WO2016041160A1 - 移动终端的控制方法和移动终端 - Google Patents

移动终端的控制方法和移动终端 Download PDF

Info

Publication number
WO2016041160A1
WO2016041160A1 PCT/CN2014/086734 CN2014086734W WO2016041160A1 WO 2016041160 A1 WO2016041160 A1 WO 2016041160A1 CN 2014086734 W CN2014086734 W CN 2014086734W WO 2016041160 A1 WO2016041160 A1 WO 2016041160A1
Authority
WO
WIPO (PCT)
Prior art keywords
mobile terminal
network
time period
current time
correspondence
Prior art date
Application number
PCT/CN2014/086734
Other languages
English (en)
French (fr)
Inventor
卢恒惠
龙水平
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to EP14902119.8A priority Critical patent/EP3185600B1/en
Priority to CN201480080349.9A priority patent/CN106664557B/zh
Priority to PCT/CN2014/086734 priority patent/WO2016041160A1/zh
Priority to US15/512,135 priority patent/US20170280364A1/en
Publication of WO2016041160A1 publication Critical patent/WO2016041160A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/14Reselecting a network or an air interface
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/082Access security using revocation of authorisation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0055Transmission or use of information for re-establishing the radio link
    • H04W36/0069Transmission or use of information for re-establishing the radio link in case of dual connectivity, e.g. decoupled uplink/downlink
    • H04W36/00698Transmission or use of information for re-establishing the radio link in case of dual connectivity, e.g. decoupled uplink/downlink using different RATs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/14Reselecting a network or an air interface
    • H04W36/144Reselecting a network or an air interface over a different radio air interface technology
    • H04W36/1446Reselecting a network or an air interface over a different radio air interface technology wherein at least one of the networks is unlicensed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/16Performing reselection for specific purposes
    • H04W36/18Performing reselection for specific purposes for allowing seamless reselection, e.g. soft reselection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/34Reselection control
    • H04W36/36Reselection control by user or terminal equipment

Definitions

  • the embodiments of the present invention relate to the field of communications technologies, and in particular, to a mobile terminal control method and a mobile terminal.
  • the user will want to enter the conference scene and the mobile terminal adaptively changes from the ringing mode to the silent mode; further, the user usually has some private
  • the information is stored in the mobile terminal.
  • the leakage of private information in the mobile terminal may also bring economic loss and security problems to the user. If the mobile terminal can intelligently know that the mobile terminal is stolen, the security operation is automatically performed. , can effectively provide users with security.
  • the premise of the adaptive operation of the mobile terminal is: accurately knowing the usage scenario corresponding to the adaptive operation.
  • the user of the mobile terminal In order to let the mobile terminal know the current usage scenario, the user of the mobile terminal usually turns on the camera of the mobile terminal, captures the picture of the current use scenario, and then moves.
  • the terminal learns the current usage scenario according to the captured image, and performs an adaptive operation.
  • the user of the mobile terminal needs to actively open the camera of the mobile terminal, and the mobile terminal cannot automatically and timely. Determine the usage scenario, and turning on the camera will additionally increase the power consumption of the mobile terminal.
  • the embodiment of the present invention provides a mobile terminal control method and a mobile terminal, which are configured to perform corresponding control operations adaptively according to a network message received in real time and a corresponding relationship stored in a database, thereby facilitating the use of the user.
  • an embodiment of the present invention provides a method for controlling a mobile terminal, including:
  • the mobile terminal performs a corresponding control operation according to the determination result.
  • the network device includes a mobile communication base station, and the network identifier includes a cell identity Cell ID.
  • the network device includes a Wi-Fi access point device, and the network identifier includes a service set identifier SSID.
  • the network device includes a Bluetooth pairing device
  • the network identifier includes a Bluetooth device identifier
  • the performing, by the mobile terminal, the corresponding control operation according to the determination result includes:
  • the mobile terminal queries the network server to determine whether the mobile terminal is in a report loss state
  • the mobile terminal If the mobile terminal is in a report loss state, the mobile terminal performs an anti-theft operation.
  • the mobile terminal performs a corresponding control operation according to the determination result, including:
  • the mobile terminal performs an anti-theft operation.
  • the mobile terminal performs a corresponding control operation according to the determination result, including:
  • the mobile terminal performs identity verification on the holder of the mobile terminal
  • the mobile terminal performs an anti-theft operation.
  • control method before the mobile terminal receives the current network information, the control method further includes:
  • the mobile terminal determines whether the mobile terminal has the capability of receiving network information
  • the mobile terminal performs identity verification on the holder of the mobile terminal
  • the mobile terminal performs an anti-theft operation.
  • the identity verification includes at least one of the following:
  • the theft prevention operation includes at least one of the following operations: displaying setting information, locking the mobile terminal, Stored user data is deleted or encrypted, positioned, and ringed.
  • the database further stores a preset operation corresponding to the stored correspondence relationship, and the mobile terminal determines As a result, the corresponding control operations are performed, including:
  • the mobile terminal performs a preset operation; the preset operation is associated with a corresponding relationship stored in the database.
  • the database stores the correspondence between the time period and the network identifier in a time series manner, or the database is The manner in which the network identifier is classified stores the correspondence between the time period and the network identifier.
  • an embodiment of the present invention provides a mobile terminal, including:
  • a receiving module configured to receive at least one network message in a current time period, where the at least one network message is sent by at least one network device;
  • An acquiring module configured to acquire, according to a network message received in a current time period, a network identifier of a network message received in a current time period;
  • a judging module configured to determine whether a correspondence between the current time period and a network identifier of the network message received in the current time period meets a correspondence stored in the database, and the corresponding relationship stored in the database includes the current time Before the segment, the correspondence between the time period of the network message received by the mobile terminal and the network identifier;
  • the execution module is configured to perform a corresponding control operation according to the judgment result.
  • the network device includes a mobile communication base station, and the network identifier includes a cell identity Cell ID.
  • the network device includes a Wi-Fi access point device, and the network identifier includes a service set identifier SSID.
  • the network device includes a Bluetooth pairing device
  • the network identifier includes a Bluetooth device identifier
  • the executing module is specifically configured to: if the determination result is not met, query the network server, determine whether the mobile terminal is In a loss reporting state;
  • the execution module is specifically configured to perform an anti-theft operation if the determination result is not met.
  • the execution module is specifically configured to
  • the determining module is further configured to determine whether the mobile terminal has the capability of receiving network information
  • the mobile terminal performs identity verification on the holder of the mobile terminal
  • the identity verification includes at least one of the following:
  • the theft prevention operation includes at least one of the following operations: displaying setting information, locking the mobile terminal, Stored user data is deleted or encrypted, positioned, and ringed.
  • the database further stores a preset operation corresponding to the stored correspondence
  • the execution module is specifically configured to:
  • a preset operation is performed; the preset operation is associated with a correspondence stored in the database.
  • the database stores the correspondence between the time period and the network identifier in a time series manner, or the database is The manner in which the network identifier is classified stores the correspondence between the time period and the network identifier.
  • an embodiment of the present invention provides a mobile terminal, including:
  • a receiver configured to receive at least one network message in a current time period, where the at least one network message is sent by at least one network device;
  • a processor configured to acquire, according to the network message received in the current time period, a network identifier of the network message received in the current time period;
  • the network device includes a mobile communication base station, and the network identifier includes a cell identity Cell ID.
  • the network device includes a Wi-Fi access point device, and the network identifier includes a service set identifier SSID.
  • the network device includes a Bluetooth pairing device
  • the network identifier includes a Bluetooth device identifier
  • the processor is specifically configured to: if the determination result is not met, query the network server, determine whether the mobile terminal is In a loss reporting state;
  • the processor is specifically configured to perform an anti-theft operation if the determination result is not met.
  • the processor is specifically configured to
  • the processor is further configured to determine whether the mobile terminal has the capability of receiving network information
  • the mobile terminal performs identity verification on the holder of the mobile terminal
  • the identity verification includes at least one of the following:
  • the theft prevention operation includes at least one of the following operations: displaying setting information, locking the mobile terminal, Stored user data is deleted or encrypted, positioned, and ringed.
  • the database further stores a preset operation corresponding to the stored correspondence relationship, and the processor specifically uses to
  • a preset operation is performed; the preset operation is associated with a correspondence stored in the database.
  • the database stores the correspondence between the time period and the network identifier in a time series manner, or the database is The manner in which the network identifier is classified stores the correspondence between the time period and the network identifier.
  • the control method of the mobile terminal and the mobile terminal provided by the embodiment of the present invention can adaptively perform corresponding control operations through the correspondence between the network message received in real time and the database, thereby facilitating the use of the user.
  • Embodiment 1 is a schematic flowchart of Embodiment 1 of a method for controlling a mobile terminal according to the present invention
  • Embodiment 2 is a schematic flowchart of Embodiment 2 of a method for controlling a mobile terminal according to the present invention
  • FIG. 3 is a first schematic diagram of a database in Embodiment 2 of the present invention.
  • FIG. 4 is a second schematic diagram of a database in Embodiment 2 of the present invention.
  • Embodiment 3 is a schematic flowchart of Embodiment 3 of a method for controlling a mobile terminal according to the present invention
  • Embodiment 1 of a mobile terminal according to the present invention is a schematic structural diagram of Embodiment 1 of a mobile terminal according to the present invention.
  • FIG. 7 is a schematic structural diagram of Embodiment 2 of a mobile terminal according to the present invention.
  • FIG. 1 is a schematic flowchart diagram of Embodiment 1 of a method for controlling a mobile terminal according to the present invention.
  • the executor of the embodiment is a common mobile terminal, such as a smart phone, an iPad, etc.
  • the embodiment includes:
  • the mobile terminal receives at least one network message in a current time period.
  • the at least one network message is sent by at least one network device, wherein at least one network device includes at least any one or more of the following: a mobile communication base station (hereinafter referred to as a base station), Wi-Fi access Device, Bluetooth pairing device;
  • the current time period may be a time period of a certain duration, for example, a time period of 9:00 to 10:00, during the current time period, the mobile terminal moves from the location A to the location B, and the mobile terminal receives the coverage location A as the mobile moves.
  • the current time period may also be subdivided into time points.
  • the mobile terminal receives the network message sent by the mobile communication base station(s) covering the cell B at the time of 10:10; possible At the same time, the network message sent by the Wi-Fi access device, the Bluetooth pairing device, and the like set in the cell B is also received.
  • the mobile terminal acquires, according to the network message received in the current time period, a network identifier of the network message received in the current time period.
  • the network message carries the network identifier, and after receiving the network message, the mobile terminal can obtain the network identifier of the network message.
  • the network device that sends the network message is the mobile communication base station, and the network identifier includes the Cell ID. If the network device that sends the network message is a Wi-Fi access point device, the network identifier includes a Service Set Identifier (SSID); if the network device that sends the network message is a Bluetooth paired device, The network identifier includes a Bluetooth device identifier.
  • SSID Service Set Identifier
  • the mobile terminal determines whether the correspondence between the current time period and the network identifier of the network message received in the current time period meets the correspondence stored in the database.
  • the corresponding relationship stored in the foregoing database includes the correspondence between the time period of the network message received by the mobile terminal and the network identifier before the current time period;
  • the current time period and the time period before the current time period are not objective time. For example, today's 9:00 and yesterday's 9:00 are different in objective time, but the correspondence between the database storage network identifier and the time period is The relationship between the storage network identifier and the time period in which the 9 points are stored; for example, the current time period is 10:10 to 10:10 today, and the current time period is before 10:00 today.
  • the mobile terminal taking 9 o'clock and 10 o'clock yesterday as an example, the mobile terminal is in the coverage area of the base station 3 and the base station 4 at 9 o'clock and 10 o'clock yesterday, and the mobile terminal is sequentially at 9 o'clock and 10 o'clock yesterday.
  • the established correspondence includes the correspondence between Cell-ID-3 and 9 points, and the correspondence between Cell-ID-4 and 10 points; and the above correspondence may reflect the behavior mode of the user of the mobile terminal; In other words, human behavior habits are regularly followed. According to the time period and network identifier of the network information received within a certain period of time, the behavior pattern of the user reflecting the mobile terminal can be refined, as reflected by the above correspondence.
  • the behavior mode is that the user carries the mobile terminal at 9 o'clock every day in the coverage area of the base station 3, and is in the coverage area of the base station 4 at 10 o'clock every day; therefore, the network identifier is received as Cell-ID-4 at 10 o'clock today.
  • the mobile terminal can determine that Cell-ID-4 and today's 10 points match the stored Cell-ID-4 and 10 points of the database. Correspondence relationship; or when the network message with the network identifier of Cell-ID-5 is received at 10:00 today, since the correspondence stored in the database is 10 points corresponding to Cell-ID-4, today's 10 points and Cell-ID -5 does not match the correspondence in the database.
  • the above-mentioned current "simple” is a relative concept, that is, when the objective time is 10 o'clock today, today's 10 o'clock is the current time period, but as the objective time changes, it becomes today's 11 o'clock. At the time, 11 o'clock today is the new current time period.
  • the mobile terminal performs a corresponding control operation according to the determination result.
  • the mobile terminal determines the correspondence between the current time segment and the network identifier of the network message by performing S103, and conforms to the corresponding relationship stored in the database, the mobile terminal is in a normal scenario, and may also be said to be the holder of the mobile terminal in the current time period.
  • the behavior is consistent with the behavior mode of the user reflected by the corresponding relationship in the foregoing database.
  • the corresponding control operation may be to keep standby or perform corresponding control operations; for example, the user enters the base station at 9:00 before the current time.
  • the mobile terminal After the coverage area of 3, the mobile terminal is set to the vibration mode, and the operation set to the vibration mode is operated by the mobile terminal as a corresponding operation corresponding to the correspondence between Cell-ID-3 and 9 points, thereby being in the current time period.
  • the network message sent by the base station 3 is received, the network identifier Cell-ID-3 of the network message and the current 9-point correspondence with the stored Cell-ID-3 and 9 points of the database are determined. , the above operation can be performed in the vibration mode;
  • the mobile terminal determines that the correspondence between the current time period and the network identifier of the network message does not meet the corresponding relationship stored in the database, the mobile terminal is in an abnormal scenario, that is, the behavior of the holder of the mobile phone at the current moment. If the behavior of the user reflected in the corresponding relationship in the foregoing database is not met, it may be that the mobile terminal is stolen. If the holder of the mobile terminal is an illegal holder, the control operation that needs to be adaptively performed is an anti-theft operation. , then The user can retrieve the lost mobile terminal or prevent the private data in the mobile terminal from being stolen, bringing security and convenience to the user's life.
  • the mobile terminal can adaptively perform corresponding control operations by using the network message received in real time and the corresponding relationship stored in the database, thereby facilitating the use of the user; for example, in an office environment, the user does not need the mobile terminal to ring.
  • the bell if the mobile terminal receives the network message sent by the network device in the office environment in the current time period, can be adaptively set to the vibration mode, and does not need to use an additional auxiliary tool such as a camera to determine whether the mobile terminal is in the office environment. This saves the power of turning on additional auxiliary tools.
  • FIG. 2 is a schematic flowchart diagram of Embodiment 2 of a method for controlling a mobile terminal according to the present invention. As shown in FIG. 2, the embodiment is further described based on the embodiment shown in FIG. 1. Specifically, the embodiment includes:
  • the mobile terminal receives at least one network message in a current time period.
  • the mobile terminal acquires, according to the network message received in the current time period, a network identifier of the network message received in the current time period.
  • the mobile terminal determines whether the current time period and the network identifier of the network message received in the current time period meet the corresponding relationship stored in the database; if not, execute S204; if yes, execute S208.
  • FIG. 3 is a first schematic diagram of a database in Embodiment 2 of the present invention. As shown in FIG.
  • the mobile terminal receives multiple network messages, where the network identifier in the network message is specifically a cell-ID, and the time period for receiving each network message is specifically a time point, when the mobile terminal
  • the method for pattern recognition, machine learning, and the like is used to analyze the receiving time period and network identifier of each network message, for example, the network identifier of the network message received in the t time period of each day is cell-ID-x, at t
  • the network identifier of the network information received in the +1 time period is cell-ID-y
  • the network identifier of the network information received in the t+2 time period is cell-ID-z
  • the network information received in the t+3 time period is
  • the network identifier is cell-ID-k, and so on, the cell-ID corresponding to each time segment can be determined, that is, multiple correspondences are obtained, and the database of the mobile terminal stores the correspondence between the time segment and the network identifier in a time series manner.
  • the t time period is before
  • FIG. 4 is a second schematic diagram of a database in Embodiment 2 of the present invention.
  • the mobile terminal analyzes the receiving time point and the network identifier of each network message by using a pattern recognition, a machine learning, or the like on a plurality of network messages received before the current time period, for example, in t1 to (t1+15).
  • the network message with the network identifier being cell-ID-x is received in any period of time, and the network with the network identifier of cell-ID-y is received in any time period from t2 to (t2+5).
  • the cell-ID-x has a corresponding relationship with each of the time periods t1 to (t1+15), and the cell-ID-y has a corresponding relationship with each of the time periods of t2 to (t2+5);
  • the database stores the corresponding relationship
  • the correspondence between the time segment and the network identifier is stored in a network identifier classification manner, that is, the cell-ID-x is regarded as a category, and the information included in the cell-ID-x category is T1 to (t1+15), and in the cell-ID-y category, the information included is t2 to (t2+5).
  • the current time period may be a time, such as 10:10, and a network message with the network identifier of cell-ID-x is received at 10:10, and the current time period and the current time period are The correspondence between the network identifiers of the network messages received in the current time period is the correspondence between 10:10 and the cell-ID-x. If the database shown in FIG. 3 has the cell-ID-x and the cell-ID- The time period corresponding to x is specifically the time period in which 10:10 is located, or in the database shown in FIG.
  • time period may be specifically a specific period of time, for example, t represents a time period of 10:10 to 10:10, or the time period may also be a time point, that is, t is also expressed as 10:10.
  • the current time period may be a period of time with a certain duration, such as 10:10 to 10:20; and when at least one network message is received in the current time period, when S203 is executed, Specifically, the current time segment is subdivided into a plurality of subdivision time segments, and the correspondence between the network identifier of the network message received in each subdivision time segment and each subdivision time segment is determined, and is consistent with multiple pieces stored in the database. Correspondence relationship; for example, in the period from 10:10 to 10:20, the network with the network identifier of cell-ID-x is received at 10:10.
  • the message is received, and the network message with the network identifier of cell-ID-y is received at 10:15, and the network message with the network identifier of cell-ID-z is received at 10:20, so when performing S203, it needs to be judged.
  • the network identifiers are cell-ID-x, cell-ID-y, and cell-ID-z network messages and each subdivision time period (specifically, the subdivision time period including 10:10, and 10:15) Whether the correspondence between the time segment and the subdivision time segment where 10:20 is located corresponds to the correspondence between the cell-ID-x and the t time segment in the database, and the correspondence between the cell-ID-y and the t+1 time segment. Relationship between the relationship, cell-ID-z and t+2 time period;
  • the user's behavior mode is not completely static.
  • the user of the mobile terminal may carry the mobile terminal temporarily to go out. For example, the user should enter the coverage area of the base station y at 10:15, so that the network identifier sent by the receiving base station y is cell-ID-y network message, but on a certain day, the user temporarily enters the coverage of the base station s at 10:15, and then receives the network message with the network identifier as cell-ID-s, then the mobile terminal
  • a certain fault tolerance rate is allowed, for example, the network identifier is received at 10:10.
  • Network message of cell-ID-x and received the network message with the network identifier of cell-ID-s at 10:15, and received the network message with the network identifier of cell-ID-z at 10:20.
  • the t time period corresponding to the cell-ID-x is specifically the time period in which the 10 point 10 is located, and the t+1 time period is the time period in which the 10:15 minute is located and corresponds to the cell-ID-y.
  • the mobile terminal determines whether the mobile terminal can access the network server; if yes, execute S205; if not, execute S206.
  • the method of final confirmation can be divided into two categories, one is the network query network server for final confirmation, and the other is the local final confirmation of the mobile terminal, so it is necessary to determine whether the mobile terminal can access the network server before final confirmation, that is to say It is determined by S204 whether the mobile terminal can access the network (specifically, a cellular network, a wifi network, etc.).
  • the network specifically, a cellular network, a wifi network, etc.
  • the mobile terminal queries the network server to determine whether the mobile terminal is in a report loss state; if yes, execute S207, if no, execute S208.
  • the user registers the mobile terminal with the network server provided by the brand of the mobile terminal, or the user registers the mobile terminal on the network server of the application through the application on the mobile terminal, or the server of the operator.
  • the mobile terminal When the mobile terminal is registered, when the mobile terminal is stolen, the user can access the network server through other terminal devices, and report the loss to the mobile terminal, so as to recover the lost mobile terminal by the network; after the user reports the loss, the network server
  • the mobile terminal is recorded in the lost state, and while the user is looking for the lost mobile terminal, the mobile terminal itself determines whether it is in the report loss state by executing S201 to S205.
  • the mobile terminal performs identity verification on the holder of the mobile terminal, and determines whether the result of the identity verification is a failure; if yes, executes S207, and if not, executes S208.
  • the authentication operation includes at least one of the following operations: password verification, pattern unlocking, biometric recognition, etc., wherein the biometric identification may specifically be fingerprint recognition, face recognition, voiceprint recognition, etc.
  • the mobile terminal performs an anti-theft operation.
  • the anti-theft operation includes at least one of the following operations:
  • the mobile terminal displays setting information, locks the mobile terminal, the mobile terminal deletes or encrypts stored user data, the mobile terminal rings to make an alarm, the mobile terminal starts a camera to take a photo, and the photo is taken Sending to the network server, the mobile terminal performs a positioning operation and sends the positioning information to the network server;
  • the foregoing setting information may be set by the user, for example, “contact the mobile phone, please contact 135xxxxxxxx”; and after the mobile terminal is locked, the mobile terminal cannot be used normally; in order to prevent the user from being lost due to the loss of the mobile terminal Information is leaked, so mobile terminals can move by themselves
  • the user data stored in the terminal is deleted, and the stored user data may be encrypted.
  • the mobile terminal may perform a positioning operation, and send the positioning information obtained through the positioning operation to the terminal.
  • the network server at the same time, the mobile terminal can also activate the camera to take photos of the illegal holder of the mobile terminal.
  • the mobile terminal performs a preset operation.
  • the preset operation is associated with a corresponding relationship stored in the database
  • the correspondence between the current time segment and the network identifier of the network message received in the current time period is determined, and the correspondence relationship between the database storage is met, indicating that the mobile terminal is in a normal scenario, and the holder of the mobile terminal in the current time period may also be said.
  • the behavior of the user is consistent with the behavior of the user reflected in the corresponding relationship in the foregoing database.
  • the corresponding control operation may be to keep standby or perform corresponding control operations; for example, the user is at 9 o'clock before the current time period.
  • the above operation can be performed as the vibration mode. ;
  • the foregoing preset operation may also be that the mobile terminal connects to the Wi-Fi access point, or performs an on-site reminder to the user.
  • S208 is directly executed; if S205 is determined to be that the mobile terminal is not in the report loss state or S206 is determined to determine that the holder of the mobile terminal passes the verification, S208 may not be executed, specifically If the user carries the mobile terminal to travel, the identifier of the network message received in the t+3 time period is not cell-ID-k, but is cell-ID-p. At this time, although it is determined by S204 or S205 that the mobile terminal is not stolen, However, there is no correspondence between cell-ID-p and t+3 in the database, so there is no preset operation, or it can be said that the preset operation is to maintain the standby state at this time.
  • S209 may also be performed.
  • the mobile terminal stores the correspondence between the current time segment and the network identifier of the network message received by the current time period to the database.
  • the correspondence between the current time period and the network identifier of the network message received by the current time period is stored in the database, which is equivalent to establishing a database;
  • the database is updated according to the network identifier of the network message received in the new current time period and the new current time period. Therefore, more and more corresponding relationships are stored in the database, so that the mobile terminal's judgment on the theft of the mobile terminal is more and more accurate, and the user's use is facilitated;
  • the network identifier of the network message received in the current time period does not meet the corresponding relationship stored in the database, and after querying the network server or authenticating the holder of the mobile terminal, determining that the mobile terminal is When stolen, the network message received in the current time period is discarded, that is, the database is not updated according to the network identifier and the current time period of the network message received in the current time period.
  • a corresponding relationship is a network received according to the first moment before the current time period (objective time, such as 9 o'clock 30 days ago). The difference between the first moment and the current time period (ie, 9 o'clock today) determined by the first moment is greater than ⁇ (preset value). If ⁇ is 30 days, the corresponding concern is determined. For outdated information, the mobile terminal deletes the obsolete information.
  • the mobile terminal can adaptively perform corresponding control operations by using the network message received in real time and the corresponding relationship stored in the database, thereby facilitating the use of the user; for example, in an office environment, the user does not need the mobile terminal to ring.
  • the bell if the mobile terminal receives the network message sent by the network device in the office environment in the current time period, can be adaptively set to the vibration mode, and does not need to use an additional auxiliary tool such as a camera to determine whether the mobile terminal is in the office environment. The power consumption of the additional auxiliary tool can be saved.
  • the mobile terminal is confirmed by checking the network server or using the identity verification operation of the mobile terminal itself to confirm whether the mobile terminal is stolen. Perform the appropriate control operation accuracy.
  • FIG. 5 is a schematic flowchart of Embodiment 3 of a method for controlling a mobile terminal according to the present invention. As shown in FIG. 5, the present embodiment is described in conjunction with the embodiment shown in FIG. 1 or FIG. 2, and the anti-theft operation is performed as a service function of the mobile terminal, and is described in more detail. Specifically, the embodiment includes :
  • the mobile terminal turns on the anti-theft function.
  • the following S302 to S311 can be executed in real time, which can be sent in time.
  • the mobile terminal performs the anti-theft operation immediately after being stolen; in order to prevent the unscrupulous person from turning off the anti-theft function by means of restoring the factory settings, the code for implementing the anti-theft function is written into the operating system of the mobile terminal or burned into the ROM of the mobile terminal. (Read-Only Memory, read-only memory).
  • the mobile terminal determines whether the mobile terminal has the capability of receiving network information. If yes, execute S303, if no, execute S309.
  • the mobile phone waits to receive the network information, that is, executes S309; the result is False, indicating that the mobile phone is not in the flight mode, and then waits for execution S303.
  • the mobile terminal receives the network message in the current time period.
  • the mobile terminal acquires, according to the network message received in the current time period, a network identifier of the network message received in the current time period.
  • S305 The mobile terminal determines whether the correspondence between the current time period and the network identifier of the network message received in the current time period meets the corresponding relationship stored in the database; if not, execute S306; if yes, return to S302 (or not execute S302, wait Go to S303).
  • the network message is taken as an example of the base station information sent by the base station, and when the base station information is received, in the Android operating system, the network identifier and the input in the base station information can be obtained by using a function (in JAVA language) NetworkInfo getNetworkInfo (int networkType).
  • NetworkType TYPE_MOBILE.
  • the mobile terminal determines whether the mobile terminal can access the network server; if yes, execute S307; if not, execute S309.
  • the mobile terminal queries the network server to determine whether the mobile terminal is in a report loss state; if yes, execute S308; if not, return to S302 (or not execute S302, and wait for execution S303).
  • the mobile terminal performs an anti-theft operation.
  • the mobile terminal performs identity verification on the holder of the mobile terminal, and determines identity verification. Whether the result is a failure; if yes, execute S308; if not, execute S310.
  • the mobile terminal turns off the anti-theft function.
  • the mobile terminal After performing S309 to determine that the holder of the mobile terminal is still a legitimate user of the mobile terminal, it is conceivable that the mobile terminal is still owned by the legitimate user within a certain period of time in the future, and in order to avoid frequent user authentication and interfere with the user, in the future
  • the anti-theft function can be turned off within a certain period of time.
  • the mobile terminal acquires a trigger condition for turning on the anti-theft function, and returns to S301.
  • the mobile terminal After the anti-theft function is turned off by the mobile terminal, the mobile terminal performs monitoring. When the mobile terminal obtains the trigger condition for turning on the anti-theft function, the mobile terminal immediately returns to S301 to perform anti-theft protection on the mobile terminal; wherein the trigger condition for enabling the anti-theft function may be that the user uses the mobile device.
  • the terminal performs presets, for example, the triggering condition is a preset duration, that is, after the mobile terminal performs S310, the mobile terminal starts a timer. When the mobile terminal determines that the timer has reached the preset duration, the mobile terminal acquires the anti-theft function. Triggering conditions.
  • the mobile terminal in the process of returning to S302 after performing S305 (or waiting for execution of S303), the mobile terminal may perform the foregoing embodiment in the same manner as the mobile terminal considers that the mobile terminal is not stolen. S208 and/or S209; similarly, in the process of returning to S302 after performing S307 (or waiting to perform S303), the mobile terminal may further perform S209 in the foregoing embodiment; and while performing S308-S310, the mobile terminal may perform S209 in the foregoing embodiment.
  • the mobile terminal determines the usage scenario of the mobile terminal at the current time by using the network information received in real time and the acquired historical network information, and before the mobile terminal finally determines that the usage scenario is an abnormal scenario, By using the identity verification operation of the mobile terminal itself, it is confirmed whether the mobile terminal is in an abnormal scenario, so that the judgment of the usage scenario is more accurate, and the use security of the user's mobile terminal is effectively guaranteed.
  • FIG. 6 is a schematic structural diagram of Embodiment 1 of a mobile terminal according to the present invention. As shown in Figure 6, it includes:
  • the receiving module 11 is configured to receive at least one network message in a current time period, where the at least one network message is sent by at least one network device;
  • the obtaining module 12 is configured to acquire, according to the network message received in the current time period, a network identifier of the network message received in the current time period;
  • the determining module 13 is configured to determine whether the correspondence between the current time period and the network identifier of the network message received in the current time period is consistent with the corresponding relationship stored in the database, and the corresponding relationship stored in the database includes the current The network received by the mobile terminal before the time period Correspondence between the time period of the network message and the network identifier;
  • the executing module 14 is configured to perform a corresponding control operation according to the determination result.
  • the network device includes a mobile communication base station, and the network identifier includes a cell identifier Cell ID.
  • the network device includes a Wi-Fi access point device, and the network identifier includes a service set identifier SSID.
  • the network device includes a Bluetooth pairing device
  • the network identifier includes a Bluetooth device identifier
  • the executing module 14 is specifically configured to: if the judgment result is not met, query the network server, and determine whether the mobile terminal is in a report loss state;
  • execution module 14 is specifically configured to perform an anti-theft operation if the determination result is not met.
  • execution module 14 is specifically configured to
  • the determining module 13 is further configured to determine whether the mobile terminal has the capability of receiving network information
  • the mobile terminal performs identity verification on the holder of the mobile terminal
  • the authentication includes at least one of the following:
  • the anti-theft operation includes at least one of: displaying setting information, locking the mobile terminal, deleting or encrypting stored user data, performing a positioning operation, and ringing.
  • the database further stores a preset operation corresponding to the stored correspondence relationship
  • the execution module 14 is specifically configured to
  • a preset operation is performed; the preset operation is associated with a correspondence stored in the database.
  • the database stores the correspondence between the time segment and the network identifier in a time series manner, or the database stores the time segment and the network identifier in a network identifier classification manner. Correspondence relationship.
  • the mobile terminal can adaptively perform corresponding control operations by using the network message received in real time and the corresponding relationship stored in the database, thereby facilitating the use of the user; for example, in an office environment, the user does not need the mobile terminal to ring.
  • the bell if the mobile terminal receives the network message sent by the network device in the office environment in the current time period, can be adaptively set to the vibration mode, and does not need to use an additional auxiliary tool such as a camera to determine whether the mobile terminal is in the office environment. This saves the power of turning on additional auxiliary tools.
  • FIG. 7 is a schematic structural diagram of Embodiment 2 of a mobile terminal according to the present invention. As shown in Figure 7, it includes:
  • the receiver 21 is configured to receive at least one network message in a current time period, where the at least one network message is sent by at least one network device;
  • the processor 22 is configured to acquire, according to the network message received in the current time period, a network identifier of the network message received in the current time period;
  • the network device includes a mobile communication base station, and the network identifier includes a cell identifier Cell ID.
  • the network device includes a Wi-Fi access point device, and the network identifier includes a service set identifier SSID.
  • the network device includes a Bluetooth pairing device
  • the network identifier includes a Bluetooth device identifier
  • the processor 22 is specifically configured to: if the judgment result is not met, query the network server, and determine whether the mobile terminal is in a report loss state;
  • the processor 22 is specifically configured to perform an anti-theft operation if the determination result is non-conformity.
  • processor is specifically configured to be used
  • processor 22 is further configured to determine whether the mobile terminal has the capability of receiving network information
  • the mobile terminal performs identity verification on the holder of the mobile terminal
  • the authentication includes at least one of the following:
  • the anti-theft operation includes at least one of: displaying setting information, locking the mobile terminal, deleting or encrypting stored user data, performing a positioning operation, and ringing.
  • the database further stores a preset operation corresponding to the stored correspondence relationship
  • the processor 22 is specifically configured to
  • a preset operation is performed; the preset operation is associated with a correspondence stored in the database.
  • the database stores the correspondence between the time segment and the network identifier in a time series manner, or the database stores the correspondence between the time segment and the network identifier in a manner of network identifier classification.
  • the mobile terminal can adaptively perform corresponding control operations by using the network message received in real time and the corresponding relationship stored in the database, thereby facilitating the use of the user; for example, in an office environment, the user does not need the mobile terminal to ring.
  • the bell if the mobile terminal receives the network message sent by the network device in the office environment in the current time period, can be adaptively set to the vibration mode, and does not need to use an additional auxiliary tool such as a camera to determine whether the mobile terminal is in the office environment. This saves the power of turning on additional auxiliary tools.
  • receivers and processors respectively perform the respective steps in the foregoing method embodiments, and the specific execution process and technical effects can refer to the respective steps in the foregoing various method embodiments.
  • the storage medium includes: a medium that can store program codes, such as a ROM, a RAM, a magnetic disk, or an optical disk.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明实施例提供一种移动终端的控制方法和移动终端,该控制方法包括:在当前时间段接收至少一个网络消息,所述至少一个网络消息是由至少一个网络设备发送的;根据在当前时间段接收的网络消息,获取在当前时间段接收的网络消息的网络标识;判断当前时间段和在当前时间段接收的网络消息的网络标识的对应关系,是否符合数据库中存储的对应关系,数据库中存储的对应关系,包括当前时间段之前,移动终端接收的网络消息的时间段和网络标识的对应关系;通过本发明实施例提供的移动终端的控制方法和移动终端,通过实时接收的网络消息和数据库中存储的对应关系,可自适应的执行相应的控制操作,给用户的使用带来便利。

Description

移动终端的控制方法和移动终端 技术领域
本发明实施例涉及通信技术领域,尤其涉及一种移动终端的控制方法和移动终端。
背景技术
随着移动技术的发展,各种移动终端也日益普及,如常见的智能手机已应用在人们生活的各个方面;目前,用户使用移动终端除了获取通信服务以外,还会期望移动终端针对不同的使用场景提供不同的、便于用户使用的服务。举例来说,当移动终端的使用场景为会议场景时,用户需要移动终端保持静音,但由于用户的疏忽,在进入会议场景后忘了将移动终端由响铃模式更改为静音模式,当移动终端接收到消息时仍然会发出声音进行提醒,从而给用户带来不便,此时用户会希望进入会议场景后移动终端自适应的由响铃模式更改为静音模式;进一步的,用户通常会将一些私人信息存储在移动终端内,当移动终端被盗时,移动终端内的私人信息泄露也会给用户带来经济损失与安全问题,若移动终端可智能地获知移动终端被盗后,自动进行防盗操作,则可有效地为用户提供安全保障。
移动终端自适应操作的前提是:准确获知自适应操作对应的使用场景,为了让移动终端获知当前的使用场景,通常移动终端的用户会开启移动终端的摄像头,捕捉当前使用场景的画面,随后移动终端根据捕捉的画面获知当前的使用场景,并进行自适应操作,但采用现有技术使移动终端获知使用场景的过程中,移动终端的用户需要主动开启移动终端的摄像头,移动终端不能自动、及时的确定使用场景,且开启摄像头还会额外增加移动终端的功耗。
发明内容
本发明实施例提供一种移动终端的控制方法和移动终端,用于根据实时接收的网络消息和数据库中存储的对应关系,可自适应的执行相应的控制操作,给用户的使用带来便利。
第一方面,本发明实施例提供一种移动终端的控制方法,包括:
所述移动终端在当前时间段接收至少一个网络消息,所述至少一个网络消息是由至少一个网络设备发送的;
所述移动终端根据在当前时间段接收的网络消息,获取在当前时间段接收的网络消息的网络标识;
所述移动终端判断所述当前时间段和在当前时间段接收的网络消息的网络标识的对应关系,是否符合数据库中存储的对应关系,所述数据库中存储的对应关系,包括所述当前时间段之前,所述移动终端接收的网络消息的时间段和网络标识的对应关系;
所述移动终端根据判断结果,执行相应的控制操作。
结合第一方面,在第一实施方式中,所述网络设备包括移动通信基站,所述网络标识包括小区标识Cell ID。
结合第一方面或第一实施方式,在第二实施方式中,在所述网络设备包括Wi-Fi接入点设备,所述网络标识包括服务集标识SSID。
结合第一方面至第一方面第二实施方式中任意一种实施方式,在第三实施方式中,所述网络设备包括蓝牙配对设备,所述网络标识包括蓝牙设备标识。
结合第一方面至第一方面第三实施方式中任意一种实施方式,在第四实施方式中,所述移动终端根据判断结果,执行相应的控制操作包括:
若判断结果为不符合,所述移动终端查询网络服务器,判断所述移动终端是否处于挂失状态;
若所述移动终端处于挂失状态,则所述移动终端执行防盗操作。
结合第一方面至第一方面第三实施方式中任意一种实施方式,在第五实施方式中,所述移动终端根据判断结果,执行相应的控制操作,包括:
若判断结果为不符合,则所述移动终端执行防盗操作。
结合第一方面至第一方面第三实施方式中任意一种实施方式,在第六实施方式中,所述移动终端根据判断结果,执行相应的控制操作,包括:
若判断结果为不符合,则所述移动终端对所述移动终端的持有人的进行身份验证;
若未通过验证,则所述移动终端执行防盗操作。
结合第一方面至第一方面第三实施方式中任意一种实施方式,在第七实施方式中,在移动终端接收当前网络信息之前,所述控制方法还包括:
所述移动终端判断所述移动终端是否具有接收网络信息的能力;
若否,所述移动终端对所述移动终端的持有人进行身份验证;
若未通过验证,则所述移动终端执行防盗操作。
结合第一方面第六实施方式或第七实施方式,在第八实施方式中,所述身份验证至少包括下述任意一种:
密码验证、图案解锁、生物特征识别。
结合第一方面第四实施方式至第八实施方式中任意一种实施方式,在第九实施方式中,所述防盗操作包括至少一种以下操作:显示设定信息、锁定所述移动终端、将存储的用户数据删除或加密、进行定位操作和响铃。
结合第一方面至第一方面第九实施方式中任意一种实施方式,在第十实施方式中,所述数据库还存储有与其存储的对应关系相对应的预设操作,所述移动终端根据判断结果,执行相应的控制操作,包括:
若判断结果为符合,所述移动终端执行预设操作;所述预设操作与数据库存储的对应关系相关联。
结合第一方面至第一方面第十实施方式中任意一种实施方式,在第十一实施方式中,所述数据库以时间序列的方式存储时间段和网络标识的对应关系,或者所述数据库以网络标识分类的方式存储时间段和网络标识的对应关系。
第二方面,本发明实施例提供一种移动终端,包括:
接收模块,用于在当前时间段接收至少一个网络消息,所述至少一个网络消息是由至少一个网络设备发送的;
获取模块,用于根据在当前时间段接收的网络消息,获取在当前时间段接收的网络消息的网络标识;
判断模块,用于判断所述当前时间段和在当前时间段接收的网络消息的网络标识的对应关系,是否符合数据库中存储的对应关系,所述数据库中存储的对应关系,包括所述当前时间段之前,所述移动终端接收的网络消息的时间段和网络标识的对应关系;
执行模块,用于根据判断结果,执行相应的控制操作。
结合第二方面,在第一实施方式中,所述网络设备包括移动通信基站,所述网络标识包括小区标识Cell ID。
结合第二方面或第一实施方式,在第二实施方式中,所述网络设备包括Wi-Fi接入点设备,所述网络标识包括服务集标识SSID。
结合第二方面至第二方面第二实施方式中任意一种实施方式,在第三实施方式中,所述网络设备包括蓝牙配对设备,所述网络标识包括蓝牙设备标识。
结合第二方面至第二方面第三实施方式中任意一种实施方式,在第四实施方式中,所述执行模块具体用于若判断结果为不符合,查询网络服务器,判断所述移动终端是否处于挂失状态;
若所述移动终端处于挂失状态,则执行防盗操作。
结合第二方面至第二方面第三实施方式中任意一种实施方式,在第五实施方式中,所述执行模块具体用于若判断结果为不符合,则执行防盗操作。
结合第二方面至第二方面第三实施方式中任意一种实施方式,在第六实施方式中,所述执行模块具体用于
若判断结果为不符合,则对所述移动终端的持有人的进行身份验证;
若未通过验证,则执行防盗操作。
结合第二方面至第二方面第三实施方式中任意一种实施方式,在第七实施方式中,所述判断模块还用于判断所述移动终端是否具有接收网络信息的能力;
若否,所述移动终端对所述移动终端的持有人进行身份验证;
若未通过验证,则执行防盗操作。
结合第二方面第六实施方式或第七实施方式,在第八实施方式中,所述身份验证至少包括下述任意一种:
密码验证、图案解锁、生物特征识别。
结合第二方面第四实施方式至第八实施方式中任意一种实施方式,在第九实施方式中,所述防盗操作包括至少一种以下操作:显示设定信息、锁定所述移动终端、将存储的用户数据删除或加密、进行定位操作和响铃。
结合第二方面至第二方面第九实施方式中任意一种实施方式,在第十 实施方式中,所述数据库还存储有与其存储的对应关系相对应的预设操作,所述执行模块具体用于
若判断结果为符合,执行预设操作;所述预设操作与数据库存储的对应关系相关联。
结合第二方面至第二方面第十实施方式中任意一种实施方式,在第十一实施方式中,所述数据库以时间序列的方式存储时间段和网络标识的对应关系,或者所述数据库以网络标识分类的方式存储时间段和网络标识的对应关系。
第三方面,本发明实施例提供一种移动终端,包括:
接收器,用于在当前时间段接收至少一个网络消息,所述至少一个网络消息是由至少一个网络设备发送的;
处理器,用于根据在当前时间段接收的网络消息,获取在当前时间段接收的网络消息的网络标识;
判断所述当前时间段和在当前时间段接收的网络消息的网络标识的对应关系,是否符合数据库中存储的对应关系,所述数据库中存储的对应关系,包括所述当前时间段之前,所述移动终端接收的网络消息的时间段和网络标识的对应关系;
根据判断结果,执行相应的控制操作。
结合第三方面,在第一实施方式中,所述网络设备包括移动通信基站,所述网络标识包括小区标识Cell ID。
结合第三方面或第一实施方式,在第二实施方式中,所述网络设备包括Wi-Fi接入点设备,所述网络标识包括服务集标识SSID。
结合第三方面至第三方面第二实施方式中任意一种实施方式,在第三实施方式中,所述网络设备包括蓝牙配对设备,所述网络标识包括蓝牙设备标识。
结合第三方面至第三方面第三实施方式中任意一种实施方式,在第四实施方式中,所述处理器具体用于若判断结果为不符合,查询网络服务器,判断所述移动终端是否处于挂失状态;
若所述移动终端处于挂失状态,则执行防盗操作。
结合第三方面至第三方面第三实施方式中任意一种实施方式,在第五 实施方式中,所述处理器具体用于若判断结果为不符合,则执行防盗操作。
结合第三方面至第三方面第三实施方式中任意一种实施方式,在第六实施方式中,所述处理器具体用于
若判断结果为不符合,则对所述移动终端的持有人的进行身份验证;
若未通过验证,则执行防盗操作。
结合第三方面至第三方面第三实施方式中任意一种实施方式,在第七实施方式中,所述处理器还用于判断所述移动终端是否具有接收网络信息的能力;
若否,所述移动终端对所述移动终端的持有人进行身份验证;
若未通过验证,则执行防盗操作。
结合第三方面第六实施方式或第七实施方式,在第八实施方式中,所述身份验证至少包括下述任意一种:
密码验证、图案解锁、生物特征识别。
结合第三方面第四实施方式至第八实施方式中任意一种实施方式,在第九实施方式中,所述防盗操作包括至少一种以下操作:显示设定信息、锁定所述移动终端、将存储的用户数据删除或加密、进行定位操作和响铃。
结合第三方面至第三方面第九实施方式中任意一种实施方式,在第十实施方式中,所述数据库还存储有与其存储的对应关系相对应的预设操作,所述处理器具体用于
若判断结果为符合,执行预设操作;所述预设操作与数据库存储的对应关系相关联。
结合第三方面至第三方面第十实施方式中任意一种实施方式,在第十一实施方式中,所述数据库以时间序列的方式存储时间段和网络标识的对应关系,或者所述数据库以网络标识分类的方式存储时间段和网络标识的对应关系。
本发明实施例提供的移动终端的控制方法和移动终端,通过实时接收的网络消息和数据库中存储的对应关系,可自适应的执行相应的控制操作,给用户的使用带来便利。
附图说明
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作一简单地介绍,显而易见地,下面描述中的附图是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。
图1为本发明移动终端的控制方法实施例一的流程示意图;
图2为本发明移动终端的控制方法实施例二的流程示意图;
图3为本发明实施例二中数据库的第一示意图;
图4为本发明实施例二中数据库的第二示意图;
图5为本发明移动终端的控制方法实施例三的流程示意图;
图6为本发明移动终端实施例一的结构示意图;
图7为本发明移动终端实施例二的结构示意图。
具体实施方式
为使本发明实施例的目的、技术方案和优点更加清楚,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
图1为本发明移动终端的控制方法实施例一的流程示意图。如图1所示,本实施例的执行主体为常见的移动终端,例如智能手机、iPad等,具体的,本实施例包括:
S101、移动终端在当前时间段接收至少一个网络消息。
上述至少一个网络消息是由至少一个网络设备发送的,其中至少一个网络设备至少包括下述设备中的任意一种或多种组合:移动通信基站(下述简称为基站)、Wi-Fi接入设备、蓝牙配对设备;
上述当前时间段可以为一定时长的时间段,例如9点至10点的时间段,在当前时间段内,移动终端由位置A移动至位置B,且移动终端随着移动接收到覆盖位置A的移动通信基站(一个或多个)发送的网络消息、覆盖位置B的移动通信基站(一个或多个)发送的网络消息,而且当位置 A和位置B的附近存在Wi-Fi(WirelessFidelity,无线保真技术)接入设备、或可与移动终端配对的蓝牙配对设备时,移动终端还会接收到Wi-Fi接入设备、蓝牙配对设备发送的网络消息;
可选的,上述当前时间段也可以细分为时刻点,例如移动终端在10点10分这一时刻,接收到覆盖小区B的移动通信基站(一个或多个)发送的网络消息;可能的,还同时接收到设置在小区B内的Wi-Fi接入设备、蓝牙配对设备等发送的网络消息。
S102、移动终端根据在当前时间段接收的网络消息,获取在当前时间段接收的网络消息的网络标识。
网络消息会携带网络标识,则移动终端接收到网络消息后,可获取到该网络消息的网络标识,具体的,发送网络消息的网络设备为移动通信基站,则所述网络标识包括Cell ID(小区标识);若发送网络消息的网络设备为Wi-Fi接入点设备,则所述网络标识包括SSID(Service Set Identifier,服务集标识);若发送网络消息的网络设备为蓝牙配对设备,则所述网络标识包括蓝牙设备标识。
S103、移动终端判断当前时间段和在当前时间段接收的网络消息的网络标识的对应关系,是否符合数据库中存储的对应关系。
上述数据库中存储的对应关系,包括上述当前时间段之前,所述移动终端接收的网络消息的时间段和网络标识的对应关系;
需要说明的是,上述当前时间段和当前时间段之前的时间段不为客观时间,例如今天9点和昨天的9点在客观时间上来说是不同的,但数据库存储网络标识和时间段的对应关系时,是存储网络标识和9点所在的时间段的对应关系;举例来说,当前时间段为今天的10点~10点10分,则上述当前时间段之前即为今天10点之前的任意一个时间段,以昨天的9点和10点为例,移动终端在昨天的9点和10点依次处于基站3和基站4的覆盖区域内,则移动终端分别在昨天的9点和10点依次接收到基站3和基站4发送的网络消息,其中基站3发送的网络消息的网络标识为Cell-ID-3,而基站4发送的网络消息的网络标识为Cell-ID-4,从而在数据库中建立的对应关系包括Cell-ID-3和9点的对应关系、Cell-ID-4和10点的对应关系;且上述对应关系可反映出移动终端的用户的行为模式;通常 而言,人类的行为习惯都是有规律可循的,根据在一定时间内接收的网络信息的时间段和网络标识,便可提炼出反映移动终端的用户的行为模式,如上述对应关系反映的行为模式为用户每天在9点携带移动终端处于基站3的覆盖区域内,而在每天的10点处于基站4的覆盖区域内;因此在今天的10点接收到网络标识为Cell-ID-4的网络标识时,由于数据库已存储了Cell-ID-4和10点的对应关系,则移动终端可确定Cell-ID-4和今天的10点符合数据库已存储的Cell-ID-4和10点的对应关系;或者在今天的10点接收到网络标识为Cell-ID-5的网络消息时,由于数据库中存储的对应关系是Cell-ID-4对应10点,因此今天的10点和Cell-ID-5不符合数据库中的对应关系。
另外,上述当前是简单中的“当前”为相对概念,即客观时间为今天的10点时,则今天的10点即为当前时间段,但随着客观时间的推移,变为今天的11点时,则今天的11点即为新的当前时间段。
S104、移动终端根据判断结果,执行相应的控制操作。
当移动终端通过执行S103判断当前时间段和网络消息的网络标识的对应关系,符合数据库中存储的对应关系,则说明移动终端处于正常场景,也可以说在当前时间段移动终端的持有者的行为符合前述数据库中对应关系所反映用户的行为模式,此时上述相应的控制操作具体可以为保持待机,也可以是执行相应的控制操作;例如在当前时刻之前,用户每次在9点进入基站3的覆盖区域后,便会将移动终端设置为震动模式,则设置为震动模式的操作被移动终端当作为相应于Cell-ID-3和9点的对应关系的控制操作,从而在当前时间段具体为9点时,且接收到基站3发送的网络消息后,确定该网络消息的网络标识Cell-ID-3和当前的9点符合数据库已存储的Cell-ID-3和9点的对应关系,便可执行上述设置为震动模式的操作;
或者当移动终端通过执行S103判断当前时间段和网络消息的网络标识的对应关系,不符合数据库中存储的对应关系,则说明移动终端处于异常场景,即在当前时刻的手机的持有者的行为不符合前述数据库中对应关系所反映用户的行为模式,则可能的,移动终端发生了被盗,则此时移动终端的持有人为非法持有人,则需要自适应执行的控制操作为防盗操作,便 于用户找回丢失的移动终端或防止移动终端内的私人数据被盗取,给用户的生活带来安全与方便。
本实施例中,移动终端通过实时接收的网络消息和数据库中存储的对应关系,可自适应的执行相应的控制操作,给用户的使用带来便利;例如在办公环境中用户不需要移动终端响铃,则移动终端只要在当前时间段接收到办公环境中的网络设备发送的网络消息后,便可自适应的设置为震动模式,不需借助摄像头等额外的辅助工具确定移动终端是否处于办公环境,可节省开启额外辅助工具的功耗。
图2为本发明移动终端的控制方法实施例二的流程示意图。如图2所示,本实施例是基于图1所示的实施例的做出的进一步描述,具体的,本实施例包括:
S201、移动终端在当前时间段接收至少一个网络消息。
S202、移动终端根据在当前时间段接收的网络消息,获取在当前时间段接收的网络消息的网络标识。
S203、移动终端判断当前时间段和在当前时间段接收的网络消息的网络标识是否符合数据库中存储的对应关系;若否,执行S204;若是,执行S208。
可参照前述S103,根据在当前时间段之前,移动终端接收的网络消息的时间段和网络标识,可提炼出对应关系,该对应关系可反映移动终端的用户的行为模式,且上述对应关系可以为至少一个;具体的,图3为本发明实施例二中数据库的第一示意图。如图3所示,在当前时间段之前,移动终端接收到多个网络消息,其中网络消息中的网络标识具体为cell-ID,接收各个网络消息的时间段具体为各个时间点,当移动终端对接收的多个网络消息采用模式识别、机器学习等方法分析各个网络消息的接收时间段和网络标识,例如每天的t时间段收到的网络消息的网络标识为cell-ID-x,在t+1时间段收到的网络信息的网络标识为cell-ID-y,t+2时间段收到的网络信息的网络标识为cell-ID-z,t+3时间段收到的网络信息的网络标识为cell-ID-k,以此类推,可以确定各个时间段对应的cell-ID,即获得多个对应关系,并且移动终端的数据库以时间序列的方式存储时间段和网络标识的对应关系,例如t时间段位于t+1时间段之前,因此依照时间序列,t时间段和cell-ID-x的对应关系排列在t+1时间段和cell-ID-y的对应关系之前;;
或者,图4为本发明实施例二中数据库的第二示意图。如图4所示,移动终端对在当前时间段之前接收的多个网络消息采用模式识别、机器学习等方法分析各个网络消息的接收时间点和网络标识,例如在t1~(t1+15)中的任意一个时间段上均接收到网络标识为cell-ID-x的网络消息,而在t2~(t2+5)中的任意一个时间段上均收到网络标识为cell-ID-y的网络消息,则cell-ID-x与t1~(t1+15)中的每一个时间段有对应关系,cell-ID-y与t2~(t2+5)中的每一个时间段有对应关系;并且在数据库存储这些对应关系时,以网络标识分类的方式存储时间段和网络标识的对应关系,即将cell-ID-x作为一个类目,则在cell-ID-x类目下,包括的信息为t1~(t1+15),而在cell-ID-y类目下,包括的信息为t2~(t2+5)。
进一步的,在执行S203时,上述当前时间段可以采用一个时刻,如10点10分,且在10点10分接收到网络标识为cell-ID-x的网络消息,则上述当前时间段和在当前时间段接收的网络消息的网络标识的对应关系即为10点10分和cell-ID-x的对应关系,若在图3所示的数据库中,存在cell-ID-x且cell-ID-x对应的t时间段具体为10点10分所在的时间段,或者在图4所示对数据库中,存在cell-ID-x类目,且cell-ID-x类目下全部的时间段中,存在10点10分所在的时间段,则说明当前时间段和在当前时间段接收的网络消息的网络标识的对应关系,是符合数据库中存储的对应关系;但若数据库中不存在cell-ID-x或者cell-ID-x对应的时间段中没有10点10分,则说明当前时间段和在当前时间段接收的网络消息的网络标识的对应关系,是不符合数据库中存储的对应关系。
另外,上述时间段可以具体为一段特定的时长,如t表示10点至10点10分这一时间段,或者时间段具体也可为一个时间点,即t也表示为10点10分。
可选的,在执行S203时,当前时间段可以为具有一定时长的一段时间,如10点10分至10点20分;且在该当前时间段中接收了至少一个网络消息,则执行S203时,具体是将当前时间段细分为多个细分时间段,并判断在各个细分时间段接收的网络消息的网络标识与各个细分时间段的对应关系,是否符合数据库中存储的多条对应关系;例如10点10分至10点20分这一时间段中,在10点10分接收了网络标识为cell-ID-x的网 络消息,并且在10点15分接收了网络标识为cell-ID-y的网络消息,在10点20分接收了网络标识为cell-ID-z的网络消息,因此在执行S203时,需要判断网络标识为cell-ID-x、cell-ID-y、cell-ID-z的网络消息与各个细分时间段(具体为包括10点10分所在的细分时间段、10点15所在的细分时间段、10点20所在的细分时间段)之间的对应关系是否均符合数据库中cell-ID-x与t时间段的对应关系、cell-ID-y与t+1时间段的对应关系、cell-ID-z与t+2时间段的对应关系;
可以理解的,用户的行为模式并不是完全的一成不变,移动终端的用户可能会携带移动终端临时外出,如本该在10点15分进入基站y的覆盖区域,从而接收基站y发送的网络标识为cell-ID-y的网络消息,但在某一天,用户在10点15分临时进入基站s的覆盖范围中,则接收到网络标识为cell-ID-s的网络消息,则灵活的,移动终端在执行S203判断当前时间段和在当前时间段接收的网络消息的网络标识的对应关系,是否符合数据库中存储的对应关系时,是允许一定的容错率,例如在10点10分接收了网络标识为cell-ID-x的网络消息,并且在10点15分接收了网络标识为cell-ID-s的网络消息,在10点20分接收了网络标识为cell-ID-z的网络消息,而数据库存储的对应关系中,cell-ID-x对应的t时间段具体为10点10所在的时间段,而t+1时间段为10点15分所在的时间段且对应于cell-ID-y,则此时当前时间段中10点15分所在的细分时间段与cell-ID-s的对应关系并不符合数据库中10点15分所在的时间段与cell-ID-y的对应关系;但由于当前时间段中,cell-ID-x与10点10分所在的细分时间段的对应关系、cell-ID-z与10点20分所在的细分时间段的对应关系均满足数据库中存储的对应关系,仅有10点15分所在的细分时间段与cell-ID-s的对应关系不满足数据库中存储的对应关系,基于一定的容错率,可以认为当前时间段和在当前时间段接收的网络消息的网络标识的对应关系,是符合数据库中存储的对应关系。
S204、移动终端判断移动终端是否可以访问网络服务器;若是执行S205;若否,执行S206。
需要说明的是,在S203中,当当前时间段和在当前时间段接收的网络消息的网络标识的对应关系,不符合数据库中存储的对应关系时则说明移动终端的持有者的行为不符合移动终端的用户的行为模式,可能发生被 盗,即可直接执行S207,即只要S203中的判断结果为不符合,移动终端立即执行防盗操作;但为了提高对被盗的判断的准确性,避免误判移动终端发生被盗而触发防盗操作,因此移动终端在初步判定移动终端的可能发生被盗之后,需要进行最终确认,即还需执行S204~S206;
进行最终确认的方法可分为两类,一类是联网查询网络服务器进行最终确认,一类是移动终端本地最终确认,因此在进行最终确认之前需要判断移动终端是否可以访问网络服务器,也就是说通过S204判断移动终端是否可以接入网络(具体为蜂窝网、wifi网络等)。
S205、移动终端查询网络服务器,判断移动终端是否处于挂失状态;若是,执行S207,若否,执行S208。
具体的,用户在移动终端的品牌商提供的网络服务器对移动终端进行了注册,或者用户通过移动终端上的应用,在该应用的网络服务器上对移动终端进行了注册,或者在运营商的服务器上对移动终端进行了注册,则当移动终端被盗时,用户通过其他终端设备可以访问这些网络服务器,对移动终端进行挂失,以期联网找回丢失的移动终端;在用户进行挂失后,网络服务器中记录移动终端处于挂失状态,而在用户找寻丢失的移动终端的同时,移动终端自身通过执行S201~S205,确定是否处于挂失状态。
S206、移动终端对移动终端的持有人进行身份验证,并判断身份验证的结果是否为失败;若是,执行S207,若否,执行S208。
其中身份验证操作至少包括下述任意一种操作:密码验证、图案解锁、生物识别等,其中生物识别具体可以为指纹识别、人脸识别、声纹识别等
S207、移动终端执行防盗操作。
其中防盗操作至少包括下述任意一种操作:
所述移动终端显示设定信息、锁定所述移动终端、所述移动终端将存储的用户数据删除或加密、所述移动终端响铃以进行警报、所述移动终端启动摄像头拍摄照片,并将照片发送至网络服务器、所述移动终端进行定位操作并将定位信息发送给网络服务器;
具体的,上述设定信息可以由用户自行设定,例如“捡到手机者请联系135xxxxxxxx”;而锁定所述移动终端后,移动终端不能正常使用;为了防止用户因移动终端的丢失而导致私人信息被泄露,因此移动终端可自行将移动 终端内存储的用户数据进行删除,也可以将存储的用户数据加密;更优的,为了帮助用户尽快找回移动终端,移动终端还可以进行定位操作,并将通过定位操作获得的定位信息发往网络服务器;同时移动终端还可启动摄像头对移动终端的非法持有人进行拍照。
S208、移动终端执行预设操作。
所述预设操作与数据库存储的对应关系相关联;
具体的,在确定当前时间段和当前时间段接收的网络消息的网络标识的对应关系,符合数据库存储的对应关系,说明移动终端处于正常场景,也可以说在当前时间段移动终端的持有者的行为符合前述数据库中对应关系所反映用户的行为模式,此时上述相应的控制操作具体可以为保持待机,也可以是执行相应的控制操作;例如在当前时间段之前,用户每次在9点进入基站3的覆盖区域后,接收到网络标识为Cell-ID-3的网络消息,且会将移动终端设置为震动模式,则移动终端会将设置为震动模式的操作作为预设操作进行记录,并与Cell-ID-3和9点的对应关系相关联,从而在当前时间段,即今天的9点时,接收到基站3发送的网络消息后,确定该网络消息的网络标识Cell-ID-3和当前的9点符合数据库已存储的Cell-ID-3和9点的对应关系,便可执行上述设置为震动模式的操作;
可选的,上述预设操作也可以是移动终端与Wi-Fi接入点进行连接,或对用户进行到站提醒等操作。
需要说明的是,若是执行S203的判断为否,则直接执行S208;若是执行S205确定移动终端未处于挂失状态或执行S206确定移动终端的持有人通过验证,则可以不执行S208,具体来说,用户携带移动终端出差,则在t+3时间段接收的网络消息的标识不为cell-ID-k,而为cell-ID-p,此时尽管通过S204或S205确定移动终端未被盗,但数据库中并没有cell-ID-p和t+3的对应关系,从而也没有预设操作,或者也可以说此时预设操作为保持待机状态。
可选的,为了使数据库中的对应关系及时更新,以保证移动终端判断的准确性,则在执行S208之后,或者通过S204或S205确定移动终端未被盗后,还可执行S209。
S209、移动终端将当前时间段和当前时间段接收的网络消息的网络标识的对应关系存储至数据库。
若当前时间段接收的网络消息为移动终端首次接收的网络消息则将当前时间段和当前时间段接收的网络消息的网络标识的对应关系存储至数据库,相当于建立了数据库;被随着时间的推移,每当在新的当前时间段接收到网络消息时,且确定移动终端没有发生被盗时,则根据新的当前时间段接收到的网络消息的网络标识和新的当前时间段,更新数据库,从而数据库中存储的对应关系越来愈多,使移动终端对移动终端被盗的判断越来越准确,给用户的使用带来便利;
但根据当前时间段接收的网络消息的网络标识和当前时间段的对应关系不符合数据库已存储的对应关系时,且经过查询网络服务器或对移动终端的持有人进行身份验证后确定移动终端为被盗时,则丢弃当前时间段接收的网络消息,即不会根据当前时间段接收的网络消息的网络标识和当前时间段,对数据库进行更新。
需要补充说明的是,在不断更新数据库的同时,还需清除过时的信息;例如某一条对应关系是根据当前时间段之前的第一时刻(客观时刻,如30天前的9点)接收的网络消息和第一时刻确定的,第一时刻和当前时间段对应的客观时刻(即今天的9点)之间的差值大于α(预设数值),如α为30天,则判断该对应关心为过时信息,则所述移动终端将过时信息进行删除。
本实施例中,移动终端通过实时接收的网络消息和数据库中存储的对应关系,可自适应的执行相应的控制操作,给用户的使用带来便利;例如在办公环境中用户不需要移动终端响铃,则移动终端只要在当前时间段接收到办公环境中的网络设备发送的网络消息后,便可自适应的设置为震动模式,不需借助摄像头等额外的辅助工具确定移动终端是否处于办公环境,可节省开启额外辅助工具的功耗;另外在移动终端在最终确定移动终端被盗之前,还通过查询网络服务器或利用移动终端自身的身份验证操作,确认移动终端是否被盗,提高了移动终端进行相应的控制操作的准确性。
图5为本发明移动终端的控制方法实施例三的流程示意图。如图5所示,本实施例在结合图1或图2所示实施例的基础上,将进行防盗操作作为移动终端的一种服务功能,进行更加详细的描述,具体的,本实施例包括:
S301、移动终端开启防盗功能。
移动终端开启反盗功能后,便可实时的执行下述S302~S311,可及时发 现移动终端被盗后立即执行防盗操作;为防止不法人员通过恢复出厂设置等方式使移动终端关闭防盗功能,因此实现防盗功能的代码被写入移动终端的操作系统或被烧入移动终端的ROM(Read-Only Memory,只读内存)中。
S302、移动终端判断移动终端是否具有接收网络信息的能力;若是,执行S303,若否,执行S309。
以常见的智能手机为例,通过判断手机是否处于飞行模式可确定移动终端是否具有接收网络信息的能力;其中,在判断手机是否为飞行模式时,手机可以从系统数据中获取判断结果,如在Android操作系统中,可利用以下函数(采用JAVA语言):boolean isEnabled=Settings.System.getInt(getContentResolver(),Settings.System.AIRPLANE_MOD E_ON,0)==1判断手机是否处于飞行模式;
当上述函数的结果为True时,表明手机处于飞行模式,则手机等待接收网络信息,即执行S309;结果为False则表示手机未处于飞行模式,则等待执行S303。
S303、移动终端在当前时间段接收网络消息。
S304、移动终端根据在当前时间段接收的网络消息,获取在当前时间段接收的网络消息的网络标识。
S305、移动终端判断当前时间段和在当前时间段接收的网络消息的网络标识的对应关系,是否符合数据库中存储的对应关系;若否,执行S306;若是,返回S302(或不执行S302,等待执行S303)。
上述网络消息以基站发送的基站信息为例,则接收到基站信息时,在Android操作系统中,可利用函数(采用JAVA语言)NetworkInfo getNetworkInfo(int networkType)获取基站信息中的网络标识和:其中输入networkType=TYPE_MOBILE。
S306、移动终端判断移动终端是否可以访问网络服务器;若是执行S307;若否,执行S309。
S307、移动终端查询网络服务器,判断移动终端是否处于挂失状态;若是,执行S308;若否,返回S302(或者不执行S302,等待执行S303)。
S308、移动终端执行防盗操作。
S309、移动终端对移动终端的持有人的进行身份验证,并判断身份验证 的结果是否为失败;若是,执行S308;若否,执行S310。
S310、移动终端关闭防盗功能。
当执行S309确定移动终端的持有人仍然是移动终端的合法用户后,可以想到在未来一定时间内移动终端仍然被合法用户拥有,则为了避免频繁对用户进行身份验证而干扰用户,则在未来一定时间内可以关闭反盗功能。
S311、移动终端获取到开启防盗功能的触发条件,则返回S301。
在移动终端关闭反盗功能后,移动终端进行监测,当移动终端获取到开启防盗功能的触发条件,立即返回S301,对移动终端进行防盗保护;其中开启反盗功能的触发条件可以是用户使用移动终端进行预设的,例如触发条件为预设时长,即移动终端执行S310后,移动终端开启计时器,当移动终端确定计时器的计时达到预设时长时,即移动终端获取到开启防盗功能的触发条件。
需要补充说明的是,本实施例中,在执行S305后返回S302(或等待执行S303)这一过程中,相当于移动终端认为移动终端未被盗,则移动终端还可执行前述实施例中的S208和/或S209;类似的,执行S307之后返回S302(或等待执行S303)的过程中,移动终端还可执行前述实施例中的S209;而且在执行S308~S310的同时,移动终端还可执行前述实施例中的S209。
本实施例中,移动终端通过实时接收的网络信息和已获取的历史网络信息,确定移动终端在当前时刻的使用场景,且在移动终端最终确定使用场景为异常场景之前,还通过查询网络服务器或利用移动终端自身的身份验证操作,确认移动终端是否处于异常场景,使得使用场景的判断更加准确,有效的保障了用户的移动终端的使用安全。
图6为本发明移动终端实施例一的结构示意图。如图6所示,包括:
接收模块11,用于在当前时间段接收至少一个网络消息,所述至少一个网络消息是由至少一个网络设备发送的;
获取模块12,用于根据在当前时间段接收的网络消息,获取在当前时间段接收的网络消息的网络标识;
判断模块13,用于判断所述当前时间段和在当前时间段接收的网络消息的网络标识的对应关系,是否符合数据库中存储的对应关系,所述数据库中存储的对应关系,包括所述当前时间段之前,所述移动终端接收的网 络消息的时间段和网络标识的对应关系;
执行模块14,用于根据判断结果,执行相应的控制操作。
可选的,所述网络设备包括移动通信基站,所述网络标识包括小区标识Cell ID。
可选的,所述网络设备包括Wi-Fi接入点设备,所述网络标识包括服务集标识SSID。
可选的,所述网络设备包括蓝牙配对设备,所述网络标识包括蓝牙设备标识。
进一步的,所述执行模块14具体用于若判断结果为不符合,查询网络服务器,判断所述移动终端是否处于挂失状态;
若所述移动终端处于挂失状态,则执行防盗操作。
进一步的,所述执行模块14具体用于若判断结果为不符合,则执行防盗操作。
进一步的,所述执行模块14具体用于
若判断结果为不符合,则对所述移动终端的持有人的进行身份验证;
若未通过验证,则执行防盗操作。
进一步的,所述判断模块13还用于判断所述移动终端是否具有接收网络信息的能力;
若否,所述移动终端对所述移动终端的持有人进行身份验证;
若未通过验证,则执行防盗操作。
进一步的,所述身份验证至少包括下述任意一种:
密码验证、图案解锁、生物特征识别。
进一步的,所述防盗操作包括至少一种以下操作:显示设定信息、锁定所述移动终端、将存储的用户数据删除或加密、进行定位操作和响铃。
进一步的,所述数据库还存储有与其存储的对应关系相对应的预设操作,所述执行模块14具体用于
若判断结果为符合,执行预设操作;所述预设操作与数据库存储的对应关系相关联。
进一步的,所述数据库以时间序列的方式存储时间段和网络标识的对应关系,或者所述数据库以网络标识分类的方式存储时间段和网络标识的 对应关系。
本实施例中,移动终端通过实时接收的网络消息和数据库中存储的对应关系,可自适应的执行相应的控制操作,给用户的使用带来便利;例如在办公环境中用户不需要移动终端响铃,则移动终端只要在当前时间段接收到办公环境中的网络设备发送的网络消息后,便可自适应的设置为震动模式,不需借助摄像头等额外的辅助工具确定移动终端是否处于办公环境,可节省开启额外辅助工具的功耗。
需要说明的是,上述各个模块对应执行前述各个方法实施例中的各个步骤,具体的执行过程及技术效果,可参考前述各个方法实施例中的各个步骤。
图7为本发明移动终端实施例二的结构示意图。如图7所示,包括:
接收器21,用于在当前时间段接收至少一个网络消息,所述至少一个网络消息是由至少一个网络设备发送的;
处理器22,用于根据在当前时间段接收的网络消息,获取在当前时间段接收的网络消息的网络标识;
判断所述当前时间段和在当前时间段接收的网络消息的网络标识的对应关系,是否符合数据库中存储的对应关系,所述数据库中存储的对应关系,包括所述当前时间段之前,所述移动终端接收的网络消息的时间段和网络标识的对应关系;
根据判断结果,执行相应的控制操作。
可选的,所述网络设备包括移动通信基站,所述网络标识包括小区标识Cell ID。
可选的,所述网络设备包括Wi-Fi接入点设备,所述网络标识包括服务集标识SSID。
可选的,所述网络设备包括蓝牙配对设备,所述网络标识包括蓝牙设备标识。
进一步的,所述处理器22具体用于若判断结果为不符合,查询网络服务器,判断所述移动终端是否处于挂失状态;
若所述移动终端处于挂失状态,则执行防盗操作。
进一步的,所述处理器22具体用于若判断结果为不符合,则执行防盗操作。
进一步的,所述处理器具体用于
若判断结果为不符合,则对所述移动终端的持有人的进行身份验证;
若未通过验证,则执行防盗操作。
进一步的,所述处理器22还用于判断所述移动终端是否具有接收网络信息的能力;
若否,所述移动终端对所述移动终端的持有人进行身份验证;
若未通过验证,则执行防盗操作。
进一步的,所述身份验证至少包括下述任意一种:
密码验证、图案解锁、生物特征识别。
进一步的,所述防盗操作包括至少一种以下操作:显示设定信息、锁定所述移动终端、将存储的用户数据删除或加密、进行定位操作和响铃。
进一步的,所述数据库还存储有与其存储的对应关系相对应的预设操作,所述处理器22具体用于
若判断结果为符合,执行预设操作;所述预设操作与数据库存储的对应关系相关联。
进一步的,所述数据库以时间序列的方式存储时间段和网络标识的对应关系,或者所述数据库以网络标识分类的方式存储时间段和网络标识的对应关系。
本实施例中,移动终端通过实时接收的网络消息和数据库中存储的对应关系,可自适应的执行相应的控制操作,给用户的使用带来便利;例如在办公环境中用户不需要移动终端响铃,则移动终端只要在当前时间段接收到办公环境中的网络设备发送的网络消息后,便可自适应的设置为震动模式,不需借助摄像头等额外的辅助工具确定移动终端是否处于办公环境,可节省开启额外辅助工具的功耗。
需要说明的是,上述接收器、处理器对应执行前述各个方法实施例中的各个步骤,具体的执行过程及技术效果,可参考前述各个方法实施例中的各个步骤。
本领域普通技术人员可以理解:实现上述方法实施例的全部或部分步骤可以通过程序指令相关的硬件来完成,前述的程序可以存储于一计算机可读取存储介质中,该程序在执行时,执行包括上述方法实施例的步骤;而前述 的存储介质包括:ROM、RAM、磁碟或者光盘等各种可以存储程序代码的介质。
最后应说明的是:以上各实施例仅用以说明本发明的技术方案,而非对其限制;尽管参照前述各实施例对本发明进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分或者全部技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本发明各实施例技术方案的范围。

Claims (36)

  1. 一种移动终端的控制方法,其特征在于,包括:
    所述移动终端在当前时间段接收至少一个网络消息,所述至少一个网络消息是由至少一个网络设备发送的;
    所述移动终端根据在当前时间段接收的网络消息,获取在当前时间段接收的网络消息的网络标识;
    所述移动终端判断所述当前时间段和在当前时间段接收的网络消息的网络标识的对应关系,是否符合数据库中存储的对应关系,所述数据库中存储的对应关系,包括所述当前时间段之前,所述移动终端接收的网络消息的时间段和网络标识的对应关系;
    所述移动终端根据判断结果,执行相应的控制操作。
  2. 根据权利要求1所述的控制方法,其特征在于,所述网络设备包括移动通信基站,所述网络标识包括小区标识Cell ID。
  3. 根据权利要求1或2所述的控制方法,其特征在于,所述网络设备包括Wi-Fi接入点设备,所述网络标识包括服务集标识SSID。
  4. 根据权利要求1-3任意一项所述的控制方法,其特征在于,所述网络设备包括蓝牙配对设备,所述网络标识包括蓝牙设备标识。
  5. 根据权利要求1-4任意一项所述的控制方法,其特征在于,所述移动终端根据判断结果,执行相应的控制操作包括:
    若判断结果为不符合,所述移动终端查询网络服务器,判断所述移动终端是否处于挂失状态;
    若所述移动终端处于挂失状态,则所述移动终端执行防盗操作。
  6. 根据权利要求1-4任意一项所述的控制方法,其特征在于,所述移动终端根据判断结果,执行相应的控制操作,包括:
    若判断结果为不符合,则所述移动终端执行防盗操作。
  7. 根据权利要求1-4任意一项所述的控制方法,其特征在于,所述移动终端根据判断结果,执行相应的控制操作,包括:
    若判断结果为不符合,则所述移动终端对所述移动终端的持有人的进行身份验证;
    若未通过验证,则所述移动终端执行防盗操作。
  8. 根据权利要求1-4任意一项所述的控制方法,其特征在于,在移动终端接收当前网络信息之前,所述控制方法还包括:
    所述移动终端判断所述移动终端是否具有接收网络信息的能力;
    若否,所述移动终端对所述移动终端的持有人进行身份验证;
    若未通过验证,则所述移动终端执行防盗操作。
  9. 根据权利要求7或8所述的控制方法,其特征在于,所述身份验证至少包括下述任意一种:
    密码验证、图案解锁、生物特征识别。
  10. 根据权利要求5-9任意一项所述的控制方法,其特征在于,所述防盗操作包括至少一种以下操作:显示设定信息、锁定所述移动终端、将存储的用户数据删除或加密、进行定位操作和响铃。
  11. 根据权利要求1-10任意一项所述的控制方法,其特征在于,所述数据库还存储有与其存储的对应关系相对应的预设操作,所述移动终端根据判断结果,执行相应的控制操作,包括:
    若判断结果为符合,所述移动终端执行预设操作;所述预设操作与数据库存储的对应关系相关联。
  12. 根据权利要求1-11任意一项所述的控制方法,其特征在于,所述数据库以时间序列的方式存储时间段和网络标识的对应关系,或者所述数据库以网络标识分类的方式存储时间段和网络标识的对应关系。
  13. 一种移动终端,其特征在于,包括:
    接收模块,用于在当前时间段接收至少一个网络消息,所述至少一个网络消息是由至少一个网络设备发送的;
    获取模块,用于根据在当前时间段接收的网络消息,获取在当前时间段接收的网络消息的网络标识;
    判断模块,用于判断所述当前时间段和在当前时间段接收的网络消息的网络标识的对应关系,是否符合数据库中存储的对应关系,所述数据库中存储的对应关系,包括所述当前时间段之前,所述移动终端接收的网络消息的时间段和网络标识的对应关系;
    执行模块,用于根据判断结果,执行相应的控制操作。
  14. 根据权利要求13所述的移动终端,其特征在于,所述网络设备 包括移动通信基站,所述网络标识包括小区标识Cell ID。
  15. 根据权利要求13或14所述的移动终端,其特征在于,所述网络设备包括Wi-Fi接入点设备,所述网络标识包括服务集标识SSID。
  16. 根据权利要求13-15任意一项所述的移动终端,其特征在于,所述网络设备包括蓝牙配对设备,所述网络标识包括蓝牙设备标识。
  17. 根据权利要求13-16任意一项所述的移动终端,其特征在于,所述执行模块具体用于若判断结果为不符合,查询网络服务器,判断所述移动终端是否处于挂失状态;
    若所述移动终端处于挂失状态,则执行防盗操作。
  18. 根据权利要求13-16任意一项所述的移动终端,其特征在于,所述执行模块具体用于若判断结果为不符合,则执行防盗操作。
  19. 根据权利要求13-16任意一项所述的移动终端,其特征在于,所述执行模块具体用于
    若判断结果为不符合,则对所述移动终端的持有人的进行身份验证;
    若未通过验证,则执行防盗操作。
  20. 根据权利要求13-16任意一项所述的移动终端,其特征在于,所述判断模块还用于判断所述移动终端是否具有接收网络信息的能力;
    若否,所述移动终端对所述移动终端的持有人进行身份验证;
    若未通过验证,则执行防盗操作。
  21. 根据权利要求19或20所述的移动终端,其特征在于,所述身份验证至少包括下述任意一种:
    密码验证、图案解锁、生物特征识别。
  22. 根据权利要求17-21任意一项所述的移动终端,其特征在于,所述防盗操作包括至少一种以下操作:显示设定信息、锁定所述移动终端、将存储的用户数据删除或加密、进行定位操作和响铃。
  23. 根据权利要求13-22任意一项所述的移动终端,其特征在于,所述数据库还存储有与其存储的对应关系相对应的预设操作,所述执行模块具体用于
    若判断结果为符合,执行预设操作;所述预设操作与数据库存储的对应关系相关联。
  24. 根据权利要求13-23任意一项所述的移动终端,其特征在于,所述数据库以时间序列的方式存储时间段和网络标识的对应关系,或者所述数据库以网络标识分类的方式存储时间段和网络标识的对应关系。
  25. 一种移动终端,其特征在于,包括:
    接收器,用于在当前时间段接收至少一个网络消息,所述至少一个网络消息是由至少一个网络设备发送的;
    处理器,用于根据在当前时间段接收的网络消息,获取在当前时间段接收的网络消息的网络标识;
    判断所述当前时间段和在当前时间段接收的网络消息的网络标识的对应关系,是否符合数据库中存储的对应关系,所述数据库中存储的对应关系,包括所述当前时间段之前,所述移动终端接收的网络消息的时间段和网络标识的对应关系;
    根据判断结果,执行相应的控制操作。
  26. 根据权利要求25所述的移动终端,其特征在于,所述网络设备包括移动通信基站,所述网络标识包括小区标识Cell ID。
  27. 根据权利要求25或26所述的移动终端,其特征在于,所述网络设备包括Wi-Fi接入点设备,所述网络标识包括服务集标识SSID。
  28. 根据权利要求25-27任意一项所述的移动终端,其特征在于,所述网络设备包括蓝牙配对设备,所述网络标识包括蓝牙设备标识。
  29. 根据权利要求25-28任意一项所述的移动终端,其特征在于,所述处理器具体用于若判断结果为不符合,查询网络服务器,判断所述移动终端是否处于挂失状态;
    若所述移动终端处于挂失状态,则执行防盗操作。
  30. 根据权利要求25-28任意一项所述的移动终端,其特征在于,所述处理器具体用于若判断结果为不符合,则执行防盗操作。
  31. 根据权利要求25-28任意一项所述的移动终端,其特征在于,所述处理器具体用于
    若判断结果为不符合,则对所述移动终端的持有人的进行身份验证;
    若未通过验证,则执行防盗操作。
  32. 根据权利要求25-28任意一项所述的移动终端,其特征在于,所 述处理器还用于判断所述移动终端是否具有接收网络信息的能力;
    若否,所述移动终端对所述移动终端的持有人进行身份验证;
    若未通过验证,则执行防盗操作。
  33. 根据权利要求31或32所述的移动终端,其特征在于,所述身份验证至少包括下述任意一种:
    密码验证、图案解锁、生物特征识别。
  34. 根据权利要求29-33任意一项所述的移动终端,其特征在于,所述防盗操作包括至少一种以下操作:显示设定信息、锁定所述移动终端、将存储的用户数据删除或加密、进行定位操作和响铃。
  35. 根据权利要求25-34任意一项所述的移动终端,其特征在于,所述数据库还存储有与其存储的对应关系相对应的预设操作,所述处理器具体用于
    若判断结果为符合,执行预设操作;所述预设操作与数据库存储的对应关系相关联。
  36. 根据权利要求25-35任意一项所述的移动终端,其特征在于,所述数据库以时间序列的方式存储时间段和网络标识的对应关系,或者所述数据库以网络标识分类的方式存储时间段和网络标识的对应关系。
PCT/CN2014/086734 2014-09-17 2014-09-17 移动终端的控制方法和移动终端 WO2016041160A1 (zh)

Priority Applications (4)

Application Number Priority Date Filing Date Title
EP14902119.8A EP3185600B1 (en) 2014-09-17 2014-09-17 Mobile terminal control method and mobile terminal
CN201480080349.9A CN106664557B (zh) 2014-09-17 2014-09-17 移动终端的控制方法和移动终端
PCT/CN2014/086734 WO2016041160A1 (zh) 2014-09-17 2014-09-17 移动终端的控制方法和移动终端
US15/512,135 US20170280364A1 (en) 2014-09-17 2014-09-17 Mobile Terminal Control Method and Mobile Terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2014/086734 WO2016041160A1 (zh) 2014-09-17 2014-09-17 移动终端的控制方法和移动终端

Publications (1)

Publication Number Publication Date
WO2016041160A1 true WO2016041160A1 (zh) 2016-03-24

Family

ID=55532448

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/086734 WO2016041160A1 (zh) 2014-09-17 2014-09-17 移动终端的控制方法和移动终端

Country Status (4)

Country Link
US (1) US20170280364A1 (zh)
EP (1) EP3185600B1 (zh)
CN (1) CN106664557B (zh)
WO (1) WO2016041160A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11238185B2 (en) * 2017-03-07 2022-02-01 Sennco Solutions, Inc. Integrated, persistent security monitoring of electronic merchandise

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101150821A (zh) * 2007-10-29 2008-03-26 深圳华为通信技术有限公司 切换移动通信终端情景模式的方法及移动通信终端
CN103024744A (zh) * 2012-12-24 2013-04-03 百度在线网络技术(北京)有限公司 移动终端的身份验证的方法和系统
US20130241729A1 (en) * 2009-02-02 2013-09-19 Absolute Software Corporation Location dependent monitoring for stolen devices
CN104023309A (zh) * 2014-05-16 2014-09-03 北京金山安全软件有限公司 防盗提醒方法及装置

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101210364B1 (ko) * 2006-06-23 2012-12-10 삼성전자주식회사 사용자의 행동 분석 결과에 따라 동작하는 이동통신단말기및 그 방법
KR101295155B1 (ko) * 2006-06-26 2013-08-09 삼성전자주식회사 사용자의 행동 분석 결과에 따라 대기화면을 표시하는이동통신단말기 및 그 방법
US8863307B2 (en) * 2012-06-05 2014-10-14 Broadcom Corporation Authenticating users based upon an identity footprint
WO2014027242A1 (en) * 2012-08-13 2014-02-20 Yougetitback Limited Systems and methods for mitigating the unauthorized use of a device
US9392463B2 (en) * 2012-12-20 2016-07-12 Tarun Anand System and method for detecting anomaly in a handheld device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101150821A (zh) * 2007-10-29 2008-03-26 深圳华为通信技术有限公司 切换移动通信终端情景模式的方法及移动通信终端
US20130241729A1 (en) * 2009-02-02 2013-09-19 Absolute Software Corporation Location dependent monitoring for stolen devices
CN103024744A (zh) * 2012-12-24 2013-04-03 百度在线网络技术(北京)有限公司 移动终端的身份验证的方法和系统
CN104023309A (zh) * 2014-05-16 2014-09-03 北京金山安全软件有限公司 防盗提醒方法及装置

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3185600A4 *

Also Published As

Publication number Publication date
EP3185600B1 (en) 2019-05-22
US20170280364A1 (en) 2017-09-28
EP3185600A1 (en) 2017-06-28
CN106664557A (zh) 2017-05-10
CN106664557B (zh) 2021-05-18
EP3185600A4 (en) 2017-09-20

Similar Documents

Publication Publication Date Title
US9007174B2 (en) Service identification authentication
EP3113131B1 (en) Method and device for providing object finding information
CN102739868B (zh) 移动终端的丢失处理方法及系统
WO2017096970A1 (zh) 一种确定目标便携设备位置的方法和装置
CN105389507B (zh) 监控系统分区文件的方法及装置
US20170277881A1 (en) Method and system for improving security of a mobile terminal
US20150363745A1 (en) Bluetooth verified smartphone clock-in
US20160062843A1 (en) Methods and devices for backing up file
CN104809773A (zh) 一种门禁控制方法、装置和门禁系统
CN105246138A (zh) 物联网设备的控制方法及装置
US20170105237A1 (en) Methods and apparatuses for network connection
KR101876183B1 (ko) IoT 기반의 보안성이 강화된 레지덴셜 게이트웨이 장치
CN101909126A (zh) 一种移动终端的状态监控方法及移动终端
US9977924B2 (en) Method and device for providing notification indicating loss of terminal
US10824706B2 (en) Portable electronic device for authenticating user and system and method associated therewith
CN105515953A (zh) 通知消息的处理方法、装置和设备
US10601591B2 (en) Close proximity inner circle discovery
CN105376711A (zh) 可穿戴设备的位置提示方法、装置及可穿戴设备
CN104601818A (zh) 一种在通讯过程中切换操作系统的方法及装置
US10419876B2 (en) Secure mobile device recovery
US20200382367A1 (en) Systems and methods for configuring a device action based on one or more events
CN106293706A (zh) 事件提醒方法、装置及终端
WO2017177789A1 (zh) 移动终端防盗窃方法及装置
WO2016041160A1 (zh) 移动终端的控制方法和移动终端
WO2018027335A1 (zh) 一种待机方法、解除终端锁定的方法、通信方法及系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14902119

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 15512135

Country of ref document: US

REEP Request for entry into the european phase

Ref document number: 2014902119

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2014902119

Country of ref document: EP