CN107343088B - Information protection method of mobile terminal and mobile terminal - Google Patents
Information protection method of mobile terminal and mobile terminal Download PDFInfo
- Publication number
- CN107343088B CN107343088B CN201710473823.XA CN201710473823A CN107343088B CN 107343088 B CN107343088 B CN 107343088B CN 201710473823 A CN201710473823 A CN 201710473823A CN 107343088 B CN107343088 B CN 107343088B
- Authority
- CN
- China
- Prior art keywords
- call
- information
- confirming
- mobile terminal
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72418—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services
- H04M1/72421—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services with automatic activation of emergency service functions, e.g. upon sensing an alarm
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/26—Devices for calling a subscriber
- H04M1/27—Devices whereby a plurality of signals may be stored simultaneously
- H04M1/274—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc
- H04M1/2745—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips
- H04M1/27453—Directories allowing storage of additional subscriber data, e.g. metadata
- H04M1/2746—Sorting, e.g. according to history or frequency of use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
- H04W4/14—Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/22—Processing or transfer of terminal data, e.g. status or physical capabilities
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Human Computer Interaction (AREA)
- Business, Economics & Management (AREA)
- Emergency Management (AREA)
- Databases & Information Systems (AREA)
- Library & Information Science (AREA)
- Telephone Function (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides an information protection method of a mobile terminal and the mobile terminal, comprising the following steps: confirming a first number according to a call record in a preset period; sending a first short message to a first terminal corresponding to the first number; receiving protection control information which is obtained and sent by the first terminal according to the first short message; and executing a preset protection program and/or instruction according to the protection control information. Under the condition that other terminals are not matched or the matched other terminals fail, the initiating end of the remote control can be automatically determined, the remote control protection initiated by the first terminal is completed, and the conditions of information leakage and the like are effectively prevented.
Description
Technical Field
The present invention relates to the field of mobile terminals, and in particular, to an information protection method for a mobile terminal and a mobile terminal.
Background
The mobile terminal is an electronic terminal device with a mobile communication module, and can be accessed to a network after being configured with an identity identification card, and with the improvement of the processing capacity and the expansion of the application range of the mobile terminal, once the mobile terminal is stolen, the problems of information leakage and the like can be caused, which can bring huge loss to users.
In order to prevent the stolen mobile terminal from causing greater loss, the mobile terminal triggers a corresponding emergency processing flow after automatically judging that the mobile terminal is stolen, and in this way, the triggering condition of the emergency processing flow is difficult to define, so that in the prior art, the emergency processing flow can be triggered in a remote control mode.
The existing remote control mode needs a user to match other terminals in advance, and once the other terminals are not matched or the matched other terminals fail, an emergency processing flow cannot be triggered, so that the problems of information leakage and the like cannot be prevented.
Disclosure of Invention
The invention provides an information protection method of a mobile terminal and the mobile terminal, which aim to solve the problem that an emergency processing flow cannot be triggered under the condition that other terminals are not matched or the matched other terminals are invalid.
According to a first aspect of the present invention, there is provided an information protection method for a mobile terminal, including:
confirming a first number according to a call record in a preset period;
sending a first short message to a first terminal corresponding to the first number;
receiving protection control information which is obtained and sent by the first terminal according to the first short message;
and executing a preset protection program and/or instruction according to the protection control information.
Optionally, before the determining the first number according to the call record in the preset period, the method further includes:
and confirming that the second number set as the emergency contact object is an invalid number.
Optionally, the confirming that the second number set as the emergency contact object is an invalid number includes:
sending a second short message to a second terminal corresponding to the second number;
and confirming that the second number is an invalid number according to the message return value information of the second message.
The confirming that the second number set as the emergency contact object is an invalid number comprises the following steps:
sending a second short message to a second terminal corresponding to the second number;
and if the time for not obtaining the return information corresponding to the second short message reaches the preset time, confirming that the second number is an invalid number.
Optionally, before the confirming that the second number set as the emergency contact object is an invalid number, the method further includes:
confirming the second number according to the call record in a preset period;
and setting the second number as an emergency contact object.
Optionally, after the confirming that the second number set as the emergency contact object is an invalid number, the method further includes:
the emergency contact object is no longer set to the second number.
Optionally, before sending the first short message to the first terminal corresponding to the first number, the method further includes:
it is detected that the first identification card is replaced with another identification card.
Optionally, the determining the first number according to the call record in the preset period includes:
the method comprises the steps of sorting the contact closeness of numbers contained in call records in a preset period according to the call duration and the call frequency of the call records in the preset period, wherein the higher the sorting is, the higher or lower the contact closeness of the numbers is;
and confirming the number with the highest contact closeness as the first number.
Optionally, the executing a preset protection program and/or instruction includes: and locking the use authority of the mobile terminal.
Optionally, after the first number is confirmed according to the call record in the preset period, the method further includes:
and updating and setting the emergency contact object as the first number.
According to a second aspect of the present invention, there is provided a mobile terminal comprising:
the number confirmation module confirms the first number according to the call record in a preset period;
the sending module is used for sending a first short message to a first terminal corresponding to the first number;
the receiving module is used for receiving the protection control information which is obtained and sent by the first terminal according to the first short message;
and the execution module executes a preset program or instruction according to the protection control information.
According to the information protection method of the mobile terminal and the mobile terminal, provided by the invention, the means of confirming the first number according to the call record in the preset period and sending the first short message to the first terminal corresponding to the first number can automatically determine the initiating end of remote control under the condition that other terminals are not matched or the matched other terminals are invalid, and the means of receiving the protection control information obtained and sent by the first terminal according to the first short message and executing the preset protection program or instruction according to the protection control information completes the remote control protection initiated at the first terminal, thereby effectively preventing the information leakage and the like.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a flow chart illustrating an information protection method of a mobile terminal according to the present invention;
FIG. 2 is a schematic diagram of a mobile terminal according to the present invention;
description of reference numerals:
11-a mobile terminal;
111-number confirmation module; 112-a sending module; 113-an execution module; 114-a receiving module;
12-first terminal.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims, as well as in the drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are, for example, capable of operation in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The technical solution of the present invention will be described in detail below with specific examples. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments.
FIG. 1 is a flow chart illustrating an information protection method of a mobile terminal according to the present invention; the implementation of the method can be carried out when the mobile terminal is in an anti-theft state, and the anti-theft state can be started to enter through the operation of a user or can be automatically started to enter through the triggering of a preset event.
Referring to fig. 1, an information protection method of a mobile terminal is provided, including:
s2: confirming a first number according to a call record in a preset period;
the preset period may be the last week, month, or even day, and when the call record is confirmed in the preset period, the data of the call record may be quantized to extract the required data, for example, the required data may include the call duration, the call times, the call occurrence time, the call ending time, the call frequency, and the like of each number.
In one embodiment, the determining the first number according to the call record in the preset period includes:
the method comprises the steps of sorting the contact closeness of numbers contained in call records in a preset period according to the call duration and the call frequency of the call records in the preset period, wherein the higher the sorting is, the higher or lower the contact closeness of the numbers is;
and confirming the number with the highest contact closeness as the first number.
The contact closeness is used for representing the closeness degree of the contact between the corresponding number and the user of the mobile terminal; the method can simply adopt one or more kinds of quantitative data of the call records to directly sort, and also can calculate a drawn numerical value or rating according to the quantitative data of the call records to sort; the call duration may refer to the accumulated call duration of a single number, or may refer to an average call duration, a median of call durations, or the like, without excluding selecting one or more call duration data therein as a basis for sorting. The call frequency may be understood as the number of calls in a unit time, where the unit time may refer to every day, every hour, every week, and the like, and the unit time of the frequency may be adjusted accordingly according to the difference of the preset period and the difference of the distribution situation of the call records.
In an alternative embodiment, it may be considered that, for different numbers, the closeness ranks more forward the longer the call duration is in the case that other quantized data such as the call frequency do not have a significant difference, and the closeness ranks more forward the higher the call frequency is in the case that other quantized data such as the call duration do not have a significant difference.
In an optional implementation manner, the numbers included in the call records may be further sorted according to the call duration, the call frequency, the call occurrence time, the call ending time, the outgoing call information, the incoming call information, and the like of the call records within a preset period, and in a specific example, it may be considered that the closer the call occurrence time is to the current time, the more the collected data equivalent to the call duration and the call frequency has use value, so according to the distance of the call occurrence time, different processing may be performed on the quantized data such as the call duration and the call frequency, and the calculation is performed, and meanwhile, the call occurrence time itself may also be calculated as one of the bases for calculating the closeness sorting. In a specific example, the current time can be collected, and compared with the case of two points in the afternoon, the value of the quantized data such as the call frequency and the call duration in the afternoon time period is higher, and the quantized data in other time periods are respectively brought into calculation in different manners.
S3: sending a first short message to a first terminal corresponding to the first number;
referring to fig. 1, before sending the first short message to the first terminal corresponding to the first number, that is, before step S3, the method further includes:
it is detected that the first identification card is replaced with another identification card. The identity identification card can be listed as an SIM card, and is one of the preconditions for sending the first short message when the identity identification card is detected to be replaced; the first identification card can be understood as an identification card which is matched with the mobile terminal in advance, and can also be understood as an identification card which is originally plugged into the mobile terminal. In addition, the time for detecting the first identification card to be replaced with another identification card is only required to be before step S3, and is not necessarily required to be after step S2, which may be before step S2, even in an alternative embodiment, and may also be before step S1 illustrated in fig. 1. The above embodiment can be used for determining whether the remote control is needed or not, so that the information can be protected more timely and effectively.
S4: receiving protection control information which is obtained and sent by the first terminal according to the first short message;
s5: and executing a preset protection program and/or instruction according to the protection control information.
The protection control information may be information for triggering execution of a preset protection program or instruction, and may be any information, and the information may be understood as the protection control information as long as the mobile terminal is preset to be able to execute a corresponding instruction and/or program according to the information.
In one example, the instruction information of # lock # may be sent to the mobile terminal to trigger the locking action, and correspondingly, the executing of the preset protection program or the instruction includes: the use permission of the mobile terminal is locked, and the mode can effectively and timely protect the information of the mobile terminal and prevent other people from using and looking up the information. In other optional examples, a location synchronization program may also be triggered to synchronously send the current location in the background, and correspondingly, the executing of the preset protection program or the preset instruction includes: acquiring current position information in real time and feeding back the current position information to the first terminal; in addition, the method can lock the use authority of the mobile terminal, and simultaneously acquire the current position information in real time and feed the current position information back to the first terminal. The method can effectively help the user to locate the mobile terminal.
In one example, the executing the preset protection program or the instruction may further include: deleting part or all of the information stored in the mobile terminal. The mode can effectively prevent the leakage of information.
After the confirming the first number according to the call record in the preset period, that is, after step S2, the method may further include:
and updating and setting the emergency contact object as the first number. It may be performed before or after any flow between step S3 to step S5. The emergency contact object can be understood as an emergency contact in the field or a number corresponding to the emergency contact; in a specific embodiment, the identifying an emergency contact object and a non-emergency contact object by marking an emergency contact identifier on a number or a contact person may be performed separately, where in this embodiment, the updating of the emergency contact object to be the first number specifically includes: the emergency contact identifier may be identified for the first number, and before the emergency contact identifier may be included to cancel the number originally having the emergency contact identifier, for example, to cancel the emergency contact identifier of the second number.
In addition, the emergency contact object may be one number, and in an alternative embodiment, may also be more than one number, which may be understood as: the number of the first numbers can also be N, where N is any integer greater than or equal to two, and N different first numbers are all used as emergency contact objects, and then the protection control information fed back by any one of the first numbers can trigger execution of the preset protection program and/or instruction. In a further specific embodiment, the protection control information fed back by different first numbers may also trigger different protection programs or instructions, respectively.
In one embodiment, before the determining the first number according to the call record in the preset period, that is, before step S2 shown in fig. 1, the method may further include:
s1: confirming that the second number set as the emergency contact object is an invalid number;
the second number is preset as an emergency contact object, and the invalid numbers include numbers which are valid before and invalid after, and invalid numbers which do not exist from beginning. The confirmation of the invalid number can be beneficial to timely re-determining the emergency contact object, so that the remote control is timely triggered, and the information in the mobile terminal is protected.
Referring to fig. 1, in one embodiment, the confirming that the second number set as the emergency contact object is an invalid number, i.e., step S1, includes:
s11: sending a second short message to a second terminal corresponding to the second number;
s13: and confirming that the second number is an invalid number according to the message return value information of the second message. In one embodiment, as shown in fig. 1, it may be determined whether the short message return value information is the transmission failure information, if so, the process proceeds to step S14: and confirming that the second number is an invalid number.
Wherein, the short message return value information may include at least one of the following fields: the system comprises sending success information, sending failure information, blacklist number information, content manual rejection information and the like, wherein a specific return value code corresponding to the sending success can be DELIVERD, a specific return value code corresponding to the sending failure can be UNDELIV, a specific return value code corresponding to the blacklist number can be BLACK, and a specific return value code corresponding to the content manual rejection can be NOSEND. By sending the failed return value, whether the second number is invalid or not can be timely and accurately judged, so that the first number is determined as soon as possible, and the time delay is avoided.
Referring to fig. 1, the step S1 may further include:
s12: and if the time for not obtaining the return information corresponding to the second short message reaches the preset time, confirming that the second number is an invalid number. The return information may include the return value information as an example, or may include the protection control information; the implementation mode judges whether the number is the invalid number by taking the preset time as a standard, and compared with the judgment of the short message return value information, the implementation mode has more applicable scenes. Meanwhile, in the embodiment illustrated in fig. 1, the step S12 and the step S13 may be used simultaneously, and they are not mutually exclusive.
In one embodiment, the second number may be a second number that is preset and set as an emergency contact object; in another optional embodiment, before the confirming that the second number set as the emergency contact object is the invalid number, that is, before step S1, the method may further include:
confirming the second number according to the call record in a preset period;
and setting the second number as the emergency contact object.
In this embodiment, the second number is also confirmed from the call log, and in this embodiment, the emergency contact object confirmed from the call log may be regarded as a number that is confirmed to be invalid, and a new emergency contact object is confirmed again from the call log. The embodiment widens the application scene and range of the alternative scheme of the invention, and the mobile terminal can determine the emergency contact object again for many times through circulation until the protection control information is received.
FIG. 2 is a schematic diagram of a mobile terminal according to the present invention; referring to fig. 2, there is provided a mobile terminal 11, including:
a number confirmation module 111, which confirms the first number according to the call record in the preset period;
a sending module 112, configured to send a first short message to a first terminal corresponding to the first number;
a receiving module 114, configured to receive protection control information obtained and sent by the first terminal 12 according to the first short message;
and the execution module 113 executes a preset program and/or instruction according to the protection control information.
The mobile terminal 11 provided by the present invention and its optional solutions can automatically determine the initiating end of remote control when other terminals are not matched or other matched terminals are invalid, and also complete remote control protection initiated at the first terminal 12 by means of receiving the protection control information obtained and sent by the first terminal 12 according to the first short message and executing a preset protection program or instruction according to the protection control information, thereby effectively preventing information leakage and the like.
The mobile terminal 11 is used to execute the information protection method of the mobile terminal provided by the present invention and its alternatives, so the specific variations and the achieved technical effects thereof can be understood with reference to the description of the information protection method of the mobile terminal provided by the alternatives.
Those of ordinary skill in the art will understand that: all or a portion of the steps of implementing the above-described method embodiments may be performed by hardware associated with program instructions. The program may be stored in a computer-readable storage medium. When executed, the program performs steps comprising the method embodiments described above; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.
Claims (6)
1. An information protection method of a mobile terminal, comprising:
sending a second short message to a second terminal corresponding to a second number set as an emergency contact object;
confirming that the second number is an invalid number according to the message return value information of the second message; or, if the time for not obtaining the return information corresponding to the second short message reaches the preset time, determining that the second number is an invalid number;
confirming a first number according to a call record in a preset period;
sending a first short message to a first terminal corresponding to the first number;
receiving protection control information which is obtained and sent by the first terminal according to the first short message;
executing a preset protection program and/or instruction according to the protection control information;
the determining the first number according to the call record in the preset period includes:
performing contact affinity sequencing on numbers contained in the call records according to the call duration, the call frequency, the call occurrence time, the call ending time, the outgoing call information and the incoming call information of the call records in a preset period, wherein the higher the sequencing is, the higher or lower the contact affinity is;
confirming that the number with the highest contact closeness is the first number;
the contact closeness is used for representing the closeness degree of the contact between the corresponding number and the user of the mobile terminal;
the executing a preset protection program and/or instruction according to the protection control information includes:
and acquiring current position information in real time and feeding back the current position information to the first terminal.
2. The method of claim 1, wherein before confirming that the second number set as the emergency contact object is an invalid number, further comprising:
confirming the second number according to the call record in a preset period;
and setting the second number as the emergency contact object.
3. The method according to any one of claims 1 to 2, wherein before sending the first short message to the first terminal corresponding to the first number, the method further comprises:
it is detected that the first identification card is replaced with another identification card.
4. The method according to any one of claims 1 to 2, wherein the executing of the preset protection program and/or instructions comprises: and locking the use authority of the mobile terminal.
5. The method according to any one of claims 1 to 2, wherein after confirming the first number according to the call record within the preset period, the method further comprises:
and updating and setting the emergency contact object as the first number.
6. A mobile terminal, comprising:
the number confirmation module is used for sending a second short message to a second terminal corresponding to a second number which is set as an emergency contact object; confirming that the second number is an invalid number according to the message return value information of the second message; or, if the time for not obtaining the return information corresponding to the second short message reaches the preset time, determining that the second number is an invalid number; confirming a first number according to a call record in a preset period;
the sending module is used for sending a first short message to a first terminal corresponding to the first number;
the receiving module is used for receiving the protection control information which is obtained and sent by the first terminal according to the first short message;
the execution module is used for confirming the first number according to the call record in the preset period; executing a preset program and/or instruction according to the protection control information;
the determining the first number according to the call record in the preset period includes:
performing contact affinity sequencing on numbers contained in the call records according to the call duration, the call frequency, the call occurrence time, the call ending time, the outgoing call information and the incoming call information of the call records in a preset period, wherein the higher the sequencing is, the higher or lower the contact affinity is;
confirming that the number with the highest contact closeness is the first number;
the contact closeness is used for representing the closeness degree of the contact between the corresponding number and the user of the mobile terminal;
the execution module is specifically configured to: and acquiring current position information in real time and feeding back the current position information to the first terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710473823.XA CN107343088B (en) | 2017-06-21 | 2017-06-21 | Information protection method of mobile terminal and mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710473823.XA CN107343088B (en) | 2017-06-21 | 2017-06-21 | Information protection method of mobile terminal and mobile terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107343088A CN107343088A (en) | 2017-11-10 |
CN107343088B true CN107343088B (en) | 2020-09-22 |
Family
ID=60220832
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710473823.XA Active CN107343088B (en) | 2017-06-21 | 2017-06-21 | Information protection method of mobile terminal and mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107343088B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110933222B (en) * | 2018-09-20 | 2022-05-10 | 中兴通讯股份有限公司 | Call control method, device, equipment and computer readable medium |
CN113347582B (en) * | 2021-06-08 | 2022-02-15 | 中国银行股份有限公司 | Loss reporting method and device for bank card agency |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102790819A (en) * | 2011-05-17 | 2012-11-21 | 芯讯通无线科技(上海)有限公司 | Mobile terminal capable of protecting privacy and method |
CN103220637A (en) * | 2012-01-19 | 2013-07-24 | 腾讯科技(深圳)有限公司 | Mobile phone anti-theft protection method and mobile phone anti-theft protection device |
CN102665020B (en) * | 2012-05-04 | 2015-05-13 | 中兴通讯股份有限公司 | Mobile terminal and antitheft method for same |
CN104080060B (en) * | 2013-03-25 | 2018-06-22 | 展讯通信(上海)有限公司 | The method that mobile terminal sends antitheft short message |
-
2017
- 2017-06-21 CN CN201710473823.XA patent/CN107343088B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN107343088A (en) | 2017-11-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107846679B (en) | Processing method and system for secondary number allocation of telephone number and operator system | |
CN104320756A (en) | Account information changing method and device | |
CN104021141B (en) | Method, device and system for data processing and cloud service | |
CN107343088B (en) | Information protection method of mobile terminal and mobile terminal | |
CN106201783A (en) | A kind of data reconstruction method and device | |
CN111626742A (en) | Transaction processing method and device | |
CN107295153B (en) | Management method and terminal for switching login accounts | |
CN107172194B (en) | Virtual SIM card management method and device and communication terminal | |
CN106657545A (en) | Method and device for intercepting push information, and terminal | |
CN104053137A (en) | Data recovery method and device | |
RU2015116527A (en) | METHOD FOR IMPLEMENTING ROAMING IN CASE OF DISTURBANCE OF FUNCTIONING OF DATA TRANSFER SERVICE IN MOBILE PHONE NETWORK | |
CN1980457A (en) | Network-side alarm-realizing method | |
CN107277251B (en) | Information protection method of mobile terminal and mobile terminal | |
EP2846528A1 (en) | Mobile terminal and anti-stolen method thereof | |
CN108601098B (en) | Network system identification method and device of dual-card terminal | |
WO2016176919A1 (en) | Attendance checking method and attendance checking server | |
EP4050509A1 (en) | User verification method and apparatus, electronic device and computer-readable medium | |
CN108834160B (en) | Method for determining use condition of user identity identification card and network equipment | |
CN105096501A (en) | Intelligent terminal device theft prevention method and intelligent terminal device | |
CN107633180B (en) | Data query method and system of public security system | |
CN107770734B (en) | Method and device for identifying mobile subscriber permanent station | |
CN108235268B (en) | Method and device for acquiring use times of IMEI (international mobile equipment identity) of call terminal | |
CN112004228A (en) | Real person authentication method and system | |
CN104618326A (en) | Information processing method and electronic device | |
CN109033858B (en) | Image protection method and device based on face recognition |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |