CN103237064A - Terminals, and method, system and cloud server for remote locking of terminals - Google Patents

Terminals, and method, system and cloud server for remote locking of terminals Download PDF

Info

Publication number
CN103237064A
CN103237064A CN2013101255906A CN201310125590A CN103237064A CN 103237064 A CN103237064 A CN 103237064A CN 2013101255906 A CN2013101255906 A CN 2013101255906A CN 201310125590 A CN201310125590 A CN 201310125590A CN 103237064 A CN103237064 A CN 103237064A
Authority
CN
China
Prior art keywords
terminal
identity information
user
verified
locking request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013101255906A
Other languages
Chinese (zh)
Other versions
CN103237064B (en
Inventor
刘娟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN201310125590.6A priority Critical patent/CN103237064B/en
Publication of CN103237064A publication Critical patent/CN103237064A/en
Application granted granted Critical
Publication of CN103237064B publication Critical patent/CN103237064B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention provides terminals, and a method, a system and a cloud server for remote locking of the terminals. The method includes that the cloud server receives identity information of a first terminal, the first terminal provides an identity authentication function after receiving a start instruction, and after a user of the first terminal passes authentication, the first terminal is started; the cloud server receives a locking request aiming at the first terminal sent by a second terminal, wherein the locking request includes identity information to be authenticated; the cloud server authenticates the identity information to be authenticated according to the identity information; and when authentication is successful, the cloud server controls the first terminal to be restarted. According to the method, password resetting caused by refurbishment of the first terminal can be avoided, the first terminal can be protected from being illegally utilized, and operation process is convenient, compact and high in safety.

Description

The remote lock method of terminal, system, high in the clouds server and terminal
Technical field
The present invention relates to communication technical field, relate in particular to a kind of remote lock method, system, high in the clouds server and terminal of terminal.
Background technology
Growing along with electronic technology, terminal (for example mobile phone, palmtop PC, car-mounted terminal, navigator or have the camera of network function and video camera etc.) becomes indispensable part in people's life, yet terminal is also often lost, and for example, loses, stolen etc.
At present, after the terminal loss, the user can adopt following method to retrieve a loss, and a kind of method is to locate to report the loss to provider, and another kind of method is to preset the start login password.The problem that exists is that first method needs the user to go to the provider place to report the loss to the user makes troubles; Second method is after terminal is brushed machine again, and the start login password is invalid, causes terminal repeatability to use poor stability.
Summary of the invention
The present invention is intended to one of solve the problems of the technologies described above at least.
For this reason, first purpose of the present invention is to propose a kind of remote lock method of terminal, and this method can avoid first terminal by brush machine replacement password again, guarantees that first terminal is not illegally utilized, and operating process is convenient, and is succinct, high safety.
Second purpose of the present invention is to propose the remote lock system of terminal.
The 3rd purpose of the present invention is to propose a kind of high in the clouds server.
The 4th purpose of the present invention is to propose a kind of terminal.
For the above-mentioned purpose of sight line, remote lock method according to the terminal of the embodiment of first aspect present invention comprises: the high in the clouds server receives the identity information at first terminal, wherein, described first terminal provides the authentication function after receiving open command, described first starting terminal after the user of described first terminal passes through checking; Described high in the clouds server receives the locking request at described first terminal that second terminal sends, and wherein, comprises identity information to be verified in the described locking request; Described high in the clouds server is verified described identity information to be verified according to described identity information; And after checking was passed through, server controls described first terminal in described high in the clouds was restarted.
Remote lock method according to the terminal of the embodiment of the invention, the user is after finding first terminal loss, can utilize second terminal to the locking request of server transmission in high in the clouds at first terminal, so that treating identity verification information according to the subscriber identity information of having stored, the high in the clouds server verifies, after checking is passed through, controlling first terminal restarts, make the starting terminal start authorization information program of winning, avoid first terminal by brush machine replacement password again, guarantee that first terminal is not illegally utilized, operating process is convenient, and is succinct, high safety.
To achieve these goals, remote lock system according to the terminal of the embodiment of second aspect present invention comprises: first terminal, be used for after receiving open command, providing the authentication function, described first starting terminal after the user of described first terminal passes through checking; Second terminal is used for sending described locking request to the high in the clouds server; Described high in the clouds server, be used for receiving the identity information at described first terminal, and receive the locking request at described first terminal that described second terminal sends, wherein, comprise identity information to be verified in the described locking request, and according to described identity information described identity information to be verified is verified, and after checking is passed through, control described first terminal and restart.
Remote lock system according to the terminal of the embodiment of the invention, the user is after finding first terminal loss, can utilize second terminal to the locking request of server transmission in high in the clouds at first terminal, so that treating identity verification information according to the subscriber identity information of having stored, the high in the clouds server verifies, after checking is passed through, controlling first terminal restarts, make the starting terminal start authorization information program of winning, avoid first terminal by brush machine replacement password again, guarantee that first terminal is not illegally utilized, operating process is convenient, and is succinct, high safety.
To achieve these goals, high in the clouds server according to the embodiment of third aspect present invention comprises: first receiver module, be used for receiving the identity information at first terminal, wherein, described first terminal provides the authentication function after receiving open command, described first starting terminal after the user of described first terminal passes through checking; Second receiver module is used for receiving the locking request at described first terminal that second terminal sends, and wherein, comprises identity information to be verified in the described locking request; Authentication module is used for according to described identity information described identity information to be verified being verified; And control module, be used for after checking is passed through, controlling described first terminal and restarting.
High in the clouds server according to the embodiment of the invention, the user is after finding first terminal loss, can utilize control module according to the checking result of authentication module first terminal to be controlled restarts, make the starting terminal start authorization information program of winning, avoid first terminal by brush machine replacement password again, guarantee that first terminal is not illegally utilized, operating process is convenient, succinctly, high safety.
To achieve these goals, the terminal according to the embodiment of fourth aspect present invention comprises: module is provided, is used for providing the authentication function after receiving open command; Start module, be used for after verifying, starting described terminal the user of described terminal; Sending module is used for sending the identity information of described terminal to the high in the clouds server; Receiver module is used for receiving the checking result that described high in the clouds server is verified at the identity information to be verified of locking request according to described identity information; And restart module, be used for when verify by after restart described terminal.
Terminal according to the embodiment of the invention, the user is after finding terminal loss, can utilize other-end to the locking request of server transmission in high in the clouds at terminal, so that treating identity verification information according to the subscriber identity information of having stored, the high in the clouds server verifies, after checking is passed through, restarting module restarts at terminal, make starting terminal start authorization information program, avoid terminal by brush machine replacement password again, guarantee that terminal is not illegally utilized, operating process is convenient, and is succinct, high safety.
The aspect that the present invention adds and advantage part in the following description provide, and part will become obviously from the following description, or recognize by practice of the present invention.
Description of drawings
Above-mentioned and/or the additional aspect of the present invention and advantage be from obviously and easily understanding becoming the description of embodiment below in conjunction with accompanying drawing, wherein,
Fig. 1 is the flow chart of the remote lock method of terminal according to an embodiment of the invention;
Fig. 2 is the structured flowchart of the remote lock system of terminal according to an embodiment of the invention;
Fig. 3 is the structured flowchart of high in the clouds server according to an embodiment of the invention; And
Fig. 4 is the structured flowchart of terminal according to an embodiment of the invention.
Embodiment
Describe embodiments of the invention below in detail, the example of described embodiment is shown in the drawings, and wherein identical or similar label is represented identical or similar elements or the element with identical or similar functions from start to finish.Be exemplary below by the embodiment that is described with reference to the drawings, only be used for explaining the present invention, and can not be interpreted as limitation of the present invention.On the contrary, embodiments of the invention comprise spirit and interior all changes, modification and the equivalent of intension scope that falls into institute's additional claims.
In description of the invention, it will be appreciated that term " first ", " second " etc. only are used for describing purpose, and can not be interpreted as indication or hint relative importance.In description of the invention, need to prove that unless clear and definite regulation and restriction are arranged in addition, term " links to each other ", " connection " should do broad understanding, for example, can be fixedly connected, also can be to removably connect, or connect integratedly; Can be mechanical connection, also can be to be electrically connected; Can be directly to link to each other, also can link to each other indirectly by intermediary.For the ordinary skill in the art, can concrete condition understand above-mentioned term concrete implication in the present invention.In addition, in description of the invention, except as otherwise noted, the implication of " a plurality of " is two or more.
Describe and to be understood that in the flow chart or in this any process of otherwise describing or method, expression comprises module, fragment or the part of code of the executable instruction of the step that one or more is used to realize specific logical function or process, and the scope of preferred implementation of the present invention comprises other realization, wherein can be not according to order shown or that discuss, comprise according to related function by the mode of basic while or by opposite order, carry out function, this should be understood by the embodiments of the invention person of ordinary skill in the field.
Below with reference to remote lock method, system, high in the clouds server and the terminal of accompanying drawing description according to the terminal of the embodiment of the invention.
After terminal was lost, the user can still still can't avoid terminal to be brushed machine again at the default start of end login password, causes default start login password invalid, causes the use of being repeated property of terminal.The present invention considers such situation, the high in the clouds server is set, the identity information of this high in the clouds server record first terminal, for example ID number of userspersonal information and first terminal, identity information checking by the high in the clouds server stores to control restarting of first terminal, can guarantee that first terminal is not by the brush machine at the locking request of first terminal.
For this reason, propose a kind of remote lock method of terminal, comprising: the high in the clouds server receives the identity information at first terminal, wherein, first terminal provides the authentication function after receiving open command, first starting terminal after the user of first terminal passes through checking; The high in the clouds server receives the locking request at first terminal that second terminal sends, and wherein, comprises identity information to be verified in the locking request; The high in the clouds server is treated identity verification information according to identity information and is verified; And after checking was passed through, server controls first terminal in high in the clouds was restarted.
Fig. 1 is the flow chart of the remote lock method of terminal according to an embodiment of the invention.
As shown in Figure 1, the remote lock method of terminal comprises:
S101, the high in the clouds server receives the identity information at first terminal, and wherein, first terminal provides the authentication function after receiving open command, first starting terminal after the user of first terminal passes through checking.
In one embodiment of the invention, first terminal can or have the camera of network function and video camera etc. for mobile phone, palmtop PC, car-mounted terminal, navigator.
Particularly, first terminal provides the authentication function after receiving open command, for example, when using first terminal or start to restart for the first time, the user sends open command to the first terminal to open the authentication function, afterwards, first terminal is verified the user who uses first terminal according to the authentication function.The user of first terminal can be in the first starting terminal authentication function and the input of the random time after authentication is passed through identity information to the first terminal, by first terminal identity information is sent to the high in the clouds server, identity information transmits and once gets final product, and high in the clouds server and first terminal can be stored this identity information.The identity information that should be appreciated that first terminal can also be uploaded to the high in the clouds server by other terminal.
In one embodiment of the invention, the authentication password by the authentication function is arranged after buying first terminal by the user or generated by the manufacturer of first terminal then provides to the user when the user buys.Wherein, authentication password is determined unique user, can be user's identity information.
In one embodiment of the invention, identity information can comprise personal attribute information (as fixing information such as name, sex, date of birth, occupation, address) and/or personal set information (as variable information such as passwords) and first terminal ID number.Wherein, personal attribute information and/or personal set information and first terminal ID number is corresponding, and personal attribute information can be user's essential information, and changeability is little, and the user remembers that easily therefore, quantity is more many, and reliability is more strong; Personal set information has changeability, randomicity characteristics, and the user is not easy to remember, but high safety.
S102, high in the clouds server receive the locking request at first terminal that second terminal sends, and wherein, comprise identity information to be verified in the locking request.
Particularly, after the user finds first terminal loss, can utilize second terminal (for example mobile phone, computer etc.) to pass through modes such as note, voice communication to the locking request of server transmission in high in the clouds at first terminal, can comprise the userspersonal information of first terminal and/or ID number identity information to be verified of first terminal in the locking request.
S103, the high in the clouds server is treated identity verification information according to identity information and is verified.
Particularly, the high in the clouds server receives after the locking request at first terminal of second terminal transmission, judge in the locking request receive identity information to be verified with stored whether consistent at the first terminal identity information, if it is consistent, then by checking, wherein identity information to be verified can comprise personal attribute information to be verified and/or personal set information, and ID number of first terminal that requires locking.
S104, after checking was passed through, server controls first terminal in high in the clouds was restarted.
In one embodiment of the invention, when first terminal is restarted by the high in the clouds server controls, require the user to import after the start authorization information, can judge whether the userspersonal information that the user imports is consistent with the identity information of having stored, if it is consistent, then by checking, first starting terminal also can continue to use.If inconsistent, then checking is not passed through, and first terminal is shut down at once, can not continue normal use.
In one embodiment of the invention, the start authorization information can be a kind of start-up routine that is embedded in first terminal, and can be set to close or open.When being set to close, have only the high in the clouds server to receive the locking request at first terminal that second terminal sends, to control after first terminal restarts, the start authorization information just can switch to unlatching; When being set to open, have only the checking pass through after, first terminal just can normally be used.
In one embodiment of the present of invention, have specific identifier in the locking request, first terminal is restarted after there is specific identifier in judgement.Wherein, this first terminal of user of specific identifier prompting first terminal that can be the high in the clouds server send to first terminal is with the warning information that is restarted.After having only the high in the clouds server checking being passed through at identity information to be verified, just can will be restarted with this first terminal of user of reminding first terminal to first terminal transmission warning information.
Remote lock method according to the terminal of the embodiment of the invention, the user is after finding first terminal loss, can utilize second terminal to the locking request of server transmission in high in the clouds at first terminal, so that treating identity verification information according to the subscriber identity information of having stored, the high in the clouds server verifies, after checking is passed through, controlling first terminal restarts, make the starting terminal start authorization information program of winning, avoid first terminal by brush machine replacement password again, guarantee that first terminal is not illegally utilized, operating process is convenient, and is succinct, high safety.
In order to realize above-described embodiment, the present invention also proposes a kind of remote lock system of terminal.
A kind of remote lock system of terminal comprises: first terminal is used for providing the authentication function, first starting terminal after the user of first terminal passes through checking after receiving open command; Second terminal is used for sending locking request to the high in the clouds server; The high in the clouds server, be used for receiving the identity information at first terminal, and receive the locking request at first terminal that second terminal sends, wherein, comprise identity information to be verified in the locking request, and treat identity verification information according to described identity information and verify, and after checking is passed through, control first terminal and restart.
Fig. 2 is the structured flowchart of the remote lock system of terminal according to an embodiment of the invention.
As shown in Figure 2, the remote lock system of terminal comprises: first terminal 100, second terminal 200 and high in the clouds server 300.
Particularly, first terminal 100 is used for providing the authentication function after receiving open command, and first terminal 100 starts after the user of first terminal 100 passes through checking.More specifically, first terminal 100 provides the authentication function after receiving open command, for example, the user sends open command to the first terminal 100 to open the authentication function when using first terminal 100 or start to restart for the first time, afterwards, first terminal 100 is verified the user who uses first terminal 100 according to the authentication function.First terminal 100 can start authentication function and the input of the random time after authentication is passed through identity information to the first terminal 100 in first terminal 100, by first terminal 100 identity information is sent to high in the clouds server 300, identity information transmits and once gets final product, and high in the clouds server 300 and first terminal 100 can be stored this identity information.The identity information that should be appreciated that first terminal 100 can also be uploaded to high in the clouds server 300 by other terminal.
In one embodiment of the invention, the authentication password by the authentication function is arranged after buying first terminal 100 by the user or generated by the manufacturer of first terminal 100 then provides to the user when the user buys.Wherein, authentication password is determined unique user, can be user's identity information.
In one embodiment of the invention, identity information can comprise personal attribute information (as fixing information such as name, sex, date of birth, occupation, address) and/or personal set information (as variable information such as passwords) and first terminal ID number.Wherein, personal attribute information and/or personal set information and first terminal ID number is corresponding, and personal attribute information can be user's essential information, and changeability is little, and the user remembers that easily therefore, quantity is more many, and reliability is more strong; Personal set information has changeability, randomicity characteristics, and the user is not easy to remember, but high safety.
In one embodiment of the invention, first terminal 100 can or have the camera of network function and video camera etc. for mobile phone, palmtop PC, car-mounted terminal, navigator.
Second terminal 200 is used for sending locking request to high in the clouds server 300.After the user finds that first terminal 100 is lost, can utilize the second terminal 200(for example mobile phone, computer etc.) locking request that sends at first terminal 100 to high in the clouds server 300 by modes such as note, voice communications.Wherein, locking request can comprise the userspersonal information of first terminal 100 and/or ID number identity information to be verified of first terminal 100.
High in the clouds server 300 is used for receiving the identity information at first terminal 100, and receive the locking request at first terminal 100 that second terminal 200 sends, wherein, comprise identity information to be verified in the locking request, and treat identity verification information according to described identity information and verify, and after checking is passed through, control first terminal 100 and restart.
More specifically, the identity information that high in the clouds server 300 receives and storage uses first terminal, 100 users to import at the user for the first time.After the user finds that first terminal 100 is lost, can utilize the second terminal 200(for example mobile phone, computer etc.) by the locking request that modes such as note, voice communication send at first terminal 100 to high in the clouds server 300, locking request can be to comprise the userspersonal information of first terminal 100 and/or ID number identity information to be verified of first terminal 100.High in the clouds server 300 receives after the locking request at first terminal 100 of second terminal, 200 transmissions, can judge in the locking request that receives identity information to be verified with stored whether consistent at first terminal, 100 identity informations, if it is consistent, then by checking, wherein identity information to be verified can comprise personal attribute information to be verified and/or personal set information, and ID number of first terminal 100 that requires locking.
In one embodiment of the invention, when the identity information checking to be verified in 300 pairs of locking request that receive of high in the clouds server is passed through, send the alarm informations to first terminal 100 can be by first terminal 100 in the locking request ID number and will be restarted with this first terminal 100 of user of reminding first terminal 100, and control first terminal 100 and restart.
In one embodiment of the invention, first terminal 100 is restarted the requirement user by high in the clouds server 300 control and is imported after the start authorization information, can judge whether the identity information that the user imports is consistent with the identity information of having stored, if it is consistent, then by checking, first terminal 100 starts and can continue to use.If inconsistent, then checking is not passed through, and first terminal 100 is shut down at once, can not continue normal use.
In one embodiment of the invention, the start authorization information can be a kind of start-up routine that is embedded in first terminal 100, and can be set to close or open.When being set to close, have only high in the clouds server 300 to receive the locking request at first terminal 100 that second terminal 200 sends, to control after first terminal 100 restarts, the start authorization information just can switch to unlatching; When being set to open, have only the checking pass through after, first terminal 100 just can normally be used.
In one embodiment of the present of invention, have specific identifier in the locking request, first terminal 100 is restarted after there is specific identifier in judgement.Wherein, this first terminal 100 of user of specific identifier prompting first terminal 100 that can be high in the clouds server 300 send to first terminal 100 is with the warning information that is restarted.
Remote lock system according to the terminal of the embodiment of the invention, the user is after finding first terminal loss, can utilize second terminal to the locking request of server transmission in high in the clouds at first terminal, so that treating identity verification information according to the subscriber identity information of having stored, the high in the clouds server verifies, after checking is passed through, controlling first terminal restarts, make the starting terminal start authorization information program of winning, avoid first terminal by brush machine replacement password again, guarantee that first terminal is not illegally utilized, operating process is convenient, and is succinct, high safety.
In order to realize above-described embodiment, the present invention also proposes a kind of high in the clouds server.
A kind of high in the clouds server comprises: first receiver module, be used for receiving the identity information at first terminal, and wherein, first terminal provides the authentication function after receiving open command, first starting terminal after the user of first terminal passes through checking; Second receiver module is used for receiving the locking request at first terminal that second terminal sends, and wherein, comprises identity information to be verified in the locking request; Authentication module is used for treating identity verification information according to identity information and verifies; And control module, be used for after checking is passed through, controlling first terminal and restarting.
Fig. 3 is the structured flowchart of high in the clouds server according to an embodiment of the invention.
As shown in Figure 3, the high in the clouds server comprises: first receiver module 301, second receiver module 302, authentication module 303 and control module 304.
Particularly, first receiver module 301 is used for receiving the identity information at first terminal, and wherein, first terminal provides the authentication function after receiving open command, first starting terminal after the user of first terminal passes through checking.More specifically, first terminal provides the authentication function after receiving open command, for example, when using first terminal or start to restart for the first time, the user sends open command to the first terminal to open the authentication function, afterwards, first terminal is verified the user who is suitable for first terminal according to the authentication function.First receiver module 301 receives and stores first terminal use at the identity information of the first starting terminal authentication function and the input of the random time after authentication is passed through.The identity information that should be appreciated that first terminal can also be uploaded to the high in the clouds server by other terminal.
In one embodiment of the invention, first terminal can or have the camera of network function and video camera etc. for mobile phone, palmtop PC, car-mounted terminal, navigator.
In one embodiment of the invention, identity information can comprise personal attribute information (as fixing information such as name, sex, date of birth, occupation, address) and/or personal set information (as variable information such as passwords) and first terminal ID number.Wherein, personal attribute information and/or personal set information and first terminal ID number is corresponding, and personal attribute information can be user's essential information, and changeability is little, and the user remembers that easily therefore, quantity is more many, and reliability is more strong; Personal set information has changeability, randomicity characteristics, and the user is not easy to remember, but high safety.
Second receiver module 302 is used for receiving the locking request at first terminal that second terminal sends, and wherein, comprises identity information to be verified in the locking request.More specifically, after the user finds first terminal loss, can utilize second terminal (for example mobile phone, computer etc.) to send locking request at first terminal to second receiver module 302 by modes such as note, voice communications, locking request can comprise the userspersonal information of first terminal and/or ID number identity information to be verified of first terminal.
Authentication module 303 is used for treating identity verification information according to identity information and verifies.More specifically, authentication module 303 receives after the locking request at first terminal of second terminal transmission by second receiver module 302, can judge whether identity information to be verified and first receiver module 301 in the locking request that second receiver module 302 receives stored consistent at the first terminal identity information, if it is consistent, then by checking, wherein identity information to be verified can comprise personal attribute information to be verified and/or personal set information, and ID number of first terminal that requires locking.
Control module 304 is used for controlling first terminal and restarting after checking is passed through.More specifically, when authentication module 303 checking by the time, the high in the clouds server can be by first terminal in the locking request sends the alarm information to first terminal ID number, and controls first terminal and restart.
In one embodiment of the present of invention, have specific identifier in the locking request, first terminal is restarted after there is specific identifier in judgement.Wherein, the subscriber set of specific identifier prompting first terminal that can be the high in the clouds server send to first terminal is with the warning information that is restarted.
High in the clouds server according to the embodiment of the invention, the user is after finding first terminal loss, can utilize control module according to the checking result of authentication module first terminal to be controlled restarts, make the starting terminal start authorization information program of winning, avoid first terminal by brush machine replacement password again, guarantee that first terminal is not illegally utilized, operating process is convenient, succinctly, high safety.
In order to realize above-described embodiment, the present invention also proposes a kind of terminal again.
A kind of terminal comprises: module is provided, is used for providing the authentication function after receiving open command; Start module, be used for after verifying, starting terminal the user of terminal; Sending module is used for sending the identity information of terminal to the high in the clouds server; Receiver module is used for receiving the checking result that the high in the clouds server is verified at the identity information to be verified of locking request according to identity information; And restart module, be used for when verify by after restart terminal.
Fig. 4 is the structured flowchart of terminal according to an embodiment of the invention.
As shown in Figure 4, terminal comprises: module 101 is provided, starts module 102, sending module 103, receiver module 104 and restarts module 105.
Particularly, provide module 101 to be used for after receiving open command, providing the authentication function.Wherein, terminal provides the authentication function after receiving open command, for example, send when the user uses terminal or start to restart for the first time open command to terminal to open the authentication function, afterwards, terminal is verified the user who uses terminal according to the authentication function.
In one embodiment of the invention, the authentication password by the authentication function can be identity information, and can be arranged after buying terminal or be generated by the manufacturer of terminal by the user then provides to the user when the user buys.
In one embodiment of the invention, terminal can or have the camera of network function and video camera etc. for mobile phone, palmtop PC, car-mounted terminal, navigator.
Starting module 102 is used for starting terminal the user of terminal after verifying.Wherein, the user is at the authentication function input identity information that provides module 101 to provide and verify to have only the user of terminal by after the identity information checking, and terminal could start use.
Sending module 103 is used for sending the identity information of terminal to the high in the clouds server.Wherein, the user is sent to the high in the clouds server at the authentication function input identity information that provides module 101 to provide and with identity information, and high in the clouds server and terminal can be stored this identity information.In one embodiment of the invention, identity information can comprise personal attribute information (as fixing information such as name, sex, date of birth, occupation, address) and/or personal set information (as variable information such as passwords) and first terminal ID number.Wherein, personal attribute information and/or personal set information and first terminal ID number is corresponding, and personal attribute information can be user's essential information, and changeability is little, and the user remembers that easily therefore, quantity is more many, and reliability is more strong; Personal set information has changeability, randomicity characteristics, and the user is not easy to remember, but high safety.
Receiver module 104 is used for receiving the checking result that the high in the clouds server is verified at the identity information to be verified of locking request according to identity information.More specifically, when the user finds terminal loss, utilize other-end (for example mobile phone, computer etc.) to pass through modes such as note, voice communication after the locking request of server transmission in high in the clouds at terminal, the high in the clouds server judge in the locking request that receives identity information to be verified with stored whether consistent at terminal identity information, if it is consistent, then by checking, wherein identity information to be verified can comprise personal attribute information to be verified and/or personal set information, and ID number of first terminal that requires locking.When checking by the time, receiver module 104 can receive the alarm information that server ID number by terminal in the locking request in high in the clouds send and will be restarted to remind kind of this terminal of user of end.
Restart module 105 be used for when verify by after restart terminal.Wherein, receiver module 104 receives after the result that checking that the high in the clouds server verifies at the identity information to be verified of locking request according to identity information passes through, and restarts terminal.
In one embodiment of the invention, when terminal is restarted by the high in the clouds server controls, require the user to import after the start authorization information, can judge whether the userspersonal information that the user imports is consistent with the identity information of having stored, if it is consistent, then by checking, starting terminal also can continue to use.If inconsistent, then checking is not passed through, and terminal is shut down at once, can not continue normal use.
In one embodiment of the invention, the start authorization information can be a kind of start-up routine that is embedded in terminal, and can be set to close or open.When being set to close, have only the high in the clouds server to receive the locking request at terminal that other-end sends, after control terminal was restarted, the start authorization information just can switch to unlatching; When being set to open, have only the checking pass through after, terminal just can normally be used.
In one embodiment of the present of invention, have specific identifier in the locking request, terminal is restarted after there is specific identifier in judgement.Wherein, the subscriber set of the specific identifier prompt terminal that can be the high in the clouds server send to terminal is with the warning information that is restarted.
Terminal according to the embodiment of the invention, the user is after finding terminal loss, can utilize other-end to the locking request of server transmission in high in the clouds at terminal, so that treating identity verification information according to the subscriber identity information of having stored, the high in the clouds server verifies, after checking is passed through, restarting module restarts at terminal, make starting terminal start authorization information program, avoid terminal by brush machine replacement password again, guarantee that terminal is not illegally utilized, operating process is convenient, and is succinct, high safety.
Should be appreciated that each several part of the present invention can realize with hardware, software, firmware or their combination.In the above-described embodiment, a plurality of steps or method can realize with being stored in the memory and by software or firmware that suitable instruction execution system is carried out.For example, if realize with hardware, the same in another embodiment, in the available following technology well known in the art each or their combination realize: have for the discrete logic of data-signal being realized the logic gates of logic function, application-specific integrated circuit (ASIC) with suitable combinational logic gate circuit, programmable gate array (PGA), field programmable gate array (FPGA) etc.
In the description of this specification, concrete feature, structure, material or characteristics that the description of reference term " embodiment ", " some embodiment ", " example ", " concrete example " or " some examples " etc. means in conjunction with this embodiment or example description are contained at least one embodiment of the present invention or the example.In this manual, the schematic statement to above-mentioned term not necessarily refers to identical embodiment or example.And concrete feature, structure, material or the characteristics of description can be with the suitable manner combination in any one or more embodiment or example.
Although illustrated and described embodiments of the invention, for the ordinary skill in the art, be appreciated that without departing from the principles and spirit of the present invention and can carry out multiple variation, modification, replacement and modification to these embodiment that scope of the present invention is by claims and be equal to and limit.

Claims (16)

1. the remote lock method of a terminal is characterized in that, may further comprise the steps:
The high in the clouds server receives the identity information at first terminal, and wherein, described first terminal provides the authentication function after receiving open command, described first starting terminal after the user of described first terminal passes through checking;
Described high in the clouds server receives the locking request at described first terminal that second terminal sends, and wherein, comprises identity information to be verified in the described locking request;
Described high in the clouds server is verified described identity information to be verified according to described identity information; And
After checking was passed through, server controls described first terminal in described high in the clouds was restarted.
2. the method for claim 1, it is characterized in that the authentication password by described authentication function is arranged after buying described first terminal by the user or generated by the manufacturer of described first terminal and then provides to described user when described user buys.
3. method as claimed in claim 1 or 2 is characterized in that, has specific identifier in the described locking request, and described first terminal is restarted after there is described specific identifier in judgement.
4. as each described method of claim 1-3, it is characterized in that described first terminal is mobile phone, palmtop PC, car-mounted terminal, navigator or camera and the video camera with network function.
5. the remote lock system of a terminal is characterized in that, comprising: first terminal, second terminal and high in the clouds server, wherein,
Described first terminal is used for the authentication function is provided after receiving open command, wherein, and described first starting terminal after the user of described first terminal passes through checking;
Described second terminal is used for sending locking request to described high in the clouds server;
Described high in the clouds server, be used for receiving the identity information at described first terminal, and receive the described locking request at described first terminal that described second terminal sends, wherein, comprise identity information to be verified in the described locking request, and according to described identity information described identity information to be verified is verified, and after checking is passed through, control described first terminal and restart.
6. system as claimed in claim 5, it is characterized in that the authentication password by described authentication function is arranged after buying described first terminal by the user or generated by the manufacturer of described first terminal and then provides to described user when described user buys.
7. as claim 5 or 6 described systems, it is characterized in that having specific identifier in the described locking request, described first terminal is restarted after there is described specific identifier in judgement.
8. as each described system of claim 5-7, it is characterized in that described first terminal is mobile phone, palmtop PC, car-mounted terminal, navigator or camera and the video camera with network function.
9. a high in the clouds server is characterized in that, comprising:
First receiver module is used for receiving the identity information at first terminal, and wherein, described first terminal provides the authentication function after receiving open command, described first starting terminal after the user of described first terminal passes through checking;
Second receiver module is used for receiving the locking request at described first terminal that second terminal sends, and wherein, comprises identity information to be verified in the described locking request;
Authentication module is used for according to described identity information described identity information to be verified being verified; And
Control module is used for controlling described first terminal and restarting after checking is passed through.
10. high in the clouds as claimed in claim 9 server, it is characterized in that the authentication password by described authentication function is arranged after buying described first terminal by the user or generated by the manufacturer of described first terminal and then provides to described user when described user buys.
11. as claim 9 or 10 described high in the clouds servers, it is characterized in that having specific identifier in the described locking request, described first terminal is restarted after there is described specific identifier in judgement.
12., it is characterized in that described first terminal is mobile phone, palmtop PC, car-mounted terminal, navigator or camera and the video camera with network function as each described high in the clouds server of claim 9-11.
13. a terminal is characterized in that, comprising:
Module is provided, is used for after receiving open command, providing the authentication function;
Start module, be used for after verifying, starting described terminal the user of described terminal;
Sending module is used for sending the identity information of described terminal to the high in the clouds server;
Receiver module is used for receiving the checking result that described high in the clouds server is verified at the identity information to be verified of locking request according to described identity information; And
Restart module, be used for when verify by after restart described terminal.
14. terminal as claimed in claim 13 is characterized in that, the authentication password by described authentication function is arranged after buying described terminal by the user or is generated by the manufacturer of described terminal and then provides to described user when described user buys.
15. as claim 13 or 14 described terminals, it is characterized in that having specific identifier in the described locking request, described terminal is restarted after there is described specific identifier in judgement.
16., it is characterized in that described terminal is mobile phone, palmtop PC, car-mounted terminal, navigator or camera and the video camera with network function as each described terminal of claim 13-15.
CN201310125590.6A 2013-04-11 2013-04-11 Remote lock method, system, cloud server and the terminal of terminal Active CN103237064B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310125590.6A CN103237064B (en) 2013-04-11 2013-04-11 Remote lock method, system, cloud server and the terminal of terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310125590.6A CN103237064B (en) 2013-04-11 2013-04-11 Remote lock method, system, cloud server and the terminal of terminal

Publications (2)

Publication Number Publication Date
CN103237064A true CN103237064A (en) 2013-08-07
CN103237064B CN103237064B (en) 2019-05-03

Family

ID=48885080

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310125590.6A Active CN103237064B (en) 2013-04-11 2013-04-11 Remote lock method, system, cloud server and the terminal of terminal

Country Status (1)

Country Link
CN (1) CN103237064B (en)

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104378375A (en) * 2014-11-17 2015-02-25 中国联合网络通信集团有限公司 Remote access method for mobile phone, terminal device, server and system
CN104618440A (en) * 2014-12-31 2015-05-13 腾讯科技(深圳)有限公司 Intelligent equipment control method and device
WO2015113351A1 (en) * 2014-01-28 2015-08-06 中兴通讯股份有限公司 Information processing method, terminal and server, and communication method and system
WO2016023269A1 (en) * 2014-08-13 2016-02-18 中兴通讯股份有限公司 Terminal application locking method, system, terminal and computer storage medium
CN105491232A (en) * 2015-11-27 2016-04-13 上海斐讯数据通信技术有限公司 Built-in virtual SIM card based mobile phone security information protection system and method
CN105512529A (en) * 2016-01-26 2016-04-20 上海斐讯数据通信技术有限公司 Unlocking method and system of mobile terminal
CN105530360A (en) * 2014-09-28 2016-04-27 宇龙计算机通信科技(深圳)有限公司 Dual system switching method and terminal
CN105635090A (en) * 2015-01-27 2016-06-01 宇龙计算机通信科技(深圳)有限公司 System access method, system access device and terminal
CN105809045A (en) * 2016-03-15 2016-07-27 青岛海信移动通信技术股份有限公司 Method and device for processing equipment systems during data reset
CN106169136A (en) * 2016-06-13 2016-11-30 广东小天才科技有限公司 A kind of long-range control method being applied to mobile device and system, mobile device
WO2017156931A1 (en) * 2016-03-14 2017-09-21 乐视控股(北京)有限公司 Locking method and system for mobile terminal
CN107231355A (en) * 2017-06-01 2017-10-03 珠海市魅族科技有限公司 Anti- method, terminal, server, device and the storage medium for cracking binding service
CN107426186A (en) * 2017-06-23 2017-12-01 广东欧珀移动通信有限公司 The method and apparatus of management terminal, server, storage device
CN107466031A (en) * 2017-08-08 2017-12-12 深圳市金立通信设备有限公司 A kind of method and terminal for protecting data
CN107577926A (en) * 2017-08-14 2018-01-12 北京小米移动软件有限公司 Intelligent terminal control method and device
WO2018049564A1 (en) * 2016-09-13 2018-03-22 华为技术有限公司 Anti-theft method and device for mobile terminal
CN109948310A (en) * 2018-12-29 2019-06-28 华为技术有限公司 A kind of locking means and associated electronic device
CN111857514A (en) * 2020-07-20 2020-10-30 百度在线网络技术(北京)有限公司 Device control method, device, electronic device and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101415157A (en) * 2008-11-28 2009-04-22 北京亿企通信息技术有限公司 Remote control method for mobile phone short message
US7860994B2 (en) * 2006-01-17 2010-12-28 Reality Mobile Llc System and method for remote data acquisition and distribution
CN102130945A (en) * 2011-01-13 2011-07-20 汉王科技股份有限公司 Mobile communication device real-time remote control system and control method thereof
CN102427472A (en) * 2011-11-24 2012-04-25 捷开通讯科技(上海)有限公司 Device and method for remotely controlling mobile communication apparatus
CN103702331A (en) * 2013-12-13 2014-04-02 北京奇虎科技有限公司 Mobile terminal antitheft method and client

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7860994B2 (en) * 2006-01-17 2010-12-28 Reality Mobile Llc System and method for remote data acquisition and distribution
CN101415157A (en) * 2008-11-28 2009-04-22 北京亿企通信息技术有限公司 Remote control method for mobile phone short message
CN102130945A (en) * 2011-01-13 2011-07-20 汉王科技股份有限公司 Mobile communication device real-time remote control system and control method thereof
CN102427472A (en) * 2011-11-24 2012-04-25 捷开通讯科技(上海)有限公司 Device and method for remotely controlling mobile communication apparatus
CN103702331A (en) * 2013-12-13 2014-04-02 北京奇虎科技有限公司 Mobile terminal antitheft method and client

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9883402B2 (en) 2014-01-28 2018-01-30 Xi'an Zhongxing New Software Co. Ltd. Method, terminal and server for processing information, and communication method and system
WO2015113351A1 (en) * 2014-01-28 2015-08-06 中兴通讯股份有限公司 Information processing method, terminal and server, and communication method and system
WO2016023269A1 (en) * 2014-08-13 2016-02-18 中兴通讯股份有限公司 Terminal application locking method, system, terminal and computer storage medium
CN105530360B (en) * 2014-09-28 2020-04-07 宇龙计算机通信科技(深圳)有限公司 Dual-system switching method and terminal
CN105530360A (en) * 2014-09-28 2016-04-27 宇龙计算机通信科技(深圳)有限公司 Dual system switching method and terminal
CN104378375A (en) * 2014-11-17 2015-02-25 中国联合网络通信集团有限公司 Remote access method for mobile phone, terminal device, server and system
CN104618440A (en) * 2014-12-31 2015-05-13 腾讯科技(深圳)有限公司 Intelligent equipment control method and device
US10834237B2 (en) 2014-12-31 2020-11-10 Tencent Technology (Shenzhen) Company Limited Method, apparatus, and storage medium for controlling cooperation of multiple intelligent devices with social application platform
US10326861B2 (en) 2014-12-31 2019-06-18 Tencent Technology (Shenzhen) Company Limited Method for controlling cooperation of multiple intelligent devices and apparatus thereof
CN104618440B (en) * 2014-12-31 2018-03-23 腾讯科技(深圳)有限公司 Smart machine control method and device
CN105635090B (en) * 2015-01-27 2019-04-12 宇龙计算机通信科技(深圳)有限公司 System access method, system access mechanism and terminal
CN105635090A (en) * 2015-01-27 2016-06-01 宇龙计算机通信科技(深圳)有限公司 System access method, system access device and terminal
CN105491232A (en) * 2015-11-27 2016-04-13 上海斐讯数据通信技术有限公司 Built-in virtual SIM card based mobile phone security information protection system and method
CN105512529A (en) * 2016-01-26 2016-04-20 上海斐讯数据通信技术有限公司 Unlocking method and system of mobile terminal
WO2017156931A1 (en) * 2016-03-14 2017-09-21 乐视控股(北京)有限公司 Locking method and system for mobile terminal
CN105809045A (en) * 2016-03-15 2016-07-27 青岛海信移动通信技术股份有限公司 Method and device for processing equipment systems during data reset
CN106169136A (en) * 2016-06-13 2016-11-30 广东小天才科技有限公司 A kind of long-range control method being applied to mobile device and system, mobile device
US10687216B2 (en) 2016-09-13 2020-06-16 Huawei Technologies Co., Ltd. Antitheft method for mobile terminal and apparatus
WO2018049564A1 (en) * 2016-09-13 2018-03-22 华为技术有限公司 Anti-theft method and device for mobile terminal
CN107231355A (en) * 2017-06-01 2017-10-03 珠海市魅族科技有限公司 Anti- method, terminal, server, device and the storage medium for cracking binding service
CN107426186A (en) * 2017-06-23 2017-12-01 广东欧珀移动通信有限公司 The method and apparatus of management terminal, server, storage device
CN107466031A (en) * 2017-08-08 2017-12-12 深圳市金立通信设备有限公司 A kind of method and terminal for protecting data
CN107577926A (en) * 2017-08-14 2018-01-12 北京小米移动软件有限公司 Intelligent terminal control method and device
WO2020135814A1 (en) * 2018-12-29 2020-07-02 华为技术有限公司 Locking method and related electronic device
CN109948310A (en) * 2018-12-29 2019-06-28 华为技术有限公司 A kind of locking means and associated electronic device
CN111857514A (en) * 2020-07-20 2020-10-30 百度在线网络技术(北京)有限公司 Device control method, device, electronic device and storage medium

Also Published As

Publication number Publication date
CN103237064B (en) 2019-05-03

Similar Documents

Publication Publication Date Title
CN103237064A (en) Terminals, and method, system and cloud server for remote locking of terminals
CN108173822B (en) Intelligent door lock control method, intelligent door lock and computer readable storage medium
WO2018127199A1 (en) Method for generating offline verification code based on smart door lock system, and system thereof
US11004124B2 (en) Method for signing up a user to a service for controlling at least one vehicle functionality by means of a user terminal
EP3466020B1 (en) A method and an apparatus for publishing assertions in a distributed database of a mobile telecommunication network and for personalising internet of things devices.
US9021568B2 (en) Verification method for verifying validity of program, and verification system
US11171784B2 (en) Systems and methods for providing a secured password and authentication mechanism for programming and updating software or firmware
JP2022529725A (en) How to authenticate the identity of digital keys, terminal devices, and media
WO2011147204A1 (en) Entrance guard control method and system thereof
CA3014806C (en) Anti-distracted driver system
WO2010000455A1 (en) Method and device for generating a time-dependent password
CN106559213B (en) Equipment management method, equipment and system
US9592793B2 (en) Method and system for preventing telematics remote control vehicle from being externally hacked
CN104580235A (en) Authentication method and authentication system for equipment connection
CN111845624A (en) Method for starting vehicle without key
WO2016146209A1 (en) Module for controlling usability of a device
CN107105082B (en) Method for unlocking network of terminal, method and device for starting terminal
KR101553482B1 (en) Authentication System For Password And Method
CN106656946B (en) Dynamic authentication method and device
JP6343928B2 (en) Portable terminal, authentication system, authentication method, and authentication program
CN113422712B (en) Network distribution method, network distribution device, household equipment and computer readable storage medium
US20190147193A1 (en) Method for a first start-up operation of a secure element which is not fully customized
KR102057564B1 (en) User Authentication System Using Authentication Variable And Method Thereof
US20160274920A1 (en) Method and device for integrated usability control
CN112491893B (en) Block chain terminal equipment network access method, device, server and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant