Anti-theft protection method for mobile terminal

A mobile terminal and screen technology, applied in the direction of digital data protection, internal/peripheral computer component protection, etc., can solve the problem of insufficient protection security and achieve good anti-theft protection effect

Active Publication Date: 2013-04-03
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF3 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In view of the above problems, the purpose of the present invention is to provide a mobile terminal anti-theft protection method and device, aiming to solve the problem that the existing mobile terminal anti-theft protection schemes are all anti-theft protection by executing the application program after the mobile terminal is turned on, resulting in insufficient protection security high technical issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-theft protection method for mobile terminal
  • Anti-theft protection method for mobile terminal
  • Anti-theft protection method for mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0018] figure 1 The flow of the anti-theft protection method for a mobile terminal provided by the first embodiment of the present invention is shown, and only the parts related to the embodiment of the present invention are shown for convenience of description.

[0019] The mobile terminal anti-theft protection method provided in this embodiment includes the following steps:

[0020] Step S101 , after receiving a power-on trigger instruction, perform a power-on operation.

[0021] In the embodiment of the present invention, as long as the judgment and verification of the user's operation action is completed during the boot process, the mobile terminal is unlocked when the requirements are met, and the mobile terminal operation interface is normally entered. Therefore, the user first needs to turn on the mobile terminal in the shutdown state. After the power switch on the mobile terminal is triggered, a start-up trigger command is generated, and the start-up process begins at...

Embodiment 2

[0025] figure 2 The flow of the mobile terminal anti-theft protection method provided by the embodiment of the present invention is shown, and only the parts related to the embodiment of the present invention are shown for convenience of description.

[0026] The mobile terminal anti-theft protection method provided in this embodiment includes the following steps:

[0027] Step S201, receiving and saving the power-on unlocking information set by the user;

[0028] Step S202, receiving and saving the monitoring time period information set by the user.

[0029] In this embodiment, the user can set the power-on unlocking information and monitoring period information by himself. Only when the preset unlocking operation is completed within the monitoring time period can the unlocking be completed and the system can be entered normally. For example, it can be set to 10 minutes after power-on within seconds. The power-on unlock information is the data information corresponding to...

Embodiment 3

[0038] image 3 The structure of the mobile terminal anti-theft protection device provided by the embodiment of the present invention is shown, and only the parts related to the embodiment of the present invention are shown for convenience of description.

[0039] The mobile terminal anti-theft protection device provided in this embodiment includes:

[0040] The power-on execution unit 301 is configured to perform a power-on operation after receiving a power-on trigger instruction;

[0041] The monitoring and judging execution unit 302 is used to monitor and judge whether the screen preset and / or the preset button of the mobile terminal is triggered during the boot process, and if it is judged to be yes, unlock the mobile terminal, otherwise lock the mobile terminal or directly shut down.

[0042]Each functional unit 301, 302 provided in this embodiment correspondingly realizes steps S101, S102 in the first embodiment. Specifically, the boot execution unit 301 executes the bo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is applicable to the technical field of mobile terminals and provides an anti-theft protection method and device for a mobile terminal. The method comprises the following steps of: executing a startup operation after a startup triggering instruction is received; and during startup, monitoring and judging whether a screen preset position and/or a preset key of the mobile terminal are/is triggered or not, unlocking the mobile terminal when the condition that the screen preset position and/or the preset key of the mobile terminal are/is triggered is judged, and locking the mobile terminal or directly shutting down if the screen preset position and/or the preset key of the mobile terminal are/is not triggered. According to the method and the device, a system is not accessed yet when the mobile terminal is locked, so that a touch screen and keys of the mobile terminal do not respond to any operation; and an unlocking operation for users is verified from a drive level, and illegal users who do not know the unlocking operation cannot enter a background of the system and search and kill processes, so that the mobile terminal can be effectively protected from being cracked, and then, a good anti-theft protection effect is reached.

Description

technical field [0001] The invention belongs to the field of mobile terminals, in particular to an anti-theft protection method for a mobile terminal. Background technique [0002] At present, many anti-theft protections for mobile terminals including mobile phones and PDAs are realized through application software after booting. For example, the screen unlock password can be set, and some anti-theft software can be used to track the SIM card, and the mobile terminal can be located in real time. The current location, but all these anti-theft protection schemes are implemented through application software after the mobile terminal is turned on, so this will leave a software cracking loophole for the criminals. After the mobile terminal is turned on, the anti-theft protection will be It only needs to close the process, such as killing the process of locking the screen and the protection application, then these protections will be invalid, so that the expected anti-theft protec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/88G06F21/62
Inventor 张强
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products