WO2018232650A1 - Terminal mobile équipé d'une fonction de protection de compte de communication et produit associé - Google Patents

Terminal mobile équipé d'une fonction de protection de compte de communication et produit associé Download PDF

Info

Publication number
WO2018232650A1
WO2018232650A1 PCT/CN2017/089434 CN2017089434W WO2018232650A1 WO 2018232650 A1 WO2018232650 A1 WO 2018232650A1 CN 2017089434 W CN2017089434 W CN 2017089434W WO 2018232650 A1 WO2018232650 A1 WO 2018232650A1
Authority
WO
WIPO (PCT)
Prior art keywords
mobile terminal
communication account
communication
logged
account
Prior art date
Application number
PCT/CN2017/089434
Other languages
English (en)
Chinese (zh)
Inventor
王苏娜
Original Assignee
深圳支点电子智能科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳支点电子智能科技有限公司 filed Critical 深圳支点电子智能科技有限公司
Priority to PCT/CN2017/089434 priority Critical patent/WO2018232650A1/fr
Publication of WO2018232650A1 publication Critical patent/WO2018232650A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/725Cordless telephones

Definitions

  • the present invention relates to the field of communication technologies, and in particular, to a mobile terminal and related products having a communication account protection function.
  • the location information is sent to the server, for example, by the mobile terminal, and the server transmits the location information to the user according to the received location information, so that the user can search for the mobile terminal according to the location information.
  • the server since the user only retrieves the mobile terminal based on the location information, it is highly likely that the mobile terminal cannot be retrieved. It can be seen that the probability that the mobile terminal is lost and retrieved is relatively low.
  • the object of the present invention is to provide a mobile terminal information publishing method and a mobile terminal, which solves the problem that the probability of loss recovery of the mobile terminal is relatively low.
  • an embodiment of the present invention provides a method for publishing information of a mobile terminal, including:
  • the mobile terminal determines whether it is currently in a stolen state
  • the mobile terminal If the mobile terminal belongs to the stolen state, and the mobile terminal detects that the mobile terminal is abnormally unlocked, the mobile terminal detects whether the currently registered communication account is a communication account that has been logged in by the mobile terminal history;
  • the mobile terminal issues the communication account in the social webpage of the communication account and logs in on the mobile terminal that the user steals. Notifying the message, and transmitting the account information of the communication account to the pre-bound terminal device.
  • the method further includes:
  • the mobile terminal specially sets the notification message in the social webpage, and the special setting includes not being visible to the communication account itself.
  • the method further includes:
  • the mobile terminal sends a notification message to each communication contact person in the address book of the communication account, the communication account is logged in on the mobile terminal stolen by the user, and deletes the group record.
  • the mobile terminal determines whether it is currently in a stolen state, including:
  • the method further includes:
  • the mobile terminal When the mobile terminal is in a stolen state, the mobile terminal hides an application specified on the mobile terminal that needs to be kept secret from being hidden on the interface, and prohibits the pre-designated application that needs to be kept secret, and The location information is sent to the pre-bound terminal device.
  • the method further includes:
  • the mobile terminal matches the communication information included in the address book of the communication account with the communication information in the communication record of the communication account that the mobile terminal has logged in, and if the same communication information is matched, the communication is performed
  • the communication account corresponding to the information is sent a notification message that the communication account is logged in to the mobile terminal, and the notification message further includes a communication account that the mobile terminal has logged in to indicate that the mobile terminal is the mobile terminal.
  • the embodiment of the invention further provides a mobile terminal, including:
  • a judging module configured to determine whether the current status is stolen
  • a detecting module configured to: if the mobile terminal is in a stolen state, and the mobile terminal detects that the mobile terminal is abnormally unlocked, detecting whether the currently registered communication account is a communication account that has been logged in by the mobile terminal history ;
  • a publishing module configured to: the mobile terminal that is currently logged in is not the communication account that has been logged in by the mobile terminal history, and the mobile terminal publishes the communication account in the social webpage of the communication account and logs in on the mobile terminal that the user steals Notification message, and sending the communication to a pre-bound terminal device Account information of the account.
  • the mobile terminal further includes:
  • a setting module configured to perform special setting on the notification message in the social webpage, where the special setting comprises not being visible to the communication account itself.
  • the mobile terminal further includes:
  • the group sending module is configured to send, in the address book of the communication account, each communication contact group, the notification message that the communication account is logged in on the mobile terminal that the user steals, and delete the grouped record.
  • the determining module is configured to determine whether the location information of the mobile terminal belongs to a location range corresponding to a motion track pre-stored by the mobile terminal, and if the location information does not belong to the location range, determine the The mobile terminal is in a stolen state;
  • the mobile terminal further includes:
  • a hiding module when the mobile terminal is in a stolen state, the mobile terminal hides an application specified on the mobile terminal that needs to be kept secret from being hidden on the interface, and prohibits the pre-designated application that needs to be kept secret Run and send the location information to the pre-bound terminal device.
  • the mobile terminal further includes:
  • a sending module configured to: the mobile terminal matches the communication information included in the address book of the communication account with the communication information in the communication record of the communication account that the mobile terminal has logged in, if the same communication information is matched Transmitting, by the communication account corresponding to the communication information, a notification message that the communication account is logged in to the mobile terminal, and the notification message further includes a communication account that the mobile terminal has logged in to indicate the mobile terminal a mobile terminal that is a communication account that has been logged in by the mobile terminal history.
  • the embodiment of the invention further provides a mobile terminal, including:
  • processor configured to perform the following steps:
  • Determining whether the mobile terminal is currently in a stolen state if the mobile terminal belongs to a stolen state, and detecting that the mobile terminal is abnormally unlocked, detecting whether the currently logged-in communication account is a communication that has been logged in by the mobile terminal history If the currently registered communication account is not the communication account that has been logged in by the mobile terminal history, the notification message of the communication account being logged in on the mobile terminal stolen by the user is posted in the social webpage of the communication account, and The pre-bound terminal device sends the account information of the communication account.
  • the processor is further configured to: perform special setting on the notification message in the social webpage, where the special setting includes not being visible to the communication account itself.
  • the processor is further configured to: send, in the address book of the communication account, each communication contact group, the notification message that the communication account is logged in on the mobile terminal that the user steals, and delete the record of the group sending .
  • the processor is specifically configured to: determine whether the location information of the mobile terminal belongs to a location range corresponding to a motion track pre-stored by the mobile terminal, in determining whether the mobile terminal is currently in a stolen state; If the location information does not belong to the location range, determining that the mobile terminal is in a stolen state;
  • the processor is further configured to: when the mobile terminal is in a stolen state, hide an application specified on the mobile terminal that needs to be confidentially hidden on the interface, and prohibit the pre-designated application that needs to be kept secret Run and send the location information to the pre-bound terminal device.
  • the processor is further configured to: match the communication information included in the address book of the communication account with the communication information in the communication record of the communication account that the mobile terminal has logged in, if the match is the same Transmitting, by the communication account corresponding to the communication information, a notification message that the communication account is logged in to the mobile terminal, and the notification message further includes a communication account that the mobile terminal has logged in to indicate The mobile terminal is a mobile terminal of a communication account that has been logged in by the mobile terminal history.
  • the processor is further configured to: detect whether the mobile terminal generates a first ⁇ action event, and if the mobile terminal generates a first ⁇ action event, detecting whether the smart watch specified by the mobile terminal generates a second ⁇ action An event, if the second watch action event occurs in the smart watch, determining whether the first action action event and the second action action event include the same action direction, and if the action direction is the same, determining the first motion Whether the action event and the start time of the ⁇ action included in the second ⁇ action event are all within a preset duration, and determining whether the duration of the ⁇ action included in the first ⁇ action event and the second ⁇ action event are both located within the preset duration, if the first ⁇ action event and the second ⁇ action event include ⁇ action start time are both within a preset time period, and the first ⁇ action event and the second Determining the duration of the ⁇ action included in the ⁇ action event is within the preset duration, and determining the ⁇ action included in the first ⁇
  • the embodiment of the invention further provides a computer readable storage medium, the program readable storage medium storing program code, the program code comprising instructions for performing the following steps:
  • Determining whether the mobile terminal is currently in a stolen state if the mobile terminal belongs to a stolen state, and the mobile terminal detects that the mobile terminal is abnormally unlocked, detecting whether the currently registered communication account is the mobile terminal history
  • the registered communication account in the case that the currently registered communication account is not the communication account that the mobile terminal has logged in, the communication account is posted on the social page of the communication account and the mobile account is logged on the user's stolen mobile terminal.
  • the notification message, and the account information of the communication account is sent to the pre-bound terminal device.
  • the program code includes instructions for performing a special step of: setting, in the social webpage, the notification message, the special setting comprising not being visible to the communication account itself.
  • the program code includes instructions for performing the following steps: in the address book of the communication account, each communication contact group sends a notification message that the communication account is logged in on the mobile terminal that the user steals, and Delete the grouped records.
  • determining whether the mobile terminal is currently in the stolen state includes: determining whether the location information of the mobile terminal belongs to a location range corresponding to the motion track pre-stored by the mobile terminal; if the location information does not belong to the location a range, determining that the mobile terminal is in a stolen state;
  • the program code includes instructions for performing the following steps:
  • the mobile terminal When the mobile terminal is in a stolen state, the mobile terminal hides an application specified on the mobile terminal that needs to be kept secret from being hidden on the interface, and prohibits the pre-specified application that needs to be kept from running, and The location information is sent to a pre-bound terminal device.
  • the program code includes instructions for performing the following steps: the communication information included in the address book of the communication account and the communication record of the communication account registered by the mobile terminal history
  • the communication information in the matching is matched, and if the same communication information is matched, the notification message that the communication account is logged in on the mobile terminal is sent to the communication account corresponding to the communication information, and the notification message further includes the movement
  • the communication account that the terminal history has logged in to indicate that the mobile terminal is the mobile terminal of the communication account that the mobile terminal has logged in.
  • the mobile terminal determines whether the mobile terminal belongs to the stolen state; if the mobile terminal belongs to the stolen state, and the mobile terminal detects that the mobile terminal is abnormally unlocked, the mobile terminal detects the current login. Whether the communication account is a communication account that has been logged in by the mobile terminal history; if the communication account currently logged in by the mobile terminal is not a communication account that has been logged in by the mobile terminal history, the mobile terminal is socialized in the communication account.
  • the webpage publishes a notification message that the communication account is logged in on the mobile terminal that the user steals, and sends the account information of the communication account to the pre-bound terminal device. In this way, the user can directly contact the thief through the communication account to improve the probability of retrieving the mobile terminal.
  • FIG. 1 is a schematic flowchart of a method for publishing information of a mobile terminal according to an embodiment of the present invention
  • FIG. 2 is a schematic structural diagram of a mobile terminal according to an embodiment of the present invention.
  • FIG. 3 is a schematic structural diagram of another mobile terminal according to an embodiment of the present invention.
  • FIG. 4 is a schematic structural diagram of another mobile terminal according to an embodiment of the present invention.
  • FIG. 5 is a schematic structural diagram of another mobile terminal according to an embodiment of the present disclosure.
  • FIG. 6 is a schematic structural diagram of another mobile terminal according to an embodiment of the present disclosure.
  • FIG. 7 is a schematic structural diagram of another mobile terminal according to an embodiment of the present disclosure.
  • FIG. 8 is a schematic structural diagram of another mobile terminal according to an embodiment of the present invention.
  • FIG. 1 is a schematic flowchart of a method for publishing information of a mobile terminal according to an embodiment of the present invention. As shown in FIG. 1
  • the mobile terminal determines whether the current state is a stolen state
  • the mobile terminal detects whether the currently logged-in communication account is a communication that has been logged in by the mobile terminal history. account number;
  • the communication account currently registered by the mobile terminal is not a communication account that has been logged in by the mobile terminal history, and the mobile terminal issues the communication account on the mobile terminal of the communication account on the mobile terminal that the user steals.
  • the login notification message, and the account information of the communication account is sent to the pre-bound terminal device.
  • the stolen state may be that the user who uses the mobile terminal is not the user of the mobile terminal itself, that is, used by others.
  • the above abnormal unlocking can be understood as not using the unlocking of the unlocking code of the mobile terminal.
  • the notification message that the communication account is logged in on the mobile terminal that the user has stolen is released to the social webpage of the communication account, so that the stolen information of the mobile terminal can be released.
  • the user can view the stolen information of the mobile terminal, and send the account information of the communication account to the pre-bound terminal device, so that the user can directly find the thief according to the account, so as to conveniently retrieve the mobile terminal.
  • the method further includes:
  • the mobile terminal specially sets the notification message in the social webpage, and the special setting includes not being visible to the communication account itself.
  • setting the notification message in the social webpage to be invisible to the communication account itself may be beneficial to spread the notification message in the social network, so as to prevent the thief from the message from the social network. Deleted.
  • the method further includes:
  • the mobile terminal sends a notification message to each communication contact person in the address book of the communication account, the communication account is logged in on the mobile terminal stolen by the user, and deletes the group record.
  • the foregoing notification message is grouped in the address book, which is more advantageous for the diffusion of the notification province, so that the user can quickly view the notification message and retrieve the mobile terminal in time.
  • the mobile terminal determines whether it is currently in a stolen state, including:
  • the method further includes:
  • the mobile terminal When the mobile terminal is in a stolen state, the mobile terminal hides an application specified on the mobile terminal that needs to be kept secret from being hidden on the interface, and prohibits the pre-designated application that needs to be kept secret, and The location information is sent to the pre-bound terminal device.
  • the stolen state of the mobile terminal can be accurately determined through the foregoing steps, and the application that needs to be kept secret is hidden on the interface, and the application that needs to be kept secret is prohibited from being operated, and
  • the location information is sent to the pre-bound terminal device, so that the security information of the mobile terminal is effectively protected to prevent the security information from being leaked.
  • the location information is sent to the pre-bound terminal device, thereby facilitating the user to retrieve the mobile terminal.
  • the method further includes:
  • the mobile terminal matches the communication information included in the address book of the communication account with the communication information in the communication record of the communication account that the mobile terminal has logged in, and if the same communication information is matched, the communication is performed
  • the communication account corresponding to the information is sent a notification message that the communication account is logged in to the mobile terminal, and the notification message further includes a communication account that the mobile terminal has logged in to indicate that the mobile terminal is the mobile terminal.
  • the same communication information exists, that is, the two communication accounts have the same communication friend, so that the user is more convenient to retrieve the mobile terminal through the friend. Because, through this friend, you can directly contact the thief.
  • the mobile terminal may further detect whether the mobile terminal generates a first ⁇ action event, and if the mobile terminal generates a first ⁇ action event, detecting the mobile terminal designation Whether the smart watch has a second action event if the smart watch occurs a second ⁇ action event, determining whether the first ⁇ action event and the second ⁇ action event include the same ⁇ action direction, and if the ⁇ action direction is the same, determining the first ⁇ action event and the second ⁇ Whether the start time of the ⁇ action included in the action event is within a preset time period, and determining whether the duration of the ⁇ action included in the first ⁇ action event and the second ⁇ action event are both within the preset duration, if The first action event and the second action event include a start time of the click action, both of which are within a preset time period, and the first action event and the second action event include a continuous action The duration is both within the preset duration, and determining whether the difference between the first
  • the preset duration may be 11 seconds, 22 seconds, 30 seconds, 50 seconds, 72 seconds, 102 seconds, or other times.
  • the first preset threshold may be 3 seconds, 5 seconds, 10 seconds, 20 seconds, 50 seconds, 84 seconds, or other time.
  • the second preset threshold may be 13 seconds, 15 seconds, 22 seconds, 20 seconds, 54 seconds, 81 seconds, or other times.
  • the mobile terminal determines whether the mobile terminal belongs to the stolen state; if the mobile terminal belongs to the stolen state, and the mobile terminal detects that the mobile terminal is abnormally unlocked, the mobile terminal detects the current login. Whether the communication account is a communication account that has been logged in by the mobile terminal history; if the communication account currently logged in by the mobile terminal is not a communication account that has been logged in by the mobile terminal history, the mobile terminal is socialized in the communication account.
  • the webpage publishes a notification message that the communication account is logged in on the mobile terminal that the user steals, and sends the account information of the communication account to the pre-bound terminal device. In this way, the user can directly contact the thief through the communication account to improve the probability of retrieving the mobile terminal.
  • FIG. 2 is a schematic structural diagram of a mobile terminal according to an embodiment of the present invention. As shown in FIG. 2, the method includes:
  • the determining module 201 is configured to determine whether the current state is a stolen state
  • the detecting module 202 is configured to detect, if the mobile terminal belongs to a stolen state, and the mobile terminal detects that the mobile terminal is abnormally unlocked, whether the currently registered communication account is a communication that has been logged in by the mobile terminal history. account number;
  • a publishing module 203 configured to: when the currently registered communication account is not a communication account that has been logged in by the mobile terminal history, the mobile terminal issues the communication account in the social network page of the communication account on the mobile terminal that the user steals The login notification message, and the account information of the communication account is sent to the pre-bound terminal device.
  • the mobile terminal further includes:
  • the setting module 204 is configured to perform special setting on the notification message in the social webpage, where the special setting includes not being visible to the communication account itself.
  • the mobile terminal further includes:
  • the group sending module 205 is configured to send, in the address book of the communication account, each communication contact group, the notification message that the communication account is logged in on the mobile terminal that the user steals, and delete the grouped record.
  • the determining module 201 is configured to determine whether the location information of the mobile terminal belongs to a location range corresponding to a motion track pre-stored by the mobile terminal, and if the location information does not belong to the location range, determine the location The mobile terminal is in a stolen state;
  • the mobile terminal further includes:
  • a hiding module 206 configured to: when the mobile terminal is in a stolen state, the mobile terminal hides an application specified on the mobile terminal that needs to be kept secret from being hidden on the interface, and prohibits the pre-designated application that needs to be kept secret
  • the program runs and sends the location information to the pre-bound terminal device.
  • the mobile terminal further includes:
  • the sending module 207 is configured to: the mobile terminal matches the communication information included in the address book of the communication account with the communication information in the communication record of the communication account that the mobile terminal has logged in, if the same communication is matched And transmitting, to the communication account corresponding to the communication information, a notification message that the communication account is logged in on the mobile terminal, and the notification message further includes a communication account that the mobile terminal has logged in to indicate the movement
  • the terminal is a mobile terminal of a communication account that has been logged in by the mobile terminal history.
  • the mobile terminal determines whether the mobile terminal belongs to the stolen state; if the mobile terminal belongs to the stolen state, and the mobile terminal detects that the mobile terminal is abnormally unlocked, the mobile terminal detects the current login. Whether the communication account is a communication account that has been logged in by the mobile terminal history; if the communication account currently logged in by the mobile terminal is not a communication account that has been logged in by the mobile terminal history, the mobile terminal is socialized in the communication account.
  • the webpage publishes a notification message that the communication account is logged in on the mobile terminal that the user steals, and sends the account information of the communication account to the pre-bound terminal device. In this way, the user can directly contact the thief through the communication account to improve the probability of retrieving the mobile terminal.
  • an embodiment of the present invention further provides a mobile terminal 700, including: a processor 710 and a memory 720 coupled to each other; and the processor 710 is configured to perform the following steps:
  • Determining whether the mobile terminal is currently in a stolen state if the mobile terminal belongs to a stolen state, and detecting that the mobile terminal is abnormally unlocked, detecting whether the currently logged-in communication account is a communication that has been logged in by the mobile terminal history If the currently registered communication account is not the communication account that has been logged in by the mobile terminal history, the notification message of the communication account being logged in on the mobile terminal stolen by the user is posted in the social webpage of the communication account, and The pre-bound terminal device sends the account information of the communication account.
  • the processor is further configured to: perform special setting on the notification message in the social webpage, where the special setting includes not being visible to the communication account itself.
  • the processor is further configured to: send, in the address book of the communication account, each communication contact group, the notification message that the communication account is logged in on the mobile terminal that the user steals, and delete the record of the group sending .
  • the processor is specifically configured to: determine whether the location information of the mobile terminal belongs to a location range corresponding to a motion track pre-stored by the mobile terminal, in determining whether the mobile terminal is currently in a stolen state; If the location information does not belong to the location range, determining that the mobile terminal is in a stolen state;
  • the processor is further configured to: when the mobile terminal is in a stolen state, hide an application specified on the mobile terminal that needs to be confidentially hidden on the interface, and prohibit the pre-designated application that needs to be kept secret Run and send the location information to the pre-bound terminal device.
  • the processor is further configured to: use the communication information included in the address book of the communication account Correlating with the communication information in the communication record of the communication account that the mobile terminal has logged in, if the same communication information is matched, sending the communication account to the communication account corresponding to the communication information and logging in to the mobile terminal
  • the notification message further includes the communication account that the mobile terminal has logged in to indicate that the mobile terminal is the mobile terminal of the communication account that the mobile terminal has logged in.
  • the processor is further configured to: detect whether the mobile terminal generates a first ⁇ action event, and if the mobile terminal generates a first ⁇ action event, detecting whether the smart watch specified by the mobile terminal generates a second ⁇ action An event, if the second watch action event occurs in the smart watch, determining whether the first action action event and the second action action event include the same action direction, and if the action direction is the same, determining the first motion Whether the action event and the start time of the ⁇ action included in the second ⁇ action event are all within a preset duration, and determining whether the duration of the ⁇ action included in the first ⁇ action event and the second ⁇ action event are both located within the preset duration, if the first ⁇ action event and the second ⁇ action event include ⁇ action start time are both within a preset time period, and the first ⁇ action event and the second Determining the duration of the ⁇ action included in the ⁇ action event is within the preset duration, and determining the ⁇ action included in the first ⁇
  • the embodiment of the invention further provides a computer readable storage medium, the program readable storage medium storing program code, the program code comprising instructions for performing the following steps:
  • Determining whether the mobile terminal is currently in a stolen state if the mobile terminal belongs to a stolen state, and the mobile terminal detects that the mobile terminal is abnormally unlocked, detecting whether the currently registered communication account is the mobile terminal history
  • the registered communication account in the case that the currently registered communication account is not the communication account that the mobile terminal has logged in, the communication account is posted on the social page of the communication account and the mobile account is logged on the user's stolen mobile terminal.
  • Notification message, and to the pre-bound end The end device sends the account information of the communication account.
  • the program code includes instructions for performing a special step of: setting, in the social webpage, the notification message, the special setting comprising not being visible to the communication account itself.
  • the program code includes instructions for performing the following steps: in the address book of the communication account, each communication contact group sends a notification message that the communication account is logged in on the mobile terminal that the user steals, and Delete the grouped records.
  • determining whether the mobile terminal is currently in the stolen state includes: determining whether the location information of the mobile terminal belongs to a location range corresponding to the motion track pre-stored by the mobile terminal; if the location information does not belong to the location a range, determining that the mobile terminal is in a stolen state;
  • the program code includes instructions for performing the following steps:
  • the mobile terminal When the mobile terminal is in a stolen state, the mobile terminal hides an application specified on the mobile terminal that needs to be kept secret from being hidden on the interface, and prohibits the pre-specified application that needs to be kept from running, and The location information is sent to a pre-bound terminal device.
  • the program code includes instructions for performing the following steps: performing communication information included in an address book of the communication account with communication information in an address book of a communication account that has been historically registered by the mobile terminal. Matching, if the matching communication information is matched, sending a notification message that the communication account is logged in to the mobile terminal to the communication account corresponding to the communication information, and the notification message further includes the history of the mobile terminal being logged in.
  • the communication account is a mobile terminal that indicates that the mobile terminal is a communication account that has been logged in by the mobile terminal history.
  • the embodiment of the present invention further provides another mobile terminal.
  • FIG. 8 for the convenience of description, only parts related to the embodiment of the present invention are shown. If the specific technical details are not disclosed, please refer to the method part of the embodiment of the present invention.
  • the mobile terminal can be any terminal device including a mobile phone, a tablet computer, a PDA (Personal Digital Assistant), a POS (Point of Sales), an in-vehicle computer, and the mobile terminal is used as a mobile phone as an example:
  • FIG. 8 is a block diagram showing a partial structure of a mobile phone related to a mobile terminal provided by an embodiment of the present invention.
  • the mobile phone includes: a radio frequency (RF) circuit 910, a memory 920, an input unit 930, a sensor 950, an audio circuit 960, a Wireless Fidelity (WiFi) module 970, a processor 980, and a power supply 990.
  • RF radio frequency
  • the structure of the handset shown in FIG. 8 does not constitute a limitation to the handset, and may include more or fewer components than those illustrated, or some components may be combined, or different component arrangements.
  • the input unit 930 can be configured to receive input numeric or character information and to generate key signal inputs related to user settings and function controls of the handset.
  • the input unit 930 can include a touch display screen 933, a biometric device 931, and other input devices 932.
  • the biometric device 931 can be a fingerprint recognition device, or a face recognition device, or an iris recognition device or the like.
  • the input unit 930 can also include other input devices 932.
  • other input devices 932 may include, but are not limited to, one or more of physical buttons, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and the like.
  • the processor 980 is configured to acquire an image to be processed, the target area of the image to be processed is used to add a watermark pattern, determine first color information of the first image corresponding to the target area, and determine the first color.
  • the processor 980 is the control center of the handset, which connects various portions of the entire handset using various interfaces and lines, by executing or executing software programs and/or modules stored in the memory 920, and invoking data stored in the memory 920, executing The phone's various functions and processing data, so that the overall monitoring of the phone.
  • the processor 980 may include one or more processing units; optionally, the processor 980 may integrate a processor and a modem processor, where the processor mainly processes an operating system, a user interface, an application, and the like.
  • the modem processor primarily handles wireless communications. It will be appreciated that the above described modem processor may also not be integrated into the processor 980.
  • memory 920 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
  • the RF circuit 910 can be used for receiving and transmitting information.
  • RF circuit 910 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like.
  • LNA Low Noise Amplifier
  • RF circuitry 910 can also communicate with the network and other devices via wireless communication.
  • the above wireless communication may use any communication standard or protocol, including but not limited to Global System of Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (Code Division). Multiple Access, CDMA), Wideband Code Division Multiple Access (Wideband Code Division Multiple Access, WCDMA), Long Term Evolution (LTE), e-mail, Short Messaging Service (SMS), etc.
  • GSM Global System of Mobile communication
  • GPRS General Packet Radio Service
  • CDMA Code Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • LTE Long Term Evolution
  • SMS Short Messaging Service
  • the handset may also include at least one type of sensor 950, such as a light sensor, motion sensor, and other sensors.
  • the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor can adjust the brightness of the touch display screen according to the brightness of the ambient light, and the proximity sensor can turn off the touch display when the mobile phone moves to the ear. And / or backlight.
  • the accelerometer sensor can detect the magnitude of acceleration in all directions (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity.
  • the mobile phone can be used to identify the gesture of the mobile phone (such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping), etc.; as for the mobile phone can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.
  • the gesture of the mobile phone such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration
  • vibration recognition related functions such as pedometer, tapping
  • the mobile phone can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.
  • the audio circuit 960, the speaker 961, and the microphone 962 can provide an audio interface between the user and the mobile phone.
  • the audio circuit 960 can transmit the converted electrical data of the received audio data to the speaker 961 for conversion to the sound signal by the speaker 961; on the other hand, the microphone 962 converts the collected sound signal into an electrical signal by the audio circuit 960. After receiving, it is converted into audio data, and then processed by the audio data playback processor 980, sent to the other mobile phone via the RF circuit 910, or played back to the memory 920 for further processing.
  • WiFi is a short-range wireless transmission technology
  • the mobile phone can help users to send and receive emails, browse web pages, and access streaming media through the WiFi module 970, which provides users with wireless broadband Internet access.
  • FIG. 8 shows the WiFi module 970, it can be understood that it does not belong to the essential configuration of the mobile phone, and may be omitted as needed within the scope of not changing the essence of the invention.
  • the handset also includes a power supply 990 (such as a battery) that supplies power to the various components.
  • a power supply 990 (such as a battery) that supplies power to the various components.
  • the power supply can be logically coupled to the processor 980 via a power management system to manage charging, discharging, and power management functions through the power management system.
  • the mobile phone may further include a camera, a Bluetooth module, and the like, and details are not described herein again.
  • each step method flow can be implemented based on the structure of the mobile phone.
  • each unit function can be implemented based on the structure of the mobile phone.
  • Embodiments of the present invention also provide a computer program product comprising a non-transitory computer readable storage medium storing a computer program, the computer program being operative to cause a mobile terminal to perform the method as described in the above method embodiment Part or all of the steps of any one of the methods.
  • the disclosed method and apparatus may It is achieved in other ways.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
  • each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may be physically included separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of hardware plus software functional units.
  • the above-described integrated unit implemented in the form of a software functional unit can be stored in a computer readable storage medium.
  • the above software functional unit is stored in a storage medium and includes a plurality of instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform part of the steps of the transceiving method of the various embodiments of the present invention.
  • the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like, and the program code can be stored. Medium.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)

Abstract

L'invention concerne un terminal mobile disposant d'une fonction de protection de compte de communication et un produit associé. Le terminal mobile comprend un processeur et une mémoire couplée l'un à l'autre. Le processeur est utilisé pour exécuter les étapes suivantes consistant : à déterminer si le terminal mobile vient d'être volé; si le terminal mobile a été volé, et lorsque le terminal mobile détecte que le terminal mobile n'est pas normalement déverrouillé, à détecter si un compte de communication actuellement connecté est un compte de communication auquel le terminal mobile se connecte de manière historique; et si le compte de communication auquel le terminal mobile est actuellement connecté n'est pas le compte de communication auquel le terminal mobile se connecte historiquement, à délivrer un message de notification indiquant que le compte de communication a fait l'objet d'une connexion sur le terminal mobile volé d'un utilisateur dans une page Web de réseautage social du compte de communication, et à envoyer des informations de compte concernant le compte de communication à un dispositif terminal préalablement lié. De cette manière, un utilisateur peut contacter directement un voleur au moyen du compte de communication, de façon à améliorer la probabilité de retrouver un terminal mobile.
PCT/CN2017/089434 2017-06-21 2017-06-21 Terminal mobile équipé d'une fonction de protection de compte de communication et produit associé WO2018232650A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/089434 WO2018232650A1 (fr) 2017-06-21 2017-06-21 Terminal mobile équipé d'une fonction de protection de compte de communication et produit associé

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/089434 WO2018232650A1 (fr) 2017-06-21 2017-06-21 Terminal mobile équipé d'une fonction de protection de compte de communication et produit associé

Publications (1)

Publication Number Publication Date
WO2018232650A1 true WO2018232650A1 (fr) 2018-12-27

Family

ID=64735875

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/089434 WO2018232650A1 (fr) 2017-06-21 2017-06-21 Terminal mobile équipé d'une fonction de protection de compte de communication et produit associé

Country Status (1)

Country Link
WO (1) WO2018232650A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113362084A (zh) * 2021-06-09 2021-09-07 广州智会云科技发展有限公司 客户数据追踪方法、装置、设备及计算机可读存储介质

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103491236A (zh) * 2012-06-13 2014-01-01 鸿富锦精密工业(深圳)有限公司 具有追踪失窃功能的电子装置和追踪失窃方法
CN103581441A (zh) * 2013-10-31 2014-02-12 中国电子科技集团公司第十五研究所 移动终端追踪防盗系统和方法
CN103973876A (zh) * 2013-02-05 2014-08-06 联想移动通信科技有限公司 一种移动终端丢失追踪方法和移动终端
US20150207917A1 (en) * 2012-12-14 2015-07-23 Beijing Netqin Technology Co., Ltd. Mobile terminal intelligent anti-theft method and mobile terminal
CN105915714A (zh) * 2016-05-24 2016-08-31 北京小米移动软件有限公司 终端丢失提示方法及装置
CN106161514A (zh) * 2015-03-31 2016-11-23 小米科技有限责任公司 信息处理方法及装置

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103491236A (zh) * 2012-06-13 2014-01-01 鸿富锦精密工业(深圳)有限公司 具有追踪失窃功能的电子装置和追踪失窃方法
US20150207917A1 (en) * 2012-12-14 2015-07-23 Beijing Netqin Technology Co., Ltd. Mobile terminal intelligent anti-theft method and mobile terminal
CN103973876A (zh) * 2013-02-05 2014-08-06 联想移动通信科技有限公司 一种移动终端丢失追踪方法和移动终端
CN103581441A (zh) * 2013-10-31 2014-02-12 中国电子科技集团公司第十五研究所 移动终端追踪防盗系统和方法
CN106161514A (zh) * 2015-03-31 2016-11-23 小米科技有限责任公司 信息处理方法及装置
CN105915714A (zh) * 2016-05-24 2016-08-31 北京小米移动软件有限公司 终端丢失提示方法及装置

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113362084A (zh) * 2021-06-09 2021-09-07 广州智会云科技发展有限公司 客户数据追踪方法、装置、设备及计算机可读存储介质

Similar Documents

Publication Publication Date Title
US10657238B2 (en) Systems and methods for identifying unauthorized users of an electronic device
WO2018032661A1 (fr) Procédé d'affichage d'informations pour un dispositif terminal et dispositif terminal
WO2016134630A1 (fr) Procédé et dispositif de reconnaissance d'appel malveillant
CN107346397B (zh) 信息处理方法及相关产品
CN106506820B (zh) 一种移动终端数据的备份方法及装置
CN107466041B (zh) 识别伪基站方法、装置及移动终端
WO2019019837A1 (fr) Procédé d'identification biologique et produit associé
CN107743108B (zh) 一种介质访问控制地址识别方法及装置
US11775625B2 (en) Alert task processing method, terminal, and computer-readable storage medium
JP6974620B2 (ja) 通知メッセージ処理方法及び端末
WO2018161538A1 (fr) Procédé d'écriture de clé de cryptage et terminal mobile
WO2019041143A1 (fr) Procédé de commande de sécurité pour terminal mobile, terminal et support de stockage informatique
WO2018232650A1 (fr) Terminal mobile équipé d'une fonction de protection de compte de communication et produit associé
US10321399B1 (en) Activating a function in response to sensor readings
WO2018232652A1 (fr) Terminal mobile comportant un niveau de confidentialité élevé et produit associé
WO2019052287A1 (fr) Procédé de prévisualisation d'informations de visage et produit associé
CN113194198B (zh) 消息处理方法、消息处理装置
CN107707736A (zh) 具有被盗防护功能的移动终端和相关设备
CN109409068B (zh) 一种操作执行方法及终端
WO2018232647A1 (fr) Dispositif électronique ayant un haut niveau de protection de la confidentialité, et produit associé
CN108733458B (zh) 一种播放内容的方法及终端
CN107341391B (zh) 信息处理方法及相关产品
CN107682527A (zh) 具有通信账号防护功能的移动终端和相关产品
WO2018232646A1 (fr) Terminal mobile avec capacité de lecture adaptative et produit associé
WO2018232651A1 (fr) Terminal mobile et produit de programme associé

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17914159

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 15.05.2020)

122 Ep: pct application non-entry in european phase

Ref document number: 17914159

Country of ref document: EP

Kind code of ref document: A1