CN107911546A - Theft preventing method, anti-theft device and the mobile terminal of mobile terminal - Google Patents

Theft preventing method, anti-theft device and the mobile terminal of mobile terminal Download PDF

Info

Publication number
CN107911546A
CN107911546A CN201711122217.XA CN201711122217A CN107911546A CN 107911546 A CN107911546 A CN 107911546A CN 201711122217 A CN201711122217 A CN 201711122217A CN 107911546 A CN107911546 A CN 107911546A
Authority
CN
China
Prior art keywords
mobile terminal
secret key
touch
key
screen
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711122217.XA
Other languages
Chinese (zh)
Inventor
龚锐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qiku Internet Technology Shenzhen Co Ltd
Original Assignee
Qiku Internet Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qiku Internet Technology Shenzhen Co Ltd filed Critical Qiku Internet Technology Shenzhen Co Ltd
Priority to CN201711122217.XA priority Critical patent/CN107911546A/en
Publication of CN107911546A publication Critical patent/CN107911546A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72454User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Human Computer Interaction (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Environmental & Geological Engineering (AREA)
  • Telephone Function (AREA)

Abstract

The present invention relates to a kind of theft preventing method of mobile terminal, anti-theft device and mobile terminal.The theft preventing method of the mobile terminal includes:By receiving the input signal of the button on the mobile terminal, recovery secret key is set, and the recovery secret key is associated with the login of unlock and/or the specified application of locking screen interface;After the secret key of the locking screen interface or the login interface mistake of specified application input pre-determined number, touch-screen is set to fail;Receive and input secret key via the user of the key-press input;Judge that the user inputs secret key and whether the recovery secret key is consistent, if unanimously, recovering the function of the touch-screen;If not receiving, the user inputs secret key or the user inputs secret key and the recovery secret key is inconsistent, and the mobile terminal does not do any response.The anti-theft technique scheme of the mobile terminal of the present invention can effectively strengthen the personal information security of mobile terminal after the loss.

Description

Theft preventing method, anti-theft device and the mobile terminal of mobile terminal
Technical field
The present invention relates to a kind of mobile equipment, in particular to a kind of theft preventing method of mobile terminal, anti-theft device, Mobile terminal and computer-readable recording medium.
Background technology
Modern daily life increasingly be unable to do without mobile equipment, for example, tablet computer, smart mobile phone, e-book, Portable notebook etc..Especially smart mobile phone etc. may store individual privacy, be also usually bundled with bank's card number or branch is paid a bill Number, information security is closely bound up safely with personal property.Once these intelligent movable device losses, it will caused very to user Serious property or reputational damage, are not that only to lose a smart machine so simple.
At present, also emerge in an endless stream in constantly progressive and development, unlocking manner for the security strategy of such as smart mobile phone, Unlocked by fingerprint, pattern unlock, numeral unlock, or it is relatively newer based on recognition of face, speech recognition, touch Feature Points Matching etc. The unlocking manner of grain husk.
The intelligent machine of present mainstream is all to coordinate opening mobile phone in a manner of unlocked by fingerprint adds pattern or numeral unlock auxiliary Operation.Such solution is latched in a security risk, once mobile phone is lost, under normal circumstances, criminal can always not Pattern or numeral unlock are gone in disconnected trial, are most likely to successfully unlock smart mobile phone at last, are viewed user information, maliciously grasped Make.
The content of the invention
In view of the above problems, mobile equipment with touch-screen can effectively be strengthened after the loss the present invention provides a kind of Theft preventing method, anti-theft device, mobile terminal and the computer-readable recording medium of the mobile terminal of security.
According to embodiment of the present invention, there is provided a kind of mobile terminal, the mobile terminal includes touch-screen, described Theft preventing method includes:
By receiving the input signal of the button on the mobile terminal, recovery secret key is set, and by the recovery secret key The login of unlock and/or specified application with locking screen interface is associated;
The locking screen interface or the login interface of the specified application unlocked by predetermined mode or login failure after, The touch-screen is set to fail;
Receive and input secret key via the user of the key-press input;
Judge that the user inputs secret key and whether the recovery secret key is consistent, if unanimously, recovering the touch-screen Function;If not receiving, the user inputs secret key or the user inputs secret key and the recovery secret key is inconsistent, institute State mobile terminal and do not do any response.
In the theft preventing method of above-mentioned mobile terminal, the button be included in virtual key below the touch-screen, One or more of the physical button of touch controlled key or setting on the mobile terminal.
In the theft preventing method of above-mentioned mobile terminal, the button be included in virtual key below the touch-screen or One or more of touch controlled key.
In the theft preventing method of above-mentioned mobile terminal, the instruction that server is sent to the mobile terminal is received, makes institute The touch-screen failure of mobile terminal is stated, described instruction is to log in the server by other-end in user, is tested by identity After card, sent by the server.
In the theft preventing method of above-mentioned mobile terminal, the recovery secret key is key press time, touch potential and button are suitable The combination secret key of at least two parameters in sequence.
In the theft preventing method of above-mentioned mobile terminal, set by receiving the input signal of at least two buttons The recovery secret key, it is described to recover the combination secret key that secret key is two parameters of the touch potential and the keystroke sequence.
In the theft preventing method of above-mentioned mobile terminal, when pre-setting the recovery secret key, make user's selection in institute Related prompting whether is provided when stating touch screen failure, if user selects to provide related prompting, when making screen fail, prompts input Recover key.
According to another implementation of the invention, there is provided a kind of anti-theft device of mobile terminal, the mobile terminal bag Touch-screen is included, the anti-theft device includes:
Secret key setup module, for recovering secret by receiving the input signal of the button on the mobile terminal to set Key, and the recovery secret key is associated with the login of unlock and/or the specified application of locking screen interface;
Touch screen failed module, for passing through predetermined mode in the login interface of the locking screen interface or the specified application After unlock or login failure, the touch-screen is set to fail;
Secret key receiving module, the user for receiving via the key-press input input secret key;
Secret key authentication module, for judging that the user inputs secret key and whether the recovery secret key is consistent, if unanimously, Recover the function of the touch-screen;Secret key or user input secret key and the recovery are inputted not receiving the user When secret key is inconsistent, the mobile terminal is set not do any response.
In the anti-theft device of above-mentioned mobile terminal, the button be included in virtual key below the touch-screen, One or more of the physical button of touch controlled key or setting on the mobile terminal.
In the anti-theft device of above-mentioned mobile terminal, the button be included in virtual key below the touch-screen or One or more of touch controlled key.
In the anti-theft device of above-mentioned mobile terminal, the touch screen failed module is additionally operable to receive server to the shifting The instruction that dynamic terminal is sent, makes the touch-screen of the mobile terminal fail, described instruction is to be logged in user by other-end The server, after authentication, is sent by the server.
In the anti-theft device of above-mentioned mobile terminal, the recovery secret key is key press time, touch potential and button are suitable The combination secret key of at least two parameters in sequence.
In the anti-theft device of above-mentioned mobile terminal, the secret key setup module is by receiving at least two buttons Input signal the recovery secret key is set, the recovery secret key is two parameters of the touch potential and the keystroke sequence Combination secret key.
In the anti-theft device of above-mentioned mobile terminal, the secret key setup module is pre-setting the recovery secret key When, make whether user's selection provides related prompting when the touch screen fails, if user selects to provide related prompting, make screen During curtain failure, input is prompted to recover key.
A further embodiment according to the present invention, there is provided a kind of mobile terminal, including memory and processor, it is described to deposit Reservoir is used to store computer program, and the processor runs the computer program so that the mobile terminal execution is according to upper The theft preventing method for the mobile terminal stated.
Another embodiment according to the present invention, there is provided a kind of computer-readable recording medium, it is stored with above-mentioned movement Computer program used in terminal.
The antitheft scheme of mobile terminal of the present invention is a kind of smart machine anti-theft security strategy based on touch-screen, can be with Effectively strengthen mobile phone, the personal information security of tablet computer after the loss.Specific method is failed when mobile phone pattern unlocks After can actively trigger touch-screen and can not carry out any operation, i.e. touch-screen failure in visible area, it is only extensive in unique mode It is multiple just can be with, and this unique pattern is also very hidden.So so that criminal can not operate and unlock mobile phone, Greatly improve the security of mobile phone.
In addition, technical scheme can also by user by Server remote by touch-screen failure, or other Password mistake is detected in and makes touch-screen failure.
To enable the above objects, features and advantages of the present invention to become apparent, preferred embodiment cited below particularly, and coordinate Appended attached drawing, is described in detail below.
Brief description of the drawings
In order to illustrate more clearly of technical scheme, letter will be made to attached drawing needed in the embodiment below Singly introduce, it will be appreciated that the following drawings illustrate only certain embodiments of the present invention, therefore be not construed as to the present invention The restriction of protection domain.In various figures, it is similarly comprised part and uses similar numbering.
Fig. 1 shows the structure diagram of the mobile terminal of one embodiment of the present of invention.
Fig. 2 shows the flow diagram of the theft preventing method of the mobile terminal of one embodiment of the present of invention.
Fig. 3 shows the structure diagram of the anti-theft device of the mobile terminal of one embodiment of the present of invention.
Embodiment
Below in conjunction with attached drawing in the embodiment of the present invention, the technical solution in the embodiment of the present invention is carried out clear, complete Ground describes, it is clear that described embodiment is only part of the embodiment of the present invention, instead of all the embodiments.Usually exist The component of the embodiment of the present invention described and illustrated in attached drawing can be arranged and designed with a variety of configurations herein.Cause This, the detailed description of the embodiment of the present invention to providing in the accompanying drawings is not intended to limit claimed invention below Scope, but it is merely representative of the selected embodiment of the present invention.Based on the embodiment of the present invention, those skilled in the art are not doing Go out all other embodiments obtained on the premise of creative work, belong to the scope of protection of the invention.
Following each embodiments are illustrated by taking the mobile phone with touch-screen as an example.Fig. 1 shows the structure diagram of the mobile phone, The mobile phone 100 includes:Radio frequency (Radio Frequency, RF) circuit 110, memory 120, input unit 130, display unit 140th, sensor 150, voicefrequency circuit 160, Wireless Fidelity (wireless fidelity, WiFi) module 170, processor 180, And the grade component of power supply 190.Input unit 130 can include contact panel and other input equipments, and display unit 140 can wrap Include display panel 140.It will be understood by those skilled in the art that 100 structure of mobile phone shown in Fig. 1 is not formed to mobile terminal Restriction, can include than illustrating more or fewer components, either combine some components or different components arrangement.
Embodiment 1
Fig. 2 shows a kind of flow diagram of the theft preventing method of the mobile terminal of one embodiment of the present of invention.
Embodiment 1 refers to a kind of theft preventing method of mobile terminal, which includes touch-screen, the antitheft square Method includes:
Step S210, recovery secret key is set by receiving the input signal of the button on the mobile terminal, and by institute State the unlock for recovering secret key and locking screen interface and/or specify the login of application associated.User passes through the button on mobile terminal Input recovers secret key.Here button can be virtual key, touch controlled key or mobile terminal square under a touch screen On physical button.Here button preferably using the virtual key or touch controlled key below touch-screen because virtual key or The calling of touch controlled key is relatively easy.
By taking mobile phone as an example, it is assumed that from a left side to having, there are menu key, HOME keys, BACK keys for side under a touch screen.User Can be by being combined setting to these three keys with keystroke sequence, touch potential, key press time.Recover secret key pattern entering Afterwards, the keystroke sequence, key press time and key press time of user are recorded as default secret key.Such as user first press HOME keys three times, Menu key pressed again 5 times, finally press BACK keys 5 seconds, be default in above-mentioned keystroke sequence, touch potential and key press time Secret key.When needing to recover screen, when only user is inputted with same keystroke sequence, touch potential and key press time, ability Recover screen.
However, when setting password, user is allowed to be accurately determined key press time and not convenient and easy-to-use enough.It can carry out one It is a little to simplify.For example, can allow user often by relative keys more than 3 seconds, as once long-time button, click is then used as a short-press Key, you can recover key to be set using the length of key press time.Thus, the setting difficulty of user is simplified, and user is very A button can extremely be used only and set and recover secret key.Such as it can be clicked on by long-press HOME keys three times twice, in long-press one Secondary be used as recovers secret key.But while recovery key, Ke Yizeng are set using keystroke sequence, touch potential and key press time Disabled user is added to crack the difficulty of the key.
In addition, in order to further simplify the setting of recovery key, (can be clicked on only with keystroke sequence and touch potential Number) set.At this time, can be by the touch key-press below mobile phone screen:Menu key, Home key, the numbering point of Back keys 1,2 and 3 are not arranged to.Recovering secret key can be made of two-dimensional array, for example, the first dimension can be used to represent numeral, the second dimension can To order of representation.Assuming that two-dimensional array is { 6,7,3 }, { 2,1,3 }, then the input of two-dimentional secret key, which operates, is:First click on Home Key 7 times, then click on Menu key 6 times, finally click on Back keys 3 times.
Only carry out, for example, however, in default recovery key, to use under touch-screen with touch key-press above The virtual key of side, touch controlled key or one or more of physical button on the mobile terminal is set.For example, Physical button is can be used alone, the combination of virtual key and physical button is either used or uses touch key-press and entity The combination of button.Preferably using one or more of the virtual key below touch-screen or touch controlled key, more preferably using tactile Touch at least two buttons in the virtual key or touch controlled key of screen lower section.
Above-mentioned default recovery key can be only associated with the locking screen interface after start or after standby wakeup.However, Under some particular cases, user using non-screen locking after mobile phone, just by other people taken away being introduced into holding state by mobile phone, by This, other people can directly some important applications of logon attempt, than such as relating to the bank APP of bank account.It is silver-colored in order to prevent Row account information is illegally accessed, can be associated with bank APP by default recovery key.Can be by the unlock with locking screen interface Associated default recovery key is arranged to identical or different key with the login of specified application.
Step S220, is unlocked or is stepped on by predetermined mode in the login interface of the locking screen interface or the specified application After record failure, the touch-screen is set to fail.It can be driven after unlocked by fingerprint, pattern unlock or numeral unlock failure to tactile Touch screen and send another set of configuration parameter so that when operating on the touchscreen, report point disorderly falls completely, gives what hardware was broken suddenly Feel.
The touch controlled key on having used touch-screen set recover secret key when, make touch-screen failure be instigate touch-screen can Viewed area fails;And when having used the virtual key of the lower section of touch-screen that default recovery password is set, only make above virtual key Visible area cannot normally show.
Since criminal is not taken into account that usually by unlocked by fingerprint, this hair can not be enabled for unlocked by fingerprint Bright antitheft mechanism.Further, since the situation for forgetting some password may also occur in itself in user, could be provided as in pattern solution In the case that lock and numeral unlock two ways, or other normal release modes all unlock failure, then enable the anti-of the present invention Robber's mechanism.
Step S230, receives and inputs secret key via the user of the key-press input.For example, in mobile phone by unauthorized theft or robber In the case of, if when unlock or login failure, touch-screen failure, disabled user can think that mobile phone damages, it is difficult to expect passing through Touch controlled key or physical button input recovery key.And validated user can be recovered after getting back mobile phone again by inputting Key recovers the normal use of mobile phone.If not receiving user inputs key, S260 is entered step.
Step S240, judges that the user inputs secret key and whether the recovery secret key is consistent.Pass through in user above-mentioned In the case of key-press input key, judge that user inputs key and whether pre-set recovery key is consistent.
Step S250, if unanimously, recovering the function of the touch-screen.If user inputs secret key and the recovery secret key No consistent, driving can send the parameter of normal use to touch-screen, then touch screen can normal use, but remain at this time Locking screen interface, therefore still need to be properly entered unlocking pin and can just enter mobile phone.
Step S260, if not receiving, the user inputs secret key or the user inputs secret key and the recovery secret key Inconsistent, then the mobile terminal does not do any response.If not receiving the user inputs secret key or user input Secret key and the recovery secret key are inconsistent, then mobile terminal does not do any response, i.e. touch-screen does not do any change.
Technical scheme has mainly installed one layer of password additional on the basis of such as pattern unlock, numeral unlock Unlocking mechanism, greatly increases the security of mobile phone.Particularly in the case of mobile phone is lost, either burglar alarm, non- The functions such as method unlock is taken pictures or transmission positions, the probability very little that mobile phone is retrieved, so, the complexity of raising mobile phone unlock Degree, the time interval that extending cell phone is cracked and manipulates, strives for the longer time to remedy, avoid risk for party, protection Personal property information security, is necessary.
In addition, after touch-screen failure, any prompting is not made, allows appropriator to be thought as screen damage, so as to Abandon the unlock to mobile phone.It can only be pressed by the entity on the virtual key below touch-screen, touch key-press or mobile terminal Key recovers the function of touch-screen, and this specific reset mode is very hidden, such criminal can not operate and solve Mobile phone is locked, greatly improves the security of mobile phone.
Certainly, when pre-setting the recovery secret key, user's selection can be allowed whether to be provided when the touch screen fails Correlation prompting, if user selects to provide related prompting, when making screen fail, prompts input to recover key.Although prompting is defeated Enter and recover secret key, but it is the function for recovering screen that prompting, which does not recover secret key, nor prompt defeated in which way Enter and recover secret key, such criminal still may take for screen damage or bugs occurs.
As an optional mode, server can be received and send instruction to mobile terminal, make the mobile terminal Touch-screen fails, which is to log in the server by other-end in user, after authentication, by the service Device is sent.For example, after user has found that mobile phone is lost, can be logged in by means of desktop computer, notebook, other mobile phones rapidly related Server, after corresponding authentication is carried out, carrying out remote control makes the screen of mobile phone fail.In this way, after hand-set from stolen takes, Criminal may not have enough time also even attempting unlocking screen, and mobile phone screen has just failed, and thus may think that what is stolen It is a mobile phone damaged, so as to ensure that mobile phone loses the property safety and personal secrets of user.
Embodiment 2
Fig. 3 shows the structure diagram of the anti-theft device of the mobile terminal of one embodiment of the present of invention.
The anti-theft device 300 of mobile terminal described in Fig. 3 includes:
Secret key setup module 310, for being recovered by receiving the input signal of the button on the mobile terminal to set Secret key, and the recovery secret key is associated with the login of unlock and/or the specified application of locking screen interface;
Touch screen failed module 320, it is predetermined for passing through in the login interface of the locking screen interface or the specified application Mode unlock or login failure after, the touch-screen is failed;
Secret key receiving module 330, the user for receiving via the key-press input input secret key;
Secret key authentication module 340, for judging that the user inputs secret key and whether the recovery secret key is consistent, if one Cause, then recover the function of the touch-screen;Secret key or user input secret key and institute are inputted not receiving the user State recover secret key it is inconsistent when, the mobile terminal is not done any response.
The module of the anti-theft device 300 of mobile terminal is used to perform the correspondence step in theft preventing method, and in antitheft square Option in method can be also correspondingly applied in anti-theft device 300, no longer described in detail one by one here.
In addition, present invention also offers a kind of mobile terminal, the mobile terminal can include smart phone, tablet computer, Intelligent wearable device etc..The mobile terminal includes memory and processor, and memory can be used for storing computer program, processor By running the computer program, so that the modules in the mobile terminal execution above method or above-mentioned anti-theft device Function.
Memory may include storing program area and storage data field, wherein, storing program area can storage program area, at least Application program (such as sound-playing function, image player function etc.) needed for one function etc.;Storage data field can store root Created data (such as voice data, phone directory etc.) etc. are used according to mobile terminal.In addition, memory can be included at a high speed Random access memory, can also include nonvolatile memory, a for example, at least disk memory, flush memory device or Other volatile solid-state parts.
The present embodiment additionally provides a kind of computer-readable storage medium, for storing the computer used in above-mentioned mobile terminal Program.
In several embodiments provided herein, it should be understood that disclosed apparatus and method, can also pass through Other modes are realized.Device embodiment described above is only schematical, for example, flow chart and structure in attached drawing Figure shows device, the system frame in the cards of method and computer program product of multiple embodiments according to the present invention Structure, function and operation.At this point, each square frame in flow chart or block diagram can represent a module, program segment or code A part, the part of the module, program segment or code include one or more be used for realization as defined in logic function Executable instruction.It should also be noted that in the implementation as replacement, the function that is marked in square frame can also with different from The order marked in attached drawing occurs.For example, two continuous square frames can essentially perform substantially in parallel, they are sometimes It can perform in the opposite order, this is depending on involved function.It is also noted that in structure chart and/or flow chart The combination of each square frame and the square frame in structure chart and/or flow chart, can use the special of function as defined in performing or action Hardware based system realize, or can be realized with the combination of specialized hardware and computer instruction.
In addition, each function module or unit in each embodiment of the present invention can integrate and to form an independence Part or modules individualism, can also two or more modules be integrated to form an independent part.
If the function is realized in the form of software function module and is used as independent production marketing or in use, can be with It is stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially in other words The part to contribute to the prior art or the part of the technical solution can be embodied in the form of software product, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be intelligence Can mobile phone, personal computer, server or network equipment etc.) perform each embodiment the method for the present invention whole or Part steps.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only Memory), Random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can be with store program codes Medium.
The embodiment of the present invention further discloses:
A1. a kind of theft preventing method of mobile terminal, the mobile terminal include touch-screen, and the theft preventing method includes:
By receiving the input signal of the button on the mobile terminal, recovery secret key is set, and by the recovery secret key The login of unlock and/or specified application with locking screen interface is associated;
The locking screen interface or the login interface of the specified application unlocked by predetermined mode or login failure after, The touch-screen is set to fail;
Receive and input secret key via the user of the key-press input;
Judge that the user inputs secret key and whether the recovery secret key is consistent, if unanimously, recovering the touch-screen Function;If not receiving, the user inputs secret key or the user inputs secret key and the recovery secret key is inconsistent, institute State mobile terminal and do not do any response.
A2. the theft preventing method of the mobile terminal according to A1, the button are included in virtual below the touch-screen One or more of button, the physical button of touch controlled key or setting on the mobile terminal.
A3. the theft preventing method of the mobile terminal according to A2, the button are included in virtual below the touch-screen One or more of button or touch controlled key.
A4. the theft preventing method of the mobile terminal according to A1, receives the instruction that server is sent to the mobile terminal, The touch-screen of the mobile terminal is set to fail, described instruction is to log in the server by other-end in user, by body After part verification, sent by the server.
A5. the theft preventing method of the mobile terminal according to A1, the recovery secret key is key press time, touch potential and presses The combination secret key of at least two parameters in key order.
A6. the theft preventing method of the mobile terminal according to A5, by the input signal for receiving at least two buttons To set the recovery secret key, the recovery secret key is secret for the combination of two parameters of the touch potential and the keystroke sequence Key.
B7. a kind of anti-theft device of mobile terminal, the mobile terminal include touch-screen, and the anti-theft device includes:
Secret key setup module, for recovering secret by receiving the input signal of the button on the mobile terminal to set Key, and the recovery secret key is associated with the login of unlock and/or the specified application of locking screen interface;
Touch screen failed module, for passing through predetermined mode in the login interface of the locking screen interface or the specified application After unlock or login failure, the touch-screen is set to fail;
Secret key receiving module, the user for receiving via the key-press input input secret key;
Secret key authentication module, for judging that the user inputs secret key and whether the recovery secret key is consistent, if unanimously, Recover the function of the touch-screen;Secret key or user input secret key and the recovery are inputted not receiving the user When secret key is inconsistent, the mobile terminal is set not do any response.
B8. the anti-theft device of the mobile terminal according to B7, the button are included in virtual below the touch-screen One or more of button, the physical button of touch controlled key or setting on the mobile terminal.
B9. the anti-theft device of the mobile terminal according to B8, the button are included in virtual below the touch-screen One or more of button or touch controlled key.
B10. the anti-theft device of the mobile terminal according to B7, the touch screen failed module be additionally operable to receive server to The instruction that the mobile terminal is sent, makes the touch-screen of the mobile terminal fail, and described instruction is to pass through other ends in user End logs in the server, after authentication, is sent by the server.
B11. the anti-theft device of the mobile terminal according to B7, it is described recovery secret key for key press time, touch potential and The combination secret key of at least two parameters in keystroke sequence.
B12. the anti-theft device of the mobile terminal according to B11, the secret key setup module is by receiving at least two The input signal of the button sets the recovery secret key, and the recovery secret key is the touch potential and the keystroke sequence The combination secret key of two parameters.
C13. a kind of mobile terminal, including memory and processor, the memory are used to store computer program, institute State processor and run the computer program so that mobile end of the mobile terminal execution according to any one of A1 to A6 The theft preventing method at end.
D14. a kind of computer-readable recording medium, it is stored with the computer used in the mobile terminal described in C13 Program.
The above description is merely a specific embodiment, but protection scope of the present invention is not limited thereto, any Those familiar with the art the invention discloses technical scope in, change or replacement can be readily occurred in, should all be contained Cover within protection scope of the present invention.

Claims (10)

1. a kind of theft preventing method of mobile terminal, the mobile terminal includes touch-screen, it is characterised in that the theft preventing method bag Include:
By receiving the input signal of the button on the mobile terminal, recovery secret key is set, and by the recovery secret key with locking Shield the unlock at interface and/or specify the login of application to be associated;
The locking screen interface or the login interface of the specified application unlocked by predetermined mode or login failure after, make institute State touch-screen failure;
Receive and input secret key via the user of the key-press input;
Judge that the user inputs secret key and whether the recovery secret key is consistent, if unanimously, recovering the function of the touch-screen; If not receiving, the user inputs secret key or the user inputs secret key and the recovery secret key is inconsistent, the movement Terminal does not do any response.
2. the theft preventing method of mobile terminal according to claim 1, it is characterised in that the button is included in the touch Shield one or more of virtual key, the physical button of touch controlled key or setting on the mobile terminal of lower section.
3. the theft preventing method of mobile terminal according to claim 2, it is characterised in that the button is included in the touch Shield one or more of virtual key or touch controlled key of lower section.
4. the theft preventing method of mobile terminal according to claim 1, it is characterised in that it is whole to the movement to receive server Hold the instruction that sends, the touch-screen of the mobile terminal is failed, described instruction be logged in user by other-end described in Server, after authentication, is sent by the server.
5. the theft preventing method of mobile terminal according to claim 1, it is characterised in that when the recovery secret key is button Between, the combination secret key of touch potential and at least two parameters in keystroke sequence.
6. the theft preventing method of mobile terminal according to claim 5, it is characterised in that pressed by receiving described at least two The input signal of key sets the recovery secret key, and the recovery secret key is two ginsengs of the touch potential and the keystroke sequence Several combination secret keys.
7. a kind of anti-theft device of mobile terminal, the mobile terminal includes touch-screen, it is characterised in that the anti-theft device bag Include:
Secret key setup module, for setting recovery secret key by receiving the input signal of the button on the mobile terminal, and The recovery secret key is associated with the login of unlock and/or the specified application of locking screen interface;
Touch screen failed module, for being unlocked in the login interface of the locking screen interface or the specified application by predetermined mode Or after login failure, the touch-screen is set to fail;
Secret key receiving module, the user for receiving via the key-press input input secret key;
Secret key authentication module, for judging that the user inputs secret key and whether the recovery secret key is consistent, if unanimously, recovering The function of the touch-screen;Secret key or user input secret key and the recovery secret key are inputted not receiving the user When inconsistent, the mobile terminal is set not do any response.
8. the anti-theft device of mobile terminal according to claim 7, it is characterised in that the button is included in the touch Shield one or more of virtual key, the physical button of touch controlled key or setting on the mobile terminal of lower section.
9. a kind of mobile terminal, it is characterised in that including memory and processor, the memory is used to store computer journey Sequence, the processor runs the computer program so that the mobile terminal execution is according to any one of claim 1 to 6 institute The theft preventing method for the mobile terminal stated.
10. a kind of computer-readable recording medium, it is characterised in that it is stored with institute in the mobile terminal described in claim 9 The computer program used.
CN201711122217.XA 2017-11-14 2017-11-14 Theft preventing method, anti-theft device and the mobile terminal of mobile terminal Pending CN107911546A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711122217.XA CN107911546A (en) 2017-11-14 2017-11-14 Theft preventing method, anti-theft device and the mobile terminal of mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711122217.XA CN107911546A (en) 2017-11-14 2017-11-14 Theft preventing method, anti-theft device and the mobile terminal of mobile terminal

Publications (1)

Publication Number Publication Date
CN107911546A true CN107911546A (en) 2018-04-13

Family

ID=61843996

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711122217.XA Pending CN107911546A (en) 2017-11-14 2017-11-14 Theft preventing method, anti-theft device and the mobile terminal of mobile terminal

Country Status (1)

Country Link
CN (1) CN107911546A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2021530074A (en) * 2018-08-09 2021-11-04 湖州申脉科技有限公司Huzhou Shenmai Technology Co., Ltd. Privacy management methods and systems for intelligent devices and social applications
CN116484431A (en) * 2023-06-21 2023-07-25 荣耀终端有限公司 Data protection method, electronic equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120075212A1 (en) * 2010-09-27 2012-03-29 Lg Electronics Inc. Mobile terminal and method of controlling the same
CN104463039A (en) * 2014-12-16 2015-03-25 上海斐讯数据通信技术有限公司 Unlocking method and device of intelligent device
CN104598831A (en) * 2014-12-05 2015-05-06 深圳天珑无线科技有限公司 Data security protection method and terminal
CN105554719A (en) * 2016-02-26 2016-05-04 上海卓易科技股份有限公司 Mobile phone alarming method and device
CN105631263A (en) * 2015-12-21 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Terminal usage limiting method and device as well as terminal
CN107018142A (en) * 2017-04-28 2017-08-04 努比亚技术有限公司 Active defense method and mobile terminal

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120075212A1 (en) * 2010-09-27 2012-03-29 Lg Electronics Inc. Mobile terminal and method of controlling the same
CN104598831A (en) * 2014-12-05 2015-05-06 深圳天珑无线科技有限公司 Data security protection method and terminal
CN104463039A (en) * 2014-12-16 2015-03-25 上海斐讯数据通信技术有限公司 Unlocking method and device of intelligent device
CN105631263A (en) * 2015-12-21 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Terminal usage limiting method and device as well as terminal
CN105554719A (en) * 2016-02-26 2016-05-04 上海卓易科技股份有限公司 Mobile phone alarming method and device
CN107018142A (en) * 2017-04-28 2017-08-04 努比亚技术有限公司 Active defense method and mobile terminal

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2021530074A (en) * 2018-08-09 2021-11-04 湖州申脉科技有限公司Huzhou Shenmai Technology Co., Ltd. Privacy management methods and systems for intelligent devices and social applications
CN116484431A (en) * 2023-06-21 2023-07-25 荣耀终端有限公司 Data protection method, electronic equipment and storage medium
CN116484431B (en) * 2023-06-21 2024-05-17 荣耀终端有限公司 Data protection method, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
Feng et al. Continuous mobile authentication using virtual key typing biometrics
Meng et al. Surveying the development of biometric user authentication on mobile phones
CN1952855B (en) Cipher input method and system preventing peeper
EP2579141B1 (en) Method and device for unlocking operating system
CN106355141B (en) Portable electronic device and operation method thereof
CN103079000A (en) Method and device for terminal unlocking
CN102982269A (en) Anti-peeping code authentication method and anti-peeping code authentication system based on biological metering characteristics
CN103034798B (en) A kind of generation method and device of random cipher
CN104820805B (en) A kind of method and device of subscriber identification card information theft-preventing
CN105760737A (en) Control method for applications and terminal
CN103425921A (en) Device, system and method for code management
CN102932540A (en) Mobile terminal and stealing prevention method thereof
CN105512547A (en) Intelligent terminal privacy protection method and intelligent terminal privacy protection system
CN107862194A (en) A kind of method, device and mobile terminal of safety verification
CN103034417A (en) Unlocking method for touch screen and terminal equipment
CN106951757A (en) A kind of method and apparatus for operating application program
CN105929974A (en) Password input management method and mobile terminal
CN106778523A (en) Fingerprint input method and device
CN103870743A (en) Information processing apparatus, and lock execution method
CN107424274A (en) The method, apparatus and intelligent door lock that a kind of intelligent door lock is unlocked
CN106372468A (en) Mobile terminal operation method and mobile terminal
CN107911546A (en) Theft preventing method, anti-theft device and the mobile terminal of mobile terminal
CN106211070B (en) A kind of anti-theft protection method and mobile terminal of mobile terminal
CN105868601A (en) Pressure touch screen-based electronic terminal, encryption unlocking controller and method
CN106952090A (en) Payment verification device and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180413