WO2015085940A1 - Procede antivol de terminal mobile et client de terminal mobile - Google Patents
Procede antivol de terminal mobile et client de terminal mobile Download PDFInfo
- Publication number
- WO2015085940A1 WO2015085940A1 PCT/CN2014/093636 CN2014093636W WO2015085940A1 WO 2015085940 A1 WO2015085940 A1 WO 2015085940A1 CN 2014093636 W CN2014093636 W CN 2014093636W WO 2015085940 A1 WO2015085940 A1 WO 2015085940A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- theft
- command
- mobile terminal
- account
- instruction
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/22—Processing or transfer of terminal data, e.g. status or physical capabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
- H04M1/67—Preventing unauthorised calls from a telephone set by electronic means
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
- H04M1/724631—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device by limiting the access to the user interface, e.g. locking a touch-screen or a keypad
Definitions
- the present invention relates to the field of Internet applications, and in particular, to a mobile terminal anti-theft method and a client.
- the user can only turn on the anti-theft function of the mobile terminal before the mobile terminal is lost. If the mobile terminal is lost before the anti-theft function is turned on, the thief can prevent the owner from retrieving the mobile terminal by turning off the mobile terminal or performing a flashing operation on the mobile terminal. For example, if the user turns on the anti-theft function in the mobile phone, after the mobile phone is lost, the user can obtain information about the thief and the stolen mobile terminal through the anti-theft function of the mobile phone. If the user does not turn on the mobile phone anti-theft before the mobile phone is lost, the anti-theft function cannot be used to obtain the above information, and the stolen mobile phone cannot be recovered.
- the mobile terminal may not use various anti-theft functions to obtain information about the thief and the stolen mobile terminal, thereby increasing the difficulty of the mobile terminal to retrieve, and cannot effectively combat Stealing crime.
- the thief can continue to use the stolen mobile terminal.
- the thief prevents the owner from retrieving the stolen mobile terminal by brushing the mobile terminal or unplugging the mobile terminal battery, and the owner cannot protect the mobile terminal after the terminal is stolen.
- the owner cannot retrieve the stolen terminal, resulting in property loss, and the user data stored in the mobile terminal and the like are lost as the mobile terminal is lost or even cause more unpredictable losses. .
- the present invention has been made in order to provide a mobile terminal anti-theft method and client that overcomes the above problems or at least partially solves or alleviates the above problems.
- a mobile terminal anti-theft method is provided, which is applicable to an anti-theft function that is not turned on.
- the mobile terminal includes: receiving a background anti-theft open command from the server, wherein the background anti-theft open command carries the verification information of the mobile terminal; parsing the background anti-theft open command, acquiring the verification information, and performing verification; After the verification is passed, the anti-theft function is turned on in the background according to the background opening anti-theft command.
- the present invention further provides a mobile terminal anti-theft client, which is disposed on a mobile terminal that does not have an anti-theft function, and includes: a receiving module configured to receive a background anti-theft opening command from the server, wherein the background anti-theft opening instruction carries The verification information of the mobile terminal; the parsing module is configured to parse the background anti-theft account opening instruction, obtain the verification information and perform verification; and the anti-theft opening module is configured to open in the background according to the background opening anti-theft command if the verification is passed Anti-theft function.
- the background anti-theft opening command can be sent to the mobile terminal through the server.
- the server After receiving the background anti-theft open command, it parses and verifies it to ensure that the received background anti-theft command is a real and valid and reliable command, avoiding receiving background anti-theft commands sent from untrusted or malicious servers, causing the mobile terminal to open incorrectly.
- Anti-theft function If the malicious server maliciously locks the mobile terminal using the anti-theft function, causing all or part of the functions of the mobile terminal to be unavailable, the user may be adversely affected.
- the embodiment of the present invention turns on the anti-theft function in the background of the mobile terminal according to the background opening anti-theft command, which solves the problem that the anti-theft function cannot be opened after the mobile terminal is lost in the prior art.
- the method of remotely opening the anti-theft function enables the lost mobile terminal to open the anti-theft without being retrieved, thereby improving the security of the mobile terminal, and the verification function also prevents the mobile terminal from being maliciously turned on by the anti-theft function. Improve the security of mobile terminals.
- the embodiment of the present invention can open the anti-theft function of the mobile terminal after the mobile terminal is lost, and then perform the corresponding anti-theft operation according to the anti-theft instruction, thereby achieving the beneficial effect of more reasonable and effective guarantee of the security of the mobile terminal and combating theft crime.
- a mobile terminal anti-theft method includes: receiving an anti-theft instruction from a sender, wherein the anti-theft instruction uses a short message as a transmission carrier; and parsing the anti-theft instruction to obtain a corresponding instruction An anti-theft command; performing an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
- the present invention also provides a mobile terminal anti-theft client, comprising: a receiving module configured to receive an anti-theft command from a sender, wherein the anti-theft command uses a short message as a sending carrier; and the parsing module is configured to parse the anti-theft command Obtaining an anti-theft command corresponding to the instruction; and executing an module configured to perform an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
- the anti-theft command from the sender that uses the short message as the transmission carrier is received, the anti-theft command is obtained by parsing the anti-theft command, and the corresponding anti-theft operation can be performed according to the anti-theft command. Therefore, the anti-theft command in the embodiment of the present invention is from a device or a terminal capable of sending a short message, and a device or a terminal capable of sending a short message (such as a mobile phone, a computer, a tablet, etc.) can be realized, so that the anti-theft of the mobile terminal can be realized conveniently and quickly.
- a short message such as a mobile phone, a computer, a tablet, etc.
- the use of other devices or terminals capable of sending short messages can enable the anti-theft function of the mobile terminal to avoid theft of the anti-theft function by the mobile terminal itself, as the prior art says.
- the embodiment of the present invention can still receive the anti-theft instruction of the sender, and obtain the anti-theft command according to the anti-theft instruction. Perform anti-theft operations. For example, after the user mobile terminal is lost, by sending an anti-theft command to the stolen mobile terminal, the embodiment of the present invention can perform a lock screen operation on the stolen mobile terminal to prevent the thief from using the mobile terminal.
- the embodiment of the present invention can also obtain the identity information of the thief (such as a photo of the thief, a fingerprint, etc.). After the identity information of the thief is obtained according to the embodiment of the present invention, the thief can be arrested according to the identity identification information. Therefore, the embodiment of the present invention can effectively prevent theft of the terminal after the terminal is stolen, and reduce the crime rate of theft and protect the security of the user property.
- a mobile terminal anti-theft method includes: receiving an anti-theft instruction from a server, wherein the anti-theft instruction is sent to the server by an activated account; parsing the anti-theft instruction to obtain the The anti-theft command corresponding to the instruction; performing the operation corresponding to the anti-theft command to implement the anti-theft of the mobile terminal.
- the present invention also provides a mobile terminal anti-theft client, comprising: a receiving module configured to receive an anti-theft command from a server, wherein the anti-theft instruction is sent to the server by an activated account; and the parsing module is configured as an analysis The anti-theft command is obtained, and the anti-theft command corresponding to the instruction is obtained; and the execution module is configured to perform an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
- the anti-theft instruction forwarded by the server from the activated account is received, the anti-theft command is obtained by parsing the anti-theft command, and the corresponding anti-theft operation can be performed according to the anti-theft command.
- the anti-theft command in the embodiment of the present invention is from a device or terminal capable of logging in to the activated account, and the device or the terminal is required to send the anti-theft command by using the activated account, and the activated account is used to send a short message or a network command. All of them can send anti-theft commands.
- the embodiment of the present invention can still receive the anti-theft instruction of the sender, and perform the anti-theft operation according to the anti-theft command obtained by analyzing the anti-theft instruction.
- the embodiment of the present invention can perform a lock screen operation on the stolen mobile terminal to prevent the thief from using the mobile terminal.
- the inability of the thief to use the mobile terminal causes the thief to fail to renovate the mobile terminal by brushing the machine, and the thief cannot resell the stolen mobile terminal for profit. Further, the probability of theft crime can be effectively reduced.
- the embodiment of the present invention can also obtain the identity information of the thief (such as a photo of the thief, a fingerprint, etc.).
- the thief After the identity information of the thief is obtained according to the embodiment of the present invention, the thief can be arrested according to the identity identification information. Therefore, the embodiment of the present invention can effectively prevent theft of the terminal after the terminal is stolen, and reduce the crime rate of theft and protect the security of the user property.
- a mobile terminal anti-theft method includes: receiving a personal electric power The anti-theft command of the brain PC terminal; parsing the anti-theft command to obtain an anti-theft command corresponding to the instruction; and performing an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
- the present invention further provides a mobile terminal anti-theft client, comprising: a receiving module configured to receive an anti-theft command from a personal computer PC terminal; and an analysis module configured to parse the anti-theft command to obtain an anti-theft command corresponding to the instruction; The module is configured to perform an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
- the anti-theft command from the PC terminal is received, the anti-theft command is obtained by parsing the anti-theft command, and the corresponding anti-theft operation can be performed according to the anti-theft command.
- the anti-theft command in the embodiment of the present invention comes from being able to use the PC terminal to open and use the anti-theft function of the mobile terminal on the premise that the stolen mobile terminal does not have the anti-theft function turned on.
- the use of a PC terminal to send an anti-theft command is simple in operation, so that the anti-theft of the mobile terminal can be realized conveniently and quickly, and the anti-theft function can be provided to perform anti-theft on the mobile terminal.
- the embodiment of the present invention can still receive the anti-theft instruction of the sender, and perform the anti-theft operation according to the anti-theft command obtained by analyzing the anti-theft instruction. For example, after the user mobile terminal is lost, by sending an anti-theft command to the stolen mobile terminal, the embodiment of the present invention can perform a lock screen operation on the stolen mobile terminal to prevent the thief from using the mobile terminal. The inability of the thief to use the mobile terminal causes the thief to fail to renovate the mobile terminal by brushing the machine, and the thief cannot resell the stolen mobile terminal for profit.
- the embodiment of the present invention can also obtain the identity information of the thief (such as a photo of the thief, a fingerprint, etc.). After the identity information of the thief is obtained according to the embodiment of the present invention, the thief can be arrested according to the identity identification information. Therefore, the embodiment of the present invention can effectively prevent theft of the terminal after the terminal is stolen, and reduce the crime rate of theft and protect the security of the user property.
- the identity information of the thief such as a photo of the thief, a fingerprint, etc.
- a mobile terminal anti-theft method includes: determining identity information of the sender according to an anti-theft instruction from a sender; and initiating an anti-theft policy matching the sender identity information to parse the The anti-theft command obtains an anti-theft command corresponding to the instruction; and performs an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
- the present invention also provides a mobile terminal anti-theft client, comprising: a determining module configured to determine identity information of the sender according to an anti-theft command from a sender; and a parsing module configured to initiate matching with the sender identity information
- the anti-theft policy resolves the anti-theft command to obtain an anti-theft command corresponding to the instruction; and the execution module is configured to perform an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
- the identity information of the sender can be determined according to the anti-theft command from the sender, the anti-theft policy matching the sender identity information is activated to parse the anti-theft command, the anti-theft command corresponding to the instruction is obtained, and the anti-theft command is executed. Operation to achieve anti-theft of the mobile terminal.
- the anti-theft command in the embodiment of the present invention may be from a device or terminal capable of sending a short message (such as a sender of the anti-theft command being a mobile terminal or a server or a personal computer), or may be from a device or terminal capable of transmitting a network command.
- the embodiment of the present invention After determining the identity information of the sender, the embodiment of the present invention initiates an anti-theft policy that matches the identity information of the sender to parse the anti-theft command, and obtains a corresponding anti-theft command, so as to ensure that the anti-theft protection can be performed on the mobile terminal according to the user's need to select an appropriate anti-theft policy.
- an anti-theft policy can be matched to perform anti-theft protection on the mobile terminal, and multiple anti-theft policies can be matched to simultaneously protect the mobile terminal against theft, thereby enhancing the security of the mobile terminal.
- the embodiment of the present invention after the mobile terminal is stolen, the anti-theft command of the sender can still be received, and the anti-theft operation is performed according to the anti-theft command obtained by parsing the anti-theft command.
- the embodiment of the present invention can perform a lock screen operation on the stolen mobile terminal to prevent the thief from using the mobile terminal.
- the inability of the thief to use the mobile terminal causes the thief to fail to renovate the mobile terminal by brushing the machine, and the thief cannot resell the stolen mobile terminal for profit. Further, the probability of theft crime can be effectively reduced.
- the embodiment of the present invention can also obtain the identity information of the thief (such as a photo of the thief, a fingerprint, etc.). After the identity information of the thief is obtained according to the embodiment of the present invention, the thief can be arrested according to the identity identification information. Therefore, the embodiment of the present invention can effectively prevent theft of the terminal after the terminal is stolen, and reduce the crime rate of theft and protect the security of the user property.
- the identity information of the thief such as a photo of the thief, a fingerprint, etc.
- a computer program comprising computer readable code that, when executed on a computing device, causes the computing device to perform a mobile terminal provided by an embodiment of the present invention Anti-theft method.
- a computer readable medium storing a computer program for performing an antitheft method for a mobile terminal provided by an embodiment of the present invention is provided.
- FIG. 1 is a flowchart showing a process of a mobile terminal anti-theft method according to an embodiment of the present invention
- FIG. 2 is a schematic structural diagram of a mobile terminal anti-theft client according to an embodiment of the present invention.
- FIG. 3 is a flowchart showing a process of a mobile terminal anti-theft method according to still another embodiment of the present invention.
- FIG. 4 is a flowchart showing a process of registering a short message interception function according to an embodiment of the present invention
- FIG. 5 is a flowchart showing a process of a short message receiving processing method according to an embodiment of the present invention
- FIG. 6 shows a process flow diagram of a method of pre-storing a verification code in accordance with a preferred embodiment of the present invention
- FIG. 7 is a flowchart showing a process of polling a command execution situation according to an embodiment of the present invention.
- FIG. 8 is a flowchart showing a process of a method for querying a receipt according to an embodiment of the present invention.
- FIG. 9 is a flowchart showing a process of a mobile terminal anti-theft method according to still another preferred embodiment of the present invention.
- FIG. 10 is a flowchart showing a process of a mobile terminal anti-theft method on a mobile phone side of a family member and a friend according to an embodiment of the present invention
- FIG. 11 is a flowchart showing a process of a mobile terminal anti-theft method on the side of a stolen mobile phone according to an embodiment of the present invention
- FIG. 12 is a schematic structural diagram of a mobile terminal anti-theft client according to still another embodiment of the present invention.
- FIG. 13 is a flowchart showing a process of a mobile terminal anti-theft method according to still another embodiment of the present invention.
- FIG. 14 is a flowchart showing a process of a method of turning on an anti-theft function according to still another embodiment of the present invention.
- FIG. 15 is a flowchart showing a process of a method of unbinding according to an embodiment of the present invention.
- 16 is a flowchart showing a process of a mobile terminal anti-theft method according to still another preferred embodiment of the present invention.
- 17 is a flowchart showing a process of transmitting an anti-theft instruction on an activated account side according to an embodiment of the present invention
- FIG. 18 is a flowchart of a method for preventing theft of a side of a mobile terminal according to an embodiment of the present invention.
- FIG. 19 is a schematic structural diagram of a mobile terminal anti-theft client according to still another embodiment of the present invention.
- FIG. 20 is a flowchart showing a process of a mobile terminal anti-theft method according to still another embodiment of the present invention.
- 21 is a flowchart showing a process of a method for activating a mobile phone anti-theft function on a side of a PC terminal according to an embodiment of the present invention
- FIG. 22 is a flow chart showing the processing of the anti-theft method on the side of the mobile phone according to still another embodiment of the present invention.
- FIG. 23 is a schematic structural diagram of a mobile terminal anti-theft client according to still another embodiment of the present invention.
- FIG. 24 is a flowchart showing a process of a mobile terminal anti-theft method according to still another embodiment of the present invention.
- FIG. 25 is a flowchart showing a process of registering a short message interception function according to still another embodiment of the present invention.
- 26 is a process flow diagram of a method of determining an anti-theft policy, in accordance with one embodiment of the present invention.
- FIG. 27 is a flowchart showing a process of mutually exclusive querying a command execution situation according to an embodiment of the present invention.
- FIG. 28 is a schematic structural diagram of a mobile terminal anti-theft client according to still another embodiment of the present invention.
- 29 is a block diagram schematically showing a computing device for performing a mobile terminal theft prevention method according to the present invention.
- Fig. 30 schematically shows a storage unit for holding or carrying program code implementing the mobile terminal anti-theft method according to the present invention.
- the anti-theft function if the anti-theft function is not turned on before the mobile terminal is lost, after the mobile terminal is lost, the anti-theft function cannot be remotely opened and used, resulting in a bad result that the mobile terminal cannot be retrieved after being lost.
- FIG. 1 is a flow chart showing the processing of a mobile terminal anti-theft method according to an embodiment of the present invention. As shown in FIG. 1, the flow includes at least steps S102 to S106.
- Step S102 Receive a background anti-theft open command from the server, where the background anti-theft open command carries the verification information of the mobile terminal.
- Step S104 Parsing the background anti-theft opening instruction, obtaining the verification information, and performing verification.
- Step S106 If the verification is passed, the anti-theft function is turned on in the background according to the anti-theft command in the background.
- the background anti-theft opening command can be sent to the mobile terminal through the server.
- the server After receiving the background anti-theft open command, it parses and verifies it to ensure that the received background anti-theft command is a real and valid and reliable command, avoiding receiving background anti-theft commands sent from untrusted or malicious servers, causing the mobile terminal to open incorrectly.
- Anti-theft function If the malicious server maliciously locks the mobile terminal using the anti-theft function, causing all or part of the functions of the mobile terminal to be unavailable, the user may be adversely affected.
- the embodiment of the present invention turns on the anti-theft function in the background of the mobile terminal according to the background opening anti-theft command, which solves the problem that the anti-theft function cannot be opened after the mobile terminal is lost in the prior art.
- the method of remotely opening the anti-theft function enables the lost mobile terminal to open the anti-theft without being retrieved, thereby improving the security of the mobile terminal, and the verification function also prevents the mobile terminal from being maliciously turned on by the anti-theft function. Improve the security of mobile terminals.
- the embodiment of the present invention can open the anti-theft function of the mobile terminal after the mobile terminal is lost, and then perform the corresponding anti-theft operation according to the anti-theft instruction, thereby achieving the beneficial effect of more reasonable and effective guarantee of the security of the mobile terminal and combating theft crime.
- the background anti-theft command carries the verification information of the mobile terminal.
- the authentication information of the mobile terminal may include a unique identity of the mobile terminal and at least one Subscriber Identity Module (SIM) card number, which may include the unique identity of the mobile terminal.
- SIM Subscriber Identity Module
- the identifier and the account information of the user may also include the unique identity of the mobile terminal, the at least one SIM card number, and the account information of the user.
- the verification information may also include other information that can be verified by the mobile terminal, such as the hardware configuration of the mobile terminal, the hardware identification ID of the mobile terminal, the system version number of the mobile terminal, and the like.
- the embodiment of the present invention is preferably an International Mobile Equipment Identity (IMEI number) of the mobile terminal.
- IMEI number itself is permanently bound to the mobile terminal and is unique and has high recognizability. Therefore, in the embodiment of the present invention, the preferred IMEI number is the unique identity of the mobile terminal.
- the mobile anti-theft method provided by the embodiment of the present invention will be described in detail by taking different verification information as an example.
- three sets of verification information are selected, which are respectively a first group of verification information including an IMEI of the mobile terminal and at least one SIM card number, including an IMEI of the mobile terminal and a second group of verification information of the account information of the user, and simultaneously The third group of verification letters including the IMEI of the mobile terminal, the at least one SIM card number, and the account information of the user interest.
- the verification information of the mobile terminal includes an IMEI of the mobile terminal and at least one SIM card number.
- the embodiment of the present invention After receiving the anti-theft open command carrying the verification information, the embodiment of the present invention performs step S104 as shown in FIG. 1 , parses the received background anti-theft open command, and obtains the verification information carried by the background anti-theft open command. After obtaining the verification information, the embodiment of the present invention separately verifies the IMEI and the at least one SIM card number in the verification information. First, the embodiment of the present invention verifies the IMEI in the verification information. If the IMEI in the verification information matches the IMEI of the mobile terminal, the IMEI in the verification information passes the verification.
- the embodiment of the present invention verifies the SIM card number in the verification information. If at least one SIM card number in the verification information matches the SIM card number in the contact list of the mobile terminal, the SIM card number in the verification information passes the verification. In addition, in the embodiment of the present invention, it is also possible to first verify that at least one SIM card number matches the SIM card number in the contact list of the mobile terminal, and secondly, verify the IMEI in the verification information. In the embodiment of the present invention, the verification order of the IMEI and the at least one SIM card number included in the verification information is not limited.
- the number of the SIM card numbers included in the verification information in the embodiment of the present invention may be any integer value other than 0, which is not limited by the embodiment of the present invention.
- the verification information includes four SIM card numbers, and only one of the SIM card numbers matches the SIM card number in the contact list of the mobile terminal, and the other three SIM card numbers do not match the SIM card number in the contact list of the mobile terminal.
- the SIM card number in the verification information is verified. For example, if the verification information includes only one SIM card number, and the SIM card number matches the SIM card number in the contact list of the mobile terminal, the SIM card number in the verification information passes the verification.
- the contact list of the user's mobile terminal may change from time to time due to factors such as job change, work place change, and the like.
- the SIM card number included in the verification information matches a SIM card number in the contact list of the mobile terminal, the SIM card number in the verification information passes the verification. After the SIM card number in the verification information passes the verification, the SIM card number is identified as a trusted number.
- the verified SIM card numbers are all identified as trusted numbers, so that in the subsequent operations, the anti-theft commands sent by any trusted number can be identified.
- the embodiment of the present invention performs an anti-theft operation according to the anti-theft instruction sent by the trusted number.
- the verification information if the IMEI in the verification information passes the verification, and the SIM card number does not match the SIM card number in the contact list of the mobile terminal, the verification information cannot pass the verification. Similarly, when at least one SIM card number in the verification information matches the SIM card number in the contact list of the mobile terminal, but the IMEI in the verification information does not match the IMEI of the mobile terminal, the verification information cannot pass. In the embodiment of the present invention, when both types of information included in the verification information are verified, the verification information is verified to ensure that the user's mobile terminal does not open the anti-theft command due to the malicious operation of the unscrupulous person or the user's mistake operation, thereby avoiding unnecessary In the case of opening the anti-theft function to the user.
- step S106 the embodiment of the present invention turns on the anti-theft function in the background according to the anti-theft command in the background.
- the embodiment of the present invention parses the anti-theft command and executes the anti-theft operation corresponding to the anti-theft command.
- the SIM card number identified as a trusted number refers to a trusted SIM card number that is authenticated and bound to the mobile terminal.
- the embodiment of the present invention receives the anti-theft instruction sent by the SIM card number identified as the trusted number.
- the embodiment of the invention can perform corresponding anti-theft operation according to the anti-theft instruction, avoid the loss of the mobile terminal, or provide a clue for retrieving the mobile terminal after the mobile terminal is lost.
- the embodiment of the present invention can enable the anti-theft function of the lost mobile phone through the server.
- the embodiment of the present invention sends an anti-theft command to the mobile phone through the bound relatives and friends. After receiving the anti-theft command, the mobile phone can automatically lock the screen or feedback the replaced SIM card number to the server or return the real-time location of the mobile phone to the server according to the anti-theft command, thereby helping the owner to retrieve the stolen mobile phone.
- the verification information of the mobile terminal includes the IMEI and the account information of the user.
- the embodiment of the present invention After receiving the anti-theft open command carrying the verification information, the embodiment of the present invention performs step S104 as shown in FIG. 1 , parses the received background anti-theft open command, and obtains the verification information carried by the background anti-theft open command. After obtaining the verification information, the embodiment of the present invention verifies the IMEI in the verification information and the account information of the user.
- the embodiment of the present invention verifies the IMEI in the verification information. If the IMEI in the verification information matches the IMEI of the mobile terminal, the IMEI in the verification information passes the verification. Secondly, after the IMEI in the verification information passes the verification, the account information of the login user of the embodiment of the present invention acquires an identifier (Identity, hereinafter referred to as ID) of the account.
- ID an identifier
- the user account information in the embodiment of the present invention may be a user name and a password, and may be a user name and a verification code randomly selected by the system, and may also be a user's email account, etc., which is not limited by the embodiment of the present invention.
- the user name and password are selected as the user account information.
- using the user name and password as the account information to log in can reasonably and effectively ensure the security of the user account.
- the user name and the randomly selected verification code are used as the account, although it is only necessary to remember the user name and no password, it is convenient, but lacks security.
- the embodiment of the present invention uses the username and password to log in to the account information to obtain the ID of the account.
- the embodiment of the present invention After obtaining the account ID, the embodiment of the present invention sends the account ID to the server, and the account ID is verified by the server. After receiving the verification result obtained by the server, the embodiment of the present invention determines whether the account information of the user passes the verification. If the user's account information is verified, the embodiment of the present invention determines that the verification information is verified. If the user's account information does not pass the verification, the embodiment of the present invention determines that the verification information has not passed the verification.
- the IMEI in the verification information may be first verified. Secondly, the account information of the user in the verification information is verified. The embodiment of the present invention may also first verify the account information of the user, and secondly, verify the IMEI in the verification information. The embodiment of the present invention does not limit the order of the IMEI in the verification verification information and the account information of the user. The verification of the IMEI in the verification information only requires the embodiment of the present invention to obtain its own IMEI and match the two IMEIs. To verify the user account information in the verification information, the account information of the user is required to be logged in the embodiment of the present invention. After the account ID is obtained, the account ID is sent to the server for verification.
- the step of verifying the user's account information is more cumbersome and complicated than verifying the IMEI. Therefore, it is preferred in the embodiment of the invention to first verify the IMEI. After the IMEI in the verification information passes the verification, the account information of the user in the verification information is verified to ensure that the verification information is verified more efficiently.
- the verification information when both types of information included in the verification information are verified, the verification information is verified, and the user's mobile terminal is not opened by the malicious operation of the unscrupulous user or the user's mistake operation. Instructions to avoid the trouble of turning on the anti-theft function in unnecessary situations.
- step S104 After the verification information is verified, the step S104 is completed, and the embodiment of the present invention continues to perform step S106.
- step S106 when the verification information is verified, the embodiment of the present invention turns on the anti-theft function in the background according to the received background anti-theft opening instruction.
- the embodiment of the present invention parses the anti-theft command and executes the anti-theft operation corresponding to the anti-theft command. For example, after the user's mobile phone is lost, if the lost phone of the user is not bound with a trusted number, the user can log in to the server to enable the anti-theft function of the lost mobile phone.
- the embodiment of the present invention can log in to the registered account and send an anti-theft command to the mobile phone through the unique account ID in the account.
- the mobile phone can automatically lock the screen or feedback the replaced SIM card number to the server or return the real-time location of the mobile phone to the server according to the anti-theft command, thereby helping the owner to retrieve the stolen mobile phone.
- the verification information of the mobile terminal includes the IMEI, the at least one SIM card number, and the account information of the user.
- the embodiment of the present invention After receiving the anti-theft open command carrying the verification information, the embodiment of the present invention performs step S104 as shown in FIG. 1 , parses the received background anti-theft open command, and obtains the verification information carried by the background anti-theft open command.
- the embodiment of the present invention verifies the IMEI in the verification information, the at least one SIM card number, and the account information division of the user.
- the embodiment of the present invention verifies the IMEI in the verification information.
- the embodiment of the present invention verifies the SIM card number in the verification information. If at least one SIM card number in the verification information matches the SIM card number in the contact list of the mobile terminal, the SIM card number in the verification information passes the verification. In addition, in the embodiment of the present invention, it is also possible to first verify that at least one SIM card number matches the SIM card number in the contact list of the mobile terminal, and secondly, verify the IMEI in the verification information, which is not used in the embodiment of the present invention. limited.
- the format of the SIM card number included in the verification information in the embodiment of the present invention may be any integer value other than 0, which is not limited by the embodiment of the present invention.
- the verification information includes two SIM card numbers, one of which matches the SIM card number in the contact list of the mobile terminal, and the other SIM card number does not match the SIM card number in the contact list of the mobile terminal.
- the SIM card number in the verification information is verified.
- the contact list of the user's mobile terminal may change from time to time due to factors such as the change of position, the change of the location of the Principality. Therefore, in the embodiment of the present invention, if the SIM card number included in the verification information matches a SIM card number in the contact list of the mobile terminal, the SIM card number in the verification information passes the verification.
- the embodiment of the present invention continues to verify the account information of the user in the verification information.
- the user account information in the embodiment of the present invention may be a user name and a password, and may be a user name and a verification code randomly selected by the system, or may be a user email account, etc., and the implementation of the present invention This example does not limit this.
- the user name and password are selected as the user account information. In actual use, using the user name and password as the account information to log in can reasonably and effectively ensure the security of the user account.
- the embodiment of the present invention uses the username and password to log in to the account information to obtain the ID of the account.
- the embodiment of the present invention After obtaining the account ID, the embodiment of the present invention sends the account ID to the server, and the account ID is verified by the server. After receiving the verification result obtained by the server, the embodiment of the present invention determines whether the account information of the user passes the verification. If the user's account information does not pass the verification, the embodiment of the present invention determines that the verification information has not passed the verification. If the account information of the user is verified, the embodiment of the present invention determines that the verification information passes the verification.
- the verification information of the mobile terminal includes the IMEI, the at least one SIM card number, and the account information of the user, if only three of them simultaneously pass the verification, the verification information passes the verification. For example, when the IMEI and the at least one SIM card number in the verification information pass the verification, but the user account information in the verification information fails the verification, the verification information fails the verification. In addition, in the embodiment of the present invention, if the IMEI in the verification information is first verified, and the IMEI fails to pass the verification, the SIM card number in the verification information and the account information of the user need not be verified, and the verification information cannot pass the verification.
- the verification information when all the information included in the verification information is verified, the verification information is verified, so that the user's mobile terminal does not open the anti-theft command due to the malicious operation of the unscrupulous person or the user's mistake operation, thereby avoiding unnecessary In the case of turning on the anti-theft function to bring trouble to the user.
- step S104 After the verification information is verified, the step S104 is completed, and the embodiment of the present invention continues to perform step S106.
- step S106 when the verification information is verified, the embodiment of the present invention turns on the anti-theft function in the background according to the received background anti-theft opening instruction.
- the embodiment of the present invention parses the anti-theft instruction and executes the anti-theft operation corresponding to the anti-theft instruction. For example, after the user's mobile phone is lost, the embodiment of the present invention can log in to the server to send a background anti-theft open command to the lost mobile phone.
- the embodiment of the present invention can send an anti-theft command to the lost mobile phone through the bound friend number or the ID in the registered user account information.
- the mobile phone can automatically lock the screen or feedback the replaced SIM card number to the server or return the real-time location of the mobile phone to the server according to the anti-theft command, thereby helping the owner to retrieve the stolen mobile phone.
- the mobile terminal anti-theft method provided by the above preferred embodiments is based on the same inventive concept.
- the embodiment of the present invention provides a client, which is disposed on a mobile terminal that does not have an anti-theft function, to implement the anti-theft method of the mobile terminal.
- FIG. 2 is a schematic structural diagram of a mobile terminal anti-theft client according to an embodiment of the present invention.
- the client in the embodiment of the present invention includes at least a receiving module 210, a parsing module 220, and an anti-theft opening module 230.
- the receiving module 210 is configured to receive a background anti-theft opening command from the server, where the background anti-theft opening command carries the verification information of the mobile terminal.
- the parsing module 220 is coupled to the receiving module 210 and configured to parse the background anti-theft opening command, obtain verification information, and perform verification.
- the anti-theft opening module 230 is coupled to the parsing module 220 and configured to enable the anti-theft function in the background according to the anti-theft command in the background.
- the receiving module 210 shown in FIG. 2 receives a background anti-theft opening command from the server.
- the backend anti-theft command of the server carries the verification information of the mobile terminal.
- the verification information of the mobile terminal may include the unique identity of the mobile terminal and the at least one SIM card number, and may include the unique identity of the mobile terminal and the account information of the user.
- the mobile phone's unique identity, at least one SIM card number, and the user's account information may be included at the same time.
- the embodiment of the present invention is preferably an IMEI.
- the IMEI itself is permanently bound to the mobile terminal and is unique and has high recognizability. Therefore, in the embodiment of the present invention, the IMEI is preferably a unique identifier of the mobile terminal.
- the mobile anti-theft client provided by the embodiment of the present invention will be described in detail by taking different authentication information as an example.
- three sets of verification information are selected, which are respectively a first group of verification information including an IMEI of the mobile terminal and at least one SIM card number, including an IMEI of the mobile terminal and a second group of verification information of the account information of the user, and simultaneously
- the third group of verification information includes the IMEI of the mobile terminal, the at least one SIM card number, and the account information of the user.
- the verification information of the mobile terminal includes an IMEI of the mobile terminal and at least one SIM card number.
- the parsing module 220 is triggered.
- the anti-theft open command is parsed, and the verification information carried by the background anti-theft open command is obtained.
- the parsing module 220 continues to verify the IMEI and the at least one SIM card number in the verification information respectively. First, the parsing module 220 verifies the IMEI in the verification information.
- the parsing module 220 verifies the SIM card number in the verification information. If at least one SIM card number in the verification information matches the SIM card number in the contact list of the mobile terminal, the SIM card number in the verification information passes the verification. In addition, the parsing module 220 in the embodiment of the present invention may also first verify that at least one SIM card number matches the SIM card number in the contact list of the mobile terminal, and secondly, verify the IMEI in the verification information. In the embodiment of the present invention, the verification order of the IMEI and the at least one SIM card number included in the verification information is not limited.
- the number of the SIM card numbers included in the verification information in the embodiment of the present invention may be any integer value other than 0, which is not limited by the embodiment of the present invention.
- the verification information includes four SIM card numbers, and only one of the SIM card numbers matches the SIM card number in the contact list of the mobile terminal, and the other three SIM card numbers do not match the SIM card number in the contact list of the mobile terminal.
- the SIM card number in the verification information is verified.
- the verification information includes only one SIM card number, and the SIM card number matches the SIM card number in the contact list of the mobile terminal, the SIM card number in the verification information passes the verification.
- the contact list of the user's mobile terminal may change from time to time due to factors such as job change, work place change, and the like. Therefore, the present invention In an embodiment, if the SIM card number included in the verification information matches a SIM card number in the contact list of the mobile terminal, the SIM card number in the verification information passes the verification.
- the verification information if the IMEI in the verification information passes the verification, and the SIM card number does not match the SIM card number in the contact list of the mobile terminal, the verification information cannot pass the verification. Similarly, when at least one SIM card number in the verification information matches the SIM card number in the contact list of the mobile terminal, but the IMEI in the verification information does not match the IMEI of the mobile terminal, the verification information cannot pass. In the embodiment of the present invention, when both types of information included in the verification information are verified, the verification information is verified to ensure that the user's mobile terminal does not open the anti-theft command due to the malicious operation of the unscrupulous person or the user's mistake operation, thereby avoiding unnecessary In the case of opening the anti-theft function to the user.
- the rejection module 240 is triggered. After the rejection module 240 is triggered, the background anti-theft instruction is refused to be executed. If the verification information passes the verification according to the parsing module 220, the anti-theft opening module 230 shown in FIG. 2 turns on the anti-theft function in the background according to the anti-theft command in the background. After the anti-theft function is turned on, the trust identification module 250 coupled with the anti-theft opening module 230 identifies that at least one SIM card number that has passed the verification is a trusted SIM card number.
- the anti-theft processing module 260 When receiving the anti-theft instruction sent by the SIM card number identified as the trusted number, the anti-theft processing module 260 performs a corresponding anti-theft operation according to the anti-theft instruction, avoids the loss of the mobile terminal, or provides the retrieval of the mobile after the mobile terminal is lost. The clue of the terminal.
- the second group of verification information is taken as an example for description.
- the verification information of the mobile terminal includes the IMEI and the account information of the user.
- the parsing module 220 is triggered.
- the parsing module 220 parses the received background anti-theft open command, and obtains the verification information carried by the background anti-theft open command.
- the parsing module 220 verifies the IMEI in the verification information and the account information of the user.
- the parsing module 220 verifies the IMEI in the verification information. If the IMEI in the verification information matches the IMEI of the mobile terminal, the IMEI in the verification information passes the verification. Secondly, after the IMEI in the verification information passes the verification, the account information of the login user of the embodiment of the present invention acquires the ID of the account.
- the user account information in the embodiment of the present invention may be a user name and a password, and may be a user name and a verification code randomly selected by the system, and may also be a user's email account, etc., which is not limited by the embodiment of the present invention.
- the user name and password are selected as the user account information.
- using the user name and password as the account information to log in can reasonably and effectively ensure the security of the user account.
- the user name and the randomly selected verification code are used as the account, although it is only necessary to remember the user name and no password, it is convenient, but lacks security.
- the embodiment of the present invention uses the username and password to log in to the account information to obtain the ID of the account.
- the parsing module 220 After obtaining the account ID, the parsing module 220 verifies the account ID by sending the account ID to the server. After receiving the verification result obtained by the server, the parsing module 220 determines whether the account information of the user passes the verification. If the account information of the user passes the verification, the parsing module 220 determines that the verification information passes the verification. The anti-theft opening module 230 is triggered. The anti-theft opening module 230 turns on the anti-theft function in the background. If the user's account information does not pass the verification, the parsing module 220 triggers the rejection module 240. The rejection module 240 refuses to enable the anti-theft function in the background.
- the parsing module 220 may first verify the IMEI in the verification information. Secondly, the account information of the user in the verification information is verified. The parsing module 220 may also first verify the account information of the user, and secondly, verify the IMEI in the verification information.
- the verification of the IMEI in the verification information only requires the embodiment of the present invention to obtain its own IMEI and match the two IMEIs.
- the account information of the user is required to be logged in the embodiment of the present invention. After the account ID is obtained, the account ID is sent to the server for verification.
- the step of verifying the user's account information is more cumbersome and complicated than verifying the IMEI. Therefore, it is preferred in the embodiment of the invention to first verify the IMEI. After the IMEI in the verification information passes the verification, the account information of the user in the verification information is verified to ensure that the verification information is verified more efficiently.
- the anti-theft processing module 260 After the anti-theft opening module 230 turns on the anti-theft function, if the anti-theft processing module 260 receives the anti-theft command sent by the verified account ID, the anti-theft processing module 260 parses the anti-theft instruction. After parsing, the anti-theft processing module 260 performs a corresponding anti-theft operation according to the anti-theft instruction. For example, after the user's mobile phone is lost, the login server sends an anti-theft open command to the lost mobile phone, and the receiving module 210 of the client in the embodiment of the present invention verifies the anti-theft open command after receiving the background anti-theft open command.
- the anti-theft opening module 230 turns on the background anti-theft function, and the anti-theft processing module 260 performs the corresponding operation according to the received anti-theft instruction. For example, according to the received anti-theft command, the automatic lock screen or the feedback of the replaced SIM card number to the server or return to the real-time location of the mobile phone to the server, etc., help the owner to retrieve the stolen mobile phone.
- the verification information of the mobile terminal includes the IMEI, the at least one SIM card number, and the account information of the user.
- the receiving module 210 of the client shown in FIG. 2 receives the anti-theft opening command carrying the verification information
- the parsing module 220 is triggered.
- the parsing module 220 parses the received background anti-theft open command, and obtains the verification information carried by the background anti-theft open command.
- the parsing module 220 verifies the IMEI in the verification information, the at least one SIM card number, and the account information portion of the user.
- the parsing module 220 verifies the IMEI in the verification information.
- the verification module 220 verifies the SIM card number in the verification information. If at least one SIM card number in the verification information matches the SIM card number in the contact list of the mobile terminal, the SIM card number in the verification information passes the verification. In addition, the parsing module 220 may first verify that at least one SIM card number matches the SIM card number in the contact list of the mobile terminal, and secondly, verify the IMEI in the verification information, which is not limited by the embodiment of the present invention.
- the format of the SIM card number included in the verification information in the embodiment of the present invention may be any integer value other than 0, which is not limited by the embodiment of the present invention.
- the verification information includes two SIM card numbers, one of which matches the SIM card number in the contact list of the mobile terminal, and the other SIM card number does not match the SIM card number in the contact list of the mobile terminal.
- the SIM card number in the verification information is verified.
- the contact list of the user's mobile terminal may change from time to time due to factors such as the change of position, the change of the location of the Principality. Therefore, in the embodiment of the present invention, if the SIM card number included in the verification information matches a SIM card number in the contact list of the mobile terminal, the SIM card number in the verification information passes the verification.
- the trust identification module 250 identifies the verified SIM card number as the trusted card number.
- the parsing module 220 continues to verify the account information of the user in the verification information.
- the user account information in the embodiment of the present invention may be a user name and a password, and may be a user name and a verification code randomly selected by the system, and may also be a user's email account, etc., which is not limited by the embodiment of the present invention.
- the user name and password are selected as the user account information. In actual use, using the user name and password as the account information to log in can reasonably and effectively ensure the security of the user account.
- the embodiment of the present invention uses the username and password to log in to the account information to obtain the ID of the account.
- the parsing module 220 After obtaining the account ID, the parsing module 220 sends the account ID to the server, and the server ID verifies the account ID. After receiving the verification result obtained by the server, the parsing module 220 determines whether the account information of the user passes the verification. If the user's account information does not pass the verification, the parsing module 220 determines that the verification information has not passed the verification. If the account information of the user passes the verification, the parsing module 220 determines that the verification information passes the verification.
- the verification information of the mobile terminal includes the IMEI, the at least one SIM card number, and the account information of the user, if only three of them simultaneously pass the verification, the verification information passes the verification. For example, when the IMEI and the at least one SIM card number in the verification information pass the verification, but the user account information in the verification information fails the verification, the verification information fails the verification. In addition, in the embodiment of the present invention, if the IMEI in the verification information is first verified, and the IMEI fails to pass the verification, the SIM card number in the verification information and the account information of the user need not be verified, and the verification information cannot pass the verification.
- the verification information when all the information included in the verification information is verified, the verification information is verified, so that the user's mobile terminal does not open the anti-theft command due to the malicious operation of the unscrupulous person or the user's mistake operation, thereby avoiding unnecessary In the case of turning on the anti-theft function to bring trouble to the user.
- the parsing module 220 in the client determines that the verification information has not passed the verification
- the parsing module 220 triggers the denial module 240.
- the parsing module 220 in the client determines that the verification information passes the verification
- the parsing module 220 triggers the anti-theft opening module 230.
- the anti-theft function is enabled, when the anti-theft processing module 260 receives the anti-theft instruction of the verified account ID, the embodiment of the present invention parses the anti-theft instruction and executes the anti-theft operation corresponding to the anti-theft instruction.
- the login server sends a background anti-theft open command to the lost mobile phone
- the client in the embodiment of the present invention verifies the background anti-theft open command after receiving the background anti-theft open command. If the background anti-theft opening command passes the verification, the anti-theft function is turned on in the background of the mobile phone. After the anti-theft function is enabled in the background of the mobile phone, the anti-theft command can be sent to the lost mobile phone through the bound friend number or the ID in the registered user account information. After receiving the anti-theft command, the mobile phone can automatically lock the screen or feedback the replaced SIM card number to the server or return the real-time location of the mobile phone to the server according to the anti-theft command, thereby helping the owner to retrieve the stolen mobile phone.
- the embodiments of the present invention can achieve the following beneficial effects:
- the background anti-theft open command can be sent to the server to Mobile terminal. After receiving the background anti-theft open command, it parses and verifies it to ensure that the received background anti-theft command is a real and valid and reliable command, avoiding receiving background anti-theft commands sent from untrusted or malicious servers, causing the mobile terminal to open incorrectly.
- Anti-theft function If the malicious server maliciously locks the mobile terminal using the anti-theft function, causing all or part of the functions of the mobile terminal to be unavailable, the user may be adversely affected.
- the embodiment of the present invention turns on the anti-theft function in the background of the mobile terminal according to the background opening anti-theft command, which solves the problem that the anti-theft function cannot be opened after the mobile terminal is lost in the prior art.
- the method of remotely opening the anti-theft function enables the lost mobile terminal to open the anti-theft without being retrieved, thereby improving the security of the mobile terminal, and the verification function also prevents the mobile terminal from being maliciously turned on by the anti-theft function. Improve the security of mobile terminals.
- the embodiment of the present invention can open the anti-theft function of the mobile terminal after the mobile terminal is lost, and then perform the corresponding anti-theft operation according to the anti-theft instruction, thereby achieving the beneficial effect of more reasonable and effective guarantee of the security of the mobile terminal and combating theft crime.
- FIG. 3 is a flow chart showing the processing of the mobile terminal anti-theft method according to an embodiment of the present invention. As shown in FIG. 3, the flow includes at least steps S302 to S306.
- Step S302 Receive an anti-theft command from a sender, where the anti-theft command uses a short message as a transmission carrier.
- Step S304 parsing the anti-theft command, and obtaining an anti-theft command corresponding to the instruction.
- Step S306 performing an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
- the anti-theft command from the sender that uses the short message as the transmission carrier is received, the anti-theft command is obtained by parsing the anti-theft command, and the corresponding anti-theft operation can be performed according to the anti-theft command. Therefore, the anti-theft command in the embodiment of the present invention is from a device or a terminal capable of sending a short message, and a device or a terminal capable of sending a short message (such as a mobile phone, a computer, a tablet, etc.) can be realized, so that the anti-theft of the mobile terminal can be realized conveniently and quickly.
- a short message such as a mobile phone, a computer, a tablet, etc.
- the use of other devices or terminals capable of sending short messages can enable the anti-theft function of the mobile terminal to avoid theft of the anti-theft function by the mobile terminal itself, as the prior art says.
- the embodiment of the present invention can still receive the anti-theft instruction of the sender, and perform the anti-theft operation according to the anti-theft command obtained by analyzing the anti-theft instruction. For example, after the user mobile terminal is lost, by sending an anti-theft command to the stolen mobile terminal, the embodiment of the present invention can perform a lock screen operation on the stolen mobile terminal to prevent the thief from using the mobile terminal.
- the embodiment of the present invention can also obtain the identity information of the thief (such as a photo of the thief, a fingerprint, etc.). After the identity information of the thief is obtained according to the embodiment of the present invention, the thief can be arrested according to the identity identification information. Therefore, the embodiment of the present invention can effectively prevent theft of the terminal after the terminal is stolen, and reduce the crime rate of theft and protect the security of the user property.
- the anti-theft command received by the embodiment of the present invention uses a short message as a transmission carrier.
- the embodiment of the invention registers the short message interception function.
- Figure 4 shows the basis A flowchart of processing a registered short message interception function according to an embodiment of the present invention.
- the embodiment of the present invention first registers a short message interception function. After the registration is completed, the embodiment of the present invention performs step S404 to generate a mapping table corresponding to the anti-theft command and the anti-theft command.
- the mapping table may also be referred to as a “sms-command table”, and the anti-theft command corresponding to the received short message may be found and determined according to the table.
- the anti-theft command and the anti-theft command form a correspondence relationship. For example, “Dingwei#”, “Suoding#”, etc.
- "Dingwei#” in the anti-theft command can find the Locate command in the corresponding anti-theft command in the mapping table.
- "Suoding#" in the anti-theft command can find the corresponding in the mapping table.
- the lock screen (Lock) command in the anti-theft command is the mapping table.
- the anti-theft command stores an identification character identifying the anti-theft command to help identify the anti-theft command in the short message. For example, “#” in “Dingwei#”, “Suoding#”, or “*" before and after the anti-theft command in "*Dingwei*".
- the embodiment of the present invention can identify and intercept the anti-theft instruction in the short message, thereby being able to continue execution. Anti-theft operation.
- the recognized character in this example can be a combination of one or more characters.
- the recognized characters Due to the distinguishing characteristics of the recognized characters, special characters that are not commonly used are usually selected as the recognized characters, such as "#" and "*" mentioned above, and for example, characters such as Roman letters and Greek letters that are not commonly used can be designated as the recognized characters. .
- the combination of multiple characters can enhance the verification function of identifying characters.
- the following anti-theft format can be set: if a special character is detected every N characters, it proves that the short message is an anti-theft SMS, not a normal short message. At this time, according to the length of the short message content, the number of special characters changes accordingly, which may be 1, 2, 3, ....
- the embodiment of the present invention performs the operation according to the processing flowchart of the short message receiving processing method according to an embodiment of the present invention as shown in FIG. 4 .
- the embodiment of the present invention receives the short message (ie, step S502)
- the embodiment of the present invention performs step S504 to determine whether the received short message carries the anti-theft instruction.
- the embodiment of the present invention queries whether the received short message carries the special character included in the mapping table. If the special character is included, it is determined that the received short message carries the anti-theft command, and the embodiment of the present invention continues to perform step S506. If the special character is not included, it is determined that the received short message does not carry the anti-theft command, and the embodiment of the present invention continues to step S508.
- the embodiment of the present invention determines that the short message is carried in the short message, and then intercepts the short message (also commonly referred to as eating the short message).
- intercepting the short message can prevent the short message from appearing in the system of the mobile terminal, causing the suspicion of the thief, and causing the thief to be vigilant. If the mobile terminal's system displays the short message carrying the anti-theft command, the thief judges that the mobile terminal turns on the anti-theft function, and the thief may perform operations such as flashing or unplugging the battery to the mobile terminal, thereby reducing the stolen mobile terminal being retrieved.
- step S506 the embodiment of the present invention continues to perform step S510, acquiring the anti-theft instruction information in the short message, and triggering the operation of determining the identity information of the sender, and the process ends. If it is determined that the received short message does not carry the anti-theft command, the embodiment of the present invention performs step S508 to release the short message, and the process ends.
- releasing the short message can reduce the vigilance of the thief, and is beneficial for recovering the stolen terminal and capturing the thief. For example, when the user's mobile terminal is lost After that, if the thief sees that the mobile terminal can receive the short message in the stolen mobile terminal, it is considered that the mobile terminal is not locked, and the anti-theft function is not turned on.
- the embodiment of the present invention intercepts the short message carrying the anti-theft command so that it cannot be displayed in the system of the mobile terminal, but performs the anti-theft operation according to the anti-theft instruction carried in the short message in the background.
- the embodiment of the invention can reduce the vigilance of the thief and increase the possibility of the stolen mobile terminal retrieving, thereby effectively curbing the occurrence of theft crime and protecting the user's property security.
- the embodiment of the present invention acquires the anti-theft instruction information in the short message and triggers the operation of determining or verifying the sender identity information. As shown in step S304 in FIG. 3, the embodiment of the present invention parses the anti-theft command, and obtains the anti-theft command corresponding to the instruction.
- the anti-theft instruction is parsed, and the verification code of the sender that sends the anti-theft instruction is obtained. After the verification code is obtained, the embodiment of the present invention continues to match the obtained verification code with the verification code pre-stored by the mobile terminal, and determines whether to acquire the anti-theft command corresponding to the anti-theft instruction according to the matching result. If the obtained verification code matches the trusted mobile terminal identifier and/or password pre-stored by the mobile terminal, the anti-theft command is obtained.
- the obtained verification code does not match the trusted mobile terminal identifier and/or password pre-stored by the mobile terminal, in order to avoid receiving the anti-theft command sent by the malicious sender, the erroneous anti-theft operation is performed on the mobile terminal, and the embodiment of the present invention ignores the Anti-theft command.
- the verification code may be the sender's mobile terminal identifier and/or the password that the sender can trust.
- the sender's mobile terminal identifier includes at least one of a sender's phone number, a sender's SIM card number, and a sender's IMEI.
- the password that proves that the sender can trust may be at least one of the sender's mobile terminal identifier and a pre-set string that the sender can trust. For example, any combination of numbers and letters can be set to a string that proves that the sender can trust. For example, ac1088206, A34TFAK6808, etc. It is also possible to set the name of the user or the birthday of the user, the birthday of the pet as a password to prove that the sender can trust, and the like.
- FIG. 6 shows a process flow diagram of a method of pre-storing a trusted mobile terminal identity and/or password in accordance with a preferred embodiment of the present invention.
- the trusted mobile terminal identifier and/or password are collectively referred to as a password, and the trusted mobile terminal identifier is referred to as a relative friend number.
- the flow includes at least steps S602 to S612.
- Step S602 whether to set a relative friend number.
- step S604 the friend number is set on the mobile terminal. If yes, step S604 is performed, and if no, step S608 is performed.
- Step S604 setting a relative friend number.
- the embodiment of the present invention selects several common contact telephone numbers according to the address book or the common contact list or white list local to the mobile terminal, and sets the number as a relative friend number.
- Step S606 After setting the family and friends number, set the password as the relative friend number. After the mobile terminal receives the short message carrying the anti-theft command, the anti-theft command is parsed to obtain the verification code. If the verification code matches the pre-set number of friends and relatives as the password, the anti-theft command corresponding to the anti-theft command is obtained.
- Step S608 whether a password is set.
- step S612 is performed.
- Step S610 setting a password according to a string input by the user.
- step S612 the password is confirmed to be turned on.
- the trusted mobile terminal identifier and the stored trusted mobile terminal may be set by setting the trusted mobile terminal identifier and/or the password to be empty. / or password is deleted.
- the embodiment of the present invention can set the family friend number and the SMS anti-theft password to be empty according to the flow shown in FIG. 6, and click the “open password” column to turn off the password function.
- the embodiment of the present invention may also select the logout anti-theft function.
- the embodiment of the present invention obtains a verification code when parsing the anti-theft instruction, and determines whether the anti-theft instruction is encrypted. If the anti-theft command is an encrypted anti-theft command, the embodiment of the present invention decrypts the anti-theft instruction by using a corresponding decryption means, and decrypts the verification code by using a corresponding decryption means, and obtains the decrypted verification code and performs matching.
- the anti-theft command may be encrypted by using an encryption algorithm.
- the anti-theft command and the verification code are decrypted by using a corresponding decryption method when parsing the anti-theft command. Limited.
- the most widely used Data Encryption Standard (DES) is used to encrypt and decrypt the anti-theft command.
- the embodiment of the present invention can perform encryption processing on other information or contents other than the verification code and the anti-theft command in the received anti-theft instruction.
- the embodiment of the invention encrypts all the information or content in the anti-theft command, and can enhance the protection of the important information or content in the anti-theft command (such as the verification code or the anti-theft command in the anti-theft command), and improve the security of the received anti-theft command. Sex.
- the anti-theft command is parsed to obtain the corresponding anti-theft command.
- the step S306 shown in FIG. 3 is executed, and the operation corresponding to the anti-theft command is executed to implement the anti-theft of the mobile terminal.
- FIG. 7 shows a process flow diagram for polling a command execution situation in accordance with one embodiment of the present invention.
- Step S702 in FIG. 7 is executed to determine whether the anti-theft command to be executed is successfully executed. If the anti-theft command fails to be executed according to the judgment result, step S704 is executed, and the anti-theft command is attempted again, and the flow ends. If the anti-theft command is successfully executed according to the judgment result, the flow ends.
- the polling query is performed on the execution of the anti-theft command to ensure that the anti-theft command acquired by the mobile terminal can be executed in time, so as to prevent the thief from brushing or other operations on the mobile terminal due to the untimely execution of the anti-theft command. Can't be retrieved.
- the embodiment of the present invention will execute a lock screen command to query whether the lock screen command is successfully executed. If the lock screen command is not executed, the embodiment of the present invention executes a lock screen command to lock the screen of the mobile terminal. If the lock screen command is successfully executed, the embodiment of the present invention abandons the execution of the screen lock command again.
- FIG. 8 shows a process flow diagram of a method of querying a receipt in accordance with one embodiment of the present invention.
- the embodiment of the present invention performs step S802 shown in FIG. 8 to request a query receipt from the server.
- step S804 the embodiment of the present invention performs step S804 to query whether the receipt is successful. If successful, the process ends. If not successful, the embodiment of the present invention returns to step S802 until the query receipt is successful.
- the embodiment of the invention ensures that the sender of the anti-theft command can know the execution status of the anti-theft command in time, and can know the execution of the anti-theft command in time, and perform the anti-theft operation more efficiently. Further, the embodiment of the present invention can improve the probability of the stolen mobile terminal retrieving.
- 9 to 11 are flowcharts showing the processing of the anti-theft method of the mobile terminal according to a preferred embodiment of the present invention.
- the method for supporting the anti-theft method of any of the mobile terminals is described above, and the anti-theft method of the mobile terminal is described more clearly and easily.
- the sender is set to the mobile phone of the relatives and friends, and the mobile terminal is set to the stolen mobile phone.
- FIG. 9 is a flow chart showing the processing of the mobile terminal anti-theft method according to a preferred embodiment of the present invention.
- the preferred embodiment performs step S902 to send an anti-theft SMS to the stolen mobile phone through the mobile phone of the relatives and friends. The number of the friend's mobile phone is pre-stored in the stolen mobile phone.
- the preferred embodiment performs step S904 to process the anti-theft SMS.
- step S906 is executed to return the stolen processing result to the mobile phone of the relatives and friends, and the anti-theft processing flow of the stolen mobile phone is completed.
- the processing flow of the mobile terminal anti-theft method of the preferred embodiment is introduced from the mobile phone side of the relatives and friends and the stolen mobile phone side respectively.
- the sender and the whistle-selling sender are represented by the family and friends mobile phone. According to the disclosure of the present invention, those skilled in the art can understand that the burglar-proof command sender can not only make the friends and relatives mobile phone, but can be any other communication device that can send short messages. The authenticity of the sender is verified by verifying the password contained in the anti-theft command, and the present invention is not limited thereto.
- FIG. 10 is a flow chart showing the processing of the mobile terminal anti-theft method on the mobile phone side of the relatives and friends according to an embodiment of the present invention. Referring to FIG. 10, the flow includes at least steps S1002 to S1006.
- the embodiment edits and sends the anti-theft SMS to the stolen mobile phone through the mobile phone of the relatives and friends.
- the embodiment can directly transmit by editing the special anti-theft short message.
- the anti-theft command in the anti-theft SMS is some anti-theft commands with high security requirements, such as "delete mobile phone data", "backup mobile phone data”, etc., this embodiment first encrypts the anti-theft SMS to be sent. Second, the encrypted anti-theft SMS is sent to the stolen phone.
- step S1002 shown in FIG. 10 in the embodiment, when the anti-theft short message to be sent is encrypted, the special mark is first spliced.
- the special mark stitched in step S1002 in the above-mentioned map containing special characters and anti-theft instructions.
- this mapping there are special tags dedicated to encryption. For example, in the mapping, both "Dingwei#” and “Dingwei#E” exist, and the corresponding anti-theft commands are all Locate commands. but “Dingwei#” indicates an unencrypted anti-theft command, and "Dingwei#E" identifies an encrypted anti-theft command.
- step S1004 to encrypt the remaining content.
- the number after “Dingwei#E” indicates the verification code, that is, the password or the number of friends and relatives pre-stored by the stolen mobile phone.
- Step S1004 performs encryption processing on the password or the relative friend number.
- "DingweiE#ac35e5b301" is obtained.
- the letters and numbers in the anti-theft command shown in the embodiment of the present invention are only used as examples, and cannot represent the real digits of the real password or the number of friends and relatives or the actual display of the encrypted anti-theft command.
- step S1006 After encrypting the anti-theft SMS, the embodiment proceeds to step S1006 to send the anti-theft SMS to the stolen mobile phone, and the process ends.
- FIG. 11 is a flow chart showing the processing of the mobile terminal anti-theft method on the side of the stolen mobile phone according to an embodiment of the present invention. Referring to FIG. 11, the flow includes at least steps S1102 to S1120.
- Step S1102 receiving an anti-theft message.
- Step S1104 Determine whether the sender of the received anti-theft SMS is a relative friend number. If yes, step S1110 is directly executed, and if no, step S1106 is performed.
- Step S1106 Determine whether the received anti-theft SMS contains content encrypted by DES. If yes, go to step S1118, if no, go to step S1108.
- Step S1108 Determine whether the verification code in the anti-theft SMS is correct.
- the verification code in the anti-theft SMS may be a password that proves that the sender can be trusted, may be the identification information of the sender's mobile terminal, and may also include both the password and the identification information of the mobile terminal. It is determined that if the verification code in the anti-theft SMS is correct, step S1110 is performed, and if the error occurs, the process ends.
- Step S1110 Obtain an anti-theft command.
- the stolen mobile phone After the stolen mobile phone receives the anti-theft SMS, it analyzes the anti-theft command carried in the anti-theft SMS, and acquires the anti-theft command corresponding to the anti-theft command.
- Step S1112 executing an anti-theft command.
- the stolen mobile phone After obtaining the anti-theft command, the stolen mobile phone performs the corresponding anti-theft operation according to the anti-theft command. For example, the operation of locking the screen of the stolen mobile phone according to the anti-theft command, or the photographing operation of the unlocking mobile phone according to the anti-theft command, and the like.
- step S1114 the execution result is returned.
- the stolen mobile phone After the execution of the anti-theft command is completed, the stolen mobile phone returns the execution result to the sender, prompting the sender to execute the command.
- Step S1116 After returning the execution result to the sender, the stolen mobile phone anti-theft operation is successfully completed, and the process ends.
- Step S1118 If the DES encrypted content exists in the anti-theft SMS, the short message content is decrypted.
- Step S1120 Determine whether the decryption of the anti-theft SMS content is successful. If yes, the process returns to step S1108, and if not, the process ends.
- the embodiment of the present invention provides a mobile terminal anti-theft client for implementing the above-mentioned mobile terminal anti-theft method.
- FIG. 12 is a schematic structural diagram of a mobile terminal anti-theft client according to an embodiment of the present invention.
- the client of the embodiment of the present invention includes at least a receiving module 1220, a parsing module 1230, and an executing module 1260.
- the receiving module 1220 is configured to receive an anti-theft command from the sender, wherein the anti-theft command uses the short message as the sending carrier.
- the parsing module 1230 is coupled to the receiving module 1220 and the executing module 1260 respectively, configured to parse the anti-theft command, and obtain an anti-theft command corresponding to the command.
- the execution module 1260 is coupled to the parsing module 1230 and configured to perform an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
- the short message intercepting module 1210 performs a filtering operation on the short message received by the mobile terminal. That is, after the mobile terminal receives the short message, the short message intercepting module 1210 determines whether the received short message carries the anti-theft instruction.
- the short message intercepting module 1210 determines that the short message includes the anti-theft command, the short message intercepting module intercepts the short message, prevents the short message from being displayed in the mobile terminal system, and triggers the receiving module 1220 to receive the anti-theft command with the short message as the carrier.
- the short message intercepting module 1210 intercepts the short message carrying the anti-theft command to prevent the short message from appearing in the system of the mobile terminal, causing the thief's suspicion, and causing the thief to be vigilant.
- the thief judges that the mobile terminal turns on the anti-theft function, and the thief may perform operations such as flashing or unplugging the battery to the mobile terminal, thereby reducing the stolen mobile terminal being retrieved. Probability, and increase the difficulty of the relevant departments to retrieve stolen terminals and capture theft.
- the short message intercepting module 1210 determines that the received short message does not carry the anti-theft command, releasing the short message can reduce the vigilance of the thief, and is beneficial for recovering the stolen terminal and capturing the thief. For example, after the user's mobile terminal is lost, if the thief sees that the mobile terminal can receive the short message in the stolen mobile terminal, the mobile terminal is considered not to be locked, and the anti-theft function is not turned on.
- the short message intercepting module 1210 in the embodiment of the present invention intercepts the short message carrying the anti-theft command so that it cannot be displayed in the system of the mobile terminal, but triggers the receiving module 1210 to receive the anti-theft command carried in the short message in the background, and performs Anti-theft operation.
- the thief cannot find that the mobile terminal has turned on the anti-theft function and performs the corresponding anti-theft operation, such as reporting the real-time location of the mobile terminal and even reporting the fingerprint of the thief. Therefore, the embodiment of the invention can reduce the vigilance of the thief and increase the possibility of the stolen mobile terminal retrieving, thereby effectively curbing the occurrence of theft crime and protecting the user's property security.
- the receiving module 1220 After the short message intercepting module 1210 intercepts the short message carrying the anti-theft command, the receiving module 1220 is triggered.
- the receiving module 1220 receives the anti-theft command with the short message as the carrier, and triggers the parsing module 1230 to parse the anti-theft command.
- the analysis module 1230 analyzes the anti-theft command and obtains a verification code of the sender that transmitted the anti-theft command. After the verification code is obtained, the parsing module 1230 continues to match the obtained verification code with the locally stored trusted mobile terminal identifier and/or password, and determines whether to obtain the anti-theft command corresponding to the anti-theft instruction according to the matching result.
- the trusted mobile terminal identifier and/or password stored locally by the client is stored by the storage module 1240. If the obtained verification code matches the trusted mobile terminal identifier and/or password stored by the storage module 1240, the resolution is resolved. Module 1230 obtains an anti-theft command.
- the parsing module 1230 ignores the erroneous placement operation on the mobile terminal to avoid receiving the anti-theft command sent by the malicious sender.
- the anti-theft command in addition, in the embodiment of the present invention, the logout module 1250 coupled with the storage module 1240 can delete the sender's mobile terminal identifier and/or password stored by the storage module 1240, and deregister the anti-theft function.
- the parsing module 1230 obtains the verification code when parsing the anti-theft command, and determines whether the anti-theft command is encrypted. If the anti-theft command is an encrypted anti-theft command, the parsing module 1230 decrypts the anti-theft command by using a corresponding interface means, and decrypts the verification code by using a corresponding decryption means, and obtains the decrypted verification code and matches.
- the anti-theft instruction may be encrypted by an arbitrary encryption algorithm, and the parsing module 1230 decrypts the anti-theft instruction and the verification code by using a corresponding decryption method when parsing the anti-theft instruction, which is not used in the embodiment of the present invention.
- the anti-theft instruction is encrypted and decrypted by using the most widely used DES.
- the embodiment of the present invention can perform encryption processing on other information or contents other than the verification code and the anti-theft command in the received anti-theft instruction.
- the parsing module 1230 After the parsing module 1230 matches the verification code carried in the anti-theft command and the verification code pre-stored by the storage module 1240, if the verification code of the sender and the verification code stored in the storage module 1240 can match, the parsing module 1230 can analyze the anti-theft.
- the instruction gets the corresponding anti-theft command.
- the trigger execution module 1260 After the parsing module 1230 obtains the anti-theft command, the trigger execution module 1260 performs a corresponding operation according to the anti-theft command to implement the mobile terminal anti-theft. In the process in which the execution module 1260 executes the anti-theft command, the command polling module 1270 coupled with the execution module 1260 polls whether the anti-theft command is successfully executed.
- the command polling module 1270 triggers the execution module 1260 to attempt to execute the anti-theft command again. If the anti-theft command is successfully executed, the command polling module 1270 triggers the execution module 1260 to end execution of the anti-theft command.
- the command polling module 1270 performs a polling query on the execution of the anti-theft command to ensure that the obtained anti-theft command can be executed in time to prevent the thief from brushing or other operations on the mobile terminal due to the untimely execution of the anti-theft command.
- the mobile terminal cannot be retrieved.
- the command polling module 1270 queries the lock screen command for successful execution. If the lock screen command is not successfully executed, the command polling module 1270 triggers the execution module 1260 to attempt to execute the lock screen command again. If the lock screen command is executed successfully, the execution module 1260 discards the screen lock command again.
- the embodiment of the present invention can achieve the following beneficial effects:
- the anti-theft command from the sender that uses the short message as the transmission carrier is received, the anti-theft command is obtained by parsing the anti-theft command, and the corresponding anti-theft operation can be performed according to the anti-theft command. Therefore, the anti-theft command in the embodiment of the present invention is from a device or a terminal capable of sending a short message, and a device or a terminal capable of sending a short message (such as a mobile phone, a computer, a tablet, etc.) can be realized, so that the anti-theft of the mobile terminal can be realized conveniently and quickly.
- a short message such as a mobile phone, a computer, a tablet, etc.
- the use of other devices or terminals capable of sending short messages can enable the anti-theft function of the mobile terminal to avoid theft of the anti-theft function by the mobile terminal itself, as the prior art says.
- Embodiment of the present invention at the end of the mobile After the terminal is stolen, the sender's anti-theft command can still be received, and the anti-theft operation is performed according to the anti-theft command obtained by parsing the anti-theft command. For example, after the user mobile terminal is lost, by sending an anti-theft command to the stolen mobile terminal, the embodiment of the present invention can perform a lock screen operation on the stolen mobile terminal to prevent the thief from using the mobile terminal.
- the embodiment of the present invention can also obtain the identity information of the thief (such as a photo of the thief, a fingerprint, etc.). After the identity information of the thief is obtained according to the embodiment of the present invention, the thief can be arrested according to the identity identification information. Therefore, the embodiment of the present invention can effectively prevent theft of the terminal after the terminal is stolen, and reduce the crime rate of theft and protect the security of the user property.
- FIG. 13 is a flow chart showing the processing of the mobile terminal anti-theft method according to an embodiment of the present invention. As shown in FIG. 13, the flow includes at least steps S1302 to S1306.
- Step S1302 receiving an anti-theft command from the server, wherein the anti-theft command is sent to the server by the activated account.
- Step S1304 Analyze the anti-theft command, and obtain an anti-theft command corresponding to the instruction.
- Step S1306 Perform an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
- the anti-theft instruction forwarded by the server from the activated account is received, the anti-theft command is obtained by parsing the anti-theft command, and the corresponding anti-theft operation can be performed according to the anti-theft command.
- the anti-theft command in the embodiment of the present invention is from a device or terminal capable of logging in to the activated account, and the device or the terminal is required to send the anti-theft command by using the activated account, and the activated account is used to send a short message or a network command. All of them can send anti-theft commands.
- the embodiment of the present invention can still receive the anti-theft instruction of the sender, and perform the anti-theft operation according to the anti-theft command obtained by analyzing the anti-theft instruction.
- the embodiment of the present invention can perform a lock screen operation on the stolen mobile terminal to prevent the thief from using the mobile terminal.
- the inability of the thief to use the mobile terminal causes the thief to fail to renovate the mobile terminal by brushing the machine, and the thief cannot resell the stolen mobile terminal for profit. Further, the probability of theft crime can be effectively reduced.
- the embodiment of the present invention can also obtain the identity information of the thief (such as a photo of the thief, a fingerprint, etc.).
- the thief After the identity information of the thief is obtained according to the embodiment of the present invention, the thief can be arrested according to the identity identification information. Therefore, the embodiment of the present invention can effectively prevent theft of the terminal after the terminal is stolen, and reduce the crime rate of theft and protect the security of the user property.
- the embodiment of the present invention receives an anti-theft instruction from a server.
- the anti-theft instruction format may only include an anti-theft command, and may also include an anti-theft command, and other identification information other than the anti-theft command.
- the anti-theft instruction may include at least one of an anti-theft policy identifier, an activated account identifier, an anti-theft command, and an anti-theft object identifier.
- the anti-theft policy is identified as an account, and is used to determine an identifier of the anti-theft policy. After the identifier is determined, no change occurs.
- the activated account ID is the unique account identification number (UID) generated for the account at the time of the current login.
- the anti-theft command includes a command number (ACTIONID) and/or a task number (TASKID), wherein the corresponding command can be found in the correspondence table containing the ACTIONID and the anti-theft command by the ACTIONID.
- TASKID is a corresponding task number generated in the server when the anti-theft command is transmitted, and the TASKID can query the execution status of the anti-theft command corresponding to the TASKID in the server.
- the TASKID is 0.
- the anti-theft object identifier may include the IMEI of the mobile terminal, and may also include other identity identifiers that can uniquely identify the mobile terminal.
- the format of the anti-theft instruction can be set as:
- OTHERS is additional information related to the anti-theft command.
- the additional information of Erase is to specify which part of the mobile terminal system to delete data (such as deleting the SMS data or notebook data in the system or the chat data of the application, etc.).
- the additional information of TakePhoto can be a requirement for the clarity of the captured photo.
- the format of the terminal lock instruction is: [Accout] 200868996, 323450296939291, LOCK, 2000000, 0.
- step S1304 is executed to parse the anti-theft command.
- the embodiment of the present invention determines whether the anti-theft instruction is encrypted. If the anti-theft command is an encrypted anti-theft command, the embodiment of the present invention decrypts the anti-theft command by using a corresponding decryption means.
- the encryption and decryption mode refer to the corresponding introduction part of the second embodiment, and no further details are provided here.
- FIG. 14 is a process flow diagram showing a method of turning on the anti-theft function in accordance with one embodiment of the present invention. Referring to FIG. 14, the flow includes at least steps S1402 through S1414.
- Step S1402 logging in to the activated account.
- a login request is sent to the login server over the network.
- Step S1404 returning login information.
- the login server After the login server receives the login request, it returns the login information, such as "account name" and "account identification code”.
- Step S1406 Send a Bind command by using a short message.
- ACTIONID is Bind
- TASKID is 0,
- OTHERS is empty.
- the number carried in the instruction is the telephone number of the mobile terminal. After the binding is successful, the mobile phone number of the mobile terminal is set to a trusted number, and the anti-theft function is activated.
- Step S1408 checking the Bind state.
- the Bind status is checked through the network.
- step S1410 the anti-theft server returns a Bind result.
- the query result returned by the anti-theft server contains information in OTHERS format. If OTHERS is 1, it indicates that the mobile terminal is successfully bound. If OTHERS is 0, the mobile terminal fails to bind.
- step S1408 and step S1410 can be repeatedly executed repeatedly, wherein if the query result returned by the anti-theft server is not received or the binding result is failed every predetermined time (for example, 20 seconds), the Bind state is checked.
- step S1412 if the Bind state is repeatedly checked three times, the binding cannot be successfully performed, and the Bind instruction that does not carry the mobile terminal's telephone number is sent through the network. If the binding is successful, the anti-theft function is activated, and the mobile terminal is identified as an untrusted number.
- Step S1414 The anti-theft server returns a Bind result sent by the network.
- the login party in FIG. 14 may be the side of the activated account after being stolen, or may be the mobile terminal side.
- the login server and the anti-theft server are the same server.
- Figure 15 shows a process flow diagram of a method of unbinding in accordance with one embodiment of the present invention. Referring to FIG. 15, the flow includes at least steps S1502 through S1506.
- step S1502 an unbind command is sent.
- this step sends an Unbind command to the anti-theft server through the network.
- the Unbind command is an anti-theft command that uses the anti-theft command format mentioned above.
- ACTIONID is Unbind
- TASKID is 0,
- OTHERS is empty.
- step S1504 the anti-theft server returns an Unbind result. If the unbinding is successful, step S1506 is performed, and if the unbinding fails, the user is prompted to perform other operations.
- step S1506 the binding is successfully cancelled, and the account information of the activated account and the anti-theft record are deleted.
- the account information of the activated account and the anti-theft record are deleted.
- the "account name" and "account identification code" in the account information are set to be empty, and the database of the anti-theft record corresponding to the account is deleted.
- the embodiment of the present invention can cancel the anti-theft function.
- the embodiment of the present invention first logs in the activated account in the client that can trigger the theft prevention of the mobile terminal.
- the client capable of triggering theft prevention of the mobile terminal may be a browser, and may be a client with a mobile phone anti-theft function on the mobile phone side (for example, a mobile guard), or may be a personal computer (Personal Computer, below)
- a client (such as a security guard) with a mobile phone anti-theft function on the side of the PC is not limited in this embodiment of the present invention.
- the anti-theft command can be sent by using the short message and/or the network command as the carrier to ensure that the mobile terminal can be burglarized by sending the anti-theft command in time through the common sender.
- the activated account sends the anti-theft command by using the short message as the carrier.
- the mobile terminal after receiving the short message, the mobile terminal first determines whether the short message carries the anti-theft command, and if so, intercepts the short message, and triggers the parsing anti-theft instruction operation as shown in step S1304 in FIG. If not, release the message.
- the embodiment of the present invention determines that the short message is carried in the short message, and then intercepts the short message (usually referred to as eating the short message).
- the short message usually referred to as eating the short message.
- the activated account is logged in, and the anti-theft command sent by the activated account with the short message and/or the network as the carrier is received.
- the mobile terminal that performs the anti-theft operation is selected in the device list of the activated account, and the anti-theft command for the mobile terminal is sent to the server by the activated account.
- the "Get Device List” command is sent to the server.
- ACTIONID is GET_LIST
- TASKID is 0, and OTHERS is empty.
- the server returns a list of devices corresponding to the account.
- the device list includes information such as identity information (such as IMEI or UID) of the mobile terminal and a phone number of the mobile terminal.
- the activated account selects the specified mobile terminal in the device list, and sends an anti-theft command to the mobile terminal to the server, which is forwarded by the server to the mobile terminal.
- the identifier of the mobile terminal is input from the activated account, and the input identifier of the mobile terminal is added to the device list of the activated account. And, the anti-theft operation corresponding to the mobile terminal is selected and sent to the mobile terminal by the server.
- the mobile terminal After receiving the anti-theft command, the mobile terminal parses the anti-theft command to obtain an anti-theft command, and then performs an anti-theft operation according to the anti-theft command.
- the embodiment of the present invention After the execution of the received anti-theft command is completed, the embodiment of the present invention returns the execution result as a receipt to the server, and reminds the server that the execution has been performed. After the server receives the receipt, it can continue the next anti-theft operation. In addition, if the server does not receive the receipt within the specified time, the embodiment of the present invention initiates a polling query to check whether the receipt is successful. See Figure 8 for the process flow of the method of querying the receipt.
- Figure 16 is a flow chart showing the processing of the mobile terminal anti-theft method in accordance with a preferred embodiment of the present invention. Referring to FIG. 16, the flow includes at least steps S1602 through S1618.
- Step S1602 Log in to the activated account, and send an anti-theft command to the server through the activated account.
- Step S1604 The server returns a processing result of the anti-theft instruction, and prompts the activated account server to receive the anti-theft instruction.
- the processing result returned by the server carries the TASKID generated by the server.
- step S1604 After the execution of the step S1604, according to the anti-theft command sent by the activated account, if the mobile phone number of the stolen mobile terminal is a trusted number, step S1608 is directly executed. If the mobile phone number of the stolen mobile terminal is a non-signal code, step S1606 is performed. .
- Step S1606 Enter the mobile phone number of the stolen mobile terminal in the activated account, and send it to the server to add the mobile phone number to the device list corresponding to the activated account stored in the server. After the mobile phone number is added to the device list, the mobile phone number of the stolen mobile terminal is converted from an untrusted number to a trusted number.
- Step S1608 After determining that the mobile phone number of the stolen mobile terminal is a trusted number, the server sends the anti-theft command to the stolen mobile terminal by using a short message.
- the ACTIONID and OTHERS in the anti-theft command are the same as the ACTIONID and OTHERS in the anti-theft command sent to the server by the activated account, and the TASKID in the anti-theft command is the TASKID generated in step S1604.
- Step S1610 The activated account sends an anti-theft command, and sends a query request to the server through the network every predetermined time (for example, 30 seconds) to query the execution result of the anti-theft command.
- the query request carries the identity information of the stolen mobile terminal (such as the IMEI or UID of the stolen mobile terminal, etc.) and the TASKID generated in step S1604.
- Step S1612 After receiving the query request, the server queries the execution status of the anti-theft command and returns to the activated account. If the server returns "the stolen mobile terminal did not receive the anti-theft command", "the stolen terminal is executing the anti-theft command”, "the stolen terminal successfully executed the anti-theft command” or "the stolen terminal failed to execute the anti-theft command", etc., to the activated account . The user can view the stolen terminal to execute the anti-theft instruction through the activated account in time, and select to perform the next anti-theft instruction and the like according to the execution of the anti-theft instruction.
- Step S1614 After the stolen terminal completes the execution of the anti-theft command, the execution result is returned to the server. After receiving the returned result, the server updates the status of the anti-theft command corresponding to the TASKID to "completed".
- Step S1616 The activated account sends a query request to the server to query the execution result of the anti-theft command.
- Step S1618 After receiving the query request of the activated account, returning “the stolen terminal executes the anti-theft command successfully” to the activated account.
- step S1610 and step S1612 can be polled one or more times. If the account has been activated, the query request can be sent to the server every 30 seconds to query the execution of the anti-theft command by the stolen terminal until the server returns to the stolen terminal to execute the anti-theft command successfully. That is, in the above flow, step S1616 and step S1618 are the repetition of step S1610 and step S1612.
- Figure 17 is a flow diagram showing the process of transmitting an anti-theft command on the side of an activated account in accordance with one embodiment of the present invention. Referring to FIG. 17, the flow includes at least steps S1702 through S1708.
- Step S1702 Generate an antitheft instruction content.
- ACTIONID is the command number of the command to be executed, such as Locate, Erase, TakePhoto, and so on.
- TASKID is 0,
- OTHERS is additional information related to the anti-theft command.
- the additional information of the Erase command is to specify which part of the data in the mobile terminal system is deleted (for example, deleting the short message data or the notebook data in the system or the chat data of the application, etc.).
- the additional information of TakePhoto can be a requirement for the clarity of the captured photo.
- step S1704 the anti-theft instruction is encrypted.
- the DES is used to encrypt the anti-theft command to ensure that the anti-theft command can be sent to the server more securely.
- the server forwards to the stolen terminal.
- the preferred embodiment may skip the encryption step if the communication between the activated account and the server uses an encryption protocol such as a Hypertext Transfer Protocol over Secure Socket Layer (hereinafter referred to as Https).
- Https Hypertext Transfer Protocol over Secure Socket Layer
- Step S1706 Send an anti-theft command to the server.
- Step S1708 Send a polling query request to the server, and query the execution status of the theft prevention terminal by the stolen terminal. If the execution is completed, the process ends. If not completed, step S1708 is repeated.
- FIG. 18 is a flowchart showing a method of processing the theft side of the mobile terminal according to an embodiment of the present invention. Referring to FIG. 18, the flow includes at least steps S1802 through S1814.
- Step S1802 receiving a short message carrying an anti-theft command.
- step S1804 the anti-theft instruction is decrypted. If it is possible to decrypt, step S1808 is executed, and if it is not possible to decrypt, step S1806 is executed.
- step S1806 the decryption fails, the execution of the anti-theft command fails, and the process ends.
- Step S1808 The decryption succeeds, and it is determined whether the mobile terminal identifier (such as IMEI or UID) carried in the anti-theft command is correct. If yes, step S1810 is performed. If not, the sender of the anti-theft command is erroneously transmitted, and the anti-theft command is not executed by the mobile terminal, and the process returns to step S1806.
- the mobile terminal identifier such as IMEI or UID
- Step S1810 Parse the received anti-theft command, and acquire an anti-theft command corresponding to the anti-theft command.
- Step S1812 executing an anti-theft command.
- step S1814 after the execution is completed, the execution result is returned to the server, and the process ends.
- the embodiment of the present invention provides a mobile terminal anti-theft client for implementing the above-mentioned mobile terminal anti-theft method.
- FIG. 19 is a schematic structural diagram of a mobile terminal anti-theft client according to an embodiment of the present invention.
- the client of the embodiment of the present invention includes at least a receiving module 1940, a parsing module 1950, and an executing module 1960.
- the receiving module 1940 is configured to receive an anti-theft command from the server, wherein the anti-theft command is sent to the server by the activated account.
- the parsing module 1950 is coupled to the receiving module 1940 and configured to parse the anti-theft command to obtain an anti-theft command corresponding to the command.
- the execution module 1960 is coupled to the execution module 1950 and configured to perform an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
- the determining module 1910 in the mobile terminal anti-theft client shown in FIG. 19 determines whether the received short message carries an anti-theft instruction after the mobile terminal receives the short message. If yes, the interception module 1920 is triggered to intercept the short message carrying the anti-theft command. If not, the release module 1930 is triggered to release the short message.
- the triggering intercepting module 1920 intercepts the short message (also commonly referred to as eating the short message).
- eating the short message can prevent the short message from appearing in the system of the mobile terminal, causing the suspicion of the thief, and causing the thief to be vigilant.
- the mobile terminal's system displays the short message carrying the anti-theft command
- the thief judges that the mobile terminal turns on the anti-theft function, and the thief may perform operations such as flashing or unplugging the battery to the mobile terminal, thereby reducing the stolen mobile terminal being retrieved. Probability, and increase the difficulty of the relevant departments to retrieve stolen terminals and capture theft.
- the trigger release module 1930 releases the short message, which can reduce the vigilance of the thief, and is beneficial to recover the stolen terminal and capture the thief. For example, after the user's mobile terminal is lost, if the thief sees that the mobile terminal can receive the short message in the stolen mobile terminal, the mobile terminal is considered not to be locked, and the anti-theft function is not turned on.
- the embodiment of the present invention intercepts the short message carrying the anti-theft command so that it cannot be displayed in the system of the mobile terminal, but performs the anti-theft operation according to the anti-theft instruction carried in the short message in the background.
- the embodiment of the invention can reduce the vigilance of the thief and increase the possibility of the stolen mobile terminal retrieving, thereby effectively curbing the occurrence of theft crime and protecting the user's property security.
- the intercepting module 1920 is triggered to intercept the short message.
- the receiving module 1940 coupled to the intercepting module 1920 receives the anti-theft command in the short message, and triggers the parsing module 1950 to parse the anti-theft command.
- the parsing module 1950 decrypts the anti-theft command by using a corresponding decryption means.
- the anti-theft command may be encrypted by an arbitrary encryption algorithm, and the parsing module 1950 decrypts the anti-theft command by using a corresponding decryption method when parsing the anti-theft command, which is not limited by the embodiment of the present invention.
- the anti-theft instruction is encrypted and decrypted by using the most widely used DES.
- the embodiment of the present invention can perform encryption processing on other information or content other than the anti-theft command in the received anti-theft command.
- the embodiment of the invention encrypts all the information or content in the anti-theft command, and can enhance the protection of the important information or content in the anti-theft command (such as the verification code or the anti-theft command in the anti-theft command), and improve the security of the received anti-theft command. Sex.
- the parsing module 1950 parses the anti-theft command
- the corresponding anti-theft command is obtained.
- the execution module 1960 coupled to the parsing module 1950 performs an anti-theft operation in accordance with the anti-theft command.
- the command polling module 1970 coupled with the execution module 1960 polls whether the anti-theft command was successfully executed. If so, the command polling module 1970 triggers the execution module 1960 to end the execution of the anti-theft command. If not, the command polling module 1970 triggers the execution module 1960 to attempt to execute the anti-theft command again.
- the polling module 1970 performs a polling query on the execution of the anti-theft command to ensure that the anti-theft command acquired by the mobile terminal can be executed in time, so as to prevent the thief from brushing the mobile terminal or other operations due to the untimely execution of the anti-theft command, so that the mobile terminal cannot Was recovered.
- the embodiment of the present invention will execute a lock screen command to query whether the lock screen command is successfully executed. If the lock screen command is not successfully executed, the command polling module 1970 triggers the execution module 1960 to attempt to execute the lock screen command again to lock the screen of the mobile terminal. If the lock screen command is executed successfully, the command polling module 1970 triggers the execution module 1960 to abandon the execution of the screen lock command again.
- the embodiment of the present invention further includes an activation module 1980 and a logout module 1990.
- the activation module 1980 transmits the Bind command with the short message as the carrier to the server by using the activated account, and activates the anti-theft function of the mobile terminal.
- the mobile phone number of the mobile terminal is a trusted number, and the mobile terminal successfully starts Anti-theft client.
- the logout module 1990 coupled with the activation module 1980 can send an unbinding command to the server using the activated account. When the unbinding is successful, the logout module 1990 deletes the account information of the activated account and the anti-theft record, and cancels the anti-theft function of the mobile terminal.
- the activated account can send an anti-theft command by using a short message and/or a network instruction as a carrier to ensure that the mobile terminal is lost, and can use the common sending platform to send an anti-theft command, thereby more effectively protecting the security of the mobile terminal.
- the activated account is logged in any client that can trigger the theft of the mobile terminal. If the account is activated, you can log in in the browser, and you can log in in the mobile guard or security guard.
- the embodiment of the present invention can achieve the following beneficial effects:
- the anti-theft instruction forwarded by the server from the activated account is received, the anti-theft command is obtained by parsing the anti-theft command, and the corresponding anti-theft operation can be performed according to the anti-theft command.
- the anti-theft command in the embodiment of the present invention is from a device or terminal capable of logging in to the activated account, and the device or the terminal is required to send the anti-theft command by using the activated account, and the activated account is used to send a short message or a network command. All of them can send anti-theft commands.
- the embodiment of the present invention can still receive the anti-theft instruction of the sender, and perform the anti-theft operation according to the anti-theft command obtained by analyzing the anti-theft instruction.
- the embodiment of the present invention can perform a lock screen operation on the stolen mobile terminal to prevent the thief from using the mobile terminal.
- the inability of the thief to use the mobile terminal causes the thief to fail to renovate the mobile terminal by brushing the machine, and the thief cannot resell the stolen mobile terminal for profit. Further, the probability of theft crime can be effectively reduced.
- the embodiment of the present invention can also obtain the identity information of the thief (such as a photo of the thief, a fingerprint, etc.).
- the thief After the identity information of the thief is obtained according to the embodiment of the present invention, the thief can be arrested according to the identity identification information. Therefore, the embodiment of the present invention can effectively prevent theft of the terminal after the terminal is stolen, and reduce the crime rate of theft and protect the security of the user property.
- FIG. 20 is a flow chart showing the processing of the mobile terminal anti-theft method according to an embodiment of the present invention. Referring to FIG. 20, the flow includes at least steps S2002 to S2006.
- Step S2002 Receive an anti-theft instruction from a personal computer (PC) terminal.
- PC personal computer
- Step S2004 parsing the anti-theft command, and obtaining an anti-theft command corresponding to the instruction.
- Step S2006 Perform an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
- the anti-theft command from the PC terminal is received, and the anti-theft command is obtained by parsing the anti-theft command. And according to the anti-theft command, the corresponding anti-theft operation can be performed.
- the anti-theft command in the embodiment of the present invention comes from being able to use the PC terminal to open and use the anti-theft function of the mobile terminal on the premise that the stolen mobile terminal does not have the anti-theft function turned on.
- the use of a PC terminal to send an anti-theft command is simple in operation, so that the anti-theft of the mobile terminal can be realized conveniently and quickly, and the anti-theft function can be provided to perform anti-theft on the mobile terminal.
- the embodiment of the present invention can still receive the anti-theft instruction of the sender, and perform the anti-theft operation according to the anti-theft command obtained by analyzing the anti-theft instruction. For example, after the user mobile terminal is lost, by sending an anti-theft command to the stolen mobile terminal, the embodiment of the present invention can perform a lock screen operation on the stolen mobile terminal to prevent the thief from using the mobile terminal. The inability of the thief to use the mobile terminal causes the thief to fail to renovate the mobile terminal by brushing the machine, and the thief cannot resell the stolen mobile terminal for profit.
- the embodiment of the present invention can also obtain the identity information of the thief (such as a photo of the thief, a fingerprint, etc.). After the identity information of the thief is obtained according to the embodiment of the present invention, the thief can be arrested according to the identity identification information. Therefore, the embodiment of the present invention can effectively prevent theft of the terminal after the terminal is stolen, and reduce the crime rate of theft and protect the security of the user property.
- the identity information of the thief such as a photo of the thief, a fingerprint, etc.
- the activation file in the embodiment of the present invention is composed of an extensible markup language XML or a lightweight data exchange format (JSON), which is used for an activation operation between the PC terminal and the mobile terminal.
- JSON lightweight data exchange format
- the embodiment of the present invention verifies the activation file according to the identity of the mobile terminal carried in the activation file. If the identity of the mobile terminal carried in the activation file is the identity of the mobile terminal, the activation file passes the verification.
- the activation file fails to pass the verification.
- the PC terminal has the characteristics of the device, it also has the characteristics of Internet access. Therefore, the PC terminal has a wide application range and can trigger different anti-theft modes.
- the embodiment of the present invention can confirm the anti-theft mode adopted in the different anti-theft mode according to the anti-theft mode identifier carried in the activation file.
- the method may include:
- the first group of anti-theft mode identifiers including the random string GUID corresponding to the mobile terminal and the second group of anti-theft mode identifiers including the GUID and the password (PASSWORD), including only the account identifier (UID), are included.
- the PC anti-theft policy is turned on, and the corresponding anti-theft operation is directly executed according to the received anti-theft command.
- the GUID is a random string generated by the PC, and the string can establish a one-to-one binding relationship with the mobile terminal.
- the anti-theft mode is identified as the second set of anti-theft mode identifiers including GUID and PASSWORD
- the PC anti-theft policy is turned on, and the PASSWORD is verified correctly. If yes, the anti-theft operation corresponding to the received anti-theft command is executed. If no, the response is stopped and no action is taken.
- the PASSWORD is a password set by the user in advance. When the password value is not empty, the embodiment of the present invention verifies the PASSWORD before executing the anti-theft command.
- the account anti-theft policy is enabled.
- the UID is an account identifier that is generated after the user logs in to the account whose account name is USERSNAME is used to identify the account.
- the anti-theft mode is identified as the fourth set of anti-theft mode identifiers including the UID and the GUID
- the PC anti-theft policy and the account anti-theft policy are enabled, the anti-theft command from the PC terminal or the UID is received, and the corresponding anti-theft operation is performed.
- the anti-theft mode is identified as the fifth group of anti-theft mode identifiers including GUID, UID, and PASSWORD
- the PC anti-theft policy and the account anti-theft policy are enabled.
- the embodiment of the present invention performs the anti-theft operation corresponding to the received anti-theft command.
- the embodiment of the present invention stops responding and does not perform any operation.
- the embodiment of the present invention can activate different anti-theft modes according to different types of anti-theft mode identifiers carried in the activation file sent by the PC terminal. That is, when the mobile terminal performs the anti-theft operation through the PC terminal, the anti-theft policy can be triggered by the PC terminal to send the anti-theft command to the mobile terminal, and multiple anti-theft policies can be triggered to simultaneously send the anti-theft command to the mobile terminal. For example, when the anti-theft mode identifier in the activation file is only included in the UID or only the GUID, the embodiment of the present invention can perform only the account anti-theft policy or only the PC anti-theft policy.
- the embodiment of the present invention can simultaneously perform PC anti-theft and account anti-theft, enhance the anti-theft protection to the mobile terminal, and increase the possibility of retrieving the mobile terminal.
- the PC anti-theft includes sending an anti-theft command to the mobile terminal through the PC terminal to perform anti-theft on the mobile terminal, and further including an activation account to perform account anti-theft on the mobile terminal.
- the PC terminal activates the account to perform account theft prevention on the mobile terminal, the PC terminal only transmits the account information to the mobile terminal as the login party.
- the difference between the PC anti-theft policy and the account anti-theft strategy is that the ACTIONID in the PC anti-theft policy needs to be distinguished from the ACTIONID in the account anti-theft strategy.
- the ACTIONID is LOCATE
- the PC anti-theft strategy should be "LOCATE_PC”
- the operation is exactly the same.
- the UID is a GUID in the PC anti-theft policy. That is, the information of the unique account in the tag account burglar is the UID, and the information of the unique computer in the tag PC burglar is the GUID.
- the anti-theft mode is identified as the anti-theft mode identifier including GUID and PASSWORD, that is, the password is required to send the command
- the PASSWORD part (which can be attached to the end of the field) is added.
- the PASSWORD part (which can be attached to the end of the field) is added.
- the PASSWORD part (which can be attached to the end of the field) is added.
- the PASSWORD part which can be attached to the end of the field
- the PASSWORD part which can be attached to the end of the field
- the PASSWORD part which can be attached to the end of the field
- the PASSWORD part which can be attached to the end of the field
- the PASSWORD part (which can be attached to the end of the field) is added.
- the PASSWORD part (which can be attached to the end of the field) is added.
- the PASSWORD part (which can be attached to the end of the field) is added.
- the PASSWORD can be personalized. If the user sets PASSWORD, the PASSWORD is verified before the anti-theft operation is performed, which can prevent the malicious terminal from sending an anti-theft command, causing the mobile terminal to perform an anti-theft operation (such as malicious lock screen, leaking real-time location information, etc.), which causes bad consequences. Users can also perform PASSWORD settings as needed, and directly perform mobile terminal anti-theft through PC or account, avoiding cumbersome steps. No need for PASSWORD authentication is usually used in trusted network environments or commonly used trusted terminals, such as home computers, office computers and other devices.
- step S2002 shown in FIG. 20 is performed to receive the anti-theft instruction from the PC terminal.
- step S2004 is executed to parse the received anti-theft command to obtain the identity of the mobile terminal carried in the anti-theft command.
- step S2006 shown in FIG. 20 is executed, and the operation corresponding to the anti-theft command is executed to implement the anti-theft of the mobile terminal. If the verification fails, the embodiment of the present invention stops responding and does not perform any operation.
- the IMEI is preferably a unique identifier of the mobile terminal.
- the PC terminal and the mobile terminal can be connected through a wired or wireless connection.
- the PC terminal and the mobile terminal can be connected through a Universal Serial Bus (USB) data line.
- the PC terminal and the mobile terminal can be connected by wireless means such as Bluetooth or a wireless network.
- the PC terminal and the mobile terminal can be connected and opened through wired or wireless manner, so that the PC terminal and the mobile terminal can be connected and opened through various methods or means, thereby being able to perform anti-theft on the mobile terminal through the PC terminal. To effectively ensure the security of the mobile terminal.
- 21 is a process flow diagram showing a method of activating a mobile phone anti-theft function on the side of a PC terminal according to an embodiment of the present invention. Referring to FIG. 21, the flow includes at least steps S2102 through S2116.
- Step S2202 determining whether the connection between the PC terminal and the mobile phone is established. If yes, go to step S2104, if no, the flow ends.
- Step S2104 Acquire an identity identifier IMEI of the mobile phone.
- Step S2106 Determine whether the user login account is activated. If no, step S2108 is performed, and if so, step S2110 is performed.
- Step S2108 Send a PC Binding (Bind_By_PC) instruction to the server.
- the PC anti-theft policy is triggered, and the anti-theft command is directly sent to the server through the PC terminal, or after the PASSWORD is input and the verification is passed, the anti-theft command is sent to the server.
- the format of the anti-theft instruction may include a command number (ACTIONID), a task number (TASKID), and additional information (OTHERS).
- ACTIONID is Bind_By_PC
- TASKID is 0, and OTHERS is GUID, IMEI, and password.
- Step S2110 Send a Bind instruction to the server.
- step S2106 If the user login account is activated according to the judgment result of step S2106, the account anti-theft policy is triggered.
- step S2122 an activation file is generated.
- the anti-theft mode is identified as including only the GUID or including the GUID and the PASSWORD. If only the mobile phone needs to open the account anti-theft, the anti-theft mode is identified as including only the UID. If the mobile phone needs to turn on PC anti-theft and account anti-theft, the anti-theft mode identifier includes GUID and UID or includes GUID, UID and PASSWORD at the same time.
- Step S2114 Send the activation file to the mobile phone.
- Step S2116 notifying the mobile phone to read the activation file and open.
- the step of reading the activation file in the mobile phone Android system and opening it is: starting the process, the process name and parameters are: adb shell am start-a BIND_FROM_PC-n com.qihoo360.mobilesafe/com.qihoo360.mobilesafe.PortalActivity- d/mnt/sdcard/Protection.dat.
- BIND_FROM_PC represents an Intent Action.
- Com.qihoo360.mobilesafe represents the package name of the Android app.
- Com.qihoo360.PortalActivity represents the Activity that is actually used to handle the activation. /mnt/sdcard/Protection.dat indicates the path where the file is opened.
- Figure 22 is a flow chart showing the processing of the anti-theft method on the side of the mobile phone according to an embodiment of the present invention. Referring to FIG. 22, the flow includes at least steps S2202 to S2224.
- step S2202 an activation command sent by the PC terminal is received, and the legitimacy is determined.
- the mobile phone After receiving the activation command sent by the PC terminal, the mobile phone determines whether the command in the activation command is Bind_From_PC, and obtains a field in the instruction to check whether the field is the path of the complete activation file. If the command in the activation command is Bind_From_PC, it is determined that the instruction is legal, and step S2204 is performed. If not, the process ends.
- step S2204 the activation file is parsed, and the IMEI carried in the activation file is obtained.
- step S2206 it is determined whether the IMEI is correct. If yes, step S2208 is performed, and if no, step S2210 is performed.
- step S2208 the anti-theft mode identifier carried in the activation file is read and saved.
- the anti-theft mode identifier includes only the GUID
- the PC anti-theft policy is turned on, and the operation corresponding to the anti-theft command is directly executed.
- the PC anti-theft policy is turned on to verify whether the PASSWROD is correct; if yes, the operation corresponding to the anti-theft command is executed; if not, the response is stopped.
- the account anti-theft policy is activated, the USERNAME is registered in the mobile terminal, the anti-theft command from the UID is received, and the corresponding operation is performed.
- the anti-theft mode identifier includes the GUID and the UID
- the PC anti-theft policy and the account anti-theft policy are enabled, and the anti-theft command from the PC terminal or the UID is received and the corresponding operation is performed.
- the anti-theft mode identifier includes the GUID, the UID, and the PASSWORD
- the PC anti-theft policy and the account anti-theft policy are enabled, and the anti-theft command from the PC terminal or the UID is verified to verify the PASSWORD; if the verification is passed, the corresponding operation of the received anti-theft command is performed. ; If the verification fails, the response stops.
- PC anti-theft identifier value is set to the GUID value.
- PC anti-theft identifier value is set to the GUID value.
- PC anti-theft identifier value is the GUID value.
- Account ID Value is the UID value.
- the anti-theft mode identifier includes GUID, UID, and PASSWORD:
- PC anti-theft identifier value is the GUID value.
- the anti-theft mode flag When the anti-theft mode flag includes other conditions, it is processed as a failure.
- step S2210 the anti-theft function fails.
- step S2212 the anti-theft function is successfully activated.
- Step S2214 Receive an anti-theft command sent by the PC terminal.
- Step S2216 parsing the anti-theft command, and acquiring the anti-theft command and the identity identifier.
- Step S2218 verifying the identity identifier carried in the anti-theft command. If the verification is passed, step S2220 is performed, and if the verification fails, the process ends.
- Step S2220 Perform an operation corresponding to the anti-theft command.
- Step S2222 Polling whether the anti-theft command is successfully executed. If yes, go to step S2224, if no, continue Perform this step.
- step S2224 the anti-theft command is successfully executed, and the execution result is returned to the PC terminal, and the process ends.
- the embodiment of the present invention provides a mobile terminal anti-theft client for implementing the above-mentioned mobile terminal anti-theft method.
- FIG. 23 is a schematic structural diagram of a mobile terminal anti-theft client according to an embodiment of the present invention.
- the client of the embodiment of the present invention includes at least a receiving module 2330, a parsing module 2340, and an executing module 2350.
- the receiving module 2330 is configured to receive an anti-theft command from the PC terminal.
- the parsing module 2340 is coupled to the receiving module 2330 and configured to parse the anti-theft command to obtain an anti-theft command corresponding to the command.
- the execution module 2350 is coupled to the parsing module 2340 and configured to perform an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
- the activation module 2320 receives the activation file from the PC terminal carrying the identity of the mobile terminal and the anti-theft mode identifier. After receiving the activation file, the activation module 2320 verifies the activation file according to the identity of the mobile terminal carried in the activation file. If the identity of the mobile terminal carried in the activation file is the identity of the mobile terminal, the activation file passes the verification. If the identity of the mobile terminal carried in the activation file is not the identity of the mobile terminal, the activation file fails to pass the verification. After the activation file passes the verification, the activation module 2320 determines different anti-theft modes according to the anti-theft mode identification carried by the activation file.
- the anti-theft mode identifier can be divided into a first group of anti-theft mode identifiers including only a random string GUID, a second group of anti-theft mode identifiers including GUID and PASSWORD, and a third including only UIDs.
- the activation module 2320 turns on the PC anti-theft policy, and directly performs the corresponding anti-theft operation according to the received anti-theft command.
- the GUID is a random string generated by the PC terminal, and the string can establish a one-to-one binding relationship with the mobile terminal.
- the activation module 2320 turns on the PC anti-theft policy and verifies whether the PASSWORD is correct. If yes, the anti-theft operation corresponding to the received anti-theft command is executed. If no, the response is stopped and no action is taken.
- the PASSWORD is a password set by the user in advance. When the password value is not empty, the embodiment of the present invention verifies the PASSWORD before executing the anti-theft command.
- the activation module 2320 activates the account anti-theft policy.
- the UID is an account identifier that is generated after the user logs in to the account whose account name is USERSNAME is used to identify the account.
- the activation module 2320 activates the PC anti-theft policy and the account anti-theft policy, receives the anti-theft command from the PC terminal or the UID, and performs a corresponding anti-theft operation.
- the activation module 2320 When the anti-theft mode is identified as the fifth group of anti-theft mode identifiers including GUID, UID, and PASSWORD, the activation module 2320 enables the PC anti-theft policy and the account anti-theft policy. Moreover, when receiving an anti-theft command from a PC terminal or UID, it is necessary to first verify PASSWORD. Second, proceed to the next step based on whether PASSWORD is verified. Specifically, when passing, the embodiment of the present invention performs the anti-theft operation corresponding to the received anti-theft command. When not, the embodiment of the present invention stops responding and does not perform any operation.
- the receiving module 2330 coupled thereto is triggered.
- the trigger parsing module 2340 parses the anti-theft command, obtains the identity of the mobile terminal carried in the anti-theft command, and verifies the anti-theft command. If the verification is successful, the parsing module 2340 triggers the execution module 2350 to perform the anti-theft operation corresponding to the anti-theft command to implement the anti-theft of the mobile terminal. If the verification fails, the response is stopped and no action is taken.
- the polling module 2360 coupled with the executing module 2350 polls whether the anti-theft command is successfully executed, and if so, the polling module 2360 triggers the executing module 2350 to end the execution of the anti-theft command. If not, the polling module 2360 triggers the execution module 2350 to attempt to execute the anti-theft command again.
- the polling module 2360 performs a polling query on the execution of the anti-theft command to ensure that the anti-theft command acquired by the mobile terminal can be executed in time to prevent the thief from brushing the mobile terminal or other due to the untimely execution of the anti-theft command. The operation makes the mobile terminal unable to be retrieved.
- the embodiment of the present invention will execute a lock screen command to query whether the lock screen command is successfully executed. If the lock screen command is not executed, the embodiment of the present invention executes a lock screen command to lock the screen of the mobile terminal. If the lock screen command is successfully executed, the embodiment of the present invention abandons the execution of the screen lock command again.
- the mobile terminal where the mobile terminal anti-theft client is located as shown in FIG. 23 is connected to the PC terminal through the interface 2310 coupled to the activation module 2320.
- the interface 2310 can connect the mobile terminal to the PC terminal by wire or wirelessly.
- the interface 2310 can be connected to a PC terminal via a USB data line.
- the interface 2310 can be connected to a PC terminal via a wireless method such as Bluetooth or a wireless network.
- the PC terminal and the interface 2310 can be connected and opened through wired or wireless manner, so that the PC terminal and the mobile terminal can be connected and opened through various methods or means, thereby enabling the mobile terminal to perform anti-theft through the PC. Ensure the security of the mobile terminal.
- the embodiment of the present invention can achieve the following beneficial effects:
- the anti-theft command from the PC terminal is received, the anti-theft command is obtained by parsing the anti-theft command, and the corresponding anti-theft operation can be performed according to the anti-theft command.
- the anti-theft command in the embodiment of the present invention comes from being able to use the PC terminal to open and use the anti-theft function of the mobile terminal on the premise that the stolen mobile terminal does not have the anti-theft function turned on.
- the operation is simple, so that the mobile terminal can be realized conveniently and quickly
- the anti-theft and can provide a complete anti-theft function to burglar the mobile terminal, and solve the problem that the mobile terminal cannot continue to burglar the mobile terminal after the mobile terminal is stolen in the prior art.
- the embodiment of the present invention can still receive the anti-theft instruction of the sender, and perform the anti-theft operation according to the anti-theft command obtained by analyzing the anti-theft instruction. For example, after the user mobile terminal is lost, by sending an anti-theft command to the stolen mobile terminal, the embodiment of the present invention can perform a lock screen operation on the stolen mobile terminal to prevent the thief from using the mobile terminal.
- the embodiment of the present invention can also obtain the identity information of the thief (such as a photo of the thief, a fingerprint, etc.). After the identity information of the thief is obtained according to the embodiment of the present invention, the thief can be arrested according to the identity identification information. Therefore, the embodiment of the present invention can effectively prevent theft of the terminal after the terminal is stolen, and reduce the crime rate of theft and protect the security of the user property.
- FIG. 24 is a flow chart showing the processing of the mobile terminal anti-theft method according to an embodiment of the present invention. Referring to FIG. 24, the flow includes at least steps S2402 through S2406.
- Step S2402 Determine identity information of the sender according to the anti-theft command from the sender.
- Step S2404 Start an anti-theft policy that matches the identity information of the sender, and parse the anti-theft command to obtain an anti-theft command corresponding to the instruction.
- Step S2406 Perform an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
- the identity information of the sender can be determined according to the anti-theft command from the sender, the anti-theft policy matching the sender identity information is activated to parse the anti-theft command, the anti-theft command corresponding to the instruction is obtained, and the anti-theft command is executed. Operation to achieve anti-theft of the mobile terminal.
- the anti-theft command in the embodiment of the present invention may be from a device or terminal capable of sending a short message (such as a sender of the anti-theft command being a mobile terminal or a server or a personal computer), or may be from a device or terminal capable of transmitting a network command.
- SMS or network commands such as mobile phones, computers, tablets, etc.
- the anti-theft command is sent quickly by SMS or network command, and the arrival time is accurate, which can save the traffic and power consumption of the stolen mobile terminal. Recovering the stolen mobile terminal to provide more time, so that the anti-theft of the mobile terminal can be realized conveniently and quickly, and solving the problem that the mobile terminal cannot continue to burglar the mobile terminal after the mobile terminal is stolen in the prior art.
- the embodiment of the present invention After determining the identity information of the sender, the embodiment of the present invention initiates an anti-theft policy that matches the identity information of the sender to parse the anti-theft command, and obtains a corresponding anti-theft command, so as to ensure that the anti-theft protection can be performed on the mobile terminal according to the user's need to select an appropriate anti-theft policy.
- an anti-theft policy can be matched to perform anti-theft protection on the mobile terminal, and multiple anti-theft policies can be matched to simultaneously protect the mobile terminal against theft, thereby enhancing the security of the mobile terminal.
- the embodiment of the present invention after the mobile terminal is stolen, the anti-theft command of the sender can still be received, and the anti-theft operation is performed according to the anti-theft command obtained by parsing the anti-theft command.
- the embodiment of the present invention can perform a lock screen operation on the stolen mobile terminal to prevent the thief from using the mobile terminal.
- the thief cannot use the mobile terminal, and the thief cannot operate the refurbishment mobile terminal by brushing the machine or the like. In turn, the thief cannot resell the stolen mobile terminal for profit. Further, the probability of theft crime can be effectively reduced.
- the embodiment of the present invention can also obtain the identity information of the thief (such as a photo of the thief, a fingerprint, etc.). After the identity information of the thief is obtained according to the embodiment of the present invention, the thief can be arrested according to the identity identification information. Therefore, the embodiment of the present invention can effectively prevent theft of the terminal after the terminal is stolen, and reduce the crime rate of theft and protect the security of the user property.
- the identity information of the thief such as a photo of the thief, a fingerprint, etc.
- the embodiment of the present invention obtains a special character carried in the anti-theft command, and determines the identity information of the sender according to the special character.
- special characters are specific strings.
- the identity information of the sender determined according to the special character includes at least one of a mobile terminal, a server, or a PC.
- the sending carrier of the anti-theft command is a short message.
- the sending carrier of the anti-theft command is a short message and/or a network command.
- the sender is a PC terminal
- the sending carrier of the anti-theft command is a short message and/or a network command.
- the anti-theft command can be sent by using a short message as a carrier.
- the embodiment of the present invention registers the short message interception function.
- Figure 25 is a flow chart showing the process of registering a short message interception function in accordance with one embodiment of the present invention.
- the embodiment of the present invention first registers a short message interception function.
- the embodiment of the present invention executes step S2504 to generate a mapping table corresponding to the anti-theft command and the anti-theft command.
- the mapping table may also be referred to as a “sms-command table”, and the anti-theft command corresponding to the received short message may be found and determined according to the table.
- the anti-theft command and the anti-theft command form a correspondence relationship.
- the mapping table the anti-theft command and the anti-theft command form a correspondence relationship.
- step S2506 is executed to generate a mapping table corresponding to the command number (ACTIONID).
- the command number forms a one-to-one mapping relationship with the command.
- a command recognizable by the stolen mobile terminal can also be added to the mapping.
- Bind corresponds to the account used for anti-theft and PC anti-theft binding
- UnBind corresponds to the command used when the account anti-theft and PC anti-theft are unbound.
- step S2508 is executed to disclose the interface for reading the file to the PC side. In the PC anti-theft strategy, it is necessary to disclose an interface that can be directly called by the PC.
- the operation flowchart of the short message receiving processing method according to an embodiment of the present invention shown in FIG. 5 is performed.
- the processing flow chart after receiving the short message (ie, step) shown in the embodiment of the present invention processes the short message.
- the embodiment of the invention determines whether the received short message carries an anti-theft instruction.
- the mapping table corresponding to the anti-theft command and the anti-theft command generated in step S2504 in FIG. 25 the embodiment of the present invention queries whether the received short message carries the anti-theft instruction including the special character in the mapping table.
- the received short message carries an anti-theft command and intercepts the short message (usually called eating the short message). Then, the anti-theft instruction information in the short message is obtained, and the operation of determining the identity information of the sender is triggered, and the process ends.
- the embodiment of the invention continues the steps. If the special character is not included, it is determined that the received short message does not carry the anti-theft command. In the embodiment of the present invention, the short message is released, and the process ends.
- the anti-theft strategy that can be used in the embodiments of the present invention includes at least three types. Therefore, in an actual application, when the anti-theft terminal receives the anti-theft SMS, it needs to determine which anti-theft SMS is issued according to the anti-theft policy, and thus It can be processed according to the corresponding anti-theft strategy.
- 26 shows a process flow diagram of a method of determining an anti-theft policy in accordance with one embodiment of the present invention. Referring to FIG. 26, the flow includes at least steps S2602 through S2622.
- Step S2602 The mobile terminal receives the short message.
- Step S2604 determining whether it is a short message anti-theft SMS. If yes, go to step S2606, if no, go to step S2610.
- Step S2606 intercepting the short message, and triggering the SMS anti-theft strategy.
- step S2608 the SMS anti-theft strategy is executed, and the process ends.
- Step S2610 Determine whether it is an account anti-theft SMS. If yes, go to step S2612, if no, go to step S2616.
- Step S2612 intercepting the short message, triggering the account anti-theft strategy.
- step S2614 the account anti-theft strategy is executed, and the process ends.
- step S2616 it is determined whether it is a PC anti-theft SMS. If yes, go to step S2618, if no, go to step S2622.
- Step S2618 intercepting the short message, triggering the PC anti-theft strategy.
- step S2620 the PC anti-theft strategy is executed, and the process ends.
- step S2622 the short message is released, and the process ends.
- releasing the short message can reduce the vigilance of the thief, and is beneficial for recovering the stolen terminal and capturing the thief. For example, after the user's mobile terminal is lost, if the thief sees that the mobile terminal can receive the short message in the stolen mobile terminal, the mobile terminal is considered not to be locked, and the anti-theft function is not turned on.
- the embodiment of the present invention intercepts the short message carrying the anti-theft command so that it cannot be displayed in the system of the mobile terminal, but performs the anti-theft operation according to the anti-theft instruction carried in the short message in the background.
- the embodiment of the invention can reduce the vigilance of the thief and increase the possibility of the stolen mobile terminal retrieving, thereby effectively curbing the occurrence of theft crime and protecting the user's property security.
- step S2404 in FIG. 24 is continued, and the anti-theft policy matching the sender identity information is started to parse the anti-theft command, and the anti-theft command corresponding to the instruction is obtained.
- the anti-theft policy includes three types, and the corresponding sender differs according to the anti-theft policy.
- the anti-theft policy is the SMS anti-theft policy
- the sender is the mobile terminal
- the anti-theft policy is the account anti-theft strategy.
- the sender is a server or a PC terminal
- the anti-theft policy is a PC anti-theft policy
- the sender is a PC terminal.
- the mobile terminal anti-theft method according to the embodiment of the present invention is separately introduced according to different senders (ie, corresponding different anti-theft policies).
- the mobile terminal anti-theft method provided by the embodiment of the present invention is first introduced when the sender is a mobile terminal.
- the anti-theft policy matched with the mobile terminal is a short message anti-theft policy, and the anti-theft command is sent by using the short message as a carrier.
- the embodiment of the present invention acquires the anti-theft instruction information in the short message, and triggers the operation of determining or verifying the sender identity information.
- the anti-theft instruction is parsed, and the verification code of the sender that sends the anti-theft instruction is obtained.
- the embodiment of the present invention continues to obtain the verification code and The verification code pre-stored by the mobile terminal is matched, and according to the matching result, it is determined whether to obtain the anti-theft command corresponding to the anti-theft instruction. If the obtained verification code matches the trusted mobile terminal identifier and/or password pre-stored by the mobile terminal, the anti-theft command is obtained.
- the obtained verification code does not match the trusted mobile terminal identifier and/or password pre-stored by the mobile terminal, in order to avoid receiving the anti-theft command sent by the malicious sender, the erroneous anti-theft operation is performed on the mobile terminal, and the embodiment of the present invention ignores the Anti-theft command.
- the verification code may be the sender's mobile terminal identifier and/or the password that the sender can trust.
- the sender's mobile terminal identifier includes at least one of a sender's phone number, a sender's SIM card number, and a sender's IMEI.
- the password that proves that the sender can trust may be at least one of the sender's mobile terminal identifier and a pre-set string that the sender can trust. For example, any combination of numbers and letters can be set to a string that proves that the sender can trust. For example, ac1088206, A34TFAK6808, etc. It is also possible to set the name of the user or the birthday of the user, the birthday of the pet as a password to prove that the sender can trust, and the like.
- the trusted mobile terminal identifier and/or password are collectively referred to as a password, and the trusted mobile terminal identifier is referred to as a relative friend number. See Figure 6 for a process flow diagram of a method of pre-storing a trusted mobile terminal identity and/or password.
- the method for storing the trusted mobile terminal identifier and/or password is as described above.
- the trusted mobile terminal identifier and the stored trusted mobile terminal may be set by setting the trusted mobile terminal identifier and/or the password to be empty. / or password is deleted.
- the embodiment of the present invention can set the family friend number and the SMS anti-theft password to be empty according to the flow shown in FIG. 6, and click the “open password” column to turn off the password function.
- the embodiment of the present invention may also select the logout anti-theft function.
- the embodiment of the present invention obtains a verification code when parsing the anti-theft instruction, and determines whether the anti-theft instruction is encrypted. If the anti-theft command is an encrypted anti-theft command, the embodiment of the present invention decrypts the anti-theft instruction by using a corresponding decryption means, and decrypts the verification code by using a corresponding decryption means, and obtains the decrypted verification code and performs matching.
- step S2406 shown in FIG. 24 is executed, and the operation corresponding to the anti-theft command is executed to implement the anti-theft of the mobile terminal.
- the embodiment of the present invention polls whether the command is successfully executed, and the flowchart of the process of polling the command execution is shown in FIG. 7.
- the polling query is performed on the execution of the anti-theft command to ensure that the anti-theft command acquired by the mobile terminal can be executed in time, so as to prevent the thief from brushing or other operations on the mobile terminal due to the untimely execution of the anti-theft command. Can't be retrieved.
- the embodiment of the present invention will execute a lock screen command to query whether the lock screen command is successfully executed. If the lock screen command is not executed, the embodiment of the present invention executes a lock screen command to lock the screen of the mobile terminal. If the lock screen command is successfully executed, the embodiment of the present invention abandons the execution of the screen lock command again.
- the embodiment of the present invention After the received anti-theft command is executed, the embodiment of the present invention returns the execution result as a sender to the sender of the anti-theft command, and reminds the sender that the anti-theft command has been executed. After receiving the receipt, the sender can continue the next anti-theft operation. In addition, if the anti-theft command sender does not receive the receipt within the specified time, the embodiment of the present invention initiates a polling query to check whether the receipt is successful. See Figure 8 for the process flow of the method for querying receipts.
- the mobile terminal anti-theft method (the sender is a mobile terminal) of the present invention will now be described by way of a specific embodiment.
- the sender is set to the mobile phone of the relatives and friends, and the mobile terminal is set to the stolen mobile phone.
- a processing flowchart of a mobile terminal anti-theft method using a short message anti-theft policy is provided.
- FIG. 9 For the specific process, refer to FIG. 9.
- the processing flow of the mobile terminal anti-theft method of the preferred embodiment is introduced from the mobile phone side of the relatives and friends and the stolen mobile phone side respectively.
- the sender and the whistle-selling sender are represented by the family and friends mobile phone. According to the disclosure of the present invention, those skilled in the art can understand that the burglar-proof command sender can not only make the friends and relatives mobile phone, but can be any other communication device that can send short messages. The authenticity of the sender is verified by verifying the password contained in the anti-theft command, and the present invention is not limited thereto.
- FIG. 10 The process flow of the mobile terminal anti-theft method on the mobile phone side of the relatives and friends provided by one embodiment of the present invention is shown in FIG. 10 .
- the embodiment edits and sends the anti-theft SMS to the stolen mobile phone through the mobile phone of the relatives and friends.
- the embodiment can directly transmit by editing the special anti-theft short message.
- the anti-theft command in the anti-theft SMS is some anti-theft commands with high security requirements, such as "delete mobile phone data", "backup mobile phone data”, etc., this embodiment first encrypts the anti-theft SMS to be sent. Second, the encrypted anti-theft SMS is sent to the stolen phone.
- the special mark is first spliced.
- a special mark stitched in step S1002 in the above-mentioned map containing special characters and anti-theft instructions.
- step S1004 to encrypt the remaining content.
- the number after “Dingwei#E” indicates the verification code, that is, the password or the number of friends and relatives pre-stored by the stolen mobile phone.
- Step S1004 performs encryption processing on the password or the relative friend number.
- "DingweiE#ac35e5b301" is obtained.
- the letters and numbers in the anti-theft command shown in the embodiment of the present invention are only used as examples, and cannot represent the real digits of the real password or the number of friends and relatives or the actual display of the encrypted anti-theft command.
- step S1006 After encrypting the anti-theft SMS, the embodiment proceeds to step S1006 to send the anti-theft SMS to the stolen mobile phone, and the process ends.
- an embodiment of the present invention provides a processing flowchart of the mobile terminal anti-theft method on the side of the stolen mobile phone, as shown in FIG.
- the embodiment of the present invention provides another method for preventing theft of the mobile terminal.
- the anti-theft policy matched with the server is an account anti-theft policy, and the anti-theft command is sent by using a short message and/or a network instruction as a carrier.
- the embodiment of the present invention receives an anti-theft instruction from the server.
- the anti-theft instruction format may include only special characters, and may include both special characters and other identification information except special characters.
- the anti-theft instruction may include a special character, an activated account identifier, an anti-theft command, and an anti-theft object identifier. At least one of them.
- the special character is Account, which is used to determine the identifier of the anti-theft policy. After the identifier is determined, no change occurs.
- the activated account ID is the unique UID generated for the account at the time of login.
- the anti-theft command includes a command number (ACTIONID) and/or a task number (TASKID), wherein the corresponding command can be found in the correspondence table including the anti-theft command and the anti-theft command by the ACTIONID.
- TASKID is a corresponding task number generated in the server when the anti-theft command is transmitted, and the TASKID can query the execution status of the anti-theft command corresponding to the TASKID in the server.
- the TASKID is 0.
- the anti-theft object identifier may include the IMEI of the mobile terminal, and may also include other identity identifiers that can uniquely identify the mobile terminal.
- the format of the anti-theft instruction can be set as:
- OTHERS is additional information related to the anti-theft command.
- the information of the Erase command is to specify which part of the data in the mobile terminal system is deleted (for example, deleting the short message data or the notebook data in the system or the chat data of the application, etc.).
- the additional information of TakePhoto can be a requirement for the clarity of the captured photo.
- the format of the terminal lock instruction is: [Accout] 200868996, 323450296939291, LOCK, 2000000, 0.
- the embodiment of the present invention parses the anti-theft command according to the account anti-theft policy. In the case of performing an analysis operation on the anti-theft instruction, the embodiment of the present invention determines whether the anti-theft instruction is encrypted. If the anti-theft command is an encrypted anti-theft command, the embodiment of the present invention decrypts the anti-theft command by using a corresponding decryption means. In the embodiment of the present invention, the anti-theft instruction may be encrypted by any encryption algorithm. In the embodiment of the present invention, the anti-theft instruction is decrypted by using a corresponding decryption method when parsing the anti-theft instruction, which is not limited by the embodiment of the present invention. For the encryption and decryption mode, refer to the corresponding introduction part of the second embodiment, and no further details are provided here.
- the anti-theft command received by the embodiment of the present invention is described above. Before receiving the anti-theft command, the embodiment of the present invention needs to activate the anti-theft function in the mobile terminal.
- One embodiment of the present invention provides a processing flowchart of a method for turning on the anti-theft function. For details, please refer to FIG. 14.
- An embodiment of the present invention also provides a method for unbinding, and a processing flowchart thereof is shown in FIG. 15.
- the embodiment of the present invention can cancel the anti-theft function.
- the embodiment of the present invention first logs in the activated account in the client that can trigger the theft prevention of the mobile terminal.
- the client capable of triggering theft prevention of the mobile terminal may be a browser, and may be a client with a mobile phone anti-theft function on the mobile phone side (for example, a mobile guard), or may have a mobile phone anti-theft function on the PC side.
- the embodiments of the present invention are not limited by the embodiments of the present invention.
- the anti-theft command can be sent by using the short message and/or the network command as the carrier to ensure that the mobile terminal can be burglarized by sending the anti-theft command in time through the common sender.
- the mobile terminal after the mobile terminal receives the short message, the mobile terminal first determines whether the short message carries the anti-theft command, and if so, intercepts the short message and triggers the analysis of the anti-theft command operation. . If not, release the message.
- the embodiment of the present invention determines that the short message is carried in the short message, and then intercepts the short message (usually referred to as eating the short message).
- the short message usually referred to as eating the short message.
- the activated account is logged in, and the anti-theft command sent by the activated account with the short message and/or the network as the carrier is received.
- the mobile terminal that performs the anti-theft operation is selected in the device list of the activated account, and the anti-theft command for the mobile terminal is sent to the server by the activated account.
- the "Get Device List” command is sent to the server.
- ACTIONID is GET_LIST
- TASKID is 0, and OTHERS is empty.
- the server returns a list of devices corresponding to the account.
- the device list includes information such as identity information (such as IMEI or UID) of the mobile terminal and a phone number of the mobile terminal.
- the activated account selects the specified mobile terminal in the device list, and sends an anti-theft command to the mobile terminal to the server, which is forwarded by the server to the mobile terminal.
- the identifier of the mobile terminal is input from the activated account, and the input identifier of the mobile terminal is added to the device list of the activated account. And, the anti-theft operation corresponding to the mobile terminal is selected and sent to the mobile terminal by the server.
- the mobile terminal After receiving the anti-theft command, the mobile terminal parses the anti-theft command to obtain an anti-theft command, and then performs an anti-theft operation according to the anti-theft command.
- the polling query is performed on the execution of the anti-theft command to ensure that the anti-theft command acquired by the mobile terminal can be executed in time, so as to prevent the thief from brushing or other operations on the mobile terminal due to the untimely execution of the anti-theft command. Can't be retrieved.
- the embodiment of the present invention will execute a lock screen command to query whether the lock screen command is successfully executed. If the lock screen command is not executed, the embodiment of the present invention executes a lock screen command to lock the screen of the mobile terminal. If the lock screen command is successfully executed, the embodiment of the present invention abandons the execution of the screen lock command again.
- the embodiment of the present invention After the execution of the received anti-theft command is completed, the embodiment of the present invention returns the execution result as a receipt to the server, and reminds the server that the execution has been performed. After the server receives the receipt, it can continue the next anti-theft operation. In addition, if the server does not receive the receipt within the specified time, the embodiment of the present invention initiates a polling query to check whether the receipt is successful.
- One embodiment of the present invention provides a processing flowchart of a method for querying a receipt, which is specifically shown in FIG. 8.
- FIG. 16 shows a processing flowchart of a mobile terminal anti-theft method using an account anti-theft policy according to a preferred embodiment of the present invention. For details, please refer to FIG. 16.
- An embodiment of the present invention provides a process flow for sending an anti-theft command on the side of an activated account. For details, see Figure 17.
- an embodiment of the present invention provides a processing flowchart of a method for preventing theft on the side of the mobile terminal. For details, please refer to FIG. 18.
- a mobile terminal anti-theft method provided by an embodiment of the present invention is provided when the sender is a PC terminal.
- the anti-theft policy matched with the server is a PC anti-theft policy or an account anti-theft policy, and the anti-theft command is sent by using a short message and/or a network command as a carrier.
- the activation file carrying the identity of the mobile terminal and the anti-theft mode identifier from the PC terminal is received. See Example 4 for an introduction to the activation file.
- anti-theft mode identification Due to the variety of anti-theft modes, there are various types of anti-theft mode identification. Conversely, different anti-theft modes can be distinguished according to different information included in different anti-theft mode identifiers. For an example of providing different anti-theft mode identifications in the embodiments of the present invention, refer to Embodiment 4.
- the embodiment of the present invention can activate different anti-theft modes according to different types of anti-theft mode identifiers carried in the activation file sent by the PC terminal. That is, when the mobile terminal performs the anti-theft operation through the PC terminal, the anti-theft policy can be triggered by the PC terminal to send the anti-theft command to the mobile terminal, and multiple anti-theft policies can be triggered to simultaneously send the anti-theft command to the mobile terminal. For example, when the anti-theft mode identifier in the activation file is only included in the UID or only the GUID, the embodiment of the present invention can perform only the account anti-theft policy or only the PC anti-theft policy.
- the embodiment of the present invention can simultaneously perform PC anti-theft and account anti-theft, enhance the anti-theft protection to the mobile terminal, and increase the possibility of retrieving the mobile terminal.
- the PC anti-theft includes sending an anti-theft command to the mobile terminal through the PC terminal to perform anti-theft on the mobile terminal, and further including an activation account to perform account anti-theft on the mobile terminal.
- the PC terminal activates the account to perform account theft prevention on the mobile terminal, the PC terminal only transmits the account information to the mobile terminal as the login party.
- the PASSWORD can be personalized. If the user sets PASSWORD, the PASSWORD is verified before the anti-theft operation is performed, which can prevent the malicious terminal from sending an anti-theft command, causing the mobile terminal to perform an anti-theft operation (such as malicious lock screen, leaking real-time location information, etc.), which causes bad consequences. Users can also perform PASSWORD settings as needed, and directly perform mobile terminal anti-theft through PC or account, avoiding cumbersome steps. No need for PASSWORD authentication is usually used in trusted network environments or commonly used trusted terminals, such as home computers, office computers and other devices.
- the anti-theft instruction from the PC terminal is received.
- the received anti-theft command is parsed to obtain the identity of the mobile terminal carried in the anti-theft command.
- the embodiment of the present invention verifies the identity identifier. If the verification is passed, the operation corresponding to the anti-theft command is executed to implement the anti-theft of the mobile terminal. If the verification fails, the embodiment of the present invention stops responding and does not perform any operation.
- a polling query is performed on the execution of the anti-theft command to ensure that the anti-theft command acquired by the mobile terminal can be The execution is performed to avoid that the thief does not promptly perform the flashing of the mobile terminal or other operations caused by the burglary command, so that the mobile terminal cannot be retrieved.
- the embodiment of the present invention will execute a lock screen command to query whether the lock screen command is successfully executed. If the lock screen command is not executed, the embodiment of the present invention executes a lock screen command to lock the screen of the mobile terminal. If the lock screen command is successfully executed, the embodiment of the present invention abandons the execution of the screen lock command again.
- the identity of the mobile terminal may be a SIM card number, and may be any identity identification information that can uniquely identify the mobile terminal, such as hardware configuration information of the mobile terminal.
- the embodiment of the present invention adopts the IMEI number of the mobile terminal as the identity of the mobile terminal, and the IMEI number itself is permanently bound to the mobile terminal and is unique and has high recognizability. Therefore, in the embodiment of the present invention, Preferably, the IMEI is a unique identity of the mobile terminal.
- the PC terminal and the mobile terminal can be connected through a wired or wireless connection.
- the PC terminal and the mobile terminal can be connected through a Universal Serial Bus (USB) data line.
- the PC terminal and the mobile terminal can be connected by wireless means such as Bluetooth or a wireless network.
- the PC terminal and the mobile terminal can be connected and opened through wired or wireless manner, so that the PC terminal and the mobile terminal can be connected and opened through various methods or means, thereby being able to perform anti-theft on the mobile terminal through the PC terminal. To effectively ensure the security of the mobile terminal.
- the mobile terminal anti-theft method (the sender is a PC terminal) of the present invention will now be described by way of a specific embodiment.
- One embodiment of the present invention provides a processing flowchart of a method for activating a mobile phone anti-theft function on a PC terminal side. For a specific flowchart, refer to FIG. 21. Correspondingly, an embodiment of the present invention further provides a processing flowchart of the anti-theft method on the mobile phone side. For a specific flowchart, refer to FIG. 22.
- the embodiment of the present invention sends a receipt to the anti-theft command sender.
- the identity of the sender is not determined, after the execution of the anti-theft command is completed, the type of receipt is first determined, and secondly, the number of attempts to return is different according to the type of receipt.
- the PC anti-theft policy is executed, the receipt is sent to the PC terminal through the network, and the method is implemented to set an attempt to send 10 receipts to the PC terminal.
- the embodiment of the present invention When the SMS anti-theft policy is executed, the embodiment of the present invention directly sends a receipt to the mobile terminal. In order to avoid the vigilance of the thief, reduce the number of receipts sent to 5 times.
- the embodiment of the present invention sends a receipt to the server through the network. If the transmission is attempted multiple times (for example, 8 times), the transmission still fails, and then the message is sent as a carrier to send the receipt to the mobile device. Terminal, if you can set the number of attempts to 2 times.
- FIG. 27 is a flow chart showing a process of mutually exclusive querying a command execution situation according to an embodiment of the present invention. As shown in FIG. 27, when the command is executed in the embodiment of the present invention, step S2702 in FIG. 27 is executed to determine whether the anti-theft command to be executed is being executed.
- step S2706 is executed to execute the anti-theft command. The process ends. If the anti-theft command is being executed according to the judgment result, step S2704 is performed. In step S2704, it is determined whether the anti-theft command is executed twice or more twice or not. If they are mutually exclusive, step S2708 is executed, the execution of the anti-theft command fails, and the process ends. If they are not mutually exclusive, step S2706 is executed to execute the anti-theft command, and the process ends.
- the polling query is performed on the execution of the anti-theft command to ensure that the anti-theft command acquired by the mobile terminal can be executed in time, so as to prevent the thief from brushing or other operations on the mobile terminal due to the untimely execution of the anti-theft command. Can't be retrieved.
- an embodiment of the present invention is about to execute a lock screen command to query whether the lock screen command is being executed. If the lock screen command is not executed, the embodiment of the present invention executes a lock screen command to lock the screen of the mobile terminal.
- the embodiment of the present invention abandons the execution of the screen lock command. For example, in the embodiment of the present invention, a photo forensic command for the unlocker is to be executed, and then whether the command is executing the photo forensic command is determined. If the command is not executed according to the judgment result, the embodiment of the present invention executes the photo forensic command. If the command is being executed according to the judgment result, and the photo forensic command can be executed twice or more, and is not mutually exclusive, the embodiment of the present invention continues to execute the photo forensic command.
- the embodiment of the present invention provides a mobile terminal anti-theft client for implementing the above-mentioned mobile terminal anti-theft method.
- FIG. 28 is a schematic structural diagram of a mobile terminal anti-theft client according to an embodiment of the present invention.
- the client of the embodiment of the present invention includes at least a determining module 2820, a parsing module 2840, and an executing module 2850.
- the determining module 2820 is configured to determine the identity information of the sender based on the anti-theft command from the sender.
- the parsing module 2840 is coupled to the determining module 2820 and configured to initiate an anti-theft policy that matches the sender identity information to parse the anti-theft command, and obtain an anti-theft command corresponding to the command.
- the execution module 2850 is coupled to the parsing module 2840 and configured to perform an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
- the determining module 2820 is further configured to:
- the sender's identity information is determined based on the special characters.
- the identity information of the sender includes at least one of the following:
- the sender is a mobile terminal
- the sender is the server
- the sender is a personal computer PC terminal.
- the determining module 2810 is further configured to:
- the method further includes:
- the matched anti-theft policy is a short message anti-theft strategy
- the matching anti-theft policy is an account anti-theft policy
- the matching anti-theft policy is a PC anti-theft policy or an account anti-theft policy.
- the method further includes:
- the sending carrier of the anti-theft command is a short message
- the sending carrier of the anti-theft command is: a short message and/or a network command
- the sending carrier of the anti-theft command is: short message and/or network command.
- the determining module 2810 is further configured to:
- the short message When the short message is used as the sending carrier of the anti-theft command, before determining the identity information of the sender, it is determined whether the received short message carries the anti-theft command;
- the parsing module 2840 is further configured to: when the sender is a mobile terminal,
- the SMS anti-theft policy is started to parse the anti-theft command, and the sender's mobile terminal identifier and/or password is obtained;
- the parsing obtains the anti-theft command corresponding to the instruction.
- the sender's mobile terminal identity includes at least one of: a sender's phone number, a sender's subscriber identity module SIM card number, and a sender's international mobile device identity code IMEI.
- the password pre-stored by the mobile terminal includes at least one of the following:
- the anti-theft command is sent to the server by the activated account, and the server forwards to the mobile terminal to trigger the anti-theft operation.
- the activated account is logged in a client capable of triggering theft prevention of the mobile terminal, wherein the client comprises at least one of the following: a browser, a client with a mobile phone anti-theft function on the mobile phone side, and a PC side The client of the mobile phone anti-theft function.
- the determination module 2820 is further configured to receive an anti-theft instruction forwarded by the server, the activated account is sent via a short message and/or a network command.
- the content of the short message and/or network command includes at least one of the following: in addition to the special character: the activated account identifier, the anti-theft command, and the anti-theft object identifier.
- the method further includes:
- the special character is Account
- the activated account identifier is the unique account identifier UID generated for the account at the time of current login;
- the anti-theft command includes a command number and/or a task number
- the anti-theft object identifier includes the IMEI of the mobile terminal.
- the method further includes:
- the activation module 2860 is configured to receive an activation file from the PC terminal before the anti-theft policy that matches the identity information of the sender is activated, and the activation file carries the identity of the mobile terminal and the anti-theft. Pattern identification
- the activation module is further configured to:
- the anti-theft mode identifier is a PC anti-theft mode identifier
- the PC anti-theft policy is activated
- the account anti-theft policy is activated.
- the anti-theft mode identification includes at least one of the following:
- the account identifier UID generated by the user after logging in to the account for identifying the account, wherein the account name of the UID user login is USERNAME;
- the activation module 2860 is further configured to:
- the anti-theft mode identifier includes only the GUID, the PC anti-theft policy is activated, and the operation corresponding to the anti-theft command is directly executed;
- the PC anti-theft policy is activated to verify whether the PASSWROD is correct; if yes, the operation corresponding to the anti-theft command is executed; if not, the response is stopped;
- the anti-theft mode identifier includes the UID, activate the account anti-theft policy, log in to the USERNAME in the mobile terminal, receive the anti-theft command from the UID, and perform the corresponding operation;
- the anti-theft mode identifier includes the GUID and the UID
- the PC anti-theft policy and the account anti-theft policy are activated, and the anti-theft command from the PC terminal or the UID is received and the corresponding operation is performed;
- the anti-theft mode identifier includes the GUID, the UID, and the PASSWORD
- the PC anti-theft policy and the account anti-theft policy are activated, and the anti-theft command from the PC terminal or the UID is authenticated to the PASSWORD; if the verification is passed, the corresponding operation of the received anti-theft command is performed; If the verification is not notified, the response is stopped.
- the method further includes:
- the decryption module 2830 is configured to decrypt the received anti-theft command by using a corresponding decryption means when the content of the anti-theft command is encrypted content, and obtain the parsable content of the anti-theft command.
- the encryption mode is DES encryption and the decryption mode is DES decryption.
- the encrypted anti-theft command comprises at least one of the following:
- the method further includes:
- the polling module 2870 is configured to poll the query for success if any of the anti-theft commands are executed;
- the polling module 2870 is further configured to: if the receipt of the requested party is not received within the specified time, polling whether the query is successful;
- the embodiment of the present invention can achieve the following beneficial effects:
- the identity information of the sender can be determined according to the anti-theft command from the sender, the anti-theft policy matching the sender identity information is activated to parse the anti-theft command, the anti-theft command corresponding to the instruction is obtained, and the anti-theft command is executed. Operation to achieve anti-theft of the mobile terminal.
- the anti-theft command in the embodiment of the present invention may be from a device or terminal capable of sending a short message (such as a sender of the anti-theft command being a mobile terminal or a server or a personal computer), or may be from a device or terminal capable of transmitting a network command.
- SMS or network commands such as mobile phones, computers, tablets, etc.
- the anti-theft command is sent quickly by SMS or network command, and the arrival time is accurate, which can save the traffic and power consumption of the stolen mobile terminal. Recovering the stolen mobile terminal to provide more time, so that the anti-theft of the mobile terminal can be realized conveniently and quickly, and solving the problem that the mobile terminal cannot continue to burglar the mobile terminal after the mobile terminal is stolen in the prior art.
- the embodiment of the present invention After determining the identity information of the sender, the embodiment of the present invention initiates an anti-theft policy that matches the identity information of the sender to parse the anti-theft command, and obtains a corresponding anti-theft command, so as to ensure that the anti-theft protection can be performed on the mobile terminal according to the user's need to select an appropriate anti-theft policy.
- an anti-theft policy can be matched to perform anti-theft protection on the mobile terminal, and multiple anti-theft policies can be matched to simultaneously protect the mobile terminal against theft, thereby enhancing the security of the mobile terminal.
- the embodiment of the present invention after the mobile terminal is stolen, the anti-theft command of the sender can still be received, and the anti-theft operation is performed according to the anti-theft command obtained by parsing the anti-theft command.
- the embodiment of the present invention can perform a lock screen operation on the stolen mobile terminal to prevent the thief from using the mobile terminal.
- the inability of the thief to use the mobile terminal causes the thief to fail to renovate the mobile terminal by brushing the machine, and the thief cannot resell the stolen mobile terminal for profit. Further, the probability of theft crime can be effectively reduced.
- the embodiment of the present invention can also obtain the identity information of the thief (such as a photo of the thief, a fingerprint, etc.). After the identity information of the thief is obtained according to the embodiment of the present invention, the thief can be arrested according to the identity identification information. Therefore, the embodiment of the present invention can effectively prevent theft of the terminal after the terminal is stolen, and reduce the crime rate of theft and protect the security of the user property.
- the identity information of the thief such as a photo of the thief, a fingerprint, etc.
- modules in the devices of the embodiments can be adaptively changed and placed in one or more devices different from the embodiment.
- the modules or units or components of the embodiments may be combined into one module or unit or component, and further they may be divided into a plurality of sub-modules or sub-units or sub-components.
- any combination of the features disclosed in the specification, including the accompanying claims, the abstract and the drawings, and any methods so disclosed, or All processes or units of the device are combined.
- Each feature disclosed in this specification (including the accompanying claims, the abstract and the drawings) may be replaced by alternative features that provide the same, equivalent or similar purpose.
- the various component embodiments of the present invention may be implemented in hardware, or in a software module running on one or more processors, or in a combination thereof.
- a microprocessor or digital signal processor may be used in practice to implement some or all of the functionality of some or all of the components of the device in accordance with embodiments of the present invention.
- the invention can also be implemented as a device or device program (e.g., a computer program and a computer program product) for performing some or all of the methods described herein.
- a program implementing the invention may be stored on a computer readable medium or may be in the form of one or more signals.
- Such signals may be downloaded from an Internet website, provided on a carrier signal, or provided in any other form.
- FIG. 29 illustrates a computing device that can implement the mobile terminal anti-theft method in accordance with the present invention.
- the computing device conventionally includes a processor 2910 and a computer program product or computer readable medium in the form of a memory 2920.
- the memory 2920 may be an electronic memory such as a flash memory, an EEPROM (Electrically Erasable Programmable Read Only Memory), an EPROM, a hard disk, or a ROM.
- Memory 2920 has a storage space 2930 for program code 2931 for performing any of the method steps described above.
- the storage space 2930 for program code may include respective program codes 2931 for implementing various steps in the above methods, respectively.
- the program code can be read from or written to one or more computer program products.
- Such computer program products include program code carriers such as hard disks, compact disks (CDs), memory cards or floppy disks.
- Such a computer program product is typically a portable or fixed storage unit as described with reference to FIG.
- the storage unit may have a storage segment, a storage space, and the like that are similarly arranged to the storage 2920 in the computing device of FIG.
- the program code can be compressed, for example, in an appropriate form.
- the storage unit includes computer readable code 2931', code that can be read by a processor, such as, for example, 2910, which, when executed by a computing device, causes the computing device to execute Each of the steps in the method described above.
Landscapes
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Databases & Information Systems (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
L'invention concerne un procédé antivol de terminal mobile et un client de terminal mobile. Le procédé antivol de terminal mobile est mis en oeuvre dans un terminal mobile dans lequel aucune fonction antivol n'a été déclenchée. Le procédé consiste à : recevoir d'un serveur une commande de mise en marche d'antivol d'arrière-plan, ladite commande comportant des informations de vérification d'un terminal mobile (S102); analyser la commande de mise en marche d'antivol d'arrière-plan, obtenir les informations de vérification et mettre en oeuvre la vérification (S104); si la vérification est réussie, mettre en marche la fonction antivol en arrière-plan selon la commande de mise en marche d'antivol d'arrière-plan (S106). D'autres procédés antivol de terminal mobile sont mis en oeuvre dans un terminal mobile dans lequel aucune fonction antivol n'a été déclenchée. La présente invention permet de mettre en marche une fonction antivol d'un terminal mobile après que celui-ci a été perdu, ce qui déclenche l'exécution d'opérations correspondantes d'antivol selon une commande d'antivol, et permet de conférer au terminal mobile de façon plus raisonnable et efficace des avantages de sécurité et de lutte contre le vol.
Applications Claiming Priority (10)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201310686970.7 | 2013-12-13 | ||
| CN201310687832.0 | 2013-12-13 | ||
| CN201310687136.XA CN103702331A (zh) | 2013-12-13 | 2013-12-13 | 移动终端防盗方法及客户端 |
| CN201310684848.6 | 2013-12-13 | ||
| CN201310684896.5 | 2013-12-13 | ||
| CN201310684848.6A CN103702317B (zh) | 2013-12-13 | 2013-12-13 | 移动终端防盗方法及客户端 |
| CN201310687832.0A CN103702318A (zh) | 2013-12-13 | 2013-12-13 | 移动终端防盗方法及客户端 |
| CN201310684896.5A CN103702299A (zh) | 2013-12-13 | 2013-12-13 | 移动终端防盗方法及客户端 |
| CN201310687136.X | 2013-12-13 | ||
| CN201310686970.7A CN103716791B (zh) | 2013-12-13 | 2013-12-13 | 移动终端防盗方法及客户端 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2015085940A1 true WO2015085940A1 (fr) | 2015-06-18 |
Family
ID=53370635
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2014/093636 Ceased WO2015085940A1 (fr) | 2013-12-13 | 2014-12-11 | Procede antivol de terminal mobile et client de terminal mobile |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2015085940A1 (fr) |
Cited By (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN112437428A (zh) * | 2020-11-27 | 2021-03-02 | 中国联合网络通信集团有限公司 | 验证方法和服务器 |
| CN112653998A (zh) * | 2021-01-07 | 2021-04-13 | 深圳市广和通无线股份有限公司 | 终端设备丢失定位方法、终端设备和存储介质 |
| CN114494939A (zh) * | 2021-12-22 | 2022-05-13 | 新瑞鹏宠物医疗集团有限公司 | 基于图像识别的防偷盗方法及相关产品 |
| CN115733628A (zh) * | 2021-08-26 | 2023-03-03 | 中国移动通信有限公司研究院 | 一种登录认证方法、装置及设备 |
| US11991525B2 (en) | 2021-12-02 | 2024-05-21 | T-Mobile Usa, Inc. | Wireless device access and subsidy control |
| US12501267B2 (en) | 2022-07-08 | 2025-12-16 | T-Mobile Usa, Inc. | Secure messaging framework for preventing SIM swap fraud |
Citations (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1859677A (zh) * | 2006-03-15 | 2006-11-08 | 华为技术有限公司 | 一种保护移动终端中信息安全的方法 |
| CN101039346A (zh) * | 2006-03-16 | 2007-09-19 | 上海晨兴电子科技有限公司 | 手机防盗方法、设备以及含有该设备的通信终端 |
| CN102231740A (zh) * | 2011-06-24 | 2011-11-02 | 中兴通讯股份有限公司 | 防盗平台及客户端、终端及实现移动终端防盗的处理方法 |
| CN103702299A (zh) * | 2013-12-13 | 2014-04-02 | 北京奇虎科技有限公司 | 移动终端防盗方法及客户端 |
| CN103702318A (zh) * | 2013-12-13 | 2014-04-02 | 北京奇虎科技有限公司 | 移动终端防盗方法及客户端 |
| CN103702317A (zh) * | 2013-12-13 | 2014-04-02 | 北京奇虎科技有限公司 | 移动终端防盗方法及客户端 |
| CN103702331A (zh) * | 2013-12-13 | 2014-04-02 | 北京奇虎科技有限公司 | 移动终端防盗方法及客户端 |
| CN103716791A (zh) * | 2013-12-13 | 2014-04-09 | 北京奇虎科技有限公司 | 移动终端防盗方法及客户端 |
-
2014
- 2014-12-11 WO PCT/CN2014/093636 patent/WO2015085940A1/fr not_active Ceased
Patent Citations (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1859677A (zh) * | 2006-03-15 | 2006-11-08 | 华为技术有限公司 | 一种保护移动终端中信息安全的方法 |
| CN101039346A (zh) * | 2006-03-16 | 2007-09-19 | 上海晨兴电子科技有限公司 | 手机防盗方法、设备以及含有该设备的通信终端 |
| CN102231740A (zh) * | 2011-06-24 | 2011-11-02 | 中兴通讯股份有限公司 | 防盗平台及客户端、终端及实现移动终端防盗的处理方法 |
| CN103702299A (zh) * | 2013-12-13 | 2014-04-02 | 北京奇虎科技有限公司 | 移动终端防盗方法及客户端 |
| CN103702318A (zh) * | 2013-12-13 | 2014-04-02 | 北京奇虎科技有限公司 | 移动终端防盗方法及客户端 |
| CN103702317A (zh) * | 2013-12-13 | 2014-04-02 | 北京奇虎科技有限公司 | 移动终端防盗方法及客户端 |
| CN103702331A (zh) * | 2013-12-13 | 2014-04-02 | 北京奇虎科技有限公司 | 移动终端防盗方法及客户端 |
| CN103716791A (zh) * | 2013-12-13 | 2014-04-09 | 北京奇虎科技有限公司 | 移动终端防盗方法及客户端 |
Cited By (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN112437428A (zh) * | 2020-11-27 | 2021-03-02 | 中国联合网络通信集团有限公司 | 验证方法和服务器 |
| CN112437428B (zh) * | 2020-11-27 | 2022-08-19 | 中国联合网络通信集团有限公司 | 验证方法和服务器 |
| CN112653998A (zh) * | 2021-01-07 | 2021-04-13 | 深圳市广和通无线股份有限公司 | 终端设备丢失定位方法、终端设备和存储介质 |
| CN115733628A (zh) * | 2021-08-26 | 2023-03-03 | 中国移动通信有限公司研究院 | 一种登录认证方法、装置及设备 |
| US11991525B2 (en) | 2021-12-02 | 2024-05-21 | T-Mobile Usa, Inc. | Wireless device access and subsidy control |
| US12520155B2 (en) | 2021-12-02 | 2026-01-06 | T-Mobile Usa, Inc. | Wireless device access and subsidy control |
| CN114494939A (zh) * | 2021-12-22 | 2022-05-13 | 新瑞鹏宠物医疗集团有限公司 | 基于图像识别的防偷盗方法及相关产品 |
| US12501267B2 (en) | 2022-07-08 | 2025-12-16 | T-Mobile Usa, Inc. | Secure messaging framework for preventing SIM swap fraud |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN103702317B (zh) | 移动终端防盗方法及客户端 | |
| US8554176B2 (en) | Method and apparatus for creating a remotely activated secure backup service for mobile handsets | |
| CN101304418B (zh) | 一种客户端侧经由提交者核查来防止偷渡式域欺骗的方法及系统 | |
| EP3063921B1 (fr) | Authentification pour une application | |
| WO2015085940A1 (fr) | Procede antivol de terminal mobile et client de terminal mobile | |
| CN103702318A (zh) | 移动终端防盗方法及客户端 | |
| CN103825863B (zh) | 一种帐号管理方法和装置 | |
| KR20150026587A (ko) | 신규 기기로부터의 로그인 알림 기능 제공 장치, 방법 및 컴퓨터 판독 가능한 기록 매체 | |
| TWI759908B (zh) | 產生授權允許名單的方法與利用其之資安系統 | |
| WO2012174898A1 (fr) | Plateforme et client antivol, terminal et procédé de traitement antivol de terminal mobile | |
| US20120144470A1 (en) | User authentication method using location information | |
| CN107438059B (zh) | 终端防盗验证方法、终端和服务器 | |
| KR101212510B1 (ko) | 위치기반의 서비스 보안 시스템 및 그 방법 | |
| CN101854357B (zh) | 网络认证监控方法及系统 | |
| JP6307610B2 (ja) | データ改竄検知装置、データ改竄検知方法、及びプログラム | |
| CN118797581A (zh) | 一种基于智能门锁的移动应用授权方法、系统及智能门锁 | |
| CN115189876B (zh) | 证书的展期方法、装置和服务器 | |
| CN107404719A (zh) | Sim卡处理方法、装置、终端及esam芯片 | |
| CN108989998A (zh) | 一种信息处理方法及装置 | |
| JP3685062B2 (ja) | 不正アクセス監視方法および内部通信ネットワーク | |
| KR101195027B1 (ko) | 서비스 보안시스템 및 그 방법 | |
| CN1980457A (zh) | 一种网络侧实现报警的方法 | |
| CN105956499B (zh) | 一种基于安全芯片的移动设备找回方法以及移动设备 | |
| CN103716791B (zh) | 移动终端防盗方法及客户端 | |
| JP4894382B2 (ja) | セキュリティシステム、情報処理装置、情報保護方法、プログラム |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14868827 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 14868827 Country of ref document: EP Kind code of ref document: A1 |