Anti-theft method and device for intelligent terminal
A technology of an intelligent terminal and an anti-theft method, applied in the field of communication, can solve problems such as user loss and leakage of user sensitive information, and achieve the effect of avoiding losses and improving the anti-theft effect.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0024] as shown in the picture 1 As shown, it is a schematic flow chart of the smart terminal anti-theft method in the embodiment of the present invention picture , the method includes the following steps:
[0025] Step 101: When the smart terminal detects a trigger event, it obtains the user's operation record of its own function; the trigger event includes power-on or a specified time.
[0026] Wherein, the designated time may be a periodic time, for example, it is designated to trigger every interval (such as half an hour, 1 hour, 6 hours, etc.) from time A, and step 101 is executed periodically.
[0027] Wherein, in one embodiment, the operation record may include operation logs: for example, the enabled application, the operation performed in the application, and of course, the operation time may also include the operation time, the location track of the smart terminal, and the like.
[0028] Step 102: Judging whether the degree of matching between the acquired operat...
Embodiment 2
[0078] Here, taking a smart phone as an example, the smart terminal anti-theft method provided by the embodiment of the present invention is described. as shown in the picture 2 As shown, the method includes the following steps:
[0079] Step 201: When the smart phone detects a trigger event, obtain the user's operation records on its own functions; the trigger event includes power-on or a specified time.
[0080] Step 202: Determine whether the matching degree between the acquired operation records and the pre-stored operating habits of the owner is greater than the preset matching degree, if not, execute step 203; if yes, return to step 201.
[0081] Step 203: Disable the preset function, if yes, end the operation.
[0082] Step 204: output the pre-stored disabling release question, and request to input the answer.
[0083] Step 205: Receive the input answer, and judge whether the answer is the same as the pre-stored answer, if they are the same, go to step 206, if not, ...
Embodiment 3
[0087] Based on the same inventive concept, an embodiment of the present invention also provides an anti-theft device for an intelligent terminal, as shown in the picture 3 As shown, the device includes:
[0088] The first operation record acquisition module 301 is configured to acquire the user's operation records on its own functions;
[0089] Matching degree judging module 302, for judging whether the matching degree of the acquired operation records and the pre-stored owner's operating habits is greater than the preset matching degree;
[0090] The disabling module 303 is configured to disable the preset function if the judging result of the matching degree judging module is no.
[0091] Among them, in one embodiment, the owner's operating habits include at least one of the following:
[0092] Contacts in the phone address book whose number of calls exceeds the first preset number of times within the first preset time period, applications whose startup times exceed the s...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 