506785B/en
Publication of CN106506785A publication Critical patent/CN106506785A/en
Application granted granted Critical
Publication of CN106506785B publication Critical patent/CN106506785B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/72412User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Computer Interaction (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the invention discloses a terminal and an encryption method for realizing terminal theft prevention, wherein the terminal comprises the following components: a setting unit configured to set a first encryption mode and a second encryption mode; the first encryption mode corresponds to one unlocking mode, and the second encryption mode corresponds to at least two unlocking modes; the detection unit is used for detecting whether the terminal starts an anti-theft mode or not to obtain a detection result; the first unlocking unit is used for unlocking by adopting a first unlocking mode corresponding to the first encryption mode when the detection result indicates that the anti-theft mode is not started; and the second unlocking unit is used for monitoring the first distance between the terminal and the appointed target terminal in real time when the detection result is that the anti-theft mode is started, and receiving the fact that the appointed target terminal controls the terminal to switch between the first encryption mode and the second encryption mode according to the first distance.

Description

Terminal and encryption method for realizing terminal theft prevention
Technical Field
The invention relates to an encryption technology, in particular to a terminal and an encryption method for realizing terminal theft prevention.
Background
Along with the increasing popularization of the intellectualization of the terminal, the market share of the terminal is higher and higher, and more users can use various intelligent services brought by the terminal. The terminal contains a lot of user privacy information, and if the terminal is stolen, the user privacy information is easily leaked. The current user requirements are: the terminal is prevented from being stolen, and the preventive measure is simple and easy to use, so that the terminal is ensured to be in monitoring of stolen prevention, stolen monitoring can be relieved at any time under normal use conditions, unlocking of the stolen monitoring is more convenient, the terminal is prevented from being stolen well, and the protection capability of user privacy information in the terminal is improved. However, there is no effective solution for this need in the related art.
Disclosure of Invention
The embodiment of the invention provides a terminal and an encryption method for realizing terminal theft prevention, which at least solve the technical problem.
A terminal according to an embodiment of the present invention includes:
a setting unit configured to set a first encryption mode and a second encryption mode; the first encryption mode corresponds to one unlocking mode, and the second encryption mode corresponds to at least two unlocking modes;
the detection unit is used for detecting whether the terminal starts an anti-theft mode or not to obtain a detection result;
the first unlocking unit is used for unlocking by adopting a first unlocking mode corresponding to the first encryption mode when the detection result indicates that the anti-theft mode is not started;
and the second unlocking unit is used for monitoring the first distance between the terminal and the appointed target terminal in real time when the detection result is that the anti-theft mode is started, receiving the switching of the appointed target terminal between the first encryption mode and the second encryption mode according to the first distance, and unlocking by adopting at least two unlocking modes corresponding to the second encryption mode if the current switching is switched to the second encryption mode.
In the above scheme, the at least two unlocking modes include: the pattern unlocking mode comprises at least two modes of sliding unlocking, password unlocking, pattern unlocking, fingerprint unlocking and iris unlocking.
In the foregoing solution, the terminal further includes:
and the unlocking mode selection unit is used for carrying out priority ordering on the at least two unlocking modes according to the unlocking difficulty, and selecting at least two unlocking modes with the unlocking difficulty arranged in the front from the unlocking mode selection list according to the priority ordering.
In the foregoing solution, the second unlocking unit is further configured to:
and when the first distance is less than or equal to a first threshold value, receiving the specified target terminal to control the terminal to close the anti-theft mode, switching to the first encryption mode, unlocking by adopting a first unlocking mode corresponding to the first encryption mode, and entering a normal operation mode of the terminal.
In the foregoing solution, the second unlocking unit is further configured to:
when the first distance is larger than a first threshold value, the specified target terminal is accepted to control the terminal to enter the anti-theft mode, the terminal is switched to the second encryption mode, a reminding message for representing the theft risk of the terminal is triggered to a terminal user, and at least two unlocking modes corresponding to the second encryption mode are adopted for unlocking;
the reminding message comprises: the anti-theft warning tone triggered by the first terminal and/or the vibration triggered by the second terminal.
The encryption method for realizing terminal theft prevention in the embodiment of the invention comprises the following steps:
setting a first encryption mode and a second encryption mode; the first encryption mode corresponds to one unlocking mode, and the second encryption mode corresponds to at least two unlocking modes;
detecting whether the terminal starts an anti-theft mode or not to obtain a detection result;
when the detection result indicates that the anti-theft mode is not started, a first unlocking mode corresponding to the first encryption mode is adopted for unlocking;
and when the detection result is that the anti-theft mode is started, monitoring a first distance between the terminal and a specified target terminal in real time, receiving that the specified target terminal controls the terminal to switch between the first encryption mode and the second encryption mode according to the first distance, and if the terminal is switched to the second encryption mode at present, unlocking by adopting at least two unlocking modes corresponding to the second encryption mode.
In the above scheme, the at least two unlocking modes include: the pattern unlocking mode comprises at least two modes of sliding unlocking, password unlocking, pattern unlocking, fingerprint unlocking and iris unlocking.
In the above scheme, the method further comprises:
and performing priority ordering on the at least two unlocking modes according to the unlocking difficulty, and selecting at least two unlocking modes with the unlocking difficulty arranged in the front from an unlocking mode selection list according to the priority ordering.
In the foregoing solution, the receiving that the designated target terminal switches between the first encryption mode and the second encryption mode according to the first distance control terminal itself includes:
and when the first distance is less than or equal to a first threshold value, receiving the specified target terminal to control the terminal to close the anti-theft mode, switching to the first encryption mode, unlocking by adopting a first unlocking mode corresponding to the first encryption mode, and entering a normal operation mode of the terminal.
In the foregoing solution, the receiving that the designated target terminal switches between the first encryption mode and the second encryption mode according to the first distance control terminal itself includes:
when the first distance is larger than a first threshold value, the specified target terminal is accepted to control the terminal to enter the anti-theft mode, the terminal is switched to the second encryption mode, a reminding message for representing the theft risk of the terminal is triggered to a terminal user, and at least two unlocking modes corresponding to the second encryption mode are adopted for unlocking;
the reminding message comprises: the anti-theft warning tone triggered by the first terminal and/or the vibration triggered by the second terminal.
The terminal of the embodiment of the invention comprises: a setting unit configured to set a first encryption mode and a second encryption mode; the first encryption mode corresponds to one unlocking mode, and the second encryption mode corresponds to at least two unlocking modes; the detection unit is used for detecting whether the terminal starts an anti-theft mode or not to obtain a detection result; the first unlocking unit is used for unlocking by adopting a first unlocking mode corresponding to the first encryption mode when the detection result indicates that the anti-theft mode is not started; and the second unlocking unit is used for monitoring the first distance between the terminal and the appointed target terminal in real time when the detection result is that the anti-theft mode is started, receiving the switching of the appointed target terminal between the first encryption mode and the second encryption mode according to the first distance, and unlocking by adopting at least two unlocking modes corresponding to the second encryption mode if the current switching is switched to the second encryption mode.
By adopting the embodiment of the invention, multiple encryption modes are selected, whether a first encryption mode (such as a common encryption mode which only needs one unlocking mode to unlock) needs to be switched to a second encryption mode (such as an encryption enhancement mode which needs at least two unlocking modes to unlock) is intelligently detected through the distance between the terminal (such as a mobile phone terminal) and a specified target terminal (such as a bracelet), so that the requirement for preventing the terminal from being stolen is met, the protection capability of user privacy information in the terminal is improved, the prevention measures are simple and easy to use through intelligent switching of the modes and corresponding unlocking of distance detection, the terminal can be ensured to be in monitoring of theft prevention, the theft monitoring can be relieved at any time under the normal use condition, and the unlocking of the theft monitoring is more convenient.
Drawings
Fig. 1 is a schematic hardware configuration diagram of an alternative mobile terminal implementing various embodiments of the present invention;
FIG. 2 is a diagram of a wireless communication system for the mobile terminal shown in FIG. 1;
FIG. 3 is a schematic diagram of a process flow of an embodiment of the present invention;
FIG. 4 is a schematic diagram of another method flow of an embodiment of the present invention;
FIG. 5 is a diagram illustrating the hardware components of a terminal according to an embodiment of the invention;
fig. 6 is a flowchart illustrating a method for applying an application scenario according to an embodiment of the present invention.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
A terminal implementing various embodiments of the present invention will now be described with reference to the accompanying drawings. In the following description, suffixes such as "module", "component", or "unit" used to denote elements are used only for facilitating the description of the embodiments of the present invention, and have no specific meaning in themselves. Thus, "module" and "component" may be used in a mixture.
The terminal may be implemented in various forms. For example, the terminal described in the embodiments of the present invention may include terminals such as a mobile phone, a smart phone, a notebook computer, a digital broadcast receiver, a Personal Digital Assistant (PDA), a tablet computer (PAD), a Portable Multimedia Player (PMP), a navigation device, and the like, and fixed terminals such as a digital TV, a desktop computer, and the like. In the following, it is assumed that the terminal is a mobile terminal. However, it will be understood by those skilled in the art that the configuration according to the embodiment of the present invention can be applied to a fixed type terminal in addition to elements particularly used for moving purposes.
Fig. 1 is a schematic diagram of a hardware structure of an alternative mobile terminal for implementing various embodiments of the present invention.
The mobile terminal 100 may include a wireless communication unit 110, an audio/video (a/V) input unit 120, a user input unit 130, a setting unit 140, a detection unit 141, a first unlocking unit 142, a second unlocking unit 143, an output unit 150, a memory 160, an interface unit 170, a controller 180, and a power supply unit 190, and the like. Fig. 1 illustrates a mobile terminal having various components, but it is to be understood that not all illustrated components are required to be implemented. More or fewer components may alternatively be implemented. Elements of the mobile terminal will be described in detail below.
The wireless communication unit 110 typically includes one or more components that allow radio communication between the mobile terminal 100 and a wireless communication system or network. For example, the wireless communication unit may include at least one of a broadcast receiving module 111, a mobile communication module 112, a wireless internet module 113, a short-range communication module 114, and a location information module 115.
The broadcast receiving module 111 receives a broadcast signal and/or broadcast associated information from an external broadcast management server via a broadcast channel. The broadcast channel may include a satellite channel and/or a terrestrial channel. The broadcast management server may be a server that generates and transmits a broadcast signal and/or broadcast associated information or a server that receives a previously generated broadcast signal and/or broadcast associated information and transmits it to a terminal. The broadcast signal may include a TV broadcast signal, a radio broadcast signal, a data broadcast signal, and the like. Also, the broadcast signal may further include a broadcast signal combined with a TV or radio broadcast signal. The broadcast associated information may also be provided via a mobile communication network, and in this case, the broadcast associated information may be received by the mobile communication module 112. The broadcast signal may exist in various forms, for example, it may exist in the form of an Electronic Program Guide (EPG) of Digital Multimedia Broadcasting (DMB), an Electronic Service Guide (ESG) of Digital Video Broadcasting Handheld (DVB-H), and the like. The broadcast receiving module 111 may receive a signal broadcast by using various types of broadcasting systems. In particular, the broadcast receiving module 111 may receive Digital broadcasts by using a Digital Broadcasting system such as a Multimedia Broadcasting-Terrestrial (DMB-T), a Digital Multimedia Broadcasting-Satellite (DMB-S), a Digital video Broadcasting-handheld (DVB-H), a data Broadcasting system of a Forward Link Media (Media flo), a Terrestrial Digital Broadcasting-Integrated service (ISDB-T), an Integrated Services Digital Broadcasting-television, and the like. The broadcast receiving module 111 may be constructed to be suitable for various broadcasting systems that provide broadcast signals as well as the above-mentioned digital broadcasting systems. The broadcast signal and/or broadcast associated information received via the broadcast receiving module 111 may be stored in the memory 160 (or other type of storage medium).
The mobile communication module 112 transmits and/or receives radio signals to and/or from at least one of a base station (e.g., access point, node B, etc.), an external terminal, and a server. Such radio signals may include voice call signals, video call signals, or various types of data transmitted and/or received according to text and/or multimedia messages.
The wireless internet module 113 supports wireless internet access of the mobile terminal. The module may be internally or externally coupled to the terminal. The wireless internet Access technology related to the module may include Wireless Local Area Network (WLAN) (Wi-Fi), wireless broadband (Wibro), worldwide interoperability for microwave Access (Wimax), High Speed Downlink Packet Access (HSDPA), and the like.
The short-range communication module 114 is a module for supporting short-range communication. Some examples of short-range communication technologies include bluetooth, Radio Frequency Identification (RFID), infrared data Association (IrDA), Ultra Wideband (UWB), zigbee, and the like.
The location information module 115 is a module for checking or acquiring location information of the mobile terminal. A typical example of the position information module is a Global Positioning System (GPS). According to the current technology, the GPS module 115 calculates distance information and accurate time information from three or more satellites and applies triangulation to the calculated information, thereby accurately calculating three-dimensional current location information according to longitude, latitude, and altitude. Currently, a method for calculating position and time information uses three satellites and corrects an error of the calculated position and time information by using another satellite. In addition, the GPS module 115 can calculate speed information by continuously calculating current position information in real time.
The a/V input unit 120 is used to receive an audio or video signal. The a/V input unit 120 may include a camera 121 and a microphone 1220, and the camera 121 processes image data of still pictures or video obtained by an image capturing apparatus in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 151. The image frames processed by the camera 121 may be stored in the memory 160 (or other storage medium) or transmitted via the wireless communication unit 110, and two or more cameras 1210 may be provided according to the construction of the mobile terminal. The microphone 122 may receive sounds (audio data) via the microphone in a phone call mode, a recording mode, a voice recognition mode, or the like, and can process such sounds into audio data. The processed audio (voice) data may be converted into a format output transmittable to a mobile communication base station via the mobile communication module 112 in case of a phone call mode. The microphone 122 may implement various types of noise cancellation (or suppression) algorithms to cancel (or suppress) noise or interference generated in the course of receiving and transmitting audio signals.
The user input unit 130 may generate key input data according to a command input by a user to control various operations of the mobile terminal. The user input unit 130 allows a user to input various types of information, and may include a keyboard, dome sheet, touch pad (e.g., a touch-sensitive member that detects changes in resistance, pressure, capacitance, and the like due to being touched), scroll wheel, joystick, and the like. In particular, when the touch pad is superimposed on the display unit 151 in the form of a layer, a touch screen may be formed.
A setting unit 140 for setting a first encryption mode and a second encryption mode; the first encryption mode corresponds to one unlocking mode, and the second encryption mode corresponds to at least two unlocking modes; the detecting unit 141 is configured to detect whether the terminal starts the anti-theft mode, and obtain a detection result; a first unlocking unit 142, configured to, when the detection result indicates that the anti-theft mode is not turned on, unlock by using a first unlocking mode corresponding to the first encryption mode (e.g., a common encryption mode); and the second unlocking unit 143 is configured to monitor a first distance between the terminal (e.g., a mobile phone terminal) and a designated target terminal (e.g., a bracelet) in real time when the detection result indicates that the anti-theft mode is turned on, receive that the designated target terminal switches between the first encryption mode and the second encryption mode according to the first distance control terminal, and unlock by using at least two unlocking modes corresponding to the second encryption mode if the designated target terminal is currently switched to the second encryption mode (e.g., an encryption enhanced mode).
The interface unit 170 serves as an interface through which at least one external device is connected to the mobile terminal 100. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The identification Module may store various information for authenticating a User using the mobile terminal 100 and may include a User Identity Module (UIM), a Subscriber Identity Module (SIM), a Universal Subscriber Identity Module (USIM), and the like. In addition, a device having an identification module (hereinafter, referred to as an "identification device") may take the form of a smart card, and thus, the identification device may be connected with the mobile terminal 100 via a port or other connection means. The interface unit 170 may be used to receive input (e.g., data information, power, etc.) from an external device and transmit the received input to one or more elements within the mobile terminal 100 or may be used to transmit data between the mobile terminal and the external device.
In addition, when the mobile terminal 100 is connected with an external cradle, the interface unit 170 may serve as a path through which power is supplied from the cradle to the mobile terminal 100 or may serve as a path through which various command signals input from the cradle are transmitted to the mobile terminal. Various command signals or power input from the cradle may be used as signals for recognizing whether the mobile terminal is accurately mounted on the cradle. The output unit 150 is configured to provide output signals (e.g., audio signals, video signals, vibration signals, etc.) in a visual, audio, and/or tactile manner. The output unit 150 may include a display unit 151, an audio output module 152, and the like.
The display unit 151 may display information processed in the mobile terminal 100. For example, when the mobile terminal 100 is in a phone call mode, the display unit 151 may display a User Interface (UI) or a Graphical User Interface (GUI) related to a call or other communication (e.g., text messaging, multimedia file downloading, etc.). When the mobile terminal 100 is in a video call mode or an image capturing mode, the display unit 151 may display a captured image and/or a received image, a UI or GUI showing a video or an image and related functions, and the like.
Meanwhile, when the display unit 151 and the touch pad are overlapped with each other in the form of a layer to form a touch screen, the display unit 151 may serve as an input device and an output device. The Display unit 151 may include at least one of a Liquid Crystal Display (LCD), a Thin Film Transistor LCD (TFT-LCD), an Organic Light-Emitting Diode (OLED) Display, a flexible Display, a three-dimensional (3D) Display, and the like. Some of these displays may be configured to be transparent to allow a user to see from the outside, which may be referred to as transparent displays, and a typical transparent display may be, for example, a Transparent Organic Light Emitting Diode (TOLED) display or the like. Depending on the particular desired implementation, the mobile terminal 100 may include two or more display units (or other display devices), for example, the mobile terminal may include an external display unit (not shown) and an internal display unit (not shown). The touch screen may be used to detect a touch input pressure as well as a touch input position and a touch input area.
The audio output module 152 may convert audio data received by the wireless communication unit 110 or stored in the memory 160 into an audio signal and output as sound when the mobile terminal is in a call signal reception mode, a call mode, a recording mode, a voice recognition mode, a broadcast reception mode, or the like. Also, the audio output module 152 may provide audio output related to a specific function performed by the mobile terminal 100 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output module 152 may include a speaker, a buzzer, and the like.
The memory 160 may store software programs and the like for processing and controlling operations performed by the controller 180, or may temporarily store data (e.g., a phonebook, messages, still images, videos, and the like) that has been or will be output. Also, the memory 160 may store data regarding various ways of vibration and audio signals output when a touch is applied to the touch screen.
The Memory 160 may include at least one type of storage medium including a flash Memory, a hard disk, a multimedia card, a card-type Memory (e.g., SD or DX Memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a Read Only Memory (ROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a Programmable Read Only Memory (PROM), a magnetic Memory, a magnetic disk, an optical disk, etc. Also, the mobile terminal 100 may cooperate with a network storage device that performs a storage function of the memory 160 through a network connection.
The controller 180 generally controls the overall operation of the mobile terminal. For example, the controller 180 performs control and processing related to voice calls, data communications, video calls, and the like. The controller 180 may perform a pattern recognition process to recognize a handwriting input or a picture drawing input performed on the touch screen as a character or an image.
The power supply unit 190 receives external power or internal power and provides appropriate power required to operate various elements and components under the control of the controller 180.
The various embodiments described herein may be implemented in a computer-readable medium using, for example, computer software, hardware, or any combination thereof. For a hardware implementation, the embodiments described herein may be implemented using at least one of an Application Specific Integrated Circuit (ASIC), a Digital Signal Processor (DSP), a Digital Signal Processing Device (DSPD), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a processor, a controller, a microcontroller, a microprocessor, and an electronic unit designed to perform the functions described herein, and in some cases, such embodiments may be implemented in the controller 180. For a software implementation, the implementation such as a process or a function may be implemented with a separate software module that allows performing at least one function or operation. The software codes may be implemented by software applications (or programs) written in any suitable programming language, which may be stored in the memory 160 and executed by the controller 180.
Up to this point, mobile terminals have been described in terms of their functionality. Hereinafter, a slide-type mobile terminal among various types of mobile terminals, such as a folder-type, bar-type, swing-type, slide-type mobile terminal, and the like, will be described as an example for the sake of brevity. Accordingly, the present invention can be applied to any type of mobile terminal, and is not limited to a slide type mobile terminal.
The mobile terminal 100 as shown in fig. 1 may be configured to operate with communication systems such as wired and wireless communication systems and satellite-based communication systems that transmit data via frames or packets.
A communication system in which a mobile terminal according to an embodiment of the present invention is operable will now be described with reference to fig. 2.
Such communication systems may use different air interfaces and/or physical layers. For example, the air interface used by the communication System includes, for example, Frequency Division Multiple Access (FDMA), Time Division Multiple Access (TDMA), Code Division Multiple Access (CDMA), and Universal Mobile Telecommunications System (UMTS) (in particular, Long Term Evolution (LTE)), global System for Mobile communications (GSM), and the like. By way of non-limiting example, the following description relates to a CDMA communication system, but such teachings are equally applicable to other types of systems.
Referring to fig. 2, the CDMA wireless communication system may include a plurality of Mobile terminals 100, a plurality of Base Stations (BSs) 270, a Base Station Controller (BSC) 275, and a Mobile Switching Center (MSC) 280. The MSC280 is configured to interface with a Public Switched Telephone Network (PSTN) 290. The MSC280 is also configured to interface with a BSC275, which may be coupled to the base station 270 via a backhaul. The backhaul may be constructed according to any of several known interfaces including, for example, E1/T1, ATM, IP, PPP, frame Relay, HDSL, ADSL, or xDSL. It will be understood that a system as shown in fig. 2 may include multiple BSCs 275.
Each BS270 may serve one or more sectors (or regions), each sector covered by a multi-directional antenna or an antenna pointing in a particular direction being radially distant from the BS 270. Alternatively, each partition may be covered by two or more antennas for diversity reception. Each BS270 may be configured to support multiple frequency allocations, with each frequency allocation having a particular frequency spectrum (e.g., 1.25MHz,5MHz, etc.).
The intersection of partitions with frequency allocations may be referred to as a CDMA channel. The BS270 may also be referred to as a Base Transceiver Subsystem (BTS) or other equivalent terminology. In such a case, the term "base station" may be used to generically refer to a single BSC275 and at least one BS 270. The base stations may also be referred to as "cells". Alternatively, each sector of a particular BS270 may be referred to as a plurality of cell sites.
As shown in fig. 2, a Broadcast Transmitter (BT) 295 transmits a Broadcast signal to the mobile terminal 100 operating within the system. A broadcast receiving module 111 as shown in fig. 1 is provided at the mobile terminal 100 to receive a broadcast signal transmitted by the BT 295. In fig. 2, several Global Positioning System (GPS) satellites 300 are shown. The satellite 300 assists in locating at least one of the plurality of mobile terminals 100.
In fig. 2, a plurality of satellites 300 are depicted, but it is understood that useful positioning information may be obtained with any number of satellites. The GPS module 115 as shown in fig. 1 is generally configured to cooperate with satellites 300 to obtain desired positioning information. Other techniques that can track the location of the mobile terminal may be used instead of or in addition to GPS tracking techniques. In addition, at least one GPS satellite 300 may selectively or additionally process satellite DMB transmission.
As a typical operation of the wireless communication system, the BS270 receives reverse link signals from various mobile terminals 100. The mobile terminal 100 is generally engaged in conversations, messaging, and other types of communications. Each reverse link signal received by a particular base station 270 is processed within the particular BS 270. The obtained data is forwarded to the associated BSC 275. The BSC provides call resource allocation and mobility management functions including coordination of soft handoff procedures between BSs 270. The BSCs 275 also route the received data to the MSC280, which provides additional routing services for interfacing with the PSTN 290. Similarly, the PSTN290 interfaces with the MSC280, the MSC interfaces with the BSCs 275, and the BSCs 275 accordingly control the BS270 to transmit forward link signals to the mobile terminal 100.
Based on the above mobile terminal hardware structure and communication system, the present invention provides various embodiments of the method.
The first embodiment is as follows:
a terminal according to an embodiment of the present invention includes: a setting unit configured to set a first encryption mode and a second encryption mode; the first encryption mode corresponds to one unlocking mode, and the second encryption mode corresponds to at least two unlocking modes; the detection unit is used for detecting whether the terminal starts an anti-theft mode or not to obtain a detection result; the first unlocking unit is used for unlocking by adopting a first unlocking mode corresponding to the first encryption mode (such as a common encryption mode) when the detection result indicates that the anti-theft mode is not started; and the second unlocking unit is used for monitoring a first distance between the terminal (such as a mobile phone terminal) and an appointed target terminal (such as a bracelet) in real time when the detection result is that the anti-theft mode is started, receiving that the appointed target terminal (such as the bracelet) switches between the first encryption mode and the second encryption mode (such as an encryption enhanced mode) according to the first distance control terminal (such as the mobile phone terminal), and unlocking by adopting at least two unlocking modes corresponding to the second encryption mode if the current switching is switched to the second encryption mode.
In a practical application, the first encryption mode is a common encryption mode, and only one unlocking mode is used for decrypting the first encryption mode, such as any one of sliding unlocking, password unlocking and pattern unlocking. For convenient consideration of the normal mode in use, sliding unlocking may be selected. For the second encryption mode, it is an encryption enhancement mode, and for the encryption enhancement mode, it must adopt two or more unlocking modes to decrypt it, for example, the unlocking mode includes: the pattern unlocking mode comprises at least two modes of sliding unlocking, password unlocking, pattern unlocking, fingerprint unlocking and iris unlocking. At least two unlocking conditions need to be met simultaneously to unlock the terminal (such as a mobile phone terminal). The embodiment of the invention comprises two types of terminals, 1) the terminal itself is like a mobile phone terminal; 2) a designated target terminal such as a bracelet. Judging whether a specified target terminal (such as a bracelet) starts an anti-theft mode, if the anti-theft mode is not started, the terminal adopts a common unlocking mode such as sliding unlocking, the process is finished, if the anti-theft mode is started, whether the first encryption mode (such as a common encryption mode which only needs one unlocking mode to unlock) needs to be switched to a second encryption mode (such as an encryption enhanced mode which needs at least two unlocking modes to unlock) is intelligently detected through judging a first distance between the terminal (such as a mobile phone terminal) and the specified target terminal (such as the bracelet) and a threshold value, so as to meet the requirement of preventing the terminal from being stolen, thereby improving the protection capability of user privacy information in the terminal, and through intelligent switching of the distance detection mode and corresponding unlocking, the preventive measures are simple and easy to use, and the terminal can be ensured to be in the monitoring of theft prevention, and the stolen monitoring can be released at any time under the normal use condition, so that the unlocking of the stolen monitoring is more convenient.
Example two:
a terminal according to an embodiment of the present invention includes: a setting unit configured to set a first encryption mode and a second encryption mode; the first encryption mode corresponds to one unlocking mode, and the second encryption mode corresponds to at least two unlocking modes; the detection unit is used for detecting whether the terminal starts an anti-theft mode or not to obtain a detection result; the first unlocking unit is used for unlocking by adopting a first unlocking mode corresponding to the first encryption mode (such as a common encryption mode) when the detection result indicates that the anti-theft mode is not started; and the unlocking mode selection unit is used for carrying out priority ordering on at least two modes of sliding unlocking, password unlocking, pattern unlocking, fingerprint unlocking and iris unlocking according to the unlocking difficulty, and selecting at least two unlocking modes with unlocking difficulties arranged in the front from the unlocking mode selection list according to the priority ordering. And the second unlocking unit is used for monitoring a first distance between the terminal (such as a mobile phone terminal) and an appointed target terminal (such as a bracelet) in real time when the detection result is that the anti-theft mode is started, receiving that the appointed target terminal (such as the bracelet) switches between the first encryption mode and the second encryption mode (such as an encryption enhanced mode) according to the first distance control terminal (such as the mobile phone terminal), and unlocking by adopting at least two unlocking modes corresponding to the second encryption mode if the current switching is switched to the second encryption mode.
In a practical application, the first encryption mode is a common encryption mode, and only one unlocking mode is used for decrypting the first encryption mode, such as any one of sliding unlocking, password unlocking and pattern unlocking. For convenient consideration of the normal mode in use, sliding unlocking may be selected. For the second encryption mode, it is an encryption enhancement mode, and for the encryption enhancement mode, it must adopt two or more unlocking modes to decrypt it, for example, the unlocking mode includes: the pattern unlocking mode comprises at least two modes of sliding unlocking, password unlocking, pattern unlocking, fingerprint unlocking and iris unlocking. At least two unlocking conditions need to be met simultaneously to unlock the terminal (such as a mobile phone terminal). The embodiment of the invention comprises two types of terminals, 1) the terminal itself is like a mobile phone terminal; 2) a designated target terminal such as a bracelet. For the encryption enhancement mode, although two unlocking modes are set for decryption, the terminal can be unlocked only when two unlocking conditions are met. However, in order to ensure that the privacy information of the user is not revealed, the unlocking difficulty needs to be increased, for example, the fingerprint unlocking mode and the iris unlocking mode need to be satisfied simultaneously to unlock. By adopting the embodiment of the invention, the encryption mode selection of the mobile phone terminal is controlled by the bracelet, so that the user can freely switch the encryption mode of the mobile phone terminal through the bracelet, the operation is convenient, and the protection capability of the privacy information of the user in a stolen environment is improved.
In an embodiment of the present invention, the second unlocking unit is further configured to: and when the first distance is less than or equal to a first threshold value, receiving the specified target terminal to control the terminal to close the anti-theft mode, switching to the first encryption mode, unlocking by adopting a first unlocking mode corresponding to the first encryption mode, and entering a normal operation mode of the terminal. For example, if the distance between the mobile phone terminal and the bracelet is less than or equal to the specific distance threshold D, the mobile phone terminal is considered to be safe, the user can turn off the anti-theft mode through the bracelet, the mobile phone terminal is automatically switched to the ordinary unlocking mode, and the user can turn on the anti-theft mode through the bracelet again.
In an embodiment of the present invention, the second unlocking unit is further configured to: and when the first distance is larger than a first threshold value, receiving the specified target terminal to control the terminal to enter the anti-theft mode, switching to the second encryption mode, triggering a reminding message for representing the theft risk of the terminal to a terminal user, and unlocking by adopting at least two unlocking modes corresponding to the second encryption mode. The reminding message comprises: the anti-theft warning tone triggered by the first terminal and/or the vibration triggered by the second terminal. For example, if the distance between the mobile phone terminal and the bracelet is greater than a certain distance threshold D, the mobile phone terminal is considered to be possibly in danger of being stolen. At the moment, the mobile phone terminal is switched from a common encryption mode to an encryption enhancement mode, and simultaneously, the mobile phone terminal sounds an anti-theft prompt tone and can remind a user through vibration of a bracelet to remind the user.
Example three:
as shown in fig. 3, an encryption method for implementing terminal theft prevention according to an embodiment of the present invention includes:
step 101, setting a first encryption mode and a second encryption mode; the first encryption mode corresponds to one unlocking mode, and the second encryption mode corresponds to at least two unlocking modes.
Step 102, detecting whether the terminal starts an anti-theft mode or not to obtain a detection result, and if so, executing step 104; otherwise, step 103 is performed.
And 103, when the detection result is that the anti-theft mode is not started, unlocking by adopting a first unlocking mode corresponding to the first encryption mode, and ending the whole process.
And step 104, monitoring the first distance between the terminal and the appointed target terminal in real time when the detection result is that the anti-theft mode is started.
And 105, receiving that the appointed target terminal switches between the first encryption mode and the second encryption mode according to the first distance control terminal.
And 106, if the current encryption mode is switched to the second encryption mode, unlocking by adopting at least two unlocking modes corresponding to the second encryption mode, and ending the whole process.
By adopting the embodiment of the invention, the first encryption mode is a common encryption mode, and only one unlocking mode is used for decrypting the first encryption mode corresponding to the common encryption mode, such as any one of sliding unlocking, password unlocking and pattern unlocking. For convenient consideration of the normal mode in use, sliding unlocking may be selected. For the second encryption mode, it is an encryption enhancement mode, and for the encryption enhancement mode, it must adopt two or more unlocking modes to decrypt it, for example, the unlocking mode includes: the pattern unlocking mode comprises at least two modes of sliding unlocking, password unlocking, pattern unlocking, fingerprint unlocking and iris unlocking. At least two unlocking conditions need to be met simultaneously to unlock the terminal (such as a mobile phone terminal). The embodiment of the invention comprises two types of terminals, 1) the terminal itself is like a mobile phone terminal; 2) a designated target terminal such as a bracelet. Judging whether a specified target terminal (such as a bracelet) starts an anti-theft mode, if the anti-theft mode is not started, the terminal adopts a common unlocking mode such as sliding unlocking, the process is finished, if the anti-theft mode is started, whether the first encryption mode (such as a common encryption mode which only needs one unlocking mode to unlock) needs to be switched to a second encryption mode (such as an encryption enhanced mode which needs at least two unlocking modes to unlock) is intelligently detected through judging a first distance between the terminal (such as a mobile phone terminal) and the specified target terminal (such as the bracelet) and a threshold value, so as to meet the requirement of preventing the terminal from being stolen, thereby improving the protection capability of user privacy information in the terminal, and through intelligent switching of the distance detection mode and corresponding unlocking, the preventive measures are simple and easy to use, and the terminal can be ensured to be in the monitoring of theft prevention, and the stolen monitoring can be released at any time under the normal use condition, so that the unlocking of the stolen monitoring is more convenient.
Example four:
as shown in fig. 4, an encryption method for implementing terminal theft prevention according to an embodiment of the present invention includes:
step 201, setting a first encryption mode and a second encryption mode; the first encryption mode corresponds to one unlocking mode, and the second encryption mode corresponds to at least two unlocking modes.
Step 202, detecting whether the terminal starts an anti-theft mode or not to obtain a detection result, and if so, executing step 204; otherwise, step 203 is executed.
And 203, when the detection result is that the anti-theft mode is not started, unlocking by adopting a first unlocking mode corresponding to the first encryption mode, and ending the whole process.
And 204, monitoring the first distance between the terminal and the specified target terminal in real time when the detection result is that the anti-theft mode is started.
Step 205, accepting that the designated target terminal switches between the first encryption mode and the second encryption mode according to the first distance control terminal.
And 206, performing priority ordering on the at least two unlocking modes according to the unlocking difficulty, and selecting the at least two unlocking modes with the unlocking difficulty arranged at the front from the unlocking mode selection list according to the priority ordering. The unlocking mode includes: the fingerprint unlocking mode and the iris unlocking mode can be selected in at least two modes of sliding unlocking, password unlocking, pattern unlocking, fingerprint unlocking and iris unlocking, the unlocking difficulty of the fingerprint unlocking mode and the iris unlocking mode is higher, and the fingerprint unlocking mode and the iris unlocking mode are arranged before other unlocking modes.
And step 207, if the current encryption mode is switched to the second encryption mode, unlocking by adopting at least two unlocking modes corresponding to the second encryption mode, and ending the whole process.
The first encryption mode is a common encryption mode, and only one unlocking mode is used for decrypting the first encryption mode corresponding to the common encryption mode, such as any one of sliding unlocking, password unlocking and pattern unlocking. For convenient consideration of the normal mode in use, sliding unlocking may be selected. For the second encryption mode, it is an encryption enhancement mode, and for the encryption enhancement mode, it must adopt two or more unlocking modes to decrypt it, for example, the unlocking mode includes: the pattern unlocking mode comprises at least two modes of sliding unlocking, password unlocking, pattern unlocking, fingerprint unlocking and iris unlocking. At least two unlocking conditions need to be met simultaneously to unlock the terminal (such as a mobile phone terminal). The embodiment of the invention comprises two types of terminals, 1) the terminal itself is like a mobile phone terminal; 2) a designated target terminal such as a bracelet. For the encryption enhancement mode, although two unlocking modes are set for decryption, the terminal can be unlocked only when two unlocking conditions are met. However, in order to ensure that the privacy information of the user is not revealed, the unlocking difficulty needs to be increased, for example, the fingerprint unlocking mode and the iris unlocking mode need to be satisfied simultaneously to unlock. By adopting the embodiment of the invention, the encryption mode selection of the mobile phone terminal is controlled by the bracelet, so that the user can freely switch the encryption mode of the mobile phone terminal through the bracelet, the operation is convenient, and the protection capability of the privacy information of the user in a stolen environment is improved.
In an embodiment of the present invention, the receiving that the designated target terminal switches between the first encryption mode and the second encryption mode according to the first distance control terminal itself includes: and when the first distance is less than or equal to a first threshold value, receiving the specified target terminal to control the terminal to close the anti-theft mode, switching to the first encryption mode, unlocking by adopting a first unlocking mode corresponding to the first encryption mode, and entering a normal operation mode of the terminal.
In an embodiment of the present invention, the receiving that the designated target terminal switches between the first encryption mode and the second encryption mode according to the first distance control terminal itself includes: and when the first distance is larger than a first threshold value, receiving the specified target terminal to control the terminal to enter the anti-theft mode, switching to the second encryption mode, triggering a reminding message for representing the theft risk of the terminal to a terminal user, and unlocking by adopting at least two unlocking modes corresponding to the second encryption mode. The reminding message comprises: the anti-theft warning tone triggered by the first terminal and/or the vibration triggered by the second terminal. For example, if the distance between the mobile phone terminal and the bracelet is greater than a certain distance threshold D, the mobile phone terminal is considered to be possibly in danger of being stolen. At the moment, the mobile phone terminal is switched from a common encryption mode to an encryption enhancement mode, and simultaneously, the mobile phone terminal sounds an anti-theft prompt tone and can remind a user through vibration of a bracelet to remind the user.
Example five:
the terminal of the embodiment of the invention comprises: a memory and a processor; wherein, the memory contains computer executable codes for realizing the information interconversion method of the identification information of the above embodiment; the processor may implement the information interconversion scheme for the identification information via computer executable code contained in the memory.
The terminal may be an electronic device such as a PC, a PAD, a tablet computer, a portable electronic device such as a laptop computer, or an intelligent mobile terminal such as a mobile phone, and is not limited to the description herein. The Processor may be implemented by a microprocessor, a Central Processing Unit (CPU), a Digital Signal Processor (DSP), or a programmable logic Array (FPGA) when executing Processing.
The terminal is shown in fig. 5 as an example of a hardware entity S11. The apparatus comprises a processor 21, a memory 22 and at least one external communication interface 23; the processor 21, the memory 22 and the at least one external communication interface 23 are all connected by a bus 24.
The following embodiments of the present invention are described using specific application scenarios:
with the increasing popularity of smart phones, smart phone users have a fairly high percentage. The smart phone contains a lot of user privacy information, and the risk of theft of the smart phone exists in public places. If the mobile phone is stolen, the privacy information of the user is easily revealed. In order to avoid the situation that the privacy information of the user is revealed due to the fact that the mobile phone is stolen, for the application scene, an encryption enhancement scheme based on the cooperation of the smart band and the smart phone is provided, so that the unlocking convenience is guaranteed under the condition of normal use, and the protection capability of the privacy information of the user in the stolen environment is also improved.
In the application scene, the mobile terminal is required to support at least two unlocking modes, namely sliding unlocking, password unlocking, pattern unlocking, fingerprint unlocking, iris unlocking and the like. Presetting: if the distance between the mobile terminal and the smart band is greater than a specific distance D (for example, D is 1 meter), the mobile phone is considered to be at risk of being stolen. Two encryption modes are preset in the mobile terminal. Wherein, a) the common encryption mode is a default encryption mode. Correspondingly, an unlocking method is needed to unlock the terminal. For the convenience of use in the normal mode, a slide unlock may be provided. b) The enhanced mode is encrypted. Two unlocking methods need to be set, and the terminal can be unlocked only when two unlocking conditions are met. In order to ensure that the privacy information of the user is not revealed, the unlocking difficulty needs to be increased, for example, fingerprint unlocking and iris unlocking need to be satisfied at the same time. Presetting in the intelligent bracelet: the switch of the anti-theft mode of the mobile terminal can be controlled through Bluetooth. The anti-theft mode is closed, and the mobile terminal adopts a common encryption mode; and starting the anti-theft mode, and adopting an encryption enhancement mode.
Fig. 6 shows a flowchart of applying the embodiment of the present invention to the application scenario, which includes:
step 301, the intelligent bracelet and the mobile terminal establish Bluetooth connection.
Step 302, judging whether the intelligent bracelet is in an anti-theft mode, if so, executing step 304; otherwise, step 303 is performed.
Step 303, the mobile terminal is switched to the normal encryption mode, the mobile terminal is unlocked by adopting the normal unlocking mode, such as sliding unlocking, and the process is ended.
And 304, detecting the distance between the mobile terminal and the intelligent bracelet in real time.
Step 305, judging that the distance is greater than a specific distance threshold value, if so, executing step 306; otherwise, step 303 is performed.
Here, if the distance between the mobile terminal and the smart band is less than or equal to the specific distance D, the mobile phone is considered to be safe, the user can turn off the anti-theft mode through the smart band, and then go to execute step 303, the mobile terminal automatically switches to the normal unlocking mode, and the user can turn on the anti-theft mode through the smart band again. If the distance between the mobile terminal and the intelligent bracelet is greater than a specific distance D, the mobile phone is considered to be possibly stolen. At this moment, the mobile terminal sets the encryption mode of the mobile terminal to be switched to the encryption enhancement mode, step 306 is executed, meanwhile, the mobile terminal sounds an anti-theft prompt tone, the intelligent bracelet vibrates to remind the user, and the user is reminded.
And step 306, switching the encryption mode of the mobile terminal to an encryption enhanced mode.
And 307, sounding an anti-theft prompt tone by the mobile terminal and/or reminding the user by vibration of the intelligent bracelet.
308, the user confirms whether the mobile terminal is safe, and if so, the step 302 is executed; otherwise, go to step 307.
By adopting the embodiment of the invention, the encryption mode of the mobile terminal is controlled by adopting the intelligent bracelet, so that a user can freely switch the encryption mode of the mobile phone through the intelligent bracelet, the operation is convenient, and the protection capability of the privacy information of the user in a stolen environment is improved.
It should be appreciated that reference throughout this specification to "one embodiment" or "an embodiment" means that a particular feature, structure or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention. Thus, the appearances of the phrases "in one embodiment" or "in an embodiment" in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. It should be understood that, in various embodiments of the present invention, the sequence numbers of the above-mentioned processes do not mean the execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation on the implementation process of the embodiments of the present invention. The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described device embodiments are merely illustrative, for example, the division of the unit is only a logical functional division, and there may be other division ways in actual implementation, such as: multiple units or components may be combined, or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the coupling, direct coupling or communication connection between the components shown or discussed may be through some interfaces, and the indirect coupling or communication connection between the devices or units may be electrical, mechanical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units; can be located in one place or distributed on a plurality of network units; some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, all the functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may be separately regarded as one unit, or two or more units may be integrated into one unit; the integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
Those of ordinary skill in the art will understand that: all or part of the steps for realizing the method embodiments can be completed by hardware related to program instructions, the program can be stored in a computer readable storage medium, and the program executes the steps comprising the method embodiments when executed; and the aforementioned storage medium includes: various media that can store program codes, such as a removable Memory device, a Read Only Memory (ROM), a magnetic disk, or an optical disk.
Alternatively, the integrated unit of the present invention may be stored in a computer-readable storage medium if it is implemented in the form of a software functional module and sold or used as a separate product. Based on such understanding, the technical solutions of the embodiments of the present invention may be essentially implemented or a part contributing to the prior art may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the methods described in the embodiments of the present invention. And the aforementioned storage medium includes: a removable storage device, a ROM, a magnetic or optical disk, or other various media that can store program code.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (8)

1. A terminal, characterized in that the terminal comprises:
a setting unit configured to set a first encryption mode and a second encryption mode; the first encryption mode corresponds to one unlocking mode, and the second encryption mode corresponds to at least two unlocking modes;
the unlocking mode selection unit is used for carrying out priority ordering on the at least two unlocking modes according to unlocking difficulty, and selecting at least two unlocking modes with unlocking difficulties arranged in the front from an unlocking mode selection list according to the priority ordering;
the detection unit is used for detecting whether the terminal or the specified target terminal starts the anti-theft mode or not to obtain a detection result; the anti-theft mode is controlled to be started at least through a specified target terminal;
the first unlocking unit is used for unlocking by adopting a first unlocking mode corresponding to the first encryption mode when the detection result indicates that the anti-theft mode is not started;
and the second unlocking unit is used for monitoring the first distance between the terminal and the appointed target terminal in real time when the detection result is that the anti-theft mode is started, receiving the switching of the appointed target terminal between the first encryption mode and the second encryption mode according to the first distance, and unlocking by adopting at least two unlocking modes corresponding to the second encryption mode if the current switching is switched to the second encryption mode.
2. The terminal of claim 1, wherein the at least two unlock modes comprise: the pattern unlocking mode comprises at least two modes of sliding unlocking, password unlocking, pattern unlocking, fingerprint unlocking and iris unlocking.
3. The terminal of claim 1, wherein the second unlocking unit is further configured to:
and when the first distance is less than or equal to a first threshold value, receiving the specified target terminal to control the terminal to close the anti-theft mode, switching to the first encryption mode, unlocking by adopting a first unlocking mode corresponding to the first encryption mode, and entering a normal operation mode of the terminal.
4. The terminal of claim 1, wherein the second unlocking unit is further configured to:
when the first distance is larger than a first threshold value, the specified target terminal is accepted to control the terminal to enter the anti-theft mode, the terminal is switched to the second encryption mode, a reminding message for representing the theft risk of the terminal is triggered to a terminal user, and at least two unlocking modes corresponding to the second encryption mode are adopted for unlocking;
the reminding message comprises: the anti-theft warning tone triggered by the first terminal and/or the vibration triggered by the second terminal.
5. An encryption method for realizing terminal theft prevention is characterized by comprising the following steps:
setting a first encryption mode and a second encryption mode; the first encryption mode corresponds to one unlocking mode, the second encryption mode corresponds to at least two unlocking modes, the at least two unlocking modes are subjected to priority sorting according to unlocking difficulty, and at least two unlocking modes with unlocking difficulty arranged in the front are selected from an unlocking mode selection list according to the priority sorting;
detecting whether the terminal or a specified target terminal starts an anti-theft mode or not to obtain a detection result; the anti-theft mode is controlled to be started at least through a specified target terminal;
when the detection result indicates that the anti-theft mode is not started, a first unlocking mode corresponding to the first encryption mode is adopted for unlocking;
and when the detection result is that the anti-theft mode is started, monitoring a first distance between the terminal and a specified target terminal in real time, receiving that the specified target terminal controls the terminal to switch between the first encryption mode and the second encryption mode according to the first distance, and if the terminal is switched to the second encryption mode at present, unlocking by adopting at least two unlocking modes corresponding to the second encryption mode.
6. The method of claim 5, wherein the at least two unlocking modes comprise: the pattern unlocking mode comprises at least two modes of sliding unlocking, password unlocking, pattern unlocking, fingerprint unlocking and iris unlocking.
7. The method according to claim 5, wherein the accepting of the designated target terminal to control the terminal to switch between the first encryption mode and the second encryption mode according to the first distance comprises:
and when the first distance is less than or equal to a first threshold value, receiving the specified target terminal to control the terminal to close the anti-theft mode, switching to the first encryption mode, unlocking by adopting a first unlocking mode corresponding to the first encryption mode, and entering a normal operation mode of the terminal.
8. The method according to claim 5, wherein the accepting of the designated target terminal to control the terminal to switch between the first encryption mode and the second encryption mode according to the first distance comprises:
when the first distance is larger than a first threshold value, the specified target terminal is accepted to control the terminal to enter the anti-theft mode, the terminal is switched to the second encryption mode, a reminding message for representing the theft risk of the terminal is triggered to a terminal user, and at least two unlocking modes corresponding to the second encryption mode are adopted for unlocking;
the reminding message comprises: the anti-theft warning tone triggered by the first terminal and/or the vibration triggered by the second terminal.
CN201610932467.9A 2016-10-24 2016-10-24 Terminal and encryption method for realizing terminal theft prevention Active CN106506785B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610932467.9A CN106506785B (en) 2016-10-24 2016-10-24 Terminal and encryption method for realizing terminal theft prevention

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610932467.9A CN106506785B (en) 2016-10-24 2016-10-24 Terminal and encryption method for realizing terminal theft prevention

Publications (2)

Publication Number Publication Date
CN106506785A CN106506785A (en) 2017-03-15
CN106506785B true CN106506785B (en) 2020-03-27

Family

ID=58318971

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610932467.9A Active CN106506785B (en) 2016-10-24 2016-10-24 Terminal and encryption method for realizing terminal theft prevention

Country Status (1)

Country Link
CN (1) CN106506785B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113609468A (en) * 2021-07-15 2021-11-05 荣耀终端有限公司 Verification method for screen locking and unlocking and terminal equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007318338A (en) * 2006-05-24 2007-12-06 Nec Corp Equipment illegal use prevention system and equipment
JP2008124959A (en) * 2006-11-15 2008-05-29 Matsushita Electric Ind Co Ltd Wireless communication system, its control method, and its program

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7715831B2 (en) * 2006-03-24 2010-05-11 Sony Ericssson Mobile Communications, Ab Methods, systems, and devices for detecting and indicating loss of proximity between mobile devices
CN101917662B (en) * 2010-06-23 2015-06-03 中兴通讯股份有限公司 Anti-theft method and anti-theft system for mobile terminal, mobile terminal and anti-theft device
CN102624988B (en) * 2012-03-29 2014-03-19 惠州Tcl移动通信有限公司 Anti-theft alarm method based on mobile phone and mobile phone
CN103092503B (en) * 2012-10-11 2016-08-31 百度在线网络技术(北京)有限公司 The unblock of mobile terminal and verification method and unblock and checking device
CN105681537A (en) * 2014-11-21 2016-06-15 富泰华工业(深圳)有限公司 Password lock and mobile terminal antitheft system using password lock

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007318338A (en) * 2006-05-24 2007-12-06 Nec Corp Equipment illegal use prevention system and equipment
JP2008124959A (en) * 2006-11-15 2008-05-29 Matsushita Electric Ind Co Ltd Wireless communication system, its control method, and its program

Also Published As

Publication number Publication date
CN106506785A (en) 2017-03-15

Similar Documents

Publication Publication Date Title
CN106027804B (en) Unlocking method and unlocking device of mobile terminal
CN104932697B (en) Gesture unlocking method and device
CN106778176B (en) Information processing method and mobile terminal
CN105631370B (en) Region screen locking method and mobile terminal
CN104992109A (en) Method and device for password setting and method and device for password matching
CN106534560B (en) Mobile terminal control device and method
CN106375840A (en) Screen projection device, mobile terminal and screen projection connection method
CN104935577B (en) Authentication method, smart card cloud, the cloud APP, apparatus and system
CN107018334A (en) A kind of applied program processing method and device based on dual camera
CN105049612A (en) Method of realizing recording and device of realizing recording
CN106485163A (en) Control method and control device that mobile terminal data storehouse accesses
CN106507343A (en) A kind of information processing method, mobile terminal and server
CN106484534A (en) Control method for the mobile terminal of displaying and control device
CN106228043B (en) Application icon hidden method and terminal
CN106020677A (en) Information processing method and mobile terminal
CN105120091A (en) Mobile terminal and maloperation prompting apparatus and method thereof
CN106412877B (en) Activation method and activation device for mobile terminal SIM card
CN106506785B (en) Terminal and encryption method for realizing terminal theft prevention
CN106302943B (en) Unlocking method and unlocking device of mobile terminal
CN105100420A (en) Terminal and method for quick dialing of same
CN105184131B (en) A kind of apparatus and method for carrying out unlocking screen by connecting WI FI
CN106250752A (en) A kind of tripper, unlocking method, terminal and wearable device
CN106535196A (en) Routing equipment, terminal and method for controlling WiFi access
CN106598463B (en) Mobile terminal and unlocking method thereof
CN106873979B (en) Information processing method and mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant