Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Intelligent antitheft method, terminal and system

An anti-theft method and intelligent technology, applied in the field of communication, can solve the problems of damage, low timely rate, single anti-theft method, etc., and achieve the effects of convenient use, improved timely rate of triggering, and various identification methods

Active Publication Date: 2010-05-12
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] There are two main anti-theft methods for existing mobile terminals. One method is that after the mobile terminal is stolen, the user actively finds out and locks the stolen mobile terminal by sending a short message to the stolen mobile terminal; The user pre-sets some passwords on the mobile terminal. Once the mobile terminal is stolen, the mobile terminal cannot be used normally because the correct password preset by the user cannot be entered, and the purpose of locking the terminal is achieved.
The above two anti-theft technologies have the disadvantage of delay. When the user finds that his mobile phone has been stolen, it may have been a considerable period of time since the mobile phone was stolen, which may cause important information or data in the mobile phone to be leaked or damaged, causing serious damage to the user. cause irreparable damage
[0003] In addition, the existing anti-theft mobile terminals sold in the market have a single anti-theft method, not only the timely rate of triggering is not high, it is easy to delay time, and the entire identification process is operated under the prompt of the user interface, which is easy for criminals to take advantage of. machine

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent antitheft method, terminal and system
  • Intelligent antitheft method, terminal and system
  • Intelligent antitheft method, terminal and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0025] An intelligent anti-theft method, comprising the following steps:

[0026] Storing the anti-theft feature parameters set by the user, the anti-theft feature parameters include at least two items;

[0027] Obtaining user information corresponding to one of the at least two anti-theft feature parameters;

[0028] Identifying whether the obtained user information matches the corresponding anti-theft characteristic parameters, and outputting identification information, if they match, continue to obtain and identify user information corresponding to other anti-theft characteristic parameters, otherwise, activate the anti-theft protection system.

[0029] see figure 1 , an intelligent anti-theft method, comprising:

[0030] Step S10, storing the anti-theft fea...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an intelligent antitheft method. The method comprises the following steps of: storing antitheft characteristic parameters set by a user, wherein the antitheft characteristic parameters at least comprise two items; acquiring user information corresponding to one of at least two antitheft characteristic parameters; and judging whether the acquired user information conforms to the corresponding antitheft characteristic parameter and inputting identifying information; if so, continuously acquiring and identifying the user formation corresponding other antitheft characteristic parameters; otherwise, starting an antitheft protection system. The invention also discloses an intelligent antitheft terminal and an intelligent antitheft system. By using the intelligent antitheft method, terminal and system, a mobile terminal can judge whether the mobile terminal is at a legally used state by identifying whether the acquired user information conforms to the antitheft characteristic parameters stored by user inputting, the identification method is diversified, and the antitheft identification process undergoes multiple judgment and analysis; and the timely triggering rate is improved, the intelligent antitheft terminal and system are conveniently used and safe and reliable.

Description

technical field [0001] The invention relates to the communication field, in particular to an intelligent anti-theft method, terminal and system. Background technique [0002] There are two main anti-theft methods for existing mobile terminals. One method is that after the mobile terminal is stolen, the user actively finds out and locks the stolen mobile terminal by sending a short message to the stolen mobile terminal; The user pre-sets some passwords on the mobile terminal. Once the mobile terminal is stolen, the mobile terminal cannot be used normally due to the inability to input the correct password preset by the user, and the purpose of locking the terminal is achieved. The above two anti-theft technologies have the disadvantage of delay. When the user finds that his mobile phone has been stolen, it may have been a considerable period of time since the mobile phone was stolen, which may cause important information or data in the mobile phone to be leaked or damaged, cau...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04M1/67H04M1/725H04M1/72448
Inventor 刘玉清
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products