CN108241809A - A kind of method for preventing from carrying out mobile terminal in illegal brush machine - Google Patents
A kind of method for preventing from carrying out mobile terminal in illegal brush machine Download PDFInfo
- Publication number
- CN108241809A CN108241809A CN201711499369.1A CN201711499369A CN108241809A CN 108241809 A CN108241809 A CN 108241809A CN 201711499369 A CN201711499369 A CN 201711499369A CN 108241809 A CN108241809 A CN 108241809A
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- write
- theft module
- operation data
- chip
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 42
- 239000007787 solid Substances 0.000 claims description 18
- 210000001747 pupil Anatomy 0.000 claims description 4
- 230000001815 facial effect Effects 0.000 claims description 3
- 238000012795 verification Methods 0.000 claims description 2
- 230000005055 memory storage Effects 0.000 abstract 1
- 238000004590 computer program Methods 0.000 description 10
- 230000008859 change Effects 0.000 description 5
- 238000010586 diagram Methods 0.000 description 4
- 238000009434 installation Methods 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 230000007547 defect Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 230000001680 brushing effect Effects 0.000 description 1
- 239000011469 building brick Substances 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 210000003128 head Anatomy 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012857 repacking Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/88—Detecting or preventing theft or loss
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Telephone Function (AREA)
Abstract
The present invention provides a kind of theft preventing method of mobile terminal, this method includes:Anti-theft module is set in the firmware of the wifi chip of mobile terminal, the anti-theft module memory storage network address;The anti-theft module judges whether the currently running operating system of the mobile terminal is legal, if not, then the anti-theft module acquisition and the relevant operation data of the mobile terminal, and the operation data is sent to the corresponding server of the network address by the wifi chip.The anti-theft protection dynamics of mobile terminal can be promoted by implementing the present invention.
Description
Technical field
It prevents from carrying out illegal brush machine to mobile terminal the present invention relates to mobile terminal device technical field more particularly to one kind
Method.
Background technology
With the development and the improvement of people's living standards of mobile communication technology, the popularity rate of mobile terminal is increasingly
It is high.Size of mobile terminals is small, the characteristics of being convenient for carrying brings huge facility, but there is also be easy to be stolen simultaneously to people's life
Risk.
However, in daily life, mobile terminal is lost or stolen event happens occasionally.When mobile terminal lose or
After stolen, the mobile terminal can be unlocked by carrying out the operations such as brush machine to mobile terminal by picking up taker or stealer, prevent the owner of lost property
Give loss or stolen mobile terminal for change, What is more, and stealer can steal the private information of the owner of lost property and using stolen mobile end
Gain wealth or publication deceptive information of the friend owner of lost property etc. by cheating in end.
At present, mobile terminal is generally used in the method for the antitheft software of installation in operating system to realize anti-theft feature or shifting
Dynamic terminal, which is stolen, to be given for change, and antitheft software described in some currently existing schemes is such as close by being switched on by the way of password is verified
Code is antitheft, i.e., presets startup password by mobile terminal user, and startup password must be inputted after mobile terminal-opening could be into
Row normal use;Antitheft software described in other currently existing schemes takes the mode of legitimate verification, such as record movement is eventually
Whether the history usage record of end subscriber is consistent to judge currently by the operation for detecting active user with the history usage record
Whether user is legal, if do not conform to rule sends warning message to scheduled telephone number.Since above-mentioned antitheft software installation is being grasped
Among making system, the change of operating system can operate to complete by conventional software, be if being reset to mobile terminal execution
The antitheft software then can be removed in system processing, and the anti-theft feature of mobile terminal is made to fail.Therefore mobile terminal of the prior art
Theft preventing method protection it is low, critical issue is that mobile terminal execution repacking operation system operatio be accessible
's.
Invention content
In order to overcome drawbacks described above of the prior art, prevent from illegally brushing mobile terminal the present invention provides one kind
The method of machine, this method include:
Write-protect switch is set in the firmware of the solid state memory chip of mobile terminal;
Anti-theft module is set in the firmware of the wifi chip of the mobile terminal;
The anti-theft module judges whether wrapped in the operating system mirror image data of the input interface write-in of the mobile terminal
User authentication information is included, if it is not, then the anti-theft module triggers the number that the write-protect switch closes the solid state memory chip
According to write-in channel.
According to an aspect of the present invention, network address is also stored described in this method in anti-theft module;Described antitheft
Module triggers the write-protect switch and closes after the data write-in channel of the solid state memory chip, and the anti-theft module is also used
In acquisition and the relevant operation data of the mobile terminal, and the operation data is sent to the net by the wifi chip
The corresponding server in network address.
According to another aspect of the present invention, this method further includes:The inquiry request that the server is sent out according to user
The operation data is provided.
According to another aspect of the present invention, operation data described in this method includes:The hardware ID of the wifi chip,
The IP address of the hot spot of the wifi chip connection and the IP address that the network equipment is mobile terminal distribution.
According to another aspect of the present invention, operation data described in this method further includes:The camera shooting of the mobile terminal
The video or image that head obtains;And/or the location information of the mobile terminal generation.
According to another aspect of the present invention, user authentication information described in this method includes:Password, finger print information, sound
Line information, pupil information or facial information.
It is provided by the present invention to prevent from passing through anti-theft module to the method and mobile terminal of the illegal brush machine of mobile terminal progress
Cooperate with write-protect switch, avoid lose in mobile terminal, it is stolen in the case of there is illegal brush machine and lead to antitheft work(
The defects of situation about can fail, overcoming the operating system of replacement mobile terminal in the prior art causes anti-theft feature to fail,
It prevents unprincipled fellow from operating the mobile terminal of unlock user by brush machine, avoids the mobile terminal of profiteering user, steals user's
Private information and the event generation using the illegal fraud of the mobile terminal progress of user, have ensured the property peace of user
Entirely, value of the mobile terminal in taker or stealer hand is picked up while can be also reduced, increases owner subsequently during negotiation
Initiative, increase the possibility that mobile terminal is lost or recovered after stolen.
Description of the drawings
By reading the detailed description made to non-limiting example made with reference to the following drawings, of the invention is other
Feature, objects and advantages will become more apparent upon:
Fig. 1 is a kind of specific embodiment of the method according to the present invention for preventing from carrying out mobile terminal illegal brush machine
Flow chart;
Fig. 2 is that one kind of the mobile terminal of the method using the present invention for preventing from carrying out mobile terminal illegal brush machine is specific
The structure diagram of embodiment;
Fig. 3 is the theft preventing method for being used to implement the mobile terminal of the present invention and the mobile terminal that can prevent illegal brush machine
The structure diagram of intelligent terminal;
The same or similar reference numeral represents the same or similar component in attached drawing.
Specific embodiment
For a better understanding and interpretation of the present invention, below in conjunction with attached drawing, the present invention is described in further detail.
The present invention provides a kind of methods for preventing from carrying out mobile terminal in illegal brush machine, please refer to Fig.1, Fig. 1 is basis
The flow chart for preventing from carrying out mobile terminal a kind of specific embodiment of the method for illegal brush machine of the present invention, this method packet
It includes:
Step S100 sets write-protect switch in the firmware of the solid state memory chip of mobile terminal;
Step S200 sets anti-theft module in the firmware of the wifi chip of the mobile terminal;
Step S300, the anti-theft module judge the operating system mirror image data of the input interface write-in of the mobile terminal
In whether include user authentication information, if it is not, then performing step S400;
Step S400, the anti-theft module trigger the data write-in that the write-protect switch closes the solid state memory chip
Channel.
Specifically, mobile terminal described in step S100 and step S200 include but not limited to be mounted with, iOS,
The terminal operations systems such as Android, Symbian, Windows Mobile, Maemo, WebOS, Palm OS or Blackberry OS
The smart mobile phone or tablet computer of system.Wifi chip in the mobile terminal is set and is cooperated to the wifi chip
The hardware device of wifi hotspot can be connected by the wifi chip in the mobile terminal, the hardware device is, for example, wifi days
Line.Solid state memory chip is also set up in the mobile terminal, the solid state memory chip is nand flash memory chip, and e.g. SSD is deposited
Store up chip, eMMC storage chips etc..In addition, the mobile terminal further include installation and run operating system thereon and
The suitable hardware environment of operating system can be met.
It will be understood by those skilled in the art that the operation for carrying out refitting system to the mobile terminal can not usually be changed
The firmware of the wifi chip and the solid state memory chip.By taking wifi chip as an example, in some embodiments, the wifi cores
Suitable storage medium, such as EROM, EEPROM or FLASH chip in piece are set, the wifi cores are stored in the storage medium
The firmware (firmware) of piece, the anti-theft module being arranged in the firmware may be embodied as computer program product;Another
In a little embodiments, which includes being embodied as the firmware of logic circuit form, and the logic circuit is by programmable logic device
Part is formed, and the anti-theft module being arranged in the firmware may be embodied as computer program product and/or programmable logic device.
Equally, the write-protect switch can also be embodied as above computer program product and/or programmable logic device.
In step S300, the input interface of the mobile terminal is, for example, USB interface or Lighting interfaces, if it is desired to
Will into mobile terminal write operation system mirror data, then need by the input interface transmit data.It is if legal
Operating system mirror image data can then include user authentication information, the user authentication information example in the operating system mirror image data
Password, finger print information, voiceprint, pupil information or facial information in this way.It should include suitable logic in the anti-theft module,
For judging that the user authentication information whether there is.If the above-mentioned result judged is no, step S400, the antitheft mould are performed
Block triggers the data write-in channel that the write-protect switch closes the solid state memory chip, this can be to avoid illegal operation system
System mirror image data is written in the solid state memory chip, that is, the operating system of the mobile terminal is avoided to be borrowed by illegal brush machine
This ensure that only the operating system mirror image data (may be that user backs up in advance) including user authentication information could be reset
Operating system.
Optionally, lost for the ease of mobile terminal, it is stolen after positioning subsequent operations, the present embodiment such as give for change
What is provided prevents to include the following steps the method that mobile terminal carries out illegal brush machine:It is also stored in the anti-theft module
Network address;The anti-theft module trigger the write-protect switch close the solid state memory chip data write-in channel it
Afterwards, the anti-theft module be additionally operable to obtain with the relevant operation data of the mobile terminal, and the operation data passed through described
Wifi chip is sent to the corresponding server of the network address.It will be appreciated by those skilled in the art that on the one hand, in order to realize
The anti-theft effect of mobile terminal, the legal operating system run on the mobile terminal are configured as and the wifi chip
It is communicated and sends password to the firmware, and the violated system on the mobile terminal will not be configured to described solid
Part sends password, and the anti-theft module can be judged by judging whether to receive the password on the mobile terminal
Whether currently running operating system is legal operating system;On the other hand, the violated system on the mobile terminal
It is also arranged to be communicated with the wifi chip and sends password to the firmware, the anti-theft module can pass through judgement
Whether the password meets legitimacy and then judges whether currently running operating system is legal on the mobile terminal
Operating system.Typically, in the case where the mobile terminal needs to access wifi hotspot, the wifi chip can just start work
Make, therefore above-mentioned steps can start to perform after the wifi chip accesses wifi hotspot.It is described antitheft in above-mentioned steps
Module obtain first with the relevant operation data of the mobile terminal, then the operation data is sent by the wifi chip
To the corresponding server of the network address.Specifically, the operation data is sent out by the internet that the wifi chip accesses
Send server corresponding to the network address, which is the server for being used to implement guarding against theft for mobile terminal function, the clothes
Business device is configurable to carry out subsequent analysis or arrangement to the operation data.The operation data includes the wifi chip
Hardware ID, wifi chip connection hot spot IP for mobile terminal distribution of IP address and the network equipment
Location.Wherein, e.g. the serial number for wifi chip setting, the hardware ID can be in advance for the hardware ID of the wifi chip
Included in the firmware of wifi chip.Preferably, the operation data further includes:What the camera of the mobile terminal obtained regards
Frequency or image;And/or the location information of the mobile terminal generation.Wherein, the location information is, for example, the mobile terminal
The latitude and longitude information obtained by any or combination in the positioning methods such as base station location, GPS positioning and wifi positioning.It performs
The owner that above-mentioned steps are conducive to mobile terminal grasps the latest position of mobile terminal, ambient conditions in time.
Optionally, the method that present embodiment provides can also include the following steps:The server is according to user
The inquiry request sent out provides the operation data.Typically, the server provides the specific implementation shape of the operation data
Formula can be designed as B/S patterns, and server offer contains the webpage of the operation data in response to the inquiry request.
It should be noted that although describing the operation of the method for the present invention with particular order in the accompanying drawings, this is not
It is required that hint must according to the particular order come perform these operations could be real or have to carry out operation shown in whole
Existing desired result.On the contrary, the step of describing in flow chart, which can change, performs sequence.Additionally or alternatively, it is convenient to omit
Multiple steps are merged into a step execution and/or a step are decomposed into execution of multiple steps by certain steps.
Further, it please refers to Fig.2, Fig. 2 is the method using the present invention for preventing from carrying out mobile terminal in illegal brush machine
Mobile terminal a kind of specific embodiment structure diagram, which includes wifi chip 110 and solid-state and deposits
Chip 120 is stored up, wherein:
Setting write-protect switch 122 in the firmware 121 of the solid state memory chip 120;
Setting anti-theft module 112 in the firmware 111 of the wifi chip 110;
The anti-theft module 112 judge the mobile terminal input interface write-in operating system mirror image data in whether
Including user authentication information, if it is not, then the anti-theft module 112 triggers the write-protect switch 122 and closes the solid-state storage
The data write-in channel of chip 120.
The mobile terminal 100 include but not limited to be mounted with iOS, Android, Symbian, Windows Mobile,
The smart mobile phone or tablet computer of the terminal operating systems such as Maemo, WebOS, Palm OS or Blackberry OS.The movement is whole
Wifi chip 110 in end 100 is set and cooperates to pass through in the mobile terminal 100 with the wifi chip 110
The wifi chip 110 connects the hardware device of wifi hotspot, and the hardware device is, for example, wifi antennas.The mobile terminal
100 further include installation and run operating system thereon and can meet the suitable hardware environment of operating system.
The input interface of the mobile terminal is, for example, USB interface or Lighting interfaces.Solid-state storage is also set up in the mobile terminal
Chip 120, the solid state memory chip 120 is nand flash memory chip, e.g. SSD storage chips, eMMC storage chips etc..
In some embodiments, the suitable storage medium of setting in the wifi chip 110, such as EROM, EEPROM or FLASH chip,
The firmware 111 of the wifi chip 110 is stored in the storage medium, being arranged on anti-theft module 112 in the firmware 111 can be with
It is embodied as computer program product;In further embodiments, which includes being embodied as logic circuit form
Firmware, the logic circuit are made of programmable logic device, and the anti-theft module 112 being arranged in the firmware 111 can be implemented
For computer program product and/or programmable logic device.Equally, write-protect switch 122 can also be embodied as above computer
Program product and/or programmable logic device.
Specifically, the user authentication information includes:Password, finger print information, voiceprint, pupil information or face letter
Breath.
Preferably, network address is also stored in the anti-theft module 112, which is, for example, IP address.Described
Anti-theft module 112 triggers the write-protect switch and closes after the data write-in channel of 122 solid state memory chips 120, institute
State anti-theft module 112 be additionally operable to obtain with the 100 relevant operation data of mobile terminal, and the operation data passed through described
Wifi chip is sent to the corresponding server 200 of the network address.The operation data includes the hardware of the wifi chip
The IP address for the hot spot that ID, the wifi chip connect and the IP address that the network equipment is the mobile terminal 100 distribution.Its
In, e.g. the serial number for wifi chip setting, the hardware ID can include the hardware ID of the wifi chip in advance
In the firmware of wifi chip.The operation data further includes:The video or image that the camera of the mobile terminal 100 obtains
And the location information that the mobile terminal 100 generates.Wherein, the location information is, for example, that the mobile terminal 100 passes through
Any or combination and the latitude and longitude information that obtains in positioning methods such as base station location, GPS positioning and wifi positioning.
Server 200 can be used for providing the operation data with the inquiry request sent out according to user.Preferably, which please
It asks and includes:With the unique corresponding mobile terminal ID of the hardware ID.The server 200 can be inquired according to mobile terminal ID
Matched hardware ID.Typically, the server 200 provides the specific implementation form of the operation data and can be designed as
B/S patterns, the server 200 offer contain the webpage of the operation data in response to the inquiry request.Such as user
The server 300 is accessed by other equipment 300 to obtain the operation data.
Fig. 3 is the method for preventing from carrying out mobile terminal illegal brush machine for being used to implement the present invention and the intelligence of mobile terminal
The structure diagram of energy terminal.Fig. 3 schematically shows the common structure of the intelligent terminal, with reference to figure 7 to common intelligence
Internal component, software and the protocol architecture of energy terminal illustrate.
The intelligent terminal has processor 510, is responsible for the integrated operation of mobile terminal, and can utilize any business
It is real that central processing unit (CPU), digital signal processor (DSP) or any other electronic programmable logic device (PLD) can be obtained
It is existing.Processor 510 have associated memory 520, the memory 520 include but not limited to RAM memory, ROM memory,
Eeprom memory, flash memory or combination.Memory 520 is controlled for numerous purposes by processor 510, one of them be for
Various software storage program instructions and data in intelligent terminal.
The software view of the intelligent terminal includes real time operating system 540, the driver for man-machine interface 560, application
Processor 550 and various applications.The application be, for example, text editor 551, handwriting recognition using 552 and other multimedias should
With 553, typically other multimedia application include such as audio call application, video call application, send and receive short disappear
Breath service (SMS) messages application, multimedia messaging service (MMS) application or e-mail applications, web browser, instant message
Receive and dispatch application, book applications, calendar application, control panel application, camera application, one or more video-games, account
This application etc..It should be noted that two or more of above application can be used as same application to perform.
The intelligent terminal further includes one or more hardware controls, for together with the driver of man-machine interface 560
With showing equipment 561, (such as loud speaker, vibrator, jingle bell occur for physical button 562, microphone 563 and various I/O equipment
Device, LED indicator etc.) cooperation, to realize the human-computer interaction of the intelligent terminal.It should be understood by those skilled in the art that user can
Mobile terminal is operated with the man-machine interface 560 that is formed in this way.
The software view of the intelligent terminal can also include various modules, protocol stack, driver etc. and relevant patrol that communicate
Volume, communication interface 570 as shown in Figure 3 is summarized as, for for wireless radio interface 571 and being optionally blue tooth interface
572 and/or infrared interface 573 communication service (such as transmission, network and connectivity) is provided, to realize the mutual of the intelligent terminal
Join intercommunication.Wireless radio interface 571 includes internal or external antenna and for establishing and safeguarding the Radio Link towards base station
Proper circuit.As known to the skilled person, the circuit includes a series of analog- and digital- electronic building bricks, together
Form radio receiver and transmitter.These components for example including bandpass filter, amplifier, frequency mixer, local oscillator,
Low-pass filter, ad/da converter etc..
The intelligent terminal can also include reader device 530, the reader device 530 be used for read SIM card information and with
This is according to the network that is provided of cooperation 571 access carrier of wireless radio interface.
The theft preventing method of mobile terminal provided by the invention can be realized using programmable logic device, can also be implemented
For computer program product, which makes computer perform for demonstrated method.The computer program product packet
Computer readable storage medium is included, comprising computer program logic or code section on the medium, is used to implement the above method
Each step.The computer readable storage medium can be mounted built-in medium in a computer or can be from computer
The removable medium (such as hot-pluggable storage device) of main body dismounting.The built-in medium includes but not limited to rewritable
Nonvolatile memory, such as RAM, ROM and hard disk.The removable medium includes but not limited to:Optical storage media (such as
CD-ROM and DVD), magneto-optic storage media (such as MO), magnetic recording medium (such as tape or mobile hard disk), have it is built-in can
The media (such as storage card) of the nonvolatile memory of rewriting and the media (such as ROM boxes) with built-in ROM.
It will be appreciated by those skilled in the art that any computer system with properly programmed device can be performed and be included
All steps of the method for the present invention in computer program product.Although most specific embodiments described in this specification
Software program is all laid particular emphasis on, but realizes that the alternate embodiment of method provided by the invention equally will in the present invention in hardware
Within the scope of asking protection.
It is obvious to a person skilled in the art that the present invention is not limited to the details of above-mentioned exemplary embodiment, Er Qie
In the case of without departing substantially from spirit or essential attributes of the invention, the present invention can be realized in other specific forms.Therefore, Ying Jiang
Embodiment regards exemplary as, and is non-limiting, the scope of the present invention by appended claims rather than on state
Bright restriction, all changes in the meaning and scope of the equivalent requirements of the claims include within the present invention.It should not will weigh
Any reference numeral in profit requirement is considered as the involved claim of limitation.Furthermore, it is to be understood that one word of " comprising " is not excluded for other
Component, unit or step, odd number are not excluded for plural number.Multiple components, unit or the device stated in claim can also be by one
A component, unit or device are realized by software or hardware.
It is provided by the present invention to prevent from passing through anti-theft module to the method and mobile terminal of the illegal brush machine of mobile terminal progress
Cooperate with write-protect switch, avoid lose in mobile terminal, it is stolen in the case of there is illegal brush machine and lead to antitheft work(
The defects of situation about can fail, overcoming the operating system of replacement mobile terminal in the prior art causes anti-theft feature to fail,
It prevents unprincipled fellow from operating the mobile terminal of unlock user by brush machine, avoids the mobile terminal of profiteering user, steals user's
Private information and the event generation using the illegal fraud of the mobile terminal progress of user, have ensured the property peace of user
Entirely, value of the mobile terminal in taker or stealer hand is picked up while can be also reduced, increases owner subsequently during negotiation
Initiative, increase the possibility that mobile terminal is lost or recovered after stolen.
Described above is only some preferred embodiments of the present invention, it is impossible to the right model of the present invention is limited with this
It encloses, equivalent variations made according to the claims of the present invention are still within the scope of the present invention.
Claims (6)
1. a kind of method for preventing from carrying out mobile terminal in illegal brush machine, this method include:
Write-protect switch is set in the firmware of the solid state memory chip of mobile terminal;
Anti-theft module is set in the firmware of the wifi chip of the mobile terminal;
The anti-theft module judges whether include using in the operating system mirror image data of the input interface write-in of the mobile terminal
Family verification information, if it is not, then the data of the anti-theft module triggering write-protect switch closing solid state memory chip are write
Enter channel.
2. according to the method described in claim 1, wherein:
Network address is also stored in the anti-theft module;
After the anti-theft module triggers the data write-in channel of the write-protect switch closing solid state memory chip, institute
It states anti-theft module and is additionally operable to acquisition and the relevant operation data of the mobile terminal, and the operation data is passed through into the wifi cores
Piece is sent to the corresponding server of the network address.
3. according to the method described in claim 2, this method further includes:
The server provides the operation data according to the inquiry request that user sends out.
4. according to the method described in claim 3, wherein, the operation data includes:
The IP address and the network equipment for the hot spot that the hardware ID of the wifi chip, the wifi chip connect are the movement
The IP address of terminal distribution.
5. according to the method described in claim 4, wherein, the operation data further includes:
The video or image that the camera of the mobile terminal obtains;And/or
The location information of the mobile terminal generation.
6. according to the method described in claim 1, wherein, the user authentication information includes:
Password, finger print information, voiceprint, pupil information or facial information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711499369.1A CN108241809A (en) | 2017-12-29 | 2017-12-29 | A kind of method for preventing from carrying out mobile terminal in illegal brush machine |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711499369.1A CN108241809A (en) | 2017-12-29 | 2017-12-29 | A kind of method for preventing from carrying out mobile terminal in illegal brush machine |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108241809A true CN108241809A (en) | 2018-07-03 |
Family
ID=62698547
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711499369.1A Pending CN108241809A (en) | 2017-12-29 | 2017-12-29 | A kind of method for preventing from carrying out mobile terminal in illegal brush machine |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108241809A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108985104A (en) * | 2018-07-20 | 2018-12-11 | 南昌黑鲨科技有限公司 | The encryption method and intelligent terminal of intelligent terminal |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN202422136U (en) * | 2011-11-11 | 2012-09-05 | 德州学院 | Wireless remote control solid state disk with protection function |
WO2013166886A1 (en) * | 2012-05-08 | 2013-11-14 | Lin Zhang | Anti-theft method, device and system for portable computer equipment |
CN104410754A (en) * | 2014-11-19 | 2015-03-11 | 北京元心科技有限公司 | Antitheft method for a mobile terminal, and a mobile terminal having an antitheft function |
CN105117912A (en) * | 2015-09-01 | 2015-12-02 | 广东欧珀移动通信有限公司 | Anti-reinstallation-after-stolen mobile terminal and anti-reinstallation-after-stolen method therefor |
-
2017
- 2017-12-29 CN CN201711499369.1A patent/CN108241809A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN202422136U (en) * | 2011-11-11 | 2012-09-05 | 德州学院 | Wireless remote control solid state disk with protection function |
WO2013166886A1 (en) * | 2012-05-08 | 2013-11-14 | Lin Zhang | Anti-theft method, device and system for portable computer equipment |
CN104410754A (en) * | 2014-11-19 | 2015-03-11 | 北京元心科技有限公司 | Antitheft method for a mobile terminal, and a mobile terminal having an antitheft function |
CN105117912A (en) * | 2015-09-01 | 2015-12-02 | 广东欧珀移动通信有限公司 | Anti-reinstallation-after-stolen mobile terminal and anti-reinstallation-after-stolen method therefor |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108985104A (en) * | 2018-07-20 | 2018-12-11 | 南昌黑鲨科技有限公司 | The encryption method and intelligent terminal of intelligent terminal |
CN108985104B (en) * | 2018-07-20 | 2022-01-21 | 南昌黑鲨科技有限公司 | Encryption method of intelligent terminal and intelligent terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101719955B (en) | Intelligent terminal system with fingerprint identification and information processing method | |
US20070155418A1 (en) | Expandable functions for cellular phones | |
CN111918243B (en) | Digital vehicle key management method and device, vehicle and storage medium | |
US20090183266A1 (en) | Method and a system for recovering a lost or stolen electronic device | |
CN105550591A (en) | Security protection device and method for user data in mobile terminal | |
CN104915582B (en) | unlocking method and device | |
CN102196021A (en) | System for remotely erasing data, method, server, and mobile device thereof | |
CN102096546A (en) | Unlocking method and device of operating system | |
CN108076426A (en) | Terminal tracing method, apparatus, storage medium and terminal device | |
US20120178476A1 (en) | Determining the last location of lost and stolen portable electronic devices when wireless communications access to the lost or stolen devices is lost or intermittent | |
CN105592146A (en) | Equipment control method, device and terminal | |
CN108280375A (en) | A kind of mobile terminal that can prevent illegal brush machine | |
US20080238608A1 (en) | Anti-theft system and method | |
CN107133794A (en) | IFAA fingerprints payment mechanism, system, method and mobile terminal | |
CN102215285A (en) | Method and apparatus for protecting information in user terminal | |
CN104994224A (en) | Antitheft method and device for mobile terminal | |
US20060282658A1 (en) | Boot systems and methods and related devices | |
CN105184184A (en) | Anti-theft method for terminal data | |
CN105488372B (en) | Verification method and device | |
CN103581404A (en) | Mobile phone with theft prevention function and mobile phone theft prevention method | |
US20160381552A1 (en) | Handling risk events for a mobile device | |
CN108241809A (en) | A kind of method for preventing from carrying out mobile terminal in illegal brush machine | |
CN107071008A (en) | Localization method, device and the equipment of terminal device | |
CN106293717A (en) | The processing method of the setting of terminal, device and terminal | |
CN104410754B (en) | The theft preventing method of mobile terminal and there is the mobile terminal of anti-theft feature |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20180703 |
|
WD01 | Invention patent application deemed withdrawn after publication |