WO2011088652A1 - 防盗移动终端及移动终端的防盗方法 - Google Patents

防盗移动终端及移动终端的防盗方法 Download PDF

Info

Publication number
WO2011088652A1
WO2011088652A1 PCT/CN2010/073841 CN2010073841W WO2011088652A1 WO 2011088652 A1 WO2011088652 A1 WO 2011088652A1 CN 2010073841 W CN2010073841 W CN 2010073841W WO 2011088652 A1 WO2011088652 A1 WO 2011088652A1
Authority
WO
WIPO (PCT)
Prior art keywords
mobile terminal
module
information
sim card
password
Prior art date
Application number
PCT/CN2010/073841
Other languages
English (en)
French (fr)
Inventor
沈少武
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Priority to US13/258,287 priority Critical patent/US8811949B2/en
Priority to EP10843692.4A priority patent/EP2503806B1/en
Publication of WO2011088652A1 publication Critical patent/WO2011088652A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Definitions

  • the present invention relates to anti-theft technology of a mobile terminal, and in particular to an anti-theft mobile terminal and an anti-theft method for the mobile terminal. Background technique
  • a mechanical locking device is designed in the mobile terminal.
  • the general locking device includes a latch, a lock body, a spring, an electromagnetic coil, an iron core, and an interlocking plate connected to the battery board.
  • the structure is complicated and difficult. It is realized in the small structure space of the mobile terminal. At the same time, the mechanical lock mode is easily cracked by the professional unlocking personnel, and does not have a strong anti-theft meaning.
  • the related information in the mobile terminal is returned by SMS, and the important information stored in the storage area such as the user's address book is transmitted back to the new mobile terminal of the owner, although this method can
  • the user's personal contact information is largely restored, but there are certain restrictions. For example, the user cannot perform the backhaul of the information when the mobile terminal is powered off, nor can the user identity module (SIM, Subscriber Identity Module) be replaced at the mobile terminal. The return of the information is performed in the case of the card.
  • SIM Subscriber Identity Module
  • the main object of the present invention is to provide an anti-theft mobile terminal and an anti-theft method for the mobile terminal, which can retrieve the relevant information of the mobile terminal after the mobile terminal is stolen, and can accurately locate the stolen mobile terminal.
  • An anti-theft mobile terminal includes a setting unit, an encryption module, a password face verification module, a detection module, a power management module, an information return module, an information deletion module, and a positioning module; wherein: a setting unit, configured to set an international mobile terminal for the mobile terminal User identification code SIMI;
  • the encryption module is configured to set a lock screen password of the mobile terminal and an information return verification password;
  • the password verification module is configured to verify the unlock screen password input by the user, and unlock the screen after the face card passes;
  • the detecting module is configured to detect the battery and the SIM card of the mobile terminal, and trigger the power management module to manage the power when the SIM card is pulled out, the battery is unplugged, or the battery is not powered out for a set time; the power management module is used for Stop the power supply function of the mobile terminal battery, enable the backup power supply to the information return module, the information deletion module, the positioning module and the SIMI;
  • the information returning module is configured to receive the information sent by other mobile terminals and send back the verification password. Passing the face certificate, passing the information in the setting storage area in the mobile terminal back to the other mobile terminal;
  • An information deleting module configured to delete, in the setting storage area, information that has been returned by the information backhaul module
  • the positioning module is configured to locate the mobile terminal, and periodically send the positioning information to the network side or the designated mobile terminal.
  • the mobile terminal further includes:
  • the SIM card binding module is configured to bind the set SIM card to the mobile terminal.
  • the SIM card inserted in the mobile terminal is a non-set SIM card, the access network service for the non-set SIM card is refused.
  • the SIM card binding module further binds the SIMI to the set SIM card.
  • the password face verification module triggers the power management module to manage the power when the number of face certificates exceeds the set threshold, and starts after the mobile terminal is restarted or powered on again.
  • the power management module does not supply power to the information return module, the information deletion module, the positioning module, and the SIMI when the battery of the mobile terminal is normally powered.
  • An anti-theft method for a mobile terminal which sets a lock screen password of the mobile terminal and an information return verification password; and sets a SIMI for the mobile terminal; the method further includes:
  • the mobile terminal After the mobile terminal locks the screen, it receives the unlocked screen lock password input by the user and verifies it, and unlocks the screen after the verification is passed; detects that the SIM card of the mobile terminal is pulled out, the battery is unplugged, or the battery is powered out for more than the set duration.
  • the mobile terminal When the battery power of the mobile terminal is stopped, the standby power is enabled, the mobile terminal enters an automatic running state, and the SIMI of the mobile terminal is used as the identity of the communication; the automatic running state includes: receiving the information returning verification password sent by the other mobile terminal After verifying, the information in the setting storage area in the mobile terminal is transmitted back to the other mobile terminal, and the information returned by the information returning module is deleted in the setting storage area; and, Move The automatic positioning function in the mobile terminal periodically sends the current positioning information of the mobile terminal to the network side or the designated mobile terminal.
  • the method further includes:
  • the set SIM card is bound to the mobile terminal, and when the SIM card inserted in the mobile terminal is a non-set SIM card, the access network service for the non-set SIM card is refused.
  • the method further includes:
  • the SIMI of the mobile terminal is bound to the set SIM card, and when the SIM card inserted in the mobile terminal is a non-set SIM card, the access network service for the non-set SIM card is refused.
  • the method further includes:
  • the battery power of the mobile terminal is stopped, the standby power is enabled, and the mobile terminal enters the automatic running state; after the mobile terminal is powered on or re-powered, the screen of the mobile terminal is automatically locked.
  • the method further includes:
  • the mobile terminal When the SIM card or the battery in the mobile terminal is pulled out for more than the set time, the mobile terminal enables the standby power and enters the automatic running state.
  • the mobile terminal by additionally setting a SIMI, a password setting module, a positioning module, a backup power source, and the like in the mobile terminal, when the mobile terminal is stolen or after the lock screen password is input multiple times, the mobile terminal stops power supply of the mobile terminal battery.
  • the standby power When the standby power is enabled, the automatic operation state is entered, that is, the mobile terminal enters the anti-theft state. At this time, the standby power supply will only supply power to the module related to the anti-theft state. In this way, after receiving the information sent back by the user through the other mobile terminal, the password input by the request is verified, and the related information stored in the setting storage area is transmitted to the requesting mobile terminal.
  • the positioning module of the stolen mobile terminal will start, automatically locate the mobile terminal, and send the positioning information to the network side or the designated mobile terminal.
  • the mobile terminal is lost, the accurate positioning of the lost mobile terminal can be realized; the password returned by the other mobile terminal user to the lost mobile terminal can be sent, and after the pass is passed, the legacy is passed.
  • the lost mobile terminal returns the relevant information in the set storage area to the other mobile terminals requested.
  • the present invention minimizes the loss of mobile terminal users from losing mobile terminals.
  • FIG. 1 is a schematic structural diagram of a structure of an anti-theft mobile terminal according to the present invention.
  • FIG. 2 is a schematic structural diagram of another component of the anti-theft mobile terminal of the present invention.
  • FIG. 3 is a flowchart of a method for preventing theft of a mobile terminal according to the present invention. detailed description
  • the basic idea of the present invention is: by additionally setting a SIMI, a password setting module, a positioning module, a backup power source, and the like in the mobile terminal, the mobile terminal stops the mobile terminal battery when the mobile terminal is stolen or after the lock screen password is input multiple times.
  • the power supply, the standby power is enabled, and the automatic operation state is entered, that is, the mobile terminal enters the anti-theft state.
  • the backup power supply will only supply power to the module related to the anti-theft state.
  • the password input by the request is sent to the mobile terminal to be requested, and the related information stored in the setting storage area is sent to the requesting mobile terminal.
  • the positioning module of the stolen mobile terminal will start, automatically locate the mobile terminal, and send the positioning information to the network side or the designated mobile terminal.
  • the example anti-theft mobile terminal includes a setting unit 10, an encryption module 11, a password verification module 12, a detection module 18, a power management module 13, and information back.
  • the setting unit 10 is configured to set a SIMI for the mobile terminal. And when the mobile terminal is lost and enters an anti-theft state, the SIMI is enabled as an identity with the lost mobile terminal, thereby implementing related communication with the mobile terminal.
  • the encryption module 11 is configured to set a lock screen password of the mobile terminal and an information return verification password.
  • the lock screen password and the information return verification password may be any digit password, which may be a number or The character combination is set by the user after the mobile terminal is started.
  • the lock screen password is to lock the screen of the mobile terminal and then need to input the corresponding password to unlock the screen.
  • the information return verification password is the password of the legal user after the request for returning the information is returned. If the verification password is input correctly, the information return request is considered legal.
  • the password verification module 12 is configured to verify the unlock screen password input by the user, cancel the lock of the screen after the verification is passed, and trigger the power management module to manage the power when the number of face certificates exceeds the set threshold; here, it can be set
  • the number of verification thresholds of the lock screen verification password is 6 times, that is, after the screen unlocking password input by the mobile terminal user is continuously errored 6 times, the mobile terminal enters an automatic running state, that is, enters an anti-theft state.
  • the setting time here can be 1 hour, 2 hours or 24 hours, one week, etc., and the duration is set by the mobile terminal user.
  • the password face verification module 12 is started after the mobile terminal is restarted or re-powered, that is, after the mobile terminal is restarted or re-powered, it is considered to be a normal power-on behavior, prompting the user to input the unlock screen lock password.
  • the detecting module 18 is configured to detect the battery and the SIM card of the mobile terminal, and trigger the power management module 13 to manage the power when the SIM card is pulled out, the battery is pulled out, or the battery is not powered for more than the set time.
  • the setting of the detecting module 18 is mainly to prevent the mobile terminal from being stolen, the thief generally pulls out the SIM card of the mobile terminal, or pulls out the battery of the mobile terminal or shuts down the mobile terminal, etc., so that the mobile terminal user cannot The mobile terminal communicates so that it cannot find its own mobile terminal.
  • the mobile terminal of the present invention is provided with a detecting module 18, detecting that the battery of the mobile terminal cannot be powered beyond the set time, or when the SIM card of the mobile terminal is pulled out beyond the set time , the standby power will be automatically activated to put the mobile terminal in an anti-theft state.
  • the setting time here can be half an hour, 20 minutes or one day.
  • the power management module 13 is configured to stop power supply of the mobile terminal battery, and enable the standby power supply to the letter
  • the processing unit supplies power, and the mobile terminal enters a shutdown state as the existing mobile terminal.
  • the backup power source is connected to the battery of the mobile terminal. When the mobile terminal is in normal working state, the battery of the mobile terminal is charged to the backup battery, and once the battery of the mobile terminal is no longer working, the backup battery is enabled to the mobile terminal.
  • the relevant module of the anti-theft state is powered to implement the anti-theft function of the mobile terminal in the present invention. The following describes in detail how the mobile terminal in the present invention implements the anti-theft function.
  • the power management module 13 does not supply power to the information returning module 14, the information deleting module 15, the positioning module 16, and the SIMI when the battery of the mobile terminal is normally powered.
  • the information returning module 14 is configured to receive the information sent back by the other mobile terminal and verify the password, and then pass back the information in the setting storage area of the mobile terminal to the other mobile terminal.
  • the request for the information backhaul can be sent to the lost mobile terminal by any other mobile terminal. Specifically, the request is sent to the lost mobile terminal in the short message mode.
  • the content of the request returned by the information is the information returned by the mobile terminal user before returning the face certificate password.
  • the lost mobile terminal starts the automatic operation mode, once the short message is received, the default is the information return verification password. Extracting the content of the short message and comparing it with the lost face card password stored in the lost mobile terminal.
  • the related information stored in the set storage area of the lost mobile terminal is automatically sent to other mobile terminals that send the request.
  • the foregoing setting storage area may be an address book storage area, a short message storage area, and a user personal information storage area.
  • the SIMI set in the lost mobile terminal must be The identity identifier, that is, the mobile terminal at this time is in a network environment supporting SIMI, and can receive short messages of other user terminals.
  • the information deleting module 15 is configured to delete information that has been returned by the information backhaul module in the setting storage area.
  • the information deleting module 15 will delete the information. In this way, even if the lock screen password of the lost mobile terminal is deciphered by others, the information cannot be seen, and the privacy of the mobile terminal user is effectively protected.
  • the positioning module 16 is configured to locate the mobile terminal, and periodically send the positioning information to the network side or the designated mobile terminal.
  • the positioning module 16 can be implemented by a Global Positioning System (GPS) locator or a corresponding processor. It is easy to implement the GPS positioning function of the mobile terminal in the mobile terminal.
  • the positioning unit 12 in the present invention may also be a Geographic Information System (GIS) locator. Specifically, the base station location information reported by the mobile terminal to the network side, and the angle and signal of the mobile terminal transmitting signals to the base station. Power, etc., determine the location information of the mobile terminal.
  • GIS Geographic Information System
  • the example anti-theft mobile terminal further includes:
  • the SIM card binding module 17 is configured to bind the set SIM card to the mobile terminal, and refuse to provide an access network service for the non-set SIM card when the SIM card inserted in the mobile terminal is a non-set SIM card.
  • the function of the SIM card binding module 17 can be set by the user. For example, when the user selects the function of binding the current mobile terminal to the currently inserted SIM, the mobile terminal will activate the binding function, except for the SIM inserted by the current user. Outside the card, the mobile terminal no longer supports other SIM cards unless the user separately sets the binding relationship with other SIN cards.
  • the SIM card binding module further binds the SIMI to the set SIM card.
  • the SIM card inserted in the mobile terminal is a non-set SIM card
  • the access network service for the non-set SIM card is refused.
  • the principle of binding the SIMI and the SIM card is exactly the same as the principle and implementation of the binding with the mobile terminal.
  • FIG. 3 is a flowchart of a method for preventing theft of a mobile terminal according to the present invention. As shown in FIG. 3, the method for preventing theft of the mobile terminal of the present invention includes the following steps:
  • Step 301 Set the lock screen password of the mobile terminal and the information return verification password; set the SIMI for the mobile terminal.
  • the lock screen password and the information return face password are set by the corresponding setting function, and the passwords are set by the user, and may be a combination of numbers or / and characters.
  • the SIMI setting is equivalent to setting another network access mode for the mobile terminal. This mode is not enabled when the mobile terminal is working normally, but is enabled when the mobile terminal enters the anti-theft state. That is to say, the mobile terminal of the present invention supports the multi-mode function, but in practice, only one single-mode mode can be selected, that is, the SIMI-supported network function (in the anti-theft state) or the SIM-supported network function (normal) is enabled. when working).
  • Step 302 After the mobile terminal locks the screen, receives the unlocked screen lock password input by the user and verifies the password, and cancels the lock of the screen after the verification is passed. If the password verification is incorrect and exceeds the set threshold number, the battery power supply of the mobile terminal is stopped. When the backup power is enabled, the mobile terminal enters an automatic running state and uses the SIMI of the mobile terminal as the identity of the communication. Here, the mobile terminal enters an automatic running state to enter an anti-theft state.
  • the mobile terminal When the lock screen password entered by the user exceeds the set threshold number, the mobile terminal will automatically enter the anti-theft state, that is, the mobile terminal exhibits a shutdown state, shutting down the network function supported by the SIM card, and then starting the SIMI support in the mobile terminal. Network function. In fact, the mobile terminal at this time still supports the network communication function with the help of the backup power supply, but this state is no longer controlled by the user.
  • the mobile terminal when the SIM card or the battery in the mobile terminal is pulled out for more than the set time, Or the battery of the mobile terminal cannot be powered. If the power is turned off or the battery is faulty, the mobile terminal will enter the automatic running state, that is, enter the anti-theft state.
  • the setting duration here can be half d, hour, 20 minutes or one day.
  • the automatic operation state includes: after receiving the information returned by the other mobile terminal, the verification password is performed, and the information in the setting storage area in the mobile terminal is transmitted back to the other mobile terminal, and The setting storage area deletes the information that has been returned by the information backhaul module; and, the automatic positioning function in the mobile terminal is started, and the current positioning information of the mobile terminal is periodically sent to the network side or the designated mobile terminal.
  • the method further includes: binding the set SIM card to the mobile terminal, and rejecting the non-set when the SIM card inserted in the mobile terminal is a non-set SIM card.
  • the SIM card provides access to network services.
  • the function can be set by the user. For example, when the user selects the function of binding the current mobile terminal to the currently inserted SIM, the mobile terminal will activate the binding function, and the mobile terminal does not except the SIM card inserted by the current user. Support other SIM cards, unless the user separately sets the binding relationship with other SIM cards.
  • the SIMI of the mobile terminal is bound to the set SIM card, and when the SIM card inserted in the mobile terminal is a non-set SIM card, the access network service for the non-set SIM card is refused.
  • the SIMI binding with the set SIM card and the binding of the mobile terminal to the set SIM card are exactly the same, and will not be described here.
  • the mobile terminal In order to prevent the mobile terminal user from operating incorrectly or forgetting the password, the mobile terminal enters the anti-theft state and cannot enter the normal state.
  • the screen of the mobile terminal After the mobile terminal of the present invention is powered on or re-powered, the screen of the mobile terminal is automatically locked. That is, after powering on or re-powering, it will automatically enter the lock screen state. After the user unlocks the screen lock password, it can enter the normal working state.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Description

防盗移动终端及移动终端的防盗方法 技术领域
本发明涉及移动终端的防盗技术, 尤其涉及一种防盗移动终端及移动 终端的防盗方法。 背景技术
移动终端在使用过程中, 由于系统的复杂性和应用程序的多样化, 已 经越来越接近日常使用的个人电脑了。 由于移动终端的便携性, 用户往往 习惯于将重要的个人信息和文件存储在移动终端中, 尤其是对于商务移动 终端而言, 更存储着非常重大的信息。 由于移动终端的便携性, 其丢失的 概率也大大增加, 不少移动终端用户都有遗失移动终端的经历。 一旦移动 终端遗失, 可能会对用户造成极大的经济损失, 因此, 一旦移动终端遗失, 用户都想在保护个人信息的前提下, 追回被盗移动终端。 目前的移动终端 显然不具备此功能。
现如今, 移动终端常用防盗方法主要有如下几种:
1、 通过设置移动终端套来防盗。 具体的, 为移动终端设置外套, 并在 移动终端外套上设置连接链, 通过连接链拴在用户的衣物上防盗。 这种方 式虽然能降低移动终端被盗的几率, 一旦移动终端丢失, 用户将束手无策。
2、 通过在移动终端内置机械锁实现防盗。 在移动终端内设计一个机械 的加锁装置, 一般的锁定装置包括锁闩、 锁体、 弹簧、 电磁线圈、 铁芯和 与电池板连接为一体锁舌板等, 这种方式结构复杂, 很难在移动终端狭小 的结构空间内实现, 同时, 机械锁的方式很容易被专业开锁人员破解, 不 具有很强的防盗意义。
3、通过移动终端开机密码实现,一般是通过四位的开机 PN码来加密, 这种防盗方式的好处是简单方便, 但破解起来也相对容易, 通过专业的破 解软件, 或者重新刷机, 即可实现系统的清零设置, 所以安全性上也存在 很大的隐患。
4、 在移动终端被盗后以短信方式回传移动终端中的相关信息, 将用户 的通讯录等设定存储区中存储的重要信息回传到失主的新移动终端上, 这 种方式虽然可以很大程度地挽回用户个人联系方式, 但是也存在一定的限 制, 比如用户不能在移动终端断电情况下执行信息的回传, 也不能在移动 终端更换用户身份识别模块( SIM, Subscriber Identity Module )卡的情况下 执行信息的回传。 发明内容
有鉴于此, 本发明的主要目的在于提供一种防盗移动终端及移动终端 的防盗方法, 能在移动终端被盗后取回移动终端相关信息, 并能准确定位 该被盗移动终端。
为达到上述目的, 本发明的技术方案是这样实现的:
一种防盗移动终端, 包括设置单元、 加密模块、 密码臉证模块、 检测 模块、 电源管理模块、 信息回传模块、 信息删除模块和定位模块; 其中: 设置单元, 用于为移动终端设置国际移动用户识别码 SIMI;
加密模块, 用于设置移动终端的锁屏密码以及信息回传验证密码; 密码验证模块, 用于对用户输入的解除屏幕锁定密码进行验证, 臉证 通过后解除屏幕的锁定;
检测模块,用于对移动终端的电池及 SIM卡进行检测,在 SIM卡拔出、 电池拔出或电池无电超出设定时长时, 触发电源管理模块对电源进行管理; 电源管理模块, 用于停止移动终端电池的供电功能, 启用备用电源向 信息回传模块、 信息删除模块、 定位模块及 SIMI供电;
信息回传模块, 用于接收其他移动终端发送的信息回传验证密码后进 行脸证, 通过时将移动终端中设定存储区中的信息回传至所述其他移动终 端;
信息删除模块, 用于在所述设定存储区删除所述信息回传模块已回传 的信息;
定位模块, 用于对移动终端进行定位, 并定时将定位信息发送给网络 侧或指定的移动终端。
优选地, 所述移动终端还包括:
SIM卡绑定模块, 用于将设定的 SIM卡与移动终端进行绑定, 在移动 终端中插入的 SIM卡为非设定 SIM卡时,拒绝为非设定 SIM卡提供接入网 络服务。
优选地, 所述 SIM卡绑定模块进一步将 SIMI与设定的 SIM卡进行绑 定。
优选地, 所述密码脸证模块在臉证次数超出设定阈值时, 触发电源管 理模块对电源进行管理, 并在移动终端重新开机或重新上电后启动。
优选地, 所述电源管理模块在移动终端的电池正常供电时, 不向信息 回传模块、 信息删除模块、 定位模块及 SIMI供电。
一种移动终端的防盗方法, 设置移动终端的锁屏密码以及信息回传验 证密码; 为移动终端设置 SIMI; 所述方法还包括:
移动终端锁屏后, 接收用户输入的解除屏幕锁定密码并对其进行驗证, 验证通过后解除屏幕的锁定; 检测到移动终端的 SIM卡拔出、 电池拔出或 电池无电超出设定时长时, 停止移动终端的电池供电, 启用备用电源, 移 动终端进入自动运行状态, 将移动终端的 SIMI作为通信的身份标识; 所述 自动运行状态包含: 接收到其他移动终端发送的信息回传验证密码后进行 验证, 通过时将移动终端中设定存储区中的信息回传至所述其他移动终端, 并在所述设定存储区删除所述信息回传模块已回传的信息; 以及, 启动移 动终端中的自动定位功能, 定时将移动终端当前的定位信息发送给网络侧 或指定的移动终端。
优选地, 所述方法还包括:
将设定的 SIM卡与移动终端进行绑定, 在移动终端中插入的 SIM卡为 非设定 SIM卡时, 拒绝为非设定 SIM卡提供接入网络服务。
优选地, 所述方法还包括:
将移动终端的 SIMI与设定的 SIM卡进行绑定,插入移动终端中的 SIM 卡为非设定 SIM卡时, 拒绝为非设定 SIM卡提供接入网络服务。
优选地, 所述方法还包括:
密码验证错误且超出设定阈值次数时, 停止移动终端的电池供电, 启 用备用电源, 移动终端进入自动运行状态; 移动终端重新开机或重新上电 后, 自动锁定移动终端的屏幕。
优选地, 所述方法还包括:
移动终端中的 SIM卡或电池被拔出超出设定时长时, 移动终端启用备 用电源, 进入自动运行状态。
本发明中, 通过在移动终端中另外设置 SIMI、 密码设置模块、 定位模 块以及备用电源等, 在移动终端被盗时或在锁屏密码输入多次后, 移动终 端将停止移动终端电池的供电, 启用备用电源, 进入自动运行状态, 即移 动终端进入防盗状态, 此时, 备用电源将仅向与防盗状态相关的模块进行 供电。 这样, 在接收到用户通过其他移动终端发送的信息回传后, 对请求 输入的密码进行检证, 通过后将在设定存储区中存储的相关信息发送给请 求的移动终端上。 同时, 被盗移动终端的定位模块将启动, 自动对该移动 终端进行定位, 并将定位信息发送到网络侧或指定的移动终端。 这样, 在 移动终端遗失后, 即可实现对该遗失移动终端的准确定位; 通过其他移动 终端用户向该遗失的移动终端发送信息回传的密码即可, 睑证通过后, 遗 失的移动终端将设定存储区中的相关信息回传给请求的其他移动终端。 本 发明最大可能地减少了移动终端用户遗失移动终端的损失。 附图说明
图 1为本发明防盗移动终端的组成结构示意图;
图 2为本发明防盗移动终端的另一组成结构示意图;
图 3为本发明移动终端的防盗方法的流程图。 具体实施方式
本发明的基本思想是: 通过在移动终端中另外设置 SIMI、 密码设置模 块、 定位模块以及备用电源等, 在移动终端被盗时或在锁屏密码输入多次 后, 移动终端将停止移动终端电池的供电, 启用备用电源, 进入自动运行 状态, 即移动终端进入防盗状态, 此时, 备用电源将仅向与防盗状态相关 的模块进行供电。 这样, 在接收到用户通过其他移动终端发送的信息回传 后, 对请求输入的密码进行臉证, 通过后将在设定存储区中存储的相关信 息发送给请求的移动终端上。 同时, 被盗移动终端的定位模块将启动, 自 动对该移动终端进行定位, 并将定位信息发送到网络侧或指定的移动终端。
图 1 为本发明移动终端复位装置的组成结构示意图, 如图 1所示, 本 示例防盗移动终端包括设置单元 10、 加密模块 11、 密码验证模块 12、 检测 模块 18、 电源管理模块 13、 信息回传模块 14、 信息删除模块 15和定位模 块 16; 其中,
设置单元 10, 用于为移动终端设置 SIMI。 用于在移动终端遗失而进入 防盗状态时, 启用该 SIMI作为与该遗失移动终端的身份标识, 从而实现与 该移动终端的相关通信。
加密模块 11 , 用于设置移动终端的锁屏密码以及信息回传验证密码; 这里, 锁屏密码及信息回传验证密码可以是任意位的密码, 可以是数字或 字符组合, 由用户在移动终端启动后自行设置。 锁屏密码即是锁定移动终 端的屏幕后需要输入相应的密码来解除屏幕锁定。 而信息回传验证密码则 是在接收到信息回传的请求后, 臉证请求方是否是合法用户的密码, 验证 密码输入正确即认为信息回传请求是合法的。
密码验证模块 12, 用于对用户输入的解除屏幕锁定密码进行验证, 验 证通过后解除屏幕的锁定, 并在脸证次数超出设定阈值时, 触发电源管理 模块对电源进行管理; 这里, 可以设置锁屏验证密码的验证阈值次数为 6 次, 即在移动终端用户输入的解除屏幕锁定密码连续错误 6次后, 移动终 端进入自动运行状态, 即进入防盗状态。 当检测到移动终端的电池或 SIM 卡被取下后超出设定时长后, 移动终端进入自动运行状态。 这里的设定时 长可以是 1小时、 2小时或 24小时、 一星期等, 该时长由移动终端用户设 定。
本发明中, 密码脸证模块 12在移动终端重新开机或重新上电后启动, 即在移动终端重新开机或重新上电后, 认为是正常的开机行为, 提示用户 输入解除屏幕锁定密码。
检测模块 18, 用于对移动终端的电池及 SIM卡进行检测, 在 SIM卡拔 出、 电池拔出或电池无电超出设定时长时, 触发电源管理模块 13对电源进 行管理。 检测模块 18的设置, 主要是防止移动终端被盗后, 小偷一般会将 移动终端的 SIM卡拔出、 或将移动终端的电池拔出或将移动终端关机等, 这样, 移动终端用户将不能与该移动终端进行通信, 从而无法找到自己的 移动终端。 针对现有移动终端的这一缺点, 本发明的移动终端中设置有检 测模块 18, 检测到移动终端的电池不能供电超出设定时长时, 或移动终端 的 SIM卡被拔出超出设定时长时, 将自动启动备用电源, 使移动终端处于 防盗状态。 这里的设定时长可以是半小时、 20分钟或一天等。
电源管理模块 13 , 用于停止移动终端电池的供电, 启用备用电源向信 息回传模块 14、 信息删除模块 15、 定位模块 16及 SIMI供电; 即当确定用 户输入的解除屏幕锁定密码的脸证次数超出设定阈值时, 自动切断移动终 端中的电池, 不再向相应的处理单元供电, 移动终端进入如现有移动终端 的关机状态。 本发明中, 备用电源与移动终端的电池连接, 在移动终端正 常工作状态下, 移动终端的电池向备用电池进行充电, 而一旦移动终端的 电池不再工作, 备用电池将被启用, 向移动终端中的防盗状态的相关模块 进行供电, 以实现本发明中移动终端的防盗功能。 以下具体说明本发明中 的移动终端是如何实现防盗功能的。
电源管理模块 13在移动终端的电池正常供电时,不向信息回传模块 14、 信息删除模块 15、 定位模块 16及 SIMI供电。
信息回传模块 14, 用于接收其他移动终端发送的信息回传验证密码后 进行驗证, 通过时将移动终端中设定存储区中的信息回传至所述其他移动 终端。 当移动终端用户确定自己的移动终端遗失时, 可通过任意的其他移 动终端向遗失的移动终端发送信息回传的请求, 具体的, 该请求是以短消 息的模式向遗失的移动终端发送该请求, 该信息回传的请求的内容为遗失 移动终端用户之前设置的信息回传脸证密码, 遗失的移动终端启动自动运 行模式后, 一旦接收到短消息, 将默认为是信息回传验证密码, 提取短消 息的内容, 与遗失移动终端中存储的信息回传臉证密码进行比对, 一致时, 将自动将遗失移动终端中设定存储区中存储的相关信息发送到发送请求的 其他移动终端中。 具体的, 上述的设定存储区可以是通讯录存储区, 短消 息存储区, 以及用户个人信息存储区等。 这里, 由于遗失的移动终端已进 入防盗状态, 因此, 之前移动终端中的 SIM卡已不再工作, 因此, 欲实现 对遗失移动终端信息回传的请求, 必须将遗失移动终端中设置的 SIMI作为 身份标识, 即此时的移动终端处于支持 SIMI的网络环境下, 可以接收其他 用户终端的短消息等。 信息删除模块 15 , 用于在所述设定存储区删除所述信息回传模块已回 传的信息。 当信息回传模块 14已向其他移动终端回传设定存储区中的相关 信息后, 信息删除模块 15将删除这些信息。 这样, 即使在遗失移动终端的 锁屏密码被其他人破译后, 也不能看到这些信息, 有效地保护了移动终端 用户的个人隐私。
定位模块 16, 用于对移动终端进行定位, 并定时将定位信息发送给网 络侧或指定的移动终端。 本发明中, 定位模块 16 可由全球卫星定位系统 ( GPS, Global Positioning System )定位仪来实现或相应的处理器实现。 在 移动终端中实现移动终端的 GPS定位功能, 是容易实现的。 本发明中的定 位单元 12也可以是地理信息系统(GIS, Geographic Information System ) 定位仪, 具体的, 通过移动终端向网络侧上报信息的基站位置信息, 以及 移动终端向基站发送信号的角度及信号功率等, 确定出移动终端的位置信 息。 本发明中, 当定位模块 16被启动后, 将自动实现对移动终端的定位, 并将定位结果上报至网络侧或指定的移动终端中。 这样, 一旦移动终端遗 失, 可以向相关人员提供遗失移动终端当前的位置信息, 为寻找到遗失的 移动终端提供了依据。
图 2为本发明防盗移动终端的另一组成结构示意图, 如图 2所示, 在 图 1所示移动终端的基础上, 本示例防盗移动终端还包括:
SIM卡绑定模块 17, 用于将设定的 SIM卡与移动终端进行绑定, 在移 动终端中插入的 SIM卡为非设定 SIM卡时,拒绝为非设定 SIM卡提供接入 网络服务。 这里, SIM卡绑定模块 17的功能可以由用户设置, 例如用户选 择将当前的移动终端与当前插入的 SIM绑定的功能时, 移动终端将启动这 种绑定功能,除了当前用户插入的 SIM卡外,移动终端不再支持其他的 SIM 卡, 除非用户另行设定与其他 SIN卡的绑定关系。
或者,所述 SIM卡绑定模块进一步将 SIMI与设定的 SIM卡进行绑定, 在移动终端中插入的 SIM卡为非设定 SIM卡时,拒绝为非设定 SIM卡提供 接入网络服务。将 SIMI与 SIM卡进行绑定的原理与前述与移动终端绑定的 原理及实现方式完全相同。
图 3为本发明移动终端的防盗方法的流程图, 如图 3所示, 本发明移 动终端的防盗方法包括以下步骤:
步骤 301 : 设置移动终端的锁屏密码以及信息回传验证密码; 为移动终 端设置 SIMI。
本步驟中, 在移动终端进入正常的运行状态后, 通过相应的设置功能 设置锁屏密码以及信息回传臉证密码, 这些密码是用户自行设定的 , 可以 是数字或 /及字符组合。 SIMI的设置, 相当于为移动终端设置另一种网络接 入模式, 该模式在移动终端正常工作时并不启用, 而是在移动终端进入防 盗状态时才会启用。 也就是说, 本发明的移动终端支持多模功能, 但实际 工作时只能选用启用一种单模方式, 即要么启用 SIMI支持的网络功能(防 盗状态下)或 SIM卡支持的网络功能 (正常工作时)。
步骤 302: 移动终端锁屏后,接收用户输入的解除屏幕锁定密码并对其 进行验证, 验证通过后解除屏幕的锁定, 若密码验证错误且超出设定阈值 次数时, 停止移动终端的电池供电, 启用备用电源, 移动终端进入自动运 行状态, 并将移动终端的 SIMI作为通信的身份标识。 这里, 移动终端进入 自动运行状态即进入防盗状态。
当用户输入的锁屏密码错误超出设定阈值次数时, 移动终端将自动进 入防盗状态, 即此时移动终端表现出关机状态, 关闭 SIM卡支持的网络功 能, 转而启动移动终端中的 SIMI支持的网络功能。 实际上, 此时的移动终 端借助备用电源的帮助, 仍支持网络通讯功能, 只是这种状态不再受用户 控制。
需要说明的是,当移动终端中的 SIM卡或电池被拔出超出设定时长时, 或移动终端的电池不能供电如关机或电池故障等超出设定时长时, 移动终 端也会进入自动运行状态, 即进入防盗状态。 这里的设定时长可以是半 d、 时、 20分钟或一天等。
这里, 所述自动运行状态包含: 接收到其他移动终端发送的信息回传 验证密码后进行^正, 通过时将移动终端中设定存储区中的信息回传至所 述其他移动终端, 并在所述设定存储区删除所述信息回传模块已回传的信 息; 以及, 启动移动终端中的自动定位功能, 定时将移动终端当前的定位 信息发送给网络侧或指定的移动终端。
本发明中, 除上述的步骤 301及步骤 302外, 还包括: 将设定的 SIM 卡与移动终端进行绑定, 在移动终端中插入的 SIM卡为非设定 SIM卡时, 拒绝为非设定 SIM卡提供接入网络服务。 这里, 可以由用户设置该功能, 例如用户选择将当前的移动终端与当前插入的 SIM绑定的功能时, 移动终 端将启动这种绑定功能, 除了当前用户插入的 SIM卡外, 移动终端不再支 持其他的 SIM卡, 除非用户另行设定与其他 SIM卡的绑定关系。
或者,将移动终端的 SIMI与设定的 SIM卡进行绑定,插入移动终端中 的 SIM卡为非设定 SIM卡时,拒绝为非设定 SIM卡提供接入网络服务。 SIMI 与设定的 SIM卡绑定和移动终端与设定的 SIM卡绑定是完全相同的, 这里 不再赘述。
为避免移动终端用户的操作失误或忘记密码导致移动终端进入防盗状 态而不能转入正常状态, 本发明的移动终端重新开机或重新上电后, 自动 锁定移动终端的屏幕。 即在开机或重新上电后, 将自动进入锁定屏幕状态, 用户输入的解除屏幕锁定密码正确后, 即可进入正常的工作状态。
以上所述, 仅为本发明的较佳实施例而已, 并非用于限定本发明的保 护范围。

Claims

权利要求书
1、 一种防盗移动终端, 其特征在于, 所述移动终端包括设置单元、 加 密模块、 密码验证模块、 检测模块、 电源管理模块、 信息回传模块、 信息 删除模块和定位模块; 其中:
设置单元, 用于为移动终端设置国际移动用户识别码 SIMI;
加密模块, 用于设置移动终端的锁屏密码以及信息回传验证密码; 密码验证模块, 用于对用户输入的解除屏幕锁定密码进行验证, 验证 通过后解除屏幕的锁定;
检测模块,用于对移动终端的电池及 SIM卡进行检测,在 SIM卡拔出、 电池拔出或电池无电超出设定时长时, 触发电源管理模块对电源进行管理; 电源管理模块, 用于停止移动终端电池的供电功能, 启用备用电源向 信息回传模块、 信息删除模块、 定位模块及 SIMI供电;
信息回传模块, 用于接收其他移动终端发送的信息回传验证密码后进 行验证, 通过时将移动终端中设定存储区中的信息回传至所述其他移动终 端;
信息删除模块, 用于在所述设定存储区删除所述信息回传模块已回传 的信息;
定位模块, 用于对移动终端进行定位, 并定时将定位信息发送给网络 侧或指定的移动终端。
2、 根据权利要求 1所述的移动终端, 其特征在于, 所述移动终端还包 括:
SIM卡绑定模块, 用于将设定的 SIM卡与移动终端进行绑定, 在移动 终端中插入的 SIM卡为非设定 SIM卡时,拒绝为非设定 SIM卡提供接入网 络服务。
3、 根据权利要求 2所述的移动终端, 其特征在于, 所述 SIM卡绑定模 块进一步将 SIMI与设定的 SIM卡进行绑定。
4、 根据权利要求 1所述的移动终端, 其特征在于, 所述密码验证模块 进一步在脸证次数超出设定阈值时, 触发电源管理模块对电源进行管理, 并在所述移动终端重新开机或重新上电后启动。
5、 一种移动终端的防盗方法, 其特征在于, 设置移动终端的锁屏密码 以及信息回传脸证密码; 为移动终端设置 SIMI; 所述方法还包括:
移动终端锁屏后, 接收用户输入的解除屏幕锁定密码并对其进行验证, 脸证通过后解除屏幕的锁定; 检测到移动终端的 SIM卡拔出、 电池拔出或 电池无电超出设定时长时, 停止移动终端的电池供电, 启用备用电源, 移 动终端进入自动运行状态, 将移动终端的 SIMI作为通信的身份标识; 所述 自动运行状态包含: 接收到其他移动终端发送的信息回传验证密码后进行 验证, 通过时将移动终端中设定存储区中的信息回传至所述其他移动终端, 并在所述设定存储区删除所述信息回传模块已回传的信息; 启动移动终端 中的自动定位功能, 定时将移动终端当前的定位信息发送给网络侧或指定 的移动终端。
6、 根据权利要求 5所述的方法, 其特征在于, 所述方法还包括: 将设定的 SIM卡与移动终端进行绑定, 在移动终端中插入的 SIM卡为 非设定 SIM卡时, 拒绝为非设定 SIM卡提供接入网络服务。
7、 根据权利要求 5或 6所述的方法, 其特征在于, 所述方法还包括: 将移动终端的 SIMI与设定的 SIM卡进行绑定,插入移动终端中的 SIM 卡为非设定 SIM卡时, 拒绝为非设定 SIM卡提供接入网络服务。
8、 根据权利要求 5所述的方法, 其特征在于, 所述方法还包括: 所述移动终端密码验证错误且超出设定阈值次数时, 停止移动终端的 电池供电, 启用备用电源, 移动终端进入自动运行状态; 移动终端重新开 机或重新上电后, 自动锁定移动终端的屏幕。
9、 根据权利要求 5所述的方法, 其特征在于, 所述方法还包括: 移动终端中的 SIM卡或电池被拔出超出设定时长时, 移动终端启用备 用电源, 进入自动运行状态。
PCT/CN2010/073841 2010-01-21 2010-06-11 防盗移动终端及移动终端的防盗方法 WO2011088652A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US13/258,287 US8811949B2 (en) 2010-01-21 2010-06-11 Anti-theft mobile terminal and anti-theft method for mobile terminal
EP10843692.4A EP2503806B1 (en) 2010-01-21 2010-06-11 Anti-theft mobile terminal and anti-theft method for mobile terminal

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201010001657.1 2010-01-21
CN201010001657.1A CN101772018B (zh) 2010-01-21 2010-01-21 防盗移动终端及移动终端的防盗方法

Publications (1)

Publication Number Publication Date
WO2011088652A1 true WO2011088652A1 (zh) 2011-07-28

Family

ID=42504538

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2010/073841 WO2011088652A1 (zh) 2010-01-21 2010-06-11 防盗移动终端及移动终端的防盗方法

Country Status (4)

Country Link
US (1) US8811949B2 (zh)
EP (1) EP2503806B1 (zh)
CN (1) CN101772018B (zh)
WO (1) WO2011088652A1 (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103164736A (zh) * 2011-12-16 2013-06-19 国民技术股份有限公司 一种智能卡电源控制系统及其实现方法
CN104349452A (zh) * 2013-07-24 2015-02-11 中国电信股份有限公司 一种定位手机的方法和系统
WO2019041356A1 (zh) * 2017-09-04 2019-03-07 深圳传音通讯有限公司 终端断电处理方法、设备及计算机可读存储介质

Families Citing this family (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101951548B (zh) * 2010-09-03 2014-04-16 惠州Tcl移动通信有限公司 用于追踪失窃通信终端的系统和方法及通信终端
US9143910B2 (en) * 2011-09-30 2015-09-22 Blackberry Limited Method and system for remote wipe through voice mail
CN102495983B (zh) * 2011-12-08 2014-08-27 孙紫阳 一种智能移动终端数据实时加密和解密的方法
CN103458394A (zh) * 2012-05-28 2013-12-18 中兴通讯股份有限公司 移动终端内部信息的处理方法、装置及移动终端
CN102800167A (zh) * 2012-08-21 2012-11-28 广州市渡明信息技术有限公司 一种移动设备及防盗方法
CN103905626A (zh) * 2012-12-28 2014-07-02 联芯科技有限公司 移动终端及其防盗操作方法
CN104182706B (zh) * 2013-05-24 2019-01-04 中兴通讯股份有限公司 一种移动终端存储卡的保密方法、装置及移动终端
US10079830B2 (en) * 2014-04-17 2018-09-18 Viavi Solutions Inc. Lockable network testing device
US9363673B2 (en) 2014-08-04 2016-06-07 Google Technology Holdings LLC Subscriber identity module control in a portable communication device
US9524172B2 (en) * 2014-09-29 2016-12-20 Bank Of America Corporation Fast start
CN104284026A (zh) * 2014-10-08 2015-01-14 宁夏天纵泓光余热发电技术有限公司 带有安防功能的手机
EP3229448B1 (en) * 2014-12-30 2020-02-19 Huawei Technologies Co., Ltd. Method for preventing loss of terminal, and terminal
CN105049424A (zh) * 2015-06-29 2015-11-11 深圳市美贝壳科技有限公司 一种网络终端防盗方法、系统及装置
CN105184184A (zh) * 2015-08-06 2015-12-23 上海与德通讯技术有限公司 一种终端数据的防窃方法
CN106101193B (zh) * 2016-05-30 2020-05-12 Oppo广东移动通信有限公司 信息的备份方法、终端设备、运营商服务器、及备份系统
US10178625B2 (en) * 2016-07-07 2019-01-08 Tile, Inc. Power Preservation in GPS-Equipped Tracking Devices
CN106529232A (zh) * 2016-10-19 2017-03-22 广东欧珀移动通信有限公司 开机启动方法及装置
CN106529262A (zh) * 2016-10-31 2017-03-22 维沃移动通信有限公司 一种移动终端的数据保护方法和移动终端
CN106488558A (zh) * 2016-11-14 2017-03-08 刘兰平 手机信号定位方法及装置
CN209312029U (zh) 2017-06-04 2019-08-27 苹果公司 电子装置
CN107370872A (zh) * 2017-06-09 2017-11-21 深圳市金立通信设备有限公司 一种终端锁机和控制终端锁机的方法、终端及控制设备
CN107172602B (zh) * 2017-06-27 2021-08-10 上海展扬通信技术有限公司 移动终端的数据安全防护方法和装置
CN107623899B (zh) * 2017-09-12 2020-12-15 Oppo广东移动通信有限公司 信息处理方法、装置、存储介质以及电子设备
CN107748852A (zh) * 2017-10-11 2018-03-02 上海展扬通信技术有限公司 一种智能终端的屏幕控制方法及屏幕控制系统
CN107729171B (zh) * 2017-10-30 2023-06-02 努比亚技术有限公司 Usb接口的自适应激活方法、装置、终端设备及存储介质
CN109842714B (zh) * 2017-11-24 2021-06-15 奇酷互联网络科技(深圳)有限公司 防盗处理方法、装置和移动终端
KR102440157B1 (ko) * 2017-12-29 2022-09-05 삼성전자주식회사 전자 장치 및 이의 디스플레이 방법
WO2020142864A1 (en) * 2019-01-07 2020-07-16 Citrix Systems, Inc. Subscriber identity management
CN110475022A (zh) * 2019-08-16 2019-11-19 珠海格力电器股份有限公司 一种找回遗失的终端的方法及装置
CN115706747A (zh) * 2021-08-05 2023-02-17 北京小米移动软件有限公司 终端控制方法及装置、电子设备、计算机可读存储介质
CN115037453B (zh) * 2021-11-19 2023-04-07 荣耀终端有限公司 数据保护方法、系统及电子设备
WO2023169545A1 (zh) * 2022-03-11 2023-09-14 华为技术有限公司 离线设备控制方法及相关装置

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1859670A (zh) * 2005-09-21 2006-11-08 华为技术有限公司 一种具有防盗功能的移动终端和移动终端防盗的方法
CN100473194C (zh) * 2007-04-25 2009-03-25 中兴通讯股份有限公司 一种手机防盗的方法
CN101568119A (zh) * 2008-04-24 2009-10-28 鸿富锦精密工业(深圳)有限公司 具防盗功能的移动终端及其防盗方法

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7137003B2 (en) * 2001-02-27 2006-11-14 Qualcomm Incorporated Subscriber identity module verification during power management
JP3840446B2 (ja) * 2002-11-26 2006-11-01 株式会社バッファロー 伝搬環境検知技術
CN101199221B (zh) * 2005-04-29 2013-01-09 意大利电信股份公司 由无线通信终端中的sim卡管理外设单元的方法及实施该方法的外设单元
US8515390B2 (en) * 2007-10-05 2013-08-20 Mformation Software Technologies, Inc. System and method for protecting data in wireless devices
CN101459721A (zh) * 2007-12-11 2009-06-17 上海晨兴电子科技有限公司 手机防盗追踪的方法和装置
CN101626541A (zh) * 2008-07-08 2010-01-13 鸿富锦精密工业(深圳)有限公司 移动通信装置及其位置报告方法
CN101610500A (zh) * 2009-07-23 2009-12-23 中兴通讯股份有限公司 手机数据找回方法、手机和手机数据找回系统

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1859670A (zh) * 2005-09-21 2006-11-08 华为技术有限公司 一种具有防盗功能的移动终端和移动终端防盗的方法
CN100473194C (zh) * 2007-04-25 2009-03-25 中兴通讯股份有限公司 一种手机防盗的方法
CN101568119A (zh) * 2008-04-24 2009-10-28 鸿富锦精密工业(深圳)有限公司 具防盗功能的移动终端及其防盗方法

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2503806A4 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103164736A (zh) * 2011-12-16 2013-06-19 国民技术股份有限公司 一种智能卡电源控制系统及其实现方法
CN104349452A (zh) * 2013-07-24 2015-02-11 中国电信股份有限公司 一种定位手机的方法和系统
WO2019041356A1 (zh) * 2017-09-04 2019-03-07 深圳传音通讯有限公司 终端断电处理方法、设备及计算机可读存储介质

Also Published As

Publication number Publication date
EP2503806B1 (en) 2015-05-20
CN101772018A (zh) 2010-07-07
EP2503806A1 (en) 2012-09-26
CN101772018B (zh) 2016-03-30
US8811949B2 (en) 2014-08-19
EP2503806A4 (en) 2014-05-21
US20120244839A1 (en) 2012-09-27

Similar Documents

Publication Publication Date Title
WO2011088652A1 (zh) 防盗移动终端及移动终端的防盗方法
CN102693381B (zh) 一种便携计算机设备的防盗方法、装置和系统
CN101252703B (zh) 一种终端资料的保护方法、系统以及移动通信终端
TWI225211B (en) Security system for preventing a personal computer from being stolen or used by unauthorized people
US20050221800A1 (en) Method for remote lockdown of a mobile computer
JP2004102682A (ja) 端末ロックシステムおよび端末ロック方法
WO2013107395A1 (zh) 手机防盗保护方法及装置
US20030065934A1 (en) After the fact protection of data in remote personal and wireless devices
US20090183266A1 (en) Method and a system for recovering a lost or stolen electronic device
CN105530356A (zh) 移动通讯终端及其数据保护方法和装置
CN103455771A (zh) 用于远程启动计算装置上的丢失模式的系统和方法
WO2014079139A1 (zh) 一种移动终端数据的保护方法及系统
CN102084370A (zh) 用于缓解对设备的未授权使用的系统
CN101400163B (zh) 防止手机未授权使用的方法及其手机
EP1901577B1 (en) Apparatus and method for controlling bluetooth in portable terminal
US20090151005A1 (en) Method for identity theft protection with self-destructing information
WO2010060242A1 (zh) 一种移动终端的鉴权方法及系统
CN109460648B (zh) 一种计算机数据防御方法
US20150094023A1 (en) Retroactively Securing a Mobile Device From a Remote Source
WO2016115760A1 (zh) 一种终端系统的控制方法、装置和终端
EP2618264A1 (en) Method for clearing computer data and computer
WO2012122752A1 (zh) 一种将终端与智能卡锁定或解锁的方法及装置
WO2011140756A1 (zh) 移动终端、移动终端数据保护方法以及移动终端监控系统
WO2010133108A1 (zh) 找回移动终端中flash数据的方法和系统及移动终端
JP2006172074A (ja) プログラム、履歴管理サーバ、及び履歴管理方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10843692

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2010843692

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 13258287

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: DE