Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
DEVICES AND METHODS FOR GUARDING AGAINST THEFT OF MOBILE TERMINALS
Document Type and Number:
WIPO Patent Application WO/2015/014293
Kind Code:
A1
Abstract:
A mobile terminal implementing a method for guarding against theft may comprises a sensor configured to detect environmental information surrounding the mobile terminal. The mobile terminal may be configured to monitors a change of the environmental information and activate an alarm when the change of the environment meets a preset condition.

Inventors:
LV XIAOHUI (CN)
Application Number:
PCT/CN2014/083375
Publication Date:
February 05, 2015
Filing Date:
July 31, 2014
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
TENCENT TECH SHENZHEN CO LTD (CN)
International Classes:
H04M1/02; G08B13/22; H04M1/72454; H04M1/72421
Foreign References:
CN102624982A2012-08-01
CN102915607A2013-02-06
CN201114224Y2008-09-10
Attorney, Agent or Firm:
ADVANCE CHINA IP LAW OFFICE (No. 85 Huacheng AvenueTianhe District, Guangzhou, Guangdong 3, CN)
Download PDF:
Claims:
Claims

1. A mobile terminal comprising:

a sensor configured to detect environmental information of an environment surrounding the mobile terminal;

a processor-readable storage medium storing a set of instructions for guarding against theft of a mobile terminal;

a processor in communication with the storage medium and the sensor, wherein when executing the set of instruction, the processor is directed to:

monitor a change of the environmental information; and

activate an alarm when the change of the environment meets a preset condition.

2. The mobile terminal according to claim 1, wherein when executing the set of instructions, the processor is further directed to receive an anti-theft activation operation enabling the processor to monitor of the change of the environmental information.

3. The mobile terminal according to claim 2, wherein the anti-theft activation operation comprises at least one of:

a preset shaking action acted on the mobile terminal;

a preset touch acted on a touchscreen of the mobile terminal; and

a preset trigger action acted on a keyboard key of the mobile terminal.

4. The mobile terminal according to claim 1, wherein the environmental information comprises at least one of:

a distance detected by the sensor;

a luminous intensity detected by the sensor; and

a status of a headphone detected by the sensor as to whether the headphone is plugged into or unplugged from the mobile terminal.

5. The mobile terminal according to claim 4, wherein the preset condition comprises at least one of:

the distance exceeds a first preset threshold;

the luminous intensity exceeds a second preset threshold; and

the headphone is unplugged from the mobile terminal from a plugged status.

6. The mobile terminal according to claim 1, wherein to activate the alarm the processor is further directed to output a warning sound with a maximum volume of the mobile terminal.

7. The mobile terminal according to claim 1, wherein the processor is further directed to receive an anti-theft deactivation operation from a user to deactivate the alarm, wherein the anti- theft deactivation operation comprises a power-off instruction or an instruction for cutting off the battery supply to the mobile terminal.

8. A method for guarding against theft of a mobile terminal, comprising:

providing a sensor to a mobile terminal to detect environmental information of an environment surrounding the mobile terminal;

monitoring, by the mobile terminal, a change of the environmental information; and activating, by the mobile terminal, an alarm when the change of the environment meets a preset condition.

9. The method according to claim 8, further comprising:

receiving, by the mobile terminal, an anti-theft activation operation enabling the monitoring of the change of the environmental information.

10. The method according to claim 9, wherein the anti -theft activation operation comprises at least one of:

a preset shaking action acted on the mobile terminal;

a preset screen touch acted on a touchscreen of the mobile terminal; and

a preset trigger action acted on a keyboard key of the mobile terminal.

1 1. The method according to claim 8, wherein the environmental information comprises at least one of:

a distance detected by the sensor;

a luminous intensity detected by the sensor; and

a status of a headphone detected by the sensor as to whether the headphone is plugged into or unplugged from the mobile terminal.

12. The method according to claim 1 1, wherein the preset condition comprises at least one of:

the distance exceeds a first preset threshold;

the luminous intensity exceeds a second preset threshold; and

the current status of the headphone of the mobile terminal has changed from "plugged" to "unplugged".

13. The method according to claim 8, wherein the activating of the alarm comprises outputting a warning sound with a maximum volume of the mobile terminal.

14. The method according to claim 8, further comprising receiving an anti -theft deactivation operation from a user to deactivate the alarm, wherein the anti-theft deactivation operation comprises a power-off instruction or an instruction for cutting off the battery supply to the mobile terminal.

15. A non-transitory processor-readable storage medium, comprising a set of instructions for guarding against theft of a mobile terminal, wherein the set of instructions, when executed by a processor, directs the processor to perform acts of:

receiving signal from a sensor of a mobile terminal to detect environmental information of an environment surrounding the mobile terminal;

monitoring a change of the environmental information; and

activating an alarm when the change of the environment meets a preset condition.

16. The storage medium according to claim 15, wherein the set of instructions further directs the processor to perform acts of receiving an anti-theft activation operation enabling the monitoring of the change of the environmental information.

17. The storage medium according to claim 16, wherein the anti-theft activation operation comprises at least one of:

a preset shaking action acted on the mobile terminal;

a preset screen touch acted on a touchscreen of the mobile terminal; and

a preset trigger action acted on a keyboard key of the mobile terminal.

18. The storage medium according to claim 15, wherein the environmental information comprises at least one of:

a distance detected by the sensor;

a luminous intensity detected by the sensor; and

a status of a headphone detected by the sensor as to whether the headphone is plugged into or unplugged from the mobile terminal; and

wherein the preset condition comprises at least one of:

the distance exceeds a first preset threshold;

the luminous intensity exceeds a second preset threshold; and

the current status of the headphone of the mobile terminal has changed from "plugged" to "unplugged".

19. The storage medium according to claim 15, wherein the activating of the alarm comprises outputting a warning sound with a maximum volume of the mobile terminal.

20. The storage medium according to claim 15, wherein the set of instructions further directs the processor to perform acts of receiving an anti-theft deactivation operation from a user to deactivate the alarm, wherein the anti-theft deactivation operation comprises a power-off instruction or an instruction for cutting off the battery supply to the mobile terminal.

Description:
DEVICES AND METHODS FOR GUARDING AGAINST THEFT OF MOBILE

TERMINALS

Description

PRIORITY STATEMENT

[0001 ] This application claims the priority benefit of Chinese Patent Application No.

201310329072.6 filed on July 31, 2013, the disclosures of which are incorporated herein in their entirety by reference.

TECHNICAL FIELD

[0002] The present disclosure relates to the field of mobile terminal technologies.

Specifically, the present disclosure relates to a method and a device for presenting theft of mobile terminals.

BACKGROUND

[0003] Mobile terminals, such as smartphones, have become indispensable to people's daily life. However, mobile terminals are small so they may be easily lost or stolen in public places, causing loss of property and possibly divulgement of private data of the terminal users.

[0004] Currently, the method commonly used for guarding against theft of mobile terminals is to locate and lock up the stolen mobile terminal and then call the police. Such a method is actually a remedial measure taken after a mobile terminal is stolen, incapable of providing effective precaution before the mobile terminal is stolen.

SUMMARY

[0005] According to an aspect of the present disclosure, a mobile terminal may comprises a sensor, a processor-readable storage medium, and a processor in communication with the storage medium. The sensor may be configured to detect environmental information of an environment surrounding the mobile terminal. The storage medium may store a set of instructions for guarding against theft of a mobile terminal. The processor, when executing the set of instruction, may monitor a change of the environmental information; and activate an alarm when the change of the environment meets a preset condition.

[0006] According to another aspect of the present disclosure, a method for guarding against theft of a mobile terminal may comprise: providing a sensor to a mobile terminal to detect environmental information of an environment surrounding the mobile terminal; monitoring, by the mobile terminal, a change of the environmental information; and activating, by the mobile terminal, an alarm when the change of the environment meets a preset condition. [0007] According to yet another aspect of the present disclosure, a non-transitory processor- readable storage medium may comprise a set of instructions for guarding against theft of a mobile terminal. The set of instructions, when executed by a processor, may direct the processor to perform acts of receiving signal from a sensor of a mobile terminal to detect environmental information of an environment surrounding the mobile terminal; monitoring a change of the environmental information; and activating an alarm when the change of the environment meets a preset condition..

DESCRIPTIONS OF THE DRAWINGS

[0008] The above and other features and advantages will become more apparent by describing in detail example embodiments thereof with reference to the attached drawings in which:

[0009] Figure 1 shows a flowchart of an anti-theft method for a mobile terminal according to example embodiments of the present disclosure;

[0010] Figure 2 shows another flowchart of an anti-theft method for a mobile terminal according to example embodiments of the present disclosure;

[001 1 ] Figure 3 shows a structural diagram for a device for guarding against theft of a mobile terminal according to example embodiments of the present disclosure; and

[0012] Figure 4 shows a structural diagram of a mobile terminal according to example embodiments of the present disclosure.

DETAILED DESCRIPTION OF THE INVENTION

[0013] To help understand more clearly the purposes, technical solution, and benefits of the present disclosure, the following further describes the present disclosure. It should be understood that the description of particular embodiments is intended only to explain, instead of limiting, the present disclosure.

[0014] Figure 4 illustrates a structural diagram of a mobile terminal according to the example embodiments of the present disclosure. The mobile terminal may be implemented as systems and/or to operate methods disclosed in the present disclosure.

[0015] The mobile terminal 1200 may include an RF (Radio Frequency) circuit 110, one or more than one memory unit(s) 120 of computer-readable memory media, an input unit 130, a display unit 140, sensors 150 (e.g., distance sensors and/or optical sensors), an audio circuit 160, a WiFi (wireless fidelity) module 170, at least one processor 180, and a power supply 190. Those of ordinary skill in the art may understand that the structure of the mobile terminal 1200 shown in Figure 4 does not constitute restrictions on the mobile terminal 1200. Compared with what may be shown in the figure, more or fewer components may be included, or certain components may be combined, or components may be arranged differently.

[0016] The RF circuit 1 10 may be configured to receive and transmit signals during the course of receiving and transmitting information and/or phone conversation. Specifically, after the RF circuit 1 10 receives downlink information from a base station, it may hand off the downlink information to the processor 180 for processing. Additionally, the RF circuit 1 10 may transmit uplink data to the base station. Generally, the RF circuit 1 10 may include, but may be not limited to, an antenna, at least one amplifier, a tuner, one or multiple oscillators, a subscriber identification module (SIM) card, a transceiver, a coupler, an LNA (Low Noise Amplifier), and a duplexer. The RF circuit 1 10 may also communicate with a network and/or other devices via wireless communication. The wireless communication may use any communication standards or protocols available or one of ordinary skill in the art may perceive at the time of the present disclosure. For example, the wireless communication may include, but not limited to, GSM (Global System of Mobile communication), GPRS (General Packet Radio Service), CDMA (Code Division Multiple Access), WCDMA (Wideband Code Division Multiple Access), LTE (Long Term Evolution), email, and SMS (Short Messaging Service).

[0017] The memory unit 120 may be configured to store software programs and/or modules. The software programs and/or modules may be sets of instructions to be executed by the processor 180. The processor 180 may execute various functional applications and data processing by running the software programs and modules stored in the memory unit 120. The memory unit 120 may include a program memory area and a data memory area, wherein the program memory area may store the operating system and at least one functionally required application program (such as the audio playback function and image playback function); the data memory area may store data (such as audio data and phone book) created according to the use of the mobile terminal 1200. Moreover, the memory unit 120 may include high-speed random- access memory and may further include non-volatile memory, such as at least one disk memory device, flash device, or other volatile solid-state memory devices. Accordingly, the memory unit 120 may further include a memory controller to provide the processor 180 and the input unit 130 with access to the memory unit 120.

[0018] The input unit 130 may be configured to receive information, such as numbers or characters, and create input of signals from keyboards, touch screens, mice, joysticks, optical or track balls, which are related to user configuration and function control. Specifically, the input unit 130 may include a touch- sensitive surface 131 and other input devices 132. The touch- sensitive surface 131, also called a touch screen or a touch pad, may collect touch operations by a user on or close to it (e.g., touch operations on the touch-sensitive surface 131 or close to the touch- sensitive surface 131 by the user using a finger, a stylus, and/or any other appropriate object or attachment) and drive corresponding connecting devices according to preset programs. The touch-sensitive surface 131 may include two portions, a touch detection device and a touch controller. The touch detection device may be configured to detect the touch location by the user and detect the signal brought by the touch operation, and then transmit the signal to the touch controller. The touch controller may be configured to receive the touch information from the touch detection device, convert the touch information into touch point coordinates information of the place where the touch screen may be contacted, and then send the touch point coordinates information to the processor 180. The touch controller may also receive commands sent by the processor 180 for execution. Moreover, the touch-sensitive surface 131 may be realized by adopting multiple types of touch-sensitive surfaces, such as resistive, capacitive, infrared, and/or surface acoustic sound wave surfaces. Besides the touch-sensitive surface 131, the input unit 130 may further include other input devices 132, such as the input devices 132 may also include, but not limited to, one or multiple types of physical keyboards, functional keys (for example, volume control buttons and switch buttons), trackballs, mice, and/or joysticks.

[0019] The display unit 140 may be configured to display information input by the user, provided to the user, and various graphical user interfaces on the mobile terminal 1200. These graphical user interfaces may be composed of graphics, texts, icons, videos, and/or combinations thereof. The display unit 140 may include a display panel 141. The display panel 141 may be in a form of an LCD (Liquid Crystal Display), an OLED (Organic Light-Emitting Diode), or any other form available at the time of the present disclosure or one of ordinary skill in the art would have perceived at the time of the present disclosure. Furthermore, the touch-sensitive surface 131 may cover the display panel 141. After the touch-sensitive surface 131 detects touch operations on it or nearby, it may transmit signals of the touch operations to the processor 180 to determine the type of the touch event. Afterwards, according to the type of the touch event, the processor 180 may provide corresponding visual output on the display panel 141. In Figure 4, the touch- sensitive surface 131 and the display panel 141 realize the input and output functions as two independent components. Alternatively, the touch-sensitive surface 131 and the display panel 141 may be integrated to realize the input and output functions.

[0020] The mobile terminal 1200 may further include at least one type of sensor 150, for example, an optical sensor, a motion sensor, and other sensors. An optical sensor may include an environmental optical sensor and a proximity sensor, wherein the environmental optical sensor may adjust the brightness of the display panel 141 according to the brightness of the environment, and the proximity sensor may turn off the display panel 141 and/or back light when the mobile terminal 1200 may be moved close an ear of the user. As a type of motion sensor, a gravity acceleration sensor may detect the magnitude of acceleration in various directions (normally three axes) and may detect the magnitude of gravity and direction when it may be stationary. The gravity acceleration sensor may be used in applications of recognizing the attitude of the mobile terminal 1200 (e.g., switching screen orientation, related games, and magnetometer calibration) and functions related to vibration recognition (e.g., pedometers and tapping); the mobile terminal 1200 may also be configured with a gyroscope, barometer, hygrometer, thermometer, infrared sensor, and other sensors.

[0021 ] An audio circuit 160, a speaker 161, and a microphone 162 may provide audio interfaces between the user and the mobile terminal 1200. The audio circuit 160 may transmit the electric signals, which are converted from the received audio data, to the speaker 161, and the speaker 161 may convert them into the output of sound signals; on the other hand, the

microphone 162 may convert the collected sound signals into electric signals, which may be converted into audio data after they are received by the audio circuit 160; after the audio data may be output to the processor 180 for processing, it may be transmitted via the RF circuit 1 10 to, for example, another terminal; or the audio data may be output to the memory unit 120 for further processing. The audio circuit 160 may further include an earplug jack to provide communication between earplugs and the mobile terminal 1200.

[0022] WiFi may be a short-distance wireless transmission technology. Via the WiFi module 170, the mobile terminal 1200 may help users receive and send emails, browse web pages, and visit streaming media. The WiFi module 170 may provide the user with wireless broadband Internet access.

[0023] The processor 180 may be the control center of the mobile terminal 1200. The processor 180 may connect to various parts of the entire mobile terminal 1200 utilizing various interfaces and circuits. The processor 180 may conduct overall monitoring of the mobile terminal 1200 by running or executing the software programs and/or modules stored in the memory unit 120, calling the data stored in the memory unit 120, and executing various functions and processing data of the mobile terminal 1200. The processor 180 may include one or multiple processing core(s). The processor 180 may integrate an application processor and a modem processor, wherein the application processor may process the operating system, user interface, and application programs, and the modem processor may process wireless communication.

[0024] The mobile terminal 1200 may further include a power supply 190 (for example a battery), which supplies power to various components. The power supply may be logically connected to the processor 180 via a power management system so that charging, discharging, power consumption management, and other functions may be realized via the power

management system. The power supply 190 may further include one or more than one DC or AC power supply, a recharging system, a power failure detection circuit, a power converter or inverter, a power status indicator, and other random components.

[0025] Further, the mobile terminal 1200 may also include a camera, Bluetooth module, etc., which are not shown in Figure 4.

[0026] Figure 1 shows a flowchart of the anti-theft method for a mobile terminal according to example embodiments of the present disclosure. The method may be implemented by the mobile terminal 1200. For example, the method may be stored in the memory unit 120 as a set of instructions and be executed by the processor 180. The method may include the follow steps:

[0027] Step SI 01 : Monitoring information about an environment around the mobile terminal.

[0028] The environmental information includes, but is not limited to, at least one of the following: distance detected by a distance sensor of the mobile terminal; luminous intensity detected by an optical sensor of the mobile terminal; and a current status of a headphone of the mobile terminal. Here, the current status of the headphone is the status of the headphone plugged into or unplugged from the mobile terminal.

[0029] Step SI 02: Upon detection that the environment information has changed and that the changed environment information meets preset conditions, determining that the mobile terminal is being lost or stolen, and activating an alarm.

[0030] The determination of whether the changed environmental information meets the preset conditions may include, but is not limited to, at least one of the following:

[0031 ] Determining whether the distance detected by the distance sensor of the mobile terminal exceeds a first preset threshold. Specifically, determining whether the distance detected by the distance sensor of the mobile terminal between the mobile terminal and a surrounding object exceeds the first preset threshold, for example, determining whether the distance is greater than or equal to 15 cm;

[0032] Determining whether the luminous intensity detected by the optical sensor of the mobile terminal exceeds a second preset threshold, for example, determining whether the luminous intensity is higher than or equal to 140 cd/m 2 (candela per square meter); and

[0033] Determining whether the current status of the mobile terminal headphone detected by the mobile terminal has changed from "plugged" to "unplugged".

[0034] Upon determining that the mobile terminal is lost or stolen, the mobile terminal may activate the alarm with an alert sound and the volume of the mobile terminal is set to maximum and given to warn the user, wherein the alert sound may be set in advance and may be an alarm ringtone.

[0035] The alarm may also be a vibration alert, light flashing alert, and/or alarm ringtone alert given by the mobile terminal.

Further, the method may also includes deactivating the alarm on receiving an operation instruction sent by the mobile terminal user for deactivating the alarm. The operation instruction may be a power-off instruction or an instruction for cutting off the battery supply to the mobile terminal.

[0036] The alarm may also be deactivated by using the following method:

[0037] A password for deactivating the alarm is set in advance on the mobile terminal so that when the password is received, the alarm is deactivated.

[0038] This embodiment may be used to give a timely and accurate determination on whether a mobile terminal is being stolen and, if yes, activate the alarm effectively, solving the problem that the prior art cannot implement effective prevention before a mobile terminal is stolen.

[0039] Figure 2 shows a flowchart of the anti-theft method for a mobile terminal according to example embodiments. The method may be implemented by the mobile terminal 1200. For example, the method may be stored in the memory unit 120 as a set of instructions and be executed by the processor 180. The method may include the following steps:

[0040] Step S201 : Receiving enablement information of the mobile terminal anti-theft function.

[0041 ] To simplify the operation procedure and allow the user to conveniently and quickly enable the mobile terminal anti-theft function by performing an anti-theft activation operation, the following method may be used to enable the mobile terminal anti-theft function in this embodiment: receiving a preset shaking action acted on the mobile terminal and detected by the acceleration sensor of the mobile terminal and, when the shaking meets the preset conditions, enabling the mobile terminal anti-theft function. The shaking may include, but is not limited to, a preset shake frequency and/or preset shake amplitude.

[0042] For example, assume that the preset conditions are as follows: number of shakes: 3 times, shake interval: shorter or equal to 200 ms, shake amplitude, namely, acceleration: greater than 800m/s 2 (meters per square second); alternatively, number of shakes: 2 groups, number of shakes per group: 3, group interval: 1000 ms, shake interval in each group: shorter than or equal to 200 ms, shake amplitude, namely, acceleration: greater than 800m/s 2 . The acceleration may be calculated by using the following formula: 10000 x ( ¾ - x 2 ) 2 + (y x - y 2 ) 2 + (z ~ - z 2 f

Acceleration = ^

[0043] In the preceding formula, ^ 1 ' -^ 1 ' Z ^ and ^ 2 ' -^ 2 ' z ^ respectively indicate the coordinates that the acceleration sensor obtains during a first shake and a second shake of the mobile terminal; ^ indicates the time interval between the shakes.

[0044] In this embodiment, the following method may also be used to enable the mobile terminal anti-theft function: detecting and/or receiving a preset mobile terminal screen touch action detected by the touch sensor of the mobile terminal; or detecting and/or receiving a preset mobile terminal keyboard key trigger action detected by the keyboard sensor of the mobile terminal.

[0045] In actual application, a key or a preset order of key pressing actions for enabling the mobile terminal anti-theft function may be set in advance, or an instruction for enabling the mobile terminal anti-theft function may be set (for example, sliding a finger clockwise or counterclockwise on the touch screen, or pressing a combination of numbers and/or letters on the keyboard), on the mobile terminal; on detection that the user presses the key or sends the enabling instruction. The anti-theft function may also be enabled when trigger information for enabling the mobile terminal anti-theft function generated at the preset time interval is received. The key pressing instruction or the enabling instruction may be sent by the user using the screen or keyboard of the mobile terminal.

[0046] After the mobile terminal anti-theft function is enabled, methods such as vibration and ringtone playing are used to inform the mobile terminal user that the anti-theft function has been enabled.

[0047] Step S202: Obtain information about the environment in which the mobile terminal exists.

[0048] After the mobile terminal anti-theft function is enabled, to ensure that the intended environmental information is obtained (e.g., assume that the mobile terminal anti-theft function is enabled before the mobile terminal is put into a pocket. If acquisition of environmental information starts immediately, the information about the environment outside the packet, instead of the information about the environment inside the packet, is obtained), a time threshold, for example, 30 seconds, may be set in advance. When the time threshold is reached, acquisition of the information about the environment surrounding the mobile terminal starts.

[0049] The environmental information may include, but is not limited to, at least one of the following: distance detected by the distance sensor of the mobile terminal; luminous intensity detected by the optical sensor of the mobile terminal; and current status of the headphone of the mobile terminal, the current status being the status of the headphone plugged into or unplugged from the mobile terminal. For example, the distance sensor may be an optical sensor. By emitting a light beam and detecting the light reflected from a nearby object, the optical sensor is able to measure the distance between the mobile terminal and the object. The distance, which reflects whether a mobile terminal is in a pocket, usually may not exceed a threshold value (e.g., 15 cm). When the mobile terminal is stolen or lost and leaves the pocket, the distance may be far more than 15 cm.

[0050] Step S203 : Monitoring the environmental information.

[0051 ] To this end, the mobile terminal (e.g., the processor of the mobile terminal) may constantly receive signal from the sensor, which detects the environmental information surrounding the mobile terminal. The of monitoring the environmental information includes, but is not limited to, monitoring a change of the environmental information, such as change of the distance detected by the distance sensor, luminous intensity detected by the optical sensor, and/or the current status of the mobile terminal headphone.

[0052] In step S204, upon detecting that the environmental information has changed and determining that the mobile terminal anti-theft function is enabled, the processor of the mobile terminal may determine whether the changed environmental information meets the preset conditions. If the determination result is "yes", step S205 is executed; otherwise, step S203 is performed to continue monitoring the environmental information.

[0053] According to the example embodiments, the information about disablement of the mobile terminal anti-theft function and the information about enablement of the mobile terminal anti-theft function may be the same or different. On detecting that the environmental information has changed and that the mobile terminal anti-theft function is enabled, whether the changed environmental information meets the preset conditions is determined.

[0054] The determining of whether the changed environmental information meets the preset conditions includes, but is not limited to, at least one of the following:

[0055] Determining whether the distance detected by the distance sensor of the mobile terminal exceeds the first preset threshold. Specifically, determining whether the distance detected by the distance sensor of the mobile terminal between the mobile terminal and a surrounding object exceeds the first preset threshold. For example, determining whether the distance is greater than or equal to 15 cm; [0056] Determining whether the luminous intensity detected by the optical sensor of the mobile terminal exceeds the second preset threshold. For example, determining whether the luminous intensity is higher than or equal to 140 cd/m 2 (candela per square meter); and

[0057] Determining whether the current status of the mobile terminal headphone detected by the mobile terminal has changed from "plugged" to "unplugged". Wherein the "plugged" status refers to a status that the headphone is plugged in the mobile terminal, and the "unplugged" status refers to a status that the headphone is unplugged from the mobile terminal.

[0058] If the changed environmental information meets the preset conditions, step SI 05 is performed; otherwise, the mobile terminal may continue monitoring the environmental information until the mobile terminal anti-theft function is disabled.

[0059] After the mobile terminal anti-theft function is disabled, methods such as vibration and ringtone playing are used to inform the mobile terminal user about the disablement.

[0060] Step S205: Determining that the mobile terminal is being stolen and activate the alarm.

[0061 ] Upon detecting that the mobile terminal is being stolen, the mobile terminal may set the volume of the mobile terminal to maximum and output an alert sound to warn the user, wherein the alert sound may be set in advance and may be an alarm ringtone.

[0062] The alarm may also be a vibration alert, light flashing alert, and/or alarm ringtone alert given by the mobile terminal.

[0063] Further, the method may include deactivating the alarm upon receiving a deactivation operation instruction sent by the mobile terminal user for deactivating the alarm. The operation instruction may be a power-off instruction or an instruction for cutting off the battery supply to the mobile terminal.

[0064] The alarm may also be deactivated by using the following method:

[0065] A password for deactivating the alarm is set in advance on the mobile terminal, so that when the mobile terminal receives the password and confirms that the received password matches the pre-set one, the mobile terminal deactivate the alarm.

[0066] The following describes the above-mentioned process by using an application scenario. Those of ordinary skill in the prior art may understand that the application scenario is intended only to explain, instead of limiting, the present disclosure.

[0067] Immediately after the preset shaking of the mobile terminal, the user puts it into his or her packet or backpack. On detecting the shaking, the acceleration sensor of the mobile terminal checks whether the frequency and amplitude of the shaking are the same as the preset frequency and amplitude for enabling the mobile terminal anti-theft function. If yes, the mobile terminal anti-theft function is enabled and two short vibrations are produced to inform the user of the fact that the anti-theft function has been enabled. Five seconds later (in this scenario, the five seconds are the preset time threshold, which is reserved for the user to put the mobile terminal, with the anti-theft function enabled, into his or her packet or backpack), the distance sensor of the mobile terminal starts detecting the distance between the mobile terminal and a surrounding object (the pocket or the backpack); the optical sensor of the mobile terminal starts detecting the current luminous intensity, and/or the mobile terminal starts detecting the current status of the mobile terminal headphone. If the distance detected by the distance sensor is longer than or equal to 15 cm, the luminous intensity detected by the optical sensor is higher than or equal to 140cd/m2, and/or the current status of the mobile terminal headphone is changed from "plugged" to

"unplugged", the mobile terminal may have slipped out of the pocket or been stolen. In such a case, the mobile terminal sets its volume to maximum and gives an alert sound to inform the mobile terminal user. The alert sound stops only if the mobile terminal is powered off or the battery of the terminal is removed, or if a correct password to deactivate the alarm is input.

[0068] As shown in the preceding application scenario, with this embodiment, the mobile terminal anti-theft function may be enabled conveniently and quickly. In addition, after the anti- theft function is enabled, the distance sensor, optical sensor, and headphone of the mobile terminal may be configured to monitor the information about the environment in which the mobile terminal exists. On detecting that the environmental information has changed and that the changed environmental information meets the preset conditions, it is determined that the mobile terminal is being stolen and so an alarm is activated. This embodiment may be used to give a timely and accurate determination on whether a mobile terminal is lost or stolen and, the instant the mobile terminal is lost or stolen, to effectively activate the alarm to provide effective precaution before the mobile terminal is stolen.

[0069] Figure 3 shows a structural diagram of a device for guarding against theft of a mobile terminal according to the above example embodiments of the present disclosure. For

convenience of description, only the parts related to this embodiment are shown in the figure.

[0070] The mobile terminal anti-theft device 3 may be a software unit, a hardware unit, or a software/hardware integrated unit that runs in the mobile terminal 1200. Alternatively, the device may be integrated into the mobile terminal 1200 as an independent add-on or run in the application system of the mobile terminal.

[0071 ] The mobile terminal anti -theft device 3 may include an information monitoring unit 31 and an alarm unit 32. The functions of the two units are as follows:

[0072] The information monitoring unit 31 is configured to monitor information about the environment in which the mobile terminal exists. [0073] The alarm unit 32 is configured to, on detecting that the environmental information has changed and that the changed environmental information meets the preset conditions, determine that the mobile terminal is lost or stolen and activate an alarm.

[0074] The device 3 further may include an information receiving unit 33, configured to receive information about the enablement of the mobile terminal anti-theft function before monitoring of the information about the environment in which a mobile terminal exists.

[0075] For example, the information receiving unit 33 may be configured to receive a mobile terminal shaking detected by the acceleration sensor of the mobile terminal, the shaking including the shake frequency and/or shake amplitude; receive a preset mobile terminal screen touch event detected by the touch sensor of the mobile terminal; or receive a preset mobile terminal keyboard key trigger action detected by the keyboard sensor of the mobile terminal.

[0076] Further, the alarm unit 32 may be configured to determine that the mobile terminal is being stolen and activate the alarm upon detecting that the environmental information has changed and determine that the changed environmental information meets the preset conditions, and that the mobile terminal anti-theft function is enabled and/or activated.

[0077] Further, the environmental information includes at least one of the following: distance detected by the distance sensor of the mobile terminal; luminous intensity detected by the optical sensor of the mobile terminal; and current status of the headphone of the mobile terminal, the current status being the status of the headphone plugged into or unplugged from the mobile terminal.

[0078] Further, the alarm unit 32 may be configured to determine that the mobile terminal is lost or stolen and activate the alarm upon detecting and/or determining that the environmental information has changed, that the changed the distance exceeds the first preset threshold, that the luminous intensity exceeds the second preset threshold, and/or that the status of the headphone of the mobile terminal has changed from "plugged" to "unplugged", .

[0079] Further, the alarm unit 32 may be configured to:

[0080] determine that the mobile terminal is lost or stolen if the determined result obtained by the alarm unit is "yes", , set the volume of the mobile terminal to the maximum, and activate the alert sound to alert the terminal user.

[0081 ] The device 3 may further include an alarm deactivation unit 34, configured to receive an operation instruction sent by the mobile terminal user for deactivating the alarm, the operation instruction being a power-off instruction or an instruction for cutting off the battery supply to the mobile terminal, and/or a password preset to deactivate the alarm. [0082] Those of ordinary skill in the prior art may understand that, for convenience and brevity of description, examples are given only based on the division of the function units. In actual application, the above-mentioned functions may be allocated as needed to different function units for completion. That is, the internal structure of the device may be divided into different function units or modules to complete all or some of the above-mentioned functions. In this embodiment, the function units may be integrated into a processing unit; each unit may exist independently and physically; or two or more units may be integrated as one unit. The integrated unit may be implemented as hardware or a software unit. In addition, the names of the function units are intended only to distinguish the units, instead of limiting the scope of the present disclosure. For details about the work processes of the units of the device, see the description of the corresponding process in the above-mentioned embodiments of the method.

[0083] Referring back to Figure 4, which shows the structural diagram of mobile terminal 1200, the mobile terminal 1200 may implement the anti -theft method for a mobile terminal provided in the above-mentioned embodiments.

[0084] In this embodiment, the display unit of the mobile terminal is a touch-screen display. The mobile terminal also may include the memory and one or more programs. The one or more programs are stored in the memory and configured before being executed by one or more processors. The one or more programs contain the instructions configured to execute the following operations monitoring the information about the environment surrounding a mobile terminal.

[0085] Upon detecting and/or determining that the environmental information has changed and that the changed environmental information meets the preset conditions, determining that the mobile terminal is being stolen, and giving an alarm.

[0086] The memory of the mobile terminal may further include the instructions configured to direct the processor to execute the following operations receiving the information for enabling the mobile terminal anti-theft function.

[0087] The memory of the mobile terminal may further include the instructions configured to direct the processor to execute the following operations:

[0088] The step of receiving the information for enabling the mobile terminal anti-theft function may include: receiving a preset shaking action acted to the mobile terminal detected by the acceleration sensor of the mobile terminal, the preset shaking including the preset shake frequency and/or shake amplitude; receiving a preset mobile terminal screen touch action detected by the touch sensor of the mobile terminal; or receiving a preset mobile terminal keyboard key trigger action detected by the keyboard sensor of the mobile terminal. The above action may be conducted by the user of the mobile terminal.

[0089] The memory of the mobile terminal may further include the instructions configured to direct the processor to execute the following operation: upon detecting and/or determining that the environmental information has changed, that the changed environmental information meets the preset conditions, and that the mobile terminal theft preventing function is enabled, determine that the mobile terminal is being stolen and activate the alarm.

[0090] The memory of the mobile terminal may further include the instructions configured to direct the processor to execute the following operations: directing the distance sensor to detect a distance and receiving the distance from the distance sensor; directing the optical sensor to detect luminous intensity of the environment surrounding the mobile terminal and receiving the luminous intensity detected by the optical sensor; and detecting the current status of the headphone of the mobile terminal, wherein the current status being the status of the headphone plugged into or unplugged from the mobile terminal.

[0091 ] Here, to determine the changed environmental information meets the preset conditions, the processor may determine that the distance exceeds the first preset threshold; the luminous intensity exceeds the second preset threshold; and/or the current status of the headphone of the mobile terminal has changed from "plugged" to "unplugged".

[0092] The memory of the mobile terminal may further include the instructions configured to direct the processor to execute the following operations: setting the volume of the mobile terminal to the maximum and giving alert sound to alert the user.

[0093] The mobile terminal may further include the instructions configured to direct the processor to execute the following operation: receiving an operation instruction sent by the mobile terminal user for deactivating the alarm, the operation instruction being a power-off instruction or an instruction for cutting off the battery supply to the mobile terminal and/or may be a password.

[0094] To sum up, with the embodiments of the present disclosure, the mobile terminal anti- theft function may be enabled conveniently and quickly. In addition, after the anti-theft function is enabled, the distance sensor, optical sensor, and headphone of the mobile terminal may be configured to monitor the information about the environment in which the mobile terminal exists. On detecting that the environmental information has changed and that the changed

environmental information meets the preset conditions, it is determined that the mobile terminal is lost or stolen and thus an alarm is activated. This embodiment may be configured to give a timely and accurate determination on whether a mobile terminal is lost or stolen stolen and, the instant the mobile terminal is being stolen, effectively activate the alarm to provide effective precaution before the mobile terminal is stolen.

[0095] Those of ordinary skill in the prior art may further understand that all or some of the steps of the methods described in the above-mentioned embodiments may be implemented by related hardware as instructed by a program, the program may be stored on a computer-readable storage medium, which may be a Read-Only Memory (ROM), RAM, magnetic disk, or optical disk.

[0096] While the present disclosure has been particularly disclosed and described above example embodiments, it should be understood that the description is not intended to limit the present disclosure. Various equivalent substitutions or obvious alterations with the same performance or purposes as those of the present disclosure may be made by those of ordinary skill in the present art without departing from the spirit and scope of the present disclosure. The present disclosure intends to cover the broadest scope of systems and methods for content browsing, generation, and interaction.

[0097] Thus, example embodiments illustrated in Figures 1-4 serve only as examples to illustrate several ways of implementation of the present disclosure. They should not be construed as to limit the spirit and scope of the example embodiments of the present disclosure. It should be noted that those skilled in the art may still make various modifications or variations without departing from the spirit and scope of the example embodiments. Such modifications and variations shall fall within the protection scope of the example embodiments, as defined in attached claims.