CN107045598A - Anti-theft method and device for mobile equipment - Google Patents
Anti-theft method and device for mobile equipment Download PDFInfo
- Publication number
- CN107045598A CN107045598A CN201611150385.5A CN201611150385A CN107045598A CN 107045598 A CN107045598 A CN 107045598A CN 201611150385 A CN201611150385 A CN 201611150385A CN 107045598 A CN107045598 A CN 107045598A
- Authority
- CN
- China
- Prior art keywords
- user
- fingerprint
- mobile device
- security
- remote terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 28
- 230000006870 function Effects 0.000 description 18
- 230000008569 process Effects 0.000 description 5
- 230000009471 action Effects 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 238000012217 deletion Methods 0.000 description 3
- 230000037430 deletion Effects 0.000 description 3
- 238000003860 storage Methods 0.000 description 2
- 230000008901 benefit Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 239000000686 essence Substances 0.000 description 1
- PCHJSUWPFVWCPO-UHFFFAOYSA-N gold Chemical compound [Au] PCHJSUWPFVWCPO-UHFFFAOYSA-N 0.000 description 1
- 239000010931 gold Substances 0.000 description 1
- 229910052737 gold Inorganic materials 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 230000035800 maturation Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000005303 weighing Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/88—Detecting or preventing theft or loss
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
- Lock And Its Accessories (AREA)
- Telephone Function (AREA)
Abstract
The invention is suitable for the technical field of computers, and provides an anti-theft method and an anti-theft device for mobile equipment, wherein the method comprises the following steps: acquire current user's fingerprint through the fingerprint collection function, discern the fingerprint, whether in order to confirm the user is mobile device's authorized subscriber, when confirming that the user is not authorized subscriber, acquire user operation mobile device's operating information, thereby keep down embezzled user's fingerprint and operating information when embezzled user on uploading fingerprint and operating information to predetermined remote terminal, make the user not only can make timely safeguard measure according to current user's operation, and can confirm user's identity as early as possible under police's help according to user's fingerprint, greatly increased the probability that mobile device was recovered.
Description
Technical field
The invention belongs to the theft preventing method and device of field of computer technology, more particularly to a kind of mobile device.
Background technology
The mobile devices such as smart mobile phone, tablet personal computer play an important role in the every aspect of life, greatly change
The social activity, shopping and entertainment way of people are become, the value of these mobile devices not only includes buying the gold that they pay
Volume, includes the user data of their storages.
When mobile device is operated because losing or being stolen by other people, the personal information of user is likely to the compromised, shifting
Alipay, wechat in dynamic equipment, which are paid etc., to be likely to be used by others, in addition likely result in the relatives and friends of user by
To telecommunication fraud, it is seen that if be not added with to take precautions against, the loss being finally subjected to will be difficult to estimate.Although current mobile device is carried
Location tracking function and anti-theft modes, but the user that location tracking function is easy to mobile device closes, anti-theft modes
The vigilance of mobile device user can be caused again by starting, therefore the probability being retrieved after most of mobile devices loss is very small,
User can only be reduced as far as loss by reporting a case to the security authorities, changing account number cipher etc..
The content of the invention
It is an object of the invention to provide a kind of theft preventing method of mobile device and device, it is intended to solves due to prior art
A kind of theft preventing method of mobile device can not be provided, cause that user's information can not be obtained simultaneously when mobile device is illegally used
The problem of effectively protecting mobile device internal data.
On the one hand, the invention provides a kind of theft preventing method of mobile device, methods described comprises the steps:
The fingerprint of currently used person is obtained by finger print collecting function;
The fingerprint is identified, with determine the user whether be the mobile device authorized user;
When it is determined that the user is not the authorized user, the behaviour that the user operates the mobile device is obtained
Make information, and the fingerprint and the operation information are uploaded into transmission to default remote terminal;
On the other hand, the invention provides a kind of anti-theft device of mobile device, described device includes:
Finger print acquisition module, the fingerprint for obtaining currently used person by finger print collecting function;
Fingerprint identification module, for the fingerprint to be identified, to determine whether the user is that the movement is set
Standby authorized user;And
Information uploading module, for when it is determined that the user is not the authorized user, obtaining the user behaviour
Make the operation information of the mobile device, and the fingerprint and the operation information are uploaded to default remote terminal.
The fingerprint of the currently used person of present invention collection, and determine whether the user is mobile device by fingerprint recognition
Authorized user, when it is determined that the user is not authorized user, the fingerprint and operation information of the user are uploaded to default
Remote terminal, so as to obtain the fingerprint and operation information of the user in the case where user does not discover, effectively help to use
Family obtains the evidence that is used by others of mobile device in remote terminal, when mobile device is stolen or is lost, available for determining
The identity of user, helps user to recover mobile device, and then effectively prevent that data are further let out in user's mobile device
Dew.
Brief description of the drawings
Fig. 1 is the implementation process figure of the theft preventing method for the mobile device that the embodiment of the present invention one is provided;
Fig. 2 is the implementation process figure of the theft preventing method for the mobile device that the embodiment of the present invention two is provided;
Fig. 3 is the structural representation of the anti-theft device for the mobile device that the embodiment of the present invention three is provided;And
Fig. 4 is the structural representation of the anti-theft device for the mobile device that the embodiment of the present invention four is provided.
Embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, it is right below in conjunction with drawings and Examples
The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and
It is not used in the restriction present invention.
Implementing for the present invention is described in detail below in conjunction with specific embodiment:
Embodiment one:
Fig. 1 shows the implementation process of the theft preventing method for the mobile device that the embodiment of the present invention one is provided, for the ease of saying
It is bright, the part related to the embodiment of the present invention is illustrate only, details are as follows:
In step S101, the fingerprint of currently used person is obtained by finger print collecting function.
The present invention supports the movement of fingerprint identification function to set suitable for smart mobile phone, intelligent watch and tablet personal computer etc.
It is standby, (for example detect contact action or button operation) when detecting mobile device and being used, open the mobile device
Finger print collecting function, to gather the fingerprint of currently used person, finger print collecting function can pass through the fingerprint sensor on mobile device
Realize.
Preferably, fingerprint sensor can be passed using the fingerprint of the technology such as pressure-sensitive or ultrasonic fingerprint sensor more maturation
Sensor, so that the fingerprint of user is more precisely collected, specifically, when using ultrasonic fingerprint sensor collection fingerprint
When, the whole screen of mobile device may be such that fingerprint collecting is more hidden, the person of being not used examines all as fingerprint collecting region
Feel.
In step s 102, fingerprint is identified, with determine user whether be mobile device authorized user.
In embodiments of the present invention, the fingerprint of authorized user can be prestored on the mobile apparatus, when collecting user
Fingerprint when, the fingerprint characteristic of user is matched with the fingerprint characteristic of authorized user, when the match is successful, it is believed that make
User is the authorized user of mobile device, and otherwise user is not the authorized user of mobile device.
In step s 103, when it is determined that user is not authorized user, the operation that user operates mobile device is obtained
Information, and fingerprint and operation information are uploaded to default remote terminal.
In embodiments of the present invention, by obtaining the instruction of user's triggering or/and the content of input, the user is obtained
Operation information, these operation informations and fingerprint are finally uploaded into default remote terminal together.Specifically, operation information can
Including operation content, operating time etc., wherein, it is corresponding that operation content may include that the operation specifically performs content, the operation
Level of security etc., level of security can be preset by user, also can be by default.Specifically, remote terminal can be long-range
Server end or other mobile terminals etc..
Preferably, can when user exceedes preset security rank to the level of security corresponding to the operation of mobile device
Refuse the operation to user to respond, for example, can be corresponding for the operation setting of deletion/closing application program (App)
The application program on the mobile device can just be deleted/closed to level of security, only authorized user, and when unauthorized user or non-
When method user performs the operation, refuse to respond the operation of user, so as to protect data safety in mobile device simultaneously
Reduce the loss of user.
In embodiments of the present invention, the fingerprint of currently used person is obtained, when determining that user does not award by fingerprint recognition
When weighing user, the fingerprint and operation information of user are uploaded into default remote terminal, so as to be obtained when user does not discover
The fingerprint and operation information of the user is taken, helps user to grasp the fingerprint and operation information of user in remote terminal, so as to
User holds proofs and takes corresponding counter-measure in time, efficiently reduces the loss of oneself.
Embodiment two:
Fig. 2 shows the implementation process of the theft preventing method for the mobile device that the embodiment of the present invention two is provided, and details are as follows:
In step s 201, the fingerprint of currently used person is obtained by finger print collecting function.
The present invention supports the movement of fingerprint identification function to set suitable for smart mobile phone, intelligent watch and tablet personal computer etc.
It is standby, (for example detect contact action or button operation) when detecting mobile device and being used, open the mobile device
Finger print collecting function, to gather the fingerprint of currently used person, finger print collecting function can pass through the fingerprint sensor on mobile device
Realize.
In step S202, fingerprint is identified, with determine user whether be mobile device authorized user.
In embodiments of the present invention, the fingerprint of authorized user can be prestored on the mobile apparatus, when collecting user
Fingerprint when, the fingerprint characteristic of user is matched with the fingerprint characteristic of authorized user, when the match is successful, it is believed that make
User is the authorized user of mobile device, and otherwise user is not the authorized user of mobile device.
In step S203, when it is determined that user is not authorized user, the operation that user operates mobile device is obtained
Information, and fingerprint and operation information are uploaded to default remote terminal.
In embodiments of the present invention, by obtaining the instruction of user's triggering or/and the content of input, the user is obtained
Operation information, these operation informations and fingerprint are finally uploaded into default remote terminal together.Specifically, operation information can
Including operation content, operating time etc., wherein, it is corresponding that operation content may include that the operation specifically performs content, the operation
Level of security etc., level of security can be preset by user, also can be by default.Specifically, remote terminal can be long-range
Server section or other mobile terminals.
In step S204, when the security for receiving remote terminal is instructed, security instruction is performed corresponding
Security is operated.
In embodiments of the present invention, when user has found that mobile device is lost or is stolen, or when user is in remote terminal
When receiving fingerprint and the operation information of mobile device transmission, user can be in remote terminal by sending security instruction control
The mobile device, to protect the data safety inside mobile device, when mobile device receives security instruction, is performed
The security instructs corresponding security operation, wherein, security instruction may include that data delete instruction, data encryption
Instruction etc..As illustratively, when security instruction deletes instruction for data, mobile device can be standby by all data messages
Part is to high in the clouds, after backing up successfully, then these data messages in mobile device are carried out into complete deletion, when control instruction is number
During according to encrypted instruction, protection can be encrypted in the significant data in mobile device, can be specified by user in remote terminal needs
The data of encryption.
Preferably, timing is started when getting the operation information of user, when detecting authorized user to mobile device
Stop timing when being operated or received security instruction, the time span of timing is authorized user not to mobile device
The duration operated, when the duration exceedes prefixed time interval and does not receive security instruction, enter
Default anti-theft modes.Specifically, after anti-theft modes are opened, mobile device performs corresponding protection operation automatically.It is used as example
Ground, for example, application program all on lockable mobile device, is allowed to be operated.And for example, can be to the institute in mobile device
There are data to be encrypted, to ensure the data safety on mobile device.So, when user is inconvenient or can not use long-range end
When end carries out security to mobile device, mobile device can carry out automatic antitheft, effectively increase the security of mobile device.
In embodiments of the present invention, when mobile device by fingerprint recognition to confirm currently used person be not authorized user when,
The fingerprint and operation information of user are not only sent to remote terminal, the security for also receiving remote terminal is instructed and performed
The corresponding operation of the instruction, so that the fingerprint and operation information of user grasp user is helped, by the long-range control for performing user
The data safety of mobile device is effectively protected in system instruction, reduces the loss that user is subjected to.
Can be with one of ordinary skill in the art will appreciate that realizing that all or part of step in above-described embodiment method is
The hardware of correlation is instructed to complete by program, described program can be stored in a computer read/write memory medium,
Described storage medium, such as ROM/RAM, disk, CD.
Embodiment three:
Fig. 3 shows the implementation process of the anti-theft device for the mobile device that the embodiment of the present invention three is provided, and details are as follows:
Finger print acquisition module 31, the fingerprint for obtaining currently used person by finger print collecting function.
In embodiments of the present invention, (contact action or button are for example detected when detecting mobile device and being used
Operation), the finger print collecting function of the mobile device is opened, to gather the fingerprint of currently used person, finger print collecting function can pass through
Fingerprint sensor on mobile device is realized.
Fingerprint identification module 32, for fingerprint to be identified, with determine user whether be mobile device mandate use
Family.
In embodiments of the present invention, the fingerprint of authorized user can be prestored on the mobile apparatus, when collecting user
Fingerprint when, the fingerprint characteristic of user is matched with the fingerprint characteristic of authorized user, when the match is successful, it is believed that make
User is the authorized user of mobile device, and otherwise user is not the authorized user of mobile device.
Information uploading module 33, for when it is determined that user is not authorized user, obtaining user's operation mobile device
Operation information, and fingerprint and operation information are uploaded to default remote terminal.
In embodiments of the present invention, by obtaining the instruction of user's triggering or/and the content of input, the user is obtained
Operation information, these operation informations and fingerprint are finally uploaded into default remote terminal together.Specifically, operation information can
Including operation content, operating time etc., wherein, it is corresponding that operation content may include that the operation specifically performs content, the operation
Level of security etc., level of security can be preset by user, also can be by default.Specifically, remote terminal can be long-range
Server end or other mobile terminals etc..In embodiments of the present invention, the fingerprint of currently used person is obtained, when passing through fingerprint recognition
When determining that user is not authorized user, the fingerprint and operation information of user are uploaded into default remote terminal, so that
The fingerprint and operation information of the user is obtained when user does not discover, helps user to grasp the fingerprint of user in remote terminal
And operation information, so that user holds proofs in time and takes corresponding counter-measure, efficiently reduce the loss of oneself.
Example IV:
Fig. 4 shows the structure of the anti-theft device for the mobile device that the embodiment of the present invention four is provided, for convenience of description, only
The part related to the embodiment of the present invention is shown, including:
Finger print acquisition module 41, the fingerprint for obtaining currently used person by finger print collecting function.
In embodiments of the present invention, (contact action or button are for example detected when detecting mobile device and being used
Operation), the finger print collecting function of the mobile device is opened, to gather the fingerprint of currently used person, finger print collecting function can pass through
Fingerprint sensor on mobile device is realized.
Fingerprint identification module 42, for fingerprint to be identified, with determine user whether be mobile device mandate use
Family.
In embodiments of the present invention, the fingerprint of authorized user can be prestored on the mobile apparatus, when collecting user
Fingerprint when, the fingerprint characteristic of user is matched with the fingerprint characteristic of authorized user, when the match is successful, it is believed that make
User is the authorized user of mobile device, and otherwise user is not the authorized user of mobile device.
Information uploading module 43, for when it is determined that user is not authorized user, obtaining user's operation mobile device
Operation information, and fingerprint and operation information are uploaded to default remote terminal.
In embodiments of the present invention, by obtaining the instruction of user's triggering or/and the content of input, the user is obtained
Operation information, these operation informations and fingerprint are finally uploaded into default remote terminal together.Specifically, operation information can
Including operation content, operating time etc., wherein, it is corresponding that operation content may include that the operation specifically performs content, the operation
Level of security etc., level of security can be preset by user, also can be by default.Specifically, remote terminal can be long-range
Server section or other mobile terminals.
Security module 44, for when the security for receiving remote terminal is instructed, performing security instruction
Corresponding security operation.
In embodiments of the present invention, when user has found that mobile device is lost or is stolen, or when user is in remote terminal
When receiving fingerprint and the operation information of mobile device transmission, user can be in remote terminal by sending security instruction control
The mobile device, to protect the data safety inside mobile device, when mobile device receives security instruction, is performed
The security instructs corresponding security operation, wherein, security instruction may include that data are deleted instruction, data and added
Close instruction etc..As illustratively, when security instruction deletes instruction for data, mobile device can be by all data messages
High in the clouds is backed up to, complete deletion is carried out after backing up successfully, then by these data messages in mobile device, when control instruction is
When data encryption is instructed, protection can be encrypted in the significant data in mobile device, can be specified by user in remote terminal needs
The data to be encrypted.
In embodiments of the present invention, when mobile device by fingerprint recognition to confirm currently used person be not authorized user when,
The fingerprint and operation information of user are not only sent to remote terminal, the security for also receiving remote terminal is instructed and performed
The corresponding operation of the instruction, so that the fingerprint and operation information of user grasp user is helped, by the long-range control for performing user
The data safety of mobile device is effectively protected in system instruction, reduces the loss that user is subjected to.
In embodiments of the present invention, each unit of the anti-theft device of mobile device can be real by corresponding hardware or software unit
Existing, each unit can be independent soft and hardware unit, can also be integrated into a soft and hardware unit, herein not to limit this
Invention.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention
Any modifications, equivalent substitutions and improvements made within refreshing and principle etc., should be included in the scope of the protection.
Claims (8)
1. a kind of theft preventing method of mobile device, it is characterised in that methods described comprises the steps:
The fingerprint of currently used person is obtained by finger print collecting function;
The fingerprint is identified, with determine the user whether be the mobile device authorized user;
When it is determined that the user is not the authorized user, the operation letter that the user operates the mobile device is obtained
Breath, and the fingerprint and the operation information are uploaded to default remote terminal.
2. the method as described in claim 1, it is characterised in that when it is determined that the user is not the authorized user, institute
Stating method also includes:
The corresponding level of security of the operation is obtained, when the level of security exceedes preset security rank, is refused to the behaviour
As being responded.
3. the method as described in claim 1, it is characterised in that be uploaded to the fingerprint and the operation information default remote
After the step of journey terminal, methods described also includes:
When the security for receiving the remote terminal is instructed, perform the security and instruct corresponding security behaviour
Make.
4. method as claimed in claim 3, it is characterised in that methods described also includes:
The timing since the operation of the user, obtains what the authorized user was not operated to the mobile device
Duration;
When the duration exceedes prefixed time interval and does not receive the security instruction, prevent into default
Robber's pattern.
5. a kind of anti-theft device of mobile device, it is characterised in that described device includes:
Finger print acquisition module, the fingerprint for obtaining currently used person by finger print collecting function;
Fingerprint identification module, for the fingerprint to be identified, to determine whether the user is the mobile device
Authorized user;And
Information uploading module, for when it is determined that the user is not the authorized user, obtaining user's operation institute
The operation information of mobile device is stated, and the fingerprint and the operation information are uploaded to default remote terminal.
6. device as claimed in claim 5, it is characterised in that described device also includes:
Operation refusal module, for obtaining the corresponding level of security of the operation, when the level of security exceedes preset security level
When other, refusal is responded to the operation.
7. device as claimed in claim 5, it is characterised in that described device also includes:
Security module, for when the security for receiving the remote terminal is instructed, performing the security and referring to
Corresponding security is made to operate.
8. device as claimed in claim 7, it is characterised in that described device also includes:
Timing module, in time, obtaining the authorized user not to the movement since the operation of the user
The duration that equipment is operated;And
Automatic antitheft module, for referring to when the duration exceedes prefixed time interval and do not receive the security
When making, into default anti-theft modes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611150385.5A CN107045598A (en) | 2016-12-14 | 2016-12-14 | Anti-theft method and device for mobile equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611150385.5A CN107045598A (en) | 2016-12-14 | 2016-12-14 | Anti-theft method and device for mobile equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107045598A true CN107045598A (en) | 2017-08-15 |
Family
ID=59543838
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611150385.5A Pending CN107045598A (en) | 2016-12-14 | 2016-12-14 | Anti-theft method and device for mobile equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107045598A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107480985A (en) * | 2017-08-18 | 2017-12-15 | 南昌欧菲生物识别技术有限公司 | The safe payment method of bank card and bank card |
CN108961847A (en) * | 2018-08-07 | 2018-12-07 | 广东小天才科技有限公司 | Learning method based on family education equipment and family education equipment |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104143059A (en) * | 2014-07-31 | 2014-11-12 | 可牛网络技术(北京)有限公司 | Method and system for improving safety of mobile terminal |
CN104751086A (en) * | 2015-03-04 | 2015-07-01 | 深圳市金立通信设备有限公司 | Terminal anti-theft method |
CN105187648A (en) * | 2015-09-10 | 2015-12-23 | 上海卓易科技股份有限公司 | Handset encryption system and method |
CN105262866A (en) * | 2015-11-13 | 2016-01-20 | 上海斐讯数据通信技术有限公司 | Anti-theft method, system and anti-theft handset |
CN105279415A (en) * | 2015-10-23 | 2016-01-27 | 广东欧珀移动通信有限公司 | Terminal equipment control method and control system |
CN105550552A (en) * | 2015-06-30 | 2016-05-04 | 宇龙计算机通信科技(深圳)有限公司 | Protection method and apparatus for mobile terminal |
CN105989265A (en) * | 2015-02-06 | 2016-10-05 | 中兴通讯股份有限公司 | Early warning method and device and terminal equipment |
-
2016
- 2016-12-14 CN CN201611150385.5A patent/CN107045598A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104143059A (en) * | 2014-07-31 | 2014-11-12 | 可牛网络技术(北京)有限公司 | Method and system for improving safety of mobile terminal |
CN105989265A (en) * | 2015-02-06 | 2016-10-05 | 中兴通讯股份有限公司 | Early warning method and device and terminal equipment |
CN104751086A (en) * | 2015-03-04 | 2015-07-01 | 深圳市金立通信设备有限公司 | Terminal anti-theft method |
CN105550552A (en) * | 2015-06-30 | 2016-05-04 | 宇龙计算机通信科技(深圳)有限公司 | Protection method and apparatus for mobile terminal |
CN105187648A (en) * | 2015-09-10 | 2015-12-23 | 上海卓易科技股份有限公司 | Handset encryption system and method |
CN105279415A (en) * | 2015-10-23 | 2016-01-27 | 广东欧珀移动通信有限公司 | Terminal equipment control method and control system |
CN105262866A (en) * | 2015-11-13 | 2016-01-20 | 上海斐讯数据通信技术有限公司 | Anti-theft method, system and anti-theft handset |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107480985A (en) * | 2017-08-18 | 2017-12-15 | 南昌欧菲生物识别技术有限公司 | The safe payment method of bank card and bank card |
CN108961847A (en) * | 2018-08-07 | 2018-12-07 | 广东小天才科技有限公司 | Learning method based on family education equipment and family education equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3428819B1 (en) | Mobile security countermeasures | |
US10515203B2 (en) | Method and system for improving security of a mobile terminal | |
US9519808B2 (en) | Method and apparatus for protecting data in a portable electronic device | |
KR101140904B1 (en) | Apparatus and methods for locating, tracking and/or recovering a wireless communication device | |
US20100273452A1 (en) | Apparatus and Methods For Locating Tracking and/or Recovering a Wireless Communication Device | |
US20170013464A1 (en) | Method and a device to detect and manage non legitimate use or theft of a mobile computerized device | |
CN108076426A (en) | Terminal tracing method, apparatus, storage medium and terminal device | |
CN104915012B (en) | A kind of screen locking method and device of terminal | |
CN102084369A (en) | System for monitoring the unauthorized use of a device | |
CN102084372A (en) | System for monitoring the unauthorized use of a device | |
CN102084370A (en) | System for mitigating the unauthorized use of a device | |
CN103957316A (en) | Smart phone anti-theft protective method | |
CN102084371A (en) | System for mitigating the unauthorized use of a device | |
CN106453874A (en) | Mobile phone control method and system | |
CN108551550A (en) | Image control, the filming control method of camera applications, device and electronic equipment | |
CN103020553A (en) | Anti-theft protection method for mobile terminal | |
CN110049490A (en) | Safety protection method and device for wearable equipment, wearable equipment and medium | |
EP3166294A1 (en) | Systems and methods for monitoring and managing use of mobile electronic devices | |
CN107045598A (en) | Anti-theft method and device for mobile equipment | |
EP2780900B1 (en) | Systems and methods for recovering low power devices | |
WO2010067263A2 (en) | A system for protection and backup of information in a mobile cell unit | |
CN106657668A (en) | Anti-theft method and device for wearable equipment | |
CN110263521A (en) | Login guard method and device, system, electronic equipment and storage medium | |
CN105989265A (en) | Early warning method and device and terminal equipment | |
CN104243476A (en) | Account protection method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170815 |
|
RJ01 | Rejection of invention patent application after publication |