WO2017177789A1 - 移动终端防盗窃方法及装置 - Google Patents

移动终端防盗窃方法及装置 Download PDF

Info

Publication number
WO2017177789A1
WO2017177789A1 PCT/CN2017/076948 CN2017076948W WO2017177789A1 WO 2017177789 A1 WO2017177789 A1 WO 2017177789A1 CN 2017076948 W CN2017076948 W CN 2017076948W WO 2017177789 A1 WO2017177789 A1 WO 2017177789A1
Authority
WO
WIPO (PCT)
Prior art keywords
mobile terminal
theft
mode
information
state
Prior art date
Application number
PCT/CN2017/076948
Other languages
English (en)
French (fr)
Inventor
刘长山
郭寰
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2017177789A1 publication Critical patent/WO2017177789A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS

Definitions

  • the embodiments of the present invention relate to the field of communications, and in particular, to a method and apparatus for preventing theft of a mobile terminal.
  • the embodiment of the invention provides a method and a device for preventing theft of a mobile terminal, so as to at least solve the problem that the mobile terminal cannot perform an alarm in time after theft of the mobile terminal.
  • a mobile terminal anti-theft method includes:
  • the mobile terminal acquires state information of the mobile terminal, and determines, according to the state information, whether the mobile terminal is in a normal use state;
  • the mobile terminal When it is determined that the mobile terminal is in a normal use state, and the mobile terminal receives an illegal operation signal, it is determined that the mobile terminal is in a theft state, and sends an alarm message.
  • the method before the sending the alarm information, the method further includes:
  • the mobile terminal starts a security verification mode, and acquires a verification parameter corresponding to the security verification mode;
  • the mobile terminal transmits the alarm information when the verification parameter fails to pass the verification, or if an input signal corresponding to the security verification mode is not received within a predetermined time period.
  • the security verification mode includes one of the following:
  • Password mode fingerprint recognition mode, iris recognition mode, voice recognition mode, face recognition mode.
  • the method further includes:
  • determining, according to the status information, whether the mobile terminal is in a normal use state includes:
  • Determining, by the mobile terminal, whether a parameter value for indicating the status information is greater than a preset threshold, and whether the mobile terminal has an unprocessed task, where the parameter value for indicating the status information is greater than In the case where the preset threshold is described and the mobile terminal has an unprocessed task, it is determined that the mobile terminal is in a normal use state.
  • the parameter value used to indicate the status information includes one of: a power value of the mobile terminal, and a signal strength value of the mobile terminal.
  • the illegal operation signal includes one of the following:
  • the forced shutdown signal is inserted and removed, and the signal of the SIM card of the subscriber identity module is disconnected, and the battery power of the mobile terminal is disconnected.
  • the sending the alarm information includes:
  • the mobile terminal performs photographing through a camera, and sends the photographed photo to a pre-designated terminal or an e-mail box.
  • a mobile terminal anti-theft device which is located in a mobile terminal, and the device includes:
  • the determining module is configured to obtain status information of the mobile terminal, and determine, according to the status information, whether the mobile terminal is in a normal use state;
  • the alarm module is configured to determine that the mobile terminal is in a theft state and send the alarm information when determining that the mobile terminal is in a normal use state and the mobile terminal receives an illegal operation signal.
  • the alarm module further includes:
  • Activating unit configured to start a security verification mode and obtain a verification parameter corresponding to the security verification mode before sending the alarm information
  • a sending unit configured to send the alarm information if the verification parameter fails to pass the verification, or if an input signal corresponding to the security verification mode is not received within a predetermined time period.
  • a computer storage medium is further provided, and the computer storage medium may store an execution instruction for executing the mobile terminal theft prevention method in the above embodiment.
  • the mobile terminal acquires the state information of the mobile terminal, determines whether the mobile terminal is in a normal use state according to the state information, determines that the mobile terminal is in a normal use state, and the mobile terminal receives an illegal operation signal. In case, determine the end of the mobile The terminal is in a state of being stolen and sends an alarm message.
  • FIG. 1 is a flowchart of a method for preventing theft of a mobile terminal according to an embodiment of the present invention
  • FIG. 2 is a structural block diagram 1 of a mobile terminal anti-theft device according to an embodiment of the present invention
  • FIG. 3 is a structural block diagram 2 of a mobile terminal anti-theft device according to an embodiment of the present invention.
  • FIG. 4 is a schematic flowchart of a mobile phone theft prevention method according to a preferred embodiment of the present invention.
  • FIG. 5 is a typical scenario diagram of a theft determination process according to a preferred embodiment of the present invention.
  • FIG. 1 is a flowchart of a method for preventing theft of a mobile terminal according to an embodiment of the present invention. As shown in FIG. 1 , the process includes the following steps:
  • Step S102 The mobile terminal acquires state information of the mobile terminal, and determines, according to the state information, whether the mobile terminal is in a normal use state;
  • Step S104 after determining that the mobile terminal is in a normal use state, and the mobile terminal receives an illegal operation signal, determining that the mobile terminal is in a theft state, and transmitting the report Police information.
  • the mobile terminal acquires status information of the mobile terminal, determines whether the mobile terminal is in a normal use state according to the status information, determines that the mobile terminal is in a normal use state, and the mobile terminal receives an illegal operation signal.
  • the mobile terminal is determined to be in a state of being stolen, and an alarm message is sent, which solves the problem that the mobile terminal cannot perform an alarm in time after being stolen, and timely controls the stolen mobile terminal to issue an alarm message.
  • the mobile terminal before the sending the alarm information, the mobile terminal starts a security verification mode, and acquires a verification parameter corresponding to the security verification mode;
  • the mobile terminal When the verification parameter fails to pass the verification, or the input signal corresponding to the security verification mode is not received within a predetermined time period, the mobile terminal sends the alarm information, and the security authentication may be a request for a password, and the security problem Wait.
  • the security verification mode includes one of the following: a password mode, a fingerprint recognition mode, an iris recognition mode, a voice recognition mode, and a face recognition mode.
  • the mobile terminal before determining that the mobile terminal is in a stolen state, acquiring geographic location information of the mobile terminal and/or environment information of the mobile terminal, determining, according to the geographic location information and/or the environment information, The scene in which the mobile terminal is located, the scene is a shopping mall, a subway, etc., wherein, in the case that the mobile terminal is determined to be in a normal use state, and the mobile terminal receives an illegal operation signal, the mobile terminal determines the movement in conjunction with the predetermined scene in which the mobile terminal is located.
  • the terminal is in a state of being stolen, for example, detecting that the mobile terminal is in a public place such as a shopping mall or a subway, and suddenly the mobile terminal receives a forced shutdown signal, the mobile terminal suspects that it has been stolen, and then initiates a security verification mode, thereby causing the mobile terminal to frequently The stolen place can timely discover that the mobile terminal is in theft state.
  • determining whether the mobile terminal is in a normal use state according to the status information includes:
  • the parameter value for indicating the status information includes one of: a power value of the mobile terminal, and a signal strength value of the mobile terminal.
  • the illegal operation signal includes one of the following:
  • the forced shutdown signal is inserted and removed from the signal of the SIM card of the subscriber identity module, and the battery power of the mobile terminal is disconnected.
  • the sending, by the mobile terminal, the alarm information includes: starting a vibration mode or a preset ringtone; transmitting a geographic location of the mobile terminal to a pre-designated terminal or an email; the mobile terminal performs a photographing through the camera, and sends the Take a photo of the photo to a pre-designated terminal or email address.
  • a mobile terminal anti-theft device is also provided, which is located in the mobile terminal, and is used to implement the above-mentioned embodiments and preferred embodiments, and has not been described again.
  • the term "module” may implement a combination of software and/or hardware of a predetermined function.
  • the apparatus described in the following embodiments is preferably implemented in software, hardware, or a combination of software and hardware, is also possible and contemplated.
  • FIG. 2 is a structural block diagram of a mobile terminal anti-theft device according to an embodiment of the present invention. As shown in FIG. 2, the device includes:
  • the determining module 22 is configured to obtain status information of the mobile terminal, and determine, according to the status information, whether the mobile terminal is in a normal use state;
  • the alarm module 24 is connected to the judging module 22, and is configured to determine that the mobile terminal is in a state of being stolen and to send an alarm information when it is determined that the mobile terminal is in a normal use state and the mobile terminal receives an illegal operation signal.
  • the determining module 22 obtains the state information of the mobile terminal, and determines whether the mobile terminal is in a normal use state according to the state information, and the alarm module 24 determines that the mobile terminal is in a normal use state, and the mobile terminal receives an illegal operation.
  • a signal it is determined that the mobile terminal is in a theft state and sends an alarm message.
  • FIG. 3 is a structural block diagram 2 of a mobile terminal anti-theft device according to an embodiment of the present invention.
  • the alarm module 24 further includes:
  • the startup unit 32 is configured to start a security verification mode and obtain a verification parameter corresponding to the security verification mode before sending the alarm information.
  • the transmitting unit 34 is connected to the activation unit 32, and is configured to transmit the alarm information when the verification parameter fails to pass the verification, or if an input signal corresponding to the security verification mode is not received within a predetermined period of time.
  • each of the above modules may be implemented by software or hardware.
  • the foregoing may be implemented by, but not limited to, the foregoing modules are all located in the same processor; or, the above modules are respectively located. Different processors.
  • the preferred embodiment of the present invention includes a mobile terminal and software and services running on the mobile terminal.
  • the method of the preferred embodiment mainly focuses on the theft mode determination and the owner reminding two services, wherein the theft mode determines whether the current device is in danger of being stolen or in the stolen process, and whether the device usage behavior and mode are consistent.
  • Theft mode The owner reminds the owner of the reminder and alarm according to the result of the theft mode, thereby reminding the user to find the abnormality at the first time and avoid the loss of the device.
  • the anti-theft mode is optional on the user device. The default is on, and the user can manually turn it on or off. In the on mode, the anti-theft service on the user's device is active and keeps listening for device status.
  • the anti-theft mode monitors the status of the device, including the environment in which the device is used, the location of the device, and the current state of the device, and evaluates whether the device is currently in a state of being stolen according to the judgment rule.
  • the anti-theft mode determines whether the user identity needs to be verified according to the risk of the current device being stolen. If the user's identity verification is required, the identity of the owner is verified in the shutdown process, and the identity verification fails.
  • the owner reminder mode is used for alarms and reminders.
  • the owner reminder mode is responsible for alarms and records of the mobile terminal in theft state. Different alarms and reminders can be set in advance, including but not limited to playing an alarm ring tone, prohibiting shutdown, sending a geographical location, and the like.
  • a preferred embodiment of the invention describes a method of enhancing mobile devices against theft. After the user activates the function, the user's device is in anti-theft protection state, including the following steps:
  • the first step the anti-theft mode is based on the current state of the device, as well as the current scene and operating status of the user, as a risk criterion for theft;
  • the second step the anti-theft mode according to the acquired state, combined with the state of the device and the user's behavior pattern to match the risk of theft, obtain the risk probability of the current theft and whether to make an alarm;
  • the third step according to the risk probability of the theft, the follow-up operation is performed, and the owner reminder mode performs alarm according to a preset reminder mode, such as a ringtone alarm, a front camera photograph, and the like, to remind the user that the current device is at risk of theft.
  • a preset reminder mode such as a ringtone alarm, a front camera photograph, and the like
  • FIG. 4 is a schematic flowchart of a mobile phone theft prevention method according to a preferred embodiment of the present invention. As shown in FIG. 4, the steps are as follows:
  • step S401 after the anti-theft mode is turned on, the usage environment, location, and status of the device are monitored.
  • the anti-theft mode detects the current device's risk of being stolen by detecting the status of the device and combining the behavior patterns of the user;
  • Step S402 when the device is in the risk of theft, the device is forcibly shut down or other illegal operations, such as removing the SIM card, the anti-theft mode is performed by the owner identity verification, and the owner reminder mode is activated to perform an alarm;
  • step S403 the owner reminder mode reminds the master device of the risk of theft according to the preset alarm mode, and reminds and notifies the owner through the ringtone playing, the location reporting or other means.
  • the anti-theft device mode in this embodiment can be managed by a switch, and the user can manually turn the function on or off.
  • the embodiment provides an implementation method of the anti-theft mode, and the device is in the standby state for the device.
  • the status and user behavior patterns are collected and analyzed, and intelligently determine whether the device is at risk of theft.
  • the anti-theft mode will start the state monitoring of the device after starting, mainly determining the environment in which the current device is located, the usage of the device, and whether there are tasks to be processed.
  • the environmental judgment of the equipment helps to determine whether the current equipment is in an environment that is easy to lose, such as riding a car, waiting for a car, and the like.
  • the detection method can be judged by external components of the device, such as a microphone for sound monitoring of the external environment, and the information obtained from other sensors can be combined to further improve the accuracy of the environmental judgment. For example, the position and direction values obtained by the geomagnetic sensor, the speed and height values obtained by the Global Positioning System (GPS), and the like.
  • GPS Global Positioning System
  • the anti-theft mode reads the data information of the local database and forms a status list of the device according to the local data value.
  • the anti-theft mode is obtained by the underlying driver of the software to obtain the state of charge available to the current device, and at the same time, through the underlying short message and the telephone recording interface, whether the current device has missed calls and short messages, and the anti-theft mode through the system push message database You can get message push information, software and applications that are currently in the background, and the above information constitutes a list describing the status of the device.
  • step S402 the device intelligently determines whether the current operation is legal according to the state of the device, in combination with the combination of the behavior and the action of the user. The specific judgment is judged based on the theft risk table.
  • the theft risk table sets the state of the device and the attributes of the device to different weights. According to the source and attributes of the device, it can be divided into several weights. Each weight is set according to the rule, and different values are set according to the rules. For example, when the device power is 90. When the device is powered on for less than 24 hours, the device health weight can be set to 1, and the status of other devices is set by the same rule.
  • Device weights include the health status of the device, the task status of the device, and the attribute status of the device.
  • the health status includes information about the health status of the device, such as the boot time of the device, the power of the device, and the standby time of the device.
  • the task status of the device includes unprocessed calls, text messages, and unread notification messages.
  • the attribute status of the device contains the current location of the device, and the device is placed. Direction, the current location of the device and the external environment, such as subway, bus or shopping mall.
  • the theft prevention mode is monitored according to the state of the device and the user's operation mode.
  • User actions and actions include forced shutdown, plugging and unplugging the card or unlocking the screen.
  • the judgment of the theft state is a logical judgment process of the device state and the user behavior. For example, when the device is in standby for a long time, the current device status is handled by a missed call. If the device receives a forced shutdown command at this time, the anti-theft mode can determine that the operation of the device is not normal according to the status and behavior. Operational logic.
  • the anti-theft mode determines that the current device is in the process of theft according to the theft mode, and can forcibly verify the identity of the user, for example, when the user forcibly shuts down, the user is required to perform identity verification.
  • the subsequent process can be executed, and when the user does not pass the authentication, the owner reminder mode is directly activated to perform an alarm.
  • the stolen mode can be combined with local or local + cloud to improve the accuracy of theft risk identification.
  • the owner reminder mode mainly performs a reminder and an alarm to the owner according to the judgment result of the current device state by the theft prevention mode.
  • the owner reminder mode can pre-define the reminder mode and strategy, and the main implementation is the alarm and record function.
  • the alarm function can inform the user of the current risk by ringing, vibrating, etc., and draw the user's attention.
  • the recording function will record the current coordinate position of the device and the information of the device user. It can be saved locally or sent to the user's predefined location by wireless or other means, such as email, emergency contact number or cloud disk, etc. Trace back.
  • FIG. 5 shows A typical scene diagram of the theft determination process provided by the preferred embodiment of the present invention is shown in FIG. 5.
  • the anti-theft mode in the user's device is in an activated state, and the anti-theft mode is responsible for periodically detecting the status of the device and evaluating the risk and status of the theft of the device.
  • the anti-theft mode judges the current device by listening to the sound around the environment. For vehicles or external use environments.
  • the anti-theft mode checks the current state of the device, including the device's battery capacity, network and standby time, and determines whether the current device is in normal use. If the battery is at a normal level and there are missed calls or text messages on the device, the device can be considered to be in normal use. On the other hand, when the power of the device is at a low level, the user does not have a service to be processed, such as a missed call or a short message, and the device is determined to be in an abnormal state;
  • the anti-theft mode determines whether the current device is at risk of being stolen according to the current behavioral mode feature, and takes the next step of theft prevention.
  • the state of the device is abnormal at this time, and there is a risk of theft.
  • the theft prevention mode starts the identity verification of the owner according to the set rules.
  • the user is in the normal use process, if the usage status of the device changes from the normal use state to the shutdown state, the device is in normal use, and the identity and security authentication is not required.
  • the device performs the normal process.
  • the user can be required to enter an identity password or other biometric authentication, such as a fingerprint or iris, before shutting down.
  • biometric authentication such as a fingerprint or iris
  • the geographic coordinates of the recording device and the forced photographing can be synchronously recorded, and after recording the current environment and location, the anti-theft mode can be performed in step S403.
  • the owner reminder mode reminds the owner that the owner is currently at the risk of being stolen according to the preset reminder mode.
  • the method of setting or the user's self-definition means reminders include vibration, sound, etc., as well as collection and reporting of device information, including but not limited to GPS coordinates, photographing of equipment, and the like.
  • the user When the user activates the anti-theft function, the user is stolen while riding the bus or walking. When the person who steals attempts to force the terminal to be shut down, the identity of the owner must be verified. If there is no verification or the verification fails, the device will alarm and record. Compared with the simple device authentication, it is smarter and does not cause the cumbersome authentication that the user actually uses. This method can be used for theft prevention of a smart phone. The user does not need to wear other software or hardware, and can get the alarm of the device at the first time when the device is lost, thereby reducing the loss of the user.
  • the method according to the above embodiment can be implemented by means of software plus a necessary general hardware platform, and of course, by hardware, but in many cases, the former is A better implementation.
  • the technical solution of the present invention in essence or the contribution to the related art can be embodied in the form of a software product stored in a storage medium (such as ROM/RAM, disk, CD-ROM).
  • the instructions include a number of instructions for causing a terminal device (which may be a cell phone, computer, server, or network device, etc.) to perform the methods described in various embodiments of the present invention.
  • Embodiments of the present invention also provide a storage medium.
  • the foregoing storage medium may be configured to store program code for performing the following steps:
  • the mobile terminal acquires status information of the mobile terminal, and determines, according to the status information, whether the mobile terminal is in a normal use state.
  • the mobile terminal After determining that the mobile terminal is in a normal use state, and the mobile terminal receives an illegal operation signal, determining that the mobile terminal is in a theft state, the mobile terminal sends the alarm information.
  • the foregoing storage medium may include, but not limited to, a USB flash drive, a Read-Only Memory (ROM), a Random Access Memory (RAM), a mobile hard disk, and a magnetic memory.
  • ROM Read-Only Memory
  • RAM Random Access Memory
  • a mobile hard disk e.g., a hard disk
  • magnetic memory e.g., a hard disk
  • the processor performs the method steps described in the foregoing embodiments according to the stored program code in the storage medium.
  • modules or steps of the present invention described above can be implemented by a general-purpose computing device that can be centralized on a single computing device or distributed across a network of multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device such that they may be stored in the storage device by the computing device and, in some cases, may be different from the order herein.
  • the steps shown or described are performed, or they are separately fabricated into individual integrated circuit modules, or a plurality of modules or steps thereof are fabricated as a single integrated circuit module.
  • the invention is not limited to any specific combination of hardware and software.
  • the mobile terminal acquires the state information of the mobile terminal, determines whether the mobile terminal is in a normal use state according to the state information, determines that the mobile terminal is in a normal use state, and the mobile terminal receives an illegal operation signal.
  • the mobile terminal is determined to be in a state of being stolen, and the alarm information is sent.

Abstract

一种移动终端防盗窃方法及装置,其中,该方法包括:移动终端获取该移动终端的状态信息,依据该状态信息判断该移动终端是否处于正常使用状态(S102);在判断该移动终端处于正常使用状态,且该移动终端接收到非法操作信号的情况下,确定该移动终端处于被盗窃状态,并发送告警信息(S104)。采用上述方法,解决了移动终端失窃后无法及时进行报警的问题,及时地控制了失窃的移动终端发出告警信息。

Description

移动终端防盗窃方法及装置 技术领域
本发明实施例涉及通信领域,具体而言,涉及一种移动终端防盗窃方法及装置。
背景技术
手机的使用日益普及,而经常遇到的情况就是手机被盗窃造成丢失,去年美国人丢失的手机总价值高达300亿美元,而费城是全美人均丢失手机最多的城市,人均每年丢失2部手机,最容易丢手机的地方则是咖啡馆。
国内有哪些地方是丢手机的“热门地”呢?来自第三方的统计显示,1.公交车上,上公交的时候手机容易被偷,特别是拎行李的学生,在公交站等车,一手拎行李,一手拿手机看,这是很多学生的习惯;2.火车站,人多拥挤,小偷好下手;3.地铁站,同火车站;4.洗手间,最容易忘记拿手机;5.餐厅,公共场合易丢失。
在相关技术中,手机失窃后往往第一时间就被强制关机或者被重新刷机了,没有足够时间发送报警以及找寻到该手机。
针对相关技术中,移动终端失窃后无法及时进行报警的问题,目前还没有有效的解决方案。
发明内容
本发明实施例提供了一种移动终端防盗窃方法及装置,以至少解决相关技术中移动终端失窃后无法及时进行报警的问题。
根据本发明实施例的一个方面,提供了一种移动终端防盗窃方法,包括:
移动终端获取所述移动终端的状态信息,依据所述状态信息判断所述移动终端是否处于正常使用状态;
在判断所述移动终端处于正常使用状态,且所述移动终端接收到非法操作信号的情况下,确定所述移动终端处于被盗窃状态,并发送告警信息。
可选地,在所述发送告警信息之前,所述方法还包括:
所述移动终端启动安全验证模式,并获取与所述安全验证模式对应的验证参数;
在所述验证参数未通过验证时,或者在预定时间段内没有接收到与所述安全验证模式对应的输入信号的情况下,所述移动终端发送所述告警信息。
可选地,所述安全验证模式包括以下之一:
密码模式,指纹识别模式,虹膜识别模式,声音识别模式,面部识别模式。
可选地,确定所述移动终端处于被盗窃状态之前,所述方法还包括:
获取所述移动终端的地理位置信息和/或所述移动终端所处的环境信息,依据所述地理位置信息和/或所述环境信息,确定所述移动终端所处场景,其中,在判断所述移动终端处于正常使用状态,且所述移动终端接收到非法操作信号的情况下,结合所述移动终端所处预定场景,确定所述移动终端是否处于被盗窃状态。
可选地,所述依据所述状态信息判断所述移动终端是否处于正常使用状态包括:
所述移动终端判断用于指示所述状态信息的参数值是否大于预设阈值,以及所述移动终端是否有未处理的任务,其中,在所述用于指示所述状态信息的参数值大于所述预设阈值,以及所述移动终端有未处理的任务的情况下,确定所述移动终端处于正常使用状态。
可选地,所述用于指示所述状态信息的参数值包括以下之一:所述移动终端的电量值,所述移动终端的信号强度值。
可选地,所述非法操作信号包括以下之一:
强制关机信号,插拔用户识别模块SIM卡的信号,所述移动终端的电池电源断开信号。
可选地,所述发送告警信息包括:
启动振动模式或预先设置的铃声;
发送所述移动终端的地理位置到预先指定的终端或者电子邮箱;
所述移动终端通过摄像头进行拍照,并发送所述拍照的照片到预先指定的终端或者电子邮箱。
根据本发明实施例的另一方面,提供了一种移动终端防盗窃装置,位于移动终端中,所述装置包括:
判断模块,设置为获取所述移动终端的状态信息,依据所述状态信息判断所述移动终端是否处于正常使用状态;
告警模块,设置为在判断所述移动终端处于正常使用状态,且所述移动终端接收到非法操作信号的情况下,确定所述移动终端处于被盗窃状态,并发送告警信息。
可选地,所述告警模块还包括:
启动单元,设置为在所述发送告警信息之前,启动安全验证模式,并获取与所述安全验证模式对应的验证参数;
发送单元,设置为在所述验证参数未通过验证时,或者在预定时间段内没有接收到与所述安全验证模式对应的输入信号的情况下,发送所述告警信息。
在本发明实施例中,还提供了一种计算机存储介质,该计算机存储介质可以存储有执行指令,该执行指令用于执行上述实施例中的移动终端防盗窃方法。
通过本发明实施例,移动终端获取该移动终端的状态信息,依据该状态信息判断该移动终端是否处于正常使用状态;在判断该移动终端处于正常使用状态,且该移动终端接收到非法操作信号的情况下,确定该移动终 端处于被盗窃状态,并发送告警信息,采用上述技术方案,解决了移动终端失窃后无法及时进行报警的问题,及时地控制了失窃的移动终端发出告警信息。
附图说明
此处所说明的附图用来提供对本发明的进一步理解,构成本申请的一部分,本发明的示意性实施例及其说明用于解释本发明,并不构成对本发明的不当限定。在附图中:
图1是根据本发明实施例的一种移动终端防盗窃方法的流程图;
图2是根据本发明实施例的一种移动终端防盗窃装置的结构框图一;
图3是根据本发明实施例的一种移动终端防盗窃装置的结构框图二;
图4为本发明优选实施例提供的一种手机防盗窃方法的流程示意图;
图5为本发明优选实施例提供的被盗窃判断过程的典型场景图。
具体实施方式
下文中将参考附图并结合实施例来详细说明本发明。需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互组合。
需要说明的是,本发明的说明书和权利要求书及上述附图中的术语“第一”、“第二”等是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。
在本实施例中提供了一种移动终端防盗窃方法,图1是根据本发明实施例的一种移动终端防盗窃方法的流程图,如图1所示,该流程包括如下步骤:
步骤S102,移动终端获取该移动终端的状态信息,依据该状态信息判断该移动终端是否处于正常使用状态;
步骤S104,在判断该移动终端处于正常使用状态,且该移动终端接收到非法操作信号的情况下,确定该移动终端处于被盗窃状态,并发送告 警信息。
通过上述步骤,移动终端获取该移动终端的状态信息,依据该状态信息判断该移动终端是否处于正常使用状态,在判断该移动终端处于正常使用状态,且该移动终端接收到非法操作信号的情况下,确定该移动终端处于被盗窃状态,并发送告警信息,解决了移动终端失窃后无法及时进行报警的问题,及时地控制了失窃的移动终端发出告警信息。
在本实施例中,在该发送告警信息之前,该移动终端启动安全验证模式,并获取与该安全验证模式对应的验证参数;
在该验证参数未通过验证时,或者在预定时间段内没有接收到与该安全验证模式对应的输入信号的情况下,该移动终端发送该告警信息,安全认证可以是要求输入密码,密保问题等。
在本实施例中,该安全验证模式包括以下之一:密码模式,指纹识别模式,虹膜识别模式,声音识别模式,面部识别模式。
在本实施例中,确定该移动终端处于被盗窃状态之前,获取该移动终端的地理位置信息和/或该移动终端所处的环境信息,依据该地理位置信息和/或该环境信息,确定该移动终端所处场景,场景为商场,地铁等,其中,在判断该移动终端处于正常使用状态,且该移动终端接收到非法操作信号的情况下,结合该移动终端所处预定场景,确定该移动终端是否处于被盗窃状态,例如,检测到移动终端处于商场或地铁等公共场所,突然移动终端接收到强制关机信号,则移动终端怀疑自身被盗窃,继而启动安全验证模式,从而使得移动终端在经常盗窃的场所,能够及时的发现该移动终端处于盗窃状态。
在本实施例中,该依据该状态信息判断该移动终端是否处于正常使用状态包括:
该移动终端判断用于指示该状态信息的参数值是否大于预设阈值,以及该移动终端是否有未处理的任务,其中,在该用于指示该状态信息的参数值大于该预设阈值,以及该移动终端有未处理的任务的情况下,确定该 移动终端处于正常使用状态。
在本实施例中,该用于指示该状态信息的参数值包括以下之一:该移动终端的电量值,该移动终端的信号强度值。
在本实施例中,该非法操作信号包括以下之一:
强制关机信号,插拔用户识别模块SIM卡的信号,该移动终端的电池电源断开信号。
在本实施例中,该移动终端发送告警信息包括:启动振动模式或预先设置的铃声;发送该移动终端的地理位置到预先指定的终端或者电子邮箱;该移动终端通过摄像头进行拍照,并发送该拍照的照片到预先指定的终端或者电子邮箱。
在本实施例中还提供了一种移动终端防盗窃装置,位于移动终端中,该装置用于实现上述实施例及优选实施方式,已经进行过说明的不再赘述。如以下所使用的,术语“模块”可以实现预定功能的软件和/或硬件的组合。尽管以下实施例所描述的装置较佳地以软件来实现,但是硬件,或者软件和硬件的组合的实现也是可能并被构想的。
图2是根据本发明实施例的一种移动终端防盗窃装置的结构框图一,如图2所示,该装置包括:
判断模块22,设置为获取该移动终端的状态信息,依据该状态信息判断该移动终端是否处于正常使用状态;
告警模块24,与判断模块22连接,设置为在判断该移动终端处于正常使用状态,且该移动终端接收到非法操作信号的情况下,确定该移动终端处于被盗窃状态,并发送告警信息。
通过上述步骤,判断模块22获取该移动终端的状态信息,依据该状态信息判断该移动终端是否处于正常使用状态,告警模块24在判断该移动终端处于正常使用状态,且该移动终端接收到非法操作信号的情况下,确定该移动终端处于被盗窃状态,并发送告警信息。采用上述技术方案,解决了移动终端失窃后无法及时进行报警的问题,及时地控制了失窃的移 动终端发出告警信息。
图3是根据本发明实施例的一种移动终端防盗窃装置的结构框图二,如图3所示,该告警模块24还包括:
启动单元32,设置为在该发送告警信息之前,启动安全验证模式,并获取与该安全验证模式对应的验证参数;
发送单元34,与启动单元32连接,设置为在该验证参数未通过验证时,或者在预定时间段内没有接收到与该安全验证模式对应的输入信号的情况下,发送该告警信息。
需要说明的是,上述各个模块是可以通过软件或硬件来实现的,对于后者,可以通过以下方式实现,但不限于此:上述各个模块均位于同一处理器中;或者,上述各个模块分别位于不同的处理器中。
下面结合本发明优选实施例进行详细说明。
本发明优选实施例所示包括移动终端和运行于移动终端上的软件和服务。
本优选实施例的方法主要在于盗窃模式判断和机主提醒两个业务,其中盗窃模式判断用于监听和判断当前设备是否存在被盗窃的风险或被盗过程中,设备的使用行为和模式是否符合盗窃模式。机主提醒则根据盗窃模式判断的结果,对机主进行提醒和报警,从而提醒使用者能够第一时间发现异常,避免设备的丢失。
用户设备上可选提供启用防盗窃模式,默认为开启状态,用户可以手动打开或者关闭。处于开启模式下,用户的设备上的防盗窃服务处于激活状态,并保持设备状态的监听。
防盗窃模式监听设备的状态,包括设备的使用环境,设备的位置和设备当前的状态,并根据判断规则来评价设备当前是否处于可能被盗的状态。当用户关机时,防盗窃模式根据当前设备被盗的风险,判断是否需要进行用户身份的验证,如需要用户的身份验证,则在关机流程中对于机主的身份进行验证,当身份验证未通过时,通过机主提醒模式进行告警和提醒。
机主提醒模式负责移动终端处于盗窃状态下的告警和记录,可以预先设置不同的告警和提醒方式,包括但不限于播放告警铃音,禁止关机,发送地理位置等等。
本发明优选实施例描述了一种增强移动设备防止盗窃的方法。用户启动该功能后,用户的设备处于防盗窃保护状态下,具体包括如下步骤:
第一步:防盗窃模式根据设备的当前状态,以及用户当前的场景和运行状态,作为盗窃的风险判断准则;
第二步:防盗窃模式根据获取的状态,结合设备的状态和用户的行为模式匹配盗窃风险,得到当前盗窃的风险概率及是否进行告警;
第三步:根据盗窃的风险概率,执行后续的操作,机主提醒模式根据预先设定的提醒模式,如铃声的报警,前摄像头拍照等多种方式进行告警,提醒用户当前设备存在盗窃风险。
图4为本发明优选实施例提供的一种手机防盗窃方法的流程示意图,如图4所示,步骤如下:
步骤S401,防盗窃模式开启后,监听设备的使用环境,位置和状态。防盗窃模式通过设备状态的检测,并结合用户的行为模式,判断当前设备是否存在被盗窃的风险;
步骤S402,当设备处于被盗窃风险中,设备被强制关机或者其他非法操作时,比如拔除sim卡等,防盗窃模式进行机主身份验证,并启动机主提醒模式进行告警;
步骤S403,机主提醒模式根据预先设定的告警方式,提醒机主设备存在被盗窃的风险,通过铃声的播放,位置的上报或者其他方式对机主进行提醒和通知。
本实施例中的防盗器模式可以通过开关来管理,用户可以手动打开或者关闭该功能。
本实施例提供的是防盗模式的实现方法,设备在待机状态下对于设备 的状态和用户的行为模式进行收集和分析,并智能判断设备是否处于盗窃的风险中。
在步骤S401中,防盗窃模式在启动后将会启动设备的状态监听,主要判断当前设备所处的环境,设备的使用情况及是否有待处理的任务。设备所处的环境判断有助于判断当前设备是否处于容易丢失的环境,如乘车,候车等环境。检测的方法可以通过设备外部元器件,如麦克风对于外部环境的声音监听来判断,同时可以结合从其他传感器获得的信息进一步提升环境判断的准确性。如,通过地磁传感器获得的位置和方向值,通过全球定位系统(Global Positioning System,简称为GPS)获得的速度和高度值等。
防盗窃模式读取本地数据库的数据信息,根据本地的数据值,形成设备的状态列表。防盗窃模式通过软件底层的驱动,获取当前设备可用的电量状态,同时通过底层短信和电话记录接口,判断当前设备是否有未接的电话和短信息,同时,防盗窃模式通过系统的推动消息数据库,可以获取消息推送信息,已经当前处于后台的软件和应用等信息,上述信息构成描述设备状态的列表。
在步骤S402中,设备根据设备的状态,结合用户的行为和动作的组合智能判断当前是否为合法的操作。具体的判断根据盗窃风险表来进行判断。
盗窃风险表将设备的状态和设备的属性设置为不同的权重,按照设备状态来源和属性的不同,可以划分为若干个权重,每个权重根据规则,设置不同的数值,例如当设备电量在90%以上时,设备开机时间小于24小时,设备健康权重可以设置为1,其他设备的状态也采用相同的规则设定。设备权重包括设备的健康状态,设备的任务状态,设备的属性状态。其中,健康状态包括设备的开机时间,设备的电量,设备的待机时间等反应设备的健康状态的信息。设备的任务状态包括设备未处理的电话,短信和未阅读的通知消息等。设备的属性状态包含设备当前所在的位置,设备的摆放 方向,设备当前所处的地理位置和外部环境,如地铁,公交或者商场等不同环境。
防盗窃模式根据设备的状态,并用户的操作模式进行监控。用户的动作和行为包括,强制关机,插拔卡或者解锁屏幕。盗窃状态的判断是设备状态和用户行为的逻辑判断过程。例如,当设备长时间待机后,当前的设备状态为有未接电话要处理,如果设备此时接收到强制关机命令,则防盗窃模式根据状态和行为则可以判断出设备的操作不符合正常的操作逻辑。此时,防盗窃模式根据盗窃模式判断当前设备处于盗窃过程中,可以强制进行用户身份的验证,如在用户强制关机时,要求用户进行身份验证。身份验证通过后,可以执行后续的流程,而当用户没有通过身份验证时直接启动机主提醒模式进行报警。
需要说明的是,被盗窃的模式可以采用本地或者本地+云端结合的方式,以提升盗窃风险识别的准确率。
在上述步骤S403中,机主提醒模式主要根据防盗窃模式对于当前设备状态的判断结果,对于机主进行提醒和告警。机主提醒模式可以预先定义提醒方式和策略,实现的主要是告警和记录功能。告警功能可以通过铃声,震动等方式告知用户当前的风险,引起用户的注意。记录功能将会记录设备当前的坐标位置以及设备使用者的信息,可以在本地保存或者通过无线或其他方式发送到用户预先定义的位置,如邮箱,紧急联系号码或者云盘等其他方式,以备追溯。
本发明的被盗窃状态判断方法优选实施例
下面以一个具体的例子说明防盗窃模式启动的情况下,终端如何根据设备的状态来识别设备丢失的风险并进行判断,以公交乘坐过程中的被盗过程的判断为例进行说明,图5为本发明优选实施例提供的被盗窃判断过程的典型场景图,如图5所示。首先,用户的设备中防盗窃模式处于启动状态,防盗窃模式负责定期检测设备的状态并对于设备的盗窃风险和状态进行评估。其次,防盗窃模式通过监听环境周围的声音,判断当前设备处 于交通工具或者外部的使用环境。
同时,防盗窃模式检查设备当前的状态,包括设备的电池容量,网络和待机时间等信息,并判断当前设备是否处于正常使用的状态。如电池电量处于正常水平,设备上有未接的电话或者短信,则可以认为设备处于正常使用。反之,当设备电量处于较低水平,用户没有要处理的业务,如未接电话或者未查看短信,则判断设备处于异常状态;
当用户拿起设备,尝试进行强制关机时,防盗窃模式根据当前的行为模式特征判断当前设备是否存在可能被盗窃的风险,并采取下一步防盗窃措施。当用户处于外部使用环境中,而此时用户的设备处于正常使用状态,并且设备的使用状态由保持待机状态变为强行关机状态,说明此时设备的状态发生异常,存在被盗窃的风险。此时,防盗窃模式根据设定的规则,启动对机主的身份验证。反之,当用户处于正常使用过程中,如果此时设备的使用状态由正常使用状态变为关机状态,则说明此时设备处于正常使用,则不需要进行身份和安全的认证,设备执行正常的流程。本例中,可以在关机前可以要求用户输入身份密码,或者其他生物身份的验证,如指纹或者虹膜等。当用户拒绝验证或者验证未通过时,则可以判断此时设备已经处于盗窃高风险中,防盗窃模式将启动机主提醒模式,进行告警和通知。
在防盗窃模式在识别风险后,可以同步记录设备的地理坐标和强制拍照,记录当前的环境和位置之后,防盗窃模式可执行步骤S403。
在机主提醒模式完成上述步骤S403后,表明此时设备处于被盗窃的奉献中,机主提醒模式根据预先设定的提醒模式来提醒机主当前处于被盗窃的风险,提醒的方式可以采用预置的方式或者用户自主定义,提醒手段包括震动,声音等,以及设备信息的收集和上报,包括但不限于GPS坐标,设备的拍照等。
本发明关于应用场景的优选实施例
用户启动防盗窃功能的情况下,用户乘坐公交或步行时被盗窃,当实 施盗窃的人员试图强行关机终端时,必须对于机主的身份进行验证,如果没有验证或者验证不通过,则设备会进行报警并记录。相比简单的在设备关机进行身份验证,更加智能,不会造成用户实际使用的繁琐的身份验证。此方法可以用于智能手机的防盗窃,用户无需佩戴其他软件或者硬件,能够在设备丢失的第一时间就得到设备的告警,降低用户的损失。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到根据上述实施例的方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本发明的技术方案本质上或者说对相关技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,或者网络设备等)执行本发明各个实施例所述的方法。
本发明的实施例还提供了一种存储介质。可选地,在本实施例中,上述存储介质可以被设置为存储用于执行以下步骤的程序代码:
S1,移动终端获取该移动终端的状态信息,依据该状态信息判断该移动终端是否处于正常使用状态;
S2,在判断该移动终端处于正常使用状态,且该移动终端接收到非法操作信号的情况下,确定该移动终端处于被盗窃状态,该移动终端发送告警信息。
可选地,在本实施例中,上述存储介质可以包括但不限于:U盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、移动硬盘、磁碟或者光盘等各种可以存储程序代码的介质。
可选地,在本实施例中,处理器根据存储介质中已存储的程序代码执行上述实施例所述的方法步骤。
可选地,本实施例中的具体示例可以参考上述实施例及可选实施方式 中所描述的示例,本实施例在此不再赘述。
显然,本领域的技术人员应该明白,上述的本发明的各模块或各步骤可以用通用的计算装置来实现,它们可以集中在单个的计算装置上,或者分布在多个计算装置所组成的网络上,可选地,它们可以用计算装置可执行的程序代码来实现,从而,可以将它们存储在存储装置中由计算装置来执行,并且在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤,或者将它们分别制作成各个集成电路模块,或者将它们中的多个模块或步骤制作成单个集成电路模块来实现。这样,本发明不限制于任何特定的硬件和软件结合。
以上所述仅为本发明的优选实施例而已,并不用于限制本发明,对于本领域的技术人员来说,本发明可以有各种更改和变化。凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。
工业实用性
在本发明实施例中,移动终端获取该移动终端的状态信息,依据该状态信息判断该移动终端是否处于正常使用状态;在判断该移动终端处于正常使用状态,且该移动终端接收到非法操作信号的情况下,确定该移动终端处于被盗窃状态,并发送告警信息,采用上述技术方案,解决了移动终端失窃后无法及时进行报警的问题,及时地控制了失窃的移动终端发出告警信息。

Claims (10)

  1. 一种移动终端防盗窃方法,包括:
    移动终端获取所述移动终端的状态信息,依据所述状态信息判断所述移动终端是否处于正常使用状态;
    在判断所述移动终端处于正常使用状态,且所述移动终端接收到非法操作信号的情况下,确定所述移动终端处于被盗窃状态,并发送告警信息。
  2. 根据权利要求1所述的方法,其中,在所述发送告警信息之前,所述方法还包括:
    所述移动终端启动安全验证模式,并获取与所述安全验证模式对应的验证参数;
    在所述验证参数未通过验证时,或者在预定时间段内没有接收到与所述安全验证模式对应的输入信号的情况下,所述移动终端发送所述告警信息。
  3. 根据权利要求2所述的方法,其中,所述安全验证模式包括以下之一:
    密码模式,指纹识别模式,虹膜识别模式,声音识别模式,面部识别模式。
  4. 根据权利要求1所述的方法,其中,确定所述移动终端处于被盗窃状态之前,所述方法还包括:
    获取所述移动终端的地理位置信息和/或所述移动终端所处的环境信息,依据所述地理位置信息和/或所述环境信息,确定所述移动终端所处场景,其中,在判断所述移动终端处于正常使用状态,且所述移动终端接收到非法操作信号的情况下,结合所述移动终端所处预定 场景,确定所述移动终端是否处于被盗窃状态。
  5. 根据权利要求1所述的方法,其中,所述依据所述状态信息判断所述移动终端是否处于正常使用状态包括:
    所述移动终端判断用于指示所述状态信息的参数值是否大于预设阈值,以及所述移动终端是否有未处理的任务,其中,在所述用于指示所述状态信息的参数值大于所述预设阈值,以及所述移动终端有未处理的任务的情况下,确定所述移动终端处于正常使用状态。
  6. 根据权利要求5所述的方法,其中,所述用于指示所述状态信息的参数值包括以下之一:所述移动终端的电量值,所述移动终端的信号强度值。
  7. 根据权利要求1所述的方法,其中,所述非法操作信号包括以下之一:
    强制关机信号,插拔用户识别模块SIM卡的信号,所述移动终端的电池电源断开信号。
  8. 根据权利要求1至7所述的方法,其中,所述发送告警信息包括:
    启动振动模式或预先设置的铃声;
    发送所述移动终端的地理位置到预先指定的终端或者电子邮箱;
    所述移动终端通过摄像头进行拍照,并发送所述拍照的照片到预先指定的终端或者电子邮箱。
  9. 一种移动终端防盗窃装置,位于移动终端中,所述装置包括:
    判断模块,用于获取所述移动终端的状态信息,依据所述状态信 息判断所述移动终端是否处于正常使用状态;
    告警模块,用于在判断所述移动终端处于正常使用状态,且所述移动终端接收到非法操作信号的情况下,确定所述移动终端处于被盗窃状态,并发送告警信息。
  10. 根据权利要求9所述的装置,其中,所述告警模块还包括:
    启动单元,用于在所述发送告警信息之前,启动安全验证模式,并获取与所述安全验证模式对应的验证参数;
    发送单元,用于在所述验证参数未通过验证时,或者在预定时间段内没有接收到与所述安全验证模式对应的输入信号的情况下,发送所述告警信息。
PCT/CN2017/076948 2016-04-11 2017-03-16 移动终端防盗窃方法及装置 WO2017177789A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610224100.1 2016-04-11
CN201610224100.1A CN107292208B (zh) 2016-04-11 2016-04-11 移动终端防盗窃方法及装置

Publications (1)

Publication Number Publication Date
WO2017177789A1 true WO2017177789A1 (zh) 2017-10-19

Family

ID=60041405

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/076948 WO2017177789A1 (zh) 2016-04-11 2017-03-16 移动终端防盗窃方法及装置

Country Status (2)

Country Link
CN (1) CN107292208B (zh)
WO (1) WO2017177789A1 (zh)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108509778A (zh) * 2018-02-07 2018-09-07 平安普惠企业管理有限公司 终端信息保护方法、装置、计算机设备和存储介质
CN109151197B (zh) * 2018-08-22 2021-04-20 奇酷互联网络科技(深圳)有限公司 基于公共摄像头的防盗方法、电子设备以及存储装置
CN109190422A (zh) * 2018-08-29 2019-01-11 奇酷互联网络科技(深圳)有限公司 终端防盗方法、终端及具有存储功能的装置
CN109544304B (zh) * 2018-11-29 2021-02-05 每日互动股份有限公司 根据移动终端信息进行预警的方法

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040203564A1 (en) * 2002-08-26 2004-10-14 Chi-Chang Ho Motorcycle communication and burglary-prevention system
CN1859670A (zh) * 2005-09-21 2006-11-08 华为技术有限公司 一种具有防盗功能的移动终端和移动终端防盗的方法
CN101616495A (zh) * 2008-06-23 2009-12-30 网秦无限(北京)科技有限公司 保护手机中个人隐私的方法及系统
CN101969493A (zh) * 2010-10-28 2011-02-09 深圳市五巨科技有限公司 一种移动终端防盗方法及装置
CN103024164A (zh) * 2012-12-03 2013-04-03 北京百度网讯科技有限公司 移动终端的防盗方法和装置
CN103037310A (zh) * 2012-12-14 2013-04-10 北京网秦天下科技有限公司 移动终端智能防盗方法和移动终端

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4682481B2 (ja) * 2001-08-15 2011-05-11 ソニー株式会社 移動端末に記録されたデータを保護する方法、移動端末データ保護システム、および移動端末
CN101005663A (zh) * 2006-11-15 2007-07-25 深圳凯虹移动通信有限公司 具有丢失追踪功能的移动终端和移动终端丢失追踪方法
CN101212730A (zh) * 2006-12-29 2008-07-02 康佳集团股份有限公司 一种移动终端防盗防丢失的方法及系统
CN100488277C (zh) * 2007-01-08 2009-05-13 北京天碁科技有限公司 移动终端的异常状态处理方法及移动终端

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040203564A1 (en) * 2002-08-26 2004-10-14 Chi-Chang Ho Motorcycle communication and burglary-prevention system
CN1859670A (zh) * 2005-09-21 2006-11-08 华为技术有限公司 一种具有防盗功能的移动终端和移动终端防盗的方法
CN101616495A (zh) * 2008-06-23 2009-12-30 网秦无限(北京)科技有限公司 保护手机中个人隐私的方法及系统
CN101969493A (zh) * 2010-10-28 2011-02-09 深圳市五巨科技有限公司 一种移动终端防盗方法及装置
CN103024164A (zh) * 2012-12-03 2013-04-03 北京百度网讯科技有限公司 移动终端的防盗方法和装置
CN103037310A (zh) * 2012-12-14 2013-04-10 北京网秦天下科技有限公司 移动终端智能防盗方法和移动终端

Also Published As

Publication number Publication date
CN107292208A (zh) 2017-10-24
CN107292208B (zh) 2022-12-20

Similar Documents

Publication Publication Date Title
ES2658314T3 (es) Aparatos y procedimientos para localizar, rastrear y/o recuperar un dispositivo de comunicación inalámbrica
US10318716B2 (en) Systems and methods for identifying unauthorized users of an electronic device
US9954829B2 (en) Method and apparatus for detecting and dealing with a lost electronics device
US10515203B2 (en) Method and system for improving security of a mobile terminal
US20100273452A1 (en) Apparatus and Methods For Locating Tracking and/or Recovering a Wireless Communication Device
WO2017177789A1 (zh) 移动终端防盗窃方法及装置
US20150048943A1 (en) Anti-loss Systems and Methods for Mobile Devices
US9706380B1 (en) Providing emergency notification and tracking data from a mobile device
US20140253708A1 (en) Lost device return
CN107729781B (zh) 移动终端防丢失的方法、移动终端及计算机可读存储介质
TW201638827A (zh) 用於在行動裝置上提供安全機制之方法及設備
WO2016180165A1 (zh) 一种手机追踪方法、装置及终端
EP2780900B1 (en) Systems and methods for recovering low power devices
US10956607B2 (en) Controlling non-owner access to media content on a computing device
JP2007334499A (ja) 所在管理システム、情報管理システム、サーバ装置、所在管理方法、および情報管理方法
JP2005142690A (ja) 情報処理装置及びその報知方法
WO2016041160A1 (zh) 移动终端的控制方法和移动终端
WO2017111962A1 (en) System and method for securing electronic device during low power and following hardware change
US8854203B1 (en) Providing a device left behind alert
CN105516914A (zh) 定位处理方法及装置
CN116939087A (zh) 接听风险的提示方法、装置、设备及存储介质
CN113840029A (zh) 异常通话状态的识别方法及装置

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17781765

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 17781765

Country of ref document: EP

Kind code of ref document: A1