WO2013107395A1 - 手机防盗保护方法及装置 - Google Patents

手机防盗保护方法及装置 Download PDF

Info

Publication number
WO2013107395A1
WO2013107395A1 PCT/CN2013/070717 CN2013070717W WO2013107395A1 WO 2013107395 A1 WO2013107395 A1 WO 2013107395A1 CN 2013070717 W CN2013070717 W CN 2013070717W WO 2013107395 A1 WO2013107395 A1 WO 2013107395A1
Authority
WO
WIPO (PCT)
Prior art keywords
theft
mobile phone
instruction
command
theft protection
Prior art date
Application number
PCT/CN2013/070717
Other languages
English (en)
French (fr)
Inventor
王庆
罗章虎
黄泽丰
郭浩然
肖权浩
袁宜霞
宋家顺
李朋涛
戴云峰
Original Assignee
腾讯科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 腾讯科技(深圳)有限公司 filed Critical 腾讯科技(深圳)有限公司
Priority to SG11201404008YA priority Critical patent/SG11201404008YA/en
Priority to EP13738538.1A priority patent/EP2806666A4/en
Priority to JP2014552502A priority patent/JP5893169B2/ja
Priority to IN6215DEN2014 priority patent/IN2014DN06215A/en
Publication of WO2013107395A1 publication Critical patent/WO2013107395A1/zh
Priority to US14/332,718 priority patent/US9723482B2/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/183Processing at user equipment or user record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/082Access security using revocation of authorisation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • H04W8/24Transfer of terminal data
    • H04W8/245Transfer of terminal data from a network towards a terminal

Definitions

  • the present invention relates to the field of information processing technologies, and in particular, to a mobile phone anti-theft protection method and device. Background technique
  • the prior art provides a mobile phone anti-theft protection method.
  • the user realizes that the mobile phone is stolen or lost, the user sends an anti-theft protection command to the stolen mobile phone, and the stolen mobile phone receives and executes the anti-theft protection command to achieve the purpose of the mobile phone anti-theft protection.
  • the user can send the anti-theft protection command to the stolen mobile phone in the form of short message, such as sending the message "open anti-theft mode", "display mandatory information”, "delete SMS" to the stolen mobile phone, correspondingly, the stolen mobile phone performs the opening Anti-theft mode, display mandatory information, and delete SMS actions.
  • the embodiment of the invention provides a mobile phone anti-theft protection method and device.
  • the technical solution is as follows:
  • the embodiment of the present invention provides a mobile phone theft protection method, where the method includes:
  • the determining whether the mobile phone meets the preset anti-theft mode activation condition includes: Determining whether the current user data matches the pre-stored user data, if not, prompting the user to input an anti-theft command, and determining whether the user is legal according to the anti-theft command input by the current user, and if not, satisfying the anti-theft mode start condition ;
  • the starting the anti-theft mode specifically includes:
  • the method further includes:
  • the method further includes:
  • the anti-theft protection information includes an anti-theft protection command and a transmission form of the instruction, and the designated contact performs anti-theft processing on the mobile phone, specifically:
  • the anti-theft protection information includes a website, and the website corresponding to the website is used to save the anti-theft protection instruction and the transmission form of the instruction, and the designated contact performs anti-theft processing on the mobile phone, specifically including
  • the anti-theft protection instruction specifically includes:
  • the embodiment of the present invention further provides a mobile phone anti-theft protection device, where the device includes:
  • a judging module configured to determine whether the mobile phone meets a preset anti-theft mode activation condition
  • a startup module configured to start an anti-theft mode when the judgment result of the determining module is that the anti-theft mode startup condition is met
  • a sending module configured to send the anti-theft protection information to the designated contact after the startup module starts the anti-theft mode, Notifying the designated contact to perform anti-theft processing on the mobile phone.
  • the determining module specifically includes:
  • a first determining unit configured to determine whether the current user data matches the pre-stored user data
  • a prompting unit when the determining result of the first determining unit is that the current user data does not match the pre-stored user data, prompting the user to input an anti-theft instruction
  • a second determining unit configured to determine, according to an anti-theft command input by the current user, whether the user is legal, and if not, satisfy the anti-theft mode starting condition
  • the third determining unit is configured to determine whether the remote anti-theft mode open command is received, and if received, satisfy the anti-theft mode start condition.
  • the startup module is specifically configured to perform a locking operation on the mobile phone when the determination result of the determining module is that the anti-theft mode activation condition is met, so that the current mobile phone user cannot operate the mobile phone.
  • the device further includes:
  • the anti-theft mode exiting module is configured to: after the startup module starts the anti-theft mode, obtain an unlocking instruction input by the current user, determine whether the unlocking instruction is correct, and if correct, exit the anti-theft mode;
  • the startup module starts the anti-theft mode, receiving a remote unlocking instruction, and exiting the anti-theft mode according to the remote unlocking instruction.
  • the device further includes:
  • the first instruction execution module is configured to execute a preset anti-theft protection command after the startup module starts the anti-theft mode.
  • the anti-theft protection information includes an anti-theft protection instruction and a transmission form of the instruction
  • the device further includes: a second instruction execution module, configured to: in the transmission form of the designated contact, the anti-theft protection instruction When the mobile phone is sent to the mobile phone, the anti-theft protection command is received, and the received anti-theft protection command is automatically executed.
  • the anti-theft protection information includes a web address, and the website corresponding to the website is used to save the anti-theft protection command and the instruction.
  • the device further includes:
  • a second instruction execution module configured to receive the anti-theft protection command when the designated contact sends the anti-theft protection command to the mobile phone according to the sending form of the instruction saved in the website corresponding to the web address, The received theft protection command is automatically executed.
  • the anti-theft protection instruction specifically includes:
  • the anti-theft protection information is sent to the designated contact to notify the designated contact to perform anti-theft processing on the mobile phone, so that the designated contact does not miss the anti-theft opportunity, which is beneficial for recovering the stolen mobile phone and can be effective. Reduce the leakage of user private information.
  • FIG. 1 is a flowchart of a method for protecting an antitheft device of a mobile phone according to Embodiment 1 of the present invention
  • FIG. 2 is a flowchart of a method for protecting an antitheft device of a mobile phone according to Embodiment 2 of the present invention
  • FIG. 3 is a schematic diagram of a built-in content forcible display screen in the second embodiment of the present invention.
  • FIG. 4 is a schematic diagram of a remote content forcible display screen in Embodiment 2 of the present invention.
  • FIG. 5 is a schematic structural diagram of a mobile phone anti-theft protection device according to Embodiment 3 of the present invention.
  • FIG. 6 is a schematic structural diagram of a mobile phone anti-theft protection device according to Embodiment 4 of the present invention. detailed description
  • This embodiment provides a mobile phone anti-theft protection method. Referring to FIG. 1, the method is as follows:
  • the anti-theft protection information includes an anti-theft protection instruction and a transmission form and/or a web address of the instruction, and the website corresponding to the website is used to save the anti-theft protection instruction and the transmission form of the instruction.
  • Embodiment 2 This embodiment provides a mobile phone anti-theft protection method. Referring to FIG. 2, the process of the method provided in this embodiment is specifically as follows: 201: Determine whether the mobile phone meets the preset anti-theft mode activation condition, and if not, activate the anti-theft mode.
  • the anti-theft mode before the anti-theft mode is activated, it is determined whether the anti-theft mode is activated according to the preset anti-theft mode activation condition.
  • the following two methods may be used to determine whether to activate the anti-theft mode, but it is not limited by the present invention.
  • the first manner it is determined whether the current user data matches the pre-stored user data. If the matching, the normal mode is started. If the matching does not match, the user is prompted to input an anti-theft command, and according to the anti-theft command input by the current user, whether the current user is legal, if legal, , the normal mode is started, and if it is not legal, the anti-theft mode start condition is met, and the anti-theft mode is started.
  • the user data and the anti-theft command are preset in the mobile phone and stored in the mobile phone.
  • the user data may be a mobile phone identification number, including a mobile phone number, a SIM (Subscriber Identity Module) card number, or a UIM (User Identity). Module, User Identification Module) Card number, IMSI (International Mobile Subscriber Identification Number) and other data identifying the identity of the user.
  • SIM Subscriber Identity Module
  • UIM User Identity
  • IMSI International Mobile Subscriber Identification Number
  • the user can also set other user data.
  • the mobile phone number in the SIM or UIM card and the mobile phone number saved by the mobile phone are read, and it is determined whether the mobile phone number in the read SIM or UIM card is consistent with the mobile phone number saved by the mobile phone, and if they are consistent, Start normal mode, if it is inconsistent, the phone locks and prompts the user to enter the anti-theft password;
  • Obtain the anti-theft password entered by the current user determine whether the anti-theft password entered by the current user is the same as the anti-theft password stored on the mobile phone, if the same, start the normal mode, If the current user enters an anti-theft password within a predetermined time or a predetermined number of times different from the anti-theft password stored on the mobile phone, the anti-theft mode is activated.
  • the second mode it is determined whether the remote anti-theft mode activation command is received. If it is received, the anti-theft mode activation condition is met, and the anti-theft mode is started according to the received remote anti-theft mode activation command.
  • the remote anti-theft mode open command is actively sent to the stolen mobile phone. Accordingly, if the stolen mobile phone receives the remote anti-theft mode open command, the anti-theft mode start condition is satisfied, according to The remote anti-theft mode on command turns on the anti-theft mode.
  • the user sends a remote anti-theft mode open command to the stolen mobile phone in the form of a short message.
  • a remote anti-theft mode open command For example, if the content is "X X X X, the anti-theft mode is turned on" to the stolen mobile phone, where X X X X indicates the anti-theft password.
  • the stolen mobile phone receives a text message with the content "X X X X Turns on the anti-theft mode"
  • the anti-theft mode is turned on.
  • the initiating anti-theft mode in this step specifically includes: performing a locking operation on the mobile phone, so that the current mobile phone user cannot operate the mobile phone.
  • the method further includes: executing a preset anti-theft protection command.
  • the preset anti-theft protection command includes a built-in content forced display instruction, a remote content forced display instruction, an upload user location information instruction, a replacement SIM card sending a short message instruction to the port, an automatic receiving incoming call instruction, an automatic front camera shooting instruction, and One or more of the specified data instructions are deleted/backed up, but are not intended to be limiting of the invention.
  • the original mobile phone pre-sets the built-in content forcibly displaying the command and sets the content forcibly displayed, and accordingly, executes the built-in content forcible display instruction, such as displaying the forcibly displayed content on the screen of the locked mobile phone.
  • the anti-theft protection information is used to enable the designated contact to send the anti-theft protection command to the stolen mobile phone according to the anti-theft protection information, specifically including the anti-theft protection instruction and the sending form and/or the website address of the instruction, wherein the website corresponding to the website uses In the form of sending the anti-theft protection command and the instruction, the website is automatically saved in the mobile phone when the original owner of the mobile phone is pre-stored in the mobile phone or when the anti-theft protection software is installed.
  • the sending form of the anti-theft protection command and the instruction may enable the designated contact to send the anti-theft protection command to the stolen mobile phone according to the sending form of the instruction.
  • the anti-theft protection information may also include other information, such as a specific description of each anti-theft protection instruction, a login account and password of the website corresponding to the website address, a current mobile phone number, a pre-set anti-theft protection command, and specific parameters or designated contacts.
  • the designated contact may be one or more contacts, which may be the original of the stolen mobile phone or other contacts, and the contact may correspond to multiple contact methods, including a mobile phone number and/or a mailbox, etc.
  • the stolen mobile phone sends the anti-theft protection information to the mobile phone number and/or mailbox corresponding to the designated contact.
  • the anti-theft protection command includes a built-in content forced display instruction, a remote content forced display instruction, an upload user location information command, a replacement SIM card to send a short message to the port, an automatic call incoming command, an automatic front camera shooting command, and a delete/backup designation.
  • One or more of the data instructions may also include other instructions.
  • the anti-theft protection information is used as an anti-theft protection command and a transmission form of the instruction is taken as an example for description. If the mobile phone locally stores the anti-theft protection instruction list and the transmission form of the instruction in various situations, correspondingly, the anti-theft protection instruction can be obtained from the locally stored anti-theft protection instruction list, and the transmission form of the instruction in each case is obtained at the same time.
  • the antitheft protection information is generated according to the obtained anti-theft protection instruction and the transmission form of the instruction in each case; or the instruction corresponding to the communication mode is obtained from the transmission form of the instruction in each case according to the currently available communication mode of the stolen mobile phone;
  • the transmission form generates the theft protection information according to the obtained anti-theft protection command and the transmission form of the instruction corresponding to the currently available communication mode.
  • the instruction transmission mode corresponding to the communication mode corresponding to the communication mode is generated, and the anti-theft protection information is generated according to the obtained anti-theft protection instruction and the generated form of the generated instruction.
  • Table 1 is a list of anti-theft protection commands saved locally by the mobile phone, and the list includes the serial number of the instruction, the anti-theft protection instruction, and the instruction corresponding to the instruction.
  • the anti-theft protection instruction list may also include other information, such as instructions in various situations. Send form, etc. Table 1
  • a transmission form according to the currently available communication mode of the mobile phone and the instruction identification mode generation instruction corresponding to the communication mode is taken as an example for description.
  • the communication mode currently available to the mobile phone is queried, and the transmission form of the instruction is generated according to the communication mode currently available to the mobile phone in combination with the instruction recognition mode corresponding to the communication mode.
  • the mobile phone uses the form of short message communication, the mobile phone can randomly generate a verification code, save the verification code locally, and send the anti-theft protection command, the verification code, the current mobile phone number and the verification code usage instructions together as a short message. Specify a contact.
  • the mobile phone after the mobile phone starts the anti-theft mode, it can query the wireless communication mode (such as sending and receiving short messages), and the generated content is "1.
  • the built-in content is forced to display, 2.
  • the remote content is forced to display, 3.
  • the user location information is uploaded, 4.
  • the SIM is replaced.
  • the first part of the content of the SMS is the anti-theft protection command, and the latter part is the transmission form of the instruction.
  • the anti-theft protection information is sent to the designated contact through one or more of the current communication methods. If the wireless channel is available, the anti-theft protection information is sent to the designated contact as a short message, such as to the specified mobile phone number; if the data channel is available, if the wifi hotspot is detected, the anti-theft protection information is sent to the email form to Specify the contact. Of course, if multiple communication methods are available, you can also try each available communication method to send the anti-theft protection information to the specified contact in turn, ensuring that the user can quickly receive the theft protection information and promptly access the stolen mobile phone. Take control.
  • the embodiment of the present invention can send the anti-theft protection information to the designated contact at a predetermined time or a predetermined time interval, in addition to sending the anti-theft protection information to the designated contact immediately after the anti-theft mode is activated, so as to ensure that the user can receive the anti-theft protection information.
  • the anti-theft protection information includes the theft protection means
  • the transmission form and/or the website address of the instruction and the instruction the designated contact can send the anti-theft protection instruction according to the transmission form of the instruction, so that the relatively cumbersome anti-theft protection instruction does not need to be memorized, the operation is convenient, and the user experience is improved at the same time.
  • the designated contact sends an anti-theft protection command to the mobile phone, and when the mobile phone receives the anti-theft protection command, automatically executes the received anti-theft protection command.
  • the anti-theft protection command may be an anti-theft protection command sent by the user in various forms, such as an anti-theft protection instruction sent by a short message, an anti-theft protection instruction sent in the form of an email, and the like.
  • the anti-theft mode After the anti-theft mode is activated, it can also obtain all external communication rights such as SMS, call, data network, etc., so that the pirate can not use the mobile phone and ensure that the stolen mobile phone can receive the anti-theft protection command sent by the user.
  • the anti-theft protection command can be sent through the Internet to provide the end user with a webpage of the login server, and the terminal user can query the user data recorded on the server (such as mobile phone number, SIM card number or UIM card number, IMSI, IMEI (International Mobile Equipment Identity), such as the data identifying the user's identity, or the operating status of the mobile phone corresponding to the user data, and sending an anti-theft protection command to the mobile phone indicated by the user data according to the user data, the anti-theft protection command may
  • the anti-theft protection command that has been edited is stored on the webpage, so that the user does not need to edit when sending the instruction to the lost mobile phone, and directly selects the anti-theft protection instruction that needs to be sent.
  • the anti-theft protection instruction includes any one of the following instructions or a plurality of: an instruction to delete data in the mobile phone, an instruction to lock the mobile phone, an instruction to locate the mobile phone, and an instruction to retrieve the mobile phone password.
  • the anti-theft protection command may also be performed by the user according to user data in real time. edit
  • the mobile phone user when the mobile phone user finds that the mobile phone is lost, the mobile phone user logs in to the server through the personal account, and checks the running status of the mobile phone that is bound to the IMEI number, and according to the running status of the mobile phone, whether the mobile phone has been inserted into the new SIM number. And check the current SIM number of the lost phone obtained by the server. If the user finds that the running status of the mobile phone is lost, perform the operation on the web page, select the anti-theft protection command to be sent, and input the current SIM number of the lost mobile phone to generate the anti-theft protection command issued to the current SIM number of the mobile phone.
  • the server And triggering the server to send the anti-theft protection command to the mobile phone, so that the mobile phone performs a corresponding operation according to the anti-theft protection instruction.
  • the anti-theft protection command is sent to the lost mobile phone in the form of a short message.
  • the designated contact may send the anti-theft protection instruction to the stolen mobile phone according to the anti-theft protection information according to the transmission form of the instruction, correspondingly, when When the stolen mobile phone receives the anti-theft protection command, it automatically executes the received anti-theft protection command.
  • the anti-theft protection information includes the foregoing web address
  • the designated contact may send the anti-theft protection command to the stolen mobile phone according to the sending form of the instruction stored in the website corresponding to the web address, and accordingly, when the stolen mobile phone receives the anti-theft protection When received, the received anti-theft protection command is automatically executed.
  • the designated security After the designated contact receives the anti-theft protection information by means of a short message or an email, the designated security
  • the content of the protection information is sent in the form of the anti-theft protection command and the instruction or the form of the anti-theft protection instruction and the instruction is obtained according to the website in the anti-theft protection information, and then the anti-theft protection is sent in the form of the instruction in the anti-theft protection information. instruction.
  • the designated contact can send the anti-theft protection command to the stolen mobile phone in the form of the instruction in the anti-theft protection information on the current mobile phone or other mobile phone.
  • the designated contact receives the short message in step 202, the designated contact wants the mobile phone to execute the built-in content forced display instruction, the remote content forced display instruction, and the delete/backup specified data instruction, then the designated contact can send or directly reply the content as "XXX +1+2+7" text message to number 123456789, of course, the designated contact can also send or directly reply to the message "XXX + built-in content forced display + remote content forced display + delete / backup specified data" The number is 123456789, where XXX is the verification code.
  • the designated mobile phone transmits the anti-theft protection instruction in the anti-theft protection information according to the transmission form of the instruction in the anti-theft protection information, and the stolen mobile phone is stolen. It can receive and identify the anti-theft protection command sent by the specified contact, and execute the received anti-theft protection command.
  • the content of the short message is identified, and it is determined whether the short message content starts with the specified verification code, and if so, the short message
  • the content is parsed, and the instructions in the short message are obtained and executed, that is, the built-in content forced display instruction, the remote content forced display instruction, and the delete/backup specified data instruction are executed, wherein XXX is a verification code.
  • each anti-theft protection command corresponding to each anti-theft protection command in step 202.
  • the preset specified information is displayed on the screen, for example, the message and the user's contact information can be displayed, and the forced display content can be set according to the user's request, as shown in FIG.
  • the anti-theft password input box and the specified information are displayed on the screen of the locked mobile phone.
  • the specified information is "Big, I am the owner of the machine! To call the mobile phone, please call the mobile phone: 13800138000".
  • the remote content forced display instruction correspondingly, the text, the short message, and the like sent by the specified information sending end are received, and the content is forcibly displayed on the mobile phone screen, as shown in FIG. 4, on the locked mobile phone screen.
  • the anti-theft password input box and the information sent from the specified information sender are displayed.
  • the message is "Please return the phone as soon as possible! To call the phone, please call 13800138000", where the specified message sender can be pre-designated or by the corresponding
  • the instruction specifies either the specified contact or the sender of the current instruction.
  • the uploading user location information instruction is received, correspondingly, the current location information is obtained, and the location information is sent to the specified location information receiving end, where the current GPS device or module of the mobile phone itself can be obtained.
  • Location information or obtain location information such as wifi hotspot or base station number through the API of the mobile phone, where The specified location information receiving end may be specified in advance or specified by a corresponding instruction or a designated contact or a transmitting end of the current instruction.
  • the replacement SIM card is sent to the port to send a short message instruction, accordingly, whether the mobile phone replaces the SIM or UIM card is detected, and if yes, the mobile phone number corresponding to the current SIM or UIM is obtained, and the mobile phone number is sent to the designated mobile phone number.
  • the number information receiving end wherein the designated number information receiving end can be specified in advance or specified by a corresponding instruction or is a designated contact or a transmitting end of the current instruction.
  • the mobile phone number can be used to query the operator for information about the current user of the mobile phone.
  • an automatic front camera shooting instruction correspondingly, detecting whether there is a front camera, if yes, turning on the front camera to acquire imaging information (such as the current user's facial information), and transmitting the captured imaging information Give the specified camera information receiving end.
  • the non-front camera can be controlled to obtain surrounding environmental information.
  • the designated camera information receiving end may be specified in advance or specified by a corresponding instruction or a designated contact or a sending end of the current instruction.
  • the user can also set a predetermined time and a predetermined time interval to take a photo. In this way, the stolen mobile phone can be retrieved by the camera information.
  • the specified data is deleted and/or the specified data is sent to the specified server backup.
  • the address book data and the short message data are deleted, and the address book data is sent to the specified server, wherein the content to be backed up and the specified server can be specified in advance or specified by corresponding instructions.
  • the website address in the anti-theft protection information in step 202 may also include a website address of a website for controlling the mobile phone, and correspondingly, the user may log in to the corresponding website to implement control of the mobile phone, as in step 203,
  • the stolen mobile phone can receive the anti-theft protection command sent by the specified website and execute the received anti-theft protection command.
  • the anti-theft mode can be exited in the following two ways:
  • the unlock command input by the current user is obtained, and it is determined whether the unlock command input by the current user is correct. If it is correct, the anti-theft mode is exited, and if not, the anti-theft mode is maintained. Specifically, after the mobile phone starts the anti-theft mode, the user is prompted to input an unlocking instruction, and the unlocking instruction input by the current user after seeing the prompt is obtained, and it is determined whether the unlocking instruction input by the current user is the same as the unlocking instruction saved by the mobile phone, and if the same, the security is quit. Mode; if not the same, keep the theft mode.
  • the remote unlocking command is received, and the anti-theft mode is exited according to the received remote unlocking command. If you receive a text message with the content "XXXX Exit Anti-theft Mode", exit the anti-theft mode, where xxxx indicates the anti-theft password.
  • the user data may be updated or the user may be required to reset the user data. If the user data is the mobile phone number, the preset mobile phone number is updated to the current mobile phone number.
  • the method provided by the embodiment after the anti-theft mode is activated, sends the anti-theft protection information to the designated contact, to notify the designated contact to perform anti-theft processing on the mobile phone, so that the designated contact does not miss the anti-theft opportunity, which is beneficial for retrieving.
  • the stolen mobile phone can effectively reduce the leakage of user private information.
  • the embodiment provides a mobile phone anti-theft protection device, which is used to perform the mobile phone anti-theft protection method of the first embodiment.
  • the mobile phone anti-theft protection device includes:
  • the determining module 401 is configured to determine whether the mobile phone meets a preset anti-theft mode activation condition
  • the startup module 402 is configured to start the anti-theft mode when the determination result of the determination module 401 is that the preset anti-theft mode activation condition is met;
  • the sending module 403 is configured to start the anti-theft mode, and send the anti-theft protection information to the designated contact to notify the designated contact to perform anti-theft processing on the mobile phone.
  • the mobile phone anti-theft protection device After the anti-theft mode is activated, the mobile phone anti-theft protection device provided by the embodiment sends the anti-theft protection information to the designated contact to notify the designated contact to perform anti-theft processing on the mobile phone, so that the designated contact does not miss the anti-theft opportunity. It is good for retrieving stolen mobile phones and effectively reducing the leakage of user private information.
  • Embodiment 4
  • the embodiment provides a mobile phone anti-theft protection device, which is used to perform the mobile phone anti-theft protection method of the second embodiment.
  • the mobile phone anti-theft protection device includes:
  • the determining module 501 is configured to determine whether the mobile phone meets a preset anti-theft mode activation condition
  • the startup module 502 is configured to start the anti-theft mode when the determination result of the determination module 501 is that the preset anti-theft mode activation condition is met;
  • the sending module 503 is configured to send the anti-theft protection information to the designated contact after the activation module 502 starts the anti-theft mode, to notify the designated contact to perform anti-theft processing on the mobile phone.
  • the determining module 501 specifically includes:
  • a first determining unit configured to determine whether the current user data matches the pre-stored user data
  • the prompting unit when the judgment result of the first determining unit is that the current user data does not match the pre-stored user data, prompting the user to input an anti-theft instruction;
  • a second determining unit configured to determine, according to an anti-theft command input by the current user, whether the current user is legal, if not The law satisfies the preset anti-theft mode activation condition
  • the third determining unit is configured to determine whether the remote anti-theft mode open command is received, and if received, the preset steal mode start condition is met.
  • the startup module 502 is specifically configured to perform a locking operation on the stolen mobile phone when the determination result of the determination module 501 is that the preset anti-theft mode activation condition is met, so that the current mobile phone user cannot operate the mobile phone.
  • the device further comprises:
  • the anti-theft mode exiting module 504 is configured to: after the startup module 502 starts the anti-theft mode, obtain an unlocking instruction input by the current user, determine whether the unlocking instruction is correct, and if correct, exit the anti-theft mode;
  • the startup module 502 starts the anti-theft mode
  • the remote unlocking command is received, and the anti-theft mode is exited according to the remote unlocking command.
  • the device further comprises:
  • the first instruction execution module 505 is configured to execute the preset anti-theft protection command after the startup module 502 starts the anti-theft mode.
  • the anti-theft protection information includes an anti-theft protection command and a transmission form of the instruction
  • the device further includes: a second instruction execution module 506, configured to: send the anti-theft protection instruction to the stolen mobile phone according to the sending form of the instruction When the anti-theft protection command is received, the received anti-theft protection command is automatically executed.
  • the anti-theft protection information includes a web address
  • the website corresponding to the web address is used to save the anti-theft protection instruction and the sending form of the instruction
  • the device further includes:
  • the second instruction execution module 506 is configured to: when the contact sends the anti-theft protection command to the stolen mobile phone according to the sending form of the instruction stored in the website corresponding to the web address, receive the anti-theft protection command, and automatically execute the received anti-theft protection instruction.
  • the anti-theft protection instruction specifically includes:
  • the mobile phone anti-theft protection device provided by the embodiment sends the anti-theft protection information to the designated contact to notify the designated contact to perform anti-theft processing on the mobile phone, so that the designated contact does not miss the anti-theft opportunity. It is good for retrieving stolen mobile phones and effectively reducing the leakage of user private information.
  • the mobile phone anti-theft protection device provided in the above embodiment is only illustrated by the division of the above functional modules. In actual applications, the function distribution may be completed by different functional modules as needed. The internal structure of the device is divided into different functional modules to perform all or part of the functions described above.
  • the embodiment of the mobile phone anti-theft protection device and the mobile phone anti-theft protection method in the above embodiments are in the same concept, and the specific implementation process is described in detail in the method embodiment, and details are not described herein again.
  • a person skilled in the art may understand that all or part of the steps of implementing the above embodiments may be completed by hardware, or may be instructed by a program to execute related hardware, and the program may be stored in a computer readable storage medium.
  • the storage medium mentioned may be a read only memory, a magnetic disk or an optical disk or the like. The above is only the preferred embodiment of the present invention, and is not intended to limit the present invention.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

提供一种手机防盗保护方法和装置。所述方法包括:判断手机是否满足预设的防盗模式启动条件;如果满足,启动防盗模式;发送防盗保护信息到指定联系人以通知所述指定联系人对所述手机作防盗处理。所述装置包括判断模块、启动模块和发送模块。本解决方案涉及信息处理领域,通过在启动防盗模式后发送防盗保护信息到指定联系人以通知该指定联系人对该手机作防盗处理,使得该指定联系人不会错过防盗时机,有利于找回被盗手机,并能够有效减少用户私密信息的泄漏。

Description

卞 手机防盗保护方法及装置
本申请要求于 2012年 1月 19日提交中国专利局、 申请号为 2012100176067、发明名称 为 "手机防盗保护方法及装置" 的中国专利申请的优先权, 其全部内容通过引用结合在本 申请中。 技术领域
本发明涉及信息处理技术领域, 特别涉及一种手机防盗保护方法及装置。 背景技术
随着手机功能的不断增加, 手机与日常生活的联系越发紧密, 如果手机丢失或者被盗, 将会对用户造成很大的困扰, 如需要花费额外的金钱购买新手机, 需要花费大量的时间和 精力找回联系人的号码及信息, 甚至可能造成私密信息的泄露。
现有技术提供了一种手机防盗保护方法, 用户意识到手机被盗或者遗失时, 发送防盗 保护指令到被盗手机, 被盗手机接收并执行该防盗保护指令, 以实现手机防盗保护的目的。 如用户可以短信的形式发送防盗保护指令到被盗手机, 如发送内容为 "开启防盗模式"、 "显示强制信息", "删除短信" 的短信到被盗手机, 相应地, 被盗手机执行开启防盗模式、 显示强制信息和删除短信动作。
在实现本发明的过程中, 发明人发现现有技术至少存在以下缺点:
现有技术中用户意识到手机被盗或者遗失有时会存在滞后的情况, 即用户有可能错过 最佳防盗时机, 导致用户可能无法找回手机, 甚至导致用户私密信息泄露。 发明内容
为了避免用户错过最佳防盗时机, 使用户更容易找回手机和减少用户私密信息的泄露, 本发明实施例提供了一种手机防盗保护方法及装置。 所述技术方案如下:
一方面, 本发明实施例提供了一种手机防盗保护方法, 所述方法包括:
判断手机是否满足预设的防盗模式启动条件, 如果满足, 启动防盗模式;
发送防盗保护信息到指定联系人, 以通知所述指定联系人对所述手机作防盗处理。 其中, 所述判断手机是否满足预设的防盗模式启动条件, 具体包括: 判断当前用户数据与预存的用户数据是否匹配, 如果不匹配, 则提示用户输入防盗指 令, 并根据当前用户输入的防盗指令判断所述用户是否合法, 如果不合法, 则满足所述防 盗模式启动条件;
或者判断是否收到远程防盗模式开启指令, 如果收到, 则满足所述防盗模式启动条件。 其中, 所述启动防盗模式, 具体包括:
对所述手机执行锁定操作, 使当前手机使用者无法操作手机。
其中, 在所述启动防盗模式之后, 还包括:
获取当前用户输入的解锁指令, 判断所述解锁指令是否正确, 如果正确, 则退出所述 防盗模式;
或者接收远程解锁指令, 根据所述远程解锁指令退出所述防盗模式。
其中, 在所述启动防盗模式之后, 还包括:
执行预先设定的防盗保护指令。
其中, 所述防盗保护信息包括防盗保护指令及指令的发送形式, 则所述指定联系人对 所述手机作防盗处理, 具体包括:
根据所述防盗保护信息, 按照所述指令的发送形式将所述防盗保护指令发送到所述手 机, 相应地, 当所述手机接收到所述防盗保护指令时, 自动执行所述接收到的防盗保护指 令。
其中, 所述防盗保护信息包括网址, 所述网址对应的网站用于保存防盗保护指令及指 令的发送形式, 则所述指定联系人对所述手机作防盗处理, 具体包括
按照所述网址对应的网站中保存的所述指令的发送形式, 将所述防盗保护指令发送到 所述手机, 相应地, 当所述手机接收到所述防盗保护指令时, 自动执行所述接收到的防盗 保护指令。
其中, 所述防盗保护指令, 具体包括:
内置内容强制显示指令、 远程内容强制显示指令、 上传用户位置信息指令、 更换 SIM 卡往端口发送短信指令、 自动接受来电指令、 自动前置摄像头拍摄指令和删除 /备份指定数 据指令中的一种或多种。
另一方面, 本发明实施例还提供了一种手机防盗保护装置, 所述装置包括:
判断模块, 用于判断手机是否满足预设的防盗模式启动条件;
启动模块, 用于在所述判断模块的判断结果为满足所述防盗模式启动条件时, 启动防 盗模式;
发送模块, 用于所述启动模块启动防盗模式后, 发送防盗保护信息到指定联系人, 以 通知所述指定联系人对所述手机作防盗处理。
其中, 所述判断模块, 具体包括:
第一判断单元, 用于判断当前用户数据与预存的用户数据是否匹配;
提示单元, 用于所述第一判断单元的判断结果为所述当前用户数据与预存的用户数据 不匹配时, 提示用户输入防盗指令;
第二判断单元, 用于根据当前用户输入的防盗指令判断所述用户是否合法, 如果不合 法, 则满足所述防盗模式启动条件;
第三判断单元, 用于判断是否收到远程防盗模式开启指令, 如果收到, 则满足所述防 盗模式启动条件。
其中, 所述启动模块, 具体用于在所述判断模块的判断结果为满足所述防盗模式启动 条件时, 对所述手机执行锁定操作, 使当前手机使用者无法操作手机。
其中, 所述装置还包括:
防盗模式退出模块, 用于所述启动模块启动防盗模式后, 获取当前用户输入的解锁指 令, 判断所述解锁指令是否正确, 如果正确, 则退出所述防盗模式;
或者用于所述启动模块启动防盗模式后, 接收远程解锁指令, 根据所述远程解锁指令 退出所述防盗模式。
其中, 所述装置还包括:
第一指令执行模块, 用于所述启动模块启动防盗模式后, 执行预先设定的防盗保护指 令。
其中, 所述防盗保护信息包括防盗保护指令及指令的发送形式, 所述装置还包括: 第二指令执行模块, 用于在所述指定联系人按照所述指令的发送形式将所述防盗保护 指令发送到所述手机时, 接收所述防盗保护指令, 自动执行所述接收到的防盗保护指令 或者, 所述防盗保护信息包括网址, 所述网址对应的网站用于保存防盗保护指令及指 令的发送形式, 所述装置还包括:
第二指令执行模块, 用于在所述指定联系人按照所述网址对应的网站中保存的所述指 令的发送形式将所述防盗保护指令发送到所述手机时, 接收所述防盗保护指令, 自动执行 所述接收到的防盗保护指令。
其中, 所述防盗保护指令, 具体包括:
内置内容强制显示指令、 远程内容强制显示指令、 上传用户位置信息指令、 更换 SIM 卡往端口发送短信指令、 自动接受来电指令、 自动前置摄像头拍摄指令和删除 /备份指定数 据指令中的一种或多种。 本发明实施例提供的技术方案带来的有益效果是:
通过启动防盗模式后, 发送防盗保护信息到指定联系人, 以通知该指定联系人对该手 机作防盗处理, 使该指定联系人不会错过防盗时机, 有利于找回被盗手机, 并能有效的减 少用户私密信息的泄露。 附图说明
为了更清楚地说明本发明实施例中的技术方案, 下面将对实施例描述中所需要使用的 附图作简单地介绍, 显而易见地, 下面描述中的附图仅仅是本发明的一些实施例, 对于本 领域普通技术人员来讲, 在不付出创造性劳动的前提下, 还可以根据这些附图获得其他的 附图。
图 1是本发明实施例一提供的手机防盗保护方法流程图;
图 2是本发明实施例二提供的手机防盗保护方法流程图;
图 3是本发明实施例二中内置内容强制显示屏幕示意图;
图 4是本发明实施例二中远程内容强制显示屏幕示意图;
图 5是本发明实施例三提供的手机防盗保护装置结构示意图;
图 6是本发明实施例四提供的手机防盗保护装置结构示意图。 具体实施方式
为使本发明的目的、 技术方案和优点更加清楚, 下面将结合附图对本发明实施方式作 进一步地详细描述。
实施例一
本实施例提供了一种手机防盗保护方法, 参见图 1, 该方法流程具体如下:
101: 判断手机是否满足预设的防盗模式启动条件, 如果满足, 启动防盗模式; 102: 发送防盗保护信息到指定联系人, 以通知该指定联系人对该手机作防盗处理。 其中, 该防盗保护信息包括防盗保护指令及指令的发送形式和 /或网址, 该网址对应的 网站用于保存防盗保护指令及指令的发送形式。
本实施例提供的方法, 通过启动防盗模式后, 发送防盗保护信息到指定联系人, 以通 知该指定联系人对该手机作防盗处理, 使该指定联系人不会错过防盗时机, 有利于找回被 盗手机, 并能有效的减少用户私密信息的泄露。 实施例二 本实施例提供了一种手机防盗保护方法。参见图 2,本实施例提供的方法流程具体如下: 201: 判断手机是否满足预设的防盗模式启动条件, 如果满足, 启动防盗模式。
针对本步骤, 启动防盗模式前, 需根据预设的防盗模式启动条件判断是否启动防盗模 式, 本发明实施例可以采用以下两种方式判断是否启动防盗模式, 但并不作为本发明的限 定。
方式一, 判断当前用户数据与预存的用户数据是否匹配, 如果匹配, 则启动正常模式, 如果不匹配, 则提示用户输入防盗指令, 并根据当前用户输入的防盗指令判断当前用户是 否合法, 如果合法, 则启动正常模式, 如果不合法, 即满足防盗模式启动条件, 则启动防 盗模式。
其中, 用户数据和防盗指令为手机的原有者预先设置好的并保存在手机中, 用户数据 可以是手机识别号码, 包括手机号码、 SIM (Subscriber Identity Module 客户识别模块) 卡号或 UIM(User Identity Module , 用户识别模块)卡号、 IMSI ( International Mobile Subscriber Identification Number, 国际移动用户识别码) 等标识用户身份的数据, 当 然用户也可以设定其他用户数据。
具体地, 手机开机时, 读取 SIM或 UIM卡中的手机号码与手机保存的手机号码, 判断 读取到的 SIM或 UIM卡中的手机号码与手机保存的手机号码是否一致, 如果一致, 则启动 正常模式, 如果不一致, 手机锁定并提示用户输入防盗密码; 获取当前用户输入的防盗密 码, 判断当前用户输入的防盗密码是否与保存在手机上的防盗密码相同, 如果相同, 则启 动正常模式, 如果当前用户在预定时间内或预定次数内输入的防盗密码与保存在手机上的 防盗密码不同, 则启动防盗模式。
方式二, 判断是否收到远程防盗模式开启指令, 如果收到, 则满足防盗模式启动条件, 根据接收到的远程防盗模式开启指令启动防盗模式。
具体地, 当用户意识到手机被盗或者丢失后, 主动发送远程防盗模式开启指令到被盗 手机, 相应地, 如果被盗手机接收到远程防盗模式开启指令, 则满足防盗模式启动条件, 则根据该远程防盗模式开启指令开启防盗模式。
更具体地, 用户通过短信的形式发送远程防盗模式开启指令到被盗手机。 如发送内容 为 " X X X X开启防盗模式" 的短信到被盗手机, 其中, X X X X表示防盗密码。 被盗手 机在收到内容为 " X X X X开启防盗模式" 的短信时, 开启防盗模式。
其中, 本步骤中的启动防盗模式具体包括: 对手机执行锁定操作, 使当前手机使用者 无法操作手机。
进一步地, 在启动防盗模式之后, 该方法还包括: 执行预先设定的防盗保护指令。 具体地, 预先设定的防盗保护指令包括内置内容强制显示指令、 远程内容强制显示指 令、 上传用户位置信息指令、 更换 SIM卡往端口发送短信指令、 自动接受来电指令、 自动 前置摄像头拍摄指令和删除 /备份指定数据指令中的一种或者多种, 但并不作为本发明的限 定。 比如, 手机原有者预先设定了内置内容强制显示指令并设置了强制显示的内容, 相应 地, 执行内置内容强制显示指令, 如在锁定后的手机的屏幕上显示强制显示的内容。
202: 发送防盗保护信息到指定联系人, 以通知该指定联系人对该手机作防盗处理。 其中, 防盗保护信息用于使指定联系人根据该防盗保护信息可以发送防盗保护指令到 被盗手机, 具体包括防盗保护指令及指令的发送形式和 /或网址等, 其中, 该网址对应的网 站用于保存防盗保护指令及指令的发送形式, 该网址为手机的原有者预先保存在手机里或 者安装防盗保护软件时自动保存在手机里。 其中, 防盗保护指令及指令的发送形式可以使 指定联系人根据指令的发送形式发送防盗保护指令到被盗手机。 当然防盗保护信息也可以 包括其他信息, 如各个防盗保护指令的具体说明、 网址对应的网站的登陆账号和密码、 当 前手机号码、 用户预先设定的防盗保护指令及具体参数或指定联系人等信息。 其中, 指定 联系人可以是一个或多个联系人, 可以是被盗手机原有者也可以是其他联系人, 而联系人 可以对应多种联系方式, 包括手机号码和 /或邮箱等, 相应地, 被盗手机将防盗保护信息发 送到指定联系人对应的手机号码和 /或邮箱。
进一步地, 防盗保护指令包括内置内容强制显示指令、 远程内容强制显示指令、 上传 用户位置信息指令、 更换 SIM卡往端口发送短信指令、 自动接受来电指令、 自动前置摄像 头拍摄指令和删除 /备份指定数据指令中的一种或者多种, 但并不作为本发明的限定, 如防 盗保护指令还可以包括其他指令。
其中, 本发明实施例中以防盗保护信息为防盗保护指令及指令的发送形式为例进行说 明。 如手机本地保存有防盗保护指令列表和各种情况下的指令的发送形式, 相应地, 可以 从本地保存的防盗保护指令列表中获取防盗保护指令, 同时获取各种情况下的指令的发送 形式, 根据获取得到的防盗保护指令和各种情况下的指令的发送形式生成防盗保护信息; 或者根据被盗手机当前可用的通讯方式从各种情况下的指令的发送形式中获取该通讯方式 对应的指令的发送形式, 根据获取得到的防盗保护指令和当前可用的通讯方式对应的指令 的发送形式生成防盗保护信息。 或者根据手机当前可用的通讯方式结合该通讯方式对应的 指令识别方式生成指令的发送形式, 根据获取得到的防盗保护指令和生成的指令的发送形 式生成防盗保护信息。 具体地, 表 1 为手机本地保存的防盗保护指令列表, 列表中包括指 令的序号、 防盗保护指令和指令对应的说明, 当然防盗保护指令列表也可以包括其他信息, 如各种情况下的指令的发送形式等。 表 1
Figure imgf000009_0001
进一步地, 本发明实施例中以根据手机当前可用的通讯方式结合该通讯方式对应的指 令识别方式生成指令的发送形式为例进行说明。 具体地, 查询手机当前可用的通讯方式, 并根据手机当前可用的通讯方式结合该通讯方式对应的指令识别方式生成指令的发送形 式。 如手机使用短信的形式通信, 则手机可以随机生成验证码, 将该验证码保存在本地, 并将防盗保护指令、 验证码、 当前的手机号码及验证码的使用说明一起以短信的形式发送 给指定联系人。例如, 手机启动防盗模式后, 查询到无线通讯方式可用(如可以收发短信), 生成内容为 " 1、 内置内容强制显示, 2、 远程内容强制显示, 3、 上传用户位置信息, 4、 更换 SIM卡往端口发送短信, 5、 自动接受来电, 6、 自动前置摄像头拍摄, 7删除 /备份指 定数据;验证码为 X X X,请发送验证码 +指令或数字 +指令或数字 +……到号码 123456789。 " 其中, 短信内容的前部分内容为防盗保护指令, 后部分内容为指令的发送形式。
在防盗保护信息生成后, 将防盗保护信息通过当前的通讯方式中的一种或多种发送给 指定联系人。 如无线通道可用, 则将防盗保护信息以短信的形式发送到指定联系人, 如发 送到指定的手机号码; 如数据通道可用, 如检测到 wifi热点, 则将防盗保护信息以邮件的 形式发送到指定联系人, 当然如果多种通讯方式可用, 也可以依次尝试每种可用的通讯方 式将防盗保护信息发送到指定联系人, 保证用户可以快速的收到防盗保护信息, 并及时的 对被盗手机进行控制。 其中, 本发明实施例除在启动防盗模式后立即发送防盗保护信息到 指定联系人以外, 还可以在预定时间或者预定时间间隔发送防盗保护信息到指定联系人, 保证用户可以收到防盗保护信息。
针对该步骤, 通过发送防盗保护信息到指定联系人, 该防盗保护信息包括防盗保护指 令及指令的发送形式和 /或网址等, 则指定联系人可以根据该指令的发送形式发送该防盗保 护指令, 则不需要记忆相对繁琐的防盗保护指令, 操作方便, 同时提升了用户体验。
203: 指定联系人发送防盗保护指令到该手机, 当该手机接收到防盗保护指令时, 自动 执行接收到的防盗保护指令。
具体地, 该防盗保护指令可以是用户通过多种形式发送的防盗保护指令, 如短信的方 式发送的防盗保护指令、 以邮件的形式发送的防盗保护指令等。 启动防盗模式后, 还可以 通过获取手机短信、 通话、 数据网络等一切可以对外的通信权限, 使得盗用者无法使用手 机并保证被盗手机可以接收到用户发送的防盗保护指令。
优选地, 该防盗保护指令可以通过互联网发送, 为终端用户提供登录服务器的 Web 网 页, 终端用户可以通过该网页查询服务器上记录的用户数据 (如手机号码、 SIM卡号或 UIM 卡号、 IMSI、 IMEI ( (International Mobile Equipment Identity, 国际移动设备身份码) 等标识用户身份的数据) 或用户数据对应的手机的运行状态, 并根据该用户数据向用户数 据指示的手机发送防盗保护指令, 该防盗保护指令可以是网页上存储已经编辑好的防盗保 护指令, 这样用户在向丢失手机发送指令时不需要进行编辑, 直接选择需要发送的防盗保 护指令即可。 其中防盗保护指令包括以下指令中的任一种或多种: 删除所述手机中的数据 的指令、 锁定所述手机的指令、 定位所述手机的指令和找回所述手机密码的指令。 当然, 该防盗保护指令还可以由用户根据用户数据实时编辑。
具体地, 本步骤中, 当手机用户在发现手机丢失后, 通过个人账号登录服务器, 查看 之前绑定 IMEI号的手机的运行状态, 根据手机的运行状态获知手机是否已被插入新的 SIM 号码, 且查看服务器端获得的丢失手机当前的 SIM 号码。 如果用户发现手机的运行状态已 经为丢失状态, 则在 Web 网页上进行操作, 选择需要发送的防盗保护指令, 并输入丢失手 机当前的 SIM号码, 生成向手机当前的 SIM号码下发的防盗保护指令, 并触发服务器将所 述防盗保护指令发送到手机, 使手机根据所述防盗保护指令执行相应的操作。 本实施例中 优选地, 防盗保护指令以短信的形式下发到丢失的手机上。
针对本步骤, 如果防盗保护信息包括防盗保护指令及指令的发送形式, 则指定联系人 可以根据该防盗保护信息, 按照该指令的发送形式将该防盗保护指令发送到被盗手机, 相 应地, 当被盗手机接收到该防盗保护指令时, 自动执行接收到的防盗保护指令。 如果防盗 保护信息包括前述的网址, 则指定联系人可以按照该网址对应的网站中保存的指令的发送 形式, 将防盗保护指令发送到被盗手机, 相应地, 当被盗手机接收到该防盗保护指令时, 自动执行接收到的防盗保护指令。
具体地, 指定联系人通过短信或者邮件等形式收到防盗保护信息后, 可以根据防盗保 护信息的内容得到防盗保护指令及指令的发送形式或者根据防盗保护信息中的网址到相应 的网站上获取防盗保护指令及指令的发送形式, 然后以防盗保护信息中的指令的发送形式 发送防盗保护指令。
更具体地, 如果指定联系人收到包含防盗保护信息的短信, 根据短信的内容, 指定联 系人可以在当前手机或其他手机上以防盗保护信息中的指令发送形式发送防盗保护指令到 被盗手机。 如指定联系人在收到步骤 202 中的短信后, 指定联系人希望手机执行内置内容 强制显示指令、 远程内容强制显示指令和删除 /备份指定数据指令, 则指定联系人可以发送 或者直接回复内容为 " X X X +1+2+7 "的短信到号码 123456789, 当然, 指定联系人也可以 发送或者直接回复内容为 " X X X +内置内容强制显示 +远程内容强制显示 +删除 /备份指定 数据" 的短信到号码 123456789, 其中, X X X为验证码。
针对本步骤, 由于防盗保护信息中包括了防盗保护指令与指令的发送形式, 只要指定 联系人按照该防盗保护信息中的指令的发送形式发送该防盗保护信息中的防盗保护指令, 则被盗手机就可以收到并识别指定联系人发送的防盗保护指令, 执行收到的防盗保护指令。 如收到内容为 " X X X +内置内容强制显示 +远程内容强制显示 +删除 /备份指定数据" 的短 信, 对短信的内容进行识别, 判断短信内容是否以指定的验证码开头, 如果是, 对短信的 内容进行解析, 获取并执行短信中的指令, 即执行内置内容强制显示指令、 远程内容强制 显示指令和删除 /备份指定数据指令, 其中, X X X为验证码。
下面对各防盗保护指令的具体执行过程进行说明, 对应步骤 202 中的各个防盗保护指 令。
具体地, 如果收到了内置内容强制显示指令, 相应地, 在屏幕上显示预先设置的指定 信息, 如可以显示留言、 用户的联系方式, 强制显示的内容可以根据用户要求进行设置, 如图 3所示, 在锁定的手机屏幕上显示防盗密码输入框和指定信息, 该指定信息为 "哥们, 我才是本机的主人! 要还手机请拨打手机: 13800138000"。
具体地, 如果收到了远程内容强制显示指令, 相应地, 接收指定的信息发送端发送的 文本、 短信等内容, 将该内容强制显示在手机屏幕上, 如图 4所示, 在锁定的手机屏幕上 显示防盗密码输入框和自指定的信息发送端发送的信息, 该信息为 "请尽快归还手机! 要 还手机请拨打手机: 13800138000 ", 其中, 指定的信息发送端可以预先指定或者由相应的 指令指定或者为指定联系人或者为当前指令的发送端等。
具体地, 如果收到了上传用户位置信息指令, 相应地, 获取当前的位置信息, 并将该 位置信息发送给指定的位置信息接收端, 其中, 可以通过调用手机本身的 GPS 软件或者模 块获取当前的位置信息,或者通过手机的 API得到 wifi热点或者基站号等位置信息,其中, 指定的位置信息接收端可以预先指定或者由相应的指令指定或者为指定联系人或者为当前 指令的发送端等。
具体地, 如果收到了更换 SIM卡往端口发送短信指令, 相应地, 检测手机是否更换了 SIM或者 UIM卡, 如果是, 则获取当前 SIM或者 UIM对应的手机号码, 将该手机号发送到指 定的号码信息接收端, 其中, 指定的号码信息接收端可以预先指定或者由相应的指令指定 或者为指定联系人或者为当前指令的发送端等。 相应地, 通过该手机号可以去运营商查询 手机当前使用者的信息。
具体地, 如果收到了自动接受来电指令, 相应地, 接通所有来电, 并开启扬声器。 则 可以通过通话要求手机的当前使用者归还手机, 并告诉其归还手机的方式。
具体地, 如果收到了自动前置摄像头拍摄指令, 相应地, 检测是否具有前置摄像头, 如果有, 开启前置摄像头获取摄像信息 (如当前用户的脸部信息), 将拍摄得到的摄像信息 发送给指定的摄像信息接收端。 优选地, 如果没有前置摄像头, 可控制非前置摄像头获取 周围的环境信息。 其中, 指定的摄像信息接收端可以预先指定或者由相应的指令指定或者 为指定联系人或者为当前指令的发送端等。 当然用户也可以设置预定时间和预定时间间隔 进行拍照。 这样, 可以通过摄像信息来找回被盗的手机。
具体地, 如果收到了删除 /备份指定数据指令, 相应地, 删除指定数据和 /或将指定数 据发送到指定服务器备份。 如删除通讯录数据和短信数据, 发送通讯录数据到指定的服务 器, 其中, 需要备份的内容和指定的服务器可以预先指定或者由相应的指令指定。
当然, 如果收到多条防盗保护指令, 则依次执行该多条防盗保护指令。
其中, 本发明实施例中, 步骤 202 中防盗保护信息中的网址也可以包括用于控制手机 的网站的网址, 相应地, 用户可以登录对应的网站实现对手机的控制, 如在步骤 203 中, 被盗手机可以接收指定网站发送的防盗保护指令, 并执行收到的防盗保护指令。
204: 退出防盗模式。
具体地, 可以通过以下两种方式退出防盗模式:
方式一, 获取当前用户输入的解锁指令, 判断当前用户输入的解锁指令是否正确, 如 果正确, 则退出防盗模式, 如果不正确, 保持防盗模式。 具体地, 手机启动防盗模式后会 提示用户输入解锁指令, 获取当前用户在看到该提示后输入的解锁指令, 判断当前用户输 入的解锁指令是否与手机保存的解锁指令相同, 如果相同, 退出防盗模式; 如果不相同, 保持防盗模式。
方式二, 接收远程解锁指令, 根据接收到的远程解锁指令退出防盗模式。 如收到内容 为 " X X X X退出防盗模式 " 的短信时, 退出防盗模式, 其中, x x x x表示防盗密码。 其中, 在退出防盗模式后, 可以对用户数据进行更新或者要求用户重新设置用户数据, 如用户数据为手机号码, 则将预设的手机号码更新为当前的手机号码。
本实施例提供的方法, 通过启动防盗模式后, 发送防盗保护信息到指定联系人, 以通 知该指定联系人对该手机作防盗处理, 使该指定联系人不会错过防盗时机, 有利于找回被 盗手机, 并能有效的减少用户私密信息的泄露。 实施例三
本实施例提供了一种手机防盗保护装置, 该装置用于执行上述实施例一的手机防盗保 护方法, 参见图 5, 该手机防盗保护装置包括:
判断模块 401, 用于判断手机是否满足预设的防盗模式启动条件;
启动模块 402, 用于在判断模块 401的判断结果为满足预设的防盗模式启动条件时, 启 动防盗模式;
发送模块 403, 用于启动模块 402启动防盗模式后, 发送防盗保护信息到指定联系人, 以通知该指定联系人对该手机作防盗处理。
本实施例提供的手机防盗保护装置, 通过启动防盗模式后, 发送防盗保护信息到指定 联系人, 以通知该指定联系人对该手机作防盗处理, 使该指定联系人不会错过防盗时机, 有利于找回被盗手机, 并能有效的减少用户私密信息的泄露。 实施例四
本实施例提供了一种手机防盗保护装置, 该装置用于执行上述实施例二的手机防盗保 护方法, 参见图 6, 该手机防盗保护装置包括:
判断模块 501, 用于判断手机是否满足预设的防盗模式启动条件;
启动模块 502, 用于在判断模块 501的判断结果为满足预设的防盗模式启动条件时, 启 动防盗模式;
发送模块 503, 用于启动模块 502启动防盗模式后, 发送防盗保护信息到指定联系人, 以通知该指定联系人对该手机作防盗处理。
其中, 判断模块 501, 具体包括:
第一判断单元, 用于判断当前用户数据与预存的用户数据是否匹配;
提示单元, 用于第一判断单元的判断结果为当前用户数据与预存的用户数据不匹配时, 提示用户输入防盗指令;
第二判断单元, 用于根据当前用户输入的防盗指令判断当前用户是否合法, 如果不合 法, 则满足预设的防盗模式启动条件;
第三判断单元, 用于判断是否收到远程防盗模式开启指令, 如果收到, 则满足预设的 盗模式启动条件。
其中, 启动模块 502, 具体用于在判断模块 501的判断结果为满足预设的防盗模式启动 条件时, 对被盗手机执行锁定操作, 使当前手机使用者无法操作手机。
其中, 该装置还包括:
防盗模式退出模块 504, 用于启动模块 502启动防盗模式后, 获取当前用户输入的解锁 指令, 判断该解锁指令是否正确, 如果正确, 则退出防盗模式;
或者用于启动模块 502 启动防盗模式后, 接收远程解锁指令, 根据该远程解锁指令退 出防盗模式。
其中, 该装置还包括:
第一指令执行模块 505, 用于启动模块 502启动防盗模式后, 执行预先设定的防盗保护 指令。
其中, 该防盗保护信息包括防盗保护指令及指令的发送形式, 该装置还包括: 第二指令执行模块 506,用于指定联系人按照该指令的发送形式将该防盗保护指令发送 到该被盗手机时, 接收该防盗保护指令, 自动执行接收到的防盗保护指令。
或者, 该防盗保护信息包括网址, 该网址对应的网站用于保存防盗保护指令及指令的 发送形式, 该装置还包括:
第二指令执行模块 506,用于指定联系人按照该网址对应的网站中保存的指令的发送形 式将防盗保护指令发送到该被盗手机时, 接收该防盗保护指令, 自动执行接收到的防盗保 护指令。
其中, 防盗保护指令, 具体包括:
内置内容强制显示指令、 远程内容强制显示指令、 上传用户位置信息指令、 更换 SIM 卡往端口发送短信指令、 自动接受来电指令、 自动前置摄像头拍摄指令和删除 /备份指定数 据指令中的一种或多种。
本实施例提供的手机防盗保护装置, 通过启动防盗模式后, 发送防盗保护信息到指定 联系人, 以通知该指定联系人对该手机作防盗处理, 使该指定联系人不会错过防盗时机, 有利于找回被盗手机, 并能有效的减少用户私密信息的泄露。 需要说明的是: 上述实施例提供的手机防盗保护装置, 仅以上述各功能模块的划分进 行举例说明, 实际应用中, 可以根据需要而将上述功能分配由不同的功能模块完成, 即将 装置的内部结构划分成不同的功能模块, 以完成以上描述的全部或者部分功能。 另外, 上 述实施例涉及的手机防盗保护装置与手机防盗保护方法实施例属于同一构思, 其具体实现 过程详见方法实施例, 这里不再赘述。 本领域普通技术人员可以理解实现上述实施例的全部或部分步骤可以通过硬件来完 成, 也可以通过程序来指令相关的硬件完成, 所述的程序可以存储于一种计算机可读存储 介质中, 上述提到的存储介质可以是只读存储器, 磁盘或光盘等。 以上所述仅为本发明的较佳实施例, 并不用以限制本发明, 凡在本发明的精神和原则 之内, 所作的任何修改、 等同替换、 改进等, 均应包含在本发明的保护范围之内。 本领域普通技术人员可以理解实现上述实施例的全部或部分步骤可以通过硬件来完 成, 也可以通过程序来指令相关的硬件完成, 所述的程序可以存储于一种计算机可读存储 介质中, 上述提到的存储介质可以是只读存储器, 磁盘或光盘等。 以上所述仅为本发明的较佳实施例, 并不用以限制本发明, 凡在本发明的精神和原则 之内, 所作的任何修改、 等同替换、 改进等, 均应包含在本发明的保护范围之内。

Claims

伙 不」 安 氺 卞
1、 一种手机防盗保护方法, 其特征在于, 所述方法包括:
判断手机是否满足预设的防盗模式启动条件, 如果满足, 启动防盗模式;
发送防盗保护信息到指定联系人, 以通知所述指定联系人对所述手机作防盗处理。
2、根据权利要求 1所述的方法, 其特征在于, 所述判断手机是否满足预设的防盗模式启 动条件, 具体包括:
判断当前用户数据与预存的用户数据是否匹配, 如果不匹配, 则提示用户输入防盗指令, 并根据当前用户输入的防盗指令判断所述用户是否合法, 如果不合法, 则满足所述防盗模式 启动条件;
或者判断是否收到远程防盗模式开启指令, 如果收到, 则满足所述防盗模式启动条件。
3、 根据权利要求 1所述的方法, 其特征在于, 所述启动防盗模式, 具体包括: 对所述手机执行锁定操作, 使当前手机使用者无法操作手机。
4、 根据权利要求 3所述的方法, 其特征在于, 在所述启动防盗模式之后, 还包括: 获取当前用户输入的解锁指令, 判断所述解锁指令是否正确, 如果正确, 则退出所述防 盗模式;
或者接收远程解锁指令, 根据所述远程解锁指令退出所述防盗模式。
5、 根据权利要求 1所述的方法, 其特征在于, 在所述启动防盗模式之后, 还包括: 执行预先设定的防盗保护指令。
6、根据权利要求 1所述的方法, 其特征在于, 所述防盗保护信息包括防盗保护指令及指 令的发送形式, 则所述指定联系人对所述手机作防盗处理, 具体包括:
根据所述防盗保护信息,按照所述指令的发送形式将所述防盗保护指令发送到所述手机, 相应地, 当所述手机接收到所述防盗保护指令时, 自动执行所述接收到的防盗保护指令。
7、 根据权利要求 1所述的方法, 其特征在于, 所述防盗保护信息包括网址, 所述网址对 应的网站用于保存防盗保护指令及指令的发送形式, 则所述指定联系人对所述手机作防盗处 理, 具体包括:
按照所述网址对应的网站中保存的所述指令的发送形式, 将所述防盗保护指令发送到所 述手机, 相应地, 当所述手机接收到所述防盗保护指令时, 自动执行所述接收到的防盗保护 指令。
8、 根据权利要求 5或 6或 7所述的方法, 其特征在于, 所述防盗保护指令, 具体包括: 内置内容强制显示指令、 远程内容强制显示指令、 上传用户位置信息指令、 更换 SIM卡 往端口发送短信指令、 自动接受来电指令、 自动前置摄像头拍摄指令和删除 /备份指定数据指 令中的一种或多种。
9、 一种手机防盗保护装置, 其特征在于, 所述装置包括:
判断模块, 用于判断手机是否满足预设的防盗模式启动条件;
启动模块, 用于在所述判断模块的判断结果为满足所述防盗模式启动条件时, 启动防盗 模式;
发送模块, 用于所述启动模块启动防盗模式后, 发送防盗保护信息到指定联系人, 以通 知所述指定联系人对所述手机作防盗处理。
10、 根据权利要求 9所述的装置, 其特征在于, 所述判断模块, 具体包括:
第一判断单元, 用于判断当前用户数据与预存的用户数据是否匹配;
提示单元, 用于所述第一判断单元的判断结果为所述当前用户数据与预存的用户数据不 匹配时, 提示用户输入防盗指令;
第二判断单元, 用于根据当前用户输入的防盗指令判断所述用户是否合法, 如果不合法, 则满足所述防盗模式启动条件;
第三判断单元, 用于判断是否收到远程防盗模式开启指令, 如果收到, 则满足所述防盗 模式启动条件。
11、 根据权利要求 9所述的装置, 其特征在于, 所述启动模块, 具体用于在所述判断模 块的判断结果为满足所述防盗模式启动条件时, 对所述手机执行锁定操作, 使当前手机使用 者无法操作手机。
12、 根据权利要求 11所述的装置, 其特征在于, 所述装置还包括:
防盗模式退出模块, 用于所述启动模块启动防盗模式后, 获取当前用户输入的解锁指令, 判断所述解锁指令是否正确, 如果正确, 则退出所述防盗模式;
或者用于所述启动模块启动防盗模式后, 接收远程解锁指令, 根据所述远程解锁指令退 出所述防盗模式。
13、 根据权利要求 9所述的装置, 其特征在于, 所述装置还包括:
第一指令执行模块, 用于所述启动模块启动防盗模式后, 执行预先设定的防盗保护指令。
14、 根据权利要求 9所述的装置, 其特征在于, 所述防盗保护信息包括防盗保护指令及 指令的发送形式, 所述装置还包括:
第二指令执行模块, 用于在所述指定联系人按照所述指令的发送形式将所述防盗保护指 令发送到所述手机时, 接收所述防盗保护指令, 自动执行所述接收到的防盗保护指令。
15、 根据权利要求 9所述的装置, 其特征在于, 所述防盗保护信息包括网址, 所述网址 对应的网站用于保存防盗保护指令及指令的发送形式, 所述装置还包括:
第二指令执行模块, 用于在所述指定联系人按照所述网址对应的网站中保存的所述指令 的发送形式将所述防盗保护指令发送到所述手机时, 接收所述防盗保护指令, 自动执行所述 接收到的防盗保护指令。
16、 根据权利要求 13或 14或 15所述的装置, 其特征在于, 所述防盗保护指令, 具体包 括:
内置内容强制显示指令、 远程内容强制显示指令、 上传用户位置信息指令、 更换 SIM卡 往端口发送短信指令、 自动接受来电指令、 自动前置摄像头拍摄指令和删除 /备份指定数据指 令中的一种或多种。
PCT/CN2013/070717 2012-01-19 2013-01-18 手机防盗保护方法及装置 WO2013107395A1 (zh)

Priority Applications (5)

Application Number Priority Date Filing Date Title
SG11201404008YA SG11201404008YA (en) 2012-01-19 2013-01-18 Anti-theft protection method and device for cellular phone
EP13738538.1A EP2806666A4 (en) 2012-01-19 2013-01-18 METHOD AND DEVICE FOR SECURING MOBILE TELEPHONE SECURITY
JP2014552502A JP5893169B2 (ja) 2012-01-19 2013-01-18 携帯電話のための盗難防止保護方法およびデバイス
IN6215DEN2014 IN2014DN06215A (zh) 2012-01-19 2013-01-18
US14/332,718 US9723482B2 (en) 2012-01-19 2014-07-16 Anti-theft protection method and device for cellular phone

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2012100176067A CN103220637A (zh) 2012-01-19 2012-01-19 手机防盗保护方法及装置
CN201210017606.7 2012-01-19

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US14/332,718 Continuation US9723482B2 (en) 2012-01-19 2014-07-16 Anti-theft protection method and device for cellular phone

Publications (1)

Publication Number Publication Date
WO2013107395A1 true WO2013107395A1 (zh) 2013-07-25

Family

ID=48798655

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/070717 WO2013107395A1 (zh) 2012-01-19 2013-01-18 手机防盗保护方法及装置

Country Status (7)

Country Link
US (1) US9723482B2 (zh)
EP (1) EP2806666A4 (zh)
JP (1) JP5893169B2 (zh)
CN (1) CN103220637A (zh)
IN (1) IN2014DN06215A (zh)
SG (1) SG11201404008YA (zh)
WO (1) WO2013107395A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103581444A (zh) * 2013-11-21 2014-02-12 北京网秦天下科技有限公司 手机和手机安全系统以及相应的方法

Families Citing this family (54)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9959539B2 (en) 2012-06-29 2018-05-01 Apple Inc. Continual authorization for secured functions
US10212158B2 (en) 2012-06-29 2019-02-19 Apple Inc. Automatic association of authentication credentials with biometrics
US9344885B2 (en) * 2013-03-14 2016-05-17 Intel Deutschland Gmbh Communication devices and cellular wide area radio base station
CN103442124B (zh) * 2013-08-01 2016-05-04 宇龙计算机通信科技(深圳)有限公司 一种分体式移动终端及其防盗方法及系统
US10331866B2 (en) 2013-09-06 2019-06-25 Apple Inc. User verification for changing a setting of an electronic device
US20150073998A1 (en) 2013-09-09 2015-03-12 Apple Inc. Use of a Biometric Image in Online Commerce
CN103699860A (zh) * 2013-12-13 2014-04-02 北京奇虎科技有限公司 终端防盗方法及设备
US20150220931A1 (en) 2014-01-31 2015-08-06 Apple Inc. Use of a Biometric Image for Authorization
CN103841264A (zh) * 2014-02-19 2014-06-04 小米科技有限责任公司 一种保护终端设备的方法、装置及终端设备
US9721454B2 (en) 2014-02-19 2017-08-01 Xiaomi Inc. Method for protecting terminal devices and the terminal device thereof
US9747432B1 (en) * 2014-04-02 2017-08-29 Sprint Communications Company, L.P. Remotely enabling a disabled user interface of a wireless communication device
CN105323219B (zh) * 2014-07-01 2020-06-16 腾讯科技(深圳)有限公司 验证用户帐号身份信息的方法及装置
WO2016018040A1 (en) * 2014-07-31 2016-02-04 Samsung Electronics Co., Ltd. A terminal and a method of controlling the same
CN104378500B (zh) * 2014-10-16 2016-11-23 深圳天珑无线科技有限公司 防盗手机、基于该防盗手机的防盗方法以及防盗系统
CN105611495A (zh) * 2014-11-25 2016-05-25 镇江金软计算机科技有限责任公司 一种基于位置定位的手机防盗系统
CN104462929B (zh) * 2014-11-27 2017-07-04 广东欧珀移动通信有限公司 一种移动设备的隐私保护方法及装置
CN104601820A (zh) * 2015-01-29 2015-05-06 成都三零瑞通移动通信有限公司 一种基于tf密码卡的手机终端信息保护方法
CN105992121A (zh) * 2015-02-03 2016-10-05 中兴通讯股份有限公司 一种建立防盗对话的方法及装置
WO2016129863A1 (en) 2015-02-12 2016-08-18 Samsung Electronics Co., Ltd. Payment processing method and electronic device supporting the same
CN105989267B (zh) * 2015-02-16 2021-02-02 中兴通讯股份有限公司 一种基于声纹识别的安全防护方法和装置
US11107047B2 (en) 2015-02-27 2021-08-31 Samsung Electronics Co., Ltd. Electronic device providing electronic payment function and operating method thereof
KR102460459B1 (ko) 2015-02-27 2022-10-28 삼성전자주식회사 전자 장치를 이용한 카드 서비스 방법 및 장치
KR20160105346A (ko) * 2015-02-27 2016-09-06 삼성전자주식회사 결제 기능 제어 방법 및 그 장치
US9565169B2 (en) 2015-03-30 2017-02-07 Microsoft Technology Licensing, Llc Device theft protection associating a device identifier and a user identifier
CN104902448B (zh) * 2015-04-15 2016-05-25 努比亚技术有限公司 追踪移动终端的方法及系统
CN104902080B (zh) * 2015-04-30 2019-04-09 Oppo广东移动通信有限公司 一种信息交互方法和设备
US10278066B2 (en) * 2015-05-04 2019-04-30 Lg Electronics Inc. Method and apparatus for displaying identification of lost device for anti-theft operations
CN106470269A (zh) * 2015-08-20 2017-03-01 腾讯科技(深圳)有限公司 一种手机防盗的方法和装置
CN105162976B (zh) * 2015-08-24 2019-03-05 努比亚技术有限公司 移动终端及其防盗处理方法
CN105282326A (zh) * 2015-09-14 2016-01-27 联想(北京)有限公司 一种控制方法、电子设备及电子装置
CN105827810B (zh) * 2015-10-20 2019-09-24 南京步步高通信科技有限公司 一种基于声纹识别的通信终端寻回方法及通信终端
CN105491235B (zh) * 2015-12-01 2019-11-26 Tcl移动通信科技(宁波)有限公司 一种手机基于手势和动作识别的报警方法及其系统
CN105516500B (zh) * 2015-12-14 2019-02-19 广东小天才科技有限公司 一种选择设备模式的方法及系统
CN105611072B (zh) * 2016-02-24 2019-04-23 Oppo广东移动通信有限公司 一种移动终端被盗保护装置、移动终端及被盗保护方法
CN105592230B (zh) * 2016-02-24 2019-08-02 Oppo广东移动通信有限公司 一种移动终端被盗保护装置、移动终端及被盗保护方法
CN106097628A (zh) * 2016-06-15 2016-11-09 珠海市魅族科技有限公司 一种防盗保护方法及设备
KR20170143431A (ko) 2016-06-21 2017-12-29 최명수 협력 기반의 상호 감시를 통해 중요 휴대 물품의 도난 및 분실을 방지하기 위한 시스템 및 방법
JP6437974B2 (ja) * 2016-09-13 2018-12-12 ソフトバンク株式会社 認証サーバ、認証方法、制御プログラム、及び認証システム
CN106506843A (zh) * 2016-11-22 2017-03-15 奇酷互联网络科技(深圳)有限公司 一种防盗方法和移动终端
CN106843729A (zh) * 2017-01-20 2017-06-13 宇龙计算机通信科技(深圳)有限公司 一种终端操控方法及终端
CN107169384A (zh) * 2017-05-15 2017-09-15 上海与德科技有限公司 一种基于移动终端的保护方法及系统
CN107241714B (zh) * 2017-06-01 2020-12-08 珠海市魅族科技有限公司 一种建立通信的方法、装置及存储介质
CN107343088B (zh) * 2017-06-21 2020-09-22 深圳传音通讯有限公司 移动终端的信息保护方法及移动终端
CN107172602B (zh) * 2017-06-27 2021-08-10 上海展扬通信技术有限公司 移动终端的数据安全防护方法和装置
CN107707746B (zh) * 2017-09-25 2021-02-23 北京珠穆朗玛移动通信有限公司 移动终端的管理方法、电子设备及存储介质
CN107483748A (zh) * 2017-09-27 2017-12-15 上海与德科技有限公司 手机防盗方法和装置
CN108111594A (zh) * 2017-12-08 2018-06-01 鹤壁职业技术学院 一种防盗式电子通讯装置
CN108040112A (zh) * 2017-12-18 2018-05-15 珠海格力电器股份有限公司 一种通信方法及设备
CN109041059B (zh) * 2018-08-23 2022-01-21 中国联合网络通信集团有限公司 一种移动终端安全认证方法、管控平台和移动终端
CN109086635A (zh) * 2018-08-24 2018-12-25 合肥合纵光电科技有限公司 一种移动设备在丢失后对个人信息进行保护的系统
CN109688270B (zh) * 2019-01-14 2020-09-25 电子科技大学 一种手机壳及基于该手机壳的智能防盗与预警方法
CN109714465A (zh) * 2019-03-18 2019-05-03 深圳市道格恒通科技有限公司 一种智能手机防盗方法及系统
CN109889986A (zh) * 2019-03-22 2019-06-14 深圳市趣创科技有限公司 手机远程找回方法、装置、系统及存储介质
CN110225188A (zh) * 2019-05-20 2019-09-10 联想(北京)有限公司 一种信息处理方法及装置

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1787583A (zh) * 2004-12-06 2006-06-14 英华达(南京)科技有限公司 利用简讯服务远程控制移动电话设置的方法
CN1859670A (zh) * 2005-09-21 2006-11-08 华为技术有限公司 一种具有防盗功能的移动终端和移动终端防盗的方法
CN1946230A (zh) * 2006-10-19 2007-04-11 宇龙计算机通信科技(深圳)有限公司 手机防盗的方法
CN101039346A (zh) * 2006-03-16 2007-09-19 上海晨兴电子科技有限公司 手机防盗方法、设备以及含有该设备的通信终端
CN101287211A (zh) * 2008-05-07 2008-10-15 中兴通讯股份有限公司 一种移动终端防盗方法

Family Cites Families (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5594740A (en) * 1993-08-27 1997-01-14 Axion Logistics Corporation Wireless communications application specific enabling method and apparatus
JP3693259B2 (ja) * 1993-09-13 2005-09-07 カシオ計算機株式会社 通信管理装置
KR100636111B1 (ko) * 1999-10-30 2006-10-18 삼성전자주식회사 분실된 이동 단말기에 내장된 데이터 보호 방법 및 이에 관한 기록매체
US6662023B1 (en) * 2000-07-06 2003-12-09 Nokia Mobile Phones Ltd. Method and apparatus for controlling and securing mobile phones that are lost, stolen or misused
JP2004140710A (ja) * 2002-10-18 2004-05-13 Sony Corp 携帯電話端末および携帯電話端末の制御方法
US7389123B2 (en) * 2003-04-29 2008-06-17 Sony Ericsson Mobile Communications Ab Mobile apparatus with remote lock and control function
CN1302681C (zh) * 2004-05-11 2007-02-28 松讯达中科电子(深圳)有限公司 手机防盗的方法
TWI271992B (en) * 2004-07-28 2007-01-21 Mediatek Inc Mobile communication apparatus having anti-theft and auto-notification functions and method of operating the same
JP2006129329A (ja) * 2004-11-01 2006-05-18 Nec Corp 携帯電話システム及び携帯電話の不正使用防止方法
JP2006261990A (ja) * 2005-03-16 2006-09-28 Fujitsu Ltd 携帯端末および遠隔ロックプログラム
US9160830B2 (en) * 2005-07-25 2015-10-13 Mediatek Inc. Mobile communication apparatus having anti-theft and auto-notification functions
EP1874069A1 (en) * 2006-06-26 2008-01-02 Samsung Electronics Co., Ltd. Method for tracking a lost mobile station
CN101098156B (zh) * 2006-06-28 2012-05-23 鸿富锦精密工业(深圳)有限公司 具有特殊使用模式的通讯装置
US20090125442A1 (en) * 2007-11-09 2009-05-14 Jonathan Otto Wireless communications device configured for automated returns
CN101568119A (zh) * 2008-04-24 2009-10-28 鸿富锦精密工业(深圳)有限公司 具防盗功能的移动终端及其防盗方法
US8467768B2 (en) * 2009-02-17 2013-06-18 Lookout, Inc. System and method for remotely securing or recovering a mobile device
US8483659B2 (en) * 2009-02-26 2013-07-09 Qualcomm Incorporated Methods and systems for recovering lost or stolen mobile devices
US8566610B2 (en) * 2009-12-18 2013-10-22 Intel Corporation Methods and apparatus for restoration of an anti-theft platform
US20110149078A1 (en) * 2009-12-18 2011-06-23 At&T Intellectual Property I, Lp Wireless anti-theft security communications device and service
JP5174048B2 (ja) * 2010-01-07 2013-04-03 京セラ株式会社 携帯通信端末
US8730334B2 (en) * 2010-12-10 2014-05-20 Symantec Corporation Techniques for providing improved perpetrator imaging
WO2012154254A1 (en) * 2011-02-16 2012-11-15 Zealer Carl Configurable advertising and content rendering
US9042865B2 (en) * 2012-03-29 2015-05-26 Sony Computer Entertainment America Llc Method for determining mobile device password settings based on check-in information
CN103702331A (zh) * 2013-12-13 2014-04-02 北京奇虎科技有限公司 移动终端防盗方法及客户端

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1787583A (zh) * 2004-12-06 2006-06-14 英华达(南京)科技有限公司 利用简讯服务远程控制移动电话设置的方法
CN1859670A (zh) * 2005-09-21 2006-11-08 华为技术有限公司 一种具有防盗功能的移动终端和移动终端防盗的方法
CN101039346A (zh) * 2006-03-16 2007-09-19 上海晨兴电子科技有限公司 手机防盗方法、设备以及含有该设备的通信终端
CN1946230A (zh) * 2006-10-19 2007-04-11 宇龙计算机通信科技(深圳)有限公司 手机防盗的方法
CN101287211A (zh) * 2008-05-07 2008-10-15 中兴通讯股份有限公司 一种移动终端防盗方法

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2806666A4 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103581444A (zh) * 2013-11-21 2014-02-12 北京网秦天下科技有限公司 手机和手机安全系统以及相应的方法

Also Published As

Publication number Publication date
CN103220637A (zh) 2013-07-24
EP2806666A1 (en) 2014-11-26
US20140329500A1 (en) 2014-11-06
IN2014DN06215A (zh) 2015-10-23
SG11201404008YA (en) 2014-10-30
US9723482B2 (en) 2017-08-01
EP2806666A4 (en) 2015-08-05
JP5893169B2 (ja) 2016-03-23
JP2015507894A (ja) 2015-03-12

Similar Documents

Publication Publication Date Title
WO2013107395A1 (zh) 手机防盗保护方法及装置
CN101772018B (zh) 防盗移动终端及移动终端的防盗方法
US8583082B2 (en) System and method for tracking stolen communication terminal, and communication terminal
CN102739868B (zh) 移动终端的丢失处理方法及系统
US20150207917A1 (en) Mobile terminal intelligent anti-theft method and mobile terminal
WO2016034090A1 (zh) 提高移动终端安全性的方法及系统
WO2012109840A1 (zh) 一种通过人脸识别实现移动终端防盗的方法和装置
CN202679426U (zh) 一种移动终端防盗装置
CN101155212A (zh) 一种限制移动终端使用的方法
CN108769925B (zh) 一种用于移动终端的防盗寻回系统
CN101163290A (zh) 一种通过机卡相互认证限制移动终端使用的方法
CN110620847B (zh) 智能终端的防盗方法、该智能终端
EP3249570B1 (en) Method and device for providing prompt indicating loss of terminal
WO2017185658A1 (zh) 一种安全保护方法、装置、移动终端及电子设备
CN101707642B (zh) 一种智能防盗方法、终端和系统
CN110730446A (zh) 一种登录方法、终端及计算机存储介质
WO2017024550A1 (zh) 一种移动终端防盗系统及方法
WO2010067263A2 (en) A system for protection and backup of information in a mobile cell unit
CN108600964B (zh) 一种移动终端追踪定位系统
CN115551076A (zh) 移动终端的定位方法、装置、电子设备及存储介质
WO2008089638A1 (fr) Procédé et terminal de communication pour contrôler l'information d'usager dans le terminal de communication
CN101163289A (zh) 一种限制移动终端使用区域的方法
CN111050236B (zh) 电子设备防盗方法、装置及系统、电子设备及存储介质
CN106921941A (zh) 一种用于追寻被盗通信终端的系统和方法及通信终端
CN107872559A (zh) 一种防盗方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13738538

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2014552502

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

REEP Request for entry into the european phase

Ref document number: 2013738538

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2013738538

Country of ref document: EP