[go: up one dir, main page]

WO2018090379A1 - Method, device and system for user terminal to give alarm - Google Patents

Method, device and system for user terminal to give alarm Download PDF

Info

Publication number
WO2018090379A1
WO2018090379A1 PCT/CN2016/106646 CN2016106646W WO2018090379A1 WO 2018090379 A1 WO2018090379 A1 WO 2018090379A1 CN 2016106646 W CN2016106646 W CN 2016106646W WO 2018090379 A1 WO2018090379 A1 WO 2018090379A1
Authority
WO
WIPO (PCT)
Prior art keywords
user terminal
access network
network device
area
cell
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2016/106646
Other languages
French (fr)
Chinese (zh)
Inventor
李永翠
李岩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to PCT/CN2016/106646 priority Critical patent/WO2018090379A1/en
Publication of WO2018090379A1 publication Critical patent/WO2018090379A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/725Cordless telephones

Definitions

  • the embodiments of the present invention relate to the field of mobile communications, and in particular, to a user terminal alarm method, apparatus, and system.
  • a user registers a management account of the user terminal on a server, which is a server for providing a background service for the user terminal. After the user finds that the user terminal is stolen, the user logs in to the management account on the server and retrieves the user terminal through the server.
  • the operations of retrieving the user terminal include: locking the user terminal, backing up data in the user terminal, and obtaining geographic location information of the user terminal, and the like.
  • the user cannot find that the user terminal is stolen in time, and the retrieval of the user terminal is not timely.
  • the embodiment of the invention provides a method, device and system for alarming the user terminal.
  • the technical solution is as follows:
  • an embodiment of the present invention provides a method for alerting a user terminal, where the method includes: acquiring an access network information list corresponding to a security area of a user terminal, where the security area is a mobile area set for the user terminal, and access network information
  • the list includes an access network device list and/or a cell list whose cell coverage is located in the security area; determining access network information currently connected by the user terminal; and detecting according to the access network information list and the access network information currently connected by the user terminal.
  • the control user terminal when it is detected that the user terminal is located outside the security zone, it indicates that the user terminal is Theft, at this time, the control user terminal actively sends out an alarm signal to indicate that the user terminal is stolen, and the user terminal is found to be stolen, and the user terminal can be found to be stolen in time to retrieve the terminal in time.
  • detecting, according to the access network information list and the access network information currently connected by the user terminal, whether the user terminal is located outside the security area including: detecting the access network device list Whether the device identifier of the access network device currently connected by the user terminal is included; when the access network information list does not include the device identifier of the currently connected access network device, determining that the user terminal is outside the security zone; or detecting the cell list Whether the cell identifier of the cell to which the user terminal is currently connected is included in the network; when the cell identifier of the currently connected cell is not included in the access network information list, it is determined that the user terminal is located outside the security zone.
  • GPS Global Positioning System
  • the method further includes: controlling the user terminal to perform an anti-theft operation, the anti-theft operation includes prohibiting the shutdown, and prohibiting the disabling of the customer identification module (Subscriber Identification) Module, SIM) card, disable flight mode, disable mute mode, and lock user terminal.
  • the customer identification module Subscriber Identification
  • SIM Subscriber Identification
  • the user terminal when detecting that the user terminal is outside the security zone, the user terminal is prohibited from performing operations such as shutting down and disabling the SIM card, thereby preventing the thief from escaping by shutting down and disabling the SIM card after the user terminal is stolen.
  • the holder's lookup increases the probability of retrieving the user terminal.
  • the method further includes: acquiring an access network coverage area corresponding to the access network information list; The coverage area updates the security zone.
  • the security zone is updated according to the access network information list such that the determined range of security zones is more accurate.
  • the method is applied to the user terminal, and acquiring the access network information list corresponding to the security area of the user terminal, including: determining the security area; and sending the security area to the management network device, The management network device determines the corresponding access network information list according to the security area; and receives the access network information list sent by the management network device.
  • determining the security area includes: acquiring current location information; determining that the distance from the location information is less than or equal to a predetermined distance
  • the area of the threshold is a security area; or, the receiving area setting operation, the area setting operation is used to set the security area; or, the N pieces of position information during the historical movement are acquired, N is an integer greater than 1; and the N position information is determined
  • the area is a safe area.
  • the method is applied to the management network device, and the access network information list corresponding to the security area of the user terminal is obtained, including: receiving the security area sent by the user terminal; Determine the corresponding access network information list.
  • the management network device detects whether the user terminal is located outside the security zone, and the user terminal does not need to save the device list, and does not need to perform the detection operation, thereby reducing the requirement for processing capability of the user terminal, and improving The applicable range of the user terminal alarm method.
  • the access network information list includes an access network device list, and the corresponding access network information is determined according to the security area.
  • the list includes: determining geographic location information of the access network device connected to the management network device; determining the access network device list according to the device identifier of the access network device located in the security region according to the geographic location information.
  • the access network information list includes a cell list, and the corresponding access network information list is determined according to the security area, including: Determining a cell coverage of each cell of the access network device connected to the management network device; determining a cell list according to a cell identity of the cell whose cell coverage is located within the security region.
  • the access network information list includes a cell list
  • the user identifier is detected in the security area according to the cell identifier and the cell list of the cell where the user is located, because the coverage of the cell is compared with the coverage of the base station. Small, thus improving the accuracy of the detection results and avoiding misjudgment of the location of the user terminal.
  • a user terminal alarm device comprising at least one unit for implementing the user terminal alarm method provided by the above first aspect.
  • a user terminal comprising: a processor, and a memory coupled to the processor.
  • the memory is for storing one or more instructions, the instructions being instructed to be executed by a processor, and the processor is configured to implement the user terminal alarm method provided by the first aspect above.
  • a management network device comprising: a processor, and a memory coupled to the processor.
  • the memory is for storing one or more instructions, the instructions being instructed to be executed by a processor, and the processor is configured to implement the user terminal alarm method provided by the first aspect above.
  • a user terminal alarm system includes a user terminal and a management network device; the user terminal is a user terminal provided by the third aspect, or the management network device is provided by the fourth aspect. Manage network devices.
  • FIG. 1A is a schematic structural diagram of a user terminal alarm system according to an exemplary embodiment of the present invention.
  • FIG. 1B is a schematic structural diagram of a user terminal alarm system according to an exemplary embodiment of the present invention.
  • FIG. 2 is a flowchart of a method for alerting a user terminal according to an exemplary embodiment of the present invention
  • FIG. 3 is a flowchart of a method for alerting a user terminal according to another exemplary embodiment of the present invention.
  • FIG. 4 is a schematic diagram of a security area provided by an exemplary embodiment of the present invention.
  • FIG. 5 is a flowchart of a method for alerting a user terminal according to another exemplary embodiment of the present invention.
  • FIG. 6 is a schematic diagram of an access network device in a security area according to an exemplary embodiment of the present invention.
  • FIG. 7A is a flowchart of a method for alerting a user terminal according to another exemplary embodiment of the present invention.
  • FIG. 7B is a schematic diagram of cell coverage provided by an exemplary embodiment of the present invention.
  • FIG. 8A is a schematic diagram of an access network coverage area according to an exemplary embodiment of the present invention.
  • FIG. 8B is a schematic diagram of an access network coverage area according to an exemplary embodiment of the present invention.
  • FIG. 8C is a flowchart of a method for alerting a user terminal according to another exemplary embodiment of the present invention.
  • FIG. 9A is a flowchart of a method for alerting a user terminal according to another exemplary embodiment of the present invention.
  • FIG. 9B is a flowchart of a method for alerting a user terminal according to another exemplary embodiment of the present invention.
  • FIG. 10 is a schematic diagram of a method for alerting a user terminal according to another exemplary embodiment of the present invention.
  • FIG. 11 is a flowchart of a method for alerting a user terminal according to another exemplary embodiment of the present invention.
  • FIG. 12 is a schematic structural diagram of a user terminal/management network device according to an exemplary embodiment of the present invention.
  • FIG. 13 is a block diagram of a user terminal alarm device provided by an exemplary embodiment of the present invention.
  • Multiple as referred to herein means two or more. "and/or”, describing the association relationship of the associated objects, indicating that there may be three relationships, for example, A and/or B, which may indicate that there are three cases where A exists separately, A and B exist at the same time, and B exists separately.
  • the symbol “/” generally indicates that the contextual object is an "or" relationship.
  • FIG. 1A is a schematic structural diagram of a user terminal alarm system according to an exemplary embodiment of the present invention.
  • the system includes: a user terminal 120, an access network device 140, and a management network device 160.
  • the user terminal 120 is an electronic device having wireless communication capabilities such as a smartphone, a tablet, an e-book reader, and a portable computer.
  • the user terminal 120 is connected to the access network device 140 by using a Radio Access Technology (RAT).
  • RAT Radio Access Technology
  • the access network device 140 is a network element that interacts with the user terminal 120.
  • the access network device 140 is a base station.
  • the access network device 140 is a Global System for Mobile communication (GSM) or a Base Transceiver Station (BTS) in Code Division Multiple Access (CDMA); or
  • the network access device 140 is a base station (NodeB) in a Universal Mobile Telecommunications System (UMTS); or the access network device 140 is a base station in a Worldwide Interoperability for Microwave Access (WiMAX) ( Base Station, BS); or, the access network device 140 is an evolved base station (eNB or e-NodeB) in Long Term Evolution (LTE); or, the access network device 140 is the fifth Access network equipment in the mobile communication technology (5G), including a central unit (CU) and a distributed unit (DU); or, the access network device 140 is wireless-fidelity (WIFI) Access point (AP) in ).
  • GSM Global System for Mobile communication
  • BTS Base Transceiver Station
  • CDMA Code Division Multiple Access
  • the network access device 140 is a base station (NodeB) in a Universal Mobile Telecommunications System (UMTS
  • the management network device 160 is configured to manage the user terminal 120 and the access network device 140, and the access network device 140 is connected to the management network device 160 through a wired network.
  • the management network device 160 is a physical device or a virtual device.
  • the management network device 160 is any one of a Mobility Management (MM) network element and a third-party deployed network element, as shown in FIG. 1A.
  • the mobility management network element is a Mobility Management Entity (MME).
  • the management network device 160 is an access network device such as a BTS, a NodeB, a BS, an e-NodeB, and an AP, and the access network device 140 and the management network device 160 are implemented as the same network device, as shown in FIG. 1B. Shown.
  • the access network device 140 connected to one management network device 160 includes one or at least two, and the user terminal 120 connected to one access network device 140 includes one or at least two, FIG. 1A exemplarily shown.
  • An access network device 140 connected to the management network device 160 is shown.
  • FIG. 1A and FIG. 1B exemplarily show a user terminal 120 connected to the access network device 140.
  • FIG. 2 is a flowchart of a method for alerting a user terminal according to an exemplary embodiment of the present application. This embodiment is applied to the user terminal alarm system shown in FIG. 1A or FIG. 1B for example. , the method includes:
  • Step 201 Obtain an access network information list corresponding to a security area of the user terminal.
  • the security zone is a mobile zone set for the user terminal, and the access network information list includes an access network device list and/or a cell list whose cell coverage is located in the security zone.
  • Step 202 Determine access network information currently connected by the user terminal.
  • Step 203 Detect whether the user terminal is located outside the security area according to the access network information list and the access network information currently connected by the user terminal.
  • Step 204 When the user terminal is outside the security zone, the control user terminal sends an alarm signal, and the alarm signal is used to alert the user terminal that the terminal is stolen.
  • This embodiment does not describe the case where the user terminal is located in the security zone.
  • the user terminal alarm method detects whether the user terminal is located outside the security area according to the access network information list of the security area and the access network information currently connected by the user terminal, when the user terminal is detected.
  • the user terminal When the user is located outside the security zone, it indicates that the user terminal is stolen.
  • the user terminal is actively sent an alarm signal to indicate the theft.
  • the user terminal is not required to discover that the user terminal is stolen, and the user terminal can be found to be stolen and retrieved in a timely manner. terminal.
  • the user terminal alarm method provided by the foregoing embodiment is applied to the user terminal or applied to the management network device, and the two cases are respectively described in different embodiments.
  • FIG. 3 is a flowchart of a method for alerting a user terminal according to an exemplary embodiment of the present invention.
  • the present embodiment is applied to the user terminal alarm system shown in FIG. 1A or FIG. 1B.
  • the user terminal in the example is exemplified, and the method includes:
  • step 301 the user terminal determines a security zone.
  • the security zone is a mobile zone set for the user terminal.
  • the security zone is an area of the system preset or user-defined size.
  • the security zone is an area that contains the current location of the user terminal.
  • the security zone is an area included in an administrative unit such as a cell, a building, a street, or a village where the user terminal is currently located.
  • the security zone is a supermarket, a stadium, and a train station where the user terminal is currently located.
  • the user terminal determines the security zone by the methods provided by the following different implementations:
  • the user terminal acquires the current location information, and determines that the distance from the location information is less than or equal to the predetermined distance threshold.
  • the working mode of the user terminal includes an anti-theft mode.
  • the user terminal When the user enters the area where the user terminal is prone to theft of the user terminal, such as a supermarket, a stadium, and a train station, the user terminal is enabled to adopt the anti-theft mode of the user terminal, and then the user terminal passes the The GPS or the interaction with the network side acquires its own location information and determines the security zone, wherein the predetermined distance threshold is a system preset value or a user-defined value. For example, if the predetermined distance threshold is 2000 meters, the security area is an area where the distance from the location information currently located by the user terminal is less than or equal to 2000 meters. In this implementation, the security zone determined by the user terminal is typically the zone identified by the latitude and longitude range of the security zone.
  • the user terminal receives an area setting operation, and the area setting operation is used to set a security area.
  • the area setting operation is used to select a map area in the map; then the user terminal invokes the map interface to determine a security area corresponding to the map area.
  • the security area determined by the user terminal is the area identified by the latitude and longitude range corresponding to the map area.
  • the area setting operation is used to set the area identifier corresponding to the security area, and the security area determined by the user is the area identified by the area identifier.
  • the area identifier is a name of the security area, and the name of the security area includes at least one of a name of the building included in the security area, a name of the administrative unit, and an enterprise name. For example, if the regional setting operation setting area identifier “xx stadium” received by the user terminal is used, the security area determined by the user terminal is the area formed by the xx stadium identified by the area identifier. It should be noted that, in this optional manner, the user terminal does not need to know the latitude and longitude range corresponding to the security area.
  • the working mode of the user terminal includes an anti-theft mode, and the user is enabled to enter the user terminal when entering the supermarket, the stadium, the train station, and the like, which are prone to theft of the user terminal.
  • the user terminal displays or jumps to the regional setting interface, and the user performs the regional setting operation.
  • the user terminal displays or jumps to the locale setting interface, and the user performs the regional setting operation as follows:
  • the user terminal displays or jumps to the map interface, and the user selects the map area in the map, and the user terminal invokes the map interface to determine the area indicated by the map area, that is, the security area.
  • the user terminal displays or jumps to the area identifier list, and the user selects the area identifier in the area identifier list, and the user terminal determines that the area identified by the area identifier is a security area.
  • the list of area identifiers displayed by the user terminal includes Jiangsu province, Shanghai City, Zhejiang province, and Hunan province, and the user can select Shanghai, and the user terminal determines that the security area is Shanghai.
  • the user terminal displays or jumps to the input window, and the user inputs the area identifier in the input window, and the user terminal determines that the area identified by the area identifier is a security area. For example, if the user inputs Shanghai into the user terminal, the user terminal determines that the security zone is Shanghai.
  • the user terminal acquires N pieces of position information during a historical movement, where N is an integer greater than 1, and the area formed by determining the N pieces of position information is a security area.
  • the security area determined by the user terminal is the area identified by the latitude and longitude range corresponding to the map area.
  • the user terminal Since the area where the user terminal carried by the user moves is usually fixed, for example, always moving in the xx city or the xx area, and for example, always moving on the route between the home and the company, the user terminal is optionally used.
  • the moving area acts as a safe area.
  • the user terminal obtains the location information of the device at a predetermined time interval, and obtains a total of N location information.
  • N is a large integer;
  • the predetermined time interval is a system preset or a user-defined preset time interval, for example, obtaining its own position information every hour.
  • the user terminal acquires its own location information every hour.
  • the schematic diagram of the acquired location information is as shown in FIG. 4, and the user terminal determines that the security area 410 is the location information.
  • Step 302 The user terminal sends a security area to the management network device, so that the management network device determines the corresponding access network information list according to the security area.
  • the security area that is sent by the user terminal to the management network device includes a latitude and longitude range corresponding to the security area and/or an area identifier of the security area.
  • the management network device is a network element connected to the access network device
  • the user terminal sends a security zone to the access network device, and the access network device forwards the security zone to the management network device.
  • the security area is carried in the network attach request and/or the session request and sent to the management.
  • Internet equipment when the user terminal establishes a communication connection with the management network device by using the access network device, the security area is carried in the communication message and sent to the management network device.
  • the management network device is generally used to manage multiple user terminals, optionally, when the user terminal sends the security area to the management network device, the user terminal also sends the terminal identifier to the management network device.
  • the terminal identifier is used to identify the user terminal, and the terminal identifier includes an International Mobile Equipment Identity (IMEI), a Media Access Control (MAC) address, and an Internet Protocol (IP) of the user terminal. The address, and at least one of the International Mobile Subscriber Identification Number (IMSI).
  • the terminal identifier may be a temporary identifier that is allocated by the network device to the user terminal.
  • the terminal identifier is a globally unique Temporary UE Identity (GUTI).
  • GUI globally unique Temporary UE Identity
  • the management network device is an access network device connected to the user terminal
  • the user terminal directly sends a security area to the management network device.
  • the user terminal carries the security area in the communication message and sends the information to the access network device.
  • Step 303 The management network device receives the security zone sent by the user terminal.
  • the security area received by the management network device includes a latitude and longitude range corresponding to the security area and/or an area identifier of the security area.
  • Step 304 The management network device determines a corresponding access network information list according to the security area.
  • the access network information list includes an access network device list and/or a cell list whose cell coverage is located in the security area.
  • the management network device determines the access network information list according to the latitude and longitude range.
  • the management network device when the security area received by the management network device includes the area identifier of the security area, the management network device directly determines the access network information list according to the area identifier; or the management network device invokes the map interface to determine the latitude and longitude corresponding to the area identifier. Range, the access network information list is determined according to the latitude and longitude range. In the embodiment of the present invention, the management network device directly determines the access network information list according to the area identifier as an example.
  • the management network device directly determines the access network information list according to the received security area, and specifically includes the following implementation manners:
  • the access network information list includes an access network device list.
  • the method for the management network device to determine the access network device list includes the following steps, as shown in FIG. 5:
  • Step 501 Determine geographic location information of the access network device connected to the management network device.
  • the management network device is a network element connected to the access network device, such as an MM network element or a third-party network element.
  • the location information of each access network device is fixed and determined when the access network device is deployed, and the management network device connected to the access network device stores the geography of each access network device connected thereto. location information.
  • Step 502 Determine, according to the device identifier of the access network device that the geographical location information is located in the security area, determine the access network device list.
  • the management network device stores a correspondence between the device identifier of the access network device and the geographic location information.
  • the geographic location information is a latitude and longitude of the access network device.
  • the device identifier is used to identify the access network device.
  • the device identifier is an eNodeB identifier (Identity, ID).
  • FIG. 6 a schematic diagram of the management network device receiving the security area 600 sent by the user terminal is shown in FIG. 6.
  • the management network device stores the geographical location information of the access network device 611 to the access network device 615, and the access network device 611 is assumed.
  • the location information of the access network device 615 and the security area 600 are as shown in FIG. 6
  • the access network device list determined by the management network device includes the device identifier of the access network device 613 and the access network device.
  • the device identification of 614 and the device identification of access network device 615 is shown in FIG. 6.
  • the access network information list includes a cell list.
  • the method for the management network device to determine the cell list includes the following steps, as shown in FIG. 7A:
  • Step 701 Determine a cell coverage range of each cell of the access network device connected to the management network device.
  • the management network device is a network element connected to the access network device, such as an MM network element or a third-party network element; or the management network device is an access network device.
  • the access network device saves the cell coverage of each cell covered by the access network device, and the management network device connected to the access network device stores the cell coverage of each cell covered by each access network device.
  • the access network device sends the coverage of each cell covered by the access network device to the management network device, and correspondingly, the management network device receives the coverage of each cell sent by the access network device, and saves each received Cell coverage.
  • Step 702 Determine a cell list according to a cell identifier of a cell whose cell coverage is located within the security zone.
  • the management network device stores a correspondence between the cell identifier and the cell coverage, and the cell The identifier is used to identify the cell.
  • the cell identifier is a Physical Cell Identifier (PCI), and an Evolved UMTS Terrestrial Radio Access Network (E-UTRAN) cell global identifier (E- UTRAN Cell Global Identifier (ECGI) or other information used to identify a cell.
  • PCI Physical Cell Identifier
  • E-UTRAN Evolved UMTS Terrestrial Radio Access Network
  • E-UTRAN Cell Global Identifier Evolved UMTS Terrestrial Radio Access Network
  • E-UTRAN Cell Global Identifier Evolved UMTS Terrestrial Radio Access Network
  • the management network device determines, according to the cell identifier of the cell that the area of the cell coverage that overlaps with the security area is greater than the predetermined threshold.
  • the predetermined ratio threshold is a system preset value or a user-defined value. For example, if the predetermined ratio threshold is 50%, when 80% of the cell coverage areas of a certain cell are located within the security area, it is determined that the area of the cell coverage of the cell that overlaps with the security area has a ratio of 80%. %, reaching a predetermined ratio threshold, and determining a cell list according to the cell identity of the cell.
  • the access network device 612 covers the cell A1, the cell A2, and the cell A3, and the access network device 614 covers the cell B1 and the cell B2.
  • cell B3 as shown in FIG. 7B, the coverage area of each cell is indicated by a broken line, and other access network devices are not shown. Assuming that the predetermined ratio threshold is 50%, it can be clearly seen from FIG.
  • the cell list determined by the management network device includes the cell identity of the cell A3 covered by the access network device 612 and the cell covered by the access network device 614.
  • Step 305 The management network device sends the access network information list to the user terminal.
  • the management network device When the management network device is the access network device, the management network device directly sends the access network information list to the user terminal; when the management network device is the network element connected to the access network device, the management network device uses the access network device to The user terminal sends a list of access network information.
  • Step 306 The user terminal receives a list of access network information sent by the management network device.
  • the user terminal After receiving the list of access network information sent by the management network device, the user terminal stores the access network information list. In actual implementation, after the user terminal sends a new security zone to the management network device, it receives a new access network information list sent by the management network device, and the user terminal stores the latest access network information list.
  • the coverage formed by the access network device and/or the cell included in the access network information list does not normally coincide with the security zone.
  • the access network device column The table includes the device identifier of the access network device 613, the device identifier of the access network device 614, and the device identifier of the access network device 615, assuming each of the access network device 613, the access network device 614, and the access network device 615.
  • the coverage is shown by the dashed line in Fig. 8A.
  • the coverage formed by the access network device 613, the access network device 614, and the access network device 615 does not coincide with the security region 600 of the user terminal, and is optional.
  • the user terminal updates the security area according to the received access network information list, and specifically includes the following steps, as shown in FIG. 8C:
  • Step 801 The user terminal acquires an access network coverage area corresponding to the access network information list.
  • the step is implemented by the user terminal receiving the access network coverage area corresponding to the access network information list sent by the management network device.
  • the management network device determines that the coverage of the cell coverage of the access network device included in the access network information list and/or the coverage of the cell coverage of the cell is the access network coverage.
  • the area and the access network coverage area is sent to the user terminal.
  • the step may also be implemented by the user terminal according to the cell coverage of the access network device included in the received access network information list and/or the cell coverage of the cell.
  • the coverage is the coverage area of the access network, which is not limited in this embodiment.
  • Step 802 The user terminal updates the security area according to the coverage area of the access network.
  • the user terminal determines that the updated security area is an access network coverage area.
  • Step 307 The user terminal determines the currently connected access network information.
  • the user terminal determines the device identifier of the currently connected access network device, or the user terminal determines the cell identifier of the currently connected cell.
  • the user terminal obtains the access network information of the access network device from the broadcast message of the access network device, including the device identifier of the access network device connected by the user terminal, or the cell identifier of the cell where the user terminal is located. In this step, the user terminal obtains the device identifier of the currently connected access network device, or the user terminal acquires the cell identifier of the currently located cell.
  • Step 308 The user terminal detects, according to the access network information list and the access network information currently connected by the user terminal, whether the user terminal is located outside the security area.
  • the user terminal detects whether the access network device list includes the device identifier of the access network device currently connected by the user terminal; When the device list of the currently connected access network device is not included in the information list, it is determined that the user terminal is outside the security zone.
  • the user terminal detects Whether the cell identifier of the cell to which the user terminal is currently connected is included in the cell list; when the cell identifier of the currently connected cell is not included in the access network information list, it is determined that the user terminal is located outside the security zone.
  • the security area in this step is usually the updated security area.
  • the security area may also be a security area determined by the user terminal, which is not limited in this embodiment.
  • Step 309 when the user terminal is outside the security zone, an alarm signal is issued.
  • the alarm signal is used to alert the user terminal that the terminal is stolen.
  • the user terminal sends a voice alarm signal through the speaker component.
  • the management terminal sends an alarm message, and the alarm information is used to prompt the user terminal to be stolen.
  • the management terminal is a terminal preset by the user for receiving alarm information of the user terminal, for example, a backup mobile phone of the user.
  • the user terminal sends an alarm message to the management terminal by using a short message, an email, and a push information, where the content and form of the alarm information are preset by the system or customized by the user. For example, when the user terminal detects that it is outside the security zone, it sends a text message to the management terminal, “Your mobile phone leaves the security zone, please pay attention to the security of the mobile phone and avoid theft.”
  • the alarm information sent by the user terminal to the management terminal further includes location information of the current location of the user terminal.
  • the thief after the user terminal is stolen, the thief usually performs a shutdown operation on the user terminal to prevent the user from searching, and when the user terminal detects that it is outside the security zone, the anti-theft operation is performed, and the ban is prohibited.
  • the other terminal or access network device disconnects the communication connection for subsequent searching by the user.
  • the theft prevention operation includes prohibiting the shutdown, prohibiting the disabling of the SIM card, disabling the flight mode, prohibiting the activation of the silent mode, and locking at least one of the user terminals.
  • the user terminal alarm method detects whether the user terminal is located outside the security area according to the access network information list of the security area and the access network information currently connected by the user terminal, when the user terminal is detected.
  • the user terminal When the user is located outside the security zone, it indicates that the user terminal is stolen.
  • the user terminal is actively sent an alarm signal to indicate the theft.
  • the user terminal is not required to discover that the user terminal is stolen, and the user terminal can be found to be stolen and retrieved in a timely manner. terminal.
  • the user terminal alarming method provided by the embodiment of the present invention determines whether the user terminal has moved outside the security zone according to the currently connected access network information, and does not need to perform real-time positioning by using the GPS in the user terminal, thereby reducing the user terminal in the Prevent energy consumption during the process of theft.
  • the user terminal alarming method provided by the embodiment of the invention prevents the user terminal from performing operations such as shutting down and disabling the SIM card when detecting that the user terminal is outside the secure area, thereby preventing the thief from shutting down and disabling the SIM card after the user terminal is stolen.
  • the method avoids the user's search and improves the probability of retrieving the user terminal.
  • the management network device when the user terminal alarm method is applied to the management network device in the user terminal alarm system shown in FIG. 1, in the above step 304, the management network device is determined to be connected. After the network access information list, the correspondence between the storage terminal identifier and the access network information list, the access network information list corresponding to different user terminals is the same or different; for the same user terminal, the management network device is based on the received new one. After determining the new access network information list, the security area updates the correspondence between the terminal identifier and the access network information list. Similar to the embodiment shown in FIG. 8C, the management network device may also update the security area according to the determined access network information list, and specifically includes the following steps, as shown in FIG. 9A:
  • Step 901 The management network device acquires an access network coverage area corresponding to the access network information list.
  • the step is implemented as: determining, by the management network device, a cell coverage area of the access network device included in the access network information list and/or a coverage area formed by the cell coverage area of the cell is an access network coverage area.
  • the management network device further sends the access network coverage area to the user terminal.
  • Step 902 The management network device updates the security area according to the coverage area of the access network.
  • the management network device determines that the updated security area is an access network coverage area.
  • Step 903 The user terminal determines the currently connected access network information.
  • Step 904 The user terminal sends the currently connected access network information to the management network device.
  • the new access network is sent to the management network device.
  • Device ID of the device For example, when the user terminal accesses the base station A, it sends the device identifier of the base station A to the MME.
  • the device identifier of the base station B is sent to the MME, but when the user terminal is moving, When the base station A is always connected in the process, the device identifier of the base station A is not sent to the MME.
  • the cell identifier of the new cell is sent to the management network device.
  • the cell identifier 1 of the cell 1 of the base station A is sent to the MME, and when the user terminal enters the coverage of the cell 2 of the base station A in the process of moving, The MME transmits the cell identity 2 of the cell 2 of the base station A.
  • the cell identity 1 is not transmitted to the MME.
  • Step 905 The management network device receives the currently connected access network information sent by the user terminal.
  • Step 906 The management network device detects, according to the access network information list and the access network information currently connected by the user terminal, whether the user terminal is located outside the security area.
  • step 308 For the implementation of this step, refer to step 308 above, which is not described in this embodiment. It should be noted that the security zone in this step is also usually an updated security zone.
  • Step 907 When the user terminal is outside the security zone, the management network device controls the user terminal to send an alarm signal.
  • the management network device sends a control command to the user terminal, where the control command is used to instruct the user terminal to send an alarm signal.
  • the control instruction is further used to indicate that the user terminal sends the alarm information to the management terminal, or is used to instruct the user terminal to perform the anti-theft operation.
  • the management network device since the management network device needs to obtain the access network information from the user terminal, the user terminal needs to be in an ACTIVE state, and optionally, the user terminal is in the management network. After the device sends a secure zone, it is forbidden to enter the idle (ILDE) state.
  • the user terminal alarm method detects whether the user terminal is located outside the security area according to the access network information list of the security area and the access network information currently connected by the user terminal, when the user terminal is detected.
  • the user terminal When the user is located outside the security zone, it indicates that the user terminal is stolen.
  • the user terminal is actively sent an alarm signal to indicate the theft.
  • the user terminal is not required to discover that the user terminal is stolen, and the user terminal can be found to be stolen and retrieved in a timely manner. terminal.
  • the user terminal alarm method provided by the embodiment of the present disclosure detects whether the user terminal is located outside the security zone by the management network device, and the user terminal does not need to save the access network information list, and does not need to perform the detection operation, thereby reducing the processing on the user terminal.
  • the capability requirements increase the scope of application of the user terminal alarm method.
  • the user terminal when the holder of the user terminal is located in the stadium, the user enables the anti-theft mode for the user terminal, and manually sets the security area 1000 to the area included in the current stadium.
  • the user terminal After receiving the security zone 1000 to the MME, the user terminal receives the cell list returned by the MME.
  • the cell list includes the cell identity of the cell B1 covered by the base station 1010 shown in FIG. 10, the cell identity of the cell B2 covered by the base station 1010, and the base station.
  • other base stations and cells in the security zone 1000 are not described.
  • the user terminal determines that the current cell is a base station. 1010 coverage cell B2, since the cell identity of the cell B2 is included in the cell list, the user terminal determines that it is currently in the stadium; when the user terminal moves to the location 1032, the user terminal determines that the current cell is the cell covered by the base station 1020.
  • the same reason is determined to be currently in the stadium; when the user terminal moves to the location 1033, the user terminal determines that the current cell is the cell A3 of the base station 1020, and since the cell identity of the cell A3 is not included in the cell list, the user terminal If it is determined that the user terminal is outside the stadium and the user terminal judges that it is stolen, an alarm signal is issued to prompt the user to be stolen.
  • the holder of the user terminal when the user terminal does not send the security area to the management network device, if the holder of the user terminal finds that the user terminal is stolen, the holder of the user terminal can also manage The terminal searches for the lost user terminal, and the method includes the following steps, as shown in FIG.
  • Step 1101 The management terminal sends the terminal identifier of the user terminal to the management network device.
  • the management terminal is an electronic device such as a smart phone, a tablet computer, a portable computer, and a desktop computer.
  • the management terminal provides the server of the background server by using the management account to log in to the user terminal, and sends the terminal identifier to the management network device by using the server.
  • the management account is an account corresponding to the user terminal preset by the user, and the user terminal is saved in the server. The correspondence between the management account and the management account is usually saved.
  • the user also sets a search range by using a management terminal, where the search range is a range set by the user after prescribing the location of the user terminal being stolen. For example, if the user finds that the user terminal is stolen in the movie theater, the search range is set to a movie theater. The range of areas included.
  • the management terminal sends the terminal identifier of the user terminal to the management network device in the search range.
  • Step 1102 The management network device receives the terminal identifier sent by the management terminal.
  • Step 1103 The management network device detects whether the context information corresponding to the terminal identifier is included.
  • the context information includes the terminal identifier, the registration area list of the user terminal, and the access network information currently connected by the terminal, where the access network information includes The device identifier of the access network device to which the user terminal is currently connected and/or the cell identifier of the currently located cell.
  • the context information includes the terminal identifier and a registration area list of the user terminal.
  • the context information includes a terminal identifier.
  • Step 1104 The management network device controls the user terminal to send when detecting the context information is included. Alarm.
  • the management network device When the management network device is a network element connected to the access network device, and the user terminal is in an active state, the management network device sends a control command to the user terminal according to the access network device identified by the device identifier included in the context information, and the control command It is used to control the user terminal to send out an alarm signal.
  • the management network device When the management network device is a network element connected to the access network device, and the user terminal is in an idle state, the management network device pages the user terminal in the registration area of the user terminal according to the registration area list of the user terminal, and determines the connection of the user terminal. After accessing the network information, the control command is sent to the user terminal according to the access network information.
  • the management network device When the management network device is an access network device, the access network device sends a control command to the user terminal according to the terminal identifier.
  • control instruction is further used to indicate that the user terminal sends the alarm information to the management terminal, or is used to instruct the user terminal to perform the anti-theft operation.
  • step 309 refer to step 309 above, which is not described in this embodiment.
  • the user terminal alarm method provided by the embodiment of the present invention can use other management terminals to control the user terminal to send an alarm signal by using the management network device even if the user terminal is stolen when the security area is not sent to the management network device. Thereby, the user terminal is retrieved, and the probability of retrieving the user terminal is improved.
  • FIG. 12 is a schematic structural diagram of a user terminal according to an exemplary embodiment of the present invention.
  • the user terminal includes a processor 1210, a memory 1220, and a bus 1230.
  • the processor 1210 includes one or more processing cores, and the processor 1210 executes various functional applications and information processing by running software programs and modules.
  • the memory 1220 is coupled to the processor 1210 via a bus 1230 for storing instructions, and the processor 1210 implements the above-described user terminal alarm method by executing instructions stored in the memory 1220.
  • memory 1220 is implemented by any type of volatile or non-volatile memory device, or a combination thereof, such as static random access memory (SRAM), electrically erasable programmable read only memory (EEPROM), erasable Programmable Read Only Memory (EPROM), Programmable Read Only Memory (PROM), Read Only Memory (ROM), Magnetic Memory, Flash Memory, Disk or Optical Disk.
  • SRAM static random access memory
  • EEPROM electrically erasable programmable read only memory
  • EPROM erasable Programmable Read Only Memory
  • PROM Programmable Read Only Memory
  • ROM Read Only Memory
  • Magnetic Memory Flash Memory
  • Disk Disk
  • Optical Disk Optical Disk
  • the user terminal further includes a receiver 1240 and a transmitter 1250, and the receiver 1240 and the transmitter 1250 are implemented as one communication component.
  • the communication component comprises a communication chip, a communication core
  • the chip includes a receiving module, a transmitting module, a modem module, and the like, for modulating and demodulating information, and receiving or transmitting information through a wireless signal, and the user terminal uses the wireless network to access the network device and other through the communication chip.
  • the device establishes a communication connection.
  • FIG. 12 shows a schematic structural diagram of a management network device provided by an exemplary embodiment of the present invention.
  • the management network device includes a processor 1210, a memory 1220, and a bus 1230.
  • the processor 1210 includes one or more processing cores, and the processor 1210 executes various functional applications and information processing by running software programs and modules.
  • the memory 1220 is coupled to the processor 1210 via a bus 1230 for storing instructions, and the processor 1210 implements the above-described user terminal alarm method by executing instructions stored in the memory 1220.
  • memory 1220 is implemented by any type of volatile or non-volatile storage device, or a combination thereof, such as SRAM, EEPROM, EPROM, PROM, ROM, magnetic memory, flash memory, magnetic disk, or optical disk.
  • the management network device further includes a receiver 1240 and a transmitter 1250, and the receiver 1240 and the transmitter 1250 are implemented as one communication component.
  • the communication component includes a network port, and the management network device establishes a communication connection with the access network device by using the wired network.
  • the management network device includes at least two network ports.
  • FIG. 13 is a block diagram of a user terminal alarm device according to an embodiment of the present invention.
  • the user terminal alarm device is implemented as a whole or a part of a user terminal by software, hardware or a combination of the two, and the user terminal alarms.
  • the device includes:
  • the obtaining unit 1310 is configured to perform the foregoing steps 201, 301, 302, 306, and 801.
  • the determining unit 1320 is configured to perform step 202, step 307 and step 903 described above.
  • the detecting unit 1330 is configured to perform the foregoing steps 203 and 308.
  • the control unit 1340 is configured to perform step 204 and step 309 described above.
  • the apparatus further includes an update unit (not shown in FIG. 13) for performing the above step 802.
  • the user terminal shown in FIG. 13 is used to implement the user terminal alarming method provided by the foregoing various embodiments.
  • the user terminal may be implemented by the acquiring unit 1310; when determining the information, the user terminal It can be implemented by the above determining unit 1320; the user terminal is executing
  • the detecting operation may be implemented by the detecting unit 1330; the user terminal may be implemented by the control unit 1340 when performing the control operation; and the user terminal may be implemented by the updating unit when performing the updating operation.
  • FIG. 13 is a block diagram of a user terminal alarm device according to an embodiment of the present invention.
  • the user terminal alarm device is implemented as a whole or a part of a management network device by software, hardware or a combination of the two.
  • Terminal alarm devices include:
  • the obtaining unit 1310 is configured to perform the foregoing steps 201, 303, 304, 501, 502, 701, 702, and 901.
  • the determining unit 1320 is configured to perform step 202 and step 905 described above.
  • the detecting unit 1330 is configured to perform the foregoing steps 203 and 906.
  • the control unit 1340 is configured to perform step 204 and step 907 above.
  • the apparatus further includes an update unit (not shown in FIG. 13) for performing the above step 902.
  • the management network device shown in FIG. 13 is used to implement the user terminal alarm method provided by the foregoing various embodiments.
  • the management device can be implemented by the acquiring unit 1310; the management network device determines the information.
  • the foregoing determining unit 1320 can be implemented by the foregoing determining unit 1320; the management network device can be implemented by the detecting unit 1330 when performing the detecting operation; and the management network device can be implemented by the foregoing control unit 1340 when performing the control operation; managing the network device
  • the update operation is performed, it can be implemented by the above update unit.
  • a person skilled in the art may understand that all or part of the steps of implementing the above embodiments may be completed by hardware, or may be instructed by a program to execute related hardware, and the program may be stored in a computer readable storage medium.
  • the storage medium mentioned may be a read only memory, a magnetic disk or an optical disk or the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

Provided in an embodiment of the present invention are a method, device and system for a user terminal to give an alarm, relating to the field of mobile communications. The method comprises: obtaining an access network information list corresponding to a security zone of a user terminal; determining information of an access network currently connected to the user terminal; according to the access network information list and the information of the access network currently connected to the user terminal, detecting whether the user terminal is located outside the security zone; and when the user terminal is located outside the security zone, controlling the user terminal such that same sends an alarm signal, wherein the alarm signal is used for giving a warning that the user terminal is stolen. When it is detected that a user terminal is located outside a security zone, the user terminal is controlled to actively send an alarm signal to prompt that the user terminal is stolen, and it is unnecessary for a user to discover that the user terminal is stolen, so that it can be found in a more timely manner that the user terminal is stolen, thereby finding the terminal in a timely manner.

Description

用户终端报警方法、装置及系统User terminal alarm method, device and system 技术领域Technical field

本申请实施例涉及移动通信领域,特别涉及一种用户终端报警方法、装置及系统。The embodiments of the present invention relate to the field of mobile communications, and in particular, to a user terminal alarm method, apparatus, and system.

背景技术Background technique

随着便携式的用户终端的普及,用户终端被盗的情况也越来越多,容易给用户带来经济损失和数据丢失等问题。With the popularization of portable user terminals, the number of user terminals being stolen is also increasing, which is easy to bring economic loss and data loss to the user.

在相关技术中,用户预先在服务器上注册该用户终端的管理帐号,该服务器是用于为用户终端提供后台服务的服务器。当用户发现用户终端被盗后,用户在服务器上登录该管理帐号,通过服务器找回用户终端。找回用户终端的操作包括:锁定用户终端、备份用户终端中的数据,以及获取用户终端的地理位置信息等等。In the related art, a user registers a management account of the user terminal on a server, which is a server for providing a background service for the user terminal. After the user finds that the user terminal is stolen, the user logs in to the management account on the server and retrieves the user terminal through the server. The operations of retrieving the user terminal include: locking the user terminal, backing up data in the user terminal, and obtaining geographic location information of the user terminal, and the like.

由于通常情况下,用户并不能及时地发现用户终端被盗,导致对用户终端的找回也不及时。Generally, the user cannot find that the user terminal is stolen in time, and the retrieval of the user terminal is not timely.

发明内容Summary of the invention

为了解决用户不能及时发现用户终端被盗,导致对用户终端找回不及时的问题,本发明实施例提供了一种用户终端报警方法、装置及系统。所述技术方案如下:In order to solve the problem that the user cannot find the user terminal to be stolen in time, and the retrieval of the user terminal is not timely, the embodiment of the invention provides a method, device and system for alarming the user terminal. The technical solution is as follows:

第一方面,本发明实施例提供了一种用户终端报警方法,该方法包括:获取用户终端的安全区域对应的接入网信息列表,安全区域是为用户终端设置的移动区域,接入网信息列表包括小区覆盖范围位于安全区域内的接入网设备列表和/或小区列表;确定用户终端当前连接的接入网信息;根据接入网信息列表和用户终端当前连接的接入网信息,检测用户终端是否位于安全区域之外;当用户终端位于安全区域之外时,控制用户终端发出报警信号,报警信号用于警示用户终端被盗。In a first aspect, an embodiment of the present invention provides a method for alerting a user terminal, where the method includes: acquiring an access network information list corresponding to a security area of a user terminal, where the security area is a mobile area set for the user terminal, and access network information The list includes an access network device list and/or a cell list whose cell coverage is located in the security area; determining access network information currently connected by the user terminal; and detecting according to the access network information list and the access network information currently connected by the user terminal. Whether the user terminal is outside the security zone; when the user terminal is outside the security zone, the control user terminal sends an alarm signal, and the alarm signal is used to alert the user terminal that the terminal is stolen.

在本实施例中,当检测到用户终端位于安全区域之外时,表示用户终端被 盗,此时控制用户终端主动发出报警信号提示被盗,而不需要由用户来发现用户终端被盗,能够更及时的发现用户终端被盗从而及时地找回终端。In this embodiment, when it is detected that the user terminal is located outside the security zone, it indicates that the user terminal is Theft, at this time, the control user terminal actively sends out an alarm signal to indicate that the user terminal is stolen, and the user terminal is found to be stolen, and the user terminal can be found to be stolen in time to retrieve the terminal in time.

在第一方面的第一种可能的实施方式中,根据接入网信息列表和用户终端当前连接的接入网信息,检测用户终端是否位于安全区域之外,包括:检测接入网设备列表中是否包括用户终端当前连接的接入网设备的设备标识;当接入网信息列表中不包括当前连接的接入网设备的设备标识时,确定用户终端位于安全区域之外;或,检测小区列表中是否包括用户终端当前连接的小区的小区标识;当接入网信息列表中不包括当前连接的小区的小区标识时,确定用户终端位于安全区域之外。In a first possible implementation manner of the first aspect, detecting, according to the access network information list and the access network information currently connected by the user terminal, whether the user terminal is located outside the security area, including: detecting the access network device list Whether the device identifier of the access network device currently connected by the user terminal is included; when the access network information list does not include the device identifier of the currently connected access network device, determining that the user terminal is outside the security zone; or detecting the cell list Whether the cell identifier of the cell to which the user terminal is currently connected is included in the network; when the cell identifier of the currently connected cell is not included in the access network information list, it is determined that the user terminal is located outside the security zone.

在该可选的实施方式中,根据用户终端根据当前连接的接入网信息判断是否已移至安全区域之外,而不需要通过用户终端中的全球定位系统(Global Positioning System,GPS)进行实时定位,减少了用户终端在防止被盗的过程中的能耗。In this optional implementation manner, according to the user terminal according to the currently connected access network information, it is determined whether it has moved outside the security zone, and does not need to be real-time through the Global Positioning System (GPS) in the user terminal. Positioning reduces the energy consumption of the user terminal in the process of preventing theft.

在第一方面的第二种可能的实施方式中,当用户终端位于安全区域之外时,该方法还包括:控制用户终端执行防盗操作,防盗操作包括禁止关机、禁止禁用客户识别模块(Subscriber Identification Module,SIM)卡、禁止启用飞行模式、禁止启动静音模式和锁定用户终端中的至少一种。In a second possible implementation manner of the first aspect, when the user terminal is located outside the security zone, the method further includes: controlling the user terminal to perform an anti-theft operation, the anti-theft operation includes prohibiting the shutdown, and prohibiting the disabling of the customer identification module (Subscriber Identification) Module, SIM) card, disable flight mode, disable mute mode, and lock user terminal.

在该可选的实施方式中,用户终端在检测到处于安全区域之外时,禁止执行关机和禁用SIM卡等操作,避免了用户终端被盗后,偷盗者通过关机和禁用SIM卡等方法躲避持有者的查找,提高了找回用户终端的概率。In the optional implementation manner, when detecting that the user terminal is outside the security zone, the user terminal is prohibited from performing operations such as shutting down and disabling the SIM card, thereby preventing the thief from escaping by shutting down and disabling the SIM card after the user terminal is stolen. The holder's lookup increases the probability of retrieving the user terminal.

在第一方面的第三种可能的实施方式中,获取用户终端的安全区域对应的接入网信息列表之后,还包括:获取接入网信息列表对应的接入网覆盖区域;根据接入网覆盖区域更新安全区域。In a third possible implementation manner of the first aspect, after acquiring the access network information list corresponding to the security area of the user terminal, the method further includes: acquiring an access network coverage area corresponding to the access network information list; The coverage area updates the security zone.

在该可选的实施方式中,根据接入网信息列表更新安全区域,使得确定的安全区域的范围更准确。In this alternative embodiment, the security zone is updated according to the access network information list such that the determined range of security zones is more accurate.

结合第一方面、第一方面的第一种可能的实施方式、第一方面的第二种可能的实施方式、第一方面的第三种可能的实施方式中的任意一种可能的实施方式,在第一方面的第四种可能的实施方式中,该方法应用于用户终端中,获取用户终端的安全区域对应的接入网信息列表,包括:确定安全区域;向管理网络设备发送安全区域,以使管理网络设备根据安全区域确定对应的接入网信息列表;接收管理网络设备发送的接入网信息列表。 With reference to the first aspect, the first possible implementation of the first aspect, the second possible implementation of the first aspect, and any one of the possible implementation manners of the third possible implementation of the first aspect, In a fourth possible implementation manner of the first aspect, the method is applied to the user terminal, and acquiring the access network information list corresponding to the security area of the user terminal, including: determining the security area; and sending the security area to the management network device, The management network device determines the corresponding access network information list according to the security area; and receives the access network information list sent by the management network device.

结合第一方面的第四种可能的实施方式,在第一方面的第五种可能的实施方式中,确定安全区域,包括:获取当前所在的位置信息;确定与位置信息的距离小于等于预定距离阈值的区域为安全区域;或,接收区域设置操作,区域设置操作用于设置安全区域;或,获取历史移动过程中的N个位置信息,N为大于1的整数;确定N个位置信息形成的区域为安全区域。With reference to the fourth possible implementation manner of the first aspect, in a fifth possible implementation manner of the first aspect, determining the security area includes: acquiring current location information; determining that the distance from the location information is less than or equal to a predetermined distance The area of the threshold is a security area; or, the receiving area setting operation, the area setting operation is used to set the security area; or, the N pieces of position information during the historical movement are acquired, N is an integer greater than 1; and the N position information is determined The area is a safe area.

结合第一方面、第一方面的第一种可能的实施方式、第一方面的第二种可能的实施方式、第一方面的第三种可能的实施方式中的任意一种可能的实施方式,在第一方面的第六种可能的实施方式中,该方法应用于管理网络设备中,获取用户终端的安全区域对应的接入网信息列表,包括:接收用户终端发送的安全区域;根据安全区域确定对应的接入网信息列表。With reference to the first aspect, the first possible implementation of the first aspect, the second possible implementation of the first aspect, and any one of the possible implementation manners of the third possible implementation of the first aspect, In a sixth possible implementation manner of the first aspect, the method is applied to the management network device, and the access network information list corresponding to the security area of the user terminal is obtained, including: receiving the security area sent by the user terminal; Determine the corresponding access network information list.

在该可选的实施方式中,由管理网络设备检测用户终端是否位于安全区域之外,用户终端不需要保存设备列表,也不需要执行检测操作,减少了对用户终端的处理能力的要求,提高了该用户终端报警方法的适用范围。In this optional implementation manner, the management network device detects whether the user terminal is located outside the security zone, and the user terminal does not need to save the device list, and does not need to perform the detection operation, thereby reducing the requirement for processing capability of the user terminal, and improving The applicable range of the user terminal alarm method.

结合第一方面的第六种可能的实施方式,在第一方面的第七种可能的实施方式中,接入网信息列表中包括接入网设备列表;根据安全区域确定对应的接入网信息列表,包括:确定与管理网络设备相连的接入网设备的地理位置信息;根据地理位置信息位于安全区域内的接入网设备的设备标识,确定接入网设备列表。With reference to the sixth possible implementation manner of the first aspect, in a seventh possible implementation manner of the first aspect, the access network information list includes an access network device list, and the corresponding access network information is determined according to the security area. The list includes: determining geographic location information of the access network device connected to the management network device; determining the access network device list according to the device identifier of the access network device located in the security region according to the geographic location information.

结合第一方面的第七种可能的实施方式,在第一方面的第八种可能的实施方式中,接入网信息列表包括小区列表;根据安全区域确定对应的接入网信息列表,包括:确定与管理网络设备相连的接入网设备的各个小区的小区覆盖范围;根据小区覆盖范围位于安全区域之内的小区的小区标识,确定小区列表。With reference to the seventh possible implementation manner of the first aspect, in an eighth possible implementation manner of the first aspect, the access network information list includes a cell list, and the corresponding access network information list is determined according to the security area, including: Determining a cell coverage of each cell of the access network device connected to the management network device; determining a cell list according to a cell identity of the cell whose cell coverage is located within the security region.

在该可选的实施方式中,接入网信息列表包括小区列表,根据用户所在小区的小区标识和小区列表检测用户终端是否位于安全区域内,由于小区的覆盖范围相比于基站的覆盖范围较小,因此提高了检测结果的准确性,避免对用户终端所在的位置的误判。In the optional implementation, the access network information list includes a cell list, and the user identifier is detected in the security area according to the cell identifier and the cell list of the cell where the user is located, because the coverage of the cell is compared with the coverage of the base station. Small, thus improving the accuracy of the detection results and avoiding misjudgment of the location of the user terminal.

第二方面,提供一种用户终端报警装置,该装置包括至少一个单元,该至少一个单元用于实现上述第一方面所提供的用户终端报警方法。In a second aspect, a user terminal alarm device is provided, the device comprising at least one unit for implementing the user terminal alarm method provided by the above first aspect.

第三方面,提供一种用户终端,该用户终端包括:处理器,以及与处理器相连的存储器。存储器用于存储一个或者一个以上的指令,指令被指示为由处理器执行,处理器用于实现上述第一方面所提供的用户终端报警方法。 In a third aspect, a user terminal is provided, the user terminal comprising: a processor, and a memory coupled to the processor. The memory is for storing one or more instructions, the instructions being instructed to be executed by a processor, and the processor is configured to implement the user terminal alarm method provided by the first aspect above.

第四方面,提供一种管理网络设备,该管理网络设备包括:处理器,以及与处理器相连的存储器。存储器用于存储一个或者一个以上的指令,指令被指示为由处理器执行,处理器用于实现上述第一方面所提供的用户终端报警方法。In a fourth aspect, a management network device is provided, the management network device comprising: a processor, and a memory coupled to the processor. The memory is for storing one or more instructions, the instructions being instructed to be executed by a processor, and the processor is configured to implement the user terminal alarm method provided by the first aspect above.

第五方面,提供一种用户终端报警系统,用户终端报警系统包括用户终端和管理网络设备;用户终端是如上述第三方面提供的用户终端,或者,管理网络设备是如上述第四方面提供的管理网络设备。According to a fifth aspect, a user terminal alarm system is provided. The user terminal alarm system includes a user terminal and a management network device; the user terminal is a user terminal provided by the third aspect, or the management network device is provided by the fourth aspect. Manage network devices.

附图说明DRAWINGS

图1A是本发明一个示例性实施例提供的用户终端报警系统的结构示意图;1A is a schematic structural diagram of a user terminal alarm system according to an exemplary embodiment of the present invention;

图1B是本发明一个示例性实施例提供的用户终端报警系统的结构示意图;FIG. 1B is a schematic structural diagram of a user terminal alarm system according to an exemplary embodiment of the present invention; FIG.

图2是本发明一个示例性实施例提供的用户终端报警方法的流程图;2 is a flowchart of a method for alerting a user terminal according to an exemplary embodiment of the present invention;

图3是本发明另一个示例性实施例提供的用户终端报警方法的流程图;FIG. 3 is a flowchart of a method for alerting a user terminal according to another exemplary embodiment of the present invention; FIG.

图4是本发明一个示例性实施例提供的安全区域的示意图;4 is a schematic diagram of a security area provided by an exemplary embodiment of the present invention;

图5是本发明另一个示例性实施例提供的用户终端报警方法的流程图;FIG. 5 is a flowchart of a method for alerting a user terminal according to another exemplary embodiment of the present invention; FIG.

图6是本发明一个示例性实施例提供的安全区域中的接入网设备的示意图;FIG. 6 is a schematic diagram of an access network device in a security area according to an exemplary embodiment of the present invention; FIG.

图7A是本发明另一个示例性实施例提供的用户终端报警方法的流程图;FIG. 7A is a flowchart of a method for alerting a user terminal according to another exemplary embodiment of the present invention; FIG.

图7B是本发明一个示例性实施例提供的小区覆盖范围的示意图;FIG. 7B is a schematic diagram of cell coverage provided by an exemplary embodiment of the present invention; FIG.

图8A是本发明一个示例性实施例涉及的接入网覆盖区域的示意图;FIG. 8A is a schematic diagram of an access network coverage area according to an exemplary embodiment of the present invention; FIG.

图8B是本发明一个示例性实施例涉及的接入网覆盖区域的示意图;FIG. 8B is a schematic diagram of an access network coverage area according to an exemplary embodiment of the present invention; FIG.

图8C是本发明另一个示例性实施例提供的用户终端报警方法的流程图;FIG. 8C is a flowchart of a method for alerting a user terminal according to another exemplary embodiment of the present invention; FIG.

图9A是本发明另一个示例性实施例提供的用户终端报警方法的流程图;FIG. 9A is a flowchart of a method for alerting a user terminal according to another exemplary embodiment of the present invention; FIG.

图9B是本发明另一个示例性实施例提供的用户终端报警方法的流程图;FIG. 9B is a flowchart of a method for alerting a user terminal according to another exemplary embodiment of the present invention; FIG.

图10是本发明另一个示例性实施例提供的用户终端报警方法的示意图;FIG. 10 is a schematic diagram of a method for alerting a user terminal according to another exemplary embodiment of the present invention; FIG.

图11是本发明另一个示例性实施例提供的用户终端报警方法的流程图;FIG. 11 is a flowchart of a method for alerting a user terminal according to another exemplary embodiment of the present invention; FIG.

图12是本发明一个示例性实施例提供的用户终端/管理网络设备的结构示意图;FIG. 12 is a schematic structural diagram of a user terminal/management network device according to an exemplary embodiment of the present invention; FIG.

图13是本发明一个示例性实施例提供的用户终端报警装置的框图。FIG. 13 is a block diagram of a user terminal alarm device provided by an exemplary embodiment of the present invention.

具体实施方式detailed description

为使本申请的目的、技术方案和优点更加清楚,下面将结合附图对本申请 实施方式作进一步地详细描述。In order to make the objects, technical solutions and advantages of the present application more clear, the present application will be described below with reference to the accompanying drawings. The embodiments are described in further detail.

在本文中提及的“多个”是指两个或两个以上。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。符号“/”一般表示前后关联对象是一种“或”的关系。"Multiple" as referred to herein means two or more. "and/or", describing the association relationship of the associated objects, indicating that there may be three relationships, for example, A and/or B, which may indicate that there are three cases where A exists separately, A and B exist at the same time, and B exists separately. The symbol "/" generally indicates that the contextual object is an "or" relationship.

请参考图1A,其示出了本发明一示例性实施例提供的用户终端报警系统的结构示意图,该系统包括:用户终端120、接入网设备140和管理网络设备160。Please refer to FIG. 1A, which is a schematic structural diagram of a user terminal alarm system according to an exemplary embodiment of the present invention. The system includes: a user terminal 120, an access network device 140, and a management network device 160.

用户终端120是诸如智能手机、平板电脑、电子书阅读器和便携式计算机之类的具有无线通信能力的电子设备。可选的,用户终端120采用无线接入技术(Radio Access Technology,RAT)与接入网设备140相连。The user terminal 120 is an electronic device having wireless communication capabilities such as a smartphone, a tablet, an e-book reader, and a portable computer. Optionally, the user terminal 120 is connected to the access network device 140 by using a Radio Access Technology (RAT).

接入网设备140是与用户终端120进行交互的网元,可选的,接入网设备140是基站。The access network device 140 is a network element that interacts with the user terminal 120. Optionally, the access network device 140 is a base station.

可选的,接入网设备140是全球移动通信系统(Global System for Mobile communication,GSM)或码分多址(Code Division Multiple Access,CDMA)中的基站(Base Transceiver Station,BTS);或者,接入网设备140是通用移动通信系统(Universal Mobile Telecommunications System,UMTS)中的基站(NodeB);或者,接入网设备140是全球微波互联接入(Worldwide Interoperability for Microwave Access,WiMAX)中的基站(Base Station,BS);或者,接入网设备140是长期演进(Long Term Evolution,LTE)中的演进型基站(evolutional Node B,eNB或e-NodeB);或者,接入网设备140是第5代移动通信技术(5G)中的接入网设备,包括集中单元(Central Unit,CU)和分布单元(Distributed Unit,DU);或者,接入网设备140是无线保真(Wireless-Fidelity,WIFI)中的接入点(Access Point,AP)。Optionally, the access network device 140 is a Global System for Mobile communication (GSM) or a Base Transceiver Station (BTS) in Code Division Multiple Access (CDMA); or The network access device 140 is a base station (NodeB) in a Universal Mobile Telecommunications System (UMTS); or the access network device 140 is a base station in a Worldwide Interoperability for Microwave Access (WiMAX) ( Base Station, BS); or, the access network device 140 is an evolved base station (eNB or e-NodeB) in Long Term Evolution (LTE); or, the access network device 140 is the fifth Access network equipment in the mobile communication technology (5G), including a central unit (CU) and a distributed unit (DU); or, the access network device 140 is wireless-fidelity (WIFI) Access point (AP) in ).

可选的,管理网络设备160用于对用户终端120和接入网设备140进行管理,接入网设备140通过有线网络与管理网络设备160相连。在实际实现时,管理网络设备160是物理设备或者是虚拟设备。Optionally, the management network device 160 is configured to manage the user terminal 120 and the access network device 140, and the access network device 140 is connected to the management network device 160 through a wired network. In actual implementation, the management network device 160 is a physical device or a virtual device.

可选的,管理网络设备160是移动性管理(Mobility Management,MM)网元和第三方部署的网元中的任意一种,如图1A所示。可选的,移动性管理网元是移动性管理实体(Mobility Management Entity,MME)。 Optionally, the management network device 160 is any one of a Mobility Management (MM) network element and a third-party deployed network element, as shown in FIG. 1A. Optionally, the mobility management network element is a Mobility Management Entity (MME).

可选的,管理网络设备160是诸如BTS、NodeB、BS、e-NodeB和AP之类的接入网设备,则接入网设备140和管理网络设备160实现成为同一个网络设备,如图1B所示。Optionally, the management network device 160 is an access network device such as a BTS, a NodeB, a BS, an e-NodeB, and an AP, and the access network device 140 and the management network device 160 are implemented as the same network device, as shown in FIG. 1B. Shown.

需要说明的是,与一个管理网络设备160相连的接入网设备140包括一个或至少两个,与一个接入网设备140相连的用户终端120包括一个或至少两个,图1A示例性的示出了与管理网络设备160相连的一个接入网设备140,图1A与图1B示例性的示出了与接入网设备140相连的一个用户终端120。It should be noted that the access network device 140 connected to one management network device 160 includes one or at least two, and the user terminal 120 connected to one access network device 140 includes one or at least two, FIG. 1A exemplarily shown. An access network device 140 connected to the management network device 160 is shown. FIG. 1A and FIG. 1B exemplarily show a user terminal 120 connected to the access network device 140.

请参考图2,其示出了本申请一个示例性实施例提供的用户终端报警方法的流程图,本实施例以该方法应用于图1A或图1B所示的用户终端报警系统中进行举例说明,该方法包括:Please refer to FIG. 2 , which is a flowchart of a method for alerting a user terminal according to an exemplary embodiment of the present application. This embodiment is applied to the user terminal alarm system shown in FIG. 1A or FIG. 1B for example. , the method includes:

步骤201,获取用户终端的安全区域对应的接入网信息列表。Step 201: Obtain an access network information list corresponding to a security area of the user terminal.

其中,安全区域是为用户终端设置的移动区域,接入网信息列表包括小区覆盖范围位于安全区域内的接入网设备列表和/或小区列表。The security zone is a mobile zone set for the user terminal, and the access network information list includes an access network device list and/or a cell list whose cell coverage is located in the security zone.

步骤202,确定用户终端当前连接的接入网信息。Step 202: Determine access network information currently connected by the user terminal.

步骤203,根据接入网信息列表和用户终端当前连接的接入网信息,检测用户终端是否位于安全区域之外。Step 203: Detect whether the user terminal is located outside the security area according to the access network information list and the access network information currently connected by the user terminal.

步骤204,当用户终端位于安全区域之外时,控制用户终端发出报警信号,报警信号用于警示用户终端被盗。Step 204: When the user terminal is outside the security zone, the control user terminal sends an alarm signal, and the alarm signal is used to alert the user terminal that the terminal is stolen.

本实施例对用户终端位于安全区域之内的情况不做赘述。This embodiment does not describe the case where the user terminal is located in the security zone.

综上所述,本发明实施例提供的用户终端报警方法,根据安全区域的接入网信息列表和用户终端当前连接的接入网信息检测用户终端是否位于安全区域之外,当检测到用户终端位于安全区域之外时,表示用户终端被盗,此时控制用户终端主动发出报警信号提示被盗,而不需要由用户来发现用户终端被盗,能够更及时的发现用户终端被盗从而找回终端。In summary, the user terminal alarm method provided by the embodiment of the present invention detects whether the user terminal is located outside the security area according to the access network information list of the security area and the access network information currently connected by the user terminal, when the user terminal is detected. When the user is located outside the security zone, it indicates that the user terminal is stolen. At this time, the user terminal is actively sent an alarm signal to indicate the theft. The user terminal is not required to discover that the user terminal is stolen, and the user terminal can be found to be stolen and retrieved in a timely manner. terminal.

可选的,上述实施例提供的用户终端报警方法应用于用户终端中,或者应用于管理网络设备中,下面将在不同的实施例中分别对这两种情况进行说明。Optionally, the user terminal alarm method provided by the foregoing embodiment is applied to the user terminal or applied to the management network device, and the two cases are respectively described in different embodiments.

请参考图3,其示出了本发明一个示例性实施例提供的用户终端报警方法的流程图,本实施例以该方法应用于图1A或图1B所示的用户终端报警系统 中的用户终端中为例进行举例说明,该方法包括:Please refer to FIG. 3, which is a flowchart of a method for alerting a user terminal according to an exemplary embodiment of the present invention. The present embodiment is applied to the user terminal alarm system shown in FIG. 1A or FIG. 1B. The user terminal in the example is exemplified, and the method includes:

步骤301,用户终端确定安全区域。In step 301, the user terminal determines a security zone.

其中,安全区域是为用户终端设置的移动区域,安全区域是系统预设或用户自定义的任意面积大小的一片地区范围,通常情况下,安全区域是包含用户终端当前所在位置的一片区域。可选的,安全区域是用户终端当前所在的小区、建筑物、街道或村落等行政单位包含的区域,比如,安全区域是用户终端当前所在的超市、体育场和火车站等。The security zone is a mobile zone set for the user terminal. The security zone is an area of the system preset or user-defined size. Generally, the security zone is an area that contains the current location of the user terminal. Optionally, the security zone is an area included in an administrative unit such as a cell, a building, a street, or a village where the user terminal is currently located. For example, the security zone is a supermarket, a stadium, and a train station where the user terminal is currently located.

用户终端通过以下几种不同的实现方式提供的方法确定安全区域:The user terminal determines the security zone by the methods provided by the following different implementations:

在第一种实现方式中,用户终端获取当前所在的位置信息;确定与位置信息的距离小于等于预定距离阈值的区域为安全区域。In the first implementation manner, the user terminal acquires the current location information, and determines that the distance from the location information is less than or equal to the predetermined distance threshold.

可选的,用户终端的工作模式中包括防盗模式,用户在携带用户终端进入超市、体育场和火车站等容易发生用户终端被盗事件的区域中时,启用用户终端的防盗模式,则用户终端通过GPS或与网络侧的交互获取自身位置信息并确定安全区域,其中,预定距离阈值是系统预设值或用户自定义值。比如,预定距离阈值是2000米,则安全区域是与用户终端当前所在的位置信息的距离小于等于2000米的区域。在该实现方式中,用户终端所确定的安全区域通常是安全区域的经纬度范围所标识的区域。Optionally, the working mode of the user terminal includes an anti-theft mode. When the user enters the area where the user terminal is prone to theft of the user terminal, such as a supermarket, a stadium, and a train station, the user terminal is enabled to adopt the anti-theft mode of the user terminal, and then the user terminal passes the The GPS or the interaction with the network side acquires its own location information and determines the security zone, wherein the predetermined distance threshold is a system preset value or a user-defined value. For example, if the predetermined distance threshold is 2000 meters, the security area is an area where the distance from the location information currently located by the user terminal is less than or equal to 2000 meters. In this implementation, the security zone determined by the user terminal is typically the zone identified by the latitude and longitude range of the security zone.

在第二种实现方式中,用户终端接收区域设置操作,区域设置操作用于设置安全区域。In a second implementation, the user terminal receives an area setting operation, and the area setting operation is used to set a security area.

可选的,该区域设置操作用于在地图中选定地图区域;则用户终端调用地图接口确定地图区域对应的安全区域。在该可选的实施方式中,用户终端确定的安全区域是地图区域对应的经纬度范围所标识的区域。Optionally, the area setting operation is used to select a map area in the map; then the user terminal invokes the map interface to determine a security area corresponding to the map area. In this optional implementation manner, the security area determined by the user terminal is the area identified by the latitude and longitude range corresponding to the map area.

可选的,该区域设置操作用于设置安全区域对应的区域标识,则用户确定的安全区域是该区域标识所标识的区域。可选的,区域标识是安全区域的名称,安全区域的名称包括安全区域包含的建筑物的名称、行政单位的名称和企业名称中的至少一种。比如,用户终端接收到的区域设置操作设置区域标识“xx体育场”,则用户终端确定的安全区域即为该区域标识所标识的xx体育场形成的区域。需要说明的是,在该可选的方式中,用户终端不需要知道安全区域所对应的经纬度范围。Optionally, the area setting operation is used to set the area identifier corresponding to the security area, and the security area determined by the user is the area identified by the area identifier. Optionally, the area identifier is a name of the security area, and the name of the security area includes at least one of a name of the building included in the security area, a name of the administrative unit, and an enterprise name. For example, if the regional setting operation setting area identifier “xx stadium” received by the user terminal is used, the security area determined by the user terminal is the area formed by the xx stadium identified by the area identifier. It should be noted that, in this optional manner, the user terminal does not need to know the latitude and longitude range corresponding to the security area.

可选的,用户终端的工作模式中包括防盗模式,用户在携带用户终端进入超市、体育场和火车站等容易发生用户终端被盗事件的区域中时,启用用户终 端的防盗模式,则用户终端显示或跳转至区域设置界面,由用户执行区域设置操作。用户终端显示或跳转至区域设置界面,由用户执行区域设置操作具体为:Optionally, the working mode of the user terminal includes an anti-theft mode, and the user is enabled to enter the user terminal when entering the supermarket, the stadium, the train station, and the like, which are prone to theft of the user terminal. In the anti-theft mode of the terminal, the user terminal displays or jumps to the regional setting interface, and the user performs the regional setting operation. The user terminal displays or jumps to the locale setting interface, and the user performs the regional setting operation as follows:

1、用户终端显示或跳转至地图界面,用户在地图中选定地图区域,用户终端调用地图接口确定地图区域表示的区域,即为安全区域。1. The user terminal displays or jumps to the map interface, and the user selects the map area in the map, and the user terminal invokes the map interface to determine the area indicated by the map area, that is, the security area.

2、用户终端显示或跳转至区域标识列表,用户在区域标识列表中选择区域标识,用户终端确定该区域标识所标识的区域为安全区域。比如,用户终端显示的区域标识列表中包括江苏省、上海市、浙江省和湖南省,用户可以选择上海市,则用户终端确定安全区域为上海市。2. The user terminal displays or jumps to the area identifier list, and the user selects the area identifier in the area identifier list, and the user terminal determines that the area identified by the area identifier is a security area. For example, the list of area identifiers displayed by the user terminal includes Jiangsu Province, Shanghai City, Zhejiang Province, and Hunan Province, and the user can select Shanghai, and the user terminal determines that the security area is Shanghai.

3、用户终端显示或跳转至输入窗口,用户在输入窗口中输入区域标识,用户终端确定该区域标识所标识的区域为安全区域。比如,用户在用户终端中输入上海市,则用户终端确定安全区域为上海市。3. The user terminal displays or jumps to the input window, and the user inputs the area identifier in the input window, and the user terminal determines that the area identified by the area identifier is a security area. For example, if the user inputs Shanghai into the user terminal, the user terminal determines that the security zone is Shanghai.

在第三种实现方式中,用户终端获取历史移动过程中的N个位置信息,N为大于1的整数;确定N个位置信息形成的区域为安全区域。在该可选的实施方式中,用户终端确定的安全区域是地图区域对应的经纬度范围所标识的区域。In a third implementation manner, the user terminal acquires N pieces of position information during a historical movement, where N is an integer greater than 1, and the area formed by determining the N pieces of position information is a security area. In this optional implementation manner, the security area determined by the user terminal is the area identified by the latitude and longitude range corresponding to the map area.

由于用户携带的用户终端移动的区域通常是比较固定的,比如,总是在xx市或xx区移动,再比如,总是在家与公司之间的路线上移动,则可选的将用户终端常用的移动区域作为安全区域。可选的,用户终端每隔预定时间间隔获取自身的位置信息,共获取N个位置信息,通常情况下,为了提高确定的安全区域的准确性,N是一个取值较大的整数;其中,预定时间间隔是系统预设或用户自定义的预设时间间隔,比如,每隔一小时获取自身的位置信息。在一个示例性的例子中,如图4所示,用户终端每隔一小时获取自身的位置信息,获取到的位置信息的示意图如图4所示,则用户终端确定安全区域410为这些位置信息形成的区域。Since the area where the user terminal carried by the user moves is usually fixed, for example, always moving in the xx city or the xx area, and for example, always moving on the route between the home and the company, the user terminal is optionally used. The moving area acts as a safe area. Optionally, the user terminal obtains the location information of the device at a predetermined time interval, and obtains a total of N location information. Generally, in order to improve the accuracy of the determined security zone, N is a large integer; The predetermined time interval is a system preset or a user-defined preset time interval, for example, obtaining its own position information every hour. In an exemplary example, as shown in FIG. 4, the user terminal acquires its own location information every hour. The schematic diagram of the acquired location information is as shown in FIG. 4, and the user terminal determines that the security area 410 is the location information. The area formed.

步骤302,用户终端向管理网络设备发送安全区域,以使管理网络设备根据安全区域确定对应的接入网信息列表。Step 302: The user terminal sends a security area to the management network device, so that the management network device determines the corresponding access network information list according to the security area.

可选的,用户终端向管理网络设备发送的安全区域包括安全区域对应的经纬度范围和/或,安全区域的区域标识。Optionally, the security area that is sent by the user terminal to the management network device includes a latitude and longitude range corresponding to the security area and/or an area identifier of the security area.

当管理网络设备是与接入网设备相连的网元时,用户终端向接入网设备发送安全区域,由接入网设备将安全区域转发至管理网络设备。When the management network device is a network element connected to the access network device, the user terminal sends a security zone to the access network device, and the access network device forwards the security zone to the management network device.

可选的,用户终端在通过接入网设备向管理网络设备发送网络附着请求和/或会话请求时,将安全区域携带在网络附着请求和/或会话请求中发送至管理 网络设备。或者,用户终端在通过接入网设备与管理网络设备建立通信连接后,将安全区域携带在通信消息中发送至管理网络设备。Optionally, when the user terminal sends a network attach request and/or a session request to the management network device by using the access network device, the security area is carried in the network attach request and/or the session request and sent to the management. Internet equipment. Alternatively, after the user terminal establishes a communication connection with the management network device by using the access network device, the security area is carried in the communication message and sent to the management network device.

由于管理网络设备通常用于对多个用户终端进行管理,则可选的,用户终端在向管理网络设备发送安全区域时,还向管理网络设备发送终端标识。可选的,终端标识用于标识用户终端,终端标识包括用户终端的国际移动设备标识(International Mobile Equipment Identity,IMEI)、媒体访问控制(Media Access Control,MAC)地址、互联网协议(Intemet Protocol,IP)地址,以及国际移动客户识别码(International Mobile Subscriber Identification Number,IMSI)中的至少一种。可选的,终端标识还可以是管理网络设备为用户终端分配的临时标识,比如,终端标识是全球唯一临时用户设备(User Equipment,UE)标识(Globally Unique Temporary UE Identity,GUTI)。Since the management network device is generally used to manage multiple user terminals, optionally, when the user terminal sends the security area to the management network device, the user terminal also sends the terminal identifier to the management network device. Optionally, the terminal identifier is used to identify the user terminal, and the terminal identifier includes an International Mobile Equipment Identity (IMEI), a Media Access Control (MAC) address, and an Internet Protocol (IP) of the user terminal. The address, and at least one of the International Mobile Subscriber Identification Number (IMSI). Optionally, the terminal identifier may be a temporary identifier that is allocated by the network device to the user terminal. For example, the terminal identifier is a globally unique Temporary UE Identity (GUTI).

当管理网络设备即为与用户终端相连的接入网设备时,用户终端直接向管理网络设备发送安全区域。可选的,用户终端在与接入网设备建立通信连接后,将安全区域携带在通信消息中发送至接入网设备。When the management network device is an access network device connected to the user terminal, the user terminal directly sends a security area to the management network device. Optionally, after establishing a communication connection with the access network device, the user terminal carries the security area in the communication message and sends the information to the access network device.

步骤303,管理网络设备接收用户终端发送的安全区域。Step 303: The management network device receives the security zone sent by the user terminal.

对应的,管理网络设备接收到的安全区域包括安全区域对应的经纬度范围和/或,安全区域的区域标识。Correspondingly, the security area received by the management network device includes a latitude and longitude range corresponding to the security area and/or an area identifier of the security area.

步骤304,管理网络设备根据安全区域确定对应的接入网信息列表。Step 304: The management network device determines a corresponding access network information list according to the security area.

其中,接入网信息列表包括小区覆盖范围位于安全区域内的接入网设备列表和/或小区列表。The access network information list includes an access network device list and/or a cell list whose cell coverage is located in the security area.

可选的,当管理网络设备接收到的安全区域包括安全区域对应的经纬度范围时,管理网络设备根据该经纬度范围确定接入网信息列表。Optionally, when the security area received by the management network device includes a latitude and longitude range corresponding to the security area, the management network device determines the access network information list according to the latitude and longitude range.

可选的,当管理网络设备接收到的安全区域包括安全区域的区域标识时,管理网络设备直接根据该区域标识确定接入网信息列表;或者,管理网络设备调用地图接口确定区域标识对应的经纬度范围,根据经纬度范围确定接入网信息列表。本发明实施例以管理网络设备直接根据区域标识确定接入网信息列表为例进行说明。Optionally, when the security area received by the management network device includes the area identifier of the security area, the management network device directly determines the access network information list according to the area identifier; or the management network device invokes the map interface to determine the latitude and longitude corresponding to the area identifier. Range, the access network information list is determined according to the latitude and longitude range. In the embodiment of the present invention, the management network device directly determines the access network information list according to the area identifier as an example.

则在上述两种可选的方式中,管理网络设备都是直接根据接收到的安全区域确定接入网信息列表的,具体包括如下几种实现方式:In the foregoing two alternative manners, the management network device directly determines the access network information list according to the received security area, and specifically includes the following implementation manners:

在一种可能的实现方式中,接入网信息列表中包括接入网设备列表。则管理网络设备确定接入网设备列表的方法包括如下几个步骤,如图5所示: In a possible implementation manner, the access network information list includes an access network device list. The method for the management network device to determine the access network device list includes the following steps, as shown in FIG. 5:

步骤501,确定与管理网络设备相连的接入网设备的地理位置信息。Step 501: Determine geographic location information of the access network device connected to the management network device.

在本实施例中,管理网络设备是MM网元或第三方网元等与接入网设备相连的网元。通常情况下,每个接入网设备的位置信息是固定的且在部署接入网设备时就确定,与接入网设备相连的管理网络设备中保存有与其相连的各个接入网设备的地理位置信息。In this embodiment, the management network device is a network element connected to the access network device, such as an MM network element or a third-party network element. Generally, the location information of each access network device is fixed and determined when the access network device is deployed, and the management network device connected to the access network device stores the geography of each access network device connected thereto. location information.

步骤502,根据地理位置信息位于安全区域内的接入网设备的设备标识,确定接入网设备列表。Step 502: Determine, according to the device identifier of the access network device that the geographical location information is located in the security area, determine the access network device list.

可选的,管理网络设备存储有接入网设备的设备标识和地理位置信息的对应关系,可选的,地理位置信息是接入网设备的经纬度。其中,设备标识用于标识接入网设备,比如,在LTE中,设备标识是eNodeB标识(Identity,ID)。Optionally, the management network device stores a correspondence between the device identifier of the access network device and the geographic location information. Optionally, the geographic location information is a latitude and longitude of the access network device. The device identifier is used to identify the access network device. For example, in LTE, the device identifier is an eNodeB identifier (Identity, ID).

比如,管理网络设备接收到用户终端发送的安全区域600的示意图如图6所示,管理网络设备中保存有接入网设备611~接入网设备615的地理位置信息,假设接入网设备611~接入网设备615的地理位置信息与安全区域600的相对位置关系如图6所示,则管理网络设备确定的接入网设备列表中包括接入网设备613的设备标识、接入网设备614的设备标识以及接入网设备615的设备标识。For example, a schematic diagram of the management network device receiving the security area 600 sent by the user terminal is shown in FIG. 6. The management network device stores the geographical location information of the access network device 611 to the access network device 615, and the access network device 611 is assumed. As shown in FIG. 6 , the location information of the access network device 615 and the security area 600 are as shown in FIG. 6 , and the access network device list determined by the management network device includes the device identifier of the access network device 613 and the access network device. The device identification of 614 and the device identification of access network device 615.

由于一个接入网设备的覆盖范围通常比较大,当用户终端移至安全区域之外时,连接的仍然有可能是位于安全区域内的接入网设备,存在一定的误差,因此,为了减少误差,在另一种可能的实现方式中,接入网信息列表包括小区列表。则管理网络设备确定小区列表的方法包括如下几个步骤,如图7A所示:Since the coverage of an access network device is usually relatively large, when the user terminal moves outside the security area, the connection may still be an access network device located in the security area, and there is a certain error, so in order to reduce the error. In another possible implementation manner, the access network information list includes a cell list. The method for the management network device to determine the cell list includes the following steps, as shown in FIG. 7A:

步骤701,确定与管理网络设备相连的接入网设备的各个小区的小区覆盖范围。Step 701: Determine a cell coverage range of each cell of the access network device connected to the management network device.

在本实施例中,管理网络设备是MM网元或第三方网元等与接入网设备相连的网元;或者,管理网络设备是接入网设备。接入网设备保存自身覆盖的各个小区的小区覆盖范围,且与接入网设备相连的管理网络设备中保存每个接入网设备覆盖的各个小区的小区覆盖范围。可选的,接入网设备向管理网络设备发送自身覆盖的各个小区的覆盖范围,则对应的,管理网络设备接收到接入网设备发送的各个小区的覆盖范围,并保存接收到的每个小区覆盖范围。In this embodiment, the management network device is a network element connected to the access network device, such as an MM network element or a third-party network element; or the management network device is an access network device. The access network device saves the cell coverage of each cell covered by the access network device, and the management network device connected to the access network device stores the cell coverage of each cell covered by each access network device. Optionally, the access network device sends the coverage of each cell covered by the access network device to the management network device, and correspondingly, the management network device receives the coverage of each cell sent by the access network device, and saves each received Cell coverage.

步骤702,根据小区覆盖范围位于安全区域之内的小区的小区标识,确定小区列表。Step 702: Determine a cell list according to a cell identifier of a cell whose cell coverage is located within the security zone.

可选的,管理网络设备存储有小区标识和小区覆盖范围的对应关系,小区 标识用于标识小区,可选的,小区标识是物理小区标识符(Physical Cell Identifier,PCI)、UMTS陆地无线接入网(Evolved UMTS Terrestrial Radio Access Network,E-UTRAN)小区全局标识符(E-UTRAN Cell Global Identifier,ECGI)或者其它用于标识小区的信息。Optionally, the management network device stores a correspondence between the cell identifier and the cell coverage, and the cell The identifier is used to identify the cell. Optionally, the cell identifier is a Physical Cell Identifier (PCI), and an Evolved UMTS Terrestrial Radio Access Network (E-UTRAN) cell global identifier (E- UTRAN Cell Global Identifier (ECGI) or other information used to identify a cell.

由于通常情况下小区的覆盖区域与安全区域不是完全重合的,因此可选的,管理网络设备根据小区覆盖范围中与安全区域重合的区域所占的比例大于预定比例阈值的小区的小区标识,确定小区列表。其中,预定比例阈值是系统预设值或用户自定义值。比如,假设预定比例阈值是50%,当某一个小区的小区覆盖区域中有80%的区域位于安全区域之内时,确定该小区的小区覆盖中与安全区域重合的区域所占的比例有80%,达到预定比例阈值,根据该小区的小区标识确定小区列表。As a result, the coverage area of the cell is not completely coincident with the security area. Therefore, the management network device determines, according to the cell identifier of the cell that the area of the cell coverage that overlaps with the security area is greater than the predetermined threshold. List of cells. The predetermined ratio threshold is a system preset value or a user-defined value. For example, if the predetermined ratio threshold is 50%, when 80% of the cell coverage areas of a certain cell are located within the security area, it is determined that the area of the cell coverage of the cell that overlaps with the security area has a ratio of 80%. %, reaching a predetermined ratio threshold, and determining a cell list according to the cell identity of the cell.

比如,以上述图6中的接入网设备612和接入网设备614为例,接入网设备612覆盖了小区A1、小区A2和小区A3,接入网设备614覆盖了小区B1、小区B2和小区B3,如图7B所示,每个小区的覆盖区域以虚线表示,其他接入网设备未示出。假设预定比例阈值为50%,则可以从图7B明显的看出,小区A1、小区A2和小区B2中与安全区域300重合的区域所占的比例未达到50%,而小区A3、小区B1和小区B3中与安全区域300重合的区域所占的比例达到了50%,则管理网络设备确定的小区列表中包括接入网设备612覆盖的小区A3的小区标识、接入网设备614覆盖的小区B1的小区标识和接入网设备614覆盖的小区B3的小区标识。For example, taking the access network device 612 and the access network device 614 in FIG. 6 as an example, the access network device 612 covers the cell A1, the cell A2, and the cell A3, and the access network device 614 covers the cell B1 and the cell B2. And cell B3, as shown in FIG. 7B, the coverage area of each cell is indicated by a broken line, and other access network devices are not shown. Assuming that the predetermined ratio threshold is 50%, it can be clearly seen from FIG. 7B that the proportion of the area in the cell A1, the cell A2, and the cell B2 that coincides with the security area 300 does not reach 50%, and the cell A3, the cell B1, and The area of the cell B3 that overlaps with the security zone 300 is 50%, and the cell list determined by the management network device includes the cell identity of the cell A3 covered by the access network device 612 and the cell covered by the access network device 614. The cell identity of B1 and the cell identity of cell B3 covered by access network device 614.

步骤305,管理网络设备向用户终端发送接入网信息列表。Step 305: The management network device sends the access network information list to the user terminal.

当管理网络设备是接入网设备时,管理网络设备直接向用户终端发送接入网信息列表;当管理网络设备是与接入网设备相连的网元时,管理网络设备通过接入网设备向用户终端发送接入网信息列表。When the management network device is the access network device, the management network device directly sends the access network information list to the user terminal; when the management network device is the network element connected to the access network device, the management network device uses the access network device to The user terminal sends a list of access network information.

步骤306,用户终端接收管理网络设备发送的接入网信息列表。Step 306: The user terminal receives a list of access network information sent by the management network device.

用户终端在接收管理网络设备发送的接入网信息列表后,存储接入网信息列表。在实际实现时,当用户终端向管理网络设备发送新的安全区域后,会接收到管理网络设备发送的新的接入网信息列表,则用户终端存储最新的接入网信息列表。After receiving the list of access network information sent by the management network device, the user terminal stores the access network information list. In actual implementation, after the user terminal sends a new security zone to the management network device, it receives a new access network information list sent by the management network device, and the user terminal stores the latest access network information list.

由于接入网信息列表中包括的接入网设备和/或小区所形成的覆盖范围通常不会与安全区域完全重合,比如,在上述图6所示的例子中,接入网设备列 表中包括接入网设备613的设备标识、接入网设备614的设备标识以及接入网设备615的设备标识,假设接入网设备613、接入网设备614和接入网设备615各自的覆盖范围如图8A中的虚线所示。则接入网设备613、接入网设备614和接入网设备615所形成的覆盖范围(如图8B中的阴影部分所示)与用户终端的安全区域600并不是重合的,则可选的,用户终端根据接收到接入网信息列表更新安全区域,具体包括如下几个步骤,如图8C所示:The coverage formed by the access network device and/or the cell included in the access network information list does not normally coincide with the security zone. For example, in the example shown in FIG. 6 above, the access network device column The table includes the device identifier of the access network device 613, the device identifier of the access network device 614, and the device identifier of the access network device 615, assuming each of the access network device 613, the access network device 614, and the access network device 615. The coverage is shown by the dashed line in Fig. 8A. Then, the coverage formed by the access network device 613, the access network device 614, and the access network device 615 (shown as a shaded portion in FIG. 8B) does not coincide with the security region 600 of the user terminal, and is optional. The user terminal updates the security area according to the received access network information list, and specifically includes the following steps, as shown in FIG. 8C:

步骤801,用户终端获取接入网信息列表对应的接入网覆盖区域。Step 801: The user terminal acquires an access network coverage area corresponding to the access network information list.

可选的,该步骤实现成为,用户终端接收管理网络设备发送的接入网信息列表对应的接入网覆盖区域。管理网络设备在根据安全区域确定接入网信息列表后,确定接入网信息列表中包括的接入网设备的小区覆盖范围和/或小区的小区覆盖范围所形成的覆盖范围为接入网覆盖区域,并将接入网覆盖区域发送至用户终端。Optionally, the step is implemented by the user terminal receiving the access network coverage area corresponding to the access network information list sent by the management network device. After determining the access network information list according to the security area, the management network device determines that the coverage of the cell coverage of the access network device included in the access network information list and/or the coverage of the cell coverage of the cell is the access network coverage. The area and the access network coverage area is sent to the user terminal.

需要说明的是,在部分实施例中,该步骤也可以实现成为用户终端根据接收到的接入网信息列表中包括的接入网设备的小区覆盖范围和/或小区的小区覆盖范围所形成的覆盖范围为接入网覆盖区域,本实施例对此不做限定。It should be noted that, in some embodiments, the step may also be implemented by the user terminal according to the cell coverage of the access network device included in the received access network information list and/or the cell coverage of the cell. The coverage is the coverage area of the access network, which is not limited in this embodiment.

步骤802,用户终端根据接入网覆盖区域更新安全区域。Step 802: The user terminal updates the security area according to the coverage area of the access network.

可选的,用户终端确定更新后的安全区域为接入网覆盖区域。Optionally, the user terminal determines that the updated security area is an access network coverage area.

步骤307,用户终端确定当前连接的接入网信息。Step 307: The user terminal determines the currently connected access network information.

可选的,用户终端确定当前连接的接入网设备的设备标识,或者,用户终端确定当前连接的小区的小区标识。Optionally, the user terminal determines the device identifier of the currently connected access network device, or the user terminal determines the cell identifier of the currently connected cell.

用户终端从接入网设备的广播消息中获取接入网设备的接入网信息,包括用户终端连接的接入网设备的设备标识,或者,用户终端所在的小区的小区标识。则该步骤实现用户终端获取当前连接的接入网设备的设备标识,或者,用户终端获取当前所在的小区的小区标识。The user terminal obtains the access network information of the access network device from the broadcast message of the access network device, including the device identifier of the access network device connected by the user terminal, or the cell identifier of the cell where the user terminal is located. In this step, the user terminal obtains the device identifier of the currently connected access network device, or the user terminal acquires the cell identifier of the currently located cell.

步骤308,用户终端根据接入网信息列表和用户终端当前连接的接入网信息,检测用户终端是否位于安全区域之外。Step 308: The user terminal detects, according to the access network information list and the access network information currently connected by the user terminal, whether the user terminal is located outside the security area.

在第一种实现方式中,当接入网信息列表包括接入网设备列表时,用户终端检测接入网设备列表中是否包括用户终端当前连接的接入网设备的设备标识;当接入网信息列表中不包括当前连接的接入网设备的设备标识时,确定用户终端位于安全区域之外。In a first implementation manner, when the access network information list includes the access network device list, the user terminal detects whether the access network device list includes the device identifier of the access network device currently connected by the user terminal; When the device list of the currently connected access network device is not included in the information list, it is determined that the user terminal is outside the security zone.

在第二种实现方式中,当接入网信息列表包括小区列表时,用户终端检测 小区列表中是否包括用户终端当前连接的小区的小区标识;当接入网信息列表中不包括当前连接的小区的小区标识时,确定用户终端位于安全区域之外。In a second implementation manner, when the access network information list includes a cell list, the user terminal detects Whether the cell identifier of the cell to which the user terminal is currently connected is included in the cell list; when the cell identifier of the currently connected cell is not included in the access network information list, it is determined that the user terminal is located outside the security zone.

需要说明的是,该步骤中的安全区域通常是更新后的安全区域,在部分实施例中,安全区域也可以是用户终端确定的安全区域,本实施例对此不做限定。It should be noted that the security area in this step is usually the updated security area. In some embodiments, the security area may also be a security area determined by the user terminal, which is not limited in this embodiment.

步骤309,当用户终端位于安全区域之外时,发出报警信号。Step 309, when the user terminal is outside the security zone, an alarm signal is issued.

其中,报警信号用于警示用户终端被盗。可选的,用户终端通过扬声器组件发出语音报警信号。考虑到在实际实现时,当用户终端所在的环境较嘈杂,或者用户终端已经离开用户较远时,用户无法听到用户终端的报警信号,则用户终端在检测到位于安全区域之外时,向管理终端发送报警信息,报警信息用于提示用户终端被盗,管理终端是用户预先设定好的用于接收用户终端的报警信息的终端,比如,用户的备用手机等。可选的,用户终端通过短信、邮件和推送信息的方式向管理终端发送报警信息,报警信息的内容和形式是系统预设或用户自定义的。比如,用户终端在检测到位于安全区域之外时,向管理终端发送短信“您的手机离开安全区域,请注意手机安全,避免被盗”。可选的,用户终端向管理终端发送的报警信息中还包括用户终端当前所在的位置信息。The alarm signal is used to alert the user terminal that the terminal is stolen. Optionally, the user terminal sends a voice alarm signal through the speaker component. Considering that in actual implementation, when the environment in which the user terminal is located is noisy, or the user terminal has been far away from the user, the user cannot hear the alarm signal of the user terminal, and when the user terminal detects that it is outside the security zone, the user terminal The management terminal sends an alarm message, and the alarm information is used to prompt the user terminal to be stolen. The management terminal is a terminal preset by the user for receiving alarm information of the user terminal, for example, a backup mobile phone of the user. Optionally, the user terminal sends an alarm message to the management terminal by using a short message, an email, and a push information, where the content and form of the alarm information are preset by the system or customized by the user. For example, when the user terminal detects that it is outside the security zone, it sends a text message to the management terminal, “Your mobile phone leaves the security zone, please pay attention to the security of the mobile phone and avoid theft.” Optionally, the alarm information sent by the user terminal to the management terminal further includes location information of the current location of the user terminal.

在实际实现时,用户终端在被盗后,偷盗者通常会对用户终端执行关机之类的操作,以防止用户查找,则当用户终端检测到位于安全区域之外时,执行防盗操作,禁止与其他终端或接入网设备断开通信连接,以便用户后续的查找。防盗操作包括禁止关机、禁止禁用SIM卡、禁止启用飞行模式、禁止启动静音模式和锁定用户终端中的至少一种。In actual implementation, after the user terminal is stolen, the thief usually performs a shutdown operation on the user terminal to prevent the user from searching, and when the user terminal detects that it is outside the security zone, the anti-theft operation is performed, and the ban is prohibited. The other terminal or access network device disconnects the communication connection for subsequent searching by the user. The theft prevention operation includes prohibiting the shutdown, prohibiting the disabling of the SIM card, disabling the flight mode, prohibiting the activation of the silent mode, and locking at least one of the user terminals.

综上所述,本发明实施例提供的用户终端报警方法,根据安全区域的接入网信息列表和用户终端当前连接的接入网信息检测用户终端是否位于安全区域之外,当检测到用户终端位于安全区域之外时,表示用户终端被盗,此时控制用户终端主动发出报警信号提示被盗,而不需要由用户来发现用户终端被盗,能够更及时的发现用户终端被盗从而找回终端。In summary, the user terminal alarm method provided by the embodiment of the present invention detects whether the user terminal is located outside the security area according to the access network information list of the security area and the access network information currently connected by the user terminal, when the user terminal is detected. When the user is located outside the security zone, it indicates that the user terminal is stolen. At this time, the user terminal is actively sent an alarm signal to indicate the theft. The user terminal is not required to discover that the user terminal is stolen, and the user terminal can be found to be stolen and retrieved in a timely manner. terminal.

本发明实施例提供的用户终端报警方法,根据用户终端根据当前连接的接入网信息判断是否已移至安全区域之外,而不需要通过用户终端中的GPS进行实时定位,减少了用户终端在防止被盗的过程中的能耗。The user terminal alarming method provided by the embodiment of the present invention determines whether the user terminal has moved outside the security zone according to the currently connected access network information, and does not need to perform real-time positioning by using the GPS in the user terminal, thereby reducing the user terminal in the Prevent energy consumption during the process of theft.

本发明实施例提供的用户终端报警方法,用户终端在检测到处于安全区域之外时,禁止执行关机和禁用SIM卡等操作,避免了用户终端被盗后,偷盗者通过关机和禁用SIM卡等方法躲避用户的查找,提高了找回用户终端的概率。 The user terminal alarming method provided by the embodiment of the invention prevents the user terminal from performing operations such as shutting down and disabling the SIM card when detecting that the user terminal is outside the secure area, thereby preventing the thief from shutting down and disabling the SIM card after the user terminal is stolen. The method avoids the user's search and improves the probability of retrieving the user terminal.

在基于上述实施例的其他可选实施例中,当上述用户终端报警方法应用于图1所示的用户终端报警系统中的管理网络设备中时,在上述步骤304中,管理网络设备在确定接入网信息列表后,存储终端标识与接入网信息列表的对应关系,不同的用户终端对应的接入网信息列表相同或者不同;对于同一个用户终端,管理网络设备在根据接收到的新的安全区域确定新的接入网信息列表后,更新终端标识与接入网信息列表的对应关系。与上述图8C所示的实施例类似的,管理网络设备也可以根据确定得到的接入网信息列表更新安全区域,具体包括如下几个步骤,如图9A所示:In other optional embodiments based on the above embodiments, when the user terminal alarm method is applied to the management network device in the user terminal alarm system shown in FIG. 1, in the above step 304, the management network device is determined to be connected. After the network access information list, the correspondence between the storage terminal identifier and the access network information list, the access network information list corresponding to different user terminals is the same or different; for the same user terminal, the management network device is based on the received new one. After determining the new access network information list, the security area updates the correspondence between the terminal identifier and the access network information list. Similar to the embodiment shown in FIG. 8C, the management network device may also update the security area according to the determined access network information list, and specifically includes the following steps, as shown in FIG. 9A:

步骤901,管理网络设备获取接入网信息列表对应的接入网覆盖区域。Step 901: The management network device acquires an access network coverage area corresponding to the access network information list.

可选的,该步骤实现成为:管理网络设备确定接入网信息列表中包括的接入网设备的小区覆盖范围和/或小区的小区覆盖范围所形成的覆盖范围为接入网覆盖区域。可选的,管理网络设备还将接入网覆盖区域发送至用户终端。Optionally, the step is implemented as: determining, by the management network device, a cell coverage area of the access network device included in the access network information list and/or a coverage area formed by the cell coverage area of the cell is an access network coverage area. Optionally, the management network device further sends the access network coverage area to the user terminal.

步骤902,管理网络设备根据接入网覆盖区域更新安全区域。Step 902: The management network device updates the security area according to the coverage area of the access network.

可选的,管理网络设备确定更新后的安全区域为接入网覆盖区域。Optionally, the management network device determines that the updated security area is an access network coverage area.

则上述步骤305-步骤309实现成为如下几个步骤,如图9B所示:Then the above steps 305-309 are implemented as the following steps, as shown in FIG. 9B:

步骤903,用户终端确定当前连接的接入网信息。Step 903: The user terminal determines the currently connected access network information.

步骤904,用户终端向管理网络设备发送当前连接的接入网信息。Step 904: The user terminal sends the currently connected access network information to the management network device.

可选的,当用户终端获取的接入网信息是用户终端当前连接的接入网设备的设备标识时,用户终端连接的接入网设备发生变化时,向管理网络设备发送新的接入网设备的设备标识。比如,用户终端在接入基站A时,向MME发送基站A的设备标识,当用户终端在移动的过程中接入基站B时,向MME发送基站B的设备标识,但当用户终端在移动的过程中始终接入基站A时,不会再向MME发送基站A的设备标识。Optionally, when the access network information acquired by the user terminal is the device identifier of the access network device currently connected by the user terminal, when the access network device connected to the user terminal changes, the new access network is sent to the management network device. Device ID of the device. For example, when the user terminal accesses the base station A, it sends the device identifier of the base station A to the MME. When the user terminal accesses the base station B in the process of moving, the device identifier of the base station B is sent to the MME, but when the user terminal is moving, When the base station A is always connected in the process, the device identifier of the base station A is not sent to the MME.

可选的,当用户终端获取的接入网信息是用户终端当前所在的小区的小区标识时,用户终端所在的小区发生变化时,向管理网络设备发送新的小区的小区标识。比如,用户终端处于基站A的小区1的覆盖范围内时,向MME发送基站A的小区1的小区标识1,当用户终端在移动的过程中进入基站A的小区2的覆盖范围内时,向MME发送基站A的小区2的小区标识2,但当用户终端在移动的过程中始终处于基站A的小区1的覆盖范围内时,不会再向MME发送小区标识1。 Optionally, when the access network information acquired by the user terminal is the cell identifier of the cell where the user terminal is currently located, when the cell where the user terminal is located changes, the cell identifier of the new cell is sent to the management network device. For example, when the user terminal is in the coverage of the cell 1 of the base station A, the cell identifier 1 of the cell 1 of the base station A is sent to the MME, and when the user terminal enters the coverage of the cell 2 of the base station A in the process of moving, The MME transmits the cell identity 2 of the cell 2 of the base station A. However, when the user terminal is always within the coverage of the cell 1 of the base station A during the mobile process, the cell identity 1 is not transmitted to the MME.

步骤905,管理网络设备接收用户终端发送的当前连接的接入网信息。Step 905: The management network device receives the currently connected access network information sent by the user terminal.

步骤906,管理网络设备根据接入网信息列表和用户终端当前连接的接入网信息,检测用户终端是否位于安全区域之外。Step 906: The management network device detects, according to the access network information list and the access network information currently connected by the user terminal, whether the user terminal is located outside the security area.

该步骤的实现方式请参考上述步骤308,本实施例对此不再赘述。需要说明的是,该步骤中的安全区域也通常是更新后的安全区域。For the implementation of this step, refer to step 308 above, which is not described in this embodiment. It should be noted that the security zone in this step is also usually an updated security zone.

步骤907,当用户终端位于安全区域之外时,管理网络设备控制用户终端发出报警信号。Step 907: When the user terminal is outside the security zone, the management network device controls the user terminal to send an alarm signal.

具体的,管理网络设备向用户终端发送控制指令,控制指令用于指示用户终端发出报警信号。可选的,控制指令还用于指示用户终端向管理终端发送报警信息,或者用于指示用户终端执行防盗操作。Specifically, the management network device sends a control command to the user terminal, where the control command is used to instruct the user terminal to send an alarm signal. Optionally, the control instruction is further used to indicate that the user terminal sends the alarm information to the management terminal, or is used to instruct the user terminal to perform the anti-theft operation.

需要说明的是,在本发明实施例中,由于管理网络设备需要从用户终端中获取接入网信息,因此,用户终端需要处于激活(ACTIVE)状态,则可选的,用户终端在向管理网络设备发送安全区域后,禁止进入空闲(ILDE)状态。It should be noted that, in the embodiment of the present invention, since the management network device needs to obtain the access network information from the user terminal, the user terminal needs to be in an ACTIVE state, and optionally, the user terminal is in the management network. After the device sends a secure zone, it is forbidden to enter the idle (ILDE) state.

综上所述,本发明实施例提供的用户终端报警方法,根据安全区域的接入网信息列表和用户终端当前连接的接入网信息检测用户终端是否位于安全区域之外,当检测到用户终端位于安全区域之外时,表示用户终端被盗,此时控制用户终端主动发出报警信号提示被盗,而不需要由用户来发现用户终端被盗,能够更及时的发现用户终端被盗从而找回终端。In summary, the user terminal alarm method provided by the embodiment of the present invention detects whether the user terminal is located outside the security area according to the access network information list of the security area and the access network information currently connected by the user terminal, when the user terminal is detected. When the user is located outside the security zone, it indicates that the user terminal is stolen. At this time, the user terminal is actively sent an alarm signal to indicate the theft. The user terminal is not required to discover that the user terminal is stolen, and the user terminal can be found to be stolen and retrieved in a timely manner. terminal.

本公开实施例提供的用户终端报警方法,由管理网络设备检测用户终端是否位于安全区域之外,用户终端不需要保存接入网信息列表,也不需要执行检测操作,减少了对用户终端的处理能力的要求,提高了该用户终端报警方法的适用范围。The user terminal alarm method provided by the embodiment of the present disclosure detects whether the user terminal is located outside the security zone by the management network device, and the user terminal does not need to save the access network information list, and does not need to perform the detection operation, thereby reducing the processing on the user terminal. The capability requirements increase the scope of application of the user terminal alarm method.

在一个示例性的例子中,如图10所示,当用户终端的持有者位于体育场中时,用户为用户终端启用防盗模式,并人工设定安全区域1000为当前所在的体育场所包括的区域,用户终端将安全区域1000发送至MME后,接收MME返回的小区列表,小区列表中包括图10中示出的基站1010覆盖的小区B1的小区标识、基站1010覆盖的小区B2的小区标识、基站1010覆盖的小区B3的小区标识,以及基站1020覆盖的小区A1的小区标识,在该示例性的例子中,不对安全区域1000中的其他基站和小区做赘述。In an illustrative example, as shown in FIG. 10, when the holder of the user terminal is located in the stadium, the user enables the anti-theft mode for the user terminal, and manually sets the security area 1000 to the area included in the current stadium. After receiving the security zone 1000 to the MME, the user terminal receives the cell list returned by the MME. The cell list includes the cell identity of the cell B1 covered by the base station 1010 shown in FIG. 10, the cell identity of the cell B2 covered by the base station 1010, and the base station. The cell identifier of the cell B3 covered by 1010 and the cell identifier of the cell A1 covered by the base station 1020. In this exemplary example, other base stations and cells in the security zone 1000 are not described.

当用户终端处于位置1031处时,用户终端确定当前所在的小区是基站 1010覆盖的小区B2,由于小区B2的小区标识包括在小区列表中,则用户终端确定当前处于体育场内;当用户终端移动至位置1032处时,用户终端确定当前所在的小区是基站1020覆盖的小区A1,同理确定当前处于体育场内;当用户终端移动至位置1033处时,用户终端确定当前所在的小区是基站1020的小区A3,由于小区A3的小区标识未包括在小区列表中,则用户终端确定当前处于体育场外,用户终端判断被盗,则发出报警信号提示用户被盗。When the user terminal is at the location 1031, the user terminal determines that the current cell is a base station. 1010 coverage cell B2, since the cell identity of the cell B2 is included in the cell list, the user terminal determines that it is currently in the stadium; when the user terminal moves to the location 1032, the user terminal determines that the current cell is the cell covered by the base station 1020. A1, the same reason is determined to be currently in the stadium; when the user terminal moves to the location 1033, the user terminal determines that the current cell is the cell A3 of the base station 1020, and since the cell identity of the cell A3 is not included in the cell list, the user terminal If it is determined that the user terminal is outside the stadium and the user terminal judges that it is stolen, an alarm signal is issued to prompt the user to be stolen.

在另一个可选的实施例中,当用户终端并没有向管理网络设备发送安全区域时,若此时用户终端的持有者发现用户终端被盗,则用户终端的持有者还可以通过管理终端查找丢失的用户终端,则该方法包括如下几个步骤,如图11所示,In another optional embodiment, when the user terminal does not send the security area to the management network device, if the holder of the user terminal finds that the user terminal is stolen, the holder of the user terminal can also manage The terminal searches for the lost user terminal, and the method includes the following steps, as shown in FIG.

步骤1101,管理终端向管理网络设备发送用户终端的终端标识。Step 1101: The management terminal sends the terminal identifier of the user terminal to the management network device.

其中,管理终端是诸如智能手机、平板电脑、便携式计算机和台式计算机之类的电子设备。可选的,管理终端通过管理帐号登录为用户终端提供后台服务器的服务器,通过服务器向管理网络设备发送终端标识,管理帐号是用户预先设置的与用户终端对应的帐号,服务器中保存有用户终端与管理帐号的对应关系,通常是保存有终端标识与管理帐号的对应关系。Among them, the management terminal is an electronic device such as a smart phone, a tablet computer, a portable computer, and a desktop computer. Optionally, the management terminal provides the server of the background server by using the management account to log in to the user terminal, and sends the terminal identifier to the management network device by using the server. The management account is an account corresponding to the user terminal preset by the user, and the user terminal is saved in the server. The correspondence between the management account and the management account is usually saved.

可选的,用户还通过管理终端设置查找范围,该查找范围是用户在预判用户终端被盗的位置后设定的范围,比如,用户在电影院发现用户终端被盗,则设置查找范围为电影院所包括的区域范围。管理终端向查找范围内的管理网络设备发送用户终端的终端标识。Optionally, the user also sets a search range by using a management terminal, where the search range is a range set by the user after prescribing the location of the user terminal being stolen. For example, if the user finds that the user terminal is stolen in the movie theater, the search range is set to a movie theater. The range of areas included. The management terminal sends the terminal identifier of the user terminal to the management network device in the search range.

步骤1102,管理网络设备接收管理终端发送的终端标识。Step 1102: The management network device receives the terminal identifier sent by the management terminal.

步骤1103,管理网络设备检测是否包括与终端标识对应的上下文信息。Step 1103: The management network device detects whether the context information corresponding to the terminal identifier is included.

当管理网络设备是与接入网设备相连的网元,且用户终端处于激活状态时,上下文信息包括终端标识、用户终端的注册区列表以及终端当前连接的接入网信息,接入网信息包括用户终端当前连接的接入网设备的设备标识和/或当前所在的小区的小区标识。When the management network device is a network element connected to the access network device, and the user terminal is in an active state, the context information includes the terminal identifier, the registration area list of the user terminal, and the access network information currently connected by the terminal, where the access network information includes The device identifier of the access network device to which the user terminal is currently connected and/or the cell identifier of the currently located cell.

当管理网络设备是与接入网设备相连的网元,且用户终端处于空闲状态时,上下文信息包括终端标识以及用户终端的注册区列表。When the management network device is a network element connected to the access network device, and the user terminal is in an idle state, the context information includes the terminal identifier and a registration area list of the user terminal.

当管理网络设备是接入网设备时,上下文信息包括终端标识。When the management network device is an access network device, the context information includes a terminal identifier.

步骤1104,管理网络设备在检测到包括上下文信息时,控制用户终端发出 报警信号。Step 1104: The management network device controls the user terminal to send when detecting the context information is included. Alarm.

当管理网络设备是与接入网设备相连的网元,且用户终端处于激活状态时,管理网络设备根据上下文信息中包括的设备标识所标识的接入网设备向用户终端发送控制指令,控制指令用于控制用户终端发出报警信号。When the management network device is a network element connected to the access network device, and the user terminal is in an active state, the management network device sends a control command to the user terminal according to the access network device identified by the device identifier included in the context information, and the control command It is used to control the user terminal to send out an alarm signal.

当管理网络设备是与接入网设备相连的网元,且用户终端处于空闲状态时,管理网络设备根据用户终端的注册区列表在用户终端的注册区中寻呼用户终端,在确定用户终端连接的接入网信息后,根据接入网信息向用户终端发送控制指令。When the management network device is a network element connected to the access network device, and the user terminal is in an idle state, the management network device pages the user terminal in the registration area of the user terminal according to the registration area list of the user terminal, and determines the connection of the user terminal. After accessing the network information, the control command is sent to the user terminal according to the access network information.

当管理网络设备是接入网设备时,接入网设备根据终端标识向用户终端发送控制指令。When the management network device is an access network device, the access network device sends a control command to the user terminal according to the terminal identifier.

在本实施例中,控制指令还用于指示用户终端向管理终端发送报警信息,或者用于指示用户终端执行防盗操作。本实施例的实现方式请参考上述步骤309,本实施例对此不再赘述。In this embodiment, the control instruction is further used to indicate that the user terminal sends the alarm information to the management terminal, or is used to instruct the user terminal to perform the anti-theft operation. For the implementation of this embodiment, refer to step 309 above, which is not described in this embodiment.

综上所述,本发明实施例提供的用户终端报警方法,即使用户终端在没有向管理网络设备发送安全区域时被盗,也可以使用其他的管理终端通过管理网络设备控制用户终端发出报警信号,从而找回用户终端,提高了找回用户终端的概率。In summary, the user terminal alarm method provided by the embodiment of the present invention can use other management terminals to control the user terminal to send an alarm signal by using the management network device even if the user terminal is stolen when the security area is not sent to the management network device. Thereby, the user terminal is retrieved, and the probability of retrieving the user terminal is improved.

请参考图12,其示出了本发明一个示例性实施例提供的用户终端的结构示意图,该用户终端包括:处理器1210、存储器1220和总线1230。Please refer to FIG. 12, which is a schematic structural diagram of a user terminal according to an exemplary embodiment of the present invention. The user terminal includes a processor 1210, a memory 1220, and a bus 1230.

处理器1210包括一个或者一个以上处理核心,处理器1210通过运行软件程序以及模块,从而执行各种功能应用以及信息处理。The processor 1210 includes one or more processing cores, and the processor 1210 executes various functional applications and information processing by running software programs and modules.

存储器1220通过总线1230与处理器1210相连,存储器1220用于存储指令,处理器1210通过执行存储器1220中存储的指令实现上述用户终端报警方法。The memory 1220 is coupled to the processor 1210 via a bus 1230 for storing instructions, and the processor 1210 implements the above-described user terminal alarm method by executing instructions stored in the memory 1220.

此外,存储器1220由任何类型的易失性或非易失性存储设备或者它们的组合实现,如静态随时存取存储器(SRAM),电可擦除可编程只读存储器(EEPROM),可擦除可编程只读存储器(EPROM),可编程只读存储器(PROM),只读存储器(ROM),磁存储器,快闪存储器,磁盘或光盘。Moreover, memory 1220 is implemented by any type of volatile or non-volatile memory device, or a combination thereof, such as static random access memory (SRAM), electrically erasable programmable read only memory (EEPROM), erasable Programmable Read Only Memory (EPROM), Programmable Read Only Memory (PROM), Read Only Memory (ROM), Magnetic Memory, Flash Memory, Disk or Optical Disk.

可选的,该用户终端还包括接收器1240和发射器1250,接收器1240和发射器1250实现为一个通信组件。可选的,该通信组件包括通信芯片,通信芯 片中包括接收模块、发射模块和调制解调模块等,用于对信息进行调制解调,并通过无线信号接收或发送信息,用户终端通过该通信芯片使用无线网络方式与接入网设备及其他设备建立通信连接。Optionally, the user terminal further includes a receiver 1240 and a transmitter 1250, and the receiver 1240 and the transmitter 1250 are implemented as one communication component. Optionally, the communication component comprises a communication chip, a communication core The chip includes a receiving module, a transmitting module, a modem module, and the like, for modulating and demodulating information, and receiving or transmitting information through a wireless signal, and the user terminal uses the wireless network to access the network device and other through the communication chip. The device establishes a communication connection.

请参考上述图12,其示出了本发明一个示例性实施例提供的管理网络设备的结构示意图,该管理网络设备包括:处理器1210、存储器1220和总线1230。Please refer to FIG. 12 above, which shows a schematic structural diagram of a management network device provided by an exemplary embodiment of the present invention. The management network device includes a processor 1210, a memory 1220, and a bus 1230.

处理器1210包括一个或者一个以上处理核心,处理器1210通过运行软件程序以及模块,从而执行各种功能应用以及信息处理。The processor 1210 includes one or more processing cores, and the processor 1210 executes various functional applications and information processing by running software programs and modules.

存储器1220通过总线1230与处理器1210相连,存储器1220用于存储指令,处理器1210通过执行存储器1220中存储的指令实现上述用户终端报警方法。The memory 1220 is coupled to the processor 1210 via a bus 1230 for storing instructions, and the processor 1210 implements the above-described user terminal alarm method by executing instructions stored in the memory 1220.

此外,存储器1220由任何类型的易失性或非易失性存储设备或者它们的组合实现,如SRAM、EEPROM、EPROM、PROM、ROM、磁存储器、快闪存储器、磁盘或光盘。Moreover, memory 1220 is implemented by any type of volatile or non-volatile storage device, or a combination thereof, such as SRAM, EEPROM, EPROM, PROM, ROM, magnetic memory, flash memory, magnetic disk, or optical disk.

可选的,该管理网络设备还包括接收器1240和发射器1250,接收器1240和发射器1250实现为一个通信组件。可选的,该通信组件包括网络端口,管理网络设备通过该网络端口使用有线网络方式与接入网设备建立通信连接,可选的,管理网络设备包括至少两个网络端口。Optionally, the management network device further includes a receiver 1240 and a transmitter 1250, and the receiver 1240 and the transmitter 1250 are implemented as one communication component. Optionally, the communication component includes a network port, and the management network device establishes a communication connection with the access network device by using the wired network. Optionally, the management network device includes at least two network ports.

请参考图13,其示出了本发明一个实施例提供的用户终端报警装置的框图,该用户终端报警装置通过软件、硬件或者两者的结合实现成为用户终端的全部或者一部分,该用户终端报警装置包括:Please refer to FIG. 13 , which is a block diagram of a user terminal alarm device according to an embodiment of the present invention. The user terminal alarm device is implemented as a whole or a part of a user terminal by software, hardware or a combination of the two, and the user terminal alarms. The device includes:

获取单元1310,用于执行上述步骤201、步骤301、步骤302、步骤306以及步骤801。The obtaining unit 1310 is configured to perform the foregoing steps 201, 301, 302, 306, and 801.

确定单元1320,用于执行上述步骤202、步骤307以及步骤903。The determining unit 1320 is configured to perform step 202, step 307 and step 903 described above.

检测单元1330,用于执行上述步骤203以及步骤308。The detecting unit 1330 is configured to perform the foregoing steps 203 and 308.

控制单元1340,用于执行上述步骤204以及步骤309。The control unit 1340 is configured to perform step 204 and step 309 described above.

可选的,该装置还包括更新单元(图13中未示出),用于执行上述步骤802。Optionally, the apparatus further includes an update unit (not shown in FIG. 13) for performing the above step 802.

在实际实现时,图13所示的用户终端用于实现上述各个实施例提供的用户终端报警方法,用户终端在获取信息时,都可以由上述获取单元1310实现;用户终端在确定信息时,都可以由上述确定单元1320实现;用户终端在执行 检测操作时,都可以由上述检测单元1330实现;用户终端在执行控制操作时,都可以由上述控制单元1340实现;用户终端在执行更新操作时,都可以由上述更新单元实现。In actual implementation, the user terminal shown in FIG. 13 is used to implement the user terminal alarming method provided by the foregoing various embodiments. When acquiring the information, the user terminal may be implemented by the acquiring unit 1310; when determining the information, the user terminal It can be implemented by the above determining unit 1320; the user terminal is executing The detecting operation may be implemented by the detecting unit 1330; the user terminal may be implemented by the control unit 1340 when performing the control operation; and the user terminal may be implemented by the updating unit when performing the updating operation.

请参考上述图13,其示出了本发明一个实施例提供的用户终端报警装置的框图,该用户终端报警装置通过软件、硬件或者两者的结合实现成为管理网络设备的全部或者一部分,该用户终端报警装置包括:Please refer to FIG. 13 above, which is a block diagram of a user terminal alarm device according to an embodiment of the present invention. The user terminal alarm device is implemented as a whole or a part of a management network device by software, hardware or a combination of the two. Terminal alarm devices include:

获取单元1310,用于执行上述步骤201、步骤303、步骤304、步骤501、步骤502、步骤701、步骤702以及步骤901。The obtaining unit 1310 is configured to perform the foregoing steps 201, 303, 304, 501, 502, 701, 702, and 901.

确定单元1320,用于执行上述步骤202以及步骤905。The determining unit 1320 is configured to perform step 202 and step 905 described above.

检测单元1330,用于执行上述步骤203以及步骤906。The detecting unit 1330 is configured to perform the foregoing steps 203 and 906.

控制单元1340,用于执行上述步骤204以及步骤907。The control unit 1340 is configured to perform step 204 and step 907 above.

可选的,该装置还包括更新单元(图13中未示出),用于执行上述步骤902。Optionally, the apparatus further includes an update unit (not shown in FIG. 13) for performing the above step 902.

在实际实现时,图13所示的管理网络设备用于实现上述各个实施例提供的用户终端报警方法,管理网络设备在获取信息时,都可以由上述获取单元1310实现;管理网络设备在确定信息时,都可以由上述确定单元1320实现;管理网络设备在执行检测操作时,都可以由上述检测单元1330实现;管理网络设备在执行控制操作时,都可以由上述控制单元1340实现;管理网络设备在执行更新操作时,都可以由上述更新单元实现。In actual implementation, the management network device shown in FIG. 13 is used to implement the user terminal alarm method provided by the foregoing various embodiments. When the management network device acquires information, the management device can be implemented by the acquiring unit 1310; the management network device determines the information. The foregoing determining unit 1320 can be implemented by the foregoing determining unit 1320; the management network device can be implemented by the detecting unit 1330 when performing the detecting operation; and the management network device can be implemented by the foregoing control unit 1340 when performing the control operation; managing the network device When the update operation is performed, it can be implemented by the above update unit.

应当理解的是,在本文中使用的,除非上下文清楚地支持例外情况,单数形式“一个”(“a”、“an”、“the”)旨在也包括复数形式。还应当理解的是,在本文中使用的“和/或”是指包括一个或者一个以上相关联地列出的项目的任意和所有可能组合。It is to be understood that the singular forms "a", "the", "the" It should also be understood that "and/or" as used herein is meant to include any and all possible combinations of one or more of the associated listed items.

上述本申请实施例序号仅仅为了描述,不代表实施例的优劣。The serial numbers of the embodiments of the present application are merely for the description, and do not represent the advantages and disadvantages of the embodiments.

本领域普通技术人员可以理解实现上述实施例的全部或部分步骤可以通过硬件来完成,也可以通过程序来指令相关的硬件完成,所述的程序可以存储于一种计算机可读存储介质中,上述提到的存储介质可以是只读存储器,磁盘或光盘等。A person skilled in the art may understand that all or part of the steps of implementing the above embodiments may be completed by hardware, or may be instructed by a program to execute related hardware, and the program may be stored in a computer readable storage medium. The storage medium mentioned may be a read only memory, a magnetic disk or an optical disk or the like.

以上所述仅为本申请的较佳实施例,并不用以限制本申请,凡在本申请的 精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本申请的保护范围之内。 The above description is only a preferred embodiment of the present application, and is not intended to limit the present application. Any modifications, equivalent substitutions, improvements, etc. made within the spirit and principles are intended to be included within the scope of this application.

Claims (32)

一种用户终端报警方法,其特征在于,所述方法包括:A user terminal alarm method, characterized in that the method comprises: 获取用户终端的安全区域对应的接入网信息列表,所述安全区域是为所述用户终端设置的移动区域,所述接入网信息列表包括小区覆盖范围位于所述安全区域内的接入网设备列表和/或小区列表;Obtaining an access network information list corresponding to a security area of the user terminal, where the security area is a mobile area set for the user terminal, where the access network information list includes an access network whose cell coverage is located in the security area Device list and/or cell list; 确定所述用户终端当前连接的接入网信息;Determining access network information currently connected by the user terminal; 根据所述接入网信息列表和所述用户终端当前连接的所述接入网信息,检测所述用户终端是否位于所述安全区域之外;Determining, according to the access network information list and the access network information currently connected by the user terminal, whether the user terminal is located outside the security area; 当所述用户终端位于所述安全区域之外时,控制所述用户终端发出报警信号,所述报警信号用于警示所述用户终端被盗。When the user terminal is located outside the security zone, the user terminal is controlled to issue an alarm signal, and the alarm signal is used to alert the user terminal that the user terminal is stolen. 根据权利要求1所述的方法,其特征在于,所述根据所述接入网信息列表和所述用户终端当前连接的所述接入网信息,检测所述用户终端是否位于所述安全区域之外,包括:The method according to claim 1, wherein the detecting, according to the access network information list and the access network information currently connected by the user terminal, detecting whether the user terminal is located in the security area In addition, including: 检测所述接入网设备列表中是否包括所述用户终端当前连接的接入网设备的设备标识;当所述接入网信息列表中不包括所述当前连接的接入网设备的设备标识时,确定所述用户终端位于所述安全区域之外;Detecting, in the list of the access network devices, the device identifier of the access network device currently connected to the user terminal; when the access network information list does not include the device identifier of the currently connected access network device Determining that the user terminal is located outside the security zone; 或,or, 检测所述小区列表中是否包括所述用户终端当前连接的小区的小区标识;当所述接入网信息列表中不包括所述当前连接的小区的小区标识时,确定所述用户终端位于所述安全区域之外。Detecting, in the cell list, whether the cell identifier of the cell to which the user terminal is currently connected is included; when the cell identifier of the currently connected cell is not included in the access network information list, determining that the user terminal is located in the Outside the safe area. 根据权利要求1所述的方法,其特征在于,当所述用户终端位于所述安全区域之外时,所述方法还包括:The method according to claim 1, wherein when the user terminal is located outside the security zone, the method further comprises: 控制所述用户终端执行防盗操作,所述防盗操作包括禁止关机、禁止禁用客户识别模块SIM卡、禁止启用飞行模式、禁止启动静音模式和锁定所述用户终端中的至少一种。The user terminal is controlled to perform an anti-theft operation, the anti-theft operation including prohibiting shutdown, prohibiting disabling of the customer identification module SIM card, disabling the flight mode, prohibiting the activation of the silent mode, and locking at least one of the user terminals. 根据权利要求1所述的方法,其特征在于,所述获取用户终端的安全区域对应的接入网信息列表之后,还包括: The method according to claim 1, wherein after the obtaining the access network information list corresponding to the security area of the user terminal, the method further includes: 获取所述接入网信息列表对应的接入网覆盖区域;Obtaining an access network coverage area corresponding to the access network information list; 根据所述接入网覆盖区域更新所述安全区域。Updating the security zone according to the access network coverage area. 根据权利要求1至4任一所述的方法,其特征在于,所述方法应用于所述用户终端中,所述获取用户终端的安全区域对应的接入网信息列表,包括:The method according to any one of claims 1 to 4, wherein the method is applied to the user terminal, and the obtaining an access network information list corresponding to a security area of the user terminal includes: 确定所述安全区域;Determining the security zone; 向管理网络设备发送所述安全区域,以使所述管理网络设备根据所述安全区域确定对应的所述接入网信息列表;Sending the security zone to the management network device, so that the management network device determines the corresponding access network information list according to the security zone; 接收所述管理网络设备发送的所述接入网信息列表。Receiving the access network information list sent by the management network device. 根据权利要求5所述的方法,其特征在于,所述确定所述安全区域,包括:The method of claim 5, wherein the determining the security zone comprises: 获取当前所在的位置信息;确定与所述位置信息的距离小于等于预定距离阈值的区域为所述安全区域;Obtaining current location information; determining that the distance from the location information is less than or equal to a predetermined distance threshold is the security zone; 或,or, 接收区域设置操作,所述区域设置操作用于设置所述安全区域;Receiving an area setting operation for setting the security area; 或,or, 获取历史移动过程中的N个位置信息,N为大于1的整数;确定所述N个位置信息形成的区域为所述安全区域。Acquiring N pieces of position information during the historical movement, N is an integer greater than 1; determining an area formed by the N pieces of position information is the safety area. 根据权利要求1至4任一所述的方法,其特征在于,所述方法应用于管理网络设备中,所述获取用户终端的安全区域对应的接入网信息列表,包括:The method according to any one of claims 1 to 4, wherein the method is applied to the management network device, and the obtaining the access network information list corresponding to the security area of the user terminal comprises: 接收所述用户终端发送的所述安全区域;Receiving the security area sent by the user terminal; 根据所述安全区域确定对应的所述接入网信息列表。Determining the corresponding access network information list according to the security area. 根据权利要求7所述的方法,其特征在于,所述接入网信息列表中包括所述接入网设备列表;The method according to claim 7, wherein the access network information list includes the access network device list; 所述根据所述安全区域确定对应的所述接入网信息列表,包括:Determining, according to the security area, the corresponding access network information list, including: 确定与所述管理网络设备相连的接入网设备的地理位置信息;Determining geographic location information of the access network device connected to the management network device; 根据所述地理位置信息位于所述安全区域内的接入网设备的设备标识,确定所述接入网设备列表。 Determining the access network device list according to the device identifier of the access network device that is located in the security area. 根据权利要求7所述的方法,其特征在于,所述接入网信息列表包括所述小区列表;The method according to claim 7, wherein the access network information list comprises the cell list; 所述根据所述安全区域确定对应的所述接入网信息列表,包括:Determining, according to the security area, the corresponding access network information list, including: 确定与所述管理网络设备相连的接入网设备的各个小区的所述小区覆盖范围;Determining the cell coverage of each cell of the access network device connected to the management network device; 根据所述小区覆盖范围位于所述安全区域之内的小区的小区标识,确定所述小区列表。Determining the cell list according to a cell identifier of a cell whose cell coverage is located within the security zone. 一种用户终端报警装置,其特征在于,所述装置包括:A user terminal alarm device, characterized in that the device comprises: 获取单元,用于获取用户终端的安全区域对应的接入网信息列表,所述安全区域是为所述用户终端设置的移动区域,所述接入网信息列表包括小区覆盖范围位于所述安全区域内的接入网设备列表和/或小区列表;An obtaining unit, configured to acquire a list of access network information corresponding to a security area of the user terminal, where the security area is a mobile area set for the user terminal, where the access network information list includes a cell coverage area in the security area a list of access network devices and/or a list of cells within; 确定单元,用于确定所述用户终端当前连接的接入网信息;a determining unit, configured to determine access network information currently connected by the user terminal; 检测单元,用于根据所述接入网信息列表和所述用户终端当前连接的所述接入网信息,检测所述用户终端是否位于所述安全区域之外;a detecting unit, configured to detect, according to the access network information list and the access network information currently connected by the user terminal, whether the user terminal is located outside the security area; 控制单元,用于当所述用户终端位于所述安全区域之外时,控制所述用户终端发出报警信号,所述报警信号用于警示所述用户终端被盗。And a control unit, configured to: when the user terminal is located outside the security zone, control the user terminal to send an alarm signal, where the alarm signal is used to alert the user terminal that the user terminal is stolen. 根据权利要求10所述的装置,其特征在于,The device of claim 10 wherein: 所述检测单元,还用于检测所述接入网设备列表中是否包括所述用户终端当前连接的接入网设备的设备标识;当所述接入网信息列表中不包括所述当前连接的接入网设备的设备标识时,确定所述用户终端位于所述安全区域之外;The detecting unit is further configured to: detect, in the access network device list, a device identifier of an access network device that is currently connected by the user terminal; and when the access network information list does not include the currently connected When the device identifier of the network device is accessed, determining that the user terminal is located outside the security zone; 或,or, 所述检测单元,还用于检测所述小区列表中是否包括所述用户终端当前连接的小区的小区标识;当所述接入网信息列表中不包括所述当前连接的小区的小区标识时,确定所述用户终端位于所述安全区域之外。The detecting unit is further configured to detect, in the cell list, whether a cell identifier of a cell currently connected by the user terminal is included, and when the cell identifier of the currently connected cell is not included in the access network information list, It is determined that the user terminal is located outside of the secure area. 根据权利要求10所述的装置,其特征在于,The device of claim 10 wherein: 所述控制单元,还用于当所述用户终端位于所述安全区域之外时,控制所述用户终端执行防盗操作,所述防盗操作包括禁止关机、禁止禁用客户识别模块 SIM卡、禁止启用飞行模式、禁止启动静音模式和锁定所述用户终端中的至少一种。The control unit is further configured to: when the user terminal is located outside the security zone, control the user terminal to perform an anti-theft operation, where the anti-theft operation includes prohibiting shutdown, prohibiting disabling the customer identification module The SIM card, the disable flight mode, the disable silent mode, and the at least one of the user terminals are locked. 根据权利要求10所述的装置,其特征在于,The device of claim 10 wherein: 所述获取单元,还用于获取所述接入网信息列表对应的接入网覆盖区域;The acquiring unit is further configured to acquire an access network coverage area corresponding to the access network information list; 所述装置还包括:The device also includes: 更新单元,用于根据所述接入网覆盖区域更新所述安全区域。And an updating unit, configured to update the security area according to the access network coverage area. 根据权利要求10至13任一所述的装置,其特征在于,所述装置应用于所述用户终端中,所述获取单元,还用于:The device according to any one of claims 10 to 13, wherein the device is applied to the user terminal, and the acquiring unit is further configured to: 确定所述安全区域;Determining the security zone; 向管理网络设备发送所述安全区域,以使所述管理网络设备根据所述安全区域确定对应的所述接入网信息列表;Sending the security zone to the management network device, so that the management network device determines the corresponding access network information list according to the security zone; 接收所述管理网络设备发送的所述接入网信息列表。Receiving the access network information list sent by the management network device. 根据权利要求14所述的装置,其特征在于,The device of claim 14 wherein: 所述获取单元,还用于获取当前所在的位置信息;确定与所述位置信息的距离小于等于预定距离阈值的区域为所述安全区域;The acquiring unit is further configured to acquire the current location information, and determine that the distance from the location information is less than or equal to a predetermined distance threshold. 或,or, 所述获取单元,还用于接收区域设置操作,所述区域设置操作用于设置所述安全区域;The obtaining unit is further configured to receive an area setting operation, where the area setting operation is used to set the security area; 或,or, 所述获取单元,还用于获取历史移动过程中的N个位置信息,N为大于1的整数;确定所述N个位置信息形成的区域为所述安全区域。The acquiring unit is further configured to acquire N pieces of position information during a historical movement, where N is an integer greater than 1; and determining an area formed by the N pieces of position information is the safety area. 根据权利要求10至13任一所述的装置,其特征在于,所述装置应用于管理网络设备中,所述获取单元,还用于:The device according to any one of claims 10 to 13, wherein the device is applied to a management network device, and the obtaining unit is further configured to: 接收所述用户终端发送的所述安全区域;Receiving the security area sent by the user terminal; 根据所述安全区域确定对应的所述接入网信息列表。Determining the corresponding access network information list according to the security area. 根据权利要求16所述的装置,其特征在于,所述接入网信息列表中包 括所述接入网设备列表;所述获取单元,还用于:The apparatus according to claim 16, wherein said access network information list is packaged The access network device list is included; the obtaining unit is further configured to: 确定与所述管理网络设备相连的接入网设备的地理位置信息;Determining geographic location information of the access network device connected to the management network device; 根据所述地理位置信息位于所述安全区域内的接入网设备的设备标识,确定所述接入网设备列表。Determining the access network device list according to the device identifier of the access network device that is located in the security area. 根据权利要求16所述的装置,其特征在于,所述接入网信息列表包括所述小区列表;所述获取单元,还用于:The device according to claim 16, wherein the access network information list includes the cell list; the acquiring unit is further configured to: 确定与所述管理网络设备相连的接入网设备的各个小区的所述小区覆盖范围;Determining the cell coverage of each cell of the access network device connected to the management network device; 根据所述小区覆盖范围位于所述安全区域之内的小区的小区标识,确定所述小区列表。Determining the cell list according to a cell identifier of a cell whose cell coverage is located within the security zone. 一种用户终端,其特征在于,所述用户终端包括:处理器,以及与处理器相连的存储器,所述存储器用于存储一个或者一个以上的指令,所述指令被配置为由所述处理器执行:A user terminal, comprising: a processor, and a memory coupled to the processor, the memory for storing one or more instructions, the instructions being configured by the processor carried out: 所述处理器,用于获取用户终端的安全区域对应的接入网信息列表,所述安全区域是为所述用户终端设置的移动区域,所述接入网信息列表包括小区覆盖范围位于所述安全区域内的接入网设备列表和/或小区列表;The processor is configured to obtain an access network information list corresponding to a security area of the user terminal, where the security area is a mobile area set for the user terminal, where the access network information list includes a cell coverage area a list of access network devices and/or a list of cells within the secure area; 所述处理器,用于确定所述用户终端当前连接的接入网信息;The processor is configured to determine access network information currently connected by the user terminal; 所述处理器,用于根据所述接入网信息列表和所述用户终端当前连接的所述接入网信息,检测所述用户终端是否位于所述安全区域之外;The processor is configured to detect, according to the access network information list and the access network information currently connected by the user terminal, whether the user terminal is located outside the security area; 所述处理器,用于当所述用户终端位于所述安全区域之外时,控制所述用户终端发出报警信号,所述报警信号用于警示所述用户终端被盗。The processor is configured to: when the user terminal is located outside the security zone, control the user terminal to send an alarm signal, where the alarm signal is used to alert the user terminal that the user terminal is stolen. 根据权利要求19所述的用户终端,其特征在于,The user terminal according to claim 19, characterized in that 所述处理器,还用于检测所述接入网设备列表中是否包括所述用户终端当前连接的接入网设备的设备标识;当所述接入网信息列表中不包括所述当前连接的接入网设备的设备标识时,确定所述用户终端位于所述安全区域之外;The processor is further configured to: detect, in the access network device list, a device identifier of an access network device that is currently connected by the user terminal; and when the access network information list does not include the currently connected When the device identifier of the network device is accessed, determining that the user terminal is located outside the security zone; 或,or, 所述处理器,还用于检测所述小区列表中是否包括所述用户终端当前连接的小区的小区标识;当所述接入网信息列表中不包括所述当前连接的小区的小 区标识时,确定所述用户终端位于所述安全区域之外。The processor is further configured to detect, in the cell list, whether a cell identifier of a cell currently connected by the user terminal is included; when the access network information list does not include the small cell of the currently connected cell When the area is identified, it is determined that the user terminal is located outside the security area. 根据权利要求19所述的用户终端,其特征在于,The user terminal according to claim 19, characterized in that 所述处理器,还用于当所述用户终端位于所述安全区域之外时,控制所述用户终端执行防盗操作,所述防盗操作包括禁止关机、禁止禁用客户识别模块SIM卡、禁止启用飞行模式、禁止启动静音模式和锁定所述用户终端中的至少一种。The processor is further configured to: when the user terminal is located outside the security zone, control the user terminal to perform an anti-theft operation, where the anti-theft operation includes prohibiting shutdown, prohibiting disabling the customer identification module SIM card, and prohibiting the flight from being activated. The mode prohibits initiating the silent mode and locking at least one of the user terminals. 根据权利要求19所述的用户终端,其特征在于,所述处理器,还用于:The user terminal according to claim 19, wherein the processor is further configured to: 获取所述接入网信息列表对应的接入网覆盖区域;Obtaining an access network coverage area corresponding to the access network information list; 根据所述接入网覆盖区域更新所述安全区域。Updating the security zone according to the access network coverage area. 根据权利要求19至22任一所述的用户终端,其特征在于,A user terminal according to any one of claims 19 to 22, characterized in that 所述处理器,还用于确定所述安全区域;The processor is further configured to determine the security area; 所述处理器,还用于向管理网络设备发送所述安全区域,以使所述管理网络设备根据所述安全区域确定对应的所述接入网信息列表;The processor is further configured to send the security area to the management network device, so that the management network device determines the corresponding access network information list according to the security area; 所述处理器,还用于接收所述管理网络设备发送的所述接入网信息列表。The processor is further configured to receive the access network information list sent by the management network device. 根据权利要求23所述的用户终端,其特征在于,A user terminal according to claim 23, characterized in that 所述处理器,还用于获取当前所在的位置信息;确定与所述位置信息的距离小于等于预定距离阈值的区域为所述安全区域;The processor is further configured to acquire location information that is currently located; and determine an area that is less than or equal to a predetermined distance threshold by the location information as the security area; 或,or, 所述处理器,还用于接收区域设置操作,所述区域设置操作用于设置所述安全区域;The processor is further configured to receive an area setting operation, where the area setting operation is used to set the security area; 或,or, 所述处理器,还用于获取历史移动过程中的N个位置信息,N为大于1的整数;确定所述N个位置信息形成的区域为所述安全区域。The processor is further configured to acquire N pieces of position information during a historical movement, where N is an integer greater than 1; and determining an area formed by the N pieces of position information is the security area. 一种管理网络设备,其特征在于,所述管理网络设备包括:处理器,以及与处理器相连的存储器,所述存储器用于存储一个或者一个以上的指令,所述指令被配置为由所述处理器执行:A management network device, comprising: a processor, and a memory coupled to the processor, the memory for storing one or more instructions, the instructions being configured to be The processor executes: 所述处理器,用于获取用户终端的安全区域对应的接入网信息列表,所述安 全区域是为所述用户终端设置的移动区域,所述接入网信息列表包括小区覆盖范围位于所述安全区域内的接入网设备列表和/或小区列表;The processor is configured to obtain a list of access network information corresponding to a security area of the user terminal, where the security The entire area is a mobile area set for the user terminal, and the access network information list includes an access network device list and/or a cell list whose cell coverage is located in the security area; 所述处理器,用于确定所述用户终端当前连接的接入网信息;The processor is configured to determine access network information currently connected by the user terminal; 所述处理器,用于根据所述接入网信息列表和所述用户终端当前连接的所述接入网信息,检测所述用户终端是否位于所述安全区域之外;The processor is configured to detect, according to the access network information list and the access network information currently connected by the user terminal, whether the user terminal is located outside the security area; 所述处理器,用于当所述用户终端位于所述安全区域之外时,控制所述用户终端发出报警信号,所述报警信号用于警示所述用户终端被盗。The processor is configured to: when the user terminal is located outside the security zone, control the user terminal to send an alarm signal, where the alarm signal is used to alert the user terminal that the user terminal is stolen. 根据权利要求25所述的管理网络设备,其特征在于,A management network device according to claim 25, wherein 所述处理器,还用于检测所述接入网设备列表中是否包括所述用户终端当前连接的接入网设备的设备标识;当所述接入网信息列表中不包括所述当前连接的接入网设备的设备标识时,确定所述用户终端位于所述安全区域之外;The processor is further configured to: detect, in the access network device list, a device identifier of an access network device that is currently connected by the user terminal; and when the access network information list does not include the currently connected When the device identifier of the network device is accessed, determining that the user terminal is located outside the security zone; 或,or, 所述处理器,还用于检测所述小区列表中是否包括所述用户终端当前连接的小区的小区标识;当所述接入网信息列表中不包括所述当前连接的小区的小区标识时,确定所述用户终端位于所述安全区域之外。The processor is further configured to detect, in the cell list, whether a cell identifier of a cell currently connected by the user terminal is included, and when the cell identifier of the currently connected cell is not included in the access network information list, It is determined that the user terminal is located outside of the secure area. 根据权利要求25所述的管理网络设备,其特征在于,A management network device according to claim 25, wherein 所述处理器,还用于当所述用户终端位于所述安全区域之外时,控制所述用户终端执行防盗操作,所述防盗操作包括禁止关机、禁止禁用客户识别模块SIM卡、禁止启用飞行模式、禁止启动静音模式和锁定所述用户终端中的至少一种。The processor is further configured to: when the user terminal is located outside the security zone, control the user terminal to perform an anti-theft operation, where the anti-theft operation includes prohibiting shutdown, prohibiting disabling the customer identification module SIM card, and prohibiting the flight from being activated. The mode prohibits initiating the silent mode and locking at least one of the user terminals. 根据权利要求19所述的用户终端,其特征在于,所述处理器,还用于:The user terminal according to claim 19, wherein the processor is further configured to: 获取所述接入网信息列表对应的接入网覆盖区域;Obtaining an access network coverage area corresponding to the access network information list; 根据所述接入网覆盖区域更新所述安全区域。Updating the security zone according to the access network coverage area. 根据权利要求25至28任一所述的管理网络设备,其特征在于,A management network device according to any one of claims 25 to 28, characterized in that 所述处理器,还用于接收所述用户终端发送的所述安全区域;The processor is further configured to receive the security area sent by the user terminal; 所述处理器,还用于根据所述安全区域确定对应的所述接入网信息列表。The processor is further configured to determine, according to the security area, the corresponding access network information list. 根据权利要求29所述的管理网络设备,其特征在于,所述接入网信息 列表中包括所述接入网设备列表;The management network device according to claim 29, wherein said access network information The list includes the access network device list; 所述处理器,还用于确定与所述管理网络设备相连的接入网设备的地理位置信息;The processor is further configured to determine geographic location information of an access network device connected to the management network device; 所述处理器,还用于根据所述地理位置信息位于所述安全区域内的接入网设备的设备标识,确定所述接入网设备列表。The processor is further configured to determine the access network device list according to the device identifier of the access network device that is located in the security area by the geographic location information. 根据权利要求29所述的管理网络设备,其特征在于,所述接入网信息列表包括所述小区列表;The management network device according to claim 29, wherein the access network information list comprises the cell list; 所述处理器,还用于确定与所述管理网络设备相连的接入网设备的各个小区的所述小区覆盖范围;The processor is further configured to determine the coverage of the cell of each cell of the access network device that is connected to the management network device; 所述处理器,还用于根据所述小区覆盖范围位于所述安全区域之内的小区的小区标识,确定所述小区列表。The processor is further configured to determine the cell list according to a cell identifier of a cell whose cell coverage is located within the security zone. 一种用户终端报警系统,其特征在于,所述系统包括:用户终端和管理网络设备;A user terminal alarm system, characterized in that the system comprises: a user terminal and a management network device; 所述用户终端是如权利要求19至24任一所述的用户终端,或者,所述管理网络设备是如权利要求25至31任一所述的管理网络设备。 The user terminal is the user terminal according to any one of claims 19 to 24, or the management network device is the management network device according to any one of claims 25 to 31.
PCT/CN2016/106646 2016-11-21 2016-11-21 Method, device and system for user terminal to give alarm Ceased WO2018090379A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/106646 WO2018090379A1 (en) 2016-11-21 2016-11-21 Method, device and system for user terminal to give alarm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/106646 WO2018090379A1 (en) 2016-11-21 2016-11-21 Method, device and system for user terminal to give alarm

Publications (1)

Publication Number Publication Date
WO2018090379A1 true WO2018090379A1 (en) 2018-05-24

Family

ID=62145997

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/106646 Ceased WO2018090379A1 (en) 2016-11-21 2016-11-21 Method, device and system for user terminal to give alarm

Country Status (1)

Country Link
WO (1) WO2018090379A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110009090A1 (en) * 2009-07-13 2011-01-13 Sparks Iii Clifford Cellular phone with boundary alarm
CN102740366A (en) * 2012-07-06 2012-10-17 华为技术有限公司 Method, device and system for realizing wireless network access
US8483663B1 (en) * 2010-10-15 2013-07-09 Sprint Communications Company L.P. Reducing mobile-phone fraud
CN105827848A (en) * 2016-04-28 2016-08-03 维沃移动通信有限公司 Prompting method and mobile terminal
CN205541194U (en) * 2016-01-21 2016-08-31 珠海格力电器股份有限公司 Anti-theft equipment, anti-theft system and terminal equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110009090A1 (en) * 2009-07-13 2011-01-13 Sparks Iii Clifford Cellular phone with boundary alarm
US8483663B1 (en) * 2010-10-15 2013-07-09 Sprint Communications Company L.P. Reducing mobile-phone fraud
CN102740366A (en) * 2012-07-06 2012-10-17 华为技术有限公司 Method, device and system for realizing wireless network access
CN205541194U (en) * 2016-01-21 2016-08-31 珠海格力电器股份有限公司 Anti-theft equipment, anti-theft system and terminal equipment
CN105827848A (en) * 2016-04-28 2016-08-03 维沃移动通信有限公司 Prompting method and mobile terminal

Similar Documents

Publication Publication Date Title
US12069541B2 (en) Terminal device location determining method and device
US9813873B2 (en) Mobile device tracking prevention method and system
CN101606405B (en) WLAN network information caching
US7966020B2 (en) Wireless user based notification system
CN102598802B (en) Apparatus and method for accessing network in wireless terminal
KR20250003594A (en) Systems and methods for reporting generalized periods of unavailability for access to a wireless network
US8737619B2 (en) Method of triggering location based events in a user equipment
US8737607B2 (en) Finding nearby users without revealing own location
US8874119B2 (en) Method and device for machine type communication monitoring processing
US20170099577A1 (en) Establishing geo-fences and related alarms
WO2019055191A1 (en) PROVIDING ESIM PROFILE BETWEEN NEARBY DEVICES
US20180206105A1 (en) Method, apparatus, and server for network inquiry
US20130143584A1 (en) System and method for user control of location determination
US11910264B2 (en) Network reselection method and apparatus
US10251119B2 (en) Method and apparatus for handling reject
US20120244882A1 (en) Method and Apparatus for Providing Satellite Assistance Data
US20200186968A1 (en) Service provision device, service provision method, and program storage medium
TWI604743B (en) Dynamic public warning system deactivation
WO2018090379A1 (en) Method, device and system for user terminal to give alarm
WO2021000319A1 (en) Method, apparatus, and system for ensuring terminal security
JP2025510798A (en) Terminal discovery method, device, equipment, and storage medium
WO2018086554A1 (en) Method and electronic apparatus for querying public transport information
US20250039830A1 (en) Communication method and related device
US12532146B2 (en) System and method for managing location information of a mobile device
WO2020120647A1 (en) Controlling an operation mode of a communications network

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16921646

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16921646

Country of ref document: EP

Kind code of ref document: A1