CN107635071A - A kind of theft preventing method, mobile terminal and computer-readable recording medium - Google Patents

A kind of theft preventing method, mobile terminal and computer-readable recording medium Download PDF

Info

Publication number
CN107635071A
CN107635071A CN201710906462.3A CN201710906462A CN107635071A CN 107635071 A CN107635071 A CN 107635071A CN 201710906462 A CN201710906462 A CN 201710906462A CN 107635071 A CN107635071 A CN 107635071A
Authority
CN
China
Prior art keywords
information
checking information
mobile terminal
unblock
default
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710906462.3A
Other languages
Chinese (zh)
Inventor
侯洪磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201710906462.3A priority Critical patent/CN107635071A/en
Publication of CN107635071A publication Critical patent/CN107635071A/en
Pending legal-status Critical Current

Links

Landscapes

  • Telephone Function (AREA)

Abstract

The invention provides a kind of theft preventing method, mobile terminal and computer-readable recording medium, it is related to technical field of mobile terminals.Wherein, this method includes:If mobile terminal detects shutdown command under screen lock state, validation information is prompted;The target location that mobile terminal is presently in is determined, and obtains the unblock checking information of input;Target location is matched with least one predeterminable area, and unblock checking information is matched with default checking information;If target location does not match with least one predeterminable area, and unlocks checking information and do not matched with default checking information, then antitheft information is exported.After mobile terminal detects shutdown command in screen locking in the present invention, if current location mismatches with predeterminable area, and unblock checking information input error, antitheft information can then be exported, without discovering stolen event by user, so as to remind user in time, the possibility for recovering mobile terminal is improved.

Description

A kind of theft preventing method, mobile terminal and computer-readable recording medium
Technical field
The present invention relates to technical field of mobile terminals, more particularly to a kind of theft preventing method, mobile terminal and computer-readable Storage medium.
Background technology
As the mobile terminal such as rapid development, mobile phone, tablet personal computer of science and technology has been increasingly becoming in people's life not The part that can or lack, the appearance of mobile terminal greatly facilitate interpersonal information interchange, and the life to people produces Revolutionary impact.However, because interests are driven, the stolen event of mobile terminal frequently occurs, and user is not only by wealth Production loss, while can also face the risk of data message leakage.
Generally, user, which is only capable of perceiving mobile terminal by the alertness of itself, is stolen, and when user's dispersion attention, The stolen event of mobile terminal can not often be perceived.Consequently, it is possible to after user has found that mobile terminal is stolen, criminal will There is time enough to crack the unblock checking information of mobile terminal, even if now user takes urgent measure, by mobile terminal The possibility given for change is also extremely low.
The content of the invention
The present invention provides a kind of theft preventing method, mobile terminal and computer-readable recording medium, with solve user fail and When discover mobile terminal and be stolen event, the problem of the difficulty increase for causing mobile terminal to be given for change.
First aspect, there is provided a kind of theft preventing method, applied to mobile terminal, this method includes:
If the mobile terminal detects shutdown command under screen lock state, validation information is prompted;
The target location that the mobile terminal is presently in is determined, and obtains the unblock checking information of input;
The target location is matched with least one predeterminable area, and by the unblock checking information with presetting Checking information is matched;
If the target location does not match with least one predeterminable area, and it is described unblock checking information with it is described Default checking information does not match, then exports antitheft information.
Second aspect, there is provided a kind of mobile terminal, the mobile terminal include:
Reminding module, if detecting shutdown command under screen lock state for the mobile terminal, prompt input validation Information;
Determining module, the target location being presently in for determining the mobile terminal, and obtain the unblock inputted and test Demonstrate,prove information;
Matching module, for the target location to be matched with least one predeterminable area, and by the unblock Checking information is matched with default checking information;
Anti-theft module, if do not matched with least one predeterminable area for the target location, and the unblock Checking information does not match with the default checking information, then exports antitheft information.
The third aspect, there is provided a kind of mobile terminal, the mobile terminal include processor, memory and be stored in described deposit On reservoir and the computer program that can run on the processor, realized when the computer program is by the computing device The step of theft preventing method of the present invention.
Fourth aspect, there is provided a kind of computer-readable recording medium, store on the computer-readable recording medium and calculate Machine program, the step of theft preventing method of the present invention is realized when computer program is executed by processor.
So, in embodiments of the present invention, when mobile terminal detects shutdown command under screen lock state, can prompt defeated Enter checking information, then can determine the target location that mobile terminal is presently in, and obtain unblock checking information, then when Target location does not match with least one predeterminable area, and unlocks checking information when not matched with default checking information, moves Terminal can export antitheft information immediately, discover stolen event by itself alertness without user, so as to right in time User is reminded, and improves the possibility for recovering mobile terminal.
Brief description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below by institute in the description to the embodiment of the present invention The accompanying drawing needed to use is briefly described, it should be apparent that, drawings in the following description are only some implementations of the present invention Example, for those of ordinary skill in the art, without having to pay creative labor, can also be according to these accompanying drawings Obtain other accompanying drawings.
Fig. 1 shows a kind of flow chart of theft preventing method in the embodiment of the present invention one;
Fig. 2 shows a kind of flow chart of theft preventing method in the embodiment of the present invention two;
Fig. 3 shows a kind of structured flowchart of mobile terminal in the embodiment of the present invention three;
Fig. 4 shows a kind of structured flowchart of anti-theft module in the embodiment of the present invention three;
Fig. 5 shows the structured flowchart of another anti-theft module in the embodiment of the present invention three;
Fig. 6 shows a kind of structured flowchart of mobile terminal in the embodiment of the present invention four;
Fig. 7 shows a kind of structured flowchart of mobile terminal in the embodiment of the present invention five.
Embodiment
The exemplary embodiment of the present invention is more fully described below with reference to accompanying drawings.Although the present invention is shown in accompanying drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the present invention without should be by embodiments set forth here Limited.Conversely, there is provided these embodiments are to be able to be best understood from the present invention, and can be by the scope of the present invention Completely it is communicated to those skilled in the art.
Embodiment one
Reference picture 1, the flow chart of the theft preventing method of the embodiment of the present invention one is shown, specifically may include steps of:
Step 101, if mobile terminal detects shutdown command under screen lock state, validation information is prompted.
In embodiments of the present invention, in order to protect privacy information, user would generally be that mobile terminal sets unblock checking letter Breath, after mobile terminal screen locking, only correctly unblock checking information, mobile terminal can just solve screen, and then user's ability for input Other operations can be carried out in interface of mobile terminal.However, because criminal's pilferage mobile terminal afterwards first can be direct Shutdown, and any remedial measure all will be of no avail after shutting down, therefore, mobile terminal must assure that under unlocking screen state It could shut down, that is to say and must be first unlocked to shutdown.
User can carry out power-off operation by modes such as long-press power keys, enter when mobile terminal is in screen lock state And mobile terminal can detect shutdown command, mobile terminal can show the input window of unblock checking information afterwards, so as to User is prompted to input unblock checking information.
Step 102, the target location that mobile terminal is presently in is determined, and obtains the unblock checking information of input.
In embodiments of the present invention, mobile terminal can position to the target location being presently in, and obtain and use The unblock checking information of family input, the unblock checking information can include fingerprint image, facial image, Serial No., touch screen rail At least one of mark and voice signal.
Step 103, target location is matched with least one predeterminable area, and checking information will be unlocked with presetting Checking information is matched.
In embodiments of the present invention, user can set safety zone list in the terminal in advance, and user can incite somebody to action The region of oneself frequent activity, and oneself think will not the region of lost mobile terminal add into the safety zone list, So as to which at least one predeterminable area, namely at least one safety zone can be stored in mobile terminal.
Mobile terminal, can be by the target location and safety place list after the target location for determining to be presently in In at least one predeterminable area matched, namely be to determine the target location whether be located at any predeterminable area in, work as shifting When dynamic terminal determines that the target location is located in any predeterminable area, it may be determined that target location matches with the predeterminable area, When mobile terminal determines that the target location is not located in any predeterminable area, it may be determined that target location and any preset areas Domain does not match.
In addition, mobile terminal after unblock checking information is got, can be verified the unblock checking information with default Information, namely the unblock checking information that user is set in advance in the terminal are matched, when the unblock checking information and in advance If checking information is consistent, it may be determined that the unblock checking information matches with default checking information, when the unblock checking information with When default checking information is inconsistent, it may be determined that the unblock checking information does not match with default checking information.
Step 104, if target location does not match with least one predeterminable area, and checking information and default checking are unlocked Information does not match, then exports antitheft information.
In embodiments of the present invention, when target location does not match with least one predeterminable area, and checking information is unlocked When not matched with default checking information, it is believed that mobile terminal is currently located at the seldom movable region of user, while unblock is tested Information input error is demonstrate,proved, at this point it is possible to think mobile terminal not in user's hand, but has been stolen, has fallen into illegal point In sub- hand, and then mobile terminal can export antitheft information, for example ring alarm bell, dial preset number etc..
In embodiments of the present invention, when mobile terminal detects shutdown command under screen lock state, input can be prompted to test Information is demonstrate,proved, then can determine the target location that mobile terminal is presently in, and obtains unblock checking information, then works as target Position does not match with least one predeterminable area, and unlocks checking information when not matched with default checking information, mobile terminal Antitheft information can be exported immediately, stolen event is discovered by itself alertness without user, so as in time to user Reminded, improve the possibility for recovering mobile terminal.
Embodiment two
Reference picture 2, the flow chart of the theft preventing method of the embodiment of the present invention two is shown, specifically may include steps of:
Step 201, if mobile terminal detects shutdown command under screen lock state, validation information is prompted.
This step is similar with the implementation process of above-mentioned steps 101, will not be described in detail herein.
For example, when mobile terminal detects shutdown command under screen lock state, a prompt window can be shown, to prompt to use Checking information needed for the input unblock of family.
Step 202, the target location that mobile terminal is presently in is determined.
In embodiments of the present invention, when mobile terminal can detect shutdown command under screen lock state, mobile terminal is worked as Preceding residing target location.
For example, the target location that mobile terminal can determine to be presently in is A.
Step 203, target location is matched with least one predeterminable area.
In embodiments of the present invention, mobile terminal can by the target location, with the safety zone list of storage extremely A few predeterminable area is matched, wherein, matching process can include:For any default at least one predeterminable area Region, determine attaching relation of the target location relative to the predeterminable area;If target location is not belonging to the predeterminable area, it is determined that Target location does not match with the predeterminable area;If target location belongs to the predeterminable area, it is determined that target location and the preset areas Domain matches.So as to which whether the position that mobile terminal can be determined to be presently in is in predeterminable area, that is to say to determine Go out current mobile terminal whether in the user often region of activity.
It should be noted that user can by with home address, business address, relatives and the home address of friend, Centered on the business's regional address often gone or gymnasium address etc., preset areas is arranged to by radius area defined of preset length Domain, and being stored in the safety zone list of mobile terminal, so as to which to determine that target location is not belonging to any pre- when mobile terminal If during region, it may be determined that mobile terminal is stolen.
For example, the safety zone list in mobile terminal can be safety zone list as shown in table 1 below, mobile terminal Target location A can be matched with all predeterminable areas in safety zone list as shown in table 1 below.
Table 1
Safety zone list
Home area B
Work unit region C
Gymnasium region D
……
It should be noted that the embodiment of the present invention only illustrates by taking safety zone list as listed in Table 1 as an example, such as Safety zone list shown in upper table 1 is not formed to the present invention to be limited.
Step 204, if target location does not match with least one predeterminable area, the unblock checking letter of input is obtained Breath.
In embodiments of the present invention, when target location does not match with least one predeterminable area in the list of safety zone When, mobile terminal can show the input window of unblock checking information, so as to prompt user to input unblock checking information, Jin Eryi Dynamic terminal can get the unblock checking information of user's input.
For example, target location A and home area B, the work unit region C in safety zone list as listed in Table 1 Do not matched with gymnasium region D, now mobile terminal can obtain unblock fingerprint image ZW.
Step 205, unblock checking information is matched with default checking information.
In embodiments of the present invention, for different types of unblock checking information, mobile terminal will unlock checking information with The process that default checking information is matched can be different, below for different types of unblock checking information, to difference Matching process illustrate.
When unblock checking information includes fingerprint image, the implementation of this step can be the first following match party Formula, including:It is determined that the characteristic matching degree between unblock fingerprint image and preset fingerprint image;If this feature matching degree is less than default Matching degree, it is determined that unblock fingerprint image does not match with preset fingerprint image;If this feature matching degree is more than or equal to default With degree, it is determined that unblock fingerprint image and preset fingerprint images match.
In the first above-mentioned matching way, mobile terminal can pre-process to unblock fingerprint image first, so as to Improve unblock fingerprint image quality, improve the precision of Finger print characteristic abstract, then mobile terminal can enter to unblock fingerprint image Row Finger print characteristic abstract, and then the fingerprint characteristic in preset fingerprint image that the fingerprint characteristic of extraction is previously stored with user is entered Row matching, and determine to unlock the characteristic matching degree between fingerprint image and preset fingerprint image.Wherein, the first above-mentioned match party Formula can be realized by default algorithm for recognizing fingerprint in mobile terminal.
When unblock checking information includes facial image, the implementation of this step can be following second of match party Formula, including:It is determined that the characteristic matching degree between unblock facial image and default facial image;If this feature matching degree is less than default Matching degree, it is determined that unblock facial image does not match with default facial image;If this feature matching degree is more than or equal to default With degree, it is determined that unblock facial image matches with default facial image.
Similar with the matching process of fingerprint image in above-mentioned second of matching way, mobile terminal first can be to solution Lock facial image is pre-processed, and so as to improve unblock quality of human face image, is improved the precision of face characteristic extraction, is then moved Terminal can carry out face characteristic extraction to unblock facial image, and then the face characteristic of extraction is previously stored with user pre- If the face characteristic in facial image is matched, and determines to unlock the characteristic matching between facial image and default facial image Degree.Wherein, above-mentioned second of matching way can be realized by default face recognition algorithms in mobile terminal.
When unblock checking information includes Serial No., the implementation of this step can be the third following match party Formula, including:Unblock Serial No. is contrasted with preset number sequence;If unblock Serial No. differs with preset number sequence Cause, it is determined that unblock Serial No. does not match with preset number sequence;If it is consistent with preset number sequence to unlock Serial No., It is determined that unblock Serial No. and preset number sequences match.
When unblock checking information includes touch screen track, the implementation of this step can be following 4th kind of match parties Formula, including:Unblock touch screen track is contrasted with default touch screen track;If unblock touch screen track is not passed through according to preset order At least one default key point in default touch screen track, it is determined that unblock touch screen track does not match with default touch screen track;If Touch screen track is unlocked according to preset order by least one default key point in default touch screen track, it is determined that unblock touch screen Track and default touch screen path matching.
When unblock checking information includes voice signal, the implementation of this step can be following 5th kind of match parties Formula, including:It is determined that the characteristic matching degree between unblock voice signal and preset sound signal;If this feature matching degree is less than default Matching degree, it is determined that unblock voice signal does not match with preset sound signal;If this feature matching degree is more than or equal to default With degree, it is determined that unblock voice signal and preset sound Signal Matching.
In above-mentioned 5th kind of matching way, mobile terminal can pre-process to unblock voice signal first, so as to Improve unblock sound signal quality, improve the precision of vocal print feature extraction, then mobile terminal can enter to unblock voice signal Row vocal print feature is extracted, and then the vocal print feature in preset sound signal that the vocal print feature of extraction is previously stored with user is entered Row matching, and determine to unlock the characteristic matching degree between voice signal and preset sound signal.Wherein, above-mentioned 5th kind of match party Formula can be realized by default voiceprint recognition algorithm in mobile terminal.
It should be noted that unblock checking information can include fingerprint image, facial image, Serial No., touch screen track Any one of with voice signal, it is of course also possible to including fingerprint image, facial image, Serial No., touch screen track and sound The combination of any number of passwords of signal, the embodiment of the present invention are not especially limited to this.In addition, in actual applications, unblock Checking information can also be the password type outside fingerprint image, facial image, Serial No., touch screen track and voice signal, The embodiment of the present invention is equally not especially limited to this.
For example, mobile terminal can determine that the characteristic matching degree between fingerprint image ZW and pre-set image YS is 20%, enter And mobile terminal can determine that this feature matching degree 20% is less than preset matching degree 80%, then mobile terminal can determine fingerprint image As ZW and pre-set image YS are not matched.
Step 206, if unblock checking information does not match with default checking information, timing is started.
In embodiments of the present invention, if target location does not match with least one predeterminable area, and checking information is unlocked Do not matched with default checking information, then start timing, so as to when user inputs correct password in time, then determine to move Terminal is not stolen, and then mobile terminal can solve screen.
For example, mobile terminal can determine that unlocking fingerprint image ZW and preset fingerprint image YS does not match, so it is mobile Terminal can the timing since current time.
Step 207, the errors number in the first preset duration is determined;The errors number is to get and default checking information The number of unmatched unblock checking information.
In embodiments of the present invention, mobile terminal is after by the first preset duration, it may be determined that the first preset duration The number with the unmatched unblock checking information of default checking information is inside got, that is to say can determine that user is pre- first If input the number of unblock checking information in duration by mistake.
For example, mobile terminal can determine that the errors number in the first preset duration 1.5 minutes is 9.
Step 208, if not getting the unblock checking information to match with default checking information in the first preset duration, and The errors number is more than preset times, then exports antitheft information.
In embodiments of the present invention, when mobile terminal is not got and default checking information phase in the first preset duration The unblock checking information matched somebody with somebody, and in the first preset duration unblock checking information errors number when being more than preset times, mobile end End can export antitheft information.
Optionally, in actual applications, for some using mobile terminal more frequently user, such user generally every The a bit of time will use mobile terminal, therefore, mobile whole in order to further improve the accuracy rate for determining that mobile terminal is stolen End can also perform following step after step 206 before step 208, including:It is determined that during interval between current time It is long minimum, and the solution screen time before current time.If so as to not got and default checking information in the first preset duration The unblock checking information to match, and the interval duration between the solution screen time and current time is more than the second preset duration, then Mobile terminal can export antitheft information.
It should be noted that even with mobile terminal more frequently user, the time of having a rest at night is generally also Mobile terminal will not be just used every a bit of time, therefore, user can independently set a period, such as at early 7 points to late 23 Point, so as within the period, the step of mobile terminal can perform the above-mentioned determination solution screen time, or within the period, Mobile terminal just performs the theft preventing method including the step of above-mentioned determination solution screen time, and is not held then outside the period The step of row above-mentioned determination solution screen time, so as to reduce the False Rate of stolen event, it is further able to improve determination movement The stolen accuracy rate of terminal.
It should also be noted that, the step of above-mentioned determination solution screen time, can perform before step 207, can also be in step Perform after rapid 207, that is to say after determining that unlock checking information does not match with default checking information, mobile terminal can be with Errors number and solution screen time are determined, if so as to not get the solution to match with default checking information in the first preset duration Checking information is locked, errors number is more than preset times, and it is pre- more than second to solve the interval duration between screen time and current time If duration, then mobile terminal can export antitheft information, that is to say exported again when mobile terminal meets a variety of stolen conditions it is antitheft Information, so as to improve the accuracy rate for determining that mobile terminal is stolen.
Optionally, the step of above-mentioned determination solution screen time can be superimposed execution with step 207, that is to say that mobile terminal can be with Both the step of having performed the above-mentioned determination solution screen time, step 207 is also performed, certainly, in actual applications, mobile terminal can also be After performing step 206, the step of only performing the above-mentioned determination solution screen time, without performing step 207, it that is to say default to first Errors number in duration is without statistics, and whether the interval duration being to determine between solution screen time and current time is more than the Two preset durations, if so as to not get the unblock checking information to match with default checking information in the first preset duration, and Interval duration between the solution screen time and current time is more than the second preset duration, then mobile terminal can export antitheft letter Breath, the embodiment of the present invention are not specifically limited to this.
Optionally, mobile terminal can perform step 207 and step 208 after step 206, certainly, in practical application In, mobile terminal can also directly after step 206, if namely in target location and at least one predeterminable area not Match somebody with somebody, and unlock checking information and do not matched with default checking information, then after starting the step of timing, perform following step:If the The unblock checking information to match with default checking information is not got in one preset duration, then exports antitheft information.
In addition, the step of exporting antitheft information at least one of comprises the following steps:
(1) prompted by default alarm bell.
(2) scene image is gathered by camera, and sent scene image and target location to default postal by network Case, or it is uploaded to default network address.
(3) stolen circular mail is sent to default mailbox by network.
(4) stolen notification message is sent to preset number.
(5) preset number is dialed.
Wherein, for the antitheft step for needing to perform by network, than second as described above with the third antitheft step, use Family can set the priority of mobile network and wireless network in advance in mobile terminal, when mobile network is prior to wireless network When, mobile terminal can be with preferential attachment mobile network after stolen event is determined, and exports antitheft letter by mobile network Breath, when wireless network is prior to mobile network, mobile terminal with automatically scanning and can connect after stolen event is determined The available wireless network of surrounding, and antitheft information is exported by wireless network.
By exporting antitheft information, user can know the stolen event of mobile terminal in time, and then can take alarm Etc. stringent effort, mobile terminal is recovered, so as to avoid property loss and information leakage.
So far, can be to being presently in position, unblock checking information after mobile terminal detects shutdown command in screen locking The number inputed by mistake with unblock checking information carries out comprehensive descision, antitheft information can be exported immediately afterwards, without by user Stolen event is discovered, so as to remind user in time, it is possible to increase the possibility for recovering mobile terminal, while can also improve Determine that mobile terminal is stolen the accuracy rate of event.
For example, mobile terminal can determine that the first preset duration is not got and preset fingerprint image YS phases in 1.5 minutes The unblock fingerprint image of matching, and the mobile terminal errors number 9 that can determine in the first preset duration 1.5 minutes be more than it is default Number 7, and then mobile terminal can be prompted by default alarm bell, and with 2 minutes for the cycle, scene is gathered by camera Image, and sent scene image and current target location A to default mailbox by mobile network.
In embodiments of the present invention, when mobile terminal detects shutdown command under screen lock state, input can be prompted to test Information is demonstrate,proved, then can determine the target location that mobile terminal is presently in, and obtains unblock checking information, then works as target Position does not match with least one predeterminable area, and unlocks checking information when not matched with default checking information, mobile terminal Antitheft information can be exported immediately, stolen event is discovered by itself alertness without user, so as in time to user Reminded, improve the possibility for recovering mobile terminal.
Embodiment three
Reference picture 3, a kind of structured flowchart of mobile terminal 300 of the embodiment of the present invention three is shown, can specifically be included:
Reminding module 301, if detecting shutdown command under screen lock state for the mobile terminal, input is prompted to test Demonstrate,prove information;
Determining module 302, the target location being presently in for determining the mobile terminal, and obtain the unblock of input Checking information;
Matching module 303, for the target location to be matched with least one predeterminable area, and by the solution Lock checking information is matched with default checking information;
Anti-theft module 304, if do not matched with least one predeterminable area for the target location, and the solution Lock checking information does not match with the default checking information, then exports antitheft information.
Optionally, reference picture 4, the anti-theft module 304 include:
Timing submodule 3041, if do not matched with least one predeterminable area for the target location, and institute State unblock checking information not match with the default checking information, then start timing;
Antitheft submodule 3042, if for not getting what is matched with the default checking information in the first preset duration Checking information is unlocked, then exports antitheft information.
Optionally, reference picture 4, the anti-theft module 304 also include:
First determination sub-module 3043, for determining the errors number in the first preset duration;The errors number is to obtain Get the number with the default unmatched unblock checking information of checking information;
Accordingly, the antitheft submodule 3042 includes:
First anti-theft 30421, if for not got in the first preset duration and the default checking information phase The unblock checking information matched somebody with somebody, and the errors number is more than preset times, then exports antitheft information.
Optionally, reference picture 4, the anti-theft module 304 also include:
Second determination sub-module 3044, it is minimum for the interval duration between determination and current time, and described current The solution screen time before time;
Accordingly, the antitheft submodule 3042 includes:
Second anti-theft 30422, if for not got in the first preset duration and the default checking information phase The unblock checking information matched somebody with somebody, and the interval duration between the solution screen time and the current time is more than the second preset duration, Then export antitheft information.
Optionally, reference picture 5, the anti-theft module 304 include at least one of following submodule:
Prompting submodule 3045, for being prompted by default alarm bell;
Gather submodule 3046, for gathering scene image by camera, and by network by the scene image and The target location is sent to default mailbox, or is uploaded to default network address;
First sending submodule 3047, for sending stolen circular mail to the default mailbox by network;
Second sending submodule 3048, for sending stolen notification message to preset number;
Submodule 3049 is dialed, for dialing the preset number.
In embodiments of the present invention, when mobile terminal detects shutdown command under screen lock state, input can be prompted to test Information is demonstrate,proved, then can determine the target location that mobile terminal is presently in, and obtains unblock checking information, then works as target Position does not match with least one predeterminable area, and unlocks checking information when not matched with default checking information, mobile terminal Antitheft information can be exported immediately, stolen event is discovered by itself alertness without user, so as in time to user Reminded, improve the possibility for recovering mobile terminal.
Example IV
Fig. 6 is the block diagram of the mobile terminal of another embodiment of the present invention.Mobile terminal 600 shown in Fig. 6 includes:At least One processor 601, memory 602, at least one network interface 604 and user interface 603.It is each in mobile terminal 600 Component is coupled by bus system 605.It is understood that bus system 605 is used to realize that the connection between these components is led to Letter.Bus system 605 is in addition to including data/address bus, in addition to power bus, controlling bus and status signal bus in addition.But it is For the sake of clear explanation, in figure 6 various buses are all designated as bus system 605.
Wherein, user interface 603 can include display, keyboard or pointing device (for example, mouse, trace ball (trackball), touch-sensitive plate or flexible screen etc..
It is appreciated that the memory 602 in the embodiment of the present invention can be volatile memory or nonvolatile memory, Or it may include both volatibility and nonvolatile memory.Wherein, nonvolatile memory can be read-only storage (Read- Only Memory, ROM), programmable read only memory (Programmable ROM, PROM), the read-only storage of erasable programmable Device (Erasable PROM, EPROM), Electrically Erasable Read Only Memory (Electrically EPROM, EEPROM) or Flash memory.Volatile memory can be random access memory (Random Access Memory, RAM), and it is used as outside high Speed caching.By exemplary but be not restricted explanation, the RAM of many forms can use, such as static RAM (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), Synchronous Dynamic Random Access Memory (Synchronous DRAM, SDRAM), double data speed synchronous dynamic RAM (Double Data Rate SDRAM, DDRSDRAM), enhanced Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronized links Dynamic random access memory (Synchlink DRAM, SLDRAM) and direct rambus random access memory (Direct Rambus RAM, DRRAM).The embodiment of the present invention description system and method memory 602 be intended to including but not limited to these With the memory of any other suitable type.
In some embodiments, memory 602 stores following element, can perform module or data structure, or Their subset of person, or their superset:Operating system 6021 and application program 6022.
Wherein, operating system 6021, comprising various system programs, such as ccf layer, core library layer, driving layer etc., it is used for Realize various basic businesses and the hardware based task of processing.Application program 6022, include various application programs, such as media Player (Media Player), browser (Browser) etc., for realizing various applied business.Realize the embodiment of the present invention The program of method may be embodied in application program 6022.
In embodiments of the present invention, by calling program or the instruction of the storage of memory 602, specifically, can be application The program stored in program 6022 or instruction, processor 601 are used for:If the mobile terminal detects shutdown under screen lock state Instruction, then prompt validation information;The target location that the mobile terminal is presently in is determined, and obtains the unblock of input Checking information;The target location is matched with least one predeterminable area, and by the unblock checking information and in advance If checking information is matched;If the target location does not match with least one predeterminable area, and the unblock is tested Card information does not match with the default checking information, then exports antitheft information.
The method that the embodiments of the present invention disclose can apply in processor 601, or be realized by processor 601. Processor 601 is probably a kind of IC chip, has the disposal ability of signal.In implementation process, the above method it is each Step can be completed by the integrated logic circuit of the hardware in processor 601 or the instruction of software form.Above-mentioned processing Device 601 can be general processor, digital signal processor (Digital Signal Processor, DSP), special integrated electricity Road (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field Programmable Gate Array, FPGA) either other PLDs, discrete gate or transistor logic, Discrete hardware components.It can realize or perform disclosed each method, step and the logic diagram in the embodiment of the present invention.It is general Processor can be microprocessor or the processor can also be any conventional processor etc..With reference to institute of the embodiment of the present invention The step of disclosed method, can be embodied directly in hardware decoding processor and perform completion, or with the hardware in decoding processor And software module combination performs completion.Software module can be located at random access memory, flash memory, read-only storage, may be programmed read-only In the ripe storage medium in this area such as memory or electrically erasable programmable memory, register.The storage medium is located at Memory 602, processor 601 read the information in memory 602, with reference to the step of its hardware completion above method.
It is understood that the embodiment of the present invention description these embodiments can use hardware, software, firmware, middleware, Microcode or its combination are realized.Realized for hardware, processing unit can be realized in one or more application specific integrated circuits (Application Specific Integrated Circuits, ASIC), digital signal processor (Digital Signal Processing, DSP), digital signal processing appts (DSP Device, DSPD), programmable logic device (Programmable Logic Device, PLD), field programmable gate array (Field-Programmable Gate Array, FPGA), general place Manage in device, controller, microcontroller, microprocessor, other electronic units for performing herein described function or its combination.
For software realize, can by perform the module (such as process, function etc.) of function described in the embodiment of the present invention come Realize the technology described in the embodiment of the present invention.Software code is storable in memory and passes through computing device.Memory can To realize within a processor or outside processor.
Optionally, the processor 601 is additionally operable to:If the target location and at least one predeterminable area are not Match somebody with somebody, and the unblock checking information does not match with the default checking information, then starts timing;If do not obtained in the first preset duration The unblock checking information to match with the default checking information is got, then exports antitheft information.
Optionally, the processor 601 is additionally operable to:Determine the errors number in the first preset duration;The errors number To get the number with the default unmatched unblock checking information of checking information;Accordingly, if described first is default Do not get the unblock checking information to match with the default checking information in long, then the step of exporting antitheft information, including: If the unblock checking information to match with the default checking information is not got in the first preset duration, and the errors number More than preset times, then antitheft information is exported.
Optionally, the processor 601 is additionally operable to:It is determined that the interval duration between current time is minimum, and described The solution screen time before current time;Accordingly, if not got in first preset duration and the default checking information The unblock checking information to match, then the step of exporting antitheft information, including:If do not got in the first preset duration with it is described The unblock checking information that default checking information matches, and described solve is grown up when shielding the interval between time and the current time In the second preset duration, then antitheft information is exported.
Optionally, the processor 601 is additionally operable to perform at least one of following steps:Carried by default alarm bell Show;Scene image is gathered by camera, and sent the scene image and the target location to default postal by network Case, or it is uploaded to default network address;Stolen circular mail is sent to the default mailbox by network;Sent to preset number stolen Notification message;Dial the preset number.
Mobile terminal 600 can realize each process that mobile terminal is realized in previous embodiment, to avoid repeating, here Repeat no more.In the embodiment of the present invention, when mobile terminal 600 detects shutdown command under screen lock state, it can prompt to input Checking information, the target location that mobile terminal is presently in then can be determined, and obtain unblock checking information, then work as mesh Cursor position does not match with least one predeterminable area, and unlocks checking information when not matched with default checking information, mobile end End can export antitheft information immediately, discover stolen event by itself alertness without user, so as in time to Family is reminded, and improves the possibility for recovering mobile terminal.
Embodiment five
Fig. 7 is the structural representation of the mobile terminal of another embodiment of the present invention.Specifically, the mobile terminal in Fig. 7 700 can be mobile phone, tablet personal computer, personal digital assistant (Personal Digital Assistant, PDA) or vehicle mounted electric Brain etc..
Mobile terminal 700 in Fig. 7 includes radio frequency (Radio Frequency, RF) circuit 710, memory 720, input Unit 730, display unit 740, processor 760, voicefrequency circuit 770, WLAN (Wireless Fidelity) module 780 and power supply 790.
Wherein, input block 730 can be used for the numeral or character information for receiving user's input, and generation and mobile terminal The signal input that 700 user is set and function control is relevant.Specifically, in the embodiment of the present invention, the input block 730 can With including contact panel 731.Contact panel 731, collecting touch operation of the user on or near it, (for example user uses hand The operation of any suitable object such as finger, stylus or annex on contact panel 731), and driven according to formula set in advance Corresponding attachment means.Optionally, contact panel 731 may include both touch detecting apparatus and touch controller.Wherein, Touch detecting apparatus detects the touch orientation of user, and detects the signal that touch operation is brought, and transmits a signal to touch control Device;Touch controller receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives the processor 760, and the order sent of reception processing device 760 and can be performed.Furthermore, it is possible to use resistance-type, condenser type, infrared ray with And the polytype such as surface acoustic wave realizes contact panel 731.Except contact panel 731, input block 730 can also include other Input equipment 732, other input equipments 732 can include but is not limited to physical keyboard, function key (such as volume control button, Switch key etc.), trace ball, mouse, the one or more in action bars etc..
Wherein, display unit 740 can be used for display by the information of user's input or be supplied to information and the movement of user The various menu interfaces of terminal 700.Display unit 740 may include display panel 741, optionally, can use LCD or organic hairs The forms such as optical diode (Organic Light-Emitting Diode, OLED) configure display panel 741.
It should be noted that contact panel 731 can cover display panel 741, touch display screen is formed, when the touch display screen is examined After measuring the touch operation on or near it, processor 760 is sent to determine the type of touch event, is followed by subsequent processing device 760 provide corresponding visual output according to the type of touch event in touch display screen.
Touch display screen includes Application Program Interface viewing area and conventional control viewing area.The Application Program Interface viewing area And arrangement mode of the conventional control viewing area does not limit, can be arranged above and below, left-right situs etc. can distinguish two it is aobvious Show the arrangement mode in area.The Application Program Interface viewing area is displayed for the interface of application program.Each interface can be with The interface element such as the icon comprising at least one application program and/or widget desktop controls.The Application Program Interface viewing area It can also be the empty interface not comprising any content.The conventional control viewing area is used to show the higher control of utilization rate, for example, Application icons such as settings button, interface numbering, scroll bar, phone directory icon etc..
Wherein processor 760 is the control centre of mobile terminal 700, utilizes various interfaces and connection whole mobile phone Various pieces, by running or performing the software program and/or module that are stored in first memory 721, and call storage Data in second memory 722, the various functions and processing data of mobile terminal 700 are performed, so as to mobile terminal 700 Carry out integral monitoring.Optionally, processor 760 may include one or more processing units.
In embodiments of the present invention, by call store the first memory 721 in software program and/or module and/ Or the data in the second memory 722, processor 760 are used for:If the mobile terminal detects shutdown under screen lock state Instruction, then prompt validation information;The target location that the mobile terminal is presently in is determined, and obtains the unblock of input Checking information;The target location is matched with least one predeterminable area, and by the unblock checking information and in advance If checking information is matched;If the target location does not match with least one predeterminable area, and the unblock is tested Card information does not match with the default checking information, then exports antitheft information.
Optionally, the processor 760 is additionally operable to:If the target location and at least one predeterminable area are not Match somebody with somebody, and the unblock checking information does not match with the default checking information, then starts timing;If do not obtained in the first preset duration The unblock checking information to match with the default checking information is got, then exports antitheft information.
Optionally, the processor 760 is additionally operable to:Determine the errors number in the first preset duration;The errors number To get the number with the default unmatched unblock checking information of checking information;Accordingly, if described first is default Do not get the unblock checking information to match with the default checking information in long, then the step of exporting antitheft information, including: If the unblock checking information to match with the default checking information is not got in the first preset duration, and the errors number More than preset times, then antitheft information is exported.
Optionally, the processor 760 is additionally operable to:It is determined that the interval duration between current time is minimum, and described The solution screen time before current time;Accordingly, if not got in first preset duration and the default checking information The unblock checking information to match, then the step of exporting antitheft information, including:If do not got in the first preset duration with it is described The unblock checking information that default checking information matches, and described solve is grown up when shielding the interval between time and the current time In the second preset duration, then antitheft information is exported.
Optionally, the processor 760 is additionally operable to perform at least one of following steps:Carried by default alarm bell Show;Scene image is gathered by camera, and sent the scene image and the target location to default postal by network Case, or it is uploaded to default network address;Stolen circular mail is sent to the default mailbox by network;Sent to preset number stolen Notification message;Dial the preset number.
It can be seen that in the embodiment of the present invention, when mobile terminal 700 detects shutdown command under screen lock state, can prompt Validation information, the target location that mobile terminal is presently in then can be determined, and obtain unblock checking information, then When target location does not match with least one predeterminable area, and unblock checking information does not match with default checking information, move Dynamic terminal can export antitheft information immediately, stolen event be discovered by itself alertness without user, so as to timely User is reminded, improves the possibility for recovering mobile terminal.
For said apparatus embodiment, because it is substantially similar to embodiment of the method, so description is fairly simple, The relevent part can refer to the partial explaination of embodiments of method.
Embodiment six
Preferably, the embodiment of the present invention also provides a kind of mobile terminal, including processor, memory, is stored in memory Computer program that is upper and can running on the processor, the computer program realize above-mentioned antitheft square when being executed by processor Each process of method embodiment, and identical technique effect can be reached, to avoid repeating, repeat no more here.
Embodiment seven
The embodiment of the present invention also provides a kind of computer-readable recording medium, and meter is stored with computer-readable recording medium Calculation machine program, the computer program realize each process of above-mentioned theft preventing method embodiment when being executed by processor, and can reach Identical technique effect, to avoid repeating, repeat no more here.Wherein, described computer-readable recording medium, deposited Ru read-only Reservoir (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation RAM), Magnetic disc or CD etc..
Each embodiment in this specification is described by the way of progressive, what each embodiment stressed be with The difference of other embodiment, between each embodiment identical similar part mutually referring to.
It would have readily occurred to a person skilled in the art that be:Any combination application of above-mentioned each embodiment is all feasible, therefore Any combination between above-mentioned each embodiment is all embodiment of the present invention, but this specification exists as space is limited, This is not just detailed one by one.
Theft preventing method is not inherently related to any certain computer, virtual system or miscellaneous equipment provided herein.Respectively Kind general-purpose system can also be used together with teaching based on this.As described above, construct with the present invention program's Structure required by system is obvious.In addition, the present invention is not also directed to any certain programmed language.It should be understood that can To realize the content of invention described herein using various programming languages, and the description done above to language-specific be for Disclose the preferred forms of the present invention.
In the specification that this place provides, numerous specific details are set forth.It is to be appreciated, however, that the implementation of the present invention Example can be put into practice in the case of these no details.In some instances, known method, structure is not been shown in detail And technology, so as not to obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify the present invention and help to understand one or more of each inventive aspect, Above in the description to the exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes In example, figure or descriptions thereof.However, the method for the disclosure should be construed to reflect following intention:I.e. required guarantor The application claims of shield features more more than the feature being expressly recited in each claim.More precisely, such as right As claim reflects, inventive aspect is all features less than single embodiment disclosed above.Therefore, it then follows tool Thus claims of body embodiment are expressly incorporated in the embodiment, wherein the conduct of each claim in itself The separate embodiments of the present invention.
Those skilled in the art, which are appreciated that, to be carried out adaptively to the module in the equipment in embodiment Change and they are arranged in one or more equipment different from the embodiment.Can be the module or list in embodiment Member or component be combined into a module or unit or component, and can be divided into addition multiple submodule or subelement or Sub-component.In addition at least some in such feature and/or process or unit exclude each other, it can use any Combination is disclosed to all features disclosed in this specification (including adjoint claim, summary and accompanying drawing) and so to appoint Where all processes or unit of method or equipment are combined.Unless expressly stated otherwise, this specification (including adjoint power Profit requires, summary and accompanying drawing) disclosed in each feature can be by providing the alternative features of identical, equivalent or similar purpose come generation Replace.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments In included some features rather than further feature, but the combination of the feature of different embodiments means in of the invention Within the scope of and form different embodiments.For example, in detail in the claims, embodiment claimed it is one of any Mode it can use in any combination.
The all parts embodiment of the present invention can be realized with hardware, or to be run on one or more processor Software module realize, or realized with combinations thereof.It will be understood by those of skill in the art that it can use in practice Microprocessor either digital signal processor (DSP) come realize in theft preventing method according to embodiments of the present invention some or it is complete The some or all functions of portion's part.The present invention be also implemented as a part for performing method as described herein or Person whole equipment or program of device (for example, computer program and computer program product).It is such to realize the present invention's Program can store on a computer-readable medium, or can have the form of one or more signal.Such signal It can download and obtain from internet website, either provide on carrier signal or provided in the form of any other.
It should be noted that the present invention will be described rather than limits the invention for above-described embodiment, and ability Field technique personnel can design alternative embodiment without departing from the scope of the appended claims.In the claims, Any reference symbol between bracket should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not Element or step listed in the claims.Word "a" or "an" before element does not exclude the presence of multiple such Element.The present invention can be by means of including the hardware of some different elements and being come by means of properly programmed computer real It is existing.In if the unit claim of equipment for drying is listed, several in these devices can be by same hardware branch To embody.The use of word first, second, and third does not indicate that any order.These words can be explained and run after fame Claim.

Claims (12)

1. a kind of theft preventing method, applied to mobile terminal, it is characterised in that methods described includes:
If the mobile terminal detects shutdown command under screen lock state, validation information is prompted;
The target location that the mobile terminal is presently in is determined, and obtains the unblock checking information of input;
The target location is matched with least one predeterminable area, and the unblock checking information is verified with default Information is matched;
If the target location does not match with least one predeterminable area, and the unblock checking information is preset with described Checking information does not match, then exports antitheft information.
2. according to the method for claim 1, it is characterised in that if the target location with it is described at least one default Region does not match, and the unblock checking information does not match with the default checking information, then exports antitheft information, including:
If the target location does not match with least one predeterminable area, and the unblock checking information is preset with described Checking information does not match, then starts timing;
If not getting the unblock checking information to match with the default checking information in the first preset duration, export antitheft Information.
3. according to the method for claim 2, it is characterised in that if do not got in first preset duration with it is described pre- If the unblock checking information that checking information matches, then before the step of exporting antitheft information, in addition to:
Determine the errors number in the first preset duration;The errors number mismatches to get with the default checking information Unblock checking information number;
Accordingly, believe if not getting the unblock to match with the default checking information in first preset duration and verifying Breath, then the step of exporting antitheft information, including:
If the unblock checking information to match with the default checking information is not got in the first preset duration, and the mistake Number is more than preset times, then exports antitheft information.
4. according to the method for claim 2, it is characterised in that if do not got in first preset duration with it is described pre- If the unblock checking information that checking information matches, then before the step of exporting antitheft information, in addition to:
It is determined that the interval duration between current time is minimum, and the solution screen time before the current time;
Accordingly, believe if not getting the unblock to match with the default checking information in first preset duration and verifying Breath, then the step of exporting antitheft information, including:
If the unblock checking information to match with the default checking information is not got in the first preset duration, and the solution screen Interval duration between time and the current time is more than the second preset duration, then exports antitheft information.
5. according to the method for claim 1, it is characterised in that described the step of exporting antitheft information, comprise the following steps At least one of:
Prompted by default alarm bell;
Scene image is gathered by camera, and sent the scene image and the target location to default postal by network Case, or it is uploaded to default network address;
Stolen circular mail is sent to the default mailbox by network;
Stolen notification message is sent to preset number;
Dial the preset number.
6. a kind of mobile terminal, it is characterised in that the mobile terminal includes:
Reminding module, if detecting shutdown command under screen lock state for the mobile terminal, prompt validation information;
Determining module, the target location being presently in for determining the mobile terminal, and obtain the unblock checking letter of input Breath;
Matching module, verified for the target location to be matched with least one predeterminable area, and by the unblock Information is matched with default checking information;
Anti-theft module, if do not matched with least one predeterminable area for the target location, and the unblock checking Information does not match with the default checking information, then exports antitheft information.
7. mobile terminal according to claim 6, it is characterised in that the anti-theft module includes:
Timing submodule, if do not matched with least one predeterminable area for the target location, and the unblock is tested Card information does not match with the default checking information, then starts timing;
Antitheft submodule, if being verified for not getting the unblock to match with the default checking information in the first preset duration Information, then export antitheft information.
8. mobile terminal according to claim 7, it is characterised in that the anti-theft module also includes:
First determination sub-module, for determining the errors number in the first preset duration;The errors number is gets and institute State the number of the unmatched unblock checking information of default checking information;
Accordingly, the antitheft submodule includes:
First anti-theft, if being tested for not getting the unblock to match with the default checking information in the first preset duration Information is demonstrate,proved, and the errors number is more than preset times, then exports antitheft information.
9. mobile terminal according to claim 7, it is characterised in that the anti-theft module also includes:
Second determination sub-module, it is minimum for the interval duration between determination and current time, and before the current time The solution screen time;
Accordingly, the antitheft submodule includes:
Second anti-theft, if being tested for not getting the unblock to match with the default checking information in the first preset duration Information is demonstrate,proved, and the interval duration between the solution screen time and the current time is more than the second preset duration, then exports antitheft Information.
10. mobile terminal according to claim 6, it is characterised in that the anti-theft module is included in following submodule At least one:
Prompting submodule, for being prompted by default alarm bell;
Submodule is gathered, for gathering scene image by camera, and by network by the scene image and the target Position is sent to default mailbox, or is uploaded to default network address;
First sending submodule, for sending stolen circular mail to the default mailbox by network;
Second sending submodule, for sending stolen notification message to preset number;
Submodule is dialed, for dialing the preset number.
11. a kind of mobile terminal, it is characterised in that including processor, memory and be stored on the memory and can be in institute The computer program run on processor is stated, the computer program is realized such as claim 1 to 5 during the computing device Any one of theft preventing method the step of.
12. a kind of computer-readable recording medium, it is characterised in that computer journey is stored on the computer-readable recording medium Sequence, the step of the theft preventing method as any one of claim 1 to 5 is realized when the computer program is executed by processor Suddenly.
CN201710906462.3A 2017-09-27 2017-09-27 A kind of theft preventing method, mobile terminal and computer-readable recording medium Pending CN107635071A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710906462.3A CN107635071A (en) 2017-09-27 2017-09-27 A kind of theft preventing method, mobile terminal and computer-readable recording medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710906462.3A CN107635071A (en) 2017-09-27 2017-09-27 A kind of theft preventing method, mobile terminal and computer-readable recording medium

Publications (1)

Publication Number Publication Date
CN107635071A true CN107635071A (en) 2018-01-26

Family

ID=61103245

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710906462.3A Pending CN107635071A (en) 2017-09-27 2017-09-27 A kind of theft preventing method, mobile terminal and computer-readable recording medium

Country Status (1)

Country Link
CN (1) CN107635071A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108540458A (en) * 2018-03-21 2018-09-14 努比亚技术有限公司 A kind of method of client checks, equipment, server and storage medium
CN108769429A (en) * 2018-06-20 2018-11-06 努比亚技术有限公司 Mobile terminal safety mode starting method, mobile terminal and readable storage medium storing program for executing
CN109284138A (en) * 2018-09-25 2019-01-29 沈文策 A kind of the power supply method for closing and device of intelligent terminal
CN109327807A (en) * 2018-11-22 2019-02-12 天津光电通信技术有限公司 A kind of anti-theft method of mobile phone based on position big data information
CN110290270A (en) * 2019-06-27 2019-09-27 维沃移动通信有限公司 Theft preventing method and mobile terminal
CN112016079A (en) * 2020-08-27 2020-12-01 深圳市亲邻科技有限公司 Equipment terminal verification method, device and storage medium
CN113240840A (en) * 2021-05-31 2021-08-10 北京京东乾石科技有限公司 Alarm method, alarm system, equipment and mobile robot for entrance guard
CN114033261A (en) * 2021-11-22 2022-02-11 中国铁塔股份有限公司 Anti-theft method, device and equipment for rectifier and storage medium
CN116193020A (en) * 2023-04-27 2023-05-30 合肥智辉空间科技有限责任公司 Mobile phone screen unlocking method and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105072262A (en) * 2015-07-22 2015-11-18 成都中科创达软件有限公司 Mobile phone antitheft method and system
CN106022054A (en) * 2016-05-26 2016-10-12 广东小天才科技有限公司 Unlocking method and device for intelligent wearable equipment
CN106027789A (en) * 2016-06-28 2016-10-12 上海哲奥实业有限公司 Anti-theft cellphone and anti-theft method for cellphone
CN106469284A (en) * 2016-08-19 2017-03-01 广东欧珀移动通信有限公司 A kind of information processing method, device and mobile terminal
US20170164204A1 (en) * 2008-04-02 2017-06-08 Yougetitback Limited Method for mitigating the unauthorized use of a device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170164204A1 (en) * 2008-04-02 2017-06-08 Yougetitback Limited Method for mitigating the unauthorized use of a device
CN105072262A (en) * 2015-07-22 2015-11-18 成都中科创达软件有限公司 Mobile phone antitheft method and system
CN106022054A (en) * 2016-05-26 2016-10-12 广东小天才科技有限公司 Unlocking method and device for intelligent wearable equipment
CN106027789A (en) * 2016-06-28 2016-10-12 上海哲奥实业有限公司 Anti-theft cellphone and anti-theft method for cellphone
CN106469284A (en) * 2016-08-19 2017-03-01 广东欧珀移动通信有限公司 A kind of information processing method, device and mobile terminal

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108540458A (en) * 2018-03-21 2018-09-14 努比亚技术有限公司 A kind of method of client checks, equipment, server and storage medium
CN108769429A (en) * 2018-06-20 2018-11-06 努比亚技术有限公司 Mobile terminal safety mode starting method, mobile terminal and readable storage medium storing program for executing
CN109284138A (en) * 2018-09-25 2019-01-29 沈文策 A kind of the power supply method for closing and device of intelligent terminal
CN109327807A (en) * 2018-11-22 2019-02-12 天津光电通信技术有限公司 A kind of anti-theft method of mobile phone based on position big data information
CN110290270A (en) * 2019-06-27 2019-09-27 维沃移动通信有限公司 Theft preventing method and mobile terminal
CN110290270B (en) * 2019-06-27 2022-01-07 维沃移动通信有限公司 Anti-theft method and mobile terminal
CN112016079A (en) * 2020-08-27 2020-12-01 深圳市亲邻科技有限公司 Equipment terminal verification method, device and storage medium
CN113240840A (en) * 2021-05-31 2021-08-10 北京京东乾石科技有限公司 Alarm method, alarm system, equipment and mobile robot for entrance guard
CN114033261A (en) * 2021-11-22 2022-02-11 中国铁塔股份有限公司 Anti-theft method, device and equipment for rectifier and storage medium
CN116193020A (en) * 2023-04-27 2023-05-30 合肥智辉空间科技有限责任公司 Mobile phone screen unlocking method and system
CN116193020B (en) * 2023-04-27 2023-08-11 合肥智辉空间科技有限责任公司 Mobile phone screen unlocking method and system

Similar Documents

Publication Publication Date Title
CN107635071A (en) A kind of theft preventing method, mobile terminal and computer-readable recording medium
CN106778183A (en) A kind of Terminal fingerprints know method for distinguishing and mobile terminal
CN106357866B (en) A kind of book management method and mobile intelligent terminal
US8904479B1 (en) Pattern-based mobile device unlocking
CN107194235B (en) A kind of application program launching method and mobile terminal
CN106203038B (en) A kind of unlocking method and mobile terminal
CN106648416A (en) Method for starting application and mobile terminal
CN106372470B (en) A kind of method and mobile terminal for reminding input password
CN107450799A (en) The display methods and mobile terminal of a kind of message
CN106446614B (en) A kind of right management method and mobile terminal of application program
CN107632870A (en) The startup method and terminal of a kind of application
CN106991311A (en) A kind of information processing method and mobile terminal
CN107329586A (en) A kind of data inputting method, mobile terminal and computer-readable recording medium
CN107122721A (en) A kind of fingerprint identification method and terminal
CN106991306B (en) A kind of method and mobile terminal inputting password
CN106778217A (en) A kind of mobile terminal unlocks error handling method and mobile terminal
CN106803031A (en) A kind of information protecting method and mobile terminal
CN106709320A (en) Identity authentication method and mobile terminal
CN106911851B (en) A kind of control method and mobile terminal of mobile terminal
CN108052248A (en) The startup method, apparatus and mobile terminal of a kind of application program
CN105824546B (en) A kind of method and electronic equipment that interface is set into fingerprint
CN107358074A (en) A kind of unlocking method and virtual reality device
CN106446626A (en) Mobile terminal unlocking method and mobile terminal
CN106295308B (en) A kind of unlocking method and mobile terminal of application program for mobile terminal
CN106682485A (en) Method for processing verification code and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180126

RJ01 Rejection of invention patent application after publication