CN108241809A - A kind of method for preventing from carrying out mobile terminal in illegal brush machine - Google Patents

A kind of method for preventing from carrying out mobile terminal in illegal brush machine Download PDF

Info

Publication number
CN108241809A
CN108241809A CN201711499369.1A CN201711499369A CN108241809A CN 108241809 A CN108241809 A CN 108241809A CN 201711499369 A CN201711499369 A CN 201711499369A CN 108241809 A CN108241809 A CN 108241809A
Authority
CN
China
Prior art keywords
mobile terminal
write
theft module
operation data
chip
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711499369.1A
Other languages
Chinese (zh)
Inventor
申子涵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201711499369.1A priority Critical patent/CN108241809A/en
Publication of CN108241809A publication Critical patent/CN108241809A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

The present invention provides a kind of theft preventing method of mobile terminal, this method includes:Anti-theft module is set in the firmware of the wifi chip of mobile terminal, the anti-theft module memory storage network address;The anti-theft module judges whether the currently running operating system of the mobile terminal is legal, if not, then the anti-theft module acquisition and the relevant operation data of the mobile terminal, and the operation data is sent to the corresponding server of the network address by the wifi chip.The anti-theft protection dynamics of mobile terminal can be promoted by implementing the present invention.

Description

A kind of method for preventing from carrying out mobile terminal in illegal brush machine
Technical field
It prevents from carrying out illegal brush machine to mobile terminal the present invention relates to mobile terminal device technical field more particularly to one kind Method.
Background technology
With the development and the improvement of people's living standards of mobile communication technology, the popularity rate of mobile terminal is increasingly It is high.Size of mobile terminals is small, the characteristics of being convenient for carrying brings huge facility, but there is also be easy to be stolen simultaneously to people's life Risk.
However, in daily life, mobile terminal is lost or stolen event happens occasionally.When mobile terminal lose or After stolen, the mobile terminal can be unlocked by carrying out the operations such as brush machine to mobile terminal by picking up taker or stealer, prevent the owner of lost property Give loss or stolen mobile terminal for change, What is more, and stealer can steal the private information of the owner of lost property and using stolen mobile end Gain wealth or publication deceptive information of the friend owner of lost property etc. by cheating in end.
At present, mobile terminal is generally used in the method for the antitheft software of installation in operating system to realize anti-theft feature or shifting Dynamic terminal, which is stolen, to be given for change, and antitheft software described in some currently existing schemes is such as close by being switched on by the way of password is verified Code is antitheft, i.e., presets startup password by mobile terminal user, and startup password must be inputted after mobile terminal-opening could be into Row normal use;Antitheft software described in other currently existing schemes takes the mode of legitimate verification, such as record movement is eventually Whether the history usage record of end subscriber is consistent to judge currently by the operation for detecting active user with the history usage record Whether user is legal, if do not conform to rule sends warning message to scheduled telephone number.Since above-mentioned antitheft software installation is being grasped Among making system, the change of operating system can operate to complete by conventional software, be if being reset to mobile terminal execution The antitheft software then can be removed in system processing, and the anti-theft feature of mobile terminal is made to fail.Therefore mobile terminal of the prior art Theft preventing method protection it is low, critical issue is that mobile terminal execution repacking operation system operatio be accessible 's.
Invention content
In order to overcome drawbacks described above of the prior art, prevent from illegally brushing mobile terminal the present invention provides one kind The method of machine, this method include:
Write-protect switch is set in the firmware of the solid state memory chip of mobile terminal;
Anti-theft module is set in the firmware of the wifi chip of the mobile terminal;
The anti-theft module judges whether wrapped in the operating system mirror image data of the input interface write-in of the mobile terminal User authentication information is included, if it is not, then the anti-theft module triggers the number that the write-protect switch closes the solid state memory chip According to write-in channel.
According to an aspect of the present invention, network address is also stored described in this method in anti-theft module;Described antitheft Module triggers the write-protect switch and closes after the data write-in channel of the solid state memory chip, and the anti-theft module is also used In acquisition and the relevant operation data of the mobile terminal, and the operation data is sent to the net by the wifi chip The corresponding server in network address.
According to another aspect of the present invention, this method further includes:The inquiry request that the server is sent out according to user The operation data is provided.
According to another aspect of the present invention, operation data described in this method includes:The hardware ID of the wifi chip, The IP address of the hot spot of the wifi chip connection and the IP address that the network equipment is mobile terminal distribution.
According to another aspect of the present invention, operation data described in this method further includes:The camera shooting of the mobile terminal The video or image that head obtains;And/or the location information of the mobile terminal generation.
According to another aspect of the present invention, user authentication information described in this method includes:Password, finger print information, sound Line information, pupil information or facial information.
It is provided by the present invention to prevent from passing through anti-theft module to the method and mobile terminal of the illegal brush machine of mobile terminal progress Cooperate with write-protect switch, avoid lose in mobile terminal, it is stolen in the case of there is illegal brush machine and lead to antitheft work( The defects of situation about can fail, overcoming the operating system of replacement mobile terminal in the prior art causes anti-theft feature to fail, It prevents unprincipled fellow from operating the mobile terminal of unlock user by brush machine, avoids the mobile terminal of profiteering user, steals user's Private information and the event generation using the illegal fraud of the mobile terminal progress of user, have ensured the property peace of user Entirely, value of the mobile terminal in taker or stealer hand is picked up while can be also reduced, increases owner subsequently during negotiation Initiative, increase the possibility that mobile terminal is lost or recovered after stolen.
Description of the drawings
By reading the detailed description made to non-limiting example made with reference to the following drawings, of the invention is other Feature, objects and advantages will become more apparent upon:
Fig. 1 is a kind of specific embodiment of the method according to the present invention for preventing from carrying out mobile terminal illegal brush machine Flow chart;
Fig. 2 is that one kind of the mobile terminal of the method using the present invention for preventing from carrying out mobile terminal illegal brush machine is specific The structure diagram of embodiment;
Fig. 3 is the theft preventing method for being used to implement the mobile terminal of the present invention and the mobile terminal that can prevent illegal brush machine The structure diagram of intelligent terminal;
The same or similar reference numeral represents the same or similar component in attached drawing.
Specific embodiment
For a better understanding and interpretation of the present invention, below in conjunction with attached drawing, the present invention is described in further detail.
The present invention provides a kind of methods for preventing from carrying out mobile terminal in illegal brush machine, please refer to Fig.1, Fig. 1 is basis The flow chart for preventing from carrying out mobile terminal a kind of specific embodiment of the method for illegal brush machine of the present invention, this method packet It includes:
Step S100 sets write-protect switch in the firmware of the solid state memory chip of mobile terminal;
Step S200 sets anti-theft module in the firmware of the wifi chip of the mobile terminal;
Step S300, the anti-theft module judge the operating system mirror image data of the input interface write-in of the mobile terminal In whether include user authentication information, if it is not, then performing step S400;
Step S400, the anti-theft module trigger the data write-in that the write-protect switch closes the solid state memory chip Channel.
Specifically, mobile terminal described in step S100 and step S200 include but not limited to be mounted with, iOS, The terminal operations systems such as Android, Symbian, Windows Mobile, Maemo, WebOS, Palm OS or Blackberry OS The smart mobile phone or tablet computer of system.Wifi chip in the mobile terminal is set and is cooperated to the wifi chip The hardware device of wifi hotspot can be connected by the wifi chip in the mobile terminal, the hardware device is, for example, wifi days Line.Solid state memory chip is also set up in the mobile terminal, the solid state memory chip is nand flash memory chip, and e.g. SSD is deposited Store up chip, eMMC storage chips etc..In addition, the mobile terminal further include installation and run operating system thereon and The suitable hardware environment of operating system can be met.
It will be understood by those skilled in the art that the operation for carrying out refitting system to the mobile terminal can not usually be changed The firmware of the wifi chip and the solid state memory chip.By taking wifi chip as an example, in some embodiments, the wifi cores Suitable storage medium, such as EROM, EEPROM or FLASH chip in piece are set, the wifi cores are stored in the storage medium The firmware (firmware) of piece, the anti-theft module being arranged in the firmware may be embodied as computer program product;Another In a little embodiments, which includes being embodied as the firmware of logic circuit form, and the logic circuit is by programmable logic device Part is formed, and the anti-theft module being arranged in the firmware may be embodied as computer program product and/or programmable logic device. Equally, the write-protect switch can also be embodied as above computer program product and/or programmable logic device.
In step S300, the input interface of the mobile terminal is, for example, USB interface or Lighting interfaces, if it is desired to Will into mobile terminal write operation system mirror data, then need by the input interface transmit data.It is if legal Operating system mirror image data can then include user authentication information, the user authentication information example in the operating system mirror image data Password, finger print information, voiceprint, pupil information or facial information in this way.It should include suitable logic in the anti-theft module, For judging that the user authentication information whether there is.If the above-mentioned result judged is no, step S400, the antitheft mould are performed Block triggers the data write-in channel that the write-protect switch closes the solid state memory chip, this can be to avoid illegal operation system System mirror image data is written in the solid state memory chip, that is, the operating system of the mobile terminal is avoided to be borrowed by illegal brush machine This ensure that only the operating system mirror image data (may be that user backs up in advance) including user authentication information could be reset Operating system.
Optionally, lost for the ease of mobile terminal, it is stolen after positioning subsequent operations, the present embodiment such as give for change What is provided prevents to include the following steps the method that mobile terminal carries out illegal brush machine:It is also stored in the anti-theft module Network address;The anti-theft module trigger the write-protect switch close the solid state memory chip data write-in channel it Afterwards, the anti-theft module be additionally operable to obtain with the relevant operation data of the mobile terminal, and the operation data passed through described Wifi chip is sent to the corresponding server of the network address.It will be appreciated by those skilled in the art that on the one hand, in order to realize The anti-theft effect of mobile terminal, the legal operating system run on the mobile terminal are configured as and the wifi chip It is communicated and sends password to the firmware, and the violated system on the mobile terminal will not be configured to described solid Part sends password, and the anti-theft module can be judged by judging whether to receive the password on the mobile terminal Whether currently running operating system is legal operating system;On the other hand, the violated system on the mobile terminal It is also arranged to be communicated with the wifi chip and sends password to the firmware, the anti-theft module can pass through judgement Whether the password meets legitimacy and then judges whether currently running operating system is legal on the mobile terminal Operating system.Typically, in the case where the mobile terminal needs to access wifi hotspot, the wifi chip can just start work Make, therefore above-mentioned steps can start to perform after the wifi chip accesses wifi hotspot.It is described antitheft in above-mentioned steps Module obtain first with the relevant operation data of the mobile terminal, then the operation data is sent by the wifi chip To the corresponding server of the network address.Specifically, the operation data is sent out by the internet that the wifi chip accesses Send server corresponding to the network address, which is the server for being used to implement guarding against theft for mobile terminal function, the clothes Business device is configurable to carry out subsequent analysis or arrangement to the operation data.The operation data includes the wifi chip Hardware ID, wifi chip connection hot spot IP for mobile terminal distribution of IP address and the network equipment Location.Wherein, e.g. the serial number for wifi chip setting, the hardware ID can be in advance for the hardware ID of the wifi chip Included in the firmware of wifi chip.Preferably, the operation data further includes:What the camera of the mobile terminal obtained regards Frequency or image;And/or the location information of the mobile terminal generation.Wherein, the location information is, for example, the mobile terminal The latitude and longitude information obtained by any or combination in the positioning methods such as base station location, GPS positioning and wifi positioning.It performs The owner that above-mentioned steps are conducive to mobile terminal grasps the latest position of mobile terminal, ambient conditions in time.
Optionally, the method that present embodiment provides can also include the following steps:The server is according to user The inquiry request sent out provides the operation data.Typically, the server provides the specific implementation shape of the operation data Formula can be designed as B/S patterns, and server offer contains the webpage of the operation data in response to the inquiry request.
It should be noted that although describing the operation of the method for the present invention with particular order in the accompanying drawings, this is not It is required that hint must according to the particular order come perform these operations could be real or have to carry out operation shown in whole Existing desired result.On the contrary, the step of describing in flow chart, which can change, performs sequence.Additionally or alternatively, it is convenient to omit Multiple steps are merged into a step execution and/or a step are decomposed into execution of multiple steps by certain steps.
Further, it please refers to Fig.2, Fig. 2 is the method using the present invention for preventing from carrying out mobile terminal in illegal brush machine Mobile terminal a kind of specific embodiment structure diagram, which includes wifi chip 110 and solid-state and deposits Chip 120 is stored up, wherein:
Setting write-protect switch 122 in the firmware 121 of the solid state memory chip 120;
Setting anti-theft module 112 in the firmware 111 of the wifi chip 110;
The anti-theft module 112 judge the mobile terminal input interface write-in operating system mirror image data in whether Including user authentication information, if it is not, then the anti-theft module 112 triggers the write-protect switch 122 and closes the solid-state storage The data write-in channel of chip 120.
The mobile terminal 100 include but not limited to be mounted with iOS, Android, Symbian, Windows Mobile, The smart mobile phone or tablet computer of the terminal operating systems such as Maemo, WebOS, Palm OS or Blackberry OS.The movement is whole Wifi chip 110 in end 100 is set and cooperates to pass through in the mobile terminal 100 with the wifi chip 110 The wifi chip 110 connects the hardware device of wifi hotspot, and the hardware device is, for example, wifi antennas.The mobile terminal 100 further include installation and run operating system thereon and can meet the suitable hardware environment of operating system. The input interface of the mobile terminal is, for example, USB interface or Lighting interfaces.Solid-state storage is also set up in the mobile terminal Chip 120, the solid state memory chip 120 is nand flash memory chip, e.g. SSD storage chips, eMMC storage chips etc.. In some embodiments, the suitable storage medium of setting in the wifi chip 110, such as EROM, EEPROM or FLASH chip, The firmware 111 of the wifi chip 110 is stored in the storage medium, being arranged on anti-theft module 112 in the firmware 111 can be with It is embodied as computer program product;In further embodiments, which includes being embodied as logic circuit form Firmware, the logic circuit are made of programmable logic device, and the anti-theft module 112 being arranged in the firmware 111 can be implemented For computer program product and/or programmable logic device.Equally, write-protect switch 122 can also be embodied as above computer Program product and/or programmable logic device.
Specifically, the user authentication information includes:Password, finger print information, voiceprint, pupil information or face letter Breath.
Preferably, network address is also stored in the anti-theft module 112, which is, for example, IP address.Described Anti-theft module 112 triggers the write-protect switch and closes after the data write-in channel of 122 solid state memory chips 120, institute State anti-theft module 112 be additionally operable to obtain with the 100 relevant operation data of mobile terminal, and the operation data passed through described Wifi chip is sent to the corresponding server 200 of the network address.The operation data includes the hardware of the wifi chip The IP address for the hot spot that ID, the wifi chip connect and the IP address that the network equipment is the mobile terminal 100 distribution.Its In, e.g. the serial number for wifi chip setting, the hardware ID can include the hardware ID of the wifi chip in advance In the firmware of wifi chip.The operation data further includes:The video or image that the camera of the mobile terminal 100 obtains And the location information that the mobile terminal 100 generates.Wherein, the location information is, for example, that the mobile terminal 100 passes through Any or combination and the latitude and longitude information that obtains in positioning methods such as base station location, GPS positioning and wifi positioning.
Server 200 can be used for providing the operation data with the inquiry request sent out according to user.Preferably, which please It asks and includes:With the unique corresponding mobile terminal ID of the hardware ID.The server 200 can be inquired according to mobile terminal ID Matched hardware ID.Typically, the server 200 provides the specific implementation form of the operation data and can be designed as B/S patterns, the server 200 offer contain the webpage of the operation data in response to the inquiry request.Such as user The server 300 is accessed by other equipment 300 to obtain the operation data.
Fig. 3 is the method for preventing from carrying out mobile terminal illegal brush machine for being used to implement the present invention and the intelligence of mobile terminal The structure diagram of energy terminal.Fig. 3 schematically shows the common structure of the intelligent terminal, with reference to figure 7 to common intelligence Internal component, software and the protocol architecture of energy terminal illustrate.
The intelligent terminal has processor 510, is responsible for the integrated operation of mobile terminal, and can utilize any business It is real that central processing unit (CPU), digital signal processor (DSP) or any other electronic programmable logic device (PLD) can be obtained It is existing.Processor 510 have associated memory 520, the memory 520 include but not limited to RAM memory, ROM memory, Eeprom memory, flash memory or combination.Memory 520 is controlled for numerous purposes by processor 510, one of them be for Various software storage program instructions and data in intelligent terminal.
The software view of the intelligent terminal includes real time operating system 540, the driver for man-machine interface 560, application Processor 550 and various applications.The application be, for example, text editor 551, handwriting recognition using 552 and other multimedias should With 553, typically other multimedia application include such as audio call application, video call application, send and receive short disappear Breath service (SMS) messages application, multimedia messaging service (MMS) application or e-mail applications, web browser, instant message Receive and dispatch application, book applications, calendar application, control panel application, camera application, one or more video-games, account This application etc..It should be noted that two or more of above application can be used as same application to perform.
The intelligent terminal further includes one or more hardware controls, for together with the driver of man-machine interface 560 With showing equipment 561, (such as loud speaker, vibrator, jingle bell occur for physical button 562, microphone 563 and various I/O equipment Device, LED indicator etc.) cooperation, to realize the human-computer interaction of the intelligent terminal.It should be understood by those skilled in the art that user can Mobile terminal is operated with the man-machine interface 560 that is formed in this way.
The software view of the intelligent terminal can also include various modules, protocol stack, driver etc. and relevant patrol that communicate Volume, communication interface 570 as shown in Figure 3 is summarized as, for for wireless radio interface 571 and being optionally blue tooth interface 572 and/or infrared interface 573 communication service (such as transmission, network and connectivity) is provided, to realize the mutual of the intelligent terminal Join intercommunication.Wireless radio interface 571 includes internal or external antenna and for establishing and safeguarding the Radio Link towards base station Proper circuit.As known to the skilled person, the circuit includes a series of analog- and digital- electronic building bricks, together Form radio receiver and transmitter.These components for example including bandpass filter, amplifier, frequency mixer, local oscillator, Low-pass filter, ad/da converter etc..
The intelligent terminal can also include reader device 530, the reader device 530 be used for read SIM card information and with This is according to the network that is provided of cooperation 571 access carrier of wireless radio interface.
The theft preventing method of mobile terminal provided by the invention can be realized using programmable logic device, can also be implemented For computer program product, which makes computer perform for demonstrated method.The computer program product packet Computer readable storage medium is included, comprising computer program logic or code section on the medium, is used to implement the above method Each step.The computer readable storage medium can be mounted built-in medium in a computer or can be from computer The removable medium (such as hot-pluggable storage device) of main body dismounting.The built-in medium includes but not limited to rewritable Nonvolatile memory, such as RAM, ROM and hard disk.The removable medium includes but not limited to:Optical storage media (such as CD-ROM and DVD), magneto-optic storage media (such as MO), magnetic recording medium (such as tape or mobile hard disk), have it is built-in can The media (such as storage card) of the nonvolatile memory of rewriting and the media (such as ROM boxes) with built-in ROM.
It will be appreciated by those skilled in the art that any computer system with properly programmed device can be performed and be included All steps of the method for the present invention in computer program product.Although most specific embodiments described in this specification Software program is all laid particular emphasis on, but realizes that the alternate embodiment of method provided by the invention equally will in the present invention in hardware Within the scope of asking protection.
It is obvious to a person skilled in the art that the present invention is not limited to the details of above-mentioned exemplary embodiment, Er Qie In the case of without departing substantially from spirit or essential attributes of the invention, the present invention can be realized in other specific forms.Therefore, Ying Jiang Embodiment regards exemplary as, and is non-limiting, the scope of the present invention by appended claims rather than on state Bright restriction, all changes in the meaning and scope of the equivalent requirements of the claims include within the present invention.It should not will weigh Any reference numeral in profit requirement is considered as the involved claim of limitation.Furthermore, it is to be understood that one word of " comprising " is not excluded for other Component, unit or step, odd number are not excluded for plural number.Multiple components, unit or the device stated in claim can also be by one A component, unit or device are realized by software or hardware.
It is provided by the present invention to prevent from passing through anti-theft module to the method and mobile terminal of the illegal brush machine of mobile terminal progress Cooperate with write-protect switch, avoid lose in mobile terminal, it is stolen in the case of there is illegal brush machine and lead to antitheft work( The defects of situation about can fail, overcoming the operating system of replacement mobile terminal in the prior art causes anti-theft feature to fail, It prevents unprincipled fellow from operating the mobile terminal of unlock user by brush machine, avoids the mobile terminal of profiteering user, steals user's Private information and the event generation using the illegal fraud of the mobile terminal progress of user, have ensured the property peace of user Entirely, value of the mobile terminal in taker or stealer hand is picked up while can be also reduced, increases owner subsequently during negotiation Initiative, increase the possibility that mobile terminal is lost or recovered after stolen.
Described above is only some preferred embodiments of the present invention, it is impossible to the right model of the present invention is limited with this It encloses, equivalent variations made according to the claims of the present invention are still within the scope of the present invention.

Claims (6)

1. a kind of method for preventing from carrying out mobile terminal in illegal brush machine, this method include:
Write-protect switch is set in the firmware of the solid state memory chip of mobile terminal;
Anti-theft module is set in the firmware of the wifi chip of the mobile terminal;
The anti-theft module judges whether include using in the operating system mirror image data of the input interface write-in of the mobile terminal Family verification information, if it is not, then the data of the anti-theft module triggering write-protect switch closing solid state memory chip are write Enter channel.
2. according to the method described in claim 1, wherein:
Network address is also stored in the anti-theft module;
After the anti-theft module triggers the data write-in channel of the write-protect switch closing solid state memory chip, institute It states anti-theft module and is additionally operable to acquisition and the relevant operation data of the mobile terminal, and the operation data is passed through into the wifi cores Piece is sent to the corresponding server of the network address.
3. according to the method described in claim 2, this method further includes:
The server provides the operation data according to the inquiry request that user sends out.
4. according to the method described in claim 3, wherein, the operation data includes:
The IP address and the network equipment for the hot spot that the hardware ID of the wifi chip, the wifi chip connect are the movement The IP address of terminal distribution.
5. according to the method described in claim 4, wherein, the operation data further includes:
The video or image that the camera of the mobile terminal obtains;And/or
The location information of the mobile terminal generation.
6. according to the method described in claim 1, wherein, the user authentication information includes:
Password, finger print information, voiceprint, pupil information or facial information.
CN201711499369.1A 2017-12-29 2017-12-29 A kind of method for preventing from carrying out mobile terminal in illegal brush machine Pending CN108241809A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711499369.1A CN108241809A (en) 2017-12-29 2017-12-29 A kind of method for preventing from carrying out mobile terminal in illegal brush machine

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711499369.1A CN108241809A (en) 2017-12-29 2017-12-29 A kind of method for preventing from carrying out mobile terminal in illegal brush machine

Publications (1)

Publication Number Publication Date
CN108241809A true CN108241809A (en) 2018-07-03

Family

ID=62698547

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711499369.1A Pending CN108241809A (en) 2017-12-29 2017-12-29 A kind of method for preventing from carrying out mobile terminal in illegal brush machine

Country Status (1)

Country Link
CN (1) CN108241809A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108985104A (en) * 2018-07-20 2018-12-11 南昌黑鲨科技有限公司 The encryption method and intelligent terminal of intelligent terminal

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202422136U (en) * 2011-11-11 2012-09-05 德州学院 Wireless remote control solid state disk with protection function
WO2013166886A1 (en) * 2012-05-08 2013-11-14 Lin Zhang Anti-theft method, device and system for portable computer equipment
CN104410754A (en) * 2014-11-19 2015-03-11 北京元心科技有限公司 Antitheft method for a mobile terminal, and a mobile terminal having an antitheft function
CN105117912A (en) * 2015-09-01 2015-12-02 广东欧珀移动通信有限公司 Anti-reinstallation-after-stolen mobile terminal and anti-reinstallation-after-stolen method therefor

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202422136U (en) * 2011-11-11 2012-09-05 德州学院 Wireless remote control solid state disk with protection function
WO2013166886A1 (en) * 2012-05-08 2013-11-14 Lin Zhang Anti-theft method, device and system for portable computer equipment
CN104410754A (en) * 2014-11-19 2015-03-11 北京元心科技有限公司 Antitheft method for a mobile terminal, and a mobile terminal having an antitheft function
CN105117912A (en) * 2015-09-01 2015-12-02 广东欧珀移动通信有限公司 Anti-reinstallation-after-stolen mobile terminal and anti-reinstallation-after-stolen method therefor

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108985104A (en) * 2018-07-20 2018-12-11 南昌黑鲨科技有限公司 The encryption method and intelligent terminal of intelligent terminal
CN108985104B (en) * 2018-07-20 2022-01-21 南昌黑鲨科技有限公司 Encryption method of intelligent terminal and intelligent terminal

Similar Documents

Publication Publication Date Title
CN101719955B (en) Intelligent terminal system with fingerprint identification and information processing method
US20070155418A1 (en) Expandable functions for cellular phones
CN111918243B (en) Digital vehicle key management method and device, vehicle and storage medium
US20090183266A1 (en) Method and a system for recovering a lost or stolen electronic device
CN105550591A (en) Security protection device and method for user data in mobile terminal
CN104915582B (en) unlocking method and device
CN102196021A (en) System for remotely erasing data, method, server, and mobile device thereof
CN102096546A (en) Unlocking method and device of operating system
CN108076426A (en) Terminal tracing method, apparatus, storage medium and terminal device
US20120178476A1 (en) Determining the last location of lost and stolen portable electronic devices when wireless communications access to the lost or stolen devices is lost or intermittent
CN105592146A (en) Equipment control method, device and terminal
CN108280375A (en) A kind of mobile terminal that can prevent illegal brush machine
US20080238608A1 (en) Anti-theft system and method
CN107133794A (en) IFAA fingerprints payment mechanism, system, method and mobile terminal
CN102215285A (en) Method and apparatus for protecting information in user terminal
CN104994224A (en) Antitheft method and device for mobile terminal
US20060282658A1 (en) Boot systems and methods and related devices
CN105184184A (en) Anti-theft method for terminal data
CN105488372B (en) Verification method and device
CN103581404A (en) Mobile phone with theft prevention function and mobile phone theft prevention method
US20160381552A1 (en) Handling risk events for a mobile device
CN108241809A (en) A kind of method for preventing from carrying out mobile terminal in illegal brush machine
CN107071008A (en) Localization method, device and the equipment of terminal device
CN106293717A (en) The processing method of the setting of terminal, device and terminal
CN104410754B (en) The theft preventing method of mobile terminal and there is the mobile terminal of anti-theft feature

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180703

WD01 Invention patent application deemed withdrawn after publication