CN107292208B - Anti-theft method and device for mobile terminal - Google Patents

Anti-theft method and device for mobile terminal Download PDF

Info

Publication number
CN107292208B
CN107292208B CN201610224100.1A CN201610224100A CN107292208B CN 107292208 B CN107292208 B CN 107292208B CN 201610224100 A CN201610224100 A CN 201610224100A CN 107292208 B CN107292208 B CN 107292208B
Authority
CN
China
Prior art keywords
mobile terminal
state
mode
information
theft
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610224100.1A
Other languages
Chinese (zh)
Other versions
CN107292208A (en
Inventor
刘长山
郭寰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201610224100.1A priority Critical patent/CN107292208B/en
Priority to PCT/CN2017/076948 priority patent/WO2017177789A1/en
Publication of CN107292208A publication Critical patent/CN107292208A/en
Application granted granted Critical
Publication of CN107292208B publication Critical patent/CN107292208B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Telephone Function (AREA)
  • Burglar Alarm Systems (AREA)
  • Alarm Systems (AREA)

Abstract

The invention provides a mobile terminal anti-theft method and a mobile terminal anti-theft device, wherein the method comprises the following steps: the mobile terminal acquires the state information of the mobile terminal and judges whether the mobile terminal is in a normal use state or not according to the state information; and under the condition that the mobile terminal is judged to be in a normal use state and receives an illegal operation signal, determining that the mobile terminal is in a stolen state and sending alarm information. By adopting the technical scheme, the problem that the alarm cannot be given in time after the mobile terminal is stolen is solved, and the stolen mobile terminal is controlled to send out alarm information in time.

Description

Anti-theft method and device for mobile terminal
Technical Field
The invention relates to the field of communication, in particular to a mobile terminal anti-theft method and a mobile terminal anti-theft device.
Background
The mobile phones are increasingly popularized, the mobile phones are stolen and lost frequently, the total value of the mobile phones lost by Americans in the last year is up to 300 billion dollars, the Philadelphia is a city with the most mobile phones lost by the Americans, 2 mobile phones are lost every year by people, and the place where the mobile phones are lost most easily is a coffee house.
What are the 'hot places' where the mobile phone is lost in China? Statistics from a third party shows that 1, on a bus, when a user gets on the bus, a mobile phone is easy to steal, especially students carrying luggage are used for waiting at a bus station, the students carry luggage with one hand and watch with the mobile phone with the other hand, and the habit of many students is met; 2. at a railway station, people are crowded, and thieves get off the bus; 3. a subway station, a same train station; 4. when a user washes a toilet, the user is most likely to forget to take the mobile phone; 5. the dining room and the public place are easy to lose.
In the related art, the mobile phone is often forced to be powered off or refreshed for the first time after being stolen, and the mobile phone is not sent with enough time to send an alarm and find.
Aiming at the problem that in the related technology, an alarm cannot be given in time after a mobile terminal is stolen, no effective solution is provided at present.
Disclosure of Invention
The invention provides a method and a device for preventing a mobile terminal from being stolen, which at least solve the problem that the alarm cannot be given in time after the mobile terminal is stolen in the related technology.
According to one aspect of the present invention, there is provided a mobile terminal theft prevention method, including:
the mobile terminal acquires the state information of the mobile terminal and judges whether the mobile terminal is in a normal use state or not according to the state information;
and under the condition that the mobile terminal is judged to be in a normal use state and receives an illegal operation signal, determining that the mobile terminal is in a stolen state and sending alarm information.
Further, before the sending the alarm information, the method further includes:
the mobile terminal starts a security verification mode and acquires verification parameters corresponding to the security verification mode;
and when the verification parameters are not verified or the input signals corresponding to the safety verification mode are not received within a preset time period, the mobile terminal sends the alarm information.
Further, the secure authentication mode includes one of:
password mode, fingerprint identification mode, iris identification mode, voice identification mode, facial identification mode.
Further, before determining that the mobile terminal is in a stolen state, the method further comprises:
the method comprises the steps of obtaining geographic position information of the mobile terminal and/or environment information of the mobile terminal, and determining a scene of the mobile terminal according to the geographic position information and/or the environment information, wherein under the condition that the mobile terminal is judged to be in a normal use state and the mobile terminal receives an illegal operation signal, the mobile terminal is determined to be in a stolen state or not by combining a preset scene of the mobile terminal.
Further, the determining whether the mobile terminal is in a normal use state according to the state information includes:
and the mobile terminal judges whether a parameter value used for indicating the state information is larger than a preset threshold value or not and whether the mobile terminal has an unprocessed task or not, wherein under the condition that the parameter value used for indicating the state information is larger than the preset threshold value and the mobile terminal has the unprocessed task, the mobile terminal is determined to be in a normal use state.
Further, the parameter value for indicating the status information includes one of: the electric quantity value of the mobile terminal and the signal intensity value of the mobile terminal.
Further, the illegal operation signal comprises one of:
and a forced shutdown signal, a signal for plugging and unplugging the SIM card of the subscriber identification module, and a battery power supply disconnection signal of the mobile terminal.
Further, the sending the alarm information includes:
starting a vibration mode or a preset ring;
sending the geographical position of the mobile terminal to a pre-designated terminal or an electronic mailbox;
and the mobile terminal takes a picture through the camera and sends the taken picture to a pre-designated terminal or an electronic mailbox.
According to another aspect of the present invention, there is provided an anti-theft device for a mobile terminal, located in the mobile terminal, the device including:
the judging module is used for acquiring the state information of the mobile terminal and judging whether the mobile terminal is in a normal use state or not according to the state information;
and the alarm module is used for determining that the mobile terminal is in a stolen state and sending alarm information under the condition that the mobile terminal is judged to be in a normal use state and receives an illegal operation signal.
Further, the alarm module further comprises:
the starting unit is used for starting a safety verification mode before the alarm information is sent, and acquiring verification parameters corresponding to the safety verification mode;
a sending unit, configured to send the warning information when the verification parameter fails to be verified or when an input signal corresponding to the security verification mode is not received within a predetermined time period.
According to the invention, the mobile terminal acquires the state information of the mobile terminal and judges whether the mobile terminal is in a normal use state or not according to the state information; the technical scheme is adopted, the problem that the mobile terminal cannot alarm in time after being stolen is solved, and the stolen mobile terminal is controlled to send out alarm information in time.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the invention without limiting the invention. In the drawings:
fig. 1 is a flowchart of a mobile terminal theft prevention method according to an embodiment of the present invention;
fig. 2 is a first block diagram of the anti-theft device of the mobile terminal according to the embodiment of the invention;
FIG. 3 is a block diagram of a mobile terminal anti-theft device according to an embodiment of the present invention;
FIG. 4 is a flow chart illustrating a method for preventing theft of a mobile phone according to a preferred embodiment of the present invention;
fig. 5 is a typical scenario diagram of a theft determination process provided in the preferred embodiment of the present invention.
Detailed Description
The invention will be described in detail hereinafter with reference to the accompanying drawings in conjunction with embodiments. It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order.
In this embodiment, a method for preventing theft of a mobile terminal is provided, and fig. 1 is a flowchart of a method for preventing theft of a mobile terminal according to an embodiment of the present invention, as shown in fig. 1, the flowchart includes the following steps:
step S102, the mobile terminal obtains the state information of the mobile terminal, and judges whether the mobile terminal is in a normal use state or not according to the state information;
and step S104, determining that the mobile terminal is in a stolen state and sending alarm information under the condition that the mobile terminal is judged to be in a normal use state and receives an illegal operation signal.
Through the steps, the mobile terminal obtains the state information of the mobile terminal, judges whether the mobile terminal is in a normal use state or not according to the state information, determines that the mobile terminal is in a stolen state and sends alarm information under the condition that the mobile terminal is judged to be in the normal use state and receives an illegal operation signal, solves the problem that the alarm cannot be timely given after the mobile terminal is stolen, and timely controls the stolen mobile terminal to send the alarm information.
In this embodiment, before the alarm information is sent, the mobile terminal starts a security verification mode and acquires a verification parameter corresponding to the security verification mode;
when the verification parameter is not verified or the input signal corresponding to the security verification mode is not received within a preset time period, the mobile terminal sends the alarm information, and the security authentication can be the request of inputting a password, a problem of secret protection and the like.
In this embodiment, the secure authentication mode includes one of: password mode, fingerprint identification mode, iris identification mode, voice identification mode, facial identification mode.
In this embodiment, before determining that the mobile terminal is in a stolen state, acquiring geographic position information of the mobile terminal and/or environment information of the mobile terminal, and determining a scene of the mobile terminal, which is a mall, a subway, or the like, according to the geographic position information and/or the environment information, where, when it is determined that the mobile terminal is in a normal use state and the mobile terminal receives an illegal operation signal, determining whether the mobile terminal is in a stolen state by combining a predetermined scene of the mobile terminal, for example, detecting that the mobile terminal is in a public place such as the mall or the subway, and suddenly receiving a forced shutdown signal by the mobile terminal, the mobile terminal suspects that the mobile terminal is stolen, and then starting a security verification mode, so that the mobile terminal can timely find that the mobile terminal is in the stolen state in a frequent stolen place.
In this embodiment, the determining whether the mobile terminal is in a normal use state according to the state information includes:
the mobile terminal judges whether a parameter value used for indicating the state information is larger than a preset threshold value or not and whether the mobile terminal has an unprocessed task or not, wherein the mobile terminal is determined to be in a normal use state under the condition that the parameter value used for indicating the state information is larger than the preset threshold value and the mobile terminal has the unprocessed task.
In this embodiment, the parameter value for indicating the status information includes one of: the electric quantity value of the mobile terminal and the signal intensity value of the mobile terminal.
In this embodiment, the illegal operation signal includes one of:
and forcing a shutdown signal, plugging and unplugging a subscriber identity module SIM card, and disconnecting a battery power supply of the mobile terminal.
In this embodiment, the sending of the alarm information by the mobile terminal includes: starting a vibration mode or a preset ring; sending the geographical position of the mobile terminal to a pre-designated terminal or an electronic mailbox; the mobile terminal takes a picture through the camera and sends the taken picture to a pre-designated terminal or an electronic mailbox.
In this embodiment, there is also provided a mobile terminal anti-theft device, located in a mobile terminal, for implementing the foregoing embodiments and preferred embodiments, which have been already described and are not described again. As used below, the term "module" may be a combination of software and/or hardware that implements a predetermined function. Although the means described in the embodiments below are preferably implemented in software, an implementation in hardware or a combination of software and hardware is also possible and contemplated.
Fig. 2 is a block diagram showing the structure of an anti-theft device for a mobile terminal according to an embodiment of the present invention, as shown in fig. 2, the device includes:
a determining module 22, configured to obtain state information of the mobile terminal, and determine whether the mobile terminal is in a normal use state according to the state information;
and the alarm module 24 is connected with the judging module 22 and is used for determining that the mobile terminal is in a stolen state and sending alarm information when the mobile terminal is judged to be in a normal use state and receives an illegal operation signal.
Through the above steps, the determining module 22 obtains the state information of the mobile terminal, determines whether the mobile terminal is in a normal use state according to the state information, and the warning module 24 determines that the mobile terminal is in a stolen state and sends warning information when the mobile terminal is determined to be in the normal use state and receives an illegal operation signal. By adopting the technical scheme, the problem that the alarm cannot be given in time after the mobile terminal is stolen is solved, and the stolen mobile terminal is controlled to send out alarm information in time.
Fig. 3 is a block diagram of a second structure of an anti-theft device of a mobile terminal according to an embodiment of the present invention, and as shown in fig. 3, the alarm module 24 further includes:
a starting unit 32, configured to start a security verification mode before the alarm information is sent, and obtain a verification parameter corresponding to the security verification mode;
and a sending unit 34 connected to the starting unit 32, for sending the alarm information when the authentication parameter is not authenticated or when an input signal corresponding to the security authentication mode is not received within a predetermined time period.
It should be noted that, the above modules may be implemented by software or hardware, and for the latter, the following may be implemented, but not limited to: all the modules are positioned in the same processor; or, the modules are respectively located in different processors.
The following detailed description is given in conjunction with the preferred embodiments of the present invention.
The preferred embodiment of the present invention is shown to include a mobile terminal and software and services running on the mobile terminal.
The method of the preferred embodiment mainly comprises two services of theft mode judgment and owner reminding, wherein the theft mode judgment is used for monitoring and judging whether the current equipment has the theft risk or not or whether the use behavior and the mode of the equipment accord with the theft mode or not in the theft process. The owner is reminded and is reported to the police according to the result that the mode of stealing was judged to remind the owner to remind the user to discover unusually the very first time, avoid losing of equipment.
An anti-theft mode is optionally provided on the user device, which is recognized as an on state and can be manually turned on or off by the user. In the on mode, the anti-theft service on the user's device is in an active state and keeps monitoring of the device state.
The anti-theft mode monitors the state of the equipment, including the use environment of the equipment, the position of the equipment and the current state of the equipment, and evaluates whether the equipment is in the possibly stolen state currently according to a judgment rule. When a user is powered off, the anti-theft mode judges whether the identity of the user needs to be verified according to the current risk of theft of the equipment, if the identity of the user needs to be verified, the identity of the owner is verified in the power-off process, and when the identity verification fails, the owner reminding mode is used for alarming and reminding.
The main reminding mode is responsible for alarming and recording when the mobile terminal is in a theft state, and different alarming and reminding modes can be preset, including but not limited to playing an alarm ring, forbidding shutdown, sending a geographical position and the like.
The preferred embodiment of the present invention describes a method of enhancing the theft protection of a mobile device. After the user starts the function, the equipment of the user is in the anti-theft protection state, and the method specifically comprises the following steps:
the first step is as follows: the anti-theft mode is used as a theft risk judgment criterion according to the current state of the equipment, the current scene and the running state of the user;
the second step is that: according to the obtained state, the anti-theft mode matches the theft risk by combining the state of the equipment and the behavior mode of the user to obtain the current theft risk probability and whether to alarm;
the third step: and executing subsequent operation according to the theft risk probability, and giving an alarm according to a preset reminding mode, such as ring alarm, front camera shooting and other modes in the main reminding mode to remind a user that the current equipment has the theft risk.
Fig. 4 is a schematic flow chart of a method for preventing theft of a mobile phone according to a preferred embodiment of the present invention, as shown in fig. 4, the steps are as follows:
step S401, after the anti-theft mode is started, the using environment, the position and the state of the equipment are monitored. The anti-theft mode judges whether the current equipment has the risk of theft or not by detecting the state of the equipment and combining the behavior mode of the user;
step S402, when the equipment is in the theft risk and is forcibly powered off or illegally operated, such as pulling out a sim card, the owner identity verification is carried out in the theft prevention mode, and the owner reminding mode is started to alarm;
and S403, the owner reminding mode reminds the owner of the theft risk according to a preset alarm mode, and reminds and notifies the owner through the playing of the ring, the reporting of the position or other modes.
The immobilizer mode in this embodiment may be managed by a switch, and a user may manually turn on or off the function.
The embodiment provides a method for realizing an anti-theft mode, wherein the device collects and analyzes the state of the device and the behavior mode of a user in a standby state, and intelligently judges whether the device is in the risk of theft.
In step S401, the anti-theft mode will start the state monitoring of the device after being started, and mainly determine the current environment of the device, the usage of the device, and whether there is a task to be processed. The environment judgment of the equipment is helpful for judging whether the current equipment is in an environment which is easy to lose, such as environments of riding, waiting and the like. The detection method can be used for judging through sound monitoring of an external environment by an external component of the equipment, such as a microphone, and meanwhile, the accuracy of environment judgment can be further improved by combining information obtained from other sensors. Such as position and orientation values obtained by a geomagnetic sensor, velocity and height values obtained by a Global Positioning System (GPS for short), and the like.
And the anti-theft mode reads the data information of the local database and forms a state list of the equipment according to the local data value. The anti-theft mode obtains the available electric quantity state of the current equipment through the driving of the bottom layer of the software, judges whether the current equipment has missed calls and short messages through the bottom layer short messages and the call recording interface, and simultaneously can obtain message pushing information through a pushing message database of the system, information such as software and application which are already in a background at present and the like, and the information forms a list for describing the equipment state.
In step S402, the device intelligently determines whether the current operation is legal or not according to the state of the device and the combination of the behavior and the action of the user. The specific judgment is made according to a theft risk table.
The theft risk table sets the state of the equipment and the attribute of the equipment to different weights, the weights can be divided into a plurality of weights according to different state sources and attributes of the equipment, each weight is set to different values according to rules, for example, when the electric quantity of the equipment is more than 90%, the starting time of the equipment is less than 24 hours, the health weight of the equipment can be set to 1, and the states of other equipment are set by the same rules. The device weight includes a health status of the device, a task status of the device, and an attribute status of the device. The health state includes information reflecting the health state of the device, such as the starting time of the device, the electric quantity of the device, the standby time of the device, and the like. The task state of the device comprises unprocessed calls, short messages, unread notification messages and the like of the device. The attribute state of the equipment comprises the current position of the equipment, the placing direction of the equipment, the current geographical position of the equipment and external environments, such as different environments of subways, buses or shopping malls and the like.
The anti-theft mode is monitored according to the state of the equipment and the operation mode of the user. User actions and behaviors include forced shutdown, plugging and unplugging cards, or unlocking the screen. The determination of the theft state is a logical determination process of the device state and the user behavior. For example, after the device is in standby for a long time, the current state of the device is that a missed call is to be processed, and if the device receives a forced power-off command at the moment, the anti-theft mode can judge that the operation of the device does not conform to normal operation logic according to the state and behavior. At this time, the anti-theft mode judges that the current equipment is in the theft process according to the theft mode, and can forcedly verify the identity of the user, for example, when the user is forcedly powered off, the user is required to perform identity verification. After the identity authentication is passed, the subsequent process can be executed, and when the user does not pass the identity authentication, the main reminding mode is directly started to give an alarm.
It should be noted that the stolen mode may adopt a local mode or a local and cloud combined mode to improve the accuracy of theft risk identification.
In the step S403, the owner reminding mode mainly reminds and alarms the owner according to the judgment result of the theft-proof mode on the current device status. The main reminding mode can predefine the reminding mode and strategy, and the main functions of alarming and recording are realized. The alarm function may inform the user of the current risk by means of a ring tone, vibration, etc. to draw the attention of the user. The recording function records the current coordinate position of the device and information of the user of the device, and may be stored locally or sent to a predefined location of the user in a wireless or other manner, such as a mailbox, an emergency contact number or a cloud disk, for future tracing.
Preferred embodiment of the stolen state judgment method of the present invention
A specific example is described below as to how the terminal identifies the risk of device loss and determines the risk according to the state of the device when the anti-theft mode is activated, taking the determination of the theft process during the bus riding as an example, and fig. 5 is a typical scene diagram of the theft determination process provided by the preferred embodiment of the present invention, as shown in fig. 5. First, the user's device has an anti-theft mode in the enabled state, which is responsible for periodically detecting the state of the device and assessing the theft risk and state of the device. Secondly, the anti-theft mode judges that the current equipment is in a vehicle or an external use environment by monitoring the surrounding sound of the environment.
Meanwhile, the anti-theft mode checks the current state of the device, including information such as the battery capacity, network and standby time of the device, and judges whether the current device is in a normal use state. If the battery power is in a normal level and the device has a missed call or short message, the device can be considered to be in normal use. Otherwise, when the electric quantity of the equipment is in a lower level, the user does not have a service to be processed, and if the user does not answer the phone call or does not check the short message, the equipment is judged to be in an abnormal state;
when a user picks up the equipment and tries to forcibly shut down the equipment, the anti-theft mode judges whether the current equipment has the risk of being stolen or not according to the current behavior mode characteristics, and takes the next anti-theft measure. When the user is in the external use environment, the device of the user is in the normal use state at this time, and the use state of the device is changed from the standby state to the forced power-off state, which indicates that the state of the device is abnormal at this time, and the risk of theft exists. At the moment, the anti-theft mode starts the identity verification of the owner according to the set rule. On the contrary, when the user is in the normal use process, if the use state of the device is changed from the normal use state to the shutdown state at this time, it indicates that the device is in the normal use at this time, the identity and the safety authentication are not required, and the device executes the normal process. In this example, the user may be required to enter an identity code or other biometric verification, such as a fingerprint or iris, before the device is turned off. When the user refuses the verification or the verification fails, the user can judge that the equipment is in high risk of theft at the moment, and the anti-theft mode starts the main reminding mode to alarm and inform.
After the anti-theft mode identifies the risk, the geographical coordinates of the recording device and the forced photograph may be recorded simultaneously, and after the current environment and location are recorded, the anti-theft mode may perform step S403.
After the owner reminding mode finishes the step S403, it indicates that the device is in the stolen dedication, the owner reminding mode reminds the owner of the stolen risk according to the preset reminding mode, the reminding mode may be a preset mode or defined by the user, and the reminding means includes vibration, sound, etc., and the collection and report of the device information, including but not limited to GPS coordinates, and the taking of the device, etc.
Preferred embodiments of the invention with respect to application scenarios
When the user starts the anti-theft function, the user is stolen while riding a bus or walking, when a person who implements the theft tries to forcibly turn off the terminal, the identity of the owner needs to be verified, and if the identity is not verified or the identity is not verified, the device alarms and records. Compared with simple equipment shutdown authentication, the method is more intelligent, and complex authentication for actual use of the user can not be caused. The method can be used for preventing the smart phone from being stolen, and the user can obtain the alarm of the equipment at the first time when the equipment is lost without wearing other software or hardware, so that the loss of the user is reduced.
Through the above description of the embodiments, those skilled in the art can clearly understand that the method according to the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but the former is a better implementation mode in many cases. Based on such understanding, the technical solutions of the present invention or portions thereof contributing to the prior art may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (which may be a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present invention.
The embodiment of the invention also provides a storage medium. Alternatively, in the present embodiment, the storage medium may be configured to store program codes for performing the following steps:
s1, a mobile terminal acquires state information of the mobile terminal and judges whether the mobile terminal is in a normal use state or not according to the state information;
s2, under the condition that the mobile terminal is judged to be in a normal use state and receives an illegal operation signal, the mobile terminal is determined to be in a stolen state, and the mobile terminal sends alarm information.
Optionally, the storage medium is further configured to store program code for performing the above steps:
optionally, in this embodiment, the storage medium may include, but is not limited to: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
Optionally, in this embodiment, the processor executes the method steps described in the above embodiments according to the program code stored in the storage medium.
Optionally, the specific examples in this embodiment may refer to the examples described in the above embodiments and optional implementation manners, and this embodiment is not described herein again.
It will be apparent to those skilled in the art that the modules or steps of the present invention described above may be implemented by a general purpose computing device, they may be centralized on a single computing device or distributed across a network of multiple computing devices, and alternatively, they may be implemented by program code executable by a computing device, such that they may be stored in a storage device and executed by a computing device, and in some cases, the steps shown or described may be performed in an order different than that described herein, or they may be separately fabricated into individual integrated circuit modules, or multiple ones of them may be fabricated into a single integrated circuit module. Thus, the present invention is not limited to any specific combination of hardware and software.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (9)

1. A mobile terminal anti-theft method is characterized by comprising the following steps:
the mobile terminal acquires the state information of the mobile terminal and judges whether the mobile terminal is in a normal use state or not according to the state information;
under the condition that the mobile terminal is judged to be in a normal use state and receives an illegal operation signal, determining that the mobile terminal is in a stolen state and sending alarm information;
wherein, the judging whether the mobile terminal is in a normal use state according to the state information comprises:
and the mobile terminal judges whether a parameter value used for indicating the state information is larger than a preset threshold value or not and whether the mobile terminal has an unprocessed task or not, wherein under the condition that the parameter value used for indicating the state information is larger than the preset threshold value and the mobile terminal has the unprocessed task, the mobile terminal is determined to be in a normal use state.
2. The method of claim 1, wherein prior to the sending the alert message, the method further comprises:
the mobile terminal starts a security verification mode and acquires verification parameters corresponding to the security verification mode;
and when the verification parameters are not verified or the input signals corresponding to the safety verification mode are not received within a preset time period, the mobile terminal sends the alarm information.
3. The method of claim 2, wherein the secure authentication mode comprises one of:
password mode, fingerprint identification mode, iris identification mode, voice identification mode, facial identification mode.
4. The method of claim 1, wherein prior to determining that the mobile terminal is in a stolen state, the method further comprises:
acquiring geographical position information of the mobile terminal and/or environment information of the mobile terminal, and determining a scene of the mobile terminal according to the geographical position information and/or the environment information, wherein under the condition that the mobile terminal is judged to be in a normal use state and the mobile terminal receives an illegal operation signal, the mobile terminal is determined to be in a stolen state or not by combining a preset scene of the mobile terminal.
5. The method of claim 1, wherein the parameter value for indicating the status information comprises one of: the electric quantity value of the mobile terminal and the signal intensity value of the mobile terminal.
6. The method of claim 1, wherein the illegal operation signal comprises one of:
and a forced shutdown signal, a signal for plugging and unplugging the SIM card of the subscriber identification module, and a battery power supply disconnection signal of the mobile terminal.
7. The method according to any one of claims 1 to 6, wherein the sending the alarm information comprises:
starting a vibration mode or a preset ring;
sending the geographical position of the mobile terminal to a pre-designated terminal or an electronic mailbox;
and the mobile terminal takes a picture through the camera and sends the taken picture to a pre-designated terminal or an electronic mailbox.
8. An anti-theft device for a mobile terminal, located in the mobile terminal, the device comprising:
the judging module is used for acquiring the state information of the mobile terminal and judging whether the mobile terminal is in a normal use state or not according to the state information;
the alarm module is used for determining that the mobile terminal is in a stolen state and sending alarm information under the condition that the mobile terminal is judged to be in a normal use state and receives an illegal operation signal;
the device is further configured to determine whether a parameter value used for indicating the state information is greater than a preset threshold and whether the mobile terminal has an unprocessed task, where it is determined that the mobile terminal is in a normal use state under the condition that the parameter value used for indicating the state information is greater than the preset threshold and the mobile terminal has the unprocessed task.
9. The apparatus of claim 8, wherein the alert module further comprises:
the starting unit is used for starting a safety verification mode before the alarm information is sent, and acquiring verification parameters corresponding to the safety verification mode;
a sending unit, configured to send the warning information when the verification parameter fails to be verified, or when an input signal corresponding to the security verification mode is not received within a predetermined time period.
CN201610224100.1A 2016-04-11 2016-04-11 Anti-theft method and device for mobile terminal Active CN107292208B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610224100.1A CN107292208B (en) 2016-04-11 2016-04-11 Anti-theft method and device for mobile terminal
PCT/CN2017/076948 WO2017177789A1 (en) 2016-04-11 2017-03-16 Anti-theft method and device for mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610224100.1A CN107292208B (en) 2016-04-11 2016-04-11 Anti-theft method and device for mobile terminal

Publications (2)

Publication Number Publication Date
CN107292208A CN107292208A (en) 2017-10-24
CN107292208B true CN107292208B (en) 2022-12-20

Family

ID=60041405

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610224100.1A Active CN107292208B (en) 2016-04-11 2016-04-11 Anti-theft method and device for mobile terminal

Country Status (2)

Country Link
CN (1) CN107292208B (en)
WO (1) WO2017177789A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108509778A (en) * 2018-02-07 2018-09-07 平安普惠企业管理有限公司 End message guard method, device, computer equipment and storage medium
CN109151197B (en) * 2018-08-22 2021-04-20 奇酷互联网络科技(深圳)有限公司 Anti-theft method based on public camera, electronic equipment and storage device
CN109190422A (en) * 2018-08-29 2019-01-11 奇酷互联网络科技(深圳)有限公司 Terminal anti-theft method, terminal and the device with store function
CN109544304B (en) * 2018-11-29 2021-02-05 每日互动股份有限公司 Method for carrying out early warning according to mobile terminal information

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003061151A (en) * 2001-08-15 2003-02-28 Sony Corp Method for protecting data recorded in mobile terminal, mobile terminal data protection system and mobile terminal
CN101005686A (en) * 2007-01-08 2007-07-25 北京天碁科技有限公司 Abnormal state processing method for mobile terminal and mobile terminal
CN101005663A (en) * 2006-11-15 2007-07-25 深圳凯虹移动通信有限公司 Mobile terminal with lost tracking function and lost tracking method of mobile terminal
CN101212730A (en) * 2006-12-29 2008-07-02 康佳集团股份有限公司 Anti-theft and anti-losing method and system for mobile terminal
CN103037310A (en) * 2012-12-14 2013-04-10 北京网秦天下科技有限公司 Mobile terminal intelligent anti-theft method and mobile terminal

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040203564A1 (en) * 2002-08-26 2004-10-14 Chi-Chang Ho Motorcycle communication and burglary-prevention system
CN1859670A (en) * 2005-09-21 2006-11-08 华为技术有限公司 Mobile terminal with anti-theft function and anti-theft method for mobile terminal
CN101616495A (en) * 2008-06-23 2009-12-30 网秦无限(北京)科技有限公司 The method and system of individual privacy in the protection mobile phone
CN101969493A (en) * 2010-10-28 2011-02-09 深圳市五巨科技有限公司 Anti-theft method and device for mobile terminal
CN103024164B (en) * 2012-12-03 2015-02-18 北京百度网讯科技有限公司 Anti-theft method and device of mobile terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003061151A (en) * 2001-08-15 2003-02-28 Sony Corp Method for protecting data recorded in mobile terminal, mobile terminal data protection system and mobile terminal
CN101005663A (en) * 2006-11-15 2007-07-25 深圳凯虹移动通信有限公司 Mobile terminal with lost tracking function and lost tracking method of mobile terminal
CN101212730A (en) * 2006-12-29 2008-07-02 康佳集团股份有限公司 Anti-theft and anti-losing method and system for mobile terminal
CN101005686A (en) * 2007-01-08 2007-07-25 北京天碁科技有限公司 Abnormal state processing method for mobile terminal and mobile terminal
CN103037310A (en) * 2012-12-14 2013-04-10 北京网秦天下科技有限公司 Mobile terminal intelligent anti-theft method and mobile terminal

Also Published As

Publication number Publication date
CN107292208A (en) 2017-10-24
WO2017177789A1 (en) 2017-10-19

Similar Documents

Publication Publication Date Title
US10657238B2 (en) Systems and methods for identifying unauthorized users of an electronic device
ES2658314T3 (en) Apparatus and procedures for locating, tracking and / or retrieving a wireless communication device
US10515203B2 (en) Method and system for improving security of a mobile terminal
US8583082B2 (en) System and method for tracking stolen communication terminal, and communication terminal
CN107292208B (en) Anti-theft method and device for mobile terminal
US20100273452A1 (en) Apparatus and Methods For Locating Tracking and/or Recovering a Wireless Communication Device
CN110049490B (en) Safety protection method and device for wearable equipment, wearable equipment and medium
US10824706B2 (en) Portable electronic device for authenticating user and system and method associated therewith
CN104994224A (en) Antitheft method and device for mobile terminal
CN105376711A (en) Position prompting method and apparatus of wearable device, and wearable device
CN110290270B (en) Anti-theft method and mobile terminal
JP2004112448A (en) Mobile terminal unit
CN201540618U (en) Anti-theft alarm device
CN108024018B (en) Anti-theft and anti-loss mobile phone system, identity recognition firmware and application thereof
WO2017111962A1 (en) System and method for securing electronic device during low power and following hardware change
CN116225235B (en) Data processing method, device, equipment and medium
CN202488722U (en) Information storage device and mobile terminal component
CN114268907A (en) Mobile terminal loss tracking method and device, mobile terminal and medium
CN105516914A (en) Location processing method and location processing device
CN109194837A (en) A kind of mobile phone safety protection method, device and terminal device
Zhao et al. MMSnap: An MMS based forensic system for recovering stolen phones
JP2003304580A (en) Communication terminal
JP2001312702A (en) Method and system for automatically reporting loss of card

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant