CN103702318A - Mobile terminal antitheft method and client - Google Patents

Mobile terminal antitheft method and client Download PDF

Info

Publication number
CN103702318A
CN103702318A CN201310687832.0A CN201310687832A CN103702318A CN 103702318 A CN103702318 A CN 103702318A CN 201310687832 A CN201310687832 A CN 201310687832A CN 103702318 A CN103702318 A CN 103702318A
Authority
CN
China
Prior art keywords
antitheft
mobile terminal
instruction
transmit leg
note
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310687832.0A
Other languages
Chinese (zh)
Inventor
张炅轩
镡云宇
黄铮
宋宛芸
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201310687832.0A priority Critical patent/CN103702318A/en
Publication of CN103702318A publication Critical patent/CN103702318A/en
Priority to PCT/CN2014/093636 priority patent/WO2015085940A1/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention provides a mobile terminal antitheft method and a client, wherein the method comprises the following steps that the identity information of a sending party is determined according to antitheft instructions from the sending party; antitheft strategies matched with the identity information of the sending party are started for analyzing the antitheft instructions, and antitheft commands correspond to the instructions are obtained; the operation corresponding to the antitheft commands is executed for realizing the antitheft effect on a mobile terminal. The method and the client provided by the embodiment of the invention have the beneficial effects that the effect of effectively realizing the antitheft operation on the mobile terminal after the mobile terminal which does not start the antitheft function is stolen can be reached, in addition, the stealing crime rate is reduced, and the property safety of users is protected.

Description

Anti-theft method for mobile terminal and client
Technical field
The present invention relates to internet, applications field, particularly relate to a kind of anti-theft method for mobile terminal and client.
Background technology
Along with the develop rapidly of intelligent mobile terminal and network, mobile terminal (comprising the plurality of devices such as mobile phone, flat board) role in people's life is also more and more important, more and more becomes indispensable comprehensive " assistant " in people's work and life.For convenience of using, people conventionally can directly be stored in mobile terminal by information such as various account information, private chat record and picture photos when using the application of mobile terminal.Therefore, if mobile terminal is lost, not only can bring property loss to user, what is more important user is stored in the personal information in mobile terminal, such as financial information such as account number ciphers.If these personal informations are revealed, the loss that user is caused is difficult to estimate.Therefore, mobile terminal is antitheft very important.
In prior art, after mobile terminal is stolen, mobile terminal can be continued to use in stealer one side.Stealer stops the owner of lost property to give stolen mobile terminal for change by mobile terminal being carried out to brush machine or extracting the operations such as battery of mobile terminal, and the owner of lost property cannot protect mobile terminal after terminal is stolen.When stealer, stolen terminal is concluded the business, the owner of lost property cannot give stolen terminal for change, causes property loss, and, be stored in subscriber datas such as data in mobile terminal and along with the loss of mobile terminal, lose and even cause more incalculable damages.
To sum up, in prior art mobile terminal stolen after, cannot continue mobile terminal to carry out the pilferage behavior that antitheft defect is encouraged stealer indirectly, cannot effectively contain pilferage crime, and to user's ill effect such as cause any property loss.
Summary of the invention
In view of the above problems, the present invention has been proposed to provide a kind of anti-theft method for mobile terminal that overcomes the problems referred to above or address the above problem at least in part and corresponding client.
According to one aspect of the present invention, a kind of anti-theft method for mobile terminal is provided, comprising: according to determine the identity information of described transmit leg from the antitheft instruction of transmit leg; Antitheft instruction described in the antitheft policy resolution that startup is mated with described transmit leg identity information, obtains antitheft order corresponding to this instruction; Carry out operation corresponding to described antitheft order, to realize guarding against theft for mobile terminal.
Alternatively, described basis is determined the identity information of described transmit leg from the antitheft instruction of transmit leg, comprising: obtain the spcial character carrying in described antitheft instruction, wherein, described spcial character is specific character string; According to described spcial character, determine the identity information of described transmit leg.
Alternatively, the identity information of described transmit leg comprise following one of at least: described transmit leg is mobile terminal; Described transmit leg is server; Described transmit leg is PC PC terminal.
Alternatively, described anti-theft method for mobile terminal also comprises: while receiving respectively the antitheft instruction that the different transmit leg of identity information sends, and the antitheft order the mutual exclusion whether antitheft order that judgement parses in the antitheft instruction of rear reception parses with antitheft instruction in front reception; If so, refusal is carried out a rear antitheft order; If not, continue to carry out a rear antitheft order.
Alternatively, when described transmit leg is mobile terminal, the antitheft strategy of coupling is the antitheft strategy of note; When described transmit leg is server, the antitheft strategy of coupling is the antitheft strategy of account; When described transmit leg is PC terminal, the antitheft strategy of coupling is the antitheft strategy of PC or the antitheft strategy of described account.
Alternatively, when described transmit leg is mobile terminal, the transmission carrier of described antitheft instruction is note; When described transmit leg is server, the transmission carrier of described antitheft instruction is: note and/or network instruction.When described transmit leg is PC terminal, the transmission carrier of described antitheft instruction is: note and/or network instruction.
Alternatively, while utilizing note as the transmission carrier of described antitheft instruction, before determining the identity information of described transmit leg, also comprise: whether the note that judgement is received carries described antitheft instruction; If so, tackle this note, the definite operation of identity information of obtaining described antitheft instruction and triggering described transmit leg; If not, this note of letting pass.
Alternatively, when described transmit leg is mobile terminal, start antitheft instruction described in the antitheft policy resolution mate with described transmit leg identity information, comprising: antitheft instruction described in the antitheft policy resolution of startup note, obtains mobile terminal identification and/or the password of described transmit leg; The trusted mobile terminal identification that the mobile terminal identification of the described transmit leg obtaining is prestored with this mobile terminal is mated, and/or the password that the password obtaining is prestored with this mobile terminal mates; If both can mate, resolve and obtain antitheft order corresponding to this instruction.
Alternatively, the mobile terminal identification of described transmit leg comprise following one of at least: the international mobile terminal identity code IMEI of the subscriber identification module SIM card of the telephone number of described transmit leg, described transmit leg number, described transmit leg.
Alternatively, the password that described mobile terminal prestores comprise following one of at least: the mobile terminal identification of described transmit leg; The character string of the described transmit leg identity of proof setting in advance.
Alternatively, when described transmit leg is server, described antitheft instruction is sent to described server by Activating Account, and by described server, is forwarded to this mobile terminal, triggers antitheft operation.
Alternatively, described having Activated Account logined in can triggering mobile terminals antitheft client, wherein, described client comprise following one of at least: browser, mobile phone side be the client with mobile phone burglary-resisting function with the client of mobile phone burglary-resisting function, PC side.
Alternatively, described antitheft instruction is sent to described server by Activating Account, comprise: the list of devices in the described middle binding that Activated Account is selected this mobile terminal that carries out antitheft operation, wherein, in list of devices, store the sign of at least one mobile terminal with the described binding that Activated Account; By described having Activated Account, the antitheft instruction for this mobile terminal is sent to described server.
Alternatively, if carry out the sign of this mobile terminal of antitheft operation, be not stored in described list of devices, by the sign of described this mobile terminal of input that Activated Account; And, by described server, described antitheft instruction is sent in the mobile terminal of sign correspondence of this mobile terminal.
Alternatively, the sign of described mobile terminal is stored in described list of devices.
Alternatively, described having Activated Account is sent to described server by note and/or network instruction by described antitheft instruction.
Alternatively, the content of described antitheft instruction is except comprising described spcial character, also comprise following one of at least: the described sign that Activated Account, antitheft order, antitheft object identity.
Alternatively, described spcial character is Account; Described having Activated Account while being designated current login is the unique account identification code UID generating the account; Described antitheft order comprises order numbering and/or mission number; Described antitheft object identity comprises the IMEI of this mobile terminal.
Alternatively, when described transmit leg is PC terminal, start described in the antitheft policy resolution mate with described transmit leg identity information before antitheft instruction, also comprise: receive the activation file from described PC terminal, wherein, described activation file carries identify label and the anti-theft modes sign of described mobile terminal; According to described identify label, described activation file is verified; If be verified, according to described anti-theft modes sign, activate different anti-theft modes.
Alternatively, according to described anti-theft modes sign, activate different anti-theft modes, comprising: if described anti-theft modes is designated PC anti-theft modes sign, activate the antitheft strategy of PC; If described anti-theft modes is designated account anti-theft modes sign, activate the antitheft strategy of account.
Alternatively, described anti-theft modes sign comprise following one of at least: that described PC terminal generates, with this mobile terminal random string GUID one to one; After user's login account, generate for identifying the account identifier UID of account, wherein, the account name of the user of UID login is called USERNAME; Password PASSWORD.
Alternatively, according to described anti-theft modes sign, activate different anti-theft modes, comprising: if when described anti-theft modes sign only comprises described GUID, activate the antitheft strategy of PC, directly carry out operation corresponding to described antitheft order; If when described anti-theft modes sign comprises described GUID and described PASSWORD, activate the antitheft strategy of PC, verify that whether described PASSWROD is correct; If so, carry out operation corresponding to described antitheft order; If not, stop response; If when described anti-theft modes sign comprises described UID, activate the antitheft strategy of account, in described mobile terminal, login described USERNAME, receive from the antitheft order of described UID and carry out corresponding operation; If when described anti-theft modes sign comprises described GUID and described UID, activate the antitheft strategy of PC and the antitheft strategy of account, receive from the antitheft order of PC terminal or described UID and carry out corresponding operation; If described anti-theft modes sign comprises described GUID, described UID and described PASSWORD, activate the antitheft strategy of PC and the antitheft strategy of account, receive from the antitheft order of described PC terminal or described UID and all described PASSWORD is verified; If be verified, carry out operation corresponding to antitheft order receiving; If checking is not notified, stop response.
Alternatively, described PC terminal is connected by wired or wireless mode with this mobile terminal, and wherein, described wired mode comprises USB connecting line, and described wireless mode comprises wireless network.
Alternatively, in described antitheft order, the content except described spcial character is encrypted content; And adopt corresponding deciphering means to be decrypted the antitheft instruction receiving, obtain the resolved content of described antitheft instruction.
Alternatively, cipher mode is des encryption, and manner of decryption is DES deciphering.
Alternatively, the antitheft instruction of encryption comprises following at least one: delete data in mobile phone instruction; The instruction of backup data in mobile phone.
Alternatively, when arbitrary antitheft order is carried out, whether poll inquiry it run succeeded; If so, finish the execution of this antitheft order; If not, again attempt carrying out this antitheft order.
Alternatively, if do not receive the receipt of Requested Party at the appointed time, whether receipt is successful for poll inquiry; If so, finish receipt inquiry; If not, again ask receipt.
According to another aspect of the present invention, a kind of guarding against theft for mobile terminal client is also provided, comprising: determination module, is configured to according to determine the identity information of described transmit leg from the antitheft instruction of transmit leg; Parsing module, is configured to start antitheft instruction described in the antitheft policy resolution mate with described transmit leg identity information, obtains antitheft order corresponding to this instruction; Executive Module, is configured to carry out operation corresponding to described antitheft order, to realize guarding against theft for mobile terminal.
Alternatively, described determination module is also configured to: obtain the spcial character carrying in described antitheft instruction, wherein, described spcial character is specific character string; According to described spcial character, determine the identity information of described transmit leg.
Alternatively, the identity information of described transmit leg comprise following one of at least: described transmit leg is mobile terminal; Described transmit leg is server; Described transmit leg is PC PC terminal.
Alternatively, also comprise judge module, be configured to: while receiving respectively the antitheft instruction that the different transmit leg of identity information sends, the antitheft order the mutual exclusion whether antitheft order that judgement parses in the antitheft instruction of rear reception parses with antitheft instruction in front reception; If so, refusal is carried out a rear antitheft order; If not, continue to carry out a rear antitheft order.
Alternatively, when described transmit leg is mobile terminal, the antitheft strategy of coupling is the antitheft strategy of note; When described transmit leg is server, the antitheft strategy of coupling is the antitheft strategy of account; When described transmit leg is PC terminal, the antitheft strategy of coupling is the antitheft strategy of PC or the antitheft strategy of described account.
Alternatively, when described transmit leg is mobile terminal, the transmission carrier of described antitheft instruction is note; When described transmit leg is server, the transmission carrier of described antitheft instruction is: note and/or network instruction; When described transmit leg is PC terminal, the transmission carrier of described antitheft instruction is: note and/or network instruction.
Alternatively, described judge module is also configured to: while utilizing note as the transmission carrier of described antitheft instruction, before determining the identity information of described transmit leg, whether the note that judgement is received carries described antitheft instruction; If so, tackle this note, the definite operation of identity information of obtaining described antitheft instruction and triggering described transmit leg; If not, this note of letting pass.
Alternatively, described parsing module is also configured to: when described transmit leg is mobile terminal, start antitheft instruction described in the antitheft policy resolution of note, obtain mobile terminal identification and/or the password of described transmit leg; The trusted mobile terminal identification that the mobile terminal identification of the described transmit leg obtaining is prestored with this mobile terminal is mated, and/or the password that the password obtaining is prestored with this mobile terminal mates; If both can mate, resolve and obtain antitheft order corresponding to this instruction.
Alternatively, the mobile terminal identification of described transmit leg comprise following one of at least: the International Mobile Equipment Identity identification code IMEI of the subscriber identification module SIM card of the telephone number of described transmit leg, described transmit leg number, described transmit leg.
Alternatively, the password that described mobile terminal prestores comprise following one of at least: the mobile terminal identification of described transmit leg; The character string of the described transmit leg identity of proof setting in advance.
Alternatively, when described transmit leg is server, described antitheft instruction is sent to described server by Activating Account, and by described server, is forwarded to this mobile terminal, triggers antitheft operation.
Alternatively, described having Activated Account logined in can triggering mobile terminals antitheft client, wherein, described client comprise following one of at least: browser, mobile phone side be the client with mobile phone burglary-resisting function with the client of mobile phone burglary-resisting function, PC side.
Alternatively, described determination module is also configured to receive the antitheft instruction that has Activated Account and sent by note and/or network instruction that described server forwards, described.
Alternatively, the content of described note and/or described network instruction is except comprising described spcial character, also comprise following one of at least: the described sign that Activated Account, antitheft order, antitheft object identity.
Alternatively, described spcial character is Account; Described having Activated Account while being designated current login is the unique account identification code UID generating the account; Described antitheft order comprises order numbering and/or mission number; Described antitheft object identity comprises the IMEI of this mobile terminal.
Alternatively, described guarding against theft for mobile terminal client also comprises: active module, be configured to described transmit leg while being PC terminal, start described in the antitheft policy resolution mating with described transmit leg identity information before antitheft instruction, reception is from the activation file of described PC terminal; Wherein, described activation file carries identify label and the anti-theft modes sign of described mobile terminal; According to described identify label, described activation file is verified; If be verified, according to described anti-theft modes sign, activate different anti-theft modes.
Alternatively, described active module is also configured to: if described anti-theft modes is designated PC anti-theft modes sign, activate the antitheft strategy of PC; If described anti-theft modes is designated account anti-theft modes sign, activate the antitheft strategy of account.
Alternatively, described anti-theft modes sign comprise following one of at least: that described PC terminal generates, with this mobile terminal random string GUID one to one; After user's login account, generate for identifying the account identifier UID of account, wherein, the account name of the user of UID login is called USERNAME; Password PASSWORD.
Alternatively, described active module is also configured to: if when described anti-theft modes sign only comprises described GUID, activate the antitheft strategy of PC, directly carry out operation corresponding to described antitheft order; If when described anti-theft modes sign comprises described GUID and described PASSWORD, activate the antitheft strategy of PC, verify that whether described PASSWROD is correct; If so, carry out operation corresponding to described antitheft order; If not, stop response; If when described anti-theft modes sign comprises described UID, activate the antitheft strategy of account, in described mobile terminal, login described USERNAME, receive from the antitheft order of described UID and carry out corresponding operation; If when described anti-theft modes sign comprises described GUID and described UID, activate the antitheft strategy of PC and the antitheft strategy of account, receive from the antitheft order of PC terminal or described UID and carry out corresponding operation; If described anti-theft modes sign comprises described GUID, described UID and described PASSWORD, activate the antitheft strategy of PC and the antitheft strategy of account, receive from the antitheft order of described PC terminal or described UID and all described PASSWORD is verified; If be verified, carry out operation corresponding to antitheft order receiving; If checking is not notified, stop response.
Alternatively, described guarding against theft for mobile terminal client also comprises: deciphering module, while being configured in described antitheft order that the content except described spcial character is encrypted content, adopt corresponding deciphering means to be decrypted the antitheft instruction receiving, obtain the resolved content of described antitheft instruction.
Alternatively, cipher mode is des encryption, and manner of decryption is DES deciphering.
Alternatively, the antitheft instruction of encryption comprises following at least one: delete data in mobile phone instruction; The instruction of backup data in mobile phone.
Alternatively, described guarding against theft for mobile terminal client also comprises: poll module, be configured to when arbitrary antitheft order is carried out, and whether poll inquiry it run succeeded; If so, finish the execution of this antitheft order; If not, again attempt carrying out this antitheft order.
Alternatively, described poll module is also configured to: if do not receive the receipt of Requested Party at the appointed time, whether receipt is successful for poll inquiry; If so, finish receipt inquiry; If not, again ask receipt.
In embodiments of the present invention, can be according to determine the identity information of transmit leg from the antitheft instruction of transmit leg, start the antitheft instruction of antitheft policy resolution of mating with transmit leg identity information, obtain antitheft order corresponding to this instruction, and carry out operation corresponding to antitheft order, to realize guarding against theft for mobile terminal.As can be seen here, antitheft instruction in the embodiment of the present invention can be from equipment or the terminal (if the transmit leg of antitheft instruction is mobile terminal or server or PC) that can send note, can also be from equipment or the terminal that can send network instruction.Can send at present equipment or the terminal a lot (such as mobile phone, computer, flat board etc.) of note or network instruction, and by note or network instruction send antitheft instruction timeliness fast, arrive accurate, can save flow and the electric quantity consumption of stolen mobile terminal, for giving stolen mobile terminal for change, provide the more time, thereby can realize quickly and easily the antitheft of mobile terminal, solved in prior art, after mobile terminal is stolen, cannot continue mobile terminal to carry out antitheft problem.After the embodiment of the present invention is determined the identity information of transmit leg; start the antitheft instruction of antitheft policy resolution of mating with transmit leg identity information; obtain corresponding antitheft order, guarantee need to select suitable antitheft strategy to carry out anti-theft protection to mobile terminal according to user.And, in the embodiment of the present invention, according to the identity information of transmit leg, can mate a kind of antitheft strategy mobile terminal is carried out to anti-theft protection, can also match multiple antitheft strategy and mobile terminal be carried out to anti-theft protection simultaneously, strengthen the fail safe of mobile terminal.In addition, in the embodiment of the present invention, after mobile terminal is stolen, still can receive the antitheft instruction of transmit leg, and according to the antitheft operation of antitheft command execution of resolving antitheft instruction acquisition.For example, after customer mobile terminal is lost, by sending antitheft instruction to stolen mobile terminal, the embodiment of the present invention can be carried out screen locking operation to stolen mobile terminal, stops stealer to use mobile terminal.Stealer cannot be used mobile terminal to cause stealer to renovate mobile terminal by operations such as brush machines, and then stealer cannot be resell stolen mobile terminal to earn a profit.Further, can effectively reduce the probability that stealing crime occurs.In addition, according to the antitheft instruction receiving, the embodiment of the present invention can also be obtained the identification information (as the photo of stealer, fingerprint etc.) of stealer.Get the identification information of stealer according to the embodiment of the present invention after, can to stealer, arrest according to above-mentioned identification information.Therefore, the embodiment of the present invention can reach terminal and effectively terminal be carried out after stolen antitheftly, and reduces the beneficial effect of stealing crime rate, protection user property safety.
Above-mentioned explanation is only the general introduction of technical solution of the present invention, in order to better understand technological means of the present invention, and can be implemented according to the content of specification, and for above and other objects of the present invention, feature and advantage can be become apparent, below especially exemplified by the specific embodiment of the present invention.
According to the detailed description to the specific embodiment of the invention by reference to the accompanying drawings below, those skilled in the art will understand above-mentioned and other objects, advantage and feature of the present invention more.
Accompanying drawing explanation
By reading below detailed description of the preferred embodiment, various other advantage and benefits will become cheer and bright for those of ordinary skills.Accompanying drawing is only for the object of preferred implementation is shown, and do not think limitation of the present invention.And in whole accompanying drawing, by identical reference symbol, represent identical parts.In the accompanying drawings:
Fig. 1 shows the process chart of anti-theft method for mobile terminal according to an embodiment of the invention;
Fig. 2 shows the process chart of registering according to an embodiment of the invention SMS interception function;
Fig. 3 A shows the process chart of note receiving handling method according to an embodiment of the invention;
Fig. 3 B shows the process chart of the method that judges according to an embodiment of the invention antitheft strategy
Fig. 4 shows the process chart of the method for mobile terminal identification pre-stored trusty in accordance with a preferred embodiment of the present invention and/or password;
Fig. 5 shows the process chart that according to an embodiment of the invention command execution situation is carried out poll inquiry;
Fig. 6 shows the process chart of the method for inquiry return receipt according to an embodiment of the invention;
Fig. 7 shows the process chart of the anti-theft method for mobile terminal of the antitheft strategy of employing note in accordance with a preferred embodiment of the present invention;
Fig. 8 shows the process chart of the anti-theft method for mobile terminal of kith and kin's mobile phone side according to an embodiment of the invention;
Fig. 9 shows the process chart of the anti-theft method for mobile terminal of stolen mobile phone one side according to an embodiment of the invention;
Figure 10 shows the process chart of the method for opening anti-theft function according to an embodiment of the invention;
Figure 11 shows the process chart of the method for unbind according to an embodiment of the invention;
Figure 12 shows the process chart of the method for inquiry return receipt according to an embodiment of the invention;
Figure 13 shows the process chart of the anti-theft method for mobile terminal of the antitheft strategy of employing account in accordance with a preferred embodiment of the present invention;
Figure 14 shows the process chart that the side that Activated Account according to an embodiment of the invention sends antitheft instruction;
Figure 15 shows the antitheft method process chart of mobile terminal one side according to an embodiment of the invention;
Figure 16 shows the process chart of the method for the anti-theft feature that Activates Phone of PC terminal one side according to an embodiment of the invention;
Figure 17 shows according to the process chart of the theft preventing method of one embodiment of the invention mobile phone one side;
Figure 18 shows the process chart that according to an embodiment of the invention command execution situation is carried out poll inquiry; And
Figure 19 shows the structural representation of guarding against theft for mobile terminal client according to an embodiment of the invention.
Embodiment
Exemplary embodiment of the present disclosure is described below with reference to accompanying drawings in more detail.Although shown exemplary embodiment of the present disclosure in accompanying drawing, yet should be appreciated that and can realize the disclosure and the embodiment that should do not set forth limits here with various forms.On the contrary, it is in order more thoroughly to understand the disclosure that these embodiment are provided, and can by the scope of the present disclosure complete convey to those skilled in the art.
In correlation technique, mention, after mobile terminal is stolen, cannot continue mobile terminal to carry out the pilferage behavior that antitheft defect is encouraged stealer indirectly, cannot effectively contain pilferage crime, and to user's ill effect such as cause any property loss.
For solving the problems of the technologies described above, the embodiment of the present invention provides a kind of anti-theft method for mobile terminal.Fig. 1 shows the process chart of anti-theft method for mobile terminal according to an embodiment of the invention.Referring to Fig. 1, this flow process at least comprises that step S102 is to step S106.
Step S102, basis are determined the identity information of transmit leg from the antitheft instruction of transmit leg.
The antitheft instruction of antitheft policy resolution that step S104, startup are mated with transmit leg identity information, obtains antitheft order corresponding to this instruction.
Step S106, carry out operation corresponding to antitheft order, to realize guarding against theft for mobile terminal.
In embodiments of the present invention, can be according to determine the identity information of transmit leg from the antitheft instruction of transmit leg, start the antitheft instruction of antitheft policy resolution of mating with transmit leg identity information, obtain antitheft order corresponding to this instruction, and carry out operation corresponding to antitheft order, to realize guarding against theft for mobile terminal.As can be seen here, antitheft instruction in the embodiment of the present invention can be from equipment or the terminal (if the transmit leg of antitheft instruction is mobile terminal or server or PC) that can send note, can also be from equipment or the terminal that can send network instruction.Can send at present equipment or the terminal a lot (such as mobile phone, computer, flat board etc.) of note or network instruction, and by note or network instruction send antitheft instruction timeliness fast, arrive accurate, can save flow and the electric quantity consumption of stolen mobile terminal, for giving stolen mobile terminal for change, provide the more time, thereby can realize quickly and easily the antitheft of mobile terminal, solved in prior art, after mobile terminal is stolen, cannot continue mobile terminal to carry out antitheft problem.After the embodiment of the present invention is determined the identity information of transmit leg; start the antitheft instruction of antitheft policy resolution of mating with transmit leg identity information; obtain corresponding antitheft order, guarantee need to select suitable antitheft strategy to carry out anti-theft protection to mobile terminal according to user.And, in the embodiment of the present invention, according to the identity information of transmit leg, can mate a kind of antitheft strategy mobile terminal is carried out to anti-theft protection, can also match multiple antitheft strategy and mobile terminal be carried out to anti-theft protection simultaneously, strengthen the fail safe of mobile terminal.In addition, in the embodiment of the present invention, after mobile terminal is stolen, still can receive the antitheft instruction of transmit leg, and according to the antitheft operation of antitheft command execution of resolving antitheft instruction acquisition.For example, after customer mobile terminal is lost, by sending antitheft instruction to stolen mobile terminal, the embodiment of the present invention can be carried out screen locking operation to stolen mobile terminal, stops stealer to use mobile terminal.Stealer cannot be used mobile terminal to cause stealer to renovate mobile terminal by operations such as brush machines, and then stealer cannot be resell stolen mobile terminal to earn a profit.Further, can effectively reduce the probability that stealing crime occurs.In addition, according to the antitheft instruction receiving, the embodiment of the present invention can also be obtained the identification information (as the photo of stealer, fingerprint etc.) of stealer.Get the identification information of stealer according to the embodiment of the present invention after, can to stealer, arrest according to above-mentioned identification information.Therefore, the embodiment of the present invention can reach terminal and effectively terminal be carried out after stolen antitheftly, and reduces the beneficial effect of stealing crime rate, protection user property safety.
While carrying out as step S102 in Fig. 1, the embodiment of the present invention is obtained the spcial character carrying in antitheft instruction, determines the identity information of transmit leg according to this spcial character.Wherein, spcial character is specific character string.In the embodiment of the present invention, according to the identity information of the definite transmit leg of spcial character, comprise that mobile terminal, server or PC (Personal Computer, hereinafter to be referred as PC) are one of at least.When transmit leg is mobile terminal, the transmission carrier of antitheft instruction is note.When transmit leg is server, the transmission carrier of antitheft instruction is note and/or network instruction.When transmit leg is PC terminal, the transmission carrier of antitheft instruction is note and/or network instruction.Can find out, in the embodiment of the present invention, no matter when transmit leg is mobile terminal or server or PC terminal, antitheft instruction all can be take note and be sent as carrier.Before receiving the antitheft instruction that note has been carrier, embodiment of the present invention registration SMS interception function.
Fig. 2 shows the process chart of registering according to an embodiment of the invention SMS interception function.As shown in the step S202 in Fig. 2, first the embodiment of the present invention registers SMS interception function.After having registered, embodiment of the present invention execution step S204, generates the antitheft instruction mapping table corresponding with antitheft order.If the transmission carrier that the note of take is antitheft instruction, also can claim this mapping table for " note-command list ", during enforcement, can search and determine antitheft order corresponding to reception note according to this table.In this mapping table, antitheft instruction and antitheft order form corresponding relation.Such as " Dingwei# ", " Suoding# " etc.In mapping table, " Dingwei# " in antitheft instruction can find location (Locate) order in corresponding antitheft order in mapping table, in like manner, " Suoding# " in antitheft instruction can find lock-screen (Lock) order in corresponding antitheft order in mapping table.In addition, for distinguishing antitheft instruction and normal short message, in antitheft instruction, store the spcial character of the antitheft instruction of identification, help to have antitheft instruction in identification note.For example " * " of antitheft instruction front and back in the " # " in " Dingwei# ", " Suoding# " or " * Dingwei* ".In note, occur can inputting as the " # " of mentioning in above preferred embodiment or " * " or other mobile terminals spcial character time, the antitheft instruction in note can be identified and intercept to the embodiment of the present invention, and then can continue to carry out antitheft operation.Spcial character in this example can be the combination of one or more characters.Due to the distinctive characteristics of spcial character, conventionally choose the character that is of little use as spcial character, for example " # " mentioned above, " * ", then the character such as the Roman character being of little use such as appointment, Greek alphabet all can as spcial character.A plurality of characters be used in combination the authentication function that can strengthen spcial character, for example, following antitheft form can be set: every N character, a spcial character being detected, prove that this note is antitheft note, is not normal short message.Now, if according to the length of short message content, the number respective change of spcial character, can be 1,2,3 ...
Flow process shown in Figure 2, after step S204 is finished, execution step S206, generates mapping table corresponding to order numbering (ACTIONID).In this mapping table, order numbering forms mapping relations one to one with order.When generating this mapping table, the discernible order of stolen mobile terminal can also be added to this mapping.The order that for example the corresponding account of Bind is antitheft, use during the antitheft binding of PC, the order that the corresponding account of UnBind is antitheft, use during the antitheft unbind of PC.After generating this mapping table, execution step S208, to the interface of the open file reading of PC end.In the antitheft strategy of PC, need openly can be held the interface directly calling by PC.
After SMS interception function register finishes, the embodiment of the present invention is according to the process chart executable operations of the note receiving handling method of one embodiment of the invention as shown in Figure 3A.As shown in Figure 3A, after the embodiment of the present invention receives note (being step S3A02), embodiment of the present invention execution step S3A04, whether the note that judgement receives carries antitheft instruction.The mapping table corresponding with antitheft order according to the antitheft instruction generating in the step S204 in Fig. 2, embodiment of the present invention inquire-receive to note in whether carry the antitheft instruction that comprises spcial character in this mapping table.If contain spcial character, to judge in the note of reception and carry antitheft instruction, the embodiment of the present invention continues execution step S3A06.If do not contain above-mentioned spcial character, to judge in the note of reception and do not carry antitheft instruction, the embodiment of the present invention continues execution step S3A08.
As shown in the step S3A06 in Fig. 3 A, after carrying antitheft instruction in embodiment of the present invention judgement note, tackle this note (conventionally also claiming to eat up note).In the embodiment of the present invention, interception note can avoid this note to occur in the system of mobile terminal, causes the suspicion of stealer, causes stealer to be enhanced your vigilance.If show the note that carries antitheft instruction in the system of mobile terminal, stealer judges mobile terminal opening anti-theft function accordingly, stealer may be carried out brush machine or extract the operations such as battery mobile terminal, reduce the probability that stolen mobile terminal is given for change, and increase the difficulty that relevant departments give stolen terminal for change, arrest stealer.Step S3A06 is finished, and the embodiment of the present invention continues execution step S3A10, obtains the antitheft command information in note, and triggers the operation that the identity information of transmit leg is determined, flow process finishes.If according to judgement, in the note receiving, do not carry antitheft instruction, the embodiment of the present invention performs step S3A08, clearance note, flow process finishes.
Above mention, the antitheft strategy that the embodiment of the present invention can be used at least comprises three kinds, therefore, in actual applications, when theft-proof terminal receives antitheft note, needing judgement is the antitheft note of sending according to which kind of antitheft strategy, and then can process according to corresponding antitheft strategy.Fig. 3 B shows the process chart of the method that judges according to an embodiment of the invention antitheft strategy.Referring to Fig. 3 B, this flow process at least comprises that step S3B02 is to step S3B22.
Step S3B02, mobile terminal receive note.
Step S304, determine whether the antitheft note of note.If so, perform step S306, if not, execution step S310.
Step S306, interception note, trigger the antitheft strategy of note.
Step S308, the antitheft strategy of execution note, flow process finishes.
Step S310, determine whether the antitheft note of account.If so, perform step S312, if not, execution step S316.
Step S312, interception note, trigger the antitheft strategy of account.
Step S314, the antitheft strategy of execution account, flow process finishes.
Step S316, determine whether the antitheft note of PC.If so, perform step S318, if not, execution step S322.
Step S318, interception note, trigger the antitheft strategy of PC.
Step S320, the antitheft strategy of execution PC, flow process finishes.
Step S322, clearance note, flow process finishes.
In the embodiment of the present invention, while not carrying antitheft instruction in the note that judgement receives, clearance note, can reduce the vigilance of stealer, is conducive to give for change stolen terminal, arrests stealer.For example, after user's mobile terminal is lost, if stealer is seen mobile terminal in stolen mobile terminal, can receive note, think that mobile terminal is not locked, not opening anti-theft function.In addition, the embodiment of the present invention will carry the SMS interception of antitheft instruction, makes in its system that cannot be presented at mobile terminal, but according to the antitheft instruction of carrying in note, carries out antitheft operation on backstage.Stealer cannot be found mobile terminal opening anti-theft function, and carries out corresponding antitheft operation, as reports the real time position of mobile terminal even to report the operations such as fingerprint of stealer.Therefore, the embodiment of the present invention can reduce the vigilance of stealer, increases the possibility that stolen mobile terminal is given for change, and then the effectively generation of containment pilferage crime, protection user's property safety.
According to flow process shown in Fig. 3, determine after the antitheft strategy of current startup, continue the step S104 in execution graph 1, start the antitheft instruction of antitheft policy resolution of mating with transmit leg identity information, obtain antitheft order corresponding to this instruction.Above mention, in the embodiment of the present invention, antitheft strategy comprises three kinds, and corresponding transmit leg is different and different according to antitheft strategy, for example, when antitheft strategy is the antitheft strategy of note, transmit leg is mobile terminal, and when antitheft strategy is the antitheft strategy of account, transmit leg is server or PC terminal, when antitheft strategy is the antitheft strategy of PC, transmit leg is PC terminal.Now according to the difference of transmit leg (i.e. corresponding different antitheft strategy), the anti-theft method for mobile terminal of the embodiment of the present invention is introduced respectively.
Paper when transmit leg is mobile terminal, the anti-theft method for mobile terminal that the embodiment of the present invention provides.When transmit leg is mobile terminal, the antitheft strategy mating with mobile terminal is the antitheft strategy of note, and antitheft instruction be take note as carrier transmission.
While carrying antitheft instruction in the note receiving, the embodiment of the present invention is obtained the antitheft command information in note, and triggers and determine or the operation of checking transmit leg identity information.The embodiment of the present invention is resolved antitheft instruction, obtains sending the identifying code of the transmit leg of this antitheft instruction.After being verified code, the identifying code that the embodiment of the present invention continues the identifying code obtaining to prestore with mobile terminal mates, and determines whether to obtain antitheft order corresponding to antitheft instruction according to matching result.If mobile terminal identification trusty and/or password that the identifying code obtaining prestores with mobile terminal mate, obtain antitheft order.If mobile terminal identification trusty and/or password that the identifying code obtaining prestores with mobile terminal do not mate, for avoiding the antitheft instruction that receives the transmission of malice transmitting terminal to cause the antitheft operation to mobile terminal execution error, the embodiment of the present invention is ignored this antitheft order.
In the embodiment of the present invention, identifying code can be mobile terminal identification and/or the proof transmit leg password trusty of transmit leg.Wherein, the mobile terminal identification of transmit leg comprises the telephone number of transmit leg, the user identification module of transmit leg (Subscriber Identity Module, hereinafter to be referred as SIM) the International Mobile Equipment Identity identification code (International Mobile Equipment Identity, hereinafter to be referred as IMEI) of card number and transmit leg is one of at least any.Proof transmit leg password trusty can be that the mobile terminal identification of transmit leg, the proof transmit leg character string trusty that sets in advance are one of at least any.For example, can numeral be set to prove transmit leg character string trusty with alphabetical combination in any.As, ac1088206, A34TFAK6808 etc.Can also user's name or birthday of user's birthday, pet be set to prove transmit leg password trusty etc.
Fig. 4 shows the process chart of the method for mobile terminal identification pre-stored trusty in accordance with a preferred embodiment of the present invention and/or password.It should be noted that, in this preferred embodiment, for convenience of address, mobile terminal identification trusty and/or password are referred to as to password, mobile terminal identification trusty is called to kith and kin's number.Referring to Fig. 4, this flow process at least comprises that step S402 is to step S412.
Step S402, whether kith and kin's number is set.
In this preferred embodiment, first inquire whether user arranges kith and kin's number on this mobile terminal, if so, performs step S404, if not, performs step S408.
Step S404, kith and kin's number is set.
If user selects to arrange kith and kin's number, the embodiment of the present invention, according to selecting some conventional contact telephone number in the address list in mobile terminal this locality or frequent contact list or white list, is made as kith and kin's number.
Step S406, after to kith and kin's number, setting completed, it is kith and kin's number that password is set.After mobile terminal receives the note that carries antitheft instruction, resolve antitheft instruction and obtain identifying code.If this identifying code and the kith and kin's numbers match as password setting in advance, obtain antitheft order corresponding to antitheft instruction.
Step S408, whether password is set.
If select according to user, kith and kin's number is arranged, continue inquiry whether password is set.If do not arrange, flow process finishes.If arrange, perform step S412.
Step S410, the character string of inputting according to user arrange password
Password is opened in step S412, confirmation.
When password being set for after kith and kin's number success, to confirm to open the function that accesses to your password, flow process finishes.
Storage mobile terminal identification trusty as described above and/or the method for password, the embodiment of the present invention can also be deleted for empty mobile terminal identification trusty and/or the password stored by mobile terminal identification trusty and/or password are set.For example, the embodiment of the present invention can be according to flow process as shown in Figure 4, and kith and kin's number, note anti-theft cipher are set to sky, and is clicking " unlatching password " hurdle to close cryptographic function.After deleting mobile terminal identification trusty and/or password, the embodiment of the present invention can also select to nullify anti-theft feature.
As described above, when the embodiment of the present invention is resolved antitheft instruction, obtain identifying code, determine whether antitheft instruction encrypts.If antitheft instruction is encrypted antitheft instruction, the embodiment of the present invention adopts corresponding deciphering means to be decrypted antitheft instruction, and adopts corresponding deciphering means to be decrypted identifying code, obtains the identifying code after deciphering and mates.In the embodiment of the present invention, antitheft instruction can be encrypted by any cryptographic algorithm, the embodiment of the present invention adopts corresponding deciphering means to be decrypted antitheft order and identifying code when antitheft instruction is resolved, and the embodiment of the present invention is not limited this.Preferably, in the embodiment of the present invention, adopt current most popular data encryption standard (Data Encryption Standard, hereinafter to be referred as DES) that antitheft instruction is encrypted and is deciphered.In addition, the embodiment of the present invention can also be encrypted other information or the content except identifying code and antitheft order in the antitheft instruction receiving.The embodiment of the present invention is encrypted all information or the content in antitheft instruction; can strengthen the protection to important information or content in antitheft instruction (as the identifying code in antitheft instruction or antitheft order), improve the fail safe of the antitheft instruction receiving.
After identifying code that the embodiment of the present invention is carried in to antitheft instruction according to pre-stored identifying code mates, if the identifying code of transmit leg can mate with the identifying code of mobile terminal, resolve antitheft instruction to obtain corresponding antitheft order.After getting antitheft order, carry out step S106 as shown in Figure 1, carry out operation corresponding to antitheft order, to realize guarding against theft for mobile terminal.
In the process being performed in arbitrary antitheft order, whether this order of embodiment of the present invention poll inquiry runs succeeded.As Fig. 5 shows the process chart that according to an embodiment of the invention command execution situation is carried out poll inquiry.Step S502 in execution graph 5, whether the antitheft order that judgement is about to carry out runs succeeded.If according to judged result, this antitheft order fails to carry out, and performs step S504, again attempts carrying out this antitheft order, and flow process finishes.If according to judged result, this antitheft command execution success, flow process finishes.
In the embodiment of the present invention, to the implementation status of antitheft order carry out poll inquiry guarantee acquisition for mobile terminal to antitheft order can be carried out in time, avoid causing not in time stealer to carry out brush machine to mobile terminal or other operations cannot be given for change mobile terminal because of antitheft command execution.For example, the embodiment of the present invention is about to carry out lock-screen order, and whether this lock-screen order is run succeeded and inquired about.If lock-screen order is not carried out, the embodiment of the present invention is carried out lock-screen order, and the screen of mobile terminal is locked.If the success of lock-screen command execution, the embodiment of the present invention abandons again carrying out this screen locking order.
After the antitheft command execution receiving is complete, the embodiment of the present invention is returned to using execution result as receipt to the transmit leg of antitheft instruction, reminds the antitheft instruction executed of transmit leg.After transmit leg is received this receipt, can continue next step antitheft operation.In addition, if antitheft instruction transmit leg is not received receipt at the appointed time, the embodiment of the present invention is initiated poll inquiry, whether success of inquiry return receipt.As Fig. 6 shows the process chart of the method for inquiry return receipt according to an embodiment of the invention.When transmit leg is not received receipt within the time of implementation, the embodiment of the present invention is carried out step S602 as shown in Figure 6, to server request inquiry return receipt.Then, embodiment of the present invention execution step S604, inquires about whether receipt is successful.If success, flow process finishes.If unsuccessful, the embodiment of the present invention is returned to execution step S602, until inquiry return receipt success.By sending receipt, inquire about, the embodiment of the present invention guarantees that antitheft instruction transmit leg can know the implementation status of antitheft instruction in time, and can know in time that antitheft instruction is carried out and finish, and more efficiently carries out antitheft operation.Further, the embodiment of the present invention can improve the probability that stolen mobile terminal is given for change.
The specific embodiment of now take describes anti-theft method for mobile terminal of the present invention (transmit leg is mobile terminal).
Embodiment mono-
Fig. 7 to Fig. 9 shows the process chart of anti-theft method for mobile terminal in accordance with a preferred embodiment of the present invention, for supporting above-mentioned any one anti-theft method for mobile terminal, above-mentioned anti-theft method for mobile terminal is set forth more clear understandablely.It should be noted that, for this preferred embodiment being set forth clearer simple, in this preferred embodiment, transmit leg is arranged to kith and kin's mobile phone, mobile terminal is arranged to stolen mobile phone.
Fig. 7 shows the process chart of the anti-theft method for mobile terminal of the antitheft strategy of employing note in accordance with a preferred embodiment of the present invention.As shown in Figure 7, after hand-set from stolen, this preferred embodiment execution step S702, sends antitheft note to stolen mobile phone by kith and kin's mobile phone.Wherein, the number of this kith and kin's mobile phone is pre-stored within stolen mobile phone.After stolen mobile phone receives antitheft note, this preferred embodiment execution step S704, processes antitheft note.After being disposed, execution step S706, returns to stolen result to kith and kin's mobile phone, completes the antitheft handling process of stolen mobile phone.
Now from kith and kin's mobile phone side and stolen mobile phone side, introduce respectively the handling process of the anti-theft method for mobile terminal of this preferred embodiment.
Please note, at this, with kith and kin's mobile phone, represent antitheft instruction transmit leg, according to content disclosed by the invention, it will be appreciated by those skilled in the art that, antitheft instruction transmit leg can make kith and kin's mobile phone incessantly, and can be any other communication equipment that can send note, the password comprising in antitheft instruction by checking verifies that whether the identity of this transmit leg is legal, the invention is not restricted to this.
Fig. 8 shows the process chart of the anti-theft method for mobile terminal of kith and kin's mobile phone side according to an embodiment of the invention.Referring to Fig. 8, this flow process at least comprises that step S802 is to step S806.
After hand-set from stolen, the present embodiment is by kith and kin's mobile phone editor and send antitheft note to stolen mobile phone.When the antitheft note of editor, if the antitheft order in antitheft note is some simple operationss, as " locking mobile phone screen ", the present embodiment can directly send by editing special antitheft note.If the higher antitheft order that is some safety requirements of the antitheft order in antitheft note, as " deletion data in mobile phone ", " backup data in mobile phone " etc., first the present embodiment is encrypted the antitheft note that is about to send.Secondly, the antitheft note through encryption is sent to stolen mobile phone.
Step S802 as shown in Figure 8, when the present embodiment is encrypted the antitheft note that is about to send, first splices special marking.The special marking splicing there is step S802 in the mapping that comprises spcial character and antitheft instruction mentioned above in.And, in this mapping, there is the special marking that is specifically designed to encryption.For example, in this mapping, have " Dingwei# " and " Dingwei#E ", the antitheft order of both correspondences is Locate order simultaneously.But " Dingwei# " represents the antitheft instruction of unencrypted, the antitheft order of " Dingwei#E " mark encryption.
Afterwards, the present embodiment continues execution step S804, and all the other contents are encrypted.For example, in " Dingwei#E1380013800 ", " Dingwei#E " numeral identifying code below, the i.e. pre-stored password of stolen mobile phone or kith and kin's number etc.Step S804 is encrypted this password or kith and kin's number.After encryption, obtain " DingweiE#ac35e5b301 ".Wherein, it should be noted that, the letter in the antitheft instruction of showing in the embodiment of the present invention and numeral, only as example, can not represent the digit of real password or kith and kin's number or the true demonstration of the antitheft instruction after encryption.After antitheft note is encrypted, the present embodiment execution step S806, sends antitheft note to stolen mobile phone, and flow process finishes.
Kith and kin's mobile phone sends antitheft note to stolen mobile phone, and stolen mobile phone is processed the antitheft note receiving.As Fig. 9 shows the process chart of the anti-theft method for mobile terminal of stolen mobile phone one side according to an embodiment of the invention.Referring to Fig. 9, this flow process at least comprises that step S902 is to step S920.
Step S902, receive antitheft note.
Whether the transmit leg of the antitheft note that step S904, judgement receive is kith and kin's number.If so, directly perform step S910, if not, execution step S906.
In the antitheft note that step S906, judgement receive, whether contain the content through des encryption.If so, perform step S918, if not, execution step S908.
Step S908, judge that whether the identifying code in antitheft note is correct.
Particularly, the identifying code in antitheft note can be proof transmit leg password trusty, can be the identification information of sender mobile terminal, can also comprise simultaneously password and mobile terminal identification information both.Through judgement, if the identifying code in antitheft note is correct, execution step S910, if mistake, flow process finishes.
Step S910, obtain antitheft order.
After stolen mobile phone receives antitheft note, resolve the antitheft instruction of carrying in antitheft note, obtain the antitheft order corresponding with this antitheft instruction.
Step S912, carry out antitheft order.
After getting antitheft order, stolen mobile phone is according to the corresponding antitheft operation of antitheft command execution.As according to antitheft order, stolen mobile phone carried out the operation of lock-screen, or according to antitheft order to release mobile phone person take pictures operation etc.
Step S914, return to execution result.
After antitheft command execution is complete, stolen mobile phone returns to execution result to transmit leg, and prompting transmit leg command execution is complete.
Step S916, return to execution result to transmit leg, the antitheft operation of stolen mobile phone is successfully finished, and flow process finishes.
If there is des encryption content in the antitheft note of step S918, short message content be decrypted.
Whether step S920, judgement decipher successful to antitheft short message content.If so, return to execution step S908, if not, flow process finishes.
Secondly introduce when transmit leg is server the anti-theft method for mobile terminal that the embodiment of the present invention provides.When transmit leg is server, the antitheft strategy mating with server is the antitheft strategy of account, and it is that carrier sends that note and/or network instruction are take in antitheft instruction.
When transmit leg is server, the embodiment of the present invention receives the antitheft instruction from server.Wherein, antitheft command format can only include spcial character, can also both comprise spcial character, also comprises other identification informations except spcial character.In the embodiment of the present invention, antitheft instruction can comprise spcial character, Activate Account sign, antitheft order, antitheft object identity.In at least one.Preferably, in the embodiment of the present invention, spcial character is account (Account), is used for determining the sign of antitheft strategy, and this sign can not change after determining.Having Activated Account while being designated current login is the unique account identification code (UID) generating the account.Antitheft order comprises order numbering (ACTIONID) and/or mission number (TASKID), wherein, by ACTIONID, can in comprising the corresponding table of antitheft instruction and antitheft order, find corresponding order.When TASKID is antitheft instruction transmission, the corresponding mission number generating in server can be inquired about the implementation status of antitheft order corresponding to this TASKID by this TASKID in server.In addition, when this antitheft instruction is when initiating first, TASKID is 0.Antitheft object identity can comprise the International Mobile Equipment Identity identification code (International Mobile Equipment Identity, hereinafter to be referred as IMEI) of this mobile terminal, can also comprise can this mobile terminal of unique identification other identify labels.To sum up, in the embodiment of the present invention, the form of antitheft instruction can be set to:
[Accout]<UID>,<IMEI>,<ACTIONID>,<TASKID>,<OTHERS>
Wherein, OTHERS is the additional information relevant to antitheft instruction.For example, the information of Erase instruction is for specify deleting the data (as the chat record data of the note data in deletion system or notepad data or application etc.) of which part in mobile terminal system.Again for example, the additional information of TakePhoto can be the requirement of the definition to taking pictures.
For example, the form of terminal locking instruction is: [Accout] 200868996,323450296939291, LOCK, 2000000,0.
It should be noted that, the numeral that represents UID, IMEI and TASKID of mentioning in the embodiment of the present invention only, as example, can not represent the digital figure place and the combination that in true utilization, represent UID, IMEI and TASKID.
After receiving antitheft instruction, the embodiment of the present invention is resolved antitheft instruction according to the antitheft strategy of account.When antitheft instruction is carried out to parse operation, the embodiment of the present invention determines that whether antitheft instruction is encrypted.If antitheft instruction is encrypted antitheft instruction, the embodiment of the present invention adopts corresponding deciphering means to be decrypted antitheft instruction.In the embodiment of the present invention, antitheft instruction can be encrypted by any cryptographic algorithm, and the embodiment of the present invention adopts corresponding deciphering means to be decrypted antitheft instruction when antitheft instruction is resolved, and the embodiment of the present invention is not limited this.Preferably, in the embodiment of the present invention, adopt current most popular data encryption standard (Data Encryption Standard, hereinafter to be referred as DES) that antitheft instruction is encrypted and is deciphered.In addition, the embodiment of the present invention can also be encrypted other information or the content except antitheft strategy sign in the antitheft instruction receiving.The embodiment of the present invention is encrypted all information or the content in antitheft instruction, can strengthen the protection to important information or content in antitheft instruction (as the antitheft strategy sign in antitheft instruction), improves the fail safe of the antitheft instruction receiving.
The antitheft the instruction above embodiment of the present invention being received is introduced, and the embodiment of the present invention, before receiving antitheft instruction, need to start anti-theft feature at this mobile terminal.As Figure 10 shows the process chart of the method for opening anti-theft function according to an embodiment of the invention.Referring to Figure 10, this flow process at least comprises that step S1002 is to step S1014.
Step S1002, log in the account having activated.
By network, to game server, send the request that logs in.
Step S1004, return to log-on message.
After logon server receives the request of logging in, return to logon information, as " name on account ", " account identification code ".
Step S1006, by note, send binding (Bind) instruction.
By note, send Bind instruction to antitheft server.In this Bind instruction, ACTIONID is Bind, and TASKID is that 0, OTHERS is empty.And, the telephone number that the number carrying in this instruction is this mobile terminal.After binding success, the telephone number of this mobile terminal is set to trusted number, and starts anti-theft feature.
Step S1008, inspection Bind state.
If after sending Bind instruction, in the scheduled time (as 20 seconds), do not receive the Query Result that antitheft server returns, by Network Check Bind state.
Step S1010, antitheft server return to Bind result.
The information that comprises OTHERS form in the Query Result that antitheft server returns.If OTHERS is 1, represent the success of this mobile terminal binding, if OTHERS is 0, represent the failure of this mobile terminal binding.
In the embodiment of the present invention, step S1008 and step S210 can repeatedly repeat, and wherein, every the scheduled time (as the 20 seconds) Query Result that antitheft server returns if do not receive or binding result, are unsuccessfully, check Bind state.
If after step S1012 rechecking Bind state three times, still cannot successfully bind, by network, send the Bind instruction that does not carry this mobile terminal telephone number.If binding success, starts anti-theft feature, and to identify this mobile terminal be trustless number.
Step S1014, antitheft server return to the Bind result that network sends.
It should be noted that, as shown in figure 10, when this mobile terminal is not stolen, the login side in Figure 10 logs in the side that Activates Account after stolen, can also be this mobile terminal one side.Now, logon server and antitheft server are same server.
Figure 11 shows the process chart of the method for unbind according to an embodiment of the invention.Referring to Figure 11, this flow process at least comprises that step S1102 is to step S1106.
Step S1102, the instruction of transmission unbind (Unbind).
Particularly, this step sends Unbind instruction by network to antitheft server.This Unbind instruction is a kind of antitheft instruction, adopts antitheft command format mentioned above.In this Unbind instruction, ACTIONID is Unbind, and TASKID is that 0, OTHERS is empty.
Step S1104, antitheft server return to Unbind result.If unbind success, performs step S306, if unbind failure points out user to carry out other operations.
Step S1106, unbind success, delete the accounts information and the antitheft record that have Activated Account.As " name on account " in accounts information, " account identification code " being set to sky and deleting the database of antitheft record corresponding to the account.
In addition, after accounts information and antitheft record that unbind success deletion have Activated Account, the embodiment of the present invention can be nullified anti-theft feature.
The handling process of having introduced opening anti-theft function in the embodiment of the present invention above and having nullified anti-theft feature.After mobile terminal is lost, first the embodiment of the present invention is logined in can triggering mobile terminals antitheft client Activating Account.Preferably, in the embodiment of the present invention, can the antitheft client of triggering mobile terminals can be browser, can be that mobile phone side for example, with the client (mobile phone bodyguard) of mobile phone burglary-resisting function, can also be PC (Personal Computer, hereinafter to be referred as PC) side is with client (such as security guard) of mobile phone burglary-resisting function etc., and the embodiment of the present invention is not limited this.In the embodiment of the present invention, Activated Account after login, can take the antitheft instruction as carrier sends of note and/or network instruction, after guaranteeing that mobile terminal is lost, can send in time antitheft instruction by conventional transmit leg and carry out antitheft to the mobile terminal of losing.Wherein, if Activated Account, take note antitheft instruction as carrier sends,, in the embodiment of the present invention, after mobile terminal receives note, first judge in note whether carry antitheft instruction, if so, tackle this note, and trigger and resolve antitheft command operating.If not, this note of letting pass.
After carrying antitheft instruction in embodiment of the present invention judgement note, tackle this note (conventionally also claiming to eat up note).In the embodiment of the present invention, eat up note and can avoid this note to occur in the system of mobile terminal, cause the suspicion of stealer, cause stealer to be enhanced your vigilance.If show the note that carries antitheft instruction in the system of mobile terminal, stealer judges mobile terminal opening anti-theft function accordingly, stealer may be carried out brush machine or extract the operations such as battery mobile terminal, reduce the probability that stolen mobile terminal is given for change, and increase the difficulty that relevant departments give stolen terminal for change, arrest stealer.After interception note, the embodiment of the present invention is obtained the antitheft command information in note, and triggers the operation that the identity information of transmit leg is determined.If according to judgement, in the note receiving, do not carry antitheft instruction, embodiment of the present invention clearance note.
In the embodiment of the present invention, while not carrying antitheft instruction in the note that judgement receives, clearance note, can reduce the vigilance of stealer, is conducive to give for change stolen terminal, arrests stealer.For example, after user's mobile terminal is lost, if stealer is seen mobile terminal in stolen mobile terminal, can receive note, think that mobile terminal is not locked, not opening anti-theft function.In addition, the embodiment of the present invention will carry the SMS interception of antitheft instruction, makes in its system that cannot be presented at mobile terminal, but according to the antitheft instruction of carrying in note, carries out antitheft operation on backstage.Stealer cannot be found mobile terminal opening anti-theft function, and carries out corresponding antitheft operation, as reports the real time position of mobile terminal even to report the operations such as fingerprint of stealer.Therefore, the embodiment of the present invention can reduce the vigilance of stealer, increases the possibility that stolen mobile terminal is given for change, and then the effectively generation of containment pilferage crime, protection user's property safety.
As described above, after mobile terminal is lost, to Activating Account and log in, and receive and Activated Account that to take note and/or network be the antitheft instruction that carrier sends.Particularly, in the middle existence that Activates Account, store the list of devices of sign with at least one mobile terminal of the binding that Activates Account.The embodiment of the present invention is selected this mobile terminal that carries out antitheft operation in the list of devices having Activated Account, and is sent to server by the antitheft instruction Activating Account for this mobile terminal.For example, send " obtaining list of devices " instruction to server, be somebody's turn to do in " obtaining list of devices " instruction, ACTIONID is GET_LIST, and TASKID is that 0, OTHERS is empty.Server returns to list of devices corresponding to the account.Wherein, in list of devices, comprise can unique identification mobile terminal identification information (as IMEI or UID etc.) and the information such as telephone number of mobile terminal.Activated Account and in list of devices, chosen the mobile terminal of appointment, and the antitheft instruction for this mobile terminal has been sent to server, by server, be forwarded to this mobile terminal.
In addition, if carry out the sign of this mobile terminal of antitheft operation, be not stored in list of devices, the sign by this mobile terminal of input that Activates Account, is added into the sign of this mobile terminal of this input in the list of devices having Activated Account.And, select the antitheft operation that this mobile terminal is corresponding to be sent to this mobile terminal by server.
After this mobile terminal receives antitheft instruction, resolve antitheft instruction and obtain antitheft order, and then according to the antitheft operation of antitheft command execution.In the embodiment of the present invention, in the process that arbitrary antitheft order is performed, whether this antitheft order of poll inquiry runs succeeded, and if so, finishes the execution of this antitheft order, if not, again attempts carrying out this antitheft order.
In the embodiment of the present invention, to the implementation status of antitheft order carry out poll inquiry guarantee acquisition for mobile terminal to antitheft order can be carried out in time, avoid causing not in time stealer to carry out brush machine to mobile terminal or other operations cannot be given for change mobile terminal because of antitheft command execution.For example, the embodiment of the present invention is about to carry out lock-screen order, and whether this lock-screen order is run succeeded and inquired about.If lock-screen order is not carried out, the embodiment of the present invention is carried out lock-screen order, and the screen of mobile terminal is locked.If the success of lock-screen command execution, the embodiment of the present invention abandons again carrying out this screen locking order.
After the antitheft command execution receiving is complete, the embodiment of the present invention is using execution result as receipt return service device, the executed of reminding service device.After server is received this receipt, can continue next step antitheft operation.In addition, if server is not received receipt at the appointed time, the embodiment of the present invention is initiated poll inquiry, whether success of inquiry return receipt.As Figure 12 shows the process chart of the method for inquiry return receipt according to an embodiment of the invention.When server is not received receipt within the time of implementation, the embodiment of the present invention is carried out step S1202 as shown in figure 12.Requesting query receipt.Then, embodiment of the present invention execution step S1204, inquires about whether receipt is successful.If success, flow process finishes.If unsuccessful, the embodiment of the present invention is returned to execution step S1202, until inquiry return receipt success.By sending receipt, inquire about, embodiment of the present invention assurance server can be known the implementation status of antitheft instruction in time, and can know in time that antitheft instruction execution finishes, and more efficiently carries out antitheft operation.Further, the embodiment of the present invention can improve the probability that stolen mobile terminal is given for change.
The specific embodiment of now take describes anti-theft method for mobile terminal of the present invention (transmit leg is server).
Embodiment bis-
Figure 13 to Figure 15 shows the process chart of anti-theft method for mobile terminal in accordance with a preferred embodiment of the present invention, for supporting above-mentioned any one anti-theft method for mobile terminal, above-mentioned anti-theft method for mobile terminal is set forth more clear understandablely.
Figure 13 shows the process chart of the anti-theft method for mobile terminal of the antitheft strategy of employing account in accordance with a preferred embodiment of the present invention.Referring to Figure 13, this flow process at least comprises that step S1302 is to step S1318.
Step S1302, login Activate Account, and have been Activated Account and sent antitheft instruction to server by this.
Step S1304, server return to the result to antitheft instruction, point out the server that Activated Account to receive antitheft instruction.Wherein, in the result that server returns, carry the TASKID that server generates.
After step S1304 is finished, antitheft instruction according to Activating Account and sending, if the phone number of stolen mobile terminal is trusted number, directly performs step S1308, if the phone number of stolen mobile terminal is insincere number, execution step S1306.
Step S1306, at the phone number of middle input stolen mobile terminal that Activates Account, and be sent to server, to add this phone number in the corresponding list of devices that Activates Account of storing in server.After this phone number is added into list of devices, the phone number of stolen mobile terminal changes trusted number into by trustless number.
Step S1308, the phone number of determining stolen mobile terminal are after trusted number, and server sends antitheft instruction to stolen mobile terminal with note form.Wherein, the ACTIONID in this antitheft instruction and OTHERS are identical with the Activate Account ACTIONID and the OTHERS that are sent in the antitheft instruction of server, and TASKID in this antitheft instruction is the TASKID generating in step S1304.
Step S1310, Activate Account and send antitheft instruction graduates, every the scheduled time (as 30 seconds), by network, to server, send inquiry request, inquire about the execution result of antitheft instruction.Wherein, in inquiry request, carry the TASKID generating in the identification information (as the IMEI of stolen mobile terminal or UID etc.) of stolen mobile terminal and step S1304.
After step S1312, server receive inquiry request, inquire about the implementation status of antitheft instruction, and be back to and Activate Account.As server returns to " stolen mobile terminal is not received antitheft instruction ", " stolen terminal is being carried out antitheft instruction ", " stolen terminal is carried out antitheft instruction success " or " stolen terminal is carried out antitheft instruction failure " etc. to Activating Account.User can check that stolen terminal carries out the situation of antitheft instruction in time by Activating Account, and selects to carry out the operations such as next antitheft instruction according to the implementation status of antitheft instruction.
After step S1314, stolen terminal are complete to antitheft command execution, return to execution result to server.After server receives and returns results, the state of antitheft order corresponding to TASKID is updated to " completing ".
Step S1316, Activate Account and send inquiry request to server, inquire about the execution result of antitheft instruction.
Step S1318, receive the inquiry request having Activated Account after, return to " stolen terminal carry out antitheft instruction success " to Activating Account.
It should be noted that, in above-mentioned flow process, step S1310 and step S1312 can poll carry out once or repeatedly.As Activated Account, can send inquiry request to server every 30 seconds, inquire about stolen terminal to the implementation status of antitheft instruction until server returns to stolen terminal and carry out antitheft instruction success.That is,, in above-mentioned flow process, step S1316 and step S1318 are the repetition of step S1310 and step S1312.
Figure 14 shows the process chart that the side that Activated Account according to an embodiment of the invention sends antitheft instruction.Referring to Figure 14, this flow process at least comprises that step S1402 is to step S1408.
Step S1402, generate antitheft command content.
Generate in antitheft instruction, the order numbering that ACTIONID is the order that will carry out, as location (Locate), delete (Erase), the evidence obtaining (TakePhoto) etc. of taking pictures.TASKID is that 0, OTHERS is the additional information relevant to antitheft instruction.For example, the information of Erase instruction is for specify deleting the data (as the chat record data of the note data in deletion system or notepad data or application etc.) of which part in mobile terminal system.Again for example, the additional information of TakePhoto can be the requirement of the definition to taking pictures.
Step S1404, antitheft instruction is encrypted.
In antitheft instruction, except Account, other data or interior perhaps information all need through encryption, in this preferred embodiment, adopt DES to be encrypted antitheft instruction, guarantee that antitheft instruction can be sent to server more safely, then be forwarded to stolen terminal by server.In addition, if Activated Account, adopted encrypted transmission agreement (the Hypertext Transfer Protocol over Secure Socket Layer with fail safe with the communication of server, hereinafter to be referred as Https) etc. cryptographic protocol, this preferred embodiment can be skipped this encrypting step.
Step S1406, send antitheft instruction to server.
Step S1408, the request of transmission poll inquiry, to server, are inquired about the implementation status of stolen terminal to antitheft instruction.If be finished, flow process finishes.If be not finished, repeating step S1408.
Figure 15 shows the antitheft method process chart of mobile terminal one side according to an embodiment of the invention.Referring to Figure 15, this flow process at least comprises that step S1502 is to step S1514.
Step S1502, reception carry the note of antitheft instruction.
Step S1504, antitheft instruction is decrypted to processing.If can decipher, execution step S1508, if can not decipher, execution step S1506.
Step S1506, Decryption failures, carry out antitheft instruction failure, and flow process finishes.
Step S1508, successful decryption, determine whether the mobile terminal identification (as IMEI or UID) of carrying in antitheft instruction is correct.If so, perform step S1510.If not, the transmit leg mistake of antitheft instruction sends, and this antitheft instruction be can't help this mobile terminal and carried out, and returns to execution step S1506.
The antitheft instruction that step S1510, parsing receive, obtains the antitheft order corresponding with this antitheft instruction.
Step S1512, carry out antitheft order.
Step S1514, be finished after, return to execution result to server, flow process finishes.
Finally introduce when transmit leg is PC terminal the anti-theft method for mobile terminal that the embodiment of the present invention provides.When transmit leg is PC terminal, the antitheft strategy mating with server is the antitheft strategy of PC or the antitheft strategy of account, and it is that carrier sends that note and/or network instruction are take in antitheft instruction.
When being sent as PC terminal, before receiving the antitheft instruction from PC terminal, receive the activation file from identify label PC terminal, that carry this mobile terminal and anti-theft modes sign.Preferably, activation file in the embodiment of the present invention is by data interchange format (the JavaScript Object Notation of extend markup language (XML) or lightweight, hereinafter to be referred as JSON) form, for the activation manipulation between PC terminal and mobile terminal.After receiving activation file, the embodiment of the present invention is verified activating file according to the identify label that activates the mobile terminal carrying in file.If the identify label of the mobile terminal carrying in activation file is the identify label of this mobile terminal, activate file by checking.If the identify label of the mobile terminal carrying in activation file is not the identify label of this mobile terminal, activate file not by checking.Consider PC terminal except possessing the attribute of equipment, also possess the characteristics such as online, therefore, the PC terminal scope of application is wider, can trigger different anti-theft modes.When activate file by checking after, the embodiment of the present invention can be determined and in different anti-theft modes, confirms the anti-theft modes that this adopts according to activating anti-theft modes sign that file carry.
Because anti-theft modes has diversity, anti-theft modes sign also corresponding exist multiple.The different information that can comprise according to the antitheft pattern identification of difference conversely speaking,, distinguish different anti-theft modes.The illustration that provides different anti-theft modes to identify in the embodiment of the present invention, particularly, can comprise:
Only comprise by PC, generated, with this mobile terminal one to one random string GUID first group of anti-theft modes sign, comprise second group of anti-theft modes sign of GUID and password (PASSWORD), only comprise account identifier (UID) the 3rd group of anti-theft modes sign, comprise the 4th group of anti-theft modes sign of GUID and UID and the 5th group of anti-theft modes sign that simultaneously comprises GUID, UID, PASSWORD three.
Now five groups of different anti-theft modes sign and effects thereof are described respectively.
When anti-theft modes is designated the first group of anti-theft modes sign that only comprises GUID, opens the antitheft strategy of PC, and directly carry out corresponding antitheft operation according to the antitheft order receiving.Wherein, GUID is the random string that PC generates, and this character string can be set up binding relationship one to one with mobile terminal.
When anti-theft modes is designated the second group of anti-theft modes sign that comprises GUID and PASSWORD, opens the antitheft strategy of PC, and whether PASSWORD is correctly verified.If so, carry out antitheft operation corresponding to antitheft order receiving.If not, stop response, do not carry out any operation.Wherein, the password that this PASSWORD sets in advance for user, when this password value is not sky, the embodiment of the present invention, before carrying out antitheft order, is verified this PASSWORD.
When anti-theft modes is designated the 3rd group of anti-theft modes sign that only comprises UID, open the antitheft strategy of account.Wherein, UID for user's login account name is called, generate after the account of USERSNAME for identifying the account identifier of account.
When anti-theft modes is designated the 4th group of anti-theft modes sign that comprises UID and GUID, open the antitheft strategy of PC and the antitheft strategy of account, receive from the antitheft instruction of PC terminal or UID and carry out corresponding antitheft operation.
When anti-theft modes is designated the 5th group of anti-theft modes sign that simultaneously comprises GUID, UID, PASSWORD three, open the antitheft strategy of PC and the antitheft strategy of account.And, while receiving the antitheft order from PC terminal or UID, all need first PASSWORD to be verified.Secondly, according to PASSWORD, whether by checking, carry out next step operation.Particularly, when passing through, the embodiment of the present invention is carried out antitheft operation corresponding to antitheft order receiving, and when obstructed out-of-date, the embodiment of the present invention stops response, does not carry out any operation.
It should be noted that, in the embodiment of the present invention, when anti-theft modes is designated the 3rd group of anti-theft modes sign that only comprises UID, the antitheft strategy of account of opening with above introduce when transmit leg is server, the antitheft strategy of account adopting is same anti-theft method for mobile terminal, and therefore not to repeat here.
As described above, the difference of the anti-theft modes sign of carrying in the activation file sending according to PC terminal, the embodiment of the present invention can activate different anti-theft modes.That is, when mobile terminal being carried out to antitheft operation by PC terminal, by PC terminal, can trigger a kind of antitheft strategy and send antitheft order to mobile terminal, can also trigger multiple antitheft strategy and to mobile terminal, send antitheft order simultaneously.For example, when the anti-theft modes in activating file is designated and only comprises UID or only comprise GUID, the embodiment of the present invention can only be carried out respectively the antitheft strategy of account or only be carried out the antitheft strategy of PC.When the anti-theft modes in activating file is designated and comprises UID and GUID simultaneously, the embodiment of the present invention can carry out that PC is antitheft and account is antitheft simultaneously, strengthens the anti-theft protection to mobile terminal, increases the possibility of giving mobile terminal for change.In the embodiment of the present invention, PC is antitheft comprises that by PC terminal, sending antitheft instruction to mobile terminal carries out antitheftly to mobile terminal, also comprise and activate account that mobile terminal is carried out to account is antitheft.When PC terminal activates account, mobile terminal is carried out to account when antitheft, PC terminal is only sent to account information in the mobile terminal of login side.
In the embodiment of the present invention, the difference of the antitheft strategy of PC and the antitheft strategy of account has: the ACTIONID needs in the antitheft strategy of PC and the ACTIONID in account anti-theft strategy distinguish." location " in account anti-theft strategy for example, ACTIONID is LOCATE, and plant at the antitheft strategy of PC, should be " LOCATE_PC ", but the operation of carrying out is identical.UID is GUID in the antitheft strategy of PC.That is, the information of the unique account number in mark account anti-theft is UID, and the information of the unique computer of mark PC in antitheft is GUID.If anti-theft modes is designated the mode of the anti-theft modes sign that comprises GUID and PASSWORD, also sending order needs password,, in the OTHERS of each order, adds PASSWORD part (can be attached to the last of this field).For example in the <OTHERS> of " removing data in mobile phone ", can be " 3, PASSWORD:123123123 ", " 3 " data in mobile phone type of removing of indicating wherein, and " PASSWORD: " below be exactly password.Stolen side is after receiving orders, if existing password while activating by PC, in the order of sending, also should take out <OTHERS> part, the password that takes out " PASSWORD: " below contrasts.If identical, represent that order is correct, otherwise be likely user cipher input error, or order be tampered.
In addition, in the embodiment of the present invention, can carry out personal settings to PASSWORD.If user arranges PASSWORD, before carrying out antitheft operation, this PASSWORD is verified, can avoid malice terminal to send antitheft instruction and cause mobile terminal mistake to carry out antitheft operation (as malice screen locking, reveal real-time position information etc.) causing severe consequence.User also can not carry out the setting of PASSWORD as required, directly by PC or account, carries out guarding against theft for mobile terminal, avoids complex steps.Do not need PASSWORD checking to be generally used for network environment trusty or conventional trusted terminal, as equipment such as family computer, Office PC.
In the embodiment of the present invention, after activating corresponding anti-theft modes according to the anti-theft modes sign in the activation file by checking, receive the antitheft instruction from PC terminal.After receiving, the antitheft instruction receiving is resolved, obtain the identify label of this mobile terminal of carrying in antitheft instruction.After obtaining the identify label of this mobile terminal of carrying in antitheft instruction, the embodiment of the present invention is verified identify label.If be verified, carry out operation corresponding to antitheft order, to realize guarding against theft for mobile terminal.If checking is not passed through, the embodiment of the present invention stops response, does not carry out any operation.
In the embodiment of the present invention, in the process being performed in arbitrary antitheft order, whether this antitheft order of poll inquiry runs succeeded, and if so, finishes the execution of this antitheft order, if not, again attempts carrying out this antitheft order.In the embodiment of the present invention, to the implementation status of antitheft order carry out poll inquiry guarantee acquisition for mobile terminal to antitheft order can be carried out in time, avoid causing not in time stealer to carry out brush machine to mobile terminal or other operations cannot be given for change mobile terminal because of antitheft command execution.For example, the embodiment of the present invention is about to carry out lock-screen order, and whether this lock-screen order is run succeeded and inquired about.If lock-screen order is not carried out, the embodiment of the present invention is carried out lock-screen order, and the screen of mobile terminal is locked.If the success of lock-screen command execution, the embodiment of the present invention abandons again carrying out this screen locking order.
In the embodiment of the present invention, the identify label of mobile terminal can be user identification module (Subscriber Identity Module, hereinafter to be referred as SIM) card number can be the identification information that the hardware configuration information etc. of mobile terminal arbitrarily can unique identification mobile terminal.Preferably, the embodiment of the present invention adopts International Mobile Equipment Identity identification code (the International Mobile Equipment Identity of mobile terminal, hereinafter to be referred as IMEI) as the identify label of this mobile terminal, IMEI itself is lifelong binding and unique constant with mobile terminal, and identifiability is high, therefore, in the embodiment of the present invention, unique identify label that preferably IMEI is this mobile terminal.
In addition, in the embodiment of the present invention, PC terminal can be connected and be got through by wired or wireless mode with this mobile terminal.For example, PC terminal and this mobile terminal can pass through USB (Universal Serial Bus, hereinafter to be referred as USB) data wire and connect.Again for example, PC terminal can be connected by wireless modes such as bluetooth, wireless networks with this mobile terminal.In the embodiment of the present invention, PC terminal can be connected and be got through by wired or wireless mode with this mobile terminal, facilitate PC terminal and mobile terminal in several ways or means connect and get through, and then can to mobile terminal, carry out by PC terminal antitheftly, effectively guarantee the fail safe of mobile terminal.
The specific embodiment of now take describes anti-theft method for mobile terminal of the present invention (transmit leg is PC terminal).
Embodiment tri-
Figure 16 and Figure 17 show the process chart of anti-theft method for mobile terminal in accordance with a preferred embodiment of the present invention, for supporting above-mentioned any one anti-theft method for mobile terminal, above-mentioned anti-theft method for mobile terminal are set forth more clear understandablely.It should be noted that, for this preferred embodiment being set forth more simply clear, in this preferred embodiment, mobile terminal is set to mobile phone.
Figure 16 shows the process chart of the method for the anti-theft feature that Activates Phone of PC terminal one side according to an embodiment of the invention.Referring to Figure 16, this flow process at least comprises that step S1602 is to step S1616.
Step S1602, judge whether PC terminal and mobile phone connect.If so, perform step S1604, if not, flow process finishes.
Step S1604, obtain the identify label IMEI of mobile phone.
Step S1606, judge whether user's login account activates.If not, execution step S1608, if so, performs step S1610.
Step S1608, to server, send PC binding (Bind_By_PC) instruction.
If according to the judged result of step S1606, the un-activation of user's login account, triggers the antitheft strategy of PC, by PC terminal, directly sends antitheft instruction to server, or, at input PASSWORD and after by checking, send antitheft instruction to server.Wherein, the form of this antitheft instruction can comprise order numbering (ACTIONID), mission number (TASKID) and additional information (OTHERS).For example, ACTIONID is Bind_By_PC, TASKID be 0 and OTHERS be GUID, IMEI and password three.
Step S1610, to server, send Bind instruction.
If according to the judged result of step S1606, user's login account activates, triggers the antitheft strategy of account.
Step S1612, generation activate file.
IMEI and anti-theft modes sign that generation carries mobile phone activate file.Wherein, if it is antitheft only to need mobile phone to open PC, anti-theft modes is designated and only comprises GUID or comprise GUID and PASSWORD.If only need mobile phone unlatching account antitheft, anti-theft modes is designated and only comprises UID.If mobile phone need to be opened, PC is antitheft and account is antitheft, and anti-theft modes sign comprises GUID and UID or comprises GUID, UID and PASSWORD three simultaneously.
Step S1614, activation file is sent to mobile phone.
Step S1616, notice mobile phone read and activate file and open.
Particularly, in mobile phone Android system, reading the step that activates file and open is: startup process, its process name and parameter are: adb shell am start-a BIND_FROM_PC-n com.qihoo360.mobilesafe/com.qihoo360.mobilesafe.PortalAc tivity-d/mnt/sdcard/Protection.dat.Wherein: BIND_FROM_PC represents the Action of an Intent.Com.qihoo360.mobilesafe represents the bag name of Android application.Com.qihoo360.PortalActivity represents to be really used for processing the Activity activating./ mnt/sdcard/Protection.dat represents to get through the path that file is put.
Figure 17 shows according to the process chart of the theft preventing method of one embodiment of the invention mobile phone one side.Referring to Figure 17, this flow process at least comprises that step S1702 is to step S1724.
Step S1702, receive the activation instruction that PC terminal sends, judge its legitimacy.
Mobile phone judges whether the order in activation instruction is Bind_From_PC, and obtains the field in instruction after receiving the activation instruction of PC terminal transmission, checks whether this field is the path of complete activation file.If the order in activation instruction is Bind_From_PC, decision instruction is legal, execution step S1704, if illegal, flow process finishes.
Step S1704, parsing activate file, obtain and activate the IMEI carrying in file.
Step S1706, judge that whether IMEI is correct, if so, perform step S1708, if not, execution step S1710.
Step S1708, read and activate the anti-theft modes sign of carrying in file, and preserve.
In this locality, preserve following information:
When anti-theft modes sign only comprises GUID, open the antitheft strategy of PC, directly carry out operation corresponding to antitheft order.
When anti-theft modes sign comprises GUID and PASSWORD, open the antitheft strategy of PC, whether PASSWROD is correct in checking; If so, carry out operation corresponding to antitheft order; If not, stop response.
When anti-theft modes sign comprises UID, open the antitheft strategy of account, in this mobile terminal, login USERNAME, receive from the antitheft order of UID and carry out corresponding operation.
When anti-theft modes sign comprises GUID and UID, open the antitheft strategy of PC and the antitheft strategy of account, receive from the antitheft order of PC terminal or UID and carry out corresponding operation.
When anti-theft modes sign comprises GUID, UID and PASSWORD, open the antitheft strategy of PC and the antitheft strategy of account, receive from PC terminal or the antitheft order of stating UID and all PASSWORD is verified; If be verified, carry out operation corresponding to antitheft order receiving; If checking is not passed through, stop response.
In this mobile terminal, receive after command adapted thereto and can open different anti-theft modes, now how mobile terminal self is arranged to respective attributes value open different anti-theft modes and describe.
When anti-theft modes sign only comprises GUID:
1. arrange in option, " the antitheft indications value of PC " is set to GUID value.
2. arrange in option, " opening the antitheft value of PC " is true.
When anti-theft modes sign comprises GUID and PASSWORD:
1. arrange in option, " the antitheft indications value of PC " is set to GUID value.
2. arrange in option, " PC anti-theft cipher value " is password value.
3. arrange in option, " opening the antitheft value of PC " is true.
When anti-theft modes sign comprises UID:
1. arrange in option, " account number identity value " is set to UID value.
2. arrange in option, " account number name value " is set to USERNAME value.
3. arrange in option, " opening account anti-theft value " is True.
Attention: herein do not arrange " opening the antitheft value of PC ", because it is antitheft not open PC.
When anti-theft modes sign comprises GUID and UID:
1. arrange in option, " the antitheft indications value of PC " is GUID value.
2. arrange in option, " account number identity value " is UID value.
3. arrange in option, " account number name value " is set to USERNAME value.
4. arrange in option, " opening account anti-theft value " is true.
5. arrange in option, " opening the antitheft value of PC " is true.
When anti-theft modes sign comprises GUID, UID and PASSWORD:
1. arrange in option, " the antitheft indications value of PC " is GUID value.
2. arrange in option, " PC anti-theft cipher value " is password value.
3. arrange in option, " account number identity value " is UID value.
4. arrange in option, " account number name value " is set to USERNAME value.
5. arrange in option, " opening account anti-theft value " is true.
6. arrange in option, " opening the antitheft value of PC " is true.
When anti-theft modes sign comprises other situations, all by failure handling.
Step S1710, the failure of opening anti-theft function.
Step S1712, the success of opening anti-theft function.
The antitheft instruction that step S1714, reception PC terminal send.
Step S1716, resolve antitheft instruction, obtain antitheft order and identify label.
Step S1718, the identify label of carrying in antitheft instruction is verified.If be verified, execution step S1720, if checking is not passed through, flow process finishes.
Step S1720, carry out operation corresponding to antitheft order.
Whether step S1722, the antitheft order of poll inquiry run succeeded.If so, perform step S324, if not, continue to carry out this step.
Step S1724, the success of antitheft command execution, return to execution result to PC terminal, and flow process finishes.
Above describe in detail in the embodiment of the present invention, when transmit leg is respectively mobile terminal, server and PC terminal, the handling process of the mobile theft preventing method of the embodiment of the present invention.Wherein, after complete to antitheft command execution, the embodiment of the present invention all sends receipt to antitheft instruction transmit leg.When uncertain transmit leg identity, after antitheft command execution is complete, first judge receipt type, secondly, according to the difference of receipt type, attempt receipt number of times different.For example, when carrying out the antitheft strategy of PC, by network, send receipt to PC terminal, this law has been implemented to arrange and has been attempted sending 10 receipts to PC terminal.When carrying out the antitheft strategy of note, the embodiment of the present invention directly sends receipt to mobile terminal.For avoiding causing the vigilance of stealer, reduce receipt transmission times to 5 time.When carrying out the antitheft strategy of account, for reducing, consume note number, the embodiment of the present invention sends receipt to server by network, if attempt repeatedly sending (as 8 times), still sending unsuccessfully, attempt take note as carrier sends receipt to mobile terminal, is 2 times as number of attempt can be set.
When mobile terminal is carried out to anti-theft protection; the embodiment of the present invention can only be used a kind of in the antitheft strategy of note, the antitheft strategy of account and the antitheft strategy of PC to carry out anti-theft protection to mobile terminal, can also use any two kinds or simultaneously use three kinds of antitheft strategies to carry out anti-theft protection to mobile terminal in above-mentioned three kinds of antitheft strategies simultaneously.Therefore,, in the process being performed in arbitrary antitheft order, whether this order of embodiment of the present invention poll inquiry runs succeeded.As Figure 18 shows the process chart that according to an embodiment of the invention command execution situation is carried out poll inquiry.As shown in figure 18, when the embodiment of the present invention is about to fill order, carry out the step S1802 in Figure 18, whether the antitheft order that judgement is about to carry out is carried out.If according to judged result, this antitheft order is not carried out, and performs step S1806, carries out this antitheft order, and flow process finishes.If according to judged result, this antitheft order is carried out, and performs step S1804.In step S1804, if this antitheft order of judgement is performed simultaneously the above whether mutual exclusion of twice or twice.If mutual exclusion, performs step S1808, carry out antitheft order unsuccessfully, flow process finishes.If not mutual exclusion, performs step S1806, carry out this antitheft order, flow process finishes.
In the embodiment of the present invention, to the implementation status of antitheft order carry out poll inquiry guarantee acquisition for mobile terminal to antitheft order can be carried out in time, avoid causing not in time stealer to carry out brush machine to mobile terminal or other operations cannot be given for change mobile terminal because of antitheft command execution.For example, the embodiment of the present invention is about to carry out lock-screen order, and whether this lock-screen order is carried out and inquired about.If lock-screen order is not carried out, the embodiment of the present invention is carried out lock-screen order, and the screen of mobile terminal is locked.If lock-screen order is carried out, and mobile terminal screen cannot be repeatedly locked, can judge that it is mutual exclusion that lock-screen is carried out more than twice and twice, and the embodiment of the present invention abandons carrying out this screen locking order.Again for example, the embodiment of the present invention is about to carry out release person is taken pictures to collect evidence and orders, and whether this order is being carried out to the evidence obtaining order of taking pictures and is judging.If according to judged result, this order is not carried out, and the embodiment of the present invention is carried out the evidence obtaining order of taking pictures.If according to judged result, this order is carried out, and the evidence obtaining order of taking pictures can be performed more than twice or twice, not mutual exclusion, and the embodiment of the present invention continues to carry out this evidence obtaining order of taking pictures.
Anti-theft method for mobile terminal based on above each preferred embodiment provides, based on same inventive concept, the embodiment of the present invention provides a kind of guarding against theft for mobile terminal client, for realizing above-mentioned anti-theft method for mobile terminal.
Figure 19 shows the structural representation of guarding against theft for mobile terminal client according to an embodiment of the invention.Referring to Figure 19, the client of the embodiment of the present invention at least comprises: determination module 1920, parsing module 1940 and Executive Module 1950.
Now introduce each device of guarding against theft for mobile terminal client or the function of composition and the annexation between each several part of the embodiment of the present invention:
Determination module 1920, is configured to according to determine the identity information of transmit leg from the antitheft instruction of transmit leg.
Parsing module 1940, is coupled with determination module 1920, is configured to start the antitheft instruction of antitheft policy resolution of mating with transmit leg identity information, obtains antitheft order corresponding to this instruction.
Executive Module 1950, is coupled with parsing module 1940, is configured to carry out operation corresponding to antitheft order, to realize guarding against theft for mobile terminal.
In embodiments of the present invention, can be according to determine the identity information of transmit leg from the antitheft instruction of transmit leg, start the antitheft instruction of antitheft policy resolution of mating with transmit leg identity information, obtain antitheft order corresponding to this instruction, and carry out operation corresponding to antitheft order, to realize guarding against theft for mobile terminal.As can be seen here, antitheft instruction in the embodiment of the present invention can be from equipment or the terminal (if the transmit leg of antitheft instruction is mobile terminal or server or PC) that can send note, can also be from equipment or the terminal that can send network instruction.Can send at present equipment or the terminal a lot (such as mobile phone, computer, flat board etc.) of note or network instruction, and by note or network instruction send antitheft instruction timeliness fast, arrive accurate, can save flow and the electric quantity consumption of stolen mobile terminal, for giving stolen mobile terminal for change, provide the more time, thereby can realize quickly and easily the antitheft of mobile terminal, solved in prior art, after mobile terminal is stolen, cannot continue mobile terminal to carry out antitheft problem.After the embodiment of the present invention is determined the identity information of transmit leg; start the antitheft instruction of antitheft policy resolution of mating with transmit leg identity information; obtain corresponding antitheft order, guarantee need to select suitable antitheft strategy to carry out anti-theft protection to mobile terminal according to user.And, in the embodiment of the present invention, according to the identity information of transmit leg, can mate a kind of antitheft strategy mobile terminal is carried out to anti-theft protection, can also match multiple antitheft strategy and mobile terminal be carried out to anti-theft protection simultaneously, strengthen the fail safe of mobile terminal.In addition, in the embodiment of the present invention, after mobile terminal is stolen, still can receive the antitheft instruction of transmit leg, and according to the antitheft operation of antitheft command execution of resolving antitheft instruction acquisition.For example, after customer mobile terminal is lost, by sending antitheft instruction to stolen mobile terminal, the embodiment of the present invention can be carried out screen locking operation to stolen mobile terminal, stops stealer to use mobile terminal.Stealer cannot be used mobile terminal to cause stealer to renovate mobile terminal by operations such as brush machines, and then stealer cannot be resell stolen mobile terminal to earn a profit.Further, can effectively reduce the probability that stealing crime occurs.In addition, according to the antitheft instruction receiving, the embodiment of the present invention can also be obtained the identification information (as the photo of stealer, fingerprint etc.) of stealer.Get the identification information of stealer according to the embodiment of the present invention after, can to stealer, arrest according to above-mentioned identification information.Therefore, the embodiment of the present invention can reach terminal and effectively terminal be carried out after stolen antitheftly, and reduces the beneficial effect of stealing crime rate, protection user property safety.
In a preferred embodiment, determination module 1920 is also configured to:
Obtain the spcial character carrying in antitheft instruction, wherein, spcial character is specific character string;
According to spcial character, determine the identity information of transmit leg.
In a preferred embodiment, the identity information of transmit leg comprise following one of at least:
Transmit leg is mobile terminal;
Transmit leg is server;
Transmit leg is PC PC terminal.
In a preferred embodiment, also comprise judge module 1910, be configured to:
While receiving respectively the antitheft instruction that the different transmit leg of identity information sends, the antitheft order the mutual exclusion whether antitheft order that judgement parses in the antitheft instruction of rear reception parses with antitheft instruction in front reception;
If so, refusal is carried out a rear antitheft order;
If not, continue to carry out a rear antitheft order.
In a preferred embodiment, also comprise:
When transmit leg is mobile terminal, the antitheft strategy of coupling is the antitheft strategy of note;
When transmit leg is server, the antitheft strategy of coupling is the antitheft strategy of account;
When transmit leg is PC terminal, the antitheft strategy of coupling is the antitheft strategy of PC or the antitheft strategy of account.
In a preferred embodiment, also comprise:
When transmit leg is mobile terminal, the transmission carrier of antitheft instruction is note;
When transmit leg is server, the transmission carrier of antitheft instruction is: note and/or network instruction;
When transmit leg is PC terminal, the transmission carrier of antitheft instruction is: note and/or network instruction.
In a preferred embodiment, judge module 1910 is also configured to:
While utilizing note as the transmission carrier of antitheft instruction, before determining the identity information of transmit leg, whether the note that judgement is received carries antitheft instruction;
If so, tackle this note, the definite operation of identity information of obtaining antitheft instruction and triggering transmit leg;
If not, this note of letting pass.
In a preferred embodiment, parsing module 1940 is also configured to: when transmit leg is mobile terminal,
Start the antitheft instruction of the antitheft policy resolution of note, obtain mobile terminal identification and/or the password of transmit leg;
The trusted mobile terminal identification that the mobile terminal identification of the transmit leg obtaining is prestored with this mobile terminal is mated, and/or the password that the password obtaining is prestored with this mobile terminal mates;
If both can mate, resolve and obtain antitheft order corresponding to this instruction.
In a preferred embodiment, the mobile terminal identification of transmit leg comprise following one of at least: the International Mobile Equipment Identity identification code IMEI of the subscriber identification module SIM card of the telephone number of transmit leg, transmit leg number, transmit leg.
In a preferred embodiment, the password that this mobile terminal prestores comprise following one of at least:
The mobile terminal identification of transmit leg;
The character string of the proof transmit leg identity setting in advance.
In a preferred embodiment, when transmit leg is server, antitheft instruction is sent to server by Activating Account, and by server, is forwarded to this mobile terminal, triggers antitheft operation.
In a preferred embodiment, Activated Account and logined in can triggering mobile terminals antitheft client, wherein, client comprise following one of at least: browser, mobile phone side be the client with mobile phone burglary-resisting function with the client of mobile phone burglary-resisting function, PC side.
In a preferred embodiment, determination module 1920 is also configured to receive antitheft instruction that described server forwards, that Activate Account and send by note and/or network instruction.
In a preferred embodiment, the content of note and/or network instruction is except comprising spcial character, also comprise following one of at least: the sign that Activated Account, antitheft order, antitheft object identity.
In a preferred embodiment, also comprise:
Spcial character is Account;
Having Activated Account while being designated current login is the unique account identification code UID generating the account;
Antitheft order comprises order numbering and/or mission number;
Antitheft object identity comprises the IMEI of this mobile terminal.
In a preferred embodiment, also comprise:
Active module 1960, is configured to transmit leg while being PC terminal, and before starting the antitheft instruction of antitheft policy resolution of mating with transmit leg identity information, reception is from the activation file of PC terminal; Wherein, activate identify label and the anti-theft modes sign that file carries this mobile terminal;
According to identify label, described activation file is verified;
If be verified, according to anti-theft modes sign, activate different anti-theft modes.
In a preferred embodiment, active module is also configured to:
If anti-theft modes is designated PC anti-theft modes sign, activate the antitheft strategy of PC;
If anti-theft modes is designated account anti-theft modes sign, activate the antitheft strategy of account.
In a preferred embodiment, anti-theft modes sign comprise following one of at least:
That PC terminal generates, with this mobile terminal random string GUID one to one;
After user's login account, generate for identifying the account identifier UID of account, wherein, the account name of the user of UID login is called USERNAME;
Password PASSWORD.
In a preferred embodiment, active module 1960 is also configured to:
If when anti-theft modes sign only comprises GUID, activate the antitheft strategy of PC, directly carry out operation corresponding to antitheft order;
If when anti-theft modes sign comprises GUID and PASSWORD, activate the antitheft strategy of PC, whether PASSWROD is correct in checking; If so, carry out operation corresponding to antitheft order; If not, stop response;
When if anti-theft modes sign comprises UID, activate the antitheft strategy of account, in this mobile terminal, login USERNAME, receive from the antitheft order of UID and carry out corresponding operation;
When if anti-theft modes sign comprises GUID and UID, activate the antitheft strategy of PC and the antitheft strategy of account, receive from the antitheft order of PC terminal or UID and carry out corresponding operation;
If anti-theft modes sign comprises GUID, UID and PASSWORD, activate the antitheft strategy of PC and the antitheft strategy of account, receive from the antitheft order of PC terminal or UID and all PASSWORD is verified; If be verified, carry out operation corresponding to antitheft order receiving; If checking is not notified, stop response.
In a preferred embodiment, also comprise:
Deciphering module 1930, while being configured in antitheft order that the content except spcial character is encrypted content, adopts corresponding deciphering means to be decrypted the antitheft instruction receiving, and obtains the resolved content of antitheft instruction.
In a preferred embodiment, cipher mode is des encryption, and manner of decryption is DES deciphering.
In a preferred embodiment, the antitheft instruction of encryption comprises following at least one:
Delete data in mobile phone instruction;
The instruction of backup data in mobile phone.
In a preferred embodiment, also comprise:
Poll module 1970, is configured to when arbitrary antitheft order is carried out, and whether poll inquiry it run succeeded;
If so, finish the execution of this antitheft order;
If not, again attempt carrying out this antitheft order.
In a preferred embodiment, poll module 1970 is also configured to: if do not receive the receipt of Requested Party at the appointed time, whether receipt is successful for poll inquiry;
If so, finish receipt inquiry;
If not, again ask receipt.
According to the combination of above-mentioned any one preferred embodiment or a plurality of preferred embodiments, the embodiment of the present invention can reach following beneficial effect:
In embodiments of the present invention, can be according to determine the identity information of transmit leg from the antitheft instruction of transmit leg, start the antitheft instruction of antitheft policy resolution of mating with transmit leg identity information, obtain antitheft order corresponding to this instruction, and carry out operation corresponding to antitheft order, to realize guarding against theft for mobile terminal.As can be seen here, antitheft instruction in the embodiment of the present invention can be from equipment or the terminal (if the transmit leg of antitheft instruction is mobile terminal or server or PC) that can send note, can also be from equipment or the terminal that can send network instruction.Can send at present equipment or the terminal a lot (such as mobile phone, computer, flat board etc.) of note or network instruction, and by note or network instruction send antitheft instruction timeliness fast, arrive accurate, can save flow and the electric quantity consumption of stolen mobile terminal, for giving stolen mobile terminal for change, provide the more time, thereby can realize quickly and easily the antitheft of mobile terminal, solved in prior art, after mobile terminal is stolen, cannot continue mobile terminal to carry out antitheft problem.After the embodiment of the present invention is determined the identity information of transmit leg; start the antitheft instruction of antitheft policy resolution of mating with transmit leg identity information; obtain corresponding antitheft order, guarantee need to select suitable antitheft strategy to carry out anti-theft protection to mobile terminal according to user.And, in the embodiment of the present invention, according to the identity information of transmit leg, can mate a kind of antitheft strategy mobile terminal is carried out to anti-theft protection, can also match multiple antitheft strategy and mobile terminal be carried out to anti-theft protection simultaneously, strengthen the fail safe of mobile terminal.In addition, in the embodiment of the present invention, after mobile terminal is stolen, still can receive the antitheft instruction of transmit leg, and according to the antitheft operation of antitheft command execution of resolving antitheft instruction acquisition.For example, after customer mobile terminal is lost, by sending antitheft instruction to stolen mobile terminal, the embodiment of the present invention can be carried out screen locking operation to stolen mobile terminal, stops stealer to use mobile terminal.Stealer cannot be used mobile terminal to cause stealer to renovate mobile terminal by operations such as brush machines, and then stealer cannot be resell stolen mobile terminal to earn a profit.Further, can effectively reduce the probability that stealing crime occurs.In addition, according to the antitheft instruction receiving, the embodiment of the present invention can also be obtained the identification information (as the photo of stealer, fingerprint etc.) of stealer.Get the identification information of stealer according to the embodiment of the present invention after, can to stealer, arrest according to above-mentioned identification information.Therefore, the embodiment of the present invention can reach terminal and effectively terminal be carried out after stolen antitheftly, and reduces the beneficial effect of stealing crime rate, protection user property safety.
In the specification that provided herein, a large amount of details have been described.Yet, can understand, embodiments of the invention can not put into practice in the situation that there is no these details.In some instances, be not shown specifically known method, structure and technology, so that not fuzzy understanding of this description.
Similarly, be to be understood that, in order to simplify the disclosure and to help to understand one or more in each inventive aspect, in the above in the description of exemplary embodiment of the present invention, each feature of the present invention is grouped together into single embodiment, figure or sometimes in its description.Yet, the method for the disclosure should be construed to the following intention of reflection: the present invention for required protection requires than the more feature of feature of clearly recording in each claim.Or rather, as reflected in claims below, inventive aspect is to be less than all features of disclosed single embodiment above.Therefore, claims of following embodiment are incorporated to this embodiment thus clearly, and wherein each claim itself is as independent embodiment of the present invention.
Those skilled in the art are appreciated that and can the module in the equipment in embodiment are adaptively changed and they are arranged in one or more equipment different from this embodiment.Module in embodiment or unit or assembly can be combined into a module or unit or assembly, and can put them into a plurality of submodules or subelement or sub-component in addition.At least some in such feature and/or process or unit are mutually repelling, and can adopt any combination to combine all processes or the unit of disclosed all features in this specification (comprising claim, summary and the accompanying drawing followed) and disclosed any method like this or equipment.Unless clearly statement in addition, in this specification (comprising claim, summary and the accompanying drawing followed) disclosed each feature can be by providing identical, be equal to or the alternative features of similar object replaces.
In addition, those skilled in the art can understand, although embodiment more described herein comprise some feature rather than further feature included in other embodiment, the combination of the feature of different embodiment means within scope of the present invention and forms different embodiment.For example, in claims, the one of any of embodiment required for protection can be used with compound mode arbitrarily.
All parts embodiment of the present invention can realize with hardware, or realizes with the software module moved on one or more processor, or realizes with their combination.It will be understood by those of skill in the art that and can use in practice microprocessor or digital signal processor (DSP) to realize according to the some or all functions of the some or all parts in the guarding against theft for mobile terminal equipment of the embodiment of the present invention.The present invention for example can also be embodied as, for carrying out part or all equipment or device program (, computer program and computer program) of method as described herein.Realizing program of the present invention and can be stored on computer-readable medium like this, or can there is the form of one or more signal.Such signal can be downloaded and obtain from internet website, or provides on carrier signal, or provides with any other form.
It should be noted above-described embodiment the present invention will be described rather than limit the invention, and those skilled in the art can design alternative embodiment in the situation that do not depart from the scope of claims.In the claims, any reference symbol between bracket should be configured to limitations on claims.Word " comprises " not to be got rid of existence and is not listed as element or step in the claims.Being positioned at word " " before element or " one " does not get rid of and has a plurality of such elements.The present invention can be by means of including the hardware of some different elements and realizing by means of the computer of suitably programming.In having enumerated the unit claim of some devices, several in these devices can be to carry out imbody by same hardware branch.The use of word first, second and C grade does not represent any order.Can be title by these word explanations.
So far, those skilled in the art will recognize that, although detailed, illustrate and described a plurality of exemplary embodiment of the present invention herein, but, without departing from the spirit and scope of the present invention, still can directly determine or derive many other modification or the modification that meets the principle of the invention according to content disclosed by the invention.Therefore, scope of the present invention should be understood and regard as and cover all these other modification or modifications.
The embodiment of the invention also discloses A1, a kind of anti-theft method for mobile terminal, comprising:
According to determine the identity information of described transmit leg from the antitheft instruction of transmit leg;
Antitheft instruction described in the antitheft policy resolution that startup is mated with described transmit leg identity information, obtains antitheft order corresponding to this instruction;
Carry out operation corresponding to described antitheft order, to realize guarding against theft for mobile terminal.
A2, according to the method described in A1, wherein, described basis is determined the identity information of described transmit leg from the antitheft instruction of transmit leg, comprising:
Obtain the spcial character carrying in described antitheft instruction, wherein, described spcial character is specific character string;
According to described spcial character, determine the identity information of described transmit leg.
A3, according to the method described in A1 or A2, wherein, the identity information of described transmit leg comprise following one of at least:
Described transmit leg is mobile terminal;
Described transmit leg is server;
Described transmit leg is PC PC terminal.
A4, according to the method described in A3, wherein, also comprise:
While receiving respectively the antitheft instruction that the different transmit leg of identity information sends, the antitheft order the mutual exclusion whether antitheft order that judgement parses in the antitheft instruction of rear reception parses with antitheft instruction in front reception;
If so, refusal is carried out a rear antitheft order;
If not, continue to carry out a rear antitheft order.
A5, according to the method described in A3 or A4, wherein,
When described transmit leg is mobile terminal, the antitheft strategy of coupling is the antitheft strategy of note;
When described transmit leg is server, the antitheft strategy of coupling is the antitheft strategy of account;
When described transmit leg is PC terminal, the antitheft strategy of coupling is the antitheft strategy of PC or the antitheft strategy of described account.
A6, according to the method described in A3 to A5 any one, wherein,
When described transmit leg is mobile terminal, the transmission carrier of described antitheft instruction is note;
When described transmit leg is server, the transmission carrier of described antitheft instruction is: note and/or network instruction;
When described transmit leg is PC terminal, the transmission carrier of described antitheft instruction is: note and/or network instruction.
A7, according to the method described in A6, wherein, while utilizing note as the transmission carrier of described antitheft instruction, before determining the identity information of described transmit leg, also comprise:
Whether the note that judgement is received carries described antitheft instruction;
If so, tackle this note, the definite operation of identity information of obtaining described antitheft instruction and triggering described transmit leg;
If not, this note of letting pass.
A8, according to the method described in A1 to A7 any one, wherein, when described transmit leg is mobile terminal, start antitheft instruction described in the antitheft policy resolution mate with described transmit leg identity information, comprising:
Start antitheft instruction described in the antitheft policy resolution of note, obtain mobile terminal identification and/or the password of described transmit leg;
The trusted mobile terminal identification that the mobile terminal identification of the described transmit leg obtaining is prestored with this mobile terminal is mated, and/or the password that the password obtaining is prestored with this mobile terminal mates;
If both can mate, resolve and obtain antitheft order corresponding to this instruction.
A9, according to the method described in A8, wherein, the mobile terminal identification of described transmit leg comprise following one of at least: the international mobile terminal identity code IMEI of the subscriber identification module SIM card of the telephone number of described transmit leg, described transmit leg number, described transmit leg.
A10, according to the method described in A8 or A9, wherein, the password that described mobile terminal prestores comprise following one of at least:
The mobile terminal identification of described transmit leg;
The character string of the described transmit leg identity of proof setting in advance.
A11, according to the method described in A1 to A10 any one, wherein, when described transmit leg is server, described antitheft instruction is sent to described server by Activating Account, and by described server, is forwarded to this mobile terminal, triggers antitheft operation.
A12, according to the method described in A11, wherein, described having Activated Account logined in can triggering mobile terminals antitheft client, wherein, described client comprise following one of at least: browser, mobile phone side be the client with mobile phone burglary-resisting function with the client of mobile phone burglary-resisting function, PC side.
A13, according to the method described in A11 or A12, wherein, described antitheft instruction is sent to described server by Activating Account, and comprising:
At the list of devices of the described middle binding that Activated Account, select this mobile terminal that carries out antitheft operation, wherein, in list of devices, store the sign with at least one mobile terminal of the described binding that Activated Account;
By described having Activated Account, the antitheft instruction for this mobile terminal is sent to described server.
A14, according to the method described in A13, wherein, if carry out the sign of this mobile terminal of antitheft operation, be not stored in described list of devices, by described Activated Account input this mobile terminal sign; And, by described server, described antitheft instruction is sent in the mobile terminal of sign correspondence of this mobile terminal.
A15, according to the method described in A14, wherein, the sign of described mobile terminal is stored in described list of devices.
A16, according to the method described in A13 to A15 any one, wherein, described having Activated Account is sent to described server by note and/or network instruction by described antitheft instruction.
A17, according to the method described in A16, wherein, the content of described antitheft instruction is except comprising described spcial character, also comprise following one of at least: the described sign that Activated Account, antitheft order, antitheft object identity.
A18, according to the method described in A17, wherein,
Described spcial character is Account;
Described having Activated Account while being designated current login is the unique account identification code UID generating the account;
Described antitheft order comprises order numbering and/or mission number;
Described antitheft object identity comprises the IMEI of this mobile terminal.
A19, according to the method described in A1 to A18 any one, when described transmit leg is PC terminal, start described in the antitheft policy resolution mate with described transmit leg identity information before antitheft instruction, also comprise:
Reception is from the activation file of described PC terminal, and wherein, described activation file carries identify label and the anti-theft modes sign of described mobile terminal;
According to described identify label, described activation file is verified;
If be verified, according to described anti-theft modes sign, activate different anti-theft modes.
A20, according to the method described in A19, wherein, according to described anti-theft modes sign, activate different anti-theft modes, comprising:
If described anti-theft modes is designated PC anti-theft modes sign, activate the antitheft strategy of PC;
If described anti-theft modes is designated account anti-theft modes sign, activate the antitheft strategy of account.
A21, according to the method described in A19 or A20, wherein, described anti-theft modes sign comprise following one of at least:
That described PC terminal generates, with this mobile terminal random string GUID one to one;
After user's login account, generate for identifying the account identifier UID of account, wherein, the account name of the user of UID login is called USERNAME;
Password PASSWORD.
A22, according to the method described in A19 to A21 any one, wherein, according to described anti-theft modes sign, activate different anti-theft modes, comprising:
If when described anti-theft modes sign only comprises described GUID, activate the antitheft strategy of PC, directly carry out operation corresponding to described antitheft order;
If when described anti-theft modes sign comprises described GUID and described PASSWORD, activate the antitheft strategy of PC, verify that whether described PASSWROD is correct; If so, carry out operation corresponding to described antitheft order; If not, stop response;
If when described anti-theft modes sign comprises described UID, activate the antitheft strategy of account, in described mobile terminal, login described USERNAME, receive from the antitheft order of described UID and carry out corresponding operation;
If when described anti-theft modes sign comprises described GUID and described UID, activate the antitheft strategy of PC and the antitheft strategy of account, receive from the antitheft order of PC terminal or described UID and carry out corresponding operation;
If described anti-theft modes sign comprises described GUID, described UID and described PASSWORD, activate the antitheft strategy of PC and the antitheft strategy of account, receive from the antitheft order of described PC terminal or described UID and all described PASSWORD is verified; If be verified, carry out operation corresponding to antitheft order receiving; If checking is not notified, stop response.
A23, according to the method described in A19 to A23, wherein, described PC terminal is connected by wired or wireless mode with this mobile terminal, wherein, described wired mode comprises USB connecting line, described wireless mode comprises wireless network.
A24, according to the method described in A2 to A23 any one, wherein, the content in described antitheft order except described spcial character is encrypted content; And
Adopt corresponding deciphering means to be decrypted the antitheft instruction receiving, obtain the resolved content of described antitheft instruction.
A25, according to the method described in A24, wherein, cipher mode is des encryption, manner of decryption is DES deciphering.
A26, according to the method described in A24 or A25, wherein, the antitheft instruction of encryption comprises following at least one:
Delete data in mobile phone instruction;
The instruction of backup data in mobile phone.
A27, according to the method described in A1 to A26 any one, wherein, when arbitrary antitheft order is carried out, whether poll inquiry it run succeeded;
If so, finish the execution of this antitheft order;
If not, again attempt carrying out this antitheft order.
A28, according to the method described in A1 to A27 any one, wherein, if do not receive the receipt of Requested Party at the appointed time, whether receipt success of poll inquiry;
If so, finish receipt inquiry;
If not, again ask receipt.
The embodiment of the invention also discloses B29, a kind of guarding against theft for mobile terminal client, comprising:
Determination module, is configured to according to determine the identity information of described transmit leg from the antitheft instruction of transmit leg;
Parsing module, is configured to start antitheft instruction described in the antitheft policy resolution mate with described transmit leg identity information, obtains antitheft order corresponding to this instruction;
Executive Module, is configured to carry out operation corresponding to described antitheft order, to realize guarding against theft for mobile terminal.
30,, according to the client described in B29, wherein, described determination module is also configured to:
Obtain the spcial character carrying in described antitheft instruction, wherein, described spcial character is specific character string;
According to described spcial character, determine the identity information of described transmit leg.
B31, according to the client described in B29 or B30, wherein, the identity information of described transmit leg comprise following one of at least:
Described transmit leg is mobile terminal;
Described transmit leg is server;
Described transmit leg is PC PC terminal.
B32, according to the client described in B31, wherein, also comprise judge module, be configured to:
While receiving respectively the antitheft instruction that the different transmit leg of identity information sends, the antitheft order the mutual exclusion whether antitheft order that judgement parses in the antitheft instruction of rear reception parses with antitheft instruction in front reception;
If so, refusal is carried out a rear antitheft order;
If not, continue to carry out a rear antitheft order.
B33, according to the client described in B31 or B32, wherein,
When described transmit leg is mobile terminal, the antitheft strategy of coupling is the antitheft strategy of note;
When described transmit leg is server, the antitheft strategy of coupling is the antitheft strategy of account;
When described transmit leg is PC terminal, the antitheft strategy of coupling is the antitheft strategy of PC or the antitheft strategy of described account.
B34, according to the client described in B31 or B33 any one, wherein,
When described transmit leg is mobile terminal, the transmission carrier of described antitheft instruction is note;
When described transmit leg is server, the transmission carrier of described antitheft instruction is: note and/or network instruction;
When described transmit leg is PC terminal, the transmission carrier of described antitheft instruction is: note and/or network instruction.
B35, according to the client described in B34, wherein, described judge module is also configured to:
While utilizing note as the transmission carrier of described antitheft instruction, before determining the identity information of described transmit leg, whether the note that judgement is received carries described antitheft instruction;
If so, tackle this note, the definite operation of identity information of obtaining described antitheft instruction and triggering described transmit leg;
If not, this note of letting pass.
B36, according to the client described in B29 to B35 any one, wherein, described parsing module is also configured to: when described transmit leg is mobile terminal,
Start antitheft instruction described in the antitheft policy resolution of note, obtain mobile terminal identification and/or the password of described transmit leg;
The trusted mobile terminal identification that the mobile terminal identification of the described transmit leg obtaining is prestored with this mobile terminal is mated, and/or the password that the password obtaining is prestored with this mobile terminal mates;
If both can mate, resolve and obtain antitheft order corresponding to this instruction.
B37, according to the client described in B36, wherein, the mobile terminal identification of described transmit leg comprise following one of at least: the International Mobile Equipment Identity identification code IMEI of the subscriber identification module SIM card of the telephone number of described transmit leg, described transmit leg number, described transmit leg.
B38, according to the client described in B36 or B37, wherein, the password that described mobile terminal prestores comprise following one of at least:
The mobile terminal identification of described transmit leg;
The character string of the described transmit leg identity of proof setting in advance.
B39, according to the client described in B29 to B38 any one, wherein, when described transmit leg is server, described antitheft instruction is sent to described server by Activating Account, and by described server, is forwarded to this mobile terminal, triggers antitheft operation.
B40, according to the client described in B39, wherein, described having Activated Account logined in can triggering mobile terminals antitheft client, wherein, described client comprise following one of at least: browser, mobile phone side be the client with mobile phone burglary-resisting function with the client of mobile phone burglary-resisting function, PC side.
B41, according to the client described in B29, wherein, the antitheft instruction that has Activated Account and sent by note and/or network instruction that described server forwards, described that described determination module is also configured to receive.
B42, according to the client described in B41, wherein, the content of described note and/or described network instruction is except comprising described spcial character, also comprise following one of at least: the described sign that Activated Account, antitheft order, antitheft object identity.
B43, according to the client described in B42, wherein,
Described spcial character is Account;
Described having Activated Account while being designated current login is the unique account identification code UID generating the account;
Described antitheft order comprises order numbering and/or mission number;
Described antitheft object identity comprises the IMEI of this mobile terminal.
B44, according to the client described in B29 to B43 any one, also comprise:
Active module, is configured to described transmit leg while being PC terminal, starts described in the antitheft policy resolution mating with described transmit leg identity information before antitheft instruction, and reception is from the activation file of described PC terminal; Wherein, described activation file carries identify label and the anti-theft modes sign of described mobile terminal;
According to described identify label, described activation file is verified;
If be verified, according to described anti-theft modes sign, activate different anti-theft modes.
B45, according to the client described in B44, wherein, described active module is also configured to:
If described anti-theft modes is designated PC anti-theft modes sign, activate the antitheft strategy of PC;
If described anti-theft modes is designated account anti-theft modes sign, activate the antitheft strategy of account.
B46, according to the client described in B44 or B45, wherein, described anti-theft modes sign comprise following one of at least:
That described PC terminal generates, with this mobile terminal random string GUID one to one;
After user's login account, generate for identifying the account identifier UID of account, wherein, the account name of the user of UID login is called USERNAME;
Password PASSWORD.
B47, according to the client described in B44 to B46 any one, wherein, described active module is also configured to:
If when described anti-theft modes sign only comprises described GUID, activate the antitheft strategy of PC, directly carry out operation corresponding to described antitheft order;
If when described anti-theft modes sign comprises described GUID and described PASSWORD, activate the antitheft strategy of PC, verify that whether described PASSWROD is correct; If so, carry out operation corresponding to described antitheft order; If not, stop response;
If when described anti-theft modes sign comprises described UID, activate the antitheft strategy of account, in described mobile terminal, login described USERNAME, receive from the antitheft order of described UID and carry out corresponding operation;
If when described anti-theft modes sign comprises described GUID and described UID, activate the antitheft strategy of PC and the antitheft strategy of account, receive from the antitheft order of PC terminal or described UID and carry out corresponding operation;
If described anti-theft modes sign comprises described GUID, described UID and described PASSWORD, activate the antitheft strategy of PC and the antitheft strategy of account, receive from the antitheft order of described PC terminal or described UID and all described PASSWORD is verified; If be verified, carry out operation corresponding to antitheft order receiving; If checking is not notified, stop response.
B48, according to the client described in B30 to B46 any one, wherein, also comprise:
Deciphering module, while being configured in described antitheft order that the content except described spcial character is encrypted content, adopts corresponding deciphering means to be decrypted the antitheft instruction receiving, and obtains the resolved content of described antitheft instruction.
B49, according to the client described in B48, wherein, cipher mode is des encryption, manner of decryption is DES deciphering.
B50, according to the client described in B48 or B49, wherein, the antitheft instruction of encryption comprises following at least one:
Delete data in mobile phone instruction;
The instruction of backup data in mobile phone.
B51, according to the client described in B29 to B50 any one, wherein, also comprise:
Poll module, is configured to when arbitrary antitheft order is carried out, and whether poll inquiry it run succeeded;
If so, finish the execution of this antitheft order;
If not, again attempt carrying out this antitheft order.
B52, according to the client described in B29 to B51 any one, wherein, described poll module is also configured to: if do not receive the receipt of Requested Party at the appointed time, whether receipt success of poll inquiry;
If so, finish receipt inquiry;
If not, again ask receipt.

Claims (10)

1. an anti-theft method for mobile terminal, comprising:
According to determine the identity information of described transmit leg from the antitheft instruction of transmit leg;
Antitheft instruction described in the antitheft policy resolution that startup is mated with described transmit leg identity information, obtains antitheft order corresponding to this instruction;
Carry out operation corresponding to described antitheft order, to realize guarding against theft for mobile terminal.
2. method according to claim 1, wherein, described basis is determined the identity information of described transmit leg from the antitheft instruction of transmit leg, comprising:
Obtain the spcial character carrying in described antitheft instruction, wherein, described spcial character is specific character string;
According to described spcial character, determine the identity information of described transmit leg.
3. method according to claim 1 and 2, wherein, the identity information of described transmit leg comprise following one of at least:
Described transmit leg is mobile terminal;
Described transmit leg is server;
Described transmit leg is PC PC terminal.
4. method according to claim 3, wherein, also comprises:
While receiving respectively the antitheft instruction that the different transmit leg of identity information sends, the antitheft order the mutual exclusion whether antitheft order that judgement parses in the antitheft instruction of rear reception parses with antitheft instruction in front reception;
If so, refusal is carried out a rear antitheft order;
If not, continue to carry out a rear antitheft order.
5. according to the method described in claim 3 or 4, wherein,
When described transmit leg is mobile terminal, the antitheft strategy of coupling is the antitheft strategy of note;
When described transmit leg is server, the antitheft strategy of coupling is the antitheft strategy of account;
When described transmit leg is PC terminal, the antitheft strategy of coupling is the antitheft strategy of PC or the antitheft strategy of described account.
6. according to the method described in claim 3 to 5 any one, wherein,
When described transmit leg is mobile terminal, the transmission carrier of described antitheft instruction is note;
When described transmit leg is server, the transmission carrier of described antitheft instruction is: note and/or network instruction;
When described transmit leg is PC terminal, the transmission carrier of described antitheft instruction is: note and/or network instruction.
7. method according to claim 6, wherein, while utilizing note as the transmission carrier of described antitheft instruction, before determining the identity information of described transmit leg, also comprises:
Whether the note that judgement is received carries described antitheft instruction;
If so, tackle this note, the definite operation of identity information of obtaining described antitheft instruction and triggering described transmit leg;
If not, this note of letting pass.
8. a guarding against theft for mobile terminal client, comprising:
Determination module, is configured to according to determine the identity information of described transmit leg from the antitheft instruction of transmit leg;
Parsing module, is configured to start antitheft instruction described in the antitheft policy resolution mate with described transmit leg identity information, obtains antitheft order corresponding to this instruction;
Executive Module, is configured to carry out operation corresponding to described antitheft order, to realize guarding against theft for mobile terminal.
9. client according to claim 8, wherein, described determination module is also configured to:
Obtain the spcial character carrying in described antitheft instruction, wherein, described spcial character is specific character string;
According to described spcial character, determine the identity information of described transmit leg.
10. client according to claim 8 or claim 9, wherein, the identity information of described transmit leg comprise following one of at least:
Described transmit leg is mobile terminal;
Described transmit leg is server;
Described transmit leg is PC PC terminal.
CN201310687832.0A 2013-12-13 2013-12-13 Mobile terminal antitheft method and client Pending CN103702318A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201310687832.0A CN103702318A (en) 2013-12-13 2013-12-13 Mobile terminal antitheft method and client
PCT/CN2014/093636 WO2015085940A1 (en) 2013-12-13 2014-12-11 Mobile terminal antitheft method and client

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310687832.0A CN103702318A (en) 2013-12-13 2013-12-13 Mobile terminal antitheft method and client

Publications (1)

Publication Number Publication Date
CN103702318A true CN103702318A (en) 2014-04-02

Family

ID=50363692

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310687832.0A Pending CN103702318A (en) 2013-12-13 2013-12-13 Mobile terminal antitheft method and client

Country Status (1)

Country Link
CN (1) CN103702318A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104486745A (en) * 2014-11-18 2015-04-01 深圳市金立通信设备有限公司 Mobile terminal anti-theft tracking device
CN104486482A (en) * 2014-11-18 2015-04-01 深圳市金立通信设备有限公司 Mobile terminal anti-theft tracking method
WO2015085940A1 (en) * 2013-12-13 2015-06-18 北京奇虎科技有限公司 Mobile terminal antitheft method and client
CN105578451A (en) * 2014-10-17 2016-05-11 中兴通讯股份有限公司 Antitheft method and device
CN106909861A (en) * 2015-12-23 2017-06-30 北京奇虎科技有限公司 A kind of method and apparatus for realizing mobile terminal remote control, mobile terminal and system
CN107786739A (en) * 2017-10-18 2018-03-09 维沃移动通信有限公司 A kind of information acquisition method and mobile terminal
CN108287855A (en) * 2017-01-10 2018-07-17 阿里巴巴集团控股有限公司 Data identification method and device, interface alternation device based on social worker library
CN108650394A (en) * 2018-04-27 2018-10-12 努比亚技术有限公司 Terminal security control method, mobile terminal and computer readable storage medium
CN108738012A (en) * 2018-05-08 2018-11-02 深圳市沃特沃德股份有限公司 Alternate device document method and terminal
CN109561068A (en) * 2018-10-23 2019-04-02 芜湖汉科信息技术有限公司 A kind of information terminal safety system
CN111557103A (en) * 2017-09-01 2020-08-18 深圳传音通讯有限公司 Mobile phone positioning and tracking method, smart mobile phone and storage medium

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015085940A1 (en) * 2013-12-13 2015-06-18 北京奇虎科技有限公司 Mobile terminal antitheft method and client
CN105578451A (en) * 2014-10-17 2016-05-11 中兴通讯股份有限公司 Antitheft method and device
CN104486745A (en) * 2014-11-18 2015-04-01 深圳市金立通信设备有限公司 Mobile terminal anti-theft tracking device
CN104486482A (en) * 2014-11-18 2015-04-01 深圳市金立通信设备有限公司 Mobile terminal anti-theft tracking method
CN106909861A (en) * 2015-12-23 2017-06-30 北京奇虎科技有限公司 A kind of method and apparatus for realizing mobile terminal remote control, mobile terminal and system
CN108287855A (en) * 2017-01-10 2018-07-17 阿里巴巴集团控股有限公司 Data identification method and device, interface alternation device based on social worker library
CN111557103A (en) * 2017-09-01 2020-08-18 深圳传音通讯有限公司 Mobile phone positioning and tracking method, smart mobile phone and storage medium
CN107786739A (en) * 2017-10-18 2018-03-09 维沃移动通信有限公司 A kind of information acquisition method and mobile terminal
CN108650394A (en) * 2018-04-27 2018-10-12 努比亚技术有限公司 Terminal security control method, mobile terminal and computer readable storage medium
CN108738012A (en) * 2018-05-08 2018-11-02 深圳市沃特沃德股份有限公司 Alternate device document method and terminal
CN109561068A (en) * 2018-10-23 2019-04-02 芜湖汉科信息技术有限公司 A kind of information terminal safety system

Similar Documents

Publication Publication Date Title
CN103702318A (en) Mobile terminal antitheft method and client
US10191457B2 (en) Automatic portable electronic device configuration
CN103702299A (en) Mobile terminal antitheft method and client
CN103702317A (en) Mobile terminal antitheft method and client
US9253177B2 (en) Authentication system, information registration system, server, program, and authentication method
CN105577648A (en) Method for obtaining and sending short message identifying code, calculating device and mobile terminal
CN105407074A (en) Authentication method, apparatus and system
CN103648089A (en) Anti-theft processing method and anti-theft processing device for mobile equipment
CN103702331A (en) Mobile terminal antitheft method and client
CN104424409A (en) Application unlocking method and device
CN112131564A (en) Encrypted data communication method, apparatus, device, and medium
CN103686667A (en) Method and device for inquiring state of terminal
US8135383B2 (en) Information security and delivery method and apparatus
CN107438054A (en) The method and system of menu information control are realized based on public platform
KR101379711B1 (en) Method for file encryption and decryption using telephone number
GB2491220A (en) Displaying and selectively retrieving information encoded in a data matrix
WO2015085940A1 (en) Mobile terminal antitheft method and client
CN113946739A (en) Sensitive data query method, device, equipment and storage medium
CN107181595A (en) A kind of account method for retrieving and device for retrieving based on intelligent terminal
CN103107881B (en) Access method, device and system of smart card
JP5465600B2 (en) Support systems and methods
CN110162941A (en) A kind of terminal log-on message store method
JP5005394B2 (en) Mail server access method and e-mail system
WO2015151251A1 (en) Network service providing device, network service providing method, and program
CN112272135B (en) Mail sending method, device, equipment and storage medium for storage software

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20140402