A mobile phone anti-theft method and device
An anti-theft method and technology for anti-theft devices, which are applied in computer security devices, location-based services, telephone communication, etc., can solve problems such as loss of mobile phones and leakage of private files, and achieve the effect of improving security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0021] figure 1 It is a flow chart of the mobile phone anti-theft method provided by Embodiment 1 of the present invention. This embodiment is applicable to the situation where the private information in the smart phone is remotely deleted when the smart phone is lost or stolen, and the lost or stolen mobile phone is required to be in the network In connection state, the method can be executed by a mobile phone anti-theft device configured in a smart phone, and the program in the mobile phone anti-theft device is a resident memory program.
[0022] Such as figure 1 As shown, the mobile phone anti-theft method described in this embodiment includes:
[0023] S101. Monitor an instruction sent to the smart phone through the data network.
[0024] It should be noted that, in this embodiment, the program for executing the command monitoring operation is required to be a resident memory program, which does not need to be manually opened by the user to achieve the purpose of real-ti...
Embodiment 2
[0031] On the basis of Embodiment 1, this embodiment requires the mobile phone to have a GPS positioning device, figure 2 It is the flow chart of the mobile phone anti-theft method described in Embodiment 2 of the present invention, as figure 2 As shown, the mobile phone anti-theft method described in this embodiment includes:
[0032] Step S201, monitoring the instruction sent to the smart phone through the data network.
[0033] Step S202, listening to a preset privacy protection instruction for deleting private information sent by the network terminal bound to the smart phone.
[0034] Step S203, delete the corresponding private information in the smart phone according to the preset privacy protection instruction.
[0035] Step S204, controlling the global positioning system GPS positioning device of the smart phone to acquire GPS information determined for the current position.
[0036] The GPS navigation system is a radio navigation and positioning system that provid...
Embodiment 3
[0042] image 3 It is the flow chart of the mobile phone anti-theft method described in Embodiment 3 of the present invention, as image 3 As shown, the mobile phone anti-theft method described in this embodiment includes:
[0043] Step S301, monitoring the instruction sent to the smart phone through the data network.
[0044] Step S302 , judging whether a preset privacy protection instruction for deleting private information sent by other smart phones bound to the smart phone is detected, if so, execute step S303 , otherwise return to step S301 .
[0045] Step S303. Delete the corresponding private information in the smart phone according to the preset privacy protection instruction.
[0046]Step S304, judging whether the card replacement instruction sent by the other smart phone is detected, if so, execute step S305, otherwise return to step S301.
[0047] Step S305 , sending a preset privacy protection instruction for deleting the private information of the other smart p...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


