CN108712567A - Theft preventing method, mobile terminal and the computer readable storage medium of mobile terminal - Google Patents

Theft preventing method, mobile terminal and the computer readable storage medium of mobile terminal Download PDF

Info

Publication number
CN108712567A
CN108712567A CN201810396417.2A CN201810396417A CN108712567A CN 108712567 A CN108712567 A CN 108712567A CN 201810396417 A CN201810396417 A CN 201810396417A CN 108712567 A CN108712567 A CN 108712567A
Authority
CN
China
Prior art keywords
mobile terminal
user
change
preventing method
theft preventing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810396417.2A
Other languages
Chinese (zh)
Inventor
李春宝
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201810396417.2A priority Critical patent/CN108712567A/en
Publication of CN108712567A publication Critical patent/CN108712567A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/535Tracking the activity of the user
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72418User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services
    • H04M1/72421User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services with automatic activation of emergency service functions, e.g. upon sensing an alarm
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/7243User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages
    • H04M1/72439User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages for image or video messaging
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72454User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72484User interfaces specially adapted for cordless or mobile telephones wherein functions are triggered by incoming communication events
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • H04W8/24Transfer of terminal data

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Databases & Information Systems (AREA)
  • Environmental & Geological Engineering (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Multimedia (AREA)
  • General Business, Economics & Management (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of theft preventing methods of mobile terminal, are applied to mobile terminal, the mobile terminal includes normal system and security system, and the theft preventing method of the mobile terminal includes:When the mobile terminal is run with the normal system, when monitoring that unlock errors number reaches preset times, unlocks the mobile terminal and the normal system is switched into the security system;The operation that the mobile terminal is monitored by the security system generates corresponding operation information according to the operation and stores;When receive user triggering when giving instruction for change, by the operation information be sent to it is corresponding give terminal for change so that user gives the mobile terminal for change according to the operation information.The invention also discloses a kind of mobile terminal and computer readable storage mediums.The present invention can improve the probability of giving for change of stolen mobile terminal, reduce user's loss.

Description

Theft preventing method, mobile terminal and the computer readable storage medium of mobile terminal
Technical field
The present invention relates to the theft preventing method of technical field of mobile terminals more particularly to mobile terminal, mobile terminal and calculating Machine readable storage medium storing program for executing.
Background technology
With the development of electronics and mechanics of communication, the mobile terminals such as smart mobile phone and tablet computer are more and more common, in people Live in role it is also more and more important.In daily life, people usually get used to carrying out using smart mobile phone Net, electronic communication and payment etc., in addition, also usually by the personal information storage of a large amount of preciousnesses in the terminal, such as communicate Record, photo, video, schedule or even network account, Bank Account Number and password etc..Once mobile phone is lost or stolen, except giving Outside user causes any property loss, the loss of the personal information such as Bank Account Number and password and leakage can also bring user and be difficult to estimate Loss.Therefore, the anti-theft measure of mobile terminal is essential.
In real life, the case where often will appear hand-set from stolen.The mobile phone of many brands, which has been provided with, at present gives work(for change Can, when terminal detects the multiple input error of password, then judges the hand-set from stolen, mobile phone can be locked at this time, and position is believed The information such as breath or the image of thief are sent to default binding terminal so that user is tracked.However, according to location information into Row tracking, help is very limited, and the information such as image of thief are also likely to be wrong, it is often more important that, theft Person would generally at this time will be unable to get stolen mobile phone again because of that can not unlock using the mobile phone and using the means of strong brush-making machine Any information so that mobile phone can not again be given for change.Therefore, exist in the prior art mobile terminal it is stolen after, give probability for change Relatively low technical problem.
Invention content
It is a primary object of the present invention to propose a kind of theft preventing method of mobile terminal, mobile terminal and computer-readable deposit Storage media, it is intended to improve the probability of giving for change of stolen mobile terminal, reduce user's loss.
To achieve the above object, the present invention provides a kind of theft preventing method of mobile terminal, is applied to mobile terminal, the shifting Dynamic terminal includes normal system and security system, and the theft preventing method of the mobile terminal includes:
When the mobile terminal is run with the normal system, when monitoring that unlock errors number reaches preset times, It unlocks the mobile terminal and the normal system is switched into the security system;
The operation that the mobile terminal is monitored by the security system generates corresponding operation information according to the operation And it stores;
When receive user triggering when giving instruction for change, by the operation information be sent to it is corresponding give terminal for change so that It obtains user and the mobile terminal is given for change according to the operation information.
Optionally, the theft preventing method of the mobile terminal further includes:
The user data in the normal system is preserved, and the user data synchronization is preserved to cloud server.
Optionally, the theft preventing method of the mobile terminal further includes:
When the self-defined request of the security system for receiving user's triggering, corresponding security system defined interface is shown, The security system defined interface includes list of application and hiding list;
It receives user and instruction is hidden based on the application that the list of application and hiding list trigger, and is hidden according to the application It hides instruction and adjusts the dispaly state applied in the security system.
Optionally, the mobile terminal further includes with front camera, the theft preventing method of the mobile terminal:
Start the front camera to be shot, to obtain the image of thief;
It is described when receive user triggering when giving instruction for change, by the operation information be sent to it is corresponding give terminal for change, So that user includes the step of giving the mobile terminal for change according to the operation information:
When receiving when giving instruction for change of user's triggering, the image of the operation information and thief is sent to corresponding Terminal is given for change, so that user gives the mobile terminal for change according to the image of the operation information and thief.
Optionally, start the front camera to be shot, the step of image to obtain thief, including:
Start the front camera to be shot to obtain image, and identifies in described image and believe with the presence or absence of face Breath;
If so, described image to be denoted as to the image of thief;
If it is not, then executing step after being separated by preset time:Start the front camera to be shot to obtain image, And it identifies and whether there is face information in described image.
Optionally, described when receiving when giving instruction for change of user's triggering, the operation information is sent to corresponding look for Terminal is returned, so that the step of user gives the mobile terminal for change according to the operation information, including:
When receive user triggering when giving instruction for change, according to it is described give for change instruction user identity is verified;
If verify it is correct, by the operation information be sent to it is corresponding give terminal for change so that user is according to the operation Information gives the mobile terminal for change.
Optionally, the operation information includes one in location information, SIM card information, message registration information, photographic intelligence Kind is a variety of.
Optionally, the theft preventing method of the mobile terminal further includes:
After giving the mobile terminal for change, when receiving the system switching command of user's triggering, by the security system Switch to the normal system.
In addition, to achieve the above object, the present invention also provides a kind of mobile terminal, the mobile terminal includes security system And normal system, further include memory, processor and is stored in the shifting that can be run on the memory and on the processor The anti-theft program of dynamic terminal is realized as described above mobile whole when the anti-theft program of the mobile terminal is executed by the processor The step of theft preventing method at end.
In addition, to achieve the above object, it is described computer-readable the present invention also provides a kind of computer readable storage medium It is stored with the anti-theft program of mobile terminal on storage medium, is realized such as when the anti-theft program of the mobile terminal is executed by processor The step of theft preventing method of the upper mobile terminal.
The present invention provides a kind of theft preventing method of mobile terminal, and this method is applied to mobile terminal, which is double System, including normal system and security system, in the normal system, the application of mobile terminal, information can all be shown, be used for The daily normal use of user, and in security system, the application of part need for confidentiality and information have been hidden.Mobile terminal is with normal When system operation, when monitoring that unlock errors number reaches preset times, then judge that the mobile terminal is stolen, unlock at this time should Normal system is simultaneously switched to security system by mobile terminal, i.e., by preset times when the password that inputs be set as security system Unlocking pin allows thief to be mistakenly considered oneself and successfully unlocks, and then is continuing with the mobile terminal, is then safely by this The further acquisition thief operation information on mobile terminals of system, for user give for change the mobile terminal provide more information with Clue.When receive user triggering when giving instruction for change, then by the operation information of acquisition be sent to it is corresponding give terminal for change so that It obtains user and gives the mobile terminal for change according to these operation informations.The present invention is by allowing thief to be mistakenly considered to have obtained mobile terminal Unlocking pin avoids it from using the means of strong brush-making machine to mobile terminal, and then acquires the operation of thief on mobile terminals Information gives the mobile terminal for change for user and provides more information and clue, general to which giving for change for stolen mobile terminal can be improved Rate reduces user's loss.In addition, the present invention improves the safety of user information in mobile terminal by setting security system, Avoid the leakage of user's important information.
Description of the drawings
Fig. 1 is the terminal structure schematic diagram for the hardware running environment that the embodiment of the present invention is related to;
Fig. 2 is a kind of communications network system Organization Chart provided in an embodiment of the present invention;
Fig. 3 is the flow diagram of the theft preventing method first embodiment of mobile terminal of the present invention;
Fig. 4 is a schematic diagram of the security system defined interface that the embodiment of the present invention is related to;
Fig. 5 is the flow diagram of the theft preventing method second embodiment of mobile terminal of the present invention;
Fig. 6 is the flow diagram of the theft preventing method 3rd embodiment of mobile terminal of the present invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific implementation mode
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In subsequent description, using for indicating that the suffix of such as " module ", " component " or " unit " of element is only The explanation for being conducive to the present invention, itself does not have a specific meaning.Therefore, " module ", " component " or " unit " can mix Ground uses.
Terminal can be implemented in a variety of manners.For example, terminal described in the present invention may include such as mobile phone, tablet Computer, laptop, palm PC, personal digital assistant (Personal Digital Assistant, PDA), portable The shiftings such as media player (Portable Media Player, PMP), navigation device, wearable device, Intelligent bracelet, pedometer The fixed terminals such as dynamic terminal, and number TV, desktop computer.
It will be illustrated by taking mobile terminal as an example in subsequent descriptions, it will be appreciated by those skilled in the art that in addition to special Except element for moving purpose, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Referring to Fig. 1, Fig. 1 is the terminal structure schematic diagram for the hardware running environment that the embodiment of the present invention is related to, it should Mobile terminal 100 may include:RF (Radio Frequency, radio frequency) unit 101, Wi-Fi module 102, audio output unit 103, A/V (audio/video) input unit 104, sensor 105, display unit 106, user input unit 107, interface unit 108, the components such as memory 109, processor 110 and power supply 111.It will be understood by those skilled in the art that shown in Fig. 1 Mobile terminal structure does not constitute the restriction to mobile terminal, and mobile terminal may include components more more or fewer than diagram, Either combine certain components or different components arrangement.
The all parts of mobile terminal are specifically introduced with reference to Fig. 1:
Radio frequency unit 101 can be used for receiving and sending messages or communication process in, signal sends and receivees, specifically, by base station Downlink information receive after, to processor 110 handle;In addition, the data of uplink are sent to base station.In general, radio frequency unit 101 Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier, duplexer etc..In addition, penetrating Frequency unit 101 can also be communicated with network and other equipment by radio communication.Above-mentioned wireless communication can use any communication Standard or agreement, including but not limited to GSM (Global System of Mobile communication, global system for mobile telecommunications System), GPRS (General Packet Radio Service, general packet radio service), CDMA2000 (Code Division Multiple Access 2000, CDMA 2000), WCDMA (Wideband Code Division Multiple Access, wideband code division multiple access), TD-SCDMA (Time Division-Synchronous Code Division Multiple Access, TD SDMA), FDD-LTE (Frequency Division Duplexing-Long Term Evolution, frequency division duplex long term evolution) and TDD-LTE (Time Division Duplexing-Long Term Evolution, time division duplex long term evolution) etc..
Wi-Fi belongs to short range wireless transmission technology, and mobile terminal can help user to receive and dispatch by Wi-Fi module 102 Email, browsing webpage and access streaming video etc., it has provided wireless broadband internet to the user and has accessed.Although Fig. 1 Show Wi-Fi module 102, but it is understood that, and it is not belonging to must be configured into for mobile terminal, it completely can basis It needs to omit in the range for the essence for not changing invention.
Audio output unit 103 can be in call signal reception pattern, call mode, record mould in mobile terminal 100 When under the isotypes such as formula, speech recognition mode, broadcast reception mode, it is that radio frequency unit 101 or Wi-Fi module 102 are received or The audio data that person stores in memory 109 is converted into audio signal and exports to be sound.Moreover, audio output unit 103 can also provide executed with mobile terminal 100 the relevant audio output of specific function (for example, call signal receive sound, Message sink sound etc.).Audio output unit 103 may include loud speaker, buzzer etc..
A/V input units 104 are for receiving audio or video signal.A/V input units 104 may include graphics processor (Graphics Processing Unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode Or the image data of the static images or video obtained by image capture apparatus (such as camera) in image capture mode carries out Reason.Treated, and picture frame may be displayed on display unit 106.Through graphics processor 1041, treated that picture frame can be deposited Storage is sent in memory 109 (or other storage mediums) or via radio frequency unit 101 or Wi-Fi module 102.Mike Wind 1042 can connect in telephone calling model, logging mode, speech recognition mode etc. operational mode via microphone 1042 Quiet down sound (audio data), and can be audio data by such acoustic processing.Audio that treated (voice) data can To be converted to the format output that can be sent to mobile communication base station via radio frequency unit 101 in the case of telephone calling model. Microphone 1042 can implement various types of noises elimination (or inhibition) algorithms and send and receive sound to eliminate (or inhibition) The noise generated during frequency signal or interference.
Mobile terminal 100 further includes at least one sensor 105, such as optical sensor, motion sensor and other biographies Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 1061, and proximity sensor can close when mobile terminal 100 is moved in one's ear Display panel 1061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (general For three axis) size of acceleration, size and the direction of gravity are can detect that when static, can be used to identify the application of mobile phone posture (such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.; The fingerprint sensor that can also configure as mobile phone, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, The other sensors such as hygrometer, thermometer, infrared sensor, details are not described herein.
Display unit 106 is for showing information input by user or being supplied to the information of user.Display unit 106 can wrap Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode may be used Forms such as (Organic Light-Emitting Diode, OLED) configure display panel 1061.
User input unit 107 can be used for receiving the number or character information of input, and generate the use with mobile terminal Family is arranged and the related key signals input of function control.Specifically, user input unit 107 may include touch panel 1071 with And other input equipments 1072.Touch panel 1071, also referred to as touch screen collect user on it or neighbouring touch operation (for example user uses any suitable objects or attachment such as finger, stylus on touch panel 1071 or in touch panel 1071 Neighbouring operation), and corresponding attachment device is driven according to preset formula.Touch panel 1071 may include touch detection Two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation band The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it It is converted into contact coordinate, then gives processor 110, and order that processor 110 is sent can be received and executed.In addition, can To realize touch panel 1071 using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves.In addition to touch panel 1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can wrap It includes but is not limited in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, operating lever etc. It is one or more, do not limit herein specifically.
Further, touch panel 1071 can cover display panel 1061, when touch panel 1071 detect on it or After neighbouring touch operation, processor 110 is sent to determine the type of touch event, is followed by subsequent processing device 110 according to touch thing The type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, touch panel 1071 and display panel 1061 be to realize the function that outputs and inputs of mobile terminal as two independent components, but in certain embodiments, can The function that outputs and inputs of mobile terminal is realized so that touch panel 1071 and display panel 1061 is integrated, is not done herein specifically It limits.
Interface unit 108 be used as at least one external device (ED) connect with mobile terminal 100 can by interface.For example, External device (ED) may include wired or wireless headphone port, external power supply (or battery charger) port, wired or nothing Line data port, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end Mouth, video i/o port, ear port etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, number It is believed that breath, electric power etc.) and the input received is transferred to one or more elements in mobile terminal 100 or can be with For the transmission data between mobile terminal 100 and external device (ED).
Memory 109 can be used for storing software program and various data.Memory 109 can include mainly storing program area And storage data field, wherein storing program area can storage program area, application program (such as the sound needed at least one function Sound playing function, image player function etc.) etc.;Storage data field can store according to mobile phone use created data (such as Audio data, phone directory etc.) etc..In addition, memory 109 may include high-speed random access memory, can also include non-easy The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of mobile terminal, utilizes each of various interfaces and the entire mobile terminal of connection A part by running or execute the software program and/or module that are stored in memory 109, and calls and is stored in storage Data in device 109 execute the various functions and processing data of mobile terminal, to carry out integral monitoring to mobile terminal.Place Reason device 110 may include one or more processing units;Preferably, processor 110 can integrate application processor and modulatedemodulate is mediated Manage device, wherein the main processing operation system of application processor, user interface and application program etc., modem processor is main Processing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
Mobile terminal 100 can also include the power supply 111 (such as battery) powered to all parts, it is preferred that power supply 111 Can be logically contiguous by power-supply management system and processor 110, to realize management charging by power-supply management system, put The functions such as electricity and power managed.
Although Fig. 1 is not shown, mobile terminal 100 can also be including bluetooth module etc., and details are not described herein.
Embodiment to facilitate the understanding of the present invention, below to the communications network system that is based on of mobile terminal of the present invention into Row description.
Referring to Fig. 2, Fig. 2 is a kind of communications network system Organization Chart provided in an embodiment of the present invention, the communication network system System is the LTE system of universal mobile communications technology, which includes communicating UE (User Equipment, the use of connection successively Family equipment) (the lands Evolved UMTS Terrestrial Radio Access Network, evolved UMTS 201, E-UTRAN Ground wireless access network) 202, EPC (Evolved Packet Core, evolved packet-based core networks) 203 and operator IP operation 204。
Specifically, UE201 can be above-mentioned terminal 100, and details are not described herein again.
E-UTRAN202 includes eNodeB2021 and other eNodeB2022 etc..Wherein, eNodeB2021 can be by returning Journey (backhaul) (such as X2 interface) is connect with other eNodeB2022, and eNodeB2021 is connected to EPC203, ENodeB2021 can provide the access of UE201 to EPC203.
EPC203 may include MME (Mobility Management Entity, mobility management entity) 2031, HSS (Home Subscriber Server, home subscriber server) 2032, other MME2033, SGW (Serving Gate Way, Gateway) 2034, PGW (PDN Gate Way, grouped data network gateway) 2035 and PCRF (Policy and Charging Rules Function, policy and rate functional entity) 2036 etc..Wherein, MME2031 be processing UE201 and The control node of signaling, provides carrying and connection management between EPC203.HSS2032 is all to manage for providing some registers Such as the function of home location register (not shown) etc, and some are preserved in relation to use such as service features, data rates The dedicated information in family.All customer data can be sent by SGW2034, and PGW2035 can provide the IP of UE 201 Address is distributed and other functions, and PCRF2036 is strategy and the charging control strategic decision-making of business data flow and IP bearing resources Point, it selects and provides available strategy and charging control decision with charge execution function unit (not shown) for strategy.
IP operation 204 may include internet, Intranet, IMS (IP Multimedia Subsystem, IP multimedia System) or other IP operations etc..
Although above-mentioned be described by taking LTE system as an example, those skilled in the art it is to be understood that the present invention not only Suitable for LTE system, be readily applicable to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA with And the following new network system etc., it does not limit herein.
Based on above-mentioned mobile terminal hardware configuration and communications network system, the theft preventing method of mobile terminal of the present invention is proposed Each embodiment.
The present invention provides a kind of theft preventing method of mobile terminal.
Referring to Fig. 3, Fig. 3 is the flow diagram of the theft preventing method first embodiment of mobile terminal of the present invention, the movement The theft preventing method of terminal is applied to mobile terminal, which includes normal system and security system, and this method includes:
Step S10, when the mobile terminal is run with the normal system, when monitor unlock errors number reach default When number, unlocks the mobile terminal and the normal system is switched into the security system;
In the present embodiment, the theft preventing method of the mobile terminal is applied to mobile terminal, which is dual system, packet Include normal system and security system.Wherein, normal system is used for the daily normal use of user, mobile whole in the normal system The application at end, information can all be shown, without hiding.And in security system, the application of part need for confidentiality and information are hidden It hides, is checked for lending other people in use, can avoid some privacies, to protect the privacy of user, while is also prevented from mobile whole When end is stolen, thief using certain applications carries out the publication of fallacious message or steals wealth in certain applications, information.
Wherein, security system can be configured by User Defined, and user can select to need hidden according to own situation The application of Tibetan and information etc. can promote the experience of user.
Specifically, before step S10, this method is further comprising the steps of:
When the self-defined request of the security system for receiving user's triggering, corresponding security system defined interface is shown, The security system defined interface includes list of application and hiding list;
It receives user and instruction is hidden based on the application that the list of application and hiding list trigger, and is hidden according to the application It hides instruction and adjusts the dispaly state applied in the security system.
This embodiment describes the processes of User Defined security system, specifically, being touched when mobile terminal receives user When the self-defined request of the security system of hair, corresponding security system defined interface is shown, the security system defined interface packet List of application and hiding list are included, as shown in figure 4, each application in mobile terminal is enumerated in list of application, with word Form is shown, certainly, can also be shown in the form of icon in a particular embodiment.As an embodiment, in Fig. 4 Shown in hiding list include using hide, account/password hide and apply inside points three options of Information hiding, wherein answering The application is hidden with hiding refer to, is not shown on the interface of mobile terminal;Account/password, which is hidden, to be referred in interface of mobile terminal It shows the application, but removes corresponding account and password;Refer to the part letter hidden in the application using inside points Information hiding Breath, such as the Part of photos taken in photograph album is hidden, hide the part record in memorandum.
List of application and hiding list trigger in mobile terminal receives user based on the security system defined interface When using hiding instruction, the dispaly state applied in instruction adjustment security system is hidden according to the application so that mobile terminal exists When entering security system, shown according to user-defined state.Specifically, the triggering scene packet of instruction is hidden in application It includes but is not limited to following two:1) user can click some option in hiding list, such as application is hidden, and is then chosen The application chosen is synchronized to using under the hiding option by the application in list of application at this time;2) user is operated by multi-touch (such as touch and draw), the application in list of application is dragged in hiding list under a certain option.It should be noted that working as Inside points Information hiding is applied in user's selection, and then selection the interior of the application occurs in application, using will appear drop-down menu Hold, for example, in photograph album this application, each photo in sub- photograph album or photograph album can occur, need for selection by the user Hiding partial content.Certainly, certain applications can not hidden parts content when, user can be prompted.
In addition, as the customized another scene of security system, it can only include and answer in the security system defined interface With list or hiding list.For example, security system defined interface can only include list of application, user clicks in list of application A certain application after, the hiding type of the application can be set.For another example security system defined interface can only include it is hiding List can add corresponding application after user clicks a certain option in hiding list under the option.
In the present embodiment, it is right when receiving unlocking pin input by user when mobile terminal is run with normal system The unlocking pin is verified, and verifies whether unlocking pin input by user is default unlocking pin, wherein unlock form can be with For number unlock, pattern unlock.If unlocking pin input by user is default unlocking pin, judge that the terminal is not stolen, The mobile terminal is unlocked at this time with for users to use;If unlocking pin input by user is not default unlocking pin, prompt to use Family continues to input, and monitors whether unlocking pin errors number reaches preset times, if monitoring, unlock errors number reaches pre- If number (such as 5 times), then judges that the mobile terminal is stolen, unlock the mobile terminal at this time and normal system is switched into safe system System, it is corresponding by preset times when the password password of input (such as the 5th) that inputs be set as the unlocking pin of security system, i.e., It allows thief to be mistakenly considered oneself successfully to unlock, loses vigilance and be continuing with the mobile terminal, also avoid thief to movement Terminal uses the means of strong brush-making machine, convenient for the further operation information of acquisition thief on mobile terminals, is given for change for user The mobile terminal provides more information and clue.
It should be noted that avoid user data from revealing and lose, the privacy of user is protected, while giving for change convenient for user The theft preventing method of data in normal system, the mobile terminal further includes:
The user data in the normal system is preserved, and the user data synchronization is preserved to cloud server.
In the present embodiment, after the system of mobile terminal switches to security system, mobile terminal backstage can be protected automatically The user data in normal system is deposited, and these user data synchronizations are preserved to cloud server so that user loses in mobile phone After mistake, the user data in normal system can also be given for change by the cloud server, so as to avoid the leakage of user data And loss, ensure the personal secrets of user.Certainly, user data is preserved to cloud server, can sets and deletes automatically Except user data.
Step S20 monitors the operation of the mobile terminal by the security system, is generated according to the operation corresponding Operation information simultaneously stores;
After the system of mobile terminal switches to security system, the operation of mobile terminal can be monitored by the security system, And corresponding operation is generated according to the operation and is stored, that is, acquire operation information of the thief on the mobile terminal, wherein behaviour Include one or more of location information, SIM card information, message registration information, photographic intelligence, certainly, operation as information Information is not limited to above- mentioned information.It should be noted that in the present embodiment, operation information can be stored in a certain default position It sets, secret preserves.In a particular embodiment, cloud server can also be sent to or cloud Dropbox is stored.
The operation information is sent to when receiving when giving instruction for change of user's triggering and corresponding gives end for change by step S30 End, so that user gives the mobile terminal for change according to the operation information.
After the system of mobile terminal is switched to security system, the operation information of mobile terminal is obtained, is then supervised in real time Whether survey receives and gives instruction for change, when receiving that user triggers when giving instruction for change, is then sent to the operation information of collection pair That answers gives terminal for change, so that user gives the mobile terminal for change according to these operation informations.Wherein, the triggering mode of instruction is given for change It can include but is not limited to following scenario described:1) by " giving for change " function in same brand mobile terminal, stolen mobile terminal is inputted Information;2) the corresponding website of the mobile terminal logs in start after the account of oneself and gives service for change;3) antitheft software is used, it is defeated Enter the information of stolen mobile terminal.Wherein, the information of stolen mobile terminal may include brand and model, the networking of mobile terminal (International Mobile Equipment Identity, international mobile equipment identification number are commonly called as license number, IMEI code Mobile phone string number, mobile phone string code, handset serial), SIM card card number etc..In addition, when inputting the information of stolen mobile terminal, also It can input the personal information of user, such as identification card number, name, give password for change etc..In addition, it is user hair to give terminal for change It rises and gives terminal used in instruction for change, can be mobile phone, tablet computer, laptop, palm PC etc..Certainly, specific In embodiment, instruction can also be given for change according to this and be sent to operation information in the mailbox or other application that user specifies so that User is checked by mailbox or other application.
Certainly, to avoid certain people's mischiefs, or the operation information of mobile terminal is stolen whereby, in specific embodiment In, the identity of user's (initiating to give the people of instruction for change) can also be verified, to ensure that the people for initiating to give instruction for change is to lose The people of main or owner of lost property commission.
Specifically, step S30 may include:
Step S31 gives instruction for change to user identity progress core when receiving when giving instruction for change of user's triggering according to described It is real;
Step S32, if verify it is correct, by the operation information be sent to it is corresponding give terminal for change so that user according to The operation information gives the mobile terminal for change.
In the present embodiment, it when receiving when giving instruction for change of user's triggering, is given for change according to this input by user in instructing Information verifies user identity, wherein gives the letter that information input by user in instruction may include stolen mobile terminal for change It ceases, the personal information of user, wherein the information of stolen mobile terminal may include that the brand of mobile terminal and model, networking are permitted Can number, IMEI code, SIM card card number etc., the personal information of user may include identification card number, name, give password for change etc..To with When family identity is verified, it can check and be filled out during this gives the userspersonal information in instruction and user's registration mobile terminal for change Whether the userspersonal information write is consistent, can also check that this is given for change in instruction and give whether password gives password for change with preset for change Unanimously, if it is consistent, that is, when verifying correct, by the operation information be sent to it is corresponding give terminal for change so that user's root The mobile terminal is given for change according to these operation informations.
The present invention provides a kind of theft preventing method of mobile terminal, and this method is applied to mobile terminal, which is double System, including normal system and security system, in the normal system, the application of mobile terminal, information can all be shown, be used for The daily normal use of user, and in security system, the application of part need for confidentiality and information have been hidden.Mobile terminal is with normal When system operation, when monitoring that unlock errors number reaches preset times, then judge that the mobile terminal is stolen, unlock at this time should Normal system is simultaneously switched to security system by mobile terminal, i.e., by preset times when the password that inputs be set as security system Unlocking pin allows thief to be mistakenly considered oneself and successfully unlocks, and then is continuing with the mobile terminal, is then safely by this The further acquisition thief operation information on mobile terminals of system, for user give for change the mobile terminal provide more information with Clue.When receive user triggering when giving instruction for change, then by the operation information of acquisition be sent to it is corresponding give terminal for change so that It obtains user and gives the mobile terminal for change according to these operation informations.The present invention is by allowing thief to be mistakenly considered to have obtained mobile terminal Unlocking pin avoids it from using the means of strong brush-making machine to mobile terminal, and then acquires the operation of thief on mobile terminals Information gives the mobile terminal for change for user and provides more information and clue, general to which giving for change for stolen mobile terminal can be improved Rate reduces user's loss.In addition, the present invention improves the safety of user information in mobile terminal by setting security system, Avoid the leakage of user's important information.
Further, it is the flow diagram of the theft preventing method second embodiment of mobile terminal of the present invention with reference to Fig. 5, Fig. 5. Based on above-mentioned first embodiment shown in Fig. 3, the theft preventing method of the mobile terminal can also include:
Step S40 starts the front camera and is shot, to obtain the image of thief;
In the present embodiment, step S40 " unlocks the mobile terminal and switches to the normal system described with step The execution of security system " is in no particular order.Mobile terminal is when monitoring that unlock errors number reaches preset times (such as 5 times), then Judge that the mobile terminal is stolen, unlocks the mobile terminal and normal system is switched to security system at this time, hence into peace Total system.Meanwhile starting the front camera and being shot, to obtain the image of thief, to help user giving for change Thief is further confirmed that according to the image of thief during mobile phone, it is general to which giving for change for stolen mobile terminal can be improved Rate.In addition, in a particular embodiment, rear camera can also be started and shot to ambient enviroment, to obtain more letters Breath is given for change for user.It should be noted that the image that shooting obtains is stored in a specific position, not in photograph album It has been shown that, and flash of light, shooting sound are automatically closed when shooting etc., in order to avoid cause the attention of thief.
Include face information in image to confirm the thief, consequently facilitating user confirms robber during getting back mobile phone Surreptitiously, the probability of giving for change of stolen mobile terminal is improved, step S40 may include:
Step S41 starts the front camera and is shot to obtain image, and identifies in described image and whether there is Face information;
Step S42, if so, described image to be denoted as to the image of thief;
Step S43, if it is not, then executing step S41 after being separated by preset time:Start the front camera to be shot To obtain image, and identifies and whether there is face information in described image.
In the present embodiment, mobile terminal then judges when monitoring that unlock errors number reaches preset times (such as 5 times) Whether the mobile terminal is stolen, start the front camera at this time and shot to obtain image, and identify in the image and deposit In face information, if there are face informations in the image, which is denoted as to the image of thief, and store, to Receive give instruction for change when, the image of the thief and operation information are sent jointly to corresponding to give terminal for change.If the figure Face information is not present as in, then continues startup front camera after being separated by preset time and is shot to obtain image, and It identifies and whether there is face information in image, until there are face informations in captured image, that is, get the figure of thief Picture.
At this point, step S30 may include:
Step S33 sends the image of the operation information and thief when receiving when giving instruction for change of user's triggering Terminal is given for change to corresponding, so that user gives the mobile terminal for change according to the image of the operation information and thief.
In the present embodiment, it when the image of acquisition for mobile terminal to thief, and after collecting operation information, is receiving To when giving instruction for change, mobile terminal by the image of operation information and thief be sent to it is corresponding give terminal for change so that giving for change Terminal gives the mobile terminal for change according to the image of the operation information and thief, can be true by operation information in the present embodiment Determine the approximate location of thief, thief is then further confirmed that according to the image of thief, it is stolen mobile whole to can be improved Give probability for change in end.
Further, it is the flow diagram of the theft preventing method 3rd embodiment of mobile terminal of the present invention with reference to Fig. 6, Fig. 6. Based on above-mentioned first embodiment shown in Fig. 3 and second embodiment shown in fig. 5, after step S30, which prevents Robber's method can also include:
Step S50, will be described when receiving the system switching command of user's triggering after giving the mobile terminal for change Security system switches to the normal system.
In the present embodiment, it after user gives mobile terminal for change, when user wants to convert to normal system operation, can touch The security system is switched to normal system by hair system switching command when mobile terminal receives the system switching command.Tool Body, the triggering mode of system switching command can be:The position of a certain specific secret of mobile terminal is provided with system switching Option, clicking corresponding normal system and switching to the option of security system can switch over, and behaviour is slided it is, of course, also possible to pass through It switches over, for example, slide position is slid into from security system at normal system.In addition, to improve safety, in order to avoid Thief has found that the option voluntarily switches over, and after receiving the system switching command, mobile terminal can also be to user's body Part is verified, for example, user can be prompted to input verification password, then by judging verification password input by user and presetting Whether system switching cipher unanimously determines whether carry out system handover operation, can also by the technological means such as recognition of face come Determine user identity.
It should be noted that if in above-described embodiment, preserve to cloud server, deletes by user data synchronization User data in mobile terminal, at this point, in the present embodiment mobile terminal receive user triggering system switching command when, Can user data be obtained from cloud server automatically, and security system is switched into normal system.
The present invention also provides a kind of mobile terminal, which includes normal system and security system, further includes storage Device, processor and the anti-theft program for being stored in the mobile terminal that can be run on the memory and on the processor, it is described The anti-of the mobile terminal as described in any of the above item embodiment is realized when the anti-theft program of mobile terminal is executed by the processor The step of robber's method.
The specific embodiment of mobile terminal of the present invention and each embodiment of theft preventing method of above-mentioned mobile terminal are essentially identical, This is not repeated.
The present invention also provides a kind of computer readable storage mediums.
Be stored with the anti-theft program of mobile terminal on computer readable storage medium of the present invention, the mobile terminal it is antitheft The step of theft preventing method of the mobile terminal as described in any of the above item embodiment is realized when program is executed by processor.
The specific embodiment of computer readable storage medium of the present invention and the basic phase of each embodiment of above-mentioned video broadcasting method Together, therefore not to repeat here.
It should be noted that herein, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that process, method, article or device including a series of elements include not only those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including this There is also other identical elements in the process of element, method, article or device.
The embodiments of the present invention are for illustration only, can not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical scheme of the present invention substantially in other words does the prior art Going out the part of contribution can be expressed in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), including some instructions are used so that a station terminal (can be mobile phone, computer, service Device or the network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited in above-mentioned specific Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much Form, all of these belong to the protection of the present invention.

Claims (10)

1. a kind of theft preventing method of mobile terminal, which is characterized in that be applied to mobile terminal, the mobile terminal includes normal system System and security system, the theft preventing method of the mobile terminal include the following steps:
When the mobile terminal is run with the normal system, when monitoring that unlock errors number reaches preset times, unlock The normal system is simultaneously switched to the security system by the mobile terminal;
The operation that the mobile terminal is monitored by the security system generates corresponding operation information according to the operation and deposits Storage;
When receive user triggering when giving instruction for change, by the operation information be sent to it is corresponding give terminal for change so that handy Family the mobile terminal is given for change according to the operation information.
2. the theft preventing method of mobile terminal as described in claim 1, which is characterized in that the theft preventing method of the mobile terminal is also Including:
The user data in the normal system is preserved, and the user data synchronization is preserved to cloud server.
3. the theft preventing method of mobile terminal as described in claim 1, which is characterized in that the theft preventing method of the mobile terminal is also Including:
When the self-defined request of the security system for receiving user's triggering, corresponding security system defined interface is shown, it is described Security system defined interface includes list of application and hiding list;
It receives user and instruction is hidden based on the application that the list of application and hiding list trigger, and hidden and referred to according to the application Enable the dispaly state for adjusting and being applied in the security system.
4. the theft preventing method of mobile terminal as described in claim 1, which is characterized in that the mobile terminal has preposition camera shooting The theft preventing method of head, the mobile terminal further includes:
Start the front camera to be shot, to obtain the image of thief;
It is described when receive user triggering when giving instruction for change, by the operation information be sent to it is corresponding give terminal for change so that Obtaining the step of user gives the mobile terminal for change according to the operation information includes:
When receiving when giving instruction for change of user's triggering, the image of the operation information and thief is sent to corresponding give for change Terminal, so that user gives the mobile terminal for change according to the image of the operation information and thief.
5. the theft preventing method of mobile terminal as claimed in claim 4, which is characterized in that start the front camera and clapped It takes the photograph, the step of image to obtain thief, including:
Start the front camera to be shot to obtain image, and identifies and whether there is face information in described image;
If so, described image to be denoted as to the image of thief;
If it is not, then executing step after being separated by preset time:Start the front camera to be shot to obtain image, and knows It whether there is face information in other described image.
6. the theft preventing method of mobile terminal as described in claim 1, which is characterized in that described to receive looking for for user's triggering When referring to enable, by the operation information be sent to it is corresponding give terminal for change so that user gives institute for change according to the operation information The step of stating mobile terminal, including:
When receive user triggering when giving instruction for change, according to it is described give for change instruction user identity is verified;
If verify it is correct, by the operation information be sent to it is corresponding give terminal for change so that user is according to the operation information Give the mobile terminal for change.
7. the theft preventing method of the mobile terminal as described in any one of claim 1-6, which is characterized in that the operation information packet Include one or more of location information, SIM card information, message registration information, photographic intelligence.
8. the theft preventing method of the mobile terminal as described in any one of claim 1-6, which is characterized in that the mobile terminal Theft preventing method further includes:
After giving the mobile terminal for change, when receiving the system switching command of user's triggering, the security system is switched At the normal system.
9. a kind of mobile terminal, which is characterized in that the mobile terminal includes security system and normal system, further includes storage Device, processor and the anti-theft program for being stored in the mobile terminal that can be run on the memory and on the processor, it is described Such as mobile terminal described in any item of the claim 1 to 8 is realized when the anti-theft program of mobile terminal is executed by the processor Theft preventing method the step of.
10. a kind of computer readable storage medium, which is characterized in that be stored on the computer readable storage medium mobile whole It is realized such as any one of claim 1 to 8 institute when the anti-theft program of the anti-theft program at end, the mobile terminal is executed by processor The step of theft preventing method for the mobile terminal stated.
CN201810396417.2A 2018-04-27 2018-04-27 Theft preventing method, mobile terminal and the computer readable storage medium of mobile terminal Pending CN108712567A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810396417.2A CN108712567A (en) 2018-04-27 2018-04-27 Theft preventing method, mobile terminal and the computer readable storage medium of mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810396417.2A CN108712567A (en) 2018-04-27 2018-04-27 Theft preventing method, mobile terminal and the computer readable storage medium of mobile terminal

Publications (1)

Publication Number Publication Date
CN108712567A true CN108712567A (en) 2018-10-26

Family

ID=63867644

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810396417.2A Pending CN108712567A (en) 2018-04-27 2018-04-27 Theft preventing method, mobile terminal and the computer readable storage medium of mobile terminal

Country Status (1)

Country Link
CN (1) CN108712567A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110290270A (en) * 2019-06-27 2019-09-27 维沃移动通信有限公司 Theft preventing method and mobile terminal
CN112489339A (en) * 2020-11-25 2021-03-12 努比亚技术有限公司 Anti-theft alarm control method, equipment and computer readable storage medium
CN113158749A (en) * 2021-02-03 2021-07-23 马广奇 Emergency processing system for lost scene of handheld device
CN115103055A (en) * 2022-06-17 2022-09-23 度小满科技(北京)有限公司 Loss processing method and device, mobile terminal and readable storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150371320A1 (en) * 2014-06-23 2015-12-24 Wal-Mart Stores, Inc. Mobile-computing-device-securement apparatus and method
CN106791176A (en) * 2017-01-16 2017-05-31 北京奇虎科技有限公司 A kind of anti-theft method for mobile terminal, device and mobile terminal
CN106878554A (en) * 2017-02-10 2017-06-20 北京奇虎科技有限公司 A kind of theft preventing method of mobile terminal, device and mobile terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150371320A1 (en) * 2014-06-23 2015-12-24 Wal-Mart Stores, Inc. Mobile-computing-device-securement apparatus and method
CN106791176A (en) * 2017-01-16 2017-05-31 北京奇虎科技有限公司 A kind of anti-theft method for mobile terminal, device and mobile terminal
CN106878554A (en) * 2017-02-10 2017-06-20 北京奇虎科技有限公司 A kind of theft preventing method of mobile terminal, device and mobile terminal

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110290270A (en) * 2019-06-27 2019-09-27 维沃移动通信有限公司 Theft preventing method and mobile terminal
CN110290270B (en) * 2019-06-27 2022-01-07 维沃移动通信有限公司 Anti-theft method and mobile terminal
CN112489339A (en) * 2020-11-25 2021-03-12 努比亚技术有限公司 Anti-theft alarm control method, equipment and computer readable storage medium
CN113158749A (en) * 2021-02-03 2021-07-23 马广奇 Emergency processing system for lost scene of handheld device
CN115103055A (en) * 2022-06-17 2022-09-23 度小满科技(北京)有限公司 Loss processing method and device, mobile terminal and readable storage medium
CN115103055B (en) * 2022-06-17 2023-10-03 度小满科技(北京)有限公司 Loss processing method, loss processing device, mobile terminal and readable storage medium

Similar Documents

Publication Publication Date Title
CN108289141A (en) A kind of the screen locking unlocking method and mobile terminal of mobile terminal
CN107194291A (en) Anti-theft method for mobile terminal, mobile terminal and computer-readable recording medium
CN108171037A (en) Using startup method, terminal and computer storage media
CN108712567A (en) Theft preventing method, mobile terminal and the computer readable storage medium of mobile terminal
CN107315937A (en) A kind of method for secret protection, mobile terminal and computer-readable recording medium
CN109033779A (en) A kind of unlock authentication method, wearable device and computer readable storage medium
CN109558718A (en) Application program login method, computer end, mobile terminal, system and storage medium
CN107395850A (en) A kind of social communication information guard method, device and computer-readable recording medium
CN107862196A (en) Fingerprint verification method, mobile terminal and computer-readable recording medium
CN109522695A (en) Application program login method, computer end, mobile terminal, system and storage medium
CN108062489A (en) A kind of glance prevention method, terminal and computer readable storage medium
CN108197441A (en) Flexible screen terminal and its solution lock control method, computer readable storage medium
CN108052845A (en) file display control method, terminal and computer readable storage medium
CN106878554A (en) A kind of theft preventing method of mobile terminal, device and mobile terminal
CN108961489A (en) A kind of equipment wearing control method, terminal and computer readable storage medium
CN109670287A (en) Intelligent terminal unlocking method, intelligent terminal and computer readable storage medium
CN108063873A (en) A kind of application program authority configuring method, mobile terminal and storage medium
CN108985047A (en) A kind of unlocking method, terminal, wearable device and computer readable storage medium
CN108563959A (en) File encrypting method, device and computer storage media
CN110032887A (en) A kind of picture method for secret protection, terminal and computer readable storage medium
CN108197560A (en) Facial image recognition method, mobile terminal and computer readable storage medium
CN108363479A (en) A kind of terminal display screen control method, terminal and computer readable storage medium
CN107330313A (en) Application control method, mobile terminal and readable storage medium storing program for executing
CN108111758A (en) A kind of shooting preview method, equipment and computer readable storage medium
CN107194217A (en) User data access control method, equipment and computer-readable recording medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181026

RJ01 Rejection of invention patent application after publication