CN110290270A - Theft preventing method and mobile terminal - Google Patents

Theft preventing method and mobile terminal Download PDF

Info

Publication number
CN110290270A
CN110290270A CN201910570020.5A CN201910570020A CN110290270A CN 110290270 A CN110290270 A CN 110290270A CN 201910570020 A CN201910570020 A CN 201910570020A CN 110290270 A CN110290270 A CN 110290270A
Authority
CN
China
Prior art keywords
mobile terminal
user
target user
module
antitheft
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910570020.5A
Other languages
Chinese (zh)
Other versions
CN110290270B (en
Inventor
胡啸
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201910570020.5A priority Critical patent/CN110290270B/en
Publication of CN110290270A publication Critical patent/CN110290270A/en
Application granted granted Critical
Publication of CN110290270B publication Critical patent/CN110290270B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72454User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72457User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to geographic location
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2250/00Details of telephonic subscriber devices
    • H04M2250/12Details of telephonic subscriber devices including a sensor for measuring a physical value, e.g. temperature or motion

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Environmental & Geological Engineering (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephone Function (AREA)

Abstract

The present invention discloses a kind of theft preventing method and mobile terminal and obtains the first use state of mobile terminal this method comprises: being moved to the operation of second environment from first environment in preset duration in response to mobile terminal;Based on the first use state and habit data, determine whether mobile terminal is that target user uses, the habit data include the operation note of the owner user of mobile terminal and the pre-set user operation mobile terminal of owner user;If mobile terminal is not that target user uses, the first antitheft operation is executed;If can not determine whether mobile terminal is that target user uses, and executes the second antitheft operation.Based on the above method, allow owner user to perceive mobile terminal at the first time as far as possible stolen, and give mobile terminal for change in time, if owner user can not perceive mobile terminal at the first time and be stolen, also mobile terminal can be given for change by the second antitheft operation, and then reduce the stolen probability of mobile terminal.

Description

Theft preventing method and mobile terminal
Technical field
The present invention relates to field of terminal more particularly to a kind of theft preventing methods and mobile terminal.
Background technique
With popularizing for mobile terminal device, other mobile terminals such as mobile phone, tablet computer are the equipment of modern's indispensability, Very big convenience and enjoyment are brought to people's lives.Currently, automatic emergency is handled all after all big enterprises are stolen to mobile terminal It is lacking, and then causes mobile terminal easily stolen.
Summary of the invention
The embodiment of the present invention provides a kind of theft preventing method and mobile terminal, is easy quilt to solve existing mobile terminal in the art The problem of robber.
In order to solve the above-mentioned technical problem, the present invention is implemented as follows:
In a first aspect, providing a kind of theft preventing method, which comprises
It is moved to the operation of second environment from first environment in preset duration in response to mobile terminal, obtains the movement The intensity of illumination of first use state of terminal, the first environment is less than preset value, and the intensity of illumination of the second environment is big In or equal to the preset value;
Based on first use state and habit data, determine whether the mobile terminal is that target user uses, institute The pre-set user operation for stating owner user and the owner user that habit data include the mobile terminal is described mobile whole The operation note at end;
If the mobile terminal is not that the target user uses, the first antitheft operation is executed;
If can not determine whether the mobile terminal is that the target user uses, and executes the second antitheft operation.
Second aspect provides a kind of mobile terminal, which includes:
Module is obtained, for being moved to the behaviour of second environment from first environment in preset duration in response to mobile terminal Make, obtain the first use state of the mobile terminal, the intensity of illumination of the first environment is less than preset value, second ring The intensity of illumination in border is greater than or equal to the preset value;
Determining module, for determining whether the mobile terminal is mesh based on first use state and habit data It marks user to use, the habit data include the owner user of the mobile terminal and the pre-set user behaviour of the owner user Make the operation note of the mobile terminal;
First anti-theft module executes the first antitheft behaviour if not being that the target user uses for the mobile terminal Make;
Second anti-theft module, if being executed for that can not determine whether the mobile terminal is that the target user uses Second antitheft operation.
The third aspect provides a kind of mobile terminal, which includes processor, memory and be stored in described deposit On reservoir and the computer program that can run on the processor, the computer program are realized when being executed by the processor The step of method as described in relation to the first aspect.
Fourth aspect provides a kind of computer readable storage medium, stores meter on the computer readable storage medium Calculation machine program, the step of method as described in relation to the first aspect is realized when the computer program is executed by processor.
In embodiments of the present invention, by detecting that mobile terminal is moved to second environment from first environment, movement is obtained First use state of terminal determines whether mobile terminal is mesh according to the first use state of mobile terminal and habit data It marks user to use, however, it is determined that mobile terminal is not that target user uses, and executes the first antitheft operation, makes owner user as far as possible Can be stolen in first time perception mobile terminal, and give mobile terminal for change in time, if can not determine whether mobile terminal is mesh User's use is marked, the second antitheft operation is executed, until determining that mobile terminal is stolen and gives for change mobile terminal, to reduce mobile whole The stolen probability in end.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present invention, constitutes a part of the invention, this hair Bright illustrative embodiments and their description are used to explain the present invention, and are not constituted improper limitations of the present invention.In the accompanying drawings:
Fig. 1 is the flow diagram of the theft preventing method of one embodiment of the present of invention;
Fig. 2 is the flow diagram of the theft preventing method of another embodiment of the invention;
Fig. 3 is the structural schematic diagram of the mobile terminal of one embodiment of the present of invention;
Fig. 4 is the structural schematic diagram of the mobile terminal of another embodiment of the invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall within the protection scope of the present invention.
Fig. 1 is the flow diagram of the theft preventing method of one embodiment of the present of invention, and method shown in Fig. 1 includes:
S110 is moved to the operation of second environment in response to mobile terminal in preset duration from first environment, obtains and moves The intensity of illumination of first use state of dynamic terminal, the first environment is less than preset value, the intensity of illumination of the second environment More than or equal to the preset value.
It will be appreciated that under normal circumstances, mobile terminal is placed in the packet of owner user or the local quilt such as in pocket Thief steals, rather than on hand being stolen by thief in owner user.When mobile terminal is moved to the second ring from first environment Border, wherein first environment is the environment that intensity of illumination is less than preset value, and second environment is the ring that intensity of illumination is greater than preset value Border, it will be appreciated that wait places to be moved to the ground such as the packet of owner user is outer or pocket is outer in the packet of mobile terminal slave primary user or in pocket Side.
In S110, in the feelings for the operation for detecting mobile terminal in preset duration and being moved to from first environment second environment Under condition, the first use state of mobile terminal is obtained, if the motion track that the first use state is mobile terminal is non-vertical And the length of motion track be greater than the current location that preset length and mobile terminal are in and be determined as location at risk, such as endanger Strategical vantage point point includes subway, public transport, scenic spot etc., illustrates that mobile terminal may be by the packet of thief slave primary user or in pocket etc. It takes out in place.
Specifically, if the motion track of mobile terminal be it is vertical, illustrate mobile terminal be by owner user in packet Or equal places are taken out in pocket.If the motion track of mobile terminal is that non-vertical and motion track length is greater than default length Degree then illustrates that mobile terminal is to be waited places to take out in the packet of non-owner user's slave primary user or in pocket, and non-owner uses The primary user that disembarks after mobile terminal is taken out at family certain distance, if the current location that mobile terminal is in is determined as location at risk, Illustrate that mobile terminal may be to be waited places to take out in the packet of thief slave primary user or in pocket, and thief takes out mobile terminal After the primary user that disembarks have certain distance.
Such as: in 2 seconds, detects that mobile terminal moves quickly into bright ring border from dark situation, illustrate mobile terminal slave Place is taken out by people in the packet of primary user or in pocket etc., obtains the first use state of mobile terminal, if the of mobile terminal One use state be mobile terminal motion track be it is non-vertical, illustrate mobile terminal be by non-owner user in packet or Equal places are taken out in pocket.If the first use state of mobile terminal is that the moving rail track of mobile terminal is non-vertical and mobile The length of track is greater than preset length, illustrates that mobile terminal is by ground in the packet of non-owner user's slave primary user or in pocket etc. Side takes out, and non-owner user takes out the primary user that disembarks after mobile terminal certain distance.If the first use state is movement The motion track of terminal is non-vertical, and the length of motion track is greater than pre-determined distance and mobile terminal is in current Place is really location at risk, illustrates that mobile terminal may be waited places to take out in the packet of thief slave primary user or in pocket, and The primary user that disembarks has certain distance.
Alternatively, detecting that mobile terminal is moved to bright ring border from dark situation and is moved to dark situation again in 2 seconds, illustrating to move Dynamic terminal by the packet of people slave primary user perhaps in pocket equal places take out then and put into the bag or pocket in equal places, obtain Mobile terminal the first use state, if the first use state be mobile terminal motion track be it is vertical, illustrate to move Terminal is by perhaps then equal places are taken out and put back in packet or the ground such as in pocket in pocket in the packet of owner user slave primary user Side.If the motion track that the first use state is mobile terminal be non-vertical and motion track movable length be greater than it is default away from From illustrating that mobile terminal is taken out by places equal in the packet of non-owner user's slave primary user or in pocket, put non-owner into and use Places are waited in the packet at family or in pocket.If the first use state is that the motion track of mobile terminal is non-vertical, and moving rail The length of mark is greater than pre-determined distance and mobile terminal is in current location as location at risk, illustrates that mobile terminal may be small Perhaps equal places in the packet or pocket of then and putting thief into are taken out in equal places in pocket in the packet of slave primary user steathily.
S120 determines whether the mobile terminal is that target user makes based on first use state and habit data With the habit data include that the owner user of the mobile terminal and the pre-set user of the owner user operate the shifting The operation note of dynamic terminal.
It should be understood that target user is the pre-set user of owner user or owner user, pre-set user can be owner's use The people of the understanding such as companion, colleague, good friend, the relative at family.Habit data include the pre- of several owner users and owner user If the operation note of user's operation mobile terminal, wherein the most use of mobile terminal number will be operated in several operation notes Family is determined as owner user.
As shown in table 1, habit data include several operation notes, and every operation note includes the time point of operation, behaviour The place of work, operation user's appearance, hold angle between mobile terminal and horizontal line, five fingers by mobile terminal screen Shape (shape is formed by pressing pixel), in pocket or packet in take out the habit of mobile terminal, by mobile terminal Closing key duration.
Table 1
Exhausted big number operation in several operation notes is operated by the same person, in conjunction with face recognition, by this person It is determined as owner user.In the case where determination is owner user, if not being owner's user's operation time shift in discovery operation note Dynamic terminal automatically opens camera, if discovery owner user occurs simultaneously with non-owner user, automatic identification voice determines two people Mutual address when chat, is repeatedly identified, determines the relationship of two people, such as companion, good friend or the colleague of owner user.
If it is determined that being the companion of owner user, it is determined that the place of operation is the address of owner user;If it is determined that being owner The colleague of user, it is determined that operation address is the CompanyAddress of owner user.If there is engine roar, noisy in the place of operation Sound etc. need to judge that the place of operation is the vehicle that subway, public transport or owner user open.
Judgement above is repeated, the entry of all operation notes is confirmed one by one.Such as: first, Article 2, third Article ... the 10000th article be all owner user operation, wherein Article 9, the 200th article, the 210th article be owner use Family companion operation, the 101st, the 100th fourth is that owner user colleague operation, and so on.After optimization It is as shown in table 2 to be accustomed to data.
Table 2
It is above-mentioned in pocket or packet in take out mobile terminal habit include in pocket or wrap in take out mobile terminal speed, Acceleration, motion track, in pocket or in packet when taking out mobile terminal by habit finger and palm on the screen.Wherein, it takes Out mobile terminal when by the screen habit finger and palm such as take out mobile terminal when, thumb is integrally pressed into screen On, some is pressed on the screen palm, some nameless pressing is in screen edge.
The place of aforesaid operations includes the places such as family, company, public transport, subway, scenic spot, park, shop, for example, such as Shown in table 3, these are pressed into security risk level division, security risk level divides safety, general, danger into.Wherein, safety The place of rank includes family and company, i.e. safety place includes family and company, and location at risk includes public transport, subway, scenic spot, generally Place includes park, shop.
The place of operation Feature Security risk level
Public transport XXX It is dangerous
Subway XXX It is dangerous
Company XXX Safety
Family XXX Safety
Park XXX Generally
Shop XXX Generally
…… …… ……
Table 3
In S120, according to the first use state and habit data, judge whether mobile terminal is that target user uses, it should Target user is the pre-set user of owner user or owner user, executes corresponding processing based on judging result.
Specifically, if the moving rail track that the first use state is mobile terminal is non-vertical and motion track length Greater than preset length, then the place that mobile terminal is operated in current location that mobile terminal is in and habit data is compared, If it is determined that current location is safety place, then do not deal with.If it is determined that current location is location at risk, then front and rear camera is sentenced Whether disconnected active user (i.e. the user of mobile terminal) is target user, however, it is determined that active user is target user, then does not make to locate Reason.If can not judge whether active user is target user, it is determined that mobile terminal speed, acceleration at this time, motion track And hold the fingers/hand palm shape of mobile terminal and whether belong to the habit of target user recorded in habit data, if so, saying Bright active user is target user, is not just dealt with.If it is not, then illustrating that active user is not target user, it is carried out step S130.If can not determine, illustrates that active user can not determine target user, be carried out step S140.
S130 executes the first antitheft operation if the mobile terminal is not that the target user uses.
S140 executes the second antitheft operation if can not determine whether the mobile terminal is that the target user uses.
In some embodiments, however, it is determined that mobile terminal is that target user uses, then does not deal with;If it is determined that mobile terminal It is not that target user uses, executes the first antitheft operation, allow owner user to perceive mobile terminal at the first time as far as possible It is stolen, and give mobile terminal for change in time;If can not determine whether mobile terminal is stolen, the second antitheft operation is executed, until determining Mobile terminal is stolen and gives mobile terminal for change.
In embodiments of the present invention, by detecting that mobile terminal is moved to second environment from first environment, movement is obtained First use state of terminal, according to the first use state of mobile terminal and habit data, it is determined whether make for target user With, however, it is determined that it is not that target user uses, executes the first antitheft operation, feel owner user in first time It is stolen to know mobile terminal, and gives mobile terminal for change in time, and then reduces the stolen probability of mobile terminal.If can not determine whether for Target user uses, and executes the second antitheft operation, until determining that mobile terminal is stolen and gives for change mobile terminal, to reduce movement The stolen probability of terminal.
Specifically, the first antitheft operation in step S130 can include:
Export warning note;
If determining the mobile terminal not is the target when the output duration of the warning note reaches preset duration User uses, then stops exporting the warning note, and execute retrieval operation.
For example, output warning note is amplitude peak vibration and maximum acoustic jingle bell, preset duration is 30 seconds, mobile terminal Continue amplitude peak vibration in 30 seconds and maximum acoustic jingle bell, prompt machine primary user's mobile terminal is stolen, moves if determined after 30 seconds Dynamic terminal is not that target user uses, and owner user does not give mobile terminal for change after illustrating 30 seconds, and owner user and thief are Through a good distance off, then mobile terminal no longer vibrates and jingle bell, holding electricity simultaneously execute retrieval operation.
Specifically, the second antitheft operation in step S140 can include:
Output notice prompt;
If power-off operation is detected in the preset duration that the end of output moment of the notice prompt starts, based on described The operating status of mobile terminal determines whether the mobile terminal is that the target user uses;
If can not determine whether the mobile terminal is that the target user uses, and executes the antitheft operation of third.
For example, output notice prompts for mobile terminal vibration, preset duration is 5 seconds, and mobile terminal vibration for 5 seconds is used In judging whether mobile terminal is that the target user uses, if mobile terminal detects power-off operation in vibration 5 seconds, in order to It prevents from judging by accident, further judges whether mobile terminal is that the target user uses according to the operating status of mobile terminal, if moving The operating status of dynamic terminal is that mobile terminal compares Caton or has the prompt for restarting the interfaces such as upgrading before shutting down, and illustrates movement eventually End is that target user uses, then mobile terminal directly shuts down, and does not make other processing.If the operating status of mobile terminal is before shutting down Not Caton and do not restart upgrading etc. interfaces prompt, then can not determine mobile terminal whether be target user use, execute The antitheft operation of third.
Optionally, in some embodiments, antitheft operate of third includes:
Detect whether the mobile terminal is set password;
If password is set in the mobile terminal, the 4th antitheft operation is executed;
Wherein, the described 4th antitheft operation includes: that the user of the mobile terminal is prompted to input password, described mobile whole During the user at end inputs password, the second use state of the mobile terminal is obtained, is based on second use state With the habit data, determine whether the mobile terminal is that the target user uses, if the mobile terminal can not be determined It whether is that the target user uses, then whether the password for verifying user's input of the mobile terminal is correct, if incorrect, Execute the described first antitheft operation.
In the case where that can not determine whether mobile terminal is stolen, whether detection mobile terminal is set password when shutting down, If password is set in mobile terminal, unlocking manner can be with fingerprint, face or number identification, in active user's (i.e. mobile terminal User) input password during, active user needs to see the screen of mobile terminal, obtains the appearance of active user, passes through User's appearance that mobile terminal is operated in the appearance of active user and habit data matches, and determines whether active user is mesh User is marked, if target user, just directly prompt passes through, and prompt can be " acknowledged expression in the eyes, the people for being exactly couple ", is then not necessarily to Input password directly shuts down, and does not make other processing.If not finding active user from operation note, user's input is verified Password it is whether correct, if verifying password it is correct, mobile terminal directly shuts down, and does not make other processing.If verifying password It is incorrect, then execute the first antitheft operation.
Optionally, in further embodiments, the antitheft operation of third further include:
If password is not set for the mobile terminal, the 5th antitheft operation is executed;
Wherein, the described 5th it is antitheft operation include: to the user of the mobile terminal show the owner user it is N number of i.e. When communication contact number of people picture in response to selection operation determine the instant messaging that the user of the mobile terminal correctly selects The number M of contact head image executes the described first antitheft operation if M < preset value, and N is the integer greater than 2.
In the case where that can not determine whether mobile terminal is stolen, whether detection mobile terminal is set password when shutting down, If password is not set in mobile terminal, interface is shown to active user, interface includes N number of instant communication contact head portrait, such as Interface includes 8 wechat head portraits and 8 QQ head portraits, and during selecting wechat head portrait or QQ head portrait, active user needs It sees that the screen of mobile terminal, front camera distinguish whether active user is target user, if target user, just directly prompts Pass through, prompt can be " acknowledged expression in the eyes, the people for being exactly couple ", and then direct power-off operation, does not make other processing.If not mesh User is marked, then responds user's selection operation, determines that active user correctly selects M wechat head portrait or M QQ head portrait, wherein Preset value is 3.If active user correctly selects 3 wechat head portraits or 3 QQ head portraits, mobile terminal directly to shut down, do not make it He is handled.If active user correctly selects 2 wechat head portraits or 2 QQ head portraits, the first antitheft operation is executed.
Optionally, in some embodiments, the second antitheft operation in step S140, comprising:
If power-off operation is not detected in the preset duration that the end of output moment of the notice prompt starts, continue really Whether the fixed mobile terminal is that the target user uses, until when determining that the mobile terminal is that the target user uses Stop determining whether the mobile terminal is operation that the target user uses.
For example, notice prompts for mobile terminal vibration, preset duration is 5 seconds, does not detect power-off operation in 5 seconds, Illustrate that active user is not carried out power-off operation, then can not determine whether mobile terminal is that target user uses, and is continued from the background really Whether the fixed mobile terminal is that the target user uses, until determining that the user of the mobile terminal is target user, is said Bright mobile terminal is not stolen, then stop determine mobile terminal user whether be target user operation.
Optionally, in further embodiments, the second antitheft operation in step S140 further include:
If power-off operation is not detected in the preset duration that the end of output moment of the notice prompt starts, continue really Whether the fixed mobile terminal is that the target user uses, until receiving the short message with special format, the tool The short message for having special format includes preset field and other chat software accounts of the owner user;
After receiving the short message with special format, the first sub- retrieval operation is executed;
Wherein, the described first sub- retrieval operation includes:
It closes reminder announced and opens data traffic and Wireless Fidelity switching to net state can be gone up, and reply the tool There is the short message of special format;
It determines whether the mobile terminal networks, if the mobile terminal networking, executes the second sub- retrieval operation;
Wherein, the described second sub- retrieval operation includes:
Based on other described chat software accounts, the user for adding other chat software accounts is good friend, and by institute State position Real-Time Sharing where mobile terminal to the user of other chat software accounts and obtain it is described other Position where the user of chat software account;
If between the position where the user of position where the mobile terminal locates and other chat software accounts Distance is less than pre-determined distance, then exports the warning note.
For example, notice prompts for mobile terminal vibration, preset duration is 5 seconds, and shutdown behaviour is not detected in 5 seconds Make, illustrate that active user is not carried out power-off operation, then can not determine whether mobile terminal is that target user uses, it is lasting to determine Whether mobile terminal is that target user uses, until receiving the short message with special format, which includes being Other WeChat IDs and preset field of owner user, wherein preset field is that mobile terminal is stolen, need to execute the first son and seek Operation is returned, after mobile terminal receives the short message, determines that mobile terminal is stolen, executes the first sub- retrieval operation.
Transmitting-receiving short message is found by thief in order to prevent, and mobile terminal closes reminder announced, and after transmitting-receiving short message It would not remain on mobile terminal.Mobile terminal opens data traffic and WIFI (Wireless Fidelity, Wireless Fidelity) is opened Concern, which is changed to, can go up net state, and reply the short message, inform that the user for sending the short message has been received by the short message.
Connect network such as 3G, 4G or WIFI that all can be connected, however, it is determined that mobile terminal networking, addition owner user's The user of other WeChat IDs is good friend, and the user of other WeChat IDs can be owner user, the friend of owner user, owner The relatives etc. of user.By the position Real-Time Sharing where mobile terminal give the user of other WeChat IDs and obtain it is described its The user of position where the user of his WeChat ID, other WeChat IDs goes to mobile terminal according to the position where mobile terminal Near, mobile terminal judges automatically between the position where mobile terminal and the position where the user of other WeChat IDs Distance, if the distance be less than pre-determined distance be 20 meters, sound automatically maximum the tinkle of bells in order to other WeChat IDs user It can hear.
Optionally, in some embodiments, the described first sub- retrieval operation further include:
If the mobile terminal failed cluster, the sub- retrieval operation of third is executed;
Wherein, the sub- retrieval operation of the third includes:
Position where the mobile terminal locates is sent in the form of short message according to prefixed time interval and receives the transmission Position where the terminal of short message with special format;
If where position where the mobile terminal locates and the terminal for sending the short message with special format The distance between position is less than pre-determined distance, then exports the warning note.
In the case where mobile terminal failed cluster, the sub- retrieval operation of third is executed, as mobile terminal calls positioning to connect automatically Position where mobile terminal is sent to above-mentioned terminal at intervals of two minutes by mouth in the form of short message, and in the form of short message Receive the position where the terminal.Where mobile terminal automatically parses short message and locating interface is called to judge mobile terminal Position and the terminal where the distance between position sound automatically most if it is 20 meters that the distance, which is less than pre-determined distance, Big the tinkle of bells can be heard in order to the user of the terminal, and give mobile terminal for change, reduce the loss of owner user.
Optionally, in some embodiments, when the output duration of warning note reaches preset duration, mobile terminal is determined It is not that target user uses, stops output warning note, execute retrieval operation, wherein retrieval operation includes:
The user for detecting the owner user identifies whether SIM card is removed;
If the SIM card of the owner user is removed, by location information at the time of detecting that the SIM card is removed It is sent to the preset number of the owner user, and records the macroscopic features of the user of the mobile terminal and restores initially to set It sets.
Specifically, at the time of detecting that the SIM card is removed, mobile terminal can call GPS positioning interface immediately, The location information of mobile terminal issues the preset number that owner user reserves in the form of short message, can mention for owner user For giving the clue of mobile terminal for change, the stolen risk of mobile terminal is reduced, wherein the preset number can be the another of owner user An outer number, is also possible to the number of owner user relatives.Front and rear camera opens shooting, is recorded and is used in the form of photo The macroscopic features at family simultaneously preserves.For in the case where networking, determining the corresponding target chat software account of preset number, The user for adding target chat software account is good friend, and the photo for recording the macroscopic features of user is sent to target chat software The user of account, the user of the target chat software account can determine the user of mobile terminal by the assistance of photo and police The information such as name, address, and mobile terminal is given for change according to the category information.
Certainly, at the time of detecting that the SIM card is removed, mobile terminal also restores initial setting up, and (i.e. factory is set Set), even if hereafter thief executes also only false remove that clear data.In order to confuse thief, temptation thief uses movement for the operation Other cards are such as networked or inserted to terminal.
Optionally, in further embodiments, retrieval operation further include:
If other SIM cards are not detected, it is determined that whether the mobile terminal networks, if the mobile terminal networking, Execute the 4th sub- retrieval operation;
Wherein, the 4th sub- retrieval operation includes:
Determine the corresponding target chat software account of the preset number;
The user for adding target chat software account is good friend, and position where the mobile terminal locates is total in real time It enjoys to the user of target chat software account;
If between the position where the user of position where the mobile terminal locates and target chat software account Distance is less than pre-determined distance, then exports the warning note.
It is removed in the SIM card of detection machine primary user, and other SIM cards is not detected, near mobile terminal connects automatically Exempt from password WIFI, if not exempting from password WIFI, actively runs WIFI cracking programs and cracked, it is determined whether WIFI is connected, In the case where connecting WIFI, the 4th sub- retrieval operation is executed, for example determine the corresponding WeChat ID of preset number, add the wechat Number user be wechat good friend, starting " position shared " position after wechat good friend is added, in real time the position where mobile terminal It shares to wechat good friend and receives the position where wechat good friend, whole operation is all located at consistency operation, and thief It can't see.
Wechat good friend goes near mobile terminal according to the position of mobile terminal sharing, and mobile terminal judges automatically movement The distance between the position where position and wechat good friend where terminal, the maximum the tinkle of bells if the distance is just sounded in 20 meters In order to the wechat, good friend can hear, and give mobile terminal for change, reduce the loss of owner user.
If not connecting WIFI still, thief's plug-in card or networking are waited, if plug-in card success, executes the first son and recover Operation;If networking successfully, the 4th sub- retrieval operation is executed.
Optionally, in some embodiments, the retrieval operation further include:
If detecting other SIM cards, the location information is sent to described default number by other described SIM cards Code, and determine whether the mobile terminal networks, if the mobile terminal networking, execute the 4th sub- retrieval operation.
In the case where detecting other SIM cards, location information is sent in the form of short message by other SIM cards Preset number, automatic connection nearby exempt from password WIFI, if not exempting from password WIFI, actively run WIFI cracking programs and carry out brokenly Solution, it is determined whether connect WIFI, in the case where connecting WIFI, execute the 4th sub- retrieval operation, until giving mobile terminal for change, drop The loss of low owner user.
Optionally, in further embodiments, the retrieval operation further include:
If the mobile terminal failed cluster, after receiving the short message with special format, described in execution First sub- retrieval operation.
In the case where not connecting WIFI, owner user or owner contact person is waited to send said short message by terminal Message executes the first sub- retrieval operation then after receiving said short message message, until giving mobile terminal for change, reduces owner and uses The loss at family.
Optionally, in some embodiments, the retrieval operation further include:
If the SIM card of the owner user is not removed, after receiving the short message with special format, Execute the described first sub- retrieval operation.
In the case where the SIM card of owner user is not removed, owner user or owner contact person is waited to pass through terminal Said short message message is sent, then after receiving said short message message, executes the first sub- retrieval operation, until giving for change mobile whole End reduces the loss of owner user.
Fig. 2 is the flow diagram of the theft preventing method of another embodiment of the invention, as shown in Fig. 2, if mobile terminal Light sensor detect that mobile terminal is moved to second environment from first environment, wherein the intensity of illumination of first environment is small It is greater than preset value in the intensity of illumination of preset value, second environment, S1 is executed, if shifting is not detected in the light sensor of mobile terminal Dynamic terminal is not dealt with from first environment to second environment.
S1: it obtains operating in the place and habit data of mobile terminal by geographical location, current camera, earpiece and move The place of terminal compares, it is determined whether is that family or company do not deal with if so, the place of operation belongs to safety place;If It is no, according to GPS, noisy sound and current speed, determine whether the place of operation belongs to location at risk.If location at risk, Execute S2.
S2: front and rear camera judges whether active user is target user, which includes owner user, parent People, colleague etc. just judge according to habit data, if can not judge whether active user is target user especially from pocket In/packet in take out mobile terminal in a flash, mobile terminal can be held from comparison speed, acceleration at this time and motion track The fingers/hand palm shape of mobile terminal determines whether the habit for belonging to the target user recorded in habit data.Judge this simultaneously Whether the length of the motion track of secondary mobile terminal is greater than 20cm.If it is not, then determination is the operation of target user, just do not make Processing.If it is, determination is not the operation of target user, it is carried out S10, jingle bell is vibrated immediately and notifies owner user.If Can not determine whether be target user operation, be carried out S3.
S3: mobile terminal vibration 2 seconds, if active user is thief, thief may lose no time to shut down, then S4 is executed, if working as Preceding user absolutely not reacts, then very likely mobile terminal is not stolen, executes S18.
S4: judge whether Caton or have restarts the interface prompts such as upgrading to mobile terminal before shutting down, if mobile terminal before shutting down Compare Caton, or have and restart the interface prompts such as upgrading, the typically active operation of owner user, can directly execute S9. If it is not, then executing S5.
S5: it without inputting password when mobile terminal on the market shuts down at present, can directly shut down, and then can not judge to move Whether dynamic terminal is that target user uses.In order to further judge whether mobile terminal is that target user uses, judge mobile whole Password whether is set when the shutdown of end, unlocking manner can be fingerprint, face or character recognition, if password is set, hold Row S6;If password is not set, S8 is executed.
S6: prompt shutdown needs password, and the prompt is primarily to allow active user to have a look at screen, by obtaining currently The appearance of user compares user's appearance that mobile terminal is operated in the appearance of active user and habit data, and confirmation is worked as Whether preceding user is target user, if it is target user, just directly prompt " acknowledged expression in the eyes, the people for being exactly couple ", then without Password need to be inputted and execute S9.If not finding active user from habit data, S7 is executed.
S7: whether verifying password is correct, if password is correct, executes S9;If password is wrong or does not always input, Then execute S10.
S8: if password is not set in mobile terminal, prompting to find out 3 wechat/QQ friends, specifically, uses to current Family shows an interface, and there are 8 wechat head portraits and 8 QQ head portraits in the inside, as long as arbitrarily looking for 3 wechat head portraits or 3 It is target user that QQ head portrait, which determines that, and executes S9.And actually this step more importantly attracts active user to face movement The screen of terminal, whether it is target user that front camera can be distinguished, once confirmation is target user, even wechat good friend Also no selection can not prompt " acknowledged expression in the eyes, people exactly couple " yet and execute S9 head portrait.To reduce the operation of target user, mention High user experience.
S9: not doing other processing, directly shuts down.
S10: amplitude peak vibration and maximum acoustic jingle bell are automatically begun to, continues 30 seconds.If owner user is simultaneously after 30 seconds Mobile terminal is not found, illustrates that owner and thief are too far apart, then mobile terminal no longer jingle bell, keeps electricity to wait subsequent The remote operation of owner user.It records the appearance of active user and restores initial setting up, it is close such as actively to unlock mobile terminal removing Code simultaneously hides all personal information, hides all applications installed, even if hereafter thief's execution clears data also, only vacation is clear It removes.
S11: target user sends the short message started with vivoxunhui_ to mobile terminal by another terminal A Message, informing that mobile terminal unlatching recovers function and actively adds xxxxxxxx is wechat good friend.Mobile terminal receive with After the short message of vivoxunhui_ beginning, the system software in mobile terminal can be parsed preferentially with vivoxunhui_ beginning Short message determines that mobile terminal is stolen, opens mode of recovering immediately, executes S12.
S12: short message is received and dispatched in order to prevent and is eavesdroped by small, stolen mobile terminal closes reminder announced, receives and dispatches in order to prevent Short message is sniffed by small, and the short message received would not remain in mobile terminal, and actively open data traffic and WIFI switching is to the state and answer short message message that can be surfed the Internet.
S13: the network (3G, 4G, WIFI) that connecting all can connect executes S14 if networking successfully, if networking is unsuccessful, Then execute S16.
S14: mobile terminal can parse the field having below after receiving the short message that vivoxunhui_ starts, and such as find " wechat " will be defaulted " wechat " subsequent all characters as WeChat ID.Then actively add the user's of the WeChat ID For wechat good friend." position is shared " function can be enabled after addition wechat good friend.And the position where mobile terminal can be total in real time It enjoys to the user of the WeChat ID.Whole operation is all located at backstage, and thief can't see.
S15: the user of the WeChat ID goes near mobile terminal according to the position where mobile terminal, after mobile terminal Platform determines the position where mobile terminal and the position where the user of the WeChat ID, and judges automatically the position where mobile terminal The distance between position where the user of the WeChat ID is set whether less than 20 meters, just sound maximum the tinkle of bells automatically in 20 meters Owner user is allowed to hear.
S16: mobile terminal call automatically locating interface the location information (including elevation information) where mobile terminal with The form of short message issues terminal A, and hair is primary at intervals of two minutes.
S17: terminal A is sent to mobile terminal by short message the position where terminal A automatically, and mobile terminal is automatic The distance between position where parsing short message and locating interface being called to judge mobile terminal and the position where terminal A, Reach the maximum the tinkle of bells that just sounds in 20 meters.
S18: can not determine whether mobile terminal is that target user uses, and backstage persistently determines whether mobile terminal is target User uses, until determining that the user of the mobile terminal is target user, illustrates that mobile terminal is not stolen, then stops determining The user of mobile terminal whether be target user operation.If it is determined that mobile terminal is not that target user uses, then S11 is executed.
S19: determination is target user, illustrates that target user has found mobile terminal, releases anti-theft modes, no longer hold Row shutdown.
S20: determination is not target user, no longer jingle bell, leaves anti-theft modes, records to enter after the appearance of active user and seek The mode of returning.
Combine Fig. 1 to 2 that antitheft method according to an embodiment of the present invention is described in detail above, it is detailed below in conjunction with Fig. 3 The thin mobile terminal described according to the embodiment of the present application.Mobile terminal 30 as shown in Figure 3, comprising:
Module 31 is obtained, for being moved to the behaviour of second environment from first environment in preset duration in response to mobile terminal Make, obtain the first use state of the mobile terminal, the intensity of illumination of the first environment is less than preset value, second ring The intensity of illumination in border is greater than or equal to the preset value;
First determining module 32, for determining that the mobile terminal is based on first use state and habit data No to use for target user, the habit data include the owner user of the mobile terminal and presetting for the owner user The operation note of mobile terminal described in user's operation;
It is antitheft to execute first if not being that the target user uses for the mobile terminal for first anti-theft module 33 Operation;
Second anti-theft module 34, if being held for that can not determine whether the mobile terminal is that the target user uses The antitheft operation of row second.
In embodiments of the present invention, by detecting that mobile terminal is moved to second environment from first environment, movement is obtained First use state of terminal determines whether mobile terminal is mesh according to the first use state of mobile terminal and habit data It marks user to use, however, it is determined that mobile terminal is not that target user uses, and executes the first antitheft operation, makes owner user as far as possible Can be stolen in first time perception mobile terminal, and give mobile terminal for change in time, if can not determine whether mobile terminal is mesh User's use is marked, the second antitheft operation is executed, until determining that mobile terminal is stolen and gives for change mobile terminal, to reduce mobile whole The stolen probability in end.
Optionally, as one embodiment, first anti-theft module 33 includes:
Alarm module, for exporting warning note;
Module is recovered, if determining described mobile whole for when the output duration of the warning note reaches preset duration End is not that the target user uses, then stops exporting the warning note, and execute retrieval operation.
Optionally, as one embodiment, second anti-theft module 34 includes:
Notification module, for exporting notice prompt;
Second determining module, if detecting pass in the preset duration started for the end of output moment that the notice prompts Machine operation, the then operating status based on the mobile terminal determine whether the mobile terminal is that the target user uses;
Third anti-theft module, if being executed for that can not determine whether the mobile terminal is that the target user uses The antitheft operation of third.
Optionally, as one embodiment, second anti-theft module 34 further include:
Second determining module, if being also used to not detect in the preset duration that the end of output moment that the notice prompts starts To power-off operation, then persistently determine whether the mobile terminal is that the target user uses, until determining the mobile terminal The target user using when stop determining whether the mobile terminal is operation that the target user uses.
Optionally, as one embodiment, second anti-theft module 34 further include:
Third determining module, if being not detected in the preset duration started for the end of output moment that the notice prompts Power-off operation then persistently determines whether the mobile terminal is that the target user uses, until receiving with special format Short message, the short message with special format includes preset field and other chat softwares of the owner user Account;
First son recovers module, for executing the first son and seeking after receiving the short message with special format Return operation;
Wherein, first son recovers module and includes:
Module is replied, it is netted to that can go up for closing reminder announced and opening data traffic and Wireless Fidelity switching State, and reply the short message with special format;
Second son recovers module, for determining whether the mobile terminal networks, if the mobile terminal networking, executes the Two sub- retrieval operations;
Wherein, second son is recovered module and is specifically used for:
Based on other described chat software accounts, the user for adding other chat software accounts is good friend, and by institute State position Real-Time Sharing where mobile terminal to the user of other chat software accounts and obtain it is described other Position where the user of chat software account;
If between the position where the user of position where the mobile terminal locates and other chat software accounts Distance is less than pre-determined distance, then exports the warning note.
Optionally, as one embodiment, the first sub- retrieval operation further include:
Third recovers module, if being used for the mobile terminal failed cluster, executes the sub- retrieval operation of third;
Wherein, third is recovered module and is specifically used for:
Position where the mobile terminal locates is sent in the form of short message according to prefixed time interval and receives the transmission Position where the terminal of short message with special format;
If where position where the mobile terminal locates and the terminal for sending the short message with special format The distance between position is less than pre-determined distance, then exports the warning note.
Optionally, as one embodiment, second anti-theft module 34 further include:
Second determining module is also used to not execute shutdown then if it is determined that the mobile terminal is that the target user uses Operation.
Optionally, as one embodiment, the third anti-theft module includes:
Detection module, for detecting whether the mobile terminal is set password;
4th anti-theft module executes the 4th antitheft operation if password is set for the mobile terminal;
Wherein, the described 4th antitheft operation includes: that the user of the mobile terminal is prompted to input password, described mobile whole During the user at end inputs password, the second use state of the mobile terminal is obtained, is based on second use state With the habit data, determine whether the mobile terminal is that the target user uses, if the mobile terminal can not be determined It whether is that the target user uses, then whether the password for verifying user's input of the mobile terminal is correct, if incorrect, Execute the described first antitheft operation.
Optionally, as one embodiment, the third anti-theft module further include:
5th anti-theft module executes the 5th antitheft operation if password is not set for the mobile terminal;
Wherein, the described 5th it is antitheft operation include: to the user of the mobile terminal show the owner user it is N number of i.e. When communication contact number of people picture in response to selection operation determine the instant messaging that the user of the mobile terminal correctly selects The number M of contact head image executes the described first antitheft operation if M < preset value, and N is the integer greater than 2.
Optionally, as one embodiment, the module of recovering includes:
Detection module, the user for being also used to detect the owner user identify whether SIM card is removed;
Sending module is detecting what the SIM card was removed if the SIM card for the owner user is removed Location information is sent to the preset number of the owner user by the moment, and records the macroscopic features of the user of the mobile terminal And restore initial setting up.
It is optionally, described to recover module as one embodiment further include:
4th son recovers module, if for other SIM cards to be not detected, it is determined that and whether the mobile terminal networks, if The mobile terminal networking then executes the 4th sub- retrieval operation;
Wherein, the 4th son is recovered module and is specifically used for:
Determine the corresponding target chat software account of the preset number;
The user for adding target chat software account is good friend, and position where the mobile terminal locates is total in real time It enjoys to the user of target chat software account;
If between the position where the user of position where the mobile terminal locates and target chat software account Distance is less than pre-determined distance, then exports the warning note.
Optionally, as one embodiment, the retrieval operation further include:
If detecting other SIM cards, the location information is sent to described default number by other described SIM cards Code, and determine whether the mobile terminal networks, if the mobile terminal networking, execute the 4th sub- retrieval operation.
Optionally, as one embodiment, the retrieval operation further include:
First son recovers module, described with special format receiving if being also used to the mobile terminal failed cluster Short message after, execute the first sub- retrieval operation.
It is optionally, described to recover module as one embodiment further include:
First son recovers module, if the SIM card for being also used to the owner user is not removed, described has receiving After the short message of special format, the first sub- retrieval operation is executed.
Mobile terminal provided in an embodiment of the present invention can be realized mobile terminal in the embodiment of the method for Fig. 1 realize it is each Process, to avoid repeating, which is not described herein again.
A kind of hardware structural diagram of Fig. 4 mobile terminal of each embodiment to realize the present invention, the mobile terminal 400 Including but not limited to: radio frequency unit 401, audio output unit 403, input unit 404, sensor 405, is shown network module 402 Show the components such as unit 4061, user input unit 407, interface unit 408, memory 409, processor 410 and power supply 411. It will be understood by those skilled in the art that mobile terminal structure shown in Fig. 4 does not constitute the restriction to mobile terminal, it is mobile whole End may include perhaps combining certain components or different component layouts than illustrating more or fewer components.In the present invention In embodiment, mobile terminal include but is not limited to mobile terminal, tablet computer, laptop, palm PC, car-mounted terminal, Wearable device and pedometer etc..
Processor 410, for being moved to the behaviour of second environment from first environment in preset duration in response to mobile terminal Make, obtain the first use state of the mobile terminal, the intensity of illumination of the first environment is less than preset value, second ring The intensity of illumination in border is greater than or equal to the preset value;Based on first use state and habit data, the movement is determined Whether terminal is that target user uses, and the habit data include the owner user and the owner user of the mobile terminal Pre-set user operate the operation note of the mobile terminal;If the mobile terminal is not that the target user uses, hold The antitheft operation of row first;If can not determine whether the mobile terminal is that the target user uses, and executes the second antitheft behaviour Make.
In embodiments of the present invention, by detecting that mobile terminal is moved to second environment from first environment, movement is obtained First use state of terminal determines whether mobile terminal is mesh according to the first use state of mobile terminal and habit data It marks user to use, however, it is determined that mobile terminal is not that target user uses, and executes the first antitheft operation, makes owner user as far as possible Can be stolen in first time perception mobile terminal, and give mobile terminal for change in time, if can not determine whether mobile terminal is mesh User's use is marked, the second antitheft operation is executed, until determining that mobile terminal is stolen and gives for change mobile terminal, to reduce mobile whole The stolen probability in end.
It should be understood that the embodiment of the present invention in, radio frequency unit 401 can be used for receiving and sending messages or communication process in, signal Send and receive, specifically, by from base station downlink data receive after, to processor 410 handle;In addition, by uplink Data are sent to base station.In general, radio frequency unit 401 includes but is not limited to antenna, at least one amplifier, transceiver, coupling Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 401 can also by wireless communication system and network and other set Standby communication.
Mobile terminal provides wireless broadband internet by network module 402 for user and accesses, and such as user is helped to receive It sends e-mails, browse webpage and access streaming video etc..
Audio output unit 403 can be received by radio frequency unit 401 or network module 402 or in memory 409 The audio data of storage is converted into audio signal and exports to be sound.Moreover, audio output unit 403 can also be provided and be moved The relevant audio output of specific function that dynamic terminal 400 executes is (for example, call signal receives sound, message sink sound etc. Deng).Audio output unit 403 includes loudspeaker, buzzer and receiver etc..
Input unit 404 is for receiving audio or video signal.Input unit 404 may include graphics processor (Graphics Processing Unit, GPU) 4041 and microphone 4042, graphics processor 4041 is in video acquisition mode Or the image data of the static images or video obtained in image capture mode by image capture apparatus (such as camera) carries out Reason.Treated, and picture frame may be displayed on display unit 4061.It can be with through treated the picture frame of graphics processor 4041 It is stored in memory 409 (or other storage mediums) or is sent via radio frequency unit 401 or network module 402.Wheat Gram wind 4042 can receive sound, and can be audio data by such acoustic processing.Treated audio data can be with The format output that mobile communication base station can be sent to via radio frequency unit 401 is converted in the case where telephone calling model.
Mobile terminal 400 further includes at least one sensor 405, such as optical sensor, motion sensor and other biographies Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 4061, and proximity sensor can close when mobile terminal 400 is moved in one's ear Display panel 4061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (general For three axis) size of acceleration, it can detect that size and the direction of gravity when static, can be used to identify mobile terminal posture (ratio Such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap);It passes Sensor 405 can also include fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, wet Meter, thermometer, infrared sensor etc. are spent, details are not described herein.
Display unit 4061 is for showing information input by user or being supplied to the information of user.Display unit 4061 can Including display panel 4061, liquid crystal display (Liquid Crystal Display, LCD), organic light-emitting diodes can be used Forms such as (Organic Light-Emitting Diode, OLED) are managed to configure display panel 4061.
User input unit 407 can be used for receiving the number or character information of input, and generate the use with mobile terminal Family setting and the related key signals input of function control.Specifically, user input unit 407 include touch panel 4071 and Other input equipments 4072.Touch panel 4071, also referred to as touch screen collect the touch operation of user on it or nearby (for example user uses any suitable objects or attachment such as finger, stylus on touch panel 4071 or in touch panel 4071 Neighbouring operation).Touch panel 4071 may include both touch detecting apparatus and touch controller.Wherein, touch detection Device detects the touch orientation of user, and detects touch operation bring signal, transmits a signal to touch controller;Touch control Device processed receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives processor 410, receiving area It manages the order that device 410 is sent and is executed.Furthermore, it is possible to more using resistance-type, condenser type, infrared ray and surface acoustic wave etc. Seed type realizes touch panel 4071.In addition to touch panel 4071, user input unit 407 can also include other input equipments 4072.Specifically, other input equipments 4072 can include but is not limited to physical keyboard, function key (such as volume control button, Switch key etc.), trace ball, mouse, operating stick, details are not described herein.
Further, touch panel 4071 can be covered on display panel 4061, when touch panel 4071 is detected at it On or near touch operation after, send processor 410 to determine the type of touch event, be followed by subsequent processing device 410 according to touching The type for touching event provides corresponding visual output on display panel 4061.Although in Fig. 4, touch panel 4071 and display Panel 4061 is the function that outputs and inputs of realizing mobile terminal as two independent components, but in some embodiments In, can be integrated by touch panel 4071 and display panel 4061 and realize the function that outputs and inputs of mobile terminal, it is specific this Place is without limitation.
Interface unit 408 is the interface that external device (ED) is connect with mobile terminal 400.For example, external device (ED) may include having Line or wireless head-band earphone port, external power supply (or battery charger) port, wired or wireless data port, storage card end Mouth, port, the port audio input/output (I/O), video i/o port, earphone end for connecting the device with identification module Mouthful etc..Interface unit 408 can be used for receiving the input (for example, data information, electric power etc.) from external device (ED) and By one or more elements that the input received is transferred in mobile terminal 400 or can be used in 400 He of mobile terminal Data are transmitted between external device (ED).
Memory 409 can be used for storing software program and various data.Memory 409 can mainly include storing program area The storage data area and, wherein storing program area can (such as the sound of application program needed for storage program area, at least one function Sound playing function, image player function etc.) etc.;Storage data area can store according to mobile phone use created data (such as Audio data, phone directory etc.) etc..In addition, memory 409 may include high-speed random access memory, it can also include non-easy The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 410 is the control centre of mobile terminal, utilizes each of various interfaces and the entire mobile terminal of connection A part by running or execute the software program and/or module that are stored in memory 409, and calls and is stored in storage Data in device 409 execute the various functions and processing data of mobile terminal, to carry out integral monitoring to mobile terminal.Place Managing device 410 may include one or more processing units;Preferably, processor 410 can integrate application processor and modulatedemodulate is mediated Manage device, wherein the main processing operation system of application processor, user interface and application program etc., modem processor is main Processing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 410.
Mobile terminal 400 can also include the power supply 411 (such as battery) powered to all parts, it is preferred that power supply 411 Can be logically contiguous by power-supply management system and processor 410, to realize management charging by power-supply management system, put The functions such as electricity and power managed.
In addition, mobile terminal 400 includes some unshowned functional modules, details are not described herein.
Preferably, the embodiment of the present invention also provides a kind of mobile terminal, including processor 410, and memory 409 is stored in On memory 409 and the computer program that can run on the processor 410, the computer program are executed by processor 410 Each process of embodiment of the method described in the above-mentioned Fig. 1 of Shi Shixian, and identical technical effect can be reached, to avoid repeating, this In repeat no more.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium Calculation machine program, the computer program realize each process of embodiment of the method described in above-mentioned Fig. 1, and energy when being executed by processor Reach identical technical effect, to avoid repeating, which is not described herein again.Wherein, the computer readable storage medium, such as only Read memory (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation RAM), magnetic or disk etc..
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal (can be mobile phone, computer, service Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much Form belongs within protection of the invention.

Claims (12)

1. a kind of theft preventing method, which is characterized in that the described method includes:
It is moved to the operation of second environment from first environment in preset duration in response to mobile terminal, obtains the mobile terminal The first use state, the intensity of illumination of the first environment is less than preset value, the intensity of illumination of the second environment be greater than or Equal to the preset value;
Based on first use state and habit data, determine whether the mobile terminal is that target user uses, the habit Used data include that the owner user of the mobile terminal and the pre-set user of the owner user operate the mobile terminal Operation note;
If the mobile terminal is not that the target user uses, the first antitheft operation is executed;
If can not determine whether the mobile terminal is that the target user uses, and executes the second antitheft operation.
2. the method as described in claim 1, which is characterized in that it is described first it is antitheft operation include:
Export warning note;
If determining the mobile terminal not is the target user when the output duration of the warning note reaches preset duration It uses, then stops exporting the warning note, and execute retrieval operation.
3. method according to claim 2, which is characterized in that it is described second it is antitheft operation include:
Output notice prompt;
If detecting power-off operation in the preset duration that the end of output moment of the notice prompt starts, it is based on the movement The operating status of terminal determines whether the mobile terminal is that the target user uses;
If can not determine whether the mobile terminal is that the target user uses, and executes the antitheft operation of third.
4. method as claimed in claim 3, which is characterized in that the second antitheft operation further include:
If power-off operation is not detected in the preset duration that the end of output moment of the notice prompt starts, institute is persistently determined State whether mobile terminal is just being used by the target user, until the short message with special format is received, it is described to have The short message of special format includes preset field and other chat software accounts of the owner user;
After receiving the short message with special format, the first sub- retrieval operation is executed;
Wherein, the described first sub- retrieval operation includes:
Close reminder announced and open data traffic and Wireless Fidelity switching to can upper net state, and reply it is described have it is special The short message of different format;
It determines whether the mobile terminal networks, if the mobile terminal networking, executes the second sub- retrieval operation;
Wherein, the described second sub- retrieval operation includes:
Based on other described chat software accounts, the user for adding other chat software accounts is good friend, and by the shifting Position Real-Time Sharing where dynamic terminal gives the user of other chat software accounts and obtains other described chats Position where the user of software account;
If the distance between the position where the user of position where the mobile terminal locates and other chat software accounts Less than pre-determined distance, then the warning note is exported.
5. method as claimed in claim 3, which is characterized in that the antitheft operation of the third includes:
Detect whether the mobile terminal is set password;
If password is set in the mobile terminal, the 4th antitheft operation is executed;
Wherein, the described 4th antitheft operation includes: that the user of the mobile terminal is prompted to input password, in the mobile terminal During user inputs password, the second use state of the mobile terminal is obtained, is based on second use state and institute Habit data are stated, determine whether the mobile terminal is that the target user uses, if the mobile terminal can not be determined whether For target user use, then whether the password for verifying user's input of the mobile terminal is correct, if incorrect, executes The first antitheft operation.
6. a kind of mobile terminal characterized by comprising
Module is obtained to obtain for being moved to the operation of second environment from first environment in preset duration in response to mobile terminal The first use state of the mobile terminal is taken, the intensity of illumination of the first environment is less than preset value, the second environment Intensity of illumination is greater than or equal to the preset value;
First determining module, for determining whether the mobile terminal is mesh based on first use state and habit data It marks user to use, the habit data include the owner user of the mobile terminal and the pre-set user behaviour of the owner user Make the operation note of the mobile terminal;
First anti-theft module executes the first antitheft operation if not being that the target user uses for the mobile terminal;
Second anti-theft module, if executing second for that can not determine whether the mobile terminal is that the target user uses Antitheft operation.
7. mobile terminal as claimed in claim 6, which is characterized in that first anti-theft module includes:
Alarm module, for exporting warning note;
Module is recovered, if determining the mobile terminal not for when the output duration of the warning note reaches preset duration It is that the target user uses, then stops exporting the warning note, and execute retrieval operation.
8. mobile terminal as claimed in claim 7, which is characterized in that second anti-theft module includes:
Notification module, for exporting notice prompt;
Second determining module, if detecting shutdown behaviour in the preset duration started for the end of output moment that the notice prompts Make, then the operating status based on the mobile terminal, determines whether the mobile terminal is that the target user uses;
Third anti-theft module, if executing third for that can not determine whether the mobile terminal is that the target user uses Antitheft operation.
9. mobile terminal as claimed in claim 8, which is characterized in that second anti-theft module further include:
Third determining module, if shutdown is not detected in the preset duration started for the end of output moment that the notice prompts Operation, then persistently determine whether the mobile terminal is just being used by the target user, until receiving with special format Short message, the short message with special format include preset field and other chat software accounts of the owner user Family;
First son recovers module, for executing the first son and recovering behaviour after receiving the short message with special format Make;
Wherein, first son recovers module and includes:
Reply module, for close reminder announced and open data traffic and Wireless Fidelity switching to can go up net state, and Reply the short message with special format;
Second son recovers module, for determining whether the mobile terminal networks, if the mobile terminal networking, executes the second son Retrieval operation;
Wherein, second son is recovered module and is specifically used for:
Based on other described chat software accounts, the user for adding other chat software accounts is good friend, and by the shifting Position Real-Time Sharing where dynamic terminal gives the user of other chat software accounts and obtains other described chats Position where the user of software account;
If the distance between the position where the user of position where the mobile terminal locates and other chat software accounts Less than pre-determined distance, then the warning note is exported.
10. the method for claim 7, which is characterized in that the third anti-theft module includes:
Detection module, for detecting whether the mobile terminal is set password;
4th anti-theft module executes the 4th antitheft operation if password is set for the mobile terminal;
Wherein, the described 4th antitheft operation includes: that the user of the mobile terminal is prompted to input password, in the mobile terminal During user inputs password, the second use state of the mobile terminal is obtained, is based on second use state and institute Habit data are stated, determine whether the mobile terminal is that the target user uses, if the mobile terminal can not be determined whether For target user use, then whether the password for verifying user's input of the mobile terminal is correct, if incorrect, executes The first antitheft operation.
11. a kind of mobile terminal characterized by comprising memory, processor and be stored on the memory and can be in institute The computer program run on processor is stated, such as claim 1 to 5 is realized when the computer program is executed by the processor Any one of described in method the step of.
12. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium Program, the step of method as described in any one of claims 1 to 5 is realized when the computer program is executed by processor.
CN201910570020.5A 2019-06-27 2019-06-27 Anti-theft method and mobile terminal Active CN110290270B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910570020.5A CN110290270B (en) 2019-06-27 2019-06-27 Anti-theft method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910570020.5A CN110290270B (en) 2019-06-27 2019-06-27 Anti-theft method and mobile terminal

Publications (2)

Publication Number Publication Date
CN110290270A true CN110290270A (en) 2019-09-27
CN110290270B CN110290270B (en) 2022-01-07

Family

ID=68020001

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910570020.5A Active CN110290270B (en) 2019-06-27 2019-06-27 Anti-theft method and mobile terminal

Country Status (1)

Country Link
CN (1) CN110290270B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111031481A (en) * 2019-12-16 2020-04-17 珠海格力电器股份有限公司 Mobile intelligent terminal position sharing method, computer device and computer readable storage medium
CN112601269A (en) * 2020-11-13 2021-04-02 维沃移动通信有限公司 Communication connection method and device, electronic equipment and readable storage medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015043224A1 (en) * 2013-09-29 2015-04-02 Tencent Technology (Shenzhen) Company Limited Method and apparatus for service login based on third party's information
CN105516916A (en) * 2014-09-26 2016-04-20 北京畅游天下网络技术有限公司 Alarming method and alarming system of mobile device
CN105611072A (en) * 2016-02-24 2016-05-25 广东欧珀移动通信有限公司 Mobile terminal theft-protection device, mobile terminal and theft-protection method
CN105847562A (en) * 2016-03-29 2016-08-10 乐视控股(北京)有限公司 Anti-theft method and device for intelligent terminal
CN105893888A (en) * 2016-03-31 2016-08-24 广东小天才科技有限公司 Anti-theft and anti-loss method and system of intelligent terminal
CN106068012A (en) * 2016-05-24 2016-11-02 珠海市魅族科技有限公司 A kind of intelligent terminal's localization method and device
WO2017024550A1 (en) * 2015-08-12 2017-02-16 刘文婷 Anti-theft system and method for mobile terminal
CN107635071A (en) * 2017-09-27 2018-01-26 维沃移动通信有限公司 A kind of theft preventing method, mobile terminal and computer-readable recording medium
CN108712567A (en) * 2018-04-27 2018-10-26 努比亚技术有限公司 Theft preventing method, mobile terminal and the computer readable storage medium of mobile terminal
CN108833674A (en) * 2018-05-17 2018-11-16 宇龙计算机通信科技(深圳)有限公司 A kind of theft preventing method and mobile terminal

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015043224A1 (en) * 2013-09-29 2015-04-02 Tencent Technology (Shenzhen) Company Limited Method and apparatus for service login based on third party's information
CN105516916A (en) * 2014-09-26 2016-04-20 北京畅游天下网络技术有限公司 Alarming method and alarming system of mobile device
WO2017024550A1 (en) * 2015-08-12 2017-02-16 刘文婷 Anti-theft system and method for mobile terminal
CN105611072A (en) * 2016-02-24 2016-05-25 广东欧珀移动通信有限公司 Mobile terminal theft-protection device, mobile terminal and theft-protection method
CN105847562A (en) * 2016-03-29 2016-08-10 乐视控股(北京)有限公司 Anti-theft method and device for intelligent terminal
CN105893888A (en) * 2016-03-31 2016-08-24 广东小天才科技有限公司 Anti-theft and anti-loss method and system of intelligent terminal
CN106068012A (en) * 2016-05-24 2016-11-02 珠海市魅族科技有限公司 A kind of intelligent terminal's localization method and device
CN107635071A (en) * 2017-09-27 2018-01-26 维沃移动通信有限公司 A kind of theft preventing method, mobile terminal and computer-readable recording medium
CN108712567A (en) * 2018-04-27 2018-10-26 努比亚技术有限公司 Theft preventing method, mobile terminal and the computer readable storage medium of mobile terminal
CN108833674A (en) * 2018-05-17 2018-11-16 宇龙计算机通信科技(深圳)有限公司 A kind of theft preventing method and mobile terminal

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111031481A (en) * 2019-12-16 2020-04-17 珠海格力电器股份有限公司 Mobile intelligent terminal position sharing method, computer device and computer readable storage medium
CN112601269A (en) * 2020-11-13 2021-04-02 维沃移动通信有限公司 Communication connection method and device, electronic equipment and readable storage medium
CN112601269B (en) * 2020-11-13 2023-08-15 维沃移动通信有限公司 Communication connection method, device, electronic equipment and readable storage medium

Also Published As

Publication number Publication date
CN110290270B (en) 2022-01-07

Similar Documents

Publication Publication Date Title
CN108021825A (en) A kind of method for protecting privacy, mobile terminal
CN108594942A (en) A kind of personal identification method and mobile terminal
CN108347512A (en) A kind of personal identification method and mobile terminal
CN108551521A (en) A kind of log-on message reminding method and mobile terminal
CN109284150A (en) A kind of method and terminal starting application program
CN108174103A (en) A kind of shooting reminding method and mobile terminal
CN108376096A (en) A kind of message display method and mobile terminal
CN108390998A (en) A kind of method and mobile terminal for sharing file
CN106878554A (en) A kind of theft preventing method of mobile terminal, device and mobile terminal
CN110149628A (en) A kind of information processing method and terminal device
CN109918944A (en) A kind of information protecting method, device, mobile terminal and storage medium
CN108769369A (en) A kind of method for early warning and mobile terminal
CN107835495A (en) A kind of message prompt method, device and mobile terminal
CN108628644A (en) A kind of the startup method, apparatus and mobile terminal of application
CN108319833A (en) A kind of control method and mobile terminal of application program
CN107889112B (en) A kind of recognition methods of pseudo-base station and mobile terminal
CN109325334A (en) A kind of touch control terminal control method and touch control terminal
CN110290270A (en) Theft preventing method and mobile terminal
CN109218984A (en) A kind of method for tracing and mobile terminal
CN109981890A (en) A kind of reminding task processing method, terminal and computer readable storage medium
CN109889756A (en) A kind of video call method and terminal device
CN109348035A (en) A kind of recognition methods of telephone number and terminal device
CN109067979A (en) A kind of reminding method and mobile terminal
CN109189397A (en) The method, apparatus of mobile terminal and intelligent display hiden application
CN108345780A (en) A kind of solution lock control method and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant