[go: up one dir, main page]

WO2018090379A1 - Procédé, dispositif et système permettant à un terminal utilisateur de donner l'alarme - Google Patents

Procédé, dispositif et système permettant à un terminal utilisateur de donner l'alarme Download PDF

Info

Publication number
WO2018090379A1
WO2018090379A1 PCT/CN2016/106646 CN2016106646W WO2018090379A1 WO 2018090379 A1 WO2018090379 A1 WO 2018090379A1 CN 2016106646 W CN2016106646 W CN 2016106646W WO 2018090379 A1 WO2018090379 A1 WO 2018090379A1
Authority
WO
WIPO (PCT)
Prior art keywords
user terminal
access network
network device
area
cell
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2016/106646
Other languages
English (en)
Chinese (zh)
Inventor
李永翠
李岩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to PCT/CN2016/106646 priority Critical patent/WO2018090379A1/fr
Publication of WO2018090379A1 publication Critical patent/WO2018090379A1/fr
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/725Cordless telephones

Definitions

  • the embodiments of the present invention relate to the field of mobile communications, and in particular, to a user terminal alarm method, apparatus, and system.
  • a user registers a management account of the user terminal on a server, which is a server for providing a background service for the user terminal. After the user finds that the user terminal is stolen, the user logs in to the management account on the server and retrieves the user terminal through the server.
  • the operations of retrieving the user terminal include: locking the user terminal, backing up data in the user terminal, and obtaining geographic location information of the user terminal, and the like.
  • the user cannot find that the user terminal is stolen in time, and the retrieval of the user terminal is not timely.
  • the embodiment of the invention provides a method, device and system for alarming the user terminal.
  • the technical solution is as follows:
  • an embodiment of the present invention provides a method for alerting a user terminal, where the method includes: acquiring an access network information list corresponding to a security area of a user terminal, where the security area is a mobile area set for the user terminal, and access network information
  • the list includes an access network device list and/or a cell list whose cell coverage is located in the security area; determining access network information currently connected by the user terminal; and detecting according to the access network information list and the access network information currently connected by the user terminal.
  • the control user terminal when it is detected that the user terminal is located outside the security zone, it indicates that the user terminal is Theft, at this time, the control user terminal actively sends out an alarm signal to indicate that the user terminal is stolen, and the user terminal is found to be stolen, and the user terminal can be found to be stolen in time to retrieve the terminal in time.
  • detecting, according to the access network information list and the access network information currently connected by the user terminal, whether the user terminal is located outside the security area including: detecting the access network device list Whether the device identifier of the access network device currently connected by the user terminal is included; when the access network information list does not include the device identifier of the currently connected access network device, determining that the user terminal is outside the security zone; or detecting the cell list Whether the cell identifier of the cell to which the user terminal is currently connected is included in the network; when the cell identifier of the currently connected cell is not included in the access network information list, it is determined that the user terminal is located outside the security zone.
  • GPS Global Positioning System
  • the method further includes: controlling the user terminal to perform an anti-theft operation, the anti-theft operation includes prohibiting the shutdown, and prohibiting the disabling of the customer identification module (Subscriber Identification) Module, SIM) card, disable flight mode, disable mute mode, and lock user terminal.
  • the customer identification module Subscriber Identification
  • SIM Subscriber Identification
  • the user terminal when detecting that the user terminal is outside the security zone, the user terminal is prohibited from performing operations such as shutting down and disabling the SIM card, thereby preventing the thief from escaping by shutting down and disabling the SIM card after the user terminal is stolen.
  • the holder's lookup increases the probability of retrieving the user terminal.
  • the method further includes: acquiring an access network coverage area corresponding to the access network information list; The coverage area updates the security zone.
  • the security zone is updated according to the access network information list such that the determined range of security zones is more accurate.
  • the method is applied to the user terminal, and acquiring the access network information list corresponding to the security area of the user terminal, including: determining the security area; and sending the security area to the management network device, The management network device determines the corresponding access network information list according to the security area; and receives the access network information list sent by the management network device.
  • determining the security area includes: acquiring current location information; determining that the distance from the location information is less than or equal to a predetermined distance
  • the area of the threshold is a security area; or, the receiving area setting operation, the area setting operation is used to set the security area; or, the N pieces of position information during the historical movement are acquired, N is an integer greater than 1; and the N position information is determined
  • the area is a safe area.
  • the method is applied to the management network device, and the access network information list corresponding to the security area of the user terminal is obtained, including: receiving the security area sent by the user terminal; Determine the corresponding access network information list.
  • the management network device detects whether the user terminal is located outside the security zone, and the user terminal does not need to save the device list, and does not need to perform the detection operation, thereby reducing the requirement for processing capability of the user terminal, and improving The applicable range of the user terminal alarm method.
  • the access network information list includes an access network device list, and the corresponding access network information is determined according to the security area.
  • the list includes: determining geographic location information of the access network device connected to the management network device; determining the access network device list according to the device identifier of the access network device located in the security region according to the geographic location information.
  • the access network information list includes a cell list, and the corresponding access network information list is determined according to the security area, including: Determining a cell coverage of each cell of the access network device connected to the management network device; determining a cell list according to a cell identity of the cell whose cell coverage is located within the security region.
  • the access network information list includes a cell list
  • the user identifier is detected in the security area according to the cell identifier and the cell list of the cell where the user is located, because the coverage of the cell is compared with the coverage of the base station. Small, thus improving the accuracy of the detection results and avoiding misjudgment of the location of the user terminal.
  • a user terminal alarm device comprising at least one unit for implementing the user terminal alarm method provided by the above first aspect.
  • a user terminal comprising: a processor, and a memory coupled to the processor.
  • the memory is for storing one or more instructions, the instructions being instructed to be executed by a processor, and the processor is configured to implement the user terminal alarm method provided by the first aspect above.
  • a management network device comprising: a processor, and a memory coupled to the processor.
  • the memory is for storing one or more instructions, the instructions being instructed to be executed by a processor, and the processor is configured to implement the user terminal alarm method provided by the first aspect above.
  • a user terminal alarm system includes a user terminal and a management network device; the user terminal is a user terminal provided by the third aspect, or the management network device is provided by the fourth aspect. Manage network devices.
  • FIG. 1A is a schematic structural diagram of a user terminal alarm system according to an exemplary embodiment of the present invention.
  • FIG. 1B is a schematic structural diagram of a user terminal alarm system according to an exemplary embodiment of the present invention.
  • FIG. 2 is a flowchart of a method for alerting a user terminal according to an exemplary embodiment of the present invention
  • FIG. 3 is a flowchart of a method for alerting a user terminal according to another exemplary embodiment of the present invention.
  • FIG. 4 is a schematic diagram of a security area provided by an exemplary embodiment of the present invention.
  • FIG. 5 is a flowchart of a method for alerting a user terminal according to another exemplary embodiment of the present invention.
  • FIG. 6 is a schematic diagram of an access network device in a security area according to an exemplary embodiment of the present invention.
  • FIG. 7A is a flowchart of a method for alerting a user terminal according to another exemplary embodiment of the present invention.
  • FIG. 7B is a schematic diagram of cell coverage provided by an exemplary embodiment of the present invention.
  • FIG. 8A is a schematic diagram of an access network coverage area according to an exemplary embodiment of the present invention.
  • FIG. 8B is a schematic diagram of an access network coverage area according to an exemplary embodiment of the present invention.
  • FIG. 8C is a flowchart of a method for alerting a user terminal according to another exemplary embodiment of the present invention.
  • FIG. 9A is a flowchart of a method for alerting a user terminal according to another exemplary embodiment of the present invention.
  • FIG. 9B is a flowchart of a method for alerting a user terminal according to another exemplary embodiment of the present invention.
  • FIG. 10 is a schematic diagram of a method for alerting a user terminal according to another exemplary embodiment of the present invention.
  • FIG. 11 is a flowchart of a method for alerting a user terminal according to another exemplary embodiment of the present invention.
  • FIG. 12 is a schematic structural diagram of a user terminal/management network device according to an exemplary embodiment of the present invention.
  • FIG. 13 is a block diagram of a user terminal alarm device provided by an exemplary embodiment of the present invention.
  • Multiple as referred to herein means two or more. "and/or”, describing the association relationship of the associated objects, indicating that there may be three relationships, for example, A and/or B, which may indicate that there are three cases where A exists separately, A and B exist at the same time, and B exists separately.
  • the symbol “/” generally indicates that the contextual object is an "or" relationship.
  • FIG. 1A is a schematic structural diagram of a user terminal alarm system according to an exemplary embodiment of the present invention.
  • the system includes: a user terminal 120, an access network device 140, and a management network device 160.
  • the user terminal 120 is an electronic device having wireless communication capabilities such as a smartphone, a tablet, an e-book reader, and a portable computer.
  • the user terminal 120 is connected to the access network device 140 by using a Radio Access Technology (RAT).
  • RAT Radio Access Technology
  • the access network device 140 is a network element that interacts with the user terminal 120.
  • the access network device 140 is a base station.
  • the access network device 140 is a Global System for Mobile communication (GSM) or a Base Transceiver Station (BTS) in Code Division Multiple Access (CDMA); or
  • the network access device 140 is a base station (NodeB) in a Universal Mobile Telecommunications System (UMTS); or the access network device 140 is a base station in a Worldwide Interoperability for Microwave Access (WiMAX) ( Base Station, BS); or, the access network device 140 is an evolved base station (eNB or e-NodeB) in Long Term Evolution (LTE); or, the access network device 140 is the fifth Access network equipment in the mobile communication technology (5G), including a central unit (CU) and a distributed unit (DU); or, the access network device 140 is wireless-fidelity (WIFI) Access point (AP) in ).
  • GSM Global System for Mobile communication
  • BTS Base Transceiver Station
  • CDMA Code Division Multiple Access
  • the network access device 140 is a base station (NodeB) in a Universal Mobile Telecommunications System (UMTS
  • the management network device 160 is configured to manage the user terminal 120 and the access network device 140, and the access network device 140 is connected to the management network device 160 through a wired network.
  • the management network device 160 is a physical device or a virtual device.
  • the management network device 160 is any one of a Mobility Management (MM) network element and a third-party deployed network element, as shown in FIG. 1A.
  • the mobility management network element is a Mobility Management Entity (MME).
  • the management network device 160 is an access network device such as a BTS, a NodeB, a BS, an e-NodeB, and an AP, and the access network device 140 and the management network device 160 are implemented as the same network device, as shown in FIG. 1B. Shown.
  • the access network device 140 connected to one management network device 160 includes one or at least two, and the user terminal 120 connected to one access network device 140 includes one or at least two, FIG. 1A exemplarily shown.
  • An access network device 140 connected to the management network device 160 is shown.
  • FIG. 1A and FIG. 1B exemplarily show a user terminal 120 connected to the access network device 140.
  • FIG. 2 is a flowchart of a method for alerting a user terminal according to an exemplary embodiment of the present application. This embodiment is applied to the user terminal alarm system shown in FIG. 1A or FIG. 1B for example. , the method includes:
  • Step 201 Obtain an access network information list corresponding to a security area of the user terminal.
  • the security zone is a mobile zone set for the user terminal, and the access network information list includes an access network device list and/or a cell list whose cell coverage is located in the security zone.
  • Step 202 Determine access network information currently connected by the user terminal.
  • Step 203 Detect whether the user terminal is located outside the security area according to the access network information list and the access network information currently connected by the user terminal.
  • Step 204 When the user terminal is outside the security zone, the control user terminal sends an alarm signal, and the alarm signal is used to alert the user terminal that the terminal is stolen.
  • This embodiment does not describe the case where the user terminal is located in the security zone.
  • the user terminal alarm method detects whether the user terminal is located outside the security area according to the access network information list of the security area and the access network information currently connected by the user terminal, when the user terminal is detected.
  • the user terminal When the user is located outside the security zone, it indicates that the user terminal is stolen.
  • the user terminal is actively sent an alarm signal to indicate the theft.
  • the user terminal is not required to discover that the user terminal is stolen, and the user terminal can be found to be stolen and retrieved in a timely manner. terminal.
  • the user terminal alarm method provided by the foregoing embodiment is applied to the user terminal or applied to the management network device, and the two cases are respectively described in different embodiments.
  • FIG. 3 is a flowchart of a method for alerting a user terminal according to an exemplary embodiment of the present invention.
  • the present embodiment is applied to the user terminal alarm system shown in FIG. 1A or FIG. 1B.
  • the user terminal in the example is exemplified, and the method includes:
  • step 301 the user terminal determines a security zone.
  • the security zone is a mobile zone set for the user terminal.
  • the security zone is an area of the system preset or user-defined size.
  • the security zone is an area that contains the current location of the user terminal.
  • the security zone is an area included in an administrative unit such as a cell, a building, a street, or a village where the user terminal is currently located.
  • the security zone is a supermarket, a stadium, and a train station where the user terminal is currently located.
  • the user terminal determines the security zone by the methods provided by the following different implementations:
  • the user terminal acquires the current location information, and determines that the distance from the location information is less than or equal to the predetermined distance threshold.
  • the working mode of the user terminal includes an anti-theft mode.
  • the user terminal When the user enters the area where the user terminal is prone to theft of the user terminal, such as a supermarket, a stadium, and a train station, the user terminal is enabled to adopt the anti-theft mode of the user terminal, and then the user terminal passes the The GPS or the interaction with the network side acquires its own location information and determines the security zone, wherein the predetermined distance threshold is a system preset value or a user-defined value. For example, if the predetermined distance threshold is 2000 meters, the security area is an area where the distance from the location information currently located by the user terminal is less than or equal to 2000 meters. In this implementation, the security zone determined by the user terminal is typically the zone identified by the latitude and longitude range of the security zone.
  • the user terminal receives an area setting operation, and the area setting operation is used to set a security area.
  • the area setting operation is used to select a map area in the map; then the user terminal invokes the map interface to determine a security area corresponding to the map area.
  • the security area determined by the user terminal is the area identified by the latitude and longitude range corresponding to the map area.
  • the area setting operation is used to set the area identifier corresponding to the security area, and the security area determined by the user is the area identified by the area identifier.
  • the area identifier is a name of the security area, and the name of the security area includes at least one of a name of the building included in the security area, a name of the administrative unit, and an enterprise name. For example, if the regional setting operation setting area identifier “xx stadium” received by the user terminal is used, the security area determined by the user terminal is the area formed by the xx stadium identified by the area identifier. It should be noted that, in this optional manner, the user terminal does not need to know the latitude and longitude range corresponding to the security area.
  • the working mode of the user terminal includes an anti-theft mode, and the user is enabled to enter the user terminal when entering the supermarket, the stadium, the train station, and the like, which are prone to theft of the user terminal.
  • the user terminal displays or jumps to the regional setting interface, and the user performs the regional setting operation.
  • the user terminal displays or jumps to the locale setting interface, and the user performs the regional setting operation as follows:
  • the user terminal displays or jumps to the map interface, and the user selects the map area in the map, and the user terminal invokes the map interface to determine the area indicated by the map area, that is, the security area.
  • the user terminal displays or jumps to the area identifier list, and the user selects the area identifier in the area identifier list, and the user terminal determines that the area identified by the area identifier is a security area.
  • the list of area identifiers displayed by the user terminal includes Jiangsu province, Shanghai City, Zhejiang province, and Hunan province, and the user can select Shanghai, and the user terminal determines that the security area is Shanghai.
  • the user terminal displays or jumps to the input window, and the user inputs the area identifier in the input window, and the user terminal determines that the area identified by the area identifier is a security area. For example, if the user inputs Shanghai into the user terminal, the user terminal determines that the security zone is Shanghai.
  • the user terminal acquires N pieces of position information during a historical movement, where N is an integer greater than 1, and the area formed by determining the N pieces of position information is a security area.
  • the security area determined by the user terminal is the area identified by the latitude and longitude range corresponding to the map area.
  • the user terminal Since the area where the user terminal carried by the user moves is usually fixed, for example, always moving in the xx city or the xx area, and for example, always moving on the route between the home and the company, the user terminal is optionally used.
  • the moving area acts as a safe area.
  • the user terminal obtains the location information of the device at a predetermined time interval, and obtains a total of N location information.
  • N is a large integer;
  • the predetermined time interval is a system preset or a user-defined preset time interval, for example, obtaining its own position information every hour.
  • the user terminal acquires its own location information every hour.
  • the schematic diagram of the acquired location information is as shown in FIG. 4, and the user terminal determines that the security area 410 is the location information.
  • Step 302 The user terminal sends a security area to the management network device, so that the management network device determines the corresponding access network information list according to the security area.
  • the security area that is sent by the user terminal to the management network device includes a latitude and longitude range corresponding to the security area and/or an area identifier of the security area.
  • the management network device is a network element connected to the access network device
  • the user terminal sends a security zone to the access network device, and the access network device forwards the security zone to the management network device.
  • the security area is carried in the network attach request and/or the session request and sent to the management.
  • Internet equipment when the user terminal establishes a communication connection with the management network device by using the access network device, the security area is carried in the communication message and sent to the management network device.
  • the management network device is generally used to manage multiple user terminals, optionally, when the user terminal sends the security area to the management network device, the user terminal also sends the terminal identifier to the management network device.
  • the terminal identifier is used to identify the user terminal, and the terminal identifier includes an International Mobile Equipment Identity (IMEI), a Media Access Control (MAC) address, and an Internet Protocol (IP) of the user terminal. The address, and at least one of the International Mobile Subscriber Identification Number (IMSI).
  • the terminal identifier may be a temporary identifier that is allocated by the network device to the user terminal.
  • the terminal identifier is a globally unique Temporary UE Identity (GUTI).
  • GUI globally unique Temporary UE Identity
  • the management network device is an access network device connected to the user terminal
  • the user terminal directly sends a security area to the management network device.
  • the user terminal carries the security area in the communication message and sends the information to the access network device.
  • Step 303 The management network device receives the security zone sent by the user terminal.
  • the security area received by the management network device includes a latitude and longitude range corresponding to the security area and/or an area identifier of the security area.
  • Step 304 The management network device determines a corresponding access network information list according to the security area.
  • the access network information list includes an access network device list and/or a cell list whose cell coverage is located in the security area.
  • the management network device determines the access network information list according to the latitude and longitude range.
  • the management network device when the security area received by the management network device includes the area identifier of the security area, the management network device directly determines the access network information list according to the area identifier; or the management network device invokes the map interface to determine the latitude and longitude corresponding to the area identifier. Range, the access network information list is determined according to the latitude and longitude range. In the embodiment of the present invention, the management network device directly determines the access network information list according to the area identifier as an example.
  • the management network device directly determines the access network information list according to the received security area, and specifically includes the following implementation manners:
  • the access network information list includes an access network device list.
  • the method for the management network device to determine the access network device list includes the following steps, as shown in FIG. 5:
  • Step 501 Determine geographic location information of the access network device connected to the management network device.
  • the management network device is a network element connected to the access network device, such as an MM network element or a third-party network element.
  • the location information of each access network device is fixed and determined when the access network device is deployed, and the management network device connected to the access network device stores the geography of each access network device connected thereto. location information.
  • Step 502 Determine, according to the device identifier of the access network device that the geographical location information is located in the security area, determine the access network device list.
  • the management network device stores a correspondence between the device identifier of the access network device and the geographic location information.
  • the geographic location information is a latitude and longitude of the access network device.
  • the device identifier is used to identify the access network device.
  • the device identifier is an eNodeB identifier (Identity, ID).
  • FIG. 6 a schematic diagram of the management network device receiving the security area 600 sent by the user terminal is shown in FIG. 6.
  • the management network device stores the geographical location information of the access network device 611 to the access network device 615, and the access network device 611 is assumed.
  • the location information of the access network device 615 and the security area 600 are as shown in FIG. 6
  • the access network device list determined by the management network device includes the device identifier of the access network device 613 and the access network device.
  • the device identification of 614 and the device identification of access network device 615 is shown in FIG. 6.
  • the access network information list includes a cell list.
  • the method for the management network device to determine the cell list includes the following steps, as shown in FIG. 7A:
  • Step 701 Determine a cell coverage range of each cell of the access network device connected to the management network device.
  • the management network device is a network element connected to the access network device, such as an MM network element or a third-party network element; or the management network device is an access network device.
  • the access network device saves the cell coverage of each cell covered by the access network device, and the management network device connected to the access network device stores the cell coverage of each cell covered by each access network device.
  • the access network device sends the coverage of each cell covered by the access network device to the management network device, and correspondingly, the management network device receives the coverage of each cell sent by the access network device, and saves each received Cell coverage.
  • Step 702 Determine a cell list according to a cell identifier of a cell whose cell coverage is located within the security zone.
  • the management network device stores a correspondence between the cell identifier and the cell coverage, and the cell The identifier is used to identify the cell.
  • the cell identifier is a Physical Cell Identifier (PCI), and an Evolved UMTS Terrestrial Radio Access Network (E-UTRAN) cell global identifier (E- UTRAN Cell Global Identifier (ECGI) or other information used to identify a cell.
  • PCI Physical Cell Identifier
  • E-UTRAN Evolved UMTS Terrestrial Radio Access Network
  • E-UTRAN Cell Global Identifier Evolved UMTS Terrestrial Radio Access Network
  • E-UTRAN Cell Global Identifier Evolved UMTS Terrestrial Radio Access Network
  • the management network device determines, according to the cell identifier of the cell that the area of the cell coverage that overlaps with the security area is greater than the predetermined threshold.
  • the predetermined ratio threshold is a system preset value or a user-defined value. For example, if the predetermined ratio threshold is 50%, when 80% of the cell coverage areas of a certain cell are located within the security area, it is determined that the area of the cell coverage of the cell that overlaps with the security area has a ratio of 80%. %, reaching a predetermined ratio threshold, and determining a cell list according to the cell identity of the cell.
  • the access network device 612 covers the cell A1, the cell A2, and the cell A3, and the access network device 614 covers the cell B1 and the cell B2.
  • cell B3 as shown in FIG. 7B, the coverage area of each cell is indicated by a broken line, and other access network devices are not shown. Assuming that the predetermined ratio threshold is 50%, it can be clearly seen from FIG.
  • the cell list determined by the management network device includes the cell identity of the cell A3 covered by the access network device 612 and the cell covered by the access network device 614.
  • Step 305 The management network device sends the access network information list to the user terminal.
  • the management network device When the management network device is the access network device, the management network device directly sends the access network information list to the user terminal; when the management network device is the network element connected to the access network device, the management network device uses the access network device to The user terminal sends a list of access network information.
  • Step 306 The user terminal receives a list of access network information sent by the management network device.
  • the user terminal After receiving the list of access network information sent by the management network device, the user terminal stores the access network information list. In actual implementation, after the user terminal sends a new security zone to the management network device, it receives a new access network information list sent by the management network device, and the user terminal stores the latest access network information list.
  • the coverage formed by the access network device and/or the cell included in the access network information list does not normally coincide with the security zone.
  • the access network device column The table includes the device identifier of the access network device 613, the device identifier of the access network device 614, and the device identifier of the access network device 615, assuming each of the access network device 613, the access network device 614, and the access network device 615.
  • the coverage is shown by the dashed line in Fig. 8A.
  • the coverage formed by the access network device 613, the access network device 614, and the access network device 615 does not coincide with the security region 600 of the user terminal, and is optional.
  • the user terminal updates the security area according to the received access network information list, and specifically includes the following steps, as shown in FIG. 8C:
  • Step 801 The user terminal acquires an access network coverage area corresponding to the access network information list.
  • the step is implemented by the user terminal receiving the access network coverage area corresponding to the access network information list sent by the management network device.
  • the management network device determines that the coverage of the cell coverage of the access network device included in the access network information list and/or the coverage of the cell coverage of the cell is the access network coverage.
  • the area and the access network coverage area is sent to the user terminal.
  • the step may also be implemented by the user terminal according to the cell coverage of the access network device included in the received access network information list and/or the cell coverage of the cell.
  • the coverage is the coverage area of the access network, which is not limited in this embodiment.
  • Step 802 The user terminal updates the security area according to the coverage area of the access network.
  • the user terminal determines that the updated security area is an access network coverage area.
  • Step 307 The user terminal determines the currently connected access network information.
  • the user terminal determines the device identifier of the currently connected access network device, or the user terminal determines the cell identifier of the currently connected cell.
  • the user terminal obtains the access network information of the access network device from the broadcast message of the access network device, including the device identifier of the access network device connected by the user terminal, or the cell identifier of the cell where the user terminal is located. In this step, the user terminal obtains the device identifier of the currently connected access network device, or the user terminal acquires the cell identifier of the currently located cell.
  • Step 308 The user terminal detects, according to the access network information list and the access network information currently connected by the user terminal, whether the user terminal is located outside the security area.
  • the user terminal detects whether the access network device list includes the device identifier of the access network device currently connected by the user terminal; When the device list of the currently connected access network device is not included in the information list, it is determined that the user terminal is outside the security zone.
  • the user terminal detects Whether the cell identifier of the cell to which the user terminal is currently connected is included in the cell list; when the cell identifier of the currently connected cell is not included in the access network information list, it is determined that the user terminal is located outside the security zone.
  • the security area in this step is usually the updated security area.
  • the security area may also be a security area determined by the user terminal, which is not limited in this embodiment.
  • Step 309 when the user terminal is outside the security zone, an alarm signal is issued.
  • the alarm signal is used to alert the user terminal that the terminal is stolen.
  • the user terminal sends a voice alarm signal through the speaker component.
  • the management terminal sends an alarm message, and the alarm information is used to prompt the user terminal to be stolen.
  • the management terminal is a terminal preset by the user for receiving alarm information of the user terminal, for example, a backup mobile phone of the user.
  • the user terminal sends an alarm message to the management terminal by using a short message, an email, and a push information, where the content and form of the alarm information are preset by the system or customized by the user. For example, when the user terminal detects that it is outside the security zone, it sends a text message to the management terminal, “Your mobile phone leaves the security zone, please pay attention to the security of the mobile phone and avoid theft.”
  • the alarm information sent by the user terminal to the management terminal further includes location information of the current location of the user terminal.
  • the thief after the user terminal is stolen, the thief usually performs a shutdown operation on the user terminal to prevent the user from searching, and when the user terminal detects that it is outside the security zone, the anti-theft operation is performed, and the ban is prohibited.
  • the other terminal or access network device disconnects the communication connection for subsequent searching by the user.
  • the theft prevention operation includes prohibiting the shutdown, prohibiting the disabling of the SIM card, disabling the flight mode, prohibiting the activation of the silent mode, and locking at least one of the user terminals.
  • the user terminal alarm method detects whether the user terminal is located outside the security area according to the access network information list of the security area and the access network information currently connected by the user terminal, when the user terminal is detected.
  • the user terminal When the user is located outside the security zone, it indicates that the user terminal is stolen.
  • the user terminal is actively sent an alarm signal to indicate the theft.
  • the user terminal is not required to discover that the user terminal is stolen, and the user terminal can be found to be stolen and retrieved in a timely manner. terminal.
  • the user terminal alarming method provided by the embodiment of the present invention determines whether the user terminal has moved outside the security zone according to the currently connected access network information, and does not need to perform real-time positioning by using the GPS in the user terminal, thereby reducing the user terminal in the Prevent energy consumption during the process of theft.
  • the user terminal alarming method provided by the embodiment of the invention prevents the user terminal from performing operations such as shutting down and disabling the SIM card when detecting that the user terminal is outside the secure area, thereby preventing the thief from shutting down and disabling the SIM card after the user terminal is stolen.
  • the method avoids the user's search and improves the probability of retrieving the user terminal.
  • the management network device when the user terminal alarm method is applied to the management network device in the user terminal alarm system shown in FIG. 1, in the above step 304, the management network device is determined to be connected. After the network access information list, the correspondence between the storage terminal identifier and the access network information list, the access network information list corresponding to different user terminals is the same or different; for the same user terminal, the management network device is based on the received new one. After determining the new access network information list, the security area updates the correspondence between the terminal identifier and the access network information list. Similar to the embodiment shown in FIG. 8C, the management network device may also update the security area according to the determined access network information list, and specifically includes the following steps, as shown in FIG. 9A:
  • Step 901 The management network device acquires an access network coverage area corresponding to the access network information list.
  • the step is implemented as: determining, by the management network device, a cell coverage area of the access network device included in the access network information list and/or a coverage area formed by the cell coverage area of the cell is an access network coverage area.
  • the management network device further sends the access network coverage area to the user terminal.
  • Step 902 The management network device updates the security area according to the coverage area of the access network.
  • the management network device determines that the updated security area is an access network coverage area.
  • Step 903 The user terminal determines the currently connected access network information.
  • Step 904 The user terminal sends the currently connected access network information to the management network device.
  • the new access network is sent to the management network device.
  • Device ID of the device For example, when the user terminal accesses the base station A, it sends the device identifier of the base station A to the MME.
  • the device identifier of the base station B is sent to the MME, but when the user terminal is moving, When the base station A is always connected in the process, the device identifier of the base station A is not sent to the MME.
  • the cell identifier of the new cell is sent to the management network device.
  • the cell identifier 1 of the cell 1 of the base station A is sent to the MME, and when the user terminal enters the coverage of the cell 2 of the base station A in the process of moving, The MME transmits the cell identity 2 of the cell 2 of the base station A.
  • the cell identity 1 is not transmitted to the MME.
  • Step 905 The management network device receives the currently connected access network information sent by the user terminal.
  • Step 906 The management network device detects, according to the access network information list and the access network information currently connected by the user terminal, whether the user terminal is located outside the security area.
  • step 308 For the implementation of this step, refer to step 308 above, which is not described in this embodiment. It should be noted that the security zone in this step is also usually an updated security zone.
  • Step 907 When the user terminal is outside the security zone, the management network device controls the user terminal to send an alarm signal.
  • the management network device sends a control command to the user terminal, where the control command is used to instruct the user terminal to send an alarm signal.
  • the control instruction is further used to indicate that the user terminal sends the alarm information to the management terminal, or is used to instruct the user terminal to perform the anti-theft operation.
  • the management network device since the management network device needs to obtain the access network information from the user terminal, the user terminal needs to be in an ACTIVE state, and optionally, the user terminal is in the management network. After the device sends a secure zone, it is forbidden to enter the idle (ILDE) state.
  • the user terminal alarm method detects whether the user terminal is located outside the security area according to the access network information list of the security area and the access network information currently connected by the user terminal, when the user terminal is detected.
  • the user terminal When the user is located outside the security zone, it indicates that the user terminal is stolen.
  • the user terminal is actively sent an alarm signal to indicate the theft.
  • the user terminal is not required to discover that the user terminal is stolen, and the user terminal can be found to be stolen and retrieved in a timely manner. terminal.
  • the user terminal alarm method provided by the embodiment of the present disclosure detects whether the user terminal is located outside the security zone by the management network device, and the user terminal does not need to save the access network information list, and does not need to perform the detection operation, thereby reducing the processing on the user terminal.
  • the capability requirements increase the scope of application of the user terminal alarm method.
  • the user terminal when the holder of the user terminal is located in the stadium, the user enables the anti-theft mode for the user terminal, and manually sets the security area 1000 to the area included in the current stadium.
  • the user terminal After receiving the security zone 1000 to the MME, the user terminal receives the cell list returned by the MME.
  • the cell list includes the cell identity of the cell B1 covered by the base station 1010 shown in FIG. 10, the cell identity of the cell B2 covered by the base station 1010, and the base station.
  • other base stations and cells in the security zone 1000 are not described.
  • the user terminal determines that the current cell is a base station. 1010 coverage cell B2, since the cell identity of the cell B2 is included in the cell list, the user terminal determines that it is currently in the stadium; when the user terminal moves to the location 1032, the user terminal determines that the current cell is the cell covered by the base station 1020.
  • the same reason is determined to be currently in the stadium; when the user terminal moves to the location 1033, the user terminal determines that the current cell is the cell A3 of the base station 1020, and since the cell identity of the cell A3 is not included in the cell list, the user terminal If it is determined that the user terminal is outside the stadium and the user terminal judges that it is stolen, an alarm signal is issued to prompt the user to be stolen.
  • the holder of the user terminal when the user terminal does not send the security area to the management network device, if the holder of the user terminal finds that the user terminal is stolen, the holder of the user terminal can also manage The terminal searches for the lost user terminal, and the method includes the following steps, as shown in FIG.
  • Step 1101 The management terminal sends the terminal identifier of the user terminal to the management network device.
  • the management terminal is an electronic device such as a smart phone, a tablet computer, a portable computer, and a desktop computer.
  • the management terminal provides the server of the background server by using the management account to log in to the user terminal, and sends the terminal identifier to the management network device by using the server.
  • the management account is an account corresponding to the user terminal preset by the user, and the user terminal is saved in the server. The correspondence between the management account and the management account is usually saved.
  • the user also sets a search range by using a management terminal, where the search range is a range set by the user after prescribing the location of the user terminal being stolen. For example, if the user finds that the user terminal is stolen in the movie theater, the search range is set to a movie theater. The range of areas included.
  • the management terminal sends the terminal identifier of the user terminal to the management network device in the search range.
  • Step 1102 The management network device receives the terminal identifier sent by the management terminal.
  • Step 1103 The management network device detects whether the context information corresponding to the terminal identifier is included.
  • the context information includes the terminal identifier, the registration area list of the user terminal, and the access network information currently connected by the terminal, where the access network information includes The device identifier of the access network device to which the user terminal is currently connected and/or the cell identifier of the currently located cell.
  • the context information includes the terminal identifier and a registration area list of the user terminal.
  • the context information includes a terminal identifier.
  • Step 1104 The management network device controls the user terminal to send when detecting the context information is included. Alarm.
  • the management network device When the management network device is a network element connected to the access network device, and the user terminal is in an active state, the management network device sends a control command to the user terminal according to the access network device identified by the device identifier included in the context information, and the control command It is used to control the user terminal to send out an alarm signal.
  • the management network device When the management network device is a network element connected to the access network device, and the user terminal is in an idle state, the management network device pages the user terminal in the registration area of the user terminal according to the registration area list of the user terminal, and determines the connection of the user terminal. After accessing the network information, the control command is sent to the user terminal according to the access network information.
  • the management network device When the management network device is an access network device, the access network device sends a control command to the user terminal according to the terminal identifier.
  • control instruction is further used to indicate that the user terminal sends the alarm information to the management terminal, or is used to instruct the user terminal to perform the anti-theft operation.
  • step 309 refer to step 309 above, which is not described in this embodiment.
  • the user terminal alarm method provided by the embodiment of the present invention can use other management terminals to control the user terminal to send an alarm signal by using the management network device even if the user terminal is stolen when the security area is not sent to the management network device. Thereby, the user terminal is retrieved, and the probability of retrieving the user terminal is improved.
  • FIG. 12 is a schematic structural diagram of a user terminal according to an exemplary embodiment of the present invention.
  • the user terminal includes a processor 1210, a memory 1220, and a bus 1230.
  • the processor 1210 includes one or more processing cores, and the processor 1210 executes various functional applications and information processing by running software programs and modules.
  • the memory 1220 is coupled to the processor 1210 via a bus 1230 for storing instructions, and the processor 1210 implements the above-described user terminal alarm method by executing instructions stored in the memory 1220.
  • memory 1220 is implemented by any type of volatile or non-volatile memory device, or a combination thereof, such as static random access memory (SRAM), electrically erasable programmable read only memory (EEPROM), erasable Programmable Read Only Memory (EPROM), Programmable Read Only Memory (PROM), Read Only Memory (ROM), Magnetic Memory, Flash Memory, Disk or Optical Disk.
  • SRAM static random access memory
  • EEPROM electrically erasable programmable read only memory
  • EPROM erasable Programmable Read Only Memory
  • PROM Programmable Read Only Memory
  • ROM Read Only Memory
  • Magnetic Memory Flash Memory
  • Disk Disk
  • Optical Disk Optical Disk
  • the user terminal further includes a receiver 1240 and a transmitter 1250, and the receiver 1240 and the transmitter 1250 are implemented as one communication component.
  • the communication component comprises a communication chip, a communication core
  • the chip includes a receiving module, a transmitting module, a modem module, and the like, for modulating and demodulating information, and receiving or transmitting information through a wireless signal, and the user terminal uses the wireless network to access the network device and other through the communication chip.
  • the device establishes a communication connection.
  • FIG. 12 shows a schematic structural diagram of a management network device provided by an exemplary embodiment of the present invention.
  • the management network device includes a processor 1210, a memory 1220, and a bus 1230.
  • the processor 1210 includes one or more processing cores, and the processor 1210 executes various functional applications and information processing by running software programs and modules.
  • the memory 1220 is coupled to the processor 1210 via a bus 1230 for storing instructions, and the processor 1210 implements the above-described user terminal alarm method by executing instructions stored in the memory 1220.
  • memory 1220 is implemented by any type of volatile or non-volatile storage device, or a combination thereof, such as SRAM, EEPROM, EPROM, PROM, ROM, magnetic memory, flash memory, magnetic disk, or optical disk.
  • the management network device further includes a receiver 1240 and a transmitter 1250, and the receiver 1240 and the transmitter 1250 are implemented as one communication component.
  • the communication component includes a network port, and the management network device establishes a communication connection with the access network device by using the wired network.
  • the management network device includes at least two network ports.
  • FIG. 13 is a block diagram of a user terminal alarm device according to an embodiment of the present invention.
  • the user terminal alarm device is implemented as a whole or a part of a user terminal by software, hardware or a combination of the two, and the user terminal alarms.
  • the device includes:
  • the obtaining unit 1310 is configured to perform the foregoing steps 201, 301, 302, 306, and 801.
  • the determining unit 1320 is configured to perform step 202, step 307 and step 903 described above.
  • the detecting unit 1330 is configured to perform the foregoing steps 203 and 308.
  • the control unit 1340 is configured to perform step 204 and step 309 described above.
  • the apparatus further includes an update unit (not shown in FIG. 13) for performing the above step 802.
  • the user terminal shown in FIG. 13 is used to implement the user terminal alarming method provided by the foregoing various embodiments.
  • the user terminal may be implemented by the acquiring unit 1310; when determining the information, the user terminal It can be implemented by the above determining unit 1320; the user terminal is executing
  • the detecting operation may be implemented by the detecting unit 1330; the user terminal may be implemented by the control unit 1340 when performing the control operation; and the user terminal may be implemented by the updating unit when performing the updating operation.
  • FIG. 13 is a block diagram of a user terminal alarm device according to an embodiment of the present invention.
  • the user terminal alarm device is implemented as a whole or a part of a management network device by software, hardware or a combination of the two.
  • Terminal alarm devices include:
  • the obtaining unit 1310 is configured to perform the foregoing steps 201, 303, 304, 501, 502, 701, 702, and 901.
  • the determining unit 1320 is configured to perform step 202 and step 905 described above.
  • the detecting unit 1330 is configured to perform the foregoing steps 203 and 906.
  • the control unit 1340 is configured to perform step 204 and step 907 above.
  • the apparatus further includes an update unit (not shown in FIG. 13) for performing the above step 902.
  • the management network device shown in FIG. 13 is used to implement the user terminal alarm method provided by the foregoing various embodiments.
  • the management device can be implemented by the acquiring unit 1310; the management network device determines the information.
  • the foregoing determining unit 1320 can be implemented by the foregoing determining unit 1320; the management network device can be implemented by the detecting unit 1330 when performing the detecting operation; and the management network device can be implemented by the foregoing control unit 1340 when performing the control operation; managing the network device
  • the update operation is performed, it can be implemented by the above update unit.
  • a person skilled in the art may understand that all or part of the steps of implementing the above embodiments may be completed by hardware, or may be instructed by a program to execute related hardware, and the program may be stored in a computer readable storage medium.
  • the storage medium mentioned may be a read only memory, a magnetic disk or an optical disk or the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

Un mode de réalisation de la présente invention concerne un procédé, un dispositif et un système permettant à un terminal utilisateur de donner l'alarme, se rapportant au domaine des communications mobiles. Le procédé consiste : à obtenir une liste d'informations de réseau d'accès correspondant à une zone de sécurité d'un terminal utilisateur ; à déterminer des informations d'un réseau d'accès actuellement connecté au terminal utilisateur ; en fonction de la liste d'informations de réseau d'accès et des informations du réseau d'accès actuellement connectés au terminal utilisateur, à détecter si le terminal utilisateur est situé à l'extérieur de la zone de sécurité ; et lorsque le terminal d'utilisateur est situé à l'extérieur de la zone de sécurité, à commander le terminal d'utilisateur de telle sorte qu'il envoie un signal d'alarme, le signal d'alarme étant utilisé pour donner un avertissement indiquant que le terminal utilisateur a été volé. Lorsqu'il est détecté qu'un terminal utilisateur est situé à l'extérieur d'une zone de sécurité, le terminal d'utilisateur est commandé afin d'envoyer activement un signal d'alarme afin d'indiquer que le terminal d'utilisateur est volé, et il n'est pas nécessaire pour un utilisateur de découvrir que le terminal utilisateur a été volé, de telle sorte qu'il peut être trouvé plus promptement que lorsque le terminal utilisateur a été volé, ce qui permet de trouver le terminal promptement.
PCT/CN2016/106646 2016-11-21 2016-11-21 Procédé, dispositif et système permettant à un terminal utilisateur de donner l'alarme Ceased WO2018090379A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/106646 WO2018090379A1 (fr) 2016-11-21 2016-11-21 Procédé, dispositif et système permettant à un terminal utilisateur de donner l'alarme

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/106646 WO2018090379A1 (fr) 2016-11-21 2016-11-21 Procédé, dispositif et système permettant à un terminal utilisateur de donner l'alarme

Publications (1)

Publication Number Publication Date
WO2018090379A1 true WO2018090379A1 (fr) 2018-05-24

Family

ID=62145997

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/106646 Ceased WO2018090379A1 (fr) 2016-11-21 2016-11-21 Procédé, dispositif et système permettant à un terminal utilisateur de donner l'alarme

Country Status (1)

Country Link
WO (1) WO2018090379A1 (fr)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110009090A1 (en) * 2009-07-13 2011-01-13 Sparks Iii Clifford Cellular phone with boundary alarm
CN102740366A (zh) * 2012-07-06 2012-10-17 华为技术有限公司 一种实现无线网络接入的方法、装置和系统
US8483663B1 (en) * 2010-10-15 2013-07-09 Sprint Communications Company L.P. Reducing mobile-phone fraud
CN105827848A (zh) * 2016-04-28 2016-08-03 维沃移动通信有限公司 一种提醒方法及移动终端
CN205541194U (zh) * 2016-01-21 2016-08-31 珠海格力电器股份有限公司 防盗设备、防盗系统及终端设备

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110009090A1 (en) * 2009-07-13 2011-01-13 Sparks Iii Clifford Cellular phone with boundary alarm
US8483663B1 (en) * 2010-10-15 2013-07-09 Sprint Communications Company L.P. Reducing mobile-phone fraud
CN102740366A (zh) * 2012-07-06 2012-10-17 华为技术有限公司 一种实现无线网络接入的方法、装置和系统
CN205541194U (zh) * 2016-01-21 2016-08-31 珠海格力电器股份有限公司 防盗设备、防盗系统及终端设备
CN105827848A (zh) * 2016-04-28 2016-08-03 维沃移动通信有限公司 一种提醒方法及移动终端

Similar Documents

Publication Publication Date Title
US12069541B2 (en) Terminal device location determining method and device
US9813873B2 (en) Mobile device tracking prevention method and system
CN101606405B (zh) 无线局域网网络信息高速缓存
US7966020B2 (en) Wireless user based notification system
CN102598802B (zh) 用于在无线终端中接入网络的装置和方法
KR20250003594A (ko) 무선 네트워크에 대한 액세스에 대한 일반화된 비가용성 기간을 보고하기 위한 시스템들 및 방법들
US8737619B2 (en) Method of triggering location based events in a user equipment
US8737607B2 (en) Finding nearby users without revealing own location
US8874119B2 (en) Method and device for machine type communication monitoring processing
US20170099577A1 (en) Establishing geo-fences and related alarms
WO2019055191A1 (fr) Provisionnement de profil esim entre des dispositifs proches
US20180206105A1 (en) Method, apparatus, and server for network inquiry
US20130143584A1 (en) System and method for user control of location determination
US11910264B2 (en) Network reselection method and apparatus
US10251119B2 (en) Method and apparatus for handling reject
US20120244882A1 (en) Method and Apparatus for Providing Satellite Assistance Data
US20200186968A1 (en) Service provision device, service provision method, and program storage medium
TWI604743B (zh) 動態停用公眾示警系統
WO2018090379A1 (fr) Procédé, dispositif et système permettant à un terminal utilisateur de donner l'alarme
WO2021000319A1 (fr) Procédé, appareil et système de garantie de la sécurité d'un terminal
JP2025510798A (ja) 端末発見方法、装置、機器及び記憶媒体
WO2018086554A1 (fr) Procédé et appareil électronique d'interrogation d'informations de transport public
US20250039830A1 (en) Communication method and related device
US12532146B2 (en) System and method for managing location information of a mobile device
WO2020120647A1 (fr) Commande d'un mode de fonctionnement d'un réseau de communication

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16921646

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16921646

Country of ref document: EP

Kind code of ref document: A1