CN106921781A - A kind of anti-theft modes start method and apparatus and mobile terminal - Google Patents
A kind of anti-theft modes start method and apparatus and mobile terminal Download PDFInfo
- Publication number
- CN106921781A CN106921781A CN201710213935.1A CN201710213935A CN106921781A CN 106921781 A CN106921781 A CN 106921781A CN 201710213935 A CN201710213935 A CN 201710213935A CN 106921781 A CN106921781 A CN 106921781A
- Authority
- CN
- China
- Prior art keywords
- data
- mobile terminal
- checking
- image data
- matched
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
- H04M1/67—Preventing unauthorised calls from a telephone set by electronic means
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
Abstract
The embodiment of the invention provides a kind of anti-theft modes and start method and apparatus and mobile terminal, methods described includes:Judge whether safety applications receive checking data;If the safety applications receive checking data, the checking data are matched with mobile terminal authentication area target data;The mobile terminal authentication area includes specifying the data storage area of application;If the checking data are matched with the target data in the authentication area, the stolen pattern of the mobile terminal is opened.Solve user and lose the mobile phone loss damnous problem of data accidentally, with the beneficial effect for effectively protecting user data by authentication under the stolen pattern of user mobile phone.
Description
Technical field
The present invention relates to anti-theft modes start-up technique field, more particularly to a kind of anti-theft modes start method and apparatus and
Mobile terminal.
Background technology
With developing rapidly for terminal device technology, the life that mobile terminal gives people brings huge facility, mobile
Terminal user can realize all the basic things in using mobile phone to complete daily life, such as shopping, proof of identification, bank's money
Gold flowing etc..While mobile terminal brings convenient, while huge risk is there is also, if such as mobile phone is accidentally
Lose, important information therein may bring serious economic loss to user.
At present, after mobile terminal is lost, if there is the checking password for entering mobile terminal system, in multiple Password Input
Screen locking can be performed after failure, data on the mobile terminal are obtained it is also possible to pass through other technologies means, caused to user
Very serious potential safety hazard.
The content of the invention
In view of the above problems, it is proposed that the present invention solves the above problems or solve above-mentioned asking at least in part to provide
A kind of anti-theft modes of topic start method and apparatus and mobile terminal.
According to an aspect of the invention, there is provided a kind of anti-theft modes start method, including:Whether judge safety applications
Receive checking data;If the safety applications receive checking data, by checking data and the mobile terminal authentication
Area's target data is matched;The mobile terminal authentication area includes specifying the data storage area of application;If the checking data
Target data with the authentication area is matched, then open the stolen pattern of the mobile terminal.
With reference in a first aspect, the present invention is in the first implementation of first aspect, it is described by the checking data with
The step of mobile terminal authentication area target data is matched, including:The type of the identification checking data;According to the class
Type, target data is read from the authentication area of respective type and is matched with the checking data.
With reference to the first implementation of first aspect or first aspect, the present invention is in second realization side of first aspect
In formula, the data storage area of the specified application includes:The image data memory block of photograph album application, the data storage of social networking application
At least one of area, the note data memory block of short message application, the contacts data store area of address list application.
With reference in a first aspect, the present invention is in the third implementation of first aspect, when the mobile terminal authentication area
Be the image data memory block of photograph album application, and/or the mobile terminal authentication area for social networking application data storage area when, then
The step of checking data are matched with mobile terminal authentication area target data, including:Judging the checking data is
No is image data;If the checking data are image datas, by the image data and the image data of photograph album application
Image data in the data storage area of memory block, and/or social networking application is matched.
It is of the invention in the 4th kind of implementation of first aspect with reference to the third implementation of first aspect, in institute
Before stating the step of image data is matched with the image data in the image data memory block of photograph album application, also include:Sentence
Whether the image data of disconnected correspondence checking data is facial image;If the image data of correspondence checking data is facial image,
The step of image data in image data memory block of the execution by the image data with photograph album application is matched.
With reference in a first aspect, the present invention is in the 5th kind of implementation of first aspect, when the mobile terminal authentication area
Be the image data memory block of photograph album application, and/or the mobile terminal authentication area for social networking application data storage area when, then
The step of checking data are matched with mobile terminal authentication area target data, including:Judging the checking data is
No is image data;If the checking data are image datas, the quantity of the image data is judged;If the picture
Data bulk is more than one, then respectively by the image data memory block, and/or social networking application of the image data and photograph album application
Data storage area in image data matched.
With reference in a first aspect, the present invention is in the 6th kind of implementation of first aspect, when the mobile terminal authentication area
Be the image data memory block of photograph album application, and/or the mobile terminal authentication area for social networking application data storage area when, then
The step of checking data are matched with mobile terminal authentication area target data, including:Judge the checking data
Type;If the checking data are any one of image data and note data, or address book data, or social networking application data
Or multiple combination data, then respectively by the image data memory block, and/or social networking application of the image data and photograph album application
Image data in data storage area is matched, and by note data, or address book data, or social networking application data with it is corresponding
Corresponding data in authentication area is matched.
With reference to the 4th kind of implementation of first aspect, the present invention is described in the 7th kind of implementation of first aspect
The step of whether image data for judging correspondence checking data is facial image, including:By default face characteristic extraction algorithm
Extract the face characteristic data in the image data of correspondence checking data.
It is of the invention in the 8th kind of implementation of first aspect with reference to the 7th kind of implementation of first aspect, if really
The image data of fixed correspondence checking data is facial image, then described that the image data is deposited with the image data of photograph album application
The step of image data in storage area is matched, including:By the face characteristic data of the extraction, the picture with photograph album application
The face characteristic data extracted in the human face data included in data storage area are matched.
It is of the invention in the 9th kind of implementation of first aspect with reference to the 8th kind of implementation of first aspect, in institute
State the face characteristic data of the extraction, with the human face data that includes in the image data memory block of photograph album application in extract
After the step of face characteristic data are matched, also include:If the face characteristic data of the extraction, the figure with photograph album application
The matching degree of the face characteristic data extracted in the human face data included in sheet data memory block exceedes predetermined threshold value, then extract institute
State the identity information of human face data.
It is described whether to judge safety applications with reference in a first aspect, the present invention is in the tenth kind of implementation of first aspect
The step of receiving checking data, including:If detecting the new data that mobile terminal is received, whether the data are verified
Sent by preset security account;If the data are from preset security account, it is determined that for the checking number that safety applications are received
According to.
It is of the invention in a kind of the tenth implementation of first aspect with reference to the tenth kind of implementation of first aspect,
It is described judge safety applications whether receive checking data the step of before, also include:By security application server client
Default power secured account numbers are set up, and uploads to security application server.
With reference in a first aspect, the present invention is in the 12nd kind of implementation of first aspect, it is described open it is described it is mobile eventually
The step of end is stolen pattern, including:The mobile terminal is locked, and/or uploads stolen information to cloud server.
It is of the invention in the 13rd kind of implementation of first aspect with reference to the 12nd kind of implementation of first aspect,
The step of locking mobile terminal, includes:The screen of the mobile terminal is locked, and/or locks the mobile terminal
Physical button, and/or lock the USB interface of the mobile terminal.
It is of the invention in the 14th kind of implementation of first aspect with reference to the 13rd kind of implementation of first aspect,
The step of USB interface of the locking mobile terminal, including:Debugging bridge rights management function is called to remove USB interface
Allow access rights.
With reference in a first aspect, the present invention is in the 15th kind of implementation of first aspect, it is described open it is described it is mobile eventually
The step of end is stolen pattern, including:The user account of current accessing system is switched into secured user's account.
It is of the invention in the 16th kind of implementation of first aspect with reference to the 15th kind of implementation of first aspect,
The step of unlatching mobile terminal is stolen pattern, including:The system that will be currently up switches to security system.
With reference in a first aspect, the present invention is in the 17th kind of implementation of first aspect, in the judgement safety applications
Before the step of whether receiving checking data, also include:Set up with security application server and be connected;Receive safety applications service
The checking data that device sends.
According to another aspect of the present invention, there is provided a kind of anti-theft modes starter, including:Judge module, for sentencing
Whether disconnected safety applications receive checking data;Matching module, if receiving checking data for the safety applications, will
The checking data are matched with mobile terminal authentication area target data;The mobile terminal authentication area includes specifying application
Data storage area;Stolen pattern opening module, if being matched with the target data in the authentication area for the checking data,
Open the stolen pattern of the mobile terminal.
It is of the invention in the first implementation of second aspect with reference to second aspect, the matching module, including:Know
Small pin for the case module, the type for recognizing the checking data;Matched sub-block, for according to the type, from respective type
Target data is read in authentication area and is matched with the checking data.
With reference to the first implementation of second aspect or second aspect, the present invention is in second realization side of second aspect
In formula, the data storage area of the specified application includes:The image data memory block of photograph album application, the data storage of social networking application
At least one of area, the note data memory block of short message application, the contacts data store area of address list application.
It is of the invention in the third implementation of second aspect with reference to second aspect, the matching module, including:Sentence
Disconnected submodule, for when the image data memory block that the mobile terminal authentication area is photograph album application, and/or the mobile terminal
When authentication area is the data storage area of social networking application, judge whether the checking data are image data;Picture match submodule,
If being image data for the checking data, by the image data memory block of the image data and photograph album application and/
Or the image data in the data storage area of social networking application is matched.
With reference to the third implementation of second aspect, the present invention is described in the 4th kind of implementation of second aspect
Matching module, also includes:Facial image judging submodule, whether the image data for judging correspondence checking data is face figure
Picture;If the image data of correspondence checking data is facial image, the picture number by the image data and photograph album application is performed
The step of being matched according to the image data in memory block.
It is of the invention in the 5th kind of implementation of second aspect with reference to second aspect, when the mobile terminal authentication area
Be the image data memory block of photograph album application, and/or the mobile terminal authentication area for social networking application data storage area when, then
The matching module, including:Judging submodule, for judging whether the checking data are image data;Quantity judges submodule
Block, if being image data for the checking data, judges the quantity of the image data;Matched sub-block, for such as
Really described image data quantity is more than one, then respectively by the image data memory block of the image data and photograph album application and/
Or the image data in the data storage area of social networking application is matched.
It is of the invention in the 6th kind of implementation of second aspect with reference to second aspect, when the mobile terminal authentication area
Be the image data memory block of photograph album application, and/or the mobile terminal authentication area for social networking application data storage area when, then
The matching module, including:Type judging submodule, the type for judging the checking data;Matched sub-block, uses respectively
If in any one that the checking data are image data and note data, or address book data, or social networking application data or
Multiple combination data, then respectively by the image data memory block, and/or the number of social networking application of the image data and photograph album application
Matched according to the image data in memory block, and by note data, or address book data, or social networking application data and corresponding mirror
Corresponding data in power area is matched.
With reference to the 4th kind of implementation of second aspect, the present invention is described in the 7th kind of implementation of second aspect
Facial image judging submodule, including:Feature extraction submodule, for being extracted to confirmed by default face characteristic extraction algorithm
Demonstrate,prove the face characteristic data in the image data of data.
It is of the invention in the 8th kind of implementation of second aspect with reference to the 7th kind of implementation of second aspect, if really
The image data of fixed correspondence checking data is facial image, then the matching module, including:Characteristic matching submodule, for inciting somebody to action
The face extracted in the human face data included in the face characteristic data of the extraction, with the image data memory block of photograph album application
Characteristic is matched.
With reference to the 8th kind of implementation of second aspect, the present invention is also wrapped in the 9th kind of implementation of second aspect
Include:Identity information extracting sub-module, if for the face characteristic data of the extraction, the image data memory block with photograph album application
In the matching degree of face characteristic data extracted in the human face data that includes exceed predetermined threshold value, then extract the human face data
Identity information.
It is of the invention in the tenth kind of implementation of second aspect with reference to second aspect, the judge module, including:Test
Card submodule, if for detecting the new data that mobile terminal is received, verifying the data whether by preset security account
Number send;Determination sub-module, if for the data from preset security account, it is determined that for the checking that safety applications are received
Data.
It is of the invention in a kind of the tenth implementation of second aspect with reference to the tenth kind of implementation of second aspect, its
It is characterised by, also includes:Preset security account sets up module, for setting up preset security by security application server client
Account, and upload to security application server.
With reference to second aspect, in the 12nd kind of implementation of second aspect, the stolen pattern opens mould to the present invention
Block, including:Locking submodule, for locking the mobile terminal, and/or uploads stolen information to cloud server.
It is of the invention in the 13rd kind of implementation of second aspect with reference to the 12nd kind of implementation of second aspect,
The locking submodule, including:Lock cell, the screen for locking the mobile terminal, and/or lock the mobile terminal
Physical button, and/or the USB interface for locking the mobile terminal.
It is of the invention in the 14th kind of implementation of second aspect with reference to the 13rd kind of implementation of second aspect,
The lock cell, including:Call subelement, for call debugging bridge rights management function remove USB interface allow access
Authority.
With reference to second aspect, in the 15th kind of implementation of second aspect, the stolen pattern opens mould to the present invention
Block, including:Handover security user account submodule, for the user account of current accessing system to be switched into secured user's account
Family.
It is of the invention in the 16th kind of implementation of second aspect with reference to the 15th kind of implementation of second aspect,
The stolen pattern opening module, including:Handover security system sub-modules, the system for that will be currently up switches to safe system
System.
With reference to second aspect, the present invention also includes in the 17th kind of implementation of second aspect:Set up connection mode
Block, is connected for being set up with security application server;Checking data reception module, for receiving security application server transmission
Checking data.
According to the third aspect of the invention we, a kind of mobile terminal, including processor and memory are also disclosed,
The memory is used to perform the program that a kind of above-mentioned anti-theft modes start method;
The processor is configurable for performing the program stored in the memory.
According to the fourth aspect of the invention, a kind of computer-readable storage medium is also disclosed, for saving as above-mentioned antitheft mould
Computer software instructions used by formula starter, it is designed by anti-theft modes starter that it is included for performing above-mentioned aspect
Program.
A kind of anti-theft modes of the invention start method and apparatus and mobile terminal, by judging whether safety applications receive
To checking data;If the safety applications receive checking data, by the checking data and mobile terminal authentication area mesh
Mark data are matched;The mobile terminal authentication area includes specifying the data storage area of application;If checking data and the institute
The target data for stating authentication area is matched, then open the stolen pattern of the mobile terminal.Solve user and lose mobile phone accidentally and lose
The damnous problem of data is lost, having for user data is effectively protected by authentication with being stolen under pattern in user mobile phone
Beneficial effect.
Described above is only the general introduction of technical solution of the present invention, in order to better understand technological means of the invention,
And can be practiced according to the content of specification, and in order to allow the above and other objects of the present invention, feature and advantage can
Become apparent, below especially exemplified by specific embodiment of the invention.
Brief description of the drawings
By reading the detailed description of hereafter preferred embodiment, various other advantages and benefit is common for this area
Technical staff will be clear understanding.Accompanying drawing is only used for showing the purpose of preferred embodiment, and is not considered as to the present invention
Limitation.And in whole accompanying drawing, identical part is denoted by the same reference numerals.In the accompanying drawings:
Fig. 1 shows the step of a kind of anti-theft modes of the invention start a kind of embodiment of method flow chart;
Fig. 2 shows the step of a kind of anti-theft modes of the invention start method another kind embodiment flow chart;
Fig. 3 shows a kind of structured flowchart of anti-theft modes starter embodiment of the invention;And,
Fig. 4 shows the block diagram of the part-structure of the mobile phone related to terminal provided in an embodiment of the present invention.
Specific embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although showing the disclosure in accompanying drawing
Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here
Limited.Conversely, there is provided these embodiments are able to be best understood from the disclosure, and can be by the scope of the present disclosure
Complete conveys to those skilled in the art.
Reference picture 1, shows the step of a kind of anti-theft modes of the invention start a kind of embodiment of method flow chart,
Specifically may include steps of:
Step 101, judge whether safety applications receive checking data.
In the embodiment of the present invention, in order to ensure mobile terminal after the loss., the security of data on mobile terminal is generally moved
Can there are a safety applications in dynamic terminal system, user can be recognized by setting security attribute in the safety applications and be worked as
Whether preceding mobile terminal is in lost state, and opened in lost state the data in current mobile terminal are protected
Pattern.For example, the personal portrait picture during user can set picture library in the safety applications is checking data, whenever user
Before entering operation interface using mobile terminal, system camera starts on backstage and catches the portrait picture of active user, with peace
The portrait picture set in full application is matched, if two pictures are matched, safety verification passes through, and user can be normal
Using current mobile terminal, wherein portrait data are a checking data.Certainly, checking data be able to can be marked for other are any
Remember the data of the mobile terminal user identity information, it is also possible to be set to the information that only active user knows oneself to verify number
According to several short message contents or message registration of such as user, the embodiment of the present invention are not any limitation as to this.
In actual applications, above-mentioned safety applications can be that mobile terminal system is carried, or third party's exploitation
Application, the embodiment of the present invention is not any limitation as to this.
If step 102, the safety applications receive checking data, by checking data and the mobile terminal authentication
Area's target data is matched;The mobile terminal authentication area includes specifying the data storage area of application.
In the embodiment of the present invention, according to the description of step 101, when the safety applications in mobile terminal are received and are set
Safety data type and attribute identical checking data, then the checking data that will just receive and the secure data for setting
Matched, shown that the mobile terminal is in stolen pattern if matching.Under normal circumstances, mobile terminal safety data are deposited
Storage in mobile terminal authentication area, authentication area can be user is set in safety applications be specifically used to storage targeted security data
A storage region, or by user specify a memory block for authentication area, authentication area in data then all for peace
Full target data, for example, be duplicated and stored in for the content of one or two short message specially to store secure data in safety applications by user
Position, and said short message is set for secure data, then the position of special storage secure data is this in safety applications
Authentication area on mobile terminal, or, it is authentication area when user specifies a photograph album, then the picture number of all storages in the photograph album
According to all be secure data;No matter any one of the setting type based on both the above authentication area, when user is in mobile terminal quilt
After robber, send with the data of data match in authentication area on the mobile terminal, system receive after checking data can and mirror
Whether secure data or target data in power area are matched, judge the mobile terminal in stolen shape according to matching result
State.
In actual applications, the setting in authentication area can be not limited only to both the above mode, the target data in authentication area
Two kinds of data described above are not limited to, the target data stored in authentication area and authentication area can be any user for unique
Checking identity, is not easy to the information known to other people, and the embodiment of the present invention is not any limitation as to this.
If step 103, the checking data are matched with the target data in the authentication area, the mobile terminal is opened
Stolen pattern.
In the embodiment of the present invention, according to the description of step 102, when the checking message that mobile terminal is received will with authentication area in
Security Target data matched, for example, authentication area be user set in advance one preservation household's portrait data photograph album, peace
Total evidence is household's portrait data of storage in the photograph album, and after mobile terminal is stolen, user sends house by other equipment
The portrait data of people on the mobile terminal, after the safety applications of mobile terminal receive multiple portrait data, by image
The method for the treatment of carries out Identification of Images, and is matched with the secure data by Identification of Images in authentication area, is matching
The mobile terminal is determined later in stolen status, and opens the stolen pattern of current mobile terminal, used on protection mobile terminal
The information at family is not compromised.
In embodiments of the present invention, by after the checking data received in the safety applications in mobile terminal, with the shifting
Target data in the authentication area pre-set in dynamic terminal is matched, and determines that the mobile terminal is in quilt if matching
Robber's state, you can start the stolen pattern of mobile terminal, solves user and loses mobile phone accidentally and lose that data are damnous asks
Topic, with the beneficial effect for effectively protecting user data by authentication under the stolen pattern of user mobile phone.
Reference picture 2, shows the step of a kind of anti-theft modes of the invention start method another kind embodiment flow
Figure, specifically may include steps of:
Step 201, judge whether safety applications receive checking data.
In the embodiment of the present invention, after user's lost mobile terminal, can be according to the mesh in the authentication area for setting in advance
Mark data, to lose mobile terminal send can with the checking data of default targeted security Data Matching, to trigger the quilt
The stolen pattern of mobile terminal is stolen, so when mobile terminal receives any data, safety applications can be according to data
The approach of transmission, or secure data label in data judges whether the data are checking data, and generally checking data are
Forwarded by the network server end of safety applications, the different number of the intention selection that can be sent according to user in forwarding
According to label, data label is verified when being carried in the data that safety applications are received, it is determined that the data are checking data.For example,
After user's lost mobile terminal, after another equipment logs in safety applications using the username and password of oneself, in selection
Stolen the mode option is opened, safety applications can point out user input authentication information, such as ID card No. etc., reresent use
Family uploads checking information, after user uploads the data with default targeted security information same type and attribute, the shifting of loss
The secure data installed in dynamic terminal receives the checking data of upload by Network Synchronization, wherein checking data are with checking number
According to label.
In actual applications, when mobile phone does not also start stolen pattern in stolen status, shifting is used in active user
During dynamic terminal, last time is input into not in the case of in screen-lock password, camera seizure can also be opened by backstage and use movement
Used as checking data, so safety applications can be activated in several cases, user can also be arranged on user's head portrait of terminal
When position computer connects the mobile phone and is downloaded data, it is desirable to user input password, in the case of Password Input is incorrect, peace
Full application starts checking data acquisition, and checking data are obtained by number of ways, and checking data can be location datas, use
Family portrait data, voice data etc., the embodiment of the present invention is not any limitation as to this.
If step 202, the safety applications receive checking data, the type of the checking data is recognized.
In the embodiment of the present invention, according to the description of step 201, when safety applications are by verifying data label, or in peace
After determining checking data under full application open-authentication data acquisition, the type of the checking data is further recognized, in reality
In the application of border, the form of data can be verified to learn by reading the file header of checking data, generally, be deposited in data
When storage, file header is all the sequence code for identifying file format, can be learnt after file format is obtained according to sequence code and tested
The type of data is demonstrate,proved, is picture, audio, short message, address book contact etc..
Step 203, according to the type, from the authentication area of respective type read target data and with the checking data
Matched.The data storage area of the specified application includes:The image data memory block of photograph album application, the data of social networking application
At least one of memory block, the note data memory block of short message application, the contacts data store area of address list application.
In the embodiment of the present invention, when the form for learning checking information so that learn checking information type after, will can verify
Data are matched with the data of the same type in authentication area.For example if checking data are picture, just by the checking picture number
Matched according to the pictorial information in authentication area, if note data or other data then can be with the mesh of same type
Mark data are matched.Certainly, in actual applications, the checking information of reception is not unique or single, and safety applications can
To require that user provides various checking letters such as multiple checking informations, pictorial information, short message, the data storage in social networking application
Breath, can be matched one by one upon receipt, and the checking information of each type can provide multinomial, accurate to improve checking
True rate.
In practical application, the target data being arranged in authentication area is all that, by pretreatment, different types of data are led to
Cross different technological means and extract its characteristic information, such as image data can extract its portrait feature, convenient and checking information
Matched, the method for the feature for extracting the target data in authentication area, and checking information and target data are carried out
The method matched somebody with somebody, the embodiment of the present invention is not any limitation as to this.
Step 204, when the mobile terminal authentication area be the image data memory block of photograph album application, and/or the movement
When terminal authentication area is the data storage area of social networking application, judge whether the checking data are image data.
In the embodiment of the present invention, when user sets authentication area, can by setting an image albums, or one it is social should
Memory block is authentication area, can be used alone one or simultaneously using multiple images memory block to authenticate area, the present invention
Embodiment is not any limitation as to this.So, when the target data stored in authenticating area is view data, can first determine whether to receive
To checking data whether be image data, the method according to file header is read, or in safety applications open-authentication data acquisition
After pattern, camera is opened on direct backstage, catches face figure, iris image of active user etc. as checking data.
Whether step 205, the image data for judging to correspond to checking data are facial image;If the picture of correspondence checking data
Data are facial image, then perform step 206.
In the embodiment of the present invention, after having judged checking data as image data, further image can be done to the picture
The treatment of feature extraction, after feature extraction is carried out to the pictorial information using multiple images feature extraction algorithm, if extracted
Feature be face characteristic, it is determined that the image be facial image, then continue executing with step 206.
In actual applications, judge whether a view data is that the method for facial image has a lot, be not limited only to above-mentioned retouching
State, the embodiment of the present invention is not any limitation as to this.
If step 206, the checking data are image datas, by the image data and the picture number of photograph album application
Matched according to the image data in the data storage area of memory block, and/or social networking application.
In the embodiment of the present invention, when it is determined that an image is image data or pseudo- face image data, then further root
The image is matched with the image of same alike result in authentication area according to the type of the image, if the image is facial image,
Characteristic in the feature that can be so extracted according to face feature extraction method, with authentication area in facial image is carried out one by one
Matching.
In actual applications, when it is determined that the checking data for receiving are view data, and it is not face image data
When, can be by the data storage area of the image data memory block, and/or social networking application of the feature of this image and photograph album application
The characteristics of image of non-face view data is matched one by one in image data, when characteristics of image is extracted the method that uses with
Image characteristic extracting method is consistent in authentication area, to ensure the accuracy of matching result, wherein, image characteristic extracting method or
Model and algorithm, are defined by the purpose for reaching feature extraction, and the embodiment of the present invention is not any limitation as to this.
If step 207, the checking data are matched with the target data in the authentication area, lock described mobile whole
End, and/or upload stolen information to cloud server.Specifically include, sub-step 2071.
In the embodiment of the present invention, when default target in the checking data that mobile terminal safety application is received with authentication area
After secure data is matched, it is determined that current mobile terminal is in stolen status, and starts the stolen pattern of mobile terminal, when
Mobile terminal will be locked after stolen pattern is opened, and screen can not be unlocked, and current movement is sent under networking state eventually
The warning message at end to safety applications cloud server, in warning message comprising current mobile terminal location information, when with
Family is after high in the clouds receives the warning message of above-mentioned mobile terminal, if user learns that current mobile terminal is not stolen shape
State, then can then release stolen status, stolen status are removed by the formal solution for inputing password or identifying code, certainly, if
Above-mentioned mobile terminal is in stolen status really, then location information that then can be in warning message obtains mobile terminal
Position, gives mobile terminal for change, and in the process, mobile terminal is in the lock-out state under stolen pattern.
Sub-step 2071, the screen for locking the mobile terminal, and/or the physical button of the mobile terminal is locked, and/
Or lock the USB interface of the mobile terminal.Specifically include, sub-step 20711.
In the embodiment of the present invention, when mobile terminal is in stolen status, lock-out state can be entered, under lock-out state, moved
The physical button that the screen of dynamic terminal can enter on screen lock state, and mobile terminal can also be in failure state, likewise,
The USB interface of mobile terminal connection other equipment can also be in failure state in lock-out state, in actual applications, when mobile whole
End starts stolen pattern, and the safety applications on mobile terminal can intercept all message for calling each process interface of mobile terminal,
User can send the message for calling each the corresponding interface when mobile terminal touch screen is clicked on by mobile terminal processor, so
Can be by the service processes of monitoring system ccf layer transmission interface message call in safety applications, when mobile terminal is in stolen mould
When calling each functional interface under formula, safety applications will be intercepted above-mentioned message, you can realize the locking shape of mobile terminal
State.
Certainly, in actual applications, the method for locking mobile terminal is not limited to the method referred in above description, the present invention
Embodiment is not any limitation as to this.
Sub-step 20711, the permission access rights for calling debugging bridge rights management function removal USB interface.
In the embodiment of the present invention, when it is determined that mobile terminal is in stolen status, safety applications then can be by calling
Examination bridge rights management function changes the permission access rights of USB interface, and so, the mobile terminal in stolen pattern just cannot
Other equipment is connected to by USB interface to carry out data transmission.
Preferably, in an alternative embodiment of the invention, after step 207, can also include:Step 207- steps 209.
If step 208, the checking data are matched with the target data in the authentication area, by current accessing system
User account switches to secured user's account.
In the embodiment of the present invention, when default target in the checking data that mobile terminal safety application is received with authentication area
After secure data is matched, it is determined that current mobile terminal is in stolen status, and starts the stolen pattern of mobile terminal, this
When allowing active user to enter mobile terminal operation interface, logged in the state of secured account, under secured account logging status,
The data of the mobile terminal script do not allow to read.
In actual applications, above-mentioned functions can now can by realizing multi-user login in setting option in mobile terminal
For multi-user delimit special memory space, and realized to various types of login users by the program for realize this function
Priority assignation, Guest User log in the state of, connection other equipment when, the data of primary user are also same on the mobile terminal
Sample can not be read.
If step 209, the checking data are matched with the target data in the authentication area, the system that will be currently up
Switch to security system.
In the embodiment of the present invention, when default target in the checking data that mobile terminal safety application is received with authentication area
After secure data is matched, it is determined that current mobile terminal is in stolen status, and starts the stolen pattern of mobile terminal, this
When allow active user enter mobile terminal operation interface when, into a security system, the security system can be current movement
The subsystem set in terminal.
In actual applications, the realization of mobile terminal subsystem can be realized in safety system by way of shared justice class
Under system pattern, the basic function of mobile terminal is accomplished, and goes monitoring according to security service is added on system framework layer
Operation of other services under stolen pattern, to realize the control to every authority in security system, and under security system
Function can set corresponding authority according to corresponding current system, and for example the All Files of main system is not permitted under security system
Perhaps it is accessed, the file storage that security system is used is individually distribution, and under normal circumstances, under installation system pattern
The sim cards of the mobile terminal will be locked, i.e., communication module and interface function under mobile terminal can all be shielded.Certainly,
Mobile terminal realizes that function that is security system and being realized in security system is not limited only to above-mentioned retouching under stolen pattern
State, the embodiment of the present invention is not any limitation as to this.
For embodiment of the method, in order to be briefly described, therefore it is all expressed as a series of combination of actions, but this area
Technical staff should know that the embodiment of the present invention is not limited by described sequence of movement, because implementing according to the present invention
Example, some steps can sequentially or simultaneously be carried out using other.Secondly, those skilled in the art should also know, specification
Described in embodiment belong to preferred embodiment, necessary to the involved action not necessarily embodiment of the present invention.
In embodiments of the present invention, by after the checking data received in the safety applications in mobile terminal, with the shifting
Target data in the authentication area pre-set in dynamic terminal is matched, and determines that the mobile terminal is in quilt if matching
Robber's state, you can start the stolen pattern of mobile terminal, locking stolen mobile terminal, or entering security system, protection is used
The data at family are not compromised, solve user and lose the mobile phone loss damnous problem of data accidentally.
Reference picture 3, shows a kind of structured flowchart of anti-theft modes starter embodiment of the invention, specifically may be used
With including such as lower module:
Judge module 301, for judging whether safety applications receive checking data;
Matching module 302, if receiving checking data for the safety applications, by checking data and the movement
Terminal authentication area target data is matched;The mobile terminal authentication area includes specifying the data storage area of application;Specific bag
Include:Identification submodule 3021, the type for recognizing the checking data;
Matched sub-block 3022, for according to the type, read from the authentication area of respective type target data and with
The checking data are matched.The data storage area of the specified application includes:The image data memory block of photograph album application, society
In data storage area, the note data memory block of short message application, the contacts data store area of address list application of friendship application
At least one.
Judging submodule 3023, for when the mobile terminal authentication area for photograph album application image data memory block, and/
Or the mobile terminal authentication area for social networking application data storage area when, judge it is described verify data whether be image data;
Facial image judging submodule 3024, whether the image data for judging correspondence checking data is facial image;
If the image data of correspondence checking data is facial image, performs and the image data is deposited with the image data of photograph album application
The step of image data in storage area is matched.
Picture match submodule 3025, if for it is described checking data be image data, by the image data with
Image data in the image data memory block of photograph album application, and/or the data storage area of social networking application is matched.
Stolen pattern opening module 303, if being matched with the target data in the authentication area for the checking data,
Open the stolen pattern of the mobile terminal.Specifically include:Locking submodule 3031, for locking the mobile terminal, and/or on
Pass stolen information to cloud server.Specifically include:Lock cell, the screen for locking the mobile terminal, and/or locking
The physical button of the mobile terminal, and/or lock the USB interface of the mobile terminal.Specifically include:Subelement is called, is used
In the permission access rights for calling debugging bridge rights management function to remove USB interface.Handover security user account submodule 3032,
For the user account of current accessing system to be switched into secured user's account.Handover security system sub-modules 3033, for inciting somebody to action
The system being currently up switches to security system.
In embodiments of the present invention, by after the checking data received in the safety applications in mobile terminal, with the shifting
Target data in the authentication area pre-set in dynamic terminal is matched, and determines that the mobile terminal is in quilt if matching
Robber's state, you can start the stolen pattern of mobile terminal, locking stolen mobile terminal, or entering security system, protection is used
The data at family are not compromised, solve user and lose the mobile phone loss damnous problem of data accidentally.
For device embodiment, because it is substantially similar to embodiment of the method, so description is fairly simple, it is related
Part is illustrated referring to the part of embodiment of the method.
The embodiment of the present invention additionally provides a kind of mobile terminal, as shown in figure 4, for convenience of description, illustrate only and this
The related part of inventive embodiments, particular technique details is not disclosed, and refer to present invention method part.The terminal can
Think including mobile phone, panel computer, PDA (Personal Digital Assistant, personal digital assistant), POS (Point
Of Sales, point-of-sale terminal), any terminal device such as vehicle-mounted computer, so that terminal is as mobile phone as an example:
Fig. 4 is illustrated that the block diagram of the part-structure of the mobile phone related to terminal provided in an embodiment of the present invention.With reference to figure
4, mobile phone includes:Radio frequency (Radio Frequency, RF) circuit 410, memory 420, input block 430, display unit 440,
Sensor 450, voicefrequency circuit 460, Wireless Fidelity (wireless fidelity, WiFi) module 470, processor 480 and
The grade part of power supply 490.It will be understood by those skilled in the art that the handset structure shown in Fig. 4 does not constitute the restriction to mobile phone,
Part more more or less than diagram can be included, or combine some parts, or different part arrangements.
Each component parts of mobile phone is specifically introduced with reference to Fig. 4:
RF circuits 410 can be used to receiving and sending messages or communication process in, the reception and transmission of signal, especially, by base station
After downlink information is received, processed to processor 480;In addition, up data is activation will be designed to base station.Generally, RF circuits 410
Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise
Amplifier, LNA), duplexer etc..Additionally, RF circuits 410 can also be communicated by radio communication with network and other equipment.
Above-mentioned radio communication can use any communication standard or agreement, including but not limited to global system for mobile communications (Global
System of Mobile communication, GSM), general packet radio service (General Packet Radio
Service, GPRS), CDMA (Code Division Multiple Access, CDMA), WCDMA
(Wideband Code Division Multiple Access, WCDMA), Long Term Evolution (Long Term Evolution,
LTE), Email, Short Message Service (Short Messaging Service, SMS) etc..
Memory 420 can be used to store software program and module, and processor 480 is by running storage in memory 420
Software program and module, so as to perform various function application and the data processing of mobile phone.Memory 420 can mainly include
Storing program area and storage data field, wherein, the application journey that storing program area can be needed for storage program area, at least one function
Sequence (such as sound-playing function, image player function etc.) etc.;Storage data field can be stored and use what is created according to mobile phone
Data (such as voice data, phone directory etc.) etc..Additionally, memory 420 can include high-speed random access memory, can be with
Including nonvolatile memory, for example, at least one disk memory, flush memory device or other volatile solid-states
Part.
Input block 430 can be used to receive the numeral or character information of input, and produce with the user of mobile phone set with
And the relevant key signals input of function control.Specifically, input block 430 may include that contact panel 431 and other inputs set
Standby 432.Contact panel 431, also referred to as touch-screen, user can be collected thereon or neighbouring touch operation (such as user uses
The operation of any suitable object such as finger, stylus or annex on contact panel 431 or near contact panel 431), and root
Corresponding attachment means are driven according to formula set in advance.Optionally, contact panel 431 may include touch detecting apparatus and touch
Two parts of controller.Wherein, touch detecting apparatus detect the touch orientation of user, and detect the signal that touch operation brings,
Transmit a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into touching
Point coordinates, then give processor 480, and the order sent of receiving processor 480 and can be performed.Furthermore, it is possible to using electricity
The polytypes such as resistive, condenser type, infrared ray and surface acoustic wave realize contact panel 431.Except contact panel 431, input
Unit 430 can also include other input equipments 432.Specifically, other input equipments 432 can include but is not limited to secondary or physical bond
One or more in disk, function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc..
Display unit 440 can be used for show by user input information or be supplied to user information and mobile phone it is various
Menu.Display unit 440 may include display panel 441, optionally, can use liquid crystal display (Liquid Crystal
Display, LCD), the form such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) it is aobvious to configure
Show panel 441.Further, contact panel 431 can cover display panel 441, when contact panel 431 detect it is thereon or attached
After near touch operation, processor 480 is sent to determine the type of touch event, with preprocessor 480 according to touch event
Type corresponding visual output is provided on display panel 441.Although in fig. 4, contact panel 431 and display panel 441
It is input and the input function that mobile phone is realized as two independent parts, but in some embodiments it is possible to by touch-control
Panel 431 and display panel 441 be integrated and input that realize mobile phone and output function.
Mobile phone may also include at least one sensor 450, such as optical sensor, motion sensor and other sensors.
Specifically, optical sensor may include ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to ambient light
Light and shade adjust the brightness of display panel 441, proximity transducer can close display panel 441 when mobile phone is moved in one's ear
And/or backlight.As one kind of motion sensor, (generally three axles) acceleration in the detectable all directions of accelerometer sensor
Size, size and the direction of gravity are can detect that when static, can be used for recognize mobile phone attitude application (such as horizontal/vertical screen is cut
Change, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;May be used also as mobile phone
The other sensors such as gyroscope, barometer, hygrometer, thermometer, the infrared ray sensor of configuration, will not be repeated here.
Voicefrequency circuit 460, loudspeaker 461, microphone 462 can provide the COBBAIF between user and mobile phone.Audio-frequency electric
Electric signal after the voice data conversion that road 460 will can receive, is transferred to loudspeaker 461, and sound is converted to by loudspeaker 461
Signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 462, is turned after being received by voicefrequency circuit 460
It is changed to voice data, then after voice data output processor 480 is processed, through RF circuits 410 to be sent to such as another mobile phone,
Or export to memory 420 so as to further treatment voice data.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronicses postal by WiFi module 470
Part, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and has accessed.Although Fig. 4 shows
WiFi module 470, but it is understood that, it is simultaneously not belonging to must be configured into for mobile phone, can not change as needed completely
Become in the essential scope of invention and omit.
Processor 480 is the control centre of mobile phone, using various interfaces and the various pieces of connection whole mobile phone, is led to
Cross operation or perform software program of the storage in memory 420 and/or module, and call storage in memory 420
Data, perform the various functions and processing data of mobile phone, so as to carry out integral monitoring to mobile phone.Optionally, processor 480 can be wrapped
Include one or more processing units;Preferably, processor 480 can integrated application processor and modem processor, wherein, should
Operating system, user interface and application program etc. are mainly processed with processor, modem processor mainly processes radio communication.
It is understood that above-mentioned modem processor can not also be integrated into processor 480.
Mobile phone also includes the power supply 490 (such as battery) powered to all parts, it is preferred that power supply can be by power supply pipe
Reason system is logically contiguous with processor 480, so as to realize management charging, electric discharge and power managed by power-supply management system
Etc. function.
Although not shown, mobile phone can also will not be repeated here including camera, bluetooth module etc..
In embodiments of the present invention, the processor 480 included by the terminal also has following functions:
Judge whether safety applications receive checking data;
If the safety applications receive checking data, by the checking data and mobile terminal authentication area number of targets
According to being matched;The mobile terminal authentication area includes specifying the data storage area of application;
If the checking data are matched with the target data in the authentication area, the stolen mould of the mobile terminal is opened
Formula.
It is apparent to those skilled in the art that, for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit, may be referred to the corresponding process in preceding method embodiment, will not be repeated here.
In several embodiments provided by the present invention, it should be understood that disclosed system, apparatus and method can be with
Realize by another way.For example, device embodiment described above is only schematical, for example, the unit
Divide, only a kind of division of logic function there can be other dividing mode when actually realizing, for example multiple units or component
Can combine or be desirably integrated into another system, or some features can be ignored, or do not perform.It is another, it is shown or
The coupling each other for discussing or direct-coupling or communication connection can be the indirect couplings of device or unit by some interfaces
Close or communicate to connect, can be electrical, mechanical or other forms.
The unit that is illustrated as separating component can be or may not be it is physically separate, it is aobvious as unit
The part for showing can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple
On NE.Some or all of unit therein can be according to the actual needs selected to realize the mesh of this embodiment scheme
's.
In addition, during each functional unit in each embodiment of the invention can be integrated in a processing unit, it is also possible to
It is that unit is individually physically present, it is also possible to which two or more units are integrated in a unit.Above-mentioned integrated list
Unit can both be realized in the form of hardware, it would however also be possible to employ the form of SFU software functional unit is realized.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is can
Completed with instructing the hardware of correlation by program, the program can be stored in a computer-readable recording medium, storage
Medium can include:Read-only storage (ROM, Read Only Memory), random access memory (RAM, Random
Access Memory), disk or CD etc..
One of ordinary skill in the art will appreciate that all or part of step in realizing above-described embodiment method can be
The hardware of correlation is instructed to complete by program, described program can be stored in a kind of computer-readable recording medium, on
It can be read-only storage, disk or CD etc. to state the storage medium mentioned.
Starting method and apparatus and mobile terminal to a kind of anti-theft modes provided by the present invention above has carried out detailed Jie
Continue, for those of ordinary skill in the art, according to the thought of the embodiment of the present invention, in specific embodiments and applications
Will change, in sum, this specification content should not be construed as limiting the invention.
Start method the invention discloses A1, a kind of anti-theft modes, including:
Judge whether safety applications receive checking data;
If the safety applications receive checking data, by the checking data and mobile terminal authentication area number of targets
According to being matched;The mobile terminal authentication area includes specifying the data storage area of application;
If the checking data are matched with the target data in the authentication area, the stolen mould of the mobile terminal is opened
Formula.
A2, the method according to A1, it is described to carry out checking data and the mobile terminal authentication area target data
With the step of, including:
The type of the identification checking data;
According to the type, target data is read from the authentication area of respective type and is carried out with the checking data
Match somebody with somebody.
A3, the method according to A1 or A2, the data storage area of the specified application include:The picture number of photograph album application
According to memory block, the data storage area of social networking application, the note data memory block of short message application, address list application contact data
At least one of memory block.
A4, the method according to A1, when the mobile terminal authentication area is the image data memory block of photograph album application,
And/or the mobile terminal authentication area for social networking application data storage area when, then checking data and the mobile terminal are reflected
The step of power area's target data is matched, including:
Judge whether the checking data are image data;
If the checking data are image datas, the image data and the image data of photograph album application are stored
Image data in the data storage area of area, and/or social networking application is matched.
A5, the method according to A4, the picture in the image data memory block of the image data and photograph album application
Before the step of data are matched, also include:
Whether the image data for judging correspondence checking data is facial image;If the image data of correspondence checking data is behaved
Face image, then perform the step that the image data in the image data memory block by the image data with photograph album application is matched
Suddenly.
A6, the method according to A1, when the mobile terminal authentication area is the image data memory block of photograph album application,
And/or the mobile terminal authentication area for social networking application data storage area when, then checking data and the mobile terminal are reflected
The step of power area's target data is matched, including:
Judge whether the checking data are image data;
If the checking data are image datas, the quantity of the image data is judged;
If the image data quantity is more than one, respectively by the image data and the image data of photograph album application
Image data in the data storage area of memory block, and/or social networking application is matched.
A7, the method according to A1, when the mobile terminal authentication area is the image data memory block of photograph album application,
And/or the mobile terminal authentication area for social networking application data storage area when, then checking data and the mobile terminal are reflected
The step of power area's target data is matched, including:
Judge the type of the checking data;
If the checking data are appointing for image data and note data, or address book data, or social networking application data
One or more data splitting, then respectively should by the image data memory block, and/or social activity of the image data and photograph album application
With data storage area in image data matched, and by note data, or address book data, or social networking application data with
Corresponding data in correspondence authentication area is matched.
A8, the method according to A5, it is described judge correspondence checking data image data whether be facial image step
Suddenly, including:
The face characteristic data in the image data of correspondence checking data are extracted by presetting face characteristic extraction algorithm.
A9, the method according to A8, however, it is determined that the image data of correspondence checking data is facial image, then described by institute
The step of stating image data and matched with the image data in the image data memory block of photograph album application, including:
In the human face data that will be included in the face characteristic data of the extraction, with the image data memory block of photograph album application
The face characteristic data of extraction are matched.
A10, the method according to A9, in the face characteristic data by the extraction, the picture with photograph album application
After the step of face characteristic data extracted in the human face data included in data storage area are matched, also include:
If in the human face data included in the face characteristic data of the extraction, with the image data memory block of photograph album application
The matching degree of the face characteristic data of extraction exceedes predetermined threshold value, then extract the identity information of the human face data.
A11, the method according to A1, it is described to judge whether safety applications receive the step of verifying data, including:
If detecting the new data that mobile terminal is received, verify whether the data are sent out by preset security account
Send;
If the data are from preset security account, it is determined that for the checking data that safety applications are received.
A12, the method according to A11, it is described judge safety applications whether receive checking data the step of before,
Also include:
Default power secured account numbers are set up by security application server client, and uploads to security application server.
The step of A13, the method according to A1, the unlatching mobile terminal stolen pattern, including:
The mobile terminal is locked, and/or uploads stolen information to cloud server.
The step of A14, the method according to A13, locking mobile terminal, includes:
The screen of the mobile terminal is locked, and/or locks the physical button of the mobile terminal, and/or locked described
The USB interface of mobile terminal.
The step of A15, the method according to A14, USB interface of the locking mobile terminal, including:
Debugging bridge rights management function is called to remove the permission access rights of USB interface.
The step of A16, the method according to A1, the unlatching mobile terminal stolen pattern, including:
The user account of current accessing system is switched into secured user's account.
The step of A17, the method according to A16, the unlatching mobile terminal stolen pattern, including:
The system that will be currently up switches to security system.
A18, the method according to A1, it is described judge safety applications whether receive checking data the step of before,
Also include:Set up with security application server and be connected;
Receive the checking data that security application server sends.
B19, a kind of anti-theft modes starter, including:
Judge module, for judging whether safety applications receive checking data;
Matching module, it is if receiving checking data for the safety applications, the checking data are whole with mobile
End authentication area's target data is matched;The mobile terminal authentication area includes specifying the data storage area of application;
Stolen pattern opening module, if being matched with the target data in the authentication area for the checking data, opens
Open the stolen pattern of the mobile terminal.
B20, the device according to B19, the matching module, including:
Identification submodule, the type for recognizing the checking data;
Matched sub-block, for according to the type, read from the authentication area of respective type target data and with it is described
Checking data are matched.
B21, the device according to B19 or B20, the data storage area of the specified application include:The figure of photograph album application
Sheet data memory block, the data storage area of social networking application, the note data memory block of short message application, the contact person of address list application
At least one of data storage area.
B22, the device according to B19, the matching module, including:
Judging submodule, for when the image data memory block that the mobile terminal authentication area is photograph album application, and/or institute
When stating the data storage area that mobile terminal authentication area is social networking application, judge whether the checking data are image data;
Picture match submodule, if being image data for the checking data, by the image data and photograph album
Image data in the image data memory block of application, and/or the data storage area of social networking application is matched.
B23, the device according to B22, the matching module also include:
Facial image judging submodule, whether the image data for judging correspondence checking data is facial image;If right
The image data of data should be verified for facial image, then perform the image data memory block by the image data and photograph album application
In image data the step of matched.
B24, the device according to A19, when the mobile terminal authentication area is the image data memory block of photograph album application,
And/or the mobile terminal authentication area for social networking application data storage area when, then the matching module, including:
Judging submodule, for judging whether the checking data are image data;
Quantity judging submodule, if being image data for the checking data, judges the number of the image data
Amount;
Matched sub-block, if being more than one for the image data quantity, respectively by the image data and phase
Image data in the image data memory block of volume application, and/or the data storage area of social networking application is matched.
B25, the device according to A19, when the mobile terminal authentication area is the image data memory block of photograph album application,
And/or the mobile terminal authentication area for social networking application data storage area when, then the matching module, including:
Type judging submodule, the type for judging the checking data;
Difference matched sub-block, if data are verified for image data and note data for described, or address book data,
Or any one or more data splitting of social networking application data, then respectively by the image data and the image data of photograph album application
Image data in the data storage area of memory block, and/or social networking application is matched, and by note data, or address list number
According to, or social networking application data with it is corresponding authentication area in corresponding data matched.
B26, the device according to A23, the facial image judging submodule, including:
Feature extraction submodule, the image data for extracting correspondence checking data by presetting face characteristic extraction algorithm
In face characteristic data.
B27, the device according to A26, however, it is determined that the image data of correspondence checking data is facial image, then described
With module, including:
Characteristic matching submodule, for by the face characteristic data of the extraction, the image data with photograph album application to be stored
The face characteristic data extracted in the human face data included in area are matched.
B28, the device according to A27, also include:
Identity information extracting sub-module, if for the face characteristic data of the extraction, the image data with photograph album application
The matching degree of the face characteristic data extracted in the human face data included in memory block exceedes predetermined threshold value, then extract the face
The identity information of data.
B29, the device according to A19, the judge module, including:
Checking submodule, if for detecting the new data that mobile terminal is received, verify the data whether by
Preset security account sends;
Determination sub-module, if for the data from preset security account, it is determined that be testing that safety applications are received
Card data.
B30, the device according to A29, also include:
Preset security account sets up module, for setting up preset security account by security application server client, and
Upload to security application server.
B31, the device according to B19, the stolen pattern opening module, including:
Locking submodule, for locking the mobile terminal, and/or uploads stolen information to cloud server.
B32, the device according to B31, the locking submodule, including:
Lock cell, the screen for locking the mobile terminal, and/or the physical button of the mobile terminal is locked,
And/or lock the USB interface of the mobile terminal.
B33, the device according to B32, the lock cell, including:
Subelement is called, for calling debugging bridge rights management function to remove the permission access rights of USB interface.
B34, the device according to B19, the stolen pattern opening module, including:
Handover security user account submodule, for the user account of current accessing system to be switched into secured user's account
Family.
B35, the device according to B34, the stolen pattern opening module, including:
Handover security system sub-modules, the system for that will be currently up switches to security system.
B36, the device according to B19, also include:
Link block is set up, is connected for being set up with security application server;
Checking data reception module, the checking data for receiving security application server transmission.
The invention also discloses C37, a kind of mobile terminal, including processor and memory,
The memory is used to store the program that the anti-theft modes performed described in A1 to A18 start method;
The processor is configurable for performing the program stored in the memory.
Claims (10)
1. a kind of anti-theft modes start method, it is characterised in that including:
Judge whether safety applications receive checking data;
If the safety applications receive checking data, the checking data are entered with mobile terminal authentication area target data
Row matching;The mobile terminal authentication area includes specifying the data storage area of application;
If the checking data are matched with the target data in the authentication area, the stolen pattern of the mobile terminal is opened.
2. method according to claim 1, it is characterised in that described by the checking data and mobile terminal authentication area mesh
The step of mark data are matched, including:
The type of the identification checking data;
According to the type, target data is read from the authentication area of respective type and is matched with the checking data.
3. method according to claim 1 and 2, it is characterised in that the data storage area of the specified application includes:Photograph album
The image data memory block of application, the data storage area of social networking application, the note data memory block of short message application, address list application
At least one of contacts data store area.
4. method according to claim 1, it is characterised in that when the mobile terminal authentication area is the picture of photograph album application
Data storage area, and/or the mobile terminal authentication area for social networking application data storage area when, then by it is described checking data with
The step of mobile terminal authentication area target data is matched, including:
Judge whether the checking data are image data;
If the checking data are image datas, by the image data memory block of the image data and photograph album application and/
Or the image data in the data storage area of social networking application is matched.
5. method according to claim 4, it is characterised in that deposited with the image data of photograph album application in the image data
Before the step of image data in storage area is matched, also include:
Whether the image data for judging correspondence checking data is facial image;If the image data of correspondence checking data is face figure
Picture, then the step of performing the image data in the image data memory block by the image data with photograph album application and matched.
6. method according to claim 1, it is characterised in that when the mobile terminal authentication area is the picture of photograph album application
Data storage area, and/or the mobile terminal authentication area for social networking application data storage area when, then by it is described checking data with
The step of mobile terminal authentication area target data is matched, including:
Judge whether the checking data are image data;
If the checking data are image datas, the quantity of the image data is judged;
If the image data quantity is more than one, the image data and the image data of photograph album application are stored respectively
Image data in the data storage area of area, and/or social networking application is matched.
7. method according to claim 1, it is characterised in that when the mobile terminal authentication area is the picture of photograph album application
Data storage area, and/or the mobile terminal authentication area for social networking application data storage area when, then by it is described checking data with
The step of mobile terminal authentication area target data is matched, including:
Judge the type of the checking data;
If the checking data are any one of image data and note data, or address book data, or social networking application data
Or multiple combination data, then respectively by the image data memory block, and/or social networking application of the image data and photograph album application
Image data in data storage area is matched, and by note data, or address book data, or social networking application data with it is corresponding
Corresponding data in authentication area is matched.
8. method according to claim 5, it is characterised in that the image data for judging correspondence checking data whether be
The step of facial image, including:
The face characteristic data in the image data of correspondence checking data are extracted by presetting face characteristic extraction algorithm.
9. a kind of anti-theft modes starter, it is characterised in that including:
Judge module, for judging whether safety applications receive checking data;
Matching module, if receiving checking data for the safety applications, the checking data and mobile terminal is reflected
Power area's target data is matched;The mobile terminal authentication area includes specifying the data storage area of application;
Stolen pattern opening module, if being matched with the target data in the authentication area for the checking data, opens institute
State the stolen pattern of mobile terminal.
10. a kind of mobile terminal, it is characterised in that including processor and memory,
A kind of anti-theft modes that the memory is used to store described in perform claim requirement 1 to claim 8 start method
Program;
The processor is configurable for performing the program stored in the memory.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710213935.1A CN106921781A (en) | 2017-04-01 | 2017-04-01 | A kind of anti-theft modes start method and apparatus and mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710213935.1A CN106921781A (en) | 2017-04-01 | 2017-04-01 | A kind of anti-theft modes start method and apparatus and mobile terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106921781A true CN106921781A (en) | 2017-07-04 |
Family
ID=59568691
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710213935.1A Pending CN106921781A (en) | 2017-04-01 | 2017-04-01 | A kind of anti-theft modes start method and apparatus and mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106921781A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108650394A (en) * | 2018-04-27 | 2018-10-12 | 努比亚技术有限公司 | Terminal security control method, mobile terminal and computer readable storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102096546A (en) * | 2010-12-29 | 2011-06-15 | 华为终端有限公司 | Unlocking method and device of operating system |
CN103457991A (en) * | 2013-05-29 | 2013-12-18 | 北京奇虎科技有限公司 | Terminal safety protection method and system |
CN103702299A (en) * | 2013-12-13 | 2014-04-02 | 北京奇虎科技有限公司 | Mobile terminal antitheft method and client |
CN103702331A (en) * | 2013-12-13 | 2014-04-02 | 北京奇虎科技有限公司 | Mobile terminal antitheft method and client |
CN105335639A (en) * | 2014-08-15 | 2016-02-17 | 中兴通讯股份有限公司 | Method and apparatus for realizing function lock in electronic device |
-
2017
- 2017-04-01 CN CN201710213935.1A patent/CN106921781A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102096546A (en) * | 2010-12-29 | 2011-06-15 | 华为终端有限公司 | Unlocking method and device of operating system |
CN103457991A (en) * | 2013-05-29 | 2013-12-18 | 北京奇虎科技有限公司 | Terminal safety protection method and system |
CN103702299A (en) * | 2013-12-13 | 2014-04-02 | 北京奇虎科技有限公司 | Mobile terminal antitheft method and client |
CN103702331A (en) * | 2013-12-13 | 2014-04-02 | 北京奇虎科技有限公司 | Mobile terminal antitheft method and client |
CN105335639A (en) * | 2014-08-15 | 2016-02-17 | 中兴通讯股份有限公司 | Method and apparatus for realizing function lock in electronic device |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108650394A (en) * | 2018-04-27 | 2018-10-12 | 努比亚技术有限公司 | Terminal security control method, mobile terminal and computer readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104901805B (en) | A kind of identification authentication methods, devices and systems | |
CN104967593B (en) | A kind of auth method, device and system | |
CN107493378B (en) | Method and device for logging in application program, computer equipment and readable storage medium | |
US9940448B2 (en) | Unlock processing method and device | |
CN106921799A (en) | A kind of mobile terminal safety means of defence and mobile terminal | |
CN107437009A (en) | Authority control method and related product | |
CN108536783A (en) | Data processing method and device, terminal, computer readable storage medium | |
CN106375478B (en) | A kind of synchronous method of mobile terminal data, apparatus and system | |
CN106327193B (en) | A kind of system unlocking method and equipment | |
CN106778175A (en) | A kind of interface locking means, device and terminal device | |
CN106920307A (en) | Gate inhibition's open method, device and mobile terminal | |
CN107451450B (en) | Biometric identification method and related product | |
CN106255102B (en) | Terminal equipment identification method and related equipment | |
CN109558718A (en) | Application program login method, computer end, mobile terminal, system and storage medium | |
CN107742067A (en) | A kind of auth method, device and system | |
CN106506820A (en) | A kind of backup method of mobile terminal data and device | |
CN109257336A (en) | It is a kind of based on the encrypted message processing method of block chain, terminal device | |
CN108881103A (en) | A kind of method and device accessing network | |
CN109743696A (en) | Identifying code encryption method, system and readable storage medium storing program for executing | |
CN109033779A (en) | A kind of unlock authentication method, wearable device and computer readable storage medium | |
CN107786569A (en) | A kind of identifying code sending method, method of reseptance and relevant device | |
CN106803027A (en) | Application function entrance starts method, device and mobile terminal | |
CN106650490A (en) | Cloud account number login method and device | |
CN106611152A (en) | User identity determination method and apparatus | |
CN106407771A (en) | Message management method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20170802 Address after: 100102, 18 floor, building 2, Wangjing street, Beijing, Chaoyang District, 1801 Applicant after: BEIJING ANYUN SHIJI SCIENCE AND TECHNOLOGY CO., LTD. Address before: 100088 Beijing city Xicheng District xinjiekouwai Street 28, block D room 112 (Desheng Park) Applicant before: Beijing Qihu Technology Co., Ltd. |
|
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170704 |