1. Field of the Disclosure
The present disclosure generally relates to mobile phones, and more particularly to a mobile phone and a communication method thereof.
2. Description of Related Art
Mobile phones are popularly used in society for their small sizes and portable features. However, for the same reasons, the mobile phones are easy to be stolen. And what is worse, the stolen mobile phones might be used to defraud persons whose contacts are listed in the stolen mobile phones.
Therefore, a mobile phone having a security mechanism is needed in the industry to address the aforementioned deficiency.
A mobile phone is designed for sending predetermined messages to the owner's relatives or friends according to phone numbers recorded therein after the mobile phone is stolen. The mobile phone includes a memory, a communication module, and a microprocessor. The memory is for storing phone numbers and predetermined messages. The communication module is for sending information wirelessly. The microprocessor is for reading the phone numbers and sending the predetermined messages according to the phone numbers when the mobile phone is stolen. A communication method used by the mobile phone is also provided.
Other advantages and novel features of the present invention will become more apparent from the following detailed description of preferred embodiment when taken in conjunction with the accompanying drawings.
Referring to
The mobile phone 20 includes a display 21, a memory 22, a scanner 23, a power manager 24, a microprocessor 25, a communication module 26, a subsidiary power source 27, a switch button 28, an input module 29, and a main power source 30. The power manager 24 is directly connected to all of the other components except the memory 22. The microprocessor 25 is directly connected to all of the other components except the subsidiary power source 27 and the main power source 30. In the embodiment, the main power source 30 is a detachable battery, and the subsidiary power source 27 is permanently fixed inside the mobile phone 20. In practice, the scanner 23 is fixed on top of the switch button 28.
The display 21 is for displaying information of the mobile phone 20. The memory 22 is for storing predetermined fingerprint data, the phone numbers of contacts, and the predetermined messages. The scanner 23 is for scanning a fingerprint of a current operator of the mobile phone; the current operator, may be the predetermined operator such as the owner or a legitimate user, or an unauthorized operator, such as an illegitimate operator, or a malicious operator. The scanner 23 is further for generating a current operator fingerprint scan. The power manager 24 is for selectively drawing power between the subsidiary power source 27 and the main power source 30. The microprocessor 25 is for controlling the other components. The communication module 26 is for sending the predetermined messages to the contacts listed in the mobile phone. The switch button 28 can be pressed, and, when actuated, generates a switch signal that is sent to the microprocessor 25. In practice, the switch button 28 is configured for powering on and powering off the mobile phone 20. The input module 29 is used for inputting information of the contacts and the predetermined messages.
Also referring to
Further referring to
In a condition that the mobile phone 20 is stolen or lost, the illegitimate operator would be using the mobile phone 20, and would have to actuate the switch button 28 to power off the mobile phone 20. The scanner 23 fixed on top of the switch button 28 scans a fingerprint of the current operator, generates the current operator fingerprint scan, and sends the current operator fingerprint scan to the microprocessor 25. Simultaneously, the switch button 28 generates a switch signal and sends the switch signal to the microprocessor 25. Because the illegitimate user's fingerprint does not match an authentic fingerprint stored in the phone, the authentication would fail. As a result, the controller unit 256 receives the switch signal and signals the power manager 24 to power off the display 21, and the illegitimate operator would not know that the mobile phone 20 is still operating. In the authentication process, the analyzer unit 250 analyzes the current operator fingerprint scan and generates fingerprint data. The compare unit 252 compares the fingerprint data with the predetermined fingerprint data. If the compared result is a valid result, the controller unit 256 signals the power manager 24 to stop supplying power, in order to power off the whole phone. If the compared result is an invalid result, the processor unit 254 reads the phone numbers and the predetermined messages from the memory 22, and sends them to the communication module 26. The communication module 26 automatically sends the predetermined messages to the phone numbers of the contacts. Herein, the valid result indicates that the fingerprint data is substantially the same as the predetermined fingerprint data. The invalid result indicates that the fingerprint data is different from the predetermined fingerprint data.
In another case, the unauthorized user may directly detach the main power source 30, for example a battery. The detector unit 242 of the power manager 24 would instantly detect a sudden disconnection of the main power source 30. The management unit 240 alternatively draws power from the subsidiary power source 27, and supplies power only to the microprocessor 25 and the communication module 26. The processor unit 254 reads the phone numbers and the predetermined messages from the memory 22, and sends them to the communication module 26. The communication module 26 automatically sends the predetermined messages to the phone numbers of the contacts.
As mentioned above, no matter whether the illegitimate operator actuates the switch button 28 to power off the mobile phone 20 or detaches the main power source 30, the communication module 26 automatically sends the predetermined messages to the contacts, such as the owner's relatives and friends, according to the phone numbers stored in the memory 22. Therefore, contacts of the phone are alerted, thereby can avoid being defrauded from the illegitimate operator.
Further referring to
In step S302, the mobile phone 20 automatically judges whether it is stolen. If the mobile phone 20 is stolen, the procedure goes to step S304. If the mobile phone 20 is not stolen, the procedure goes to step S308. Step S302 will be described in detail hereinafter.
In step S304, the processor unit 254 reads the phone numbers and the predetermined messages from the memory 22.
In step S306, the communication module 26 automatically sends the predetermined messages to the phone numbers of the contacts.
In step S308, the controller unit 256 signals the power manager 24 to stop supplying power. That is, the power manager 24 powers off the mobile phone 20.
Also referring to
In sub-step S402, the switch button 28 is actuated when the mobile phone 20 is in standby mode.
In sub-step S404, the scanner 23 fixed on top of the switch button 28 scans the current operator fingerprint, and generates a current operator fingerprint scan according to the current operator fingerprint.
In sub-step S406, the switch button 28 generates the switch signal and sends the switch signal to the microprocessor 25.
In sub-step S408, the controller unit 256 receives the switch signal and signals the power manager 24 to power off the display 21.
In sub-step S410, the analyzer unit 250 analyzes the current operator fingerprint scan and generates fingerprint data.
In sub-step S412, the compare unit 252 compares the fingerprint data with the predetermined fingerprint data. If the compare result is a valid result, the procedure goes to step S308. If the compare result is an invalid result, the procedure goes to step S304.
Also referring to
In sub-step S502, the detector unit 242 detects a sudden disconnection of the main power source 30 when the main power source 30 is detached. In sub-step S504, the management unit 240 draws power from the subsidiary power source 27. After that, the procedure goes to step S304.
It is to be understood, however, that even though numerous characteristics and advantages of the present invention have been set forth in the foregoing description, together with details of the structure and function of the invention, the disclosure is illustrative only, and changes may be made in detail, especially in matters of shape, size, and arrangement of parts within the principles of the invention to the full extent indicated by the broad general meaning of the terms in which the appended claims are expressed.
Number | Date | Country | Kind |
---|---|---|---|
200710202506.0 | Nov 2007 | CN | national |