CN103384289A - Method for preventing mobile phone from being stolen - Google Patents

Method for preventing mobile phone from being stolen Download PDF

Info

Publication number
CN103384289A
CN103384289A CN2012101365437A CN201210136543A CN103384289A CN 103384289 A CN103384289 A CN 103384289A CN 2012101365437 A CN2012101365437 A CN 2012101365437A CN 201210136543 A CN201210136543 A CN 201210136543A CN 103384289 A CN103384289 A CN 103384289A
Authority
CN
China
Prior art keywords
password
mobile phone
stolen
verified
prevents hand
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012101365437A
Other languages
Chinese (zh)
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Jingyan Electronic Technology Co Ltd
Original Assignee
Shanghai Jingyan Electronic Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Jingyan Electronic Technology Co Ltd filed Critical Shanghai Jingyan Electronic Technology Co Ltd
Priority to CN2012101365437A priority Critical patent/CN103384289A/en
Publication of CN103384289A publication Critical patent/CN103384289A/en
Pending legal-status Critical Current

Links

Landscapes

  • Telephone Function (AREA)

Abstract

The invention discloses a method for preventing a mobile phone from being stolen. The method for preventing the mobile phone from being stolen comprises the steps of (1) setting a password, (2) inputting a password through external operation and verifying the input password, and (3) executing corresponding operation according to a password verifying result. The method for preventing the mobile phone from being stolen has the advantages that the mobile phone can be effectively prevented from being stolen and the retrieving rate of the mobile phone can be improved due to the fact that an encryption method is used for verification, the safety of the mobile phone is guaranteed, and convenience is brought to users.

Description

Prevent the method for hand-set from stolen
Technical field
The present invention relates to electronic communication field, especially the mobile phone mobile phone.
Background technology
Along with developing rapidly of electronic technology, mobile phone has become the equipment that people must carry, powerful along with handset capability and function, people with a large amount of data storage mobile phone as, as address book, picture, the document information such as Email even, if mobile phone is lost, these data will be revealed, and this user brings great loss and trouble.So just the security performance of mobile phone is had higher requirement.
Summary of the invention
The purpose of this invention is to provide a kind of method that prevents hand-set from stolen.
A kind of method that prevents hand-set from stolen comprises:
The step of step 1) setting code;
Step 2) peripheral operation input password and step that password is verified;
Step 3) is according to the password authentification step of executable operations as a result.
The method that prevents hand-set from stolen provided by the invention utilizes the mode of encrypting to verify, can prevent effectively that hand-set from stolen from also can improve the rate of giving for change of mobile phone, guarantees the fail safe of mobile phone, for the user facilitates.
Description of drawings
Fig. 1 is the schematic flow sheet that prevents the method for hand-set from stolen provided by the present invention.
Embodiment
For the purpose, technical scheme and the advantage that make the embodiment of the present invention clearer, below in conjunction with the accompanying drawing in the embodiment of the present invention, technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment in the present invention, those of ordinary skills belong to the scope of protection of the invention not making the every other embodiment that obtains under the creative work prerequisite.
As shown in Figure 1, a kind of method that prevents hand-set from stolen comprises:
The step of step 1) setting code;
Step 2) peripheral operation input password and step that password is verified;
Step 3) is according to the password authentification step of executable operations as a result.
Mobile phone can be verified its identity by allowing the user input password like this, judges whether this operator has the right of using and accessing hand-set data, thereby guarantees the fail safe of mobile phone; As hand-set from stolen, the thief does not also know the password that mobile phone is set, and can't access, and this mobile phone can't use also just can not reach the purpose that the thief steals mobile phone, prevents hand-set from stolen with this.
Further, the step of described setting code comprises:
Step 11) is inputted password by external command;
Step 12) is carried out signal with password and is processed and store;
It will be understood by those skilled in the art that described step 11) inputs password by external command, can be to utilize mobile phone key input password, can be also to utilize touch-screen input password;
Further, step 2) peripheral operation is inputted password and to the step that password is verified, comprising:
Step 21) peripheral operation person inputs password;
Step 22) mobile phone reads the predefined password of storage and compares with the password of current input, when both likelihood is greater than or equal to the similarity threshold of setting, is verified; When both likelihood during less than the similarity threshold set, authentication failed.
Further, step 3) comprises according to the password authentification step of executable operations as a result:
When being verified, carry out the operation that starts mobile phone and enter standby interface; When authentication failed, carry out the step of alarm operation;
Further, the step of described alarm operation refers to send SMS message to default number by the mobile phone radio frequency module.This number just can be received the information of hand-set from stolen like this, improves the probability that finds mobile phone.
Further, the step of described step 1) setting code comprises: the information in the mobile phone reading SIM card, and the automatic acquisition password is also preserved;
Described step 2) peripheral operation is inputted password and the step that password is verified is comprised: the information in the mobile phone reading SIM card, read the information of current SIM card, automatically obtain current SIM card password and with step 1) in the password preserved compare, when both likelihood is greater than or equal to the similarity threshold of setting, be verified; When both likelihood during less than the similarity threshold set, authentication failed.Like this, the user just needn't manually input password and set, and directly the method by binding SIM card and mobile phone is encrypted, and improves the fail safe of mobile phone.
It should be noted that at last: above embodiment only in order to technical scheme of the present invention to be described, is not intended to limit; Although with reference to previous embodiment, the present invention is had been described in detail, those of ordinary skill in the art is to be understood that: it still can be modified to the technical scheme that aforementioned each embodiment puts down in writing, and perhaps part technical characterictic wherein is equal to replacement; And these modifications or replacement do not make the essence of appropriate technical solution break away from the spirit and scope of various embodiments of the present invention technical scheme.

Claims (8)

1. a method that prevents hand-set from stolen, is characterized in that, comprising:
The step of step 1) setting code;
Step 2) peripheral operation input password and step that password is verified;
Step 3) is according to the password authentification step of executable operations as a result.
2. the method that prevents hand-set from stolen as claimed in claim 1, is characterized in that, the step of described step 1) setting code,
Comprise:
Step 11) is inputted password by external command;
Step 12) is carried out signal with password and is processed and store.
3. the method that prevents hand-set from stolen as claimed in claim 2, is characterized in that, described step 11) is utilized mobile phone key input password.
4. the method that prevents hand-set from stolen as claimed in claim 2, is characterized in that, described step 11) is utilized touch-screen input password.
5. the method that prevents hand-set from stolen as described in any one in claim 1 to 4, is characterized in that step 2) peripheral operation input password and to the step that password is verified, comprising:
Step 21) peripheral operation person inputs password;
Step 22) mobile phone reads the predefined password of storage and compares with the password of current input, when both likelihood is greater than or equal to the similarity threshold of setting, is verified; When both likelihood during less than the similarity threshold set, authentication failed.
6. the method that prevents hand-set from stolen as claimed in claim 5, is characterized in that, step 3) comprises according to the password authentification step of executable operations as a result:
When being verified, carry out the operation that starts mobile phone and enter standby interface; When authentication failed, carry out the step of alarm operation.
7. the method that prevents hand-set from stolen as claimed in claim 6, is characterized in that, the step of described alarm operation refers to send SMS message to default number by the mobile phone radio frequency module.
8. the method that prevents hand-set from stolen as claimed in claim 5 is characterized in that:
The step of described step 1) setting code comprises: the information in the mobile phone reading SIM card, and the automatic acquisition password is also preserved;
Described step 2) peripheral operation is inputted password and the step that password is verified is comprised: the information in the mobile phone reading SIM card, read the information of current SIM card, automatically obtain current SIM card password and with step 1) in the password preserved compare, when both likelihood is greater than or equal to the similarity threshold of setting, be verified; When both likelihood during less than the similarity threshold set, authentication failed.
CN2012101365437A 2012-05-06 2012-05-06 Method for preventing mobile phone from being stolen Pending CN103384289A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012101365437A CN103384289A (en) 2012-05-06 2012-05-06 Method for preventing mobile phone from being stolen

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012101365437A CN103384289A (en) 2012-05-06 2012-05-06 Method for preventing mobile phone from being stolen

Publications (1)

Publication Number Publication Date
CN103384289A true CN103384289A (en) 2013-11-06

Family

ID=49491980

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012101365437A Pending CN103384289A (en) 2012-05-06 2012-05-06 Method for preventing mobile phone from being stolen

Country Status (1)

Country Link
CN (1) CN103384289A (en)

Similar Documents

Publication Publication Date Title
US20090298468A1 (en) System and method for deleting data in a communication device
EP2905715B1 (en) Method, system and terminal for encrypting/decrypting application program on communication terminal
CN103366107A (en) Method, device and mobile phone for protecting access permission of application program
EP2835997B1 (en) Cell phone data encryption method and decryption method
CN105530356A (en) Mobile communication terminal and data protection method and apparatus thereof
CN104573551A (en) File processing method and mobile terminal
CN104954534B (en) Control method, device and the corresponding communication terminal of communication terminal
US8706158B2 (en) Mobile phone for authenticating SIM card and method thereof
CN103034417A (en) Unlocking method for touch screen and terminal equipment
CN104363589A (en) Identity authentication method, device and terminal
CN103632081A (en) Encrypted storage device and authentication system and authentication method thereof
US9426647B2 (en) Method and device for protecting privacy data of mobile terminal user
CN102521169B (en) Confidential USB (universal serial bus) memory disk with display screen and security control method of confidential USB memory disk
CN101296231A (en) Data card operation method and data card
US9542547B2 (en) Identification to access portable computing device
WO2011130970A1 (en) Device and method for protecting data of mobile terminal
CN105516136A (en) Authority management method, device and system
CN210627203U (en) UICC device with safe storage function
CN104423928A (en) Data processing method, data processing device and terminal equipment
WO2015186072A1 (en) Encryption and decryption of data between a communications device and smart card with near field communication function
CN103379478A (en) Control method, control system, client terminal and server
CN102244860A (en) Method, system and server for preventing communication information of mobile terminal from being monitored
CN202014304U (en) Mobile phone privacy protection system based on code authentication
US20140141819A1 (en) Mobile phone with inbuilt protection for user information and method thereof
CN103530580A (en) Terminal SD card security management method, device and terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20131106