CN106921781A - A kind of anti-theft modes start method and apparatus and mobile terminal - Google Patents

A kind of anti-theft modes start method and apparatus and mobile terminal Download PDF

Info

Publication number
CN106921781A
CN106921781A CN201710213935.1A CN201710213935A CN106921781A CN 106921781 A CN106921781 A CN 106921781A CN 201710213935 A CN201710213935 A CN 201710213935A CN 106921781 A CN106921781 A CN 106921781A
Authority
CN
China
Prior art keywords
data
mobile terminal
checking
image data
matched
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710213935.1A
Other languages
Chinese (zh)
Inventor
邢春雪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Anyun Century Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201710213935.1A priority Critical patent/CN106921781A/en
Publication of CN106921781A publication Critical patent/CN106921781A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device

Abstract

The embodiment of the invention provides a kind of anti-theft modes and start method and apparatus and mobile terminal, methods described includes:Judge whether safety applications receive checking data;If the safety applications receive checking data, the checking data are matched with mobile terminal authentication area target data;The mobile terminal authentication area includes specifying the data storage area of application;If the checking data are matched with the target data in the authentication area, the stolen pattern of the mobile terminal is opened.Solve user and lose the mobile phone loss damnous problem of data accidentally, with the beneficial effect for effectively protecting user data by authentication under the stolen pattern of user mobile phone.

Description

A kind of anti-theft modes start method and apparatus and mobile terminal
Technical field
The present invention relates to anti-theft modes start-up technique field, more particularly to a kind of anti-theft modes start method and apparatus and Mobile terminal.
Background technology
With developing rapidly for terminal device technology, the life that mobile terminal gives people brings huge facility, mobile Terminal user can realize all the basic things in using mobile phone to complete daily life, such as shopping, proof of identification, bank's money Gold flowing etc..While mobile terminal brings convenient, while huge risk is there is also, if such as mobile phone is accidentally Lose, important information therein may bring serious economic loss to user.
At present, after mobile terminal is lost, if there is the checking password for entering mobile terminal system, in multiple Password Input Screen locking can be performed after failure, data on the mobile terminal are obtained it is also possible to pass through other technologies means, caused to user Very serious potential safety hazard.
The content of the invention
In view of the above problems, it is proposed that the present invention solves the above problems or solve above-mentioned asking at least in part to provide A kind of anti-theft modes of topic start method and apparatus and mobile terminal.
According to an aspect of the invention, there is provided a kind of anti-theft modes start method, including:Whether judge safety applications Receive checking data;If the safety applications receive checking data, by checking data and the mobile terminal authentication Area's target data is matched;The mobile terminal authentication area includes specifying the data storage area of application;If the checking data Target data with the authentication area is matched, then open the stolen pattern of the mobile terminal.
With reference in a first aspect, the present invention is in the first implementation of first aspect, it is described by the checking data with The step of mobile terminal authentication area target data is matched, including:The type of the identification checking data;According to the class Type, target data is read from the authentication area of respective type and is matched with the checking data.
With reference to the first implementation of first aspect or first aspect, the present invention is in second realization side of first aspect In formula, the data storage area of the specified application includes:The image data memory block of photograph album application, the data storage of social networking application At least one of area, the note data memory block of short message application, the contacts data store area of address list application.
With reference in a first aspect, the present invention is in the third implementation of first aspect, when the mobile terminal authentication area Be the image data memory block of photograph album application, and/or the mobile terminal authentication area for social networking application data storage area when, then The step of checking data are matched with mobile terminal authentication area target data, including:Judging the checking data is No is image data;If the checking data are image datas, by the image data and the image data of photograph album application Image data in the data storage area of memory block, and/or social networking application is matched.
It is of the invention in the 4th kind of implementation of first aspect with reference to the third implementation of first aspect, in institute Before stating the step of image data is matched with the image data in the image data memory block of photograph album application, also include:Sentence Whether the image data of disconnected correspondence checking data is facial image;If the image data of correspondence checking data is facial image, The step of image data in image data memory block of the execution by the image data with photograph album application is matched.
With reference in a first aspect, the present invention is in the 5th kind of implementation of first aspect, when the mobile terminal authentication area Be the image data memory block of photograph album application, and/or the mobile terminal authentication area for social networking application data storage area when, then The step of checking data are matched with mobile terminal authentication area target data, including:Judging the checking data is No is image data;If the checking data are image datas, the quantity of the image data is judged;If the picture Data bulk is more than one, then respectively by the image data memory block, and/or social networking application of the image data and photograph album application Data storage area in image data matched.
With reference in a first aspect, the present invention is in the 6th kind of implementation of first aspect, when the mobile terminal authentication area Be the image data memory block of photograph album application, and/or the mobile terminal authentication area for social networking application data storage area when, then The step of checking data are matched with mobile terminal authentication area target data, including:Judge the checking data Type;If the checking data are any one of image data and note data, or address book data, or social networking application data Or multiple combination data, then respectively by the image data memory block, and/or social networking application of the image data and photograph album application Image data in data storage area is matched, and by note data, or address book data, or social networking application data with it is corresponding Corresponding data in authentication area is matched.
With reference to the 4th kind of implementation of first aspect, the present invention is described in the 7th kind of implementation of first aspect The step of whether image data for judging correspondence checking data is facial image, including:By default face characteristic extraction algorithm Extract the face characteristic data in the image data of correspondence checking data.
It is of the invention in the 8th kind of implementation of first aspect with reference to the 7th kind of implementation of first aspect, if really The image data of fixed correspondence checking data is facial image, then described that the image data is deposited with the image data of photograph album application The step of image data in storage area is matched, including:By the face characteristic data of the extraction, the picture with photograph album application The face characteristic data extracted in the human face data included in data storage area are matched.
It is of the invention in the 9th kind of implementation of first aspect with reference to the 8th kind of implementation of first aspect, in institute State the face characteristic data of the extraction, with the human face data that includes in the image data memory block of photograph album application in extract After the step of face characteristic data are matched, also include:If the face characteristic data of the extraction, the figure with photograph album application The matching degree of the face characteristic data extracted in the human face data included in sheet data memory block exceedes predetermined threshold value, then extract institute State the identity information of human face data.
It is described whether to judge safety applications with reference in a first aspect, the present invention is in the tenth kind of implementation of first aspect The step of receiving checking data, including:If detecting the new data that mobile terminal is received, whether the data are verified Sent by preset security account;If the data are from preset security account, it is determined that for the checking number that safety applications are received According to.
It is of the invention in a kind of the tenth implementation of first aspect with reference to the tenth kind of implementation of first aspect, It is described judge safety applications whether receive checking data the step of before, also include:By security application server client Default power secured account numbers are set up, and uploads to security application server.
With reference in a first aspect, the present invention is in the 12nd kind of implementation of first aspect, it is described open it is described it is mobile eventually The step of end is stolen pattern, including:The mobile terminal is locked, and/or uploads stolen information to cloud server.
It is of the invention in the 13rd kind of implementation of first aspect with reference to the 12nd kind of implementation of first aspect, The step of locking mobile terminal, includes:The screen of the mobile terminal is locked, and/or locks the mobile terminal Physical button, and/or lock the USB interface of the mobile terminal.
It is of the invention in the 14th kind of implementation of first aspect with reference to the 13rd kind of implementation of first aspect, The step of USB interface of the locking mobile terminal, including:Debugging bridge rights management function is called to remove USB interface Allow access rights.
With reference in a first aspect, the present invention is in the 15th kind of implementation of first aspect, it is described open it is described it is mobile eventually The step of end is stolen pattern, including:The user account of current accessing system is switched into secured user's account.
It is of the invention in the 16th kind of implementation of first aspect with reference to the 15th kind of implementation of first aspect, The step of unlatching mobile terminal is stolen pattern, including:The system that will be currently up switches to security system.
With reference in a first aspect, the present invention is in the 17th kind of implementation of first aspect, in the judgement safety applications Before the step of whether receiving checking data, also include:Set up with security application server and be connected;Receive safety applications service The checking data that device sends.
According to another aspect of the present invention, there is provided a kind of anti-theft modes starter, including:Judge module, for sentencing Whether disconnected safety applications receive checking data;Matching module, if receiving checking data for the safety applications, will The checking data are matched with mobile terminal authentication area target data;The mobile terminal authentication area includes specifying application Data storage area;Stolen pattern opening module, if being matched with the target data in the authentication area for the checking data, Open the stolen pattern of the mobile terminal.
It is of the invention in the first implementation of second aspect with reference to second aspect, the matching module, including:Know Small pin for the case module, the type for recognizing the checking data;Matched sub-block, for according to the type, from respective type Target data is read in authentication area and is matched with the checking data.
With reference to the first implementation of second aspect or second aspect, the present invention is in second realization side of second aspect In formula, the data storage area of the specified application includes:The image data memory block of photograph album application, the data storage of social networking application At least one of area, the note data memory block of short message application, the contacts data store area of address list application.
It is of the invention in the third implementation of second aspect with reference to second aspect, the matching module, including:Sentence Disconnected submodule, for when the image data memory block that the mobile terminal authentication area is photograph album application, and/or the mobile terminal When authentication area is the data storage area of social networking application, judge whether the checking data are image data;Picture match submodule, If being image data for the checking data, by the image data memory block of the image data and photograph album application and/ Or the image data in the data storage area of social networking application is matched.
With reference to the third implementation of second aspect, the present invention is described in the 4th kind of implementation of second aspect Matching module, also includes:Facial image judging submodule, whether the image data for judging correspondence checking data is face figure Picture;If the image data of correspondence checking data is facial image, the picture number by the image data and photograph album application is performed The step of being matched according to the image data in memory block.
It is of the invention in the 5th kind of implementation of second aspect with reference to second aspect, when the mobile terminal authentication area Be the image data memory block of photograph album application, and/or the mobile terminal authentication area for social networking application data storage area when, then The matching module, including:Judging submodule, for judging whether the checking data are image data;Quantity judges submodule Block, if being image data for the checking data, judges the quantity of the image data;Matched sub-block, for such as Really described image data quantity is more than one, then respectively by the image data memory block of the image data and photograph album application and/ Or the image data in the data storage area of social networking application is matched.
It is of the invention in the 6th kind of implementation of second aspect with reference to second aspect, when the mobile terminal authentication area Be the image data memory block of photograph album application, and/or the mobile terminal authentication area for social networking application data storage area when, then The matching module, including:Type judging submodule, the type for judging the checking data;Matched sub-block, uses respectively If in any one that the checking data are image data and note data, or address book data, or social networking application data or Multiple combination data, then respectively by the image data memory block, and/or the number of social networking application of the image data and photograph album application Matched according to the image data in memory block, and by note data, or address book data, or social networking application data and corresponding mirror Corresponding data in power area is matched.
With reference to the 4th kind of implementation of second aspect, the present invention is described in the 7th kind of implementation of second aspect Facial image judging submodule, including:Feature extraction submodule, for being extracted to confirmed by default face characteristic extraction algorithm Demonstrate,prove the face characteristic data in the image data of data.
It is of the invention in the 8th kind of implementation of second aspect with reference to the 7th kind of implementation of second aspect, if really The image data of fixed correspondence checking data is facial image, then the matching module, including:Characteristic matching submodule, for inciting somebody to action The face extracted in the human face data included in the face characteristic data of the extraction, with the image data memory block of photograph album application Characteristic is matched.
With reference to the 8th kind of implementation of second aspect, the present invention is also wrapped in the 9th kind of implementation of second aspect Include:Identity information extracting sub-module, if for the face characteristic data of the extraction, the image data memory block with photograph album application In the matching degree of face characteristic data extracted in the human face data that includes exceed predetermined threshold value, then extract the human face data Identity information.
It is of the invention in the tenth kind of implementation of second aspect with reference to second aspect, the judge module, including:Test Card submodule, if for detecting the new data that mobile terminal is received, verifying the data whether by preset security account Number send;Determination sub-module, if for the data from preset security account, it is determined that for the checking that safety applications are received Data.
It is of the invention in a kind of the tenth implementation of second aspect with reference to the tenth kind of implementation of second aspect, its It is characterised by, also includes:Preset security account sets up module, for setting up preset security by security application server client Account, and upload to security application server.
With reference to second aspect, in the 12nd kind of implementation of second aspect, the stolen pattern opens mould to the present invention Block, including:Locking submodule, for locking the mobile terminal, and/or uploads stolen information to cloud server.
It is of the invention in the 13rd kind of implementation of second aspect with reference to the 12nd kind of implementation of second aspect, The locking submodule, including:Lock cell, the screen for locking the mobile terminal, and/or lock the mobile terminal Physical button, and/or the USB interface for locking the mobile terminal.
It is of the invention in the 14th kind of implementation of second aspect with reference to the 13rd kind of implementation of second aspect, The lock cell, including:Call subelement, for call debugging bridge rights management function remove USB interface allow access Authority.
With reference to second aspect, in the 15th kind of implementation of second aspect, the stolen pattern opens mould to the present invention Block, including:Handover security user account submodule, for the user account of current accessing system to be switched into secured user's account Family.
It is of the invention in the 16th kind of implementation of second aspect with reference to the 15th kind of implementation of second aspect, The stolen pattern opening module, including:Handover security system sub-modules, the system for that will be currently up switches to safe system System.
With reference to second aspect, the present invention also includes in the 17th kind of implementation of second aspect:Set up connection mode Block, is connected for being set up with security application server;Checking data reception module, for receiving security application server transmission Checking data.
According to the third aspect of the invention we, a kind of mobile terminal, including processor and memory are also disclosed,
The memory is used to perform the program that a kind of above-mentioned anti-theft modes start method;
The processor is configurable for performing the program stored in the memory.
According to the fourth aspect of the invention, a kind of computer-readable storage medium is also disclosed, for saving as above-mentioned antitheft mould Computer software instructions used by formula starter, it is designed by anti-theft modes starter that it is included for performing above-mentioned aspect Program.
A kind of anti-theft modes of the invention start method and apparatus and mobile terminal, by judging whether safety applications receive To checking data;If the safety applications receive checking data, by the checking data and mobile terminal authentication area mesh Mark data are matched;The mobile terminal authentication area includes specifying the data storage area of application;If checking data and the institute The target data for stating authentication area is matched, then open the stolen pattern of the mobile terminal.Solve user and lose mobile phone accidentally and lose The damnous problem of data is lost, having for user data is effectively protected by authentication with being stolen under pattern in user mobile phone Beneficial effect.
Described above is only the general introduction of technical solution of the present invention, in order to better understand technological means of the invention, And can be practiced according to the content of specification, and in order to allow the above and other objects of the present invention, feature and advantage can Become apparent, below especially exemplified by specific embodiment of the invention.
Brief description of the drawings
By reading the detailed description of hereafter preferred embodiment, various other advantages and benefit is common for this area Technical staff will be clear understanding.Accompanying drawing is only used for showing the purpose of preferred embodiment, and is not considered as to the present invention Limitation.And in whole accompanying drawing, identical part is denoted by the same reference numerals.In the accompanying drawings:
Fig. 1 shows the step of a kind of anti-theft modes of the invention start a kind of embodiment of method flow chart;
Fig. 2 shows the step of a kind of anti-theft modes of the invention start method another kind embodiment flow chart;
Fig. 3 shows a kind of structured flowchart of anti-theft modes starter embodiment of the invention;And,
Fig. 4 shows the block diagram of the part-structure of the mobile phone related to terminal provided in an embodiment of the present invention.
Specific embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although showing the disclosure in accompanying drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here Limited.Conversely, there is provided these embodiments are able to be best understood from the disclosure, and can be by the scope of the present disclosure Complete conveys to those skilled in the art.
Reference picture 1, shows the step of a kind of anti-theft modes of the invention start a kind of embodiment of method flow chart, Specifically may include steps of:
Step 101, judge whether safety applications receive checking data.
In the embodiment of the present invention, in order to ensure mobile terminal after the loss., the security of data on mobile terminal is generally moved Can there are a safety applications in dynamic terminal system, user can be recognized by setting security attribute in the safety applications and be worked as Whether preceding mobile terminal is in lost state, and opened in lost state the data in current mobile terminal are protected Pattern.For example, the personal portrait picture during user can set picture library in the safety applications is checking data, whenever user Before entering operation interface using mobile terminal, system camera starts on backstage and catches the portrait picture of active user, with peace The portrait picture set in full application is matched, if two pictures are matched, safety verification passes through, and user can be normal Using current mobile terminal, wherein portrait data are a checking data.Certainly, checking data be able to can be marked for other are any Remember the data of the mobile terminal user identity information, it is also possible to be set to the information that only active user knows oneself to verify number According to several short message contents or message registration of such as user, the embodiment of the present invention are not any limitation as to this.
In actual applications, above-mentioned safety applications can be that mobile terminal system is carried, or third party's exploitation Application, the embodiment of the present invention is not any limitation as to this.
If step 102, the safety applications receive checking data, by checking data and the mobile terminal authentication Area's target data is matched;The mobile terminal authentication area includes specifying the data storage area of application.
In the embodiment of the present invention, according to the description of step 101, when the safety applications in mobile terminal are received and are set Safety data type and attribute identical checking data, then the checking data that will just receive and the secure data for setting Matched, shown that the mobile terminal is in stolen pattern if matching.Under normal circumstances, mobile terminal safety data are deposited Storage in mobile terminal authentication area, authentication area can be user is set in safety applications be specifically used to storage targeted security data A storage region, or by user specify a memory block for authentication area, authentication area in data then all for peace Full target data, for example, be duplicated and stored in for the content of one or two short message specially to store secure data in safety applications by user Position, and said short message is set for secure data, then the position of special storage secure data is this in safety applications Authentication area on mobile terminal, or, it is authentication area when user specifies a photograph album, then the picture number of all storages in the photograph album According to all be secure data;No matter any one of the setting type based on both the above authentication area, when user is in mobile terminal quilt After robber, send with the data of data match in authentication area on the mobile terminal, system receive after checking data can and mirror Whether secure data or target data in power area are matched, judge the mobile terminal in stolen shape according to matching result State.
In actual applications, the setting in authentication area can be not limited only to both the above mode, the target data in authentication area Two kinds of data described above are not limited to, the target data stored in authentication area and authentication area can be any user for unique Checking identity, is not easy to the information known to other people, and the embodiment of the present invention is not any limitation as to this.
If step 103, the checking data are matched with the target data in the authentication area, the mobile terminal is opened Stolen pattern.
In the embodiment of the present invention, according to the description of step 102, when the checking message that mobile terminal is received will with authentication area in Security Target data matched, for example, authentication area be user set in advance one preservation household's portrait data photograph album, peace Total evidence is household's portrait data of storage in the photograph album, and after mobile terminal is stolen, user sends house by other equipment The portrait data of people on the mobile terminal, after the safety applications of mobile terminal receive multiple portrait data, by image The method for the treatment of carries out Identification of Images, and is matched with the secure data by Identification of Images in authentication area, is matching The mobile terminal is determined later in stolen status, and opens the stolen pattern of current mobile terminal, used on protection mobile terminal The information at family is not compromised.
In embodiments of the present invention, by after the checking data received in the safety applications in mobile terminal, with the shifting Target data in the authentication area pre-set in dynamic terminal is matched, and determines that the mobile terminal is in quilt if matching Robber's state, you can start the stolen pattern of mobile terminal, solves user and loses mobile phone accidentally and lose that data are damnous asks Topic, with the beneficial effect for effectively protecting user data by authentication under the stolen pattern of user mobile phone.
Reference picture 2, shows the step of a kind of anti-theft modes of the invention start method another kind embodiment flow Figure, specifically may include steps of:
Step 201, judge whether safety applications receive checking data.
In the embodiment of the present invention, after user's lost mobile terminal, can be according to the mesh in the authentication area for setting in advance Mark data, to lose mobile terminal send can with the checking data of default targeted security Data Matching, to trigger the quilt The stolen pattern of mobile terminal is stolen, so when mobile terminal receives any data, safety applications can be according to data The approach of transmission, or secure data label in data judges whether the data are checking data, and generally checking data are Forwarded by the network server end of safety applications, the different number of the intention selection that can be sent according to user in forwarding According to label, data label is verified when being carried in the data that safety applications are received, it is determined that the data are checking data.For example, After user's lost mobile terminal, after another equipment logs in safety applications using the username and password of oneself, in selection Stolen the mode option is opened, safety applications can point out user input authentication information, such as ID card No. etc., reresent use Family uploads checking information, after user uploads the data with default targeted security information same type and attribute, the shifting of loss The secure data installed in dynamic terminal receives the checking data of upload by Network Synchronization, wherein checking data are with checking number According to label.
In actual applications, when mobile phone does not also start stolen pattern in stolen status, shifting is used in active user During dynamic terminal, last time is input into not in the case of in screen-lock password, camera seizure can also be opened by backstage and use movement Used as checking data, so safety applications can be activated in several cases, user can also be arranged on user's head portrait of terminal When position computer connects the mobile phone and is downloaded data, it is desirable to user input password, in the case of Password Input is incorrect, peace Full application starts checking data acquisition, and checking data are obtained by number of ways, and checking data can be location datas, use Family portrait data, voice data etc., the embodiment of the present invention is not any limitation as to this.
If step 202, the safety applications receive checking data, the type of the checking data is recognized.
In the embodiment of the present invention, according to the description of step 201, when safety applications are by verifying data label, or in peace After determining checking data under full application open-authentication data acquisition, the type of the checking data is further recognized, in reality In the application of border, the form of data can be verified to learn by reading the file header of checking data, generally, be deposited in data When storage, file header is all the sequence code for identifying file format, can be learnt after file format is obtained according to sequence code and tested The type of data is demonstrate,proved, is picture, audio, short message, address book contact etc..
Step 203, according to the type, from the authentication area of respective type read target data and with the checking data Matched.The data storage area of the specified application includes:The image data memory block of photograph album application, the data of social networking application At least one of memory block, the note data memory block of short message application, the contacts data store area of address list application.
In the embodiment of the present invention, when the form for learning checking information so that learn checking information type after, will can verify Data are matched with the data of the same type in authentication area.For example if checking data are picture, just by the checking picture number Matched according to the pictorial information in authentication area, if note data or other data then can be with the mesh of same type Mark data are matched.Certainly, in actual applications, the checking information of reception is not unique or single, and safety applications can To require that user provides various checking letters such as multiple checking informations, pictorial information, short message, the data storage in social networking application Breath, can be matched one by one upon receipt, and the checking information of each type can provide multinomial, accurate to improve checking True rate.
In practical application, the target data being arranged in authentication area is all that, by pretreatment, different types of data are led to Cross different technological means and extract its characteristic information, such as image data can extract its portrait feature, convenient and checking information Matched, the method for the feature for extracting the target data in authentication area, and checking information and target data are carried out The method matched somebody with somebody, the embodiment of the present invention is not any limitation as to this.
Step 204, when the mobile terminal authentication area be the image data memory block of photograph album application, and/or the movement When terminal authentication area is the data storage area of social networking application, judge whether the checking data are image data.
In the embodiment of the present invention, when user sets authentication area, can by setting an image albums, or one it is social should Memory block is authentication area, can be used alone one or simultaneously using multiple images memory block to authenticate area, the present invention Embodiment is not any limitation as to this.So, when the target data stored in authenticating area is view data, can first determine whether to receive To checking data whether be image data, the method according to file header is read, or in safety applications open-authentication data acquisition After pattern, camera is opened on direct backstage, catches face figure, iris image of active user etc. as checking data.
Whether step 205, the image data for judging to correspond to checking data are facial image;If the picture of correspondence checking data Data are facial image, then perform step 206.
In the embodiment of the present invention, after having judged checking data as image data, further image can be done to the picture The treatment of feature extraction, after feature extraction is carried out to the pictorial information using multiple images feature extraction algorithm, if extracted Feature be face characteristic, it is determined that the image be facial image, then continue executing with step 206.
In actual applications, judge whether a view data is that the method for facial image has a lot, be not limited only to above-mentioned retouching State, the embodiment of the present invention is not any limitation as to this.
If step 206, the checking data are image datas, by the image data and the picture number of photograph album application Matched according to the image data in the data storage area of memory block, and/or social networking application.
In the embodiment of the present invention, when it is determined that an image is image data or pseudo- face image data, then further root The image is matched with the image of same alike result in authentication area according to the type of the image, if the image is facial image, Characteristic in the feature that can be so extracted according to face feature extraction method, with authentication area in facial image is carried out one by one Matching.
In actual applications, when it is determined that the checking data for receiving are view data, and it is not face image data When, can be by the data storage area of the image data memory block, and/or social networking application of the feature of this image and photograph album application The characteristics of image of non-face view data is matched one by one in image data, when characteristics of image is extracted the method that uses with Image characteristic extracting method is consistent in authentication area, to ensure the accuracy of matching result, wherein, image characteristic extracting method or Model and algorithm, are defined by the purpose for reaching feature extraction, and the embodiment of the present invention is not any limitation as to this.
If step 207, the checking data are matched with the target data in the authentication area, lock described mobile whole End, and/or upload stolen information to cloud server.Specifically include, sub-step 2071.
In the embodiment of the present invention, when default target in the checking data that mobile terminal safety application is received with authentication area After secure data is matched, it is determined that current mobile terminal is in stolen status, and starts the stolen pattern of mobile terminal, when Mobile terminal will be locked after stolen pattern is opened, and screen can not be unlocked, and current movement is sent under networking state eventually The warning message at end to safety applications cloud server, in warning message comprising current mobile terminal location information, when with Family is after high in the clouds receives the warning message of above-mentioned mobile terminal, if user learns that current mobile terminal is not stolen shape State, then can then release stolen status, stolen status are removed by the formal solution for inputing password or identifying code, certainly, if Above-mentioned mobile terminal is in stolen status really, then location information that then can be in warning message obtains mobile terminal Position, gives mobile terminal for change, and in the process, mobile terminal is in the lock-out state under stolen pattern.
Sub-step 2071, the screen for locking the mobile terminal, and/or the physical button of the mobile terminal is locked, and/ Or lock the USB interface of the mobile terminal.Specifically include, sub-step 20711.
In the embodiment of the present invention, when mobile terminal is in stolen status, lock-out state can be entered, under lock-out state, moved The physical button that the screen of dynamic terminal can enter on screen lock state, and mobile terminal can also be in failure state, likewise, The USB interface of mobile terminal connection other equipment can also be in failure state in lock-out state, in actual applications, when mobile whole End starts stolen pattern, and the safety applications on mobile terminal can intercept all message for calling each process interface of mobile terminal, User can send the message for calling each the corresponding interface when mobile terminal touch screen is clicked on by mobile terminal processor, so Can be by the service processes of monitoring system ccf layer transmission interface message call in safety applications, when mobile terminal is in stolen mould When calling each functional interface under formula, safety applications will be intercepted above-mentioned message, you can realize the locking shape of mobile terminal State.
Certainly, in actual applications, the method for locking mobile terminal is not limited to the method referred in above description, the present invention Embodiment is not any limitation as to this.
Sub-step 20711, the permission access rights for calling debugging bridge rights management function removal USB interface.
In the embodiment of the present invention, when it is determined that mobile terminal is in stolen status, safety applications then can be by calling Examination bridge rights management function changes the permission access rights of USB interface, and so, the mobile terminal in stolen pattern just cannot Other equipment is connected to by USB interface to carry out data transmission.
Preferably, in an alternative embodiment of the invention, after step 207, can also include:Step 207- steps 209.
If step 208, the checking data are matched with the target data in the authentication area, by current accessing system User account switches to secured user's account.
In the embodiment of the present invention, when default target in the checking data that mobile terminal safety application is received with authentication area After secure data is matched, it is determined that current mobile terminal is in stolen status, and starts the stolen pattern of mobile terminal, this When allowing active user to enter mobile terminal operation interface, logged in the state of secured account, under secured account logging status, The data of the mobile terminal script do not allow to read.
In actual applications, above-mentioned functions can now can by realizing multi-user login in setting option in mobile terminal For multi-user delimit special memory space, and realized to various types of login users by the program for realize this function Priority assignation, Guest User log in the state of, connection other equipment when, the data of primary user are also same on the mobile terminal Sample can not be read.
If step 209, the checking data are matched with the target data in the authentication area, the system that will be currently up Switch to security system.
In the embodiment of the present invention, when default target in the checking data that mobile terminal safety application is received with authentication area After secure data is matched, it is determined that current mobile terminal is in stolen status, and starts the stolen pattern of mobile terminal, this When allow active user enter mobile terminal operation interface when, into a security system, the security system can be current movement The subsystem set in terminal.
In actual applications, the realization of mobile terminal subsystem can be realized in safety system by way of shared justice class Under system pattern, the basic function of mobile terminal is accomplished, and goes monitoring according to security service is added on system framework layer Operation of other services under stolen pattern, to realize the control to every authority in security system, and under security system Function can set corresponding authority according to corresponding current system, and for example the All Files of main system is not permitted under security system Perhaps it is accessed, the file storage that security system is used is individually distribution, and under normal circumstances, under installation system pattern The sim cards of the mobile terminal will be locked, i.e., communication module and interface function under mobile terminal can all be shielded.Certainly, Mobile terminal realizes that function that is security system and being realized in security system is not limited only to above-mentioned retouching under stolen pattern State, the embodiment of the present invention is not any limitation as to this.
For embodiment of the method, in order to be briefly described, therefore it is all expressed as a series of combination of actions, but this area Technical staff should know that the embodiment of the present invention is not limited by described sequence of movement, because implementing according to the present invention Example, some steps can sequentially or simultaneously be carried out using other.Secondly, those skilled in the art should also know, specification Described in embodiment belong to preferred embodiment, necessary to the involved action not necessarily embodiment of the present invention.
In embodiments of the present invention, by after the checking data received in the safety applications in mobile terminal, with the shifting Target data in the authentication area pre-set in dynamic terminal is matched, and determines that the mobile terminal is in quilt if matching Robber's state, you can start the stolen pattern of mobile terminal, locking stolen mobile terminal, or entering security system, protection is used The data at family are not compromised, solve user and lose the mobile phone loss damnous problem of data accidentally.
Reference picture 3, shows a kind of structured flowchart of anti-theft modes starter embodiment of the invention, specifically may be used With including such as lower module:
Judge module 301, for judging whether safety applications receive checking data;
Matching module 302, if receiving checking data for the safety applications, by checking data and the movement Terminal authentication area target data is matched;The mobile terminal authentication area includes specifying the data storage area of application;Specific bag Include:Identification submodule 3021, the type for recognizing the checking data;
Matched sub-block 3022, for according to the type, read from the authentication area of respective type target data and with The checking data are matched.The data storage area of the specified application includes:The image data memory block of photograph album application, society In data storage area, the note data memory block of short message application, the contacts data store area of address list application of friendship application At least one.
Judging submodule 3023, for when the mobile terminal authentication area for photograph album application image data memory block, and/ Or the mobile terminal authentication area for social networking application data storage area when, judge it is described verify data whether be image data;
Facial image judging submodule 3024, whether the image data for judging correspondence checking data is facial image; If the image data of correspondence checking data is facial image, performs and the image data is deposited with the image data of photograph album application The step of image data in storage area is matched.
Picture match submodule 3025, if for it is described checking data be image data, by the image data with Image data in the image data memory block of photograph album application, and/or the data storage area of social networking application is matched.
Stolen pattern opening module 303, if being matched with the target data in the authentication area for the checking data, Open the stolen pattern of the mobile terminal.Specifically include:Locking submodule 3031, for locking the mobile terminal, and/or on Pass stolen information to cloud server.Specifically include:Lock cell, the screen for locking the mobile terminal, and/or locking The physical button of the mobile terminal, and/or lock the USB interface of the mobile terminal.Specifically include:Subelement is called, is used In the permission access rights for calling debugging bridge rights management function to remove USB interface.Handover security user account submodule 3032, For the user account of current accessing system to be switched into secured user's account.Handover security system sub-modules 3033, for inciting somebody to action The system being currently up switches to security system.
In embodiments of the present invention, by after the checking data received in the safety applications in mobile terminal, with the shifting Target data in the authentication area pre-set in dynamic terminal is matched, and determines that the mobile terminal is in quilt if matching Robber's state, you can start the stolen pattern of mobile terminal, locking stolen mobile terminal, or entering security system, protection is used The data at family are not compromised, solve user and lose the mobile phone loss damnous problem of data accidentally.
For device embodiment, because it is substantially similar to embodiment of the method, so description is fairly simple, it is related Part is illustrated referring to the part of embodiment of the method.
The embodiment of the present invention additionally provides a kind of mobile terminal, as shown in figure 4, for convenience of description, illustrate only and this The related part of inventive embodiments, particular technique details is not disclosed, and refer to present invention method part.The terminal can Think including mobile phone, panel computer, PDA (Personal Digital Assistant, personal digital assistant), POS (Point Of Sales, point-of-sale terminal), any terminal device such as vehicle-mounted computer, so that terminal is as mobile phone as an example:
Fig. 4 is illustrated that the block diagram of the part-structure of the mobile phone related to terminal provided in an embodiment of the present invention.With reference to figure 4, mobile phone includes:Radio frequency (Radio Frequency, RF) circuit 410, memory 420, input block 430, display unit 440, Sensor 450, voicefrequency circuit 460, Wireless Fidelity (wireless fidelity, WiFi) module 470, processor 480 and The grade part of power supply 490.It will be understood by those skilled in the art that the handset structure shown in Fig. 4 does not constitute the restriction to mobile phone, Part more more or less than diagram can be included, or combine some parts, or different part arrangements.
Each component parts of mobile phone is specifically introduced with reference to Fig. 4:
RF circuits 410 can be used to receiving and sending messages or communication process in, the reception and transmission of signal, especially, by base station After downlink information is received, processed to processor 480;In addition, up data is activation will be designed to base station.Generally, RF circuits 410 Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..Additionally, RF circuits 410 can also be communicated by radio communication with network and other equipment. Above-mentioned radio communication can use any communication standard or agreement, including but not limited to global system for mobile communications (Global System of Mobile communication, GSM), general packet radio service (General Packet Radio Service, GPRS), CDMA (Code Division Multiple Access, CDMA), WCDMA (Wideband Code Division Multiple Access, WCDMA), Long Term Evolution (Long Term Evolution, LTE), Email, Short Message Service (Short Messaging Service, SMS) etc..
Memory 420 can be used to store software program and module, and processor 480 is by running storage in memory 420 Software program and module, so as to perform various function application and the data processing of mobile phone.Memory 420 can mainly include Storing program area and storage data field, wherein, the application journey that storing program area can be needed for storage program area, at least one function Sequence (such as sound-playing function, image player function etc.) etc.;Storage data field can be stored and use what is created according to mobile phone Data (such as voice data, phone directory etc.) etc..Additionally, memory 420 can include high-speed random access memory, can be with Including nonvolatile memory, for example, at least one disk memory, flush memory device or other volatile solid-states Part.
Input block 430 can be used to receive the numeral or character information of input, and produce with the user of mobile phone set with And the relevant key signals input of function control.Specifically, input block 430 may include that contact panel 431 and other inputs set Standby 432.Contact panel 431, also referred to as touch-screen, user can be collected thereon or neighbouring touch operation (such as user uses The operation of any suitable object such as finger, stylus or annex on contact panel 431 or near contact panel 431), and root Corresponding attachment means are driven according to formula set in advance.Optionally, contact panel 431 may include touch detecting apparatus and touch Two parts of controller.Wherein, touch detecting apparatus detect the touch orientation of user, and detect the signal that touch operation brings, Transmit a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into touching Point coordinates, then give processor 480, and the order sent of receiving processor 480 and can be performed.Furthermore, it is possible to using electricity The polytypes such as resistive, condenser type, infrared ray and surface acoustic wave realize contact panel 431.Except contact panel 431, input Unit 430 can also include other input equipments 432.Specifically, other input equipments 432 can include but is not limited to secondary or physical bond One or more in disk, function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc..
Display unit 440 can be used for show by user input information or be supplied to user information and mobile phone it is various Menu.Display unit 440 may include display panel 441, optionally, can use liquid crystal display (Liquid Crystal Display, LCD), the form such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) it is aobvious to configure Show panel 441.Further, contact panel 431 can cover display panel 441, when contact panel 431 detect it is thereon or attached After near touch operation, processor 480 is sent to determine the type of touch event, with preprocessor 480 according to touch event Type corresponding visual output is provided on display panel 441.Although in fig. 4, contact panel 431 and display panel 441 It is input and the input function that mobile phone is realized as two independent parts, but in some embodiments it is possible to by touch-control Panel 431 and display panel 441 be integrated and input that realize mobile phone and output function.
Mobile phone may also include at least one sensor 450, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor may include ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to ambient light Light and shade adjust the brightness of display panel 441, proximity transducer can close display panel 441 when mobile phone is moved in one's ear And/or backlight.As one kind of motion sensor, (generally three axles) acceleration in the detectable all directions of accelerometer sensor Size, size and the direction of gravity are can detect that when static, can be used for recognize mobile phone attitude application (such as horizontal/vertical screen is cut Change, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;May be used also as mobile phone The other sensors such as gyroscope, barometer, hygrometer, thermometer, the infrared ray sensor of configuration, will not be repeated here.
Voicefrequency circuit 460, loudspeaker 461, microphone 462 can provide the COBBAIF between user and mobile phone.Audio-frequency electric Electric signal after the voice data conversion that road 460 will can receive, is transferred to loudspeaker 461, and sound is converted to by loudspeaker 461 Signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 462, is turned after being received by voicefrequency circuit 460 It is changed to voice data, then after voice data output processor 480 is processed, through RF circuits 410 to be sent to such as another mobile phone, Or export to memory 420 so as to further treatment voice data.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronicses postal by WiFi module 470 Part, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and has accessed.Although Fig. 4 shows WiFi module 470, but it is understood that, it is simultaneously not belonging to must be configured into for mobile phone, can not change as needed completely Become in the essential scope of invention and omit.
Processor 480 is the control centre of mobile phone, using various interfaces and the various pieces of connection whole mobile phone, is led to Cross operation or perform software program of the storage in memory 420 and/or module, and call storage in memory 420 Data, perform the various functions and processing data of mobile phone, so as to carry out integral monitoring to mobile phone.Optionally, processor 480 can be wrapped Include one or more processing units;Preferably, processor 480 can integrated application processor and modem processor, wherein, should Operating system, user interface and application program etc. are mainly processed with processor, modem processor mainly processes radio communication. It is understood that above-mentioned modem processor can not also be integrated into processor 480.
Mobile phone also includes the power supply 490 (such as battery) powered to all parts, it is preferred that power supply can be by power supply pipe Reason system is logically contiguous with processor 480, so as to realize management charging, electric discharge and power managed by power-supply management system Etc. function.
Although not shown, mobile phone can also will not be repeated here including camera, bluetooth module etc..
In embodiments of the present invention, the processor 480 included by the terminal also has following functions:
Judge whether safety applications receive checking data;
If the safety applications receive checking data, by the checking data and mobile terminal authentication area number of targets According to being matched;The mobile terminal authentication area includes specifying the data storage area of application;
If the checking data are matched with the target data in the authentication area, the stolen mould of the mobile terminal is opened Formula.
It is apparent to those skilled in the art that, for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, may be referred to the corresponding process in preceding method embodiment, will not be repeated here.
In several embodiments provided by the present invention, it should be understood that disclosed system, apparatus and method can be with Realize by another way.For example, device embodiment described above is only schematical, for example, the unit Divide, only a kind of division of logic function there can be other dividing mode when actually realizing, for example multiple units or component Can combine or be desirably integrated into another system, or some features can be ignored, or do not perform.It is another, it is shown or The coupling each other for discussing or direct-coupling or communication connection can be the indirect couplings of device or unit by some interfaces Close or communicate to connect, can be electrical, mechanical or other forms.
The unit that is illustrated as separating component can be or may not be it is physically separate, it is aobvious as unit The part for showing can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be according to the actual needs selected to realize the mesh of this embodiment scheme 's.
In addition, during each functional unit in each embodiment of the invention can be integrated in a processing unit, it is also possible to It is that unit is individually physically present, it is also possible to which two or more units are integrated in a unit.Above-mentioned integrated list Unit can both be realized in the form of hardware, it would however also be possible to employ the form of SFU software functional unit is realized.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is can Completed with instructing the hardware of correlation by program, the program can be stored in a computer-readable recording medium, storage Medium can include:Read-only storage (ROM, Read Only Memory), random access memory (RAM, Random Access Memory), disk or CD etc..
One of ordinary skill in the art will appreciate that all or part of step in realizing above-described embodiment method can be The hardware of correlation is instructed to complete by program, described program can be stored in a kind of computer-readable recording medium, on It can be read-only storage, disk or CD etc. to state the storage medium mentioned.
Starting method and apparatus and mobile terminal to a kind of anti-theft modes provided by the present invention above has carried out detailed Jie Continue, for those of ordinary skill in the art, according to the thought of the embodiment of the present invention, in specific embodiments and applications Will change, in sum, this specification content should not be construed as limiting the invention.
Start method the invention discloses A1, a kind of anti-theft modes, including:
Judge whether safety applications receive checking data;
If the safety applications receive checking data, by the checking data and mobile terminal authentication area number of targets According to being matched;The mobile terminal authentication area includes specifying the data storage area of application;
If the checking data are matched with the target data in the authentication area, the stolen mould of the mobile terminal is opened Formula.
A2, the method according to A1, it is described to carry out checking data and the mobile terminal authentication area target data With the step of, including:
The type of the identification checking data;
According to the type, target data is read from the authentication area of respective type and is carried out with the checking data Match somebody with somebody.
A3, the method according to A1 or A2, the data storage area of the specified application include:The picture number of photograph album application According to memory block, the data storage area of social networking application, the note data memory block of short message application, address list application contact data At least one of memory block.
A4, the method according to A1, when the mobile terminal authentication area is the image data memory block of photograph album application, And/or the mobile terminal authentication area for social networking application data storage area when, then checking data and the mobile terminal are reflected The step of power area's target data is matched, including:
Judge whether the checking data are image data;
If the checking data are image datas, the image data and the image data of photograph album application are stored Image data in the data storage area of area, and/or social networking application is matched.
A5, the method according to A4, the picture in the image data memory block of the image data and photograph album application Before the step of data are matched, also include:
Whether the image data for judging correspondence checking data is facial image;If the image data of correspondence checking data is behaved Face image, then perform the step that the image data in the image data memory block by the image data with photograph album application is matched Suddenly.
A6, the method according to A1, when the mobile terminal authentication area is the image data memory block of photograph album application, And/or the mobile terminal authentication area for social networking application data storage area when, then checking data and the mobile terminal are reflected The step of power area's target data is matched, including:
Judge whether the checking data are image data;
If the checking data are image datas, the quantity of the image data is judged;
If the image data quantity is more than one, respectively by the image data and the image data of photograph album application Image data in the data storage area of memory block, and/or social networking application is matched.
A7, the method according to A1, when the mobile terminal authentication area is the image data memory block of photograph album application, And/or the mobile terminal authentication area for social networking application data storage area when, then checking data and the mobile terminal are reflected The step of power area's target data is matched, including:
Judge the type of the checking data;
If the checking data are appointing for image data and note data, or address book data, or social networking application data One or more data splitting, then respectively should by the image data memory block, and/or social activity of the image data and photograph album application With data storage area in image data matched, and by note data, or address book data, or social networking application data with Corresponding data in correspondence authentication area is matched.
A8, the method according to A5, it is described judge correspondence checking data image data whether be facial image step Suddenly, including:
The face characteristic data in the image data of correspondence checking data are extracted by presetting face characteristic extraction algorithm.
A9, the method according to A8, however, it is determined that the image data of correspondence checking data is facial image, then described by institute The step of stating image data and matched with the image data in the image data memory block of photograph album application, including:
In the human face data that will be included in the face characteristic data of the extraction, with the image data memory block of photograph album application The face characteristic data of extraction are matched.
A10, the method according to A9, in the face characteristic data by the extraction, the picture with photograph album application After the step of face characteristic data extracted in the human face data included in data storage area are matched, also include:
If in the human face data included in the face characteristic data of the extraction, with the image data memory block of photograph album application The matching degree of the face characteristic data of extraction exceedes predetermined threshold value, then extract the identity information of the human face data.
A11, the method according to A1, it is described to judge whether safety applications receive the step of verifying data, including:
If detecting the new data that mobile terminal is received, verify whether the data are sent out by preset security account Send;
If the data are from preset security account, it is determined that for the checking data that safety applications are received.
A12, the method according to A11, it is described judge safety applications whether receive checking data the step of before, Also include:
Default power secured account numbers are set up by security application server client, and uploads to security application server.
The step of A13, the method according to A1, the unlatching mobile terminal stolen pattern, including:
The mobile terminal is locked, and/or uploads stolen information to cloud server.
The step of A14, the method according to A13, locking mobile terminal, includes:
The screen of the mobile terminal is locked, and/or locks the physical button of the mobile terminal, and/or locked described The USB interface of mobile terminal.
The step of A15, the method according to A14, USB interface of the locking mobile terminal, including:
Debugging bridge rights management function is called to remove the permission access rights of USB interface.
The step of A16, the method according to A1, the unlatching mobile terminal stolen pattern, including:
The user account of current accessing system is switched into secured user's account.
The step of A17, the method according to A16, the unlatching mobile terminal stolen pattern, including:
The system that will be currently up switches to security system.
A18, the method according to A1, it is described judge safety applications whether receive checking data the step of before, Also include:Set up with security application server and be connected;
Receive the checking data that security application server sends.
B19, a kind of anti-theft modes starter, including:
Judge module, for judging whether safety applications receive checking data;
Matching module, it is if receiving checking data for the safety applications, the checking data are whole with mobile End authentication area's target data is matched;The mobile terminal authentication area includes specifying the data storage area of application;
Stolen pattern opening module, if being matched with the target data in the authentication area for the checking data, opens Open the stolen pattern of the mobile terminal.
B20, the device according to B19, the matching module, including:
Identification submodule, the type for recognizing the checking data;
Matched sub-block, for according to the type, read from the authentication area of respective type target data and with it is described Checking data are matched.
B21, the device according to B19 or B20, the data storage area of the specified application include:The figure of photograph album application Sheet data memory block, the data storage area of social networking application, the note data memory block of short message application, the contact person of address list application At least one of data storage area.
B22, the device according to B19, the matching module, including:
Judging submodule, for when the image data memory block that the mobile terminal authentication area is photograph album application, and/or institute When stating the data storage area that mobile terminal authentication area is social networking application, judge whether the checking data are image data;
Picture match submodule, if being image data for the checking data, by the image data and photograph album Image data in the image data memory block of application, and/or the data storage area of social networking application is matched.
B23, the device according to B22, the matching module also include:
Facial image judging submodule, whether the image data for judging correspondence checking data is facial image;If right The image data of data should be verified for facial image, then perform the image data memory block by the image data and photograph album application In image data the step of matched.
B24, the device according to A19, when the mobile terminal authentication area is the image data memory block of photograph album application, And/or the mobile terminal authentication area for social networking application data storage area when, then the matching module, including:
Judging submodule, for judging whether the checking data are image data;
Quantity judging submodule, if being image data for the checking data, judges the number of the image data Amount;
Matched sub-block, if being more than one for the image data quantity, respectively by the image data and phase Image data in the image data memory block of volume application, and/or the data storage area of social networking application is matched.
B25, the device according to A19, when the mobile terminal authentication area is the image data memory block of photograph album application, And/or the mobile terminal authentication area for social networking application data storage area when, then the matching module, including:
Type judging submodule, the type for judging the checking data;
Difference matched sub-block, if data are verified for image data and note data for described, or address book data, Or any one or more data splitting of social networking application data, then respectively by the image data and the image data of photograph album application Image data in the data storage area of memory block, and/or social networking application is matched, and by note data, or address list number According to, or social networking application data with it is corresponding authentication area in corresponding data matched.
B26, the device according to A23, the facial image judging submodule, including:
Feature extraction submodule, the image data for extracting correspondence checking data by presetting face characteristic extraction algorithm In face characteristic data.
B27, the device according to A26, however, it is determined that the image data of correspondence checking data is facial image, then described With module, including:
Characteristic matching submodule, for by the face characteristic data of the extraction, the image data with photograph album application to be stored The face characteristic data extracted in the human face data included in area are matched.
B28, the device according to A27, also include:
Identity information extracting sub-module, if for the face characteristic data of the extraction, the image data with photograph album application The matching degree of the face characteristic data extracted in the human face data included in memory block exceedes predetermined threshold value, then extract the face The identity information of data.
B29, the device according to A19, the judge module, including:
Checking submodule, if for detecting the new data that mobile terminal is received, verify the data whether by Preset security account sends;
Determination sub-module, if for the data from preset security account, it is determined that be testing that safety applications are received Card data.
B30, the device according to A29, also include:
Preset security account sets up module, for setting up preset security account by security application server client, and Upload to security application server.
B31, the device according to B19, the stolen pattern opening module, including:
Locking submodule, for locking the mobile terminal, and/or uploads stolen information to cloud server.
B32, the device according to B31, the locking submodule, including:
Lock cell, the screen for locking the mobile terminal, and/or the physical button of the mobile terminal is locked, And/or lock the USB interface of the mobile terminal.
B33, the device according to B32, the lock cell, including:
Subelement is called, for calling debugging bridge rights management function to remove the permission access rights of USB interface.
B34, the device according to B19, the stolen pattern opening module, including:
Handover security user account submodule, for the user account of current accessing system to be switched into secured user's account Family.
B35, the device according to B34, the stolen pattern opening module, including:
Handover security system sub-modules, the system for that will be currently up switches to security system.
B36, the device according to B19, also include:
Link block is set up, is connected for being set up with security application server;
Checking data reception module, the checking data for receiving security application server transmission.
The invention also discloses C37, a kind of mobile terminal, including processor and memory,
The memory is used to store the program that the anti-theft modes performed described in A1 to A18 start method;
The processor is configurable for performing the program stored in the memory.

Claims (10)

1. a kind of anti-theft modes start method, it is characterised in that including:
Judge whether safety applications receive checking data;
If the safety applications receive checking data, the checking data are entered with mobile terminal authentication area target data Row matching;The mobile terminal authentication area includes specifying the data storage area of application;
If the checking data are matched with the target data in the authentication area, the stolen pattern of the mobile terminal is opened.
2. method according to claim 1, it is characterised in that described by the checking data and mobile terminal authentication area mesh The step of mark data are matched, including:
The type of the identification checking data;
According to the type, target data is read from the authentication area of respective type and is matched with the checking data.
3. method according to claim 1 and 2, it is characterised in that the data storage area of the specified application includes:Photograph album The image data memory block of application, the data storage area of social networking application, the note data memory block of short message application, address list application At least one of contacts data store area.
4. method according to claim 1, it is characterised in that when the mobile terminal authentication area is the picture of photograph album application Data storage area, and/or the mobile terminal authentication area for social networking application data storage area when, then by it is described checking data with The step of mobile terminal authentication area target data is matched, including:
Judge whether the checking data are image data;
If the checking data are image datas, by the image data memory block of the image data and photograph album application and/ Or the image data in the data storage area of social networking application is matched.
5. method according to claim 4, it is characterised in that deposited with the image data of photograph album application in the image data Before the step of image data in storage area is matched, also include:
Whether the image data for judging correspondence checking data is facial image;If the image data of correspondence checking data is face figure Picture, then the step of performing the image data in the image data memory block by the image data with photograph album application and matched.
6. method according to claim 1, it is characterised in that when the mobile terminal authentication area is the picture of photograph album application Data storage area, and/or the mobile terminal authentication area for social networking application data storage area when, then by it is described checking data with The step of mobile terminal authentication area target data is matched, including:
Judge whether the checking data are image data;
If the checking data are image datas, the quantity of the image data is judged;
If the image data quantity is more than one, the image data and the image data of photograph album application are stored respectively Image data in the data storage area of area, and/or social networking application is matched.
7. method according to claim 1, it is characterised in that when the mobile terminal authentication area is the picture of photograph album application Data storage area, and/or the mobile terminal authentication area for social networking application data storage area when, then by it is described checking data with The step of mobile terminal authentication area target data is matched, including:
Judge the type of the checking data;
If the checking data are any one of image data and note data, or address book data, or social networking application data Or multiple combination data, then respectively by the image data memory block, and/or social networking application of the image data and photograph album application Image data in data storage area is matched, and by note data, or address book data, or social networking application data with it is corresponding Corresponding data in authentication area is matched.
8. method according to claim 5, it is characterised in that the image data for judging correspondence checking data whether be The step of facial image, including:
The face characteristic data in the image data of correspondence checking data are extracted by presetting face characteristic extraction algorithm.
9. a kind of anti-theft modes starter, it is characterised in that including:
Judge module, for judging whether safety applications receive checking data;
Matching module, if receiving checking data for the safety applications, the checking data and mobile terminal is reflected Power area's target data is matched;The mobile terminal authentication area includes specifying the data storage area of application;
Stolen pattern opening module, if being matched with the target data in the authentication area for the checking data, opens institute State the stolen pattern of mobile terminal.
10. a kind of mobile terminal, it is characterised in that including processor and memory,
A kind of anti-theft modes that the memory is used to store described in perform claim requirement 1 to claim 8 start method Program;
The processor is configurable for performing the program stored in the memory.
CN201710213935.1A 2017-04-01 2017-04-01 A kind of anti-theft modes start method and apparatus and mobile terminal Pending CN106921781A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710213935.1A CN106921781A (en) 2017-04-01 2017-04-01 A kind of anti-theft modes start method and apparatus and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710213935.1A CN106921781A (en) 2017-04-01 2017-04-01 A kind of anti-theft modes start method and apparatus and mobile terminal

Publications (1)

Publication Number Publication Date
CN106921781A true CN106921781A (en) 2017-07-04

Family

ID=59568691

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710213935.1A Pending CN106921781A (en) 2017-04-01 2017-04-01 A kind of anti-theft modes start method and apparatus and mobile terminal

Country Status (1)

Country Link
CN (1) CN106921781A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108650394A (en) * 2018-04-27 2018-10-12 努比亚技术有限公司 Terminal security control method, mobile terminal and computer readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102096546A (en) * 2010-12-29 2011-06-15 华为终端有限公司 Unlocking method and device of operating system
CN103457991A (en) * 2013-05-29 2013-12-18 北京奇虎科技有限公司 Terminal safety protection method and system
CN103702299A (en) * 2013-12-13 2014-04-02 北京奇虎科技有限公司 Mobile terminal antitheft method and client
CN103702331A (en) * 2013-12-13 2014-04-02 北京奇虎科技有限公司 Mobile terminal antitheft method and client
CN105335639A (en) * 2014-08-15 2016-02-17 中兴通讯股份有限公司 Method and apparatus for realizing function lock in electronic device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102096546A (en) * 2010-12-29 2011-06-15 华为终端有限公司 Unlocking method and device of operating system
CN103457991A (en) * 2013-05-29 2013-12-18 北京奇虎科技有限公司 Terminal safety protection method and system
CN103702299A (en) * 2013-12-13 2014-04-02 北京奇虎科技有限公司 Mobile terminal antitheft method and client
CN103702331A (en) * 2013-12-13 2014-04-02 北京奇虎科技有限公司 Mobile terminal antitheft method and client
CN105335639A (en) * 2014-08-15 2016-02-17 中兴通讯股份有限公司 Method and apparatus for realizing function lock in electronic device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108650394A (en) * 2018-04-27 2018-10-12 努比亚技术有限公司 Terminal security control method, mobile terminal and computer readable storage medium

Similar Documents

Publication Publication Date Title
CN104901805B (en) A kind of identification authentication methods, devices and systems
CN104967593B (en) A kind of auth method, device and system
CN107493378B (en) Method and device for logging in application program, computer equipment and readable storage medium
US9940448B2 (en) Unlock processing method and device
CN106921799A (en) A kind of mobile terminal safety means of defence and mobile terminal
CN107437009A (en) Authority control method and related product
CN108536783A (en) Data processing method and device, terminal, computer readable storage medium
CN106375478B (en) A kind of synchronous method of mobile terminal data, apparatus and system
CN106327193B (en) A kind of system unlocking method and equipment
CN106778175A (en) A kind of interface locking means, device and terminal device
CN106920307A (en) Gate inhibition's open method, device and mobile terminal
CN107451450B (en) Biometric identification method and related product
CN106255102B (en) Terminal equipment identification method and related equipment
CN109558718A (en) Application program login method, computer end, mobile terminal, system and storage medium
CN107742067A (en) A kind of auth method, device and system
CN106506820A (en) A kind of backup method of mobile terminal data and device
CN109257336A (en) It is a kind of based on the encrypted message processing method of block chain, terminal device
CN108881103A (en) A kind of method and device accessing network
CN109743696A (en) Identifying code encryption method, system and readable storage medium storing program for executing
CN109033779A (en) A kind of unlock authentication method, wearable device and computer readable storage medium
CN107786569A (en) A kind of identifying code sending method, method of reseptance and relevant device
CN106803027A (en) Application function entrance starts method, device and mobile terminal
CN106650490A (en) Cloud account number login method and device
CN106611152A (en) User identity determination method and apparatus
CN106407771A (en) Message management method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20170802

Address after: 100102, 18 floor, building 2, Wangjing street, Beijing, Chaoyang District, 1801

Applicant after: BEIJING ANYUN SHIJI SCIENCE AND TECHNOLOGY CO., LTD.

Address before: 100088 Beijing city Xicheng District xinjiekouwai Street 28, block D room 112 (Desheng Park)

Applicant before: Beijing Qihu Technology Co., Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170704