CN103384289A - Method for preventing mobile phone from being stolen - Google Patents
Method for preventing mobile phone from being stolen Download PDFInfo
- Publication number
- CN103384289A CN103384289A CN2012101365437A CN201210136543A CN103384289A CN 103384289 A CN103384289 A CN 103384289A CN 2012101365437 A CN2012101365437 A CN 2012101365437A CN 201210136543 A CN201210136543 A CN 201210136543A CN 103384289 A CN103384289 A CN 103384289A
- Authority
- CN
- China
- Prior art keywords
- password
- mobile phone
- stolen
- verified
- prevents hand
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Telephone Function (AREA)
Abstract
The invention discloses a method for preventing a mobile phone from being stolen. The method for preventing the mobile phone from being stolen comprises the steps of (1) setting a password, (2) inputting a password through external operation and verifying the input password, and (3) executing corresponding operation according to a password verifying result. The method for preventing the mobile phone from being stolen has the advantages that the mobile phone can be effectively prevented from being stolen and the retrieving rate of the mobile phone can be improved due to the fact that an encryption method is used for verification, the safety of the mobile phone is guaranteed, and convenience is brought to users.
Description
Technical field
The present invention relates to electronic communication field, especially the mobile phone mobile phone.
Background technology
Along with developing rapidly of electronic technology, mobile phone has become the equipment that people must carry, powerful along with handset capability and function, people with a large amount of data storage mobile phone as, as address book, picture, the document information such as Email even, if mobile phone is lost, these data will be revealed, and this user brings great loss and trouble.So just the security performance of mobile phone is had higher requirement.
Summary of the invention
The purpose of this invention is to provide a kind of method that prevents hand-set from stolen.
A kind of method that prevents hand-set from stolen comprises:
The step of step 1) setting code;
Step 2) peripheral operation input password and step that password is verified;
Step 3) is according to the password authentification step of executable operations as a result.
The method that prevents hand-set from stolen provided by the invention utilizes the mode of encrypting to verify, can prevent effectively that hand-set from stolen from also can improve the rate of giving for change of mobile phone, guarantees the fail safe of mobile phone, for the user facilitates.
Description of drawings
Fig. 1 is the schematic flow sheet that prevents the method for hand-set from stolen provided by the present invention.
Embodiment
For the purpose, technical scheme and the advantage that make the embodiment of the present invention clearer, below in conjunction with the accompanying drawing in the embodiment of the present invention, technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment in the present invention, those of ordinary skills belong to the scope of protection of the invention not making the every other embodiment that obtains under the creative work prerequisite.
As shown in Figure 1, a kind of method that prevents hand-set from stolen comprises:
The step of step 1) setting code;
Step 2) peripheral operation input password and step that password is verified;
Step 3) is according to the password authentification step of executable operations as a result.
Mobile phone can be verified its identity by allowing the user input password like this, judges whether this operator has the right of using and accessing hand-set data, thereby guarantees the fail safe of mobile phone; As hand-set from stolen, the thief does not also know the password that mobile phone is set, and can't access, and this mobile phone can't use also just can not reach the purpose that the thief steals mobile phone, prevents hand-set from stolen with this.
Further, the step of described setting code comprises:
Step 11) is inputted password by external command;
Step 12) is carried out signal with password and is processed and store;
It will be understood by those skilled in the art that described step 11) inputs password by external command, can be to utilize mobile phone key input password, can be also to utilize touch-screen input password;
Further, step 2) peripheral operation is inputted password and to the step that password is verified, comprising:
Step 21) peripheral operation person inputs password;
Step 22) mobile phone reads the predefined password of storage and compares with the password of current input, when both likelihood is greater than or equal to the similarity threshold of setting, is verified; When both likelihood during less than the similarity threshold set, authentication failed.
Further, step 3) comprises according to the password authentification step of executable operations as a result:
When being verified, carry out the operation that starts mobile phone and enter standby interface; When authentication failed, carry out the step of alarm operation;
Further, the step of described alarm operation refers to send SMS message to default number by the mobile phone radio frequency module.This number just can be received the information of hand-set from stolen like this, improves the probability that finds mobile phone.
Further, the step of described step 1) setting code comprises: the information in the mobile phone reading SIM card, and the automatic acquisition password is also preserved;
Described step 2) peripheral operation is inputted password and the step that password is verified is comprised: the information in the mobile phone reading SIM card, read the information of current SIM card, automatically obtain current SIM card password and with step 1) in the password preserved compare, when both likelihood is greater than or equal to the similarity threshold of setting, be verified; When both likelihood during less than the similarity threshold set, authentication failed.Like this, the user just needn't manually input password and set, and directly the method by binding SIM card and mobile phone is encrypted, and improves the fail safe of mobile phone.
It should be noted that at last: above embodiment only in order to technical scheme of the present invention to be described, is not intended to limit; Although with reference to previous embodiment, the present invention is had been described in detail, those of ordinary skill in the art is to be understood that: it still can be modified to the technical scheme that aforementioned each embodiment puts down in writing, and perhaps part technical characterictic wherein is equal to replacement; And these modifications or replacement do not make the essence of appropriate technical solution break away from the spirit and scope of various embodiments of the present invention technical scheme.
Claims (8)
1. a method that prevents hand-set from stolen, is characterized in that, comprising:
The step of step 1) setting code;
Step 2) peripheral operation input password and step that password is verified;
Step 3) is according to the password authentification step of executable operations as a result.
2. the method that prevents hand-set from stolen as claimed in claim 1, is characterized in that, the step of described step 1) setting code,
Comprise:
Step 11) is inputted password by external command;
Step 12) is carried out signal with password and is processed and store.
3. the method that prevents hand-set from stolen as claimed in claim 2, is characterized in that, described step 11) is utilized mobile phone key input password.
4. the method that prevents hand-set from stolen as claimed in claim 2, is characterized in that, described step 11) is utilized touch-screen input password.
5. the method that prevents hand-set from stolen as described in any one in claim 1 to 4, is characterized in that step 2) peripheral operation input password and to the step that password is verified, comprising:
Step 21) peripheral operation person inputs password;
Step 22) mobile phone reads the predefined password of storage and compares with the password of current input, when both likelihood is greater than or equal to the similarity threshold of setting, is verified; When both likelihood during less than the similarity threshold set, authentication failed.
6. the method that prevents hand-set from stolen as claimed in claim 5, is characterized in that, step 3) comprises according to the password authentification step of executable operations as a result:
When being verified, carry out the operation that starts mobile phone and enter standby interface; When authentication failed, carry out the step of alarm operation.
7. the method that prevents hand-set from stolen as claimed in claim 6, is characterized in that, the step of described alarm operation refers to send SMS message to default number by the mobile phone radio frequency module.
8. the method that prevents hand-set from stolen as claimed in claim 5 is characterized in that:
The step of described step 1) setting code comprises: the information in the mobile phone reading SIM card, and the automatic acquisition password is also preserved;
Described step 2) peripheral operation is inputted password and the step that password is verified is comprised: the information in the mobile phone reading SIM card, read the information of current SIM card, automatically obtain current SIM card password and with step 1) in the password preserved compare, when both likelihood is greater than or equal to the similarity threshold of setting, be verified; When both likelihood during less than the similarity threshold set, authentication failed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012101365437A CN103384289A (en) | 2012-05-06 | 2012-05-06 | Method for preventing mobile phone from being stolen |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012101365437A CN103384289A (en) | 2012-05-06 | 2012-05-06 | Method for preventing mobile phone from being stolen |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103384289A true CN103384289A (en) | 2013-11-06 |
Family
ID=49491980
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2012101365437A Pending CN103384289A (en) | 2012-05-06 | 2012-05-06 | Method for preventing mobile phone from being stolen |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103384289A (en) |
-
2012
- 2012-05-06 CN CN2012101365437A patent/CN103384289A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20090298468A1 (en) | System and method for deleting data in a communication device | |
EP2905715B1 (en) | Method, system and terminal for encrypting/decrypting application program on communication terminal | |
CN103366107A (en) | Method, device and mobile phone for protecting access permission of application program | |
EP2835997B1 (en) | Cell phone data encryption method and decryption method | |
CN105530356A (en) | Mobile communication terminal and data protection method and apparatus thereof | |
CN104573551A (en) | File processing method and mobile terminal | |
CN104954534B (en) | Control method, device and the corresponding communication terminal of communication terminal | |
US8706158B2 (en) | Mobile phone for authenticating SIM card and method thereof | |
CN103034417A (en) | Unlocking method for touch screen and terminal equipment | |
CN104363589A (en) | Identity authentication method, device and terminal | |
CN103632081A (en) | Encrypted storage device and authentication system and authentication method thereof | |
US9426647B2 (en) | Method and device for protecting privacy data of mobile terminal user | |
CN102521169B (en) | Confidential USB (universal serial bus) memory disk with display screen and security control method of confidential USB memory disk | |
CN101296231A (en) | Data card operation method and data card | |
US9542547B2 (en) | Identification to access portable computing device | |
WO2011130970A1 (en) | Device and method for protecting data of mobile terminal | |
CN105516136A (en) | Authority management method, device and system | |
CN210627203U (en) | UICC device with safe storage function | |
CN104423928A (en) | Data processing method, data processing device and terminal equipment | |
WO2015186072A1 (en) | Encryption and decryption of data between a communications device and smart card with near field communication function | |
CN103379478A (en) | Control method, control system, client terminal and server | |
CN102244860A (en) | Method, system and server for preventing communication information of mobile terminal from being monitored | |
CN202014304U (en) | Mobile phone privacy protection system based on code authentication | |
US20140141819A1 (en) | Mobile phone with inbuilt protection for user information and method thereof | |
CN103530580A (en) | Terminal SD card security management method, device and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20131106 |