CN107707736A - Mobile terminal and relevant device with stolen safeguard function - Google Patents

Mobile terminal and relevant device with stolen safeguard function Download PDF

Info

Publication number
CN107707736A
CN107707736A CN201710790044.2A CN201710790044A CN107707736A CN 107707736 A CN107707736 A CN 107707736A CN 201710790044 A CN201710790044 A CN 201710790044A CN 107707736 A CN107707736 A CN 107707736A
Authority
CN
China
Prior art keywords
mobile terminal
wifi
positional information
account
stolen
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710790044.2A
Other languages
Chinese (zh)
Inventor
王苏娜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Fulcrum Electronic Intelligent Technology Co Ltd
Original Assignee
Shenzhen Fulcrum Electronic Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Fulcrum Electronic Intelligent Technology Co Ltd filed Critical Shenzhen Fulcrum Electronic Intelligent Technology Co Ltd
Priority to CN201710790044.2A priority Critical patent/CN107707736A/en
Publication of CN107707736A publication Critical patent/CN107707736A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72418User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services
    • H04M1/72421User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services with automatic activation of emergency service functions, e.g. upon sensing an alarm
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72457User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to geographic location
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/025Services making use of location information using location based information parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • H04W8/24Transfer of terminal data

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Computer Interaction (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Environmental & Geological Engineering (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The present invention provides the mobile terminal with stolen safeguard function, including the processor and memory to intercouple;The processor is used to perform following steps:Detection unblock authentication failed number, and judge whether the frequency of failure exceedes preset times, if so, then gathering the positional information of the mobile terminal;The mobile terminal judges whether the positional information belongs to the position range corresponding to the movement locus that the mobile terminal prestores;If the positional information is not belonging to the position range, it is determined that the mobile terminal is in stolen status;When the mobile terminal is in stolen status, the mobile terminal hides the application program for the predesignated need for confidentiality installed on the mobile terminal on interface, and forbid the application program of the predesignated need for confidentiality to run, and the positional information is sent to the terminal device bound in advance.The information of protection application program in time, which can so be realized, to be revealed, to improve the security performance of mobile terminal.

Description

Mobile terminal and relevant device with stolen safeguard function
Technical field
The present invention relates to communication technical field, more particularly to mobile terminal and relevant device with stolen safeguard function.
Background technology
With the development of the communication technology, mobile terminal is increasingly liked and used by user, and present mobile terminal It is worth also more and more higher.The situation that mobile terminal is lost often occurs in real life, such as:It is stolen.However, at present After mobile terminal is stolen, mainly by this way by mobile terminal location, then positional information is sent to server, server According to the positional information received, and user is transferred to, such user, according to positional information, searches mobile whole according to can End.So very it is probably that can not give movement for change eventually greatly however, because user is only to be carried out giving mobile terminal for change according to positional information End, can thus may result in information-leakage.It can be seen that the security performance of mobile terminal is than relatively low at present.
The content of the invention
It is an object of the invention to provide a kind of mobile terminal to be stolen processing method and mobile terminal, solves mobile terminal Security performance than it is relatively low the problem of.
In order to achieve the above object, the embodiment of the present invention provides a kind of mobile terminal and is stolen processing method, it is characterised in that Including:
Mobile terminal detection unblock authentication failed number, and judge whether the frequency of failure exceedes preset times, if so, Then gather the positional information of the mobile terminal;
The mobile terminal judges whether the positional information belongs to the movement locus institute that the mobile terminal prestores Corresponding position range;
If the positional information is not belonging to the position range, it is determined that the mobile terminal is in stolen status;
When the mobile terminal is in stolen status, the mobile terminal preassigns what is installed on the mobile terminal The application program of need for confidentiality is hidden on interface, and forbids the application program of the predesignated need for confidentiality to run, and will The positional information is sent to the terminal device bound in advance.
Preferably, methods described also includes:
When the mobile terminal is in stolen status, the mobile terminal moves back the account logged on the mobile terminal Go out, and delete the password record of the account.
Preferably, methods described also includes:
When the mobile terminal is in stolen status, when detecting that the mobile terminal is logged in communications account, by described in The relevant information of communications account is sent to the terminal device bound in advance;
The mobile terminal issues the shifting that the communications account is stolen in user in the social webpage of the communications account The notification message logged in dynamic terminal.
Preferably, methods described also includes:
Mobile terminal to search WIFI signal, and identify the WIFI marks of the WIFI signal nearby nearby;
The mobile terminal is in WIFI log-on messages corresponding to WIFI marks described in server lookup;
WIFI marks and WIFI log-on messages are sent to the terminal device bound in advance by the mobile terminal.
Preferably, methods described also includes:
If described when being in stolen status, the mobile terminal is unlocked, then by the security information in the mobile terminal It is encrypted.
The embodiment of the present invention also provides a kind of mobile terminal, including:
Acquisition module, unblock authentication failed number is detected for mobile terminal, and judge whether the frequency of failure exceedes Preset times, if so, then gathering the positional information of the mobile terminal;
Judge module, for judging whether the positional information belongs to the movement locus institute that the mobile terminal prestores Corresponding position range;
Determining module, if being not belonging to the position range for the positional information, it is determined that the mobile terminal is in Stolen status;
First sending module, when being in stolen status for the mobile terminal, the mobile terminal will be described mobile whole The application program for the predesignated need for confidentiality installed on end is hidden on interface, and forbids the predesignated need for confidentiality Application program is run, and the positional information is sent to the terminal device bound in advance.
Preferably, the mobile terminal also includes:
Removing module, during in stolen status, the mobile terminal moves back the account logged on the mobile terminal Go out, and delete the password record of the account.
Preferably, the mobile terminal also includes:
Second sending module,, will when detecting that the mobile terminal is logged in communications account during in stolen status The relevant information of the communications account is sent to the terminal device bound in advance;
Release module, the shifting stolen for issuing the communications account in the social webpage of the communications account in user The notification message logged in dynamic terminal.
Preferably, the mobile terminal also includes:
Search module, for searching for WIFI signal nearby, and identify the WIFI marks of the WIFI signal nearby;
Enquiry module, in WIFI log-on messages corresponding to WIFI marks described in server lookup;
3rd sending module, for WIFI marks and WIFI log-on messages to be sent to the terminal bound in advance and set It is standby.
Preferably, the mobile terminal also includes:
Encrypting module, if for it is described be in stolen status when, the mobile terminal is unlocked, then by the mobile terminal In security information be encrypted.
The embodiment of the present invention also provides a kind of mobile terminal, including:
The processor and memory to intercouple;The processor is used to perform following steps:
Detection unblock authentication failed number, and judge whether the frequency of failure exceedes preset times, if so, then gathering institute State the positional information of mobile terminal;
Judge whether the positional information belongs to the position model corresponding to the movement locus that the mobile terminal prestores Enclose;If the positional information is not belonging to the position range, it is determined that the mobile terminal is in stolen status;
When the mobile terminal is in stolen status, by the predesignated need for confidentiality installed on the mobile terminal Application program is hidden on interface, and forbids the application program of the predesignated need for confidentiality to run, and the position is believed Breath is sent to the terminal device bound in advance.
Optionally, the processor is additionally operable to:When the mobile terminal is in stolen status, by the mobile terminal The account of login exits, and deletes the password record of the account.
Optionally, the processor is additionally operable to:When the mobile terminal is in stolen status, detect described mobile whole When end is logged in communications account, the relevant information of the communications account is sent to the terminal device bound in advance;Described logical Believe in the social webpage of account and issue the notification message that the communications account logs on the mobile terminal that user steals.
Optionally, the processor is additionally operable to:Mobile terminal to search WIFI signal, and identifying near described nearby The WIFI marks of WIFI signal;The mobile terminal is in WIFI log-on messages corresponding to WIFI marks described in server lookup;Institute State mobile terminal and WIFI marks and WIFI log-on messages are sent to the terminal device bound in advance.
Optionally, the processor is additionally operable to:If described, the mobile terminal is unlocked when being in stolen status, then will Security information in the mobile terminal is encrypted.
Optionally, in some possible embodiments of the present invention, the processor is additionally operable to detect the movement eventually Whether end, which occurs first, is got rid of action event, if mobile terminal, which occurs first, gets rid of action event, is detected the mobile terminal and is specified Intelligent watch whether occur second and get rid of action event, if the intelligent watch, which occurs second, gets rid of action event, judge described the One get rid of action event and second whipping as event include whether get rid of direction of action identical, if it is identical to get rid of direction of action, Judge described first get rid of action event and second whipping as the whipping that event includes make initial time whether be respectively positioned on it is default In duration, judge that described first gets rid of action event and second whipping and make the whether equal position of duration as the whipping that event includes In in the preset duration, if described first get rid of action event and second whipping as the whipping that event includes originate when Between be respectively positioned in preset duration, and described first gets rid of action event and second whipping continues as the whipping that event includes Duration is respectively positioned within the preset duration, judges that described first gets rid of action event and got rid of with second whipping as what event included Whether the difference of action initial time is less than the 3rd predetermined threshold value, if described first gets rid of action event and second whipping work The difference that the whipping that event includes makees initial time is less than the 3rd predetermined threshold value, judges that described first gets rid of action event and described the Whether the difference that two whippings make duration as the whipping that event includes is less than the 4th predetermined threshold value, if first whipping is made The difference that event makees duration with second whipping as the whipping that event includes is less than the 4th predetermined threshold value, determines the shifting Same action event occurs in the preset duration for dynamic terminal and the intelligent watch.It is determined that the mobile terminal and institute State in the case that same action event occurs in the preset duration for intelligent watch, release the stolen shape of the mobile terminal State.
The embodiment of the present invention also provides a kind of computer-readable recording medium, the computer-readable recording medium storage Program code, the instruction that described program code includes are used to perform following steps:
Detection unblock authentication failed number, and judge whether the frequency of failure exceedes preset times, if so, then gathering institute State the positional information of mobile terminal;
Judge whether the positional information belongs to the position model corresponding to the movement locus that the mobile terminal prestores Enclose;
If the positional information is not belonging to the position range, it is determined that the mobile terminal is in stolen status;
When the mobile terminal is in stolen status, by the predesignated need for confidentiality installed on the mobile terminal Application program is hidden on interface, and forbids the application program of the predesignated need for confidentiality to run, and the position is believed Breath is sent to the terminal device bound in advance.
Optionally, the instruction that described program code includes is additionally operable to perform following steps:Quilt is in the mobile terminal During robber's state, the account logged on the mobile terminal is exited, and deletes the password record of the account.
Optionally, the instruction that described program code includes is additionally operable to perform following steps:Quilt is in the mobile terminal During robber's state, when detecting that the mobile terminal is logged in communications account, the relevant information of the communications account is sent to pre- The terminal device first bound;The mobile end that the communications account is stolen in user is issued in the social webpage of the communications account The notification message logged on end.
Optionally, the instruction that described program code includes is additionally operable to perform following steps:Search WIFI signal, and knowing nearby The WIFI marks of not described WIFI signal nearby;In WIFI log-on messages corresponding to WIFI marks described in server lookup;By institute State WIFI marks and WIFI log-on messages are sent to the terminal device bound in advance.
Optionally, the instruction that described program code includes is additionally operable to perform following steps:If described when being in stolen status, The mobile terminal is unlocked, then the security information in the mobile terminal is encrypted.
In the embodiment of the present invention, mobile terminal detection unblock authentication failed number, and judge whether the frequency of failure surpasses Preset times are crossed, if so, then gathering the positional information of the mobile terminal;Whether the mobile terminal judges the positional information Belong to the position range corresponding to the movement locus that the mobile terminal prestores;If the positional information is not belonging to institute's rheme Put scope, it is determined that the mobile terminal is in stolen status;When the mobile terminal is in stolen status, the mobile terminal The application program for the predesignated need for confidentiality installed on the mobile terminal is hidden on interface, and forbids the finger in advance Determine the application program operation of need for confidentiality, and the positional information is sent to the terminal device bound in advance.So can be real Now the information of protection application program will not be revealed in time, to improve the security performance of mobile terminal.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, it will use below required in embodiment Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for ability For the those of ordinary skill of domain, on the premise of not paying creative work, it can also be obtained according to these accompanying drawings other attached Figure.
Fig. 1 is the schematic flow sheet that a kind of mobile terminal provided in an embodiment of the present invention is stolen processing method;
Fig. 2 is a kind of structural representation of mobile terminal provided in an embodiment of the present invention;
Fig. 3 is the structural representation of another mobile terminal provided in an embodiment of the present invention;
Fig. 4 is the structural representation of another mobile terminal provided in an embodiment of the present invention;
Fig. 5 is the structural representation of another mobile terminal provided in an embodiment of the present invention;
Fig. 6 is the structural representation of another mobile terminal provided in an embodiment of the present invention;
Fig. 7 is the structural representation of another mobile terminal provided in an embodiment of the present invention;
Fig. 8 is the structural representation of another mobile terminal provided in an embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.Based on this Embodiment in invention, the every other reality that those of ordinary skill in the art are obtained under the premise of creative work is not made Example is applied, belongs to the scope of protection of the invention.
Fig. 1 is refer to, Fig. 1 is the flow signal that a kind of mobile terminal provided in an embodiment of the present invention is stolen processing method Figure, as shown in figure 1, including:
101st, mobile terminal detection unblock authentication failed number, and judge whether the frequency of failure exceedes preset times, If so, then gather the positional information of the mobile terminal;
103rd, mobile terminal judges whether the positional information belongs to the movement locus institute that the mobile terminal prestores Corresponding position range;
If the 102nd, the positional information is not belonging to the position range, it is determined that the mobile terminal is in stolen status;
104th, when the mobile terminal is in stolen status, the mobile terminal is advance by what is installed on the mobile terminal Specify the application program of need for confidentiality to be hidden on interface, and forbid the application program of the predesignated need for confidentiality to run, And the positional information is sent to the terminal device bound in advance.
In the embodiment, it can be realized by above-mentioned steps and hide the application program of need for confidentiality on interface, and Forbid the application program of the predesignated need for confidentiality to run, the information to mobile terminal can be so protected with a more step.And These application programs can not also be run so that the information of mobile terminal is effectively protected, so as to reach raising mobile terminal Information security purpose.Wherein, above-mentioned application program can be payment application, bank application, communication chat should With program or finance and economics application program etc..
Preferably, methods described also includes:
When the mobile terminal is in stolen status, the mobile terminal moves back the account logged on the mobile terminal Go out, and delete the password record of the account.
The embodiment, the account of the application program of mobile terminal login can also be further deleted, so as to further protect Protect the security information of mobile terminal.
Preferably, methods described also includes:
When the mobile terminal is in stolen status, when detecting that the mobile terminal is logged in communications account, by described in The relevant information of communications account is sent to the terminal device bound in advance;
The mobile terminal issues the shifting that the communications account is stolen in user in the social webpage of the communications account The notification message logged in dynamic terminal.
In the embodiment, above-mentioned communications account can be the communications account that stealer logs in after mobile terminal is stolen, this Sample by issued in the social webpage of the communications account communications account logged on the mobile terminal for stealing user it is logical Know message, it is whole without using the movement so as to be advantageous to pilferage user so as to reach the pilferage shape of pilferage user to be open End, and then protect the purpose of the security information of mobile terminal.
Preferably, methods described also includes:
Mobile terminal to search WIFI signal, and identify the WIFI marks of the WIFI signal nearby nearby;
The mobile terminal is in WIFI log-on messages corresponding to WIFI marks described in server lookup;
WIFI marks and WIFI log-on messages are sent to the terminal device bound in advance by the mobile terminal.
In the embodiment, each WIFI signal can be in above-mentioned server authentication, so be identified by above-mentioned WIFI, User's can is confirmed to the identity-related information of the people of mobile terminal steathily, to facilitate user to give mobile terminal for change.
Preferably, methods described also includes:
If described when being in stolen status, the mobile terminal is unlocked, then by the security information in the mobile terminal It is encrypted.
It can be realized when detecting that mobile terminal is in stolen status, by the mobile terminal by above-mentioned steps Security information is encrypted, so as to improve the security performance of mobile terminal safety information.Wherein, above-mentioned security information can be moved The security information that dynamic terminal is pre-set, or user are preassigned, and quilt is in detecting it is of course also possible to be mobile terminal Automatic identification during robber's state.
Optionally, in some possible embodiments of the present invention, the mobile terminal also can detect described mobile whole Whether end, which occurs first, is got rid of action event, if mobile terminal, which occurs first, gets rid of action event, is detected the mobile terminal and is specified Intelligent watch whether occur second and get rid of action event, if the intelligent watch, which occurs second, gets rid of action event, judge described the One get rid of action event and second whipping as event include whether get rid of direction of action identical, if it is identical to get rid of direction of action, Judge described first get rid of action event and second whipping as the whipping that event includes make initial time whether be respectively positioned on it is default In duration, judge that described first gets rid of action event and second whipping and make the whether equal position of duration as the whipping that event includes In in the preset duration, if described first get rid of action event and second whipping as the whipping that event includes originate when Between be respectively positioned in preset duration, and described first gets rid of action event and second whipping continues as the whipping that event includes Duration is respectively positioned within the preset duration, judges that described first gets rid of action event and got rid of with second whipping as what event included Whether the difference of action initial time is less than the 3rd predetermined threshold value, if described first gets rid of action event and second whipping work The difference that the whipping that event includes makees initial time is less than the 3rd predetermined threshold value, judges that described first gets rid of action event and described the Whether the difference that two whippings make duration as the whipping that event includes is less than the 4th predetermined threshold value, if first whipping is made The difference that event makees duration with second whipping as the whipping that event includes is less than the 4th predetermined threshold value, determines the shifting Same action event occurs in the preset duration for dynamic terminal and the intelligent watch.
Optionally, in some possible embodiments of the present invention, it is determined that the mobile terminal and the intelligent hand In the case that same action event occurs in the preset duration for table, the stolen status of the mobile terminal is released.
Optionally, the preset duration can be 11 seconds, 22 seconds, 30 seconds, 50 seconds, 72 seconds, 102 seconds or other time.
Optionally, the first predetermined threshold value can be 3 seconds, 5 seconds, 10 seconds, 20 seconds, 50 seconds, 84 seconds or other time.
Optionally, the second predetermined threshold value can be 13 seconds, 15 seconds, 22 seconds, 20 seconds, 54 seconds, 81 seconds or other time.
Fig. 2 is refer to, Fig. 2 is a kind of structural representation of mobile terminal provided in an embodiment of the present invention, as shown in Fig. 2 Including:
Acquisition module 201, unblock authentication failed number is detected for mobile terminal, and judge whether the frequency of failure surpasses Preset times are crossed, if so, then gathering the positional information of the mobile terminal;
Judge module 202, for judging whether the positional information belongs to the motion rail that the mobile terminal prestores Position range corresponding to mark;
Determining module 203, if being not belonging to the position range for the positional information, it is determined that at the mobile terminal In stolen status;
First sending module 204, when being in stolen status for the mobile terminal, the mobile terminal is by the movement The application program for the predesignated need for confidentiality installed in terminal is hidden on interface, and forbids the predesignated need for confidentiality Application program operation, and the positional information is sent to the terminal device bound in advance.
Preferably, as shown in figure 3, the mobile terminal also includes:
Removing module 205, during in stolen status, account that the mobile terminal will log on the mobile terminal Exit, and delete the password record of the account.
Preferably, as shown in figure 4, the mobile terminal also includes:
Second sending module 206, during in stolen status, detect that the mobile terminal is logged in communications account When, the relevant information of the communications account is sent to the terminal device bound in advance;
Release module 207, stolen for issuing the communications account in the social webpage of the communications account in user Mobile terminal on the notification message that logs in.
Preferably, as shown in figure 5, the mobile terminal also includes:
Search module 208, for searching for WIFI signal nearby, and identify the WIFI marks of the WIFI signal nearby;
Enquiry module 209, in WIFI log-on messages corresponding to WIFI marks described in server lookup;
3rd sending module 2010, for WIFI marks and WIFI log-on messages to be sent into the terminal bound in advance Equipment.
Preferably, as shown in fig. 6, the mobile terminal also includes:
Encrypting module 2011, if for it is described be in stolen status when, the mobile terminal is unlocked, then by the movement Security information in terminal is encrypted.
In the embodiment of the present invention, mobile terminal detection unblock authentication failed number, and judge whether the frequency of failure surpasses Preset times are crossed, if so, then gathering the positional information of the mobile terminal;Whether the mobile terminal judges the positional information Belong to the position range corresponding to the movement locus that the mobile terminal prestores;If the positional information is not belonging to institute's rheme Put scope, it is determined that the mobile terminal is in stolen status;When the mobile terminal is in stolen status, the mobile terminal The application program for the predesignated need for confidentiality installed on the mobile terminal is hidden on interface, and forbids the finger in advance Determine the application program operation of need for confidentiality, and the positional information is sent to the terminal device bound in advance.So can be real Now the information of protection application program will not be revealed in time, to improve the security performance of mobile terminal.
Referring to Fig. 7, the embodiment of the present invention also provides a kind of mobile terminal 700, including:The He of processor 710 to intercouple Memory 720;The processor 710 is used to perform following steps:
Detection unblock authentication failed number, and judge whether the frequency of failure exceedes preset times, if so, then gathering institute State the positional information of mobile terminal;
Judge whether the positional information belongs to the position model corresponding to the movement locus that the mobile terminal prestores Enclose;If the positional information is not belonging to the position range, it is determined that the mobile terminal is in stolen status;
When the mobile terminal is in stolen status, by the predesignated need for confidentiality installed on the mobile terminal Application program is hidden on interface, and forbids the application program of the predesignated need for confidentiality to run, and the position is believed Breath is sent to the terminal device bound in advance.
Optionally, the processor is additionally operable to:When the mobile terminal is in stolen status, by the mobile terminal The account of login exits, and deletes the password record of the account.
Optionally, the processor is additionally operable to:When the mobile terminal is in stolen status, detect described mobile whole When end is logged in communications account, the relevant information of the communications account is sent to the terminal device bound in advance;Described logical Believe in the social webpage of account and issue the notification message that the communications account logs on the mobile terminal that user steals.
Optionally, the processor is additionally operable to:Mobile terminal to search WIFI signal, and identifying near described nearby The WIFI marks of WIFI signal;The mobile terminal is in WIFI log-on messages corresponding to WIFI marks described in server lookup;Institute State mobile terminal and WIFI marks and WIFI log-on messages are sent to the terminal device bound in advance.
Optionally, the processor is additionally operable to:If described, the mobile terminal is unlocked when being in stolen status, then will Security information in the mobile terminal is encrypted.
Optionally, in some possible embodiments of the present invention, the processor 710 is additionally operable to detect the movement Whether terminal, which occurs first, is got rid of action event, if mobile terminal, which occurs first, gets rid of action event, is detected the mobile terminal and is referred to Whether fixed intelligent watch, which occurs second, is got rid of action event, if the intelligent watch, which occurs second, gets rid of action event, described in judgement First get rid of action event and second whipping as event include whether get rid of direction of action identical, if getting rid of direction of action phase Together, judge described first get rid of action event and second whipping as the whipping that event includes make initial time whether be respectively positioned on it is pre- If in duration, judge that described first gets rid of action event and second whipping whether as the whipping that event includes make duration equal In the preset duration, if described first gets rid of action event and second whipping originates as the whipping that event includes Time is respectively positioned in preset duration, and described first gets rid of action event and second whipping is held as the whipping that event includes Continuous duration is respectively positioned within the preset duration, judges that described first gets rid of what action event and second whipping included as event Whether the difference that whipping makees initial time is less than the 3rd predetermined threshold value, if described first gets rid of action event and second whipping The difference that the whipping included as event makees initial time is less than the 3rd predetermined threshold value, judge described first get rid of action event with it is described Whether the difference that the second whipping makees duration as the whipping that event includes is less than the 4th predetermined threshold value, if first whipping Make event and second whipping and make the difference of duration as the whipping that event includes to be less than the 4th predetermined threshold value, it is determined that described Same action event occurs in the preset duration for mobile terminal and the intelligent watch.It is determined that the mobile terminal and In the case that same action event occurs in the preset duration for the intelligent watch, the stolen of the mobile terminal is released State.
The embodiment of the present invention also provides a kind of computer-readable recording medium, the computer-readable recording medium storage Program code, the instruction that described program code includes are used to perform following steps:
Detection unblock authentication failed number, and judge whether the frequency of failure exceedes preset times, if so, then gathering institute State the positional information of mobile terminal;
Judge whether the positional information belongs to the position model corresponding to the movement locus that the mobile terminal prestores Enclose;
If the positional information is not belonging to the position range, it is determined that the mobile terminal is in stolen status;
When the mobile terminal is in stolen status, by the predesignated need for confidentiality installed on the mobile terminal Application program is hidden on interface, and forbids the application program of the predesignated need for confidentiality to run, and the position is believed Breath is sent to the terminal device bound in advance.
Optionally, the instruction that described program code includes is additionally operable to perform following steps:Quilt is in the mobile terminal During robber's state, the account logged on the mobile terminal is exited, and deletes the password record of the account.
Optionally, the instruction that described program code includes is additionally operable to perform following steps:Quilt is in the mobile terminal During robber's state, when detecting that the mobile terminal is logged in communications account, the relevant information of the communications account is sent to pre- The terminal device first bound;The mobile end that the communications account is stolen in user is issued in the social webpage of the communications account The notification message logged on end.
Optionally, the instruction that described program code includes is additionally operable to perform following steps:Search WIFI signal, and knowing nearby The WIFI marks of not described WIFI signal nearby;In WIFI log-on messages corresponding to WIFI marks described in server lookup;By institute State WIFI marks and WIFI log-on messages are sent to the terminal device bound in advance.
Optionally, the instruction that described program code includes is additionally operable to perform following steps:If described when being in stolen status, The mobile terminal is unlocked, then the security information in the mobile terminal is encrypted.
The embodiment of the present invention additionally provides another mobile terminal, as shown in figure 8, for convenience of description, illustrate only and this The related part of inventive embodiments, particular technique details do not disclose, refer to present invention method part.The movement is whole End can be to include mobile phone, tablet personal computer, PDA (Personal Digital Assistant, personal digital assistant), POS Any terminal device such as (Point ofSales, point-of-sale terminal), vehicle-mounted computer, so that mobile terminal is mobile phone as an example:
Fig. 8 is illustrated that the block diagram of the part-structure of the mobile phone related to mobile terminal provided in an embodiment of the present invention.Ginseng Fig. 8 is examined, mobile phone includes:Radio frequency (Radio Frequency, RF) circuit 910, memory 920, input block 930, sensor 950th, voicefrequency circuit 960, Wireless Fidelity (Wireless Fidelity, WiFi) module 970, processor 980 and power supply 990 Deng part.It will be understood by those skilled in the art that the handset structure shown in Fig. 8 does not form the restriction to mobile phone, can wrap Include than illustrating more or less parts, either combine some parts or different parts arrangement.
Each component parts of mobile phone is specifically introduced with reference to Fig. 8:
Input block 930 can be used for the numeral or character information for receiving input, and produce with the user of mobile phone set with And the key signals input that function control is relevant.Specifically, input block 930 may include touching display screen 933, biological identification device 931 and other input equipments 932.Biological identification device 931 can be fingerprint identification device, or, face identification device, or Person, iris identification device etc..Input block 930 can also include other input equipments 932.Specifically, other input equipments 932 can include but is not limited to physical button, function key (such as volume control button, switch key etc.), trace ball, mouse, One or more in action bars etc..Wherein, the processor 980 is used to obtain pending image, the pending image Target area is used to add watermark recovery;Determine the first colouring information of the first image corresponding to the target area;Determine institute State the absolute value of the colour-difference between the first colouring information and the second colouring information of the watermark recovery;It is small in the absolute value When predetermined threshold value, color adjustment, and second face after adjustment are carried out to described first image and/or the watermark recovery Colour-difference between color information and first colouring information is in preset range;By the pending image after adjustment and institute State watermark recovery to be synthesized, obtain output image.
Processor 980 is the control centre of mobile phone, using various interfaces and the various pieces of connection whole mobile phone, is led to Cross operation or perform the software program and/or module being stored in memory 920, and call and be stored in memory 920 Data, the various functions and processing data of mobile phone are performed, so as to carry out integral monitoring to mobile phone.Optionally, processor 980 can wrap Include one or more processing units;Optionally, processor 980 can integrated processor and modem processor, wherein, processor Main processing operating system, user interface and application program etc., modem processor mainly handles radio communication.It is appreciated that , above-mentioned modem processor can not also be integrated into processor 980.
In addition, memory 920 can include high-speed random access memory, nonvolatile memory, example can also be included Such as at least one disk memory, flush memory device or other volatile solid-state parts.
RF circuits 910 can be used for the reception and transmission of information.Generally, RF circuits 910 include but is not limited to antenna, at least one Individual amplifier, transceiver, coupler, low-noise amplifier (LowNoiseAmplifier, LNA), duplexer etc..In addition, RF Circuit 910 can also be communicated by radio communication with network and other equipment.Above-mentioned radio communication can use any communication to mark Accurate or agreement, including but not limited to global system for mobile communications (Global System ofMobile communication, GSM), general packet radio service (General Packet Radio Service, GPRS), CDMA (Code Division Multiple Access, CDMA), WCDMA (Wideband Code Division Multiple Access, WCDMA), Long Term Evolution (Long Term Evolution, LTE), Email, Short Message Service (ShortMessaging Service, SMS) etc..
Mobile phone may also include at least one sensor 950, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor may include ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to ambient light Light and shade adjust the brightness of touching display screen, proximity transducer can when mobile phone is moved in one's ear, close touching display screen and/ Or backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions (generally three axles) acceleration Size, size and the direction of gravity are can detect that when static, available for identification mobile phone posture application (such as horizontal/vertical screen switching, Dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;It can also configure as mobile phone Gyroscope, barometer, hygrometer, thermometer, the other sensors such as infrared ray sensor, will not be repeated here.
Wherein, voicefrequency circuit 960, loudspeaker 961, microphone 962 can provide the COBBAIF between user and mobile phone.Sound Electric signal after the voice data received conversion can be transferred to loudspeaker 961, is converted to by loudspeaker 961 by frequency circuit 960 Voice signal plays;On the other hand, the voice signal of collection is converted to electric signal by microphone 962, is received by voicefrequency circuit 960 After be converted to voice data, it is such as another to be sent to through RF circuits 910 then after voice data playback process device 980 is handled Mobile phone, or voice data is played to memory 920 further to handle.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronicses postal by WiFi module 970 Part, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and accessed.Although Fig. 8 is shown WiFi module 970, but it is understood that, it is simultaneously not belonging to must be configured into for mobile phone, can not change as needed completely Become in the essential scope of invention and omit.
Mobile phone also includes the power supply 990 (such as battery) to all parts power supply, and optionally, power supply can pass through power supply pipe Reason system and processor 980 are logically contiguous, so as to realize management charging, electric discharge and power managed by power-supply management system Etc. function.
Although being not shown, mobile phone can also include camera, bluetooth module etc., will not be repeated here.
In embodiment shown in earlier figures 1, each step method flow can based on the mobile phone structure realize.
In embodiment shown in 2~Fig. 6 of earlier figures, each unit function can based on the mobile phone structure realize.
The embodiment of the present invention also provides a kind of computer program product, and the computer program product includes storing calculating The non-transient computer-readable recording medium of machine program, the computer program are operable to make mobile terminal perform as described above The part or all of step of any method described in embodiment of the method.
In several embodiments provided herein, it should be understood that disclosed method and apparatus, can be by other Mode realize.For example, device embodiment described above is only schematical, for example, the division of the unit, only For a kind of division of logic function, there can be other dividing mode when actually realizing, such as multiple units or component can combine Or another system is desirably integrated into, or some features can be ignored, or do not perform.Another, shown or discussed phase Coupling or direct-coupling or communication connection between mutually can be by some interfaces, the INDIRECT COUPLING or communication of device or unit Connection, can be electrical, mechanical or other forms.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, can also That the independent physics of unit includes, can also two or more units it is integrated in a unit.Above-mentioned integrated list Member can both be realized in the form of hardware, can also be realized in the form of hardware adds SFU software functional unit.
The above-mentioned integrated unit realized in the form of SFU software functional unit, can be stored in one and computer-readable deposit In storage media.Above-mentioned SFU software functional unit is stored in a storage medium, including some instructions are causing a computer Equipment (can be personal computer, server, or network equipment etc.) performs receiving/transmission method described in each embodiment of the present invention Part steps.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (Read-Only Memory, abbreviation ROM), random access memory (RandomAccess Memory, abbreviation RAM), magnetic disc or CD etc. are various can store journey The medium of sequence code.
Described above is the preferred embodiment of the present invention, it is noted that for those skilled in the art For, on the premise of principle of the present invention is not departed from, some improvements and modifications can also be made, these improvements and modifications It should be regarded as protection scope of the present invention.

Claims (10)

  1. A kind of 1. mobile terminal, it is characterised in that including:
    The processor and memory to intercouple;The processor is used to perform following steps:
    Detection unblock authentication failed number, and judge whether the frequency of failure exceedes preset times, if so, then gathering the shifting The positional information of dynamic terminal;
    Judge whether the positional information belongs to the position range corresponding to the movement locus that the mobile terminal prestores;If The positional information is not belonging to the position range, it is determined that the mobile terminal is in stolen status;
    When the mobile terminal is in stolen status, by the application for the predesignated need for confidentiality installed on the mobile terminal Program is hidden on interface, and forbids the application program of the predesignated need for confidentiality to run, and the positional information is sent out Give the terminal device bound in advance.
  2. 2. mobile terminal as claimed in claim 1, it is characterised in that the processor is additionally operable to:At the mobile terminal When stolen status, the account logged on the mobile terminal is exited, and deletes the password record of the account.
  3. 3. mobile terminal as claimed in claim 2, it is characterised in that
    The processor is additionally operable to:When the mobile terminal is in stolen status, detect that the mobile terminal is logged in leading to When believing account, the relevant information of the communications account is sent to the terminal device bound in advance;In the society of the communications account Hand in webpage and issue the notification message that the communications account logs on the mobile terminal that user steals.
  4. 4. such as the mobile terminal any one of claim 1-3, it is characterised in that the processor is additionally operable to:The shifting Dynamic terminal searching WIFI signal, and identify the WIFI marks of the WIFI signal nearby nearby;The mobile terminal is in server Inquire about WIFI log-on messages corresponding to the WIFI marks;The mobile terminal sends out WIFI marks and WIFI log-on messages Give the terminal device bound in advance.
  5. 5. such as the mobile terminal any one of claim 1-3, it is characterised in that the processor is additionally operable to:It is if described During in stolen status, the mobile terminal is unlocked, then the security information in the mobile terminal is encrypted.
  6. A kind of 6. computer-readable recording medium, it is characterised in that computer-readable recording medium storage program code, The instruction that described program code includes is used to perform following steps:
    Detection unblock authentication failed number, and judge whether the frequency of failure exceedes preset times, if so, then gathering the shifting The positional information of dynamic terminal;
    Judge whether the positional information belongs to the position range corresponding to the movement locus that the mobile terminal prestores;
    If the positional information is not belonging to the position range, it is determined that the mobile terminal is in stolen status;
    When the mobile terminal is in stolen status, by the application for the predesignated need for confidentiality installed on the mobile terminal Program is hidden on interface, and forbids the application program of the predesignated need for confidentiality to run, and the positional information is sent out Give the terminal device bound in advance.
  7. 7. computer-readable recording medium as claimed in claim 6, it is characterised in that the instruction that described program code includes is also For performing following steps:When the mobile terminal is in stolen status, the account logged on the mobile terminal is exited, And delete the password record of the account.
  8. 8. computer-readable recording medium as claimed in claim 7, it is characterised in that the instruction that described program code includes is also For performing following steps:When the mobile terminal is in stolen status, detect that the mobile terminal is logged in the account that communicates Number when, the relevant information of the communications account is sent to the terminal device bound in advance;In the social network of the communications account The notification message that the communications account logs on the mobile terminal that user steals is issued in page.
  9. 9. such as the computer-readable recording medium any one of claim 6-8, it is characterised in that described program code bag The instruction included is additionally operable to perform following steps:Search WIFI signal, and identify the WIFI marks of the WIFI signal nearby nearby; In WIFI log-on messages corresponding to WIFI marks described in server lookup;WIFI marks and WIFI log-on messages are sent to The terminal device bound in advance.
  10. 10. such as the computer-readable recording medium any one of claim 6-8, it is characterised in that described program code Including instruction be additionally operable to perform following steps:If described, the mobile terminal is unlocked when being in stolen status, then will described in Security information in mobile terminal is encrypted.
CN201710790044.2A 2017-09-05 2017-09-05 Mobile terminal and relevant device with stolen safeguard function Pending CN107707736A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710790044.2A CN107707736A (en) 2017-09-05 2017-09-05 Mobile terminal and relevant device with stolen safeguard function

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710790044.2A CN107707736A (en) 2017-09-05 2017-09-05 Mobile terminal and relevant device with stolen safeguard function

Publications (1)

Publication Number Publication Date
CN107707736A true CN107707736A (en) 2018-02-16

Family

ID=61172003

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710790044.2A Pending CN107707736A (en) 2017-09-05 2017-09-05 Mobile terminal and relevant device with stolen safeguard function

Country Status (1)

Country Link
CN (1) CN107707736A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108769429A (en) * 2018-06-20 2018-11-06 努比亚技术有限公司 Mobile terminal safety mode starting method, mobile terminal and readable storage medium storing program for executing
CN110446162A (en) * 2019-07-13 2019-11-12 恒大智慧科技有限公司 A kind of router anti-lost method and system, computer readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102932540A (en) * 2012-10-24 2013-02-13 广东欧珀移动通信有限公司 Mobile terminal and stealing prevention method thereof
CN103607416A (en) * 2013-12-09 2014-02-26 吴东辉 Method and application system for authenticating identity of network terminal machine
CN106203012A (en) * 2016-06-22 2016-12-07 中国联合网络通信集团有限公司 The processing method of screen locking, device and equipment
CN106357876A (en) * 2015-07-14 2017-01-25 中兴通讯股份有限公司 Data display method of mobile terminal and device
CN106658489A (en) * 2016-09-30 2017-05-10 广东欧珀移动通信有限公司 Terminal application processing method, device and mobile terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102932540A (en) * 2012-10-24 2013-02-13 广东欧珀移动通信有限公司 Mobile terminal and stealing prevention method thereof
CN103607416A (en) * 2013-12-09 2014-02-26 吴东辉 Method and application system for authenticating identity of network terminal machine
CN106357876A (en) * 2015-07-14 2017-01-25 中兴通讯股份有限公司 Data display method of mobile terminal and device
CN106203012A (en) * 2016-06-22 2016-12-07 中国联合网络通信集团有限公司 The processing method of screen locking, device and equipment
CN106658489A (en) * 2016-09-30 2017-05-10 广东欧珀移动通信有限公司 Terminal application processing method, device and mobile terminal

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108769429A (en) * 2018-06-20 2018-11-06 努比亚技术有限公司 Mobile terminal safety mode starting method, mobile terminal and readable storage medium storing program for executing
CN110446162A (en) * 2019-07-13 2019-11-12 恒大智慧科技有限公司 A kind of router anti-lost method and system, computer readable storage medium

Similar Documents

Publication Publication Date Title
CN103488924B (en) A kind of unlocking processing method of terminal, device and equipment
CN104966005B (en) A kind of access control method, and terminal device
EP2731066B1 (en) Electronic device and method for controlling payment function of input means
CN105912905A (en) Fingerprint unlocking method and terminal
CN104901805B (en) A kind of identification authentication methods, devices and systems
CN106470269A (en) A kind of method and apparatus of antitheft mobile phone
US9940448B2 (en) Unlock processing method and device
CN106327193B (en) A kind of system unlocking method and equipment
CN106778175A (en) A kind of interface locking means, device and terminal device
CN104967593A (en) Identity verification method, apparatus and system
CN106331370A (en) Data transmission method and terminal device
CN107679410A (en) Possess the mobile terminal and Related product of certain privacy protection function
CN106412311A (en) Data transmission method and terminal device
CN103366104A (en) Method and device for controlling accessing of application
CN107577961A (en) Mobile terminal and Related product available for security information protection
CN107609407A (en) The guard method of information security and device in a kind of user terminal
CN106878554A (en) A kind of theft preventing method of mobile terminal, device and mobile terminal
CN106611152A (en) User identity determination method and apparatus
WO2020015655A1 (en) Mobile terminal and screen unlocking method and device
CN107707736A (en) Mobile terminal and relevant device with stolen safeguard function
CN106066953B (en) Fingerprint unlocking control method and terminal equipment
CN107948390A (en) The guard method of user data and mobile terminal
CN106407779A (en) Information acquisition method and apparatus, and terminal
CN105912914A (en) Fingerprint unlocking method and terminal equipment
CN106503512A (en) Mobile terminal and its plus/unlocking method and a device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180216