CN108009450A - The method, apparatus and terminal of terminal anti-theft - Google Patents
The method, apparatus and terminal of terminal anti-theft Download PDFInfo
- Publication number
- CN108009450A CN108009450A CN201710999045.8A CN201710999045A CN108009450A CN 108009450 A CN108009450 A CN 108009450A CN 201710999045 A CN201710999045 A CN 201710999045A CN 108009450 A CN108009450 A CN 108009450A
- Authority
- CN
- China
- Prior art keywords
- terminal
- stolen
- physiological characteristic
- characteristic information
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/88—Detecting or preventing theft or loss
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1415—Saving, restoring, recovering or retrying at system level
- G06F11/1417—Boot up procedures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Quality & Reliability (AREA)
- Telephone Function (AREA)
Abstract
The application provides a kind of method, apparatus and terminal of terminal anti-theft, by when the first system for detecting acquiescence is closed, hidden startup second system;Wherein, the second system is started under the power supply of reserve battery;Whether the terminal is judged in the state that has been stolen or may be stolen, if so, then performing antitheft operation, prevents terminal to be stolen the safety with information in protection terminal to realize.
Description
Technical field
This application involves field of communication technology, more particularly to the method, apparatus and terminal of a kind of terminal anti-theft.
Background technology
With being on the increase for the intelligent portable electronic equipment such as function such as smart mobile phone, camera, tablet computer, intelligence is just
The formula electronic equipment of taking also carries more and more information, and with personal privacy information, payment account safety etc. is closely related, because
This, it is how antitheft as the indispensable function of using intelligent and portable electronic equipment.
In correlation technique, intelligent portable electronic equipment antitheft mode mainly has setting unlocking pin, anti-theft security software
And additional alarm etc., these modes, which can play, notifies the owner of lost property, the function such as sweep equipment data.
There are the following problems in correlation technique:For setting the antitheft mode such as unlocking pin, anti-theft security software, stealer
Personal identification be difficult to confirm, it is relatively low to recover the possibility of stolen equipment, and works as the intelligent portable electronic equipment person of being tampered
After repacking operation system, intelligent portable electronic equipment, which can not perform, notifies the owner of lost property, the operation such as sweep equipment data.For additional
The antitheft mode of alarm, is only a prompting function, and equipment can be shut down or split out to equipment by disabled user in short distance
Battery, makes intelligent portable electronic equipment can not alarm.
The content of the invention
The application can be prevented mainly solving the technical problems that provide the method, apparatus and terminal of a kind of terminal anti-theft
Terminal is stolen the safety with information in protection terminal.
In order to solve the above technical problems, first technical solution that the application uses is:A kind of side of terminal anti-theft is provided
Method, this method include:When the first system for detecting acquiescence is closed, hidden startup second system;Wherein, the second system
Started under the power supply of reserve battery;Whether the terminal is judged in the state that has been stolen or may be stolen, if so,
Then perform antitheft operation.
In order to solve the above technical problems, second technical solution that the application uses is:A kind of mobile terminal is provided, the end
End includes the processor and telecommunication circuit of mutual electrical couplings, and the processor is used for when the first system for detecting acquiescence is closed
When, hidden startup second system;Wherein, the second system is started under the power supply of reserve battery;Judge the terminal
Whether in the state that has been stolen or may be stolen, if so, then performing antitheft operation by the telecommunication circuit.
In order to solve the above technical problems, the 3rd technical solution that the application uses is:There is provided one kind has store function
Device, which has program stored therein data, and routine data can be performed to realize the side of terminal anti-theft as described above
Method.
The beneficial effect of the application is:Be different from the situation of the prior art, the application provide a kind of method of terminal anti-theft,
Device and terminal, by when detect acquiescence the first system close when, hidden startup second system;Wherein, second system
System is started under the power supply of reserve battery;Whether the terminal is judged in the state that has been stolen or may be stolen, if
It is then to perform antitheft operation, prevents terminal to be stolen the safety with information in protection terminal to realize.
Brief description of the drawings
Fig. 1 is the flow diagram of one embodiment of method of the application terminal anti-theft;
Fig. 2 be the application terminal anti-theft method in step S102 realize flow diagram;
Fig. 3 is the flow diagram of another embodiment of method of the application terminal anti-theft;
Fig. 4 is the structure diagram of the application mobile terminal;
Fig. 5 is a kind of structure diagram of the device with store function of the application.
Embodiment
For the purpose, technical scheme and advantage of the application are more clearly understood, below in conjunction with specific embodiment, and reference
Attached drawing, is described in further detail the application.
Referring to Fig. 1, Fig. 1 is the flow diagram of an embodiment of the method for terminal anti-theft, the execution in the present embodiment
Main body, can be terminal (for example notebook, computer, mobile phone, wearable device etc.), and the terminal can use hardware or soft
The mode of part is realized.If in addition, it is noted that have substantially the same as a result, the method for the present embodiment is not with shown in Fig. 1
Flow order be limited.As shown in the figure, this method comprises the following steps:
In S101, when the first system for detecting acquiescence is closed, hidden startup second system;Wherein, described second
System is started under the power supply of reserve battery.
Specifically, when detecting when the first system is closed in the case of not over formal unlock, such case can be with
Including positive closing terminal, refitting system etc., start second system at this time, the first system can be the operation system of terminal acquiescence
System, which causes terminal to work normally, and the first system, which is closed, can be understood as terminal and be in shutdown mode, and second system can be with
Including antitheft encryption system or the other systems of antitheft encryption system are included, hidden startup second system can include
Terminal is in the first system closing, and display screen, which is in, to go out screen state, but the second system of terminal can allow the inter-process of terminal
Device is in running order, i.e. terminal is in standby mode, keep receiving extraneous communication instruction, such as can network in terminal
In the case of, terminal inner is stored according to the instruction received by sending instructions under cloud server terminal to second system, second system
Content changed accordingly, such as change, delete operation, with the security of protection information.
In the present embodiment, when the first system for not detecting acquiescence is closed, i.e., under normal circumstances, second system meeting
In sleep mode, exclusive power supply of the reserve battery as second system, under normal circumstances, reserve battery may be configured as
Main battery out of power when, be not other module for power supply of terminal, such as the first system power.But if in advance in terminal
It is other module for power supply of terminal using Emergency Power is used as after formal unlock is arranged in setting, then, when main battery out of power
When, then enable reserve battery and power for the first system.
In another embodiment of the application, when the terminal charge, main battery and reserve battery can charge at the same time,
To ensure reserve battery electricity abundance.When starting second system, backstage is preferential to select main battery work, when main battery electricity is low
In a certain preset value, such as 10% or during less than 10%, switch to reserve battery work.
In S102, whether the terminal is judged in the state that has been stolen or may be stolen, if so, then performing antitheft
Operation.
Alternatively, performing antitheft operation includes performing following at least one operation:Lock the terminal;Control the terminal
Blank screen, and it is in holding state;By the recorded message for getting current instant position information, collecting, the current shadow absorbed
As at least one in information uploads to cloud server terminal;Delete Local File.
Above as can be seen that in the embodiment of the present application, by the second system that startup is obtained under the power supply of reserve battery
Unite whether to judge the terminal in the state that has been stolen or may be stolen, if so, antitheft operation is then performed, it is anti-to realize
Only terminal is stolen the safety with information in protection terminal.
Referring to Fig. 2, Fig. 2 be the application terminal anti-theft method in step S102 realize flow diagram, its is specific
Flow comprises the following steps:
In S201, the first physiological characteristic information of the user of the currently used terminal is obtained.
Specifically, when the first system for detecting acquiescence is closed, after hidden startup second system, obtained by second system
The first physiological characteristic information of the user of currently used terminal is taken, wherein, the first physiological characteristic information includes following at least one
The information of physiological characteristic:Fingerprint, face, iris, palmmprint and sound.
In S202, judge whether first physiological characteristic information and default second physiological characteristic information are identical.
Specifically, the second physiological characteristic information includes the information of following at least one physiological characteristic:Fingerprint, face, iris,
Palmmprint and sound.According to the setting of default second physiological characteristic information, to obtain corresponding second physiological characteristic information, by
One physiological characteristic information is compared with default second physiological characteristic information, when comparison can be 100% matching herein, determines
First physiological characteristic information is identical with default second physiological characteristic information, otherwise, it determines the first physiological characteristic information is with presetting
The second physiological characteristic information differ;Can also be according to a certain default standard come judge the first physiological characteristic information with it is pre-
If the second physiological characteristic information it is whether identical.
Alternatively, judge first physiological characteristic information and whether default second physiological characteristic information is identical also wraps
Include:First physiological characteristic information is matched with default second physiological characteristic information, if matching degree is greater than or equal to
Preset value, then judge identical, if matching degree is less than preset value, judgement differs.
In S203, if differing, it is judged as that the terminal is in and has been stolen or may be stolen.
Specifically, it is determined that the first physiological characteristic information is differed with default second physiological characteristic information, then terminal is judged
It is stolen or may be stolen, antitheft operation is performed according to setting.
Alternatively, if first physiological characteristic information is identical with default second physiological characteristic information, it is judged as institute
State terminal and be in non-stolen status, carry out closing the second system or the unlock terminal operation.
In the present embodiment, by judge the first physiological characteristic information and default second physiological characteristic information whether phase
Together, to judge that terminal in whether being stolen or may be stolen, can improve the accuracy for judging that terminal is stolen.
Referring to Fig. 3, Fig. 3 is the flow diagram of another embodiment of the method for terminal anti-theft, holding in the present embodiment
Row main body, can be terminal (for example notebook, computer, mobile phone, wearable device etc.), the terminal can use hardware or
The mode of software is realized.If in addition, it is noted that have substantially the same as a result, the method for the present embodiment is not with Fig. 3 institutes
The flow order shown is limited.As shown in the figure, this method comprises the following steps:
In S301, encrypted area is created in the flash memory area of the terminal, the content stored in the encrypted area is set not
Change because of the triggering of predeterminable event;Wherein, the predeterminable event includes refitting system operatio.
Specifically, encryption section is created in the flash area of terminal, for example, encryption journey can be stored in encryption section
Sequence, the head portrait picture and other guide of owner, encryption section sets encryption, and is not wiped because of the triggering of predeterminable event,
Predeterminable event includes refitting system operatio.
In S302, using second life of at least one terminal user as authenticating user identification sample collected
Manage characteristic information and encipheror is stored in the encrypted area.
Specifically, default second physiological characteristic information is stored in encrypted area, with reference to the description of above step S202, works as inspection
When measuring the first system of acquiescence and closing, during hidden startup second system, the first physiological characteristic information of active user is obtained, will
First physiological characteristic information is compared with the second physiological characteristic information in encrypted area, to determine whether terminal is stolen, if really
Determine terminal to be stolen, the first physiological characteristic information is stored in encrypted area in the lump, when detecting networking, by the first life in encrypted area
Reason characteristic information is uploaded to cloud server terminal, so that owner or public security organ call.
Alternatively, the source program of the second system is stored in the encrypted area.Specifically, when terminal is by refitting system
When, second system will not be brushed off, and after terminal turns back on, second system can still be run in the terminal, keep reception to refer to
Writ state.
As another embodiment of the application, when user is in first time using terminal, when such as starting shooting for the first time, terminal
Prompting enables second system, and pop-up choice box instruction user uploads the content with physiological characteristic information to the encrypted area of terminal,
Using the presupposed information as owner's authentication.When needing verification machine owner identification, terminal gathers the physiological characteristic of active user
Information is compared with presupposed information, if unanimously, then it represents that owner's identity can be continuing with by verification, active user;If no
Unanimously, then it represents that owner's identity is not verified, then according to presetting, execution is corresponding to be operated.Meanwhile second system will be known
International Mobile Equipment Identity code (International Mobile Equipment Identity, IMEI) conduct of other terminal
The ID of mobile phone, and the account of itself and cloud server terminal is bound, even if refitting system, this binding relationship is also uniquely established constant
, it when terminal is under networking situation, can to communicate between cloud server terminal and first or second system of terminal, indicate
First or second system perform corresponding operation by the instruction that receives.
Above as can be seen that in the embodiment of the present application, by creating encryption section in the flash area of terminal, to deposit
Encipheror, the head portrait picture and other guide of owner are put, these contents are not wiped free of because of refitting system, according in these
Hold, second system can be started, establish writing to each other between terminal in time by second system, so as to improve terminal
The security of information in the probability and protection terminal being retrieved.
Referring to Fig. 4, a kind of mobile terminal 40 includes:The processor 401 and telecommunication circuit 402 of mutual electrical couplings, with
The reserve battery 403 of the 401 mutual electrical couplings of processor.
The processor 401 is used for when the first system for detecting acquiescence is closed, hidden startup second system;Wherein,
The second system is started under the power supply of reserve battery;Judge whether the terminal is in be stolen or may be stolen
State, if so, then performing antitheft operation by the telecommunication circuit 402.
The reserve battery 403 is used to power to start the second system for the processor 401.
Specifically, it is this when processor 401 is detected in the first system closing in the case of not over formal unlock
Situation can include positive closing terminal 40, refitting system etc., start second system at this time, and the first system can be that terminal 40 is silent
The operating system recognized, the system cause terminal 40 to work normally, and the first system, which is closed, can be understood as terminal 40 in shutdown mould
Formula, second system can include antitheft encryption system or include the other systems of antitheft encryption system, hidden to start the
Two system can be in the first system closing including terminal 40, and display screen, which is in, to go out screen state, but the second system of terminal 40
The internal processor 401 of terminal can be allowed in running order, i.e., terminal 40 is in standby mode, keeps receiving the external world and communicating referring to
Order, such as in terminal 40 in the case where that can network, by sending instructions under cloud server terminal to second system, second system according to
The instruction received, changes the content of 40 storage inside of terminal accordingly, such as changes, deletes operation, to protect letter
The security of breath.
In the present embodiment, when processor 401 does not detect that the first system of acquiescence is closed, i.e., under normal circumstances,
Second system can be in sleep mode, and exclusive power supply of the reserve battery 403 as second system is under normal circumstances, standby
With battery 403 may be configured as main battery out of power when, be not other module for power supply of terminal 40, such as the first system power,
Certainly, it is other moulds of terminal 40 if being used as Emergency Power after formal unlock is arranged in the application of terminal 40 is set in advance
Block is powered, then, when main battery out of power, enable reserve battery 403 and power for the first system.
In another embodiment of the application, when the terminal 40 charges, main battery and reserve battery 403 can at the same time
Charging, to ensure 403 electricity of reserve battery abundance.When starting second system, backstage is preferential to select main battery work, when main electricity
Pond electricity is less than a certain preset value, and such as 10% or during less than 10%, switch to reserve battery 403 and work.
Alternatively, processor 401 performs antitheft operation and includes performing following at least one operation:Lock the terminal 40;
40 blank screen of terminal is controlled, and is in holding state;By the recorded message for getting current instant position information, collecting,
At least one in the current image information absorbed uploads to cloud server terminal;Delete Local File.
Above as can be seen that in the embodiment of the present application, terminal under the power supply of reserve battery by obtaining the of startup
Whether two system judges the terminal in the state that has been stolen or may be stolen, if so, antitheft operation is then performed, with reality
Terminal is now prevented to be stolen the safety with information in protection terminal.
Alternatively, the processor 401 is additionally operable to create encrypted area in the flash memory area of the terminal 40, sets described add
The content stored in close area does not change because of the triggering of predeterminable event;Wherein, the predeterminable event includes refitting system operatio;Will
Second physiological characteristic information and encryption journey of at least one terminal user as authenticating user identification sample collected
Sequence is stored in the encrypted area.
Specifically, encrypted area is created in the flash memory area of terminal 40, for example, encipheror, machine can be stored in encrypted area
Main head portrait picture and other guide, encrypted area sets encryption, and is not wiped because of the triggering of predeterminable event, predeterminable event
Including resetting system operatio.
Specifically, default second physiological characteristic information is stored in encrypted area by processor 401, with reference to described above, when
When processor detects that the first system of acquiescence is closed, hidden startup second system, obtains the first physiological characteristic of active user
Information, the first physiological characteristic information is compared with the second physiological characteristic information in encrypted area, whether to determine terminal 40
It is stolen, however, it is determined that terminal 40 is stolen, and the first physiological characteristic information is stored in encrypted area in the lump, when processor 401 passes through the electricity that communicates
When road 402 detects networking, the first physiological characteristic information in encrypted area is uploaded to cloud server terminal, so that owner calls.
Alternatively, the source program of the second system is stored in the encrypted area.Specifically, when terminal 40 is by refitting system
When, second system will not be brushed off, and after terminal 40 turns back on, second system can still be run in terminal 40, keep connecing
Receive command status.
It is whole when such as starting shooting for the first time when user is in first time using terminal 40 as another embodiment of the application
40 promptings are held to enable second system, pop-up choice box instruction user uploads the adding to terminal 40 of the content with physiological characteristic information
Mi Qu, using the presupposed information as owner's authentication.When needing verification machine owner identification, terminal 40 gathers the life of active user
Reason characteristic information is compared with presupposed information, if unanimously, then it represents that owner's identity can continue to make by verification, active user
With;It is if inconsistent, then it represents that owner's identity is not verified, then according to presetting, execution is corresponding to be operated.Meanwhile second system
System by the International Mobile Equipment Identity code of identification terminal 40 (International Mobile Equipment Identity,
IMEI) the ID as mobile phone, and the account of itself and cloud server terminal is bound, even if refitting system, this binding relationship is also only
One establish it is constant, when terminal 40 is under networking situation, can cause cloud server terminal and terminal 40 first or second system it
Between communicate, instruction first or second system perform corresponding operation by the instruction that receives.
Above as can be seen that in the embodiment of the present application, encrypted area is created in the flash area of terminal by processor
Domain, with store encipheror, owner head portrait picture and other guide, these contents are not wiped free of because of refitting system, root
According to these contents, second system can be started, establish writing to each other between terminal in time by second system, so as to
The security of information in the probability and protection terminal that raising terminal is retrieved.
Referring to Fig. 5, a kind of device 50 with store function is stored thereon with routine data 501, described program data
501 can be performed to realize the method as described in the theft preventing method of above-mentioned terminal 40.
The beneficial effect of the application is:Be different from the situation of the prior art, the application provide a kind of method of terminal anti-theft,
Device and terminal, by when detect acquiescence the first system close when, hidden startup second system;Wherein, second system
System is started under the power supply of reserve battery;Whether the terminal is judged in the state that has been stolen or may be stolen, if
It is then to perform antitheft operation, prevents terminal to be stolen the safety with information in protection terminal to realize.
The foregoing is merely presently filed embodiment, not thereby limits the scope of the claims of the application, every to utilize this
The equivalent structure or equivalent flow shift that application specification and accompanying drawing content are made, it is relevant to be directly or indirectly used in other
Technical field, is similarly included in the scope of patent protection of the application.
Claims (10)
- A kind of 1. theft preventing method of terminal, it is characterised in that the described method includes:When the first system for detecting acquiescence is closed, hidden startup second system;Wherein, the second system is in reserve battery Power supply under started;Whether the terminal is judged in the state that has been stolen or may be stolen, if so, then performing antitheft operation.
- 2. according to the method described in claim 1, it is characterized in that,It is described to judge whether the terminal includes in the state that has been stolen or be stolen:Obtain the first physiological characteristic information of the user of the currently used terminal;Judge whether first physiological characteristic information and default second physiological characteristic information are identical;If differing, it is judged as that the terminal is in and has been stolen or may be stolen.
- 3. according to the method described in claim 2, it is characterized in that,It is described to judge whether the terminal further includes in the state that has been stolen or be stolen:If first physiological characteristic information is identical with default second physiological characteristic information, it is judged as that the terminal is in not Stolen status, carries out closing the second system or the unlock terminal operation.
- 4. according to the method described in claim 2, it is characterized in that,Described first or second physiological characteristic information includes the information of following at least one physiological characteristic:Fingerprint, face, iris, Palmmprint and sound.
- 5. according to the method described in claim 1, it is characterized in that, the method further includes:Encrypted area is created in the flash memory area of the terminal, the content stored in the encrypted area not touching because of predeterminable event is set Send out and change;Wherein, the predeterminable event includes refitting system operatio;Using second physiological characteristic information of at least one terminal user as authenticating user identification sample collected and Encipheror is stored in the encrypted area.
- 6. according to the method described in claim 1, it is characterized in that, the antitheft operation of the execution includes performing following at least one Operation:Lock the terminal;The terminal blank screen is controlled, and is in holding state;By at least one in the recorded message for getting current instant position information, collecting, the current image information absorbed Upload to cloud server terminal;Delete Local File.
- 7. a kind of mobile terminal, it is characterised in that the terminal includes:The processor and telecommunication circuit of mutual electrical couplings, the processor are used for when the first system for detecting acquiescence is closed When, hidden startup second system;Wherein, the second system is started under the power supply of reserve battery;Judge the terminal Whether in the state that has been stolen or may be stolen, if so, then performing antitheft operation by the telecommunication circuit.
- 8. terminal according to claim 7, it is characterised in that the terminal further includes:With the reserve battery of the mutual electrical couplings of the processor;The reserve battery is used to power to start the second system for the processor.
- 9. terminal according to claim 7, it is characterised in that the processor is additionally operable to:Encrypted area is created in the flash memory area of the terminal, the content stored in the encrypted area not touching because of predeterminable event is set Send out and change;Wherein, the predeterminable event includes refitting system operatio;It will collect as authenticating user identification sample extremely Second physiological characteristic information and encipheror of a few terminal user is stored in the encrypted area.
- A kind of 10. device with store function, it is characterised in that have program stored therein data, described program data be performed with Realize such as claim 1-6 any one of them methods.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710999045.8A CN108009450A (en) | 2017-10-23 | 2017-10-23 | The method, apparatus and terminal of terminal anti-theft |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710999045.8A CN108009450A (en) | 2017-10-23 | 2017-10-23 | The method, apparatus and terminal of terminal anti-theft |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108009450A true CN108009450A (en) | 2018-05-08 |
Family
ID=62051897
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710999045.8A Pending CN108009450A (en) | 2017-10-23 | 2017-10-23 | The method, apparatus and terminal of terminal anti-theft |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108009450A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111259463A (en) * | 2020-01-08 | 2020-06-09 | Oppo(重庆)智能科技有限公司 | Anti-theft protection method and apparatus, electronic device, computer readable storage medium |
CN111698368A (en) * | 2020-06-12 | 2020-09-22 | 北京字节跳动网络技术有限公司 | Terminal control method and device, terminal and storage medium |
CN112417410A (en) * | 2020-11-16 | 2021-02-26 | 珠海格力电器股份有限公司 | Operation method and device of intelligent terminal, storage medium and electronic device |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103905626A (en) * | 2012-12-28 | 2014-07-02 | 联芯科技有限公司 | Mobile terminal and anti-theft operation method thereof |
CN105450841A (en) * | 2014-09-25 | 2016-03-30 | 小米科技有限责任公司 | Method and device of terminal guard against theft |
-
2017
- 2017-10-23 CN CN201710999045.8A patent/CN108009450A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103905626A (en) * | 2012-12-28 | 2014-07-02 | 联芯科技有限公司 | Mobile terminal and anti-theft operation method thereof |
CN105450841A (en) * | 2014-09-25 | 2016-03-30 | 小米科技有限责任公司 | Method and device of terminal guard against theft |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111259463A (en) * | 2020-01-08 | 2020-06-09 | Oppo(重庆)智能科技有限公司 | Anti-theft protection method and apparatus, electronic device, computer readable storage medium |
CN111259463B (en) * | 2020-01-08 | 2022-09-09 | Oppo(重庆)智能科技有限公司 | Anti-theft protection method and apparatus, electronic device, computer readable storage medium |
CN111698368A (en) * | 2020-06-12 | 2020-09-22 | 北京字节跳动网络技术有限公司 | Terminal control method and device, terminal and storage medium |
CN112417410A (en) * | 2020-11-16 | 2021-02-26 | 珠海格力电器股份有限公司 | Operation method and device of intelligent terminal, storage medium and electronic device |
CN112417410B (en) * | 2020-11-16 | 2025-01-28 | 珠海格力电器股份有限公司 | Smart terminal operation method and device, storage medium, and electronic device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112115444B (en) | Unlocking method and electronic equipment | |
CN110651270B (en) | Data access method and device | |
CN113015161B (en) | Authentication method and its medium and electronic equipment | |
EP3941014A1 (en) | Digital key-based identity authentication method, terminal apparatus, and medium | |
US20070254697A1 (en) | Mobile Terminal Device | |
CN103838992A (en) | Fingerprint identifying method and terminal | |
CN104537291A (en) | Screen interface unlocking method and screen interface unlocking device | |
CN104700050A (en) | Mobile terminal safety positioning method and device | |
CN104780279A (en) | Mobile phone and method used for supporting stolen tracking and locating | |
CN105893823A (en) | Security protection method and device, and intelligent terminal | |
CN106875520A (en) | A kind of smart lock, electron key and intelligent lock system | |
CN108009450A (en) | The method, apparatus and terminal of terminal anti-theft | |
CN105262885B (en) | A kind of mobile terminal and its pintle hook lock theft preventing method with pintle hook lock anti-theft feature | |
CN110049490B (en) | Safety protection method and device for wearable equipment, wearable equipment and medium | |
CN105187640A (en) | Anti-theft method and system of mobile terminal | |
CN110706389A (en) | Wireless direct-connection access control system and method | |
CN113196236A (en) | Cross-device authentication method and electronic device | |
CN112598821A (en) | Intelligent lock and control method applied to intelligent lock | |
JP2013161261A (en) | Information processing terminal, authentication control method and authentication control program of the same | |
CN110310108B (en) | Novel self-destruction hardware wallet with dismantling machine | |
CN110310104B (en) | Self-destruction type hardware wallet | |
JP2013027249A (en) | Portable terminal, portable terminal charging system, portable terminal charging method, and program | |
CN102831340B (en) | The tripper of electronic equipment and unlock method thereof | |
CN112261632B (en) | Equipment unlocking method, equipment unlocking device, control system and computer readable medium | |
CN107026735A (en) | Method and managed devices that a kind of password is automatically entered |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180508 |
|
RJ01 | Rejection of invention patent application after publication |