Anti-theft method and anti-theft system for mobile terminal, mobile terminal and anti-theft device

A technology of mobile terminals and anti-theft devices, applied in location-based services, advanced technologies, electrical components, etc., can solve problems such as single setting and inability to automatically set the working status of alarm devices, so as to save energy and ensure timeliness Effect

Active Publication Date: 2010-12-15
ZTE CORP
2 Cites 32 Cited by

AI-Extracted Technical Summary

Problems solved by technology

This method can realize the anti-theft of the mobile phone to a certain extent, but its setting is single, and the ...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Method used

[0071] The mobile terminal anti-theft method in this embodiment dynamically adjusts the anti-theft working state by detecting the area where the mobile terminal is located, and solves the problem of single anti-theft setting in the prior art. Moreover, the anti-theft function can be turned off in the safe area to save energy consumption; in the non-safe area, the timeliness of the anti-theft alarm can be guaranteed....
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Abstract

The invention relates to an anti-theft method for a mobile terminal. The method comprises the following steps of: acquiring current position information by using the mobile terminal; judging whether the safety level of the mobile terminal changes according to the current position information; when the safety level of the mobile terminal changes, setting the working state of an anti-theft device according to the changed safety level of the mobile terminal; and performing corresponding anti-theft operation according to the working state by using the anti-theft device. The invention also provides a corresponding anti-theft system for the mobile terminal, the mobile terminal and the anti-theft device. An anti-theft working state is adjusted dynamically by detecting the region where the mobile terminal is positioned so that the problem of single anti-theft setting in the prior art is solved. An anti-theft function can be closed in a safety region so as to save energy; and a non-safe region ensures in-time anti-theft alarming.

Application Domain

Technology Topic

Image

  • Anti-theft method and anti-theft system for mobile terminal, mobile terminal and anti-theft device
  • Anti-theft method and anti-theft system for mobile terminal, mobile terminal and anti-theft device
  • Anti-theft method and anti-theft system for mobile terminal, mobile terminal and anti-theft device

Examples

  • Experimental program(1)

Example Embodiment

[0048] The technical solution of the present invention will be further described below in conjunction with the drawings and specific embodiments of the specification.
[0049] The invention dynamically adjusts the anti-theft working state according to the different geographical areas, so that the mobile terminal and the anti-theft device communicate according to the anti-theft working state, and perform corresponding anti-theft operations.
[0050] figure 1 It is a schematic flow chart of an embodiment of the mobile terminal anti-theft method of the present invention.
[0051] The anti-theft method for a mobile terminal in this embodiment includes the following steps:
[0052] Step S10, the mobile terminal obtains current location information;
[0053] The current location information of the mobile terminal can be obtained through the mobile terminal to obtain the network side geographic location (that is, a large-scale regional location), and then the GPS navigation module is controlled to obtain real-time or timed acquisition. For example, the mobile terminal communicates with the network in real time and obtains the geographic location information on the network side. When the geographic location information on the network side is within a safe area, the GPS navigation module is turned off or the GPS geographic location information polling is performed for a long time to obtain the current Location information; when the geographic location on the network side is in a non-secure area, turn on the GPS navigation module and perform a short-term polling of GPS geographic location information. The polling time can be set according to specific conditions (for example, 5 minutes). This is not limited. In this way, the power consumption of the mobile terminal can be reduced.
[0054] Step S11: Determine whether the security level of the mobile terminal changes according to the current location information; when the security level of the mobile terminal changes, go to step S12; otherwise, return to step S10;
[0055] Step S11 is specifically:
[0056] Step A: Query a preset security level table to obtain a security level that matches the current location information of the mobile terminal;
[0057] Step B: Compare the security level matching the current location information of the mobile terminal with the current security level of the mobile terminal, and determine whether the security level of the mobile terminal has changed.
[0058] The preset security level table is preset and stored on the mobile terminal. The preset security level table includes multiple security levels, security areas corresponding to the security levels, and location information. For example, the preset security levels in this embodiment include:
[0059] 1. Security status-the security zone is 20-30 meters, and its location information can be set as the user's home location information. It should be noted here that the location information may be a range value, and any location within the range of the home location can determine that the mobile terminal is in a safe state. The following description of location information is the same. In this mode, you can turn off the anti-theft function or turn on the anti-theft function regularly (for example, every 30 minutes).
[0060] 2. Safer state-the safe area is 5-20 meters, and its location information can be set as the location information of the user's work unit. In this mode, the anti-theft function can be turned on regularly (for example, every 1 minute) and continue to work for a period of time (for example, 20-30 seconds).
[0061] 3. Dangerous state-the safe area is 0 to 5 meters, and its position information can be set to position information other than the above two states. In this mode, the anti-theft function continues to work.
[0062] The setting of the above-mentioned preset security level table can be set differently according to the needs of users, which is not limited here.
[0063] According to the current location information of the mobile terminal, the preset security level table is queried, and the security level matching the current location information can be obtained. For example, if the mobile terminal is located in the area of ​​the user's work unit, the matching security level is a relatively safe state. If the current working state of the mobile terminal is a safe state or a dangerous state, it is judged that the security level of the mobile terminal has changed; if the current working state of the mobile terminal is a safer state, it is judged that the security level of the mobile terminal has not changed.
[0064] Step S12: Set the working state of the anti-theft device according to the changed security level of the mobile terminal;
[0065] Step S13: The anti-theft device performs corresponding anti-theft operations according to its working state.
[0066] Reference figure 2 , Step S13 further includes:
[0067] Step S131: The anti-theft device sets the communication distance between the anti-theft device and the mobile terminal according to its working state, which is recorded as the normal communication distance;
[0068] The communication distance between the anti-theft device and the mobile terminal is the security zone in the preset security level table in step S11. For example, when the anti-theft working state is a relatively safe state, the communication distance between the anti-theft device and the mobile terminal is set to a safe area (5-20 meters), that is, the normal communication distance is 5-20 meters.
[0069] Step S132: When the communication distance between the anti-theft device and the mobile terminal is greater than or equal to the normal communication distance, an alarm is initiated.
[0070] Both the anti-theft device and the mobile terminal are equipped with a wireless communication module, such as Bluetooth. And the wireless communication module will start accordingly according to the anti-theft working status. For example, in a safer state, start once every certain period of time (for example, 1 minute). After the anti-theft device and the wireless communication module on the mobile terminal are both activated, the anti-theft device and the mobile terminal communicate with each other and automatically shut down after a period of time (for example, 20-30 seconds). When the wireless communication module is working, when the distance between the anti-theft device and the mobile terminal exceeds the normal communication distance, the anti-theft device and the mobile terminal cannot communicate normally, so an alarm is activated. The alarm device can be provided on the anti-theft device and/or the mobile terminal.
[0071] The mobile terminal anti-theft method of this embodiment dynamically adjusts the anti-theft working state by detecting the area where the mobile terminal is located, which solves the single problem of the anti-theft setting in the prior art. Moreover, the anti-theft function can be turned off in the safe area to save energy consumption; in the non-safe area, the timeliness of the anti-theft alarm can be ensured.
[0072] image 3 It is a schematic structural diagram of an embodiment of the mobile terminal anti-theft system of the present invention.
[0073] The anti-theft system for a mobile terminal in this embodiment includes a mobile terminal 100 and an anti-theft device 200. The mobile terminal 100 can set the working state of the anti-theft device 200 according to different areas where it is located, so that the anti-theft device 200 can perform corresponding anti-theft operations according to different working states.
[0074] Reference Figure 4 , The mobile terminal 100 specifically includes:
[0075] The location information obtaining module 11 is used to obtain current location information of the mobile terminal 100;
[0076] The security level judgment module 12 is used to judge the security level of the mobile terminal 100 according to the current location information;
[0077] The status setting module 13 is used to set the working status of the anti-theft device 200 according to the changed security level of the mobile terminal 100 when the security level of the mobile terminal 100 changes;
[0078] The position information acquiring module 11 is preferably a GPS navigation module. First, the mobile terminal is used to obtain the network-side geographic location (that is, a large-scale regional location), and then the GPS navigation module is controlled according to the network-side geographic location for real-time or timing acquisition. For example, the mobile terminal communicates with the network in real time, and obtains the geographic location information on the network side. When the geographic location information on the network side is within a safe area, the GPS navigation module is turned off or the long-term polling of the GPS geographic location information is performed to obtain Current location information; when the geographic location on the network side is a non-secure area, turn on the GPS navigation module and perform a short-term polling of GPS geographic location information. The polling time can be set according to specific conditions (for example, 5 minutes), There is no limitation here. In this way, the power consumption of the mobile terminal can be reduced.
[0079] Reference Figure 5 , The aforementioned security level judgment module 12 specifically includes:
[0080] The query unit 121 queries a preset security level table to obtain a security level matching the current location information of the mobile terminal 100;
[0081] The comparing unit 122 is configured to compare the security level matched with the current location information of the mobile terminal 100 and the current security level of the mobile terminal 100 to determine whether the security level of the mobile terminal 100 has changed.
[0082] The preset security level table is preset and stored in the mobile terminal 100. The preset security level table includes multiple security levels, corresponding security areas and location information.
[0083] According to the current location information of the mobile terminal 100, the preset security level table is queried, and the security level matching the current location information can be obtained. For example, if the mobile terminal 100 is located in the area of ​​the user's work unit, the matching security level is a relatively safe state. If the current working state of the mobile terminal 100 is a safe state or a dangerous state, it is judged that the security level of the mobile terminal 100 has changed; if the current working state of the mobile terminal 100 is a safer state, it is judged that the security level of the mobile terminal 100 has not changed .
[0084] Reference Image 6 , The anti-theft device 200 specifically includes:
[0085] The communication distance setting module 21 is used to set the communication distance between the anti-theft device 200 and the mobile terminal 100 according to the working state of the anti-theft device 200, which is recorded as the normal communication distance;
[0086] The processing module 22 is configured to initiate an alarm when the distance between the anti-theft device 200 and the mobile terminal 100 is greater than or equal to the normal communication distance.
[0087] According to the working state of the anti-theft, the communication distance setting module 21 sets the communication distance between the anti-theft device 200 and the mobile terminal 100 as a security zone in the preset security level table. For example, when the working state of the anti-theft device is a relatively safe state, the communication distance between the anti-theft device 200 and the mobile terminal 100 is set to a safe area (5-20 meters), that is, the normal communication distance is 5-20 meters.
[0088] Both the anti-theft device 200 and the mobile terminal 100 are provided with a Bluetooth module. After the anti-theft device 200 and the Bluetooth module on the mobile terminal 100 are both activated, the anti-theft device 200 and the mobile terminal 100 communicate with each other. When the distance between the anti-theft device 200 and the mobile terminal 100 exceeds the normal communication distance, the anti-theft device 200 and the mobile terminal 100 cannot communicate normally, and an alarm is initiated.
[0089] It should be noted here that the status setting module 23 in the mobile terminal 100 can also set the working status on the mobile terminal 100. Therefore, the mobile terminal 100 can also perform a corresponding anti-theft operation according to the set working state, and its anti-theft operation is consistent with the anti-theft operation on the anti-theft device 200 and is performed simultaneously.
[0090] The mobile terminal anti-theft system of this embodiment dynamically adjusts the anti-theft working state by detecting the area where the mobile terminal is located, which solves the single problem of the prior art anti-theft setting. Moreover, the anti-theft function can be turned off in the safe area to save energy consumption; in the non-safe area, the timeliness of the anti-theft alarm can be ensured.
[0091] The above descriptions are only the preferred embodiments of the present invention and do not limit the scope of its patents. Any equivalent structure or equivalent process transformation made by using the content of the description and drawings of the present invention is directly or indirectly applied to other related technical fields. The same reason is included in the scope of patent protection of the present invention.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Similar technology patents

High grade non- oriented silicon steel and method for manufacturing same

ActiveCN101333620AReduce furnace roll nodulesReduce energy consumptionTemperature control deviceSheet steelElectrical steel
Owner:BAOSHAN IRON & STEEL CO LTD

Classification and recommendation of technical efficacy words

  • Reduce energy consumption
  • Guaranteed timeliness

Preparation method of high-strength hydrogel

InactiveCN103739861AThe preparation process takes a short timeReduce energy consumptionPolymer chemistryDouble network
Owner:HENAN POLYTECHNIC UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products