CN104023133A - Anti-theft method and device for mobile terminal - Google Patents
Anti-theft method and device for mobile terminal Download PDFInfo
- Publication number
- CN104023133A CN104023133A CN201410222925.0A CN201410222925A CN104023133A CN 104023133 A CN104023133 A CN 104023133A CN 201410222925 A CN201410222925 A CN 201410222925A CN 104023133 A CN104023133 A CN 104023133A
- Authority
- CN
- China
- Prior art keywords
- information
- current
- mobile terminal
- theft
- facial
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides an anti-theft method and device for a mobile terminal. Wherein, the method comprises the following steps: storing password information and verification information, wherein the verification information comprises one or more of fingerprint information, sound information and face information; obtaining a current password input by a user, comparing the current password with stored password information, if the current password and the stored password information are not consistent, entering a first-level anti-theft mode, executing a first-level locking operation, and obtaining current verification information; and correspondingly comparing the current verification information with the verification information, entering anti-theft modes of different levels according to the comparison result, and executing locking operations of different levels. According to the anti-theft method and device for the mobile terminal, the mobile terminal is protected comprehensively, meanwhile, anti-theft modes of different levels are provided for the mobile terminal, the anti-theft modes of the mobile terminal are enriched, a legal user who cannot use the mobile terminal due to misoperation can use part of functions of the mobile terminal, and user experience is improved.
Description
Technical field
The present invention relates to mobile device technical field, relate in particular to a kind of theft preventing method of mobile terminal.
Background technology
Along with mobile communication technology ground development, mobile terminal for example smart mobile phone because of little, the portable feature of its volume, become the indispensable instrument of people's daily life, for example smart mobile phone of existing mobile terminal is to be no longer simply used for the means of communication of making a phone call and sending short messages, progressively be evolved into the platform of processing and storing personal information, user can carry out the activities such as social class, financial class by mobile terminal, for example, user can carry out online payment by smart mobile phone, transfers accounts on the net etc.
In order to ensure that in mobile terminal, personal information is not utilized or usurps by other people.User can protect mobile terminal by the mode of password at present; be that user is in the time using or activate mobile terminal; need to input password; only input password correct in the situation that user; user just can use mobile terminal; if Password Input mistake exceedes preset times for example 3 times, mobile terminal will be locked completely, and user cannot use mobile terminal.
But; the problem that the above-mentioned mode by password protects mobile terminal to exist is; if the validated user of mobile terminal is the owner of mobile terminal; because inputing password 3 times by mistake because of carelessness or not having at mobile terminal under the state of screen locking; false touch screen and cause password mistake 3 times; mobile terminal will be completely locked, and the validated user of mobile terminal also cannot use mobile terminal, use mobile terminal to make troubles to validated user.
Summary of the invention
The present invention is intended to solve at least to a certain extent one of technical problem in correlation technique.For this reason, one object of the present invention is to propose a kind of theft preventing method and device of mobile terminal, the method and device can be in protecting mobile terminal comprehensively, for mobile terminal provides the anti-theft modes of different stage, enrich the anti-theft modes of mobile terminal, and make can use the partial function of mobile terminal because misoperation cannot be used the validated user of mobile terminal, improved user's experience.
The theft preventing method that has proposed a kind of mobile terminal according to first aspect present invention embodiment, comprising: preserve encrypted message and authorization information, described authorization information comprises one or more in finger print information, acoustic information and facial information; Obtain the current password of user's input, and the described encrypted message of described current password and preservation is compared, if the two is inconsistent, enter one-level anti-theft modes, carry out one-level lock operation, and obtain current authentication information; And described current authentication information and described authorization information correspondence are compared, and enter the anti-theft modes of different stage according to comparison result, carry out the lock operation of different stage.
The theft preventing method of the mobile terminal of the embodiment of the present invention, obtain the current password of user's input, the encrypted message of current password and preservation is compared, and in the time that comparison is inconsistent, enter one-level anti-theft modes, carry out one-level lock operation, and obtain current authentication information, and the authorization information of current authentication information and preservation is compared, and the anti-theft modes that enters different stage according to comparison result, carry out the lock operation of different stage, thus, in protecting mobile terminal comprehensively, for mobile terminal provides the anti-theft modes of different stage, enrich the anti-theft modes of mobile terminal, and make can use the partial function of mobile terminal because misoperation cannot be used the validated user of mobile terminal, improve user's experience.
Second aspect present invention embodiment has proposed a kind of anti-theft device of mobile terminal, comprising: preserve module, for preserving encrypted message and authorization information, described authorization information comprises one or more in finger print information, acoustic information and facial information; Obtain module, for obtaining the current password of user's input, and the described encrypted message of described current password and preservation is compared, if the two is inconsistent, enter one-level anti-theft modes, carry out one-level lock operation, and obtain current authentication information; And processing module, for described current authentication information and described authorization information correspondence are compared, and enter the anti-theft modes of different stage according to comparison result, carry out the lock operation of different stage.
The anti-theft device of the mobile terminal of the embodiment of the present invention, preserve encrypted message and authorization information by preserving module, obtain the current password of user's input by obtaining module, the encrypted message of current password and preservation is compared, and in the time that comparison is inconsistent, enter one-level anti-theft modes, carry out one-level lock operation, and obtain current authentication information, and by processing module, the authorization information of current authentication information and preservation is compared, and the anti-theft modes that enters different stage according to comparison result, carry out the lock operation of different stage, thus, in protecting mobile terminal comprehensively, for mobile terminal provides the anti-theft modes of different stage, enrich the anti-theft modes of mobile terminal, and make can use the partial function of mobile terminal because misoperation cannot be used the validated user of mobile terminal, improve user's experience.
Third aspect present invention embodiment has proposed a kind of mobile terminal, this mobile terminal comprises housing, processor, memory, circuit board and power circuit, wherein, described circuit board is placed in the interior volume that described housing surrounds, and described processor and described memory are arranged on described circuit board; Described power circuit, is used to each circuit or the device power supply of described mobile terminal; Described memory is for stores executable programs code; Described processor moves the program corresponding with described executable program code by reading the executable program code of storing in described memory, for carrying out following steps: preserve encrypted message and authorization information, described authorization information comprises one or more in finger print information, acoustic information and facial information; Obtain the current password of user's input, and the described encrypted message of described current password and preservation is compared, if the two is inconsistent, enter one-level anti-theft modes, carry out one-level lock operation, and obtain current authentication information; And described current authentication information and described authorization information correspondence are compared, and enter the anti-theft modes of different stage according to comparison result, carry out the lock operation of different stage.
The mobile terminal of the embodiment of the present invention, obtain the current password of user's input, the encrypted message of current password and preservation is compared, and in the time that comparison is inconsistent, enter one-level anti-theft modes, carry out one-level lock operation, and obtain current authentication information, and the authorization information of current authentication information and preservation is compared, and the anti-theft modes that enters different stage according to comparison result, carry out the lock operation of different stage, thus, in protecting mobile terminal comprehensively, for mobile terminal provides the anti-theft modes of different stage, enrich the anti-theft modes of mobile terminal, and make can use the partial function of mobile terminal because misoperation cannot be used the validated user of mobile terminal, improve user's experience.
The aspect that the present invention is additional and advantage in the following description part provide, and part will become obviously from the following description, or recognize by practice of the present invention.
Brief description of the drawings
The present invention above-mentioned and/or additional aspect and advantage will become from the following description of the accompanying drawings of embodiments obviously and easily and understand, wherein,
Fig. 1 is the flow chart of the theft preventing method of mobile terminal according to an embodiment of the invention;
Fig. 2 is the flow chart of the theft preventing method of mobile terminal in accordance with another embodiment of the present invention;
Fig. 3 is the flow chart of the theft preventing method of the mobile terminal of another embodiment according to the present invention; And
Fig. 4 is the structural representation of the anti-theft device of mobile terminal according to an embodiment of the invention.
Embodiment
Describe embodiments of the invention below in detail, the example of described embodiment is shown in the drawings, and wherein same or similar label represents same or similar element or has the element of identical or similar functions from start to finish.Be exemplary below by the embodiment being described with reference to the drawings, be intended to for explaining the present invention, and can not be interpreted as limitation of the present invention.
Any process of otherwise describing in flow chart or at this or method are described and can be understood to, represent to comprise that one or more is for realizing module, fragment or the part of code of executable instruction of step of specific logical function or process, and the scope of the preferred embodiment of the present invention comprises other realization, wherein can be not according to order shown or that discuss, comprise according to related function by the mode of basic while or by contrary order, carry out function, this should be understood by embodiments of the invention person of ordinary skill in the field.
Describe according to the theft preventing method of the mobile terminal of the embodiment of the present invention and device below with reference to accompanying drawing.
Fig. 1 is the flow chart of the theft preventing method of mobile terminal according to an embodiment of the invention.
As shown in Figure 1, the theft preventing method of mobile terminal comprises:
S101, preserves encrypted message and authorization information.
Wherein, above-mentioned authorization information can be including, but not limited to one or more in finger print information, acoustic information and facial information.
In this embodiment, before preserving above-mentioned authorization information, can also comprise: gather user profile, extract the feature of user profile, generate authorization information, user profile comprises one or more in finger print information, acoustic information and facial information.
Particularly, in the time that the user profile gathering is acoustic information, can be by calling the sound pick-up outfit of mobile terminal, gather user at for example sound in 10 minutes of Preset Time, and the sound collecting is carried out to feature extraction to obtain user's characteristic voice, wherein, Preset Time can be to give tacit consent in mobile terminal system, can also be that user arranges in mobile terminal system according to different demands.
In the time that the user profile gathering is finger print information, can obtains by calling the fingerprint input device of mobile terminal user's fingerprint, and user's fingerprint be carried out to feature extraction acquisition user's fingerprint characteristic.
In the time that the user profile gathering is facial information, open the camera in mobile terminal, gather user's face image information, and face image information is carried out to feature extraction, obtain user's face feature.
S102, obtains the current password of user's input, and the encrypted message of current password and preservation is compared, if the two is inconsistent, enters one-level anti-theft modes, carries out one-level lock operation, and obtains current authentication information.
Particularly, anti-theft modes can be divided into three grades, and every grade of anti-theft modes is by different authorization information control, and the lock operation of execution different stage, wherein:
One-level anti-theft modes can be by encrypted message control, carries out one-level lock operation, locks sensitive data, and wherein, sensitive data can comprise but be limited to user's private data and transaction payment data.
Two stage anti-theft pattern can be by finger print information control, carries out secondary lock operation, locks sensitive data, obtains the current location information of mobile terminal, and the current location information of mobile terminal is sent in the contact person's that user sets in advance mobile phone.
Three grades of anti-theft modes can by acoustic information and/control of face information, carry out three grades of lock operations, lock all data, and send current acoustic information and/or current facial information to contact person.
In this embodiment, before obtaining the current password of user's input, can also comprise: determine that the recognition sequence of encrypted message is prior to authorization information; And in the time that authorization information comprises at least two kinds of information, determine the recognition sequence of authorization information.
For example, encrypted message, finger print information, acoustic information and face information in mobile terminal, are preserved, according to recognition code information for the first time, identify for the second time finger print information, the recognition sequence of the while sound recognition information of identification for the third time and face information is identified, and enters the anti-theft modes of different stage according to recognition result.
Again for example, in mobile terminal, preserve encrypted message and face information, identified according to the recognition sequence of face information after first encrypted message, and entered the anti-theft modes of different stage according to recognition result.
In the time that authorization information comprises at least two kinds of information, obtain current authentication information according to recognition sequence.For example, comprise finger print information and acoustic information in the authorization information of mobile terminal, according to first obtaining current finger print information, the recognition sequence of the current acoustic information of reentrying obtains current authentication information.
It should be noted that, due to acoustic information and/facial information all can control three grades of anti-theft modes, therefore, acoustic information and facial information have identical recognition sequence.
S103, compares current authentication information and authorization information correspondence, and enters the anti-theft modes of different stage according to comparison result, carries out the lock operation of different stage.
In this embodiment, in the time that authorization information comprises finger print information, the current finger print information obtaining and the finger print information of preservation are compared, if the two is consistent, enter one-level anti-theft modes, carry out one-level lock operation, if the two is inconsistent, enter two stage anti-theft pattern, carry out secondary lock operation.
In this embodiment, in the time that authorization information comprises facial information, the current facial information obtaining and the facial information of preservation are compared, if the two is consistent, enter two stage anti-theft pattern, carry out secondary lock operation, if the two is inconsistent, enter three grades of anti-theft modes, carry out three grades of lock operations.
In the time that authorization information comprises acoustic information, the current acoustic information obtaining and the acoustic information of preservation are compared, if the two is consistent, enter two stage anti-theft pattern, carry out secondary lock operation, if the two is inconsistent, enter three grades of anti-theft modes, carry out three grades of lock operations.
In addition, in the time comprising acoustic information and facial information in authorization information, obtain current acoustic information and current facial information, and by the acoustic information of current acoustic information and current facial information and preservation with face is corresponding compares, if all consistent, enter two stage anti-theft pattern, carry out secondary lock operation, if there is a pair of information inconsistent, enter three grades of anti-theft modes, carry out three grades of lock operations.
The theft preventing method embodiment of above-mentioned mobile terminal, obtain the current password of user's input, the encrypted message of current password and preservation is compared, and in the time that comparison is inconsistent, enter one-level anti-theft modes, carry out one-level lock operation, and obtain current authentication information, and the authorization information of current authentication information and preservation is compared, and the anti-theft modes that enters different stage according to comparison result, carry out the lock operation of different stage, thus, in protecting mobile terminal comprehensively, for mobile terminal provides the anti-theft modes of different stage, enrich the anti-theft modes of mobile terminal, and make can use the partial function of mobile terminal because misoperation cannot be used the validated user of mobile terminal, improve user's experience.
Fig. 2 is the flow chart of the theft preventing method of mobile terminal in accordance with another embodiment of the present invention, this embodiment is specifically described as example to comprise finger print information, acoustic information and facial information in authorization information, as shown in Figure 2, the theft preventing method of this mobile terminal comprises:
S201, preserves encrypted message, finger print information, acoustic information and facial information.
Particularly, obtain the encrypted message that user arranges, and gather finger print information, acoustic information and the facial information of mobile terminal validated user, and above-mentioned encrypted message, finger print information, acoustic information and facial information are kept in mobile terminal.
S202, obtains the current password of user's input, and the encrypted message of current password and preservation is compared, if the two is inconsistent, enters one-level anti-theft modes, carries out one-level lock operation, and obtains current authentication information.
Particularly, S202 can comprise S2021-S2025.
S2021, receives the current password that user inputs.
S2022, judges that whether current password is correct, judges that whether the current password that user inputs is consistent with the encrypted message of preservation, if consistent, carries out S2023, carries out S2024 if inconsistent.
S2023, unlocking mobile terminal, normally uses mobile terminal.
S2024, judges whether the password number of times of user's input exceedes preset times, and in the time not exceeding preset times, carries out S2021, as exceed preset times, carries out S2025.
Preset times can be to give tacit consent in mobile terminal system, can also be that user arranges in mobile terminal system according to different demands.For example, preset times can be 3 times.
S2025, enters one-level anti-theft modes, locking sensitive data, and to obtain current authentication information be current finger print information.
Particularly, private data and the transaction payment data of locking mobile terminal, avoided mobile phone users privacy information to be leaked, and protected the safety of user privacy information in mobile terminal.
S203, compares the finger print information correspondence of current finger print information and preservation, and enters the anti-theft modes of different stage according to comparison result, carries out the lock operation of different stage.
Particularly, S203 can comprise S2031-S2034.
S2031, judges that whether current finger print information is correct, judges that whether the current finger print information obtaining is consistent with the finger print information of preservation, if consistent, carries out S2032, if inconsistent, carries out S2033.
S2032, operating mobile terminal under one-level anti-theft modes.
Particularly, in the time that the finger print information of user input is correct, on the basis of locking sensitive data, the validated user of mobile terminal can also use other functions of mobile terminal, does not affect user and experience other functions of mobile terminal.Thus, can avoid causing mobile terminal completely locked because misoperation makes password errors number exceed pre-determined number, the validated user of mobile terminal cannot use the generation of mobile terminal.
S2033, enters two stage anti-theft pattern, carries out secondary lock operation, and obtains current acoustic information and current facial information.
Particularly, locking sensitive data, and by the current location information of for example global position system GPS of navigation system (Global Positioning System) acquisition mobile terminal, the current location information of mobile terminal is issued in the contact person's that user sets in advance mobile phone to localisation of mobile terminals.
S204, compares the acoustic information of current acoustic information and current facial information and preservation and facial information correspondence, and enters the anti-theft modes of different stage according to comparison result, carries out the lock operation of different stage.
Particularly, S204 can comprise S2041-S2044.
S2041, judges that whether current acoustic information and current facial information be correct, judges that whether the current acoustic information obtaining is consistent with acoustic information and the facial information of preservation with current facial information, if all consistent, carry out S2042, if there is a pair of information inconsistent, carry out S2043.
S2042, operating mobile terminal under two stage anti-theft pattern.
Particularly, when the current acoustic information of inputting user and current facial information are correct, at locking sensitive data, obtain the current location information of mobile terminal, and after the current location information of mobile terminal being sent in the contact person's that user sets in advance mobile phone, user can also use other functions of mobile terminal, does not affect user and experience other functions of mobile terminal.
S2043, enters three grades of anti-theft modes, carries out three grades of lock operations, and sends current acoustic information and current facial information to contact person.
Particularly, all data in locking mobile terminal, be that mobile terminal is completely locked, user cannot use any function of mobile terminal, and to current acoustic information and the current facial information of contact person's transmit operation mobile phone users, contact person receives current acoustic information and the current facial information of transmission, and determine be the validated user of mobile terminal after, can carry out release to blocked mobile terminal by transmit operation instruction.
Should be understood that, if when the finger print information that authorization information comprises user, acoustic information/facial information, mobile terminal carries out antitheft process and Fig. 2 similar process, does not repeat herein.
The theft preventing method of above-mentioned mobile terminal; the encrypted message of mobile terminal, acoustic information and facial information be corresponding one-level, secondary and three grades of anti-theft modes respectively; and the anti-theft modes of different stage is carried out different lock operations; in omnibearing protection mobile terminal; for mobile terminal provides the anti-theft modes of different stage; enrich the anti-theft modes of mobile terminal; and make can use the partial function of mobile terminal because erroneous input Password Operations cannot use the validated user of mobile terminal, improved user's experience.
Fig. 3 is the flow chart of the theft preventing method of the mobile terminal of another embodiment according to the present invention, and this embodiment is specifically described as an example of the facial information that comprises user in authorization information example, and as shown in Figure 3, the theft preventing method of this mobile terminal comprises:
S301, preserves encrypted message and user's facial information.
S302, obtains the current password of user's input, and the encrypted message of current password and preservation is compared, if the two is inconsistent, enters one-level anti-theft modes, carries out one-level lock operation, and obtains current authentication information.
Particularly, S302 can comprise S3021-S3025.
S3021, receives the current password that user inputs.
S3022, judges that whether current password is correct, judges that whether the current password that user inputs is consistent with the encrypted message of preservation, if consistent, carries out S3023, carries out S3024 if inconsistent.
S3023, unlocking mobile terminal, normally uses mobile terminal.
S3024, judges whether the password number of times of user's input exceedes preset times, and in the time not exceeding preset times, carries out S3021, as exceed preset times, carries out S3025.
Wherein, preset times can be to give tacit consent in mobile terminal system, can also be that user arranges in mobile terminal system according to different demands, and for example, preset times can 3 times.
S3025, enters one-level anti-theft modes, locking sensitive data, and to obtain current authentication information be current facial information.
Particularly, private data and the transaction payment data of locking mobile terminal, avoided the privacy information of mobile phone users to be leaked, and protected the safety of user privacy information in mobile terminal.
S303, compares the facial information correspondence of current facial information and preservation, and enters the anti-theft modes of different stage according to comparison result, carries out the lock operation of different stage.
Particularly, S303 can comprise S3031-S3034.
S3031, judges that whether current facial information is correct, judges that whether the current facial information obtaining is consistent with the facial information of preservation, if consistent, carries out S3032, if inconsistent, carries out S3033.
S3032, operating mobile terminal under one-level anti-theft modes.
Particularly, in the time that the current facial information of user input is correct, on the basis of locking sensitive data, the validated user of mobile terminal can also use other functions of mobile terminal, does not affect user and experience other functions of mobile terminal.Thus, can avoid causing mobile terminal completely locked because misoperation makes password errors number exceed pre-determined number, the validated user of mobile terminal cannot use the generation of mobile terminal.
S3033, enters three grades of anti-theft modes, carries out three grades of lock operations, and sends current facial information to contact person.
Particularly, all data in locking mobile terminal, be that mobile terminal is completely locked, user cannot use any function of mobile terminal, and to the current facial information of contact person's transmit operation mobile phone users, contact person receives the current facial information of transmission, and determine be the validated user of mobile terminal after, can carry out release to blocked mobile terminal by transmit operation instruction.
The theft preventing method of above-mentioned mobile terminal; in mobile terminal, preserve encrypted message and facial information; wherein; encrypted message and facial information be corresponding one-level and three grades of anti-theft modes respectively; carry out in order anti-theft modes; in can omnibearing protection mobile terminal; for mobile terminal provides the anti-theft modes of different stage; enrich the anti-theft modes of mobile terminal; and make can use the partial function of mobile terminal because erroneous input Password Operations cannot use the validated user of mobile terminal, improved user's experience.
In order to realize above-described embodiment, the present invention also proposes a kind of anti-theft device of mobile terminal.
Fig. 4 is the structural representation of the anti-theft device of mobile terminal according to an embodiment of the invention.
As shown in Figure 4, the anti-theft device of mobile terminal comprises: preserve module 41, obtain module 42 and processing module 43, wherein:
Preserve module 41 for preserving encrypted message and authorization information, above-mentioned authorization information comprises one or more in finger print information, acoustic information and facial information; Obtain module 42 for obtaining the current password of user's input, and the above-mentioned encrypted message of above-mentioned current password and preservation is compared, if the two is inconsistent, enter one-level anti-theft modes, carry out one-level lock operation, and obtain current authentication information; And processing module 43 is for above-mentioned current authentication information and above-mentioned authorization information correspondence are compared, and enter the anti-theft modes of different stage according to comparison result, carry out the lock operation of different stage.
In the time entering one-level anti-theft modes, above-mentioned acquisition module 42 is carried out one-level lock operation and is locked sensitive data, thus, and the safety of individual privacy information in protection mobile terminal.
Above-mentioned authorization information can be including, but not limited to one or more in finger print information, acoustic information and facial information.
Particularly, anti-theft modes can be divided into three grades, and every grade of anti-theft modes is by different authorization information control, and the lock operation of execution different stage, wherein:
One-level anti-theft modes can be by encrypted message control, carries out one-level lock operation, locks sensitive data, and wherein, sensitive data can comprise but be limited to user's private data and transaction payment data.
Two stage anti-theft pattern can be by finger print information control, carries out secondary lock operation, locks sensitive data, obtains the current location information of mobile terminal, and the current location information of mobile terminal is sent in the contact person's that user sets in advance mobile phone.
Three grades of anti-theft modes can, by acoustic information and/or the control of face information, be carried out three grades of lock operations, lock all data, and send current acoustic information and/or current facial information to contact person.
In addition, said apparatus can also comprise acquisition module 44, acquisition module 44 is for before preserving authorization information in above-mentioned preservation module 41, gather user profile, extract the feature of above-mentioned user profile, generate above-mentioned authorization information, above-mentioned user profile comprises one or more in finger print information, acoustic information and facial information.
Particularly, in the time that above-mentioned user profile is acoustic information, above-mentioned acquisition module 44 specifically for: gather the acoustic information in predetermined amount of time; In the time that above-mentioned user profile is facial information, above-mentioned acquisition module 44 specifically for: open camera, the above-mentioned facial information of typing.
In the time that above-mentioned user profile is finger print information, above-mentioned acquisition module 44 also can pass through fingerprint collecting unit (not shown) typing finger print information.
In addition, said apparatus can also comprise determination module 45, and determination module 45, for obtain the current password of user's input in above-mentioned acquisition module 42 before, determines that the recognition sequence of above-mentioned encrypted message is prior to above-mentioned authorization information; And in the time that above-mentioned authorization information comprises at least two kinds of information, determine the recognition sequence of above-mentioned authorization information.
Particularly, acquisition module 44 can gather corresponding authorization information according to user's selection, if user selects finger print information and acoustic information as authorization information, acquisition module 44 will gather finger print information and the acoustic information of mobile terminal validated user, and preserve the encrypted message of user's setting and the authorization information that acquisition module 44 collects by preservation module 42.Preserve after encrypted message and authorization information in preservation module 42, determination module 45 is definite identifies finger print information for the second time according to the first recognition code information, and the recognition sequence of sound recognition information is identified for the third time.
In addition, acoustic information and/facial information all can control three grades of anti-theft modes, therefore, in the time that above-mentioned authorization information also comprises tut information and/or facial information, tut information and facial information have identical recognition sequence.
Determine at determination module 45 after the order of identification, obtaining module 42 will identify in order, and comprise at least two kinds of information in authorization information time, obtain above-mentioned current authentication information according to above-mentioned recognition sequence.For example, authorization information comprises finger print information and acoustic information, obtains module 42 according to first obtaining current finger print information, and the recognition sequence of the current acoustic information of reentrying obtains current authentication information.
In the time that above-mentioned authorization information comprises above-mentioned finger print information, above-mentioned processing module 43 specifically for: by obtain current finger print information and the above-mentioned finger print information of preservation compare, if the two is consistent, enter above-mentioned one-level anti-theft modes, carry out one-level lock operation, if the two is inconsistent, enter two stage anti-theft pattern, carry out secondary lock operation.
In the time that above-mentioned authorization information comprises above-mentioned facial information, above-mentioned processing module 43 specifically for: by obtain current facial information and the above-mentioned facial information of preservation compare, if the two is consistent, enter above-mentioned one-level anti-theft modes, carry out one-level lock operation, if the two is inconsistent, enter three grades of anti-theft modes, carry out three grades of lock operations.
In the time entering two stage anti-theft pattern, above-mentioned processing module 43 locks sensitive data, obtains the current location information of above-mentioned mobile terminal, and sends above-mentioned current location information to contact person.
In addition, above-mentioned processing module 43 also for: obtain current acoustic information and/or current facial information, and by the tut information of current acoustic information and/or current facial information and preservation with face is corresponding compares, if all consistent, enter above-mentioned two stage anti-theft pattern, carry out secondary lock operation, if there is a pair of information inconsistent, enter three grades of anti-theft modes, carry out three grades of lock operations.
In the time entering three grades of anti-theft modes, processing module 43 locks all data, and sends current acoustic information and/or current facial information to contact person.
After contact person determines that active user is the validated user of mobile terminal, to mobile terminal transmit operation instruction, mobile terminal receives operational order, and according to instruction unlocking mobile terminal.
Comprise that the anti-theft device of preserving module, obtaining the mobile terminal of module, processing module, acquisition module and determination module carries out antitheft detailed process and can, referring to Fig. 1, Fig. 2 and Fig. 3, not repeat herein.
The anti-theft device embodiment of above-mentioned mobile terminal, preserve encrypted message and authorization information by preserving module, obtain the current password of user's input by obtaining module, the encrypted message of current password and preservation is compared, and in the time that comparison is inconsistent, enter one-level anti-theft modes, carry out one-level lock operation, and obtain current authentication information, and by processing module, the authorization information of current authentication information and preservation is compared, and the anti-theft modes that enters different stage according to comparison result, carry out the lock operation of different stage, thus, in protecting mobile terminal comprehensively, for mobile terminal provides the anti-theft modes of different stage, enrich the anti-theft modes of mobile terminal, and make can use the partial function of mobile terminal because misoperation cannot be used the validated user of mobile terminal, improve user's experience.
In order to realize above-described embodiment, the present invention also proposes a kind of mobile terminal, this mobile terminal comprises housing, processor, memory, circuit board and power circuit, wherein, foregoing circuit plate is placed in the interior volume that above-mentioned housing surrounds, and above-mentioned processor and above-mentioned memory are arranged on foregoing circuit plate; Above-mentioned power circuit, is used to each circuit or the device power supply of above-mentioned mobile terminal; Above-mentioned memory is for stores executable programs code; Above-mentioned processor moves the program corresponding with above-mentioned executable program code by reading the executable program code of storing in above-mentioned memory, for carrying out following steps:
S101 ', preserves encrypted message and authorization information.
Wherein, above-mentioned authorization information can be including, but not limited to one or more in finger print information, acoustic information and facial information.
In this embodiment, before preserving above-mentioned authorization information, can also comprise: gather user profile, extract the feature of user profile, generate authorization information, user profile comprises one or more in finger print information, acoustic information and facial information.
Particularly, in the time that the user profile gathering is acoustic information, can be by calling the sound pick-up outfit of mobile terminal, gather user at for example sound in 10 minutes of Preset Time, and the sound collecting is carried out to feature extraction to obtain user's characteristic voice, wherein, Preset Time can be to give tacit consent in mobile terminal system, can also be that user arranges in mobile terminal system according to different demands.
In the time that the user profile gathering is finger print information, can obtains by calling the fingerprint input device of mobile terminal user's fingerprint, and user's fingerprint be carried out to feature extraction acquisition user's fingerprint characteristic.
In the time that the user profile gathering is facial information, open the camera in mobile terminal, gather user's face image information, and face image information is carried out to feature extraction, obtain user's face feature.
S102 ', obtains the current password of user's input, and the encrypted message of current password and preservation is compared, if the two is inconsistent, enters one-level anti-theft modes, carries out one-level lock operation, and obtains current authentication information.
Particularly, anti-theft modes can be divided into three grades, and every grade of anti-theft modes is by different authorization information control, and the lock operation of execution different stage, wherein:
One-level anti-theft modes can be by encrypted message control, carries out one-level lock operation, locks sensitive data, and wherein, sensitive data can comprise but be limited to user's private data and transaction payment data.
Two stage anti-theft pattern can be by finger print information control, carries out secondary lock operation, locks sensitive data, obtains the current location information of mobile terminal, and the current location information of mobile terminal is sent in the contact person's that user sets in advance mobile phone.
Three grades of anti-theft modes can by acoustic information and/control of face information, carry out three grades of lock operations, lock all data, and send current acoustic information and/or current facial information to contact person.
In this embodiment, before obtaining the current password of user's input, can also comprise: determine that the recognition sequence of encrypted message is prior to authorization information; And in the time that authorization information comprises at least two kinds of information, determine the recognition sequence of authorization information.
For example, encrypted message, finger print information, acoustic information and face information in mobile terminal, are preserved, according to recognition code information for the first time, identify for the second time finger print information, the recognition sequence of the while sound recognition information of identification for the third time and face information is identified, and enters the anti-theft modes of different stage according to recognition result.
Again for example, in mobile terminal, preserve encrypted message and face information, identified according to the recognition sequence of face information after first encrypted message, and entered the anti-theft modes of different stage according to recognition result.
In the time that authorization information comprises at least two kinds of information, obtain current authentication information according to recognition sequence.For example, comprise finger print information and acoustic information in the authorization information of mobile terminal, according to first obtaining current finger print information, the recognition sequence of the current acoustic information of reentrying obtains current authentication information.
It should be noted that, due to acoustic information and/facial information all can control three grades of anti-theft modes, therefore, acoustic information and facial information have identical recognition sequence.
S103 ', compares current authentication information and authorization information correspondence, and enters the anti-theft modes of different stage according to comparison result, carries out the lock operation of different stage.
In this embodiment, in the time that authorization information comprises finger print information, the current finger print information obtaining and the finger print information of preservation are compared, if the two is consistent, enter one-level anti-theft modes, carry out one-level lock operation, if the two is inconsistent, enter two stage anti-theft pattern, carry out secondary lock operation.
In this embodiment, in the time that authorization information comprises facial information, the current facial information obtaining and the facial information of preservation are compared, if the two is consistent, enter two stage anti-theft pattern, carry out secondary lock operation, if the two is inconsistent, enter three grades of anti-theft modes, carry out three grades of lock operations.
In the time that authorization information comprises acoustic information, the current acoustic information obtaining and the acoustic information of preservation are compared, if the two is consistent, enter two stage anti-theft pattern, carry out secondary lock operation, if the two is inconsistent, enter three grades of anti-theft modes, carry out three grades of lock operations.
In addition, in the time comprising acoustic information and facial information in authorization information, obtain current acoustic information and current facial information, and by the acoustic information of current acoustic information and current facial information and preservation with face is corresponding compares, if all consistent, enter two stage anti-theft pattern, carry out secondary lock operation, if there is a pair of information inconsistent, enter three grades of anti-theft modes, carry out three grades of lock operations.
Above-mentioned mobile terminal embodiment, obtain the current password of user's input, the encrypted message of current password and preservation is compared, and in the time that comparison is inconsistent, enter one-level anti-theft modes, carry out one-level lock operation, and obtain current authentication information, and the authorization information of current authentication information and preservation is compared, and the anti-theft modes that enters different stage according to comparison result, carry out the lock operation of different stage, thus, in protecting mobile terminal comprehensively, for mobile terminal provides the anti-theft modes of different stage, enrich the anti-theft modes of mobile terminal, and make can use the partial function of mobile terminal because misoperation cannot be used the validated user of mobile terminal, improve user's experience.
In the description of this specification, the description of reference term " embodiment ", " some embodiment ", " example ", " concrete example " or " some examples " etc. means to be contained at least one embodiment of the present invention or example in conjunction with specific features, structure, material or the feature of this embodiment or example description.In this manual, to the schematic statement of above-mentioned term not must for be identical embodiment or example.And, specific features, structure, material or the feature of description can one or more embodiment in office or example in suitable mode combination.In addition,, not conflicting in the situation that, those skilled in the art can carry out combination and combination by the feature of the different embodiment that describe in this specification or example and different embodiment or example.
In addition, term " first ", " second " be only for describing object, and can not be interpreted as instruction or hint relative importance or the implicit quantity that indicates indicated technical characterictic.Thus, at least one this feature can be expressed or impliedly be comprised to the feature that is limited with " first ", " second ".In description of the invention, the implication of " multiple " is at least two, for example two, and three etc., unless otherwise expressly limited specifically.
Any process of otherwise describing in flow chart or at this or method are described and can be understood to, represent to comprise that one or more is for realizing module, fragment or the part of code of executable instruction of step of specific logical function or process, and the scope of the preferred embodiment of the present invention comprises other realization, wherein can be not according to order shown or that discuss, comprise according to related function by the mode of basic while or by contrary order, carry out function, this should be understood by embodiments of the invention person of ordinary skill in the field.
The logic and/or the step that in flow chart, represent or otherwise describe at this, for example, can be considered to the sequencing list of the executable instruction for realizing logic function, may be embodied in any computer-readable medium, use for instruction execution system, device or equipment (as computer based system, comprise that the system of processor or other can and carry out the system of instruction from instruction execution system, device or equipment instruction fetch), or use in conjunction with these instruction execution systems, device or equipment.With regard to this specification, " computer-readable medium " can be anyly can comprise, device that storage, communication, propagation or transmission procedure use for instruction execution system, device or equipment or in conjunction with these instruction execution systems, device or equipment.The example more specifically (non-exhaustive list) of computer-readable medium comprises following: the electrical connection section (electronic installation) with one or more wirings, portable computer diskette box (magnetic device), random access memory (RAM), read-only memory (ROM), the erasable read-only memory (EPROM or flash memory) of editing, fiber device, and portable optic disk read-only memory (CDROM).In addition, computer-readable medium can be even paper or other the suitable medium that can print described program thereon, because can be for example by paper or other media be carried out to optical scanner, then edit, decipher or process in electronics mode and obtain described program with other suitable methods if desired, be then stored in computer storage.
Should be appreciated that each several part of the present invention can realize with hardware, software, firmware or their combination.In the above-described embodiment, multiple steps or method can realize with being stored in software or the firmware carried out in memory and by suitable instruction execution system.For example, if realized with hardware, the same in another embodiment, can realize by any one in following technology well known in the art or their combination: there is the discrete logic for data-signal being realized to the logic gates of logic function, there is the application-specific integrated circuit (ASIC) of suitable combinational logic gate circuit, programmable gate array (PGA), field programmable gate array (FPGA) etc.
Those skilled in the art are appreciated that realizing all or part of step that above-described embodiment method carries is can carry out the hardware that instruction is relevant by program to complete, described program can be stored in a kind of computer-readable recording medium, this program, in the time carrying out, comprises step of embodiment of the method one or a combination set of.
In addition, the each functional unit in each embodiment of the present invention can be integrated in a processing module, can be also that the independent physics of unit exists, and also can be integrated in a module two or more unit.Above-mentioned integrated module both can adopt the form of hardware to realize, and also can adopt the form of software function module to realize.If described integrated module realizes and during as production marketing independently or use, also can be stored in a computer read/write memory medium using the form of software function module.
The above-mentioned storage medium of mentioning can be read-only memory, disk or CD etc.Although illustrated and described embodiments of the invention above, be understandable that, above-described embodiment is exemplary, can not be interpreted as limitation of the present invention, and those of ordinary skill in the art can change above-described embodiment within the scope of the invention, amendment, replacement and modification.
Claims (20)
1. a theft preventing method for mobile terminal, is characterized in that, comprising:
Preserve encrypted message and authorization information, described authorization information comprises one or more in finger print information, acoustic information and facial information;
Obtain the current password of user's input, and the described encrypted message of described current password and preservation is compared, if the two is inconsistent, enter one-level anti-theft modes, carry out one-level lock operation, and obtain current authentication information; And
Described current authentication information and described authorization information correspondence are compared, and enter the anti-theft modes of different stage according to comparison result, carry out the lock operation of different stage.
2. method according to claim 1, is characterized in that, before described preservation authorization information, also comprises:
Gather user profile, extract the feature of described user profile, generate described authorization information, described user profile comprises one or more in finger print information, acoustic information and facial information.
3. method according to claim 1, is characterized in that, before the current password of described acquisition user input, also comprises:
Determine that the recognition sequence of described encrypted message is prior to described authorization information; And
In the time that described authorization information comprises at least two kinds of information, determine the recognition sequence of described authorization information.
4. method according to claim 2, is characterized in that, in the time that described user profile is acoustic information, described collection user profile, comprising: gather the acoustic information in predetermined amount of time; Or
In the time that described user profile is facial information, described collection user profile, comprising: open camera, facial information described in typing.
5. method according to claim 3, is characterized in that, in the time that described authorization information comprises at least two kinds of information, described acquisition current authentication information, comprising:
Obtain described current authentication information according to described recognition sequence.
6. according to the method described in claim 3 or 5, it is characterized in that, in the time that described authorization information comprises described finger print information, described described current authentication information and described authorization information correspondence are compared, and the anti-theft modes that enters different stage according to comparison result, the lock operation of carrying out different stage, comprising:
The current finger print information obtaining and the described finger print information of preservation are compared, if the two is consistent, enter described one-level anti-theft modes, carry out one-level lock operation, if the two is inconsistent, enter two stage anti-theft pattern, carry out secondary lock operation.
7. according to the method described in claim 3 or 5, it is characterized in that, in the time that described authorization information comprises described facial information, described described current authentication information and described authorization information correspondence are compared, and the anti-theft modes that enters different stage according to comparison result, the lock operation of carrying out different stage, comprising:
The current facial information obtaining and the described facial information of preservation are compared, if the two is consistent, enter described one-level anti-theft modes, carry out one-level lock operation, if the two is inconsistent, enter three grades of anti-theft modes, carry out three grades of lock operations.
8. method according to claim 6, is characterized in that, in the time that described authorization information also comprises described acoustic information and/or facial information, described acoustic information and facial information have identical recognition sequence.
9. method according to claim 8, is characterized in that, after the described finger print information of determining described current finger print information and preservation is inconsistent, also comprises:
Obtain current acoustic information and/or current facial information, and by the described acoustic information of current acoustic information and/or current facial information and preservation with face is corresponding compares, if all consistent, enter described two stage anti-theft pattern, carry out secondary lock operation, if there is a pair of information inconsistent, enter three grades of anti-theft modes, carry out three grades of lock operations.
10. method according to claim 9, is characterized in that, described execution one-level lock operation, comprising: locking sensitive data; And/or
Described execution secondary lock operation, comprising: locking sensitive data, obtains the current location information of described mobile terminal, and send described current location information to contact person; And/or
Three grades of lock operations of described execution, comprising: lock all data, and send current acoustic information and/or current facial information to contact person.
The anti-theft device of 11. 1 kinds of mobile terminals, is characterized in that, comprising:
Preserve module, for preserving encrypted message and authorization information, described authorization information comprises one or more in finger print information, acoustic information and facial information;
Obtain module, for obtaining the current password of user's input, and the described encrypted message of described current password and preservation is compared, if the two is inconsistent, enter one-level anti-theft modes, carry out one-level lock operation, and obtain current authentication information; And
Processing module, for described current authentication information and described authorization information correspondence are compared, and enters the anti-theft modes of different stage according to comparison result, carry out the lock operation of different stage.
12. devices according to claim 11, is characterized in that, also comprise:
Acquisition module, before preserving authorization information in described preservation module, gathers user profile, extracts the feature of described user profile, generates described authorization information, and described user profile comprises one or more in finger print information, acoustic information and facial information.
13. devices according to claim 11, is characterized in that, also comprise:
Determination module, before obtaining the current password of user's input in described acquisition module, determines that the recognition sequence of described encrypted message is prior to described authorization information; And in the time that described authorization information comprises at least two kinds of information, determine the recognition sequence of described authorization information.
14. devices according to claim 12, is characterized in that, in the time that described user profile is acoustic information, and described acquisition module, specifically for: gather the acoustic information in predetermined amount of time; Or
In the time that described user profile is facial information, described acquisition module, specifically for: open camera, facial information described in typing.
15. devices according to claim 13, is characterized in that, in the time that described authorization information comprises at least two kinds of information, and described acquisition module, specifically for:
Obtain described current authentication information according to described recognition sequence.
16. according to the device described in claim 13 or 15, it is characterized in that, and in the time that described authorization information comprises described finger print information, described processing module, specifically for:
The current finger print information obtaining and the described finger print information of preservation are compared, if the two is consistent, enter described one-level anti-theft modes, carry out one-level lock operation, if the two is inconsistent, enter two stage anti-theft pattern, carry out secondary lock operation.
17. according to the device described in claim 13 or 15, it is characterized in that, and in the time that described authorization information comprises described facial information, described processing module, specifically for:
The current facial information obtaining and the described facial information of preservation are compared, if the two is consistent, enter described one-level anti-theft modes, carry out one-level lock operation, if the two is inconsistent, enter three grades of anti-theft modes, carry out three grades of lock operations.
18. devices according to claim 16, is characterized in that, in the time that described authorization information also comprises described acoustic information and/or facial information, described acoustic information and facial information have identical recognition sequence.
19. devices according to claim 18, is characterized in that, described processing module, also for:
Obtain current acoustic information and/or current facial information, and by the described acoustic information of current acoustic information and/or current facial information and preservation with face is corresponding compares, if all consistent, enter described two stage anti-theft pattern, carry out secondary lock operation, if there is a pair of information inconsistent, enter three grades of anti-theft modes, carry out three grades of lock operations.
20. devices according to claim 19, is characterized in that, described acquisition module, specifically for: locking sensitive data; And/or
Described processing module, specifically for: while entering two stage anti-theft pattern, locking sensitive data, obtains the current location information of described mobile terminal, and sends described current location information to contact person; And/or
Described processing module, specifically for: while entering three grades of anti-theft modes, lock all data, and send current acoustic information and/or current facial information to contact person.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410222925.0A CN104023133B (en) | 2014-05-23 | 2014-05-23 | Anti-theft method and device for mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410222925.0A CN104023133B (en) | 2014-05-23 | 2014-05-23 | Anti-theft method and device for mobile terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104023133A true CN104023133A (en) | 2014-09-03 |
CN104023133B CN104023133B (en) | 2017-05-24 |
Family
ID=51439695
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410222925.0A Active CN104023133B (en) | 2014-05-23 | 2014-05-23 | Anti-theft method and device for mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104023133B (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104331668A (en) * | 2014-09-28 | 2015-02-04 | 小米科技有限责任公司 | Wrong password prompting method and device |
CN105046127A (en) * | 2015-05-26 | 2015-11-11 | 小米科技有限责任公司 | Encryption and decryption implementation method and device |
CN105243346A (en) * | 2015-11-16 | 2016-01-13 | 广东欧珀移动通信有限公司 | Mobile terminal with guard against theft function and guard against theft method |
CN105306691A (en) * | 2015-09-25 | 2016-02-03 | 维沃移动通信有限公司 | Personal information protection method and terminal |
CN105491236A (en) * | 2015-12-02 | 2016-04-13 | 小米科技有限责任公司 | Terminal unlocking method and device |
CN106101382A (en) * | 2016-05-30 | 2016-11-09 | 努比亚技术有限公司 | A kind of terminal lookup method and terminal |
CN106407870A (en) * | 2015-07-28 | 2017-02-15 | 宇龙计算机通信科技(深圳)有限公司 | Fingerprint identification method and user equipment |
CN106453874A (en) * | 2016-09-29 | 2017-02-22 | 李信 | Mobile phone control method and system |
CN106469284A (en) * | 2016-08-19 | 2017-03-01 | 广东欧珀移动通信有限公司 | An information processing method, device and mobile terminal |
CN106778154A (en) * | 2016-11-15 | 2017-05-31 | 深圳天珑无线科技有限公司 | Mobile terminal and its unlocking method |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100009658A1 (en) * | 2008-07-08 | 2010-01-14 | Hong Fu Jin Precision Industry (Shenzhen) Co., Ltd. | Method for identity authentication by mobile terminal |
CN101719955A (en) * | 2009-11-26 | 2010-06-02 | 中山大学 | Intelligent terminal system with fingerprint identification and information processing method |
CN103051809A (en) * | 2013-01-05 | 2013-04-17 | 深圳市中兴移动通信有限公司 | Mobile terminal and file security method and device thereof |
CN103235909A (en) * | 2013-04-25 | 2013-08-07 | 广东欧珀移动通信有限公司 | Method and device for resetting password and mobile device |
CN103488924A (en) * | 2013-09-26 | 2014-01-01 | 小米科技有限责任公司 | Terminal unlocking processing method, device and equipment |
-
2014
- 2014-05-23 CN CN201410222925.0A patent/CN104023133B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100009658A1 (en) * | 2008-07-08 | 2010-01-14 | Hong Fu Jin Precision Industry (Shenzhen) Co., Ltd. | Method for identity authentication by mobile terminal |
CN101719955A (en) * | 2009-11-26 | 2010-06-02 | 中山大学 | Intelligent terminal system with fingerprint identification and information processing method |
CN103051809A (en) * | 2013-01-05 | 2013-04-17 | 深圳市中兴移动通信有限公司 | Mobile terminal and file security method and device thereof |
CN103235909A (en) * | 2013-04-25 | 2013-08-07 | 广东欧珀移动通信有限公司 | Method and device for resetting password and mobile device |
CN103488924A (en) * | 2013-09-26 | 2014-01-01 | 小米科技有限责任公司 | Terminal unlocking processing method, device and equipment |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104331668B (en) * | 2014-09-28 | 2018-05-18 | 小米科技有限责任公司 | Bad password reminding method and device |
CN104331668A (en) * | 2014-09-28 | 2015-02-04 | 小米科技有限责任公司 | Wrong password prompting method and device |
CN105046127A (en) * | 2015-05-26 | 2015-11-11 | 小米科技有限责任公司 | Encryption and decryption implementation method and device |
CN106407870A (en) * | 2015-07-28 | 2017-02-15 | 宇龙计算机通信科技(深圳)有限公司 | Fingerprint identification method and user equipment |
CN105306691A (en) * | 2015-09-25 | 2016-02-03 | 维沃移动通信有限公司 | Personal information protection method and terminal |
CN105243346B (en) * | 2015-11-16 | 2018-01-19 | 广东欧珀移动通信有限公司 | A kind of mobile terminal and its theft preventing method with anti-theft feature |
CN105243346A (en) * | 2015-11-16 | 2016-01-13 | 广东欧珀移动通信有限公司 | Mobile terminal with guard against theft function and guard against theft method |
CN105491236A (en) * | 2015-12-02 | 2016-04-13 | 小米科技有限责任公司 | Terminal unlocking method and device |
CN106101382A (en) * | 2016-05-30 | 2016-11-09 | 努比亚技术有限公司 | A kind of terminal lookup method and terminal |
CN106469284A (en) * | 2016-08-19 | 2017-03-01 | 广东欧珀移动通信有限公司 | An information processing method, device and mobile terminal |
CN106453874A (en) * | 2016-09-29 | 2017-02-22 | 李信 | Mobile phone control method and system |
CN106453874B (en) * | 2016-09-29 | 2020-01-03 | 李信 | Mobile phone control method and system |
CN106778154A (en) * | 2016-11-15 | 2017-05-31 | 深圳天珑无线科技有限公司 | Mobile terminal and its unlocking method |
Also Published As
Publication number | Publication date |
---|---|
CN104023133B (en) | 2017-05-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104023133A (en) | Anti-theft method and device for mobile terminal | |
JP7182924B2 (en) | Mobile security measures | |
US10447839B2 (en) | Device locator disable authentication | |
CN105279449B (en) | Data access control method, system and mobile equipment based on context | |
Crawford et al. | Understanding user perceptions of transparent authentication on a mobile device | |
CN105848134A (en) | Virtual SIM (Subscriber Identity Module) card management device, communication terminal, access control method and management method | |
CN102930436A (en) | Mobile payment method and device | |
KR20110087178A (en) | USB security device and authentication method with secure user authentication means | |
US20080120726A1 (en) | External storage device | |
CN105279400A (en) | Mobile terminal security management method and mobile terminal | |
CN111800273B (en) | Information processing method, electronic device, and storage medium | |
CN111414605B (en) | Unlocking method and device of embedded security unit, electronic equipment and storage medium | |
CN110708364B (en) | Electronic equipment unlocking method and device, electronic equipment and storage medium | |
CN103824004A (en) | Application program protection method and device | |
CN105005721A (en) | Computer authorization starting control system and method based on computer starting key | |
CN106203028A (en) | Method and device for setting screen locking password and electronic equipment | |
CN105184184A (en) | Anti-theft method for terminal data | |
US9760695B2 (en) | Content viewing restriction system | |
US8931080B2 (en) | Method and system for controlling the execution of a function protected by authentification of a user, in particular for the access to a resource | |
US8151111B2 (en) | Processing device constituting an authentication system, authentication system, and the operation method thereof | |
CN105809045A (en) | Method and device for processing equipment systems during data reset | |
KR20090002074A (en) | User authentication device and method based on one-time password with improved security | |
JP4756902B2 (en) | Information leakage prevention system | |
JP4698502B2 (en) | Terminal device authentication system, authentication method and program using mobile phone | |
CN114238923A (en) | Authentication method and device, processing method and device of equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |