CN107707692A - The antitheft mobile phone and its alarm method of software and hardware combining - Google Patents
The antitheft mobile phone and its alarm method of software and hardware combining Download PDFInfo
- Publication number
- CN107707692A CN107707692A CN201710689021.2A CN201710689021A CN107707692A CN 107707692 A CN107707692 A CN 107707692A CN 201710689021 A CN201710689021 A CN 201710689021A CN 107707692 A CN107707692 A CN 107707692A
- Authority
- CN
- China
- Prior art keywords
- mobile phone
- alarm
- software
- sim card
- hardware combining
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 43
- 238000009434 installation Methods 0.000 claims abstract description 18
- 230000001960 triggered effect Effects 0.000 claims abstract description 11
- 230000027455 binding Effects 0.000 claims abstract description 8
- 238000009739 binding Methods 0.000 claims abstract description 8
- 238000010248 power generation Methods 0.000 claims description 11
- 238000004891 communication Methods 0.000 abstract description 28
- 230000006870 function Effects 0.000 description 34
- 238000012545 processing Methods 0.000 description 13
- 238000010586 diagram Methods 0.000 description 9
- 230000008569 process Effects 0.000 description 7
- 230000009471 action Effects 0.000 description 6
- 230000008859 change Effects 0.000 description 5
- 230000005611 electricity Effects 0.000 description 4
- 238000010295 mobile communication Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 230000007774 longterm Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 238000013473 artificial intelligence Methods 0.000 description 1
- XEGGRYVFLWGFHI-UHFFFAOYSA-N bendiocarb Chemical compound CNC(=O)OC1=CC=CC2=C1OC(C)(C)O2 XEGGRYVFLWGFHI-UHFFFAOYSA-N 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 230000001815 facial effect Effects 0.000 description 1
- 239000011521 glass Substances 0.000 description 1
- 238000005286 illumination Methods 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000009897 systematic effect Effects 0.000 description 1
- 230000002123 temporal effect Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 230000036964 tight binding Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/02—Constructional features of telephone sets
- H04M1/0202—Portable telephone sets, e.g. cordless phones, mobile phones or bar type handsets
- H04M1/026—Details of the structure or mounting of specific components
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/02—Mechanical actuation
- G08B13/14—Mechanical actuation by lifting or attempted removal of hand-portable articles
- G08B13/1409—Mechanical actuation by lifting or attempted removal of hand-portable articles for removal detection of electrical appliances by detecting their physical disconnection from an electrical system, e.g. using a switch incorporated in the plug connector
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Telephone Function (AREA)
Abstract
This application discloses a kind of antitheft mobile phone of software and hardware combining and its alarm method, it is related to communication field, its alarm method includes software alarm and hardware alarms;Hardware alarms include:Trigger signal is obtained, trigger signal is obtained by the anti-theft switch being arranged on SIM card installation position, and anti-theft switch can be triggered when taking out SIM card;Start authentication module, and obtain the identity information of user's input;Such as by checking, then terminate;As not verified, then start acousto-optic device and alarmed;Software alarm includes:Alarm signal is obtained, alarm signal is sent by other intelligent terminals;Using the SIM card module or wireless network of mobile phone, mobile phone present position is sent to the account of binding.By software alarm and the combination of two kinds of type of alarms of hardware alarms, as long as what is found is timely, no matter whether stealer takes out SIM card, can start alert program within the very first time, greatly improve the probability for recovering mobile phone, and reduce the difficulty of operation.
Description
Technical field
The application is related to communication field, more particularly to the antitheft mobile phone and its alarm method of a kind of software and hardware combining.
Background technology
Smart mobile phone of the prior art, anti-theft feature is stronger and stronger, although anti-theft feature is more and more richer in form
Richness, but operation principle is essentially identical:After missing mode is started, on the one hand, lock the operation interface of mobile phone, mobile phone is not made
With the passive antitheft function of realization;On the other hand, mobile phone location, the image of cellie or acoustic information are sent to tying up
Fixed terminal device, realize the function of actively finding.
The technology that anti-theft feature is all based on software view of stating is shut, is cracked easily by the mode of brush machine.
In addition, on active seeking function, more practical technology is to realize secret alarm using SIM card on backstage, such as
Fruit can start the warning function in time before stealer leaves criminal scene, then can rapidly, efficiently recover mobile phone;If
After stealer has moved away from criminal scene, just start the warning function, then can greatly increase the difficulty recovered.
On the other hand, if stealer after mobile phone is stolen, rapidly takes out SIM card, then alarm can be limited to a certain extent
The difficulty of mobile phone is recovered in function, increase.
The content of the invention
The purpose of the application is the antitheft mobile phone and its alarm method for providing a kind of software and hardware combining, to solve existing skill
Anti-theft feature in art, principle is more single, the technical problem easily cracked.
To achieve the above object, this application provides a kind of anti-theft alarming method of software and hardware combining, including software to alarm
And hardware alarms;
Wherein, hardware alarms include:
Trigger signal is obtained, the trigger signal is obtained by the anti-theft switch being arranged on SIM card installation position, described anti-
Pirate of the open is closed and can be triggered when taking out SIM card;
Start authentication module, and obtain the identity information of user's input;
Such as by checking, then terminate;
As not verified, then start acousto-optic device and alarmed;
Wherein, software alarm includes:
Alarm signal is obtained, the alarm signal is sent by other intelligent terminals;
Using the SIM card module or wireless network of mobile phone, mobile phone present position is sent to the account of binding.
In the above-mentioned technical solutions, further, by verifying, after terminating;When mobile phone detects SIM card signal again,
Automatically turn on the alarm method.
In the above-mentioned technical solutions, further, when the alarm method is in starting state, if user shuts down, meeting
It is required that user carries out authentication, only when being verified, shutdown action can be just performed.
In the above-mentioned technical solutions, further, when starting shooting again, the alarm method is automatically turned on.
In the above-mentioned technical solutions, further, software alarm also includes:After alarm signal is obtained, mobile phone is locked
Partial function.
In the above-mentioned technical solutions, further, in software alarm, the alarm signal is whole by intelligence set in advance
End is sent;Or the information of setting is sent for any intelligent terminal.
Compared to prior art, the anti-theft alarming method for the software and hardware combining that the application provides, due to including hardware alarms,
It is easily detected by brush machine to crack, safe class is higher.Moreover, software alarm and hardware alarms cooperate, stealer is being stolen
After mobile phone, if not taking out SIM card, software warning function can utilize SIM card to send warning message and positional information, be easy to
Recover mobile phone;If stealer after mobile phone is stolen, takes out rapidly SIM card, then hardware alarms play a role, and remind the owner of lost property and group
Many attentions, also allow for recovering mobile phone.That is, by software alarm and the combination of two kinds of type of alarms of hardware alarms, as long as finding
It is timely, you can start alert program within the very first time, greatly improve the probability for recovering mobile phone, and reduce the difficulty of operation.
In addition, the present invention also provides a kind of antitheft mobile phone of software and hardware combining, including:
Mobile phone body, the mobile phone body are provided with SIM card installation position, and including acousto-optic device;
Anti-theft switch, the anti-theft switch are arranged on SIM card installation position, taken out in SIM card from SIM card installation position
When, the anti-theft switch can be triggered;
On the one hand warning circuit, the warning circuit electrically connect with anti-theft switch, on the other hand electric with the acousto-optic device
Connection;
Authentication module, the authentication module input default instruction for user, when the instruction that authentication module obtains is incorrect
Or instruction is got in certain period of time, then the work of warning circuit control acousto-optic device, is alarmed.
In the above-mentioned technical solutions, further, in addition to alarm power supply, the alarm power supply are distinguished by power supply circuit
Authentication module electrical connection is electrically connected with warning circuit, acousto-optic device and authentication module.
In the above-mentioned technical solutions, further, in addition to self power generation module, the self power generation module and alarm power supply are electric
Connection.
In the above-mentioned technical solutions, further, in addition to auxiliary switch, the auxiliary switch are arranged on inserting for card taking pin
In groove;The auxiliary switch electrically connects with warning circuit.
The antitheft mobile phone of the software and hardware combining provided compared to prior art, the application, SIM card is monitored by anti-theft switch
Plugging condition, when anti-theft switch is triggered, can start authentication module carry out authentication:If by checking, judge
Operated for owner, do not alarm, be easy to owner normally to change SIM card;If not verified, sound and light alarm can be carried out, is caused
The owner of lost property or other people attention, help to recover mobile phone.Due to being provided with alarm structure in hardware aspect, it is not easy to pass through
Brush machine cracks, and safe class is higher.
The additional aspect and advantage of the application will become obvious in following description section, or the practice for passing through the application
Recognize.
Brief description of the drawings
, below will be to specific in order to illustrate more clearly of the application embodiment or technical scheme of the prior art
The required accompanying drawing used is briefly described in embodiment or description of the prior art, it should be apparent that, in describing below
Accompanying drawing is some embodiments of the application, for those of ordinary skill in the art, before creative work is not paid
Put, other accompanying drawings can also be obtained according to these accompanying drawings.
To more fully understand and illustrating some embodiments of the present application, below with reference to the description of accompanying drawing reference implementation example,
In the drawings, same digital number indicates corresponding part in the accompanying drawings.
Fig. 1 is the illustrative diagram of the Environment System provided according to some embodiments of the present application.
Fig. 2 is the exemplary cell schematic diagram of the electronic functionalities configuration shown in Fig. 1.
Fig. 3 is hard in the alarm method of the antitheft mobile phone of the software and hardware combining provided according to some embodiments of the present application
The exemplary process diagram of part alarm;
Fig. 4 is soft in the alarm method of the antitheft mobile phone of the software and hardware combining provided according to some embodiments of the present application
The exemplary process diagram of part alarm;
Fig. 5 is that the mechanical structure of the antitheft mobile phone of the software and hardware combining provided according to some embodiments of the present application is illustrated
Figure;
Fig. 6 is the electronic structure square frame of the antitheft mobile phone of the software and hardware combining provided according to some embodiments of the present application
Figure.
Reference:
1- mobile phone bodies;2- anti-theft switch;3- warning circuits;4- authentication modules;5- alarm power supplys;6- self power generation modules;
11-SIM cards installation position;12-SIM cards;13- Katos;14- acousto-optic devices.
Embodiment
Description below with reference to accompanying drawing is had the right the application defined in requirement and its equivalent for ease of Integrated Understanding
Various embodiments.These embodiments include various specific details in order to understand, but these be considered only as it is exemplary.Cause
This, it will be appreciated by those skilled in the art that carrying out variations and modifications without departing from this to various embodiments described here
The scope and spirit of application.In addition, briefly and to be explicitly described the application, the application will be omitted to known function and structure
Description.
The term and phrase used in description below and claims is not limited to literal meaning, and be merely can
Understand and as one man understand the application.Therefore, for those skilled in the art, it is possible to understand that, there is provided to the various implementations of the application
The description of example is only the purpose to illustrate, rather than limitation appended claims and its application of Equivalent definitions.
Below in conjunction with the accompanying drawing in the application some embodiments, the technical scheme in the embodiment of the present application is carried out clear
Chu, it is fully described by, it is clear that described embodiment is only some embodiments of the present application, rather than whole embodiments.
Based on the embodiment in the application, those of ordinary skill in the art are obtained all under the premise of creative work is not made
Other embodiment, belong to the scope of the application protection.
It should be noted that the term used in the embodiment of the present application is the mesh for being only in description specific embodiment
, and it is not intended to be limiting the application." one " of singulative used in the embodiment of the present application and appended claims,
"one", " one kind ", " described " and "the" be also intended to including most forms, unless context clearly shows that other implications.Also
It should be appreciated that term "and/or" used herein refer to and list items purposes comprising one or more mutually bindings it is any or
It is possible to combine.Expression " first ", " second ", " described the first " and " described the second " be used for modify respective element without examining
Worry order or importance, are used only for distinguishing a kind of element and another element, without limiting respective element.
Terminal according to the application some embodiments can be electronic equipment, the electronic equipment can include smart mobile phone,
PC (PC, such as tablet personal computer, desktop computer, notebook, net book, palm PC PDA), mobile phone, e-book
Reader, portable media player (PMP), audio/video player (MP3/MP4), video camera, virtual reality device
And one or more of combinations in wearable device etc. (VR).According to some embodiments of the present application, the wearable device
Including type of attachment (such as wrist-watch, ring, bracelet, glasses or wear-type device (HMD)), integrated type (such as electronics clothes
Dress), decorated type (such as pad skin, tatoo or built in electronic device) etc. in one or more of combinations.The application's
In some embodiments, the electronic equipment can be flexible, be not limited to the said equipment, or can be in above-mentioned various equipment
One or more of combinations.In this application, term " user " may indicate that using the people of electronic equipment or using electronic equipment
Equipment (such as artificial intelligence electronic equipment).
The embodiment of the present application provides the antitheft mobile phone and its alarm method of a kind of software and hardware combining.For the ease of understanding this
Apply for embodiment, the embodiment of the present application is described in detail below with reference to accompanying drawing.
Fig. 1 is the illustrative diagram of the Environment System 100 provided according to some embodiments of the present application.Such as Fig. 1
Shown, Environment System 100 can include electronic equipment 110, network 120 and server 130 etc..Electronic equipment 110 can be with
Including bus 111, processor 112, memory 113, input/output module 114, display 115, communication module 116 and physics
Key 117 etc..In some embodiments of the present application, electronic equipment 110 can omit one or more elements, or can enter one
Step includes one or more other elements.
Bus 111 can include circuit.The circuit can be with one or more element (examples in interconnection electronics 110
Such as, bus 111, processor 112, memory 113, input/output module 114, display 115 and communication module 116).It is described
Circuit can also realize communication (for example, obtaining and/or sending number between one or more elements in electronic equipment 110
According to).
Processor 112 can include one or more coprocessors (Co-processor), application processor (AP,
Application Processor) and communication processor (Communication Processor).As an example, processor
112 can perform the control and/or data processing with one or more elements of electronic equipment 110.
Memory 113 can be with data storage.The data can include other with one or more of electronic equipment 110
The related instruction of element or data.For example, the data can include the initial data of the before processing of processor 112, intermediate data
And/or the data after processing.Specifically, memory 113 can store photo, image, iris information etc..Memory 113 can
With including impermanent memory memory and/or permanent memory memory.
According to some embodiments of the present application, memory 113 can store software and/or program.Described program can wrap
Include kernel, middleware, API (API, Application Programming Interface) and/or using journey
Sequence.At least a portion of the kernel, the middleware or the API can include operating system (OS,
Operating System).As an example, the kernel can be controlled or managed for performing other programs (for example, middle
Part, API and application program) in realize operation or function system resource (for example, bus 111, processor
112nd, memory 113 etc.).In addition, the kernel can provide interface.The interface can by the middleware, it is described should
One or more elements of electronic equipment 110 are accessed with DLL or the application program to control or management system resource.
The middleware can be as the intermediate layer of data transfer.The data transfer can allow API or
Application program is with the kernel communication exchanging data.As an example, the middleware can be handled from the application program
One or more task requests of acquisition.For example, the middleware can be to one or more application assigned electronic equipments
The priority of 110 system resource (for example, bus 111, processor 112, memory 113 etc.), and processing it is one or
Multiple tasks are asked.The API can be that the application program is used to control from the kernel or the middleware
The interface of function is provided.The API can also include one or more interfaces or function.The function can be used
In security control, Control on Communication, document control, window control, text control, image procossing, signal transacting etc..
Input/output module 114 can send what is inputted from user or external equipment to the other elements of electronic equipment 110
Instruction or data.Input/output module 114 can also be defeated by the instruction of the other elements acquisition from electronic equipment 110 or data
Go out to user or external equipment.
Display 115 can be with display content.The content can to user show all kinds (for example, text, image,
Video, icon and/or symbol).Display 115 can include liquid crystal display (LCD, Liquid Crystal Display),
Light emitting diode (LED, Light-Emitting Diode) display, Organic Light Emitting Diode (OLED, Organic Light
Emitting Diode) display, Micro Electro Mechanical System (MEMS, Micro Electro Mechanical Systems) display
Device or electric paper display etc., or several combinations.Display 115 can include touch-screen.In certain embodiments, display
115 can show virtual key.The touch-screen can obtain the input of the virtual key.Display 115 can be touched by described
Touch screen and obtain input.The input can include touch input, gesture input, action input, close input, electronic pen or user
The input (for example, hovering input) of body part.
Communication module 116 can configure the communication between equipment.In certain embodiments, network environment 100 can enter one
Step includes electronic equipment 140.As an example, the communication between the equipment can include electronic equipment 110 and other equipment (example
Such as, server 130 or electronic equipment 140) between communication.For example, communication module 116 can pass through radio communication or cable modem
Letter is connected to network 120, realizes and communicates with other equipment (for example, server 130 or electronic equipment 140).
The radio communication can include microwave communication and/or satellite communication etc..The radio communication can include honeycomb
Communication is (for example, global mobile communication (GSM, Global System for Mobile Communications), CDMA
(CDMA, Code Division Multiple Access), 3G (Third Generation) Moblie (3G, The 3rd Generation
Telecommunication), forth generation mobile communication (4G), the 5th third-generation mobile communication (5G)), Long Term Evolution (LTE,
Long Term Evolution), Long Term Evolution upgrade version (LTE-A, LTE-Advanced), WCDMA
(WCDMA, Wideband Code Division Multiple Access), UMTS (UMTS,
Universal Mobile Telecommunications System), WiMAX (WiBro, Wireless
Broadband) etc., or several combinations.According to some embodiments of the present application, the radio communication can include wireless local
Net (WiFi, Wireless Fidelity), bluetooth, low-power consumption bluetooth (BLE, Bluetooth Low Energy), ZigBee protocol
(ZigBee), near-field communication (NFC, Near Field Communication), magnetic safe transmission, radio frequency and body area network (BAN,
Body Area Network) etc., or several combinations.According to some embodiments of the present application, the wire communication can include
GLONASS (Glonass/GNSS, Global Navigation Satellite System), global positioning system
System (GPS, Global Position System), Beidou navigation satellite system or Galileo (European GPS)
Deng.The wire communication can include USB (USB, Universal Serial Bus), high-definition media interface
(HDMI, High-Definition Multimedia Interface), proposed standard 232 (RS-232, Recommend
), and/or one in plain old telephone service (POTS, Plain Old Telephone Service) etc. Standard232
Kind, or several combinations.
Secondary or physical bond 117 can be used for user mutual.Secondary or physical bond 117 can include one or more entity keys.In some realities
Apply in example, user can be with the function of self-defined secondary or physical bond 117.For example, secondary or physical bond 11 can be used for starting alarm method.
Network 120 can include communication network.The communication network can include computer network (for example, LAN
(LAN, Local Area Network) or wide area network (WAN, Wide Area Network)), internet and/or telephone network
Deng, or several combinations.Network 120 can be to the other equipment in Environment System 100 (for example, electronic equipment 110, clothes
Business device 130, electronic equipment 140 etc.) send information.
Server 130 can be by the other equipment in the connection Environment System 100 of network 120 (for example, electronic equipment
110th, electronic equipment 140 etc.).
Electronic equipment 140 can be identical or different with electronic equipment 110 type.According to some embodiments of the present application,
The part or all of operation performed in electronic equipment 110 can be in another equipment or multiple equipment (for example, electronic equipment 140
And/or server 130) in perform.In certain embodiments, when electronic equipment 110 be automatically or in response to request perform it is a kind of or
When multiple functions and/or service, electronic equipment 110 can ask other equipment (for example, electronic equipment 140 and/or server
130) perform function and/or service are substituted.In certain embodiments, electronic equipment 110 is in addition to perform function or service, further
Perform relative one or more functions.In certain embodiments, other equipment is (for example, electronic equipment 140 and/or clothes
Business device 130) asked function or other related one or more functions can be performed, implementing result can be sent to electricity
Sub- equipment 110.Electronic equipment 110 can repeat result or further handle implementing result, to provide asked function
Or service.
It should be noted that the description for Environment System 100 above, only for convenience of description, can not be this Shen
It please be limited within the scope of illustrated embodiment.It is appreciated that for those skilled in the art, the principle based on the system can
Each element can be combined on the premise of without departing substantially from the principle, or forms subsystem and be connected with other elements,
To implementing the various modifications and variations on the above method and systematic difference field progress form and details.For example, network environment
System 100 may further include database.Such deformation, within the protection domain of the application.
Fig. 2 is the exemplary cell block diagram that the electronic functionalities provided according to some embodiments of the present application configure.Such as
Shown in Fig. 2, processor 112 can include processing module 200, and the processing module 200 can include acquiring unit 210, analysis
Unit 220, control unit 230.
According to some embodiments of the present application, acquiring unit 210 can obtain information.Described information can include but unlimited
In word, picture, audio, video, action, gesture etc., or several combinations.In certain embodiments, acquiring unit 210 can be with
Input information is obtained by input/output module 114, the touch-screen of display 115 and/or secondary or physical bond 117.As an example, obtain
Unit 210 is taken to obtain the input information of electronic equipment 110, such as control instruction.The input information can include button
Input, touch-control input, gesture input, action input, remote input, transmission input etc., or several combinations.
In certain embodiments, acquiring unit 210 can obtain the identity information of user's input.In certain embodiments,
Acquiring unit 210 can obtain trigger signal caused by anti-theft switch.In certain embodiments, acquiring unit 210 can obtain
The alarm signal that other electronic equipments are sent.
According to some embodiments of the present application, information that analytic unit 220 can at least obtain to acquiring unit 210 and
The information stored in electronic equipment is analyzed.In certain embodiments, analytic unit 220 can analyze acquiring unit 210 and obtain
The identity information taken, is verified to identity information, to judge whether to alarm.
According to some embodiments of the present application, control unit 230 can be with control electronics.The control electronics can
To perform action including control electronics 110.In certain embodiments, control unit 230 is according to the analysis of analytic unit 220
As a result, control acousto-optic device is alarmed.
It should be noted that described above for the unit in processing module 200, only for convenience of description, can not be this
Application is limited within the scope of illustrated embodiment.It is appreciated that for those skilled in the art, the principle based on the system,
Unit may be combined on the premise of without departing substantially from the principle, or form submodule and connect with other units
Connect, the various modifications and variations in form and details are carried out to the function of implementing above-mentioned module and unit.For example, electronic equipment
110 may further include sensor etc., and acquiring unit 210 can obtain information by sensor.In another example processing unit
220 may further include division subelement etc..Such deformation, within the protection domain of the application.
The alarm method of the antitheft mobile phone for the software and hardware combining that the application provides, including software alarm and hardware alarms.
Fig. 3 is hard in the alarm method of the antitheft mobile phone of the software and hardware combining provided according to some embodiments of the present application
The exemplary process diagram of part alarm.As shown in figure 3, flow 300 can be realized by processing module 200.
In step 310, trigger signal is obtained.
In certain embodiments, the trigger signal is obtained by the anti-theft switch that is arranged on SIM card installation position, when taking
When going out or changing SIM card, anti-theft switch can be triggered, and then produce trigger signal.In certain embodiments, the triggering letter
Number obtained by the auxiliary switch that is arranged in the slot of card taking pin, when card taking pin is inserted in the slot, auxiliary switch can be touched
Hair, and then produce trigger signal.In certain embodiments, above-mentioned anti-theft switch and auxiliary switch are applied while.
In step 320, start authentication module, and obtain the identity information of user's input.
After trigger signal is obtained, authentication interface can be ejected, to gather the information of user's input.Authentication
Mode can include, Password Input, fingerprint input, iris input or one kind in face recognition or several.
Such as by checking, then the operation that explanation is owner or the user that has permission performs, then not alarm, can carry out just
Normal card taking, change card operation.
And when mobile phone detects SIM card signal again, hardware alarms are automatically turned on, avoid user because carelessness is forgotten to open
The function.
When the alarm method is in starting state, if user shuts down, it may require that user carries out authentication, only testing
When card passes through, shutdown action can be just performed.Prevent stealer from releasing alarm by way of shutdown, moreover, when starting shooting again,
Automatically turn on the alarm method.
As not verified, then step 330 is performed.
In a step 330, start acousto-optic device to be alarmed.
Acoustic-optic alarm can be loudspeaker, flash lamp, the breath light etc. built in mobile phone body, or be separately provided
Light, sound-producing device.Wherein, sound-producing device can send alert ring, can also play the alarm voice of recording repeatedly, for example,
" this is thief, my hand-set from stolen, please be paid attention to " etc., to attract the attention of people nearby, have the function that deterrence, warning.
Fig. 4 is soft in the alarm method of the antitheft mobile phone of the software and hardware combining provided according to some embodiments of the present application
The exemplary process diagram of part alarm.As shown in figure 4, flow 400 can be realized by processing module 200.
In step 410, alarm signal is obtained.
The alarm signal is sent by other intelligent terminals.In certain embodiments, other intelligent terminals refer to advance binding
Mobile phone, using the mobile phone to stolen mobile phone send warning message, you can start software alarm.In certain embodiments, other
Intelligent terminal is service platform, after user logs in the service platform using account, you can starts software alarm.In some embodiments
In, other intelligent terminals are the arbitrary equipment that can send information, and user sends the warning message specified using equipment, is stolen hand
After machine identification, that is, start software alarm.
At step 420, using the SIM card module or wireless network of mobile phone, mobile phone present position is sent to binding
Account.
After software alarm is started, using the communication unit of mobile phone to the account of binding, such as mobile phone, platform account
Deng sending warning message and positional information, be easy to recover mobile phone.
In certain embodiments, after starting software alarm, in addition to step 430.
In step 430, some or all of function of mobile phone is locked.
Make mobile phone can not normal use, on the one hand ensure that the data safety in mobile phone, on the other hand, mobile phone is lost valency
Value, reach passive antitheft purpose.
In summary, the alarm method of the antitheft mobile phone for the software and hardware combining that the application provides, due to including hardware alarms,
It is easily detected by brush machine to crack, safe class is higher.Moreover, software alarm and hardware alarms cooperate, stealer is being stolen
After mobile phone, if not taking out SIM card, software warning function can utilize SIM card to send warning message and positional information, be easy to
Recover mobile phone;If stealer after mobile phone is stolen, takes out rapidly SIM card, then hardware alarms play a role, and remind the owner of lost property and group
Many attentions, also allow for recovering mobile phone.That is, by software alarm and the combination of two kinds of type of alarms of hardware alarms, as long as finding
It is timely, you can start alert program within the very first time, greatly improve the probability for recovering mobile phone, and reduce the difficulty of operation.
Fig. 5 is that the mechanical structure of the antitheft mobile phone of the software and hardware combining provided according to some embodiments of the present application is illustrated
Figure;Fig. 6 is the electronic structure block diagram of the antitheft mobile phone of the software and hardware combining provided according to some embodiments of the present application.
As illustrated, the application provides a kind of antitheft mobile phone of software and hardware combining, including mobile phone body 1, anti-theft switch 2,
Warning circuit 3 and authentication module 4;The mobile phone body 1 is provided with SIM card installation position 11, and SIM card 12 is installed using Kato 13
On SIM card installation position 11, the mobile phone body 1 includes acousto-optic device 14;The anti-theft switch 2 is arranged on SIM card installation position
On 11;SIM card installation position 11 is attached in SIM card 12, or when SIM card 12 is taken out from SIM card installation position 11, it is described antitheft
Switch 2 can be triggered;The one side of warning circuit 3 electrically connects with anti-theft switch 2, is on the other hand electrically connected with acousto-optic device 14
Connect;The authentication module 4 inputs default instruction for user, when instruction that authentication module 4 obtains is incorrect or in a timing
Between get instruction in section, then warning circuit 3 controls acousto-optic device 14 to work, and is alarmed.
The application provides a kind of antitheft mobile phone of software and hardware combining, and its operation principle is as follows:
After stealer steals mobile phone, either oneself using, it is second-hand resell or escape tracking, be required for change or
SIM card 12 is taken out, SIM card installation position 11 is attached in SIM card 12, or when SIM card 12 is taken out from SIM card installation position 11,
Anti-theft switch 2 can be triggered;
After anti-theft switch 2 is triggered, starts authentication module 4, user's checking identity, if the verification passes, then terminate;If
Checking is not by starting warning circuit 3 then;
Warning circuit 3 can start the acousto-optic device 14 in mobile phone body 1, not stop to flash and sound the alarm.
The application provides a kind of antitheft mobile phone of software and hardware combining, has two kinds to use scene:
Scene one, under open state;
When the plug of SIM card 12, when triggering anti-theft switch 2, interface ejection prompting frame reminds user, need to carry out authentication,
After the completion of the replacing of SIM card 12, handset identity to signal, mobile phone burglary-resisting function is automatically opened up, to prevent user forgets to open from preventing
Steal function;
Scene two:Under off-mode;
User is accustomed to shutdown and changes SIM card 12, and now needing the prior closing hand phone anti-theft feature of user, (antitheft mobile phone is certainly
Dynamic to open, so when user selects to shut down, ejection pop-up prompting carries out authentication with closing hand phone anti-theft feature), shutdown
Started shooting after changing SIM card 12, mobile phone automatically turns on mobile phone burglary-resisting function, or is touched after replacing SIM card 12 in the case of out of power
Antitheft mobile phone alarm has been sent out, has now been started shooting, authentication input frame can be ejected, can have been sounded all clear by authentication.
The antitheft mobile phone of the software and hardware combining provided compared to prior art, the application, SIM is monitored by anti-theft switch 2
The plugging condition of card 12, when anti-theft switch 2 is triggered, authentication module 4 can be started and carry out authentication:If by verifying,
Then it is judged as that owner operates, does not alarm, be easy to owner normally to change SIM card 12;If not verified, acousto-optic report can be carried out
It is alert, cause the owner of lost property or other people attention, help to recover mobile phone.Due to being provided with alarm structure in hardware aspect, not allowing
Easily cracked by brush machine, safe class is higher.
Particular, it is important that the warning function can be combined with software warning function in the prior art, if stealer is stolen
After mobile phone, SIM card 12 is extracted immediately, then starts sound and light alarm, realize that short range is alarmed;After if stealer steals mobile phone, do not pull out
Go out SIM card 12, then can start software alarm rapidly, that is, control SIM card 12 to send alarming short message.
It on software warning function, can be started by the intelligent terminal of binding, can also be sent and referred to by any intelligent terminal
Fixed alarm command is realized.So user can be opened after consciousness mobile phone is lost using friend at one's side or the mobile phone of passerby
Move the warning function.
In the present embodiment, the antitheft mobile phone of software and hardware combining also includes alarm power supply 5, and the alarm power supply 5 passes through confession
Circuit electrically connects authentication module 4 with warning circuit 3, acousto-optic device 14 and authentication module 4 respectively and electrically connected.
After there is provided independent alarm power supply 5, stealer on the one hand can be avoided, prevents to report by dismantling battery
It is alert, it on the other hand can ensure that mobile phone, still can Normal Alarm in the state of off-mode, or dead battery capability.
After the electricity for power supply 5 of alarming exhausts, it can also be filled when meeting condition by self power generation module 6 for alarm power supply 5
Electricity, to be again started up alarming.
Specifically, self power generation module 6 can be friction power generation component.Friction power generation component includes friction generator and electricity
Road plate, during carrying mobile phone, you can charged for alarm power supply 5, to extend warning function.
Certainly, this is only in one embodiment of the application, and the self power generation module 6 of the application can also use other patterns,
For example, self power generation module 6 can also use solar components, it is that alarm power supply 5 charges using illumination.
The antitheft mobile phone for the software and hardware combining that the application provides, authentication module 4 can be Password Input module, fingerprint input
One or more in module, iris input module or facial recognition modules.Because mobile phone of the prior art is generally provided with
Some authentication modules 4, therefore without additionally setting, too high cost will not be increased.
In the present embodiment, the antitheft mobile phone of software and hardware combining also includes auxiliary switch, and the auxiliary switch is arranged on and taken
In the slot of card pin;The auxiliary switch electrically connects with warning circuit 3.Alarm switch and auxiliary switch form dual triggering machine
Structure, on the one hand, the accuracy of triggering can be improved;On the other hand, by increasing capacitance it is possible to increase destroy the difficulty of trigger mechanism, and then improve peace
Quan Xing.
In the present embodiment, the acousto-optic device 14 is the flash lamp and loudspeaker built in mobile phone body 1.On the one hand, energy
Hardware cost is enough saved, on the other hand, makes warning system and the tight binding of mobile phone body 1, improves the difficulty of alarm release.When
So, it may also set up independent acousto-optic device.
It should be noted that the above embodiments are intended merely as example, the application is not limited to such example, but can
To carry out various change.
It should be noted that in this manual, term " comprising ", "comprising" or its any other variant are intended to
Nonexcludability includes, so that process, method, article or equipment including a series of elements not only will including those
Element, but also the other element including being not expressly set out, or it is this process, method, article or equipment also to include
Intrinsic key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that
Other identical element also be present in process, method, article or equipment including the key element.
Finally, it is to be noted that, a series of above-mentioned processing are not only included with order described here in temporal sequence
The processing of execution, and the processing including performing parallel or respectively rather than in chronological order.
One of ordinary skill in the art will appreciate that realize all or part of flow in above-described embodiment method, being can be with
To be completed by the related hardware of computer program instructions, described program can be stored in a computer-readable recording medium,
The program is upon execution, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, described storage medium can be magnetic disc,
CD, read-only storage (Read-Only Memory, ROM) or random access memory (Random Access Memory, RAM)
Deng.
Above disclosed is only some preferred embodiments of the application, it is impossible to the right model of the application is limited with this
Enclose, one of ordinary skill in the art will appreciate that all or part of flow of above-described embodiment is realized, and will according to the application right
Made equivalent variations are sought, still falls within and invents covered scope.
Claims (10)
1. a kind of alarm method of the antitheft mobile phone of software and hardware combining, it is characterised in that including software alarm and hardware alarms;
Wherein, hardware alarms include:
Trigger signal is obtained, the trigger signal is obtained by the anti-theft switch being arranged on SIM card installation position, the antitheft
Pass can be triggered when taking out SIM card;
Start authentication module, and obtain the identity information of user's input;
Such as by checking, then terminate;
As not verified, then start acousto-optic device and alarmed;
Wherein, software alarm includes:
Alarm signal is obtained, the alarm signal is sent by other intelligent terminals;
Using the SIM card module or wireless network of mobile phone, mobile phone present position is sent to the account of binding.
2. the alarm method of the antitheft mobile phone of software and hardware combining according to claim 1, it is characterised in that by verifying,
After end;When mobile phone detects SIM card signal again, the alarm method is automatically turned on.
3. the alarm method of the antitheft mobile phone of software and hardware combining according to claim 2, it is characterised in that in the alarm side
When method is in starting state, if user shuts down, it may require that user carries out authentication, only when being verified, can just perform
Shutdown acts.
4. the alarm method of the antitheft mobile phone of software and hardware combining according to claim 3, it is characterised in that start shooting again
When, automatically turn on the alarm method.
5. the alarm method of the antitheft mobile phone of software and hardware combining according to claim 1, it is characterised in that software alarm is also
Including:After alarm signal is obtained, the partial function of mobile phone is locked.
6. the alarm method of the antitheft mobile phone of software and hardware combining according to claim 1, it is characterised in that alarmed in software
In, the alarm signal is sent by intelligent terminal set in advance;Or the information of setting is sent for any intelligent terminal.
A kind of 7. antitheft mobile phone of software and hardware combining, it is characterised in that including:
Mobile phone body, the mobile phone body are provided with SIM card installation position, and including acousto-optic device;
Anti-theft switch, the anti-theft switch is arranged on SIM card installation position, when SIM card is taken out from SIM card installation position, institute
Stating anti-theft switch can be triggered;
On the one hand warning circuit, the warning circuit are electrically connected with anti-theft switch, on the other hand electrically connected with the acousto-optic device;
Authentication module, the authentication module input default instruction for user, when instruction that authentication module obtains is incorrect or
Instruction is got in certain period of time, then the work of warning circuit control acousto-optic device, is alarmed.
8. the antitheft mobile phone of software and hardware combining according to claim 7, it is characterised in that also include alarm power supply, it is described
Alarm power supply electrically connects authentication module electrical connection by power supply circuit with warning circuit, acousto-optic device and authentication module respectively.
9. the antitheft mobile phone of software and hardware combining according to claim 8, it is characterised in that also including self power generation module, institute
State self power generation module and alarm power electric connection.
10. the antitheft mobile phone of software and hardware combining according to claim 1, it is characterised in that described also including auxiliary switch
Auxiliary switch is arranged in the slot of card taking pin;The auxiliary switch electrically connects with warning circuit.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710689021.2A CN107707692A (en) | 2017-08-13 | 2017-08-13 | The antitheft mobile phone and its alarm method of software and hardware combining |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710689021.2A CN107707692A (en) | 2017-08-13 | 2017-08-13 | The antitheft mobile phone and its alarm method of software and hardware combining |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107707692A true CN107707692A (en) | 2018-02-16 |
Family
ID=61170218
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710689021.2A Pending CN107707692A (en) | 2017-08-13 | 2017-08-13 | The antitheft mobile phone and its alarm method of software and hardware combining |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107707692A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109245787A (en) * | 2018-11-27 | 2019-01-18 | 东莞宜安科技股份有限公司 | A mobile phone SIM card advance and retreat mechanism and its control method |
CN110086942A (en) * | 2019-05-13 | 2019-08-02 | 闻泰通讯股份有限公司 | Theft preventing method, device, equipment and the storage medium of intelligent terminal |
-
2017
- 2017-08-13 CN CN201710689021.2A patent/CN107707692A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109245787A (en) * | 2018-11-27 | 2019-01-18 | 东莞宜安科技股份有限公司 | A mobile phone SIM card advance and retreat mechanism and its control method |
CN110086942A (en) * | 2019-05-13 | 2019-08-02 | 闻泰通讯股份有限公司 | Theft preventing method, device, equipment and the storage medium of intelligent terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9800995B2 (en) | Distributed application functionality and user interface for multiple connected mobile devices | |
US20200134153A1 (en) | Method and device for identity authentication | |
US10691920B2 (en) | Information image display method and apparatus | |
CN106470269A (en) | A kind of method and apparatus of antitheft mobile phone | |
CN109636401A (en) | A kind of method of payment and system based on the micro- expression of user | |
CN106327193B (en) | A kind of system unlocking method and equipment | |
CN107425579A (en) | A kind of intelligent charging method and system | |
CN107704849A (en) | The face identification method and system of double verification function | |
CN105262885B (en) | A kind of mobile terminal and its pintle hook lock theft preventing method with pintle hook lock anti-theft feature | |
CN107256353A (en) | Possesses the display methods of privacy protection function | |
CN110049490B (en) | Safety protection method and device for wearable equipment, wearable equipment and medium | |
EP4401385A1 (en) | Implementation method for remote control after theft of mobile phone | |
CN107846508A (en) | For the assisted memory method and system of forgetful crowd | |
JP6938579B2 (en) | Mobile device privacy protection methods and devices, as well as mobile devices | |
CN107944245A (en) | A kind of eyeball tracking iris unlocking method and system | |
CN107506721A (en) | A kind of more method for collecting iris and system | |
CN107707692A (en) | The antitheft mobile phone and its alarm method of software and hardware combining | |
CN107786979A (en) | A kind of multiple terminals shared communication method and system | |
CN106791176A (en) | A kind of anti-theft method for mobile terminal, device and mobile terminal | |
CN106056171A (en) | Utilizing radio frequency identification tags to display messages and notifications on peripheral devices | |
CN107404484A (en) | A kind of method, apparatus and system of mechanical release authority | |
CN108549804A (en) | Mode switching method and device, computer readable storage medium, terminal | |
CN107395900A (en) | The multiple based reminding method of missed call | |
CN112016071A (en) | Unlocking method, device and readable storage medium based on verifier state and environment | |
CN106125914A (en) | A kind of mobile terminal and alarm clock control method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20180216 |