CN109327807A - A kind of anti-theft method of mobile phone based on position big data information - Google Patents
A kind of anti-theft method of mobile phone based on position big data information Download PDFInfo
- Publication number
- CN109327807A CN109327807A CN201811401769.9A CN201811401769A CN109327807A CN 109327807 A CN109327807 A CN 109327807A CN 201811401769 A CN201811401769 A CN 201811401769A CN 109327807 A CN109327807 A CN 109327807A
- Authority
- CN
- China
- Prior art keywords
- user
- area
- mobile phone
- authentication
- big data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/029—Location-based management or tracking services
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/021—Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention provides a kind of anti-theft method of mobile phone based on position big data information, and process is as follows: 1) establishing basic database;According to the time span of user position, user location is divided into rotine position area_F, once in a while position area_O and suspected locations area_S;Wherein rotine position area_F is the most common position of user, degree of belief highest;Suspected locations area_S is the position that most seldom occurs of user even without the position gone, and degree of belief is minimum.2) user is monitored information setting;As input parameter, user is needed to set trusted distance, each region carries out the time interval of authentication, alarm contact method.3) position learning process.This method can be more intelligent and rapidly whether discovery terminal is stolen and can be stolen with real-time tracking the location information of terminal;Convenience is provided for user, and can effectively hit criminal.
Description
Technical field
The present invention relates to field of communication technology more particularly to a kind of anti-theft method of mobile phone based on position big data information.
Background technique
Current most of mobile phone antitheft systems are all based on the modes such as fingerprint, SIM card replacement or antitheft card of mobile telephone to know
Whether other mobile phone is stolen, if not operating to mobile phone, or shutdown, then cannot find hand-set from stolen in time.And it is general
After being stolen, start calling station module just to track the location information of mobile phone, carry out stolen mobile phone positioning, there is stolen discovery
Hysteresis quality.Discovery to keep mobile phone more intelligent is stolen behavior, and more rapidly positions stolen mobile phone position, grinds
Sending out the anti-theft method of mobile phone based on position big data information a kind of is a urgent problem to be solved.
Summary of the invention
The invention solves the above technical problems, provide a kind of anti-theft method of mobile phone based on position big data information, lead to
Overfitting counts mobile phone location data, to identify rotine position, once in a while position and the suspected locations of mobile phone, and then according to preparatory
Setting carries out mobile phone alarm.
In order to solve the above technical problems, the technical solution adopted by the present invention is that:
A kind of anti-theft method of mobile phone based on position big data information, process are as follows:
1, basic database is established;
2, user is monitored information setting;
3, position learning process
1. detecting location information first, and basic database is called, checks whether to be new position, what new position here referred to
It is the position outside cognitive domains deviation range.
2. then start timer if it is new position, before timer arrival or timer reach, Yong Hujin
It has gone authentication (user inputs correct fingerprint or carried out correct solution screen operation), then timer stops and is zeroed.
3. prompting user to carry out authentication, (user inputs correct fingerprint or has carried out correct if timer overflows
Solution screen operation).If being proved to be successful A times, which is added in position area_O once in a while.
4. otherwise entering verifying and alarm procedure.
5. it needs to carry out authentication according to presetting in position area_O once in a while, if being proved to be successful more than A times,
Then the position is added in the area_F of rotine position, otherwise the position is eliminated in suspected locations area_S, is continued to execute 2.
~operation 4..
6. the position is eliminated in suspected locations area_S, is continued to execute if certain position is more than not update the C time
2.~operation 4..
7. it equally needs to need to carry out periodic authentication according to presetting in the area_F of rotine position, if
It does not update, then eliminates the position in position area_O once in a while more than the C time, execute operation 5. 6..
Further, basic database process is established are as follows: according to the time span of user position, by user location point
For rotine position area_F, position area_O and suspected locations area_S once in a while.Wherein rotine position area_F be user most
The position often occurred, degree of belief highest.And suspected locations area_S is then the position that most seldom occurs of user even without going
Position, degree of belief is minimum.
Further, in step 2, as input parameter, user is needed to set trusted distance (user's setting, default
Value can set the empirical value of the scope of activities of user), i.e., (refer to rotine position area_F, once in a while position in each trust region
Area_O and suspected locations area_S) deviation range x (can be using default setting as the empirical value of scope of activities);Each region
The time interval of authentication is carried out, i.e. prompt user input carries out the time interval (default value of authentication in each region
Can be set to 5min, that is, think that user continues on mobile phone with minute rank) area_F_t, area_O_t, area_S_t;Report
Alert contact method, i.e., after authentication failure or repeatedly authentication time-out, mobile phone sends the collection of letters of warning message
Side.
Further, the verifying and alarm procedure include user using in mobile phone solution screen (input correct password or
Person's fingerprint) operation.If authentication failed N (is set, default value can be set to 3) secondary, then mobile phone is to emergency contact side according to user
Formula sends warning message, and location information is sent to emergency contact by the period.
Further, parameter A/B/C/D/E can be arranged according to the characteristics of each region, it is desirable that D > A, i.e., more reliable
Region, number can be verified and lack point.D is set according to user, general 1≤D≤3.
Further, parameter E≤C, i.e., in frequent region, updating position can be more more frequently.
Further, parameter A is set according to user, general 1≤A≤3.
Further, parameter C, E are set according to user, integrated database size, general 7≤C≤30 day.
Further, parameter B is set according to user, general B≤5.
Further, this method can be applied to the equipment such as mobile phone terminal, GPS, database.
The advantages and positive effects of the present invention are: this method can more intelligence and rapidly discovery terminal whether by
Steal and can be stolen with real-time tracking the location information of terminal;Convenience is provided for user, and can effectively hit criminal.
Detailed description of the invention
Fig. 1 is work flow diagram of the invention.
Specific embodiment
Specific embodiments of the present invention will now be described in detail with reference to the accompanying drawings.
In daily life, the course of action of people is fixed mostly, and for student, route is concentrated mainly on house
Between front yard and school, for office worker, route is concentrated mainly between family and company, only rare occasion, can be gone out
Other present abnormal positions.Therefore, we can use these rules to judge whether mobile phone is stolen, and carry out location tracking.
As shown in Figure 1, a kind of anti-theft method of mobile phone based on position big data information, process are as follows:
1, basic database is established
According to the time span of user position, user location is divided into rotine position area_F, once in a while position area_
O and suspected locations area_S.Wherein rotine position area_F is the most common position of user, degree of belief highest.And it is suspicious
Position area_S is then the position that most seldom occurs of user even without the position gone, and degree of belief is minimum;
2, user is monitored information setting
As input parameter, needing user to set trusted distance, (user's setting, default value can set the activity of user
The empirical value of range), i.e., (refer to rotine position area_F, once in a while position area_O and suspected locations in each trust region
Area_S deviation range x (can be using default setting as the empirical value of scope of activities));Each region carries out the time of authentication
Interval prompts user's input between the time that each region (rotine position, once in a while position and suspected locations) carry out authentication
Every (default value can be set to 5min, that is, think that user continues on mobile phone with minute rank) area_F_t, area_O_t,
area_S_t;Alarm contact method, i.e., after authentication failure or repeatedly authentication time-out, mobile phone sends alarm
The destination of information;
3, position learning process
1. detecting location information first, and basic database is called, checks whether to be new position, what new position here referred to
It is the position outside cognitive domains deviation range.
2. then start timer if it is new position, before timer arrival or timer reach, Yong Hujin
It has gone authentication (user inputs correct fingerprint or carried out correct solution screen operation), then timer stops and is zeroed.
3. prompting user to carry out authentication, (user inputs correct fingerprint or has carried out correct if timer overflows
Solution screen operation).If being proved to be successful A times, which is added in position area_O once in a while.
4. otherwise entering verifying and alarm procedure.
The verifying includes that user uses solution screen (the inputting correct password or fingerprint) behaviour in mobile phone with alarm procedure
Make.If authentication failed N (is set, default value can be set to 3) secondary, then mobile phone sends alarm to emergency contact mode according to user
Information, and location information is sent to emergency contact by the period.
5. it needs to carry out authentication according to presetting in position area_O once in a while, if being proved to be successful more than A times,
Then the position is added in the area_F of rotine position, otherwise the position is eliminated in suspected locations area_S, is continued to execute 2.
~operation 4..
6. the position is eliminated in suspected locations area_S, is continued to execute if certain position is more than not update the C time
2.~operation 4..
7. it equally needs to need to carry out periodic authentication according to presetting in the area_F of rotine position, if
It does not update, then eliminates the position in position area_O once in a while more than the C time, execute operation 5. 6..
Foregoing is directed to parameter A/B/C/D/E, can be arranged according to the characteristics of each region, it is desirable that D > A, i.e., more reliable
Region, number can be verified and lack point.D is set according to user, general 1≤D≤3.Parameter E≤C updates that is, in frequent region
It position can be more more frequently.Parameter A is set according to user, general 1≤A≤3.Parameter C, E are set according to user, and integrated database is big
It is small, general 7≤C≤30 day.Parameter B is set according to user, general B≤5.
It may be mentioned here that although this patent, which is suggested plans, is directed to mobile phone terminal, the mentioned method of this patent
It can be applied to other equipment for supporting GPS, database.
The embodiments of the present invention have been described in detail above, but content is only the preferred embodiment of the present invention,
It should not be considered as limiting the scope of the invention.All changes and improvements made in accordance with the scope of the present invention, should all
It still belongs within this patent covering scope.
Claims (8)
1. a kind of anti-theft method of mobile phone based on position big data information, which is characterized in that its process is as follows:
1) basic database is established;
2) user is monitored information setting;
3) position learning process
1. detecting location information first, and basic database is called, checks whether to be new position;
2. then starting timer if it is new position, before timer reaches or timer reaches, user has carried out identity
Verifying, then timer stops and is zeroed;
3. prompting user to carry out authentication if timer overflows;If being proved to be successful A times, which is added position once in a while
It sets in area_O;
4. otherwise entering verifying and alarm procedure;
5. it needs to carry out authentication according to presetting in position area_O once in a while, it, will if being proved to be successful more than A times
The position be added rotine position area_F in, otherwise the position is eliminated in suspected locations area_S, continue to execute 2.~4.
Operation;
6. the position is eliminated in suspected locations area_S if certain position is more than not update the C time, continue to execute 2.~
4. operation;
7. equally needing to need to carry out periodic authentication, if more than C according to presetting in the area_F of rotine position
Time does not update, then eliminates the position in position area_O once in a while, executes operation 5. 6..
2. a kind of anti-theft method of mobile phone based on position big data information according to claim 1, which is characterized in that establish
Basic database process are as follows: according to the time span of user position, user location is divided into rotine position area_F, once in a while
Position area_O and suspected locations area_S;Wherein rotine position area_F is the most common position of user, degree of belief highest;
Suspected locations area_S is the position that most seldom occurs of user even without the position gone, and degree of belief is minimum.
3. a kind of anti-theft method of mobile phone based on position big data information according to claim 1 or 2, it is characterised in that:
In step 2, as input parameter, user is needed to set:
Trusted distance (refers to rotine position area_F, once in a while position area_O and suspected locations in each trust region
Area_S deviation range x);
Each region carries out the time interval of authentication, i.e. prompt user input carries out the time of authentication in each region
It is spaced area_F_t, area_O_t, area_S_t;
Alarm contact method, i.e., after authentication failure or repeatedly authentication time-out, mobile phone sends warning message
Destination.
4. a kind of anti-theft method of mobile phone based on position big data information according to claim 3, it is characterised in that: described
Verifying includes user with alarm procedure to be operated using the solution screen in mobile phone, if authentication failed n times, mobile phone is to emergency contact mode
Warning message is sent, and location information is sent to emergency contact by the period.
5. a kind of anti-theft method of mobile phone based on position big data information according to claim 1, it is characterised in that: described
Authentication includes that user inputs correct fingerprint or carried out correct solution screen operation.
6. a kind of anti-theft method of mobile phone based on position big data information according to claim 3, it is characterised in that: described
New position refers to the position outside cognitive domains deviation range.
7. a kind of anti-theft method of mobile phone based on position big data information according to claim 1, it is characterised in that: parameter
A/B/C/D/E is arranged according to the characteristics of each region, it is desirable that D > A can verify number and lack point that is, in more reliable region;Ginseng
Number D is set according to user;It is more frequent to update position that is, in frequent region by parameter E≤C;Parameter A is set according to user;Parameter C,
E is set according to user, the setting of integrated database size;Parameter B is set according to user.
8. a kind of anti-theft method of mobile phone based on position big data information according to claim 1, it is characterised in that: we
Method can be applied to mobile phone terminal, GPS, database.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811401769.9A CN109327807A (en) | 2018-11-22 | 2018-11-22 | A kind of anti-theft method of mobile phone based on position big data information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811401769.9A CN109327807A (en) | 2018-11-22 | 2018-11-22 | A kind of anti-theft method of mobile phone based on position big data information |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109327807A true CN109327807A (en) | 2019-02-12 |
Family
ID=65258898
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811401769.9A Pending CN109327807A (en) | 2018-11-22 | 2018-11-22 | A kind of anti-theft method of mobile phone based on position big data information |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109327807A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114996686A (en) * | 2022-07-29 | 2022-09-02 | 深圳市赢向量科技有限公司 | Computer system and user identity identification method and device thereof |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106231075A (en) * | 2016-07-20 | 2016-12-14 | 惠州Tcl移动通信有限公司 | A kind of method and system automatically turning on antitheft mobile phone pattern |
CN106379270A (en) * | 2016-09-05 | 2017-02-08 | 深圳市双赢伟业科技股份有限公司 | Vehicle anti-theft system |
CN107635071A (en) * | 2017-09-27 | 2018-01-26 | 维沃移动通信有限公司 | A kind of theft preventing method, mobile terminal and computer-readable recording medium |
-
2018
- 2018-11-22 CN CN201811401769.9A patent/CN109327807A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106231075A (en) * | 2016-07-20 | 2016-12-14 | 惠州Tcl移动通信有限公司 | A kind of method and system automatically turning on antitheft mobile phone pattern |
CN106379270A (en) * | 2016-09-05 | 2017-02-08 | 深圳市双赢伟业科技股份有限公司 | Vehicle anti-theft system |
CN106379270B (en) * | 2016-09-05 | 2019-04-02 | 深圳市双赢伟业科技股份有限公司 | vehicle anti-theft system |
CN107635071A (en) * | 2017-09-27 | 2018-01-26 | 维沃移动通信有限公司 | A kind of theft preventing method, mobile terminal and computer-readable recording medium |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114996686A (en) * | 2022-07-29 | 2022-09-02 | 深圳市赢向量科技有限公司 | Computer system and user identity identification method and device thereof |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3105748B1 (en) | Applying geographical limitations to control actions of a security system | |
CN106203012A (en) | The processing method of screen locking, device and equipment | |
EP3136273B1 (en) | Intrusion security device with sms based notification and control | |
CN101364316B (en) | Mobile phone key gate inhibition system | |
US20160379025A1 (en) | Systems and methods for rfid-based access management of electronic devices | |
CN105573623A (en) | Help seeking method based on fingerprint identification | |
US20030045270A1 (en) | Fraud detection techniques for wireless network operators | |
CN110135594A (en) | A kind of power system monitor exception information processing method and system | |
CN104933826A (en) | Method and system of protecting life and property safety based on wearable device | |
CN102708611A (en) | Intelligent lock and control method thereof | |
CN105141756A (en) | Abnormity processing method and abnormity processing device | |
CN104240355A (en) | Intelligent safety access control system | |
CN108449723A (en) | Talk back equipment sharing method, talk back equipment and computer-readable medium | |
CN109327807A (en) | A kind of anti-theft method of mobile phone based on position big data information | |
CN105427479A (en) | Man-machine interaction ATM safety management system and method | |
US11172346B2 (en) | Mobile-initiated SMS cell broadcast | |
US20090111439A1 (en) | System and method for monitoring a monitored mobile phone | |
CN105717891A (en) | Mobile terminal, system, and method for monitoring engineering operation scene | |
CN111049990B (en) | Message reminding method and system | |
Saranya et al. | A Smart friendly IoT device for women safety with GSM and GPS location tracking | |
CN103167413A (en) | Cell phone tracking method | |
CN107452170A (en) | The method and apparatus of home security | |
CN201251802Y (en) | Cell phone key gate control system | |
CN107318055A (en) | Screen unlocking method and device of mobile terminal | |
EP3185600B1 (en) | Mobile terminal control method and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190212 |
|
RJ01 | Rejection of invention patent application after publication |