Movatterモバイル変換


[0]ホーム

URL:


CN104023133B - Anti-theft method and device for mobile terminal - Google Patents

Anti-theft method and device for mobile terminal
Download PDF

Info

Publication number
CN104023133B
CN104023133BCN201410222925.0ACN201410222925ACN104023133BCN 104023133 BCN104023133 BCN 104023133BCN 201410222925 ACN201410222925 ACN 201410222925ACN 104023133 BCN104023133 BCN 104023133B
Authority
CN
China
Prior art keywords
information
current
mobile terminal
theft
checking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410222925.0A
Other languages
Chinese (zh)
Other versions
CN104023133A (en
Inventor
张月玥
张舵
罗亚峰
陈勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Kingsoft Internet Security Software Co Ltd
Original Assignee
Beijing Kingsoft Internet Security Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Kingsoft Internet Security Software Co LtdfiledCriticalBeijing Kingsoft Internet Security Software Co Ltd
Priority to CN201410222925.0ApriorityCriticalpatent/CN104023133B/en
Publication of CN104023133ApublicationCriticalpatent/CN104023133A/en
Application grantedgrantedCritical
Publication of CN104023133BpublicationCriticalpatent/CN104023133B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Landscapes

Abstract

The invention provides an anti-theft method and device for a mobile terminal. Wherein, the method comprises the following steps: storing password information and verification information, wherein the verification information comprises one or more of fingerprint information, sound information and face information; obtaining a current password input by a user, comparing the current password with stored password information, if the current password and the stored password information are not consistent, entering a first-level anti-theft mode, executing a first-level locking operation, and obtaining current verification information; and correspondingly comparing the current verification information with the verification information, entering anti-theft modes of different levels according to the comparison result, and executing locking operations of different levels. According to the anti-theft method and device for the mobile terminal, the mobile terminal is protected comprehensively, meanwhile, anti-theft modes of different levels are provided for the mobile terminal, the anti-theft modes of the mobile terminal are enriched, a legal user who cannot use the mobile terminal due to misoperation can use part of functions of the mobile terminal, and user experience is improved.

Description

The theft preventing method and device of mobile terminal
Technical field
The present invention relates to mobile device technology field, more particularly to a kind of theft preventing method of mobile terminal.
Background technology
Continued to develop with mobile communication technology, mobile terminal such as smart mobile phone is because of its small volume, portableFeature, it has also become the indispensable instrument of people's daily life, existing mobile terminal such as smart mobile phone is no longer letterSingle means of communication for making a phone call and sending short messages, has progressively been evolved into the platform for the treatment of and storage personal information, userThe activities such as social class, financial class can be carried out by mobile terminal, for example, user can carry out online payment by smart mobile phone,Transfer accounts on the net.
In order to personal information is not utilized or usurped by other people in ensureing mobile terminal.Current user can be by the side of passwordFormula is protected to mobile terminal, i.e., user when using or activating mobile terminal, it is necessary to input password, it is only defeated in userEnter password it is correct in the case of, user just can use mobile terminal, if Password Input mistake exceed preset times such as 3Secondary, mobile terminal will be fully latched, and user will be unable to use mobile terminal.
However, the problem for protecting mobile terminal presence above by the mode of password is, if the legal use of mobile terminalFamily is the owner of mobile terminal, because imprudence inputs password 3 times by mistake or in the state of mobile terminal does not have screen locking, false touch screenAnd causing code error 3 times, mobile terminal will be locked completely, and the validated user of mobile terminal also will be unable to using mobile wholeEnd, is made troubles to validated user using mobile terminal.
The content of the invention
It is contemplated that at least solving one of technical problem in correlation technique to a certain extent.Therefore, of the inventionOne purpose is the theft preventing method and device for proposing a kind of mobile terminal, and the method and device can be moved eventually in full protectionWhile end, the anti-theft modes of different stage are provided for mobile terminal, enrich the anti-theft modes of mobile terminal, and cause becauseMaloperation and cannot using mobile terminal validated user can using mobile terminal partial function, improve the body of userTest.
Embodiment proposes a kind of theft preventing method of mobile terminal according to a first aspect of the present invention, including:Preserve message in cipherBreath and checking information, the checking information include one or more in finger print information, acoustic information and facial information;UsedThe current password of family input, and the current password and the encrypted message for preserving are compared, if the two is inconsistent,Into one-level anti-theft modes, one-level lock operation is performed, and obtain current authentication information;And by the current authentication information andThe checking information correspondence is compared, and enters the anti-theft modes of different stage according to comparison result, performs different stageLock operation.
The theft preventing method of the mobile terminal of the embodiment of the present invention, obtain user input current password, by current password withThe encrypted message of preservation is compared, and when comparing inconsistent, into one-level anti-theft modes, performs one-level lock operation, andCurrent authentication information is obtained, and current authentication information and the checking information for preserving are compared, and entered according to comparison resultEnter the anti-theft modes of different stage, perform the lock operation of different stage, thus, while full protection mobile terminal, beMobile terminal provides the anti-theft modes of different stage, enriches the anti-theft modes of mobile terminal, and cause because of maloperationThe experience of user cannot can be improve using the validated user of mobile terminal using the partial function of mobile terminal.
Second aspect present invention embodiment proposes a kind of anti-theft device of mobile terminal, including:Preserving module, for protectingEncrypted message and checking information are deposited, the checking information includes the one kind or many in finger print information, acoustic information and facial informationKind;Module, the current password for obtaining user input are obtained, and the current password and the encrypted message for preserving are enteredRow is compared, if the two is inconsistent, into one-level anti-theft modes, performs one-level lock operation, and obtain current authentication information;WithAnd processing module, for comparing the current authentication information is corresponding with the checking information, and entered according to comparison resultEnter the anti-theft modes of different stage, perform the lock operation of different stage.
The anti-theft device of the mobile terminal of the embodiment of the present invention, encrypted message and checking information are preserved by preserving module,By obtain module obtain user input current password, by current password with preservation encrypted message compare, and thanTo it is inconsistent when, into one-level anti-theft modes, perform one-level lock operation, and obtain current authentication information, and by treatmentModule compares current authentication information and the checking information for preserving, and enters the antitheft mould of different stage according to comparison resultFormula, performs the lock operation of different stage, thus, while full protection mobile terminal, for mobile terminal provides differenceThe anti-theft modes of rank, enrich the anti-theft modes of mobile terminal, and cause that because of maloperation mobile terminal cannot be usedValidated user can improve the experience of user using the partial function of mobile terminal.
Third aspect present invention embodiment proposes a kind of mobile terminal, and the mobile terminal includes housing, processor, storageDevice, circuit board and power circuit, wherein, the circuit board is placed in the interior volume that the housing is surrounded, the processor andThe memory is arranged on the circuit board;The power circuit, for each circuit or device for the mobile terminalPower supply;The memory is used to store executable program code;The processor by read store in the memory canConfiguration processor code runs program corresponding with the executable program code, for performing following steps:Preserve passwordInformation and checking information, the checking information include one or more in finger print information, acoustic information and facial information;ObtainThe current password of user input, and the current password and the encrypted message for preserving are compared, if the two is inconsistent,Then enter one-level anti-theft modes, perform one-level lock operation, and obtain current authentication information;And by the current authentication informationIt is corresponding with the checking information to compare, and according to comparison result into the anti-theft modes of different stage, perform different stageLock operation.
The mobile terminal of the embodiment of the present invention, obtains the current password of user input, by current password and the password for preservingInformation is compared, and when comparing inconsistent, into one-level anti-theft modes, performs one-level lock operation, and acquisition is currently testedCard information, and current authentication information and the checking information for preserving are compared, and different stage is entered according to comparison resultAnti-theft modes, perform different stage lock operation, be that mobile terminal is carried while full protection mobile terminal thusThe anti-theft modes of different stage are supplied, the anti-theft modes of mobile terminal have been enriched, and has caused that because of maloperation shifting cannot be usedThe validated user of dynamic terminal can improve the experience of user using the partial function of mobile terminal.
The additional aspect of the present invention and advantage will be set forth in part in the description, and will partly become from the following descriptionObtain substantially, or recognized by practice of the invention.
Brief description of the drawings
The above-mentioned and/or additional aspect of the present invention and advantage will become from the following description of the accompanying drawings of embodimentsSubstantially and be readily appreciated that, wherein,
Fig. 1 is the flow chart of the theft preventing method of mobile terminal according to an embodiment of the invention;
Fig. 2 is the flow chart of the theft preventing method of mobile terminal in accordance with another embodiment of the present invention;
Fig. 3 is the flow chart of the theft preventing method of the mobile terminal according to another embodiment of the invention;And
Fig. 4 is the structural representation of the anti-theft device of mobile terminal according to an embodiment of the invention.
Specific embodiment
Embodiments of the invention are described below in detail, the example of the embodiment is shown in the drawings, wherein from start to finishSame or similar label represents same or similar element or the element with same or like function.Below with reference to attachedIt is exemplary to scheme the embodiment of description, it is intended to for explaining the present invention, and be not considered as limiting the invention.
Any process described otherwise above or method description in flow chart or herein is construed as, and expression includesIt is one or more for realizing specific logical function or process the step of the module of code of executable instruction, fragment or portionPoint, and the scope of the preferred embodiment of the present invention includes other realization, wherein can not press shown or discussion suitableSequence, including function involved by basis by it is basic simultaneously in the way of or in the opposite order, carry out perform function, this should be of the inventionEmbodiment person of ordinary skill in the field understood.
Below with reference to the accompanying drawings the theft preventing method and device of mobile terminal according to embodiments of the present invention described.
Fig. 1 is the flow chart of the theft preventing method of mobile terminal according to an embodiment of the invention.
As shown in figure 1, the theft preventing method of mobile terminal includes:
S101, preserves encrypted message and checking information.
Wherein, above-mentioned checking information can include but is not limited in finger print information, acoustic information and facial informationPlant or various.
In this embodiment, before above-mentioned checking information is preserved, can also include:Collection user profile, extracts userThe feature of information, generates checking information, and user profile includes the one kind or many in finger print information, acoustic information and facial informationKind.
Specifically, when the user profile of collection is acoustic information, can be by calling the sound pick-up outfit of mobile terminal, collectionSound of the user in Preset Time such as 10 minutes, and sound to collecting carries out feature extraction to obtain the sound of userFeature, wherein, Preset Time can be acquiescence in mobile terminal system, can also be user according to different demands in movementSet in terminal system.
When the user profile of collection is finger print information, user can be obtained by calling the fingerprint input device of mobile terminalFingerprint, and the fingerprint characteristic that feature extraction obtains user is carried out to the fingerprint of user.
When the user profile of collection is facial information, the camera in mobile terminal is opened, gather face's figure of userAs information, and feature extraction is carried out to facial image information, obtain the face feature of user.
S102, obtains the current password of user input, and current password and the encrypted message for preserving are compared, if twoPerson is inconsistent, then into one-level anti-theft modes, perform one-level lock operation, and obtain current authentication information.
Specifically, anti-theft modes can be divided into three-level, and every grade of anti-theft modes are controlled by different checking informations, and are performedThe lock operation of different stage, wherein:
One-level anti-theft modes can perform one-level lock operation by encrypted message control, that is, lock sensitive data, wherein, it is quickSense data can include but be limited to the private data of user and transaction payment data.
Two stage anti-theft pattern can be performed secondary latch and operated surely by finger print information control, that is, lock sensitive data, be movedThe current location information of terminal, and the current location information of mobile terminal is sent the mobile phone of the contact person pre-set to userIn.
Three-level anti-theft modes can be controlled by acoustic information and/face information, perform three-level lock operation, that is, lock all numbersAccording to, and send current sound information and/or current facial information to contact person.
In this embodiment, before the current password of user input is obtained, can also include:Determine the knowledge of encrypted messageOrder is not prior to checking information;And when checking information includes at least two information, determine the recognition sequence of checking information.
For example, encrypted message, finger print information, acoustic information and face information are saved in mobile terminal, then according to firstSecondary recognition code information, second identification finger print information, third time identification recognizes the identification of acoustic information and face information simultaneouslyOrder is identified, and enters the anti-theft modes of different stage according to recognition result.
Again for example, saving encrypted message and face information in mobile terminal, then according to face information after first encrypted messageRecognition sequence be identified, and according to recognition result enter different stage anti-theft modes.
When checking information includes at least two information, then current authentication information is obtained according to recognition sequence.For example, mobileFinger print information and acoustic information are included in the checking information of terminal, then according to first acquisition current finger print information, current sound of reentryingThe recognition sequence of message breath obtains current authentication information.
It should be noted that because acoustic information and/facial information can control three-level anti-theft modes, therefore, soundInformation and facial information have identical recognition sequence.
S103, compares current authentication information is corresponding with checking information, and enter different stage according to comparison resultAnti-theft modes, perform different stage lock operation.
In this embodiment, when checking information include finger print information when, then will obtain current finger print information and preserveFinger print information is compared, if the two is consistent, into one-level anti-theft modes, performs one-level lock operation, if the two is inconsistent,Then enter two stage anti-theft pattern, perform secondary latch and operate surely.
In this embodiment, when checking information include facial information when, then will obtain current facial information and preserveFacial information is compared, if the two is consistent, into two stage anti-theft pattern, is performed secondary latch and is operated surely, if the two is inconsistent,Then enter three-level anti-theft modes, perform three-level lock operation.
When checking information includes acoustic information, then the current sound information of acquisition and the acoustic information for preserving are comparedIt is right, if the two is consistent, into two stage anti-theft pattern, performs secondary latch and operate surely, it is antitheft into three-level if the two is inconsistentPattern, performs three-level lock operation.
In addition, when acoustic information and facial information is included in checking information, then obtaining current sound information and current facePortion's information, and by current sound information and current facial information and the acoustic information for preserving and face is corresponding compares, ifUnanimously, then into two stage anti-theft pattern, perform secondary latch and operate surely, if there are a pair of information inconsistent, into the antitheft mould of three-levelFormula, performs three-level lock operation.
The theft preventing method embodiment of above-mentioned mobile terminal, obtains the current password of user input, by current password and preservationEncrypted message compare, and when comparing inconsistent, into one-level anti-theft modes, perform one-level lock operation, and obtainCurrent authentication information, and current authentication information and the checking information for preserving are compared, and entered not according to comparison resultThe anti-theft modes of same level, perform the lock operation of different stage, are movement while full protection mobile terminal thusTerminal provides the anti-theft modes of different stage, enriches the anti-theft modes of mobile terminal, and cause because maloperation cannotThe experience of user can be improve using the validated user of mobile terminal using the partial function of mobile terminal.
Fig. 2 is the flow chart of the theft preventing method of mobile terminal in accordance with another embodiment of the present invention, and the embodiment is testingComprising being specifically described as a example by finger print information, acoustic information and facial information in card information, as shown in Fig. 2 the mobile terminalTheft preventing method include:
S201, preserves encrypted message, finger print information, acoustic information and facial information.
Specifically, the encrypted message that user is set is obtained, and gathers the finger print information of mobile terminal validated user, sound letterBreath and facial information, and above-mentioned encrypted message, finger print information, acoustic information and facial information are preserved in the terminal.
S202, obtains the current password of user input, and current password and the encrypted message for preserving are compared, if twoPerson is inconsistent, then into one-level anti-theft modes, perform one-level lock operation, and obtain current authentication information.
Specifically, S202 can include S2021-S2025.
S2021, receives the current password of user input.
S2022, judges whether current password is correct, that is, the current password and the encrypted message for preserving for judging user input areIt is no consistent, if unanimously, performing S2023, S2024 is performed if inconsistent.
S2023, unlocks mobile terminal, normally uses mobile terminal.
S2024, judges whether the password number of times of user input exceedes preset times, and when preset times are not above,S2021 is performed, such as exceedes preset times, perform S2025.
Preset times can be acquiescence in mobile terminal system, can also be user according to different demands mobile wholeSet in end system.For example, preset times can be 3 times.
S2025, into one-level anti-theft modes, locks sensitive data, and obtain current authentication information i.e. current finger print information.
Specifically, the private data and transaction payment data of locking mobile terminal, it is to avoid mobile terminal user privacy letterBreath is compromised, and protects the safety of user privacy information in mobile terminal.
S203, by current finger print information with preserve finger print information it is corresponding compare, and according to comparison result entrance notThe anti-theft modes of same level, perform the lock operation of different stage.
Specifically, S203 can include S2031-S2034.
S2031, judges whether current finger print information is correct, that is, judge the current finger print information for obtaining with the fingerprint letter for preservingWhether breath is consistent, if unanimously, performing S2032, if inconsistent, performs S2033.
S2032, mobile terminal is operated under one-level anti-theft modes.
Specifically, when the finger print information of user input is correct, on the basis of sensitive data is locked, the conjunction of mobile terminalMethod user can not also influence the other functions of Consumer's Experience mobile terminal using the other functions of mobile terminal.Thus, can keep awayExempt from because of maloperation so that code error number of times exceed pre-determined number and caused by mobile terminal completely be locked, mobile terminal it is legalUser cannot use the generation of mobile terminal.
S2033, into two stage anti-theft pattern, performs secondary latch and operates surely, and obtain current sound information and current faceInformation.
Specifically, sensitive data is locked, and by alignment system such as global position system GPS (GlobalPositioning System) obtain mobile terminal current location information, the current location information of mobile terminal is issued into useIn the mobile phone of the contact person that family pre-sets, mobile terminal is positioned.
S204, is compared current sound information and current facial information are corresponding with facial information with the acoustic information for preservingIt is right, and according to comparison result into the anti-theft modes of different stage, perform the lock operation of different stage.
Specifically, S204 can include S2041-S2044.
S2041, judges whether current sound information and current facial information are correct, that is, judge the current sound information for obtainingIt is whether consistent with the acoustic information and facial information for preserving with current facial information, if consistent, S2042 is performed, if there are a pairInformation is inconsistent, then perform S2043.
S2042, mobile terminal is operated under two stage anti-theft pattern.
Specifically, in the current sound information and correct current facial information of user input, in locking sensitive data, obtainThe current location information of mobile terminal is obtained, and the current location information of mobile terminal is sent the contact person pre-set to userMobile phone in after, user can also using mobile terminal other functions, the other functions of Consumer's Experience mobile terminal are not influenceed.
S2043, into three-level anti-theft modes, performs three-level lock operation, and to contact person send current sound information andCurrent facial information.
Specifically, all data in locking mobile terminal, i.e. mobile terminal is locked completely, and user cannot use movementAny function of terminal, and the current sound information and current facial information of operation mobile terminal user, connection are sent to contact personBe people receive send current sound information and current facial information, and it is determined that be mobile terminal validated user after, can lead toTransmission operational order is crossed to be unlocked the mobile terminal being locked.
If it should be appreciated that when finger print information, acoustic information/facial information of the checking information comprising user, movement is eventuallyIt is similar to Fig. 2 processes that end carries out antitheft process, does not repeat herein.
The theft preventing method of above-mentioned mobile terminal, the encrypted message of mobile terminal, acoustic information and facial information are corresponded to respectivelyThe anti-theft modes for one-level, two grades and three-level anti-theft modes, and different stage perform different lock operations, in comprehensive guarantorWhile shield mobile terminal, the anti-theft modes of different stage are provided for mobile terminal, enrich the anti-theft modes of mobile terminal,And allow to be used because of erroneous input Password Operations the validated user of mobile terminal using the part work(of mobile terminalCan, improve the experience of user.
Fig. 3 is the flow chart of the theft preventing method of the mobile terminal according to another embodiment of the invention, and the embodiment is testingIt is specifically described as a example by the facial information comprising user in card information, as shown in figure 3, the theft preventing method bag of the mobile terminalInclude:
S301, preserves the facial information of encrypted message and user.
S302, obtains the current password of user input, and current password and the encrypted message for preserving are compared, if twoPerson is inconsistent, then into one-level anti-theft modes, perform one-level lock operation, and obtain current authentication information.
Specifically, S302 can include S3021-S3025.
S3021, receives the current password of user input.
S3022, judges whether current password is correct, that is, the current password and the encrypted message for preserving for judging user input areIt is no consistent, if unanimously, performing S3023, S3024 is performed if inconsistent.
S3023, unlocks mobile terminal, normally uses mobile terminal.
S3024, judges whether the password number of times of user input exceedes preset times, and when preset times are not above,S3021 is performed, such as exceedes preset times, perform S3025.
Wherein, preset times can be acquiescence in mobile terminal system, can also be that user exists according to different demandsSet in mobile terminal system, for example, preset times can be with 3 times.
S3025, into one-level anti-theft modes, locks sensitive data, and obtain the i.e. current facial information of current authentication information.
Specifically, the private data and transaction payment data of locking mobile terminal, it is to avoid the privacy of mobile terminal userInformation is compromised, and protects the safety of user privacy information in mobile terminal.
S303, by current facial information with preserve facial information it is corresponding compare, and according to comparison result entrance notThe anti-theft modes of same level, perform the lock operation of different stage.
Specifically, S303 can include S3031-S3034.
S3031, judges whether current facial information is correct, that is, judge the current facial information for obtaining with the face's letter for preservingWhether breath is consistent, if unanimously, performing S3032, if inconsistent, performs S3033.
S3032, mobile terminal is operated under one-level anti-theft modes.
Specifically, when the current facial information of user input is correct, on the basis of sensitive data is locked, mobile terminalValidated user can also using mobile terminal other functions, the other functions of Consumer's Experience mobile terminal are not influenceed.Thus,Can avoid because of maloperation so that code error number of times exceed pre-determined number and caused by mobile terminal completely be locked, mobile terminalValidated user cannot use the generation of mobile terminal.
S3033, into three-level anti-theft modes, performs three-level lock operation, and send current facial information to contact person.
Specifically, all data in locking mobile terminal, i.e. mobile terminal is locked completely, and user cannot use movementAny function of terminal, and the operation current facial information of mobile terminal user is sent to contact person, contact person receives working as transmissionPreceding facial information, and it is determined that be mobile terminal validated user after, can by send operational order to be locked mobile endEnd is unlocked.
The theft preventing method of above-mentioned mobile terminal, preserves encrypted message and facial information in the terminal, wherein, message in cipherBreath and facial information correspond to one-level and three-level anti-theft modes respectively, and anti-theft modes are performed in sequence, can omnibearing protectionWhile mobile terminal, the anti-theft modes of different stage are provided for mobile terminal, enrich the anti-theft modes of mobile terminal, andAnd allow to be used because of erroneous input Password Operations the validated user of mobile terminal using the partial function of mobile terminal,Improve the experience of user.
In order to realize above-described embodiment, the present invention also proposes a kind of anti-theft device of mobile terminal.
Fig. 4 is the structural representation of the anti-theft device of mobile terminal according to an embodiment of the invention.
As shown in figure 4, the anti-theft device of mobile terminal includes:Preserving module 41, acquisition module 42 and processing module 43, itsIn:
Preserving module 41 is used to preserve encrypted message and checking information, and above-mentioned checking information includes that finger print information, sound are believedOne or more in breath and facial information;Obtaining module 42 is used to obtain the current password of user input, and will be above-mentioned currentPassword and the above-mentioned encrypted message for preserving are compared, if the two is inconsistent, into one-level anti-theft modes, perform one-level lockingOperation, and obtain current authentication information;And processing module 43 is used for above-mentioned current authentication information and above-mentioned checking information pairShould compare, and enter the anti-theft modes of different stage according to comparison result, perform the lock operation of different stage.
When one-level anti-theft modes are entered, it is locking sensitive data that above-mentioned acquisition module 42 performs one-level lock operation, byThis, the safety of individual privacy information in protection mobile terminal.
Above-mentioned checking information can include but is not limited to the one kind or many in finger print information, acoustic information and facial informationKind.
Specifically, anti-theft modes can be divided into three-level, and every grade of anti-theft modes are controlled by different checking informations, and are performedThe lock operation of different stage, wherein:
One-level anti-theft modes can perform one-level lock operation by encrypted message control, that is, lock sensitive data, wherein, it is quickSense data can include but be limited to the private data of user and transaction payment data.
Two stage anti-theft pattern can be performed secondary latch and operated surely by finger print information control, that is, lock sensitive data, be movedThe current location information of terminal, and the current location information of mobile terminal is sent the mobile phone of the contact person pre-set to userIn.
Three-level anti-theft modes can be controlled by acoustic information and/or face information, perform three-level lock operation, that is, lock allData, and send current sound information and/or current facial information to contact person.
In addition, said apparatus can also include acquisition module 44, acquisition module 44 is used to be preserved in above-mentioned preserving module 41Before checking information, user profile is gathered, extract the feature of above-mentioned user profile, generate above-mentioned checking information, above-mentioned user's letterBreath includes one or more in finger print information, acoustic information and facial information.
Specifically, when above-mentioned user profile be acoustic information when, above-mentioned acquisition module 44 specifically for:The collection scheduled timeAcoustic information in section;When above-mentioned user profile be facial information when, above-mentioned acquisition module 44 specifically for:Open camera,The above-mentioned facial information of typing.
When above-mentioned user profile is finger print information, above-mentioned acquisition module 44 can also be by fingerprint collecting unit (in figure notShow) typing finger print information.
In addition, said apparatus can also include determining module 45, determining module 45 is used to be obtained in above-mentioned acquisition module 42Before the current password of user input, determine the recognition sequence of above-mentioned encrypted message prior to above-mentioned checking information;And when above-mentionedWhen checking information includes at least two information, the recognition sequence of above-mentioned checking information is determined.
Specifically, acquisition module 44 can gather corresponding checking information according to the selection of user, if user's selection fingerprint, used as checking information, acquisition module 44 will gather the finger print information harmony message of mobile terminal validated user for information and acoustic informationBreath, and the checking information collected by encrypted message and acquisition module 44 that preserving module 42 preserves user's setting.PreservingAfter module 42 preserves encrypted message and checking information, determining module 45 is determined according to the first recognition code information, second identificationFinger print information, the recognition sequence of third time identification acoustic information is identified.
In addition, acoustic information and/facial information can control three-level anti-theft modes, therefore, when above-mentioned checking information alsoComprising tut information and/or during facial information, tut information and facial information have identical recognition sequence.
After the order that determining module 45 determines identification, obtaining module 42 will be identified in sequence, and believe in checkingWhen including at least two information in breath, above-mentioned current authentication information is obtained according to above-mentioned recognition sequence.For example, checking information is includedFinger print information and acoustic information, then obtain module 42 according to first acquisition current finger print information, the knowledge of current sound information of reentryingOrder does not obtain current authentication information.
When above-mentioned checking information include above-mentioned finger print information when, above-mentioned processing module 43 specifically for:It is current by what is obtainedFinger print information and the above-mentioned finger print information for preserving are compared, if the two is consistent, into above-mentioned one-level anti-theft modes, perform oneLevel lock operation, if the two is inconsistent, into two stage anti-theft pattern, performs secondary latch and operates surely.
When above-mentioned checking information include above-mentioned facial information when, above-mentioned processing module 43 specifically for:It is current by what is obtainedFacial information and the above-mentioned facial information for preserving are compared, if the two is consistent, into above-mentioned one-level anti-theft modes, perform oneLevel lock operation, if the two is inconsistent, into three-level anti-theft modes, performs three-level lock operation.
When two stage anti-theft pattern is entered, the locking sensitive data of above-mentioned processing module 43 obtains working as above-mentioned mobile terminalFront position information, and send above-mentioned current location information to contact person.
In addition, above-mentioned processing module 43 is additionally operable to:Current sound information and/or current facial information are obtained, and will be currentAcoustic information and/or current facial information and the tut information for preserving and face is corresponding compares, if unanimously, enteringEnter above-mentioned two stage anti-theft pattern, perform secondary latch and operate surely, if there are a pair of information inconsistent, into three-level anti-theft modes, holdRow three-level lock operation.
When three-level anti-theft modes are entered, processing module 43 locks all data, and sends current sound letter to contact personBreath and/or current facial information.
After the validated user that contact person determines that active user is mobile terminal, operational order is sent to mobile terminal, movedDynamic terminal receives operational order, and according to instruction unblock mobile terminal.
Anti-theft device including preserving module, the mobile terminal for obtaining module, processing module, acquisition module and determining moduleAntitheft detailed process is carried out reference can be made to Fig. 1, Fig. 2 and Fig. 3, do not repeat herein.
The anti-theft device embodiment of above-mentioned mobile terminal, encrypted message and checking information are preserved by preserving module, are passed throughThe current password that module obtains user input is obtained, current password is compared with the encrypted message for preserving, and compared notWhen consistent, into one-level anti-theft modes, one-level lock operation is performed, and obtain current authentication information, and by processing moduleCurrent authentication information and the checking information for preserving are compared, and enter the anti-theft modes of different stage according to comparison result,The lock operation of different stage is performed, thus, while full protection mobile terminal, for mobile terminal provides different stageAnti-theft modes, enrich the anti-theft modes of mobile terminal, and cause that because of maloperation the legal of mobile terminal cannot be usedUser can improve the experience of user using the partial function of mobile terminal.
In order to realize above-described embodiment, the present invention also proposes a kind of mobile terminal, and the mobile terminal includes housing, treatmentDevice, memory, circuit board and power circuit, wherein, foregoing circuit plate is placed in the interior volume that above-mentioned housing is surrounded, above-mentioned placeReason device and above-mentioned memory are arranged on foregoing circuit plate;Above-mentioned power circuit, for each circuit for above-mentioned mobile terminalOr device is powered;Above-mentioned memory is used to store executable program code;Above-mentioned processor deposit in above-mentioned memory by being readThe executable program code of storage runs program corresponding with above-mentioned executable program code, for performing following steps:
S101 ', preserves encrypted message and checking information.
Wherein, above-mentioned checking information can include but is not limited in finger print information, acoustic information and facial informationPlant or various.
In this embodiment, before above-mentioned checking information is preserved, can also include:Collection user profile, extracts userThe feature of information, generates checking information, and user profile includes the one kind or many in finger print information, acoustic information and facial informationKind.
Specifically, when the user profile of collection is acoustic information, can be by calling the sound pick-up outfit of mobile terminal, collectionSound of the user in Preset Time such as 10 minutes, and sound to collecting carries out feature extraction to obtain the sound of userFeature, wherein, Preset Time can be acquiescence in mobile terminal system, can also be user according to different demands in movementSet in terminal system.
When the user profile of collection is finger print information, user can be obtained by calling the fingerprint input device of mobile terminalFingerprint, and the fingerprint characteristic that feature extraction obtains user is carried out to the fingerprint of user.
When the user profile of collection is facial information, the camera in mobile terminal is opened, gather face's figure of userAs information, and feature extraction is carried out to facial image information, obtain the face feature of user.
S102 ', obtains the current password of user input, and current password and the encrypted message for preserving are compared, ifThe two is inconsistent, then into one-level anti-theft modes, perform one-level lock operation, and obtain current authentication information.
Specifically, anti-theft modes can be divided into three-level, and every grade of anti-theft modes are controlled by different checking informations, and are performedThe lock operation of different stage, wherein:
One-level anti-theft modes can perform one-level lock operation by encrypted message control, that is, lock sensitive data, wherein, it is quickSense data can include but be limited to the private data of user and transaction payment data.
Two stage anti-theft pattern can be performed secondary latch and operated surely by finger print information control, that is, lock sensitive data, be movedThe current location information of terminal, and the current location information of mobile terminal is sent the mobile phone of the contact person pre-set to userIn.
Three-level anti-theft modes can be controlled by acoustic information and/face information, perform three-level lock operation, that is, lock all numbersAccording to, and send current sound information and/or current facial information to contact person.
In this embodiment, before the current password of user input is obtained, can also include:Determine the knowledge of encrypted messageOrder is not prior to checking information;And when checking information includes at least two information, determine the recognition sequence of checking information.
For example, encrypted message, finger print information, acoustic information and face information are saved in mobile terminal, then according to firstSecondary recognition code information, second identification finger print information, third time identification recognizes the identification of acoustic information and face information simultaneouslyOrder is identified, and enters the anti-theft modes of different stage according to recognition result.
Again for example, saving encrypted message and face information in mobile terminal, then according to face information after first encrypted messageRecognition sequence be identified, and according to recognition result enter different stage anti-theft modes.
When checking information includes at least two information, then current authentication information is obtained according to recognition sequence.For example, mobileFinger print information and acoustic information are included in the checking information of terminal, then according to first acquisition current finger print information, current sound of reentryingThe recognition sequence of message breath obtains current authentication information.
It should be noted that because acoustic information and/facial information can control three-level anti-theft modes, therefore, soundInformation and facial information have identical recognition sequence.
S103 ', compares current authentication information is corresponding with checking information, and enter different stage according to comparison resultAnti-theft modes, perform different stage lock operation.
In this embodiment, when checking information include finger print information when, then will obtain current finger print information and preserveFinger print information is compared, if the two is consistent, into one-level anti-theft modes, performs one-level lock operation, if the two is inconsistent,Then enter two stage anti-theft pattern, perform secondary latch and operate surely.
In this embodiment, when checking information include facial information when, then will obtain current facial information and preserveFacial information is compared, if the two is consistent, into two stage anti-theft pattern, is performed secondary latch and is operated surely, if the two is inconsistent,Then enter three-level anti-theft modes, perform three-level lock operation.
When checking information includes acoustic information, then the current sound information of acquisition and the acoustic information for preserving are comparedIt is right, if the two is consistent, into two stage anti-theft pattern, performs secondary latch and operate surely, it is antitheft into three-level if the two is inconsistentPattern, performs three-level lock operation.
In addition, when acoustic information and facial information is included in checking information, then obtaining current sound information and current facePortion's information, and by current sound information and current facial information and the acoustic information for preserving and face is corresponding compares, ifUnanimously, then into two stage anti-theft pattern, perform secondary latch and operate surely, if there are a pair of information inconsistent, into the antitheft mould of three-levelFormula, performs three-level lock operation.
Above-mentioned mobile terminal embodiment, obtains the current password of user input, by current password and the encrypted message for preservingCompare, and when comparing inconsistent, into one-level anti-theft modes, perform one-level lock operation, and obtain current authentication letterBreath, and current authentication information and the checking information for preserving are compared, and the anti-of different stage is entered according to comparison resultRobber's pattern, performs the lock operation of different stage, thus, while full protection mobile terminal, for mobile terminal is providedThe anti-theft modes of different stage, enrich the anti-theft modes of mobile terminal, and cause because maloperation cannot be using mobile wholeThe validated user at end can improve the experience of user using the partial function of mobile terminal.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically showThe description of example " or " some examples " etc. means to combine specific features, structure, material or spy that the embodiment or example are describedPoint is contained at least one embodiment of the invention or example.In this manual, to the schematic representation of above-mentioned term notIdentical embodiment or example must be directed to.And, the specific features of description, structure, material or feature can be with officeCombined in an appropriate manner in one or more embodiments or example.Additionally, in the case of not conflicting, the skill of this areaArt personnel can be tied the feature of the different embodiments or example described in this specification and different embodiments or exampleClose and combine.
Additionally, term " first ", " second " are only used for describing purpose, and it is not intended that indicating or implying relative importanceOr the implicit quantity for indicating indicated technical characteristic.Thus, define " first ", the feature of " second " can express orImplicitly include at least one this feature.In the description of the invention, " multiple " is meant that at least two, such as two, threeIt is individual etc., unless otherwise expressly limited specifically.
Any process described otherwise above or method description in flow chart or herein is construed as, and expression includesIt is one or more for realizing specific logical function or process the step of the module of code of executable instruction, fragment or portionPoint, and the scope of the preferred embodiment of the present invention includes other realization, wherein can not press shown or discussion suitableSequence, including function involved by basis by it is basic simultaneously in the way of or in the opposite order, carry out perform function, this should be of the inventionEmbodiment person of ordinary skill in the field understood.
Represent in flow charts or logic and/or step described otherwise above herein, for example, being considered useIn the order list of the executable instruction for realizing logic function, in may be embodied in any computer-readable medium, forInstruction execution system, device or equipment (such as computer based system, including the system of processor or other can be held from instructionThe system of row system, device or equipment instruction fetch and execute instruction) use, or with reference to these instruction execution systems, device or setIt is standby and use.For the purpose of this specification, " computer-readable medium " can any can be included, store, communicate, propagate or passThe dress that defeated program is used for instruction execution system, device or equipment or with reference to these instruction execution systems, device or equipmentPut.The more specifically example (non-exhaustive list) of computer-readable medium includes following:With the electricity that one or more are connected upConnecting portion (electronic installation), portable computer diskette box (magnetic device), random access memory (RAM), read-only storage(ROM), erasable edit read-only storage (EPROM or flash memory), fiber device, and portable optic disk is read-only depositsReservoir (CDROM).In addition, computer-readable medium can even is that the paper that can thereon print described program or other are suitableMedium, because optical scanner for example can be carried out by paper or other media, then enters edlin, interpretation or if necessary with itHis suitable method is processed electronically to obtain described program, is then stored in computer storage.
It should be appreciated that each several part of the invention can be realized with hardware, software, firmware or combinations thereof.Above-mentionedIn implementation method, the software that multiple steps or method can in memory and by suitable instruction execution system be performed with storageOr firmware is realized.If for example, realized with hardware, and in another embodiment, can be with well known in the artAny one of row technology or their combination are realized:With the logic gates for realizing logic function to data-signalDiscrete logic, the application specific integrated circuit with suitable combinational logic gate circuit, programmable gate array (PGA), sceneProgrammable gate array (FPGA) etc..
Those skilled in the art are appreciated that to realize all or part of step that above-described embodiment method is carriedThe rapid hardware that can be by program to instruct correlation is completed, and described program can be stored in a kind of computer-readable storage mediumIn matter, the program upon execution, including one or a combination set of the step of embodiment of the method.
Additionally, during each functional unit in each embodiment of the invention can be integrated in a processing module, it is also possible toIt is that unit is individually physically present, it is also possible to which two or more units are integrated in a module.Above-mentioned integrated mouldBlock can both be realized in the form of hardware, it would however also be possible to employ the form of software function module is realized.The integrated module is such asFruit is to realize in the form of software function module and as independent production marketing or when using, it is also possible to which storage is in a computerIn read/write memory medium.
Storage medium mentioned above can be read-only storage, disk or CD etc..Although having been shown above and retouchingEmbodiments of the invention are stated, it is to be understood that above-described embodiment is exemplary, it is impossible to be interpreted as to limit of the inventionSystem, one of ordinary skill in the art can be changed to above-described embodiment, change, replace and become within the scope of the inventionType.

Claims (20)

CN201410222925.0A2014-05-232014-05-23Anti-theft method and device for mobile terminalActiveCN104023133B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201410222925.0ACN104023133B (en)2014-05-232014-05-23Anti-theft method and device for mobile terminal

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201410222925.0ACN104023133B (en)2014-05-232014-05-23Anti-theft method and device for mobile terminal

Publications (2)

Publication NumberPublication Date
CN104023133A CN104023133A (en)2014-09-03
CN104023133Btrue CN104023133B (en)2017-05-24

Family

ID=51439695

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201410222925.0AActiveCN104023133B (en)2014-05-232014-05-23Anti-theft method and device for mobile terminal

Country Status (1)

CountryLink
CN (1)CN104023133B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN104331668B (en)*2014-09-282018-05-18小米科技有限责任公司Bad password reminding method and device
CN105046127A (en)*2015-05-262015-11-11小米科技有限责任公司Encryption and decryption implementation method and device
CN106407870A (en)*2015-07-282017-02-15宇龙计算机通信科技(深圳)有限公司Fingerprint identification method and user equipment
CN105306691A (en)*2015-09-252016-02-03维沃移动通信有限公司Personal information protection method and terminal
CN105243346B (en)*2015-11-162018-01-19广东欧珀移动通信有限公司A kind of mobile terminal and its theft preventing method with anti-theft feature
CN105491236A (en)*2015-12-022016-04-13小米科技有限责任公司Terminal unlocking method and device
CN106101382A (en)*2016-05-302016-11-09努比亚技术有限公司A kind of terminal lookup method and terminal
CN106469284A (en)*2016-08-192017-03-01广东欧珀移动通信有限公司 An information processing method, device and mobile terminal
CN106453874B (en)*2016-09-292020-01-03李信Mobile phone control method and system
CN106778154A (en)*2016-11-152017-05-31深圳天珑无线科技有限公司Mobile terminal and its unlocking method

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN101626417A (en)*2008-07-082010-01-13鸿富锦精密工业(深圳)有限公司Method for mobile terminal authentication
CN101719955B (en)*2009-11-262013-01-02中山大学深圳研究院Intelligent terminal system with fingerprint identification and information processing method
CN103051809A (en)*2013-01-052013-04-17深圳市中兴移动通信有限公司Mobile terminal and file security method and device thereof
CN103235909B (en)*2013-04-252016-08-03广东欧珀移动通信有限公司A kind of reset the method for password, device and mobile device
CN103488924B (en)*2013-09-262017-03-08小米科技有限责任公司A kind of unlocking processing method of terminal, device and equipment

Also Published As

Publication numberPublication date
CN104023133A (en)2014-09-03

Similar Documents

PublicationPublication DateTitle
CN104023133B (en)Anti-theft method and device for mobile terminal
US9805364B2 (en)ID authentication
CN108615150A (en)Vehicle related information processing method and processing device based on block chain
CN103714280B (en)A kind of authority control method and electronic equipment
JPS5911950B2 (en) personal identification system
KR20110087178A (en) USB security device and authentication method with secure user authentication means
US20160246954A1 (en)Security card having fingerprint authentication, processing system and processing method therefor
CN108257290A (en)Cash box security control method, dynamic puzzle-lock and backstage cash box monitoring system
CN107134074A (en)Storing collaborative share method, storing equipment and computer-readable recording medium
CN108320154A (en)Digital wallet asset protection method and device, electronic equipment and storage medium
CN104346550B (en)A kind of information processing method and a kind of electronic equipment
CN106713370A (en)Identity authentication method, server and mobile terminal
CN108510290A (en)Customer information amending method, device, computer equipment and storage medium in call
CN107918911A (en)System and method for performing safe web bank transaction
CN109074583A (en) Biometric data registration system and settlement system
CN107369234A (en)A kind of method for unlocking and system
CN112711771A (en)Vehicle information protection method and device
CN106599843A (en)Fingerprint authentication method and device
CN105069361A (en)Safety access method and system for privacy space
US20070266240A1 (en)Processing device constituting an authentication system, authentication system, and the operation method thereof
CN105631291B (en)A kind of fingerprint authentication method and electronic equipment
CN112202793A (en)Method, device, equipment and medium for logging in mobile phone bank through fingerprint
Boateng et al.A fraud prevention and secure cognitive sim card registration model
Fedotova et al.Increase of economic security of internet systems of credit organizations
CN1987924A (en)System and method for more safety and convenient of bank account

Legal Events

DateCodeTitleDescription
C06Publication
PB01Publication
C10Entry into substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp