CN107911546A - Theft preventing method, anti-theft device and the mobile terminal of mobile terminal - Google Patents
Theft preventing method, anti-theft device and the mobile terminal of mobile terminal Download PDFInfo
- Publication number
- CN107911546A CN107911546A CN201711122217.XA CN201711122217A CN107911546A CN 107911546 A CN107911546 A CN 107911546A CN 201711122217 A CN201711122217 A CN 201711122217A CN 107911546 A CN107911546 A CN 107911546A
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- secret key
- touch
- key
- screen
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72454—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
- H04M1/67—Preventing unauthorised calls from a telephone set by electronic means
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Human Computer Interaction (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Environmental & Geological Engineering (AREA)
- Telephone Function (AREA)
Abstract
The present invention relates to a kind of theft preventing method of mobile terminal, anti-theft device and mobile terminal.The theft preventing method of the mobile terminal includes:By receiving the input signal of the button on the mobile terminal, recovery secret key is set, and the recovery secret key is associated with the login of unlock and/or the specified application of locking screen interface;After the secret key of the locking screen interface or the login interface mistake of specified application input pre-determined number, touch-screen is set to fail;Receive and input secret key via the user of the key-press input;Judge that the user inputs secret key and whether the recovery secret key is consistent, if unanimously, recovering the function of the touch-screen;If not receiving, the user inputs secret key or the user inputs secret key and the recovery secret key is inconsistent, and the mobile terminal does not do any response.The anti-theft technique scheme of the mobile terminal of the present invention can effectively strengthen the personal information security of mobile terminal after the loss.
Description
Technical field
The present invention relates to a kind of mobile equipment, in particular to a kind of theft preventing method of mobile terminal, anti-theft device,
Mobile terminal and computer-readable recording medium.
Background technology
Modern daily life increasingly be unable to do without mobile equipment, for example, tablet computer, smart mobile phone, e-book,
Portable notebook etc..Especially smart mobile phone etc. may store individual privacy, be also usually bundled with bank's card number or branch is paid a bill
Number, information security is closely bound up safely with personal property.Once these intelligent movable device losses, it will caused very to user
Serious property or reputational damage, are not that only to lose a smart machine so simple.
At present, also emerge in an endless stream in constantly progressive and development, unlocking manner for the security strategy of such as smart mobile phone,
Unlocked by fingerprint, pattern unlock, numeral unlock, or it is relatively newer based on recognition of face, speech recognition, touch Feature Points Matching etc.
The unlocking manner of grain husk.
The intelligent machine of present mainstream is all to coordinate opening mobile phone in a manner of unlocked by fingerprint adds pattern or numeral unlock auxiliary
Operation.Such solution is latched in a security risk, once mobile phone is lost, under normal circumstances, criminal can always not
Pattern or numeral unlock are gone in disconnected trial, are most likely to successfully unlock smart mobile phone at last, are viewed user information, maliciously grasped
Make.
The content of the invention
In view of the above problems, mobile equipment with touch-screen can effectively be strengthened after the loss the present invention provides a kind of
Theft preventing method, anti-theft device, mobile terminal and the computer-readable recording medium of the mobile terminal of security.
According to embodiment of the present invention, there is provided a kind of mobile terminal, the mobile terminal includes touch-screen, described
Theft preventing method includes:
By receiving the input signal of the button on the mobile terminal, recovery secret key is set, and by the recovery secret key
The login of unlock and/or specified application with locking screen interface is associated;
The locking screen interface or the login interface of the specified application unlocked by predetermined mode or login failure after,
The touch-screen is set to fail;
Receive and input secret key via the user of the key-press input;
Judge that the user inputs secret key and whether the recovery secret key is consistent, if unanimously, recovering the touch-screen
Function;If not receiving, the user inputs secret key or the user inputs secret key and the recovery secret key is inconsistent, institute
State mobile terminal and do not do any response.
In the theft preventing method of above-mentioned mobile terminal, the button be included in virtual key below the touch-screen,
One or more of the physical button of touch controlled key or setting on the mobile terminal.
In the theft preventing method of above-mentioned mobile terminal, the button be included in virtual key below the touch-screen or
One or more of touch controlled key.
In the theft preventing method of above-mentioned mobile terminal, the instruction that server is sent to the mobile terminal is received, makes institute
The touch-screen failure of mobile terminal is stated, described instruction is to log in the server by other-end in user, is tested by identity
After card, sent by the server.
In the theft preventing method of above-mentioned mobile terminal, the recovery secret key is key press time, touch potential and button are suitable
The combination secret key of at least two parameters in sequence.
In the theft preventing method of above-mentioned mobile terminal, set by receiving the input signal of at least two buttons
The recovery secret key, it is described to recover the combination secret key that secret key is two parameters of the touch potential and the keystroke sequence.
In the theft preventing method of above-mentioned mobile terminal, when pre-setting the recovery secret key, make user's selection in institute
Related prompting whether is provided when stating touch screen failure, if user selects to provide related prompting, when making screen fail, prompts input
Recover key.
According to another implementation of the invention, there is provided a kind of anti-theft device of mobile terminal, the mobile terminal bag
Touch-screen is included, the anti-theft device includes:
Secret key setup module, for recovering secret by receiving the input signal of the button on the mobile terminal to set
Key, and the recovery secret key is associated with the login of unlock and/or the specified application of locking screen interface;
Touch screen failed module, for passing through predetermined mode in the login interface of the locking screen interface or the specified application
After unlock or login failure, the touch-screen is set to fail;
Secret key receiving module, the user for receiving via the key-press input input secret key;
Secret key authentication module, for judging that the user inputs secret key and whether the recovery secret key is consistent, if unanimously,
Recover the function of the touch-screen;Secret key or user input secret key and the recovery are inputted not receiving the user
When secret key is inconsistent, the mobile terminal is set not do any response.
In the anti-theft device of above-mentioned mobile terminal, the button be included in virtual key below the touch-screen,
One or more of the physical button of touch controlled key or setting on the mobile terminal.
In the anti-theft device of above-mentioned mobile terminal, the button be included in virtual key below the touch-screen or
One or more of touch controlled key.
In the anti-theft device of above-mentioned mobile terminal, the touch screen failed module is additionally operable to receive server to the shifting
The instruction that dynamic terminal is sent, makes the touch-screen of the mobile terminal fail, described instruction is to be logged in user by other-end
The server, after authentication, is sent by the server.
In the anti-theft device of above-mentioned mobile terminal, the recovery secret key is key press time, touch potential and button are suitable
The combination secret key of at least two parameters in sequence.
In the anti-theft device of above-mentioned mobile terminal, the secret key setup module is by receiving at least two buttons
Input signal the recovery secret key is set, the recovery secret key is two parameters of the touch potential and the keystroke sequence
Combination secret key.
In the anti-theft device of above-mentioned mobile terminal, the secret key setup module is pre-setting the recovery secret key
When, make whether user's selection provides related prompting when the touch screen fails, if user selects to provide related prompting, make screen
During curtain failure, input is prompted to recover key.
A further embodiment according to the present invention, there is provided a kind of mobile terminal, including memory and processor, it is described to deposit
Reservoir is used to store computer program, and the processor runs the computer program so that the mobile terminal execution is according to upper
The theft preventing method for the mobile terminal stated.
Another embodiment according to the present invention, there is provided a kind of computer-readable recording medium, it is stored with above-mentioned movement
Computer program used in terminal.
The antitheft scheme of mobile terminal of the present invention is a kind of smart machine anti-theft security strategy based on touch-screen, can be with
Effectively strengthen mobile phone, the personal information security of tablet computer after the loss.Specific method is failed when mobile phone pattern unlocks
After can actively trigger touch-screen and can not carry out any operation, i.e. touch-screen failure in visible area, it is only extensive in unique mode
It is multiple just can be with, and this unique pattern is also very hidden.So so that criminal can not operate and unlock mobile phone,
Greatly improve the security of mobile phone.
In addition, technical scheme can also by user by Server remote by touch-screen failure, or other
Password mistake is detected in and makes touch-screen failure.
To enable the above objects, features and advantages of the present invention to become apparent, preferred embodiment cited below particularly, and coordinate
Appended attached drawing, is described in detail below.
Brief description of the drawings
In order to illustrate more clearly of technical scheme, letter will be made to attached drawing needed in the embodiment below
Singly introduce, it will be appreciated that the following drawings illustrate only certain embodiments of the present invention, therefore be not construed as to the present invention
The restriction of protection domain.In various figures, it is similarly comprised part and uses similar numbering.
Fig. 1 shows the structure diagram of the mobile terminal of one embodiment of the present of invention.
Fig. 2 shows the flow diagram of the theft preventing method of the mobile terminal of one embodiment of the present of invention.
Fig. 3 shows the structure diagram of the anti-theft device of the mobile terminal of one embodiment of the present of invention.
Embodiment
Below in conjunction with attached drawing in the embodiment of the present invention, the technical solution in the embodiment of the present invention is carried out clear, complete
Ground describes, it is clear that described embodiment is only part of the embodiment of the present invention, instead of all the embodiments.Usually exist
The component of the embodiment of the present invention described and illustrated in attached drawing can be arranged and designed with a variety of configurations herein.Cause
This, the detailed description of the embodiment of the present invention to providing in the accompanying drawings is not intended to limit claimed invention below
Scope, but it is merely representative of the selected embodiment of the present invention.Based on the embodiment of the present invention, those skilled in the art are not doing
Go out all other embodiments obtained on the premise of creative work, belong to the scope of protection of the invention.
Following each embodiments are illustrated by taking the mobile phone with touch-screen as an example.Fig. 1 shows the structure diagram of the mobile phone,
The mobile phone 100 includes:Radio frequency (Radio Frequency, RF) circuit 110, memory 120, input unit 130, display unit
140th, sensor 150, voicefrequency circuit 160, Wireless Fidelity (wireless fidelity, WiFi) module 170, processor 180,
And the grade component of power supply 190.Input unit 130 can include contact panel and other input equipments, and display unit 140 can wrap
Include display panel 140.It will be understood by those skilled in the art that 100 structure of mobile phone shown in Fig. 1 is not formed to mobile terminal
Restriction, can include than illustrating more or fewer components, either combine some components or different components arrangement.
Embodiment 1
Fig. 2 shows a kind of flow diagram of the theft preventing method of the mobile terminal of one embodiment of the present of invention.
Embodiment 1 refers to a kind of theft preventing method of mobile terminal, which includes touch-screen, the antitheft square
Method includes:
Step S210, recovery secret key is set by receiving the input signal of the button on the mobile terminal, and by institute
State the unlock for recovering secret key and locking screen interface and/or specify the login of application associated.User passes through the button on mobile terminal
Input recovers secret key.Here button can be virtual key, touch controlled key or mobile terminal square under a touch screen
On physical button.Here button preferably using the virtual key or touch controlled key below touch-screen because virtual key or
The calling of touch controlled key is relatively easy.
By taking mobile phone as an example, it is assumed that from a left side to having, there are menu key, HOME keys, BACK keys for side under a touch screen.User
Can be by being combined setting to these three keys with keystroke sequence, touch potential, key press time.Recover secret key pattern entering
Afterwards, the keystroke sequence, key press time and key press time of user are recorded as default secret key.Such as user first press HOME keys three times,
Menu key pressed again 5 times, finally press BACK keys 5 seconds, be default in above-mentioned keystroke sequence, touch potential and key press time
Secret key.When needing to recover screen, when only user is inputted with same keystroke sequence, touch potential and key press time, ability
Recover screen.
However, when setting password, user is allowed to be accurately determined key press time and not convenient and easy-to-use enough.It can carry out one
It is a little to simplify.For example, can allow user often by relative keys more than 3 seconds, as once long-time button, click is then used as a short-press
Key, you can recover key to be set using the length of key press time.Thus, the setting difficulty of user is simplified, and user is very
A button can extremely be used only and set and recover secret key.Such as it can be clicked on by long-press HOME keys three times twice, in long-press one
Secondary be used as recovers secret key.But while recovery key, Ke Yizeng are set using keystroke sequence, touch potential and key press time
Disabled user is added to crack the difficulty of the key.
In addition, in order to further simplify the setting of recovery key, (can be clicked on only with keystroke sequence and touch potential
Number) set.At this time, can be by the touch key-press below mobile phone screen:Menu key, Home key, the numbering point of Back keys
1,2 and 3 are not arranged to.Recovering secret key can be made of two-dimensional array, for example, the first dimension can be used to represent numeral, the second dimension can
To order of representation.Assuming that two-dimensional array is { 6,7,3 }, { 2,1,3 }, then the input of two-dimentional secret key, which operates, is:First click on Home
Key 7 times, then click on Menu key 6 times, finally click on Back keys 3 times.
Only carry out, for example, however, in default recovery key, to use under touch-screen with touch key-press above
The virtual key of side, touch controlled key or one or more of physical button on the mobile terminal is set.For example,
Physical button is can be used alone, the combination of virtual key and physical button is either used or uses touch key-press and entity
The combination of button.Preferably using one or more of the virtual key below touch-screen or touch controlled key, more preferably using tactile
Touch at least two buttons in the virtual key or touch controlled key of screen lower section.
Above-mentioned default recovery key can be only associated with the locking screen interface after start or after standby wakeup.However,
Under some particular cases, user using non-screen locking after mobile phone, just by other people taken away being introduced into holding state by mobile phone, by
This, other people can directly some important applications of logon attempt, than such as relating to the bank APP of bank account.It is silver-colored in order to prevent
Row account information is illegally accessed, can be associated with bank APP by default recovery key.Can be by the unlock with locking screen interface
Associated default recovery key is arranged to identical or different key with the login of specified application.
Step S220, is unlocked or is stepped on by predetermined mode in the login interface of the locking screen interface or the specified application
After record failure, the touch-screen is set to fail.It can be driven after unlocked by fingerprint, pattern unlock or numeral unlock failure to tactile
Touch screen and send another set of configuration parameter so that when operating on the touchscreen, report point disorderly falls completely, gives what hardware was broken suddenly
Feel.
The touch controlled key on having used touch-screen set recover secret key when, make touch-screen failure be instigate touch-screen can
Viewed area fails;And when having used the virtual key of the lower section of touch-screen that default recovery password is set, only make above virtual key
Visible area cannot normally show.
Since criminal is not taken into account that usually by unlocked by fingerprint, this hair can not be enabled for unlocked by fingerprint
Bright antitheft mechanism.Further, since the situation for forgetting some password may also occur in itself in user, could be provided as in pattern solution
In the case that lock and numeral unlock two ways, or other normal release modes all unlock failure, then enable the anti-of the present invention
Robber's mechanism.
Step S230, receives and inputs secret key via the user of the key-press input.For example, in mobile phone by unauthorized theft or robber
In the case of, if when unlock or login failure, touch-screen failure, disabled user can think that mobile phone damages, it is difficult to expect passing through
Touch controlled key or physical button input recovery key.And validated user can be recovered after getting back mobile phone again by inputting
Key recovers the normal use of mobile phone.If not receiving user inputs key, S260 is entered step.
Step S240, judges that the user inputs secret key and whether the recovery secret key is consistent.Pass through in user above-mentioned
In the case of key-press input key, judge that user inputs key and whether pre-set recovery key is consistent.
Step S250, if unanimously, recovering the function of the touch-screen.If user inputs secret key and the recovery secret key
No consistent, driving can send the parameter of normal use to touch-screen, then touch screen can normal use, but remain at this time
Locking screen interface, therefore still need to be properly entered unlocking pin and can just enter mobile phone.
Step S260, if not receiving, the user inputs secret key or the user inputs secret key and the recovery secret key
Inconsistent, then the mobile terminal does not do any response.If not receiving the user inputs secret key or user input
Secret key and the recovery secret key are inconsistent, then mobile terminal does not do any response, i.e. touch-screen does not do any change.
Technical scheme has mainly installed one layer of password additional on the basis of such as pattern unlock, numeral unlock
Unlocking mechanism, greatly increases the security of mobile phone.Particularly in the case of mobile phone is lost, either burglar alarm, non-
The functions such as method unlock is taken pictures or transmission positions, the probability very little that mobile phone is retrieved, so, the complexity of raising mobile phone unlock
Degree, the time interval that extending cell phone is cracked and manipulates, strives for the longer time to remedy, avoid risk for party, protection
Personal property information security, is necessary.
In addition, after touch-screen failure, any prompting is not made, allows appropriator to be thought as screen damage, so as to
Abandon the unlock to mobile phone.It can only be pressed by the entity on the virtual key below touch-screen, touch key-press or mobile terminal
Key recovers the function of touch-screen, and this specific reset mode is very hidden, such criminal can not operate and solve
Mobile phone is locked, greatly improves the security of mobile phone.
Certainly, when pre-setting the recovery secret key, user's selection can be allowed whether to be provided when the touch screen fails
Correlation prompting, if user selects to provide related prompting, when making screen fail, prompts input to recover key.Although prompting is defeated
Enter and recover secret key, but it is the function for recovering screen that prompting, which does not recover secret key, nor prompt defeated in which way
Enter and recover secret key, such criminal still may take for screen damage or bugs occurs.
As an optional mode, server can be received and send instruction to mobile terminal, make the mobile terminal
Touch-screen fails, which is to log in the server by other-end in user, after authentication, by the service
Device is sent.For example, after user has found that mobile phone is lost, can be logged in by means of desktop computer, notebook, other mobile phones rapidly related
Server, after corresponding authentication is carried out, carrying out remote control makes the screen of mobile phone fail.In this way, after hand-set from stolen takes,
Criminal may not have enough time also even attempting unlocking screen, and mobile phone screen has just failed, and thus may think that what is stolen
It is a mobile phone damaged, so as to ensure that mobile phone loses the property safety and personal secrets of user.
Embodiment 2
Fig. 3 shows the structure diagram of the anti-theft device of the mobile terminal of one embodiment of the present of invention.
The anti-theft device 300 of mobile terminal described in Fig. 3 includes:
Secret key setup module 310, for being recovered by receiving the input signal of the button on the mobile terminal to set
Secret key, and the recovery secret key is associated with the login of unlock and/or the specified application of locking screen interface;
Touch screen failed module 320, it is predetermined for passing through in the login interface of the locking screen interface or the specified application
Mode unlock or login failure after, the touch-screen is failed;
Secret key receiving module 330, the user for receiving via the key-press input input secret key;
Secret key authentication module 340, for judging that the user inputs secret key and whether the recovery secret key is consistent, if one
Cause, then recover the function of the touch-screen;Secret key or user input secret key and institute are inputted not receiving the user
State recover secret key it is inconsistent when, the mobile terminal is not done any response.
The module of the anti-theft device 300 of mobile terminal is used to perform the correspondence step in theft preventing method, and in antitheft square
Option in method can be also correspondingly applied in anti-theft device 300, no longer described in detail one by one here.
In addition, present invention also offers a kind of mobile terminal, the mobile terminal can include smart phone, tablet computer,
Intelligent wearable device etc..The mobile terminal includes memory and processor, and memory can be used for storing computer program, processor
By running the computer program, so that the modules in the mobile terminal execution above method or above-mentioned anti-theft device
Function.
Memory may include storing program area and storage data field, wherein, storing program area can storage program area, at least
Application program (such as sound-playing function, image player function etc.) needed for one function etc.;Storage data field can store root
Created data (such as voice data, phone directory etc.) etc. are used according to mobile terminal.In addition, memory can be included at a high speed
Random access memory, can also include nonvolatile memory, a for example, at least disk memory, flush memory device or
Other volatile solid-state parts.
The present embodiment additionally provides a kind of computer-readable storage medium, for storing the computer used in above-mentioned mobile terminal
Program.
In several embodiments provided herein, it should be understood that disclosed apparatus and method, can also pass through
Other modes are realized.Device embodiment described above is only schematical, for example, flow chart and structure in attached drawing
Figure shows device, the system frame in the cards of method and computer program product of multiple embodiments according to the present invention
Structure, function and operation.At this point, each square frame in flow chart or block diagram can represent a module, program segment or code
A part, the part of the module, program segment or code include one or more be used for realization as defined in logic function
Executable instruction.It should also be noted that in the implementation as replacement, the function that is marked in square frame can also with different from
The order marked in attached drawing occurs.For example, two continuous square frames can essentially perform substantially in parallel, they are sometimes
It can perform in the opposite order, this is depending on involved function.It is also noted that in structure chart and/or flow chart
The combination of each square frame and the square frame in structure chart and/or flow chart, can use the special of function as defined in performing or action
Hardware based system realize, or can be realized with the combination of specialized hardware and computer instruction.
In addition, each function module or unit in each embodiment of the present invention can integrate and to form an independence
Part or modules individualism, can also two or more modules be integrated to form an independent part.
If the function is realized in the form of software function module and is used as independent production marketing or in use, can be with
It is stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially in other words
The part to contribute to the prior art or the part of the technical solution can be embodied in the form of software product, the meter
Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be intelligence
Can mobile phone, personal computer, server or network equipment etc.) perform each embodiment the method for the present invention whole or
Part steps.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only Memory),
Random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can be with store program codes
Medium.
The embodiment of the present invention further discloses:
A1. a kind of theft preventing method of mobile terminal, the mobile terminal include touch-screen, and the theft preventing method includes:
By receiving the input signal of the button on the mobile terminal, recovery secret key is set, and by the recovery secret key
The login of unlock and/or specified application with locking screen interface is associated;
The locking screen interface or the login interface of the specified application unlocked by predetermined mode or login failure after,
The touch-screen is set to fail;
Receive and input secret key via the user of the key-press input;
Judge that the user inputs secret key and whether the recovery secret key is consistent, if unanimously, recovering the touch-screen
Function;If not receiving, the user inputs secret key or the user inputs secret key and the recovery secret key is inconsistent, institute
State mobile terminal and do not do any response.
A2. the theft preventing method of the mobile terminal according to A1, the button are included in virtual below the touch-screen
One or more of button, the physical button of touch controlled key or setting on the mobile terminal.
A3. the theft preventing method of the mobile terminal according to A2, the button are included in virtual below the touch-screen
One or more of button or touch controlled key.
A4. the theft preventing method of the mobile terminal according to A1, receives the instruction that server is sent to the mobile terminal,
The touch-screen of the mobile terminal is set to fail, described instruction is to log in the server by other-end in user, by body
After part verification, sent by the server.
A5. the theft preventing method of the mobile terminal according to A1, the recovery secret key is key press time, touch potential and presses
The combination secret key of at least two parameters in key order.
A6. the theft preventing method of the mobile terminal according to A5, by the input signal for receiving at least two buttons
To set the recovery secret key, the recovery secret key is secret for the combination of two parameters of the touch potential and the keystroke sequence
Key.
B7. a kind of anti-theft device of mobile terminal, the mobile terminal include touch-screen, and the anti-theft device includes:
Secret key setup module, for recovering secret by receiving the input signal of the button on the mobile terminal to set
Key, and the recovery secret key is associated with the login of unlock and/or the specified application of locking screen interface;
Touch screen failed module, for passing through predetermined mode in the login interface of the locking screen interface or the specified application
After unlock or login failure, the touch-screen is set to fail;
Secret key receiving module, the user for receiving via the key-press input input secret key;
Secret key authentication module, for judging that the user inputs secret key and whether the recovery secret key is consistent, if unanimously,
Recover the function of the touch-screen;Secret key or user input secret key and the recovery are inputted not receiving the user
When secret key is inconsistent, the mobile terminal is set not do any response.
B8. the anti-theft device of the mobile terminal according to B7, the button are included in virtual below the touch-screen
One or more of button, the physical button of touch controlled key or setting on the mobile terminal.
B9. the anti-theft device of the mobile terminal according to B8, the button are included in virtual below the touch-screen
One or more of button or touch controlled key.
B10. the anti-theft device of the mobile terminal according to B7, the touch screen failed module be additionally operable to receive server to
The instruction that the mobile terminal is sent, makes the touch-screen of the mobile terminal fail, and described instruction is to pass through other ends in user
End logs in the server, after authentication, is sent by the server.
B11. the anti-theft device of the mobile terminal according to B7, it is described recovery secret key for key press time, touch potential and
The combination secret key of at least two parameters in keystroke sequence.
B12. the anti-theft device of the mobile terminal according to B11, the secret key setup module is by receiving at least two
The input signal of the button sets the recovery secret key, and the recovery secret key is the touch potential and the keystroke sequence
The combination secret key of two parameters.
C13. a kind of mobile terminal, including memory and processor, the memory are used to store computer program, institute
State processor and run the computer program so that mobile end of the mobile terminal execution according to any one of A1 to A6
The theft preventing method at end.
D14. a kind of computer-readable recording medium, it is stored with the computer used in the mobile terminal described in C13
Program.
The above description is merely a specific embodiment, but protection scope of the present invention is not limited thereto, any
Those familiar with the art the invention discloses technical scope in, change or replacement can be readily occurred in, should all be contained
Cover within protection scope of the present invention.
Claims (10)
1. a kind of theft preventing method of mobile terminal, the mobile terminal includes touch-screen, it is characterised in that the theft preventing method bag
Include:
By receiving the input signal of the button on the mobile terminal, recovery secret key is set, and by the recovery secret key with locking
Shield the unlock at interface and/or specify the login of application to be associated;
The locking screen interface or the login interface of the specified application unlocked by predetermined mode or login failure after, make institute
State touch-screen failure;
Receive and input secret key via the user of the key-press input;
Judge that the user inputs secret key and whether the recovery secret key is consistent, if unanimously, recovering the function of the touch-screen;
If not receiving, the user inputs secret key or the user inputs secret key and the recovery secret key is inconsistent, the movement
Terminal does not do any response.
2. the theft preventing method of mobile terminal according to claim 1, it is characterised in that the button is included in the touch
Shield one or more of virtual key, the physical button of touch controlled key or setting on the mobile terminal of lower section.
3. the theft preventing method of mobile terminal according to claim 2, it is characterised in that the button is included in the touch
Shield one or more of virtual key or touch controlled key of lower section.
4. the theft preventing method of mobile terminal according to claim 1, it is characterised in that it is whole to the movement to receive server
Hold the instruction that sends, the touch-screen of the mobile terminal is failed, described instruction be logged in user by other-end described in
Server, after authentication, is sent by the server.
5. the theft preventing method of mobile terminal according to claim 1, it is characterised in that when the recovery secret key is button
Between, the combination secret key of touch potential and at least two parameters in keystroke sequence.
6. the theft preventing method of mobile terminal according to claim 5, it is characterised in that pressed by receiving described at least two
The input signal of key sets the recovery secret key, and the recovery secret key is two ginsengs of the touch potential and the keystroke sequence
Several combination secret keys.
7. a kind of anti-theft device of mobile terminal, the mobile terminal includes touch-screen, it is characterised in that the anti-theft device bag
Include:
Secret key setup module, for setting recovery secret key by receiving the input signal of the button on the mobile terminal, and
The recovery secret key is associated with the login of unlock and/or the specified application of locking screen interface;
Touch screen failed module, for being unlocked in the login interface of the locking screen interface or the specified application by predetermined mode
Or after login failure, the touch-screen is set to fail;
Secret key receiving module, the user for receiving via the key-press input input secret key;
Secret key authentication module, for judging that the user inputs secret key and whether the recovery secret key is consistent, if unanimously, recovering
The function of the touch-screen;Secret key or user input secret key and the recovery secret key are inputted not receiving the user
When inconsistent, the mobile terminal is set not do any response.
8. the anti-theft device of mobile terminal according to claim 7, it is characterised in that the button is included in the touch
Shield one or more of virtual key, the physical button of touch controlled key or setting on the mobile terminal of lower section.
9. a kind of mobile terminal, it is characterised in that including memory and processor, the memory is used to store computer journey
Sequence, the processor runs the computer program so that the mobile terminal execution is according to any one of claim 1 to 6 institute
The theft preventing method for the mobile terminal stated.
10. a kind of computer-readable recording medium, it is characterised in that it is stored with institute in the mobile terminal described in claim 9
The computer program used.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711122217.XA CN107911546A (en) | 2017-11-14 | 2017-11-14 | Theft preventing method, anti-theft device and the mobile terminal of mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711122217.XA CN107911546A (en) | 2017-11-14 | 2017-11-14 | Theft preventing method, anti-theft device and the mobile terminal of mobile terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107911546A true CN107911546A (en) | 2018-04-13 |
Family
ID=61843996
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711122217.XA Pending CN107911546A (en) | 2017-11-14 | 2017-11-14 | Theft preventing method, anti-theft device and the mobile terminal of mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107911546A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2021530074A (en) * | 2018-08-09 | 2021-11-04 | 湖州申脉科技有限公司Huzhou Shenmai Technology Co., Ltd. | Privacy management methods and systems for intelligent devices and social applications |
CN116484431A (en) * | 2023-06-21 | 2023-07-25 | 荣耀终端有限公司 | Data protection method, electronic equipment and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120075212A1 (en) * | 2010-09-27 | 2012-03-29 | Lg Electronics Inc. | Mobile terminal and method of controlling the same |
CN104463039A (en) * | 2014-12-16 | 2015-03-25 | 上海斐讯数据通信技术有限公司 | Unlocking method and device of intelligent device |
CN104598831A (en) * | 2014-12-05 | 2015-05-06 | 深圳天珑无线科技有限公司 | Data security protection method and terminal |
CN105554719A (en) * | 2016-02-26 | 2016-05-04 | 上海卓易科技股份有限公司 | Mobile phone alarming method and device |
CN105631263A (en) * | 2015-12-21 | 2016-06-01 | 宇龙计算机通信科技(深圳)有限公司 | Terminal usage limiting method and device as well as terminal |
CN107018142A (en) * | 2017-04-28 | 2017-08-04 | 努比亚技术有限公司 | Active defense method and mobile terminal |
-
2017
- 2017-11-14 CN CN201711122217.XA patent/CN107911546A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120075212A1 (en) * | 2010-09-27 | 2012-03-29 | Lg Electronics Inc. | Mobile terminal and method of controlling the same |
CN104598831A (en) * | 2014-12-05 | 2015-05-06 | 深圳天珑无线科技有限公司 | Data security protection method and terminal |
CN104463039A (en) * | 2014-12-16 | 2015-03-25 | 上海斐讯数据通信技术有限公司 | Unlocking method and device of intelligent device |
CN105631263A (en) * | 2015-12-21 | 2016-06-01 | 宇龙计算机通信科技(深圳)有限公司 | Terminal usage limiting method and device as well as terminal |
CN105554719A (en) * | 2016-02-26 | 2016-05-04 | 上海卓易科技股份有限公司 | Mobile phone alarming method and device |
CN107018142A (en) * | 2017-04-28 | 2017-08-04 | 努比亚技术有限公司 | Active defense method and mobile terminal |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2021530074A (en) * | 2018-08-09 | 2021-11-04 | 湖州申脉科技有限公司Huzhou Shenmai Technology Co., Ltd. | Privacy management methods and systems for intelligent devices and social applications |
CN116484431A (en) * | 2023-06-21 | 2023-07-25 | 荣耀终端有限公司 | Data protection method, electronic equipment and storage medium |
CN116484431B (en) * | 2023-06-21 | 2024-05-17 | 荣耀终端有限公司 | Data protection method, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Feng et al. | Continuous mobile authentication using virtual key typing biometrics | |
Meng et al. | Surveying the development of biometric user authentication on mobile phones | |
CN1952855B (en) | Cipher input method and system preventing peeper | |
EP2579141B1 (en) | Method and device for unlocking operating system | |
CN106355141B (en) | Portable electronic device and operation method thereof | |
CN103079000A (en) | Method and device for terminal unlocking | |
CN102982269A (en) | Anti-peeping code authentication method and anti-peeping code authentication system based on biological metering characteristics | |
CN103034798B (en) | A kind of generation method and device of random cipher | |
CN104820805B (en) | A kind of method and device of subscriber identification card information theft-preventing | |
CN105760737A (en) | Control method for applications and terminal | |
CN103425921A (en) | Device, system and method for code management | |
CN102932540A (en) | Mobile terminal and stealing prevention method thereof | |
CN105512547A (en) | Intelligent terminal privacy protection method and intelligent terminal privacy protection system | |
CN107862194A (en) | A kind of method, device and mobile terminal of safety verification | |
CN103034417A (en) | Unlocking method for touch screen and terminal equipment | |
CN106951757A (en) | A kind of method and apparatus for operating application program | |
CN105929974A (en) | Password input management method and mobile terminal | |
CN106778523A (en) | Fingerprint input method and device | |
CN103870743A (en) | Information processing apparatus, and lock execution method | |
CN107424274A (en) | The method, apparatus and intelligent door lock that a kind of intelligent door lock is unlocked | |
CN106372468A (en) | Mobile terminal operation method and mobile terminal | |
CN107911546A (en) | Theft preventing method, anti-theft device and the mobile terminal of mobile terminal | |
CN106211070B (en) | A kind of anti-theft protection method and mobile terminal of mobile terminal | |
CN105868601A (en) | Pressure touch screen-based electronic terminal, encryption unlocking controller and method | |
CN106952090A (en) | Payment verification device and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180413 |