CN201001137Y - Intelligent anti-theft mobile phone - Google Patents

Intelligent anti-theft mobile phone Download PDF

Info

Publication number
CN201001137Y
CN201001137Y CNU2006201750082U CN200620175008U CN201001137Y CN 201001137 Y CN201001137 Y CN 201001137Y CN U2006201750082 U CNU2006201750082 U CN U2006201750082U CN 200620175008 U CN200620175008 U CN 200620175008U CN 201001137 Y CN201001137 Y CN 201001137Y
Authority
CN
China
Prior art keywords
mobile phone
circuit
theft
cpu
theft signal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNU2006201750082U
Other languages
Chinese (zh)
Inventor
周建明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CNU2006201750082U priority Critical patent/CN201001137Y/en
Application granted granted Critical
Publication of CN201001137Y publication Critical patent/CN201001137Y/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The utility model relates to an intelligent anti-theft mobile phone. A CPU and an interface circuit are arranged in the mobile phone. The utility model is characterized in that the mobile phone also comprises an anti-theft detector, an anti-theft signal processing circuit, and an alarm circuit, wherein the anti-theft detector is connected with the anti-theft signal processing circuit, to receive the change of the related information around the mobile phone, and to send an anti-theft signal to the anti-theft signal processing circuit; the anti-theft signal processing circuit is connected with the CPU through the interface circuit, to code and decode the anti-theft signal sent from the anti-theft detector, and send to the CPU; the alarm circuit is connected with the CPU through the interface circuit, to receive the alarm order sent from the CPU, and send out an early-warning signal.

Description

A kind of intelligent anti-theft mobile phone
Technical field
The utility model relates to a kind of mobile phone, especially a kind of mobile phone that has the intelligent anti-theft function.
Background technology
For a long time, numerous cellphone subscribers are subjected to the puzzlement of hand-set from stolen, and mobile phone is in a single day stolen, have no idea and can give for change, but also can follow losing of the valuable information material of many individuals.Some disclosed antitheft methods are also arranged at present, a kind of stolen and over-network registration alarming method of cellphone information that prevents that such as Chinese patent application number has been 00101440 patent disclosure, its defective is that related data is in RAM, RAM is under powering-off state, be easy to obliterated data information, password useless be set to cause.Chinese patent application number is 01802972 and 00136188 patent disclosure, and the implementation method of mobile phone is recovered in the latent row dialing of a kind of mobile phone, but implements the comparison difficulty.The patent of CN1694548, its method are to realize the transmission of antitheft information and to methods such as antitheft remote telephone orders by high frequency transmission circuit, central processing unit and the memory of mobile phone, but when the mobile phone distance is far away, are difficult to carry out remote control.Chinese patent application number is 02117718 patent, and its scheme is to adopt antitheft card of mobile telephone, but the defective that is cracked is arranged.
And, more than all methods, all do not have to realize how mobile phone personal information data to be carried out safeguard protection and fetch, and means such as mobile phone recovered in effective tracking, the assistance of lost mobile phone.
The utility model content
The purpose of this utility model just is to provide a kind of mobile phone that anti-theft feature is arranged, mobile phone exist stolen possible in, remind the cellphone subscriber that there is stolen danger in mobile phone, allow the user take measures to prevent.At hand-set from stolen or after losing, the machine master can fetch the personal information data in the own mobile phone, and assurance individual's relevant secret is not stolen or loses, and can carry out remote monitoring to stolen or lost handset.
The technical solution of the utility model is as follows:
A kind of intelligent anti-theft mobile phone, CPU and interface circuit are arranged in the described mobile phone, it is characterized in that: described mobile phone also comprises pir intrusion detector, anti-theft signal treatment circuit, warning circuit, described pir intrusion detector is connected with the anti-theft signal treatment circuit, receive the variation of mobile phone periphery relevant information, and send anti-theft signal to the anti-theft signal treatment circuit; Described anti-theft signal treatment circuit is connected with CPU by interface circuit, and the anti-theft signal that pir intrusion detector is sent carries out encoding and decoding, and is sent to CPU; Described warning circuit is connected with CPU by interface circuit, receives the alarm command that CPU sends, and sends early warning signal.
Above-mentioned pir intrusion detector can be electrostatic transducer or temperature sensor, after the electrostatic field that described electrostatic transducer is experienced the mobile phone periphery changes, can send anti-theft signal to the anti-theft signal treatment circuit; After the temperature that described temperature sensor is experienced the mobile phone periphery changes, can send anti-theft signal to the anti-theft signal treatment circuit.
Above-mentioned pir intrusion detector also can adopt electrostatic transducer and temperature sensor simultaneously, the electrostatic field of experiencing the mobile phone periphery when electrostatic transducer changes, and the temperature that temperature sensor is also experienced the mobile phone periphery simultaneously changes, and pir intrusion detector just sends anti-theft signal to the anti-theft signal treatment circuit.
Described mobile phone also comprises battery cover, and described battery cover is fixed on the mobile phone by screw and nut.
Further, be provided with power circuit in described battery of mobile phone lid inboard.
Further, be provided with reserve battery and a voltage monitoring circuit in the described mobile phone, reserve battery is connected with described power circuit respectively with voltage monitoring circuit.
The beneficial effects of the utility model are: when mobile phone exists stolenly possible the time, promptly send early warning to the machine master, remind cellphone subscriber's mobile phone to have stolen danger, allow the user take measures to prevent.At hand-set from stolen or after losing, the machine master can fetch the personal information data in the own mobile phone, and assurance individual's relevant secret is not stolen or loses, and can carry out remote monitoring to stolen or lost handset, follows the trail of the whereabouts of mobile phone, so that fetch mobile phone at last.
Description of drawings
Fig. 1 is the external structure of mobile phone of the present utility model;
Fig. 2 is the end view of mobile phone of the present utility model;
Fig. 3 is the rearview of mobile phone of the present utility model;
Fig. 4 is battery cover appreciable mobile phone internal structure schematic diagram when opening;
Fig. 5 circuit signal conveying flow of the present utility model schematic diagram
Fig. 6 is the circuit diagram of a kind of execution mode of antitheft mobile phone detector of the present utility model
Fig. 7 is the flow chart that mobile phone of the present utility model is realized burglar alarm
Fig. 8 is a mobile phone personal information processing flow chart of the present utility model
Fig. 9 is a hand-set from stolen method for supervising flow chart of the present utility model
Embodiment
Below in conjunction with description of drawings embodiment of the present utility model.
As depicted in figs. 1 and 2, mobile phone of the present utility model comprises display floater 1, main frame 2, and these two parts connect by fixed or detachable manner.On the main frame 2 of mobile phone pir intrusion detector is installed, described pir intrusion detector can be an electrostatic transducer or temperature sensor, also can comprise electrostatic transducer and temperature sensor simultaneously.In Fig. 2, pir intrusion detector just comprises electrostatic transducer 21 and temperature sensor 29, can see that the probe of detector is positioned on the shell of hand-set host 2.
Anti-theft signal treatment circuit, warning circuit also are set in the mobile phone of the present utility model.Pir intrusion detector is electrically connected with the anti-theft signal treatment circuit, and the anti-theft signal treatment circuit is connected with mobile phone CPU by interface circuit, and warning circuit also connects with mobile phone CPU by interface circuit.
Pir intrusion detector can be monitored mobile phone surrounding enviroment change in information.When pir intrusion detector is electrostatic transducer, after the electrostatic field that electrostatic transducer is experienced the mobile phone periphery changes, send anti-theft signal to the anti-theft signal treatment circuit; When pir intrusion detector is temperature sensor, after the temperature that temperature sensor is experienced the mobile phone periphery changes, send anti-theft signal to the anti-theft signal treatment circuit.
For pir intrusion detector can not surveyed by mistake, pir intrusion detector of the present utility model can comprise electrostatic transducer and temperature sensor simultaneously, has only when the two detects external signal simultaneously and changes, Cai send anti-theft signal to the anti-theft signal treatment circuit.
Fig. 5 is the signal processing circuit schematic diagram that comprises a kind of pir intrusion detector of electrostatic transducer and temperature sensor simultaneously.Electrostatic transducer 21 and temperature sensor 29 are worked together, and the signal of the two is handled by 2751 and 2752 shaping respectively, give and door 2753, have only when the two detects the external signal variation simultaneously, just send anti-theft signal to the anti-theft signal treatment circuit.Because human body is a static electrification, when other objects are close, will break electrostatic equilibrium, staff has temperature simultaneously, captures this two signs simultaneously, and can judge has the stranger to invade.The false alarm of so just having avoided single-sensor to bring.
After the anti-theft signal treatment circuit receives the anti-theft signal that pir intrusion detector sends, signal is carried out encoding and decoding handle, and treated signal is delivered to the CPU of mobile phone by interface circuit; After CPU receives signal, send alarm command to warning circuit, drive warning circuit and send alarm signal by interface circuit.
Fig. 6 is a circuit signal conveying flow schematic diagram of the present utility model.After pir intrusion detector is delivered to anti-theft signal treatment circuit 275 with anti-theft signal, antitheft treatment circuit 275 carries out encoding and decoding to it to be handled, and by main frame internal interface circuit 273, signal after handling is passed to CPU 271, resolve and send control signal by CPU again, vibration among the calling mobile phone ROM 272 or ring program, be dealt among the RAM 274 temporary, and will vibrate or the ring program is issued interface circuit 273 by RAM274, issue drive circuit 278 by interface circuit again, drive warning circuit 279 and move, make mobile phone vibration or ring, remind user mobile phone that stolen danger is arranged with this.
Fig. 7 is a handset anti-theft alarm flow chart of the present utility model.After the user receives vibration or bell signal, make reflection, taking measures, it is stolen to prevent at once.If find it is false alarm, can input password by keyboard, sound all clear.Be integrated with the alarm release program among the mobile phone ROM of the present utility model, after mobile phone sends alarm signal, check the releasing alarm command input that whether has, if alarm release instruction input is arranged, then call release alert program is removed and is reported to the police.
In the mobile phone of the present utility model timer is arranged, timer picks up counting after mobile phone sends alarm signal, if setting-up time (as, setting-up time is 50 seconds) within, do not receive the releasing alarm command, then CPU drives the warning circuit buzzer of ringing, the warning of sounding, simultaneously timer picks up counting again after reporting to the police sounding, if setting-up time (as, can set timing time is 500 seconds) in, still do not receive the instruction of sounding all clear, then buzzer stops audible alarm, calls " mobile phone blank screen program " by CPU then, and mobile phone screen is turned off, and simultaneously with keyboard lockout, mobile phone enters " anti-thefting monitoring state ", if want mobile phone to restart work, and must the input password.
Fig. 8 is a mobile phone personal information protection flow chart of the present utility model.In order to protect the personal information (telephone directory information etc.) of preserving in the mobile phone; after mobile phone is lost, do not distorted, infringement such as deletion; and in time in lost mobile phone, fetch personal information, be integrated with personal information locking module and personal information sending module in the mobile phone of the present utility model.Mobile phone enters " anti-thefting monitoring state " afterwards, can be by the number of the stolen or lost mobile phone of other mobile phone dialings, send password and operation transmission instruction simultaneously, if this moment the mobile phone password check correct after, the instruction of reception associative operation, and call the personal information locking module, carry out the personal information lock operation, locking phone directory and other personal information data bank.Call the personal information sending module simultaneously, the personal information on caller mobile phone transmission mobile phone.Mobile phone is judged automatically whether personal information has sent and is finished, and after personal information sends and finishes, finishes to send, and finishes the personal information locking then.
In order to prevent misoperation, the machine master also can be by sending instruction, the locking of releasing personal information, specific algorithm is, in the personal information process of transmitting, the machine master transmits END instruction and password by sending personal information to lost mobile phone, after mobile phone received instruction, whether first decision instruction password was correct, if password is correct, then finish personal information and transmit, and close the personal information locking.If there is not dependent instruction, or password bad, then continue to carry out the personal information transfer operation, finish until operation.
Fig. 9 is an antitheft mobile phone monitoring flow chart of the present utility model.In order effectively to follow the trail of the bodily destination of mobile phone, the utility model is integrated anti-thefting monitoring program in mobile phone ROM, behind the hand-set from stolen, the mobile phone owner can pass through other mobile phones, dial the number of stolen mobile phone, send a monitoring mobile phone function to stolen mobile phone simultaneously and enable password, stolen mobile phone receives called instruction and monitoring function is enabled after the password, confirms errorlessly, and then CPU calls the anti-thefting monitoring program, receive the control command that sends simultaneously, whether the anti-thefting monitoring program is judged the instruction of opening camera in the control command, if having, then open mobile phone cam, the real time shooting surroundings, and to caller mobile phone transmission video; Have or not in the control command that the anti-thefting monitoring program judge to receive and open the cylinder record instruction,, then call and open mobile phone cylinder record program cylinder record is opened, record ambient sound, simultaneously audio frequency is sent to the caller mobile phone if having.Like this, calling party's mobile phone just can pass through the display screen surveillance video, or by receiver reception sound, thereby the record mobile phone is stolen people's appearance feature, and living environment etc., and can select to appear by the police, find the basic station number that this mobile phone uses at present, with and IMEI, the position of locating cellphone, so that fetch mobile phone at last.
The user can send to mobile phone at any time and finish audio frequency and video transmission instruction in the process of transmitting of audio frequency and video, sends password simultaneously.Stolen mobile phone finishes video transmission instruction if the anti-thefting monitoring program is received in the video monitoring process, judge then whether password is correct, if correct, then finishes the video sending function, closes camera then; In the Voice Surveillance process, if the anti-thefting monitoring program is received the cylinder record out code, then whether the decision instruction password is correct, if correct, then finish audio frequency and sends, and closes cylinder record.
Usurp the people and change SIM cards of mobile phones in order to prevent mobile phone, can select user's phone number is cured among the ROM 272 of mobile phone, phone number is just effectively permanent in mobile phone like this, in a single day mobile phone enters after the anti-thefting monitoring state, can receive the anti-thefting monitoring instruction from the mobile phone owner whenever and wherever possible.
Fig. 3 is the rearview of mobile phone of the present utility model, can see battery cover 23; Fig. 4 is battery cover appreciable mobile phone cut-away view when opening.For preventing that mobile phone from usurping the people and cutting off cellular phone power supplies at short notice, the battery cover of mobile phone has adopted the semi-fixed type design, and battery of mobile phone lid 23 is fixed on the mobile phone by screw 24, nut 25, can only open by specific purpose tool.Simultaneously in order to prevent that battery of mobile phone lid 23 from being opened by force, the part power circuit of mobile phone is arranged on the battery cover inboard, battery cover 23 is in case opened by force, and the cellular phone power supplies circuit promptly goes to pot, and mobile phone has also just lost use value.
After preventing that the cellular phone power supplies circuit from being destroyed, can't use the long-range anti-thefting monitoring function of mobile phone, the spy is provided with one group of standby rechargeable battery 26 (see figure 4) in the circuit of mobile phone, with supply voltage supervisory circuit 277 (see figure 6)s, reserve battery is connected with power circuit, but be in off state usually, voltage monitoring circuit is connected (see figure 6) with power circuit 276, the voltage of monitoring cellular phone power supplies circuit; When mobile phone main battery electric weight deficiency or inefficacy, the voltage that voltage monitoring circuit can monitor power circuit is lower than rated value, and sends signal to CPU, and CPU connects reserve battery and power circuit, is the mobile phone power supply.If reserve battery is also destroyed, the repertoire of mobile phone is also just destroyed so, and mobile phone has also just thoroughly been scrapped.
The utility model for the anti-theft feature that prevents mobile phone not by misoperation, perhaps be used as purpose beyond antitheft by the people, in start-up course each time, be prerequisite all, otherwise can't open relevant anti-theft feature with the input password.So both can give full play to the anti-theft feature of mobile phone, can effectively guarantee mobile phone end user's individual privacy again.
For the influence that prevents that the antitheft mobile phone monitoring program from not cut off the power supply, can be in ROM 272 with the anti-thefting monitoring program Solidification, the permanent preservation.Because mobile phone has the reserve battery power supply, and after mobile phone was lost, no matter whether main battery cut off the power supply, antitheft controlled function can both be by remote activation, operation simultaneously.

Claims (6)

1. intelligent anti-theft mobile phone, CPU and interface circuit are arranged in the described mobile phone, it is characterized in that: described mobile phone also comprises pir intrusion detector, anti-theft signal treatment circuit, warning circuit, described pir intrusion detector is connected with the anti-theft signal treatment circuit, receive the variation of mobile phone periphery relevant information, and send anti-theft signal to the anti-theft signal treatment circuit; Described anti-theft signal treatment circuit is connected with CPU by interface circuit, and the anti-theft signal that pir intrusion detector is sent carries out encoding and decoding, and is sent to CPU; Described warning circuit is connected with CPU by interface circuit, receives the alarm command that CPU sends, and sends early warning signal.
2. mobile phone as claimed in claim 1 is characterized in that: described pir intrusion detector is electrostatic transducer or temperature sensor.
3. mobile phone as claimed in claim 1 is characterized in that: described pir intrusion detector comprises electrostatic transducer and temperature sensor.
4. mobile phone as claimed in claim 1 is characterized in that: described mobile phone also comprises battery cover, and described battery cover is fixed on the mobile phone by screw and nut.
5. mobile phone as claimed in claim 4 is characterized in that: described battery of mobile phone lid inboard is provided with power circuit.
6. mobile phone as claimed in claim 5 is characterized in that: be provided with reserve battery and a voltage monitoring circuit in the described mobile phone, reserve battery is connected with described power circuit respectively with voltage monitoring circuit.
CNU2006201750082U 2006-12-19 2006-12-19 Intelligent anti-theft mobile phone Expired - Fee Related CN201001137Y (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNU2006201750082U CN201001137Y (en) 2006-12-19 2006-12-19 Intelligent anti-theft mobile phone

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNU2006201750082U CN201001137Y (en) 2006-12-19 2006-12-19 Intelligent anti-theft mobile phone

Publications (1)

Publication Number Publication Date
CN201001137Y true CN201001137Y (en) 2008-01-02

Family

ID=39015538

Family Applications (1)

Application Number Title Priority Date Filing Date
CNU2006201750082U Expired - Fee Related CN201001137Y (en) 2006-12-19 2006-12-19 Intelligent anti-theft mobile phone

Country Status (1)

Country Link
CN (1) CN201001137Y (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102750796A (en) * 2012-06-25 2012-10-24 中兴通讯股份有限公司 Alarming method of touch screen terminal and touch screen terminal
CN102821208A (en) * 2012-08-21 2012-12-12 广州市渡明信息技术有限公司 Mobile phone and antitheft method
CN106060214A (en) * 2016-07-18 2016-10-26 永德利硅橡胶科技(深圳)有限公司 Method for preventing mobile phone from being lost based on mobile phone shell
CN112735067A (en) * 2020-12-31 2021-04-30 王雷 Mobile phone anti-theft system, method and device

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102750796A (en) * 2012-06-25 2012-10-24 中兴通讯股份有限公司 Alarming method of touch screen terminal and touch screen terminal
WO2014000605A1 (en) * 2012-06-25 2014-01-03 中兴通讯股份有限公司 Touch screen terminal and alarm method thereof
US9529408B2 (en) 2012-06-25 2016-12-27 Zte Corporation Touch screen terminal and alarm method thereof
CN102821208A (en) * 2012-08-21 2012-12-12 广州市渡明信息技术有限公司 Mobile phone and antitheft method
CN106060214A (en) * 2016-07-18 2016-10-26 永德利硅橡胶科技(深圳)有限公司 Method for preventing mobile phone from being lost based on mobile phone shell
CN106060214B (en) * 2016-07-18 2018-11-27 永德利硅橡胶科技(深圳)有限公司 A method of prevent mobile phone from losing based on mobile phone shell
CN112735067A (en) * 2020-12-31 2021-04-30 王雷 Mobile phone anti-theft system, method and device

Similar Documents

Publication Publication Date Title
CN101207859A (en) Method for preventing mobile phone being stolen
CN101611599B (en) Apparatus and methods for locating, tracking and/or recovering a wireless communication device
US8031052B2 (en) Systems and methods for radio frequency identification
EP1704545A2 (en) Improved security device, system, and method
CN103824397A (en) Anti-theft alarm device, system and method with remote monitoring security function
CN102750796A (en) Alarming method of touch screen terminal and touch screen terminal
CN102624988A (en) Anti-theft alarm method based on mobile phone and mobile phone
CN110910607A (en) Intelligent alarm terminal
CN201001137Y (en) Intelligent anti-theft mobile phone
EP1220556A1 (en) Remote disabling of a mobile phone device
CN106952445A (en) A kind of anti-abduction alarm method of domestic intelligent cloud lock and its system
CN104809776A (en) Intelligent automatic door as well as graph recognition unlocking method and automatic control method of intelligent automatic door
JP2005189914A (en) Notification system, information providing device and method, electronic apparatus and method and program
CN205512998U (en) Cell -phone strorage device with automatic alarm function
EP2780900B1 (en) Systems and methods for recovering low power devices
CN208590024U (en) A kind of GSM telephone alarm device
CN201540618U (en) Anti-theft alarm device
CN201054730Y (en) An intrusion alarm mobile terminal
US20040204054A1 (en) Automatic voice and image inter-cellular phone security communication system
CN102487425A (en) Mobile phone, infrared antitheft system and antitheft method thereof
CN106412216A (en) Automatic police-calling method of mobile terminal and system thereof
CN206149411U (en) Based on wireless network cell -phone remote video monitoring anti -theft system
JP2007013872A (en) Mobile terminal provided with illegal use countermeasure function
CN1169642A (en) Radio call receiver
CN108898773A (en) A kind of indoor and outdoor burglary-resisting system

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20080102

Termination date: 20131219