CN201001137Y - Intelligent anti-theft mobile phone - Google Patents
Intelligent anti-theft mobile phone Download PDFInfo
- Publication number
- CN201001137Y CN201001137Y CNU2006201750082U CN200620175008U CN201001137Y CN 201001137 Y CN201001137 Y CN 201001137Y CN U2006201750082 U CNU2006201750082 U CN U2006201750082U CN 200620175008 U CN200620175008 U CN 200620175008U CN 201001137 Y CN201001137 Y CN 201001137Y
- Authority
- CN
- China
- Prior art keywords
- mobile phone
- circuit
- theft
- cpu
- theft signal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
The utility model relates to an intelligent anti-theft mobile phone. A CPU and an interface circuit are arranged in the mobile phone. The utility model is characterized in that the mobile phone also comprises an anti-theft detector, an anti-theft signal processing circuit, and an alarm circuit, wherein the anti-theft detector is connected with the anti-theft signal processing circuit, to receive the change of the related information around the mobile phone, and to send an anti-theft signal to the anti-theft signal processing circuit; the anti-theft signal processing circuit is connected with the CPU through the interface circuit, to code and decode the anti-theft signal sent from the anti-theft detector, and send to the CPU; the alarm circuit is connected with the CPU through the interface circuit, to receive the alarm order sent from the CPU, and send out an early-warning signal.
Description
Technical field
The utility model relates to a kind of mobile phone, especially a kind of mobile phone that has the intelligent anti-theft function.
Background technology
For a long time, numerous cellphone subscribers are subjected to the puzzlement of hand-set from stolen, and mobile phone is in a single day stolen, have no idea and can give for change, but also can follow losing of the valuable information material of many individuals.Some disclosed antitheft methods are also arranged at present, a kind of stolen and over-network registration alarming method of cellphone information that prevents that such as Chinese patent application number has been 00101440 patent disclosure, its defective is that related data is in RAM, RAM is under powering-off state, be easy to obliterated data information, password useless be set to cause.Chinese patent application number is 01802972 and 00136188 patent disclosure, and the implementation method of mobile phone is recovered in the latent row dialing of a kind of mobile phone, but implements the comparison difficulty.The patent of CN1694548, its method are to realize the transmission of antitheft information and to methods such as antitheft remote telephone orders by high frequency transmission circuit, central processing unit and the memory of mobile phone, but when the mobile phone distance is far away, are difficult to carry out remote control.Chinese patent application number is 02117718 patent, and its scheme is to adopt antitheft card of mobile telephone, but the defective that is cracked is arranged.
And, more than all methods, all do not have to realize how mobile phone personal information data to be carried out safeguard protection and fetch, and means such as mobile phone recovered in effective tracking, the assistance of lost mobile phone.
The utility model content
The purpose of this utility model just is to provide a kind of mobile phone that anti-theft feature is arranged, mobile phone exist stolen possible in, remind the cellphone subscriber that there is stolen danger in mobile phone, allow the user take measures to prevent.At hand-set from stolen or after losing, the machine master can fetch the personal information data in the own mobile phone, and assurance individual's relevant secret is not stolen or loses, and can carry out remote monitoring to stolen or lost handset.
The technical solution of the utility model is as follows:
A kind of intelligent anti-theft mobile phone, CPU and interface circuit are arranged in the described mobile phone, it is characterized in that: described mobile phone also comprises pir intrusion detector, anti-theft signal treatment circuit, warning circuit, described pir intrusion detector is connected with the anti-theft signal treatment circuit, receive the variation of mobile phone periphery relevant information, and send anti-theft signal to the anti-theft signal treatment circuit; Described anti-theft signal treatment circuit is connected with CPU by interface circuit, and the anti-theft signal that pir intrusion detector is sent carries out encoding and decoding, and is sent to CPU; Described warning circuit is connected with CPU by interface circuit, receives the alarm command that CPU sends, and sends early warning signal.
Above-mentioned pir intrusion detector can be electrostatic transducer or temperature sensor, after the electrostatic field that described electrostatic transducer is experienced the mobile phone periphery changes, can send anti-theft signal to the anti-theft signal treatment circuit; After the temperature that described temperature sensor is experienced the mobile phone periphery changes, can send anti-theft signal to the anti-theft signal treatment circuit.
Above-mentioned pir intrusion detector also can adopt electrostatic transducer and temperature sensor simultaneously, the electrostatic field of experiencing the mobile phone periphery when electrostatic transducer changes, and the temperature that temperature sensor is also experienced the mobile phone periphery simultaneously changes, and pir intrusion detector just sends anti-theft signal to the anti-theft signal treatment circuit.
Described mobile phone also comprises battery cover, and described battery cover is fixed on the mobile phone by screw and nut.
Further, be provided with power circuit in described battery of mobile phone lid inboard.
Further, be provided with reserve battery and a voltage monitoring circuit in the described mobile phone, reserve battery is connected with described power circuit respectively with voltage monitoring circuit.
The beneficial effects of the utility model are: when mobile phone exists stolenly possible the time, promptly send early warning to the machine master, remind cellphone subscriber's mobile phone to have stolen danger, allow the user take measures to prevent.At hand-set from stolen or after losing, the machine master can fetch the personal information data in the own mobile phone, and assurance individual's relevant secret is not stolen or loses, and can carry out remote monitoring to stolen or lost handset, follows the trail of the whereabouts of mobile phone, so that fetch mobile phone at last.
Description of drawings
Fig. 1 is the external structure of mobile phone of the present utility model;
Fig. 2 is the end view of mobile phone of the present utility model;
Fig. 3 is the rearview of mobile phone of the present utility model;
Fig. 4 is battery cover appreciable mobile phone internal structure schematic diagram when opening;
Fig. 5 circuit signal conveying flow of the present utility model schematic diagram
Fig. 6 is the circuit diagram of a kind of execution mode of antitheft mobile phone detector of the present utility model
Fig. 7 is the flow chart that mobile phone of the present utility model is realized burglar alarm
Fig. 8 is a mobile phone personal information processing flow chart of the present utility model
Fig. 9 is a hand-set from stolen method for supervising flow chart of the present utility model
Embodiment
Below in conjunction with description of drawings embodiment of the present utility model.
As depicted in figs. 1 and 2, mobile phone of the present utility model comprises display floater 1, main frame 2, and these two parts connect by fixed or detachable manner.On the main frame 2 of mobile phone pir intrusion detector is installed, described pir intrusion detector can be an electrostatic transducer or temperature sensor, also can comprise electrostatic transducer and temperature sensor simultaneously.In Fig. 2, pir intrusion detector just comprises electrostatic transducer 21 and temperature sensor 29, can see that the probe of detector is positioned on the shell of hand-set host 2.
Anti-theft signal treatment circuit, warning circuit also are set in the mobile phone of the present utility model.Pir intrusion detector is electrically connected with the anti-theft signal treatment circuit, and the anti-theft signal treatment circuit is connected with mobile phone CPU by interface circuit, and warning circuit also connects with mobile phone CPU by interface circuit.
Pir intrusion detector can be monitored mobile phone surrounding enviroment change in information.When pir intrusion detector is electrostatic transducer, after the electrostatic field that electrostatic transducer is experienced the mobile phone periphery changes, send anti-theft signal to the anti-theft signal treatment circuit; When pir intrusion detector is temperature sensor, after the temperature that temperature sensor is experienced the mobile phone periphery changes, send anti-theft signal to the anti-theft signal treatment circuit.
For pir intrusion detector can not surveyed by mistake, pir intrusion detector of the present utility model can comprise electrostatic transducer and temperature sensor simultaneously, has only when the two detects external signal simultaneously and changes, Cai send anti-theft signal to the anti-theft signal treatment circuit.
Fig. 5 is the signal processing circuit schematic diagram that comprises a kind of pir intrusion detector of electrostatic transducer and temperature sensor simultaneously.Electrostatic transducer 21 and temperature sensor 29 are worked together, and the signal of the two is handled by 2751 and 2752 shaping respectively, give and door 2753, have only when the two detects the external signal variation simultaneously, just send anti-theft signal to the anti-theft signal treatment circuit.Because human body is a static electrification, when other objects are close, will break electrostatic equilibrium, staff has temperature simultaneously, captures this two signs simultaneously, and can judge has the stranger to invade.The false alarm of so just having avoided single-sensor to bring.
After the anti-theft signal treatment circuit receives the anti-theft signal that pir intrusion detector sends, signal is carried out encoding and decoding handle, and treated signal is delivered to the CPU of mobile phone by interface circuit; After CPU receives signal, send alarm command to warning circuit, drive warning circuit and send alarm signal by interface circuit.
Fig. 6 is a circuit signal conveying flow schematic diagram of the present utility model.After pir intrusion detector is delivered to anti-theft signal treatment circuit 275 with anti-theft signal, antitheft treatment circuit 275 carries out encoding and decoding to it to be handled, and by main frame internal interface circuit 273, signal after handling is passed to CPU 271, resolve and send control signal by CPU again, vibration among the calling mobile phone ROM 272 or ring program, be dealt among the RAM 274 temporary, and will vibrate or the ring program is issued interface circuit 273 by RAM274, issue drive circuit 278 by interface circuit again, drive warning circuit 279 and move, make mobile phone vibration or ring, remind user mobile phone that stolen danger is arranged with this.
Fig. 7 is a handset anti-theft alarm flow chart of the present utility model.After the user receives vibration or bell signal, make reflection, taking measures, it is stolen to prevent at once.If find it is false alarm, can input password by keyboard, sound all clear.Be integrated with the alarm release program among the mobile phone ROM of the present utility model, after mobile phone sends alarm signal, check the releasing alarm command input that whether has, if alarm release instruction input is arranged, then call release alert program is removed and is reported to the police.
In the mobile phone of the present utility model timer is arranged, timer picks up counting after mobile phone sends alarm signal, if setting-up time (as, setting-up time is 50 seconds) within, do not receive the releasing alarm command, then CPU drives the warning circuit buzzer of ringing, the warning of sounding, simultaneously timer picks up counting again after reporting to the police sounding, if setting-up time (as, can set timing time is 500 seconds) in, still do not receive the instruction of sounding all clear, then buzzer stops audible alarm, calls " mobile phone blank screen program " by CPU then, and mobile phone screen is turned off, and simultaneously with keyboard lockout, mobile phone enters " anti-thefting monitoring state ", if want mobile phone to restart work, and must the input password.
Fig. 8 is a mobile phone personal information protection flow chart of the present utility model.In order to protect the personal information (telephone directory information etc.) of preserving in the mobile phone; after mobile phone is lost, do not distorted, infringement such as deletion; and in time in lost mobile phone, fetch personal information, be integrated with personal information locking module and personal information sending module in the mobile phone of the present utility model.Mobile phone enters " anti-thefting monitoring state " afterwards, can be by the number of the stolen or lost mobile phone of other mobile phone dialings, send password and operation transmission instruction simultaneously, if this moment the mobile phone password check correct after, the instruction of reception associative operation, and call the personal information locking module, carry out the personal information lock operation, locking phone directory and other personal information data bank.Call the personal information sending module simultaneously, the personal information on caller mobile phone transmission mobile phone.Mobile phone is judged automatically whether personal information has sent and is finished, and after personal information sends and finishes, finishes to send, and finishes the personal information locking then.
In order to prevent misoperation, the machine master also can be by sending instruction, the locking of releasing personal information, specific algorithm is, in the personal information process of transmitting, the machine master transmits END instruction and password by sending personal information to lost mobile phone, after mobile phone received instruction, whether first decision instruction password was correct, if password is correct, then finish personal information and transmit, and close the personal information locking.If there is not dependent instruction, or password bad, then continue to carry out the personal information transfer operation, finish until operation.
Fig. 9 is an antitheft mobile phone monitoring flow chart of the present utility model.In order effectively to follow the trail of the bodily destination of mobile phone, the utility model is integrated anti-thefting monitoring program in mobile phone ROM, behind the hand-set from stolen, the mobile phone owner can pass through other mobile phones, dial the number of stolen mobile phone, send a monitoring mobile phone function to stolen mobile phone simultaneously and enable password, stolen mobile phone receives called instruction and monitoring function is enabled after the password, confirms errorlessly, and then CPU calls the anti-thefting monitoring program, receive the control command that sends simultaneously, whether the anti-thefting monitoring program is judged the instruction of opening camera in the control command, if having, then open mobile phone cam, the real time shooting surroundings, and to caller mobile phone transmission video; Have or not in the control command that the anti-thefting monitoring program judge to receive and open the cylinder record instruction,, then call and open mobile phone cylinder record program cylinder record is opened, record ambient sound, simultaneously audio frequency is sent to the caller mobile phone if having.Like this, calling party's mobile phone just can pass through the display screen surveillance video, or by receiver reception sound, thereby the record mobile phone is stolen people's appearance feature, and living environment etc., and can select to appear by the police, find the basic station number that this mobile phone uses at present, with and IMEI, the position of locating cellphone, so that fetch mobile phone at last.
The user can send to mobile phone at any time and finish audio frequency and video transmission instruction in the process of transmitting of audio frequency and video, sends password simultaneously.Stolen mobile phone finishes video transmission instruction if the anti-thefting monitoring program is received in the video monitoring process, judge then whether password is correct, if correct, then finishes the video sending function, closes camera then; In the Voice Surveillance process, if the anti-thefting monitoring program is received the cylinder record out code, then whether the decision instruction password is correct, if correct, then finish audio frequency and sends, and closes cylinder record.
Usurp the people and change SIM cards of mobile phones in order to prevent mobile phone, can select user's phone number is cured among the ROM 272 of mobile phone, phone number is just effectively permanent in mobile phone like this, in a single day mobile phone enters after the anti-thefting monitoring state, can receive the anti-thefting monitoring instruction from the mobile phone owner whenever and wherever possible.
Fig. 3 is the rearview of mobile phone of the present utility model, can see battery cover 23; Fig. 4 is battery cover appreciable mobile phone cut-away view when opening.For preventing that mobile phone from usurping the people and cutting off cellular phone power supplies at short notice, the battery cover of mobile phone has adopted the semi-fixed type design, and battery of mobile phone lid 23 is fixed on the mobile phone by screw 24, nut 25, can only open by specific purpose tool.Simultaneously in order to prevent that battery of mobile phone lid 23 from being opened by force, the part power circuit of mobile phone is arranged on the battery cover inboard, battery cover 23 is in case opened by force, and the cellular phone power supplies circuit promptly goes to pot, and mobile phone has also just lost use value.
After preventing that the cellular phone power supplies circuit from being destroyed, can't use the long-range anti-thefting monitoring function of mobile phone, the spy is provided with one group of standby rechargeable battery 26 (see figure 4) in the circuit of mobile phone, with supply voltage supervisory circuit 277 (see figure 6)s, reserve battery is connected with power circuit, but be in off state usually, voltage monitoring circuit is connected (see figure 6) with power circuit 276, the voltage of monitoring cellular phone power supplies circuit; When mobile phone main battery electric weight deficiency or inefficacy, the voltage that voltage monitoring circuit can monitor power circuit is lower than rated value, and sends signal to CPU, and CPU connects reserve battery and power circuit, is the mobile phone power supply.If reserve battery is also destroyed, the repertoire of mobile phone is also just destroyed so, and mobile phone has also just thoroughly been scrapped.
The utility model for the anti-theft feature that prevents mobile phone not by misoperation, perhaps be used as purpose beyond antitheft by the people, in start-up course each time, be prerequisite all, otherwise can't open relevant anti-theft feature with the input password.So both can give full play to the anti-theft feature of mobile phone, can effectively guarantee mobile phone end user's individual privacy again.
For the influence that prevents that the antitheft mobile phone monitoring program from not cut off the power supply, can be in ROM 272 with the anti-thefting monitoring program Solidification, the permanent preservation.Because mobile phone has the reserve battery power supply, and after mobile phone was lost, no matter whether main battery cut off the power supply, antitheft controlled function can both be by remote activation, operation simultaneously.
Claims (6)
1. intelligent anti-theft mobile phone, CPU and interface circuit are arranged in the described mobile phone, it is characterized in that: described mobile phone also comprises pir intrusion detector, anti-theft signal treatment circuit, warning circuit, described pir intrusion detector is connected with the anti-theft signal treatment circuit, receive the variation of mobile phone periphery relevant information, and send anti-theft signal to the anti-theft signal treatment circuit; Described anti-theft signal treatment circuit is connected with CPU by interface circuit, and the anti-theft signal that pir intrusion detector is sent carries out encoding and decoding, and is sent to CPU; Described warning circuit is connected with CPU by interface circuit, receives the alarm command that CPU sends, and sends early warning signal.
2. mobile phone as claimed in claim 1 is characterized in that: described pir intrusion detector is electrostatic transducer or temperature sensor.
3. mobile phone as claimed in claim 1 is characterized in that: described pir intrusion detector comprises electrostatic transducer and temperature sensor.
4. mobile phone as claimed in claim 1 is characterized in that: described mobile phone also comprises battery cover, and described battery cover is fixed on the mobile phone by screw and nut.
5. mobile phone as claimed in claim 4 is characterized in that: described battery of mobile phone lid inboard is provided with power circuit.
6. mobile phone as claimed in claim 5 is characterized in that: be provided with reserve battery and a voltage monitoring circuit in the described mobile phone, reserve battery is connected with described power circuit respectively with voltage monitoring circuit.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNU2006201750082U CN201001137Y (en) | 2006-12-19 | 2006-12-19 | Intelligent anti-theft mobile phone |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNU2006201750082U CN201001137Y (en) | 2006-12-19 | 2006-12-19 | Intelligent anti-theft mobile phone |
Publications (1)
Publication Number | Publication Date |
---|---|
CN201001137Y true CN201001137Y (en) | 2008-01-02 |
Family
ID=39015538
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNU2006201750082U Expired - Fee Related CN201001137Y (en) | 2006-12-19 | 2006-12-19 | Intelligent anti-theft mobile phone |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN201001137Y (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102750796A (en) * | 2012-06-25 | 2012-10-24 | 中兴通讯股份有限公司 | Alarming method of touch screen terminal and touch screen terminal |
CN102821208A (en) * | 2012-08-21 | 2012-12-12 | 广州市渡明信息技术有限公司 | Mobile phone and antitheft method |
CN106060214A (en) * | 2016-07-18 | 2016-10-26 | 永德利硅橡胶科技(深圳)有限公司 | Method for preventing mobile phone from being lost based on mobile phone shell |
CN112735067A (en) * | 2020-12-31 | 2021-04-30 | 王雷 | Mobile phone anti-theft system, method and device |
-
2006
- 2006-12-19 CN CNU2006201750082U patent/CN201001137Y/en not_active Expired - Fee Related
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102750796A (en) * | 2012-06-25 | 2012-10-24 | 中兴通讯股份有限公司 | Alarming method of touch screen terminal and touch screen terminal |
WO2014000605A1 (en) * | 2012-06-25 | 2014-01-03 | 中兴通讯股份有限公司 | Touch screen terminal and alarm method thereof |
US9529408B2 (en) | 2012-06-25 | 2016-12-27 | Zte Corporation | Touch screen terminal and alarm method thereof |
CN102821208A (en) * | 2012-08-21 | 2012-12-12 | 广州市渡明信息技术有限公司 | Mobile phone and antitheft method |
CN106060214A (en) * | 2016-07-18 | 2016-10-26 | 永德利硅橡胶科技(深圳)有限公司 | Method for preventing mobile phone from being lost based on mobile phone shell |
CN106060214B (en) * | 2016-07-18 | 2018-11-27 | 永德利硅橡胶科技(深圳)有限公司 | A method of prevent mobile phone from losing based on mobile phone shell |
CN112735067A (en) * | 2020-12-31 | 2021-04-30 | 王雷 | Mobile phone anti-theft system, method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101207859A (en) | Method for preventing mobile phone being stolen | |
CN101611599B (en) | Apparatus and methods for locating, tracking and/or recovering a wireless communication device | |
US8031052B2 (en) | Systems and methods for radio frequency identification | |
EP1704545A2 (en) | Improved security device, system, and method | |
CN103824397A (en) | Anti-theft alarm device, system and method with remote monitoring security function | |
CN102750796A (en) | Alarming method of touch screen terminal and touch screen terminal | |
CN102624988A (en) | Anti-theft alarm method based on mobile phone and mobile phone | |
CN110910607A (en) | Intelligent alarm terminal | |
CN201001137Y (en) | Intelligent anti-theft mobile phone | |
EP1220556A1 (en) | Remote disabling of a mobile phone device | |
CN106952445A (en) | A kind of anti-abduction alarm method of domestic intelligent cloud lock and its system | |
CN104809776A (en) | Intelligent automatic door as well as graph recognition unlocking method and automatic control method of intelligent automatic door | |
JP2005189914A (en) | Notification system, information providing device and method, electronic apparatus and method and program | |
CN205512998U (en) | Cell -phone strorage device with automatic alarm function | |
EP2780900B1 (en) | Systems and methods for recovering low power devices | |
CN208590024U (en) | A kind of GSM telephone alarm device | |
CN201540618U (en) | Anti-theft alarm device | |
CN201054730Y (en) | An intrusion alarm mobile terminal | |
US20040204054A1 (en) | Automatic voice and image inter-cellular phone security communication system | |
CN102487425A (en) | Mobile phone, infrared antitheft system and antitheft method thereof | |
CN106412216A (en) | Automatic police-calling method of mobile terminal and system thereof | |
CN206149411U (en) | Based on wireless network cell -phone remote video monitoring anti -theft system | |
JP2007013872A (en) | Mobile terminal provided with illegal use countermeasure function | |
CN1169642A (en) | Radio call receiver | |
CN108898773A (en) | A kind of indoor and outdoor burglary-resisting system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20080102 Termination date: 20131219 |