Anti-theft method, mobile terminal and computer readable storage medium

A technology of mobile terminal and anti-theft method, which is applied in the protection of internal/peripheral computer components, telephone communication, digital data authentication, etc., and can solve the problems of increased difficulty in retrieving mobile terminals and failing to detect theft of mobile terminals in time.

Inactive Publication Date: 2018-01-26
VIVO MOBILE COMM CO LTD
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides an anti-theft method, a mobile terminal and a computer-readable storage medium to solve the probl...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-theft method, mobile terminal and computer readable storage medium
  • Anti-theft method, mobile terminal and computer readable storage medium
  • Anti-theft method, mobile terminal and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] refer to figure 1 , which shows a flow chart of the anti-theft method in Embodiment 1 of the present invention, which may specifically include the following steps:

[0029] In step 101, if the mobile terminal detects a power-off command in the screen-locked state, it prompts to input verification information.

[0030] In the embodiment of the present invention, in order to protect privacy information, the user usually sets unlock verification information for the mobile terminal. After the mobile terminal is locked, the mobile terminal will unlock the screen only if the correct unlock verification information is input, and then the user can unlock the mobile terminal. Perform other operations on the mobile terminal interface. However, because criminals will directly shut down the mobile terminal after stealing it, and any remedial measures after shutting down will be useless, therefore, the mobile terminal must be guaranteed to be turned off in the screen unlocked state...

Embodiment 2

[0042] refer to figure 2 , which shows a flow chart of the anti-theft method in Embodiment 2 of the present invention, which may specifically include the following steps:

[0043] In step 201, if the mobile terminal detects a power-off command in the screen-locked state, it prompts to input verification information.

[0044] This step is similar to the implementation process of step 101 above, and will not be described in detail here.

[0045] For example, when the mobile terminal detects a power-off instruction in a locked screen state, a prompt window may be displayed to prompt the user to input verification information required for unlocking.

[0046] Step 202, determine the current target location of the mobile terminal.

[0047] In the embodiment of the present invention, when the mobile terminal detects a power-off instruction in a locked screen state, the current target location of the mobile terminal is available.

[0048] For example, the mobile terminal may deter...

Embodiment 3

[0096] refer to image 3 , which shows a structural block diagram of a mobile terminal 300 according to Embodiment 3 of the present invention, which may specifically include:

[0097] A prompting module 301, configured to prompt input of verification information if the mobile terminal detects a power-off command in a screen-locked state;

[0098] A determining module 302, configured to determine the current target location of the mobile terminal, and acquire input unlock verification information;

[0099] A matching module 303, configured to match the target location with at least one preset area, and match the unlock verification information with preset verification information;

[0100] The anti-theft module 304 is configured to output anti-theft information if the target location does not match the at least one preset area, and the unlock verification information does not match the preset verification information.

[0101] optional, see Figure 4 , the anti-theft module ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an anti-theft method, a mobile terminal and a computer readable storage medium, and relates to the technical field of the mobile terminal. The method comprises the following steps: reminding to input verification information if the mobile terminal detects a turn-off instruction under a screen-locking state; determining a target location located by the mobile terminal at present, and acquiring the input unlocking verification information; matching the target location with at least one preset region, and matching the unlocking verification information with the preset verification information; if the target location is unmatched with at least one preset region, and the unlocking verification information is unmatched with the preset verification information, outputting the anti-theft information. After the mobile terminal detects the turn-off instruction in the screen-locking state, the anti-theft information can be output without needing the user to perceive the stolen event if the current location is unmatched with the preset region and the unlocking verification information is entered incorrectly, thereby immediately reminding a user, and the possibility of taking back the mobile terminal is improved.

Description

technical field [0001] The present invention relates to the technical field of mobile terminals, in particular to an anti-theft method, a mobile terminal and a computer-readable storage medium. Background technique [0002] With the rapid development of science and technology, mobile terminals such as mobile phones and tablet computers have gradually become an indispensable part of people's lives. Revolutionary impact. However, driven by interests, the theft of mobile terminals occurs frequently, and users not only suffer property losses, but also face the risk of data information leakage. [0003] Usually, the user can only perceive the theft of the mobile terminal by virtue of his own vigilance, but when the user is distracted, he often cannot perceive the theft of the mobile terminal. In this way, after the user discovers that the mobile terminal has been stolen, criminals will have enough time to decipher the unlocking verification information of the mobile terminal. A...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04M1/725G06F21/88G06F21/31H04M1/72463
Inventor 侯洪磊
Owner VIVO MOBILE COMM CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products