WO2019061525A1 - 移动终端的防盗处理方法、移动终端及可读存储介质 - Google Patents
移动终端的防盗处理方法、移动终端及可读存储介质 Download PDFInfo
- Publication number
- WO2019061525A1 WO2019061525A1 PCT/CN2017/105097 CN2017105097W WO2019061525A1 WO 2019061525 A1 WO2019061525 A1 WO 2019061525A1 CN 2017105097 W CN2017105097 W CN 2017105097W WO 2019061525 A1 WO2019061525 A1 WO 2019061525A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- mobile terminal
- unlocking
- theft
- processing method
- unlock
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/725—Cordless telephones
Definitions
- the present invention relates to the field of communications technologies, and in particular, to an anti-theft processing method for a mobile terminal, a mobile terminal, and a readable storage medium.
- the main purpose of the present invention is to provide a method for preventing theft prevention of a mobile terminal, a mobile terminal, and a readable storage medium, and aim to solve the technical problem that the mobile terminal cannot be retrieved after the mobile terminal is lost.
- the present invention provides an anti-theft processing method for a mobile terminal, and the anti-theft processing method includes the following steps:
- the method further includes:
- the mobile terminal When the number of times the mobile terminal unlocks the failure reaches the first preset number of times, the mobile terminal is controlled to enter the prohibition unlock mode.
- the step of controlling the mobile terminal to enter the forbidden unlock mode before the step of the mobile terminal unlocking failure reaches the first preset number of times further includes:
- the unlocking protection state is entered, and the front camera function and the positioning function of the mobile terminal are started, wherein the second preset number of times is less than the first preset number of times.
- the step of entering the unlocking protection state and starting the front camera function and the positioning function of the mobile terminal further includes:
- the anti-theft processing method further includes:
- the number of unlocking failures reaches the second preset number of times and does not reach the first preset number of times, if no operation is detected within the preset duration, the location information of the current mobile terminal is acquired, and the unlocking person photographed when the mobile terminal is unlocked is acquired. Image information and sent to the account number.
- the step of entering the unlock protection state and starting the front camera function and the positioning function of the mobile terminal after the number of unlocking failures reaches the second preset number of times further includes:
- the mobile terminal When the mobile terminal unlocks successfully, the mobile terminal is controlled to exit the unlock protection state.
- the step of entering the prohibition unlocking mode further includes:
- the shortcut unlocking interface is entered for the user to perform a quick unlocking operation.
- the method further includes:
- the unlock prohibition mode is exited.
- the present invention further provides a mobile terminal, the mobile terminal comprising: a memory, a processor, and an anti-theft processing program stored on the memory and operable on the processor, the anti-theft
- the steps of the anti-theft processing method of the mobile terminal as described above are implemented when the processing program is executed by the processor.
- the present invention also provides a computer readable storage medium storing an anti-theft processing program, the anti-theft processing program being executed by a processor to implement the mobile terminal as described above The steps of the anti-theft processing method.
- the anti-theft processing method of the mobile terminal acquires the current location information of the mobile terminal and the image information of the unlocking person captured by the mobile terminal when the mobile terminal is unlocked, and then obtains The location information and the image information are sent to the preset anti-theft information receiving account, so that after the mobile terminal is lost, it is only necessary to detect that the lost mobile terminal is in the unlock-free mode, and the related information of the lost mobile terminal can be acquired.
- the location information and the image information of the user enable retrieval of the lost mobile terminal.
- FIG. 1 is a schematic structural diagram of a terminal/device in a hardware operating environment according to an embodiment of the present invention
- FIG. 2 is a schematic flow chart of a first embodiment of an antitheft processing method according to the present invention
- FIG. 3 is a schematic flow chart of a second embodiment of the anti-theft processing method of the present invention.
- FIG. 4 is a schematic flow chart of a third embodiment of the anti-theft processing method of the present invention.
- FIG. 1 is a schematic structural diagram of a terminal in a hardware operating environment according to an embodiment of the present invention.
- the mobile terminal in the embodiment of the present invention may be a PC, or may be a portable terminal device having a display function, such as a smart phone, a tablet computer, or a portable computer.
- the mobile terminal can include a processor 1001, such as a CPU, a network interface 1004, a user interface 1003, a memory 1005, and a communication bus 1002.
- the communication bus 1002 is used to implement connection communication between these components.
- the user interface 1003 can include a display, an input unit such as a keyboard, and the optional user interface 1003 can also include a standard wired interface, a wireless interface.
- the network interface 1004 can optionally include a standard wired interface, a wireless interface (such as a WI-FI interface).
- the memory 1005 may be a high speed RAM memory or a stable memory (non-volatile) Memory), such as disk storage.
- the memory 1005 can also optionally be a storage device independent of the aforementioned processor 1001.
- the mobile terminal may further include a front camera, RF (Radio) Frequency, RF) circuits, sensors, audio circuits, WiFi modules, and more.
- sensors such as light sensors, motion sensors, and other sensors.
- the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display according to the brightness of the ambient light, and the proximity sensor may turn off the display and/or when the mobile terminal moves to the ear. Backlighting.
- the gravity acceleration sensor can detect the magnitude of acceleration in each direction (usually three axes), and can detect the magnitude and direction of gravity when stationary, and can be used to identify the posture of the mobile terminal (such as horizontal and vertical screen switching, Related games, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping), etc.; of course, the mobile terminal can also be equipped with other sensors such as gyroscope, barometer, hygrometer, thermometer, infrared sensor, etc. No longer.
- terminal structure shown in FIG. 1 does not constitute a limitation to the terminal, and may include more or less components than those illustrated, or a combination of certain components, or different component arrangements.
- an operating system may be included in the memory 1005 as a computer storage medium.
- a network communication module may be included in the memory 1005 as a computer storage medium.
- a user interface module may be included in the memory 1005 as a computer storage medium.
- a terminal anti-theft program may be included in the memory 1005 as a computer storage medium.
- the network interface 1004 is mainly used to connect to the background server and perform data communication with the background server;
- the user interface 1003 is mainly used to connect the client (user end), and perform data communication with the client;
- the processor 1001 can be used to call the anti-theft handler stored in the memory 1005 and perform the following operations:
- processor 1001 can call the anti-theft processing program stored in the memory 1005, and further performs the following operations:
- the mobile terminal When the number of times the mobile terminal unlocks the failure reaches the first preset number of times, the mobile terminal is controlled to enter the prohibition unlock mode.
- processor 1001 can call the anti-theft processing program stored in the memory 1005, and further performs the following operations:
- the unlocking protection state is entered, and the front camera function and the positioning function of the mobile terminal are started, wherein the second preset number of times is less than the first preset number of times.
- processor 1001 can call the anti-theft processing program stored in the memory 1005, and further performs the following operations:
- processor 1001 can call the anti-theft processing program stored in the memory 1005, and further performs the following operations:
- the number of unlocking failures reaches the second preset number of times and does not reach the first preset number of times, if no operation is detected within the preset duration, the location information of the current mobile terminal is acquired, and the unlocking person photographed when the mobile terminal is unlocked is acquired. Image information is sent to the anti-theft account.
- processor 1001 can call the anti-theft processing program stored in the memory 1005, and further performs the following operations:
- the mobile terminal When the mobile terminal unlocks successfully, the mobile terminal is controlled to exit the unlock protection state.
- processor 1001 can call the anti-theft processing program stored in the memory 1005, and further performs the following operations:
- the shortcut unlocking interface is entered for the user to perform a quick unlocking operation.
- processor 1001 can call the anti-theft processing program stored in the memory 1005, and further performs the following operations:
- the unlock prohibition mode is exited.
- FIG. 2 is a schematic flowchart diagram of an anti-theft processing method according to an embodiment of the present invention, where the anti-theft processing method includes:
- Step S10 Acquire current location information of the mobile terminal and image information of the unlocker that is captured when the mobile terminal fails to unlock when the mobile terminal is in the forbidden unlock mode;
- the unlocking prohibition mode is a mode in which the unlocking operation is not allowed.
- the unlocking cannot be performed only for a period of time, and the unlocking is prohibited. After the time is reached, the unlocking can be performed again.
- the mobile phone in order to ensure the security of the mobile phone, after the number of unlocking failures reaches a certain limit, the mobile phone will enter the prohibition unlock mode, and the unlocking function is not enabled again after a certain time delay. However, it is directly prohibited from being used and cannot be used. If you want to unlock the operation, you need to exit the unlocking prohibition mode according to the preset method.
- the mobile terminal since the mobile terminal usually sets the corresponding password by the owner to effectively restrict the use of others, such as fingerprint unlocking, image unlocking, and digital password unlocking, etc., when the mobile phone with the relevant password is required to be used, In the terminal, the user's fingerprint, input image, or input number is required to satisfy the preset unlock information, and the user can use it. In the actual application process, people can not always unlock to the mobile terminal to unlock successfully. Specifically, there are often a certain number of times (usually set to 5 times). When there is no unlocking success within a certain number of times, It is forbidden to unlock for a certain period of time (usually set to 60 seconds).
- the mobile phone is referred to as the mobile terminal, and when the unlocking is successful within a preset number of times, the current mobile terminal is caused to enter the unlocking prohibition mode, wherein, when moving When the terminal is in the unlock mode, the user will not be able to unlock the operation, that is, the unlock function of the mobile terminal will be locked in this state.
- the mobile terminal when the corresponding mobile terminal needs to be used, it is unlocked correspondingly, and the mobile terminal can be directly used when the unlocking is successful, and the unlocking interface is always used when the unlocking is unsuccessful, and Enter the unlock protection state when the unlock reaches a certain condition.
- the mobile phone when the mobile phone needs to be used, it is detected whether it is in the prohibition unlock mode, and the number of unlocking times is usually set to 5 times.
- the unlocking is successful 5 times, the mobile phone enters the prohibition unlock mode, and the mobile phone is determined to be the unlocked mode. The user is not the real mobile phone owner.
- the mobile terminal when it is confirmed that the mobile terminal enters the prohibition unlock mode, the current location information of the mobile terminal and the image information of the unlocker captured by the related camera function of the mobile terminal in the unlocked state are acquired. Specifically, when it is determined that the user of the mobile phone is not the real owner of the mobile phone, that is, the number of unlocking failures reaches 5 times, the mobile phone will obtain the current location information of the mobile phone through its own related program, and the mobile phone's own camera (mainly The front camera will be turned on to capture the relevant image information of the user who unlocked the phone.
- the actual image information required is an image of the unlocking person.
- the image captured by the front camera of the mobile phone may not necessarily be the image of the unlocking person, and may also be photographed.
- the image does not contain an image of the unlocker and contains some insignificant scenes.
- the acquired image in addition to directly transmitting the image information of the unlocked person captured when the acquired mobile terminal fails to be unlocked to the anti-theft account, the acquired image may be analyzed and processed so that the image of the unlocked person can be accurately obtained, and When the camera function of the front camera is activated, it is in a state of real-time capture, and when the face image is recognized and the shooting interface is recognized, shooting is performed to obtain an image of the unlocker.
- the acquired image may be the current mobile phone user's avatar, and may also include the user's current location. environment of.
- Step S20 Send the location information and the image information to a preset anti-theft account.
- the mobile terminal when it acquires the current location information and related image information, it sends the current location information to the preset anti-theft information receiving account.
- the related location information and the image information are sent to the preset anti-theft information receiving account, the user can obtain the location information and the image information sent by the mobile terminal in a certain manner.
- the preset anti-theft information receiving account has multiple types, and may be one or more of QQ, WeChat, and another mobile terminal (mobile phone number), for example, if the account information bound by the user is two. For the above and above, the location information and image information sent by the mobile phone will be sent to each account.
- the location information of the lost mobile phone and the captured image information can be directly received through the family mobile phone, and the received information can be “ Check if the mobile phone is lost. If it is lost, please check the information. If it is not lost, please cancel the prohibition unlocking command.
- the received information in addition to the image information of the user after the mobile phone is lost and the current location information of the mobile phone, may also include The unlocking mode of the unlocking mode is prohibited for the mobile phone. This information is mainly used to facilitate the mode in which the current mobile phone is located when the mobile phone is in the unlocking-free mode due to a user's misoperation.
- the mobile terminal when the mobile terminal is in the forbidden unlock mode, the current location information of the mobile terminal and the image information of the unlocker captured when the mobile terminal is unlocked are acquired, and then the obtained location information and image information are obtained.
- step S10 when the mobile terminal is in the forbidden unlock mode, acquiring the current location information of the mobile terminal and the image information of the unlocker captured when the mobile terminal fails to unlock, the foregoing includes:
- step S30 when the number of times the unlocking failure of the mobile terminal reaches the second preset number of times, the unlocking protection state is entered, and the pre-photographing function and the positioning function of the mobile terminal are started, wherein the second preset number of times is smaller than the first pre-predetermined Set the number of times;
- the camera function is activated by turning on the front camera of the mobile terminal, and the positioning function of the mobile terminal is also activated.
- the unlocking limit is usually set to 5 times, that is, in the unlocking process, the unlocking function of the mobile phone is turned off and the mobile phone enters the unlocking protection state only when the unlocking is not completed 5 times.
- the related functions of the mobile phone will be activated to obtain the relevant information required, specifically, the number of unlocking times is set to 3 times.
- the third unlocking still fails, and the camera function and the positioning function of the mobile phone are activated.
- the activation of the camera function of the mobile phone may be to open the front camera of the mobile phone to obtain the avatar of the current mobile phone user, and the starting function of the positioning function.
- the positioning of the GPS may also be based on the positioning of the base station of the mobile operation network. Since the accuracy of the positioning is slightly different between the two, in this embodiment, the positioning based on the GPS is preferably used to make the positioning more accurate.
- the camera function of the mobile phone and the corresponding positioning function are activated.
- the image information acquired by the front camera is automatically obtained by the camera function of the mobile phone, and is saved in the corresponding The location, while the GPS positioning function activated, obtains the location information of the current mobile phone and saves it in the corresponding storage location.
- the camera function and the positioning function of the mobile phone are activated, each time the unlocking fails, the related information acquired by the camera function and the positioning function at the time of the unlocking is acquired and saved until the unlocking is successful or the mobile phone enters the unlocking protection state for subsequent processing.
- the camera function and the positioning function that are turned on are turned off, so as to effectively reduce the consumption of the mobile phone.
- the mobile phone activates the photographing and positioning function when the unlocking fails three times.
- the fourth unlocking if the unlocking is successful, the operation interface is directly accessed, and the location information acquired due to the third unlocking failure and The image information is deleted; if the unlocking fails, the current location information and the corresponding image information are acquired again; and when the fifth unlocking operation is performed, if the unlocking fails again, the current location information and the corresponding image information are acquired again, and then
- the obtained location information and the image information including the 3rd, 4th, and 5th unlocking failures, are sent to another mobile phone bound to the current mobile phone, so that the real owner of the mobile phone can be accurate. Get the location information of the current mobile phone and the user image information. And after sending relevant information to the bound mobile phone, the camera function and positioning function of the mobile phone will be turned off.
- the camera function of the mobile terminal and the time of starting the positioning function are not limited.
- the photographing function and the moment when the positioning function is activated are before the mobile terminal enters the unlock protection state.
- Step S40 When the number of times the unlocking failure of the mobile terminal reaches the first preset number of times, the mobile terminal is controlled to enter the prohibition unlock mode.
- the unlocking function of the mobile terminal is turned off, and the unlocking mode is entered.
- the unlocking success may not be performed once, and usually, there is a certain number of unlocking times, that is, when the number of unlocking failures reaches the limit number of times, it is turned off.
- the unlocking function of the mobile phone is no longer supported for unlocking.
- the most common setting method is to set the limit number of times to 5 times, that is, there are 5 chances to unlock in an unlocking phase, and the number of unlocking failures will be 5 times.
- the unlock operation cannot be performed for a certain period of time.
- the unlocking operation in order to better protect the user's information after the mobile phone is stolen, the unlocking operation will no longer be supported after the unlocking reaches a certain number of times, until the user withdraws the mobile phone from prohibiting the unlocking by a specific operation.
- the specific operation may include receiving the confirmation information sent according to the preset anti-theft information receiving account, and may further include the user entering the quick unlocking interface for quick unlocking.
- the mobile phone when the number of unlocking failures reaches 5 times, the mobile phone will enter the prohibition unlocking state, and the unlocking operation of the mobile phone will no longer be allowed, but in the actual application process, the mobile phone is not always in the unlocked state. Specifically, when the mobile phone receives the confirmation information sent by the set anti-theft account, the mobile phone in the prohibition unlock mode will exit the prohibition unlock mode and re-enter the normal unlock interface, so that the user can unlock the mobile phone again.
- the specific acquisition method is not limited, and the purpose is to obtain an image of the unlocker better and send it to the anti-theft account.
- the related camera function and the positioning function of the mobile terminal are activated to obtain current location information and related image information, thereby realizing the process of using the terminal.
- the start time of the unlock function is more accurate, and when the number of unlock failures reaches the unlock limit number, the mobile terminal enters the prohibition unlock mode, and the unlock operation of the mobile terminal is no longer supported, and the acquired related information is sent to the location. Bind account.
- the startup of the related functions is more in line with the actual application, and the related functions are started under certain conditions, and after the related functions are started, certain information is acquired based on each operation, so that the final information is acquired. It is more accurate, and when entering the prohibition unlock mode, the position information acquired by the mobile terminal and the image information are fed back.
- the anti-theft processing method of the mobile terminal further includes:
- the number of unlocking failures reaches the second preset number of times and does not reach the first preset number of times, if no operation is detected within the preset duration, the location information of the current mobile terminal is acquired, and the unlocking person photographed when the mobile terminal is unlocked is acquired. Image information is sent to the anti-theft account.
- the camera function and the positioning function of the mobile terminal when the camera function and the positioning function of the mobile terminal are activated, if the number of unlocking times does not reach the limit number of times of unlocking, and no unlocking operation is detected within a certain period of time, the direct access is obtained.
- the saved location information and image information are then sent to the second mobile terminal.
- the camera function and the positioning function of the mobile phone are activated to acquire the location information and the image information of the current mobile phone, and when the mobile phone does not detect any unlocking operation within a certain time period , the position information and the image information acquired by the third unlocking failure are directly sent to another mobile phone that is pre-bound, and similarly, if the fourth unlocking fails, it is not detected within a certain preset time period.
- the location information and image information acquired due to the third unlock failure and the fourth unlock failure are sent to the bound mobile phone.
- the time limit for the preset duration is not limited. In order to make the information acquisition more accurate, in this embodiment, the preset duration is set to 3 seconds, specifically, when the unlocking operation is performed 3 times or When 4 times, if there is no unlocking operation within 3 seconds after the failure, the related information is directly transmitted.
- the photographing function and the positioning function of the mobile terminal are activated, if no unlocking operation is detected within a certain period of time, the acquired location information and image information are directly sent to the bound mobile.
- the terminal does not send information because the mobile terminal does not enter the unlock protection state, so that the acquisition of related information of the mobile terminal is more timely and accurate.
- the anti-theft processing method of the mobile terminal further includes:
- Step S50 when the number of unlocking failures reaches a second preset number of times, the quick unlocking function is activated;
- step S60 when the number of unlocking failures does not reach the first preset number of times, if it is detected that the current touch operation meets the preset condition of entering the quick unlocking interface, the shortcut unlocking interface is entered for the user to perform a quick unlocking operation.
- a quick unlocking function is also activated.
- the mobile phone when the mobile phone is unlocked, if the number of unlocking failures reaches 3 times, the mobile phone will start the quick unlocking function when entering the unlocking protection state, but the quick unlocking function is a hidden function, which is not directly performed on the mobile phone interface. Display, and will only be activated when entering the unlock protection state, the user can perform corresponding touch screen operation or button operation, and only when the operation meets the condition of entering the quick unlock interface presetly, the shortcut unlock interface is entered. The user quickly unlocks the phone.
- the operation of entering the quick unlock interface may be long pressing the power button for 3 seconds, or pressing the power button and the volume down button for 3 seconds at the same time, the specific setting manner is not limited, but it needs to be satisfied that it is not triggered by simple operation. At the same time, it is not a very complicated operation, which can be set by the user.
- the number of times used in the unlocking operation may be more than once, and the operation mode for entering the unlocking shortcut interface is only known to the mobile phone. Therefore, when the number of unlocking failures reaches 3 or 5 times, the user may fail to unlock due to his own operation error. Since the setting is when the mobile phone enters the unlocking prohibition state, the unlocking operation will no longer be allowed, and The location information acquired by the mobile phone and the captured image information are sent to the bound account. In order to avoid this situation, the real user of the mobile phone can enter the quick unlock interface to perform the unlocking operation by using a preset operation mode, and at this time The unlocking operation will be simpler and easier to operate.
- the quick unlocking function of the mobile terminal is started, and when the corresponding touch operation meets the entry into the quick unlocking interface, the interface is entered to perform an unlocking operation.
- the mobile terminal can be unlocked by using the preset quick unlock, without the mobile terminal acquiring relevant information and transmitting the information to the bound account. Even if a misoperation occurs, the mobile terminal can be prevented from performing useless operations in time.
- the invention also provides a mobile terminal with anti-theft function.
- the mobile terminal with anti-theft function includes: a memory, a processor, and an anti-theft processing program stored on the memory and operable on the processor, wherein the anti-theft processing program is implemented by the processor The steps of the anti-theft processing method of the mobile terminal.
- embodiments of the present invention also provide a computer readable storage medium.
- the computer readable storage medium of the present invention stores an anti-theft processing program, and the anti-theft processing program is executed by the processor to implement the steps of the anti-theft processing method method of the mobile terminal as described above.
- portions of the technical solution of the present invention that contribute substantially or to the prior art may be embodied in the form of a software product stored in a storage medium (such as a ROM/RAM as described above). , a disk, an optical disk, including a number of instructions for causing a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the methods described in various embodiments of the present invention.
- a terminal device which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephone Function (AREA)
Abstract
本发明公开了一种移动终端的防盗处理方法,所述移动终端的防盗处理方法包括以下步骤:在移动终端处于禁止解锁模式下,获取移动终端的当前位置信息以及移动终端解锁失败时拍摄的解锁人的图像信息;将所述位置信息以及所述图像信息发送至预设的防盗账号。本发明还公开了一种移动终端以及可读存储介质。本发明实现了在移动终端丢失后,当对所丢失的移动终端进行解锁操作并达到一定的条件时,便可获取所丢失移动终端的相关位置信息以及使用者的图像信息,进而可实现对所丢失移动终端的找回。
Description
技术领域
本发明涉及通信技术领域,尤其涉及一种移动终端的防盗处理方法、移动终端及可读存储介质。
背景技术
现如今,移动终端已经成为人们生活的必需品,随着移动终端的越来越普及,随之而来的问题也越来越多,其中较为重要的便是对于移动终端的在防盗方面的处理,具体地,在用户使用移动终端过程中,很有可能会因为各种原因导致移动终端的丢失,而人们对于此种情况的发生却没有更好的处理方式。
目前较为常用的防盗技术有多种,但是能够做到的仅仅是保证用户的相关数据信息不会被人查看以及自己可以找回相关重要的信息,而当用户需要找回所丢失的移动终端时,却很难以实现。
发明内容
本发明的主要目的在于提供一种移动终端的防盗处理方法、移动终端及可读存储介质,旨在解决如何在移动终端丢失后,无法实现移动终端找回的技术问题。
为实现上述目的,本发明提供一种移动终端的防盗处理方法,所述防盗处理方法包括以下步骤:
在移动终端处于禁止解锁模式下,获取移动终端的当前位置信息以及移动终端解锁失败时拍摄的解锁人的图像信息;
将所述位置信息以及所述图像信息发送至预设的防盗账号。
优选地,所述在移动终端处于禁止解锁模式下,获取移动终端的当前位置信息以及移动终端解锁失败时拍摄的解锁人的图像信息的步骤之前还包括:
当移动终端解锁失败次数达到第一预设次数时,控制移动终端进入所述禁止解锁模式。
优选地,所述当移动终端解锁失败次数达到第一预设次数时,控制移动终端进入所述禁止解锁模式的步骤之前还包括:
当移动终端解锁失败次数达到第二预设次数时,进入解锁保护状态,并启动移动终端的前置拍照功能以及定位功能,其中,所述第二预设次数小于所述第一预设次数。
优选地,所述当移动终端解锁失败次数达到第二预设次数时,进入解锁保护状态,并启动移动终端的前置拍照功能以及定位功能的步骤之后还包括:
当移动终端解锁失败时,基于所述前置拍照功能进行拍摄,以获取当前解锁人的图像信息并进行保存。
优选地,所述防盗处理方法还包括:
当解锁失败次数达到第二预设次数且并未达到第一预设次数时,若在预设时长内未检测到操作,则获取当前移动终端的位置信息以及移动终端解锁时拍摄的解锁人的图像信息,并发送至所述账号。
优选地,所述当解锁失败次数达到第二预设次数时,进入解锁保护状态,并启动移动终端的前置拍照功能以及定位功能的步骤之后还包括:
当移动终端解锁成功时,控制移动终端退出所述解锁保护状态。
优选地,所述当移动终端解锁失败次数达到第一预设次数时,进入所述禁止解锁模式的步骤之前还包括:
当解锁失败次数达到第二预设次数时,启动所述快捷解锁功能;
当解锁失败次数未达到第一预设次数时,若检测到当前触控操作满足进入快捷解锁界面的预设条件时,进入快捷解锁界面,以供用户进行快捷解锁操作。
优选地,所述将所述位置信息以及所述图像信息发送至预设的防盗信息接收账号的步骤之后还包括:
当接收到基于所述防盗账号发送的确认信息时,退出所述解锁禁止模式。
此外,为实现上述目的,本发明还提供一种移动终端,所述移动终端包括:存储器、处理器及存储在所述存储器上并可在所述处理器上运行的防盗处理程序,所述防盗处理程序被所述处理器执行时实现如上所述的移动终端的防盗处理方法的步骤。
此外,为实现上述目的,本发明还提供一种计算机可读存储介质,所述计算机可读存储介质上存储防盗处理程序,所述防盗处理程序被处理器执行时实现如上所述的移动终端的防盗处理方法的步骤。
本发明提出的移动终端的防盗处理方法,在移动终端处于禁止解锁模式下时,获取所述移动终端的当前位置信息以及所述移动终端在解锁时拍摄的解锁人的的图像信息,然后将得到的位置信息以及图像信息发送至预设的防盗信息接收账号,实现了在移动终端丢失后,只需要检测到所丢失的移动终端处于禁止解锁状模式下时,便可获取所丢失移动终端的相关位置信息以及使用者的图像信息,从而可以实现对所丢失移动终端的找回。
附图说明
图1是本发明实施例方案涉及的硬件运行环境的终端\装置结构示意图;
图2为本发明防盗处理方法的第一实施例的流程示意图;
图3为本发明防盗处理方法的第二实施例的流程示意图;
图4为本发明防盗处理方法的第三实施例的流程示意图。
本发明目的的实现、功能特点及优点将结合实施例,参照附图做进一步说明。
具体实施方式
应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。
如图1所示,图1是本发明实施例方案涉及的硬件运行环境的终端结构示意图。
本发明实施例移动终端可以是PC,也可以是智能手机、平板电脑、便携计算机等具有显示功能的可移动式终端设备。
如图1所示,该移动终端可以包括:处理器1001,例如CPU,网络接口1004,用户接口1003,存储器1005,通信总线1002。其中,通信总线1002用于实现这些组件之间的连接通信。用户接口1003可以包括显示屏(Display)、输入单元比如键盘(Keyboard),可选用户接口1003还可以包括标准的有线接口、无线接口。网络接口1004可选的可以包括标准的有线接口、无线接口(如WI-FI接口)。存储器1005可以是高速RAM存储器,也可以是稳定的存储器(non-volatile
memory),例如磁盘存储器。存储器1005可选的还可以是独立于前述处理器1001的存储装置。
可选地,移动终端还可以包括前置摄像头、RF(Radio
Frequency,射频)电路,传感器、音频电路、WiFi模块等等。其中,传感器比如光传感器、运动传感器以及其他传感器。具体地,光传感器可包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节显示屏的亮度,接近传感器可在移动终端移动到耳边时,关闭显示屏和/或背光。作为运动传感器的一种,重力加速度传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别移动终端姿态的应用(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等;当然,移动终端还可配置陀螺仪、气压计、湿度计、温度计、红外线传感器等其他传感器,在此不再赘述。
本领域技术人员可以理解,图1中示出的终端结构并不构成对终端的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。
如图1所示,作为一种计算机存储介质的存储器1005中可以包括操作系统、网络通信模块、用户接口模块以及终端防盗程序。
在图1所示的终端中,网络接口1004主要用于连接后台服务器,与后台服务器进行数据通信;用户接口1003主要用于连接客户端(用户端),与客户端进行数据通信;而处理器1001可以用于调用存储器1005中存储的防盗处理程序,并执行以下操作:
在移动终端处于禁止解锁模式下,获取移动终端的当前位置信息以及移动终端解锁失败时拍摄的解锁人的图像信息;
将所述位置信息以及所述图像信息发送至预设的防盗账号。
进一步地,处理器1001可以调用存储器1005中存储的防盗处理程序,还执行以下操作:
当移动终端解锁失败次数达到第一预设次数时,控制移动终端进入所述禁止解锁模式。
进一步地,处理器1001可以调用存储器1005中存储的防盗处理程序,还执行以下操作:
当移动终端解锁失败次数达到第二预设次数时,进入解锁保护状态,并启动移动终端的前置拍照功能以及定位功能,其中,所述第二预设次数小于所述第一预设次数。
进一步地,处理器1001可以调用存储器1005中存储的防盗处理程序,还执行以下操作:
当移动终端解锁失败时,基于所述前置拍照功能进行拍摄,以获取当前解锁人的图像信息并进行保存。
进一步地,处理器1001可以调用存储器1005中存储的防盗处理程序,还执行以下操作:
当解锁失败次数达到第二预设次数且并未达到第一预设次数时,若在预设时长内未检测到操作,则获取当前移动终端的位置信息以及移动终端解锁时拍摄的解锁人的图像信息,并发送至所述防盗账号。
进一步地,处理器1001可以调用存储器1005中存储的防盗处理程序,还执行以下操作:
当移动终端解锁成功时,控制移动终端退出所述解锁保护状态。
进一步地,处理器1001可以调用存储器1005中存储的防盗处理程序,还执行以下操作:
当解锁失败次数达到第二预设次数时,启动所述快捷解锁功能;
当解锁失败次数未达到第一预设次数时,若检测到当前触控操作满足进入快捷解锁界面的预设条件时,进入快捷解锁界面,以供用户进行快捷解锁操作。
进一步地,处理器1001可以调用存储器1005中存储的防盗处理程序,还执行以下操作:
当接收到基于所述防盗账号发送的确认信息时,退出所述解锁禁止模式。
参照图2,图2为本发明防盗处理方法一实施例的流程示意图,所述防盗处理方法包括:
步骤S10,在移动终端处于禁止解锁模式下,获取移动终端的当前位置信息以及移动终端解锁失败时拍摄的解锁人的图像信息;
本实施例中,解锁禁止模式是一种不允许进行解锁操作的模式,,现有技术中,当解锁失败次数达到一定的限制次数之后,仅仅是在一段时间内不能进行解锁,而在禁止解锁的时间达到后可再次进行解锁,在本实施例中,为了保证手机的安全,当解锁失败次数达到一定的限制次数之后,手机将会进入禁止解锁模式,解锁功能并不是在一定时长后再次启用,而是直接被禁止一直不能被使用,若想要进行解锁操作时,则需要按照预设的方式将手机退出解锁禁止模式。
在移动终端使用过程中,由于移动终端通常会被拥有者设置相应的密码,以有效的限制他人的使用,比如指纹解锁、图像解锁以及数字密码解锁等,使得当需要使用设置有相关密码的移动终端时,需要用户指纹、输入图像或者输入数字满足预先设置的解锁信息,才可以进行使用。在实际应用过程中,人们并不是可以一直进行解锁至移动终端解锁成功,具体地,往往会有一定的次数限制(通常设置为5次),当在一定的次数内没有解锁成功时,则会有一定的时长内(通常设置为60秒)禁止进行解锁。本实施例中,为了更好的理解本方案,以手机为所提及的移动终端,并设置当在预设次数内没有解锁成功时,将使得当前移动终端进入解锁禁止模式,其中,当移动终端处于禁止解锁模式时用户将不可以进行解锁操作,也就是在此状态时移动终端的解锁功能将会被锁定。
本实施例中,当需要使用相应的移动终端时,会对其进行相应的解锁,并在解锁成功时可直接使用所述移动终端,而当解锁不成功时,则会一直处于解锁界面,并在解锁达到一定条件时进入解锁保护状态。具体地,在手机需要被使用时,会检测其是否处于禁止解锁模式,通常设置解锁次数为5次,只有在5次均没有解锁成功时,手机则会进入禁止解锁模式,此时便认定手机的使用者已经并非是真实的手机拥有者。
本实施例中,当确认移动终端进入禁止解锁模式时,将会获取移动终端的当前位置信息和在解锁状态下移动终端的相关拍照功能所拍摄得到的解锁人的图像信息。具体地,当认定手机的使用者并非时手机的真正拥有者时,即解锁失败次数到达5次,手机将会通过自身的相关程序获取手机当前的位置信息,并且手机自带的摄像头(主要是前置摄像头)会开启,用以拍摄对手机进行解锁操作的用户的相关的图像信息。
本实施例中,实际所需要的图像信息为解锁人的图像,但是在实际的进行解锁操作时,手机的前置摄像头所拍摄的图像并不一定会是解锁人的图像,还有可能所拍摄的图像中并不包含有解锁人的图像而包含一些无关紧要的景象。在本方案中,除了直接将获取的移动终端解锁失败时拍摄的解锁人的图像信息发送至防盗账号上,也可以对所获取的图像进行分析处理,以可以准确获取解锁人的图像,还可以当启动了前置摄像头的拍照功能时,处于一个实时抓拍的状态,当识别到人脸图像进行拍摄界面时,进行拍摄,以获取解锁人的图像。
本实施例中,对于所提及的通过开启相关程序来获取手机当前位置信息的方式有多种,可以是直接开启手机自身的GPS定位功能进行位置信息的获取,还可以是通过开启某一预设的软件,通过软件获取位置信息。并且,由于在手机的实际使用过程中,人们在进行解锁操作时往往是将手机面对着自己,因此所获取的图像可以是当前手机使用者的头像,同时还可以包括使用者的当前所处的环境。
步骤S20,将所述位置信息以及所述图像信息发送至与预设的防盗账号。
本实施例中,当移动终端获取了当前位置信息以及相关的图像信息时,会将其发送至与预设的防盗信息接收账号。当将相关的位置信息以及图像信息发送至与预设的防盗信息接收账号时,用户可以通过一定的方式来获取移动终端所发送的位置信息以及图像信息。具体地,预设的防盗信息接收账号的种类有多种,可以为QQ、微信以及另一移动终端(手机号码)中的一种或者多种,比如,若用户所绑定的账号信息为两种及以上时,则在手机所发送的位置信息以及图像信息将会对每一个账号都进行发送。比如,当所绑定的账号为家人的手机号时,当自身手机丢失后,对于所丢失手机的位置信息以及所拍摄的图像信息,直接可通过家人手机进行接收,其中接收到的信息可以是“确认手机是否丢失,若丢失请查看信息,若未丢失请解除禁止解锁指令”,所接收到的信息中,除了包括手机丢失后使用者的图像信息以及手机当前所处的位置信息,还可以包括对手机禁止解锁模式的解除指令,此信息主要用于对用户因误操作使得手机处于禁止解锁模式时,便于解除当前手机所处的模式。
本实施例中,在移动终端处于禁止解锁模式下时,获取所述移动终端的当前位置信息以及所述移动终端解锁时所拍摄得到的解锁人的图像信息,然后将得到的位置信息以及图像信息发送至预设的防盗信息接收账号,实现了在移动终端丢失后,只需要检测到移动终端处于禁止解锁模式时,便可获取所丢失移动终端的相关位置信息以及使用者的图像信息,从而可以实现对所丢失移动终端的找回。
进一步地,步骤S10,在移动终端处于禁止解锁模式下,获取移动终端的当前位置信息以及移动终端解锁失败时拍摄的解锁人的图像信息,之前包括:
步骤S30,当移动终端解锁失败次数达到第二预设次数时,进入解锁保护状态,并启动移动终端的前置拍照功能以及定位功能,其中,所述第二预设次数小于所述第一预设次数;
本实施例中,当移动终端进行相应的解锁操作时,若解锁失败的次数达到一定的次数时,会通过开启移动终端的前置摄像头来启动拍照功能,并且还会启动移动终端的定位功能。具体地,通常设置的解锁限制次数为5次,也就是在解锁过程中,只有在5次解锁均未成果时才会关闭手机的解锁功能以及使手机进入解锁保护状态,在本实施例中,为了更好的获得手机的当前信息,设置在进行解锁操作的次数并未达到5次时,便会启动手机的相关功能,以获取所需要的相关信息,具体地,设置在解锁次数达到3次时,也就是第3次解锁依旧失败,启动手机的拍照功能以及定位功能,其中手机的拍照功能的启动可以是开启手机的前置摄像头,来获取当前手机使用者的头像,定位功能的启动方式不限,可以是基于
GPS的定位,还可以是基于移动运营网的基站的定位,由于两者在定位的准确性上有些许差异,在本实施例中,优选利用基于GPS的定位方式进行定位,以使得定位更加的准确。
本实施例中,设置当解锁失败3次时,将会启动手机的拍照功能以及相应的定位功能,此时,会通过手机的拍照功能自动获取前置摄像头所获取的图像信息,并且保存在相应的位置,同时所启动的GPS定位功能获取当前手机的位置信息并保存在相应的存储位置。在启动了手机的拍照功能以及定位功能时,每解锁失败一次均会获取此次解锁时拍照功能以及定位功能所获取的相关信息并保存,直至解锁成功或者手机进入解锁保护状态后进行后续处理,而当解锁成功时,则会将所开启的拍照功能以及定位功能关闭,以有效的降低手机的消耗。具体地,手机在解锁失败3次时启动了拍照和定位功能,在进行第4次解锁时,若解锁成功,则直接接入操作界面,并将因第3次解锁失败而获取的位置信息以及图像信息进行删除;若解锁失败,则再次获取当前位置信息以及相应的图像信息;并且在进行第5次解锁操作时,若解锁再次失败,则再一次获取当前位置信息以及相应的图像信息,然后将所获取的位置信息以及图像信息,包括第3次、第4次以及第5次解锁失败而获取的,发送至与当前手机所绑定的另一手机,以供手机的真实拥有者可准确获取当前手机的位置信息以及使用者图像信息。并且在将相关信息发送至所绑定的手机上后,将会关闭手机的拍照功能以及定位功能。
需要特别指出的是,移动终端拍照功能以及定位功能的启动的时刻不限。在本实施例中,为了使得获取的图像信息以及位置信息更为准确,拍照功能以及定位功能所启动的时刻在移动终端进入解锁保护状态之前。
步骤S40,当移动终端解锁失败次数达到第一预设次数时,控制移动终端进入所述禁止解锁模式。
本实施例中,当移动终端进行相应的解锁操作时,若解锁失败的次数达到一定次数时,将会关闭移动终端的解锁功能,并且进入禁止解锁模式。具体地,在使用手机的过程中,并不一定会是一次就可以解锁成功,通常情况下,会有一定解锁次数的限制,也就是说,当解锁失败的次数达到限制次数次时,会关闭手机的解锁功能而不再支持进行解锁操作,最为常见的设置方式是,设置限制次数为5次,也就是在一个解锁阶段有5次机会进行解锁,并且在解锁失败次数达到5次时将在一定时长内不能进行解锁操作。在本实施例中,为了更好的在手机被盗之后对用户的信息有更好的保护,在解锁达到一定次数之后将不再支持进行解锁操作,直至用户通过特定的操作使手机退出禁止解锁状态,本实施例中,特定的操作可以包括接收到基于预设的防盗信息接收账号而发送的确认信息,还可以包括用户进入快捷解锁界面进行快捷解锁。
本实施例中,当解锁失败次数达到5次时,手机将会进入禁止解锁状态,此时将不再允许对手机进行解锁操作,但是在实际应用过程中,手机并不是一直处于禁止解锁状态,具体地,当手机接收到所设置的防盗账号所发送的确认信息时,处于禁止解锁模式下的手机将会退出禁止解锁模式,重新进入正常的解锁界面,以便于用户再次对手机进行解锁操作。具体地获取方式不限,目的在于更好的获取解锁人的图像并发送给防盗账号。
本实施例中,在移动终端进行解锁的过程中,当解锁失败次数达到一定次数时,启动移动终端的相关拍照功能以及定位功能,以获取当前位置信息以及相关图像信息,实现了在终端使用过程中解锁功能的启动时机更加准确,并且在解锁失败次数达到解锁限制次数时,移动终端将进入禁止解锁模式,此时便不再支持对移动终端进行解锁操作,同时将获取的相关信息发送至所绑定的账号。实现了在解锁过程中,相关功能的启动更加的符合实际应用情况,在一定条件下才启动相关功能,并且在启动相关功能后,基于每一次的操作均获取一定的信息,使得最终信息的获取更加的准确,并且在进入禁止解锁模式时,将移动终端所获取的位置信息以及图像信息进行反馈。
进一步地,上述移动终端的防盗处理方法还包括:
当解锁失败次数达到第二预设次数且并未达到第一预设次数时,若在预设时长内未检测到操作,则获取当前移动终端的位置信息以及移动终端解锁时拍摄的解锁人的图像信息,并发送至所述防盗账号。
本实施例中,当在启动移动终端的拍照功能和定位功能时,若解锁次数并未达到解锁次数的限制次数,且在一定的时长内并未检测到任何的解锁操作时,则将直接获取所保存的位置信息以及图像信息,然后发送至第二移动终端。具体地,当解锁操作的次数达到3次时,启动手机的拍照功能以及定位功能,用以获取当前手机的位置信息以及图像信息,而当在一定时长内手机并未检测到任何的解锁操作时,则直接将因第3次解锁失败而获取的位置信息以及图像信息发送至预先绑定好的另一手机上,同样的,若第4次解锁失败后,在一定预设时长内并未检测到任何解锁操作时,则将因第3次解锁失败以及因第4次解锁失败而获取的位置信息以及图像信息发送至所绑定的手机上。在本实施例中,对于预设时长的时间长短设置不限,为了使得信息的获取更加的准确,在本实施例中,设置预设时长为3秒,具体地,当解锁操作进行3次或4次时,若在失败后3秒内没有任何解锁操作时,则直接进行相关信息的发送。
本实施例中,当启动了移动终端的拍照功能以及定位功能时,若在一定的时长内没有检测到任何的解锁操作时,直接将所获取的位置信息以及图像信息发送至所绑定的移动终端,并不会因为移动终端没有进入解锁保护状态而不进行信息发送的,实现了对于移动终端的相关信息的获取更为及时准确。
进一步地,上述移动终端的防盗处理方法还包括:
步骤S50,当解锁失败次数达到第二预设次数时,启动所述快捷解锁功能;
步骤S60,当解锁失败次数未达到第一预设次数时,若检测到当前触控操作满足进入快捷解锁界面的预设条件时,进入快捷解锁界面,以供用户进行快捷解锁操作。
本实施例中,当解锁失败次数达到第二预设次数时,除了启动拍照功能以及定位功能外,还将启动一个快捷解锁功能。具体地,在对手机进行解锁时,若解锁失败的次数达到了3次时,手机在进入解锁保护状态时将启动快捷解锁功能,但是快捷解锁功能为隐藏功能,并不是直接在手机界面上进行显示,并且只有在进入解锁保护状态时才会被启动,用户可以进行相应的触屏操作或者按键操作,只有操作在满足预先设置的进入快捷解锁界面的条件时,才会进入快捷解锁界面,以便用户对手机进行快捷解锁。对于进入快捷解锁界面的操作可以是长按开机键3秒,也可以是同时按压开机键和音量减键3秒,具体地设置方式不限,但需要满足的是,并不是简易操作即可触发,同时也不是很复杂的操作,具体可由用户自行设置。
本实施例中,由于人们在实际操作过程中会存在一定操作失误,而使得在进行解锁操作时所使用的次数可能不止一次,对于进入解锁快捷界面的操作方式只对于手机真实拥有着才是知晓的,因此,当解锁失败次数达到3次或者5次时,可能时用户因自身的操作失误而使得解锁失败,由于设定当手机进入解锁禁止状态时,将不再允许进行解锁操作,并且将手机所获取的位置信息以及所拍摄的图像信息发送至所绑定的账号,手机的真正用户为了避免此情况的产生,可以通过预设的操作方式进入快捷解锁界面进行解锁操作,并且此时的解锁操作将较为简单且操作方便。
本实施例中,在移动终端的解锁失败次数达到一定次数时,将启动移动终端的快捷解锁功能,并且在相应的触控操作满足进入快捷解锁界面时进入其界面以进行解锁操作。使得当用户因为自身操作失误进使得移动终端进入了解锁保护状态时,可通过预先设置的快捷解锁对移动终端进行解锁,而不会使移动终端获取相关信息并发送给所绑定的账号,实现了即使出现误操作时,也可以及时地避免移动终端进行无用的操作。
本发明还提供一种具有防盗功能的移动终端。
本发明具有防盗功能的移动终端包括:存储器、处理器及存储在所述存储器上并可在所述处理器上运行的防盗处理程序,所述防盗处理程序被所述处理器执行时实现如上所述的移动终端的防盗处理方法的步骤。
其中,在所述处理器上运行的防盗处理程序被执行时所实现的方法可参照本发明移动终端的防盗处理方法方法各个实施例,在此不再赘述。
此外本发明实施例还提出一种计算机可读存储介质。
本发明计算机可读存储介质上存储有防盗处理程序,所述防盗处理程序被处理器执行时实现如上所述的移动终端的防盗处理方法方法的步骤。
其中,在所述处理器上运行的防盗处理程序被执行时所实现的方法可参照本发明移动终端的防盗处理方法方法各个实施例,在此不再赘述。
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者系统不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者系统所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者系统中还存在另外的相同要素。
上述本发明实施例序号仅仅为了描述,不代表实施例的优劣。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在如上所述的一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本发明各个实施例所述的方法。
以上仅为本发明的优选实施例,并非因此限制本发明的专利范围,凡是利用本发明说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本发明的专利保护范围内。
Claims (10)
- 一种移动终端的防盗处理方法,其特征在于,所述移动终端的防盗处理方法包括以下步骤:在移动终端处于禁止解锁模式下,获取移动终端的当前位置信息以及移动终端解锁失败时拍摄的解锁人的图像信息;将所述位置信息以及所述图像信息发送至预设的防盗账号。
- 如权利要求1所述的移动终端的防盗处理方法,其特征在于,所述在移动终端处于禁止解锁模式下,获取移动终端的当前位置信息以及移动终端解锁失败时拍摄的解锁人的图像信息的步骤之前还包括:当移动终端解锁失败次数达到第一预设次数时,控制移动终端进入所述禁止解锁模式。
- 如权利要求2所述的移动终端的防盗处理方法,其特征在于,所述当移动终端解锁失败次数达到第一预设次数时,控制移动终端进入所述禁止解锁模式的步骤之前还包括:当移动终端解锁失败次数达到第二预设次数时,进入解锁保护状态,并启动移动终端的前置拍照功能以及定位功能,其中,所述第二预设次数小于所述第一预设次数。
- 如权利要求3所述的移动终端的防盗处理方法,其特征在于,所述当移动终端解锁失败次数达到第二预设次数时,进入解锁保护状态,并启动移动终端的前置拍照功能以及定位功能的步骤之后还包括:当移动终端解锁失败时,基于所述前置拍照功能进行拍摄,以获取当前解锁人的图像信息并进行保存。
- 如权利要求4所述的移动终端的防盗处理方法,其特征在于,所述防盗处理方法还包括:当解锁失败次数达到第二预设次数且并未达到第一预设次数时,若在预设时长内未检测到操作,则获取当前移动终端的位置信息以及移动终端解锁时拍摄的解锁人的图像信息,并发送至所述防盗账号。
- 如权利要求3所述的移动终端的防盗处理方法,其特征在于,所述当解锁失败次数达到第二预设次数时,进入解锁保护状态,并启动移动终端的前置拍照功能以及定位功能的步骤之后还包括:当移动终端解锁成功时,控制移动终端退出所述解锁保护状态。
- 如权利要求3所述的移动终端的防盗处理方法,其特征在于,所述防盗处理方法还包括:当解锁失败次数达到第二预设次数时,启动所述快捷解锁功能;当解锁失败次数未达到第一预设次数时,若检测到当前触控操作满足进入快捷解锁界面的预设条件时,进入快捷解锁界面,以供用户进行快捷解锁操作。
- 如权利要求1所述的移动终端的防盗处理方法,其特征在于,所述将所述位置信息以及所述图像信息发送至预设的防盗信息接收账号的步骤之后还包括:当接收到基于所述防盗账号发送的确认信息时,退出所述解锁禁止模式。
- 一种移动终端,其特征在于,所述移动终端包括:存储器、处理器及存储在所述存储器上并可在所述处理器上运行的防盗处理程序,所述防盗处理程序被所述处理器执行时实现如权利要求1至8中任一项所述的移动终端的防盗处理方法的步骤。
- 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质上存储有防盗处理程序,所述防盗处理程序被处理器执行时实现如权利要求1至8中任一项所述的移动终端的防盗处理方法的步骤。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2017/105097 WO2019061525A1 (zh) | 2017-09-30 | 2017-09-30 | 移动终端的防盗处理方法、移动终端及可读存储介质 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2017/105097 WO2019061525A1 (zh) | 2017-09-30 | 2017-09-30 | 移动终端的防盗处理方法、移动终端及可读存储介质 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019061525A1 true WO2019061525A1 (zh) | 2019-04-04 |
Family
ID=65902353
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2017/105097 WO2019061525A1 (zh) | 2017-09-30 | 2017-09-30 | 移动终端的防盗处理方法、移动终端及可读存储介质 |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2019061525A1 (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112631496A (zh) * | 2019-09-24 | 2021-04-09 | 深圳市万普拉斯科技有限公司 | 移动终端的控制方法、装置、计算机设备和存储介质 |
WO2023131209A1 (zh) * | 2022-01-10 | 2023-07-13 | 荣耀终端有限公司 | 终端防盗方法及终端设备 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104010088A (zh) * | 2014-06-16 | 2014-08-27 | 中国地质大学(武汉) | 智能手机防盗方法及系统 |
CN205596183U (zh) * | 2016-04-18 | 2016-09-21 | 乐视控股(北京)有限公司 | 一种防盗手机 |
CN106231092A (zh) * | 2016-07-29 | 2016-12-14 | 哈尔滨理工大学 | 一种手机信息安全保护方法 |
CN106470269A (zh) * | 2015-08-20 | 2017-03-01 | 腾讯科技(深圳)有限公司 | 一种手机防盗的方法和装置 |
-
2017
- 2017-09-30 WO PCT/CN2017/105097 patent/WO2019061525A1/zh active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104010088A (zh) * | 2014-06-16 | 2014-08-27 | 中国地质大学(武汉) | 智能手机防盗方法及系统 |
CN106470269A (zh) * | 2015-08-20 | 2017-03-01 | 腾讯科技(深圳)有限公司 | 一种手机防盗的方法和装置 |
CN205596183U (zh) * | 2016-04-18 | 2016-09-21 | 乐视控股(北京)有限公司 | 一种防盗手机 |
CN106231092A (zh) * | 2016-07-29 | 2016-12-14 | 哈尔滨理工大学 | 一种手机信息安全保护方法 |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112631496A (zh) * | 2019-09-24 | 2021-04-09 | 深圳市万普拉斯科技有限公司 | 移动终端的控制方法、装置、计算机设备和存储介质 |
CN112631496B (zh) * | 2019-09-24 | 2022-09-09 | 深圳市万普拉斯科技有限公司 | 移动终端的控制方法、装置、计算机设备和存储介质 |
WO2023131209A1 (zh) * | 2022-01-10 | 2023-07-13 | 荣耀终端有限公司 | 终端防盗方法及终端设备 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2018169273A1 (en) | Method for providing different indicator for image based on shooting mode and electronic device thereof | |
WO2013043004A2 (en) | Apparatus and method for controlling screen rotation in a portable terminal | |
WO2019172641A1 (en) | Electronic device and method for managing electronic key thereof | |
WO2013189231A1 (zh) | 一种基于图片脸部识别进行解锁的方法、系统及电子设备 | |
WO2014073886A1 (en) | Electronic device and method for controlling payment function of input means | |
WO2018009029A1 (en) | Electronic device and operating method thereof | |
WO2017067293A1 (zh) | 一种指纹解锁的方法、装置和终端 | |
WO2017142256A1 (en) | Electronic device for authenticating based on biometric data and operating method thereof | |
WO2020166911A1 (en) | Screen providing method and electronic device supporting same | |
WO2018026142A1 (ko) | 홍채 센서의 동작을 제어하는 방법 및 이를 위한 전자 장치 | |
WO2022050652A1 (en) | Method, apparatus, and computer readable storage medium for controlling account | |
WO2018117409A1 (en) | Operating method for function of iris recognition and electronic device supporting the same | |
WO2018094950A1 (zh) | 无人机及基于无人机的通信方法 | |
WO2019164290A1 (en) | Method of biometric authenticating using plurality of camera with different field of view and electronic apparatus thereof | |
WO2017190450A1 (zh) | 进程关闭方法及装置 | |
WO2019061525A1 (zh) | 移动终端的防盗处理方法、移动终端及可读存储介质 | |
WO2019164281A1 (en) | Electronic device and control method thereof | |
WO2018048217A1 (en) | Electronic apparatus and operating method thereof | |
WO2021080360A1 (en) | Electronic device and method for controlling display operation thereof | |
WO2020091525A1 (ko) | 생체 인증을 이용한 결제 방법 및 그 전자 장치 | |
WO2016006831A1 (ko) | 홍채 인식을 이용한 도어록과 그 시스템 및 그에 사용되는 이동통신단말기와 네트워크 게이트웨이 및 사용자 인증 방법 | |
WO2017036204A1 (zh) | 应用程序切换时的焦点定位方法及装置 | |
WO2021194080A1 (ko) | 전자 장치의 사용자 인증 방식 결정 방법 및 그 전자 장치 | |
WO2019142958A1 (ko) | 전자 기기 및 그 제어방법 | |
WO2019218436A1 (zh) | 车辆驾驶的监控方法、装置、设备及计算机可读存储介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17927333 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 17927333 Country of ref document: EP Kind code of ref document: A1 |