CN109327807A - A kind of anti-theft method of mobile phone based on position big data information - Google Patents

A kind of anti-theft method of mobile phone based on position big data information Download PDF

Info

Publication number
CN109327807A
CN109327807A CN201811401769.9A CN201811401769A CN109327807A CN 109327807 A CN109327807 A CN 109327807A CN 201811401769 A CN201811401769 A CN 201811401769A CN 109327807 A CN109327807 A CN 109327807A
Authority
CN
China
Prior art keywords
user
area
mobile phone
authentication
big data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811401769.9A
Other languages
Chinese (zh)
Inventor
张鹏泉
褚孝鹏
朱爱微
赵辰
姜博畅
窦向会
王冬祥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin Optical Electrical Communication Technology Co Ltd
Original Assignee
Tianjin Optical Electrical Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin Optical Electrical Communication Technology Co Ltd filed Critical Tianjin Optical Electrical Communication Technology Co Ltd
Priority to CN201811401769.9A priority Critical patent/CN109327807A/en
Publication of CN109327807A publication Critical patent/CN109327807A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention provides a kind of anti-theft method of mobile phone based on position big data information, and process is as follows: 1) establishing basic database;According to the time span of user position, user location is divided into rotine position area_F, once in a while position area_O and suspected locations area_S;Wherein rotine position area_F is the most common position of user, degree of belief highest;Suspected locations area_S is the position that most seldom occurs of user even without the position gone, and degree of belief is minimum.2) user is monitored information setting;As input parameter, user is needed to set trusted distance, each region carries out the time interval of authentication, alarm contact method.3) position learning process.This method can be more intelligent and rapidly whether discovery terminal is stolen and can be stolen with real-time tracking the location information of terminal;Convenience is provided for user, and can effectively hit criminal.

Description

A kind of anti-theft method of mobile phone based on position big data information
Technical field
The present invention relates to field of communication technology more particularly to a kind of anti-theft method of mobile phone based on position big data information.
Background technique
Current most of mobile phone antitheft systems are all based on the modes such as fingerprint, SIM card replacement or antitheft card of mobile telephone to know Whether other mobile phone is stolen, if not operating to mobile phone, or shutdown, then cannot find hand-set from stolen in time.And it is general After being stolen, start calling station module just to track the location information of mobile phone, carry out stolen mobile phone positioning, there is stolen discovery Hysteresis quality.Discovery to keep mobile phone more intelligent is stolen behavior, and more rapidly positions stolen mobile phone position, grinds Sending out the anti-theft method of mobile phone based on position big data information a kind of is a urgent problem to be solved.
Summary of the invention
The invention solves the above technical problems, provide a kind of anti-theft method of mobile phone based on position big data information, lead to Overfitting counts mobile phone location data, to identify rotine position, once in a while position and the suspected locations of mobile phone, and then according to preparatory Setting carries out mobile phone alarm.
In order to solve the above technical problems, the technical solution adopted by the present invention is that:
A kind of anti-theft method of mobile phone based on position big data information, process are as follows:
1, basic database is established;
2, user is monitored information setting;
3, position learning process
1. detecting location information first, and basic database is called, checks whether to be new position, what new position here referred to It is the position outside cognitive domains deviation range.
2. then start timer if it is new position, before timer arrival or timer reach, Yong Hujin It has gone authentication (user inputs correct fingerprint or carried out correct solution screen operation), then timer stops and is zeroed.
3. prompting user to carry out authentication, (user inputs correct fingerprint or has carried out correct if timer overflows Solution screen operation).If being proved to be successful A times, which is added in position area_O once in a while.
4. otherwise entering verifying and alarm procedure.
5. it needs to carry out authentication according to presetting in position area_O once in a while, if being proved to be successful more than A times, Then the position is added in the area_F of rotine position, otherwise the position is eliminated in suspected locations area_S, is continued to execute 2. ~operation 4..
6. the position is eliminated in suspected locations area_S, is continued to execute if certain position is more than not update the C time 2.~operation 4..
7. it equally needs to need to carry out periodic authentication according to presetting in the area_F of rotine position, if It does not update, then eliminates the position in position area_O once in a while more than the C time, execute operation 5. 6..
Further, basic database process is established are as follows: according to the time span of user position, by user location point For rotine position area_F, position area_O and suspected locations area_S once in a while.Wherein rotine position area_F be user most The position often occurred, degree of belief highest.And suspected locations area_S is then the position that most seldom occurs of user even without going Position, degree of belief is minimum.
Further, in step 2, as input parameter, user is needed to set trusted distance (user's setting, default Value can set the empirical value of the scope of activities of user), i.e., (refer to rotine position area_F, once in a while position in each trust region Area_O and suspected locations area_S) deviation range x (can be using default setting as the empirical value of scope of activities);Each region The time interval of authentication is carried out, i.e. prompt user input carries out the time interval (default value of authentication in each region Can be set to 5min, that is, think that user continues on mobile phone with minute rank) area_F_t, area_O_t, area_S_t;Report Alert contact method, i.e., after authentication failure or repeatedly authentication time-out, mobile phone sends the collection of letters of warning message Side.
Further, the verifying and alarm procedure include user using in mobile phone solution screen (input correct password or Person's fingerprint) operation.If authentication failed N (is set, default value can be set to 3) secondary, then mobile phone is to emergency contact side according to user Formula sends warning message, and location information is sent to emergency contact by the period.
Further, parameter A/B/C/D/E can be arranged according to the characteristics of each region, it is desirable that D > A, i.e., more reliable Region, number can be verified and lack point.D is set according to user, general 1≤D≤3.
Further, parameter E≤C, i.e., in frequent region, updating position can be more more frequently.
Further, parameter A is set according to user, general 1≤A≤3.
Further, parameter C, E are set according to user, integrated database size, general 7≤C≤30 day.
Further, parameter B is set according to user, general B≤5.
Further, this method can be applied to the equipment such as mobile phone terminal, GPS, database.
The advantages and positive effects of the present invention are: this method can more intelligence and rapidly discovery terminal whether by Steal and can be stolen with real-time tracking the location information of terminal;Convenience is provided for user, and can effectively hit criminal.
Detailed description of the invention
Fig. 1 is work flow diagram of the invention.
Specific embodiment
Specific embodiments of the present invention will now be described in detail with reference to the accompanying drawings.
In daily life, the course of action of people is fixed mostly, and for student, route is concentrated mainly on house Between front yard and school, for office worker, route is concentrated mainly between family and company, only rare occasion, can be gone out Other present abnormal positions.Therefore, we can use these rules to judge whether mobile phone is stolen, and carry out location tracking.
As shown in Figure 1, a kind of anti-theft method of mobile phone based on position big data information, process are as follows:
1, basic database is established
According to the time span of user position, user location is divided into rotine position area_F, once in a while position area_ O and suspected locations area_S.Wherein rotine position area_F is the most common position of user, degree of belief highest.And it is suspicious Position area_S is then the position that most seldom occurs of user even without the position gone, and degree of belief is minimum;
2, user is monitored information setting
As input parameter, needing user to set trusted distance, (user's setting, default value can set the activity of user The empirical value of range), i.e., (refer to rotine position area_F, once in a while position area_O and suspected locations in each trust region Area_S deviation range x (can be using default setting as the empirical value of scope of activities));Each region carries out the time of authentication Interval prompts user's input between the time that each region (rotine position, once in a while position and suspected locations) carry out authentication Every (default value can be set to 5min, that is, think that user continues on mobile phone with minute rank) area_F_t, area_O_t, area_S_t;Alarm contact method, i.e., after authentication failure or repeatedly authentication time-out, mobile phone sends alarm The destination of information;
3, position learning process
1. detecting location information first, and basic database is called, checks whether to be new position, what new position here referred to It is the position outside cognitive domains deviation range.
2. then start timer if it is new position, before timer arrival or timer reach, Yong Hujin It has gone authentication (user inputs correct fingerprint or carried out correct solution screen operation), then timer stops and is zeroed.
3. prompting user to carry out authentication, (user inputs correct fingerprint or has carried out correct if timer overflows Solution screen operation).If being proved to be successful A times, which is added in position area_O once in a while.
4. otherwise entering verifying and alarm procedure.
The verifying includes that user uses solution screen (the inputting correct password or fingerprint) behaviour in mobile phone with alarm procedure Make.If authentication failed N (is set, default value can be set to 3) secondary, then mobile phone sends alarm to emergency contact mode according to user Information, and location information is sent to emergency contact by the period.
5. it needs to carry out authentication according to presetting in position area_O once in a while, if being proved to be successful more than A times, Then the position is added in the area_F of rotine position, otherwise the position is eliminated in suspected locations area_S, is continued to execute 2. ~operation 4..
6. the position is eliminated in suspected locations area_S, is continued to execute if certain position is more than not update the C time 2.~operation 4..
7. it equally needs to need to carry out periodic authentication according to presetting in the area_F of rotine position, if It does not update, then eliminates the position in position area_O once in a while more than the C time, execute operation 5. 6..
Foregoing is directed to parameter A/B/C/D/E, can be arranged according to the characteristics of each region, it is desirable that D > A, i.e., more reliable Region, number can be verified and lack point.D is set according to user, general 1≤D≤3.Parameter E≤C updates that is, in frequent region It position can be more more frequently.Parameter A is set according to user, general 1≤A≤3.Parameter C, E are set according to user, and integrated database is big It is small, general 7≤C≤30 day.Parameter B is set according to user, general B≤5.
It may be mentioned here that although this patent, which is suggested plans, is directed to mobile phone terminal, the mentioned method of this patent It can be applied to other equipment for supporting GPS, database.
The embodiments of the present invention have been described in detail above, but content is only the preferred embodiment of the present invention, It should not be considered as limiting the scope of the invention.All changes and improvements made in accordance with the scope of the present invention, should all It still belongs within this patent covering scope.

Claims (8)

1. a kind of anti-theft method of mobile phone based on position big data information, which is characterized in that its process is as follows:
1) basic database is established;
2) user is monitored information setting;
3) position learning process
1. detecting location information first, and basic database is called, checks whether to be new position;
2. then starting timer if it is new position, before timer reaches or timer reaches, user has carried out identity Verifying, then timer stops and is zeroed;
3. prompting user to carry out authentication if timer overflows;If being proved to be successful A times, which is added position once in a while It sets in area_O;
4. otherwise entering verifying and alarm procedure;
5. it needs to carry out authentication according to presetting in position area_O once in a while, it, will if being proved to be successful more than A times The position be added rotine position area_F in, otherwise the position is eliminated in suspected locations area_S, continue to execute 2.~4. Operation;
6. the position is eliminated in suspected locations area_S if certain position is more than not update the C time, continue to execute 2.~ 4. operation;
7. equally needing to need to carry out periodic authentication, if more than C according to presetting in the area_F of rotine position Time does not update, then eliminates the position in position area_O once in a while, executes operation 5. 6..
2. a kind of anti-theft method of mobile phone based on position big data information according to claim 1, which is characterized in that establish Basic database process are as follows: according to the time span of user position, user location is divided into rotine position area_F, once in a while Position area_O and suspected locations area_S;Wherein rotine position area_F is the most common position of user, degree of belief highest; Suspected locations area_S is the position that most seldom occurs of user even without the position gone, and degree of belief is minimum.
3. a kind of anti-theft method of mobile phone based on position big data information according to claim 1 or 2, it is characterised in that: In step 2, as input parameter, user is needed to set:
Trusted distance (refers to rotine position area_F, once in a while position area_O and suspected locations in each trust region Area_S deviation range x);
Each region carries out the time interval of authentication, i.e. prompt user input carries out the time of authentication in each region It is spaced area_F_t, area_O_t, area_S_t;
Alarm contact method, i.e., after authentication failure or repeatedly authentication time-out, mobile phone sends warning message Destination.
4. a kind of anti-theft method of mobile phone based on position big data information according to claim 3, it is characterised in that: described Verifying includes user with alarm procedure to be operated using the solution screen in mobile phone, if authentication failed n times, mobile phone is to emergency contact mode Warning message is sent, and location information is sent to emergency contact by the period.
5. a kind of anti-theft method of mobile phone based on position big data information according to claim 1, it is characterised in that: described Authentication includes that user inputs correct fingerprint or carried out correct solution screen operation.
6. a kind of anti-theft method of mobile phone based on position big data information according to claim 3, it is characterised in that: described New position refers to the position outside cognitive domains deviation range.
7. a kind of anti-theft method of mobile phone based on position big data information according to claim 1, it is characterised in that: parameter A/B/C/D/E is arranged according to the characteristics of each region, it is desirable that D > A can verify number and lack point that is, in more reliable region;Ginseng Number D is set according to user;It is more frequent to update position that is, in frequent region by parameter E≤C;Parameter A is set according to user;Parameter C, E is set according to user, the setting of integrated database size;Parameter B is set according to user.
8. a kind of anti-theft method of mobile phone based on position big data information according to claim 1, it is characterised in that: we Method can be applied to mobile phone terminal, GPS, database.
CN201811401769.9A 2018-11-22 2018-11-22 A kind of anti-theft method of mobile phone based on position big data information Pending CN109327807A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811401769.9A CN109327807A (en) 2018-11-22 2018-11-22 A kind of anti-theft method of mobile phone based on position big data information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811401769.9A CN109327807A (en) 2018-11-22 2018-11-22 A kind of anti-theft method of mobile phone based on position big data information

Publications (1)

Publication Number Publication Date
CN109327807A true CN109327807A (en) 2019-02-12

Family

ID=65258898

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811401769.9A Pending CN109327807A (en) 2018-11-22 2018-11-22 A kind of anti-theft method of mobile phone based on position big data information

Country Status (1)

Country Link
CN (1) CN109327807A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114996686A (en) * 2022-07-29 2022-09-02 深圳市赢向量科技有限公司 Computer system and user identity identification method and device thereof

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106231075A (en) * 2016-07-20 2016-12-14 惠州Tcl移动通信有限公司 A kind of method and system automatically turning on antitheft mobile phone pattern
CN106379270A (en) * 2016-09-05 2017-02-08 深圳市双赢伟业科技股份有限公司 Vehicle anti-theft system
CN107635071A (en) * 2017-09-27 2018-01-26 维沃移动通信有限公司 A kind of theft preventing method, mobile terminal and computer-readable recording medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106231075A (en) * 2016-07-20 2016-12-14 惠州Tcl移动通信有限公司 A kind of method and system automatically turning on antitheft mobile phone pattern
CN106379270A (en) * 2016-09-05 2017-02-08 深圳市双赢伟业科技股份有限公司 Vehicle anti-theft system
CN106379270B (en) * 2016-09-05 2019-04-02 深圳市双赢伟业科技股份有限公司 VATS Vehicle Anti-Theft System
CN107635071A (en) * 2017-09-27 2018-01-26 维沃移动通信有限公司 A kind of theft preventing method, mobile terminal and computer-readable recording medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114996686A (en) * 2022-07-29 2022-09-02 深圳市赢向量科技有限公司 Computer system and user identity identification method and device thereof

Similar Documents

Publication Publication Date Title
EP3105748B1 (en) Applying geographical limitations to control actions of a security system
CN106203012A (en) The processing method of screen locking, device and equipment
US10002475B2 (en) Intrusion security device with SMS based notification and control
CN105722090A (en) Control method and device for automatically identifying pseudo base station
US7974602B2 (en) Fraud detection techniques for wireless network operators
CN105573623A (en) Help seeking method based on fingerprint identification
CN104933826A (en) Method and system of protecting life and property safety based on wearable device
CN105141756A (en) Abnormity processing method and abnormity processing device
CN109327807A (en) A kind of anti-theft method of mobile phone based on position big data information
CN105427479A (en) Man-machine interaction ATM safety management system and method
US11172346B2 (en) Mobile-initiated SMS cell broadcast
CN110135594A (en) A kind of power system monitor exception information processing method and system
CN105717891A (en) Mobile terminal, system, and method for monitoring engineering operation scene
US20090111439A1 (en) System and method for monitoring a monitored mobile phone
Saranya et al. A Smart friendly IoT device for women safety with GSM and GPS location tracking
CN103167413A (en) Cell phone tracking method
CN111049990B (en) Message reminding method and system
CN107452170A (en) The method and apparatus of home security
CN104754530A (en) Mobile terminal, system and method used for intelligent detection door lock
CN103874057A (en) Anti-eavesdrop mobile terminal and control system and method suitable for classified places
CN201251802Y (en) Cell phone key gate control system
CN107318055A (en) A kind of unlocking screen method and device of mobile terminal
CN106664557B (en) Control method of mobile terminal and mobile terminal
CN109377392A (en) A kind of monitoring and managing method and device
CN111107217A (en) Intelligent disturbance-free method and system and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190212

RJ01 Rejection of invention patent application after publication