Nothing Special   »   [go: up one dir, main page]

CN110086942B - Anti-theft method, device and equipment of intelligent terminal and storage medium - Google Patents

Anti-theft method, device and equipment of intelligent terminal and storage medium Download PDF

Info

Publication number
CN110086942B
CN110086942B CN201910394217.8A CN201910394217A CN110086942B CN 110086942 B CN110086942 B CN 110086942B CN 201910394217 A CN201910394217 A CN 201910394217A CN 110086942 B CN110086942 B CN 110086942B
Authority
CN
China
Prior art keywords
intelligent terminal
real
alarm
time clock
ring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910394217.8A
Other languages
Chinese (zh)
Other versions
CN110086942A (en
Inventor
张东伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wingtech Communication Co Ltd
Original Assignee
Wingtech Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wingtech Communication Co Ltd filed Critical Wingtech Communication Co Ltd
Priority to CN201910394217.8A priority Critical patent/CN110086942B/en
Publication of CN110086942A publication Critical patent/CN110086942A/en
Application granted granted Critical
Publication of CN110086942B publication Critical patent/CN110086942B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72454User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions

Landscapes

  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Environmental & Geological Engineering (AREA)
  • Burglar Alarm Systems (AREA)
  • Alarm Systems (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the invention discloses an anti-theft method, an anti-theft device, anti-theft equipment and a storage medium for an intelligent terminal. Wherein, the method comprises the following steps: if receiving an alarm activation request, determining the ringing period of the real-time clock; and controlling the real-time clock to continuously ring according to the ring period. By the technical scheme, an effective tracking means can be provided for the police and the victim, so that the occurrence of stealing the intelligent terminal is reduced.

Description

Anti-theft method, device and equipment of intelligent terminal and storage medium
Technical Field
The embodiment of the invention relates to the technical field of intelligent terminals, in particular to an anti-theft method, an anti-theft device, anti-theft equipment and a storage medium for an intelligent terminal.
Background
With the development of information technology, the wide application of intelligent terminals provides convenience for daily life of people. It follows that more and more user information is stored in the smart terminal. When an intelligent terminal such as a mobile phone is stolen, a person who steals the intelligent terminal may perform some illegal activities using user information. Therefore, the anti-theft function of the intelligent terminal is very important.
However, the existing intelligent terminal anti-theft method focuses on deleting data or providing positioning information, and cannot effectively cope with the ongoing robbery and theft, and cannot provide a very obvious clue to police and victims, especially in the scene of a large number of people and complex personnel components. Therefore, it is necessary to provide a new anti-theft method for the intelligent terminal.
Disclosure of Invention
The embodiment of the invention provides an anti-theft method, an anti-theft device, anti-theft equipment and a storage medium for an intelligent terminal, which can provide an effective tracking means for a police and a victim, so that the occurrence of the behavior of stealing the intelligent terminal is reduced.
In a first aspect, an embodiment of the present invention provides an anti-theft method for an intelligent terminal, where the method includes:
if receiving an alarm activation request, determining the ringing period of the real-time clock;
and controlling the real-time clock to continuously ring according to the ring period.
In a second aspect, an embodiment of the present invention provides an anti-theft device for an intelligent terminal, where the device includes:
the ringing period determining module is used for determining the ringing period of the real-time clock if receiving the alarm activating request;
and the control module is used for controlling the real-time clock to continuously ring according to the ring period.
In a third aspect, an embodiment of the present invention further provides an apparatus, where the apparatus includes:
one or more processors;
storage means for storing one or more programs;
when the one or more programs are executed by the one or more processors, the one or more processors are caused to implement the anti-theft method for the intelligent terminal according to any of the first aspects.
In a fourth aspect, an embodiment of the present invention further provides a storage medium, where a computer program is stored, and when the computer program is executed by a processor, the method for preventing theft of an intelligent terminal according to any of the first aspects is implemented.
According to the anti-theft method, the anti-theft device, the anti-theft equipment and the anti-theft storage medium for the intelligent terminal, provided by the embodiment of the invention, after a holder of the intelligent terminal determines that the intelligent terminal is stolen, an activation alarm request can be sent to the stolen intelligent terminal; the stolen intelligent terminal can determine the ringing period of the real-time clock after receiving the activation alarm request; and then controlling the real-time clock to continuously ring according to the ring period. According to the scheme, the state (namely the starting or shutdown state and the like) of the intelligent terminal does not need to be concerned, once the real-time clock is started, the ringing can be continuously performed according to the ringing period, so that the intelligent terminal cannot be in the complete shutdown state, a display and effective tracking and positioning mode is provided for a holder and a police, and the occurrence of the behavior of stealing the intelligent terminal is reduced.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
Fig. 1 is a flowchart of an anti-theft method for an intelligent terminal according to a first embodiment of the present invention;
fig. 2 is a flowchart of an anti-theft method for an intelligent terminal according to a second embodiment of the present invention;
fig. 3 is a flowchart of an anti-theft method for an intelligent terminal according to a third embodiment of the present invention;
fig. 4 is a block diagram illustrating an anti-theft device of an intelligent terminal according to a fourth embodiment of the present invention;
fig. 5 is a schematic structural diagram of an apparatus provided in the fifth embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting of the invention. It should be further noted that, for the convenience of description, only some of the structures related to the present invention are shown in the drawings, not all of the structures.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures. Meanwhile, in the description of the present invention, the terms "first", "second", and the like are used only for distinguishing the description, and are not to be construed as indicating or implying relative importance.
Example one
Fig. 1 is a flowchart of an anti-theft method for an intelligent terminal according to an embodiment of the present invention, which is applicable to how to provide effective tracking for police and victims in case of a theft event. The method is particularly suitable for dealing with the happening stealing events, and provides obvious clues for the police and the victims so as to carry out effective tracking scenes. The intelligent terminal can be a mobile phone, a smart watch or a tablet and the like. The method can be executed by the anti-theft device of the intelligent terminal in the embodiment of the invention, the device can be realized in a software and/or hardware mode, and the device can be configured on the intelligent terminal. As shown in fig. 1, the method specifically includes the following steps:
and S110, if the alarm activation request is received, determining the ringing period of the real-time clock.
In this embodiment, the alarm activation request is a trigger mechanism, which may be a trigger mechanism preset by a user and storing an alarm module on the intelligent terminal, or a trigger mechanism default for the alarm module on the intelligent terminal, or the like; the alarm module can be an instruction or a signal and the like and is used for activating the alarm module of the stolen intelligent terminal; the alarm activation request may specifically be a request for activating an alarm module on the intelligent terminal, which is sent to the intelligent terminal by means of other intelligent terminals in a bluetooth or network manner when the holder of the intelligent terminal determines that the intelligent terminal is stolen. Wherein the alarm module may comprise a real-time clock. The real-time clock is also called an alarm clock and is configured on the intelligent terminal; optionally, the real-time clock has a feature of continuously ringing according to a ringing period when the alarm module is not turned off once activated. That is, no matter whether the intelligent terminal is in a power-off state or not, the real-time clock can ring in a circulating manner according to a preset ring period as long as the real-time clock is activated. The ringing period is a preset time interval from the end of the last ringing to the start of the next ringing of the real-time clock, and may be, for example, 5 Min.
For example, on a subway with a large number of people, the mobile phone of the user A is stolen; after finding that the mobile phone of the user A is stolen, the user A can send an activation alarm request comprising a stolen mobile phone identifier to an alarm server in a network mode by means of other intelligent terminals such as an intelligent watch, a tablet or mobile phones of other people; and the alarm server determines the stolen mobile phone according to the mobile phone identification in the activation alarm request and forwards the activation alarm request to the stolen mobile phone. The sending of the activation alarm request including the stolen mobile phone identifier to the alarm server in a network mode specifically comprises the following steps: the method comprises the steps that account names and passwords of preset login alarm modules are used for entering a personal alarm module center of a webpage version, a mobile phone identifier which is bound in advance can be obtained from the personal alarm module center, an alarm button is clicked to pop up an activation alarm request generation interface, the mobile phone identifier is added to a set position, and after clicking and storing are carried out, an activation alarm request comprising a stolen mobile phone identifier is generated; an activation alarm request including the identity of the stolen handset may then be sent to an alarm server. The mobile phone identifier is an identifier for uniquely identifying the mobile phone, and can be a production serial number of the mobile phone, and the like. In addition, if the user A finds that the mobile phone is stolen in time, the user A can also directly send an activation alarm request to the stolen mobile phone in a Bluetooth communication mode by means of other intelligent terminals configured with Bluetooth, such as other mobile phones and the like.
When detecting that the alarm activation request is received, the stolen mobile phone may determine a ringing period of the real-time clock, and then control the real-time clock to perform a ringing operation, that is, perform step S120.
And S120, controlling the real-time clock to continuously ring according to the ring period.
Specifically, the alarm module is activated to control the real-time clock to be started and to control the real-time clock to continuously ring according to the ring period. For example, the ringing period is 5Min, the real-time clock starts ringing at the time of being turned on, and after the current ringing stops, the real-time clock enters a second ringing period after 5Min to start ringing; and controlling the real-time clock to continuously ring according to the ring period until the alarm module is closed.
Optionally, controlling the real-time clock to continuously ring according to the ring period may include: acquiring a current timestamp in real time, and updating the timing time according to the current timestamp and the ringing period; and controlling the real-time clock to ring according to the updated timing time.
In this embodiment, the current timestamp may be the time when the current ring of the real-time clock ends, such as 8: 10; the timed time refers to the time when the real time clock rings. For example, the ring period is 5Min, the current timestamp is 8: 10, the timing time will become 8: 15. optionally, the current timestamp and the timing time are updated according to the change of time, so that the real-time clock can continuously ring.
Specifically, after receiving the alarm activation request, the intelligent terminal may determine a ringing period of the real-time clock; then activating an alarm module to enable the real-time clock to start and ring, acquiring a current timestamp of the real-time clock when the ring is finished in real time, and updating the timing time according to the current timestamp and the ring period; the real-time clock is further controlled to ring according to the updated timing time, that is, the real-time clock is controlled to ring at 8: 15 ringing. And then, acquiring the current timestamp of the end of the ringing of the current real-time clock in real time, such as 8: and 16, updating the timing time according to the current timestamp and the ringing period, wherein the timing time is changed into 8: and 21, controlling the real-time clock to be in a state that 8: 21 ringing. The real-time clock can be controlled to ring continuously by repeating the operation, and the real-time clock can be closed only under the condition that the alarm module is closed, namely the real-time clock can not be interrupted by other people except the holder, so that an obvious and effective tracking and positioning mode is provided for the holder and the police.
In addition, it should be noted that in this embodiment, attention does not need to be paid to the state of the intelligent terminal (i.e., the power-on state or the power-off state), once the real-time clock is turned on, the real-time clock will continuously ring according to the ring period, so that the intelligent terminal cannot be in the complete power-off state.
For example, before the alarm module of the intelligent terminal is activated, that is, the real-time clock is turned on and rings, even if the intelligent terminal is turned off by a thief, the user can control the real-time clock of the alarm module on the intelligent terminal to be started by the alarm server in a network manner, once the real-time clock is turned on and rings, the intelligent terminal is awakened, and then the timing time is updated in real time, so that the real-time clock rings continuously. In addition, even if a thief forcibly closes the intelligent terminal when or after the real-time clock rings, the alarm module of the intelligent terminal cannot be closed, so that the real-time clock is always in a working state, and the thief can still ring after the next ring time arrives to wake up the intelligent terminal. That is, the real-time clock may cyclically execute operations of ringing and updating the timing time, so that the intelligent terminal cannot be completely powered off.
In addition, even if a person who steals the intelligent terminal pulls out the SIM card of the intelligent terminal and replaces the SIM card with a new SIM card, because the alarm module on the intelligent terminal is not changed, the holder of the intelligent terminal can still send an activation alarm request comprising the identity of the stolen intelligent terminal to the alarm server in a network mode, the alarm server determines the stolen intelligent terminal according to the intelligent terminal identity in the activation alarm request and forwards the activation alarm request to the stolen intelligent terminal; when detecting that the alarm activation request is received by the stolen intelligent terminal, the alarm activation method can determine the ringing period of the real-time clock firstly, and then control the real-time clock to perform ringing operation so as to provide an effective tracking means for retrieving the intelligent terminal. The intelligent terminal identifier is an identifier for uniquely identifying the intelligent terminal, and can be a production serial number of the intelligent terminal and the like.
According to the technical scheme provided by the embodiment of the invention, after a holder of the intelligent terminal determines that the intelligent terminal is stolen, the holder can send an activation alarm request to the stolen intelligent terminal; the stolen intelligent terminal can determine the ringing period of the real-time clock after receiving the activation alarm request; and then controlling the real-time clock to continuously ring according to the ring period. According to the scheme, the state (namely the starting or shutdown state and the like) of the intelligent terminal does not need to be concerned, once the real-time clock is started, the ringing can be continuously performed according to the ringing period, so that the intelligent terminal cannot be in the complete shutdown state, a display and effective tracking and positioning mode is provided for a holder and a police, and the occurrence of the behavior of stealing the intelligent terminal is reduced.
Example two
Fig. 2 is a flowchart of an anti-theft method for an intelligent terminal according to a second embodiment of the present invention, and this embodiment further explains controlling a real-time clock to continuously ring according to a ring period based on the above embodiment. As shown in fig. 2, the method specifically includes the following steps:
s210, if an alarm activation request is received, determining the ringing period of the real-time clock.
S220, in the process of controlling the real-time clock to continuously ring according to the ring period, if a forced shutdown event is detected, determining the next ring time according to the ring period.
In this embodiment, the forced shutdown event may be an event triggered by pressing a side key or a power key of the smart terminal, or may be an event triggered by pulling out an SIM card of the smart terminal. The next ring time refers to the time when the real-time clock rings next time. Alternatively, the next ringing time may be determined based on the ringing period and the time at which the forced shutdown event was detected. The time when the forced shutdown event is detected may be any time before the next ringing, such as the end time of the current ringing, the start time of the current ringing, any time in the process of the current ringing, or any time after the end of the current ringing.
For example, the ringing period is 5Min, and the time when the forced shutdown event is detected is the current ringing end time 8: 00, then the next ring time is 8: 05. optionally, the real time clock may be defaulted to last 2Min per ring. If the time of detecting the forced shutdown event is the ring starting time 8: 00, then the next ring time is 8: 07.
specifically, after receiving the alarm activation request, the intelligent terminal may determine a ringing period of the real-time clock; then activating an alarm module to enable the real-time clock to start and ring; in the process of controlling the real-time clock to continuously ring according to the ring period, if a forced shutdown event is detected, acquiring the current time, determining the next ring time according to the current time and the ring period, and simultaneously closing the intelligent terminal; and then controls the real-time clock to ring at the next ring time to perform step S230.
And S230, controlling the real-time clock to ring according to the next ring time.
Specifically, when the real-time clock reaches the next ringing time, the real-time clock rings, so that the intelligent terminal is awakened; and then updating the timing time in real time according to the ring period and the end time of the next ring or the starting time and the duration time of the next ring, so that the real-time clock continuously rings, that is, the real-time clock can circularly execute the operations of ring and updating the timing time, and the intelligent terminal cannot be in a complete shutdown state.
In addition, if a forced shutdown event is detected after the next ring, the operations in steps S220 to S230 are executed in a loop, that is, even if the terminal is powered off, once the ring time of the real-time clock is reached, the terminal can still be woken up, that is, the terminal cannot be completely powered off.
According to the technical scheme provided by the embodiment of the invention, after a holder of the intelligent terminal determines that the intelligent terminal is stolen, the holder can send an activation alarm request to the stolen intelligent terminal; the stolen intelligent terminal can determine the ringing period of the real-time clock after receiving the activation alarm request; then controlling the real-time clock to continuously ring according to the ring period, and determining the next ring time according to the ring period if a forced shutdown event is detected in the process of controlling the real-time clock to continuously ring according to the ring period; and controls the real-time clock to ring according to the next ring time. According to the scheme, once the real-time clock is started, even if the intelligent terminal is forcibly powered off, the ringing can be continuously performed according to the ringing period, so that the intelligent terminal cannot be in a complete shutdown state, a display and effective tracking and positioning mode is provided for a holder and an police, and the occurrence of the behavior of stealing the intelligent terminal is reduced.
EXAMPLE III
Fig. 3 is a flowchart of an anti-theft method for an intelligent terminal according to a third embodiment of the present invention, and the present embodiment is further optimized based on the foregoing embodiments. As shown in fig. 3, the method specifically includes the following steps:
s310, if an alarm activating request is received, determining the ringing period of the real-time clock.
And S320, controlling the real-time clock to continuously ring according to the ring period.
S330, if the alarm clock closing event is detected, displaying an unlocking password interface.
In this embodiment, the alarm clock turning-off event may be an event triggered by clicking to turn off a real-time clock, and the like. The unlocking password interface is an interface for a user to input an unlocking password so as to unlock the intelligent terminal. The unlocking password interface can be a default unlocking interface of the intelligent terminal. Optionally, the alarm clock turning-off event may be set in association with the unlocking password interface in advance.
Specifically, after the real-time clock is controlled to continuously ring according to the ring period, if an alarm clock closing event is detected, an unlocking password interface can be displayed so that a user can input an unlocking password.
S340, acquiring an unlocking password input by a user, and determining whether the intelligent terminal is unlocked according to the unlocking password; if not, go to step S350; if yes, go to step S360.
Specifically, after step S330 is executed, the intelligent terminal may obtain an unlocking password input by the user on the unlocking password interface, compare the obtained unlocking password with a pre-stored unlocking password, and unlock the intelligent terminal and simultaneously close the alarm module to stop the real-time clock from working if the obtained unlocking password is the same as the pre-stored unlocking password. If not, that is, the intelligent terminal is not unlocked and still in the screen locking state, at this time, the real-time clock may be controlled to continuously ring according to the ring period, that is, the operation of step S350 is performed. In this embodiment, the real-time clock cannot be interrupted by other people than the owner, and an obvious and effective tracking and positioning manner is provided for the owner and the police.
And S350, controlling the real-time clock to continuously ring according to the ring period.
In this embodiment, the operation of step S350 is the same as the operation of step S320, so that after it is determined that the intelligent terminal is not unlocked according to the unlocking password, the operation of step S320 may be returned to, and after the alarm clock turning-off event is detected again, the operations of steps S330 and S340 are executed; the operation may also be stopped after performing step S320.
And S360, controlling the real-time clock to be closed.
According to the technical scheme provided by the embodiment of the invention, after a holder of the intelligent terminal determines that the intelligent terminal is stolen, the holder can send an activation alarm request to the stolen intelligent terminal; the stolen intelligent terminal can determine the ringing period of the real-time clock after receiving the activation alarm request; then controlling the real-time clock to continuously ring according to the ring period, and providing an unlocking password interface for a user when an alarm clock closing event is detected so that the user can input an unlocking password, and closing the real-time clock after the intelligent terminal is unlocked according to the unlocking password input by the user; otherwise, the real-time clock is still controlled to continuously ring according to the ring period. According to the scheme, once the real-time clock is started, even if the real-time clock is required to be closed, after the intelligent terminal is determined not to be unlocked according to the unlocking password, the real-time clock continuously rings according to the ring period, namely, the real-time clock cannot be interrupted by other people except a holder, a display and effective tracking and positioning mode is provided for the holder and a police, and therefore the occurrence of the behavior of stealing the intelligent terminal is reduced.
Example four
Fig. 4 is a block diagram of an anti-theft device for an intelligent terminal according to a fourth embodiment of the present invention, where the device may be configured on an intelligent terminal, and may execute an anti-theft method for an intelligent terminal according to any embodiment of the present invention, and has functional modules and beneficial effects corresponding to the execution method. As shown in fig. 4, the apparatus may include:
a ringing period determining module 410, configured to determine a ringing period of the real-time clock if an alarm activation request is received;
and the control module 420 is configured to control the real-time clock to continuously ring according to the ring period.
According to the technical scheme provided by the embodiment of the invention, after a holder of the intelligent terminal determines that the intelligent terminal is stolen, the holder can send an activation alarm request to the stolen intelligent terminal; the stolen intelligent terminal can determine the ringing period of the real-time clock after receiving the activation alarm request; and then controlling the real-time clock to continuously ring according to the ring period. According to the scheme, the state (namely the starting or shutdown state and the like) of the intelligent terminal does not need to be concerned, once the real-time clock is started, the ringing can be continuously performed according to the ringing period, so that the intelligent terminal cannot be in the complete shutdown state, a display and effective tracking and positioning mode is provided for a holder and a police, and the occurrence of the behavior of stealing the intelligent terminal is reduced.
Illustratively, the control module 420 may be specifically configured to:
acquiring a current timestamp in real time, and updating the timing time according to the current timestamp and the ringing period;
and controlling the real-time clock to ring according to the updated timing time.
Illustratively, the control module 420 may be further specifically configured to:
if a forced shutdown event is detected, determining the next ringing time according to the ringing period;
and controlling the real-time clock to ring according to the next ring time.
Illustratively, the apparatus may further include:
the display module is used for displaying an unlocking password interface if an alarm clock closing event is detected after the real-time clock is controlled to continuously ring according to a ring period;
the unlocking determining module is used for acquiring an unlocking password input by a user and determining whether the intelligent terminal is unlocked according to the unlocking password;
the control module 420 may further be configured to control the real-time clock to continuously ring according to the ring period if the intelligent terminal is not unlocked.
For example, the control module 420 may be further configured to control the real-time clock to be turned off if the smart terminal is unlocked after determining whether the smart terminal is unlocked according to the unlocking password.
EXAMPLE five
Fig. 5 is a schematic structural diagram of an apparatus provided in the fifth embodiment of the present invention. Fig. 5 illustrates a block diagram of an exemplary device 12 suitable for use in implementing embodiments of the present invention. The device 12 shown in fig. 5 is only an example and should not bring any limitations to the functionality and scope of use of the embodiments of the present invention. Alternatively, the device 12 may typically be a smart terminal such as a cell phone, smart watch, or the like.
As shown in FIG. 5, device 12 is in the form of a general purpose computing device. The components of device 12 may include, but are not limited to: one or more processors or processing units 16, a system memory 28, and a bus 18 that couples various system components including the system memory 28 and the processing unit 16.
Bus 18 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. By way of example, such architectures include, but are not limited to, Industry Standard Architecture (ISA) bus, micro-channel architecture (MAC) bus, enhanced ISA bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus.
Device 12 typically includes a variety of computer system readable media. Such media may be any available media that is accessible by device 12 and includes both volatile and nonvolatile media, removable and non-removable media.
The system memory 28 may include computer system readable media in the form of volatile memory, such as Random Access Memory (RAM)30 and/or cache memory 32. Device 12 may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, storage system 34 may be used to read from and write to non-removable, nonvolatile magnetic media (not shown in FIG. 5, and commonly referred to as a "hard drive"). Although not shown in FIG. 5, a magnetic disk drive for reading from and writing to a removable, nonvolatile magnetic disk (e.g., a "floppy disk") and an optical disk drive for reading from or writing to a removable, nonvolatile optical disk (e.g., a CD-ROM, DVD-ROM, or other optical media) may be provided. In these cases, each drive may be connected to bus 18 by one or more data media interfaces. System memory 28 may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments of the invention.
A program/utility 40 having a set (at least one) of program modules 42 may be stored, for example, in system memory 28, such program modules 42 including, but not limited to, an operating system, one or more application programs, other program modules, and program data, each of which examples or some combination thereof may comprise an implementation of a network environment. Program modules 42 generally carry out the functions and/or methodologies of the described embodiments of the invention.
Device 12 may also communicate with one or more external devices 14 (e.g., keyboard, pointing device, display 24, etc.), with one or more devices that enable a user to interact with device 12, and/or with any devices (e.g., network card, modem, etc.) that enable device 12 to communicate with one or more other computing devices. Such communication may be through an input/output (I/O) interface 22. In the device 12 of the present embodiment, the display 24 is not provided as a separate body but is embedded in the mirror surface, and when the display surface of the display 24 is not displayed, the display surface of the display 24 and the mirror surface are visually integrated. Also, the device 12 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the Internet) via the network adapter 20. As shown, the network adapter 20 communicates with the other modules of the device 12 via the bus 18. It should be understood that although not shown in the figures, other hardware and/or software modules may be used in conjunction with device 12, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
The processing unit 16 executes various functional applications and data processing by executing programs stored in the system memory 28, for example, to implement the anti-theft method of the smart terminal provided by the embodiment of the present invention.
EXAMPLE six
The sixth embodiment of the present invention provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the anti-theft method for an intelligent terminal according to all the embodiments of the present invention.
Computer storage media for embodiments of the invention may employ any combination of one or more computer-readable media. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or terminal. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present invention and the technical principles employed. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present invention has been described in greater detail by the above embodiments, the present invention is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present invention, and the scope of the present invention is determined by the scope of the appended claims.

Claims (7)

1. An anti-theft method for an intelligent terminal is characterized by comprising the following steps:
if receiving an alarm activation request, activating a real-time clock of an alarm module, and determining a ringing period of the real-time clock; the work of the real-time clock is irrelevant to the shutdown state of the intelligent terminal;
the alarm activation request is specifically that an alarm request is sent to the intelligent terminal in a network mode by means of a second intelligent terminal, and the alarm request is used for activating an alarm module on the intelligent terminal;
the second intelligent terminal sends an alarm request to the intelligent terminal in a network mode, and the alarm request comprises the following steps: the second intelligent terminal sends an activation alarm request comprising the identification of the stolen intelligent terminal to the alarm server in a network mode; the alarm server determines a stolen intelligent terminal according to the intelligent terminal identification, and forwards the alarm activation request to the stolen intelligent terminal;
the method comprises the steps that a second intelligent terminal is used for sending an alarm request to the intelligent terminal in a network mode, the alarm request is not limited by an SIM card of the intelligent terminal, and the alarm request can be sent to the intelligent terminal even if the SIM card in the intelligent terminal is removed or replaced;
acquiring a current timestamp in real time, and updating the timing time according to the current timestamp and a ringing period;
controlling the real-time clock to ring according to the updated timing time;
if the alarm clock closing event is detected, displaying an unlocking password interface;
acquiring an unlocking password input by a user, and determining whether the intelligent terminal is unlocked according to the unlocking password;
if not, controlling the real-time clock to continuously ring according to the ring period.
2. The method of claim 1, wherein controlling the real-time clock to continue ringing according to the ringing period comprises:
in the process of controlling the real-time clock to continuously ring according to the ring period, if a forced shutdown event is detected, determining the next ring time according to the ring period;
and controlling the real-time clock to ring according to the next ring time.
3. The method according to claim 1, wherein after determining whether the smart terminal is unlocked according to the unlocking password, the method further comprises:
and if so, controlling the real-time clock to be closed.
4. The utility model provides an intelligent terminal's anti-theft device which characterized in that includes:
the ringing period determining module is used for determining the ringing period of the real-time clock if receiving the alarm activating request; the work of the real-time clock is irrelevant to the shutdown state of the intelligent terminal; the alarm activation request is specifically that an alarm request is sent to the intelligent terminal in a network mode by means of a second intelligent terminal, and the alarm request is used for activating an alarm module on the intelligent terminal; the second intelligent terminal sends an alarm request to the intelligent terminal in a network mode, and the alarm request comprises the following steps: the second intelligent terminal sends an activation alarm request comprising the identification of the stolen intelligent terminal to the alarm server in a network mode; the alarm server determines a stolen intelligent terminal according to the intelligent terminal identification, and forwards the alarm activation request to the stolen intelligent terminal;
the method comprises the steps that a second intelligent terminal is used for sending an alarm request to the intelligent terminal in a network mode, the alarm request is not limited by an SIM card of the intelligent terminal, and the alarm request can be sent to the intelligent terminal even if the SIM card in the intelligent terminal is removed or replaced;
the control module is used for controlling the real-time clock to continuously ring according to the ring period;
the control module is specifically configured to:
acquiring a current timestamp in real time, and updating the timing time according to the current timestamp and a ringing period;
controlling the real-time clock to ring according to the updated timing time;
if the alarm clock closing event is detected, displaying an unlocking password interface;
acquiring an unlocking password input by a user, and determining whether the intelligent terminal is unlocked according to the unlocking password;
if not, controlling the real-time clock to continuously ring according to the ring period.
5. The apparatus of claim 4, wherein the control module is further specifically configured to:
if a forced shutdown event is detected, determining the next ringing time according to the ringing period;
and controlling the real-time clock to ring according to the next ring time.
6. An anti-theft device for an intelligent terminal, the device comprising:
one or more processors;
storage means for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement the anti-theft method for a smart terminal of any of claims 1-3.
7. A storage medium having stored thereon a computer program, characterized in that the program, when executed by a processor, implements the anti-theft method of a smart terminal according to any one of claims 1-3.
CN201910394217.8A 2019-05-13 2019-05-13 Anti-theft method, device and equipment of intelligent terminal and storage medium Active CN110086942B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910394217.8A CN110086942B (en) 2019-05-13 2019-05-13 Anti-theft method, device and equipment of intelligent terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910394217.8A CN110086942B (en) 2019-05-13 2019-05-13 Anti-theft method, device and equipment of intelligent terminal and storage medium

Publications (2)

Publication Number Publication Date
CN110086942A CN110086942A (en) 2019-08-02
CN110086942B true CN110086942B (en) 2021-09-10

Family

ID=67419810

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910394217.8A Active CN110086942B (en) 2019-05-13 2019-05-13 Anti-theft method, device and equipment of intelligent terminal and storage medium

Country Status (1)

Country Link
CN (1) CN110086942B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114205801A (en) * 2021-12-09 2022-03-18 深圳市广和通无线股份有限公司 Equipment retrieving method and device and related equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103957323A (en) * 2014-05-08 2014-07-30 深圳市中兴移动通信有限公司 Mobile terminal and antitheft method thereof
CN104010088A (en) * 2014-06-16 2014-08-27 中国地质大学(武汉) Smart-phone anti-theft method and system
WO2015014293A1 (en) * 2013-07-31 2015-02-05 Tencent Technology (Shenzhen) Company Limited Devices and methods for guarding against theft of mobile terminals
CN106067243A (en) * 2016-05-19 2016-11-02 合肥工业大学 A kind of smart machine anti-loss method based on kinestate data analysis
CN109463856A (en) * 2018-12-04 2019-03-15 珠海格力电器股份有限公司 Bracelet and control method thereof, intelligent terminal and control method thereof

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005167463A (en) * 2003-12-01 2005-06-23 Sony Ericsson Mobilecommunications Japan Inc Subscriber identification module and data access blocking method therefor
US7034684B2 (en) * 2004-01-06 2006-04-25 Matsushita Electric Industrial Co., Ltd. Personal item monitor using radio frequency identification
CN1893493A (en) * 2005-06-30 2007-01-10 康佳集团股份有限公司 Antitheft method of push-button inductive antitheft hand-set
CN1897051A (en) * 2005-07-13 2007-01-17 康佳集团股份有限公司 Safety device and method and safety cell phone
CN1921330A (en) * 2005-08-22 2007-02-28 康佳集团股份有限公司 Theft protection installation, mobile phone with anti-theft function and anti-theft method for mobile phone
CN101583203A (en) * 2008-05-15 2009-11-18 乐金电子(中国)研究开发中心有限公司 Remote control device and remote control method for mobile phone
CN101719304A (en) * 2009-12-01 2010-06-02 成都港奇科技有限公司 Personnel belongings monitoring system based mobile phone Bluetooth
CN103093589A (en) * 2011-11-04 2013-05-08 希姆通信息技术(上海)有限公司 Wireless communication alarm system and alarm method
CN102750796A (en) * 2012-06-25 2012-10-24 中兴通讯股份有限公司 Alarming method of touch screen terminal and touch screen terminal
CN105430181B (en) * 2015-11-09 2019-10-22 上海斐讯数据通信技术有限公司 A kind of anti-theft method for mobile terminal and system based on Intelligent bracelet
CN106713638B (en) * 2016-12-26 2021-05-28 上海传英信息技术有限公司 Control system based on intelligent terminal
CN106911851B (en) * 2017-02-27 2019-04-12 维沃移动通信有限公司 A kind of control method and mobile terminal of mobile terminal
CN107707692A (en) * 2017-08-13 2018-02-16 上海爱优威软件开发有限公司 The antitheft mobile phone and its alarm method of software and hardware combining
CN107483748A (en) * 2017-09-27 2017-12-15 上海与德科技有限公司 Anti-theft method of mobile phone and device
CN108389345A (en) * 2018-03-23 2018-08-10 酷博创意有限公司 Removable intelligent terminal early warning system and its application

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015014293A1 (en) * 2013-07-31 2015-02-05 Tencent Technology (Shenzhen) Company Limited Devices and methods for guarding against theft of mobile terminals
CN103957323A (en) * 2014-05-08 2014-07-30 深圳市中兴移动通信有限公司 Mobile terminal and antitheft method thereof
CN104010088A (en) * 2014-06-16 2014-08-27 中国地质大学(武汉) Smart-phone anti-theft method and system
CN106067243A (en) * 2016-05-19 2016-11-02 合肥工业大学 A kind of smart machine anti-loss method based on kinestate data analysis
CN109463856A (en) * 2018-12-04 2019-03-15 珠海格力电器股份有限公司 Bracelet and control method thereof, intelligent terminal and control method thereof

Also Published As

Publication number Publication date
CN110086942A (en) 2019-08-02

Similar Documents

Publication Publication Date Title
US9396380B2 (en) Finger print sensor and auxiliary processor integration in an electronic device
CN106991304B (en) Message processing method and device
CN107924288A (en) Electronic equipment and its method for carrying out perform function using speech recognition
US20190171805A9 (en) Unlocking method and apparatus, and storage medium
CN109979047B (en) Multi-network intelligent door lock control method, storage medium, controller and fingerprint lock
CN106250018B (en) The method and device of lock notification message
CN106911852A (en) The method and mobile terminal of a kind of automatic alarm
CN103377056A (en) Program executing method and mobile terminal
US9338624B2 (en) Cellular telephone and computer program comprising means for generating and sending an alarm message
CN110086942B (en) Anti-theft method, device and equipment of intelligent terminal and storage medium
CN102932741A (en) Mobile phone antitheft tracking method and antitheft tracking mobile phone
JP2019523466A (en) Method and apparatus for unlocking terminal screen
WO2014012380A1 (en) Anti-theft device and method for mobile terminal
KR20180105819A (en) Key Controlling Method For Using Rule and Electronic Device Thereof
CN111669460A (en) Message pushing method and device, electronic equipment and storage medium
CN107707692A (en) The antitheft mobile phone and its alarm method of software and hardware combining
US20140373185A1 (en) Anti-theft Method and Computer System thereof
CN114121042A (en) Voice detection method and device under wake-up-free scene and electronic equipment
CN107395900A (en) The multiple based reminding method of missed call
CN113986190A (en) Application processing method and device and electronic equipment
CN115689553A (en) Payment method and device and terminal equipment
CN203191984U (en) Usb key system
CN111340986A (en) Intelligent lock abnormity alarm method, intelligent lock and storage medium
CN111050236A (en) Electronic equipment anti-theft method, device and system, electronic equipment and storage medium
CN113347076B (en) Session information deleting method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant