[go: up one dir, main page]

CN107707692A - The antitheft mobile phone and its alarm method of software and hardware combining - Google Patents

The antitheft mobile phone and its alarm method of software and hardware combining Download PDF

Info

Publication number
CN107707692A
CN107707692A CN201710689021.2A CN201710689021A CN107707692A CN 107707692 A CN107707692 A CN 107707692A CN 201710689021 A CN201710689021 A CN 201710689021A CN 107707692 A CN107707692 A CN 107707692A
Authority
CN
China
Prior art keywords
mobile phone
alarm
software
sim card
hardware combining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710689021.2A
Other languages
Chinese (zh)
Inventor
张竹林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Aiyouwei Software Development Co Ltd
Original Assignee
Shanghai Aiyouwei Software Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Aiyouwei Software Development Co Ltd filed Critical Shanghai Aiyouwei Software Development Co Ltd
Priority to CN201710689021.2A priority Critical patent/CN107707692A/en
Publication of CN107707692A publication Critical patent/CN107707692A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/02Constructional features of telephone sets
    • H04M1/0202Portable telephone sets, e.g. cordless phones, mobile phones or bar type handsets
    • H04M1/026Details of the structure or mounting of specific components
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/14Mechanical actuation by lifting or attempted removal of hand-portable articles
    • G08B13/1409Mechanical actuation by lifting or attempted removal of hand-portable articles for removal detection of electrical appliances by detecting their physical disconnection from an electrical system, e.g. using a switch incorporated in the plug connector
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephone Function (AREA)

Abstract

This application discloses a kind of antitheft mobile phone of software and hardware combining and its alarm method, it is related to communication field, its alarm method includes software alarm and hardware alarms;Hardware alarms include:Trigger signal is obtained, trigger signal is obtained by the anti-theft switch being arranged on SIM card installation position, and anti-theft switch can be triggered when taking out SIM card;Start authentication module, and obtain the identity information of user's input;Such as by checking, then terminate;As not verified, then start acousto-optic device and alarmed;Software alarm includes:Alarm signal is obtained, alarm signal is sent by other intelligent terminals;Using the SIM card module or wireless network of mobile phone, mobile phone present position is sent to the account of binding.By software alarm and the combination of two kinds of type of alarms of hardware alarms, as long as what is found is timely, no matter whether stealer takes out SIM card, can start alert program within the very first time, greatly improve the probability for recovering mobile phone, and reduce the difficulty of operation.

Description

The antitheft mobile phone and its alarm method of software and hardware combining
Technical field
The application is related to communication field, more particularly to the antitheft mobile phone and its alarm method of a kind of software and hardware combining.
Background technology
Smart mobile phone of the prior art, anti-theft feature is stronger and stronger, although anti-theft feature is more and more richer in form Richness, but operation principle is essentially identical:After missing mode is started, on the one hand, lock the operation interface of mobile phone, mobile phone is not made With the passive antitheft function of realization;On the other hand, mobile phone location, the image of cellie or acoustic information are sent to tying up Fixed terminal device, realize the function of actively finding.
The technology that anti-theft feature is all based on software view of stating is shut, is cracked easily by the mode of brush machine.
In addition, on active seeking function, more practical technology is to realize secret alarm using SIM card on backstage, such as Fruit can start the warning function in time before stealer leaves criminal scene, then can rapidly, efficiently recover mobile phone;If After stealer has moved away from criminal scene, just start the warning function, then can greatly increase the difficulty recovered.
On the other hand, if stealer after mobile phone is stolen, rapidly takes out SIM card, then alarm can be limited to a certain extent The difficulty of mobile phone is recovered in function, increase.
The content of the invention
The purpose of the application is the antitheft mobile phone and its alarm method for providing a kind of software and hardware combining, to solve existing skill Anti-theft feature in art, principle is more single, the technical problem easily cracked.
To achieve the above object, this application provides a kind of anti-theft alarming method of software and hardware combining, including software to alarm And hardware alarms;
Wherein, hardware alarms include:
Trigger signal is obtained, the trigger signal is obtained by the anti-theft switch being arranged on SIM card installation position, described anti- Pirate of the open is closed and can be triggered when taking out SIM card;
Start authentication module, and obtain the identity information of user's input;
Such as by checking, then terminate;
As not verified, then start acousto-optic device and alarmed;
Wherein, software alarm includes:
Alarm signal is obtained, the alarm signal is sent by other intelligent terminals;
Using the SIM card module or wireless network of mobile phone, mobile phone present position is sent to the account of binding.
In the above-mentioned technical solutions, further, by verifying, after terminating;When mobile phone detects SIM card signal again, Automatically turn on the alarm method.
In the above-mentioned technical solutions, further, when the alarm method is in starting state, if user shuts down, meeting It is required that user carries out authentication, only when being verified, shutdown action can be just performed.
In the above-mentioned technical solutions, further, when starting shooting again, the alarm method is automatically turned on.
In the above-mentioned technical solutions, further, software alarm also includes:After alarm signal is obtained, mobile phone is locked Partial function.
In the above-mentioned technical solutions, further, in software alarm, the alarm signal is whole by intelligence set in advance End is sent;Or the information of setting is sent for any intelligent terminal.
Compared to prior art, the anti-theft alarming method for the software and hardware combining that the application provides, due to including hardware alarms, It is easily detected by brush machine to crack, safe class is higher.Moreover, software alarm and hardware alarms cooperate, stealer is being stolen After mobile phone, if not taking out SIM card, software warning function can utilize SIM card to send warning message and positional information, be easy to Recover mobile phone;If stealer after mobile phone is stolen, takes out rapidly SIM card, then hardware alarms play a role, and remind the owner of lost property and group Many attentions, also allow for recovering mobile phone.That is, by software alarm and the combination of two kinds of type of alarms of hardware alarms, as long as finding It is timely, you can start alert program within the very first time, greatly improve the probability for recovering mobile phone, and reduce the difficulty of operation.
In addition, the present invention also provides a kind of antitheft mobile phone of software and hardware combining, including:
Mobile phone body, the mobile phone body are provided with SIM card installation position, and including acousto-optic device;
Anti-theft switch, the anti-theft switch are arranged on SIM card installation position, taken out in SIM card from SIM card installation position When, the anti-theft switch can be triggered;
On the one hand warning circuit, the warning circuit electrically connect with anti-theft switch, on the other hand electric with the acousto-optic device Connection;
Authentication module, the authentication module input default instruction for user, when the instruction that authentication module obtains is incorrect Or instruction is got in certain period of time, then the work of warning circuit control acousto-optic device, is alarmed.
In the above-mentioned technical solutions, further, in addition to alarm power supply, the alarm power supply are distinguished by power supply circuit Authentication module electrical connection is electrically connected with warning circuit, acousto-optic device and authentication module.
In the above-mentioned technical solutions, further, in addition to self power generation module, the self power generation module and alarm power supply are electric Connection.
In the above-mentioned technical solutions, further, in addition to auxiliary switch, the auxiliary switch are arranged on inserting for card taking pin In groove;The auxiliary switch electrically connects with warning circuit.
The antitheft mobile phone of the software and hardware combining provided compared to prior art, the application, SIM card is monitored by anti-theft switch Plugging condition, when anti-theft switch is triggered, can start authentication module carry out authentication:If by checking, judge Operated for owner, do not alarm, be easy to owner normally to change SIM card;If not verified, sound and light alarm can be carried out, is caused The owner of lost property or other people attention, help to recover mobile phone.Due to being provided with alarm structure in hardware aspect, it is not easy to pass through Brush machine cracks, and safe class is higher.
The additional aspect and advantage of the application will become obvious in following description section, or the practice for passing through the application Recognize.
Brief description of the drawings
, below will be to specific in order to illustrate more clearly of the application embodiment or technical scheme of the prior art The required accompanying drawing used is briefly described in embodiment or description of the prior art, it should be apparent that, in describing below Accompanying drawing is some embodiments of the application, for those of ordinary skill in the art, before creative work is not paid Put, other accompanying drawings can also be obtained according to these accompanying drawings.
To more fully understand and illustrating some embodiments of the present application, below with reference to the description of accompanying drawing reference implementation example, In the drawings, same digital number indicates corresponding part in the accompanying drawings.
Fig. 1 is the illustrative diagram of the Environment System provided according to some embodiments of the present application.
Fig. 2 is the exemplary cell schematic diagram of the electronic functionalities configuration shown in Fig. 1.
Fig. 3 is hard in the alarm method of the antitheft mobile phone of the software and hardware combining provided according to some embodiments of the present application The exemplary process diagram of part alarm;
Fig. 4 is soft in the alarm method of the antitheft mobile phone of the software and hardware combining provided according to some embodiments of the present application The exemplary process diagram of part alarm;
Fig. 5 is that the mechanical structure of the antitheft mobile phone of the software and hardware combining provided according to some embodiments of the present application is illustrated Figure;
Fig. 6 is the electronic structure square frame of the antitheft mobile phone of the software and hardware combining provided according to some embodiments of the present application Figure.
Reference:
1- mobile phone bodies;2- anti-theft switch;3- warning circuits;4- authentication modules;5- alarm power supplys;6- self power generation modules; 11-SIM cards installation position;12-SIM cards;13- Katos;14- acousto-optic devices.
Embodiment
Description below with reference to accompanying drawing is had the right the application defined in requirement and its equivalent for ease of Integrated Understanding Various embodiments.These embodiments include various specific details in order to understand, but these be considered only as it is exemplary.Cause This, it will be appreciated by those skilled in the art that carrying out variations and modifications without departing from this to various embodiments described here The scope and spirit of application.In addition, briefly and to be explicitly described the application, the application will be omitted to known function and structure Description.
The term and phrase used in description below and claims is not limited to literal meaning, and be merely can Understand and as one man understand the application.Therefore, for those skilled in the art, it is possible to understand that, there is provided to the various implementations of the application The description of example is only the purpose to illustrate, rather than limitation appended claims and its application of Equivalent definitions.
Below in conjunction with the accompanying drawing in the application some embodiments, the technical scheme in the embodiment of the present application is carried out clear Chu, it is fully described by, it is clear that described embodiment is only some embodiments of the present application, rather than whole embodiments. Based on the embodiment in the application, those of ordinary skill in the art are obtained all under the premise of creative work is not made Other embodiment, belong to the scope of the application protection.
It should be noted that the term used in the embodiment of the present application is the mesh for being only in description specific embodiment , and it is not intended to be limiting the application." one " of singulative used in the embodiment of the present application and appended claims, "one", " one kind ", " described " and "the" be also intended to including most forms, unless context clearly shows that other implications.Also It should be appreciated that term "and/or" used herein refer to and list items purposes comprising one or more mutually bindings it is any or It is possible to combine.Expression " first ", " second ", " described the first " and " described the second " be used for modify respective element without examining Worry order or importance, are used only for distinguishing a kind of element and another element, without limiting respective element.
Terminal according to the application some embodiments can be electronic equipment, the electronic equipment can include smart mobile phone, PC (PC, such as tablet personal computer, desktop computer, notebook, net book, palm PC PDA), mobile phone, e-book Reader, portable media player (PMP), audio/video player (MP3/MP4), video camera, virtual reality device And one or more of combinations in wearable device etc. (VR).According to some embodiments of the present application, the wearable device Including type of attachment (such as wrist-watch, ring, bracelet, glasses or wear-type device (HMD)), integrated type (such as electronics clothes Dress), decorated type (such as pad skin, tatoo or built in electronic device) etc. in one or more of combinations.The application's In some embodiments, the electronic equipment can be flexible, be not limited to the said equipment, or can be in above-mentioned various equipment One or more of combinations.In this application, term " user " may indicate that using the people of electronic equipment or using electronic equipment Equipment (such as artificial intelligence electronic equipment).
The embodiment of the present application provides the antitheft mobile phone and its alarm method of a kind of software and hardware combining.For the ease of understanding this Apply for embodiment, the embodiment of the present application is described in detail below with reference to accompanying drawing.
Fig. 1 is the illustrative diagram of the Environment System 100 provided according to some embodiments of the present application.Such as Fig. 1 Shown, Environment System 100 can include electronic equipment 110, network 120 and server 130 etc..Electronic equipment 110 can be with Including bus 111, processor 112, memory 113, input/output module 114, display 115, communication module 116 and physics Key 117 etc..In some embodiments of the present application, electronic equipment 110 can omit one or more elements, or can enter one Step includes one or more other elements.
Bus 111 can include circuit.The circuit can be with one or more element (examples in interconnection electronics 110 Such as, bus 111, processor 112, memory 113, input/output module 114, display 115 and communication module 116).It is described Circuit can also realize communication (for example, obtaining and/or sending number between one or more elements in electronic equipment 110 According to).
Processor 112 can include one or more coprocessors (Co-processor), application processor (AP, Application Processor) and communication processor (Communication Processor).As an example, processor 112 can perform the control and/or data processing with one or more elements of electronic equipment 110.
Memory 113 can be with data storage.The data can include other with one or more of electronic equipment 110 The related instruction of element or data.For example, the data can include the initial data of the before processing of processor 112, intermediate data And/or the data after processing.Specifically, memory 113 can store photo, image, iris information etc..Memory 113 can With including impermanent memory memory and/or permanent memory memory.
According to some embodiments of the present application, memory 113 can store software and/or program.Described program can wrap Include kernel, middleware, API (API, Application Programming Interface) and/or using journey Sequence.At least a portion of the kernel, the middleware or the API can include operating system (OS, Operating System).As an example, the kernel can be controlled or managed for performing other programs (for example, middle Part, API and application program) in realize operation or function system resource (for example, bus 111, processor 112nd, memory 113 etc.).In addition, the kernel can provide interface.The interface can by the middleware, it is described should One or more elements of electronic equipment 110 are accessed with DLL or the application program to control or management system resource.
The middleware can be as the intermediate layer of data transfer.The data transfer can allow API or Application program is with the kernel communication exchanging data.As an example, the middleware can be handled from the application program One or more task requests of acquisition.For example, the middleware can be to one or more application assigned electronic equipments The priority of 110 system resource (for example, bus 111, processor 112, memory 113 etc.), and processing it is one or Multiple tasks are asked.The API can be that the application program is used to control from the kernel or the middleware The interface of function is provided.The API can also include one or more interfaces or function.The function can be used In security control, Control on Communication, document control, window control, text control, image procossing, signal transacting etc..
Input/output module 114 can send what is inputted from user or external equipment to the other elements of electronic equipment 110 Instruction or data.Input/output module 114 can also be defeated by the instruction of the other elements acquisition from electronic equipment 110 or data Go out to user or external equipment.
Display 115 can be with display content.The content can to user show all kinds (for example, text, image, Video, icon and/or symbol).Display 115 can include liquid crystal display (LCD, Liquid Crystal Display), Light emitting diode (LED, Light-Emitting Diode) display, Organic Light Emitting Diode (OLED, Organic Light Emitting Diode) display, Micro Electro Mechanical System (MEMS, Micro Electro Mechanical Systems) display Device or electric paper display etc., or several combinations.Display 115 can include touch-screen.In certain embodiments, display 115 can show virtual key.The touch-screen can obtain the input of the virtual key.Display 115 can be touched by described Touch screen and obtain input.The input can include touch input, gesture input, action input, close input, electronic pen or user The input (for example, hovering input) of body part.
Communication module 116 can configure the communication between equipment.In certain embodiments, network environment 100 can enter one Step includes electronic equipment 140.As an example, the communication between the equipment can include electronic equipment 110 and other equipment (example Such as, server 130 or electronic equipment 140) between communication.For example, communication module 116 can pass through radio communication or cable modem Letter is connected to network 120, realizes and communicates with other equipment (for example, server 130 or electronic equipment 140).
The radio communication can include microwave communication and/or satellite communication etc..The radio communication can include honeycomb Communication is (for example, global mobile communication (GSM, Global System for Mobile Communications), CDMA (CDMA, Code Division Multiple Access), 3G (Third Generation) Moblie (3G, The 3rd Generation Telecommunication), forth generation mobile communication (4G), the 5th third-generation mobile communication (5G)), Long Term Evolution (LTE, Long Term Evolution), Long Term Evolution upgrade version (LTE-A, LTE-Advanced), WCDMA (WCDMA, Wideband Code Division Multiple Access), UMTS (UMTS, Universal Mobile Telecommunications System), WiMAX (WiBro, Wireless Broadband) etc., or several combinations.According to some embodiments of the present application, the radio communication can include wireless local Net (WiFi, Wireless Fidelity), bluetooth, low-power consumption bluetooth (BLE, Bluetooth Low Energy), ZigBee protocol (ZigBee), near-field communication (NFC, Near Field Communication), magnetic safe transmission, radio frequency and body area network (BAN, Body Area Network) etc., or several combinations.According to some embodiments of the present application, the wire communication can include GLONASS (Glonass/GNSS, Global Navigation Satellite System), global positioning system System (GPS, Global Position System), Beidou navigation satellite system or Galileo (European GPS) Deng.The wire communication can include USB (USB, Universal Serial Bus), high-definition media interface (HDMI, High-Definition Multimedia Interface), proposed standard 232 (RS-232, Recommend ), and/or one in plain old telephone service (POTS, Plain Old Telephone Service) etc. Standard232 Kind, or several combinations.
Secondary or physical bond 117 can be used for user mutual.Secondary or physical bond 117 can include one or more entity keys.In some realities Apply in example, user can be with the function of self-defined secondary or physical bond 117.For example, secondary or physical bond 11 can be used for starting alarm method.
Network 120 can include communication network.The communication network can include computer network (for example, LAN (LAN, Local Area Network) or wide area network (WAN, Wide Area Network)), internet and/or telephone network Deng, or several combinations.Network 120 can be to the other equipment in Environment System 100 (for example, electronic equipment 110, clothes Business device 130, electronic equipment 140 etc.) send information.
Server 130 can be by the other equipment in the connection Environment System 100 of network 120 (for example, electronic equipment 110th, electronic equipment 140 etc.).
Electronic equipment 140 can be identical or different with electronic equipment 110 type.According to some embodiments of the present application, The part or all of operation performed in electronic equipment 110 can be in another equipment or multiple equipment (for example, electronic equipment 140 And/or server 130) in perform.In certain embodiments, when electronic equipment 110 be automatically or in response to request perform it is a kind of or When multiple functions and/or service, electronic equipment 110 can ask other equipment (for example, electronic equipment 140 and/or server 130) perform function and/or service are substituted.In certain embodiments, electronic equipment 110 is in addition to perform function or service, further Perform relative one or more functions.In certain embodiments, other equipment is (for example, electronic equipment 140 and/or clothes Business device 130) asked function or other related one or more functions can be performed, implementing result can be sent to electricity Sub- equipment 110.Electronic equipment 110 can repeat result or further handle implementing result, to provide asked function Or service.
It should be noted that the description for Environment System 100 above, only for convenience of description, can not be this Shen It please be limited within the scope of illustrated embodiment.It is appreciated that for those skilled in the art, the principle based on the system can Each element can be combined on the premise of without departing substantially from the principle, or forms subsystem and be connected with other elements, To implementing the various modifications and variations on the above method and systematic difference field progress form and details.For example, network environment System 100 may further include database.Such deformation, within the protection domain of the application.
Fig. 2 is the exemplary cell block diagram that the electronic functionalities provided according to some embodiments of the present application configure.Such as Shown in Fig. 2, processor 112 can include processing module 200, and the processing module 200 can include acquiring unit 210, analysis Unit 220, control unit 230.
According to some embodiments of the present application, acquiring unit 210 can obtain information.Described information can include but unlimited In word, picture, audio, video, action, gesture etc., or several combinations.In certain embodiments, acquiring unit 210 can be with Input information is obtained by input/output module 114, the touch-screen of display 115 and/or secondary or physical bond 117.As an example, obtain Unit 210 is taken to obtain the input information of electronic equipment 110, such as control instruction.The input information can include button Input, touch-control input, gesture input, action input, remote input, transmission input etc., or several combinations.
In certain embodiments, acquiring unit 210 can obtain the identity information of user's input.In certain embodiments, Acquiring unit 210 can obtain trigger signal caused by anti-theft switch.In certain embodiments, acquiring unit 210 can obtain The alarm signal that other electronic equipments are sent.
According to some embodiments of the present application, information that analytic unit 220 can at least obtain to acquiring unit 210 and The information stored in electronic equipment is analyzed.In certain embodiments, analytic unit 220 can analyze acquiring unit 210 and obtain The identity information taken, is verified to identity information, to judge whether to alarm.
According to some embodiments of the present application, control unit 230 can be with control electronics.The control electronics can To perform action including control electronics 110.In certain embodiments, control unit 230 is according to the analysis of analytic unit 220 As a result, control acousto-optic device is alarmed.
It should be noted that described above for the unit in processing module 200, only for convenience of description, can not be this Application is limited within the scope of illustrated embodiment.It is appreciated that for those skilled in the art, the principle based on the system, Unit may be combined on the premise of without departing substantially from the principle, or form submodule and connect with other units Connect, the various modifications and variations in form and details are carried out to the function of implementing above-mentioned module and unit.For example, electronic equipment 110 may further include sensor etc., and acquiring unit 210 can obtain information by sensor.In another example processing unit 220 may further include division subelement etc..Such deformation, within the protection domain of the application.
The alarm method of the antitheft mobile phone for the software and hardware combining that the application provides, including software alarm and hardware alarms.
Fig. 3 is hard in the alarm method of the antitheft mobile phone of the software and hardware combining provided according to some embodiments of the present application The exemplary process diagram of part alarm.As shown in figure 3, flow 300 can be realized by processing module 200.
In step 310, trigger signal is obtained.
In certain embodiments, the trigger signal is obtained by the anti-theft switch that is arranged on SIM card installation position, when taking When going out or changing SIM card, anti-theft switch can be triggered, and then produce trigger signal.In certain embodiments, the triggering letter Number obtained by the auxiliary switch that is arranged in the slot of card taking pin, when card taking pin is inserted in the slot, auxiliary switch can be touched Hair, and then produce trigger signal.In certain embodiments, above-mentioned anti-theft switch and auxiliary switch are applied while.
In step 320, start authentication module, and obtain the identity information of user's input.
After trigger signal is obtained, authentication interface can be ejected, to gather the information of user's input.Authentication Mode can include, Password Input, fingerprint input, iris input or one kind in face recognition or several.
Such as by checking, then the operation that explanation is owner or the user that has permission performs, then not alarm, can carry out just Normal card taking, change card operation.
And when mobile phone detects SIM card signal again, hardware alarms are automatically turned on, avoid user because carelessness is forgotten to open The function.
When the alarm method is in starting state, if user shuts down, it may require that user carries out authentication, only testing When card passes through, shutdown action can be just performed.Prevent stealer from releasing alarm by way of shutdown, moreover, when starting shooting again, Automatically turn on the alarm method.
As not verified, then step 330 is performed.
In a step 330, start acousto-optic device to be alarmed.
Acoustic-optic alarm can be loudspeaker, flash lamp, the breath light etc. built in mobile phone body, or be separately provided Light, sound-producing device.Wherein, sound-producing device can send alert ring, can also play the alarm voice of recording repeatedly, for example, " this is thief, my hand-set from stolen, please be paid attention to " etc., to attract the attention of people nearby, have the function that deterrence, warning.
Fig. 4 is soft in the alarm method of the antitheft mobile phone of the software and hardware combining provided according to some embodiments of the present application The exemplary process diagram of part alarm.As shown in figure 4, flow 400 can be realized by processing module 200.
In step 410, alarm signal is obtained.
The alarm signal is sent by other intelligent terminals.In certain embodiments, other intelligent terminals refer to advance binding Mobile phone, using the mobile phone to stolen mobile phone send warning message, you can start software alarm.In certain embodiments, other Intelligent terminal is service platform, after user logs in the service platform using account, you can starts software alarm.In some embodiments In, other intelligent terminals are the arbitrary equipment that can send information, and user sends the warning message specified using equipment, is stolen hand After machine identification, that is, start software alarm.
At step 420, using the SIM card module or wireless network of mobile phone, mobile phone present position is sent to binding Account.
After software alarm is started, using the communication unit of mobile phone to the account of binding, such as mobile phone, platform account Deng sending warning message and positional information, be easy to recover mobile phone.
In certain embodiments, after starting software alarm, in addition to step 430.
In step 430, some or all of function of mobile phone is locked.
Make mobile phone can not normal use, on the one hand ensure that the data safety in mobile phone, on the other hand, mobile phone is lost valency Value, reach passive antitheft purpose.
In summary, the alarm method of the antitheft mobile phone for the software and hardware combining that the application provides, due to including hardware alarms, It is easily detected by brush machine to crack, safe class is higher.Moreover, software alarm and hardware alarms cooperate, stealer is being stolen After mobile phone, if not taking out SIM card, software warning function can utilize SIM card to send warning message and positional information, be easy to Recover mobile phone;If stealer after mobile phone is stolen, takes out rapidly SIM card, then hardware alarms play a role, and remind the owner of lost property and group Many attentions, also allow for recovering mobile phone.That is, by software alarm and the combination of two kinds of type of alarms of hardware alarms, as long as finding It is timely, you can start alert program within the very first time, greatly improve the probability for recovering mobile phone, and reduce the difficulty of operation.
Fig. 5 is that the mechanical structure of the antitheft mobile phone of the software and hardware combining provided according to some embodiments of the present application is illustrated Figure;Fig. 6 is the electronic structure block diagram of the antitheft mobile phone of the software and hardware combining provided according to some embodiments of the present application.
As illustrated, the application provides a kind of antitheft mobile phone of software and hardware combining, including mobile phone body 1, anti-theft switch 2, Warning circuit 3 and authentication module 4;The mobile phone body 1 is provided with SIM card installation position 11, and SIM card 12 is installed using Kato 13 On SIM card installation position 11, the mobile phone body 1 includes acousto-optic device 14;The anti-theft switch 2 is arranged on SIM card installation position On 11;SIM card installation position 11 is attached in SIM card 12, or when SIM card 12 is taken out from SIM card installation position 11, it is described antitheft Switch 2 can be triggered;The one side of warning circuit 3 electrically connects with anti-theft switch 2, is on the other hand electrically connected with acousto-optic device 14 Connect;The authentication module 4 inputs default instruction for user, when instruction that authentication module 4 obtains is incorrect or in a timing Between get instruction in section, then warning circuit 3 controls acousto-optic device 14 to work, and is alarmed.
The application provides a kind of antitheft mobile phone of software and hardware combining, and its operation principle is as follows:
After stealer steals mobile phone, either oneself using, it is second-hand resell or escape tracking, be required for change or SIM card 12 is taken out, SIM card installation position 11 is attached in SIM card 12, or when SIM card 12 is taken out from SIM card installation position 11, Anti-theft switch 2 can be triggered;
After anti-theft switch 2 is triggered, starts authentication module 4, user's checking identity, if the verification passes, then terminate;If Checking is not by starting warning circuit 3 then;
Warning circuit 3 can start the acousto-optic device 14 in mobile phone body 1, not stop to flash and sound the alarm.
The application provides a kind of antitheft mobile phone of software and hardware combining, has two kinds to use scene:
Scene one, under open state;
When the plug of SIM card 12, when triggering anti-theft switch 2, interface ejection prompting frame reminds user, need to carry out authentication, After the completion of the replacing of SIM card 12, handset identity to signal, mobile phone burglary-resisting function is automatically opened up, to prevent user forgets to open from preventing Steal function;
Scene two:Under off-mode;
User is accustomed to shutdown and changes SIM card 12, and now needing the prior closing hand phone anti-theft feature of user, (antitheft mobile phone is certainly Dynamic to open, so when user selects to shut down, ejection pop-up prompting carries out authentication with closing hand phone anti-theft feature), shutdown Started shooting after changing SIM card 12, mobile phone automatically turns on mobile phone burglary-resisting function, or is touched after replacing SIM card 12 in the case of out of power Antitheft mobile phone alarm has been sent out, has now been started shooting, authentication input frame can be ejected, can have been sounded all clear by authentication.
The antitheft mobile phone of the software and hardware combining provided compared to prior art, the application, SIM is monitored by anti-theft switch 2 The plugging condition of card 12, when anti-theft switch 2 is triggered, authentication module 4 can be started and carry out authentication:If by verifying, Then it is judged as that owner operates, does not alarm, be easy to owner normally to change SIM card 12;If not verified, acousto-optic report can be carried out It is alert, cause the owner of lost property or other people attention, help to recover mobile phone.Due to being provided with alarm structure in hardware aspect, not allowing Easily cracked by brush machine, safe class is higher.
Particular, it is important that the warning function can be combined with software warning function in the prior art, if stealer is stolen After mobile phone, SIM card 12 is extracted immediately, then starts sound and light alarm, realize that short range is alarmed;After if stealer steals mobile phone, do not pull out Go out SIM card 12, then can start software alarm rapidly, that is, control SIM card 12 to send alarming short message.
It on software warning function, can be started by the intelligent terminal of binding, can also be sent and referred to by any intelligent terminal Fixed alarm command is realized.So user can be opened after consciousness mobile phone is lost using friend at one's side or the mobile phone of passerby Move the warning function.
In the present embodiment, the antitheft mobile phone of software and hardware combining also includes alarm power supply 5, and the alarm power supply 5 passes through confession Circuit electrically connects authentication module 4 with warning circuit 3, acousto-optic device 14 and authentication module 4 respectively and electrically connected.
After there is provided independent alarm power supply 5, stealer on the one hand can be avoided, prevents to report by dismantling battery It is alert, it on the other hand can ensure that mobile phone, still can Normal Alarm in the state of off-mode, or dead battery capability.
After the electricity for power supply 5 of alarming exhausts, it can also be filled when meeting condition by self power generation module 6 for alarm power supply 5 Electricity, to be again started up alarming.
Specifically, self power generation module 6 can be friction power generation component.Friction power generation component includes friction generator and electricity Road plate, during carrying mobile phone, you can charged for alarm power supply 5, to extend warning function.
Certainly, this is only in one embodiment of the application, and the self power generation module 6 of the application can also use other patterns, For example, self power generation module 6 can also use solar components, it is that alarm power supply 5 charges using illumination.
The antitheft mobile phone for the software and hardware combining that the application provides, authentication module 4 can be Password Input module, fingerprint input One or more in module, iris input module or facial recognition modules.Because mobile phone of the prior art is generally provided with Some authentication modules 4, therefore without additionally setting, too high cost will not be increased.
In the present embodiment, the antitheft mobile phone of software and hardware combining also includes auxiliary switch, and the auxiliary switch is arranged on and taken In the slot of card pin;The auxiliary switch electrically connects with warning circuit 3.Alarm switch and auxiliary switch form dual triggering machine Structure, on the one hand, the accuracy of triggering can be improved;On the other hand, by increasing capacitance it is possible to increase destroy the difficulty of trigger mechanism, and then improve peace Quan Xing.
In the present embodiment, the acousto-optic device 14 is the flash lamp and loudspeaker built in mobile phone body 1.On the one hand, energy Hardware cost is enough saved, on the other hand, makes warning system and the tight binding of mobile phone body 1, improves the difficulty of alarm release.When So, it may also set up independent acousto-optic device.
It should be noted that the above embodiments are intended merely as example, the application is not limited to such example, but can To carry out various change.
It should be noted that in this manual, term " comprising ", "comprising" or its any other variant are intended to Nonexcludability includes, so that process, method, article or equipment including a series of elements not only will including those Element, but also the other element including being not expressly set out, or it is this process, method, article or equipment also to include Intrinsic key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that Other identical element also be present in process, method, article or equipment including the key element.
Finally, it is to be noted that, a series of above-mentioned processing are not only included with order described here in temporal sequence The processing of execution, and the processing including performing parallel or respectively rather than in chronological order.
One of ordinary skill in the art will appreciate that realize all or part of flow in above-described embodiment method, being can be with To be completed by the related hardware of computer program instructions, described program can be stored in a computer-readable recording medium, The program is upon execution, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, described storage medium can be magnetic disc, CD, read-only storage (Read-Only Memory, ROM) or random access memory (Random Access Memory, RAM) Deng.
Above disclosed is only some preferred embodiments of the application, it is impossible to the right model of the application is limited with this Enclose, one of ordinary skill in the art will appreciate that all or part of flow of above-described embodiment is realized, and will according to the application right Made equivalent variations are sought, still falls within and invents covered scope.

Claims (10)

1. a kind of alarm method of the antitheft mobile phone of software and hardware combining, it is characterised in that including software alarm and hardware alarms;
Wherein, hardware alarms include:
Trigger signal is obtained, the trigger signal is obtained by the anti-theft switch being arranged on SIM card installation position, the antitheft Pass can be triggered when taking out SIM card;
Start authentication module, and obtain the identity information of user's input;
Such as by checking, then terminate;
As not verified, then start acousto-optic device and alarmed;
Wherein, software alarm includes:
Alarm signal is obtained, the alarm signal is sent by other intelligent terminals;
Using the SIM card module or wireless network of mobile phone, mobile phone present position is sent to the account of binding.
2. the alarm method of the antitheft mobile phone of software and hardware combining according to claim 1, it is characterised in that by verifying, After end;When mobile phone detects SIM card signal again, the alarm method is automatically turned on.
3. the alarm method of the antitheft mobile phone of software and hardware combining according to claim 2, it is characterised in that in the alarm side When method is in starting state, if user shuts down, it may require that user carries out authentication, only when being verified, can just perform Shutdown acts.
4. the alarm method of the antitheft mobile phone of software and hardware combining according to claim 3, it is characterised in that start shooting again When, automatically turn on the alarm method.
5. the alarm method of the antitheft mobile phone of software and hardware combining according to claim 1, it is characterised in that software alarm is also Including:After alarm signal is obtained, the partial function of mobile phone is locked.
6. the alarm method of the antitheft mobile phone of software and hardware combining according to claim 1, it is characterised in that alarmed in software In, the alarm signal is sent by intelligent terminal set in advance;Or the information of setting is sent for any intelligent terminal.
A kind of 7. antitheft mobile phone of software and hardware combining, it is characterised in that including:
Mobile phone body, the mobile phone body are provided with SIM card installation position, and including acousto-optic device;
Anti-theft switch, the anti-theft switch is arranged on SIM card installation position, when SIM card is taken out from SIM card installation position, institute Stating anti-theft switch can be triggered;
On the one hand warning circuit, the warning circuit are electrically connected with anti-theft switch, on the other hand electrically connected with the acousto-optic device;
Authentication module, the authentication module input default instruction for user, when instruction that authentication module obtains is incorrect or Instruction is got in certain period of time, then the work of warning circuit control acousto-optic device, is alarmed.
8. the antitheft mobile phone of software and hardware combining according to claim 7, it is characterised in that also include alarm power supply, it is described Alarm power supply electrically connects authentication module electrical connection by power supply circuit with warning circuit, acousto-optic device and authentication module respectively.
9. the antitheft mobile phone of software and hardware combining according to claim 8, it is characterised in that also including self power generation module, institute State self power generation module and alarm power electric connection.
10. the antitheft mobile phone of software and hardware combining according to claim 1, it is characterised in that described also including auxiliary switch Auxiliary switch is arranged in the slot of card taking pin;The auxiliary switch electrically connects with warning circuit.
CN201710689021.2A 2017-08-13 2017-08-13 The antitheft mobile phone and its alarm method of software and hardware combining Pending CN107707692A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710689021.2A CN107707692A (en) 2017-08-13 2017-08-13 The antitheft mobile phone and its alarm method of software and hardware combining

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710689021.2A CN107707692A (en) 2017-08-13 2017-08-13 The antitheft mobile phone and its alarm method of software and hardware combining

Publications (1)

Publication Number Publication Date
CN107707692A true CN107707692A (en) 2018-02-16

Family

ID=61170218

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710689021.2A Pending CN107707692A (en) 2017-08-13 2017-08-13 The antitheft mobile phone and its alarm method of software and hardware combining

Country Status (1)

Country Link
CN (1) CN107707692A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109245787A (en) * 2018-11-27 2019-01-18 东莞宜安科技股份有限公司 A mobile phone SIM card advance and retreat mechanism and its control method
CN110086942A (en) * 2019-05-13 2019-08-02 闻泰通讯股份有限公司 Theft preventing method, device, equipment and the storage medium of intelligent terminal

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109245787A (en) * 2018-11-27 2019-01-18 东莞宜安科技股份有限公司 A mobile phone SIM card advance and retreat mechanism and its control method
CN110086942A (en) * 2019-05-13 2019-08-02 闻泰通讯股份有限公司 Theft preventing method, device, equipment and the storage medium of intelligent terminal

Similar Documents

Publication Publication Date Title
US9800995B2 (en) Distributed application functionality and user interface for multiple connected mobile devices
US20200134153A1 (en) Method and device for identity authentication
US10691920B2 (en) Information image display method and apparatus
CN106470269A (en) A kind of method and apparatus of antitheft mobile phone
CN109636401A (en) A kind of method of payment and system based on the micro- expression of user
CN106327193B (en) A kind of system unlocking method and equipment
CN107425579A (en) A kind of intelligent charging method and system
CN107704849A (en) The face identification method and system of double verification function
CN105262885B (en) A kind of mobile terminal and its pintle hook lock theft preventing method with pintle hook lock anti-theft feature
CN107256353A (en) Possesses the display methods of privacy protection function
CN110049490B (en) Safety protection method and device for wearable equipment, wearable equipment and medium
EP4401385A1 (en) Implementation method for remote control after theft of mobile phone
CN107846508A (en) For the assisted memory method and system of forgetful crowd
JP6938579B2 (en) Mobile device privacy protection methods and devices, as well as mobile devices
CN107944245A (en) A kind of eyeball tracking iris unlocking method and system
CN107506721A (en) A kind of more method for collecting iris and system
CN107707692A (en) The antitheft mobile phone and its alarm method of software and hardware combining
CN107786979A (en) A kind of multiple terminals shared communication method and system
CN106791176A (en) A kind of anti-theft method for mobile terminal, device and mobile terminal
CN106056171A (en) Utilizing radio frequency identification tags to display messages and notifications on peripheral devices
CN107404484A (en) A kind of method, apparatus and system of mechanical release authority
CN108549804A (en) Mode switching method and device, computer readable storage medium, terminal
CN107395900A (en) The multiple based reminding method of missed call
CN112016071A (en) Unlocking method, device and readable storage medium based on verifier state and environment
CN106125914A (en) A kind of mobile terminal and alarm clock control method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180216