CN107635071A - A kind of theft preventing method, mobile terminal and computer-readable recording medium - Google Patents
A kind of theft preventing method, mobile terminal and computer-readable recording medium Download PDFInfo
- Publication number
- CN107635071A CN107635071A CN201710906462.3A CN201710906462A CN107635071A CN 107635071 A CN107635071 A CN 107635071A CN 201710906462 A CN201710906462 A CN 201710906462A CN 107635071 A CN107635071 A CN 107635071A
- Authority
- CN
- China
- Prior art keywords
- information
- checking information
- mobile terminal
- unblock
- default
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Telephone Function (AREA)
Abstract
The invention provides a kind of theft preventing method, mobile terminal and computer-readable recording medium, it is related to technical field of mobile terminals.Wherein, this method includes:If mobile terminal detects shutdown command under screen lock state, validation information is prompted;The target location that mobile terminal is presently in is determined, and obtains the unblock checking information of input;Target location is matched with least one predeterminable area, and unblock checking information is matched with default checking information;If target location does not match with least one predeterminable area, and unlocks checking information and do not matched with default checking information, then antitheft information is exported.After mobile terminal detects shutdown command in screen locking in the present invention, if current location mismatches with predeterminable area, and unblock checking information input error, antitheft information can then be exported, without discovering stolen event by user, so as to remind user in time, the possibility for recovering mobile terminal is improved.
Description
Technical field
The present invention relates to technical field of mobile terminals, more particularly to a kind of theft preventing method, mobile terminal and computer-readable
Storage medium.
Background technology
As the mobile terminal such as rapid development, mobile phone, tablet personal computer of science and technology has been increasingly becoming in people's life not
The part that can or lack, the appearance of mobile terminal greatly facilitate interpersonal information interchange, and the life to people produces
Revolutionary impact.However, because interests are driven, the stolen event of mobile terminal frequently occurs, and user is not only by wealth
Production loss, while can also face the risk of data message leakage.
Generally, user, which is only capable of perceiving mobile terminal by the alertness of itself, is stolen, and when user's dispersion attention,
The stolen event of mobile terminal can not often be perceived.Consequently, it is possible to after user has found that mobile terminal is stolen, criminal will
There is time enough to crack the unblock checking information of mobile terminal, even if now user takes urgent measure, by mobile terminal
The possibility given for change is also extremely low.
The content of the invention
The present invention provides a kind of theft preventing method, mobile terminal and computer-readable recording medium, with solve user fail and
When discover mobile terminal and be stolen event, the problem of the difficulty increase for causing mobile terminal to be given for change.
First aspect, there is provided a kind of theft preventing method, applied to mobile terminal, this method includes:
If the mobile terminal detects shutdown command under screen lock state, validation information is prompted;
The target location that the mobile terminal is presently in is determined, and obtains the unblock checking information of input;
The target location is matched with least one predeterminable area, and by the unblock checking information with presetting
Checking information is matched;
If the target location does not match with least one predeterminable area, and it is described unblock checking information with it is described
Default checking information does not match, then exports antitheft information.
Second aspect, there is provided a kind of mobile terminal, the mobile terminal include:
Reminding module, if detecting shutdown command under screen lock state for the mobile terminal, prompt input validation
Information;
Determining module, the target location being presently in for determining the mobile terminal, and obtain the unblock inputted and test
Demonstrate,prove information;
Matching module, for the target location to be matched with least one predeterminable area, and by the unblock
Checking information is matched with default checking information;
Anti-theft module, if do not matched with least one predeterminable area for the target location, and the unblock
Checking information does not match with the default checking information, then exports antitheft information.
The third aspect, there is provided a kind of mobile terminal, the mobile terminal include processor, memory and be stored in described deposit
On reservoir and the computer program that can run on the processor, realized when the computer program is by the computing device
The step of theft preventing method of the present invention.
Fourth aspect, there is provided a kind of computer-readable recording medium, store on the computer-readable recording medium and calculate
Machine program, the step of theft preventing method of the present invention is realized when computer program is executed by processor.
So, in embodiments of the present invention, when mobile terminal detects shutdown command under screen lock state, can prompt defeated
Enter checking information, then can determine the target location that mobile terminal is presently in, and obtain unblock checking information, then when
Target location does not match with least one predeterminable area, and unlocks checking information when not matched with default checking information, moves
Terminal can export antitheft information immediately, discover stolen event by itself alertness without user, so as to right in time
User is reminded, and improves the possibility for recovering mobile terminal.
Brief description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below by institute in the description to the embodiment of the present invention
The accompanying drawing needed to use is briefly described, it should be apparent that, drawings in the following description are only some implementations of the present invention
Example, for those of ordinary skill in the art, without having to pay creative labor, can also be according to these accompanying drawings
Obtain other accompanying drawings.
Fig. 1 shows a kind of flow chart of theft preventing method in the embodiment of the present invention one;
Fig. 2 shows a kind of flow chart of theft preventing method in the embodiment of the present invention two;
Fig. 3 shows a kind of structured flowchart of mobile terminal in the embodiment of the present invention three;
Fig. 4 shows a kind of structured flowchart of anti-theft module in the embodiment of the present invention three;
Fig. 5 shows the structured flowchart of another anti-theft module in the embodiment of the present invention three;
Fig. 6 shows a kind of structured flowchart of mobile terminal in the embodiment of the present invention four;
Fig. 7 shows a kind of structured flowchart of mobile terminal in the embodiment of the present invention five.
Embodiment
The exemplary embodiment of the present invention is more fully described below with reference to accompanying drawings.Although the present invention is shown in accompanying drawing
Exemplary embodiment, it being understood, however, that may be realized in various forms the present invention without should be by embodiments set forth here
Limited.Conversely, there is provided these embodiments are to be able to be best understood from the present invention, and can be by the scope of the present invention
Completely it is communicated to those skilled in the art.
Embodiment one
Reference picture 1, the flow chart of the theft preventing method of the embodiment of the present invention one is shown, specifically may include steps of:
Step 101, if mobile terminal detects shutdown command under screen lock state, validation information is prompted.
In embodiments of the present invention, in order to protect privacy information, user would generally be that mobile terminal sets unblock checking letter
Breath, after mobile terminal screen locking, only correctly unblock checking information, mobile terminal can just solve screen, and then user's ability for input
Other operations can be carried out in interface of mobile terminal.However, because criminal's pilferage mobile terminal afterwards first can be direct
Shutdown, and any remedial measure all will be of no avail after shutting down, therefore, mobile terminal must assure that under unlocking screen state
It could shut down, that is to say and must be first unlocked to shutdown.
User can carry out power-off operation by modes such as long-press power keys, enter when mobile terminal is in screen lock state
And mobile terminal can detect shutdown command, mobile terminal can show the input window of unblock checking information afterwards, so as to
User is prompted to input unblock checking information.
Step 102, the target location that mobile terminal is presently in is determined, and obtains the unblock checking information of input.
In embodiments of the present invention, mobile terminal can position to the target location being presently in, and obtain and use
The unblock checking information of family input, the unblock checking information can include fingerprint image, facial image, Serial No., touch screen rail
At least one of mark and voice signal.
Step 103, target location is matched with least one predeterminable area, and checking information will be unlocked with presetting
Checking information is matched.
In embodiments of the present invention, user can set safety zone list in the terminal in advance, and user can incite somebody to action
The region of oneself frequent activity, and oneself think will not the region of lost mobile terminal add into the safety zone list,
So as to which at least one predeterminable area, namely at least one safety zone can be stored in mobile terminal.
Mobile terminal, can be by the target location and safety place list after the target location for determining to be presently in
In at least one predeterminable area matched, namely be to determine the target location whether be located at any predeterminable area in, work as shifting
When dynamic terminal determines that the target location is located in any predeterminable area, it may be determined that target location matches with the predeterminable area,
When mobile terminal determines that the target location is not located in any predeterminable area, it may be determined that target location and any preset areas
Domain does not match.
In addition, mobile terminal after unblock checking information is got, can be verified the unblock checking information with default
Information, namely the unblock checking information that user is set in advance in the terminal are matched, when the unblock checking information and in advance
If checking information is consistent, it may be determined that the unblock checking information matches with default checking information, when the unblock checking information with
When default checking information is inconsistent, it may be determined that the unblock checking information does not match with default checking information.
Step 104, if target location does not match with least one predeterminable area, and checking information and default checking are unlocked
Information does not match, then exports antitheft information.
In embodiments of the present invention, when target location does not match with least one predeterminable area, and checking information is unlocked
When not matched with default checking information, it is believed that mobile terminal is currently located at the seldom movable region of user, while unblock is tested
Information input error is demonstrate,proved, at this point it is possible to think mobile terminal not in user's hand, but has been stolen, has fallen into illegal point
In sub- hand, and then mobile terminal can export antitheft information, for example ring alarm bell, dial preset number etc..
In embodiments of the present invention, when mobile terminal detects shutdown command under screen lock state, input can be prompted to test
Information is demonstrate,proved, then can determine the target location that mobile terminal is presently in, and obtains unblock checking information, then works as target
Position does not match with least one predeterminable area, and unlocks checking information when not matched with default checking information, mobile terminal
Antitheft information can be exported immediately, stolen event is discovered by itself alertness without user, so as in time to user
Reminded, improve the possibility for recovering mobile terminal.
Embodiment two
Reference picture 2, the flow chart of the theft preventing method of the embodiment of the present invention two is shown, specifically may include steps of:
Step 201, if mobile terminal detects shutdown command under screen lock state, validation information is prompted.
This step is similar with the implementation process of above-mentioned steps 101, will not be described in detail herein.
For example, when mobile terminal detects shutdown command under screen lock state, a prompt window can be shown, to prompt to use
Checking information needed for the input unblock of family.
Step 202, the target location that mobile terminal is presently in is determined.
In embodiments of the present invention, when mobile terminal can detect shutdown command under screen lock state, mobile terminal is worked as
Preceding residing target location.
For example, the target location that mobile terminal can determine to be presently in is A.
Step 203, target location is matched with least one predeterminable area.
In embodiments of the present invention, mobile terminal can by the target location, with the safety zone list of storage extremely
A few predeterminable area is matched, wherein, matching process can include:For any default at least one predeterminable area
Region, determine attaching relation of the target location relative to the predeterminable area;If target location is not belonging to the predeterminable area, it is determined that
Target location does not match with the predeterminable area;If target location belongs to the predeterminable area, it is determined that target location and the preset areas
Domain matches.So as to which whether the position that mobile terminal can be determined to be presently in is in predeterminable area, that is to say to determine
Go out current mobile terminal whether in the user often region of activity.
It should be noted that user can by with home address, business address, relatives and the home address of friend,
Centered on the business's regional address often gone or gymnasium address etc., preset areas is arranged to by radius area defined of preset length
Domain, and being stored in the safety zone list of mobile terminal, so as to which to determine that target location is not belonging to any pre- when mobile terminal
If during region, it may be determined that mobile terminal is stolen.
For example, the safety zone list in mobile terminal can be safety zone list as shown in table 1 below, mobile terminal
Target location A can be matched with all predeterminable areas in safety zone list as shown in table 1 below.
Table 1
Safety zone list |
Home area B |
Work unit region C |
Gymnasium region D |
…… |
It should be noted that the embodiment of the present invention only illustrates by taking safety zone list as listed in Table 1 as an example, such as
Safety zone list shown in upper table 1 is not formed to the present invention to be limited.
Step 204, if target location does not match with least one predeterminable area, the unblock checking letter of input is obtained
Breath.
In embodiments of the present invention, when target location does not match with least one predeterminable area in the list of safety zone
When, mobile terminal can show the input window of unblock checking information, so as to prompt user to input unblock checking information, Jin Eryi
Dynamic terminal can get the unblock checking information of user's input.
For example, target location A and home area B, the work unit region C in safety zone list as listed in Table 1
Do not matched with gymnasium region D, now mobile terminal can obtain unblock fingerprint image ZW.
Step 205, unblock checking information is matched with default checking information.
In embodiments of the present invention, for different types of unblock checking information, mobile terminal will unlock checking information with
The process that default checking information is matched can be different, below for different types of unblock checking information, to difference
Matching process illustrate.
When unblock checking information includes fingerprint image, the implementation of this step can be the first following match party
Formula, including:It is determined that the characteristic matching degree between unblock fingerprint image and preset fingerprint image;If this feature matching degree is less than default
Matching degree, it is determined that unblock fingerprint image does not match with preset fingerprint image;If this feature matching degree is more than or equal to default
With degree, it is determined that unblock fingerprint image and preset fingerprint images match.
In the first above-mentioned matching way, mobile terminal can pre-process to unblock fingerprint image first, so as to
Improve unblock fingerprint image quality, improve the precision of Finger print characteristic abstract, then mobile terminal can enter to unblock fingerprint image
Row Finger print characteristic abstract, and then the fingerprint characteristic in preset fingerprint image that the fingerprint characteristic of extraction is previously stored with user is entered
Row matching, and determine to unlock the characteristic matching degree between fingerprint image and preset fingerprint image.Wherein, the first above-mentioned match party
Formula can be realized by default algorithm for recognizing fingerprint in mobile terminal.
When unblock checking information includes facial image, the implementation of this step can be following second of match party
Formula, including:It is determined that the characteristic matching degree between unblock facial image and default facial image;If this feature matching degree is less than default
Matching degree, it is determined that unblock facial image does not match with default facial image;If this feature matching degree is more than or equal to default
With degree, it is determined that unblock facial image matches with default facial image.
Similar with the matching process of fingerprint image in above-mentioned second of matching way, mobile terminal first can be to solution
Lock facial image is pre-processed, and so as to improve unblock quality of human face image, is improved the precision of face characteristic extraction, is then moved
Terminal can carry out face characteristic extraction to unblock facial image, and then the face characteristic of extraction is previously stored with user pre-
If the face characteristic in facial image is matched, and determines to unlock the characteristic matching between facial image and default facial image
Degree.Wherein, above-mentioned second of matching way can be realized by default face recognition algorithms in mobile terminal.
When unblock checking information includes Serial No., the implementation of this step can be the third following match party
Formula, including:Unblock Serial No. is contrasted with preset number sequence;If unblock Serial No. differs with preset number sequence
Cause, it is determined that unblock Serial No. does not match with preset number sequence;If it is consistent with preset number sequence to unlock Serial No.,
It is determined that unblock Serial No. and preset number sequences match.
When unblock checking information includes touch screen track, the implementation of this step can be following 4th kind of match parties
Formula, including:Unblock touch screen track is contrasted with default touch screen track;If unblock touch screen track is not passed through according to preset order
At least one default key point in default touch screen track, it is determined that unblock touch screen track does not match with default touch screen track;If
Touch screen track is unlocked according to preset order by least one default key point in default touch screen track, it is determined that unblock touch screen
Track and default touch screen path matching.
When unblock checking information includes voice signal, the implementation of this step can be following 5th kind of match parties
Formula, including:It is determined that the characteristic matching degree between unblock voice signal and preset sound signal;If this feature matching degree is less than default
Matching degree, it is determined that unblock voice signal does not match with preset sound signal;If this feature matching degree is more than or equal to default
With degree, it is determined that unblock voice signal and preset sound Signal Matching.
In above-mentioned 5th kind of matching way, mobile terminal can pre-process to unblock voice signal first, so as to
Improve unblock sound signal quality, improve the precision of vocal print feature extraction, then mobile terminal can enter to unblock voice signal
Row vocal print feature is extracted, and then the vocal print feature in preset sound signal that the vocal print feature of extraction is previously stored with user is entered
Row matching, and determine to unlock the characteristic matching degree between voice signal and preset sound signal.Wherein, above-mentioned 5th kind of match party
Formula can be realized by default voiceprint recognition algorithm in mobile terminal.
It should be noted that unblock checking information can include fingerprint image, facial image, Serial No., touch screen track
Any one of with voice signal, it is of course also possible to including fingerprint image, facial image, Serial No., touch screen track and sound
The combination of any number of passwords of signal, the embodiment of the present invention are not especially limited to this.In addition, in actual applications, unblock
Checking information can also be the password type outside fingerprint image, facial image, Serial No., touch screen track and voice signal,
The embodiment of the present invention is equally not especially limited to this.
For example, mobile terminal can determine that the characteristic matching degree between fingerprint image ZW and pre-set image YS is 20%, enter
And mobile terminal can determine that this feature matching degree 20% is less than preset matching degree 80%, then mobile terminal can determine fingerprint image
As ZW and pre-set image YS are not matched.
Step 206, if unblock checking information does not match with default checking information, timing is started.
In embodiments of the present invention, if target location does not match with least one predeterminable area, and checking information is unlocked
Do not matched with default checking information, then start timing, so as to when user inputs correct password in time, then determine to move
Terminal is not stolen, and then mobile terminal can solve screen.
For example, mobile terminal can determine that unlocking fingerprint image ZW and preset fingerprint image YS does not match, so it is mobile
Terminal can the timing since current time.
Step 207, the errors number in the first preset duration is determined;The errors number is to get and default checking information
The number of unmatched unblock checking information.
In embodiments of the present invention, mobile terminal is after by the first preset duration, it may be determined that the first preset duration
The number with the unmatched unblock checking information of default checking information is inside got, that is to say can determine that user is pre- first
If input the number of unblock checking information in duration by mistake.
For example, mobile terminal can determine that the errors number in the first preset duration 1.5 minutes is 9.
Step 208, if not getting the unblock checking information to match with default checking information in the first preset duration, and
The errors number is more than preset times, then exports antitheft information.
In embodiments of the present invention, when mobile terminal is not got and default checking information phase in the first preset duration
The unblock checking information matched somebody with somebody, and in the first preset duration unblock checking information errors number when being more than preset times, mobile end
End can export antitheft information.
Optionally, in actual applications, for some using mobile terminal more frequently user, such user generally every
The a bit of time will use mobile terminal, therefore, mobile whole in order to further improve the accuracy rate for determining that mobile terminal is stolen
End can also perform following step after step 206 before step 208, including:It is determined that during interval between current time
It is long minimum, and the solution screen time before current time.If so as to not got and default checking information in the first preset duration
The unblock checking information to match, and the interval duration between the solution screen time and current time is more than the second preset duration, then
Mobile terminal can export antitheft information.
It should be noted that even with mobile terminal more frequently user, the time of having a rest at night is generally also
Mobile terminal will not be just used every a bit of time, therefore, user can independently set a period, such as at early 7 points to late 23
Point, so as within the period, the step of mobile terminal can perform the above-mentioned determination solution screen time, or within the period,
Mobile terminal just performs the theft preventing method including the step of above-mentioned determination solution screen time, and is not held then outside the period
The step of row above-mentioned determination solution screen time, so as to reduce the False Rate of stolen event, it is further able to improve determination movement
The stolen accuracy rate of terminal.
It should also be noted that, the step of above-mentioned determination solution screen time, can perform before step 207, can also be in step
Perform after rapid 207, that is to say after determining that unlock checking information does not match with default checking information, mobile terminal can be with
Errors number and solution screen time are determined, if so as to not get the solution to match with default checking information in the first preset duration
Checking information is locked, errors number is more than preset times, and it is pre- more than second to solve the interval duration between screen time and current time
If duration, then mobile terminal can export antitheft information, that is to say exported again when mobile terminal meets a variety of stolen conditions it is antitheft
Information, so as to improve the accuracy rate for determining that mobile terminal is stolen.
Optionally, the step of above-mentioned determination solution screen time can be superimposed execution with step 207, that is to say that mobile terminal can be with
Both the step of having performed the above-mentioned determination solution screen time, step 207 is also performed, certainly, in actual applications, mobile terminal can also be
After performing step 206, the step of only performing the above-mentioned determination solution screen time, without performing step 207, it that is to say default to first
Errors number in duration is without statistics, and whether the interval duration being to determine between solution screen time and current time is more than the
Two preset durations, if so as to not get the unblock checking information to match with default checking information in the first preset duration, and
Interval duration between the solution screen time and current time is more than the second preset duration, then mobile terminal can export antitheft letter
Breath, the embodiment of the present invention are not specifically limited to this.
Optionally, mobile terminal can perform step 207 and step 208 after step 206, certainly, in practical application
In, mobile terminal can also directly after step 206, if namely in target location and at least one predeterminable area not
Match somebody with somebody, and unlock checking information and do not matched with default checking information, then after starting the step of timing, perform following step:If the
The unblock checking information to match with default checking information is not got in one preset duration, then exports antitheft information.
In addition, the step of exporting antitheft information at least one of comprises the following steps:
(1) prompted by default alarm bell.
(2) scene image is gathered by camera, and sent scene image and target location to default postal by network
Case, or it is uploaded to default network address.
(3) stolen circular mail is sent to default mailbox by network.
(4) stolen notification message is sent to preset number.
(5) preset number is dialed.
Wherein, for the antitheft step for needing to perform by network, than second as described above with the third antitheft step, use
Family can set the priority of mobile network and wireless network in advance in mobile terminal, when mobile network is prior to wireless network
When, mobile terminal can be with preferential attachment mobile network after stolen event is determined, and exports antitheft letter by mobile network
Breath, when wireless network is prior to mobile network, mobile terminal with automatically scanning and can connect after stolen event is determined
The available wireless network of surrounding, and antitheft information is exported by wireless network.
By exporting antitheft information, user can know the stolen event of mobile terminal in time, and then can take alarm
Etc. stringent effort, mobile terminal is recovered, so as to avoid property loss and information leakage.
So far, can be to being presently in position, unblock checking information after mobile terminal detects shutdown command in screen locking
The number inputed by mistake with unblock checking information carries out comprehensive descision, antitheft information can be exported immediately afterwards, without by user
Stolen event is discovered, so as to remind user in time, it is possible to increase the possibility for recovering mobile terminal, while can also improve
Determine that mobile terminal is stolen the accuracy rate of event.
For example, mobile terminal can determine that the first preset duration is not got and preset fingerprint image YS phases in 1.5 minutes
The unblock fingerprint image of matching, and the mobile terminal errors number 9 that can determine in the first preset duration 1.5 minutes be more than it is default
Number 7, and then mobile terminal can be prompted by default alarm bell, and with 2 minutes for the cycle, scene is gathered by camera
Image, and sent scene image and current target location A to default mailbox by mobile network.
In embodiments of the present invention, when mobile terminal detects shutdown command under screen lock state, input can be prompted to test
Information is demonstrate,proved, then can determine the target location that mobile terminal is presently in, and obtains unblock checking information, then works as target
Position does not match with least one predeterminable area, and unlocks checking information when not matched with default checking information, mobile terminal
Antitheft information can be exported immediately, stolen event is discovered by itself alertness without user, so as in time to user
Reminded, improve the possibility for recovering mobile terminal.
Embodiment three
Reference picture 3, a kind of structured flowchart of mobile terminal 300 of the embodiment of the present invention three is shown, can specifically be included:
Reminding module 301, if detecting shutdown command under screen lock state for the mobile terminal, input is prompted to test
Demonstrate,prove information;
Determining module 302, the target location being presently in for determining the mobile terminal, and obtain the unblock of input
Checking information;
Matching module 303, for the target location to be matched with least one predeterminable area, and by the solution
Lock checking information is matched with default checking information;
Anti-theft module 304, if do not matched with least one predeterminable area for the target location, and the solution
Lock checking information does not match with the default checking information, then exports antitheft information.
Optionally, reference picture 4, the anti-theft module 304 include:
Timing submodule 3041, if do not matched with least one predeterminable area for the target location, and institute
State unblock checking information not match with the default checking information, then start timing;
Antitheft submodule 3042, if for not getting what is matched with the default checking information in the first preset duration
Checking information is unlocked, then exports antitheft information.
Optionally, reference picture 4, the anti-theft module 304 also include:
First determination sub-module 3043, for determining the errors number in the first preset duration;The errors number is to obtain
Get the number with the default unmatched unblock checking information of checking information;
Accordingly, the antitheft submodule 3042 includes:
First anti-theft 30421, if for not got in the first preset duration and the default checking information phase
The unblock checking information matched somebody with somebody, and the errors number is more than preset times, then exports antitheft information.
Optionally, reference picture 4, the anti-theft module 304 also include:
Second determination sub-module 3044, it is minimum for the interval duration between determination and current time, and described current
The solution screen time before time;
Accordingly, the antitheft submodule 3042 includes:
Second anti-theft 30422, if for not got in the first preset duration and the default checking information phase
The unblock checking information matched somebody with somebody, and the interval duration between the solution screen time and the current time is more than the second preset duration,
Then export antitheft information.
Optionally, reference picture 5, the anti-theft module 304 include at least one of following submodule:
Prompting submodule 3045, for being prompted by default alarm bell;
Gather submodule 3046, for gathering scene image by camera, and by network by the scene image and
The target location is sent to default mailbox, or is uploaded to default network address;
First sending submodule 3047, for sending stolen circular mail to the default mailbox by network;
Second sending submodule 3048, for sending stolen notification message to preset number;
Submodule 3049 is dialed, for dialing the preset number.
In embodiments of the present invention, when mobile terminal detects shutdown command under screen lock state, input can be prompted to test
Information is demonstrate,proved, then can determine the target location that mobile terminal is presently in, and obtains unblock checking information, then works as target
Position does not match with least one predeterminable area, and unlocks checking information when not matched with default checking information, mobile terminal
Antitheft information can be exported immediately, stolen event is discovered by itself alertness without user, so as in time to user
Reminded, improve the possibility for recovering mobile terminal.
Example IV
Fig. 6 is the block diagram of the mobile terminal of another embodiment of the present invention.Mobile terminal 600 shown in Fig. 6 includes:At least
One processor 601, memory 602, at least one network interface 604 and user interface 603.It is each in mobile terminal 600
Component is coupled by bus system 605.It is understood that bus system 605 is used to realize that the connection between these components is led to
Letter.Bus system 605 is in addition to including data/address bus, in addition to power bus, controlling bus and status signal bus in addition.But it is
For the sake of clear explanation, in figure 6 various buses are all designated as bus system 605.
Wherein, user interface 603 can include display, keyboard or pointing device (for example, mouse, trace ball
(trackball), touch-sensitive plate or flexible screen etc..
It is appreciated that the memory 602 in the embodiment of the present invention can be volatile memory or nonvolatile memory,
Or it may include both volatibility and nonvolatile memory.Wherein, nonvolatile memory can be read-only storage (Read-
Only Memory, ROM), programmable read only memory (Programmable ROM, PROM), the read-only storage of erasable programmable
Device (Erasable PROM, EPROM), Electrically Erasable Read Only Memory (Electrically EPROM, EEPROM) or
Flash memory.Volatile memory can be random access memory (Random Access Memory, RAM), and it is used as outside high
Speed caching.By exemplary but be not restricted explanation, the RAM of many forms can use, such as static RAM
(Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), Synchronous Dynamic Random Access Memory
(Synchronous DRAM, SDRAM), double data speed synchronous dynamic RAM (Double Data Rate
SDRAM, DDRSDRAM), enhanced Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronized links
Dynamic random access memory (Synchlink DRAM, SLDRAM) and direct rambus random access memory (Direct
Rambus RAM, DRRAM).The embodiment of the present invention description system and method memory 602 be intended to including but not limited to these
With the memory of any other suitable type.
In some embodiments, memory 602 stores following element, can perform module or data structure, or
Their subset of person, or their superset:Operating system 6021 and application program 6022.
Wherein, operating system 6021, comprising various system programs, such as ccf layer, core library layer, driving layer etc., it is used for
Realize various basic businesses and the hardware based task of processing.Application program 6022, include various application programs, such as media
Player (Media Player), browser (Browser) etc., for realizing various applied business.Realize the embodiment of the present invention
The program of method may be embodied in application program 6022.
In embodiments of the present invention, by calling program or the instruction of the storage of memory 602, specifically, can be application
The program stored in program 6022 or instruction, processor 601 are used for:If the mobile terminal detects shutdown under screen lock state
Instruction, then prompt validation information;The target location that the mobile terminal is presently in is determined, and obtains the unblock of input
Checking information;The target location is matched with least one predeterminable area, and by the unblock checking information and in advance
If checking information is matched;If the target location does not match with least one predeterminable area, and the unblock is tested
Card information does not match with the default checking information, then exports antitheft information.
The method that the embodiments of the present invention disclose can apply in processor 601, or be realized by processor 601.
Processor 601 is probably a kind of IC chip, has the disposal ability of signal.In implementation process, the above method it is each
Step can be completed by the integrated logic circuit of the hardware in processor 601 or the instruction of software form.Above-mentioned processing
Device 601 can be general processor, digital signal processor (Digital Signal Processor, DSP), special integrated electricity
Road (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field
Programmable Gate Array, FPGA) either other PLDs, discrete gate or transistor logic,
Discrete hardware components.It can realize or perform disclosed each method, step and the logic diagram in the embodiment of the present invention.It is general
Processor can be microprocessor or the processor can also be any conventional processor etc..With reference to institute of the embodiment of the present invention
The step of disclosed method, can be embodied directly in hardware decoding processor and perform completion, or with the hardware in decoding processor
And software module combination performs completion.Software module can be located at random access memory, flash memory, read-only storage, may be programmed read-only
In the ripe storage medium in this area such as memory or electrically erasable programmable memory, register.The storage medium is located at
Memory 602, processor 601 read the information in memory 602, with reference to the step of its hardware completion above method.
It is understood that the embodiment of the present invention description these embodiments can use hardware, software, firmware, middleware,
Microcode or its combination are realized.Realized for hardware, processing unit can be realized in one or more application specific integrated circuits
(Application Specific Integrated Circuits, ASIC), digital signal processor (Digital Signal
Processing, DSP), digital signal processing appts (DSP Device, DSPD), programmable logic device (Programmable
Logic Device, PLD), field programmable gate array (Field-Programmable Gate Array, FPGA), general place
Manage in device, controller, microcontroller, microprocessor, other electronic units for performing herein described function or its combination.
For software realize, can by perform the module (such as process, function etc.) of function described in the embodiment of the present invention come
Realize the technology described in the embodiment of the present invention.Software code is storable in memory and passes through computing device.Memory can
To realize within a processor or outside processor.
Optionally, the processor 601 is additionally operable to:If the target location and at least one predeterminable area are not
Match somebody with somebody, and the unblock checking information does not match with the default checking information, then starts timing;If do not obtained in the first preset duration
The unblock checking information to match with the default checking information is got, then exports antitheft information.
Optionally, the processor 601 is additionally operable to:Determine the errors number in the first preset duration;The errors number
To get the number with the default unmatched unblock checking information of checking information;Accordingly, if described first is default
Do not get the unblock checking information to match with the default checking information in long, then the step of exporting antitheft information, including:
If the unblock checking information to match with the default checking information is not got in the first preset duration, and the errors number
More than preset times, then antitheft information is exported.
Optionally, the processor 601 is additionally operable to:It is determined that the interval duration between current time is minimum, and described
The solution screen time before current time;Accordingly, if not got in first preset duration and the default checking information
The unblock checking information to match, then the step of exporting antitheft information, including:If do not got in the first preset duration with it is described
The unblock checking information that default checking information matches, and described solve is grown up when shielding the interval between time and the current time
In the second preset duration, then antitheft information is exported.
Optionally, the processor 601 is additionally operable to perform at least one of following steps:Carried by default alarm bell
Show;Scene image is gathered by camera, and sent the scene image and the target location to default postal by network
Case, or it is uploaded to default network address;Stolen circular mail is sent to the default mailbox by network;Sent to preset number stolen
Notification message;Dial the preset number.
Mobile terminal 600 can realize each process that mobile terminal is realized in previous embodiment, to avoid repeating, here
Repeat no more.In the embodiment of the present invention, when mobile terminal 600 detects shutdown command under screen lock state, it can prompt to input
Checking information, the target location that mobile terminal is presently in then can be determined, and obtain unblock checking information, then work as mesh
Cursor position does not match with least one predeterminable area, and unlocks checking information when not matched with default checking information, mobile end
End can export antitheft information immediately, discover stolen event by itself alertness without user, so as in time to
Family is reminded, and improves the possibility for recovering mobile terminal.
Embodiment five
Fig. 7 is the structural representation of the mobile terminal of another embodiment of the present invention.Specifically, the mobile terminal in Fig. 7
700 can be mobile phone, tablet personal computer, personal digital assistant (Personal Digital Assistant, PDA) or vehicle mounted electric
Brain etc..
Mobile terminal 700 in Fig. 7 includes radio frequency (Radio Frequency, RF) circuit 710, memory 720, input
Unit 730, display unit 740, processor 760, voicefrequency circuit 770, WLAN (Wireless Fidelity) module
780 and power supply 790.
Wherein, input block 730 can be used for the numeral or character information for receiving user's input, and generation and mobile terminal
The signal input that 700 user is set and function control is relevant.Specifically, in the embodiment of the present invention, the input block 730 can
With including contact panel 731.Contact panel 731, collecting touch operation of the user on or near it, (for example user uses hand
The operation of any suitable object such as finger, stylus or annex on contact panel 731), and driven according to formula set in advance
Corresponding attachment means.Optionally, contact panel 731 may include both touch detecting apparatus and touch controller.Wherein,
Touch detecting apparatus detects the touch orientation of user, and detects the signal that touch operation is brought, and transmits a signal to touch control
Device;Touch controller receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives the processor
760, and the order sent of reception processing device 760 and can be performed.Furthermore, it is possible to use resistance-type, condenser type, infrared ray with
And the polytype such as surface acoustic wave realizes contact panel 731.Except contact panel 731, input block 730 can also include other
Input equipment 732, other input equipments 732 can include but is not limited to physical keyboard, function key (such as volume control button,
Switch key etc.), trace ball, mouse, the one or more in action bars etc..
Wherein, display unit 740 can be used for display by the information of user's input or be supplied to information and the movement of user
The various menu interfaces of terminal 700.Display unit 740 may include display panel 741, optionally, can use LCD or organic hairs
The forms such as optical diode (Organic Light-Emitting Diode, OLED) configure display panel 741.
It should be noted that contact panel 731 can cover display panel 741, touch display screen is formed, when the touch display screen is examined
After measuring the touch operation on or near it, processor 760 is sent to determine the type of touch event, is followed by subsequent processing device
760 provide corresponding visual output according to the type of touch event in touch display screen.
Touch display screen includes Application Program Interface viewing area and conventional control viewing area.The Application Program Interface viewing area
And arrangement mode of the conventional control viewing area does not limit, can be arranged above and below, left-right situs etc. can distinguish two it is aobvious
Show the arrangement mode in area.The Application Program Interface viewing area is displayed for the interface of application program.Each interface can be with
The interface element such as the icon comprising at least one application program and/or widget desktop controls.The Application Program Interface viewing area
It can also be the empty interface not comprising any content.The conventional control viewing area is used to show the higher control of utilization rate, for example,
Application icons such as settings button, interface numbering, scroll bar, phone directory icon etc..
Wherein processor 760 is the control centre of mobile terminal 700, utilizes various interfaces and connection whole mobile phone
Various pieces, by running or performing the software program and/or module that are stored in first memory 721, and call storage
Data in second memory 722, the various functions and processing data of mobile terminal 700 are performed, so as to mobile terminal 700
Carry out integral monitoring.Optionally, processor 760 may include one or more processing units.
In embodiments of the present invention, by call store the first memory 721 in software program and/or module and/
Or the data in the second memory 722, processor 760 are used for:If the mobile terminal detects shutdown under screen lock state
Instruction, then prompt validation information;The target location that the mobile terminal is presently in is determined, and obtains the unblock of input
Checking information;The target location is matched with least one predeterminable area, and by the unblock checking information and in advance
If checking information is matched;If the target location does not match with least one predeterminable area, and the unblock is tested
Card information does not match with the default checking information, then exports antitheft information.
Optionally, the processor 760 is additionally operable to:If the target location and at least one predeterminable area are not
Match somebody with somebody, and the unblock checking information does not match with the default checking information, then starts timing;If do not obtained in the first preset duration
The unblock checking information to match with the default checking information is got, then exports antitheft information.
Optionally, the processor 760 is additionally operable to:Determine the errors number in the first preset duration;The errors number
To get the number with the default unmatched unblock checking information of checking information;Accordingly, if described first is default
Do not get the unblock checking information to match with the default checking information in long, then the step of exporting antitheft information, including:
If the unblock checking information to match with the default checking information is not got in the first preset duration, and the errors number
More than preset times, then antitheft information is exported.
Optionally, the processor 760 is additionally operable to:It is determined that the interval duration between current time is minimum, and described
The solution screen time before current time;Accordingly, if not got in first preset duration and the default checking information
The unblock checking information to match, then the step of exporting antitheft information, including:If do not got in the first preset duration with it is described
The unblock checking information that default checking information matches, and described solve is grown up when shielding the interval between time and the current time
In the second preset duration, then antitheft information is exported.
Optionally, the processor 760 is additionally operable to perform at least one of following steps:Carried by default alarm bell
Show;Scene image is gathered by camera, and sent the scene image and the target location to default postal by network
Case, or it is uploaded to default network address;Stolen circular mail is sent to the default mailbox by network;Sent to preset number stolen
Notification message;Dial the preset number.
It can be seen that in the embodiment of the present invention, when mobile terminal 700 detects shutdown command under screen lock state, can prompt
Validation information, the target location that mobile terminal is presently in then can be determined, and obtain unblock checking information, then
When target location does not match with least one predeterminable area, and unblock checking information does not match with default checking information, move
Dynamic terminal can export antitheft information immediately, stolen event be discovered by itself alertness without user, so as to timely
User is reminded, improves the possibility for recovering mobile terminal.
For said apparatus embodiment, because it is substantially similar to embodiment of the method, so description is fairly simple,
The relevent part can refer to the partial explaination of embodiments of method.
Embodiment six
Preferably, the embodiment of the present invention also provides a kind of mobile terminal, including processor, memory, is stored in memory
Computer program that is upper and can running on the processor, the computer program realize above-mentioned antitheft square when being executed by processor
Each process of method embodiment, and identical technique effect can be reached, to avoid repeating, repeat no more here.
Embodiment seven
The embodiment of the present invention also provides a kind of computer-readable recording medium, and meter is stored with computer-readable recording medium
Calculation machine program, the computer program realize each process of above-mentioned theft preventing method embodiment when being executed by processor, and can reach
Identical technique effect, to avoid repeating, repeat no more here.Wherein, described computer-readable recording medium, deposited Ru read-only
Reservoir (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation RAM),
Magnetic disc or CD etc..
Each embodiment in this specification is described by the way of progressive, what each embodiment stressed be with
The difference of other embodiment, between each embodiment identical similar part mutually referring to.
It would have readily occurred to a person skilled in the art that be:Any combination application of above-mentioned each embodiment is all feasible, therefore
Any combination between above-mentioned each embodiment is all embodiment of the present invention, but this specification exists as space is limited,
This is not just detailed one by one.
Theft preventing method is not inherently related to any certain computer, virtual system or miscellaneous equipment provided herein.Respectively
Kind general-purpose system can also be used together with teaching based on this.As described above, construct with the present invention program's
Structure required by system is obvious.In addition, the present invention is not also directed to any certain programmed language.It should be understood that can
To realize the content of invention described herein using various programming languages, and the description done above to language-specific be for
Disclose the preferred forms of the present invention.
In the specification that this place provides, numerous specific details are set forth.It is to be appreciated, however, that the implementation of the present invention
Example can be put into practice in the case of these no details.In some instances, known method, structure is not been shown in detail
And technology, so as not to obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify the present invention and help to understand one or more of each inventive aspect,
Above in the description to the exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes
In example, figure or descriptions thereof.However, the method for the disclosure should be construed to reflect following intention:I.e. required guarantor
The application claims of shield features more more than the feature being expressly recited in each claim.More precisely, such as right
As claim reflects, inventive aspect is all features less than single embodiment disclosed above.Therefore, it then follows tool
Thus claims of body embodiment are expressly incorporated in the embodiment, wherein the conduct of each claim in itself
The separate embodiments of the present invention.
Those skilled in the art, which are appreciated that, to be carried out adaptively to the module in the equipment in embodiment
Change and they are arranged in one or more equipment different from the embodiment.Can be the module or list in embodiment
Member or component be combined into a module or unit or component, and can be divided into addition multiple submodule or subelement or
Sub-component.In addition at least some in such feature and/or process or unit exclude each other, it can use any
Combination is disclosed to all features disclosed in this specification (including adjoint claim, summary and accompanying drawing) and so to appoint
Where all processes or unit of method or equipment are combined.Unless expressly stated otherwise, this specification (including adjoint power
Profit requires, summary and accompanying drawing) disclosed in each feature can be by providing the alternative features of identical, equivalent or similar purpose come generation
Replace.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments
In included some features rather than further feature, but the combination of the feature of different embodiments means in of the invention
Within the scope of and form different embodiments.For example, in detail in the claims, embodiment claimed it is one of any
Mode it can use in any combination.
The all parts embodiment of the present invention can be realized with hardware, or to be run on one or more processor
Software module realize, or realized with combinations thereof.It will be understood by those of skill in the art that it can use in practice
Microprocessor either digital signal processor (DSP) come realize in theft preventing method according to embodiments of the present invention some or it is complete
The some or all functions of portion's part.The present invention be also implemented as a part for performing method as described herein or
Person whole equipment or program of device (for example, computer program and computer program product).It is such to realize the present invention's
Program can store on a computer-readable medium, or can have the form of one or more signal.Such signal
It can download and obtain from internet website, either provide on carrier signal or provided in the form of any other.
It should be noted that the present invention will be described rather than limits the invention for above-described embodiment, and ability
Field technique personnel can design alternative embodiment without departing from the scope of the appended claims.In the claims,
Any reference symbol between bracket should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not
Element or step listed in the claims.Word "a" or "an" before element does not exclude the presence of multiple such
Element.The present invention can be by means of including the hardware of some different elements and being come by means of properly programmed computer real
It is existing.In if the unit claim of equipment for drying is listed, several in these devices can be by same hardware branch
To embody.The use of word first, second, and third does not indicate that any order.These words can be explained and run after fame
Claim.
Claims (12)
1. a kind of theft preventing method, applied to mobile terminal, it is characterised in that methods described includes:
If the mobile terminal detects shutdown command under screen lock state, validation information is prompted;
The target location that the mobile terminal is presently in is determined, and obtains the unblock checking information of input;
The target location is matched with least one predeterminable area, and the unblock checking information is verified with default
Information is matched;
If the target location does not match with least one predeterminable area, and the unblock checking information is preset with described
Checking information does not match, then exports antitheft information.
2. according to the method for claim 1, it is characterised in that if the target location with it is described at least one default
Region does not match, and the unblock checking information does not match with the default checking information, then exports antitheft information, including:
If the target location does not match with least one predeterminable area, and the unblock checking information is preset with described
Checking information does not match, then starts timing;
If not getting the unblock checking information to match with the default checking information in the first preset duration, export antitheft
Information.
3. according to the method for claim 2, it is characterised in that if do not got in first preset duration with it is described pre-
If the unblock checking information that checking information matches, then before the step of exporting antitheft information, in addition to:
Determine the errors number in the first preset duration;The errors number mismatches to get with the default checking information
Unblock checking information number;
Accordingly, believe if not getting the unblock to match with the default checking information in first preset duration and verifying
Breath, then the step of exporting antitheft information, including:
If the unblock checking information to match with the default checking information is not got in the first preset duration, and the mistake
Number is more than preset times, then exports antitheft information.
4. according to the method for claim 2, it is characterised in that if do not got in first preset duration with it is described pre-
If the unblock checking information that checking information matches, then before the step of exporting antitheft information, in addition to:
It is determined that the interval duration between current time is minimum, and the solution screen time before the current time;
Accordingly, believe if not getting the unblock to match with the default checking information in first preset duration and verifying
Breath, then the step of exporting antitheft information, including:
If the unblock checking information to match with the default checking information is not got in the first preset duration, and the solution screen
Interval duration between time and the current time is more than the second preset duration, then exports antitheft information.
5. according to the method for claim 1, it is characterised in that described the step of exporting antitheft information, comprise the following steps
At least one of:
Prompted by default alarm bell;
Scene image is gathered by camera, and sent the scene image and the target location to default postal by network
Case, or it is uploaded to default network address;
Stolen circular mail is sent to the default mailbox by network;
Stolen notification message is sent to preset number;
Dial the preset number.
6. a kind of mobile terminal, it is characterised in that the mobile terminal includes:
Reminding module, if detecting shutdown command under screen lock state for the mobile terminal, prompt validation information;
Determining module, the target location being presently in for determining the mobile terminal, and obtain the unblock checking letter of input
Breath;
Matching module, verified for the target location to be matched with least one predeterminable area, and by the unblock
Information is matched with default checking information;
Anti-theft module, if do not matched with least one predeterminable area for the target location, and the unblock checking
Information does not match with the default checking information, then exports antitheft information.
7. mobile terminal according to claim 6, it is characterised in that the anti-theft module includes:
Timing submodule, if do not matched with least one predeterminable area for the target location, and the unblock is tested
Card information does not match with the default checking information, then starts timing;
Antitheft submodule, if being verified for not getting the unblock to match with the default checking information in the first preset duration
Information, then export antitheft information.
8. mobile terminal according to claim 7, it is characterised in that the anti-theft module also includes:
First determination sub-module, for determining the errors number in the first preset duration;The errors number is gets and institute
State the number of the unmatched unblock checking information of default checking information;
Accordingly, the antitheft submodule includes:
First anti-theft, if being tested for not getting the unblock to match with the default checking information in the first preset duration
Information is demonstrate,proved, and the errors number is more than preset times, then exports antitheft information.
9. mobile terminal according to claim 7, it is characterised in that the anti-theft module also includes:
Second determination sub-module, it is minimum for the interval duration between determination and current time, and before the current time
The solution screen time;
Accordingly, the antitheft submodule includes:
Second anti-theft, if being tested for not getting the unblock to match with the default checking information in the first preset duration
Information is demonstrate,proved, and the interval duration between the solution screen time and the current time is more than the second preset duration, then exports antitheft
Information.
10. mobile terminal according to claim 6, it is characterised in that the anti-theft module is included in following submodule
At least one:
Prompting submodule, for being prompted by default alarm bell;
Submodule is gathered, for gathering scene image by camera, and by network by the scene image and the target
Position is sent to default mailbox, or is uploaded to default network address;
First sending submodule, for sending stolen circular mail to the default mailbox by network;
Second sending submodule, for sending stolen notification message to preset number;
Submodule is dialed, for dialing the preset number.
11. a kind of mobile terminal, it is characterised in that including processor, memory and be stored on the memory and can be in institute
The computer program run on processor is stated, the computer program is realized such as claim 1 to 5 during the computing device
Any one of theft preventing method the step of.
12. a kind of computer-readable recording medium, it is characterised in that computer journey is stored on the computer-readable recording medium
Sequence, the step of the theft preventing method as any one of claim 1 to 5 is realized when the computer program is executed by processor
Suddenly.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710906462.3A CN107635071A (en) | 2017-09-27 | 2017-09-27 | A kind of theft preventing method, mobile terminal and computer-readable recording medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710906462.3A CN107635071A (en) | 2017-09-27 | 2017-09-27 | A kind of theft preventing method, mobile terminal and computer-readable recording medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107635071A true CN107635071A (en) | 2018-01-26 |
Family
ID=61103245
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710906462.3A Pending CN107635071A (en) | 2017-09-27 | 2017-09-27 | A kind of theft preventing method, mobile terminal and computer-readable recording medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107635071A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108540458A (en) * | 2018-03-21 | 2018-09-14 | 努比亚技术有限公司 | A kind of method of client checks, equipment, server and storage medium |
CN108769429A (en) * | 2018-06-20 | 2018-11-06 | 努比亚技术有限公司 | Mobile terminal safety mode starting method, mobile terminal and readable storage medium storing program for executing |
CN109284138A (en) * | 2018-09-25 | 2019-01-29 | 沈文策 | A kind of the power supply method for closing and device of intelligent terminal |
CN109327807A (en) * | 2018-11-22 | 2019-02-12 | 天津光电通信技术有限公司 | A kind of anti-theft method of mobile phone based on position big data information |
CN110290270A (en) * | 2019-06-27 | 2019-09-27 | 维沃移动通信有限公司 | Theft preventing method and mobile terminal |
CN112016079A (en) * | 2020-08-27 | 2020-12-01 | 深圳市亲邻科技有限公司 | Equipment terminal verification method, device and storage medium |
CN113240840A (en) * | 2021-05-31 | 2021-08-10 | 北京京东乾石科技有限公司 | Alarm method, alarm system, equipment and mobile robot for entrance guard |
CN114033261A (en) * | 2021-11-22 | 2022-02-11 | 中国铁塔股份有限公司 | Anti-theft method, device and equipment for rectifier and storage medium |
CN116193020A (en) * | 2023-04-27 | 2023-05-30 | 合肥智辉空间科技有限责任公司 | Mobile phone screen unlocking method and system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105072262A (en) * | 2015-07-22 | 2015-11-18 | 成都中科创达软件有限公司 | Mobile phone antitheft method and system |
CN106022054A (en) * | 2016-05-26 | 2016-10-12 | 广东小天才科技有限公司 | Unlocking method and device for intelligent wearable equipment |
CN106027789A (en) * | 2016-06-28 | 2016-10-12 | 上海哲奥实业有限公司 | Anti-theft cellphone and anti-theft method for cellphone |
CN106469284A (en) * | 2016-08-19 | 2017-03-01 | 广东欧珀移动通信有限公司 | A kind of information processing method, device and mobile terminal |
US20170164204A1 (en) * | 2008-04-02 | 2017-06-08 | Yougetitback Limited | Method for mitigating the unauthorized use of a device |
-
2017
- 2017-09-27 CN CN201710906462.3A patent/CN107635071A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170164204A1 (en) * | 2008-04-02 | 2017-06-08 | Yougetitback Limited | Method for mitigating the unauthorized use of a device |
CN105072262A (en) * | 2015-07-22 | 2015-11-18 | 成都中科创达软件有限公司 | Mobile phone antitheft method and system |
CN106022054A (en) * | 2016-05-26 | 2016-10-12 | 广东小天才科技有限公司 | Unlocking method and device for intelligent wearable equipment |
CN106027789A (en) * | 2016-06-28 | 2016-10-12 | 上海哲奥实业有限公司 | Anti-theft cellphone and anti-theft method for cellphone |
CN106469284A (en) * | 2016-08-19 | 2017-03-01 | 广东欧珀移动通信有限公司 | A kind of information processing method, device and mobile terminal |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108540458A (en) * | 2018-03-21 | 2018-09-14 | 努比亚技术有限公司 | A kind of method of client checks, equipment, server and storage medium |
CN108769429A (en) * | 2018-06-20 | 2018-11-06 | 努比亚技术有限公司 | Mobile terminal safety mode starting method, mobile terminal and readable storage medium storing program for executing |
CN109284138A (en) * | 2018-09-25 | 2019-01-29 | 沈文策 | A kind of the power supply method for closing and device of intelligent terminal |
CN109327807A (en) * | 2018-11-22 | 2019-02-12 | 天津光电通信技术有限公司 | A kind of anti-theft method of mobile phone based on position big data information |
CN110290270A (en) * | 2019-06-27 | 2019-09-27 | 维沃移动通信有限公司 | Theft preventing method and mobile terminal |
CN110290270B (en) * | 2019-06-27 | 2022-01-07 | 维沃移动通信有限公司 | Anti-theft method and mobile terminal |
CN112016079A (en) * | 2020-08-27 | 2020-12-01 | 深圳市亲邻科技有限公司 | Equipment terminal verification method, device and storage medium |
CN113240840A (en) * | 2021-05-31 | 2021-08-10 | 北京京东乾石科技有限公司 | Alarm method, alarm system, equipment and mobile robot for entrance guard |
CN114033261A (en) * | 2021-11-22 | 2022-02-11 | 中国铁塔股份有限公司 | Anti-theft method, device and equipment for rectifier and storage medium |
CN116193020A (en) * | 2023-04-27 | 2023-05-30 | 合肥智辉空间科技有限责任公司 | Mobile phone screen unlocking method and system |
CN116193020B (en) * | 2023-04-27 | 2023-08-11 | 合肥智辉空间科技有限责任公司 | Mobile phone screen unlocking method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107635071A (en) | A kind of theft preventing method, mobile terminal and computer-readable recording medium | |
CN106778183A (en) | A kind of Terminal fingerprints know method for distinguishing and mobile terminal | |
CN106357866B (en) | A kind of book management method and mobile intelligent terminal | |
US8904479B1 (en) | Pattern-based mobile device unlocking | |
CN107194235B (en) | A kind of application program launching method and mobile terminal | |
CN106203038B (en) | A kind of unlocking method and mobile terminal | |
CN106648416A (en) | Method for starting application and mobile terminal | |
CN106372470B (en) | A kind of method and mobile terminal for reminding input password | |
CN107450799A (en) | The display methods and mobile terminal of a kind of message | |
CN106446614B (en) | A kind of right management method and mobile terminal of application program | |
CN107632870A (en) | The startup method and terminal of a kind of application | |
CN106991311A (en) | A kind of information processing method and mobile terminal | |
CN107329586A (en) | A kind of data inputting method, mobile terminal and computer-readable recording medium | |
CN107122721A (en) | A kind of fingerprint identification method and terminal | |
CN106991306B (en) | A kind of method and mobile terminal inputting password | |
CN106778217A (en) | A kind of mobile terminal unlocks error handling method and mobile terminal | |
CN106803031A (en) | A kind of information protecting method and mobile terminal | |
CN106709320A (en) | Identity authentication method and mobile terminal | |
CN106911851B (en) | A kind of control method and mobile terminal of mobile terminal | |
CN108052248A (en) | The startup method, apparatus and mobile terminal of a kind of application program | |
CN105824546B (en) | A kind of method and electronic equipment that interface is set into fingerprint | |
CN107358074A (en) | A kind of unlocking method and virtual reality device | |
CN106446626A (en) | Mobile terminal unlocking method and mobile terminal | |
CN106295308B (en) | A kind of unlocking method and mobile terminal of application program for mobile terminal | |
CN106682485A (en) | Method for processing verification code and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180126 |
|
RJ01 | Rejection of invention patent application after publication |