WO2017024550A1 - 一种移动终端防盗***及方法 - Google Patents

一种移动终端防盗***及方法 Download PDF

Info

Publication number
WO2017024550A1
WO2017024550A1 PCT/CN2015/086743 CN2015086743W WO2017024550A1 WO 2017024550 A1 WO2017024550 A1 WO 2017024550A1 CN 2015086743 W CN2015086743 W CN 2015086743W WO 2017024550 A1 WO2017024550 A1 WO 2017024550A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
mobile terminal
theft
password
preset
Prior art date
Application number
PCT/CN2015/086743
Other languages
English (en)
French (fr)
Inventor
刘文婷
Original Assignee
刘文婷
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 刘文婷 filed Critical 刘文婷
Priority to PCT/CN2015/086743 priority Critical patent/WO2017024550A1/zh
Publication of WO2017024550A1 publication Critical patent/WO2017024550A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning

Definitions

  • the present invention relates to the field of mobile communications, and in particular, to a mobile terminal anti-theft system and method.
  • mobile terminals can be easily lost or stolen. After the mobile terminal is lost, the owner will find the mobile terminal according to the approximate location of the lost mobile terminal. Because the clues are too few, it is difficult to find, so often only the loss of the mobile terminal is lost, and ultimately the loss of the owner's property; at the same time, the mobile terminal often stores some important information of the owner, and the awareness of the mobile terminal usually causes the owner's life. The inconvenience; criminals can also use the contact information stored on the mobile terminal to commit fraud and other criminal acts, endangering public order.
  • the present invention provides a mobile terminal anti-theft method, including: a setting step of setting an anti-theft parameter according to a user's needs;
  • the determining step determines whether the user wants to perform a shutdown operation
  • Receiving when it is determined that the user wants to perform a shutdown operation on the mobile terminal, displaying a receiving window to receive a password input by the user;
  • the speaker of the mobile terminal is controlled to play a warning sound.
  • the determining step when the user presses the shutdown button of the mobile terminal for a preset preset time, it is determined that the user performs a shutdown operation on the mobile terminal.
  • the method further includes a second performing step of controlling the speaker of the mobile terminal to play a warning tone when the user does not input the correct password within the preset time.
  • the anti-theft parameter includes a shutdown password of the mobile terminal, a volume level of the playback alert tone, and an identifier of the current communication card.
  • the method further includes: when the password input by the user is different from the preset anti-theft password, acquiring the information of the user, and sending the information of the user to the preset anti-theft receiving address.
  • the acquiring the information of the user includes: starting a camera to perform shooting to obtain a captured image;
  • sending the information of the user to the preset anti-theft receiving address comprises: transmitting the captured image to a preset anti-theft receiving address.
  • the shooting the camera to obtain the captured image specifically includes:
  • the acquiring the information of the user includes: acquiring a current communication card identifier
  • the sending the information of the user to the preset anti-theft receiving address comprises: determining whether the current communication card identifier is the same as the preset communication card identifier; and when the current communication card identifier is associated with the preset communication When the card identifiers are different, the communication card identifier is sent to a preset anti-theft receiving address.
  • the method further includes: when the current communication card identifier is the same as the preset communication card identifier, to the server A password reset request command is sent to cause the user to reset the password according to the password reset command returned by the server.
  • the present invention also provides a mobile terminal anti-theft system, comprising: a setting module, configured to set an anti-theft coefficient according to a user's needs, the anti-theft coefficient including a shutdown password of the mobile terminal, a volume level of the player, and a current communication card.
  • a setting module configured to set an anti-theft coefficient according to a user's needs, the anti-theft coefficient including a shutdown password of the mobile terminal, a volume level of the player, and a current communication card.
  • a determining module configured to determine whether the user performs a shutdown operation on the mobile terminal
  • a receiving module configured to: when determining that the user wants to perform a shutdown operation on the mobile terminal, displaying a receiving window to receive a password input by the user;
  • an execution module configured to control a speaker of the mobile terminal to play a warning sound when the password input by the user is incorrect and the number of input password errors exceeds a limit.
  • a verification module configured to receive a password of the user, and verify whether the password input by the user is the same as the preset anti-theft password
  • An acquiring module configured to acquire information about the user when the verification module verifies that the password input by the user is different from the preset anti-theft password
  • a sending module configured to send information about the user acquired by the acquiring module to a preset anti-theft receiving address.
  • the technical solution provided by the embodiment of the present invention has the beneficial effects that: after the mobile terminal is stolen or lost, the illegal user of the mobile terminal inputs the basic information of the illegal user, such as starting the camera to the illegal user. The captured image of the human face and the surrounding environment, etc., so that it is possible to find the stolen movement based on the information. terminal.
  • the mobile terminal user can search for the lost mobile terminal in the first time by call tracking, and on the other hand, when the illegal user does not input the correct shutdown password, It can further alert the user that the mobile terminal is stolen by controlling the sound of the speaker of the mobile terminal to recover the loss of the user.
  • FIG. 1 is a diagram showing an operating environment of a mobile terminal anti-theft system according to Embodiment 1 of the present invention
  • FIG. 2 is a flowchart of a method for preventing an anti-theft of a mobile terminal according to Embodiment 1 of the present invention
  • FIG. 3 is a flowchart of a method for preventing an anti-theft of a mobile terminal according to Embodiment 2 of the present invention.
  • FIG. 4 is a schematic structural diagram of an anti-theft terminal according to Embodiment 3 of the present invention.
  • FIG. 5 is a schematic structural diagram of an anti-theft terminal according to Embodiment 4 of the present invention.
  • the first embodiment of the present invention provides an operating environment diagram of a mobile terminal anti-theft system.
  • the anti-theft system 10 runs in the mobile terminal 1 , and the mobile terminal 1 can be an electronic device such as a mobile phone.
  • the anti-theft system 10 is configured to control the speaker 20 of the mobile terminal 1 to play a warning tone to remind the user that the mobile terminal 1 is stolen when the illegal user steals the mobile terminal 1 and wants to evade the user's tracking by shutting down.
  • the mobile terminal 1 further includes a memory 30, a processor 40, and a camera 50.
  • the memory 30 is configured to store various materials, such as storing the anti-theft system 10 Programmatic code.
  • the memory 30 can also be used to store a personalized alert tone file set by the user, for example, an audio file in a format such as MP3, WAV, or the like.
  • the anti-theft system 10 can be partitioned into one or more modules that are stored in the memory 30 for execution by the processor 40 to perform the functions provided by the present invention.
  • the camera 50 can be used to capture the current user's face and surrounding scenes, and send the captured image to a preset anti-theft receiving address.
  • the anti-theft system 10 is divided into a setting module 11, a judging module 12, a receiving module 13, a shutdown module 14, and an execution module 15.
  • the module referred to in the present invention is a program segment that performs a specific function, and the functions of each module will be specifically described in the flowchart of FIG. 2.
  • the first embodiment of the present invention provides a mobile terminal anti-theft method, and the method includes the following steps:
  • Step 201 The setting module 11 sets the anti-theft parameter of the mobile terminal 1 according to the needs of the user, and the anti-theft parameter includes a shutdown password of the mobile terminal 1, a warning tone, and a volume level of the speaker 20 for playing the warning tone. .
  • the shutdown password can be set more complicated, for example, a password composed of letters and numbers can be combined.
  • the volume level at which the speaker 20 emits the warning tone can be set to be the highest.
  • Step 202 The determining module 12 determines whether the user wants to perform a shutdown operation on the mobile terminal 1. If yes, step 203 is performed; otherwise, it is determined whether the user wants to perform a shutdown operation on the mobile terminal 1.
  • step 203 is performed.
  • Step 203 The receiving module 13 displays a receiving window to receive a password input by the user.
  • a receiving window may be displayed on the screen of the mobile terminal 1 and the user is prompted to input a shutdown password to shut down the mobile terminal 1.
  • Step 204 The determining module 12 determines whether the password input by the user is the same as the preset shutdown password, that is, whether the password input by the user is correct. If yes, step 205 is performed; otherwise, step 206 is performed.
  • Step 205 The shutdown module 14 shuts down the mobile terminal 1.
  • Step 206 The determining module 12 further determines whether the number of times the user consecutively enters the password error exceeds the limit. For example, when the number of consecutively entering the password error exceeds the limit of the number of times (three times), the current user is determined to be an illegal user. On the other hand, if the number of times the user enters the password error has not exceeded the limit of the number of times, the process returns to step 203 to continue receiving the password input by the user.
  • Step 207 The execution module 15 controls the speaker 20 of the mobile terminal 1 to play the preset warning tone at a preset volume level.
  • the execution module 15 may be configured to display the receiving window after the receiving module 13 displays the receiving window, if the user fails to input the correct shutdown within the preset time.
  • the password controls the speaker 20 to play the preset warning tone at a preset volume level.
  • the present invention can prevent an illegal user from shutting down the mobile terminal 1 so that the user of the mobile terminal 1 can search for the mobile terminal 1 in the first time by call tracking.
  • an illegal user does not enter When the password is properly turned off, it can further alert the user that the mobile terminal 1 is stolen by controlling the speaker of the mobile terminal 1 to sound a warning sound to recover the user's loss as much as possible.
  • a second embodiment of the present invention provides a mobile terminal anti-theft method, where the method includes:
  • Step 301 preset a communication card identifier, an anti-theft password, and an anti-theft receiving address.
  • the mobile terminal has a camera device, and the mobile terminal has the communication card identifier in normal use.
  • the user who normally uses the mobile terminal is called the owner.
  • the mobile terminal presets the anti-theft password and the anti-theft receiving address.
  • the embodiment of the present invention does not limit the format of the anti-theft password, and may be a number of any field or a letter of any field, and the anti-theft receiving address may be a mobile phone number, an email address, or a server address. Etc., the present invention does not limit the implementation form of the anti-theft receiving address.
  • Step 302 Receive a password input by the user, and verify whether the input password is the same as the preset anti-theft password. If yes, go to step 307; if no, go to step 303.
  • the mobile terminal needs to insert a communication card for communication.
  • the password is first input, and the mobile terminal verifies that the input password is the same as the preset anti-theft password.
  • the user can normally use the mobile terminal to verify. If they are different, it means that the user has entered the wrong password and the user cannot use the mobile terminal.
  • the mobile terminal can preset the number of times the password is input, and when the password input by the user is different from the preset anti-theft password, the embodiment of the present invention can also prompt the user to input the password again, and verify that the user inputs the password and the preset anti-theft again. If the password is the same as the preset anti-theft password, the user is regarded as the owner of the mobile terminal, and the mobile terminal is not lost or stolen, and step 307 is performed; When the password for re-entering is different from the preset anti-theft password, step 303 is performed.
  • Step 303 Start the camera to shoot, and send the captured image to the preset anti-theft receiving address.
  • the mobile terminal verifies that the password input by the user is different from the preset anti-theft password, and uses different measures to obtain information of the current user, thereby transmitting the current user information to the preset anti-theft receiving address, because the anti-theft receiving The address is preset by the owner. Therefore, after the current user's information is sent to the burglar receiving address, the owner can increase the way to retrieve the mobile terminal according to the user information.
  • the acquiring the information of the current user specifically includes: the mobile terminal starts the front camera to perform shooting, captures the current user's face and the surrounding scene, and sends the captured image to the preset anti-theft receiving address.
  • the mobile terminal when the mobile terminal further has a rear camera, the mobile terminal further activates the rear camera to perform shooting, and the current user uses the environment around the back end of the mobile terminal to shoot, and sends the captured image to the preset anti-theft receiving. address.
  • the mobile terminal can transmit the captured image to the preset anti-theft address through the network transmission or sending information.
  • the specific transmission mode is not limited in the embodiment of the present invention.
  • Step 304 Obtain the current communication card identifier, determine whether the communication card identifier is the same as the preset communication card identifier, and if yes, go to step 306; if no, go to step 305.
  • the mobile terminal determines that the communication card identifier is the same as the preset communication card identifier, it indicates that the mobile terminal is not lost or stolen, but the owner has forgotten the password, and the password reset service can be set for the owner.
  • the mobile terminal determines that the communication card identifier is different from the preset communication card identifier, it indicates that the mobile terminal has been stolen or lost.
  • the user who uses the mobile terminal at this time is called an illegal user, and the mobile terminal will Obtain the communication card identifier of the illegal user, and send the communication card identifier to the server.
  • step 303 and the step 304 are both operations for obtaining information of the current user. If there is no sequence, when the step 304 is performed, if the identifier of the communication card is different from the preset communication card identifier, step 303 is performed. Thereby, the number of times of shooting of the terminal server is reduced, and the transmission amount of the captured image is reduced, and the transmission load of the network is alleviated.
  • Step 305 Send the current communication card identifier to the burglar receiving address, so that the owner can know the communication card identifier of the illegal user.
  • the mobile terminal identifier of the illegal user is sent to the anti-theft receiving address, and the anti-theft receiving address is preset by the owner, so the communication card identifier of the illegal user is sent to After the anti-theft receiving address, the owner can know the communication card identifier of the current illegal user from the anti-theft receiving address.
  • the owner can take measures to lock the mobile phone. If the owner obtains the communication card identifier and sends a control command to the server in the form of a short message sending control command, the server locks the mobile terminal corresponding to the communication card identifier, and after the mobile terminal is locked, The mobile terminal will not be able to operate.
  • Step 306 Send a password reset request command to the server, so that the user sets the password according to the password reset command returned by the server.
  • the mobile terminal sends a password reset request command to the server, receives a password reset command returned by the server, and displays a password reset window to the user, so that the user sets a new password, so that the user inputs the new password and performs normal communication.
  • Step 307 The mobile terminal performs normal communication.
  • the mobile terminal when the mobile terminal verifies that the password input by the user is the same as the preset anti-theft password, it indicates that the mobile terminal is not stolen or lost, and the mobile terminal normally communicates.
  • the method provided by the embodiment of the present invention after the mobile terminal is stolen or lost, when the illegal user of the mobile terminal inputs a password, starts the camera to shoot the face of the illegal user and the surrounding environment, and grasps the basic information of the illegal user. Therefore, the mobile terminal can be retrieved based on the information, which is advantageous for finding the stolen mobile terminal.
  • the mobile terminal when the illegal user inserts the communication card into the mobile terminal for communication, the mobile terminal can also obtain the communication card identifier, and the communication card identifier can be used as a favorable clue for finding the stolen mobile terminal.
  • FIG. 4 is a schematic structural diagram of an anti-theft terminal according to Embodiment 3 of the present invention.
  • the anti-theft system 10 is divided into a setting module 11, a judging module 12, a receiving module 13, a shutdown module 14, and an execution module 15.
  • the so-called module is a program segment for completing a specific function, and the functions of each module will be specifically described in the flowchart of FIG. 2 and will not be described in detail herein.
  • a schematic structural diagram of an anti-theft terminal according to Embodiment 4 of the present invention includes a verification module 501, an obtaining module 502, and a sending module 503;
  • the verification module 501 is configured to receive a password input by the user, and verify whether the password input by the user is the same as the preset password;
  • the obtaining module 502 is configured to: when the verification module 501 verifies that the password input by the user is different from the preset anti-theft password, acquire the information of the user;
  • the sending module 503 is configured to send the information of the user acquired by the obtaining module 502 to the preset anti-theft receiving address.
  • the anti-theft mobile terminal can transmit the obtained user information to the preset anti-theft receiving address through the network transmission or sending information, and the specific sending manner is not limited in the embodiment of the present invention.
  • the obtaining module 501 is further configured to:
  • the user's information is acquired.
  • the obtaining module 502 specifically includes a first acquiring unit, where the first acquiring unit is specifically configured to: when the verification module 501 verifies that the password input by the user is different from the preset anti-theft password, start the camera to obtain a captured image;
  • the sending module 503 is specifically configured to send the captured image acquired by the obtaining module 502 to a preset anti-theft receiving address.
  • the first acquiring unit is further configured to:
  • the front camera is activated to capture the image of the user's face and the environment of the front end to obtain a captured image; and the surrounding environment of the rear camera to the rear end is activated. Take a picture to get a captured image.
  • the anti-theft mobile terminal starts the front camera to shoot, captures the current user's face and surrounding scenes, and sends the captured image to the preset anti-theft receiving address.
  • the anti-theft mobile terminal further has a rear camera
  • the anti-theft mobile terminal further activates the rear camera to perform shooting, and the current user uses the environment around the back end of the mobile terminal to shoot, and sends the captured image to the preset. Anti-theft receiving address.
  • the obtaining module 502 further includes a second acquiring unit, configured to acquire a current communication card identifier
  • the sending module 503 is further configured to determine whether the current communication card identifier is the same as the preset communication card identifier; when the current communication card identifier is different from the preset communication card identifier, send the communication card identifier to the preset. Anti-theft receiving address.
  • the anti-theft mobile terminal determines that the communication card identifier is different from the preset communication card identifier, it indicates that the anti-theft mobile terminal has been stolen or lost, and the embodiment of the present invention refers to the user who uses the anti-theft mobile terminal at this time.
  • the anti-theft mobile terminal will obtain the communication card identifier of the illegal user and send the communication card identifier to the server.
  • the second obtaining unit is further configured to:
  • a password reset request command is sent to the server, so that the user resets the password according to the password reset command returned by the server.
  • the anti-theft mobile terminal determines that the communication card identifier is the same as the preset communication card identifier, indicating that the anti-theft mobile terminal is not lost or stolen, but the owner himself forgets the password, and the password reset service may be set for the owner.
  • the anti-theft mobile terminal provided by the embodiment of the present invention, after the mobile terminal is stolen or lost, when the illegal user of the mobile terminal inputs a password, activates the camera to shoot the face and surroundings of the illegal user, and grasps the basic information of the illegal user. Therefore, the mobile terminal can be retrieved based on the information, which is advantageous for finding the stolen mobile terminal.
  • the mobile terminal when the illegal user inserts the communication card into the mobile terminal for communication, the mobile terminal can also obtain the communication card identifier, and the communication card identifier can be used as a favorable clue for finding the stolen mobile terminal.
  • the device provided in this embodiment may be the same as the method embodiment, and the specific implementation process is described in detail in the method embodiment, and details are not described herein again.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)

Abstract

本发明涉及移动通信领域,公开了一种移动终端防盗***,包括:设置模块,判断模块,接收模块,执行模块,验证模块,获取模块,发送模块。所述移动终端防盗***通过在对移动终端被盗或遗失后,在移动终端的非法用户输入密码时,掌握非法用户的基本信息,从而可以根据这些信息有利于找寻到被盗移动终端;一方面也可以防止非法用户将所述移动终端关机,移动终端用户则可通过来电追踪以在第一时间内寻找自己丢失的移动终端,另一方面,当非法用户没有输入正确的关机密码时,其可通过控制移动终端的扬声器发出警示音进一步提醒用户该移动终端被盗,以尽量挽回用户的损失。

Description

一种移动终端防盗***及方法 技术领域
本发明涉及移动通信领域,尤其涉及一种移动终端防盗***及方法。
背景技术
移动终端作为一种随身携带的、时尚小巧、价值不菲的通讯工具,很容易丢失或者被盗。移动终端丢失后,然而机主会根据丢失移动终端的大概地点去找寻移动终端。由于线索太少,很难找到,所以常常只能接受移动终端丢失的损失,最终造成失主财产的损失;同时移动终端上往往存储机主的一些重要信息,移动终端的意识也通常造成机主生活的不便;犯罪分子还可以通过移动终端上存储的联系人信息进行诈骗等犯罪行为,危害社会治安。
发明内容
为了解决以上问题,本发明提供了一种移动终端防盗方法,包括:设置步骤,根据用户的需要设置防盗参数;
判断步骤,判断用户是否要执行关机操作;
接收步骤,当确定用户要对所述移动终端执行关机操作时,显示接收窗口以接收用户输入的密码;
第一执行步骤,当用户输入的密码错误且输入密码错误的次数超过限制时,控制所述移动终端的扬声器播放警示音。
具体的,所述判断步骤中,当用户长按了该移动终端的关机键达到预设预设时间,则判断用户要对所述移动终端执行关机操作。
具体的,所述方法还包括第二执行步骤,当用户没有在预设时间内输入正确密码时,控制所述移动终端的扬声器播放警示音。
具体的,所述防盗参数包括所述移动终端的关机密码、播放警示音的音量级别、当前通信卡的标识。
具体的,所述方法还包括:当所述用户输入的密码与预设的防盗密码不同时,获取所述用户的信息将所述用户的信息发送给预设的防盗接收地址。
具体的,所述获取所述用户的信息包括:启动摄像头进行拍摄得到拍摄图像;
相应地,将所述用户的信息发送给预设的防盗接收地址具体包括:将所述拍摄图像发送给预设的防盗接收地址。
具体的,所述启动摄像头进行拍摄得到拍摄图像具体包括:
启动前置摄像头对所述用户的人脸和前端的周围环境进行拍摄得到拍摄图像;
并启动后置摄像头对后端的周围环境进行拍摄得到拍摄图像。
具体的,所述获取所述用户的信息包括:获取当前的通信卡标识;
相应地,将所述用户的信息发送给预设的防盗接收地址包括:判断所述当前的通信卡标识与预设的通信卡标识是否相同;当所述当前的通信卡标识与预设的通信卡标识不相同时,将所述通信卡标识发送给预设的防盗接收地址。
具体的,所述判断所述当前的通信卡标识与预设的通信卡标识是否相同之后,所述方法还包括:当所述当前的通信卡标识与预设的通信卡标识相同时,向服务器发送密码重置请求命令,以使用户根据服务器返回的密码重置命令重置密码。
本发明还提供了一种移动终端防盗***,包括:设置模块,用于根据用户的需要设置防盗系数,所述防盗系数包括所述移动终端的关机密码、播放器的音量级别、当前通信卡的标识;
判断模块,用于判断用户是否对所述移动终端执行关机操作;
接收模块,用于当确定用户要对所述移动终端执行关机操作时,显示接收窗口以接收用户输入的密码;
执行模块,用于当用户输入的密码错误且输入密码错误的次数超过限制时,控制所述移动终端的扬声器播放警示音。
验证模块,用于接收用户的密码,并验证所述用户输入的密码与预设的防盗密码是否相同;
获取模块,用于当所述验证模块验证出所述用户输入的密码与预设的防盗密码不相同时,获取所述用户的信息;
发送模块,用于将所述获取模块获取道的所述用户的信息发送给预设的防盗接收地址。
本发明实施例提供的技术方案带来的有益效果是:通过在对移动终端被盗或遗失后,在移动终端的非法用户输入密码时,掌握非法用户的基本信息,如启动摄像头对该非法用户的人脸和周围环境进行拍摄得到的拍摄图像等,从而可以根据这些信息有利于找寻到被盗移动 终端。一方面也可以防止非法用户将所述移动终端关机,移动终端用户则可通过来电追踪以在第一时间内寻找自己丢失的移动终端,另一方面,当非法用户没有输入正确的关机密码时,其可通过控制移动终端的扬声器发出警示音进一步提醒用户该移动终端被盗,以尽量挽回用户的损失。
附图说明
图1是本发明实施例一提供的移动终端防盗***的运行环境图;
图2是本发明实施例一提供的移动终端防盗方法流程图;
图3是本发明实施例二提供的移动终端防盗方法流程图;
图4是本发明实施例三提供的一种防盗终端结构示意图;
图5是本发明实施例四提供的一种防盗终端的结构示意图。
具体实施方式
为了使本发明的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本发明进行进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。
如图1所示,本发明实施例一提供了一种移动终端防盗***运行环境图,在本实施例中,防盗***10运行于移动终端1中,所述移动终端1可以为手机等电子设备。该防盗***10用于当非法用户盗取所述移动终端1且想通过关机来逃避用户的追踪时,控制所述移动终端1的扬声器20播放警示音来提醒用户所述移动终端1被盗。所述移动终端1还包括存储器30、处理器40以及摄像头50。
所述存储器30用于存储各种资料,例如存储所述防盗***10 的程序化代码。在本实施例中,所述存储器30还可以用于存储用户自己设置的个性化警示音文件,例如可以使MP3、WAV等格式的音频文件。所述防盗***10可以被分割成一个或多个模块,所述一个或多个模块被存储在所述存储器30中被处理器40执行,以完成本发明提供的功能。所述摄像头50可以用于拍摄当前用户的人脸和周围场景,将拍摄后的图像发送给预设的防盗接收地址。例如,参阅图4所述,所述防盗***10被分割成设置模块11、判断模块12、接收模块13、关机模块14及执行模块15。本发明所称的模块是完成一特定功能的程序段,关于各模块的功能将在图2的流程图中具体描述。
如图2所示,本发明实施例一提供了一种移动终端防盗方法,所述方法包括如下步骤:
步骤201:设置模块11根据用户的需要设置所述移动终端1的防盗参数,所述防盗参数包括所述移动终端1的关机密码,警示音、用于播放所述警示音的扬声器20的音量级别。
具体地,为增强所述移动终端1的防盗性能,可将该关机密码设置的较为复杂,例如可以使由字母和数字组合而成的密码。另外,为使得当所述移动终端1被盗时,所述移动终端1能够发出较大音量的警示音来提示用户,可以设置扬声器20发出警示音的音量级别最高。
步骤202:判断模块12判断用户是否要对所述移动终端1执行关机操作,若是,执行步骤203,否则继续判断用户是否要对所述移动终端1执行关机操作。
具体地,若用户长按了该移动终端1的关机键达到预设时间,则 判断用户要对所述移动终端1执行关机操作,此时则执行步骤203。
步骤203:接收模块13显示接收窗口以接收用户输入的密码。
例如,可以在所述移动终端1的屏幕显示一个接收窗口,并提示用户需输入关机密码才可将所述移动终端1关机。
步骤204:判断模块12判断用户所输入的密码是否与预设的关机密码相同也即判断用户输入的密码是否正确,若是,执行步骤205,否则,执行步骤206。
步骤205:关机模块14将所述移动终端1关机。
步骤206:判断模块12进一步判断用户连续输入密码错误的次数是否超过限制,例如当用户连续输入密码错误的次数超过次数限制(三次)时,确定当前用户为非法用户,此时,执行步骤207,反之,若用户输入密码错误的次数尚未超过次数限制时则回到步骤203,继续接收用户输入的密码。
步骤207:执行模块15控制所述移动终端1的扬声器20以预设的音量级别来播放所预设的警示音。
需要说明的是,为增强对所述移动终端1的防盗措施,还可以设置所述执行模块15于所述接收模块13显示了接收窗口后,若用户未能于预设时间内输入正确的关机密码,则控制所述扬声器20以预设的音量级别来播放所预设的警示音。
从本发明的流程步骤可以看出,一方面,本发明可防止非法用户将所述移动终端1关机,使得移动终端1的用户可通过来电追踪以在第一时间内寻找自己的移动终端1,另一方面,当非法用户没有输入 正确的关机密码时,其可通过控制移动终端1的扬声器发出警示音进一步提醒用户该移动终端1被盗,以尽量挽回用户的损失。
如图3所示,本发明实施例二提供了一种移动终端防盗方法,所述方法包括:
步骤301:预设通信卡标识、防盗密码和防盗接收地址。
本实施例中,移动终端上有摄像头装置,且移动终端预先了正常使用时的通信卡标识,此时正常使用移动终端的用户称为机主。移动终端预设防盗密码和防盗接收地址,其中本发明实施例不对防盗密码的格式进行限定,可以为任意字段的数字或任意字段的字母,防盗接收地址可以为手机号码、邮箱地址或某服务器地址等,本发明不对防盗接收地址的实现形式进行限定。
步骤302:接收用户输入的密码,并验证输入的密码是否与预设的防盗密码相同,若是,则执行步骤307;若否,则执行步骤303。
其中移动终端内需要***通信卡进行通信,用户利用移动终端进行通信时,先输入密码,移动终端验证输入的密码与预设的防盗密码是否相同,验证相同时用户才能正常使用该移动终端,验证不相同时,则表明用户输入密码错误,用户无法使用该移动终端。
优选地,移动终端可以预设输入密码的次数,验证用户输入的密码与预设的防盗密码不相同时,本发明实施例还可以提示用户再次输入密码,验证用户再次输入密码与预设的防盗密码是否相同,若用户再次输入的密码存在与预设的防盗密码相同的情况时,则视为该用户为移动终端的机主,该移动终端没有遗失或被盗,执行步骤307;若 用于再次输入的密码与预设的防盗密码不相同时,执行步骤303。
步骤303:启动摄像头进行拍摄,并将拍摄图像发送给预设的防盗接收地址。
具体地,移动终端验证除用户输入的密码与预设的防盗密码不相同时,采用不同的措施获取当前用户的信息,从而将当前用户的信息发送给预设的防盗接收地址,由于该防盗接收地址是机主预设的,因此将当前用户的信息发送给防盗接收地址后,机主能够根据该用户信息增加找回移动终端的途径。
具体地,获取当前用户的信息具体包括,移动终端启动前置摄像头进行拍摄,拍摄当前用户的人脸和周围场景,将拍摄后的图像发送给预设的防盗接收地址。
优选地,移动终端还置有后置摄像头时,移动终端还启动后置摄像头进行拍摄,对当前用户使用移动终端的后端周围环境进行拍摄,并将拍摄后的图像发送给预设的防盗接收地址。
其中,移动终端可以通过网络传输或发信息的方式,将拍摄后的图像发送给预设的防盗地址,本发明实施例不对具体的发送方式进行限定。
步骤304:获取当前的通信卡标识,判断通信卡标识与预设的通信卡标识是否相同,若是,则执行步骤306;若否,则执行步骤305。
其中,移动终端判断出通信卡标识与预设的通信卡标识相同时,表明该移动终端没有遗失或被盗,只是机主自身忘记密码,此时可以为机主设置密码重置服务。
移动终端判断出通信卡标识与预设的通信卡标识不相同时,表明该移动终端已经被盗或遗失,本发明实施例将此时使用该移动终端的用户称为非法用户,移动终端将会获取该非法用户的通信卡标识,并将该通信卡标识发送给服务器。
其中,上述步骤303和步骤304均为获取当前用户的信息的操作,两者没有先后顺序,先执行步骤304时,可以判断出通信卡标识与预设的通信卡标识不相同时,执行步骤303,从而减少终端服务器的拍摄次数,及减少拍摄图像的传输量,减轻了网络的传输负担。
步骤305:将当前的通信卡标识发送给防盗接收地址,从而机主能够获知非法用户的通信卡标识。
具体地,移动终端判断出当前用户为非法用户时,将该非法用户的通信卡标识发送给防盗接收地址,由于该防盗接收地址是机主预设的,因此将非法用户的通信卡标识发送给防盗接收地址后,机主即能够从防盗接收地址获知当前非法用户的通信卡标识。机主可以采取措施锁闭手机,如机主根据获得通信卡标识,用短信发送控制命令的形式向服务器发送控制命令,使服务器对该通信卡标识对应的移动终端进行锁定,移动终端锁定后,该移动终端将无法操作。
步骤306:向服务器发送密码重置请求命令,使用户根据服务器返回的密码重置命令设置密码。
具体地,移动终端向服务器发送密码重置请求命令,接收服务器返回的密码重置命令,向用户显示密码重置窗口,使用户设置新的密码,从而用户输入该新的密码后进行正常通信。
步骤307:移动终端进行正常通信。
其中,移动终端验证用户输入的密码与预设的防盗密码相同时,则表明移动终端没有被盗或遗失,移动终端正常通信。
本发明实施例提供的方法,通过在移动终端被盗或遗失后,在移动终端的非法用户输入密码时,启动摄像头对该非法用户的人脸和周围的环境进行拍摄,掌握非法用户的基本信息,从而可以根据这些信息找回移动终端,有利于找寻到被盗移动终端。另外,非法用户将通信卡***移动中端内进行通信时,移动终端还可以获取该通信卡标识,该通信卡标识能够作为找寻到被盗移动终端的有利线索。
如图4所示,本发明实施例三提供的一种防盗终端结构示意图,所述防盗***10被分割成设置模块11、判断模块12、接收模块13、关机模块14及执行模块15.本发明所称的模块是完成一特定功能的程序段,关于各模块的功能将在图2的流程图中具体描述,在此不作详细的说明。
如图5所示,本发明实施例四提供的一种防盗终端结构示意图,包括验证模块501、获取模块502、发送模块503;
验证模块501,用于接收用户输入的密码,并验证用户输入的密码与预设密码是否相同;
获取模块502,用于当验证模块501验证出用户输入的密码与预设的防盗密码不相同时,获取用户的信息;
发送模块503,用于将获取模块502获取到的用户的信息发送给预设的防盗接收地址。
实际应用中,防盗移动终端可以通过网络传输或发信息的方式,将获取的用户信息发送给预设的防盗接收地址,本发明实施例不对具体的发送方式进行限定。
其中,获取模块501还用于:
提示用户再次输入密码,验证用户再次输入的密码与预设的防盗密码是否相同;
当用户再次输入的密码与预设的防盗不相同时,获取用户的信息。
其中,获取模块502具体包括第一获取单元,第一获取单元具体用于,当验证模块501验证出用户输入的密码与预设的防盗密码不相同时,启动摄像头进行拍摄得到拍摄图像;
相应地,发送模块503具体用于,将获取模块502获取的拍摄图像发送给预设的防盗接收地址。
具体地,第一获取单元还用于:
当验证模块501验证出用户输入的密码与预设的防盗密码不相同时,启动前置摄像头对用户的人脸和前端的周围环境进行拍摄得到拍摄图像;并启动后置摄像头对后端的周围环境进行拍摄得到拍摄图像。
其中,防盗移动终端启动前置摄像头进行拍摄,拍摄当前用户的人脸和周围场景,将拍摄后的图像发送给预设的防盗接收地址。优选地,防盗移动终端还置有后置摄像头时,防盗移动终端还启动后置摄像头进行拍摄,对当前用户使用移动终端的后端周围环境进行拍摄,并将拍摄后的图像发送给预设的防盗接收地址。
另外,获取模块502还包括第二获取单元,用于获取当前的通信卡标识;
相应地,发送模块503还用于判断当前的通信卡标识与预设的通信卡标识是否相同;当当前的通信卡标识与预设的通信卡标识不相同时,将通信卡标识发送给预设防盗接收地址。
实际应用中,防盗移动终端判断出通信卡标识与预设的通信卡标识不相同时,表明该防盗移动终端已经被盗或遗失,本发明实施例将此时使用该防盗移动终端的用户称为非法用户,防盗移动终端将会获取非法用户的通信卡标识,并将该通信卡标识发送给服务器。
进一步地,第二获取单元还用于:
当当前的通信卡标识与预设的通信卡标识相同时,向服务器发送密码重置请求命令,以使用户根据服务器返回的密码重置命令重置密码。
其中,防盗移动终端判断出通信卡标识与预设的通信卡标识相同时,表明该防盗移动终端没有遗失或被盗,只是机主自身忘记密码,此时可以为机主设置密码重置服务。
本发明实施例提供的防盗移动终端,通过在移动终端被盗或遗失后,在移动终端的非法用户输入密码时,启动摄像头对该非法用户的人脸和周围进行拍摄,掌握非法用户的基本信息,从而可以根据这些信息找回移动终端,有利于找寻到被盗移动终端。另外,非法用户将通信卡***移动终端内进行通信时,移动终端还可以获取该通信卡标识,该通信卡标识能够作为找寻被盗移动终端的有利线索。
本实施例提供的装置,具体可以与方法实施例属于同一构思,其具体实现过程详见方法实施例,这里不再赘述。
以上所述仅为本发明的较佳实施例而已,并不用以限制本发明,凡在本发明的精神和原则之内所作的任何修改、等同替换和改进等,均应包含在本发明的保护范围之内。

Claims (10)

  1. 一种移动终端防盗方法,其特征在于,包括:
    设置步骤,根据用户的需要设置防盗参数;
    判断步骤,判断用户是否要执行关机操作;
    接收步骤,当确定用户要对所述移动终端执行关机操作时,显
    示接收窗口以接收用户输入的密码;
    第一执行步骤,当用户输入的密码错误且输入密码错误的次数
    超过限制时,控制所述移动终端的扬声器播放警示音。
  2. 根据权利要求1所述的一种移动终端防盗方法,其特征在于,所述判断步骤中,当用户长按了该移动终端的关机键达到预设预设时间,则判断用户要对所述移动终端执行关机操作。
  3. 根据权利要求1所述的一种移动终端防盗方法,其特征在于,还包括第二执行步骤,当用户没有在预设时间内输入正确密码时,控制所述移动终端的扬声器播放警示音。
  4. 根据权利要求1所述的一种移动终端防盗方法,其特征在于,所述防盗参数包括所述移动终端的关机密码、播放警示音的音量级别、当前通信卡的标识。
  5. 根据权利要求1所述的一种移动终端防盗方法,其特征在于,还包括:发送步骤,当所述用户输入的密码与预设的防盗密码不同时,获取所述用户的信息将所述用户的信息发送给预设的防 盗接收地址。
  6. 根据权利要求5所述的一种移动终端防盗方法,其特征在于,所述获取所述用户的信息包括:启动摄像头进行拍摄得到拍摄图像;
    相应地,将所述用户的信息发送给预设的防盗接收地址具体包括:将所述拍摄图像发送给预设的防盗接收地址。
  7. 根据权利要求6所述的一种移动终端防盗方法,其特征在于,所述启动摄像头进行拍摄得到拍摄图像具体包括:
    启动前置摄像头对所述用户的人脸和前端的周围环境进行拍摄得到拍摄图像;
    并启动后置摄像头对后端的周围环境进行拍摄得到拍摄图像。
  8. 根据权利要求4或5所述的一种移动终端防盗方法,其特征在于,所述获取所述用户的信息包括:获取当前的通信卡标识;
    相应地,将所述用户的信息发送给预设的防盗接收地址包括:判断所述当前的通信卡标识与预设的通信卡标识是否相同;
    当所述当前的通信卡标识与预设的通信卡标识不相同时,将所述通信卡标识发送给预设的防盗接收地址。
  9. 根据权利要求8所述的一种移动终端防盗方法,其特征在于,所述判断所述当前的通信卡标识与预设的通信卡标识是否相同之后,所述方法还包括:
    当所述当前的通信卡标识与预设的通信卡标识相同时,向服 务器发送密码重置请求命令,以使用户根据服务器返回的密码重置命令重置密码。
  10. 一种移动终端防盗***,其特征在于,包括:
    设置模块,用于根据用户的需要设置防盗系数,所述防盗系数包括所述移动终端的关机密码、播放器的音量级别、当前通信卡的标识;
    判断模块,用于判断用户是否对所述移动终端执行关机操作;
    接收模块,用于当确定用户要对所述移动终端执行关机操作时,显示接收窗口以接收用户输入的密码;
    执行模块,用于当用户输入的密码错误且输入密码错误的次数超过限制时,控制所述移动终端的扬声器播放警示音。
    验证模块,用于接收用户的密码,并验证所述用户输入的密码与预设的防盗密码是否相同;
    获取模块,用于当所述验证模块验证出所述用户输入的密码与预设的防盗密码不相同时,获取所述用户的信息;
    发送模块,用于将所述获取模块获取道的所述用户的信息发送给预设的防盗接收地址。
PCT/CN2015/086743 2015-08-12 2015-08-12 一种移动终端防盗***及方法 WO2017024550A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2015/086743 WO2017024550A1 (zh) 2015-08-12 2015-08-12 一种移动终端防盗***及方法

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2015/086743 WO2017024550A1 (zh) 2015-08-12 2015-08-12 一种移动终端防盗***及方法

Publications (1)

Publication Number Publication Date
WO2017024550A1 true WO2017024550A1 (zh) 2017-02-16

Family

ID=57982947

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/086743 WO2017024550A1 (zh) 2015-08-12 2015-08-12 一种移动终端防盗***及方法

Country Status (1)

Country Link
WO (1) WO2017024550A1 (zh)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109710292A (zh) * 2018-12-28 2019-05-03 Tcl移动通信科技(宁波)有限公司 移动终端刷机控制处理方法、移动终端及存储介质
CN110290270A (zh) * 2019-06-27 2019-09-27 维沃移动通信有限公司 防盗方法和移动终端
CN111667347A (zh) * 2020-06-12 2020-09-15 吉林吉大通信设计院股份有限公司 一种基于5g通信技术的大数据式搜索***及其搜索方法
CN112671979A (zh) * 2020-12-14 2021-04-16 中国联合网络通信集团有限公司 终端防盗方法和装置
CN115471937A (zh) * 2022-09-23 2022-12-13 广州浩传网络科技有限公司 一种档案管理装置及使用方法

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101420684A (zh) * 2007-10-26 2009-04-29 英业达股份有限公司 一种行动电话防盗***及其方法
CN103037310A (zh) * 2012-12-14 2013-04-10 北京网秦天下科技有限公司 移动终端智能防盗方法和移动终端
CN103595863A (zh) * 2013-10-28 2014-02-19 沈阳建筑大学 一种手机防盗***
CN103873655A (zh) * 2012-12-13 2014-06-18 深圳富泰宏精密工业有限公司 移动终端防盗***及方法
CN104123514A (zh) * 2013-04-26 2014-10-29 腾讯科技(深圳)有限公司 关机验证方法及装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101420684A (zh) * 2007-10-26 2009-04-29 英业达股份有限公司 一种行动电话防盗***及其方法
CN103873655A (zh) * 2012-12-13 2014-06-18 深圳富泰宏精密工业有限公司 移动终端防盗***及方法
CN103037310A (zh) * 2012-12-14 2013-04-10 北京网秦天下科技有限公司 移动终端智能防盗方法和移动终端
CN104123514A (zh) * 2013-04-26 2014-10-29 腾讯科技(深圳)有限公司 关机验证方法及装置
CN103595863A (zh) * 2013-10-28 2014-02-19 沈阳建筑大学 一种手机防盗***

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109710292A (zh) * 2018-12-28 2019-05-03 Tcl移动通信科技(宁波)有限公司 移动终端刷机控制处理方法、移动终端及存储介质
CN109710292B (zh) * 2018-12-28 2024-01-05 Tcl移动通信科技(宁波)有限公司 移动终端刷机控制处理方法、移动终端及存储介质
CN110290270A (zh) * 2019-06-27 2019-09-27 维沃移动通信有限公司 防盗方法和移动终端
CN110290270B (zh) * 2019-06-27 2022-01-07 维沃移动通信有限公司 防盗方法和移动终端
CN111667347A (zh) * 2020-06-12 2020-09-15 吉林吉大通信设计院股份有限公司 一种基于5g通信技术的大数据式搜索***及其搜索方法
CN111667347B (zh) * 2020-06-12 2023-11-07 吉林吉大通信设计院股份有限公司 一种基于5g通信技术的大数据式搜索***及其搜索方法
CN112671979A (zh) * 2020-12-14 2021-04-16 中国联合网络通信集团有限公司 终端防盗方法和装置
CN115471937A (zh) * 2022-09-23 2022-12-13 广州浩传网络科技有限公司 一种档案管理装置及使用方法
CN115471937B (zh) * 2022-09-23 2024-04-19 广州浩传网络科技有限公司 一种档案管理装置及使用方法

Similar Documents

Publication Publication Date Title
WO2017024550A1 (zh) 一种移动终端防盗***及方法
US10123196B2 (en) Method and device for alarm triggering
WO2016034090A1 (zh) 提高移动终端安全性的方法及***
WO2016015551A1 (zh) 提高移动终端安全性的方法及***
EP3200483B1 (en) Method and device for acquiring location information
WO2017128718A1 (zh) 获取终端信息的方法及装置
RU2628478C2 (ru) Способ и устройство для доступа к сети
WO2013107395A1 (zh) 手机防盗保护方法及装置
JP2007036365A (ja) 携帯情報端末装置
WO2017156960A1 (zh) 访问智能摄像头的方法及装置
TWI761843B (zh) 門禁控制方法及裝置、電子設備和儲存介質
CN107623899B (zh) 信息处理方法、装置、存储介质以及电子设备
JP6126755B2 (ja) 端末検証方法、装置、プログラム、及び記録媒体
KR20150100476A (ko) 도난 방지를 위한 보안 방법 및 그 전자 장치
EP3249570B1 (en) Method and device for providing prompt indicating loss of terminal
WO2016011739A1 (zh) 防伪验证方法、装置和***
CN110620847B (zh) 智能终端的防盗方法、该智能终端
CN105934933B (zh) 一种防止终端丢失的方法和终端
CN105430639B (zh) 信息处理方法及装置
CN106603817A (zh) 来电处理方法、来电处理装置和电子设备
US9363673B2 (en) Subscriber identity module control in a portable communication device
CN106570381B (zh) 一种指纹解锁的方法及装置
CN110290270B (zh) 防盗方法和移动终端
WO2023131209A9 (zh) 终端防盗方法及终端设备
JP2009296112A (ja) 携帯端末装置、不正使用防止方法及びプログラム

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15900748

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15900748

Country of ref document: EP

Kind code of ref document: A1