[go: up one dir, main page]

CN108009450A - The method, apparatus and terminal of terminal anti-theft - Google Patents

The method, apparatus and terminal of terminal anti-theft Download PDF

Info

Publication number
CN108009450A
CN108009450A CN201710999045.8A CN201710999045A CN108009450A CN 108009450 A CN108009450 A CN 108009450A CN 201710999045 A CN201710999045 A CN 201710999045A CN 108009450 A CN108009450 A CN 108009450A
Authority
CN
China
Prior art keywords
terminal
stolen
physiological characteristic
characteristic information
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710999045.8A
Other languages
Chinese (zh)
Inventor
冯旭
张兆生
李辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JRD Communication Shenzhen Ltd
Original Assignee
JRD Communication Shenzhen Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by JRD Communication Shenzhen Ltd filed Critical JRD Communication Shenzhen Ltd
Priority to CN201710999045.8A priority Critical patent/CN108009450A/en
Publication of CN108009450A publication Critical patent/CN108009450A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1415Saving, restoring, recovering or retrying at system level
    • G06F11/1417Boot up procedures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Quality & Reliability (AREA)
  • Telephone Function (AREA)

Abstract

The application provides a kind of method, apparatus and terminal of terminal anti-theft, by when the first system for detecting acquiescence is closed, hidden startup second system;Wherein, the second system is started under the power supply of reserve battery;Whether the terminal is judged in the state that has been stolen or may be stolen, if so, then performing antitheft operation, prevents terminal to be stolen the safety with information in protection terminal to realize.

Description

The method, apparatus and terminal of terminal anti-theft
Technical field
This application involves field of communication technology, more particularly to the method, apparatus and terminal of a kind of terminal anti-theft.
Background technology
With being on the increase for the intelligent portable electronic equipment such as function such as smart mobile phone, camera, tablet computer, intelligence is just The formula electronic equipment of taking also carries more and more information, and with personal privacy information, payment account safety etc. is closely related, because This, it is how antitheft as the indispensable function of using intelligent and portable electronic equipment.
In correlation technique, intelligent portable electronic equipment antitheft mode mainly has setting unlocking pin, anti-theft security software And additional alarm etc., these modes, which can play, notifies the owner of lost property, the function such as sweep equipment data.
There are the following problems in correlation technique:For setting the antitheft mode such as unlocking pin, anti-theft security software, stealer Personal identification be difficult to confirm, it is relatively low to recover the possibility of stolen equipment, and works as the intelligent portable electronic equipment person of being tampered After repacking operation system, intelligent portable electronic equipment, which can not perform, notifies the owner of lost property, the operation such as sweep equipment data.For additional The antitheft mode of alarm, is only a prompting function, and equipment can be shut down or split out to equipment by disabled user in short distance Battery, makes intelligent portable electronic equipment can not alarm.
The content of the invention
The application can be prevented mainly solving the technical problems that provide the method, apparatus and terminal of a kind of terminal anti-theft Terminal is stolen the safety with information in protection terminal.
In order to solve the above technical problems, first technical solution that the application uses is:A kind of side of terminal anti-theft is provided Method, this method include:When the first system for detecting acquiescence is closed, hidden startup second system;Wherein, the second system Started under the power supply of reserve battery;Whether the terminal is judged in the state that has been stolen or may be stolen, if so, Then perform antitheft operation.
In order to solve the above technical problems, second technical solution that the application uses is:A kind of mobile terminal is provided, the end End includes the processor and telecommunication circuit of mutual electrical couplings, and the processor is used for when the first system for detecting acquiescence is closed When, hidden startup second system;Wherein, the second system is started under the power supply of reserve battery;Judge the terminal Whether in the state that has been stolen or may be stolen, if so, then performing antitheft operation by the telecommunication circuit.
In order to solve the above technical problems, the 3rd technical solution that the application uses is:There is provided one kind has store function Device, which has program stored therein data, and routine data can be performed to realize the side of terminal anti-theft as described above Method.
The beneficial effect of the application is:Be different from the situation of the prior art, the application provide a kind of method of terminal anti-theft, Device and terminal, by when detect acquiescence the first system close when, hidden startup second system;Wherein, second system System is started under the power supply of reserve battery;Whether the terminal is judged in the state that has been stolen or may be stolen, if It is then to perform antitheft operation, prevents terminal to be stolen the safety with information in protection terminal to realize.
Brief description of the drawings
Fig. 1 is the flow diagram of one embodiment of method of the application terminal anti-theft;
Fig. 2 be the application terminal anti-theft method in step S102 realize flow diagram;
Fig. 3 is the flow diagram of another embodiment of method of the application terminal anti-theft;
Fig. 4 is the structure diagram of the application mobile terminal;
Fig. 5 is a kind of structure diagram of the device with store function of the application.
Embodiment
For the purpose, technical scheme and advantage of the application are more clearly understood, below in conjunction with specific embodiment, and reference Attached drawing, is described in further detail the application.
Referring to Fig. 1, Fig. 1 is the flow diagram of an embodiment of the method for terminal anti-theft, the execution in the present embodiment Main body, can be terminal (for example notebook, computer, mobile phone, wearable device etc.), and the terminal can use hardware or soft The mode of part is realized.If in addition, it is noted that have substantially the same as a result, the method for the present embodiment is not with shown in Fig. 1 Flow order be limited.As shown in the figure, this method comprises the following steps:
In S101, when the first system for detecting acquiescence is closed, hidden startup second system;Wherein, described second System is started under the power supply of reserve battery.
Specifically, when detecting when the first system is closed in the case of not over formal unlock, such case can be with Including positive closing terminal, refitting system etc., start second system at this time, the first system can be the operation system of terminal acquiescence System, which causes terminal to work normally, and the first system, which is closed, can be understood as terminal and be in shutdown mode, and second system can be with Including antitheft encryption system or the other systems of antitheft encryption system are included, hidden startup second system can include Terminal is in the first system closing, and display screen, which is in, to go out screen state, but the second system of terminal can allow the inter-process of terminal Device is in running order, i.e. terminal is in standby mode, keep receiving extraneous communication instruction, such as can network in terminal In the case of, terminal inner is stored according to the instruction received by sending instructions under cloud server terminal to second system, second system Content changed accordingly, such as change, delete operation, with the security of protection information.
In the present embodiment, when the first system for not detecting acquiescence is closed, i.e., under normal circumstances, second system meeting In sleep mode, exclusive power supply of the reserve battery as second system, under normal circumstances, reserve battery may be configured as Main battery out of power when, be not other module for power supply of terminal, such as the first system power.But if in advance in terminal It is other module for power supply of terminal using Emergency Power is used as after formal unlock is arranged in setting, then, when main battery out of power When, then enable reserve battery and power for the first system.
In another embodiment of the application, when the terminal charge, main battery and reserve battery can charge at the same time, To ensure reserve battery electricity abundance.When starting second system, backstage is preferential to select main battery work, when main battery electricity is low In a certain preset value, such as 10% or during less than 10%, switch to reserve battery work.
In S102, whether the terminal is judged in the state that has been stolen or may be stolen, if so, then performing antitheft Operation.
Alternatively, performing antitheft operation includes performing following at least one operation:Lock the terminal;Control the terminal Blank screen, and it is in holding state;By the recorded message for getting current instant position information, collecting, the current shadow absorbed As at least one in information uploads to cloud server terminal;Delete Local File.
Above as can be seen that in the embodiment of the present application, by the second system that startup is obtained under the power supply of reserve battery Unite whether to judge the terminal in the state that has been stolen or may be stolen, if so, antitheft operation is then performed, it is anti-to realize Only terminal is stolen the safety with information in protection terminal.
Referring to Fig. 2, Fig. 2 be the application terminal anti-theft method in step S102 realize flow diagram, its is specific Flow comprises the following steps:
In S201, the first physiological characteristic information of the user of the currently used terminal is obtained.
Specifically, when the first system for detecting acquiescence is closed, after hidden startup second system, obtained by second system The first physiological characteristic information of the user of currently used terminal is taken, wherein, the first physiological characteristic information includes following at least one The information of physiological characteristic:Fingerprint, face, iris, palmmprint and sound.
In S202, judge whether first physiological characteristic information and default second physiological characteristic information are identical.
Specifically, the second physiological characteristic information includes the information of following at least one physiological characteristic:Fingerprint, face, iris, Palmmprint and sound.According to the setting of default second physiological characteristic information, to obtain corresponding second physiological characteristic information, by One physiological characteristic information is compared with default second physiological characteristic information, when comparison can be 100% matching herein, determines First physiological characteristic information is identical with default second physiological characteristic information, otherwise, it determines the first physiological characteristic information is with presetting The second physiological characteristic information differ;Can also be according to a certain default standard come judge the first physiological characteristic information with it is pre- If the second physiological characteristic information it is whether identical.
Alternatively, judge first physiological characteristic information and whether default second physiological characteristic information is identical also wraps Include:First physiological characteristic information is matched with default second physiological characteristic information, if matching degree is greater than or equal to Preset value, then judge identical, if matching degree is less than preset value, judgement differs.
In S203, if differing, it is judged as that the terminal is in and has been stolen or may be stolen.
Specifically, it is determined that the first physiological characteristic information is differed with default second physiological characteristic information, then terminal is judged It is stolen or may be stolen, antitheft operation is performed according to setting.
Alternatively, if first physiological characteristic information is identical with default second physiological characteristic information, it is judged as institute State terminal and be in non-stolen status, carry out closing the second system or the unlock terminal operation.
In the present embodiment, by judge the first physiological characteristic information and default second physiological characteristic information whether phase Together, to judge that terminal in whether being stolen or may be stolen, can improve the accuracy for judging that terminal is stolen.
Referring to Fig. 3, Fig. 3 is the flow diagram of another embodiment of the method for terminal anti-theft, holding in the present embodiment Row main body, can be terminal (for example notebook, computer, mobile phone, wearable device etc.), the terminal can use hardware or The mode of software is realized.If in addition, it is noted that have substantially the same as a result, the method for the present embodiment is not with Fig. 3 institutes The flow order shown is limited.As shown in the figure, this method comprises the following steps:
In S301, encrypted area is created in the flash memory area of the terminal, the content stored in the encrypted area is set not Change because of the triggering of predeterminable event;Wherein, the predeterminable event includes refitting system operatio.
Specifically, encryption section is created in the flash area of terminal, for example, encryption journey can be stored in encryption section Sequence, the head portrait picture and other guide of owner, encryption section sets encryption, and is not wiped because of the triggering of predeterminable event, Predeterminable event includes refitting system operatio.
In S302, using second life of at least one terminal user as authenticating user identification sample collected Manage characteristic information and encipheror is stored in the encrypted area.
Specifically, default second physiological characteristic information is stored in encrypted area, with reference to the description of above step S202, works as inspection When measuring the first system of acquiescence and closing, during hidden startup second system, the first physiological characteristic information of active user is obtained, will First physiological characteristic information is compared with the second physiological characteristic information in encrypted area, to determine whether terminal is stolen, if really Determine terminal to be stolen, the first physiological characteristic information is stored in encrypted area in the lump, when detecting networking, by the first life in encrypted area Reason characteristic information is uploaded to cloud server terminal, so that owner or public security organ call.
Alternatively, the source program of the second system is stored in the encrypted area.Specifically, when terminal is by refitting system When, second system will not be brushed off, and after terminal turns back on, second system can still be run in the terminal, keep reception to refer to Writ state.
As another embodiment of the application, when user is in first time using terminal, when such as starting shooting for the first time, terminal Prompting enables second system, and pop-up choice box instruction user uploads the content with physiological characteristic information to the encrypted area of terminal, Using the presupposed information as owner's authentication.When needing verification machine owner identification, terminal gathers the physiological characteristic of active user Information is compared with presupposed information, if unanimously, then it represents that owner's identity can be continuing with by verification, active user;If no Unanimously, then it represents that owner's identity is not verified, then according to presetting, execution is corresponding to be operated.Meanwhile second system will be known International Mobile Equipment Identity code (International Mobile Equipment Identity, IMEI) conduct of other terminal The ID of mobile phone, and the account of itself and cloud server terminal is bound, even if refitting system, this binding relationship is also uniquely established constant , it when terminal is under networking situation, can to communicate between cloud server terminal and first or second system of terminal, indicate First or second system perform corresponding operation by the instruction that receives.
Above as can be seen that in the embodiment of the present application, by creating encryption section in the flash area of terminal, to deposit Encipheror, the head portrait picture and other guide of owner are put, these contents are not wiped free of because of refitting system, according in these Hold, second system can be started, establish writing to each other between terminal in time by second system, so as to improve terminal The security of information in the probability and protection terminal being retrieved.
Referring to Fig. 4, a kind of mobile terminal 40 includes:The processor 401 and telecommunication circuit 402 of mutual electrical couplings, with The reserve battery 403 of the 401 mutual electrical couplings of processor.
The processor 401 is used for when the first system for detecting acquiescence is closed, hidden startup second system;Wherein, The second system is started under the power supply of reserve battery;Judge whether the terminal is in be stolen or may be stolen State, if so, then performing antitheft operation by the telecommunication circuit 402.
The reserve battery 403 is used to power to start the second system for the processor 401.
Specifically, it is this when processor 401 is detected in the first system closing in the case of not over formal unlock Situation can include positive closing terminal 40, refitting system etc., start second system at this time, and the first system can be that terminal 40 is silent The operating system recognized, the system cause terminal 40 to work normally, and the first system, which is closed, can be understood as terminal 40 in shutdown mould Formula, second system can include antitheft encryption system or include the other systems of antitheft encryption system, hidden to start the Two system can be in the first system closing including terminal 40, and display screen, which is in, to go out screen state, but the second system of terminal 40 The internal processor 401 of terminal can be allowed in running order, i.e., terminal 40 is in standby mode, keeps receiving the external world and communicating referring to Order, such as in terminal 40 in the case where that can network, by sending instructions under cloud server terminal to second system, second system according to The instruction received, changes the content of 40 storage inside of terminal accordingly, such as changes, deletes operation, to protect letter The security of breath.
In the present embodiment, when processor 401 does not detect that the first system of acquiescence is closed, i.e., under normal circumstances, Second system can be in sleep mode, and exclusive power supply of the reserve battery 403 as second system is under normal circumstances, standby With battery 403 may be configured as main battery out of power when, be not other module for power supply of terminal 40, such as the first system power, Certainly, it is other moulds of terminal 40 if being used as Emergency Power after formal unlock is arranged in the application of terminal 40 is set in advance Block is powered, then, when main battery out of power, enable reserve battery 403 and power for the first system.
In another embodiment of the application, when the terminal 40 charges, main battery and reserve battery 403 can at the same time Charging, to ensure 403 electricity of reserve battery abundance.When starting second system, backstage is preferential to select main battery work, when main electricity Pond electricity is less than a certain preset value, and such as 10% or during less than 10%, switch to reserve battery 403 and work.
Alternatively, processor 401 performs antitheft operation and includes performing following at least one operation:Lock the terminal 40; 40 blank screen of terminal is controlled, and is in holding state;By the recorded message for getting current instant position information, collecting, At least one in the current image information absorbed uploads to cloud server terminal;Delete Local File.
Above as can be seen that in the embodiment of the present application, terminal under the power supply of reserve battery by obtaining the of startup Whether two system judges the terminal in the state that has been stolen or may be stolen, if so, antitheft operation is then performed, with reality Terminal is now prevented to be stolen the safety with information in protection terminal.
Alternatively, the processor 401 is additionally operable to create encrypted area in the flash memory area of the terminal 40, sets described add The content stored in close area does not change because of the triggering of predeterminable event;Wherein, the predeterminable event includes refitting system operatio;Will Second physiological characteristic information and encryption journey of at least one terminal user as authenticating user identification sample collected Sequence is stored in the encrypted area.
Specifically, encrypted area is created in the flash memory area of terminal 40, for example, encipheror, machine can be stored in encrypted area Main head portrait picture and other guide, encrypted area sets encryption, and is not wiped because of the triggering of predeterminable event, predeterminable event Including resetting system operatio.
Specifically, default second physiological characteristic information is stored in encrypted area by processor 401, with reference to described above, when When processor detects that the first system of acquiescence is closed, hidden startup second system, obtains the first physiological characteristic of active user Information, the first physiological characteristic information is compared with the second physiological characteristic information in encrypted area, whether to determine terminal 40 It is stolen, however, it is determined that terminal 40 is stolen, and the first physiological characteristic information is stored in encrypted area in the lump, when processor 401 passes through the electricity that communicates When road 402 detects networking, the first physiological characteristic information in encrypted area is uploaded to cloud server terminal, so that owner calls.
Alternatively, the source program of the second system is stored in the encrypted area.Specifically, when terminal 40 is by refitting system When, second system will not be brushed off, and after terminal 40 turns back on, second system can still be run in terminal 40, keep connecing Receive command status.
It is whole when such as starting shooting for the first time when user is in first time using terminal 40 as another embodiment of the application 40 promptings are held to enable second system, pop-up choice box instruction user uploads the adding to terminal 40 of the content with physiological characteristic information Mi Qu, using the presupposed information as owner's authentication.When needing verification machine owner identification, terminal 40 gathers the life of active user Reason characteristic information is compared with presupposed information, if unanimously, then it represents that owner's identity can continue to make by verification, active user With;It is if inconsistent, then it represents that owner's identity is not verified, then according to presetting, execution is corresponding to be operated.Meanwhile second system System by the International Mobile Equipment Identity code of identification terminal 40 (International Mobile Equipment Identity, IMEI) the ID as mobile phone, and the account of itself and cloud server terminal is bound, even if refitting system, this binding relationship is also only One establish it is constant, when terminal 40 is under networking situation, can cause cloud server terminal and terminal 40 first or second system it Between communicate, instruction first or second system perform corresponding operation by the instruction that receives.
Above as can be seen that in the embodiment of the present application, encrypted area is created in the flash area of terminal by processor Domain, with store encipheror, owner head portrait picture and other guide, these contents are not wiped free of because of refitting system, root According to these contents, second system can be started, establish writing to each other between terminal in time by second system, so as to The security of information in the probability and protection terminal that raising terminal is retrieved.
Referring to Fig. 5, a kind of device 50 with store function is stored thereon with routine data 501, described program data 501 can be performed to realize the method as described in the theft preventing method of above-mentioned terminal 40.
The beneficial effect of the application is:Be different from the situation of the prior art, the application provide a kind of method of terminal anti-theft, Device and terminal, by when detect acquiescence the first system close when, hidden startup second system;Wherein, second system System is started under the power supply of reserve battery;Whether the terminal is judged in the state that has been stolen or may be stolen, if It is then to perform antitheft operation, prevents terminal to be stolen the safety with information in protection terminal to realize.
The foregoing is merely presently filed embodiment, not thereby limits the scope of the claims of the application, every to utilize this The equivalent structure or equivalent flow shift that application specification and accompanying drawing content are made, it is relevant to be directly or indirectly used in other Technical field, is similarly included in the scope of patent protection of the application.

Claims (10)

  1. A kind of 1. theft preventing method of terminal, it is characterised in that the described method includes:
    When the first system for detecting acquiescence is closed, hidden startup second system;Wherein, the second system is in reserve battery Power supply under started;
    Whether the terminal is judged in the state that has been stolen or may be stolen, if so, then performing antitheft operation.
  2. 2. according to the method described in claim 1, it is characterized in that,
    It is described to judge whether the terminal includes in the state that has been stolen or be stolen:
    Obtain the first physiological characteristic information of the user of the currently used terminal;
    Judge whether first physiological characteristic information and default second physiological characteristic information are identical;
    If differing, it is judged as that the terminal is in and has been stolen or may be stolen.
  3. 3. according to the method described in claim 2, it is characterized in that,
    It is described to judge whether the terminal further includes in the state that has been stolen or be stolen:
    If first physiological characteristic information is identical with default second physiological characteristic information, it is judged as that the terminal is in not Stolen status, carries out closing the second system or the unlock terminal operation.
  4. 4. according to the method described in claim 2, it is characterized in that,
    Described first or second physiological characteristic information includes the information of following at least one physiological characteristic:Fingerprint, face, iris, Palmmprint and sound.
  5. 5. according to the method described in claim 1, it is characterized in that, the method further includes:
    Encrypted area is created in the flash memory area of the terminal, the content stored in the encrypted area not touching because of predeterminable event is set Send out and change;Wherein, the predeterminable event includes refitting system operatio;
    Using second physiological characteristic information of at least one terminal user as authenticating user identification sample collected and Encipheror is stored in the encrypted area.
  6. 6. according to the method described in claim 1, it is characterized in that, the antitheft operation of the execution includes performing following at least one Operation:
    Lock the terminal;
    The terminal blank screen is controlled, and is in holding state;
    By at least one in the recorded message for getting current instant position information, collecting, the current image information absorbed Upload to cloud server terminal;
    Delete Local File.
  7. 7. a kind of mobile terminal, it is characterised in that the terminal includes:
    The processor and telecommunication circuit of mutual electrical couplings, the processor are used for when the first system for detecting acquiescence is closed When, hidden startup second system;Wherein, the second system is started under the power supply of reserve battery;Judge the terminal Whether in the state that has been stolen or may be stolen, if so, then performing antitheft operation by the telecommunication circuit.
  8. 8. terminal according to claim 7, it is characterised in that the terminal further includes:
    With the reserve battery of the mutual electrical couplings of the processor;
    The reserve battery is used to power to start the second system for the processor.
  9. 9. terminal according to claim 7, it is characterised in that the processor is additionally operable to:
    Encrypted area is created in the flash memory area of the terminal, the content stored in the encrypted area not touching because of predeterminable event is set Send out and change;Wherein, the predeterminable event includes refitting system operatio;It will collect as authenticating user identification sample extremely Second physiological characteristic information and encipheror of a few terminal user is stored in the encrypted area.
  10. A kind of 10. device with store function, it is characterised in that have program stored therein data, described program data be performed with Realize such as claim 1-6 any one of them methods.
CN201710999045.8A 2017-10-23 2017-10-23 The method, apparatus and terminal of terminal anti-theft Pending CN108009450A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710999045.8A CN108009450A (en) 2017-10-23 2017-10-23 The method, apparatus and terminal of terminal anti-theft

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710999045.8A CN108009450A (en) 2017-10-23 2017-10-23 The method, apparatus and terminal of terminal anti-theft

Publications (1)

Publication Number Publication Date
CN108009450A true CN108009450A (en) 2018-05-08

Family

ID=62051897

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710999045.8A Pending CN108009450A (en) 2017-10-23 2017-10-23 The method, apparatus and terminal of terminal anti-theft

Country Status (1)

Country Link
CN (1) CN108009450A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111259463A (en) * 2020-01-08 2020-06-09 Oppo(重庆)智能科技有限公司 Anti-theft protection method and apparatus, electronic device, computer readable storage medium
CN111698368A (en) * 2020-06-12 2020-09-22 北京字节跳动网络技术有限公司 Terminal control method and device, terminal and storage medium
CN112417410A (en) * 2020-11-16 2021-02-26 珠海格力电器股份有限公司 Operation method and device of intelligent terminal, storage medium and electronic device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103905626A (en) * 2012-12-28 2014-07-02 联芯科技有限公司 Mobile terminal and anti-theft operation method thereof
CN105450841A (en) * 2014-09-25 2016-03-30 小米科技有限责任公司 Method and device of terminal guard against theft

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103905626A (en) * 2012-12-28 2014-07-02 联芯科技有限公司 Mobile terminal and anti-theft operation method thereof
CN105450841A (en) * 2014-09-25 2016-03-30 小米科技有限责任公司 Method and device of terminal guard against theft

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111259463A (en) * 2020-01-08 2020-06-09 Oppo(重庆)智能科技有限公司 Anti-theft protection method and apparatus, electronic device, computer readable storage medium
CN111259463B (en) * 2020-01-08 2022-09-09 Oppo(重庆)智能科技有限公司 Anti-theft protection method and apparatus, electronic device, computer readable storage medium
CN111698368A (en) * 2020-06-12 2020-09-22 北京字节跳动网络技术有限公司 Terminal control method and device, terminal and storage medium
CN112417410A (en) * 2020-11-16 2021-02-26 珠海格力电器股份有限公司 Operation method and device of intelligent terminal, storage medium and electronic device
CN112417410B (en) * 2020-11-16 2025-01-28 珠海格力电器股份有限公司 Smart terminal operation method and device, storage medium, and electronic device

Similar Documents

Publication Publication Date Title
CN112115444B (en) Unlocking method and electronic equipment
CN110651270B (en) Data access method and device
CN113015161B (en) Authentication method and its medium and electronic equipment
EP3941014A1 (en) Digital key-based identity authentication method, terminal apparatus, and medium
US20070254697A1 (en) Mobile Terminal Device
CN103838992A (en) Fingerprint identifying method and terminal
CN104537291A (en) Screen interface unlocking method and screen interface unlocking device
CN104700050A (en) Mobile terminal safety positioning method and device
CN104780279A (en) Mobile phone and method used for supporting stolen tracking and locating
CN105893823A (en) Security protection method and device, and intelligent terminal
CN106875520A (en) A kind of smart lock, electron key and intelligent lock system
CN108009450A (en) The method, apparatus and terminal of terminal anti-theft
CN105262885B (en) A kind of mobile terminal and its pintle hook lock theft preventing method with pintle hook lock anti-theft feature
CN110049490B (en) Safety protection method and device for wearable equipment, wearable equipment and medium
CN105187640A (en) Anti-theft method and system of mobile terminal
CN110706389A (en) Wireless direct-connection access control system and method
CN113196236A (en) Cross-device authentication method and electronic device
CN112598821A (en) Intelligent lock and control method applied to intelligent lock
JP2013161261A (en) Information processing terminal, authentication control method and authentication control program of the same
CN110310108B (en) Novel self-destruction hardware wallet with dismantling machine
CN110310104B (en) Self-destruction type hardware wallet
JP2013027249A (en) Portable terminal, portable terminal charging system, portable terminal charging method, and program
CN102831340B (en) The tripper of electronic equipment and unlock method thereof
CN112261632B (en) Equipment unlocking method, equipment unlocking device, control system and computer readable medium
CN107026735A (en) Method and managed devices that a kind of password is automatically entered

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180508

RJ01 Rejection of invention patent application after publication