CN110620847B - Anti-theft method of intelligent terminal and intelligent terminal - Google Patents

Anti-theft method of intelligent terminal and intelligent terminal Download PDF

Info

Publication number
CN110620847B
CN110620847B CN201910999223.6A CN201910999223A CN110620847B CN 110620847 B CN110620847 B CN 110620847B CN 201910999223 A CN201910999223 A CN 201910999223A CN 110620847 B CN110620847 B CN 110620847B
Authority
CN
China
Prior art keywords
intelligent terminal
terminal
password
theft
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910999223.6A
Other languages
Chinese (zh)
Other versions
CN110620847A (en
Inventor
肖明
李凌志
吴少波
李如森
王素平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Transsion Holdings Co Ltd
Original Assignee
Shenzhen Transsion Holdings Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Transsion Holdings Co Ltd filed Critical Shenzhen Transsion Holdings Co Ltd
Priority to CN201910999223.6A priority Critical patent/CN110620847B/en
Publication of CN110620847A publication Critical patent/CN110620847A/en
Application granted granted Critical
Publication of CN110620847B publication Critical patent/CN110620847B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72418User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services
    • H04M1/72421User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services with automatic activation of emergency service functions, e.g. upon sensing an alarm
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Telephone Function (AREA)
  • Alarm Systems (AREA)

Abstract

The invention provides an anti-theft method of an intelligent terminal, the intelligent terminal and a computer readable medium. The anti-theft method can detect forced shutdown operation of the intelligent terminal, can execute the forced shutdown operation only by inputting a matched safety password, and can start an anti-theft mode of the intelligent terminal when the correct safety password cannot be input within limited times.

Description

Anti-theft method of intelligent terminal and intelligent terminal
Technical Field
The invention relates to the technical field of intelligent terminal theft prevention, in particular to an intelligent terminal theft prevention method and an intelligent terminal.
Background
With the development of science and technology, the iterative updating speed of the intelligent terminal is continuously improved, the functionality of the intelligent terminal is stronger and stronger, and besides the communication function of high convenience and high definition, the high integration of various living and learning tools such as payment and traffic guidance is realized, so that the dependence of a user on the intelligent terminal is higher and higher. However, the possibility that the intelligent terminal is lost is improved just because the user carries the intelligent terminal anytime and anywhere, and therefore, how to remind the user to find the intelligent terminal in time becomes a problem to be solved in the continuous development of the intelligent terminal after the user unintentionally loses the intelligent terminal.
At present, many mobile phones have the function of searching for my mobile phone, and after a user realizes that his own mobile phone is lost, the user can log in an application program for searching for my mobile phone on a mobile phone produced by the same manufacturer, and the lost mobile phone can be searched by inputting the account name and the password of the own mobile phone. However, this method requires the user to recognize that the user loses his/her mobile phone, and at the same time, the user needs to remember the user name and password of his/her mobile phone. However, if the user cannot recognize the loss of the user's intelligent terminal in time, the user has forced the flashing operation on the user's intelligent terminal during the period when the user steals or picks up the user's intelligent terminal, or the user forgets the account name or password of the user's intelligent terminal, so that the user cannot find the intelligent terminal, which not only causes property loss of the user, but also causes various inconveniences such as life, work, learning, and the like.
Disclosure of Invention
In order to solve the above problems, the present invention provides an anti-theft method for an intelligent terminal, the intelligent terminal and a computer readable medium. The anti-theft method provided by the invention can detect the forced shutdown operation of the intelligent terminal, can execute the forced shutdown operation only by inputting the matched security password, and can start the anti-theft mode of the intelligent terminal when the correct security password can not be input within a limited number of times, for example, the intelligent terminal can be reminded of losing the intelligent terminal and can be provided with clues for finding the intelligent terminal by reminding a user of accurately positioning and finding the intelligent terminal in a short time through the current position information of the intelligent terminal, the alarm prompt information displayed by the intelligent terminal, the alarm call dialed, the intelligent terminal information automatically backed up and deleted and the like, and the privacy of the user can be protected from being checked randomly, so that the unnecessary loss is avoided.
Specifically, the invention provides an anti-theft method for an intelligent terminal, which comprises the following steps:
s1: receiving a shutdown instruction;
s2: carrying out security password verification according to a preset strategy;
s3: and controlling the terminal to enter a preset mode according to the verification result.
Preferably, in the above anti-theft method, before the step S2, the method further includes:
detecting whether the intelligent terminal is connected with a second device or not;
if not, go to step S2;
or, if so, not executing the step S2, and controlling the terminal to enter a normal power-off mode.
Preferably, in the above anti-theft method, the second device is a preset anti-theft verification device and/or a historical connection device that has established a connection relationship with the intelligent terminal.
Preferably, in the above anti-theft method, the intelligent terminal establishes a connection relationship with at least one second device, and step S2 includes: and the intelligent terminal performs security password authentication through at least one of the second equipment and the intelligent terminal.
Preferably, in the above anti-theft method, the step S2 includes: and if the result of the security password authentication is authentication failure, sending an information prompt of the authentication failure through at least one of the second equipment and the terminal.
Preferably, in the above anti-theft method, the security password includes at least one of a numeric password, a character password, a figure password, a fingerprint password, an iris password or a face password; and the preset mode is an anti-theft mode.
Preferably, in the above anti-theft method, after the step of controlling the terminal to enter the anti-theft mode, at least one of sending current position information of the intelligent terminal, sending alarm prompt information, displaying the alarm prompt information through the intelligent terminal, and making an alarm call is executed.
Preferably, in the above anti-theft method, after the step of controlling the terminal to enter the anti-theft mode, the method further includes: processing preset data on the intelligent terminal according to a preset rule, and transmitting the processed preset data to the second equipment; and/or deleting preset data in the intelligent terminal.
Preferably, in the above anti-theft method, the preset data includes at least one of a contact, information, a call record, an email, a photo, and a file; the preset rules include encryption and/or compression.
Another aspect of the present invention provides an intelligent terminal, which includes: a display, a processor, a memory and a computer program stored on the memory and executable on the processor, which computer program, when executed by the processor, implements the steps of the anti-theft method as defined in any one of the above.
Compared with the prior art, the invention has the advantages that:
1) when the forced shutdown operation is not allowed to be carried out on the intelligent terminal, the intelligent terminal can automatically and timely inform a user;
2) the intelligent anti-theft warning system does not depend on active searching of the user and does not depend on the account name, the password and the like of the intelligent terminal memorized by the user, so that the intelligence of the anti-theft warning is improved;
3) the intelligent terminal can send positioning information to a user when the intelligent terminal is forcibly powered off, and a clue for finding the intelligent terminal is provided, so that the user can accurately position and find the intelligent terminal in a short time, and unnecessary loss is avoided;
4) and when the user is in a dangerous condition, an alarm method can be provided, so that the user can ask for help outwards in time by means of the intelligent terminal.
Drawings
Fig. 1 is a schematic flow chart illustrating an anti-theft method for an intelligent terminal according to a preferred embodiment of the present invention;
fig. 2 is a schematic flowchart of a method for acquiring and sending current location information of the intelligent terminal according to a preferred embodiment of the present invention;
fig. 3 is a schematic flow chart of sending out alarm prompt information in the anti-theft method according to a preferred embodiment of the invention;
fig. 4 is a schematic flow chart of displaying an alarm prompt message through the intelligent terminal in the anti-theft method according to a preferred embodiment of the present invention;
fig. 5 is a schematic flow chart of dialing an alarm call through the intelligent terminal in the anti-theft method according to a preferred embodiment of the present invention.
Detailed Description
The advantages of the invention are explained in detail below with reference to the drawings and the embodiments.
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the disclosure, as detailed in the appended claims.
The terminology used in the present disclosure is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. As used in this disclosure and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present disclosure. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
In the following description, suffixes such as "module", "component", or "unit" used to denote elements are used only for facilitating the explanation of the present invention, and have no specific meaning in themselves. Thus, "module" and "component" may be used in a mixture.
Fig. 1 is a flowchart illustrating an anti-theft method of an intelligent terminal according to a preferred embodiment of the present invention. As can be seen from the figure, the anti-theft method provided by the embodiment includes the following steps:
s001: capturing a shutdown instruction;
the shutdown instruction may be triggered by long pressing of a shutdown button on the intelligent terminal, or by effective operations on a shutdown instruction icon or a shortcut icon in a display interface of the intelligent terminal, such as clicking, long pressing, or the like, or by voice control, or by cutting off a connection with a power supply, such as unloading a battery, or the like.
S002: carrying out security password verification according to a preset strategy;
preferably, the preset policy may be that various shutdown instructions mentioned in the above steps are captured, a shutdown event is not directly executed, but a security verification request is generated under the trigger of the shutdown instruction, and the user is prompted to input a security password in a text, voice or other form through the intelligent terminal, for example, a prompt box jumps out from a display interface of the intelligent terminal, and a prompt text of "security password" and a password input box are displayed in the prompt box, in this case, the user inputs a text-type security password containing characters, letters, numbers, symbols or a combination thereof in the password input box; or, a graphical interface, such as a multi-point interface, is displayed in the display interface of the intelligent terminal, and the user inputs the security password in a mode of drawing a graph in the interface; or the prompt words of 'input fingerprint' are displayed on the intelligent terminal, and the user inputs the security password in a mode of inputting the fingerprint in a fingerprint identification area on the intelligent terminal; or, a face or eye image acquisition area is generated in a display interface of the intelligent terminal, and the face or eye characteristics of the user are captured as the security password by using the camera device of the intelligent terminal. Preferably, in order to avoid a situation that the user cannot turn off the smart terminal because the user forgets the security password in the text type or the graphic form formed by the numbers, the letters, the symbols, or the combination thereof, in this embodiment, the user may request to change the security password input form, for example, request to change the digital security password into the fingerprint security password, so as to ensure that the user can certainly perform control operations including but not limited to turning off the smart terminal.
S003: controlling the terminal to enter a preset mode according to a verification result
Preferably, after identifying the security password entered by the user, a verification password associated with the security authentication request is retrieved in the system and the security password entered by the user is matched against the verification password. Preferably, when the security password is a number or a character password or a graphic password or a combination thereof, the verification is judged to be passed only when the security password input by the user is completely consistent with the verification password, otherwise, the verification fails; when the safety password is one or more of a fingerprint password, an iris password or a face password, when the difference between the safety password and the verification password is within a certain error range, the verification is judged to be passed, otherwise, the verification fails.
Preferably, the preset mode may be an anti-theft mode. In this embodiment, it may be preferable that the intelligent terminal is configured to start the anti-theft mode when the number of times of matching the security password reaches a preset number of times and the security password cannot be matched.
In this embodiment, the threshold of the number of times of checking the security password, that is, the preset number of times, is preset in consideration of the fact that the user has fuzzy memory of the security password or unstable changes of the fingerprint, the eye and the facial features due to the state, the emotion and the like of the user. Therefore, as the user inputs the security password, the security password is verified to be the wrong security password, the user inputs the security password again, the correctness of the security password is verified again, the intelligent terminal can also record the times of inputting the security password by the user, and the function of closing the intelligent terminal can be realized when the user inputs the correct security password within the preset times including the preset times.
However, when the user enters the security password for the first preset number of times, and the security password is still incorrect, the user is determined that the security password cannot be obtained. When the event happens, the intelligent terminal is triggered to enter the anti-theft mode.
Therefore, in view of the above design, when the intelligent terminal of the user is stolen or lost, if the thief or the collector wants to update the system of the intelligent terminal by forcibly shutting down the intelligent terminal, and reuse or buy and sell the intelligent terminal, the intelligent terminal can recognize the above operation and automatically send out the current position information of the intelligent terminal according to the triggering of the operation, so that the user can find the intelligent terminal in the shortest time, and the loss is reduced.
Based on the foregoing embodiment, in another preferred embodiment consistent with the present invention, before step S2, it is further detected whether the intelligent terminal can establish a connection relationship with the second device again. When the intelligent terminal cannot establish connection with the second device again, the above step S2 is continuously executed; if the intelligent terminal can establish a connection with the second device again, the step S2 is not executed, and the intelligent terminal is controlled to enter a normal power-off mode. Preferably, the second device may be selected from a preset anti-theft authentication device and/or a historical connection device that establishes a connection relationship with the smart terminal, and more preferably, the historical connection device includes, but is not limited to, at least one of a second smart terminal, a server, a wearable device, and an internet of things device. Based on the foregoing embodiment, in another preferred embodiment consistent with the present invention, if the intelligent terminal establishes a connection relationship with at least one of the foregoing second devices, step S2 includes: and the intelligent terminal performs security password verification through at least one of the second equipment and the intelligent terminal.
Based on the above embodiment, in another preferred embodiment consistent with the present invention, the step S2 includes: and if the result of the security password authentication is authentication failure, sending an information prompt of the authentication failure through at least one of the second equipment and the terminal.
Based on the above embodiments, the present invention further provides a plurality of anti-theft modes of the intelligent terminal, including but not limited to sending current location information of the intelligent terminal, sending alarm prompt information, displaying the alarm prompt information through the intelligent terminal, making an alarm call, transmitting information in the intelligent terminal to the second storage space, and removing the information in the intelligent terminal (i.e. automatically backing up the information in the intelligent terminal and deleting the information after the automatic backup), and the like. Hereinafter, a specific implementation method of the above-mentioned anti-theft mode provided in the present invention will be described by at least one specific embodiment.
Referring to fig. 2, based on the above embodiment, in another preferred embodiment of the present invention, a method for sending current location information of an intelligent terminal is to send the current location information of the intelligent terminal to an emergency contact preset in the intelligent terminal, and since the emergency contact may be a second prepared contact of a user or a contact of a friend or a parent of the user, the emergency contact may notify the user of the current location information of the intelligent terminal at the first time, so that the user may quickly find the intelligent terminal. The method comprises the specific steps of:
s051: starting a positioning module in the intelligent terminal to acquire the current position information of the intelligent terminal
When the intelligent terminal detects that the safety password input for the preset times is reached and the safety password is wrong, a positioning module in the intelligent terminal is started, wherein the positioning module can be a positioning module carried by the intelligent terminal, and can also be a positioning module by means of a third party, and the started positioning module can accurately acquire the current position information of the intelligent terminal.
S052: retrieving pre-stored communication information for emergency contacts
Meanwhile, the intelligent terminal retrieves the emergency contact which is pre-stored in the intelligent terminal by the user and is associated with the situation, namely the emergency contact when the intelligent terminal is forcibly powered off by others, and reads the communication information of the emergency contact from the intelligent terminal. Preferably, the communication information includes, but is not limited to, a telephone number based on the smart terminal, or an account number of an application program with a communication function installed in the smart terminal, such as, but not limited to, an account number including a WeChat account, a QQ account, a Payment Bank account, and the like.
S053: sending the current position information to the emergency contact person according to the communication information
After the communication information of the emergency contact is acquired from the intelligent terminal, communication connection is established with the terminal associated with the communication information, and the acquired current position information of the intelligent terminal is sent to the terminal associated with the communication information in the forms of characters, pictures or webpage links and the like. Then, the current location information may be displayed in the terminal of the emergency contact in the form of text, picture, or intelligent terminal-based or third party electronic map.
Moreover, preferably, the intelligent terminal is not limited to a contact mode for reading the emergency contacts, and can simultaneously read one or more communication information of one or more emergency contacts according to the prestored information, so that the current position information of the intelligent terminal sent to the emergency contacts can be ensured to be timely read.
The method of the embodiment can also be used for an outward help seeking method of the user, when the user is in danger, the user can also send the intelligent terminal of the user, namely the current geographical position of the user, to the emergency contact person by triggering a shutdown event and inputting an incorrect safety password, so that the emergency contact person can find the user in time to assist the user.
Referring to fig. 3, based on the above embodiment, in another preferred embodiment of the present invention, when the number of times of security verification reaches the preset number of times and the security password associated with the security verification request cannot be matched, the current location information of the intelligent terminal is sent to the emergency contact, and meanwhile, an alarm prompt message is sent. Therefore, the emergency contact can obviously know that the intelligent terminal is stolen or lost, and the urgent awareness of the emergency contact for searching for the intelligent terminal can be improved. Specifically, according to this embodiment, when the number of times of security verification reaches a preset number of times and the security password associated with the security verification request cannot be matched, the step of sending the alarm prompt message to the outside includes:
s061: retrieving a pre-stored alert prompt message template and pre-stored communication information for emergency contacts
In this embodiment, when the number of times of security verification reaches the preset number of times and the security password associated with the security verification request cannot be matched, not only the communication information of the emergency contact is retrieved from the intelligent terminal, but also an alarm prompt information template is retrieved from the intelligent terminal. Preferably, the alert prompt message template includes, but is not limited to, a text message template, a voice message template, a picture message template, a video message template, and the like.
S062: sending the alarm prompt information to the emergency contact according to the alarm prompt information template
Based on the scheme of the embodiment, when the terminal of the emergency contact receives the current position information of the intelligent terminal and also receives an alarm prompt message, the terminal of the emergency contact independently displays the current position of the intelligent terminal in the form of characters, pictures or electronic maps and also plays the alarm prompt message; or the current position information of the intelligent terminal and the alarm prompt information can be displayed after being associated, for example, by triggering the played alarm prompt information, the terminal of the emergency contact senses the trigger, and further displays the current position information of the intelligent terminal, so that the emergency contact or the user can find the intelligent terminal; or the alarm prompt information and the current position information of the intelligent terminal can be played in the terminal of the emergency contact person at the same time. The above playing method can be adjusted according to actual situations, and should not be limited by the text here.
Meanwhile, preferably, the alarm prompt information includes one or more of voice prompt information, audio prompt information, video prompt information, picture prompt information and/or text information according to different alarm prompt information templates.
Therefore, the method can also be used for an outward help seeking method of the user, when the user is in danger, the user can also send alarm prompt information to the emergency contact person by triggering a shutdown event and inputting an incorrect safety password, so that the emergency contact person can know the current situation and apply assistance.
Referring to fig. 4, based on the above embodiment, in another preferred embodiment of the present invention, when the number of times of security verification reaches a preset number of times and the security password associated with the security verification request cannot be matched, an alarm prompt message is displayed by the intelligent terminal itself, so that other people or nearby users can be reminded at any time, and the intelligent terminal is a lost or stolen intelligent terminal, so that a user near the intelligent terminal can find its intelligent terminal according to the alarm prompt message. Specifically, the method for displaying the alarm prompt information through the intelligent terminal when the security verification times reach the preset times and the security password associated with the security verification request cannot be matched includes the following steps:
s071: searching prestored alarm prompt information template
In this embodiment, when the number of times of security verification reaches the preset number of times and the security password associated with the security verification request cannot be matched, not only the communication information of the emergency contact is retrieved from the intelligent terminal, but also an alarm prompt information template is retrieved from the intelligent terminal. Preferably, the alert prompt message template includes, but is not limited to, a text message template, a voice message template, a picture message template, a video message template, and the like.
S072: and according to the alarm prompt information template, playing one or more of voice prompt information, audio prompt information, video prompt information, picture prompt information and/or text information through the intelligent terminal.
For example, a voice prompt message can be played through the intelligent terminal to inform a person who wants to forcibly swipe the phone through the intelligent terminal that the behavior belongs to theft or the person is improperly benefited and should return the owner in time, otherwise, the owner has the right to return and compensate the owner, or the person who wants to forcibly swipe the phone through the intelligent terminal is warned according to 'peace management law' to peace punishment on the person; or an alarm audio is played through the intelligent terminal, and a warning function is also played for a person who wants to forcibly swipe the intelligent terminal.
Referring to fig. 5, based on the above embodiment, in another preferred embodiment consistent with the present invention, when the number of times of security verification reaches a preset number of times and the security password associated with the security verification request cannot be matched, an alarm call may be dialed by the intelligent terminal, so that a public security officer may know that the intelligent terminal is lost or that a user is in danger in time, and thus, the lost intelligent terminal may be found in time or the user in danger may be assisted. The specific steps can be as follows:
s081: acquiring registered country or region information of the intelligent terminal;
here, the information of the intelligent terminal can be identified by acquiring a serial number or the like of the intelligent terminal, and a registered country or region of the intelligent terminal is requested to an operator or the like of the intelligent terminal through the information; the registered country or region information of the intelligent terminal can be obtained through the ID in a mode of obtaining the ID of the intelligent terminal.
S082: acquiring an alarm telephone number of the country or the region according to the registered country or region information;
here, a country/region-alarm telephone number association table may be stored in the intelligent terminal in advance, and then, according to the acquired registered country or region information, the corresponding alarm telephone number may be retrieved and acquired in the intelligent terminal; or by means of the running network of the intelligent terminal, the alarm telephone number corresponding to the registered country or region can be retrieved and obtained according to the obtained registered country or region information.
S083: dialing according to the alarm telephone number;
s084: and after the response to the dialing is sensed, feeding back the response according to a preset alarm template.
Here, an alarm audio may be prerecorded, and when the intelligent terminal senses a response to the dialing, the alarm audio may be played through a microphone.
Based on the above embodiment, in another preferred embodiment consistent with the present invention, the method for making an alarm call may further include the steps of:
s091: retrieving a prestored communication telephone number of the emergency contact;
s092: dialing according to the communication telephone number;
s093: and after the response to the dialing is sensed, feeding back the response according to a preset alarm template.
The specific steps of retrieving the communication telephone number of the emergency contact, feeding back an answer according to a preset alarm template, and the like, which are related in the method, have been described in the above embodiments, and are not described herein again.
In addition, based on the above embodiment, according to another embodiment of the present invention, after the intelligent terminal starts the anti-theft mode, the intelligent terminal may also automatically backup the preset data in the intelligent terminal, and then delete the preset data; or directly deleting the preset data in the intelligent terminal. The backup method of the preset data comprises the steps of storing the preset data defined in advance in the intelligent terminal, including but not limited to information, files, pictures, videos and address lists stored in the intelligent terminal, installation packages of all application programs and the like; or the information most closely related to the privacy of the user, such as at least one of contacts, information, call records, mails, photos and files, is transmitted to a cloud storage terminal provided by an operator of the intelligent terminal; or, the data is transmitted to a third-party storage terminal such as a hundred-degree cloud disk, a 360-degree cloud disk and the like which is installed on the intelligent terminal and used for storage; or transmitted to a second device which establishes a connection relationship with the intelligent terminal. And deleting all information after the storage is finished. Or the preset data in the intelligent terminal is directly deleted without the information transmission.
Based on the foregoing embodiment, in another preferred embodiment consistent with the present invention, a specific anti-theft mode is further provided, which specifically includes compressing all information in the intelligent terminal, including an address book, a short message, a communication record, a memo, a picture, various installation packages, a storage file and a cache file in various application programs, and the like, or only information most closely related to user privacy, such as at least one of a contact, information, a call record, an email, a photo, and a file, after the intelligent terminal starts the anti-theft mode and before backup processing, to obtain a compressed file.
Based on the foregoing embodiment, in another preferred embodiment consistent with the present invention, a specific anti-theft mode is further provided, which specifically includes after the intelligent terminal starts the anti-theft mode, encrypting all information in the intelligent terminal, including at least one of an address book, a short message, a communication record, a memo, a picture, various installation packages, storage files and cache files in various application programs, and the like, or only information most closely associated with user privacy, such as contacts, information, a call record, an email, a photo, and a file, to obtain an encrypted file, where the encrypted file may be compressed according to a transmission protocol requirement or any other file meeting a transmission requirement, and transmitting the encrypted file to a second storage space. Preferably, the second storage space may be a cloud storage terminal provided by an operator of the intelligent terminal, or a third-party storage terminal installed on the intelligent terminal and used for storage, such as a hundred-degree cloud disk and a 360-degree cloud disk, on the second device that establishes a connection relationship with the intelligent terminal.
Based on the above embodiment, in another preferred embodiment consistent with the present invention, there is also provided a specific anti-theft mode, which includes turning on a camera in a smart terminal to capture an image of a current user after the smart terminal starts the anti-theft mode, preferably, the turning on should be started in the background, and the captured image is not displayed in a display interface of the smart terminal, so that it is possible to conceivably acquire an image containing appearance information of a thief or a picker, and thus, when the image is transmitted to a second terminal, it is convenient for the user of the second terminal to inquire about the user according to the image information, thereby finding not only a lost terminal but also apprehending a person who steals the terminal.
Preferably, the second terminal in each of the above embodiments is a server terminal and/or a second intelligent terminal.
In summary, the anti-theft scheme of the intelligent terminal provided by the invention can automatically and timely inform the user when the forced shutdown operation is not allowed to be performed on the intelligent terminal; the intelligent anti-theft warning system does not depend on active searching of the user and does not depend on the account name, the password and the like of the intelligent terminal memorized by the user, so that the intelligence of the anti-theft warning is improved; the intelligent terminal can send positioning information to a user when the intelligent terminal is forcibly powered off, and a clue for finding the intelligent terminal is provided, so that the user can accurately position and find the intelligent terminal in a short time, and unnecessary loss is avoided; and when the user is in a dangerous condition, an alarm method can be provided, so that the user can ask for help outwards in time by means of the intelligent terminal.
In another aspect of the present invention, an intelligent terminal is further provided, which includes: a display, a processor, a memory and a computer program stored on the memory and executable on the processor, the computer program, when executed by the processor, implementing the steps of the anti-theft method as described in any one of the embodiments above, or a combination of the embodiments. And will not be described in detail herein.
In another aspect of the present invention, a computer-readable storage medium is provided, in which an anti-theft program is stored, and the anti-theft program is executed by a processor to implement the steps of the anti-theft method implemented by any one of the above embodiments or a combination of the above embodiments. And will not be described in detail herein.
The embodiments of the present invention have been described in detail, but the embodiments are merely examples, and the present invention is not limited to the embodiments described above. Any equivalent modifications and substitutions to those skilled in the art are also within the scope of the present invention. Accordingly, equivalent alterations and modifications are intended to be included within the scope of the present invention, without departing from the spirit and scope of the invention.

Claims (5)

1. An anti-theft method of an intelligent terminal is characterized by comprising the following steps:
s1: receiving a shutdown instruction;
s2: detecting whether the intelligent terminal can be connected with a second device or not; if not, executing step S2'; if yes, not executing step S2', and controlling the terminal to enter a normal power-off mode;
s2': carrying out security password verification according to a preset strategy, and if the result of the security password verification is verification failure, sending a message prompt of the verification failure;
s3: controlling the terminal to enter a preset mode according to a verification result, wherein
The second equipment is preset anti-theft verification equipment and/or historical connection equipment which establishes a connection relation with the intelligent terminal;
after the step of controlling the terminal to enter the preset mode, sending alarm prompt information; the step of sending the alarm prompt message comprises the following steps: retrieving a pre-stored alarm prompt information template and pre-stored communication information of the emergency contact;
sending the alarm prompt information to the emergency contact according to the alarm prompt information template; the preset mode is an anti-theft mode; after the step of controlling the terminal to enter the anti-theft mode, the method further comprises the following steps: processing preset data on the intelligent terminal according to a preset rule, and transmitting the processed data to the second equipment; the preset rule comprises an encryption processing to obtain an encrypted file, and the encrypted file is compressed and encrypted according to a transmission protocol;
and deleting preset data in the intelligent terminal.
2. The anti-theft method according to claim 1,
the security password comprises at least one of a digital password, a character password, a graphic password, a fingerprint password, an iris password or a face password.
3. The anti-theft method according to claim 1, wherein the step of controlling the terminal to enter the anti-theft mode is followed by at least one of transmitting current location information of the smart terminal, displaying alarm prompt information through the smart terminal, and making an alarm call.
4. The anti-theft method according to claim 1, wherein the preset data includes at least one of a contact, a message, a call log, a mail, a photo, and a file.
5. An intelligent terminal, comprising: display, processor, memory and computer program stored on the memory and executable on the processor, which computer program, when executed by the processor, carries out the steps of the anti-theft method according to any one of claims 1 to 4.
CN201910999223.6A 2019-10-21 2019-10-21 Anti-theft method of intelligent terminal and intelligent terminal Active CN110620847B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910999223.6A CN110620847B (en) 2019-10-21 2019-10-21 Anti-theft method of intelligent terminal and intelligent terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910999223.6A CN110620847B (en) 2019-10-21 2019-10-21 Anti-theft method of intelligent terminal and intelligent terminal

Publications (2)

Publication Number Publication Date
CN110620847A CN110620847A (en) 2019-12-27
CN110620847B true CN110620847B (en) 2022-08-30

Family

ID=68926367

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910999223.6A Active CN110620847B (en) 2019-10-21 2019-10-21 Anti-theft method of intelligent terminal and intelligent terminal

Country Status (1)

Country Link
CN (1) CN110620847B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112233398A (en) * 2020-09-21 2021-01-15 重庆传音通讯技术有限公司 Alarm method, terminal and storage medium
CN112615722A (en) * 2020-12-08 2021-04-06 深圳市沃特沃德股份有限公司 Smart watch searching method and device, computer equipment and storage medium
CN112434354A (en) * 2020-12-18 2021-03-02 歌尔光学科技有限公司 Intelligent mobile terminal, lost recovery positioning method and device thereof, and medium
CN113242555A (en) * 2021-04-29 2021-08-10 深圳市沃特沃德信息有限公司 Mobile phone information security protection method, device, equipment and medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103873655A (en) * 2012-12-13 2014-06-18 深圳富泰宏精密工业有限公司 Mobile terminal anti-theft system and mobile terminal anti-theft method
US8776226B2 (en) * 2010-01-26 2014-07-08 Bae Systems Information And Electronic Systems Integration Inc. Method and apparatus for detecting SSH login attacks
CN106027789A (en) * 2016-06-28 2016-10-12 上海哲奥实业有限公司 Anti-theft cellphone and anti-theft method for cellphone
CN107194291A (en) * 2017-05-16 2017-09-22 努比亚技术有限公司 Anti-theft method for mobile terminal, mobile terminal and computer-readable recording medium
CN107979692A (en) * 2017-11-17 2018-05-01 珠海市魅族科技有限公司 Terminal anti-theft method and device, computer installation and computer-readable recording medium
WO2019061219A1 (en) * 2017-09-29 2019-04-04 华为技术有限公司 Screen unlocking method and terminal

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103634477B (en) * 2013-12-11 2016-01-20 深圳市亚略特生物识别科技有限公司 There is theft preventing method and the system of the mobile phone of fingerprint device
CN105022951A (en) * 2014-04-17 2015-11-04 中兴通讯股份有限公司 Information processing method and electronic equipment
CN105187640A (en) * 2015-08-21 2015-12-23 上海斐讯数据通信技术有限公司 Anti-theft method and system of mobile terminal
CN107577961A (en) * 2017-09-05 2018-01-12 深圳支点电子智能科技有限公司 Mobile terminal and Related product available for security information protection

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8776226B2 (en) * 2010-01-26 2014-07-08 Bae Systems Information And Electronic Systems Integration Inc. Method and apparatus for detecting SSH login attacks
CN103873655A (en) * 2012-12-13 2014-06-18 深圳富泰宏精密工业有限公司 Mobile terminal anti-theft system and mobile terminal anti-theft method
CN106027789A (en) * 2016-06-28 2016-10-12 上海哲奥实业有限公司 Anti-theft cellphone and anti-theft method for cellphone
CN107194291A (en) * 2017-05-16 2017-09-22 努比亚技术有限公司 Anti-theft method for mobile terminal, mobile terminal and computer-readable recording medium
WO2019061219A1 (en) * 2017-09-29 2019-04-04 华为技术有限公司 Screen unlocking method and terminal
CN107979692A (en) * 2017-11-17 2018-05-01 珠海市魅族科技有限公司 Terminal anti-theft method and device, computer installation and computer-readable recording medium

Also Published As

Publication number Publication date
CN110620847A (en) 2019-12-27

Similar Documents

Publication Publication Date Title
CN110620847B (en) Anti-theft method of intelligent terminal and intelligent terminal
EP3288238B1 (en) Terminal alarm method and apparatus
WO2016034090A1 (en) Method and system for improving security of mobile terminal
EP1914961B1 (en) Mobile information terminal apparatus
WO2013107395A1 (en) Mobile phone security protection method and device
US20100273452A1 (en) Apparatus and Methods For Locating Tracking and/or Recovering a Wireless Communication Device
US9819784B1 (en) Silent invocation of emergency broadcasting mobile device
WO2016015551A1 (en) Method and system for improving safety of mobile terminal
TWI364977B (en) Server apparatus, server control program, and server-client system
CN104780279A (en) Mobile phone and method used for supporting stolen tracking and locating
CN105573623A (en) Help seeking method based on fingerprint identification
CN108052822B (en) Terminal control method, device and system
CN108513009A (en) A kind of hidden mobile fingerprint identification alarm system and alarm method
CN110855833A (en) Terminal retrieving method and device, terminal and storage medium
WO2017024550A1 (en) Anti-theft system and method for mobile terminal
WO2017177789A1 (en) Anti-theft method and device for mobile terminal
EP2789154B1 (en) Cellular telephone and computer program comprising means for generating and sending an alert
CN110290270B (en) Anti-theft method and mobile terminal
CN109981890B (en) Reminding task processing method, terminal and computer readable storage medium
CN104092813A (en) Handset and operation processing method thereof
CN106231594B (en) Mobile terminal information protection method and system
JP2007249530A (en) Authentication device, authentication method and authentication program
US20050093692A1 (en) Information processing device having external notification function and notification method thereof
CN109660662B (en) Information processing method and terminal
CN106921941A (en) A kind of system and method and communication terminal for pursuing stolen communication terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant