Mobile terminal antitheft method and client

A technology of mobile terminals and anti-theft methods, applied in the field of Internet applications, can solve the problems of inability to prevent theft of mobile terminals, loss of user property, and inability to effectively curb theft crimes, etc.

Inactive Publication Date: 2014-04-02
BEIJING QIHOO TECH CO LTD +1
View PDF3 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The thief prevents the owner from retrieving the stolen mobile terminal by flashing the mobile terminal or pulling out the battery of the mobile terminal, but the owner cannot protect the mobile terminal after the terminal is stolen
When the thief trades the stolen terminal, the owner cannot retrieve the stolen terminal, resulting in property loss, and user information such as data stored in the mobile terminal is lost with the loss of the mobile terminal and even causes more inestimable losses
[0004] To sum up, after the mobile terminal is stolen in the prior art, the defect that the mobile terminal cannot continue to be protected from theft indirectly encourages the thief's theft behavior, cannot effectively curb the theft crime, and causes bad consequences such as property loss to the user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile terminal antitheft method and client
  • Mobile terminal antitheft method and client
  • Mobile terminal antitheft method and client

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0130] Figure 7 to Figure 9 It shows a processing flow chart of the mobile terminal anti-theft method according to a preferred embodiment of the present invention, which is used to support any of the above-mentioned mobile terminal anti-theft methods, and makes the above-mentioned mobile terminal anti-theft method clearer and easier to understand. It should be noted that, in order to explain this preferred embodiment more clearly and simply, in this preferred embodiment, the sender is set on the mobile phone of relatives and friends, and the mobile terminal is set on the stolen mobile phone.

[0131] Figure 7 It shows a processing flowchart of a mobile terminal anti-theft method using a short message anti-theft strategy according to a preferred embodiment of the present invention. Such as Figure 7 As shown, after the mobile phone is stolen, the preferred embodiment executes step S702 to send anti-theft text messages to the stolen mobile phone through the mobile phones of ...

Embodiment 2

[0191] Figure 13 to Figure 15 It shows a processing flow chart of the mobile terminal anti-theft method according to a preferred embodiment of the present invention, which is used to support any of the above-mentioned mobile terminal anti-theft methods, and makes the above-mentioned mobile terminal anti-theft method clearer and easier to understand.

[0192] Figure 13 It shows a processing flow chart of a mobile terminal anti-theft method using an account anti-theft policy according to a preferred embodiment of the present invention. see Figure 13 , the process includes at least step S1302 to step S1318.

[0193] Step S1302, log in to the activated account, and send an anti-theft instruction to the server through the activated account.

[0194] Step S1304, the server returns the processing result of the anti-theft command, prompting the activated account server to receive the anti-theft command. Wherein, the processing result returned by the server carries th...

Embodiment 3

[0239] Figure 16 and Figure 17 It shows a processing flow chart of the mobile terminal anti-theft method according to a preferred embodiment of the present invention, which is used to support any of the above-mentioned mobile terminal anti-theft methods, and makes the above-mentioned mobile terminal anti-theft method clearer and easier to understand. It should be noted that, in order to explain this preferred embodiment more simply and clearly, the mobile terminal is set as a mobile phone in this preferred embodiment.

[0240] Figure 16 A processing flowchart of a method for activating the anti-theft function of a mobile phone at the PC terminal side according to an embodiment of the present invention is shown. see Figure 16 , the process includes at least step S1602 to step S1616.

[0241] Step S1602, judging whether the connection between the PC terminal and the mobile phone has been established. If yes, execute step S1604; if no, the process ends.

[02...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a mobile terminal antitheft method and a client, wherein the method comprises the following steps that the identity information of a sending party is determined according to antitheft instructions from the sending party; antitheft strategies matched with the identity information of the sending party are started for analyzing the antitheft instructions, and antitheft commands correspond to the instructions are obtained; the operation corresponding to the antitheft commands is executed for realizing the antitheft effect on a mobile terminal. The method and the client provided by the embodiment of the invention have the beneficial effects that the effect of effectively realizing the antitheft operation on the mobile terminal after the mobile terminal which does not start the antitheft function is stolen can be reached, in addition, the stealing crime rate is reduced, and the property safety of users is protected.

Description

technical field [0001] The invention relates to the field of Internet applications, in particular to a mobile terminal anti-theft method and a client. Background technique [0002] With the rapid development of smart mobile terminals and networks, mobile terminals (including mobile phones, tablets and other devices) are playing an increasingly important role in people's lives, and have become an indispensable tool in people's work and life. Orientation "assistant". For the convenience of use, when people use the application of the mobile terminal, information such as various account information, private chat records, pictures and photos are usually directly stored in the mobile terminal. Therefore, if the mobile terminal is lost, it will not only bring property loss to the user, but more importantly, the private information stored in the mobile terminal by the user, such as financial information such as account number and password. If the private information is leaked, the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W8/24H04W8/26H04W12/02
Inventor 张炅轩镡云宇黄铮宋宛芸
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products