CN107292208A - Guarding against theft for mobile terminal steals method and device - Google Patents

Guarding against theft for mobile terminal steals method and device Download PDF

Info

Publication number
CN107292208A
CN107292208A CN201610224100.1A CN201610224100A CN107292208A CN 107292208 A CN107292208 A CN 107292208A CN 201610224100 A CN201610224100 A CN 201610224100A CN 107292208 A CN107292208 A CN 107292208A
Authority
CN
China
Prior art keywords
mobile terminal
pattern
status information
operating condition
normal operating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610224100.1A
Other languages
Chinese (zh)
Other versions
CN107292208B (en
Inventor
刘长山
郭寰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201610224100.1A priority Critical patent/CN107292208B/en
Priority to PCT/CN2017/076948 priority patent/WO2017177789A1/en
Publication of CN107292208A publication Critical patent/CN107292208A/en
Application granted granted Critical
Publication of CN107292208B publication Critical patent/CN107292208B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS

Abstract

Method and device is stolen the invention provides a kind of guarding against theft for mobile terminal, wherein, this method includes:The status information of the acquisition for mobile terminal mobile terminal, judges whether the mobile terminal is in normal operating condition according to the status information;Judging that the mobile terminal is in normal operating condition, and in the case that the mobile terminal receives illegal operation signal, determining that the mobile terminal is in stolen state, and send a warning message.Using above-mentioned technical proposal, solve mobile terminal it is stolen after the problem of can not be alarmed in time, stolen mobile terminal is controlled in time and sends warning information.

Description

Guarding against theft for mobile terminal steals method and device
Technical field
The present invention relates to the communications field, method and device is stolen in particular to a kind of guarding against theft for mobile terminal.
Background technology
The use of mobile phone becomes increasingly popular, and to be exactly hand-set from stolen steal situation about frequently encountering causes to lose, and last year, American lost The mobile phone total value of mistake is up to 30,000,000,000 dollars, and Philadelphia is the whole America most city of lost mobile phone per capita, is lost every year per capita 2 mobile phones are lost, the place for being easiest to loss mobile phone is then coffee-house.
Which place the country has be loss mobile phone " popular ground "In third-party statistics display, 1. buses, Mobile phone is easily stolen when upper public transport, particularly carries the student of luggage, in cars such as bus stations, and luggage is carried on the other hand, on the other hand Adept machine sees that this is the custom of many students;2. how crowded railway station, people is, thief sets about well;3. subway station, with fire Station;4. toilet, is easiest to forget adept machine;5. dining room, public arena is easy to lose.
In the related art, often the very first time is just forced shutdown or by brush machine again after mobile phone is stolen, without foot The enough time sends alarm and looks for the mobile phone.
For in correlation technique, the problem of can not being alarmed in time after mobile terminal is stolen solves there is presently no effective Certainly scheme.
The content of the invention
Method and device is stolen the invention provides a kind of guarding against theft for mobile terminal, is lost with least solving mobile terminal in correlation technique The problem of can not being alarmed in time after surreptitiously.
According to an aspect of the invention, there is provided a kind of guarding against theft for mobile terminal steals method, including:
Whether the status information of mobile terminal described in acquisition for mobile terminal, the mobile terminal is judged according to the status information In normal operating condition;
The mobile terminal is being judged in normal operating condition, and the mobile terminal receives the feelings of illegal operation signal Under condition, determine that the mobile terminal is in stolen state, and send a warning message.
Further, before described send a warning message, methods described also includes:
The mobile terminal starts safety verification pattern, and obtains certificate parameter corresponding with the safety verification pattern;
When the certificate parameter is not verified, or it is not received by within a predetermined period of time and the safety verification mould In the case of the corresponding input signal of formula, the mobile terminal sends the warning information.
Further, the safety verification pattern includes one below:
Cipher mode, fingerprint recognition pattern, iris recognition pattern, voice recognition pattern, face recognition pattern.
Further, it is determined that the mobile terminal is in before stolen state, methods described also includes:
The environmental information residing for the geographical location information and/or the mobile terminal of the mobile terminal is obtained, according to described Geographical location information and/or the environmental information, determine scene residing for the mobile terminal, wherein, judging described move In the case that dynamic terminal is in normal operating condition, and the mobile terminal receives illegal operation signal, moved with reference to described Predetermined scene residing for dynamic terminal, determines whether the mobile terminal is in stolen state.
Further, it is described to judge whether the mobile terminal includes in normal operating condition according to the status information:
The mobile terminal judges whether the parameter value for indicative of said status information is more than predetermined threshold value, and the shifting Whether dynamic terminal has untreated task, wherein, it is more than in the parameter value for indicative of said status information described pre- If threshold value, and in the case that the mobile terminal has untreated task, determine that the mobile terminal is in and normally use State.
Further, the parameter value for indicative of said status information includes one below:The electricity of the mobile terminal Value, the signal strength values of the mobile terminal.
Further, the illegal operation signal includes one below:
Forced shutdown signal, plugs the signal of subscriber identification module SIM card, and the battery supply of the mobile terminal disconnects Signal.
Further, it is described send a warning message including:
Vibration on Start-up pattern or the tinkle of bells pre-set;
Send the geographical position to preassigned terminal or E-mail address of the mobile terminal;
The mobile terminal is taken pictures by camera, and the photo taken pictures described in sending to preassigned terminal or E-mail address.
Device is stolen there is provided a kind of guarding against theft for mobile terminal according to another aspect of the present invention, it is described in mobile terminal Device includes:
Judge module, the status information for obtaining the mobile terminal judges described mobile whole according to the status information Whether end is in normal operating condition;
Alarm module, for judge the mobile terminal be in normal operating condition, and the mobile terminal receive it is non- In the case of method operation signal, determine that the mobile terminal is in stolen state, and send a warning message.
Further, the alarm module also includes:
Start unit, for before described send a warning message, starting safety verification pattern, and is obtained and the safety The corresponding certificate parameter of Validation Mode;
Transmitting element, for when the certificate parameter is not verified, or be not received by within a predetermined period of time with In the case of the corresponding input signal of the safety verification pattern, the warning information is sent.
By the present invention, the status information of the acquisition for mobile terminal mobile terminal judges that the movement is whole according to the status information Whether end is in normal operating condition;Judging that the mobile terminal is in normal operating condition, and the mobile terminal receives In the case of illegal operation signal, determine that the mobile terminal is in stolen state, and send a warning message, using above-mentioned Technical scheme, solve mobile terminal it is stolen after the problem of can not be alarmed in time, stolen movement is controlled in time Terminal sends warning information.
Brief description of the drawings
Accompanying drawing described herein is used for providing a further understanding of the present invention, constitutes the part of the application, the present invention Schematic description and description be used for explain the present invention, do not constitute inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is the flow chart that a kind of guarding against theft for mobile terminal according to embodiments of the present invention steals method;
Fig. 2 is the structured flowchart one that a kind of guarding against theft for mobile terminal according to embodiments of the present invention steals device;
Fig. 3 is the structured flowchart two that a kind of guarding against theft for mobile terminal according to embodiments of the present invention steals device;
Fig. 4 steals the schematic flow sheet of method for a kind of preventing mobile phone that the preferred embodiment of the present invention is provided;
The typical scene figure for the stolen deterministic process that Fig. 5 provides for the preferred embodiment of the present invention.
Embodiment
Describe the present invention in detail below with reference to accompanying drawing and in conjunction with the embodiments.It should be noted that in the feelings not conflicted Under condition, the feature in embodiment and embodiment in the application can be mutually combined.
It should be noted that term " first ", " second " in description and claims of this specification and above-mentioned accompanying drawing Etc. being for distinguishing similar object, without for describing specific order or precedence.
Method is stolen there is provided a kind of guarding against theft for mobile terminal in the present embodiment, Fig. 1 is a kind of shifting according to embodiments of the present invention Dynamic terminal anti-theft steals the flow chart of method, as shown in figure 1, the flow comprises the following steps:
Step S102, the status information of the acquisition for mobile terminal mobile terminal judges that the movement is whole according to the status information Whether end is in normal operating condition;
Step S104, is judging the mobile terminal in normal operating condition, and the mobile terminal receives illegal operation In the case of signal, determine that the mobile terminal is in stolen state, and send a warning message.
By above-mentioned steps, the status information of the acquisition for mobile terminal mobile terminal judges the movement according to the status information Terminal whether be in normal operating condition, judge the mobile terminal be in normal operating condition, and the mobile terminal reception In the case of illegal operation signal, determine that the mobile terminal is in stolen state, and send a warning message, solve The problem of can not being alarmed in time after mobile terminal is stolen, controls stolen mobile terminal and sends warning information in time.
In the present embodiment, before this sends a warning message, the mobile terminal start safety verification pattern, and obtain with The corresponding certificate parameter of safety verification pattern;
When the certificate parameter is not verified, or it is not received by within a predetermined period of time and the safety verification pattern pair In the case of the input signal answered, the mobile terminal sends the warning information, and safety certification can be requirement input password, Password protection problem etc..
In the present embodiment, the safety verification pattern includes one below:Cipher mode, fingerprint recognition pattern, iris is known Other pattern, voice recognition pattern, face recognition pattern.
In the present embodiment, determine that the mobile terminal is in before stolen state, obtain the geographical position of the mobile terminal Environmental information residing for information and/or the mobile terminal, according to the geographical location information and/or the environmental information, it is determined that should Scene residing for mobile terminal, scene is market, subway etc., wherein, judging that the mobile terminal is in normal operating condition, And in the case that the mobile terminal receives illegal operation signal, the predetermined scene with reference to residing for the mobile terminal determines the shifting Whether dynamic terminal is in stolen state, for example, detecting mobile terminal is in the public places such as market or subway, suddenly Mobile terminal receives forced shutdown signal, then mobile terminal suspects that itself is stolen, then starts safety verification pattern, So that mobile terminal is in the place often stolen, it can timely find that the mobile terminal is in theft state.
In the present embodiment, this judges whether the mobile terminal includes in normal operating condition according to the status information:
The mobile terminal judges whether the parameter value for indicating the status information is more than predetermined threshold value, and the mobile terminal Whether untreated task is had, wherein, it is used to indicate that the parameter value of the status information to be more than the predetermined threshold value at this, and In the case that the mobile terminal has untreated task, determine that the mobile terminal is in normal operating condition.
In the present embodiment, this is used to indicate that the parameter value of the status information to include one below:The electricity of the mobile terminal Value, the signal strength values of the mobile terminal.
In the present embodiment, the illegal operation signal includes one below:
Forced shutdown signal, plugs the signal of subscriber identification module SIM card, and the battery supply of the mobile terminal disconnects letter Number.
In the present embodiment, the mobile terminal send a warning message including:Vibration on Start-up pattern or the tinkle of bells pre-set; Send the geographical position to preassigned terminal or E-mail address of the mobile terminal;The mobile terminal is entered by camera Row is taken pictures, and sends photo that this takes pictures to preassigned terminal or E-mail address.
A kind of guarding against theft for mobile terminal surreptitiously device is additionally provided in the present embodiment, and in mobile terminal, the device is used for real Existing above-described embodiment and preferred embodiment, had carried out repeating no more for explanation.As used below, term " mould Block " can realize the combination of the software and/or hardware of predetermined function.Although the device described by following examples is preferably Realized with software, but hardware, or the realization of the combination of software and hardware is also that may and be contemplated.
Fig. 2 is the structured flowchart one that a kind of guarding against theft for mobile terminal according to embodiments of the present invention steals device, as shown in Fig. 2 The device includes:
Judge module 22, the status information for obtaining the mobile terminal judges that the mobile terminal is according to the status information It is no to be in normal operating condition;
Alarm module 24, is connected with judge module 22, for judging the mobile terminal in normal operating condition, and In the case that the mobile terminal receives illegal operation signal, determine that the mobile terminal is in stolen state, and send announcement Alert information.
By above-mentioned steps, judge module 22 obtains the status information of the mobile terminal, and judging according to the status information should Whether mobile terminal is in normal operating condition, and alarm module 24 is judging the mobile terminal in normal operating condition, And in the case that the mobile terminal receives illegal operation signal, determine that the mobile terminal is in stolen state, and send Warning information.Using above-mentioned technical proposal, solve mobile terminal it is stolen after the problem of can not be alarmed in time, in time Ground controls stolen mobile terminal and sends warning information.
Fig. 3 is the structured flowchart two that a kind of guarding against theft for mobile terminal according to embodiments of the present invention steals device, as shown in figure 3, The alarm module 24 also includes:
Start unit 32, is tested for before this sends a warning message, starting safety verification pattern, and obtaining with the safety The corresponding certificate parameter of card pattern;
Transmitting element 34, is connected with start unit 32, for when the certificate parameter is not verified, or predetermined In the case of input signal corresponding with the safety verification pattern is not received by period, the warning information is sent.
It should be noted that above-mentioned modules can be by software or hardware to realize, for the latter, Ke Yitong Cross in the following manner realization, but not limited to this:Above-mentioned modules are respectively positioned in same processor;Or, each above-mentioned mould Block is located in different processors respectively.
It is described in detail with reference to the preferred embodiment of the present invention.
Including mobile terminal and the software and services run on mobile terminal shown in the preferred embodiment of the present invention.
The method of this preferred embodiment essentially consists in theft mode decision and owner reminds two business, wherein theft pattern is sentenced Break for monitor and judge current device with the presence or absence of stolen risk or it is stolen during, the usage behavior and mould of equipment Whether formula meets theft pattern.Owner is reminded then according to the result of theft mode decision, and owner is reminded and alarmed, So as to remind user to note abnormalities the very first time, it is to avoid the loss of equipment.
Optionally provided on user equipment and enable theft protection pattern, be defaulted as opening, user can be with manual unlocking or pass Close.Under open mode, the theft protection service in the equipment of user is active, and keeps the prison of equipment state Listen.
The state of theft protection pattern audiomonitor, includes the use environment of equipment, the position of equipment and the current state of equipment, And whether the state that may be stolen currently is in come valuator device according to judgment rule.When user shuts down, theft protection pattern The risk being stolen according to current device, judges whether the checking for needing to carry out user identity, if desired for the authentication of user, Then the identity for owner in shutdown process is verified, when authentication not by when, entered by owner's indicating mode Row alarm and prompting.
Owner's indicating mode is responsible for alarm and the record that mobile terminal is under theft state, can pre-set different announcements Alert and alerting pattern, including but not limited to plays alarm tone, forbids shutdown, send geographical position etc..
The preferred embodiment of the present invention describes a kind of method that enhancing mobile device avoids theft.User starts after the function, The equipment of user is under theft protection guard mode, specifically includes following steps:
The first step:Theft protection pattern according to the current state of equipment, and user current scene and running status, as The risk judgment criterion of theft;
Second step:Theft protection pattern is according to the state of acquisition, and the state of bonding apparatus and the behavior pattern matching of user are stolen Whether risk, the risk probability currently stolen and alerted;
3rd step:According to the risk probability of theft, follow-up operation is performed, owner's indicating mode is carried according to set in advance Wake up pattern, the alarm of such as the tinkle of bells, preceding camera, which is taken pictures, waits various ways to be alerted, and reminds user current device presence robber Surreptitiously risk.
Fig. 4 steals the schematic flow sheet of method for a kind of preventing mobile phone that the preferred embodiment of the present invention is provided, as shown in figure 4, Step is as follows:
Step S401, after theft protection pattern is opened, the use environment of audiomonitor, position and state.Theft protection pattern By the detection of equipment state, and the behavior pattern of user is combined, judge that current device whether there is stolen risk;
Step S402, when equipment is in stolen risk, and equipment is forced shutdown or other illegal operations, than Sim cards are such as pulled out, theft protection pattern carries out owner's authentication, and start owner's indicating mode and alerted;
Step S403, owner's indicating mode reminds owner's equipment to exist stolen according to alarm mode set in advance Risk, by the broadcasting of the tinkle of bells, position report or other modes are reminded and notified to owner.
Alarm pattern in the present embodiment can be managed by switching, and user with manual unlocking or can close the function.
The present embodiment provides the implementation method of anti-theft modes, equipment state in the standby state for equipment and user Behavior pattern be collected and analyze, and intelligent decision equipment whether in theft risk in.
In step S401, theft protection pattern upon actuation will starting device status monitoring, it is main to judge currently to set Standby residing environment, the service condition of equipment and whether pending processing task.Environment residing for equipment judges to help to sentence Whether disconnected current device is in the environment that is easily lost, such as by bus, the environment such as wait.The method of detection can pass through equipment External component, such as microphone judge for the sound monitoring of external environment condition, are obtained while can combine from other sensors The information obtained further lifts the accuracy of environment judgement.Such as, the position and direction value obtained by geomagnetic sensor, leads to Cross speed and height value of global positioning system (Global Positioning System, referred to as GPS) acquisition etc..
Theft protection pattern reads the data message of local data base, according to local data value, forms the status list of equipment. Theft protection pattern obtains the available state of charge of current device by the driving of bottom most software, at the same by bottom short message and Telephony recording interface, judges whether current device has the phone not connect and short message, meanwhile, theft protection pattern passes through system Promotion message database, message pushed information can be obtained, be currently at backstage software and application etc. information, Above- mentioned information constitutes the list of description equipment state.
In step S402, equipment judges to work as according to the state of equipment with reference to the behavior of user and the combination intelligent of action Whether preceding be legal operation.Specifically judge to be judged according to theft risk table.
The attribute of the state of equipment and equipment is set to different weights by theft risk table, originates and belongs to according to equipment state Property difference, several weights can be divided into, each weight sets different numerical value according to rule, for example, work as equipment When electricity is more than 90%, the device power-up time is less than 24 hours, and equipment health weight could be arranged to 1, and other set Standby state also uses identical rule settings.Equipment weight includes the health status of equipment, the task status of equipment, if Standby attribute status.Wherein, health status includes the available machine time of equipment, the electricity of equipment, stand-by time of equipment etc. The information of the health status of consersion unit.The task status of equipment includes equipment untreated phone, short message and does not read Notification message etc..The attribute status of equipment includes the position that equipment is currently located, the placing direction of equipment, the current institute of equipment The varying environments such as the geographical position at place and external environment condition, such as subway, public transport or market.
Theft protection pattern is monitored according to the state of equipment, and the operator scheme of user.The action and behavior of user includes, Forced shutdown, plug-in card or solution lock screen.The judgement of theft state is equipment state and the logic judgment mistake of user behavior Journey.For example, after equipment is standby for a long time, current equipment state is has missed call to handle, if equipment is now Forced shutdown order is received, then theft protection pattern then may determine that the operation of equipment is not met just according to state and behavior Normal operation logic.Now, theft protection pattern is in during theft according to theft mode decision current device, Ke Yiqiang System carries out the checking of user identity, such as in user's forced shutdown, it is desirable to which user carries out authentication.Authentication passes through Afterwards, follow-up flow can be performed, and owner's indicating mode is directly initiated when user is not over authentication and is reported It is alert.
It should be noted that by the way of stolen pattern can be combined using local or local+high in the clouds, to lift robber The surreptitiously accuracy rate of risk identification.
In above-mentioned steps S403, owner's indicating mode is main according to judgement of the theft protection pattern for current device state As a result, reminded and alerted for owner.Owner's indicating mode can pre-define alerting pattern and strategy, realization Mainly alert and writing function.Alarm function can be by the tinkle of bells, and the mode such as vibrations informs the current risk of user, draws Play the attention of user.Writing function will the current coordinate position of recording equipment and equipment user information, Ke Yi It is local to preserve or be sent to the position that user pre-defines, such as mailbox, emergency contact number by wireless or other modes Or the other modes such as cloud disk, in case reviewing.
The stolen state judging method preferred embodiment of the present invention
Below with a specific example illustrate theft protection pattern start in the case of, terminal how according to the state of equipment come The risk of identification equipment loss is simultaneously judged, is illustrated by taking the judgement of the stolen process during public transport is taken as an example, The typical scene figure for the stolen deterministic process that Fig. 5 provides for the preferred embodiment of the present invention, as shown in Figure 5.First, use Theft protection pattern is in starting state in the equipment at family, and theft protection pattern is responsible for the state of periodic detection equipment and for equipment Theft risk and state be estimated.Secondly, theft protection pattern is by the sound around monitoring condition, and judgement is currently set The standby use environment in the vehicles or outside.
Meanwhile, the current state of theft protection pattern examination equipment includes the battery capacity of equipment, network and stand-by time etc. Information, and judge current device whether in the state normally used.Have as battery electric quantity is in normal level, equipment The phone or short message not connect, then can consider that equipment is in and normally use.Conversely, working as equipment electricity is in reduced levels, User does not have a business to be processed, such as missed call or does not check short message, then judges that equipment is in abnormality;
When user picks up equipment, attempts to carry out forced shutdown, theft protection pattern judges according to current behavior pattern feature Current device takes next step theft protection measure with the presence or absence of possible stolen risk.When user uses in outside In environment, and now the equipment of user is in normal operating condition, and the use state of equipment is become by holding holding state For off-mode by force, illustrate that exception occurs for the state of now equipment, there is stolen risk.Now, theft protection mould Formula starts the authentication to owner according to the rule of setting.Conversely, during user is in normal use, if Now the use state of equipment is changed into off-mode from normal operating condition, then illustrates that now equipment is in and normally use, then The certification of identity and safety need not be carried out, equipment performs normal flow.In this example, it can require before being powered off User input identification cipher, or other biological identity checking, such as fingerprint or iris.Refuse inspection of books as user or Person checking not by when, then may determine that now equipment in theft excessive risk in, theft protection pattern will start owner Indicating mode, is alerted and is notified.
In theft protection pattern after identification risk, it can be taken pictures with the geographical coordinate and pressure of synchronous recording equipment, record is current Environment and position after, theft protection pattern can perform step S403.
After owner's indicating mode completes above-mentioned steps S403, show that now equipment is in stolen devotion, owner Indicating mode reminds owner to be currently at stolen risk according to indicating mode set in advance, and the mode of prompting can be with By the way of preset or user independently defines, remind means to include vibrations, sound etc., and facility information collection With report, including but not limited to gps coordinate, equipment is taken pictures.
Preferred embodiment of the present invention on application scenarios
In the case that user starts theft protection function, user take pubic transport or during walking it is stolen, as the personnel for implementing theft When forcibly trying to shutdown terminal, it is necessary to which the identity for owner is verified, is not passed through if not verifying or verifying, Then equipment can be alarmed and be recorded.Compared to simply authentication is carried out in equipment shutdown, more intelligently, do not result in The cumbersome authentication of user's actual use.The method can be used for the theft protection of smart mobile phone, and user need not wear it His software or hardware, can just obtain the alarm of equipment in the very first time of device losses, reduce the loss of user.
Through the above description of the embodiments, those skilled in the art can be understood that according to above-described embodiment Method the mode of required general hardware platform can be added to realize by software, naturally it is also possible to by hardware, but a lot In the case of the former be more preferably embodiment.Understood based on such, technical scheme is substantially in other words to existing The part for having technology to contribute can be embodied in the form of software product, and the computer software product is stored in one In storage medium (such as ROM/RAM, magnetic disc, CD), including some instructions are make it that a station terminal equipment (can To be mobile phone, computer, server, or network equipment etc.) perform method described in each embodiment of the invention.
Embodiments of the invention additionally provide a kind of storage medium.Alternatively, in the present embodiment, above-mentioned storage medium can The program code for performing following steps to be arranged to storage to be used for:
S1, the status information of the acquisition for mobile terminal mobile terminal judges whether the mobile terminal is located according to the status information In normal operating condition;
S2, is judging the mobile terminal in normal operating condition, and the mobile terminal receives the feelings of illegal operation signal Under condition, determine that the mobile terminal is in stolen state, the mobile terminal sends a warning message.
Alternatively, storage medium is also configured to the program code that storage is used to perform above-mentioned steps:
Alternatively, in the present embodiment, above-mentioned storage medium can include but is not limited to:USB flash disk, read-only storage (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), mobile hard disk, Magnetic disc or CD etc. are various can be with the medium of store program codes.
Alternatively, in the present embodiment, processor performs above-described embodiment according to the program code stored in storage medium Described method and step.
Alternatively, the specific example in the present embodiment may be referred to showing described in above-described embodiment and optional embodiment Example, the present embodiment will not be repeated here.
Obviously, those skilled in the art should be understood that above-mentioned each module of the invention or each step can be with general Computing device realizes that they can be concentrated on single computing device, or is distributed in multiple computing devices and is constituted Network on, alternatively, the program code that they can be can perform with computing device be realized, it is thus possible to by they Storage is performed by computing device in the storage device, and in some cases, can be to be held different from order herein They, are either fabricated to each integrated circuit modules or will be many in them by the shown or described step of row respectively Individual module or step are fabricated to single integrated circuit module to realize.So, the present invention is not restricted to any specific hardware Combined with software.
The preferred embodiments of the present invention are the foregoing is only, are not intended to limit the invention, for the technology of this area For personnel, the present invention can have various modifications and variations.Within the spirit and principles of the invention, that is made is any Modification, equivalent substitution, improvement etc., should be included in the scope of the protection.

Claims (10)

1. a kind of guarding against theft for mobile terminal steals method, it is characterised in that including:
The status information of mobile terminal described in acquisition for mobile terminal, the mobile terminal is judged according to the status information Whether normal operating condition is in;
The mobile terminal is being judged in normal operating condition, and the mobile terminal receives illegal operation signal In the case of, determine that the mobile terminal is in stolen state, and send a warning message.
2. according to the method described in claim 1, it is characterised in that before described send a warning message, methods described is also Including:
The mobile terminal starts safety verification pattern, and obtains certificate parameter corresponding with the safety verification pattern;
When the certificate parameter is not verified, or it is not received by is tested with the safety within a predetermined period of time In the case of the corresponding input signal of card pattern, the mobile terminal sends the warning information.
3. method according to claim 2, it is characterised in that the safety verification pattern includes one below:
Cipher mode, fingerprint recognition pattern, iris recognition pattern, voice recognition pattern, face recognition pattern.
4. according to the method described in claim 1, it is characterised in that determine that the mobile terminal is in before stolen state, Methods described also includes:
Obtain the environmental information residing for the geographical location information and/or the mobile terminal of the mobile terminal, foundation The geographical location information and/or the environmental information, determine scene residing for the mobile terminal, wherein, sentencing The mobile terminal that breaks is in normal operating condition, and in the case that the mobile terminal receives illegal operation signal, The predetermined scene with reference to residing for the mobile terminal, determines whether the mobile terminal is in stolen state.
5. according to the method described in claim 1, it is characterised in that described to judge described mobile whole according to the status information Whether end includes in normal operating condition:
The mobile terminal judges whether the parameter value for indicative of said status information is more than predetermined threshold value, Yi Jisuo State whether mobile terminal has untreated task, wherein, it is big in the parameter value for indicative of said status information In the predetermined threshold value, and in the case that the mobile terminal has untreated task, the mobile terminal is determined In normal operating condition.
6. method according to claim 5, it is characterised in that the parameter value bag for indicative of said status information Include one below:The charge value of the mobile terminal, the signal strength values of the mobile terminal.
7. according to the method described in claim 1, it is characterised in that the illegal operation signal includes one below:
Forced shutdown signal, plugs the signal of subscriber identification module SIM card, and the battery supply of the mobile terminal breaks ON signal.
8. the method according to claim 1 to 7, it is characterised in that it is described send a warning message including:
Vibration on Start-up pattern or the tinkle of bells pre-set;
Send the geographical position to preassigned terminal or E-mail address of the mobile terminal;
The mobile terminal is taken pictures by camera, and the photo taken pictures described in sending is to preassigned terminal Or E-mail address.
9. a kind of guarding against theft for mobile terminal steals device, it is characterised in that in mobile terminal, described device includes:
Judge module, the status information for obtaining the mobile terminal judges described move according to the status information Whether dynamic terminal is in normal operating condition;
Alarm module, for judge the mobile terminal be in normal operating condition, and the mobile terminal receive In the case of illegal operation signal, determine that the mobile terminal is in stolen state, and send a warning message.
10. device according to claim 9, it is characterised in that the alarm module also includes:
Start unit, for before described send a warning message, starts safety verification pattern, and obtain with it is described The corresponding certificate parameter of safety verification pattern;
Transmitting element, for when the certificate parameter is not verified, or is not received within a predetermined period of time In the case of input signal corresponding with the safety verification pattern, the warning information is sent.
CN201610224100.1A 2016-04-11 2016-04-11 Anti-theft method and device for mobile terminal Active CN107292208B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610224100.1A CN107292208B (en) 2016-04-11 2016-04-11 Anti-theft method and device for mobile terminal
PCT/CN2017/076948 WO2017177789A1 (en) 2016-04-11 2017-03-16 Anti-theft method and device for mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610224100.1A CN107292208B (en) 2016-04-11 2016-04-11 Anti-theft method and device for mobile terminal

Publications (2)

Publication Number Publication Date
CN107292208A true CN107292208A (en) 2017-10-24
CN107292208B CN107292208B (en) 2022-12-20

Family

ID=60041405

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610224100.1A Active CN107292208B (en) 2016-04-11 2016-04-11 Anti-theft method and device for mobile terminal

Country Status (2)

Country Link
CN (1) CN107292208B (en)
WO (1) WO2017177789A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108509778A (en) * 2018-02-07 2018-09-07 平安普惠企业管理有限公司 End message guard method, device, computer equipment and storage medium
CN109151197A (en) * 2018-08-22 2019-01-04 奇酷互联网络科技(深圳)有限公司 Theft preventing method, electronic equipment and storage device based on public camera
CN109190422A (en) * 2018-08-29 2019-01-11 奇酷互联网络科技(深圳)有限公司 Terminal anti-theft method, terminal and the device with store function
CN109544304A (en) * 2018-11-29 2019-03-29 浙江每日互动网络科技股份有限公司 The method for carrying out early warning according to information of mobile terminal

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003061151A (en) * 2001-08-15 2003-02-28 Sony Corp Method for protecting data recorded in mobile terminal, mobile terminal data protection system and mobile terminal
CN101005686A (en) * 2007-01-08 2007-07-25 北京天碁科技有限公司 Abnormal state processing method for mobile terminal and mobile terminal
CN101005663A (en) * 2006-11-15 2007-07-25 深圳凯虹移动通信有限公司 Mobile terminal with lost tracking function and lost tracking method of mobile terminal
CN101212730A (en) * 2006-12-29 2008-07-02 康佳集团股份有限公司 Anti-theft and anti-losing method and system for mobile terminal
CN103037310A (en) * 2012-12-14 2013-04-10 北京网秦天下科技有限公司 Mobile terminal intelligent anti-theft method and mobile terminal

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040203564A1 (en) * 2002-08-26 2004-10-14 Chi-Chang Ho Motorcycle communication and burglary-prevention system
CN1859670A (en) * 2005-09-21 2006-11-08 华为技术有限公司 Mobile terminal with anti-theft function and anti-theft method for mobile terminal
CN101616495A (en) * 2008-06-23 2009-12-30 网秦无限(北京)科技有限公司 The method and system of individual privacy in the protection mobile phone
CN101969493A (en) * 2010-10-28 2011-02-09 深圳市五巨科技有限公司 Anti-theft method and device for mobile terminal
CN103024164B (en) * 2012-12-03 2015-02-18 北京百度网讯科技有限公司 Anti-theft method and device of mobile terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003061151A (en) * 2001-08-15 2003-02-28 Sony Corp Method for protecting data recorded in mobile terminal, mobile terminal data protection system and mobile terminal
CN101005663A (en) * 2006-11-15 2007-07-25 深圳凯虹移动通信有限公司 Mobile terminal with lost tracking function and lost tracking method of mobile terminal
CN101212730A (en) * 2006-12-29 2008-07-02 康佳集团股份有限公司 Anti-theft and anti-losing method and system for mobile terminal
CN101005686A (en) * 2007-01-08 2007-07-25 北京天碁科技有限公司 Abnormal state processing method for mobile terminal and mobile terminal
CN103037310A (en) * 2012-12-14 2013-04-10 北京网秦天下科技有限公司 Mobile terminal intelligent anti-theft method and mobile terminal

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108509778A (en) * 2018-02-07 2018-09-07 平安普惠企业管理有限公司 End message guard method, device, computer equipment and storage medium
CN109151197A (en) * 2018-08-22 2019-01-04 奇酷互联网络科技(深圳)有限公司 Theft preventing method, electronic equipment and storage device based on public camera
CN109151197B (en) * 2018-08-22 2021-04-20 奇酷互联网络科技(深圳)有限公司 Anti-theft method based on public camera, electronic equipment and storage device
CN109190422A (en) * 2018-08-29 2019-01-11 奇酷互联网络科技(深圳)有限公司 Terminal anti-theft method, terminal and the device with store function
CN109544304A (en) * 2018-11-29 2019-03-29 浙江每日互动网络科技股份有限公司 The method for carrying out early warning according to information of mobile terminal

Also Published As

Publication number Publication date
CN107292208B (en) 2022-12-20
WO2017177789A1 (en) 2017-10-19

Similar Documents

Publication Publication Date Title
CN103985230B (en) A kind of Notification Method based on image, device and notice system
ES2658314T3 (en) Apparatus and procedures for locating, tracking and / or retrieving a wireless communication device
CN202650162U (en) Antitheft alarm system
US9942520B2 (en) Interactive and targeted monitoring service
CN107292208A (en) Guarding against theft for mobile terminal steals method and device
CN106846724A (en) A kind of locator and its locator alarm method
CN105745635A (en) Context-aware collaborative user tracking
US8577394B2 (en) Security management system and method
CN108334765B (en) Portable electronic device for authenticating a user and related system and method
CN105376711A (en) Position prompting method and apparatus of wearable device, and wearable device
US9978243B2 (en) Wandering notification server and wandering notification system
KR20150008976A (en) Unspecified number of emergencies in the field adjacent to the location notification service members how
CN105282700A (en) Tracking method, tracking server, and tracking system
CN111815884A (en) Automatic dialing alarm method for mobile terminal
KR20150003430A (en) Secondary terminals located emergency notification services via communication methods
CN112017401A (en) Alarm system for monitoring the safety of persons, corresponding method and storage medium
CN101546467A (en) Radio alarm system and radio alarm method with early warning function
CN106453894B (en) The method whether detecting communication apparatus passes into silence
US20090111439A1 (en) System and method for monitoring a monitored mobile phone
CN106600898A (en) Safety early warning method, device and terminal
JP2006303806A (en) Interphone system
CN201540618U (en) Anti-theft alarm device
CN210377604U (en) Multifunctional community access control system
CN106297185A (en) A kind of Portable type safety protection system and method
CN100382644C (en) Method of guarding against theft for mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant