CN107194291A - Anti-theft method for mobile terminal, mobile terminal and computer-readable recording medium - Google Patents
Anti-theft method for mobile terminal, mobile terminal and computer-readable recording medium Download PDFInfo
- Publication number
- CN107194291A CN107194291A CN201710343395.9A CN201710343395A CN107194291A CN 107194291 A CN107194291 A CN 107194291A CN 201710343395 A CN201710343395 A CN 201710343395A CN 107194291 A CN107194291 A CN 107194291A
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- instruction
- cloud server
- information
- machine
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/22—Processing or transfer of terminal data, e.g. status or physical capabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/22—Processing or transfer of terminal data, e.g. status or physical capabilities
- H04W8/24—Transfer of terminal data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/22—Processing or transfer of terminal data, e.g. status or physical capabilities
- H04W8/24—Transfer of terminal data
- H04W8/245—Transfer of terminal data from a network towards a terminal
Landscapes
- Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Bioethics (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of anti-theft method for mobile terminal, mobile terminal and computer-readable recording medium, including:The instruction that acquisition for mobile terminal the machine is lost;Internet resources are obtained according to the instruction, locally-stored material upload Cloud Server is deleted into local data simultaneously automatically;Opening locating device is simultaneously locked, and local out code is not received not getting the out code prelocalization device from Cloud Server;Positioner detects ownship position information in real time and the synchronous positional information is to Cloud Server.The present invention realizes that data on the mobile terminal lost automated back-up and can delete local data and ensure safety after the loss., moreover it is possible to allow user to obtain real time position residing for the mobile terminal lost, conveniently give the mobile terminal of loss for change.
Description
Technical field
The present invention relates to technical field of mobile terminals, more particularly to a kind of anti-theft method for mobile terminal, mobile terminal and
Computer-readable recording medium.
Background technology
A feast for the eyes for the listing of anti-theft technique existing market, various to have, mode is also a lot, but how true
Surely stolen method and stolen later processing method are difficult to have perfect.Such as only steal and send short messages, merely listen for ring
Border, only changes cartoon and knows to be essentially all method of no avail, it is most important that, one is how to protect the data of oneself not let out
Dew, whether two can attempt to recover.Also lock mobile phone, although can ensure that data is not revealed, but need operator's branch again
Hold.Besides some antitheft softwares, no matter how outstanding these softwares are and intelligent, and user is stolen after brush software, or soft monitoring
Part is deleted, and mobile phone appropriator of still leaving is used, it is impossible to given for change.
The content of the invention
It is a primary object of the present invention to propose a kind of anti-theft method for mobile terminal and mobile terminal and computer-readable
Storage medium, it is intended to which solving the antitheft related design in existing mobile terminal can not accomplish not only to have prevented that data from divulging a secret but also can be compared with
The problem of getting back mobile phone for convenience.
To achieve the above object, a kind of anti-theft method for mobile terminal that the present invention is provided, the described method comprises the following steps:
The instruction that acquisition for mobile terminal the machine is lost;
Internet resources are obtained according to the instruction, locally-stored material upload Cloud Server is deleted to local simultaneously automatically
Data;
Opening locating device is simultaneously locked, and this is not received not getting the out code prelocalization device from Cloud Server
Ground out code;
Positioner detects ownship position information in real time and the synchronous positional information is to Cloud Server.
Further, step is also included before the instruction that described step acquisition for mobile terminal the machine is lost:
User fingerprints information is enrolled, using finger print information as the unlocking cipher of mobile terminal, by the finger print information with moving
The International Mobile Equipment Identity code binding of dynamic terminal, uploads the finger print information and International Mobile Equipment Identity code arrives cloud service
Device.
Further, the instruction that described step acquisition for mobile terminal the machine is lost is specifically included:
When the number of times that mobile terminal obtains wrong unlocking cipher in setting time exceedes the setting upper limit, mobile terminal is obtained
The instruction for taking the machine to lose;Or
The instruction that the machine of acquisition for mobile terminal from Cloud Server is lost;Or
It is mobile when obtaining the instruction of password replacement but not obtaining the information for confirming password replacement from stand-by equipment
Terminal obtains the instruction of the machine loss;Or
When obtaining the instruction of SIM card change but not obtaining the information for the confirmation SIM card change that stand-by equipment is sent, move
Dynamic terminal obtains the instruction of the machine loss;Or
The information that the machine of acquisition for mobile terminal from stand-by equipment is lost.
Further, the positioner detects ownship position information in real time and the synchronous positional information is to Cloud Server
Afterwards, methods described also includes step:
The prompting message of the machine loss is sent to the default stand-by equipment of mobile terminal, the prompting message is comprising mobile whole
End current location information, default prompting message, new insert SIM card number one or more.
Further, it is described that Internet resources are obtained according to the instruction, automatically by the material upload stored on mobile terminal
Cloud Server, is specifically included while deleting local data:
Mobile data network is automatically turned on according to the instruction and will be stored by mobile data network on mobile terminal
Material upload Cloud Server, while deleting local data;Or
It can be connected according to the instruction search with Wi-Fi wireless networks and automatically, pass through connected Wi-Fi wireless networks
By the material upload Cloud Server stored on mobile terminal, while deleting local data.
Further, the positioner detects ownship position information in real time and the synchronous positional information is to Cloud Server
Afterwards, methods described also includes step:
The instruction that the machine from Cloud Server has been given for change is received, backup information is downloaded from Cloud Server automatically, released
Positioner opens the instruction of locking.
Further, the positioner detects ownship position information in real time and the synchronous positional information is to Cloud Server
Afterwards, methods described also includes step:
Obtain the signal of mobile terminal shutdown, turning-off mobile terminal but the positioner continuous firing for keeping mobile terminal.
Further, the positioner detects ownship position information in real time and the synchronous positional information is to Cloud Server
Afterwards, methods described also includes step:
When obtaining mobile terminal brush machine signal, the deposit of private partition is opened up comprising using in the hard disk of mobile terminal automatically
User's identification program and information including the finger print information of family, and keep backstage automatic running and perform user's identification, until receiving
The private partition is voluntarily destroyed after having given instruction for change to the machine from Cloud Server.
In addition, to achieve the above object, the present invention also proposes a kind of mobile terminal, including memory, processor and at least
One is stored in the memory and is configured as by the application program of the computing device, it is characterised in that described
At least one application program is configurable for performing the anti-theft method for mobile terminal described in any of the above-described claim.
And, to achieve the above object, the present invention also proposes a kind of computer-readable recording medium, described computer-readable
Be stored with guarding against theft for mobile terminal program on storage medium, and the guarding against theft for mobile terminal program realizes above-mentioned when being executed by processor
The step of one anti-theft method for mobile terminal.
A kind of anti-theft method for mobile terminal and mobile terminal and computer-readable recording medium proposed by the present invention, pass through
Obtain after the instruction that clear and definite mobile terminal is lost, backup information to Cloud Server, the local data of deletion, while opening mobile whole
The positioner at end implements synchronous current location information to Cloud Server, helps user fast and accurately to be given for change by positional information
The mobile terminal of loss, is truly realized anti-theft and anti-losing.
Brief description of the drawings
Fig. 1 is the hardware architecture diagram for the mobile terminal for realizing each embodiment of the invention;
Fig. 2 is the wireless communication system schematic diagram of mobile terminal as shown in Figure 1;
The anti-theft method for mobile terminal schematic flow sheet that Fig. 3 provides for first embodiment of the invention;
The anti-theft method for mobile terminal schematic flow sheet that Fig. 4 provides for second embodiment of the invention;
The anti-theft method for mobile terminal schematic flow sheet that Fig. 5 provides for third embodiment of the invention;
The anti-theft method for mobile terminal schematic flow sheet that Fig. 6 provides for fourth embodiment of the invention;
The anti-theft method for mobile terminal schematic flow sheet that Fig. 7 provides for fifth embodiment of the invention.
The realization, functional characteristics and advantage of the object of the invention will be described further referring to the drawings in conjunction with the embodiments.
Embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In follow-up description, the suffix using such as " module ", " part " or " unit " for representing element is only
Be conducive to the explanation of the present invention, itself there is no a specific meaning.Therefore, " module ", " part " or " unit " can be mixed
Ground is used.
Terminal can be implemented in a variety of manners.For example, the terminal described in the present invention can include such as mobile phone, flat board
Computer, notebook computer, palm PC, personal digital assistant (Personal Digital Assistant, PDA), portable
Media player (Portable Media Player, PMP), guider, wearable device, Intelligent bracelet, pedometer etc. are moved
Move the fixed terminals such as terminal, and numeral TV, desktop computer.
It will be illustrated in subsequent descriptions by taking mobile terminal as an example, it will be appreciated by those skilled in the art that except special
Outside element for moving purpose, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Referring to Fig. 1, its hardware architecture diagram for a kind of mobile terminal of realization each embodiment of the invention, the shifting
Dynamic terminal 100 can include:RF (Radio Frequency, radio frequency) unit 101, Wi-Fi module 102, audio output unit
103rd, A/V (audio/video) input block 104, sensor 105, display unit 106, user input unit 107, interface unit
108th, the part such as memory 109, processor 110 and power supply 111.It will be understood by those skilled in the art that shown in Fig. 1
Mobile terminal structure does not constitute the restriction to mobile terminal, and mobile terminal can be included than illustrating more or less parts,
Either combine some parts or different parts arrangement.
The all parts of mobile terminal are specifically introduced with reference to Fig. 1:
Radio frequency unit 101 can be used for receiving and sending messages or communication process in, the reception and transmission of signal, specifically, by base station
Downlink information receive after, handled to processor 110;In addition, up data are sent into base station.Generally, radio frequency unit 101
Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier, duplexer etc..In addition, penetrating
Frequency unit 101 can also be communicated by radio communication with network and other equipment.Above-mentioned radio communication can use any communication
Standard or agreement, including but not limited to GSM (Global System of Mobile communication, global system for mobile telecommunications
System), GPRS (General Packet Radio Service, general packet radio service), CDMA2000 (Code
Division Multiple Access 2000, CDMA 2000), WCDMA (Wideband Code Division
Multiple Access, WCDMA), TD-SCDMA (Time Division-Synchronous Code
Division Multiple Access, TD SDMA), FDD-LTE (Frequency Division
Duplexing-Long Term Evolution, FDD Long Term Evolution) and TDD-LTE (Time Division
Duplexi ng-Long Term Evolution, time division duplex Long Term Evolution) etc..
WiFi belongs to short range wireless transmission technology, and mobile terminal can help user's transmitting-receiving electricity by WiFi module 102
Sub- mail, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and accessed.Although Fig. 1 shows
Go out WiFi module 102, but it is understood that, it is simultaneously not belonging to must be configured into for mobile terminal, completely can be according to need
To be omitted in the essential scope for do not change invention.
Audio output unit 103 can be in call signal reception pattern, call mode, record mould in mobile terminal 1 00
When under the isotypes such as formula, speech recognition mode, broadcast reception mode, it is that radio frequency unit 101 or WiFi module 102 are received or
The voice data stored in memory 109 is converted into audio signal and is output as sound.Moreover, audio output unit 103
The audio output related to the specific function that mobile terminal 1 00 is performed can also be provided (for example, call signal receives sound, disappeared
Breath receives sound etc.).Audio output unit 103 can include loudspeaker, buzzer etc..
A/V input blocks 104 are used to receive audio or video signal.A/V input blocks 104 can include graphics processor
(Graphics Processing Unit, GPU) 1041 and microphone 1042,1041 pairs of graphics processor is in video acquisition mode
Or the view data progress of the static images or video obtained in image capture mode by image capture apparatus (such as camera)
Reason.Picture frame after processing may be displayed on display unit 106.Picture frame after being handled through graphics processor 1041 can be deposited
Storage is transmitted in memory 109 (or other storage mediums) or via radio frequency unit 101 or WiFi module 102.Mike
Wind 1042 can connect in telephone calling model, logging mode, speech recognition mode etc. operational mode via microphone 1042
Quiet down sound (voice data), and can be voice data by such acoustic processing.Audio (voice) data after processing can
To be converted to the form output that mobile communication base station can be sent to via radio frequency unit 101 in the case of telephone calling model.
Microphone 1042 can implement various types of noises and eliminate (or suppression) algorithm to eliminate (or suppression) in reception and send sound
The noise produced during frequency signal or interference.
Mobile terminal 1 00 also includes at least one sensor 105, such as optical sensor, motion sensor and other biographies
Sensor.Specifically, optical sensor includes ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to environment
The light and shade of light adjusts the brightness of display panel 1061, and proximity transducer can close when mobile terminal 1 00 is moved in one's ear
Display panel 1061 and/or backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions (general
For three axles) size of acceleration, size and the direction of gravity are can detect that when static, the application available for identification mobile phone posture
(such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.;
The fingerprint sensor that can also configure as mobile phone, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer,
The other sensors such as hygrometer, thermometer, infrared ray sensor, will not be repeated here.
Display unit 106 is used for the information for showing the information inputted by user or being supplied to user.Display unit 106 can be wrapped
Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used
Forms such as (Organic Light-Emitting Diode, OLED) configures display panel 1061.
User input unit 107 can be used for the numeral or character information for receiving input, and produce the use with mobile terminal
The key signals input that family is set and function control is relevant.Specifically, user input unit 107 may include contact panel 1071 with
And other input equipments 1072.Contact panel 1071, also referred to as touch-screen, collect touch operation of the user on or near it
(such as user is using any suitable objects such as finger, stylus or annex on contact panel 1071 or in contact panel 1071
Neighbouring operation), and corresponding attachment means are driven according to formula set in advance.Contact panel 1071 may include touch detection
Two parts of device and touch controller.Wherein, touch detecting apparatus detects the touch orientation of user, and detects touch operation band
The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it
It is converted into contact coordinate, then gives processor 110, and the order sent of reception processing device 110 and can be performed.In addition, can
To realize contact panel 1071 using polytypes such as resistance-type, condenser type, infrared ray and surface acoustic waves.Except contact panel
1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can be wrapped
Include but be not limited to physical keyboard, in function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc.
One or more, do not limit herein specifically.
Further, contact panel 1071 can cover display panel 1061, detect thereon when contact panel 1071 or
After neighbouring touch operation, processor 110 is sent to determine the type of touch event, with preprocessor 110 according to touch thing
The type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, contact panel 1071 and display panel
1061 be input and the output function that mobile terminal is realized as two independent parts, but in certain embodiments, can
By contact panel 1071 and the input that is integrated and realizing mobile terminal of display panel 1061 and output function, not do specifically herein
Limit.
Interface unit 108 is connected the interface that can pass through as at least one external device (ED) with mobile terminal 1 00.For example,
External device (ED) can include wired or wireless head-band earphone port, external power source (or battery charger) port, wired or nothing
Line FPDP, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end
Mouth, video i/o port, ear port etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, number
It is believed that breath, electric power etc.) and the input received is transferred to one or more elements in mobile terminal 1 00 or can be with
For transmitting data between mobile terminal 1 00 and external device (ED).
Memory 109 can be used for storage software program and various data.Memory 109 can mainly include storing program area
And storage data field, wherein, application program (the such as sound that storing program area can be needed for storage program area, at least one function
Sound playing function, image player function etc.) etc.;Storage data field can be stored uses created data (such as according to mobile phone
Voice data, phone directory etc.) etc..In addition, memory 109 can include high-speed random access memory, it can also include non-easy
The property lost memory, for example, at least one disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of mobile terminal, utilizes each of various interfaces and the whole mobile terminal of connection
Individual part, by operation or performs and is stored in software program and/or module in memory 109, and calls and be stored in storage
Data in device 109, perform the various functions and processing data of mobile terminal, so as to carry out integral monitoring to mobile terminal.Place
Reason device 110 may include one or more processing units;It is preferred that, processor 110 can integrated application processor and modulatedemodulate mediate
Device is managed, wherein, application processor mainly handles operating system, user interface and application program etc., and modem processor is main
Handle radio communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
Mobile terminal 1 00 can also include the power supply 111 (such as battery) powered to all parts, it is preferred that power supply 111
Can be logically contiguous by power-supply management system and processor 110, so as to realize management charging by power-supply management system, put
The function such as electricity and power managed.
Although Fig. 1 is not shown, mobile terminal 1 00 can also will not be repeated here including bluetooth module etc..
For the ease of understanding the embodiment of the present invention, the communications network system that the mobile terminal of the present invention is based on is entered below
Row description.
Referring to Fig. 2, Fig. 2 is a kind of communications network system Organization Chart provided in an embodiment of the present invention, the communication network system
Unite as the LTE system of universal mobile communications technology, UE (User Equipment, use of the LTE system including communicating connection successively
Family equipment) 201, E-UTRAN (Evolved UMTS Terrestrial Radio Access Network, evolved UMTS lands
Ground wireless access network) 202, EPC (Evolved Packet Core, evolved packet-based core networks) 203 and operator IP operation
204。
Specifically, UE201 can be above-mentioned terminal 100, and here is omitted.
E-UTRAN202 includes eNodeB2021 and other eNodeB2022 etc..Wherein, eNodeB2021 can be by returning
Journey (backhaul) (such as X2 interface) is connected with other eNodeB2022, and eNodeB2021 is connected to EPC203,
ENodeB2021 can provide UE201 to EPC203 access.
EPC203 can include MME (Mobility Management Entity, mobility management entity) 2031, HSS
(Home Subscriber Server, home subscriber server) 2032, other MME2033, SGW (Serving Gate Way,
Gateway) 2034, PGW (PDN Gate Way, grouped data network gateway) 2035 and PCRF (Policy and
Charging Rules Function, policy and rate functional entity) 2036 etc..Wherein, MME2031 be processing UE201 and
There is provided carrying and connection management for the control node of signaling between EPC203.HSS2032 is all to manage for providing some registers
Such as function of attaching position register (not shown) etc, and some are preserved about the use such as service features, data rate
The special information in family.All customer data can be transmitted by SGW2034, and PGW2035 can provide UE 201 IP
Address is distributed and other functions, and PCRF2036 is strategy and the charging control strategic decision-making of business data flow and IP bearing resources
Point, it selects and provided available strategy and charging control decision-making with charge execution function unit (not shown) for strategy.
IP operation 204 can include internet, Intranet, IMS (IP Multimedia Subsystem, IP multimedia
System) or other IP operations etc..
Although above-mentioned be described by taking LTE system as an example, those skilled in the art it is to be understood that the present invention not only
Suitable for LTE system, be readily applicable to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA with
And following new network system etc., do not limit herein.
Based on above-mentioned mobile terminal hardware configuration and communications network system, each embodiment of the inventive method is proposed.
Embodiment one
First embodiment of the invention provides a kind of anti-theft method for mobile terminal, as shown in figure 3, methods described includes following step
Suddenly:
S1, the instruction that acquisition for mobile terminal the machine is lost;
Confirm after the fact that mobile terminal is lost, mobile terminal starts anti-theft modes.General mobile terminal determines to lose
The fact, it can voluntarily judge to learn according to the generation of some suspicious event for mobile terminal, can also be by receiving cloud service
The loss of device or stand-by equipment instructs and judges to learn.Following several situations can specifically be included:
1st, when the number of times that mobile terminal obtains wrong unlocking cipher in setting time exceedes the setting upper limit, mobile terminal
Obtain the instruction that the machine is lost.
The upper limit number of times statistics of mistake unlocking cipher input, should be the statistics in a setting time, the setting time
Can be 24 hours or other times.The unlocking cipher can be finger-print cipher or numerical ciphers, for example, be set in 24 small
When the interior 1071 input error unlocking cipher of contact panel by mobile terminal 1 00 10 times, that is, judged the mobile terminal 1 00
Not under proprietary control, as mobile terminal is lost.The setting upper limit of 10 times, can be independent finger-print cipher input
The number of times of mistake or the number of times of independent numerical ciphers input error, or numerical ciphers and finger-print cipher are altogether
Unlocking times.
2nd, the instruction that the machine of acquisition for mobile terminal from Cloud Server is lost.
When judging whether mobile terminal is lost, the order by receiving Cloud Server is a mode.Specifically, user
Can be then whole to movement by personal account by logging in the personal account of Cloud Server with the account that customer mobile terminal is bound
The client that end is sent on the instruction of mobile terminal loss, mobile terminal is received after the instruction, and mobile terminal is to obtain at the machine
In the instruction of lost condition, and then start anti-theft modes.
3rd, the instruction that password is reset is being obtained, but when not obtaining the information for confirming password replacement from stand-by equipment, moved
Dynamic terminal obtains the instruction of the machine loss.
Judge that the another way that mobile terminal is in lost condition is that mobile terminal cannot be introduced into operation because of code error
Interface, can provide the guide of change of secret code, if currently used people tries to enter operation circle by changing the channel of password
The authority in face, mobile terminal can propose whether checking user possesses the means for the authority for changing password, such as input original password,
Or the answer of new password or input validation problem is received by other stand-by equipments or the identity of real-name authentication is inputted
Information etc., but no matter which kind of mode, will by stand-by equipment to mobile terminal send confirm password modification instruction be defined, it is no
Then to estimate this change of secret code illegal for mobile terminal, confirms that mobile terminal is in lost condition, starts anti-theft modes.
Stand-by equipment can be user in the default backup phone number of mobile terminal, standby email address, this is default
Backup phone number, standby email address information upload Cloud Server and preserved simultaneously.
4th, when obtaining the instruction of SIM card change but not obtaining the information for the confirmation SIM card change that stand-by equipment is sent,
The instruction that acquisition for mobile terminal the machine is lost.
When mobile terminal is replaced SIM card, to ensure that the action is user's operation, mobile terminal is from trend stand-by equipment
Prompting message is sent, when acting legal instruction of the replacing SIM card is confirmed when stand-by equipment is sent, then mobile terminal is not in
Under illegal control, when acting legal instruction of the replacing SIM card is confirmed when stand-by equipment is not sent, then mobile terminal is estimated
This SIM card replacing action is illegal, confirms that mobile terminal is in lost condition, starts anti-theft modes.
5th, after the information for the machine loss that stand-by equipment is sent is obtained, the instruction that acquisition for mobile terminal the machine is lost.
When mobile terminal is lost, user can send loss to mobile device by default stand-by equipment and instruct, and move
When dynamic terminal receives the instruction, confirm that the machine is in lost condition, start anti-theft modes.
S2, obtains Internet resources according to the instruction, automatically deletes locally-stored material upload Cloud Server simultaneously
Local data;
When mobile terminal obtains the machine by above channel is in the instruction of lost condition, opening anti-theft pattern, i.e., certainly
The dynamic network that passes through is by the material upload Cloud Server stored on mobile terminal, while local data is deleted, to protect user to store
In the data security of mobile terminal;Due to mobile terminal probably due to departing from conventional Wi-Fi environment and closing data network and make
Mobile terminal is in the state without network, and the instruction that now mobile terminal is in lost condition according to described the machine is automatically turned on
Mobile data network or the unlatching search of Wi-Fi module 102 can be connected with Wi-Fi wireless networks and automatically, pass through mobile data
Network or the Wi-Fi wireless networks that are connected are by the material upload Cloud Server stored on mobile terminal, while deleting local money
Material.
S3, opening locating device is simultaneously locked, and is not connect not getting the out code prelocalization device from Cloud Server
By local out code;
Receive after the instruction that the machine has been lost, mobile terminal will also be except data on the processing mobile terminal of safety
The operation for starting and helping user to give mobile terminal for change is carved, concrete operations are:Opening locating device, the positioner is included but not
It is limited to the localization function modules such as GPS, wireless network positioning, sensor positioning;Make positioner keep lasting to open, and do not connect
Instructing for positioner is closed by local input, positioner is deliberately closed with the people of the tamper-proof mobile terminal hidden and chase after
Track.As long as the owner of the mobile terminal from cloud server end log in personal account and to mobile terminal send the machine given for change or
When closing positioner instruction, the positioner of mobile terminal just performs closing.In the case that mobile terminal shuts down, open
The mobile terminal entrance for opening anti-theft modes is false off-mode, that is, shuts down but do not close positioner, be in positioner
Running status, until electricity exhausts.But when mobile terminal is connected with the mains, positioner is waken up at once.
S4, positioner detects ownship position information in real time and the synchronous positional information is to Cloud Server.
Under anti-theft modes, positioner is opened and detects the location of mobile terminal information in real time, and by detection
Positional information uploads to Cloud Server or other equipment authorized by network, so that the owner of mobile terminal passes through cloud service
Device or the stand-by equipment of mandate consult the positional information, and find by positional information the mobile terminal of loss.What is authorized is standby
Equipment includes terminal where spare mobile phone, default mailbox etc..For example by the positional information of detection by short message sending to standby
Mobile phone, positional information that user is received by spare mobile phone, grasps the location of mobile terminal for losing, so as to give loss for change
Mobile terminal;Or the positional information of detection by mail is sent to default mailbox, user is by logging in default mailbox
Positional information is obtained, the location of the mobile terminal of loss is grasped, so as to give the mobile terminal of loss for change.Number of spare mobile phone
Code and default mailbox need user to be set in anti-theft modes presupposed information, and the default information can all upload cloud service
Device carries out backup preservation.
The anti-theft method for mobile terminal of implementation above, it is determined that mobile terminal be in lost condition after, opening anti-theft pattern,
The local material upload Cloud Server of mobile terminal is backed up so that subscriber data is not lost, while deletion mobile terminal is locally provided
Material obtains the real-time position information of mobile terminal and uploads to cloud service in order to avoid subscriber data leaks while opening positioner
Device, to help user to give the mobile terminal of loss for change according to the positional information of acquisition.
Embodiment two
Second embodiment of the invention provides a kind of anti-theft method for mobile terminal, as shown in figure 4, methods described includes following step
Suddenly:
S21, enrolls user fingerprints information, using finger print information as the unlocking cipher of mobile terminal, by the finger print information
Bound with the International Mobile Equipment Identity code of mobile terminal, upload the finger print information and International Mobile Equipment Identity code to cloud clothes
Business device.
The International Mobile Equipment Identity code of mobile terminal:(International Mobile Equipment
Identity IMEI code) is abbreviated as, " the electronics string number " being made up of 15 bit digitals, it is a pair with every mobile phone 1
Should, and the code is that the whole world is unique.It is unique that each mobile phone will all be endowed a whole world after finishing assembly
A sets of numbers, this number from producing to being delivered for use all will by manufacture production manufacturer record.
The International Mobile Equipment Identity code of user fingerprints information and mobile terminal is bound, and fingerprint is close as starting shooting
Code, is the one-to-one corresponding in order to ensure mobile terminal and user, it is ensured that mobile terminal only has user to carry out one to be
Row safety operation, for example:Unblock, Modify password, deletion important information, access privacy information etc..
S22, the instruction that acquisition for mobile terminal the machine is lost;
S23, obtains Internet resources according to the instruction, automatically deletes locally-stored material upload Cloud Server simultaneously
Local data;
S24, opening locating device is simultaneously locked, and is not connect not getting the out code prelocalization device from Cloud Server
By local out code;
S25, positioner detects ownship position information in real time and the synchronous positional information is to Cloud Server.
S26, the prompting message of the machine loss is sent to the default stand-by equipment of mobile terminal, and the prompting message includes shifting
Dynamic current location information of terminal, default prompting message, new insert SIM card number one or more.
Can be that mobile terminal voluntarily confirms according to setting condition because determining that mobile terminal is in lost condition, so
When lost condition is confirmed by mobile terminal self, user oneself is possible to have no knowledge about the mobile terminal loss of oneself, institute
To confirm the mobile terminal lost after opening anti-theft pattern, except the positional information upload service for detecting positioner in real time
Outside device, also the information that mobile terminal is lost is notified to user, allows a user to what very first time understanding mobile terminal had been lost
The fact, is easy to user to begin look for mobile terminal as early as possible.
Specifically, the telephone number of the standby call set during by being initialized to anti-theft modes sends carrying for the machine loss
Awake information, the prompting message includes mobile terminal current location information, default prompting message, newly inserts the one of SIM card number
Item is multinomial.
Or, the standby E-mail address set during by being initialized to mobile terminal sends the prompting letter of the machine loss
Breath, the prompting message comprising mobile terminal current location information, default prompting message, new insert SIM card number one or
It is multinomial.
In addition to the prompting message, the real-time position information that can be detected with additional positioning device, so that mobile terminal
Owner learn present situation that mobile terminal loses the very first time and the positional information consulted by stand-by equipment, and pass through position
Information finds the mobile terminal of loss.Stand-by equipment includes the spare mobile phone of user, and user will be standby when anti-theft modes are initialized
Set with the phone number of mobile phone and arrive mobile terminal.Mobile terminal uploads the information of detection after Cloud Server, also by detection
Positional information to spare mobile phone, positional information that user is received by spare mobile phone, grasps the movement lost by short message sending
The location of terminal, so as to give the mobile terminal of loss for change;Or be sent to the positional information of detection by mail default
Mailbox, user obtains positional information by logging in default mailbox, the location of the mobile terminal of loss is grasped, so as to give for change
The mobile terminal of loss.The number of spare mobile phone and default mailbox need user to be set in anti-theft modes presupposed information, should
Default information can all upload Cloud Server and carry out backup preservation.
The anti-theft method for mobile terminal of implementation above, it is determined that mobile terminal be in lost condition after, opening anti-theft pattern,
The local material upload Cloud Server of mobile terminal is backed up so that subscriber data is not lost, while deletion mobile terminal is locally provided
Material obtains the real-time position information of mobile terminal and uploads to cloud service in order to avoid subscriber data leaks while opening positioner
Device, and sent to stand-by equipment outside the prompting message that mobile terminal is lost, the real time position that can be detected with additional positioning device
Information, so that the owner of mobile terminal learns the present situation of mobile terminal loss the very first time and consults the position by stand-by equipment
Confidence ceases, and finds by positional information the mobile terminal of loss.
Embodiment three
Third embodiment of the invention provides a kind of anti-theft method for mobile terminal, as shown in figure 5, methods described includes following step
Suddenly:
S31, enrolls user fingerprints information, using finger print information as the unlocking cipher of mobile terminal, by the finger print information
Bound with the International Mobile Equipment Identity code of mobile terminal, upload the finger print information and International Mobile Equipment Identity code to cloud clothes
Business device.
S32, the instruction that acquisition for mobile terminal the machine is lost;
S33, obtains Internet resources according to the instruction, automatically deletes locally-stored material upload Cloud Server simultaneously
Local data;
S34, opening locating device is simultaneously locked, and is not connect not getting the out code prelocalization device from Cloud Server
By local out code;
S35, positioner detects ownship position information in real time and the synchronous positional information is to Cloud Server;
S36, the prompting message of the machine loss is sent to the default stand-by equipment of mobile terminal, and the prompting message includes shifting
Dynamic current location information of terminal, default prompting message, new insert SIM card number one or more;
S37, receives the instruction that the machine from Cloud Server has been given for change, downloads backup information from Cloud Server automatically,
Release the instruction that positioner opens locking.
Specifically, to prevent the antecessor that works as the mobile terminal lost from releasing positioner from local by illegal means
Locking, the mode such as brush machine, the order unlocked the ability that mobile terminal is defined to send by Cloud Server
Release the positioner lock-out state of mobile terminal.When user gives the mobile terminal of loss for change by the positional information obtained in real time
Afterwards, it is necessary to release the lock-out state of mobile terminal.User logs in Cloud Server personal account, mobile terminal is sent to mobile terminal
The order of positioner locking is given or has released for change, given for change when the mobile terminal given for change receives the machine from Cloud Server
Or the instruction of positioner locking is released, backup information is downloaded from Cloud Server automatically, the mobile terminal that aspect is given for change is returned to
Use state before loss, while releasing the instruction that positioner opens locking, now the positioner of mobile terminal just can be with
Terminate lasting open.
The anti-theft method for mobile terminal of implementation above, after mobile terminal is given for change, obtains from cloud service and gives instruction for change, and under
The state that backup information returns to mobile terminal before losing is carried, is user-friendly, user experience is improved, released simultaneously
The lasting locking of positioner, improves the security of mobile terminal.
Example IV
Fourth embodiment of the invention provides a kind of anti-theft method for mobile terminal, as shown in fig. 6, methods described includes following step
Suddenly:
S41, enrolls user fingerprints information, using finger print information as the unlocking cipher of mobile terminal, by the finger print information
Bound with the International Mobile Equipment Identity code of mobile terminal, upload the finger print information and International Mobile Equipment Identity code to cloud clothes
Business device;
S42, the instruction that acquisition for mobile terminal the machine is lost;
S43, obtains Internet resources according to the instruction, automatically deletes locally-stored material upload Cloud Server simultaneously
Local data;
S44, opening locating device is simultaneously locked, and is not connect not getting the out code prelocalization device from Cloud Server
By local out code;
S45, positioner detects ownship position information in real time and the synchronous positional information is to Cloud Server;
S46, obtains the signal of mobile terminal shutdown, turning-off mobile terminal but the lasting work of positioner for keeping mobile terminal
Make.
After mobile terminal is lost, when antecessor can typically cut off contacting for user and its mobile terminal by every possible means,
Simplest method is exactly that first mobile terminal shuts down, and in current many ultra-thin mobile terminals, battery is embedded in mobile whole
In end housing, and removing battery is not received, holder can only be shut down by closing key.So, setting mobile terminal starts
Shutdown after anti-theft modes is false shutdown, i.e., surface is shut down, but the designated program on backstage does not terminate operation, and designated program is included
But positioner, mixed-media network modules mixed-media are not limited to, mobile terminal is maintained positioner test position under the unspent state of electric power
Information, and the positional information of detection is passed through into Network Synchronization to Cloud Server.The guard of eavesdropper can so be effectively reduced
The heart, and user can be made to obtain mobile terminal present position from Cloud Server in time, therefore mobile terminal is found faster.
In addition to the real-time position information that the positioner is detected, it can also be sent to the stand-by equipment of user and remind letter
Breath and positional information, so that the owner of mobile terminal learns the present situation of mobile terminal loss the very first time and by stand-by equipment
The positional information is consulted, and finds by positional information the mobile terminal of loss.Stand-by equipment includes the spare mobile phone of user, uses
The phone number of spare mobile phone is set and arrives mobile terminal by family when anti-theft modes are initialized.Mobile terminal is by the information of detection
Pass after Cloud Server, also by the positional information of detection by short message sending to spare mobile phone, user is received by spare mobile phone
The location of positional information, the mobile terminal for grasping loss, so as to give the mobile terminal of loss for change;Or by the position of detection
Information through mail is sent to default mailbox, and user obtains positional information by logging in default mailbox, grasps the movement lost
The location of terminal, so as to give the mobile terminal of loss for change.The number of spare mobile phone and default mailbox need user antitheft
Set during pattern presupposed information, the default information can all upload Cloud Server and carry out backup preservation.
The theft preventing method of implementation above, by setting false shutdown, allows the mobile terminal of loss under false power down condition,
Continue to operate positioner and mixed-media network modules mixed-media, so that user knows the position of mobile terminal and gives the mobile end of loss for change in time
End, the probability for being retrieved mobile terminal is higher.
Embodiment five
Fifth embodiment of the invention provides a kind of anti-theft method for mobile terminal, as shown in fig. 7, methods described includes following step
Suddenly:
S51, enrolls user fingerprints information, using finger print information as the unlocking cipher of mobile terminal, by the finger print information
Bound with the International Mobile Equipment Identity code of mobile terminal, upload the finger print information and International Mobile Equipment Identity code to cloud clothes
Business device;
S52, the instruction that acquisition for mobile terminal the machine is lost;
S53, obtains Internet resources according to the instruction, automatically deletes locally-stored material upload Cloud Server simultaneously
Local data;
S54, opening locating device is simultaneously locked, and is not connect not getting the out code prelocalization device from Cloud Server
By local out code;
S55, positioner detects ownship position information in real time and the synchronous positional information is to Cloud Server;
S56, obtains the signal of mobile terminal shutdown, turning-off mobile terminal but the lasting work of positioner for keeping mobile terminal
Make;
S57, when obtaining mobile terminal brush machine signal, opens up a private partition deposit bag in the hard disk of mobile terminal automatically
Containing the user's identification program and information including user fingerprints information, and keep backstage automatic running and perform user's identification, until
Receive after the machine from Cloud Server has given instruction for change and voluntarily destroy the private partition.
User's identification, when being the interactive operation of user and mobile terminal in simple terms, mobile terminal issues the user with identity
The request of checking, the legitimacy of user identity is recognized with this.Specific authentication means including but not limited to:Numerical ciphers are tested
Card, finger-print cipher checking, safety problem checking, check code checking;According to the situation of user error, authentication is increased or decreased
Means.When mobile terminal obtains mobile terminal brush machine signal under anti-theft modes opening, illustrate to steal mobile terminal
People is ready for releasing the Software security protection of mobile terminal by way of resetting mobile terminal system, in order to ensure user security
The safety of antitheft information, mobile terminal opens up a private partition deposit in the hard disk of mobile terminal automatically and includes user fingerprints letter
User's identification program and information including breath, such as anti-theft modes and fingerprint recognition Verification System, and keep backstage automatic running
With execution user's identification, the private partition is voluntarily destroyed until receiving after the machine from Cloud Server has given instruction for change.Make
Even if the mobile terminal that must be lost faces ultimate threat as brush machine, security protection ability and loss still can be kept to look for
The ability returned, makes the security performance of mobile terminal higher.
The theft preventing method of implementation above, even if making the mobile terminal of loss face ultimate threat as brush machine, still may be used
To keep the ability that security protection ability and loss are given for change, make the security performance of mobile terminal higher.
Embodiment six
Sixth embodiment of the invention provides a kind of mobile terminal, as shown in figure 1, including memory 109, the and of processor 110
At least one is stored in the memory 109 and is configured as the anti-theft program performed by the processor 110, described anti-
Robber's program is configurable for performing following steps:
The first step, the instruction that acquisition for mobile terminal the machine is lost;
Confirm after the fact that mobile terminal is lost, mobile terminal starts anti-theft modes.General mobile terminal determines to lose
The fact, it can voluntarily judge to learn according to the generation of some suspicious event for mobile terminal, can also be by receiving cloud service
The loss of device or stand-by equipment instructs and judges to learn.Following several situations can specifically be included:
1st, when the number of times that mobile terminal obtains wrong unlocking cipher in setting time exceedes the setting upper limit, mobile terminal
Obtain the instruction that the machine is lost.
The upper limit number of times statistics of mistake unlocking cipher input, should be the statistics in a setting time, the setting time
Can be 24 hours or other times.The unlocking cipher can be finger-print cipher or numerical ciphers, for example, be set in 24 small
When interior mobile terminal 1 00 unlocking cipher 10 times of mistake is received by contact panel 1071, that is, judged the mobile terminal
Not under proprietary control, as mobile terminal is lost.The setting upper limit of 10 times, can be independent finger-print cipher input
The number of times of mistake or the number of times of independent numerical ciphers input error, or numerical ciphers and finger-print cipher are altogether
Unlocking times.
2nd, the instruction that the machine of acquisition for mobile terminal from Cloud Server is lost.
When judging whether mobile terminal is lost, the order by receiving Cloud Server is a mode.Specifically, user
Can be then whole to movement by personal account by logging in the personal account of Cloud Server with the account that customer mobile terminal is bound
The client that end is sent on the instruction of mobile terminal loss, mobile terminal is received after the instruction, and mobile terminal is to obtain at the machine
In the instruction of lost condition, and then start anti-theft modes.
3rd, the instruction that password is reset is being obtained, but when not obtaining the information for confirming password replacement from stand-by equipment, moved
Dynamic terminal obtains the instruction of the machine loss.
Judge that the another way that mobile terminal is in lost condition is that mobile terminal cannot be introduced into operation because of code error
Interface, can provide the guide of change of secret code, if currently used people tries to enter operation circle by changing the channel of password
The authority in face, mobile terminal can propose whether checking user possesses the means for the authority for changing password, such as input original password,
Or the answer of new password or input validation problem is received by other stand-by equipments or the identity of real-name authentication is inputted
Information etc., but no matter which kind of mode, will by stand-by equipment to mobile terminal send confirm password modification instruction be defined, it is no
Then to estimate this change of secret code illegal for mobile terminal, confirms that mobile terminal is in lost condition, starts anti-theft modes.
Stand-by equipment can be user in the default backup phone number of mobile terminal, standby email address, this is default
Backup phone number, standby email address information upload Cloud Server and preserved simultaneously.
4th, when obtaining the instruction of SIM card change but not obtaining the information for the confirmation SIM card change that stand-by equipment is sent,
The instruction that acquisition for mobile terminal the machine is lost.
When mobile terminal is replaced SIM card, to ensure that the action is user's operation, mobile terminal is from trend stand-by equipment
Prompting message is sent, when acting legal instruction of the replacing SIM card is confirmed when stand-by equipment is sent, then mobile terminal is not in
Under illegal control, when acting legal instruction of the replacing SIM card is confirmed when stand-by equipment is not sent, then mobile terminal is estimated
This SIM card replacing action is illegal, confirms that mobile terminal is in lost condition, starts anti-theft modes.
5th, after the information for the machine loss that stand-by equipment is sent is obtained, the instruction that acquisition for mobile terminal the machine is lost.
When mobile terminal is lost, user can send loss to mobile device by default stand-by equipment and instruct, and move
When dynamic terminal receives the instruction, confirm that the machine is in lost condition, start anti-theft modes.
Second step, obtains Internet resources, automatically by locally-stored material upload Cloud Server simultaneously according to the instruction
Delete local data;
When mobile terminal obtains the machine by above channel is in the instruction of lost condition, opening anti-theft pattern, i.e., certainly
The dynamic network that passes through is by the material upload Cloud Server stored on mobile terminal, while local data is deleted, to protect user to store
In the data security of mobile terminal;Due to mobile terminal probably due to departing from conventional Wi-Fi environment and closing data network and make
Mobile terminal is in the state without network, and now mobile terminal automatically turns on mobile data network or automatically turns on WiFi moulds
The search of block 102 can be connected with Wi-Fi wireless networks and automatically, pass through mobile data network or the Wi-Fi wireless networks connected
By the material upload Cloud Server stored on mobile terminal, while deleting local data.
3rd step, opening locating device is simultaneously locked, and the out code prelocalization device from Cloud Server is not being got
Local out code is not received;
Receive after the instruction that the machine has been lost, mobile terminal will also be except data on the processing mobile terminal of safety
The operation for starting and helping user to give mobile terminal for change is carved, concrete operations are:Opening locating device, the positioner is included but not
It is limited to the functional modules such as GPS, wireless network positioning, sensor positioning;Make positioner keep lasting to open, and do not receive this
The instruction of the closing positioner of ground input, deliberately closes positioner with the people of the tamper-proof mobile terminal and hides tracking.Only
Will the owner of the mobile terminal log in personal account from cloud server end and send the machine to mobile terminal and given for change or closed
When positioner is instructed, the positioner of mobile terminal just performs closing.In the case that mobile terminal shuts down, open anti-
What the mobile terminal of robber's pattern entered is false off-mode, that is, shuts down but do not close positioner, positioner is in operation
State, until electricity exhausts.But when mobile terminal is connected with the mains, positioner is waken up at once.
4th step, positioner detects ownship position information in real time and the synchronous positional information is to Cloud Server.
Under anti-theft modes, positioner is opened and detects the location of mobile terminal information in real time, and by detection
Positional information uploads to Cloud Server or other equipment authorized by network, so that the owner of mobile terminal passes through cloud service
Device or the stand-by equipment of mandate consult the positional information, and find by positional information the mobile terminal of loss.What is authorized is standby
Equipment includes terminal where spare mobile phone, default mailbox etc..For example by the positional information of detection by short message sending to standby
Mobile phone, positional information that user is received by spare mobile phone, grasps the location of mobile terminal for losing, so as to give loss for change
Mobile terminal;Or the positional information of detection by mail is sent to default mailbox, user is by logging in default mailbox
Positional information is obtained, the location of the mobile terminal of loss is grasped, so as to give the mobile terminal of loss for change.Number of spare mobile phone
Code and default mailbox need user to be set in anti-theft modes presupposed information, and the default information can all upload cloud service
Device carries out backup preservation.
The mobile terminal of implementation above, it is determined that mobile terminal is after lost condition, opening anti-theft pattern will be mobile whole
The local material upload Cloud Server in end is backed up so that subscriber data is not lost, at the same delete the local data of mobile terminal so as not to
Family data leaks, and obtains the real-time position information of mobile terminal while opening positioner and uploads to Cloud Server, to help
User gives the mobile terminal of loss for change according to the positional information of acquisition.
Embodiment seven
Seventh embodiment of the invention provides a kind of mobile terminal, as shown in figure 1, including memory 109, the and of processor 110
At least one is stored in the memory 109 and is configured as the anti-theft program performed by the processor 110, described anti-
Robber's program is configurable for performing embodiment two, embodiment three, example IV, the step of embodiment five any one theft preventing method
Suddenly, it will not be repeated here.
Embodiment eight
Eighth embodiment of the invention is provided deposits on a kind of computer-readable recording medium, the computer-readable recording medium
Guarding against theft for mobile terminal program is contained, the guarding against theft for mobile terminal program realizes following steps when being executed by processor:
The first step, the instruction that acquisition for mobile terminal the machine is lost;
Confirm after the fact that mobile terminal is lost, mobile terminal starts anti-theft modes.General mobile terminal determines to lose
The fact, it can voluntarily judge to learn according to the generation of some suspicious event for mobile terminal, can also be by receiving cloud service
The loss of device or stand-by equipment instructs and judges to learn.Following several situations can specifically be included:
1st, when the number of times that mobile terminal obtains wrong unlocking cipher in setting time exceedes the setting upper limit, mobile terminal
Obtain the instruction that the machine is lost.
The upper limit number of times statistics of mistake unlocking cipher input, should be the statistics in a setting time, the setting time
Can be 24 hours or other times.The unlocking cipher can be finger-print cipher or numerical ciphers, for example, be set in 24 small
When drawback lock Password Input mistake 10 times, that is, judge the mobile terminal not under proprietary control, as it is mobile eventually
Lose at end.The setting upper limit of 10 times, can be the number of times or independent numerical ciphers of independent finger-print cipher input error
The number of times of input error, or numerical ciphers and the unlocking times of finger-print cipher altogether.
2nd, the instruction that the machine of acquisition for mobile terminal from Cloud Server is lost.
When judging whether mobile terminal is lost, the order by receiving Cloud Server is a mode.Specifically, user
Can be then whole to movement by personal account by logging in the personal account of Cloud Server with the account that customer mobile terminal is bound
The client that end is sent on the instruction of mobile terminal loss, mobile terminal is received after the instruction, and mobile terminal is to obtain at the machine
In the instruction of lost condition, and then start anti-theft modes.
3rd, the instruction that password is reset is being obtained, but when not obtaining the information for confirming password replacement from stand-by equipment, moved
Dynamic terminal obtains the instruction of the machine loss.
Judge that the another way that mobile terminal is in lost condition is that mobile terminal cannot be introduced into operation because of code error
Interface, can provide the guide of change of secret code, if currently used people tries to enter operation circle by changing the channel of password
The authority in face, mobile terminal can propose whether checking user possesses the means for the authority for changing password, such as input original password,
Or the answer of new password or input validation problem is received by other stand-by equipments or the identity of real-name authentication is inputted
Information etc., but no matter which kind of mode, will by stand-by equipment to mobile terminal send confirm password modification instruction be defined, it is no
Then to estimate this change of secret code illegal for mobile terminal, confirms that mobile terminal is in lost condition, starts anti-theft modes.
Stand-by equipment can be user in the default backup phone number of mobile terminal, standby email address, this is default
Backup phone number, standby email address information upload Cloud Server and preserved simultaneously.
4th, when obtaining the instruction of SIM card change but not obtaining the information for the confirmation SIM card change that stand-by equipment is sent,
The instruction that acquisition for mobile terminal the machine is lost.
When mobile terminal is replaced SIM card, to ensure that the action is user's operation, mobile terminal is from trend stand-by equipment
Prompting message is sent, when acting legal instruction of the replacing SIM card is confirmed when stand-by equipment is sent, then mobile terminal is not in
Under illegal control, when acting legal instruction of the replacing SIM card is confirmed when stand-by equipment is not sent, then mobile terminal is estimated
This SIM card replacing action is illegal, confirms that mobile terminal is in lost condition, starts anti-theft modes.
5th, after the information for the machine loss that stand-by equipment is sent is obtained, the instruction that acquisition for mobile terminal the machine is lost.
When mobile terminal is lost, user can send loss to mobile device by default stand-by equipment and instruct, and move
When dynamic terminal receives the instruction, confirm that the machine is in lost condition, start anti-theft modes.
Second step, obtains Internet resources, automatically by locally-stored material upload Cloud Server simultaneously according to the instruction
Delete local data;
When mobile terminal obtains the machine by above channel is in the instruction of lost condition, opening anti-theft pattern, i.e., certainly
The dynamic network that passes through is by the material upload Cloud Server stored on mobile terminal, while local data is deleted, to protect user to store
In the data security of mobile terminal;Due to mobile terminal probably due to departing from conventional Wi-Fi environment and closing data network and make
Mobile terminal is in the state without network, and now mobile terminal, which automatically turns on mobile data network or search, can use Wi-Fi
Wireless network is simultaneously connected automatically, will be stored by mobile data network or the Wi-Fi wireless networks connected on mobile terminal
Material upload Cloud Server, while deleting local data.
3rd step, opening locating device is simultaneously locked, and the out code prelocalization device from Cloud Server is not being got
Local out code is not received;
Receive after the instruction that the machine has been lost, mobile terminal will also be except data on the processing mobile terminal of safety
The operation for starting and helping user to give mobile terminal for change is carved, concrete operations are:Opening locating device, the positioner is included but not
It is limited to the functional modules such as GPS, wireless network positioning, sensor positioning, positioner is kept lasting and open, do not receive local defeated
The instruction of the closing positioner entered, deliberately closes positioner with the people of the tamper-proof mobile terminal and hides tracking.As long as should
The owner of mobile terminal logs in personal account and send the machine to mobile terminal from cloud server end has given or has closed positioning for change
When device is instructed, the positioner of mobile terminal just performs closing.In the case that mobile terminal shuts down, opening anti-theft mould
What the mobile terminal of formula entered is false off-mode, that is, shuts down but do not close positioner, positioner is in running status,
Until electricity exhausts.But when mobile terminal is connected with the mains, positioner is waken up at once.
4th step, positioner detects ownship position information in real time and the synchronous positional information is to Cloud Server.
Under anti-theft modes, positioner is opened and detects the location of mobile terminal information in real time, and by detection
Positional information uploads to Cloud Server or other equipment authorized by network, so that the owner of mobile terminal passes through cloud service
Device or the stand-by equipment of mandate consult the positional information, and find by positional information the mobile terminal of loss.What is authorized is standby
Equipment includes terminal where spare mobile phone, default mailbox etc..For example by the positional information of detection by short message sending to standby
Mobile phone, positional information that user is received by spare mobile phone, grasps the location of mobile terminal for losing, so as to give loss for change
Mobile terminal;Or the positional information of detection by mail is sent to default mailbox, user is by logging in default mailbox
Positional information is obtained, the location of the mobile terminal of loss is grasped, so as to give the mobile terminal of loss for change.Number of spare mobile phone
Code and default mailbox need user to be set in anti-theft modes presupposed information, and the default information can all upload cloud service
Device carries out backup preservation.
The computer-readable recording medium of implementation above, when the guarding against theft for mobile terminal program of its storage is handled by least one
After device is performed, following effect is realized:
It is determined that terminal residing for processor be in lost condition after, opening anti-theft pattern, by the material upload of terminal local
Cloud Server is backed up so that subscriber data is not lost, while deletion terminal local data is opened in order to avoid subscriber data leaks simultaneously
Positioner obtains the real-time position information of terminal and uploads to Cloud Server, to help user to be looked for according to the positional information of acquisition
Return the terminal lost.
Embodiment nine
Ninth embodiment of the invention is provided deposits on a kind of computer-readable recording medium, the computer-readable recording medium
Contain guarding against theft for mobile terminal program, the guarding against theft for mobile terminal program realized when being executed by processor embodiment two, embodiment three,
The step of example IV, any one theft preventing method of embodiment five, it will not be repeated here.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row
His property is included, so that process, method, article or device including a series of key elements not only include those key elements, and
And also including other key elements being not expressly set out, or also include for this process, method, article or device institute inherently
Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this
Also there is other identical element in process, method, article or the device of key element.
The embodiments of the present invention are for illustration only, and the quality of embodiment is not represented.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Understood based on such, technical scheme is substantially done to prior art in other words
Going out the part of contribution can be embodied in the form of software product, and the computer software product is stored in a storage medium
In (such as ROM/RAM, magnetic disc, CD), including some instructions are to cause a station terminal (can be mobile phone, computer, service
Device, air conditioner, or network equipment etc.) perform method described in each of the invention embodiment.
Embodiments of the invention are described above in conjunction with accompanying drawing, but the invention is not limited in above-mentioned specific
Embodiment, above-mentioned embodiment is only schematical, rather than restricted, one of ordinary skill in the art
Under the enlightenment of the present invention, in the case of present inventive concept and scope of the claimed protection is not departed from, it can also make a lot
Form, these are belonged within the protection of the present invention.
Claims (10)
1. a kind of anti-theft method for mobile terminal, it is characterised in that:It the described method comprises the following steps:
The instruction that acquisition for mobile terminal the machine is lost;
Internet resources are obtained according to the instruction, locally-stored material upload Cloud Server is deleted to local money simultaneously automatically
Material;
Opening locating device is simultaneously locked, and local pass is not received not getting the out code prelocalization device from Cloud Server
Close instruction;
Positioner detects ownship position information in real time and the synchronous positional information is to Cloud Server.
2. anti-theft method for mobile terminal according to claim 1, it is characterised in that:Described acquisition for mobile terminal the machine is lost
Instruction before, methods described also include step:
User fingerprints information is enrolled, it is using finger print information as the unlocking cipher of mobile terminal, the finger print information is whole with movement
The International Mobile Equipment Identity code binding at end, uploads the finger print information and International Mobile Equipment Identity code arrives Cloud Server.
3. anti-theft method for mobile terminal according to claim 1, it is characterised in that:Described acquisition for mobile terminal the machine is lost
Instruction specifically include:
When the number of times that mobile terminal obtains wrong unlocking cipher in setting time exceedes the setting upper limit, acquisition for mobile terminal sheet
The instruction that machine is lost;Or
The instruction that the machine of acquisition for mobile terminal from Cloud Server is lost;Or
When obtaining the instruction of password replacement but not obtaining the information for confirming password replacement from stand-by equipment, mobile terminal
Obtain the instruction that the machine is lost;Or
It is mobile whole when obtaining the instruction of SIM card change but not obtaining the information for the confirmation SIM card change that stand-by equipment is sent
End obtains the instruction that the machine is lost;Or
The information that the machine of acquisition for mobile terminal from stand-by equipment is lost.
4. anti-theft method for mobile terminal according to claim 1, it is characterised in that:The positioner detects the machine in real time
Positional information and the synchronous positional information are to after Cloud Server, and methods described also includes step:
The prompting message of the machine loss is sent to the default stand-by equipment of mobile terminal, the prompting message is worked as comprising mobile terminal
Front position information, default prompting message, new insert SIM card number one or more.
5. anti-theft method for mobile terminal according to claim 1, it is characterised in that:The step is obtained according to the instruction
Internet resources, automatically by the material upload Cloud Server stored on mobile terminal, are specifically included while deleting local data:
Mobile data network is automatically turned on and by mobile data network by the data stored on mobile terminal according to the instruction
Cloud Server is uploaded, while deleting local data;Or
It can be connected according to the instruction search with Wi-Fi wireless networks and automatically, passing through connected Wi-Fi wireless networks will shifting
The material upload Cloud Server stored in dynamic terminal, while deleting local data.
6. anti-theft method for mobile terminal according to claim 1, it is characterised in that:The positioner detects the machine in real time
Positional information and the synchronous positional information are to after Cloud Server, and methods described also includes step:
The instruction that the machine from Cloud Server has been given for change is received, backup information is downloaded from Cloud Server automatically, positioning is released
Device opens the instruction of locking.
7. anti-theft method for mobile terminal according to claim 1, it is characterised in that:The positioner detects the machine in real time
Positional information and the synchronous positional information are to after Cloud Server, and methods described also includes step:
Obtain the signal of mobile terminal shutdown, turning-off mobile terminal but the positioner continuous firing for keeping mobile terminal.
8. anti-theft method for mobile terminal according to claim 1, it is characterised in that:The positioner detects the machine in real time
Positional information and the synchronous positional information are to after Cloud Server, and methods described also includes step:
When obtaining mobile terminal brush machine signal, open up the deposit of private partition in the hard disk of mobile terminal automatically and refer to comprising user
User's identification program and information including line information, and keep backstage automatic running and perform user's identification, come until receiving
The private partition is voluntarily destroyed after having given instruction for change from the machine of Cloud Server.
9. a kind of mobile terminal, including memory, processor and at least one be stored in the memory and be configured as
By the application program of the computing device, it is characterised in that at least one described application program is configurable for right of execution
Profit requires the anti-theft method for mobile terminal described in any one of 1 to 8 claim.
10. a kind of computer-readable recording medium, it is characterised in that be stored with the computer-readable recording medium mobile whole
Anti-theft program is held, is realized when the guarding against theft for mobile terminal program is executed by processor as any one of claim 1 to 8
The step of anti-theft method for mobile terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710343395.9A CN107194291A (en) | 2017-05-16 | 2017-05-16 | Anti-theft method for mobile terminal, mobile terminal and computer-readable recording medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710343395.9A CN107194291A (en) | 2017-05-16 | 2017-05-16 | Anti-theft method for mobile terminal, mobile terminal and computer-readable recording medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107194291A true CN107194291A (en) | 2017-09-22 |
Family
ID=59873695
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710343395.9A Pending CN107194291A (en) | 2017-05-16 | 2017-05-16 | Anti-theft method for mobile terminal, mobile terminal and computer-readable recording medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107194291A (en) |
Cited By (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107493395A (en) * | 2017-09-30 | 2017-12-19 | 陈银芳 | The data destroying method and Related product of smart mobile phone |
CN107610432A (en) * | 2017-10-16 | 2018-01-19 | 李修球 | A kind of intelligent alarm method, system and intelligent mobile terminal |
CN107707746A (en) * | 2017-09-25 | 2018-02-16 | 北京珠穆朗玛移动通信有限公司 | Management method, electronic equipment and the storage medium of mobile terminal |
CN107819752A (en) * | 2017-10-30 | 2018-03-20 | 维沃移动通信有限公司 | A kind of document protection method and mobile terminal |
CN107908976A (en) * | 2017-12-07 | 2018-04-13 | 珠海市横琴新区龙族科技有限公司 | The concealed secret control device in electronic equipment backstage and its method |
CN108241805A (en) * | 2018-01-02 | 2018-07-03 | 联想(北京)有限公司 | For handling the method for data, equipment and memory devices |
CN108764409A (en) * | 2018-05-31 | 2018-11-06 | 国网河南省电力公司检修公司 | Secondary device machine account management system |
CN108810239A (en) * | 2017-12-24 | 2018-11-13 | 湛江正信科技服务有限公司 | Method, apparatus, intelligent terminal and the storage medium that intelligent terminal is recovered |
CN109117666A (en) * | 2018-07-27 | 2019-01-01 | 深圳市国通世纪科技开发有限公司 | Lose terminal safety protection method, computer equipment and storage medium |
CN109379706A (en) * | 2018-08-15 | 2019-02-22 | 深圳壹账通智能科技有限公司 | Anti-theft method for mobile terminal, device, system and storage medium |
CN109460648A (en) * | 2018-11-13 | 2019-03-12 | 广东财经大学 | A kind of computer data defence method |
CN109561068A (en) * | 2018-10-23 | 2019-04-02 | 芜湖汉科信息技术有限公司 | A kind of information terminal safety system |
CN109981894A (en) * | 2019-02-28 | 2019-07-05 | 北京基软科技有限公司 | A kind of anti-mobile phone loss device |
CN110308874A (en) * | 2019-06-27 | 2019-10-08 | 青海民族大学 | A kind of portable intelligent storage device and method |
CN110620847A (en) * | 2019-10-21 | 2019-12-27 | 深圳传音控股股份有限公司 | Anti-theft method of intelligent terminal and intelligent terminal |
CN111132133A (en) * | 2019-12-27 | 2020-05-08 | 珠海市魅族科技有限公司 | Terminal searching method and device, storage medium and electronic device |
CN111310247A (en) * | 2020-03-11 | 2020-06-19 | 温州市音咯网络科技有限公司 | Anti-theft device of information secrecy hard disk |
CN111372239A (en) * | 2020-02-26 | 2020-07-03 | 珠海市魅族科技有限公司 | Anti-theft control method of intelligent terminal, intelligent terminal and anti-theft system of intelligent terminal |
CN111523096A (en) * | 2020-04-08 | 2020-08-11 | 深圳市筑泰防务智能科技有限公司 | Security management and control method, device, terminal, system and readable storage medium for terminal user |
CN111542047A (en) * | 2020-03-30 | 2020-08-14 | 宇龙计算机通信科技(深圳)有限公司 | Data uploading method and device, storage medium and related equipment |
CN113076564A (en) * | 2021-04-13 | 2021-07-06 | 山东北斗云信息技术有限公司 | Hard disk protection method, device and equipment based on Beidou positioning and storage medium |
CN113676244A (en) * | 2021-08-10 | 2021-11-19 | 南京熊猫电子股份有限公司 | Control method and system based on satellite mobile communication terminal |
CN114157754A (en) * | 2021-12-11 | 2022-03-08 | 天翼电信终端有限公司 | Lost mobile phone retrieving method, system and storage medium based on eSIM card |
CN114205734A (en) * | 2020-09-01 | 2022-03-18 | 成都鼎桥通信技术有限公司 | Control method, device and equipment of positioning function and storage medium |
CN115706747A (en) * | 2021-08-05 | 2023-02-17 | 北京小米移动软件有限公司 | Terminal control method and device, electronic equipment and computer readable storage medium |
CN116132570A (en) * | 2023-04-13 | 2023-05-16 | 深圳市光速时代科技有限公司 | Control method and system for remote interaction based on intelligent watch |
CN116471129A (en) * | 2023-06-20 | 2023-07-21 | 深圳市美力高集团有限公司 | Security monitoring data secure storage system and method based on big data analysis |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101252703A (en) * | 2008-03-28 | 2008-08-27 | 宇龙计算机通信科技(深圳)有限公司 | Terminal data protecting method, system as well as mobile communication terminal |
CN103220646A (en) * | 2013-04-24 | 2013-07-24 | 广东欧珀移动通信有限公司 | Method and system for finding mobile terminal device based on short message |
CN105100383A (en) * | 2014-05-22 | 2015-11-25 | 南京大五教育科技有限公司 | Mobile phone antitheft and tracking positioning system |
CN106060796A (en) * | 2016-06-01 | 2016-10-26 | 宇龙计算机通信科技(深圳)有限公司 | Method and device for destroying backups of terminal |
-
2017
- 2017-05-16 CN CN201710343395.9A patent/CN107194291A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101252703A (en) * | 2008-03-28 | 2008-08-27 | 宇龙计算机通信科技(深圳)有限公司 | Terminal data protecting method, system as well as mobile communication terminal |
CN103220646A (en) * | 2013-04-24 | 2013-07-24 | 广东欧珀移动通信有限公司 | Method and system for finding mobile terminal device based on short message |
CN105100383A (en) * | 2014-05-22 | 2015-11-25 | 南京大五教育科技有限公司 | Mobile phone antitheft and tracking positioning system |
CN106060796A (en) * | 2016-06-01 | 2016-10-26 | 宇龙计算机通信科技(深圳)有限公司 | Method and device for destroying backups of terminal |
Non-Patent Citations (1)
Title |
---|
《电子报》编辑部: "《2014年电子报合订本 下》", 30 November 2014, 电子科技大学出版社 * |
Cited By (33)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107707746B (en) * | 2017-09-25 | 2021-02-23 | 北京珠穆朗玛移动通信有限公司 | Management method of mobile terminal, electronic device and storage medium |
CN107707746A (en) * | 2017-09-25 | 2018-02-16 | 北京珠穆朗玛移动通信有限公司 | Management method, electronic equipment and the storage medium of mobile terminal |
CN107493395A (en) * | 2017-09-30 | 2017-12-19 | 陈银芳 | The data destroying method and Related product of smart mobile phone |
CN107610432A (en) * | 2017-10-16 | 2018-01-19 | 李修球 | A kind of intelligent alarm method, system and intelligent mobile terminal |
CN107819752A (en) * | 2017-10-30 | 2018-03-20 | 维沃移动通信有限公司 | A kind of document protection method and mobile terminal |
CN107819752B (en) * | 2017-10-30 | 2020-06-30 | 维沃移动通信有限公司 | File protection method, mobile terminal and computer readable storage medium |
CN107908976A (en) * | 2017-12-07 | 2018-04-13 | 珠海市横琴新区龙族科技有限公司 | The concealed secret control device in electronic equipment backstage and its method |
CN108810239A (en) * | 2017-12-24 | 2018-11-13 | 湛江正信科技服务有限公司 | Method, apparatus, intelligent terminal and the storage medium that intelligent terminal is recovered |
CN108241805A (en) * | 2018-01-02 | 2018-07-03 | 联想(北京)有限公司 | For handling the method for data, equipment and memory devices |
CN108241805B (en) * | 2018-01-02 | 2021-12-24 | 联想(北京)有限公司 | Method, device and memory device for processing data |
CN108764409A (en) * | 2018-05-31 | 2018-11-06 | 国网河南省电力公司检修公司 | Secondary device machine account management system |
CN109117666A (en) * | 2018-07-27 | 2019-01-01 | 深圳市国通世纪科技开发有限公司 | Lose terminal safety protection method, computer equipment and storage medium |
CN109379706A (en) * | 2018-08-15 | 2019-02-22 | 深圳壹账通智能科技有限公司 | Anti-theft method for mobile terminal, device, system and storage medium |
CN109561068A (en) * | 2018-10-23 | 2019-04-02 | 芜湖汉科信息技术有限公司 | A kind of information terminal safety system |
CN109460648A (en) * | 2018-11-13 | 2019-03-12 | 广东财经大学 | A kind of computer data defence method |
CN109460648B (en) * | 2018-11-13 | 2021-06-22 | 广东财经大学 | Computer data defense method |
CN109981894A (en) * | 2019-02-28 | 2019-07-05 | 北京基软科技有限公司 | A kind of anti-mobile phone loss device |
CN110308874A (en) * | 2019-06-27 | 2019-10-08 | 青海民族大学 | A kind of portable intelligent storage device and method |
CN110620847A (en) * | 2019-10-21 | 2019-12-27 | 深圳传音控股股份有限公司 | Anti-theft method of intelligent terminal and intelligent terminal |
CN110620847B (en) * | 2019-10-21 | 2022-08-30 | 深圳传音控股股份有限公司 | Anti-theft method of intelligent terminal and intelligent terminal |
CN111132133A (en) * | 2019-12-27 | 2020-05-08 | 珠海市魅族科技有限公司 | Terminal searching method and device, storage medium and electronic device |
CN111372239A (en) * | 2020-02-26 | 2020-07-03 | 珠海市魅族科技有限公司 | Anti-theft control method of intelligent terminal, intelligent terminal and anti-theft system of intelligent terminal |
CN111310247A (en) * | 2020-03-11 | 2020-06-19 | 温州市音咯网络科技有限公司 | Anti-theft device of information secrecy hard disk |
CN111542047A (en) * | 2020-03-30 | 2020-08-14 | 宇龙计算机通信科技(深圳)有限公司 | Data uploading method and device, storage medium and related equipment |
CN111523096A (en) * | 2020-04-08 | 2020-08-11 | 深圳市筑泰防务智能科技有限公司 | Security management and control method, device, terminal, system and readable storage medium for terminal user |
CN114205734A (en) * | 2020-09-01 | 2022-03-18 | 成都鼎桥通信技术有限公司 | Control method, device and equipment of positioning function and storage medium |
CN113076564A (en) * | 2021-04-13 | 2021-07-06 | 山东北斗云信息技术有限公司 | Hard disk protection method, device and equipment based on Beidou positioning and storage medium |
CN115706747A (en) * | 2021-08-05 | 2023-02-17 | 北京小米移动软件有限公司 | Terminal control method and device, electronic equipment and computer readable storage medium |
CN113676244A (en) * | 2021-08-10 | 2021-11-19 | 南京熊猫电子股份有限公司 | Control method and system based on satellite mobile communication terminal |
CN113676244B (en) * | 2021-08-10 | 2022-09-02 | 南京熊猫电子股份有限公司 | Control method and system based on satellite mobile communication terminal |
CN114157754A (en) * | 2021-12-11 | 2022-03-08 | 天翼电信终端有限公司 | Lost mobile phone retrieving method, system and storage medium based on eSIM card |
CN116132570A (en) * | 2023-04-13 | 2023-05-16 | 深圳市光速时代科技有限公司 | Control method and system for remote interaction based on intelligent watch |
CN116471129A (en) * | 2023-06-20 | 2023-07-21 | 深圳市美力高集团有限公司 | Security monitoring data secure storage system and method based on big data analysis |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107194291A (en) | Anti-theft method for mobile terminal, mobile terminal and computer-readable recording medium | |
CN108289141A (en) | A kind of the screen locking unlocking method and mobile terminal of mobile terminal | |
CN107315937A (en) | A kind of method for secret protection, mobile terminal and computer-readable recording medium | |
CN107395850A (en) | A kind of social communication information guard method, device and computer-readable recording medium | |
CN107862196A (en) | Fingerprint verification method, mobile terminal and computer-readable recording medium | |
CN109618316A (en) | Network share method, mobile terminal and storage medium | |
CN107122817A (en) | Processing method and Quick Response Code terminal based on Quick Response Code | |
CN109522695A (en) | Application program login method, computer end, mobile terminal, system and storage medium | |
CN109743696A (en) | Identifying code encryption method, system and readable storage medium storing program for executing | |
CN108563959A (en) | File encrypting method, device and computer storage media | |
CN108961489A (en) | A kind of equipment wearing control method, terminal and computer readable storage medium | |
CN108063873A (en) | A kind of application program authority configuring method, mobile terminal and storage medium | |
CN107343272A (en) | A kind of data traffic sharing method and mobile terminal | |
CN108712567A (en) | Theft preventing method, mobile terminal and the computer readable storage medium of mobile terminal | |
CN108206892A (en) | Guard method, device, mobile terminal and the storage medium of contact person's privacy | |
CN107491682A (en) | Terminal unlocking optimization method, terminal and computer-readable recording medium | |
CN107273738A (en) | A kind of method of controlling security, terminal and computer-readable recording medium | |
CN108920917A (en) | Log in end switching method, mobile terminal and computer readable storage medium | |
CN107516051A (en) | A kind of data encryption storage method, device and computer-readable recording medium | |
CN107885988A (en) | A kind of unlocking screen method, terminal and computer-readable recording medium | |
CN107707554A (en) | A kind of login method and mobile terminal of application program account | |
CN107577961A (en) | Mobile terminal and Related product available for security information protection | |
CN107562343A (en) | A kind of interactive regulation and control method, equipment and computer-readable recording medium | |
CN108012270A (en) | A kind of method of information processing, equipment and computer-readable recording medium | |
CN107220554A (en) | A kind of file forwarding management method and corresponding system, terminal device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170922 |