WO2015085940A1 - Mobile terminal antitheft method and client - Google Patents

Mobile terminal antitheft method and client Download PDF

Info

Publication number
WO2015085940A1
WO2015085940A1 PCT/CN2014/093636 CN2014093636W WO2015085940A1 WO 2015085940 A1 WO2015085940 A1 WO 2015085940A1 CN 2014093636 W CN2014093636 W CN 2014093636W WO 2015085940 A1 WO2015085940 A1 WO 2015085940A1
Authority
WO
WIPO (PCT)
Prior art keywords
theft
command
mobile terminal
account
instruction
Prior art date
Application number
PCT/CN2014/093636
Other languages
French (fr)
Chinese (zh)
Inventor
黄铮
张炅轩
范国峰
闫学松
镡云宇
张之弢
邱慧
宋宛芸
Original Assignee
北京奇虎科技有限公司
奇智软件(北京)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CN201310684848.6A external-priority patent/CN103702317B/en
Priority claimed from CN201310687136.XA external-priority patent/CN103702331A/en
Priority claimed from CN201310687832.0A external-priority patent/CN103702318A/en
Priority claimed from CN201310686970.7A external-priority patent/CN103716791B/en
Priority claimed from CN201310684896.5A external-priority patent/CN103702299A/en
Application filed by 北京奇虎科技有限公司, 奇智软件(北京)有限公司 filed Critical 北京奇虎科技有限公司
Publication of WO2015085940A1 publication Critical patent/WO2015085940A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • H04M1/724631User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device by limiting the access to the user interface, e.g. locking a touch-screen or a keypad

Definitions

  • the present invention relates to the field of Internet applications, and in particular, to a mobile terminal anti-theft method and a client.
  • the user can only turn on the anti-theft function of the mobile terminal before the mobile terminal is lost. If the mobile terminal is lost before the anti-theft function is turned on, the thief can prevent the owner from retrieving the mobile terminal by turning off the mobile terminal or performing a flashing operation on the mobile terminal. For example, if the user turns on the anti-theft function in the mobile phone, after the mobile phone is lost, the user can obtain information about the thief and the stolen mobile terminal through the anti-theft function of the mobile phone. If the user does not turn on the mobile phone anti-theft before the mobile phone is lost, the anti-theft function cannot be used to obtain the above information, and the stolen mobile phone cannot be recovered.
  • the mobile terminal may not use various anti-theft functions to obtain information about the thief and the stolen mobile terminal, thereby increasing the difficulty of the mobile terminal to retrieve, and cannot effectively combat Stealing crime.
  • the thief can continue to use the stolen mobile terminal.
  • the thief prevents the owner from retrieving the stolen mobile terminal by brushing the mobile terminal or unplugging the mobile terminal battery, and the owner cannot protect the mobile terminal after the terminal is stolen.
  • the owner cannot retrieve the stolen terminal, resulting in property loss, and the user data stored in the mobile terminal and the like are lost as the mobile terminal is lost or even cause more unpredictable losses. .
  • the present invention has been made in order to provide a mobile terminal anti-theft method and client that overcomes the above problems or at least partially solves or alleviates the above problems.
  • a mobile terminal anti-theft method is provided, which is applicable to an anti-theft function that is not turned on.
  • the mobile terminal includes: receiving a background anti-theft open command from the server, wherein the background anti-theft open command carries the verification information of the mobile terminal; parsing the background anti-theft open command, acquiring the verification information, and performing verification; After the verification is passed, the anti-theft function is turned on in the background according to the background opening anti-theft command.
  • the present invention further provides a mobile terminal anti-theft client, which is disposed on a mobile terminal that does not have an anti-theft function, and includes: a receiving module configured to receive a background anti-theft opening command from the server, wherein the background anti-theft opening instruction carries The verification information of the mobile terminal; the parsing module is configured to parse the background anti-theft account opening instruction, obtain the verification information and perform verification; and the anti-theft opening module is configured to open in the background according to the background opening anti-theft command if the verification is passed Anti-theft function.
  • the background anti-theft opening command can be sent to the mobile terminal through the server.
  • the server After receiving the background anti-theft open command, it parses and verifies it to ensure that the received background anti-theft command is a real and valid and reliable command, avoiding receiving background anti-theft commands sent from untrusted or malicious servers, causing the mobile terminal to open incorrectly.
  • Anti-theft function If the malicious server maliciously locks the mobile terminal using the anti-theft function, causing all or part of the functions of the mobile terminal to be unavailable, the user may be adversely affected.
  • the embodiment of the present invention turns on the anti-theft function in the background of the mobile terminal according to the background opening anti-theft command, which solves the problem that the anti-theft function cannot be opened after the mobile terminal is lost in the prior art.
  • the method of remotely opening the anti-theft function enables the lost mobile terminal to open the anti-theft without being retrieved, thereby improving the security of the mobile terminal, and the verification function also prevents the mobile terminal from being maliciously turned on by the anti-theft function. Improve the security of mobile terminals.
  • the embodiment of the present invention can open the anti-theft function of the mobile terminal after the mobile terminal is lost, and then perform the corresponding anti-theft operation according to the anti-theft instruction, thereby achieving the beneficial effect of more reasonable and effective guarantee of the security of the mobile terminal and combating theft crime.
  • a mobile terminal anti-theft method includes: receiving an anti-theft instruction from a sender, wherein the anti-theft instruction uses a short message as a transmission carrier; and parsing the anti-theft instruction to obtain a corresponding instruction An anti-theft command; performing an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
  • the present invention also provides a mobile terminal anti-theft client, comprising: a receiving module configured to receive an anti-theft command from a sender, wherein the anti-theft command uses a short message as a sending carrier; and the parsing module is configured to parse the anti-theft command Obtaining an anti-theft command corresponding to the instruction; and executing an module configured to perform an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
  • the anti-theft command from the sender that uses the short message as the transmission carrier is received, the anti-theft command is obtained by parsing the anti-theft command, and the corresponding anti-theft operation can be performed according to the anti-theft command. Therefore, the anti-theft command in the embodiment of the present invention is from a device or a terminal capable of sending a short message, and a device or a terminal capable of sending a short message (such as a mobile phone, a computer, a tablet, etc.) can be realized, so that the anti-theft of the mobile terminal can be realized conveniently and quickly.
  • a short message such as a mobile phone, a computer, a tablet, etc.
  • the use of other devices or terminals capable of sending short messages can enable the anti-theft function of the mobile terminal to avoid theft of the anti-theft function by the mobile terminal itself, as the prior art says.
  • the embodiment of the present invention can still receive the anti-theft instruction of the sender, and obtain the anti-theft command according to the anti-theft instruction. Perform anti-theft operations. For example, after the user mobile terminal is lost, by sending an anti-theft command to the stolen mobile terminal, the embodiment of the present invention can perform a lock screen operation on the stolen mobile terminal to prevent the thief from using the mobile terminal.
  • the embodiment of the present invention can also obtain the identity information of the thief (such as a photo of the thief, a fingerprint, etc.). After the identity information of the thief is obtained according to the embodiment of the present invention, the thief can be arrested according to the identity identification information. Therefore, the embodiment of the present invention can effectively prevent theft of the terminal after the terminal is stolen, and reduce the crime rate of theft and protect the security of the user property.
  • a mobile terminal anti-theft method includes: receiving an anti-theft instruction from a server, wherein the anti-theft instruction is sent to the server by an activated account; parsing the anti-theft instruction to obtain the The anti-theft command corresponding to the instruction; performing the operation corresponding to the anti-theft command to implement the anti-theft of the mobile terminal.
  • the present invention also provides a mobile terminal anti-theft client, comprising: a receiving module configured to receive an anti-theft command from a server, wherein the anti-theft instruction is sent to the server by an activated account; and the parsing module is configured as an analysis The anti-theft command is obtained, and the anti-theft command corresponding to the instruction is obtained; and the execution module is configured to perform an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
  • the anti-theft instruction forwarded by the server from the activated account is received, the anti-theft command is obtained by parsing the anti-theft command, and the corresponding anti-theft operation can be performed according to the anti-theft command.
  • the anti-theft command in the embodiment of the present invention is from a device or terminal capable of logging in to the activated account, and the device or the terminal is required to send the anti-theft command by using the activated account, and the activated account is used to send a short message or a network command. All of them can send anti-theft commands.
  • the embodiment of the present invention can still receive the anti-theft instruction of the sender, and perform the anti-theft operation according to the anti-theft command obtained by analyzing the anti-theft instruction.
  • the embodiment of the present invention can perform a lock screen operation on the stolen mobile terminal to prevent the thief from using the mobile terminal.
  • the inability of the thief to use the mobile terminal causes the thief to fail to renovate the mobile terminal by brushing the machine, and the thief cannot resell the stolen mobile terminal for profit. Further, the probability of theft crime can be effectively reduced.
  • the embodiment of the present invention can also obtain the identity information of the thief (such as a photo of the thief, a fingerprint, etc.).
  • the thief After the identity information of the thief is obtained according to the embodiment of the present invention, the thief can be arrested according to the identity identification information. Therefore, the embodiment of the present invention can effectively prevent theft of the terminal after the terminal is stolen, and reduce the crime rate of theft and protect the security of the user property.
  • a mobile terminal anti-theft method includes: receiving a personal electric power The anti-theft command of the brain PC terminal; parsing the anti-theft command to obtain an anti-theft command corresponding to the instruction; and performing an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
  • the present invention further provides a mobile terminal anti-theft client, comprising: a receiving module configured to receive an anti-theft command from a personal computer PC terminal; and an analysis module configured to parse the anti-theft command to obtain an anti-theft command corresponding to the instruction; The module is configured to perform an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
  • the anti-theft command from the PC terminal is received, the anti-theft command is obtained by parsing the anti-theft command, and the corresponding anti-theft operation can be performed according to the anti-theft command.
  • the anti-theft command in the embodiment of the present invention comes from being able to use the PC terminal to open and use the anti-theft function of the mobile terminal on the premise that the stolen mobile terminal does not have the anti-theft function turned on.
  • the use of a PC terminal to send an anti-theft command is simple in operation, so that the anti-theft of the mobile terminal can be realized conveniently and quickly, and the anti-theft function can be provided to perform anti-theft on the mobile terminal.
  • the embodiment of the present invention can still receive the anti-theft instruction of the sender, and perform the anti-theft operation according to the anti-theft command obtained by analyzing the anti-theft instruction. For example, after the user mobile terminal is lost, by sending an anti-theft command to the stolen mobile terminal, the embodiment of the present invention can perform a lock screen operation on the stolen mobile terminal to prevent the thief from using the mobile terminal. The inability of the thief to use the mobile terminal causes the thief to fail to renovate the mobile terminal by brushing the machine, and the thief cannot resell the stolen mobile terminal for profit.
  • the embodiment of the present invention can also obtain the identity information of the thief (such as a photo of the thief, a fingerprint, etc.). After the identity information of the thief is obtained according to the embodiment of the present invention, the thief can be arrested according to the identity identification information. Therefore, the embodiment of the present invention can effectively prevent theft of the terminal after the terminal is stolen, and reduce the crime rate of theft and protect the security of the user property.
  • the identity information of the thief such as a photo of the thief, a fingerprint, etc.
  • a mobile terminal anti-theft method includes: determining identity information of the sender according to an anti-theft instruction from a sender; and initiating an anti-theft policy matching the sender identity information to parse the The anti-theft command obtains an anti-theft command corresponding to the instruction; and performs an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
  • the present invention also provides a mobile terminal anti-theft client, comprising: a determining module configured to determine identity information of the sender according to an anti-theft command from a sender; and a parsing module configured to initiate matching with the sender identity information
  • the anti-theft policy resolves the anti-theft command to obtain an anti-theft command corresponding to the instruction; and the execution module is configured to perform an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
  • the identity information of the sender can be determined according to the anti-theft command from the sender, the anti-theft policy matching the sender identity information is activated to parse the anti-theft command, the anti-theft command corresponding to the instruction is obtained, and the anti-theft command is executed. Operation to achieve anti-theft of the mobile terminal.
  • the anti-theft command in the embodiment of the present invention may be from a device or terminal capable of sending a short message (such as a sender of the anti-theft command being a mobile terminal or a server or a personal computer), or may be from a device or terminal capable of transmitting a network command.
  • the embodiment of the present invention After determining the identity information of the sender, the embodiment of the present invention initiates an anti-theft policy that matches the identity information of the sender to parse the anti-theft command, and obtains a corresponding anti-theft command, so as to ensure that the anti-theft protection can be performed on the mobile terminal according to the user's need to select an appropriate anti-theft policy.
  • an anti-theft policy can be matched to perform anti-theft protection on the mobile terminal, and multiple anti-theft policies can be matched to simultaneously protect the mobile terminal against theft, thereby enhancing the security of the mobile terminal.
  • the embodiment of the present invention after the mobile terminal is stolen, the anti-theft command of the sender can still be received, and the anti-theft operation is performed according to the anti-theft command obtained by parsing the anti-theft command.
  • the embodiment of the present invention can perform a lock screen operation on the stolen mobile terminal to prevent the thief from using the mobile terminal.
  • the inability of the thief to use the mobile terminal causes the thief to fail to renovate the mobile terminal by brushing the machine, and the thief cannot resell the stolen mobile terminal for profit. Further, the probability of theft crime can be effectively reduced.
  • the embodiment of the present invention can also obtain the identity information of the thief (such as a photo of the thief, a fingerprint, etc.). After the identity information of the thief is obtained according to the embodiment of the present invention, the thief can be arrested according to the identity identification information. Therefore, the embodiment of the present invention can effectively prevent theft of the terminal after the terminal is stolen, and reduce the crime rate of theft and protect the security of the user property.
  • the identity information of the thief such as a photo of the thief, a fingerprint, etc.
  • a computer program comprising computer readable code that, when executed on a computing device, causes the computing device to perform a mobile terminal provided by an embodiment of the present invention Anti-theft method.
  • a computer readable medium storing a computer program for performing an antitheft method for a mobile terminal provided by an embodiment of the present invention is provided.
  • FIG. 1 is a flowchart showing a process of a mobile terminal anti-theft method according to an embodiment of the present invention
  • FIG. 2 is a schematic structural diagram of a mobile terminal anti-theft client according to an embodiment of the present invention.
  • FIG. 3 is a flowchart showing a process of a mobile terminal anti-theft method according to still another embodiment of the present invention.
  • FIG. 4 is a flowchart showing a process of registering a short message interception function according to an embodiment of the present invention
  • FIG. 5 is a flowchart showing a process of a short message receiving processing method according to an embodiment of the present invention
  • FIG. 6 shows a process flow diagram of a method of pre-storing a verification code in accordance with a preferred embodiment of the present invention
  • FIG. 7 is a flowchart showing a process of polling a command execution situation according to an embodiment of the present invention.
  • FIG. 8 is a flowchart showing a process of a method for querying a receipt according to an embodiment of the present invention.
  • FIG. 9 is a flowchart showing a process of a mobile terminal anti-theft method according to still another preferred embodiment of the present invention.
  • FIG. 10 is a flowchart showing a process of a mobile terminal anti-theft method on a mobile phone side of a family member and a friend according to an embodiment of the present invention
  • FIG. 11 is a flowchart showing a process of a mobile terminal anti-theft method on the side of a stolen mobile phone according to an embodiment of the present invention
  • FIG. 12 is a schematic structural diagram of a mobile terminal anti-theft client according to still another embodiment of the present invention.
  • FIG. 13 is a flowchart showing a process of a mobile terminal anti-theft method according to still another embodiment of the present invention.
  • FIG. 14 is a flowchart showing a process of a method of turning on an anti-theft function according to still another embodiment of the present invention.
  • FIG. 15 is a flowchart showing a process of a method of unbinding according to an embodiment of the present invention.
  • 16 is a flowchart showing a process of a mobile terminal anti-theft method according to still another preferred embodiment of the present invention.
  • 17 is a flowchart showing a process of transmitting an anti-theft instruction on an activated account side according to an embodiment of the present invention
  • FIG. 18 is a flowchart of a method for preventing theft of a side of a mobile terminal according to an embodiment of the present invention.
  • FIG. 19 is a schematic structural diagram of a mobile terminal anti-theft client according to still another embodiment of the present invention.
  • FIG. 20 is a flowchart showing a process of a mobile terminal anti-theft method according to still another embodiment of the present invention.
  • 21 is a flowchart showing a process of a method for activating a mobile phone anti-theft function on a side of a PC terminal according to an embodiment of the present invention
  • FIG. 22 is a flow chart showing the processing of the anti-theft method on the side of the mobile phone according to still another embodiment of the present invention.
  • FIG. 23 is a schematic structural diagram of a mobile terminal anti-theft client according to still another embodiment of the present invention.
  • FIG. 24 is a flowchart showing a process of a mobile terminal anti-theft method according to still another embodiment of the present invention.
  • FIG. 25 is a flowchart showing a process of registering a short message interception function according to still another embodiment of the present invention.
  • 26 is a process flow diagram of a method of determining an anti-theft policy, in accordance with one embodiment of the present invention.
  • FIG. 27 is a flowchart showing a process of mutually exclusive querying a command execution situation according to an embodiment of the present invention.
  • FIG. 28 is a schematic structural diagram of a mobile terminal anti-theft client according to still another embodiment of the present invention.
  • 29 is a block diagram schematically showing a computing device for performing a mobile terminal theft prevention method according to the present invention.
  • Fig. 30 schematically shows a storage unit for holding or carrying program code implementing the mobile terminal anti-theft method according to the present invention.
  • the anti-theft function if the anti-theft function is not turned on before the mobile terminal is lost, after the mobile terminal is lost, the anti-theft function cannot be remotely opened and used, resulting in a bad result that the mobile terminal cannot be retrieved after being lost.
  • FIG. 1 is a flow chart showing the processing of a mobile terminal anti-theft method according to an embodiment of the present invention. As shown in FIG. 1, the flow includes at least steps S102 to S106.
  • Step S102 Receive a background anti-theft open command from the server, where the background anti-theft open command carries the verification information of the mobile terminal.
  • Step S104 Parsing the background anti-theft opening instruction, obtaining the verification information, and performing verification.
  • Step S106 If the verification is passed, the anti-theft function is turned on in the background according to the anti-theft command in the background.
  • the background anti-theft opening command can be sent to the mobile terminal through the server.
  • the server After receiving the background anti-theft open command, it parses and verifies it to ensure that the received background anti-theft command is a real and valid and reliable command, avoiding receiving background anti-theft commands sent from untrusted or malicious servers, causing the mobile terminal to open incorrectly.
  • Anti-theft function If the malicious server maliciously locks the mobile terminal using the anti-theft function, causing all or part of the functions of the mobile terminal to be unavailable, the user may be adversely affected.
  • the embodiment of the present invention turns on the anti-theft function in the background of the mobile terminal according to the background opening anti-theft command, which solves the problem that the anti-theft function cannot be opened after the mobile terminal is lost in the prior art.
  • the method of remotely opening the anti-theft function enables the lost mobile terminal to open the anti-theft without being retrieved, thereby improving the security of the mobile terminal, and the verification function also prevents the mobile terminal from being maliciously turned on by the anti-theft function. Improve the security of mobile terminals.
  • the embodiment of the present invention can open the anti-theft function of the mobile terminal after the mobile terminal is lost, and then perform the corresponding anti-theft operation according to the anti-theft instruction, thereby achieving the beneficial effect of more reasonable and effective guarantee of the security of the mobile terminal and combating theft crime.
  • the background anti-theft command carries the verification information of the mobile terminal.
  • the authentication information of the mobile terminal may include a unique identity of the mobile terminal and at least one Subscriber Identity Module (SIM) card number, which may include the unique identity of the mobile terminal.
  • SIM Subscriber Identity Module
  • the identifier and the account information of the user may also include the unique identity of the mobile terminal, the at least one SIM card number, and the account information of the user.
  • the verification information may also include other information that can be verified by the mobile terminal, such as the hardware configuration of the mobile terminal, the hardware identification ID of the mobile terminal, the system version number of the mobile terminal, and the like.
  • the embodiment of the present invention is preferably an International Mobile Equipment Identity (IMEI number) of the mobile terminal.
  • IMEI number itself is permanently bound to the mobile terminal and is unique and has high recognizability. Therefore, in the embodiment of the present invention, the preferred IMEI number is the unique identity of the mobile terminal.
  • the mobile anti-theft method provided by the embodiment of the present invention will be described in detail by taking different verification information as an example.
  • three sets of verification information are selected, which are respectively a first group of verification information including an IMEI of the mobile terminal and at least one SIM card number, including an IMEI of the mobile terminal and a second group of verification information of the account information of the user, and simultaneously The third group of verification letters including the IMEI of the mobile terminal, the at least one SIM card number, and the account information of the user interest.
  • the verification information of the mobile terminal includes an IMEI of the mobile terminal and at least one SIM card number.
  • the embodiment of the present invention After receiving the anti-theft open command carrying the verification information, the embodiment of the present invention performs step S104 as shown in FIG. 1 , parses the received background anti-theft open command, and obtains the verification information carried by the background anti-theft open command. After obtaining the verification information, the embodiment of the present invention separately verifies the IMEI and the at least one SIM card number in the verification information. First, the embodiment of the present invention verifies the IMEI in the verification information. If the IMEI in the verification information matches the IMEI of the mobile terminal, the IMEI in the verification information passes the verification.
  • the embodiment of the present invention verifies the SIM card number in the verification information. If at least one SIM card number in the verification information matches the SIM card number in the contact list of the mobile terminal, the SIM card number in the verification information passes the verification. In addition, in the embodiment of the present invention, it is also possible to first verify that at least one SIM card number matches the SIM card number in the contact list of the mobile terminal, and secondly, verify the IMEI in the verification information. In the embodiment of the present invention, the verification order of the IMEI and the at least one SIM card number included in the verification information is not limited.
  • the number of the SIM card numbers included in the verification information in the embodiment of the present invention may be any integer value other than 0, which is not limited by the embodiment of the present invention.
  • the verification information includes four SIM card numbers, and only one of the SIM card numbers matches the SIM card number in the contact list of the mobile terminal, and the other three SIM card numbers do not match the SIM card number in the contact list of the mobile terminal.
  • the SIM card number in the verification information is verified. For example, if the verification information includes only one SIM card number, and the SIM card number matches the SIM card number in the contact list of the mobile terminal, the SIM card number in the verification information passes the verification.
  • the contact list of the user's mobile terminal may change from time to time due to factors such as job change, work place change, and the like.
  • the SIM card number included in the verification information matches a SIM card number in the contact list of the mobile terminal, the SIM card number in the verification information passes the verification. After the SIM card number in the verification information passes the verification, the SIM card number is identified as a trusted number.
  • the verified SIM card numbers are all identified as trusted numbers, so that in the subsequent operations, the anti-theft commands sent by any trusted number can be identified.
  • the embodiment of the present invention performs an anti-theft operation according to the anti-theft instruction sent by the trusted number.
  • the verification information if the IMEI in the verification information passes the verification, and the SIM card number does not match the SIM card number in the contact list of the mobile terminal, the verification information cannot pass the verification. Similarly, when at least one SIM card number in the verification information matches the SIM card number in the contact list of the mobile terminal, but the IMEI in the verification information does not match the IMEI of the mobile terminal, the verification information cannot pass. In the embodiment of the present invention, when both types of information included in the verification information are verified, the verification information is verified to ensure that the user's mobile terminal does not open the anti-theft command due to the malicious operation of the unscrupulous person or the user's mistake operation, thereby avoiding unnecessary In the case of opening the anti-theft function to the user.
  • step S106 the embodiment of the present invention turns on the anti-theft function in the background according to the anti-theft command in the background.
  • the embodiment of the present invention parses the anti-theft command and executes the anti-theft operation corresponding to the anti-theft command.
  • the SIM card number identified as a trusted number refers to a trusted SIM card number that is authenticated and bound to the mobile terminal.
  • the embodiment of the present invention receives the anti-theft instruction sent by the SIM card number identified as the trusted number.
  • the embodiment of the invention can perform corresponding anti-theft operation according to the anti-theft instruction, avoid the loss of the mobile terminal, or provide a clue for retrieving the mobile terminal after the mobile terminal is lost.
  • the embodiment of the present invention can enable the anti-theft function of the lost mobile phone through the server.
  • the embodiment of the present invention sends an anti-theft command to the mobile phone through the bound relatives and friends. After receiving the anti-theft command, the mobile phone can automatically lock the screen or feedback the replaced SIM card number to the server or return the real-time location of the mobile phone to the server according to the anti-theft command, thereby helping the owner to retrieve the stolen mobile phone.
  • the verification information of the mobile terminal includes the IMEI and the account information of the user.
  • the embodiment of the present invention After receiving the anti-theft open command carrying the verification information, the embodiment of the present invention performs step S104 as shown in FIG. 1 , parses the received background anti-theft open command, and obtains the verification information carried by the background anti-theft open command. After obtaining the verification information, the embodiment of the present invention verifies the IMEI in the verification information and the account information of the user.
  • the embodiment of the present invention verifies the IMEI in the verification information. If the IMEI in the verification information matches the IMEI of the mobile terminal, the IMEI in the verification information passes the verification. Secondly, after the IMEI in the verification information passes the verification, the account information of the login user of the embodiment of the present invention acquires an identifier (Identity, hereinafter referred to as ID) of the account.
  • ID an identifier
  • the user account information in the embodiment of the present invention may be a user name and a password, and may be a user name and a verification code randomly selected by the system, and may also be a user's email account, etc., which is not limited by the embodiment of the present invention.
  • the user name and password are selected as the user account information.
  • using the user name and password as the account information to log in can reasonably and effectively ensure the security of the user account.
  • the user name and the randomly selected verification code are used as the account, although it is only necessary to remember the user name and no password, it is convenient, but lacks security.
  • the embodiment of the present invention uses the username and password to log in to the account information to obtain the ID of the account.
  • the embodiment of the present invention After obtaining the account ID, the embodiment of the present invention sends the account ID to the server, and the account ID is verified by the server. After receiving the verification result obtained by the server, the embodiment of the present invention determines whether the account information of the user passes the verification. If the user's account information is verified, the embodiment of the present invention determines that the verification information is verified. If the user's account information does not pass the verification, the embodiment of the present invention determines that the verification information has not passed the verification.
  • the IMEI in the verification information may be first verified. Secondly, the account information of the user in the verification information is verified. The embodiment of the present invention may also first verify the account information of the user, and secondly, verify the IMEI in the verification information. The embodiment of the present invention does not limit the order of the IMEI in the verification verification information and the account information of the user. The verification of the IMEI in the verification information only requires the embodiment of the present invention to obtain its own IMEI and match the two IMEIs. To verify the user account information in the verification information, the account information of the user is required to be logged in the embodiment of the present invention. After the account ID is obtained, the account ID is sent to the server for verification.
  • the step of verifying the user's account information is more cumbersome and complicated than verifying the IMEI. Therefore, it is preferred in the embodiment of the invention to first verify the IMEI. After the IMEI in the verification information passes the verification, the account information of the user in the verification information is verified to ensure that the verification information is verified more efficiently.
  • the verification information when both types of information included in the verification information are verified, the verification information is verified, and the user's mobile terminal is not opened by the malicious operation of the unscrupulous user or the user's mistake operation. Instructions to avoid the trouble of turning on the anti-theft function in unnecessary situations.
  • step S104 After the verification information is verified, the step S104 is completed, and the embodiment of the present invention continues to perform step S106.
  • step S106 when the verification information is verified, the embodiment of the present invention turns on the anti-theft function in the background according to the received background anti-theft opening instruction.
  • the embodiment of the present invention parses the anti-theft command and executes the anti-theft operation corresponding to the anti-theft command. For example, after the user's mobile phone is lost, if the lost phone of the user is not bound with a trusted number, the user can log in to the server to enable the anti-theft function of the lost mobile phone.
  • the embodiment of the present invention can log in to the registered account and send an anti-theft command to the mobile phone through the unique account ID in the account.
  • the mobile phone can automatically lock the screen or feedback the replaced SIM card number to the server or return the real-time location of the mobile phone to the server according to the anti-theft command, thereby helping the owner to retrieve the stolen mobile phone.
  • the verification information of the mobile terminal includes the IMEI, the at least one SIM card number, and the account information of the user.
  • the embodiment of the present invention After receiving the anti-theft open command carrying the verification information, the embodiment of the present invention performs step S104 as shown in FIG. 1 , parses the received background anti-theft open command, and obtains the verification information carried by the background anti-theft open command.
  • the embodiment of the present invention verifies the IMEI in the verification information, the at least one SIM card number, and the account information division of the user.
  • the embodiment of the present invention verifies the IMEI in the verification information.
  • the embodiment of the present invention verifies the SIM card number in the verification information. If at least one SIM card number in the verification information matches the SIM card number in the contact list of the mobile terminal, the SIM card number in the verification information passes the verification. In addition, in the embodiment of the present invention, it is also possible to first verify that at least one SIM card number matches the SIM card number in the contact list of the mobile terminal, and secondly, verify the IMEI in the verification information, which is not used in the embodiment of the present invention. limited.
  • the format of the SIM card number included in the verification information in the embodiment of the present invention may be any integer value other than 0, which is not limited by the embodiment of the present invention.
  • the verification information includes two SIM card numbers, one of which matches the SIM card number in the contact list of the mobile terminal, and the other SIM card number does not match the SIM card number in the contact list of the mobile terminal.
  • the SIM card number in the verification information is verified.
  • the contact list of the user's mobile terminal may change from time to time due to factors such as the change of position, the change of the location of the Principality. Therefore, in the embodiment of the present invention, if the SIM card number included in the verification information matches a SIM card number in the contact list of the mobile terminal, the SIM card number in the verification information passes the verification.
  • the embodiment of the present invention continues to verify the account information of the user in the verification information.
  • the user account information in the embodiment of the present invention may be a user name and a password, and may be a user name and a verification code randomly selected by the system, or may be a user email account, etc., and the implementation of the present invention This example does not limit this.
  • the user name and password are selected as the user account information. In actual use, using the user name and password as the account information to log in can reasonably and effectively ensure the security of the user account.
  • the embodiment of the present invention uses the username and password to log in to the account information to obtain the ID of the account.
  • the embodiment of the present invention After obtaining the account ID, the embodiment of the present invention sends the account ID to the server, and the account ID is verified by the server. After receiving the verification result obtained by the server, the embodiment of the present invention determines whether the account information of the user passes the verification. If the user's account information does not pass the verification, the embodiment of the present invention determines that the verification information has not passed the verification. If the account information of the user is verified, the embodiment of the present invention determines that the verification information passes the verification.
  • the verification information of the mobile terminal includes the IMEI, the at least one SIM card number, and the account information of the user, if only three of them simultaneously pass the verification, the verification information passes the verification. For example, when the IMEI and the at least one SIM card number in the verification information pass the verification, but the user account information in the verification information fails the verification, the verification information fails the verification. In addition, in the embodiment of the present invention, if the IMEI in the verification information is first verified, and the IMEI fails to pass the verification, the SIM card number in the verification information and the account information of the user need not be verified, and the verification information cannot pass the verification.
  • the verification information when all the information included in the verification information is verified, the verification information is verified, so that the user's mobile terminal does not open the anti-theft command due to the malicious operation of the unscrupulous person or the user's mistake operation, thereby avoiding unnecessary In the case of turning on the anti-theft function to bring trouble to the user.
  • step S104 After the verification information is verified, the step S104 is completed, and the embodiment of the present invention continues to perform step S106.
  • step S106 when the verification information is verified, the embodiment of the present invention turns on the anti-theft function in the background according to the received background anti-theft opening instruction.
  • the embodiment of the present invention parses the anti-theft instruction and executes the anti-theft operation corresponding to the anti-theft instruction. For example, after the user's mobile phone is lost, the embodiment of the present invention can log in to the server to send a background anti-theft open command to the lost mobile phone.
  • the embodiment of the present invention can send an anti-theft command to the lost mobile phone through the bound friend number or the ID in the registered user account information.
  • the mobile phone can automatically lock the screen or feedback the replaced SIM card number to the server or return the real-time location of the mobile phone to the server according to the anti-theft command, thereby helping the owner to retrieve the stolen mobile phone.
  • the mobile terminal anti-theft method provided by the above preferred embodiments is based on the same inventive concept.
  • the embodiment of the present invention provides a client, which is disposed on a mobile terminal that does not have an anti-theft function, to implement the anti-theft method of the mobile terminal.
  • FIG. 2 is a schematic structural diagram of a mobile terminal anti-theft client according to an embodiment of the present invention.
  • the client in the embodiment of the present invention includes at least a receiving module 210, a parsing module 220, and an anti-theft opening module 230.
  • the receiving module 210 is configured to receive a background anti-theft opening command from the server, where the background anti-theft opening command carries the verification information of the mobile terminal.
  • the parsing module 220 is coupled to the receiving module 210 and configured to parse the background anti-theft opening command, obtain verification information, and perform verification.
  • the anti-theft opening module 230 is coupled to the parsing module 220 and configured to enable the anti-theft function in the background according to the anti-theft command in the background.
  • the receiving module 210 shown in FIG. 2 receives a background anti-theft opening command from the server.
  • the backend anti-theft command of the server carries the verification information of the mobile terminal.
  • the verification information of the mobile terminal may include the unique identity of the mobile terminal and the at least one SIM card number, and may include the unique identity of the mobile terminal and the account information of the user.
  • the mobile phone's unique identity, at least one SIM card number, and the user's account information may be included at the same time.
  • the embodiment of the present invention is preferably an IMEI.
  • the IMEI itself is permanently bound to the mobile terminal and is unique and has high recognizability. Therefore, in the embodiment of the present invention, the IMEI is preferably a unique identifier of the mobile terminal.
  • the mobile anti-theft client provided by the embodiment of the present invention will be described in detail by taking different authentication information as an example.
  • three sets of verification information are selected, which are respectively a first group of verification information including an IMEI of the mobile terminal and at least one SIM card number, including an IMEI of the mobile terminal and a second group of verification information of the account information of the user, and simultaneously
  • the third group of verification information includes the IMEI of the mobile terminal, the at least one SIM card number, and the account information of the user.
  • the verification information of the mobile terminal includes an IMEI of the mobile terminal and at least one SIM card number.
  • the parsing module 220 is triggered.
  • the anti-theft open command is parsed, and the verification information carried by the background anti-theft open command is obtained.
  • the parsing module 220 continues to verify the IMEI and the at least one SIM card number in the verification information respectively. First, the parsing module 220 verifies the IMEI in the verification information.
  • the parsing module 220 verifies the SIM card number in the verification information. If at least one SIM card number in the verification information matches the SIM card number in the contact list of the mobile terminal, the SIM card number in the verification information passes the verification. In addition, the parsing module 220 in the embodiment of the present invention may also first verify that at least one SIM card number matches the SIM card number in the contact list of the mobile terminal, and secondly, verify the IMEI in the verification information. In the embodiment of the present invention, the verification order of the IMEI and the at least one SIM card number included in the verification information is not limited.
  • the number of the SIM card numbers included in the verification information in the embodiment of the present invention may be any integer value other than 0, which is not limited by the embodiment of the present invention.
  • the verification information includes four SIM card numbers, and only one of the SIM card numbers matches the SIM card number in the contact list of the mobile terminal, and the other three SIM card numbers do not match the SIM card number in the contact list of the mobile terminal.
  • the SIM card number in the verification information is verified.
  • the verification information includes only one SIM card number, and the SIM card number matches the SIM card number in the contact list of the mobile terminal, the SIM card number in the verification information passes the verification.
  • the contact list of the user's mobile terminal may change from time to time due to factors such as job change, work place change, and the like. Therefore, the present invention In an embodiment, if the SIM card number included in the verification information matches a SIM card number in the contact list of the mobile terminal, the SIM card number in the verification information passes the verification.
  • the verification information if the IMEI in the verification information passes the verification, and the SIM card number does not match the SIM card number in the contact list of the mobile terminal, the verification information cannot pass the verification. Similarly, when at least one SIM card number in the verification information matches the SIM card number in the contact list of the mobile terminal, but the IMEI in the verification information does not match the IMEI of the mobile terminal, the verification information cannot pass. In the embodiment of the present invention, when both types of information included in the verification information are verified, the verification information is verified to ensure that the user's mobile terminal does not open the anti-theft command due to the malicious operation of the unscrupulous person or the user's mistake operation, thereby avoiding unnecessary In the case of opening the anti-theft function to the user.
  • the rejection module 240 is triggered. After the rejection module 240 is triggered, the background anti-theft instruction is refused to be executed. If the verification information passes the verification according to the parsing module 220, the anti-theft opening module 230 shown in FIG. 2 turns on the anti-theft function in the background according to the anti-theft command in the background. After the anti-theft function is turned on, the trust identification module 250 coupled with the anti-theft opening module 230 identifies that at least one SIM card number that has passed the verification is a trusted SIM card number.
  • the anti-theft processing module 260 When receiving the anti-theft instruction sent by the SIM card number identified as the trusted number, the anti-theft processing module 260 performs a corresponding anti-theft operation according to the anti-theft instruction, avoids the loss of the mobile terminal, or provides the retrieval of the mobile after the mobile terminal is lost. The clue of the terminal.
  • the second group of verification information is taken as an example for description.
  • the verification information of the mobile terminal includes the IMEI and the account information of the user.
  • the parsing module 220 is triggered.
  • the parsing module 220 parses the received background anti-theft open command, and obtains the verification information carried by the background anti-theft open command.
  • the parsing module 220 verifies the IMEI in the verification information and the account information of the user.
  • the parsing module 220 verifies the IMEI in the verification information. If the IMEI in the verification information matches the IMEI of the mobile terminal, the IMEI in the verification information passes the verification. Secondly, after the IMEI in the verification information passes the verification, the account information of the login user of the embodiment of the present invention acquires the ID of the account.
  • the user account information in the embodiment of the present invention may be a user name and a password, and may be a user name and a verification code randomly selected by the system, and may also be a user's email account, etc., which is not limited by the embodiment of the present invention.
  • the user name and password are selected as the user account information.
  • using the user name and password as the account information to log in can reasonably and effectively ensure the security of the user account.
  • the user name and the randomly selected verification code are used as the account, although it is only necessary to remember the user name and no password, it is convenient, but lacks security.
  • the embodiment of the present invention uses the username and password to log in to the account information to obtain the ID of the account.
  • the parsing module 220 After obtaining the account ID, the parsing module 220 verifies the account ID by sending the account ID to the server. After receiving the verification result obtained by the server, the parsing module 220 determines whether the account information of the user passes the verification. If the account information of the user passes the verification, the parsing module 220 determines that the verification information passes the verification. The anti-theft opening module 230 is triggered. The anti-theft opening module 230 turns on the anti-theft function in the background. If the user's account information does not pass the verification, the parsing module 220 triggers the rejection module 240. The rejection module 240 refuses to enable the anti-theft function in the background.
  • the parsing module 220 may first verify the IMEI in the verification information. Secondly, the account information of the user in the verification information is verified. The parsing module 220 may also first verify the account information of the user, and secondly, verify the IMEI in the verification information.
  • the verification of the IMEI in the verification information only requires the embodiment of the present invention to obtain its own IMEI and match the two IMEIs.
  • the account information of the user is required to be logged in the embodiment of the present invention. After the account ID is obtained, the account ID is sent to the server for verification.
  • the step of verifying the user's account information is more cumbersome and complicated than verifying the IMEI. Therefore, it is preferred in the embodiment of the invention to first verify the IMEI. After the IMEI in the verification information passes the verification, the account information of the user in the verification information is verified to ensure that the verification information is verified more efficiently.
  • the anti-theft processing module 260 After the anti-theft opening module 230 turns on the anti-theft function, if the anti-theft processing module 260 receives the anti-theft command sent by the verified account ID, the anti-theft processing module 260 parses the anti-theft instruction. After parsing, the anti-theft processing module 260 performs a corresponding anti-theft operation according to the anti-theft instruction. For example, after the user's mobile phone is lost, the login server sends an anti-theft open command to the lost mobile phone, and the receiving module 210 of the client in the embodiment of the present invention verifies the anti-theft open command after receiving the background anti-theft open command.
  • the anti-theft opening module 230 turns on the background anti-theft function, and the anti-theft processing module 260 performs the corresponding operation according to the received anti-theft instruction. For example, according to the received anti-theft command, the automatic lock screen or the feedback of the replaced SIM card number to the server or return to the real-time location of the mobile phone to the server, etc., help the owner to retrieve the stolen mobile phone.
  • the verification information of the mobile terminal includes the IMEI, the at least one SIM card number, and the account information of the user.
  • the receiving module 210 of the client shown in FIG. 2 receives the anti-theft opening command carrying the verification information
  • the parsing module 220 is triggered.
  • the parsing module 220 parses the received background anti-theft open command, and obtains the verification information carried by the background anti-theft open command.
  • the parsing module 220 verifies the IMEI in the verification information, the at least one SIM card number, and the account information portion of the user.
  • the parsing module 220 verifies the IMEI in the verification information.
  • the verification module 220 verifies the SIM card number in the verification information. If at least one SIM card number in the verification information matches the SIM card number in the contact list of the mobile terminal, the SIM card number in the verification information passes the verification. In addition, the parsing module 220 may first verify that at least one SIM card number matches the SIM card number in the contact list of the mobile terminal, and secondly, verify the IMEI in the verification information, which is not limited by the embodiment of the present invention.
  • the format of the SIM card number included in the verification information in the embodiment of the present invention may be any integer value other than 0, which is not limited by the embodiment of the present invention.
  • the verification information includes two SIM card numbers, one of which matches the SIM card number in the contact list of the mobile terminal, and the other SIM card number does not match the SIM card number in the contact list of the mobile terminal.
  • the SIM card number in the verification information is verified.
  • the contact list of the user's mobile terminal may change from time to time due to factors such as the change of position, the change of the location of the Principality. Therefore, in the embodiment of the present invention, if the SIM card number included in the verification information matches a SIM card number in the contact list of the mobile terminal, the SIM card number in the verification information passes the verification.
  • the trust identification module 250 identifies the verified SIM card number as the trusted card number.
  • the parsing module 220 continues to verify the account information of the user in the verification information.
  • the user account information in the embodiment of the present invention may be a user name and a password, and may be a user name and a verification code randomly selected by the system, and may also be a user's email account, etc., which is not limited by the embodiment of the present invention.
  • the user name and password are selected as the user account information. In actual use, using the user name and password as the account information to log in can reasonably and effectively ensure the security of the user account.
  • the embodiment of the present invention uses the username and password to log in to the account information to obtain the ID of the account.
  • the parsing module 220 After obtaining the account ID, the parsing module 220 sends the account ID to the server, and the server ID verifies the account ID. After receiving the verification result obtained by the server, the parsing module 220 determines whether the account information of the user passes the verification. If the user's account information does not pass the verification, the parsing module 220 determines that the verification information has not passed the verification. If the account information of the user passes the verification, the parsing module 220 determines that the verification information passes the verification.
  • the verification information of the mobile terminal includes the IMEI, the at least one SIM card number, and the account information of the user, if only three of them simultaneously pass the verification, the verification information passes the verification. For example, when the IMEI and the at least one SIM card number in the verification information pass the verification, but the user account information in the verification information fails the verification, the verification information fails the verification. In addition, in the embodiment of the present invention, if the IMEI in the verification information is first verified, and the IMEI fails to pass the verification, the SIM card number in the verification information and the account information of the user need not be verified, and the verification information cannot pass the verification.
  • the verification information when all the information included in the verification information is verified, the verification information is verified, so that the user's mobile terminal does not open the anti-theft command due to the malicious operation of the unscrupulous person or the user's mistake operation, thereby avoiding unnecessary In the case of turning on the anti-theft function to bring trouble to the user.
  • the parsing module 220 in the client determines that the verification information has not passed the verification
  • the parsing module 220 triggers the denial module 240.
  • the parsing module 220 in the client determines that the verification information passes the verification
  • the parsing module 220 triggers the anti-theft opening module 230.
  • the anti-theft function is enabled, when the anti-theft processing module 260 receives the anti-theft instruction of the verified account ID, the embodiment of the present invention parses the anti-theft instruction and executes the anti-theft operation corresponding to the anti-theft instruction.
  • the login server sends a background anti-theft open command to the lost mobile phone
  • the client in the embodiment of the present invention verifies the background anti-theft open command after receiving the background anti-theft open command. If the background anti-theft opening command passes the verification, the anti-theft function is turned on in the background of the mobile phone. After the anti-theft function is enabled in the background of the mobile phone, the anti-theft command can be sent to the lost mobile phone through the bound friend number or the ID in the registered user account information. After receiving the anti-theft command, the mobile phone can automatically lock the screen or feedback the replaced SIM card number to the server or return the real-time location of the mobile phone to the server according to the anti-theft command, thereby helping the owner to retrieve the stolen mobile phone.
  • the embodiments of the present invention can achieve the following beneficial effects:
  • the background anti-theft open command can be sent to the server to Mobile terminal. After receiving the background anti-theft open command, it parses and verifies it to ensure that the received background anti-theft command is a real and valid and reliable command, avoiding receiving background anti-theft commands sent from untrusted or malicious servers, causing the mobile terminal to open incorrectly.
  • Anti-theft function If the malicious server maliciously locks the mobile terminal using the anti-theft function, causing all or part of the functions of the mobile terminal to be unavailable, the user may be adversely affected.
  • the embodiment of the present invention turns on the anti-theft function in the background of the mobile terminal according to the background opening anti-theft command, which solves the problem that the anti-theft function cannot be opened after the mobile terminal is lost in the prior art.
  • the method of remotely opening the anti-theft function enables the lost mobile terminal to open the anti-theft without being retrieved, thereby improving the security of the mobile terminal, and the verification function also prevents the mobile terminal from being maliciously turned on by the anti-theft function. Improve the security of mobile terminals.
  • the embodiment of the present invention can open the anti-theft function of the mobile terminal after the mobile terminal is lost, and then perform the corresponding anti-theft operation according to the anti-theft instruction, thereby achieving the beneficial effect of more reasonable and effective guarantee of the security of the mobile terminal and combating theft crime.
  • FIG. 3 is a flow chart showing the processing of the mobile terminal anti-theft method according to an embodiment of the present invention. As shown in FIG. 3, the flow includes at least steps S302 to S306.
  • Step S302 Receive an anti-theft command from a sender, where the anti-theft command uses a short message as a transmission carrier.
  • Step S304 parsing the anti-theft command, and obtaining an anti-theft command corresponding to the instruction.
  • Step S306 performing an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
  • the anti-theft command from the sender that uses the short message as the transmission carrier is received, the anti-theft command is obtained by parsing the anti-theft command, and the corresponding anti-theft operation can be performed according to the anti-theft command. Therefore, the anti-theft command in the embodiment of the present invention is from a device or a terminal capable of sending a short message, and a device or a terminal capable of sending a short message (such as a mobile phone, a computer, a tablet, etc.) can be realized, so that the anti-theft of the mobile terminal can be realized conveniently and quickly.
  • a short message such as a mobile phone, a computer, a tablet, etc.
  • the use of other devices or terminals capable of sending short messages can enable the anti-theft function of the mobile terminal to avoid theft of the anti-theft function by the mobile terminal itself, as the prior art says.
  • the embodiment of the present invention can still receive the anti-theft instruction of the sender, and perform the anti-theft operation according to the anti-theft command obtained by analyzing the anti-theft instruction. For example, after the user mobile terminal is lost, by sending an anti-theft command to the stolen mobile terminal, the embodiment of the present invention can perform a lock screen operation on the stolen mobile terminal to prevent the thief from using the mobile terminal.
  • the embodiment of the present invention can also obtain the identity information of the thief (such as a photo of the thief, a fingerprint, etc.). After the identity information of the thief is obtained according to the embodiment of the present invention, the thief can be arrested according to the identity identification information. Therefore, the embodiment of the present invention can effectively prevent theft of the terminal after the terminal is stolen, and reduce the crime rate of theft and protect the security of the user property.
  • the anti-theft command received by the embodiment of the present invention uses a short message as a transmission carrier.
  • the embodiment of the invention registers the short message interception function.
  • Figure 4 shows the basis A flowchart of processing a registered short message interception function according to an embodiment of the present invention.
  • the embodiment of the present invention first registers a short message interception function. After the registration is completed, the embodiment of the present invention performs step S404 to generate a mapping table corresponding to the anti-theft command and the anti-theft command.
  • the mapping table may also be referred to as a “sms-command table”, and the anti-theft command corresponding to the received short message may be found and determined according to the table.
  • the anti-theft command and the anti-theft command form a correspondence relationship. For example, “Dingwei#”, “Suoding#”, etc.
  • "Dingwei#” in the anti-theft command can find the Locate command in the corresponding anti-theft command in the mapping table.
  • "Suoding#" in the anti-theft command can find the corresponding in the mapping table.
  • the lock screen (Lock) command in the anti-theft command is the mapping table.
  • the anti-theft command stores an identification character identifying the anti-theft command to help identify the anti-theft command in the short message. For example, “#” in “Dingwei#”, “Suoding#”, or “*" before and after the anti-theft command in "*Dingwei*".
  • the embodiment of the present invention can identify and intercept the anti-theft instruction in the short message, thereby being able to continue execution. Anti-theft operation.
  • the recognized character in this example can be a combination of one or more characters.
  • the recognized characters Due to the distinguishing characteristics of the recognized characters, special characters that are not commonly used are usually selected as the recognized characters, such as "#" and "*" mentioned above, and for example, characters such as Roman letters and Greek letters that are not commonly used can be designated as the recognized characters. .
  • the combination of multiple characters can enhance the verification function of identifying characters.
  • the following anti-theft format can be set: if a special character is detected every N characters, it proves that the short message is an anti-theft SMS, not a normal short message. At this time, according to the length of the short message content, the number of special characters changes accordingly, which may be 1, 2, 3, ....
  • the embodiment of the present invention performs the operation according to the processing flowchart of the short message receiving processing method according to an embodiment of the present invention as shown in FIG. 4 .
  • the embodiment of the present invention receives the short message (ie, step S502)
  • the embodiment of the present invention performs step S504 to determine whether the received short message carries the anti-theft instruction.
  • the embodiment of the present invention queries whether the received short message carries the special character included in the mapping table. If the special character is included, it is determined that the received short message carries the anti-theft command, and the embodiment of the present invention continues to perform step S506. If the special character is not included, it is determined that the received short message does not carry the anti-theft command, and the embodiment of the present invention continues to step S508.
  • the embodiment of the present invention determines that the short message is carried in the short message, and then intercepts the short message (also commonly referred to as eating the short message).
  • intercepting the short message can prevent the short message from appearing in the system of the mobile terminal, causing the suspicion of the thief, and causing the thief to be vigilant. If the mobile terminal's system displays the short message carrying the anti-theft command, the thief judges that the mobile terminal turns on the anti-theft function, and the thief may perform operations such as flashing or unplugging the battery to the mobile terminal, thereby reducing the stolen mobile terminal being retrieved.
  • step S506 the embodiment of the present invention continues to perform step S510, acquiring the anti-theft instruction information in the short message, and triggering the operation of determining the identity information of the sender, and the process ends. If it is determined that the received short message does not carry the anti-theft command, the embodiment of the present invention performs step S508 to release the short message, and the process ends.
  • releasing the short message can reduce the vigilance of the thief, and is beneficial for recovering the stolen terminal and capturing the thief. For example, when the user's mobile terminal is lost After that, if the thief sees that the mobile terminal can receive the short message in the stolen mobile terminal, it is considered that the mobile terminal is not locked, and the anti-theft function is not turned on.
  • the embodiment of the present invention intercepts the short message carrying the anti-theft command so that it cannot be displayed in the system of the mobile terminal, but performs the anti-theft operation according to the anti-theft instruction carried in the short message in the background.
  • the embodiment of the invention can reduce the vigilance of the thief and increase the possibility of the stolen mobile terminal retrieving, thereby effectively curbing the occurrence of theft crime and protecting the user's property security.
  • the embodiment of the present invention acquires the anti-theft instruction information in the short message and triggers the operation of determining or verifying the sender identity information. As shown in step S304 in FIG. 3, the embodiment of the present invention parses the anti-theft command, and obtains the anti-theft command corresponding to the instruction.
  • the anti-theft instruction is parsed, and the verification code of the sender that sends the anti-theft instruction is obtained. After the verification code is obtained, the embodiment of the present invention continues to match the obtained verification code with the verification code pre-stored by the mobile terminal, and determines whether to acquire the anti-theft command corresponding to the anti-theft instruction according to the matching result. If the obtained verification code matches the trusted mobile terminal identifier and/or password pre-stored by the mobile terminal, the anti-theft command is obtained.
  • the obtained verification code does not match the trusted mobile terminal identifier and/or password pre-stored by the mobile terminal, in order to avoid receiving the anti-theft command sent by the malicious sender, the erroneous anti-theft operation is performed on the mobile terminal, and the embodiment of the present invention ignores the Anti-theft command.
  • the verification code may be the sender's mobile terminal identifier and/or the password that the sender can trust.
  • the sender's mobile terminal identifier includes at least one of a sender's phone number, a sender's SIM card number, and a sender's IMEI.
  • the password that proves that the sender can trust may be at least one of the sender's mobile terminal identifier and a pre-set string that the sender can trust. For example, any combination of numbers and letters can be set to a string that proves that the sender can trust. For example, ac1088206, A34TFAK6808, etc. It is also possible to set the name of the user or the birthday of the user, the birthday of the pet as a password to prove that the sender can trust, and the like.
  • FIG. 6 shows a process flow diagram of a method of pre-storing a trusted mobile terminal identity and/or password in accordance with a preferred embodiment of the present invention.
  • the trusted mobile terminal identifier and/or password are collectively referred to as a password, and the trusted mobile terminal identifier is referred to as a relative friend number.
  • the flow includes at least steps S602 to S612.
  • Step S602 whether to set a relative friend number.
  • step S604 the friend number is set on the mobile terminal. If yes, step S604 is performed, and if no, step S608 is performed.
  • Step S604 setting a relative friend number.
  • the embodiment of the present invention selects several common contact telephone numbers according to the address book or the common contact list or white list local to the mobile terminal, and sets the number as a relative friend number.
  • Step S606 After setting the family and friends number, set the password as the relative friend number. After the mobile terminal receives the short message carrying the anti-theft command, the anti-theft command is parsed to obtain the verification code. If the verification code matches the pre-set number of friends and relatives as the password, the anti-theft command corresponding to the anti-theft command is obtained.
  • Step S608 whether a password is set.
  • step S612 is performed.
  • Step S610 setting a password according to a string input by the user.
  • step S612 the password is confirmed to be turned on.
  • the trusted mobile terminal identifier and the stored trusted mobile terminal may be set by setting the trusted mobile terminal identifier and/or the password to be empty. / or password is deleted.
  • the embodiment of the present invention can set the family friend number and the SMS anti-theft password to be empty according to the flow shown in FIG. 6, and click the “open password” column to turn off the password function.
  • the embodiment of the present invention may also select the logout anti-theft function.
  • the embodiment of the present invention obtains a verification code when parsing the anti-theft instruction, and determines whether the anti-theft instruction is encrypted. If the anti-theft command is an encrypted anti-theft command, the embodiment of the present invention decrypts the anti-theft instruction by using a corresponding decryption means, and decrypts the verification code by using a corresponding decryption means, and obtains the decrypted verification code and performs matching.
  • the anti-theft command may be encrypted by using an encryption algorithm.
  • the anti-theft command and the verification code are decrypted by using a corresponding decryption method when parsing the anti-theft command. Limited.
  • the most widely used Data Encryption Standard (DES) is used to encrypt and decrypt the anti-theft command.
  • the embodiment of the present invention can perform encryption processing on other information or contents other than the verification code and the anti-theft command in the received anti-theft instruction.
  • the embodiment of the invention encrypts all the information or content in the anti-theft command, and can enhance the protection of the important information or content in the anti-theft command (such as the verification code or the anti-theft command in the anti-theft command), and improve the security of the received anti-theft command. Sex.
  • the anti-theft command is parsed to obtain the corresponding anti-theft command.
  • the step S306 shown in FIG. 3 is executed, and the operation corresponding to the anti-theft command is executed to implement the anti-theft of the mobile terminal.
  • FIG. 7 shows a process flow diagram for polling a command execution situation in accordance with one embodiment of the present invention.
  • Step S702 in FIG. 7 is executed to determine whether the anti-theft command to be executed is successfully executed. If the anti-theft command fails to be executed according to the judgment result, step S704 is executed, and the anti-theft command is attempted again, and the flow ends. If the anti-theft command is successfully executed according to the judgment result, the flow ends.
  • the polling query is performed on the execution of the anti-theft command to ensure that the anti-theft command acquired by the mobile terminal can be executed in time, so as to prevent the thief from brushing or other operations on the mobile terminal due to the untimely execution of the anti-theft command. Can't be retrieved.
  • the embodiment of the present invention will execute a lock screen command to query whether the lock screen command is successfully executed. If the lock screen command is not executed, the embodiment of the present invention executes a lock screen command to lock the screen of the mobile terminal. If the lock screen command is successfully executed, the embodiment of the present invention abandons the execution of the screen lock command again.
  • FIG. 8 shows a process flow diagram of a method of querying a receipt in accordance with one embodiment of the present invention.
  • the embodiment of the present invention performs step S802 shown in FIG. 8 to request a query receipt from the server.
  • step S804 the embodiment of the present invention performs step S804 to query whether the receipt is successful. If successful, the process ends. If not successful, the embodiment of the present invention returns to step S802 until the query receipt is successful.
  • the embodiment of the invention ensures that the sender of the anti-theft command can know the execution status of the anti-theft command in time, and can know the execution of the anti-theft command in time, and perform the anti-theft operation more efficiently. Further, the embodiment of the present invention can improve the probability of the stolen mobile terminal retrieving.
  • 9 to 11 are flowcharts showing the processing of the anti-theft method of the mobile terminal according to a preferred embodiment of the present invention.
  • the method for supporting the anti-theft method of any of the mobile terminals is described above, and the anti-theft method of the mobile terminal is described more clearly and easily.
  • the sender is set to the mobile phone of the relatives and friends, and the mobile terminal is set to the stolen mobile phone.
  • FIG. 9 is a flow chart showing the processing of the mobile terminal anti-theft method according to a preferred embodiment of the present invention.
  • the preferred embodiment performs step S902 to send an anti-theft SMS to the stolen mobile phone through the mobile phone of the relatives and friends. The number of the friend's mobile phone is pre-stored in the stolen mobile phone.
  • the preferred embodiment performs step S904 to process the anti-theft SMS.
  • step S906 is executed to return the stolen processing result to the mobile phone of the relatives and friends, and the anti-theft processing flow of the stolen mobile phone is completed.
  • the processing flow of the mobile terminal anti-theft method of the preferred embodiment is introduced from the mobile phone side of the relatives and friends and the stolen mobile phone side respectively.
  • the sender and the whistle-selling sender are represented by the family and friends mobile phone. According to the disclosure of the present invention, those skilled in the art can understand that the burglar-proof command sender can not only make the friends and relatives mobile phone, but can be any other communication device that can send short messages. The authenticity of the sender is verified by verifying the password contained in the anti-theft command, and the present invention is not limited thereto.
  • FIG. 10 is a flow chart showing the processing of the mobile terminal anti-theft method on the mobile phone side of the relatives and friends according to an embodiment of the present invention. Referring to FIG. 10, the flow includes at least steps S1002 to S1006.
  • the embodiment edits and sends the anti-theft SMS to the stolen mobile phone through the mobile phone of the relatives and friends.
  • the embodiment can directly transmit by editing the special anti-theft short message.
  • the anti-theft command in the anti-theft SMS is some anti-theft commands with high security requirements, such as "delete mobile phone data", "backup mobile phone data”, etc., this embodiment first encrypts the anti-theft SMS to be sent. Second, the encrypted anti-theft SMS is sent to the stolen phone.
  • step S1002 shown in FIG. 10 in the embodiment, when the anti-theft short message to be sent is encrypted, the special mark is first spliced.
  • the special mark stitched in step S1002 in the above-mentioned map containing special characters and anti-theft instructions.
  • this mapping there are special tags dedicated to encryption. For example, in the mapping, both "Dingwei#” and “Dingwei#E” exist, and the corresponding anti-theft commands are all Locate commands. but “Dingwei#” indicates an unencrypted anti-theft command, and "Dingwei#E" identifies an encrypted anti-theft command.
  • step S1004 to encrypt the remaining content.
  • the number after “Dingwei#E” indicates the verification code, that is, the password or the number of friends and relatives pre-stored by the stolen mobile phone.
  • Step S1004 performs encryption processing on the password or the relative friend number.
  • "DingweiE#ac35e5b301" is obtained.
  • the letters and numbers in the anti-theft command shown in the embodiment of the present invention are only used as examples, and cannot represent the real digits of the real password or the number of friends and relatives or the actual display of the encrypted anti-theft command.
  • step S1006 After encrypting the anti-theft SMS, the embodiment proceeds to step S1006 to send the anti-theft SMS to the stolen mobile phone, and the process ends.
  • FIG. 11 is a flow chart showing the processing of the mobile terminal anti-theft method on the side of the stolen mobile phone according to an embodiment of the present invention. Referring to FIG. 11, the flow includes at least steps S1102 to S1120.
  • Step S1102 receiving an anti-theft message.
  • Step S1104 Determine whether the sender of the received anti-theft SMS is a relative friend number. If yes, step S1110 is directly executed, and if no, step S1106 is performed.
  • Step S1106 Determine whether the received anti-theft SMS contains content encrypted by DES. If yes, go to step S1118, if no, go to step S1108.
  • Step S1108 Determine whether the verification code in the anti-theft SMS is correct.
  • the verification code in the anti-theft SMS may be a password that proves that the sender can be trusted, may be the identification information of the sender's mobile terminal, and may also include both the password and the identification information of the mobile terminal. It is determined that if the verification code in the anti-theft SMS is correct, step S1110 is performed, and if the error occurs, the process ends.
  • Step S1110 Obtain an anti-theft command.
  • the stolen mobile phone After the stolen mobile phone receives the anti-theft SMS, it analyzes the anti-theft command carried in the anti-theft SMS, and acquires the anti-theft command corresponding to the anti-theft command.
  • Step S1112 executing an anti-theft command.
  • the stolen mobile phone After obtaining the anti-theft command, the stolen mobile phone performs the corresponding anti-theft operation according to the anti-theft command. For example, the operation of locking the screen of the stolen mobile phone according to the anti-theft command, or the photographing operation of the unlocking mobile phone according to the anti-theft command, and the like.
  • step S1114 the execution result is returned.
  • the stolen mobile phone After the execution of the anti-theft command is completed, the stolen mobile phone returns the execution result to the sender, prompting the sender to execute the command.
  • Step S1116 After returning the execution result to the sender, the stolen mobile phone anti-theft operation is successfully completed, and the process ends.
  • Step S1118 If the DES encrypted content exists in the anti-theft SMS, the short message content is decrypted.
  • Step S1120 Determine whether the decryption of the anti-theft SMS content is successful. If yes, the process returns to step S1108, and if not, the process ends.
  • the embodiment of the present invention provides a mobile terminal anti-theft client for implementing the above-mentioned mobile terminal anti-theft method.
  • FIG. 12 is a schematic structural diagram of a mobile terminal anti-theft client according to an embodiment of the present invention.
  • the client of the embodiment of the present invention includes at least a receiving module 1220, a parsing module 1230, and an executing module 1260.
  • the receiving module 1220 is configured to receive an anti-theft command from the sender, wherein the anti-theft command uses the short message as the sending carrier.
  • the parsing module 1230 is coupled to the receiving module 1220 and the executing module 1260 respectively, configured to parse the anti-theft command, and obtain an anti-theft command corresponding to the command.
  • the execution module 1260 is coupled to the parsing module 1230 and configured to perform an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
  • the short message intercepting module 1210 performs a filtering operation on the short message received by the mobile terminal. That is, after the mobile terminal receives the short message, the short message intercepting module 1210 determines whether the received short message carries the anti-theft instruction.
  • the short message intercepting module 1210 determines that the short message includes the anti-theft command, the short message intercepting module intercepts the short message, prevents the short message from being displayed in the mobile terminal system, and triggers the receiving module 1220 to receive the anti-theft command with the short message as the carrier.
  • the short message intercepting module 1210 intercepts the short message carrying the anti-theft command to prevent the short message from appearing in the system of the mobile terminal, causing the thief's suspicion, and causing the thief to be vigilant.
  • the thief judges that the mobile terminal turns on the anti-theft function, and the thief may perform operations such as flashing or unplugging the battery to the mobile terminal, thereby reducing the stolen mobile terminal being retrieved. Probability, and increase the difficulty of the relevant departments to retrieve stolen terminals and capture theft.
  • the short message intercepting module 1210 determines that the received short message does not carry the anti-theft command, releasing the short message can reduce the vigilance of the thief, and is beneficial for recovering the stolen terminal and capturing the thief. For example, after the user's mobile terminal is lost, if the thief sees that the mobile terminal can receive the short message in the stolen mobile terminal, the mobile terminal is considered not to be locked, and the anti-theft function is not turned on.
  • the short message intercepting module 1210 in the embodiment of the present invention intercepts the short message carrying the anti-theft command so that it cannot be displayed in the system of the mobile terminal, but triggers the receiving module 1210 to receive the anti-theft command carried in the short message in the background, and performs Anti-theft operation.
  • the thief cannot find that the mobile terminal has turned on the anti-theft function and performs the corresponding anti-theft operation, such as reporting the real-time location of the mobile terminal and even reporting the fingerprint of the thief. Therefore, the embodiment of the invention can reduce the vigilance of the thief and increase the possibility of the stolen mobile terminal retrieving, thereby effectively curbing the occurrence of theft crime and protecting the user's property security.
  • the receiving module 1220 After the short message intercepting module 1210 intercepts the short message carrying the anti-theft command, the receiving module 1220 is triggered.
  • the receiving module 1220 receives the anti-theft command with the short message as the carrier, and triggers the parsing module 1230 to parse the anti-theft command.
  • the analysis module 1230 analyzes the anti-theft command and obtains a verification code of the sender that transmitted the anti-theft command. After the verification code is obtained, the parsing module 1230 continues to match the obtained verification code with the locally stored trusted mobile terminal identifier and/or password, and determines whether to obtain the anti-theft command corresponding to the anti-theft instruction according to the matching result.
  • the trusted mobile terminal identifier and/or password stored locally by the client is stored by the storage module 1240. If the obtained verification code matches the trusted mobile terminal identifier and/or password stored by the storage module 1240, the resolution is resolved. Module 1230 obtains an anti-theft command.
  • the parsing module 1230 ignores the erroneous placement operation on the mobile terminal to avoid receiving the anti-theft command sent by the malicious sender.
  • the anti-theft command in addition, in the embodiment of the present invention, the logout module 1250 coupled with the storage module 1240 can delete the sender's mobile terminal identifier and/or password stored by the storage module 1240, and deregister the anti-theft function.
  • the parsing module 1230 obtains the verification code when parsing the anti-theft command, and determines whether the anti-theft command is encrypted. If the anti-theft command is an encrypted anti-theft command, the parsing module 1230 decrypts the anti-theft command by using a corresponding interface means, and decrypts the verification code by using a corresponding decryption means, and obtains the decrypted verification code and matches.
  • the anti-theft instruction may be encrypted by an arbitrary encryption algorithm, and the parsing module 1230 decrypts the anti-theft instruction and the verification code by using a corresponding decryption method when parsing the anti-theft instruction, which is not used in the embodiment of the present invention.
  • the anti-theft instruction is encrypted and decrypted by using the most widely used DES.
  • the embodiment of the present invention can perform encryption processing on other information or contents other than the verification code and the anti-theft command in the received anti-theft instruction.
  • the parsing module 1230 After the parsing module 1230 matches the verification code carried in the anti-theft command and the verification code pre-stored by the storage module 1240, if the verification code of the sender and the verification code stored in the storage module 1240 can match, the parsing module 1230 can analyze the anti-theft.
  • the instruction gets the corresponding anti-theft command.
  • the trigger execution module 1260 After the parsing module 1230 obtains the anti-theft command, the trigger execution module 1260 performs a corresponding operation according to the anti-theft command to implement the mobile terminal anti-theft. In the process in which the execution module 1260 executes the anti-theft command, the command polling module 1270 coupled with the execution module 1260 polls whether the anti-theft command is successfully executed.
  • the command polling module 1270 triggers the execution module 1260 to attempt to execute the anti-theft command again. If the anti-theft command is successfully executed, the command polling module 1270 triggers the execution module 1260 to end execution of the anti-theft command.
  • the command polling module 1270 performs a polling query on the execution of the anti-theft command to ensure that the obtained anti-theft command can be executed in time to prevent the thief from brushing or other operations on the mobile terminal due to the untimely execution of the anti-theft command.
  • the mobile terminal cannot be retrieved.
  • the command polling module 1270 queries the lock screen command for successful execution. If the lock screen command is not successfully executed, the command polling module 1270 triggers the execution module 1260 to attempt to execute the lock screen command again. If the lock screen command is executed successfully, the execution module 1260 discards the screen lock command again.
  • the embodiment of the present invention can achieve the following beneficial effects:
  • the anti-theft command from the sender that uses the short message as the transmission carrier is received, the anti-theft command is obtained by parsing the anti-theft command, and the corresponding anti-theft operation can be performed according to the anti-theft command. Therefore, the anti-theft command in the embodiment of the present invention is from a device or a terminal capable of sending a short message, and a device or a terminal capable of sending a short message (such as a mobile phone, a computer, a tablet, etc.) can be realized, so that the anti-theft of the mobile terminal can be realized conveniently and quickly.
  • a short message such as a mobile phone, a computer, a tablet, etc.
  • the use of other devices or terminals capable of sending short messages can enable the anti-theft function of the mobile terminal to avoid theft of the anti-theft function by the mobile terminal itself, as the prior art says.
  • Embodiment of the present invention at the end of the mobile After the terminal is stolen, the sender's anti-theft command can still be received, and the anti-theft operation is performed according to the anti-theft command obtained by parsing the anti-theft command. For example, after the user mobile terminal is lost, by sending an anti-theft command to the stolen mobile terminal, the embodiment of the present invention can perform a lock screen operation on the stolen mobile terminal to prevent the thief from using the mobile terminal.
  • the embodiment of the present invention can also obtain the identity information of the thief (such as a photo of the thief, a fingerprint, etc.). After the identity information of the thief is obtained according to the embodiment of the present invention, the thief can be arrested according to the identity identification information. Therefore, the embodiment of the present invention can effectively prevent theft of the terminal after the terminal is stolen, and reduce the crime rate of theft and protect the security of the user property.
  • FIG. 13 is a flow chart showing the processing of the mobile terminal anti-theft method according to an embodiment of the present invention. As shown in FIG. 13, the flow includes at least steps S1302 to S1306.
  • Step S1302 receiving an anti-theft command from the server, wherein the anti-theft command is sent to the server by the activated account.
  • Step S1304 Analyze the anti-theft command, and obtain an anti-theft command corresponding to the instruction.
  • Step S1306 Perform an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
  • the anti-theft instruction forwarded by the server from the activated account is received, the anti-theft command is obtained by parsing the anti-theft command, and the corresponding anti-theft operation can be performed according to the anti-theft command.
  • the anti-theft command in the embodiment of the present invention is from a device or terminal capable of logging in to the activated account, and the device or the terminal is required to send the anti-theft command by using the activated account, and the activated account is used to send a short message or a network command. All of them can send anti-theft commands.
  • the embodiment of the present invention can still receive the anti-theft instruction of the sender, and perform the anti-theft operation according to the anti-theft command obtained by analyzing the anti-theft instruction.
  • the embodiment of the present invention can perform a lock screen operation on the stolen mobile terminal to prevent the thief from using the mobile terminal.
  • the inability of the thief to use the mobile terminal causes the thief to fail to renovate the mobile terminal by brushing the machine, and the thief cannot resell the stolen mobile terminal for profit. Further, the probability of theft crime can be effectively reduced.
  • the embodiment of the present invention can also obtain the identity information of the thief (such as a photo of the thief, a fingerprint, etc.).
  • the thief After the identity information of the thief is obtained according to the embodiment of the present invention, the thief can be arrested according to the identity identification information. Therefore, the embodiment of the present invention can effectively prevent theft of the terminal after the terminal is stolen, and reduce the crime rate of theft and protect the security of the user property.
  • the embodiment of the present invention receives an anti-theft instruction from a server.
  • the anti-theft instruction format may only include an anti-theft command, and may also include an anti-theft command, and other identification information other than the anti-theft command.
  • the anti-theft instruction may include at least one of an anti-theft policy identifier, an activated account identifier, an anti-theft command, and an anti-theft object identifier.
  • the anti-theft policy is identified as an account, and is used to determine an identifier of the anti-theft policy. After the identifier is determined, no change occurs.
  • the activated account ID is the unique account identification number (UID) generated for the account at the time of the current login.
  • the anti-theft command includes a command number (ACTIONID) and/or a task number (TASKID), wherein the corresponding command can be found in the correspondence table containing the ACTIONID and the anti-theft command by the ACTIONID.
  • TASKID is a corresponding task number generated in the server when the anti-theft command is transmitted, and the TASKID can query the execution status of the anti-theft command corresponding to the TASKID in the server.
  • the TASKID is 0.
  • the anti-theft object identifier may include the IMEI of the mobile terminal, and may also include other identity identifiers that can uniquely identify the mobile terminal.
  • the format of the anti-theft instruction can be set as:
  • OTHERS is additional information related to the anti-theft command.
  • the additional information of Erase is to specify which part of the mobile terminal system to delete data (such as deleting the SMS data or notebook data in the system or the chat data of the application, etc.).
  • the additional information of TakePhoto can be a requirement for the clarity of the captured photo.
  • the format of the terminal lock instruction is: [Accout] 200868996, 323450296939291, LOCK, 2000000, 0.
  • step S1304 is executed to parse the anti-theft command.
  • the embodiment of the present invention determines whether the anti-theft instruction is encrypted. If the anti-theft command is an encrypted anti-theft command, the embodiment of the present invention decrypts the anti-theft command by using a corresponding decryption means.
  • the encryption and decryption mode refer to the corresponding introduction part of the second embodiment, and no further details are provided here.
  • FIG. 14 is a process flow diagram showing a method of turning on the anti-theft function in accordance with one embodiment of the present invention. Referring to FIG. 14, the flow includes at least steps S1402 through S1414.
  • Step S1402 logging in to the activated account.
  • a login request is sent to the login server over the network.
  • Step S1404 returning login information.
  • the login server After the login server receives the login request, it returns the login information, such as "account name" and "account identification code”.
  • Step S1406 Send a Bind command by using a short message.
  • ACTIONID is Bind
  • TASKID is 0,
  • OTHERS is empty.
  • the number carried in the instruction is the telephone number of the mobile terminal. After the binding is successful, the mobile phone number of the mobile terminal is set to a trusted number, and the anti-theft function is activated.
  • Step S1408 checking the Bind state.
  • the Bind status is checked through the network.
  • step S1410 the anti-theft server returns a Bind result.
  • the query result returned by the anti-theft server contains information in OTHERS format. If OTHERS is 1, it indicates that the mobile terminal is successfully bound. If OTHERS is 0, the mobile terminal fails to bind.
  • step S1408 and step S1410 can be repeatedly executed repeatedly, wherein if the query result returned by the anti-theft server is not received or the binding result is failed every predetermined time (for example, 20 seconds), the Bind state is checked.
  • step S1412 if the Bind state is repeatedly checked three times, the binding cannot be successfully performed, and the Bind instruction that does not carry the mobile terminal's telephone number is sent through the network. If the binding is successful, the anti-theft function is activated, and the mobile terminal is identified as an untrusted number.
  • Step S1414 The anti-theft server returns a Bind result sent by the network.
  • the login party in FIG. 14 may be the side of the activated account after being stolen, or may be the mobile terminal side.
  • the login server and the anti-theft server are the same server.
  • Figure 15 shows a process flow diagram of a method of unbinding in accordance with one embodiment of the present invention. Referring to FIG. 15, the flow includes at least steps S1502 through S1506.
  • step S1502 an unbind command is sent.
  • this step sends an Unbind command to the anti-theft server through the network.
  • the Unbind command is an anti-theft command that uses the anti-theft command format mentioned above.
  • ACTIONID is Unbind
  • TASKID is 0,
  • OTHERS is empty.
  • step S1504 the anti-theft server returns an Unbind result. If the unbinding is successful, step S1506 is performed, and if the unbinding fails, the user is prompted to perform other operations.
  • step S1506 the binding is successfully cancelled, and the account information of the activated account and the anti-theft record are deleted.
  • the account information of the activated account and the anti-theft record are deleted.
  • the "account name" and "account identification code" in the account information are set to be empty, and the database of the anti-theft record corresponding to the account is deleted.
  • the embodiment of the present invention can cancel the anti-theft function.
  • the embodiment of the present invention first logs in the activated account in the client that can trigger the theft prevention of the mobile terminal.
  • the client capable of triggering theft prevention of the mobile terminal may be a browser, and may be a client with a mobile phone anti-theft function on the mobile phone side (for example, a mobile guard), or may be a personal computer (Personal Computer, below)
  • a client (such as a security guard) with a mobile phone anti-theft function on the side of the PC is not limited in this embodiment of the present invention.
  • the anti-theft command can be sent by using the short message and/or the network command as the carrier to ensure that the mobile terminal can be burglarized by sending the anti-theft command in time through the common sender.
  • the activated account sends the anti-theft command by using the short message as the carrier.
  • the mobile terminal after receiving the short message, the mobile terminal first determines whether the short message carries the anti-theft command, and if so, intercepts the short message, and triggers the parsing anti-theft instruction operation as shown in step S1304 in FIG. If not, release the message.
  • the embodiment of the present invention determines that the short message is carried in the short message, and then intercepts the short message (usually referred to as eating the short message).
  • the short message usually referred to as eating the short message.
  • the activated account is logged in, and the anti-theft command sent by the activated account with the short message and/or the network as the carrier is received.
  • the mobile terminal that performs the anti-theft operation is selected in the device list of the activated account, and the anti-theft command for the mobile terminal is sent to the server by the activated account.
  • the "Get Device List” command is sent to the server.
  • ACTIONID is GET_LIST
  • TASKID is 0, and OTHERS is empty.
  • the server returns a list of devices corresponding to the account.
  • the device list includes information such as identity information (such as IMEI or UID) of the mobile terminal and a phone number of the mobile terminal.
  • the activated account selects the specified mobile terminal in the device list, and sends an anti-theft command to the mobile terminal to the server, which is forwarded by the server to the mobile terminal.
  • the identifier of the mobile terminal is input from the activated account, and the input identifier of the mobile terminal is added to the device list of the activated account. And, the anti-theft operation corresponding to the mobile terminal is selected and sent to the mobile terminal by the server.
  • the mobile terminal After receiving the anti-theft command, the mobile terminal parses the anti-theft command to obtain an anti-theft command, and then performs an anti-theft operation according to the anti-theft command.
  • the embodiment of the present invention After the execution of the received anti-theft command is completed, the embodiment of the present invention returns the execution result as a receipt to the server, and reminds the server that the execution has been performed. After the server receives the receipt, it can continue the next anti-theft operation. In addition, if the server does not receive the receipt within the specified time, the embodiment of the present invention initiates a polling query to check whether the receipt is successful. See Figure 8 for the process flow of the method of querying the receipt.
  • Figure 16 is a flow chart showing the processing of the mobile terminal anti-theft method in accordance with a preferred embodiment of the present invention. Referring to FIG. 16, the flow includes at least steps S1602 through S1618.
  • Step S1602 Log in to the activated account, and send an anti-theft command to the server through the activated account.
  • Step S1604 The server returns a processing result of the anti-theft instruction, and prompts the activated account server to receive the anti-theft instruction.
  • the processing result returned by the server carries the TASKID generated by the server.
  • step S1604 After the execution of the step S1604, according to the anti-theft command sent by the activated account, if the mobile phone number of the stolen mobile terminal is a trusted number, step S1608 is directly executed. If the mobile phone number of the stolen mobile terminal is a non-signal code, step S1606 is performed. .
  • Step S1606 Enter the mobile phone number of the stolen mobile terminal in the activated account, and send it to the server to add the mobile phone number to the device list corresponding to the activated account stored in the server. After the mobile phone number is added to the device list, the mobile phone number of the stolen mobile terminal is converted from an untrusted number to a trusted number.
  • Step S1608 After determining that the mobile phone number of the stolen mobile terminal is a trusted number, the server sends the anti-theft command to the stolen mobile terminal by using a short message.
  • the ACTIONID and OTHERS in the anti-theft command are the same as the ACTIONID and OTHERS in the anti-theft command sent to the server by the activated account, and the TASKID in the anti-theft command is the TASKID generated in step S1604.
  • Step S1610 The activated account sends an anti-theft command, and sends a query request to the server through the network every predetermined time (for example, 30 seconds) to query the execution result of the anti-theft command.
  • the query request carries the identity information of the stolen mobile terminal (such as the IMEI or UID of the stolen mobile terminal, etc.) and the TASKID generated in step S1604.
  • Step S1612 After receiving the query request, the server queries the execution status of the anti-theft command and returns to the activated account. If the server returns "the stolen mobile terminal did not receive the anti-theft command", "the stolen terminal is executing the anti-theft command”, "the stolen terminal successfully executed the anti-theft command” or "the stolen terminal failed to execute the anti-theft command", etc., to the activated account . The user can view the stolen terminal to execute the anti-theft instruction through the activated account in time, and select to perform the next anti-theft instruction and the like according to the execution of the anti-theft instruction.
  • Step S1614 After the stolen terminal completes the execution of the anti-theft command, the execution result is returned to the server. After receiving the returned result, the server updates the status of the anti-theft command corresponding to the TASKID to "completed".
  • Step S1616 The activated account sends a query request to the server to query the execution result of the anti-theft command.
  • Step S1618 After receiving the query request of the activated account, returning “the stolen terminal executes the anti-theft command successfully” to the activated account.
  • step S1610 and step S1612 can be polled one or more times. If the account has been activated, the query request can be sent to the server every 30 seconds to query the execution of the anti-theft command by the stolen terminal until the server returns to the stolen terminal to execute the anti-theft command successfully. That is, in the above flow, step S1616 and step S1618 are the repetition of step S1610 and step S1612.
  • Figure 17 is a flow diagram showing the process of transmitting an anti-theft command on the side of an activated account in accordance with one embodiment of the present invention. Referring to FIG. 17, the flow includes at least steps S1702 through S1708.
  • Step S1702 Generate an antitheft instruction content.
  • ACTIONID is the command number of the command to be executed, such as Locate, Erase, TakePhoto, and so on.
  • TASKID is 0,
  • OTHERS is additional information related to the anti-theft command.
  • the additional information of the Erase command is to specify which part of the data in the mobile terminal system is deleted (for example, deleting the short message data or the notebook data in the system or the chat data of the application, etc.).
  • the additional information of TakePhoto can be a requirement for the clarity of the captured photo.
  • step S1704 the anti-theft instruction is encrypted.
  • the DES is used to encrypt the anti-theft command to ensure that the anti-theft command can be sent to the server more securely.
  • the server forwards to the stolen terminal.
  • the preferred embodiment may skip the encryption step if the communication between the activated account and the server uses an encryption protocol such as a Hypertext Transfer Protocol over Secure Socket Layer (hereinafter referred to as Https).
  • Https Hypertext Transfer Protocol over Secure Socket Layer
  • Step S1706 Send an anti-theft command to the server.
  • Step S1708 Send a polling query request to the server, and query the execution status of the theft prevention terminal by the stolen terminal. If the execution is completed, the process ends. If not completed, step S1708 is repeated.
  • FIG. 18 is a flowchart showing a method of processing the theft side of the mobile terminal according to an embodiment of the present invention. Referring to FIG. 18, the flow includes at least steps S1802 through S1814.
  • Step S1802 receiving a short message carrying an anti-theft command.
  • step S1804 the anti-theft instruction is decrypted. If it is possible to decrypt, step S1808 is executed, and if it is not possible to decrypt, step S1806 is executed.
  • step S1806 the decryption fails, the execution of the anti-theft command fails, and the process ends.
  • Step S1808 The decryption succeeds, and it is determined whether the mobile terminal identifier (such as IMEI or UID) carried in the anti-theft command is correct. If yes, step S1810 is performed. If not, the sender of the anti-theft command is erroneously transmitted, and the anti-theft command is not executed by the mobile terminal, and the process returns to step S1806.
  • the mobile terminal identifier such as IMEI or UID
  • Step S1810 Parse the received anti-theft command, and acquire an anti-theft command corresponding to the anti-theft command.
  • Step S1812 executing an anti-theft command.
  • step S1814 after the execution is completed, the execution result is returned to the server, and the process ends.
  • the embodiment of the present invention provides a mobile terminal anti-theft client for implementing the above-mentioned mobile terminal anti-theft method.
  • FIG. 19 is a schematic structural diagram of a mobile terminal anti-theft client according to an embodiment of the present invention.
  • the client of the embodiment of the present invention includes at least a receiving module 1940, a parsing module 1950, and an executing module 1960.
  • the receiving module 1940 is configured to receive an anti-theft command from the server, wherein the anti-theft command is sent to the server by the activated account.
  • the parsing module 1950 is coupled to the receiving module 1940 and configured to parse the anti-theft command to obtain an anti-theft command corresponding to the command.
  • the execution module 1960 is coupled to the execution module 1950 and configured to perform an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
  • the determining module 1910 in the mobile terminal anti-theft client shown in FIG. 19 determines whether the received short message carries an anti-theft instruction after the mobile terminal receives the short message. If yes, the interception module 1920 is triggered to intercept the short message carrying the anti-theft command. If not, the release module 1930 is triggered to release the short message.
  • the triggering intercepting module 1920 intercepts the short message (also commonly referred to as eating the short message).
  • eating the short message can prevent the short message from appearing in the system of the mobile terminal, causing the suspicion of the thief, and causing the thief to be vigilant.
  • the mobile terminal's system displays the short message carrying the anti-theft command
  • the thief judges that the mobile terminal turns on the anti-theft function, and the thief may perform operations such as flashing or unplugging the battery to the mobile terminal, thereby reducing the stolen mobile terminal being retrieved. Probability, and increase the difficulty of the relevant departments to retrieve stolen terminals and capture theft.
  • the trigger release module 1930 releases the short message, which can reduce the vigilance of the thief, and is beneficial to recover the stolen terminal and capture the thief. For example, after the user's mobile terminal is lost, if the thief sees that the mobile terminal can receive the short message in the stolen mobile terminal, the mobile terminal is considered not to be locked, and the anti-theft function is not turned on.
  • the embodiment of the present invention intercepts the short message carrying the anti-theft command so that it cannot be displayed in the system of the mobile terminal, but performs the anti-theft operation according to the anti-theft instruction carried in the short message in the background.
  • the embodiment of the invention can reduce the vigilance of the thief and increase the possibility of the stolen mobile terminal retrieving, thereby effectively curbing the occurrence of theft crime and protecting the user's property security.
  • the intercepting module 1920 is triggered to intercept the short message.
  • the receiving module 1940 coupled to the intercepting module 1920 receives the anti-theft command in the short message, and triggers the parsing module 1950 to parse the anti-theft command.
  • the parsing module 1950 decrypts the anti-theft command by using a corresponding decryption means.
  • the anti-theft command may be encrypted by an arbitrary encryption algorithm, and the parsing module 1950 decrypts the anti-theft command by using a corresponding decryption method when parsing the anti-theft command, which is not limited by the embodiment of the present invention.
  • the anti-theft instruction is encrypted and decrypted by using the most widely used DES.
  • the embodiment of the present invention can perform encryption processing on other information or content other than the anti-theft command in the received anti-theft command.
  • the embodiment of the invention encrypts all the information or content in the anti-theft command, and can enhance the protection of the important information or content in the anti-theft command (such as the verification code or the anti-theft command in the anti-theft command), and improve the security of the received anti-theft command. Sex.
  • the parsing module 1950 parses the anti-theft command
  • the corresponding anti-theft command is obtained.
  • the execution module 1960 coupled to the parsing module 1950 performs an anti-theft operation in accordance with the anti-theft command.
  • the command polling module 1970 coupled with the execution module 1960 polls whether the anti-theft command was successfully executed. If so, the command polling module 1970 triggers the execution module 1960 to end the execution of the anti-theft command. If not, the command polling module 1970 triggers the execution module 1960 to attempt to execute the anti-theft command again.
  • the polling module 1970 performs a polling query on the execution of the anti-theft command to ensure that the anti-theft command acquired by the mobile terminal can be executed in time, so as to prevent the thief from brushing the mobile terminal or other operations due to the untimely execution of the anti-theft command, so that the mobile terminal cannot Was recovered.
  • the embodiment of the present invention will execute a lock screen command to query whether the lock screen command is successfully executed. If the lock screen command is not successfully executed, the command polling module 1970 triggers the execution module 1960 to attempt to execute the lock screen command again to lock the screen of the mobile terminal. If the lock screen command is executed successfully, the command polling module 1970 triggers the execution module 1960 to abandon the execution of the screen lock command again.
  • the embodiment of the present invention further includes an activation module 1980 and a logout module 1990.
  • the activation module 1980 transmits the Bind command with the short message as the carrier to the server by using the activated account, and activates the anti-theft function of the mobile terminal.
  • the mobile phone number of the mobile terminal is a trusted number, and the mobile terminal successfully starts Anti-theft client.
  • the logout module 1990 coupled with the activation module 1980 can send an unbinding command to the server using the activated account. When the unbinding is successful, the logout module 1990 deletes the account information of the activated account and the anti-theft record, and cancels the anti-theft function of the mobile terminal.
  • the activated account can send an anti-theft command by using a short message and/or a network instruction as a carrier to ensure that the mobile terminal is lost, and can use the common sending platform to send an anti-theft command, thereby more effectively protecting the security of the mobile terminal.
  • the activated account is logged in any client that can trigger the theft of the mobile terminal. If the account is activated, you can log in in the browser, and you can log in in the mobile guard or security guard.
  • the embodiment of the present invention can achieve the following beneficial effects:
  • the anti-theft instruction forwarded by the server from the activated account is received, the anti-theft command is obtained by parsing the anti-theft command, and the corresponding anti-theft operation can be performed according to the anti-theft command.
  • the anti-theft command in the embodiment of the present invention is from a device or terminal capable of logging in to the activated account, and the device or the terminal is required to send the anti-theft command by using the activated account, and the activated account is used to send a short message or a network command. All of them can send anti-theft commands.
  • the embodiment of the present invention can still receive the anti-theft instruction of the sender, and perform the anti-theft operation according to the anti-theft command obtained by analyzing the anti-theft instruction.
  • the embodiment of the present invention can perform a lock screen operation on the stolen mobile terminal to prevent the thief from using the mobile terminal.
  • the inability of the thief to use the mobile terminal causes the thief to fail to renovate the mobile terminal by brushing the machine, and the thief cannot resell the stolen mobile terminal for profit. Further, the probability of theft crime can be effectively reduced.
  • the embodiment of the present invention can also obtain the identity information of the thief (such as a photo of the thief, a fingerprint, etc.).
  • the thief After the identity information of the thief is obtained according to the embodiment of the present invention, the thief can be arrested according to the identity identification information. Therefore, the embodiment of the present invention can effectively prevent theft of the terminal after the terminal is stolen, and reduce the crime rate of theft and protect the security of the user property.
  • FIG. 20 is a flow chart showing the processing of the mobile terminal anti-theft method according to an embodiment of the present invention. Referring to FIG. 20, the flow includes at least steps S2002 to S2006.
  • Step S2002 Receive an anti-theft instruction from a personal computer (PC) terminal.
  • PC personal computer
  • Step S2004 parsing the anti-theft command, and obtaining an anti-theft command corresponding to the instruction.
  • Step S2006 Perform an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
  • the anti-theft command from the PC terminal is received, and the anti-theft command is obtained by parsing the anti-theft command. And according to the anti-theft command, the corresponding anti-theft operation can be performed.
  • the anti-theft command in the embodiment of the present invention comes from being able to use the PC terminal to open and use the anti-theft function of the mobile terminal on the premise that the stolen mobile terminal does not have the anti-theft function turned on.
  • the use of a PC terminal to send an anti-theft command is simple in operation, so that the anti-theft of the mobile terminal can be realized conveniently and quickly, and the anti-theft function can be provided to perform anti-theft on the mobile terminal.
  • the embodiment of the present invention can still receive the anti-theft instruction of the sender, and perform the anti-theft operation according to the anti-theft command obtained by analyzing the anti-theft instruction. For example, after the user mobile terminal is lost, by sending an anti-theft command to the stolen mobile terminal, the embodiment of the present invention can perform a lock screen operation on the stolen mobile terminal to prevent the thief from using the mobile terminal. The inability of the thief to use the mobile terminal causes the thief to fail to renovate the mobile terminal by brushing the machine, and the thief cannot resell the stolen mobile terminal for profit.
  • the embodiment of the present invention can also obtain the identity information of the thief (such as a photo of the thief, a fingerprint, etc.). After the identity information of the thief is obtained according to the embodiment of the present invention, the thief can be arrested according to the identity identification information. Therefore, the embodiment of the present invention can effectively prevent theft of the terminal after the terminal is stolen, and reduce the crime rate of theft and protect the security of the user property.
  • the identity information of the thief such as a photo of the thief, a fingerprint, etc.
  • the activation file in the embodiment of the present invention is composed of an extensible markup language XML or a lightweight data exchange format (JSON), which is used for an activation operation between the PC terminal and the mobile terminal.
  • JSON lightweight data exchange format
  • the embodiment of the present invention verifies the activation file according to the identity of the mobile terminal carried in the activation file. If the identity of the mobile terminal carried in the activation file is the identity of the mobile terminal, the activation file passes the verification.
  • the activation file fails to pass the verification.
  • the PC terminal has the characteristics of the device, it also has the characteristics of Internet access. Therefore, the PC terminal has a wide application range and can trigger different anti-theft modes.
  • the embodiment of the present invention can confirm the anti-theft mode adopted in the different anti-theft mode according to the anti-theft mode identifier carried in the activation file.
  • the method may include:
  • the first group of anti-theft mode identifiers including the random string GUID corresponding to the mobile terminal and the second group of anti-theft mode identifiers including the GUID and the password (PASSWORD), including only the account identifier (UID), are included.
  • the PC anti-theft policy is turned on, and the corresponding anti-theft operation is directly executed according to the received anti-theft command.
  • the GUID is a random string generated by the PC, and the string can establish a one-to-one binding relationship with the mobile terminal.
  • the anti-theft mode is identified as the second set of anti-theft mode identifiers including GUID and PASSWORD
  • the PC anti-theft policy is turned on, and the PASSWORD is verified correctly. If yes, the anti-theft operation corresponding to the received anti-theft command is executed. If no, the response is stopped and no action is taken.
  • the PASSWORD is a password set by the user in advance. When the password value is not empty, the embodiment of the present invention verifies the PASSWORD before executing the anti-theft command.
  • the account anti-theft policy is enabled.
  • the UID is an account identifier that is generated after the user logs in to the account whose account name is USERSNAME is used to identify the account.
  • the anti-theft mode is identified as the fourth set of anti-theft mode identifiers including the UID and the GUID
  • the PC anti-theft policy and the account anti-theft policy are enabled, the anti-theft command from the PC terminal or the UID is received, and the corresponding anti-theft operation is performed.
  • the anti-theft mode is identified as the fifth group of anti-theft mode identifiers including GUID, UID, and PASSWORD
  • the PC anti-theft policy and the account anti-theft policy are enabled.
  • the embodiment of the present invention performs the anti-theft operation corresponding to the received anti-theft command.
  • the embodiment of the present invention stops responding and does not perform any operation.
  • the embodiment of the present invention can activate different anti-theft modes according to different types of anti-theft mode identifiers carried in the activation file sent by the PC terminal. That is, when the mobile terminal performs the anti-theft operation through the PC terminal, the anti-theft policy can be triggered by the PC terminal to send the anti-theft command to the mobile terminal, and multiple anti-theft policies can be triggered to simultaneously send the anti-theft command to the mobile terminal. For example, when the anti-theft mode identifier in the activation file is only included in the UID or only the GUID, the embodiment of the present invention can perform only the account anti-theft policy or only the PC anti-theft policy.
  • the embodiment of the present invention can simultaneously perform PC anti-theft and account anti-theft, enhance the anti-theft protection to the mobile terminal, and increase the possibility of retrieving the mobile terminal.
  • the PC anti-theft includes sending an anti-theft command to the mobile terminal through the PC terminal to perform anti-theft on the mobile terminal, and further including an activation account to perform account anti-theft on the mobile terminal.
  • the PC terminal activates the account to perform account theft prevention on the mobile terminal, the PC terminal only transmits the account information to the mobile terminal as the login party.
  • the difference between the PC anti-theft policy and the account anti-theft strategy is that the ACTIONID in the PC anti-theft policy needs to be distinguished from the ACTIONID in the account anti-theft strategy.
  • the ACTIONID is LOCATE
  • the PC anti-theft strategy should be "LOCATE_PC”
  • the operation is exactly the same.
  • the UID is a GUID in the PC anti-theft policy. That is, the information of the unique account in the tag account burglar is the UID, and the information of the unique computer in the tag PC burglar is the GUID.
  • the anti-theft mode is identified as the anti-theft mode identifier including GUID and PASSWORD, that is, the password is required to send the command
  • the PASSWORD part (which can be attached to the end of the field) is added.
  • the PASSWORD part (which can be attached to the end of the field) is added.
  • the PASSWORD part (which can be attached to the end of the field) is added.
  • the PASSWORD part which can be attached to the end of the field
  • the PASSWORD part which can be attached to the end of the field
  • the PASSWORD part which can be attached to the end of the field
  • the PASSWORD part which can be attached to the end of the field
  • the PASSWORD part (which can be attached to the end of the field) is added.
  • the PASSWORD part (which can be attached to the end of the field) is added.
  • the PASSWORD part (which can be attached to the end of the field) is added.
  • the PASSWORD can be personalized. If the user sets PASSWORD, the PASSWORD is verified before the anti-theft operation is performed, which can prevent the malicious terminal from sending an anti-theft command, causing the mobile terminal to perform an anti-theft operation (such as malicious lock screen, leaking real-time location information, etc.), which causes bad consequences. Users can also perform PASSWORD settings as needed, and directly perform mobile terminal anti-theft through PC or account, avoiding cumbersome steps. No need for PASSWORD authentication is usually used in trusted network environments or commonly used trusted terminals, such as home computers, office computers and other devices.
  • step S2002 shown in FIG. 20 is performed to receive the anti-theft instruction from the PC terminal.
  • step S2004 is executed to parse the received anti-theft command to obtain the identity of the mobile terminal carried in the anti-theft command.
  • step S2006 shown in FIG. 20 is executed, and the operation corresponding to the anti-theft command is executed to implement the anti-theft of the mobile terminal. If the verification fails, the embodiment of the present invention stops responding and does not perform any operation.
  • the IMEI is preferably a unique identifier of the mobile terminal.
  • the PC terminal and the mobile terminal can be connected through a wired or wireless connection.
  • the PC terminal and the mobile terminal can be connected through a Universal Serial Bus (USB) data line.
  • the PC terminal and the mobile terminal can be connected by wireless means such as Bluetooth or a wireless network.
  • the PC terminal and the mobile terminal can be connected and opened through wired or wireless manner, so that the PC terminal and the mobile terminal can be connected and opened through various methods or means, thereby being able to perform anti-theft on the mobile terminal through the PC terminal. To effectively ensure the security of the mobile terminal.
  • 21 is a process flow diagram showing a method of activating a mobile phone anti-theft function on the side of a PC terminal according to an embodiment of the present invention. Referring to FIG. 21, the flow includes at least steps S2102 through S2116.
  • Step S2202 determining whether the connection between the PC terminal and the mobile phone is established. If yes, go to step S2104, if no, the flow ends.
  • Step S2104 Acquire an identity identifier IMEI of the mobile phone.
  • Step S2106 Determine whether the user login account is activated. If no, step S2108 is performed, and if so, step S2110 is performed.
  • Step S2108 Send a PC Binding (Bind_By_PC) instruction to the server.
  • the PC anti-theft policy is triggered, and the anti-theft command is directly sent to the server through the PC terminal, or after the PASSWORD is input and the verification is passed, the anti-theft command is sent to the server.
  • the format of the anti-theft instruction may include a command number (ACTIONID), a task number (TASKID), and additional information (OTHERS).
  • ACTIONID is Bind_By_PC
  • TASKID is 0, and OTHERS is GUID, IMEI, and password.
  • Step S2110 Send a Bind instruction to the server.
  • step S2106 If the user login account is activated according to the judgment result of step S2106, the account anti-theft policy is triggered.
  • step S2122 an activation file is generated.
  • the anti-theft mode is identified as including only the GUID or including the GUID and the PASSWORD. If only the mobile phone needs to open the account anti-theft, the anti-theft mode is identified as including only the UID. If the mobile phone needs to turn on PC anti-theft and account anti-theft, the anti-theft mode identifier includes GUID and UID or includes GUID, UID and PASSWORD at the same time.
  • Step S2114 Send the activation file to the mobile phone.
  • Step S2116 notifying the mobile phone to read the activation file and open.
  • the step of reading the activation file in the mobile phone Android system and opening it is: starting the process, the process name and parameters are: adb shell am start-a BIND_FROM_PC-n com.qihoo360.mobilesafe/com.qihoo360.mobilesafe.PortalActivity- d/mnt/sdcard/Protection.dat.
  • BIND_FROM_PC represents an Intent Action.
  • Com.qihoo360.mobilesafe represents the package name of the Android app.
  • Com.qihoo360.PortalActivity represents the Activity that is actually used to handle the activation. /mnt/sdcard/Protection.dat indicates the path where the file is opened.
  • Figure 22 is a flow chart showing the processing of the anti-theft method on the side of the mobile phone according to an embodiment of the present invention. Referring to FIG. 22, the flow includes at least steps S2202 to S2224.
  • step S2202 an activation command sent by the PC terminal is received, and the legitimacy is determined.
  • the mobile phone After receiving the activation command sent by the PC terminal, the mobile phone determines whether the command in the activation command is Bind_From_PC, and obtains a field in the instruction to check whether the field is the path of the complete activation file. If the command in the activation command is Bind_From_PC, it is determined that the instruction is legal, and step S2204 is performed. If not, the process ends.
  • step S2204 the activation file is parsed, and the IMEI carried in the activation file is obtained.
  • step S2206 it is determined whether the IMEI is correct. If yes, step S2208 is performed, and if no, step S2210 is performed.
  • step S2208 the anti-theft mode identifier carried in the activation file is read and saved.
  • the anti-theft mode identifier includes only the GUID
  • the PC anti-theft policy is turned on, and the operation corresponding to the anti-theft command is directly executed.
  • the PC anti-theft policy is turned on to verify whether the PASSWROD is correct; if yes, the operation corresponding to the anti-theft command is executed; if not, the response is stopped.
  • the account anti-theft policy is activated, the USERNAME is registered in the mobile terminal, the anti-theft command from the UID is received, and the corresponding operation is performed.
  • the anti-theft mode identifier includes the GUID and the UID
  • the PC anti-theft policy and the account anti-theft policy are enabled, and the anti-theft command from the PC terminal or the UID is received and the corresponding operation is performed.
  • the anti-theft mode identifier includes the GUID, the UID, and the PASSWORD
  • the PC anti-theft policy and the account anti-theft policy are enabled, and the anti-theft command from the PC terminal or the UID is verified to verify the PASSWORD; if the verification is passed, the corresponding operation of the received anti-theft command is performed. ; If the verification fails, the response stops.
  • PC anti-theft identifier value is set to the GUID value.
  • PC anti-theft identifier value is set to the GUID value.
  • PC anti-theft identifier value is the GUID value.
  • Account ID Value is the UID value.
  • the anti-theft mode identifier includes GUID, UID, and PASSWORD:
  • PC anti-theft identifier value is the GUID value.
  • the anti-theft mode flag When the anti-theft mode flag includes other conditions, it is processed as a failure.
  • step S2210 the anti-theft function fails.
  • step S2212 the anti-theft function is successfully activated.
  • Step S2214 Receive an anti-theft command sent by the PC terminal.
  • Step S2216 parsing the anti-theft command, and acquiring the anti-theft command and the identity identifier.
  • Step S2218 verifying the identity identifier carried in the anti-theft command. If the verification is passed, step S2220 is performed, and if the verification fails, the process ends.
  • Step S2220 Perform an operation corresponding to the anti-theft command.
  • Step S2222 Polling whether the anti-theft command is successfully executed. If yes, go to step S2224, if no, continue Perform this step.
  • step S2224 the anti-theft command is successfully executed, and the execution result is returned to the PC terminal, and the process ends.
  • the embodiment of the present invention provides a mobile terminal anti-theft client for implementing the above-mentioned mobile terminal anti-theft method.
  • FIG. 23 is a schematic structural diagram of a mobile terminal anti-theft client according to an embodiment of the present invention.
  • the client of the embodiment of the present invention includes at least a receiving module 2330, a parsing module 2340, and an executing module 2350.
  • the receiving module 2330 is configured to receive an anti-theft command from the PC terminal.
  • the parsing module 2340 is coupled to the receiving module 2330 and configured to parse the anti-theft command to obtain an anti-theft command corresponding to the command.
  • the execution module 2350 is coupled to the parsing module 2340 and configured to perform an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
  • the activation module 2320 receives the activation file from the PC terminal carrying the identity of the mobile terminal and the anti-theft mode identifier. After receiving the activation file, the activation module 2320 verifies the activation file according to the identity of the mobile terminal carried in the activation file. If the identity of the mobile terminal carried in the activation file is the identity of the mobile terminal, the activation file passes the verification. If the identity of the mobile terminal carried in the activation file is not the identity of the mobile terminal, the activation file fails to pass the verification. After the activation file passes the verification, the activation module 2320 determines different anti-theft modes according to the anti-theft mode identification carried by the activation file.
  • the anti-theft mode identifier can be divided into a first group of anti-theft mode identifiers including only a random string GUID, a second group of anti-theft mode identifiers including GUID and PASSWORD, and a third including only UIDs.
  • the activation module 2320 turns on the PC anti-theft policy, and directly performs the corresponding anti-theft operation according to the received anti-theft command.
  • the GUID is a random string generated by the PC terminal, and the string can establish a one-to-one binding relationship with the mobile terminal.
  • the activation module 2320 turns on the PC anti-theft policy and verifies whether the PASSWORD is correct. If yes, the anti-theft operation corresponding to the received anti-theft command is executed. If no, the response is stopped and no action is taken.
  • the PASSWORD is a password set by the user in advance. When the password value is not empty, the embodiment of the present invention verifies the PASSWORD before executing the anti-theft command.
  • the activation module 2320 activates the account anti-theft policy.
  • the UID is an account identifier that is generated after the user logs in to the account whose account name is USERSNAME is used to identify the account.
  • the activation module 2320 activates the PC anti-theft policy and the account anti-theft policy, receives the anti-theft command from the PC terminal or the UID, and performs a corresponding anti-theft operation.
  • the activation module 2320 When the anti-theft mode is identified as the fifth group of anti-theft mode identifiers including GUID, UID, and PASSWORD, the activation module 2320 enables the PC anti-theft policy and the account anti-theft policy. Moreover, when receiving an anti-theft command from a PC terminal or UID, it is necessary to first verify PASSWORD. Second, proceed to the next step based on whether PASSWORD is verified. Specifically, when passing, the embodiment of the present invention performs the anti-theft operation corresponding to the received anti-theft command. When not, the embodiment of the present invention stops responding and does not perform any operation.
  • the receiving module 2330 coupled thereto is triggered.
  • the trigger parsing module 2340 parses the anti-theft command, obtains the identity of the mobile terminal carried in the anti-theft command, and verifies the anti-theft command. If the verification is successful, the parsing module 2340 triggers the execution module 2350 to perform the anti-theft operation corresponding to the anti-theft command to implement the anti-theft of the mobile terminal. If the verification fails, the response is stopped and no action is taken.
  • the polling module 2360 coupled with the executing module 2350 polls whether the anti-theft command is successfully executed, and if so, the polling module 2360 triggers the executing module 2350 to end the execution of the anti-theft command. If not, the polling module 2360 triggers the execution module 2350 to attempt to execute the anti-theft command again.
  • the polling module 2360 performs a polling query on the execution of the anti-theft command to ensure that the anti-theft command acquired by the mobile terminal can be executed in time to prevent the thief from brushing the mobile terminal or other due to the untimely execution of the anti-theft command. The operation makes the mobile terminal unable to be retrieved.
  • the embodiment of the present invention will execute a lock screen command to query whether the lock screen command is successfully executed. If the lock screen command is not executed, the embodiment of the present invention executes a lock screen command to lock the screen of the mobile terminal. If the lock screen command is successfully executed, the embodiment of the present invention abandons the execution of the screen lock command again.
  • the mobile terminal where the mobile terminal anti-theft client is located as shown in FIG. 23 is connected to the PC terminal through the interface 2310 coupled to the activation module 2320.
  • the interface 2310 can connect the mobile terminal to the PC terminal by wire or wirelessly.
  • the interface 2310 can be connected to a PC terminal via a USB data line.
  • the interface 2310 can be connected to a PC terminal via a wireless method such as Bluetooth or a wireless network.
  • the PC terminal and the interface 2310 can be connected and opened through wired or wireless manner, so that the PC terminal and the mobile terminal can be connected and opened through various methods or means, thereby enabling the mobile terminal to perform anti-theft through the PC. Ensure the security of the mobile terminal.
  • the embodiment of the present invention can achieve the following beneficial effects:
  • the anti-theft command from the PC terminal is received, the anti-theft command is obtained by parsing the anti-theft command, and the corresponding anti-theft operation can be performed according to the anti-theft command.
  • the anti-theft command in the embodiment of the present invention comes from being able to use the PC terminal to open and use the anti-theft function of the mobile terminal on the premise that the stolen mobile terminal does not have the anti-theft function turned on.
  • the operation is simple, so that the mobile terminal can be realized conveniently and quickly
  • the anti-theft and can provide a complete anti-theft function to burglar the mobile terminal, and solve the problem that the mobile terminal cannot continue to burglar the mobile terminal after the mobile terminal is stolen in the prior art.
  • the embodiment of the present invention can still receive the anti-theft instruction of the sender, and perform the anti-theft operation according to the anti-theft command obtained by analyzing the anti-theft instruction. For example, after the user mobile terminal is lost, by sending an anti-theft command to the stolen mobile terminal, the embodiment of the present invention can perform a lock screen operation on the stolen mobile terminal to prevent the thief from using the mobile terminal.
  • the embodiment of the present invention can also obtain the identity information of the thief (such as a photo of the thief, a fingerprint, etc.). After the identity information of the thief is obtained according to the embodiment of the present invention, the thief can be arrested according to the identity identification information. Therefore, the embodiment of the present invention can effectively prevent theft of the terminal after the terminal is stolen, and reduce the crime rate of theft and protect the security of the user property.
  • FIG. 24 is a flow chart showing the processing of the mobile terminal anti-theft method according to an embodiment of the present invention. Referring to FIG. 24, the flow includes at least steps S2402 through S2406.
  • Step S2402 Determine identity information of the sender according to the anti-theft command from the sender.
  • Step S2404 Start an anti-theft policy that matches the identity information of the sender, and parse the anti-theft command to obtain an anti-theft command corresponding to the instruction.
  • Step S2406 Perform an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
  • the identity information of the sender can be determined according to the anti-theft command from the sender, the anti-theft policy matching the sender identity information is activated to parse the anti-theft command, the anti-theft command corresponding to the instruction is obtained, and the anti-theft command is executed. Operation to achieve anti-theft of the mobile terminal.
  • the anti-theft command in the embodiment of the present invention may be from a device or terminal capable of sending a short message (such as a sender of the anti-theft command being a mobile terminal or a server or a personal computer), or may be from a device or terminal capable of transmitting a network command.
  • SMS or network commands such as mobile phones, computers, tablets, etc.
  • the anti-theft command is sent quickly by SMS or network command, and the arrival time is accurate, which can save the traffic and power consumption of the stolen mobile terminal. Recovering the stolen mobile terminal to provide more time, so that the anti-theft of the mobile terminal can be realized conveniently and quickly, and solving the problem that the mobile terminal cannot continue to burglar the mobile terminal after the mobile terminal is stolen in the prior art.
  • the embodiment of the present invention After determining the identity information of the sender, the embodiment of the present invention initiates an anti-theft policy that matches the identity information of the sender to parse the anti-theft command, and obtains a corresponding anti-theft command, so as to ensure that the anti-theft protection can be performed on the mobile terminal according to the user's need to select an appropriate anti-theft policy.
  • an anti-theft policy can be matched to perform anti-theft protection on the mobile terminal, and multiple anti-theft policies can be matched to simultaneously protect the mobile terminal against theft, thereby enhancing the security of the mobile terminal.
  • the embodiment of the present invention after the mobile terminal is stolen, the anti-theft command of the sender can still be received, and the anti-theft operation is performed according to the anti-theft command obtained by parsing the anti-theft command.
  • the embodiment of the present invention can perform a lock screen operation on the stolen mobile terminal to prevent the thief from using the mobile terminal.
  • the thief cannot use the mobile terminal, and the thief cannot operate the refurbishment mobile terminal by brushing the machine or the like. In turn, the thief cannot resell the stolen mobile terminal for profit. Further, the probability of theft crime can be effectively reduced.
  • the embodiment of the present invention can also obtain the identity information of the thief (such as a photo of the thief, a fingerprint, etc.). After the identity information of the thief is obtained according to the embodiment of the present invention, the thief can be arrested according to the identity identification information. Therefore, the embodiment of the present invention can effectively prevent theft of the terminal after the terminal is stolen, and reduce the crime rate of theft and protect the security of the user property.
  • the identity information of the thief such as a photo of the thief, a fingerprint, etc.
  • the embodiment of the present invention obtains a special character carried in the anti-theft command, and determines the identity information of the sender according to the special character.
  • special characters are specific strings.
  • the identity information of the sender determined according to the special character includes at least one of a mobile terminal, a server, or a PC.
  • the sending carrier of the anti-theft command is a short message.
  • the sending carrier of the anti-theft command is a short message and/or a network command.
  • the sender is a PC terminal
  • the sending carrier of the anti-theft command is a short message and/or a network command.
  • the anti-theft command can be sent by using a short message as a carrier.
  • the embodiment of the present invention registers the short message interception function.
  • Figure 25 is a flow chart showing the process of registering a short message interception function in accordance with one embodiment of the present invention.
  • the embodiment of the present invention first registers a short message interception function.
  • the embodiment of the present invention executes step S2504 to generate a mapping table corresponding to the anti-theft command and the anti-theft command.
  • the mapping table may also be referred to as a “sms-command table”, and the anti-theft command corresponding to the received short message may be found and determined according to the table.
  • the anti-theft command and the anti-theft command form a correspondence relationship.
  • the mapping table the anti-theft command and the anti-theft command form a correspondence relationship.
  • step S2506 is executed to generate a mapping table corresponding to the command number (ACTIONID).
  • the command number forms a one-to-one mapping relationship with the command.
  • a command recognizable by the stolen mobile terminal can also be added to the mapping.
  • Bind corresponds to the account used for anti-theft and PC anti-theft binding
  • UnBind corresponds to the command used when the account anti-theft and PC anti-theft are unbound.
  • step S2508 is executed to disclose the interface for reading the file to the PC side. In the PC anti-theft strategy, it is necessary to disclose an interface that can be directly called by the PC.
  • the operation flowchart of the short message receiving processing method according to an embodiment of the present invention shown in FIG. 5 is performed.
  • the processing flow chart after receiving the short message (ie, step) shown in the embodiment of the present invention processes the short message.
  • the embodiment of the invention determines whether the received short message carries an anti-theft instruction.
  • the mapping table corresponding to the anti-theft command and the anti-theft command generated in step S2504 in FIG. 25 the embodiment of the present invention queries whether the received short message carries the anti-theft instruction including the special character in the mapping table.
  • the received short message carries an anti-theft command and intercepts the short message (usually called eating the short message). Then, the anti-theft instruction information in the short message is obtained, and the operation of determining the identity information of the sender is triggered, and the process ends.
  • the embodiment of the invention continues the steps. If the special character is not included, it is determined that the received short message does not carry the anti-theft command. In the embodiment of the present invention, the short message is released, and the process ends.
  • the anti-theft strategy that can be used in the embodiments of the present invention includes at least three types. Therefore, in an actual application, when the anti-theft terminal receives the anti-theft SMS, it needs to determine which anti-theft SMS is issued according to the anti-theft policy, and thus It can be processed according to the corresponding anti-theft strategy.
  • 26 shows a process flow diagram of a method of determining an anti-theft policy in accordance with one embodiment of the present invention. Referring to FIG. 26, the flow includes at least steps S2602 through S2622.
  • Step S2602 The mobile terminal receives the short message.
  • Step S2604 determining whether it is a short message anti-theft SMS. If yes, go to step S2606, if no, go to step S2610.
  • Step S2606 intercepting the short message, and triggering the SMS anti-theft strategy.
  • step S2608 the SMS anti-theft strategy is executed, and the process ends.
  • Step S2610 Determine whether it is an account anti-theft SMS. If yes, go to step S2612, if no, go to step S2616.
  • Step S2612 intercepting the short message, triggering the account anti-theft strategy.
  • step S2614 the account anti-theft strategy is executed, and the process ends.
  • step S2616 it is determined whether it is a PC anti-theft SMS. If yes, go to step S2618, if no, go to step S2622.
  • Step S2618 intercepting the short message, triggering the PC anti-theft strategy.
  • step S2620 the PC anti-theft strategy is executed, and the process ends.
  • step S2622 the short message is released, and the process ends.
  • releasing the short message can reduce the vigilance of the thief, and is beneficial for recovering the stolen terminal and capturing the thief. For example, after the user's mobile terminal is lost, if the thief sees that the mobile terminal can receive the short message in the stolen mobile terminal, the mobile terminal is considered not to be locked, and the anti-theft function is not turned on.
  • the embodiment of the present invention intercepts the short message carrying the anti-theft command so that it cannot be displayed in the system of the mobile terminal, but performs the anti-theft operation according to the anti-theft instruction carried in the short message in the background.
  • the embodiment of the invention can reduce the vigilance of the thief and increase the possibility of the stolen mobile terminal retrieving, thereby effectively curbing the occurrence of theft crime and protecting the user's property security.
  • step S2404 in FIG. 24 is continued, and the anti-theft policy matching the sender identity information is started to parse the anti-theft command, and the anti-theft command corresponding to the instruction is obtained.
  • the anti-theft policy includes three types, and the corresponding sender differs according to the anti-theft policy.
  • the anti-theft policy is the SMS anti-theft policy
  • the sender is the mobile terminal
  • the anti-theft policy is the account anti-theft strategy.
  • the sender is a server or a PC terminal
  • the anti-theft policy is a PC anti-theft policy
  • the sender is a PC terminal.
  • the mobile terminal anti-theft method according to the embodiment of the present invention is separately introduced according to different senders (ie, corresponding different anti-theft policies).
  • the mobile terminal anti-theft method provided by the embodiment of the present invention is first introduced when the sender is a mobile terminal.
  • the anti-theft policy matched with the mobile terminal is a short message anti-theft policy, and the anti-theft command is sent by using the short message as a carrier.
  • the embodiment of the present invention acquires the anti-theft instruction information in the short message, and triggers the operation of determining or verifying the sender identity information.
  • the anti-theft instruction is parsed, and the verification code of the sender that sends the anti-theft instruction is obtained.
  • the embodiment of the present invention continues to obtain the verification code and The verification code pre-stored by the mobile terminal is matched, and according to the matching result, it is determined whether to obtain the anti-theft command corresponding to the anti-theft instruction. If the obtained verification code matches the trusted mobile terminal identifier and/or password pre-stored by the mobile terminal, the anti-theft command is obtained.
  • the obtained verification code does not match the trusted mobile terminal identifier and/or password pre-stored by the mobile terminal, in order to avoid receiving the anti-theft command sent by the malicious sender, the erroneous anti-theft operation is performed on the mobile terminal, and the embodiment of the present invention ignores the Anti-theft command.
  • the verification code may be the sender's mobile terminal identifier and/or the password that the sender can trust.
  • the sender's mobile terminal identifier includes at least one of a sender's phone number, a sender's SIM card number, and a sender's IMEI.
  • the password that proves that the sender can trust may be at least one of the sender's mobile terminal identifier and a pre-set string that the sender can trust. For example, any combination of numbers and letters can be set to a string that proves that the sender can trust. For example, ac1088206, A34TFAK6808, etc. It is also possible to set the name of the user or the birthday of the user, the birthday of the pet as a password to prove that the sender can trust, and the like.
  • the trusted mobile terminal identifier and/or password are collectively referred to as a password, and the trusted mobile terminal identifier is referred to as a relative friend number. See Figure 6 for a process flow diagram of a method of pre-storing a trusted mobile terminal identity and/or password.
  • the method for storing the trusted mobile terminal identifier and/or password is as described above.
  • the trusted mobile terminal identifier and the stored trusted mobile terminal may be set by setting the trusted mobile terminal identifier and/or the password to be empty. / or password is deleted.
  • the embodiment of the present invention can set the family friend number and the SMS anti-theft password to be empty according to the flow shown in FIG. 6, and click the “open password” column to turn off the password function.
  • the embodiment of the present invention may also select the logout anti-theft function.
  • the embodiment of the present invention obtains a verification code when parsing the anti-theft instruction, and determines whether the anti-theft instruction is encrypted. If the anti-theft command is an encrypted anti-theft command, the embodiment of the present invention decrypts the anti-theft instruction by using a corresponding decryption means, and decrypts the verification code by using a corresponding decryption means, and obtains the decrypted verification code and performs matching.
  • step S2406 shown in FIG. 24 is executed, and the operation corresponding to the anti-theft command is executed to implement the anti-theft of the mobile terminal.
  • the embodiment of the present invention polls whether the command is successfully executed, and the flowchart of the process of polling the command execution is shown in FIG. 7.
  • the polling query is performed on the execution of the anti-theft command to ensure that the anti-theft command acquired by the mobile terminal can be executed in time, so as to prevent the thief from brushing or other operations on the mobile terminal due to the untimely execution of the anti-theft command. Can't be retrieved.
  • the embodiment of the present invention will execute a lock screen command to query whether the lock screen command is successfully executed. If the lock screen command is not executed, the embodiment of the present invention executes a lock screen command to lock the screen of the mobile terminal. If the lock screen command is successfully executed, the embodiment of the present invention abandons the execution of the screen lock command again.
  • the embodiment of the present invention After the received anti-theft command is executed, the embodiment of the present invention returns the execution result as a sender to the sender of the anti-theft command, and reminds the sender that the anti-theft command has been executed. After receiving the receipt, the sender can continue the next anti-theft operation. In addition, if the anti-theft command sender does not receive the receipt within the specified time, the embodiment of the present invention initiates a polling query to check whether the receipt is successful. See Figure 8 for the process flow of the method for querying receipts.
  • the mobile terminal anti-theft method (the sender is a mobile terminal) of the present invention will now be described by way of a specific embodiment.
  • the sender is set to the mobile phone of the relatives and friends, and the mobile terminal is set to the stolen mobile phone.
  • a processing flowchart of a mobile terminal anti-theft method using a short message anti-theft policy is provided.
  • FIG. 9 For the specific process, refer to FIG. 9.
  • the processing flow of the mobile terminal anti-theft method of the preferred embodiment is introduced from the mobile phone side of the relatives and friends and the stolen mobile phone side respectively.
  • the sender and the whistle-selling sender are represented by the family and friends mobile phone. According to the disclosure of the present invention, those skilled in the art can understand that the burglar-proof command sender can not only make the friends and relatives mobile phone, but can be any other communication device that can send short messages. The authenticity of the sender is verified by verifying the password contained in the anti-theft command, and the present invention is not limited thereto.
  • FIG. 10 The process flow of the mobile terminal anti-theft method on the mobile phone side of the relatives and friends provided by one embodiment of the present invention is shown in FIG. 10 .
  • the embodiment edits and sends the anti-theft SMS to the stolen mobile phone through the mobile phone of the relatives and friends.
  • the embodiment can directly transmit by editing the special anti-theft short message.
  • the anti-theft command in the anti-theft SMS is some anti-theft commands with high security requirements, such as "delete mobile phone data", "backup mobile phone data”, etc., this embodiment first encrypts the anti-theft SMS to be sent. Second, the encrypted anti-theft SMS is sent to the stolen phone.
  • the special mark is first spliced.
  • a special mark stitched in step S1002 in the above-mentioned map containing special characters and anti-theft instructions.
  • step S1004 to encrypt the remaining content.
  • the number after “Dingwei#E” indicates the verification code, that is, the password or the number of friends and relatives pre-stored by the stolen mobile phone.
  • Step S1004 performs encryption processing on the password or the relative friend number.
  • "DingweiE#ac35e5b301" is obtained.
  • the letters and numbers in the anti-theft command shown in the embodiment of the present invention are only used as examples, and cannot represent the real digits of the real password or the number of friends and relatives or the actual display of the encrypted anti-theft command.
  • step S1006 After encrypting the anti-theft SMS, the embodiment proceeds to step S1006 to send the anti-theft SMS to the stolen mobile phone, and the process ends.
  • an embodiment of the present invention provides a processing flowchart of the mobile terminal anti-theft method on the side of the stolen mobile phone, as shown in FIG.
  • the embodiment of the present invention provides another method for preventing theft of the mobile terminal.
  • the anti-theft policy matched with the server is an account anti-theft policy, and the anti-theft command is sent by using a short message and/or a network instruction as a carrier.
  • the embodiment of the present invention receives an anti-theft instruction from the server.
  • the anti-theft instruction format may include only special characters, and may include both special characters and other identification information except special characters.
  • the anti-theft instruction may include a special character, an activated account identifier, an anti-theft command, and an anti-theft object identifier. At least one of them.
  • the special character is Account, which is used to determine the identifier of the anti-theft policy. After the identifier is determined, no change occurs.
  • the activated account ID is the unique UID generated for the account at the time of login.
  • the anti-theft command includes a command number (ACTIONID) and/or a task number (TASKID), wherein the corresponding command can be found in the correspondence table including the anti-theft command and the anti-theft command by the ACTIONID.
  • TASKID is a corresponding task number generated in the server when the anti-theft command is transmitted, and the TASKID can query the execution status of the anti-theft command corresponding to the TASKID in the server.
  • the TASKID is 0.
  • the anti-theft object identifier may include the IMEI of the mobile terminal, and may also include other identity identifiers that can uniquely identify the mobile terminal.
  • the format of the anti-theft instruction can be set as:
  • OTHERS is additional information related to the anti-theft command.
  • the information of the Erase command is to specify which part of the data in the mobile terminal system is deleted (for example, deleting the short message data or the notebook data in the system or the chat data of the application, etc.).
  • the additional information of TakePhoto can be a requirement for the clarity of the captured photo.
  • the format of the terminal lock instruction is: [Accout] 200868996, 323450296939291, LOCK, 2000000, 0.
  • the embodiment of the present invention parses the anti-theft command according to the account anti-theft policy. In the case of performing an analysis operation on the anti-theft instruction, the embodiment of the present invention determines whether the anti-theft instruction is encrypted. If the anti-theft command is an encrypted anti-theft command, the embodiment of the present invention decrypts the anti-theft command by using a corresponding decryption means. In the embodiment of the present invention, the anti-theft instruction may be encrypted by any encryption algorithm. In the embodiment of the present invention, the anti-theft instruction is decrypted by using a corresponding decryption method when parsing the anti-theft instruction, which is not limited by the embodiment of the present invention. For the encryption and decryption mode, refer to the corresponding introduction part of the second embodiment, and no further details are provided here.
  • the anti-theft command received by the embodiment of the present invention is described above. Before receiving the anti-theft command, the embodiment of the present invention needs to activate the anti-theft function in the mobile terminal.
  • One embodiment of the present invention provides a processing flowchart of a method for turning on the anti-theft function. For details, please refer to FIG. 14.
  • An embodiment of the present invention also provides a method for unbinding, and a processing flowchart thereof is shown in FIG. 15.
  • the embodiment of the present invention can cancel the anti-theft function.
  • the embodiment of the present invention first logs in the activated account in the client that can trigger the theft prevention of the mobile terminal.
  • the client capable of triggering theft prevention of the mobile terminal may be a browser, and may be a client with a mobile phone anti-theft function on the mobile phone side (for example, a mobile guard), or may have a mobile phone anti-theft function on the PC side.
  • the embodiments of the present invention are not limited by the embodiments of the present invention.
  • the anti-theft command can be sent by using the short message and/or the network command as the carrier to ensure that the mobile terminal can be burglarized by sending the anti-theft command in time through the common sender.
  • the mobile terminal after the mobile terminal receives the short message, the mobile terminal first determines whether the short message carries the anti-theft command, and if so, intercepts the short message and triggers the analysis of the anti-theft command operation. . If not, release the message.
  • the embodiment of the present invention determines that the short message is carried in the short message, and then intercepts the short message (usually referred to as eating the short message).
  • the short message usually referred to as eating the short message.
  • the activated account is logged in, and the anti-theft command sent by the activated account with the short message and/or the network as the carrier is received.
  • the mobile terminal that performs the anti-theft operation is selected in the device list of the activated account, and the anti-theft command for the mobile terminal is sent to the server by the activated account.
  • the "Get Device List” command is sent to the server.
  • ACTIONID is GET_LIST
  • TASKID is 0, and OTHERS is empty.
  • the server returns a list of devices corresponding to the account.
  • the device list includes information such as identity information (such as IMEI or UID) of the mobile terminal and a phone number of the mobile terminal.
  • the activated account selects the specified mobile terminal in the device list, and sends an anti-theft command to the mobile terminal to the server, which is forwarded by the server to the mobile terminal.
  • the identifier of the mobile terminal is input from the activated account, and the input identifier of the mobile terminal is added to the device list of the activated account. And, the anti-theft operation corresponding to the mobile terminal is selected and sent to the mobile terminal by the server.
  • the mobile terminal After receiving the anti-theft command, the mobile terminal parses the anti-theft command to obtain an anti-theft command, and then performs an anti-theft operation according to the anti-theft command.
  • the polling query is performed on the execution of the anti-theft command to ensure that the anti-theft command acquired by the mobile terminal can be executed in time, so as to prevent the thief from brushing or other operations on the mobile terminal due to the untimely execution of the anti-theft command. Can't be retrieved.
  • the embodiment of the present invention will execute a lock screen command to query whether the lock screen command is successfully executed. If the lock screen command is not executed, the embodiment of the present invention executes a lock screen command to lock the screen of the mobile terminal. If the lock screen command is successfully executed, the embodiment of the present invention abandons the execution of the screen lock command again.
  • the embodiment of the present invention After the execution of the received anti-theft command is completed, the embodiment of the present invention returns the execution result as a receipt to the server, and reminds the server that the execution has been performed. After the server receives the receipt, it can continue the next anti-theft operation. In addition, if the server does not receive the receipt within the specified time, the embodiment of the present invention initiates a polling query to check whether the receipt is successful.
  • One embodiment of the present invention provides a processing flowchart of a method for querying a receipt, which is specifically shown in FIG. 8.
  • FIG. 16 shows a processing flowchart of a mobile terminal anti-theft method using an account anti-theft policy according to a preferred embodiment of the present invention. For details, please refer to FIG. 16.
  • An embodiment of the present invention provides a process flow for sending an anti-theft command on the side of an activated account. For details, see Figure 17.
  • an embodiment of the present invention provides a processing flowchart of a method for preventing theft on the side of the mobile terminal. For details, please refer to FIG. 18.
  • a mobile terminal anti-theft method provided by an embodiment of the present invention is provided when the sender is a PC terminal.
  • the anti-theft policy matched with the server is a PC anti-theft policy or an account anti-theft policy, and the anti-theft command is sent by using a short message and/or a network command as a carrier.
  • the activation file carrying the identity of the mobile terminal and the anti-theft mode identifier from the PC terminal is received. See Example 4 for an introduction to the activation file.
  • anti-theft mode identification Due to the variety of anti-theft modes, there are various types of anti-theft mode identification. Conversely, different anti-theft modes can be distinguished according to different information included in different anti-theft mode identifiers. For an example of providing different anti-theft mode identifications in the embodiments of the present invention, refer to Embodiment 4.
  • the embodiment of the present invention can activate different anti-theft modes according to different types of anti-theft mode identifiers carried in the activation file sent by the PC terminal. That is, when the mobile terminal performs the anti-theft operation through the PC terminal, the anti-theft policy can be triggered by the PC terminal to send the anti-theft command to the mobile terminal, and multiple anti-theft policies can be triggered to simultaneously send the anti-theft command to the mobile terminal. For example, when the anti-theft mode identifier in the activation file is only included in the UID or only the GUID, the embodiment of the present invention can perform only the account anti-theft policy or only the PC anti-theft policy.
  • the embodiment of the present invention can simultaneously perform PC anti-theft and account anti-theft, enhance the anti-theft protection to the mobile terminal, and increase the possibility of retrieving the mobile terminal.
  • the PC anti-theft includes sending an anti-theft command to the mobile terminal through the PC terminal to perform anti-theft on the mobile terminal, and further including an activation account to perform account anti-theft on the mobile terminal.
  • the PC terminal activates the account to perform account theft prevention on the mobile terminal, the PC terminal only transmits the account information to the mobile terminal as the login party.
  • the PASSWORD can be personalized. If the user sets PASSWORD, the PASSWORD is verified before the anti-theft operation is performed, which can prevent the malicious terminal from sending an anti-theft command, causing the mobile terminal to perform an anti-theft operation (such as malicious lock screen, leaking real-time location information, etc.), which causes bad consequences. Users can also perform PASSWORD settings as needed, and directly perform mobile terminal anti-theft through PC or account, avoiding cumbersome steps. No need for PASSWORD authentication is usually used in trusted network environments or commonly used trusted terminals, such as home computers, office computers and other devices.
  • the anti-theft instruction from the PC terminal is received.
  • the received anti-theft command is parsed to obtain the identity of the mobile terminal carried in the anti-theft command.
  • the embodiment of the present invention verifies the identity identifier. If the verification is passed, the operation corresponding to the anti-theft command is executed to implement the anti-theft of the mobile terminal. If the verification fails, the embodiment of the present invention stops responding and does not perform any operation.
  • a polling query is performed on the execution of the anti-theft command to ensure that the anti-theft command acquired by the mobile terminal can be The execution is performed to avoid that the thief does not promptly perform the flashing of the mobile terminal or other operations caused by the burglary command, so that the mobile terminal cannot be retrieved.
  • the embodiment of the present invention will execute a lock screen command to query whether the lock screen command is successfully executed. If the lock screen command is not executed, the embodiment of the present invention executes a lock screen command to lock the screen of the mobile terminal. If the lock screen command is successfully executed, the embodiment of the present invention abandons the execution of the screen lock command again.
  • the identity of the mobile terminal may be a SIM card number, and may be any identity identification information that can uniquely identify the mobile terminal, such as hardware configuration information of the mobile terminal.
  • the embodiment of the present invention adopts the IMEI number of the mobile terminal as the identity of the mobile terminal, and the IMEI number itself is permanently bound to the mobile terminal and is unique and has high recognizability. Therefore, in the embodiment of the present invention, Preferably, the IMEI is a unique identity of the mobile terminal.
  • the PC terminal and the mobile terminal can be connected through a wired or wireless connection.
  • the PC terminal and the mobile terminal can be connected through a Universal Serial Bus (USB) data line.
  • the PC terminal and the mobile terminal can be connected by wireless means such as Bluetooth or a wireless network.
  • the PC terminal and the mobile terminal can be connected and opened through wired or wireless manner, so that the PC terminal and the mobile terminal can be connected and opened through various methods or means, thereby being able to perform anti-theft on the mobile terminal through the PC terminal. To effectively ensure the security of the mobile terminal.
  • the mobile terminal anti-theft method (the sender is a PC terminal) of the present invention will now be described by way of a specific embodiment.
  • One embodiment of the present invention provides a processing flowchart of a method for activating a mobile phone anti-theft function on a PC terminal side. For a specific flowchart, refer to FIG. 21. Correspondingly, an embodiment of the present invention further provides a processing flowchart of the anti-theft method on the mobile phone side. For a specific flowchart, refer to FIG. 22.
  • the embodiment of the present invention sends a receipt to the anti-theft command sender.
  • the identity of the sender is not determined, after the execution of the anti-theft command is completed, the type of receipt is first determined, and secondly, the number of attempts to return is different according to the type of receipt.
  • the PC anti-theft policy is executed, the receipt is sent to the PC terminal through the network, and the method is implemented to set an attempt to send 10 receipts to the PC terminal.
  • the embodiment of the present invention When the SMS anti-theft policy is executed, the embodiment of the present invention directly sends a receipt to the mobile terminal. In order to avoid the vigilance of the thief, reduce the number of receipts sent to 5 times.
  • the embodiment of the present invention sends a receipt to the server through the network. If the transmission is attempted multiple times (for example, 8 times), the transmission still fails, and then the message is sent as a carrier to send the receipt to the mobile device. Terminal, if you can set the number of attempts to 2 times.
  • FIG. 27 is a flow chart showing a process of mutually exclusive querying a command execution situation according to an embodiment of the present invention. As shown in FIG. 27, when the command is executed in the embodiment of the present invention, step S2702 in FIG. 27 is executed to determine whether the anti-theft command to be executed is being executed.
  • step S2706 is executed to execute the anti-theft command. The process ends. If the anti-theft command is being executed according to the judgment result, step S2704 is performed. In step S2704, it is determined whether the anti-theft command is executed twice or more twice or not. If they are mutually exclusive, step S2708 is executed, the execution of the anti-theft command fails, and the process ends. If they are not mutually exclusive, step S2706 is executed to execute the anti-theft command, and the process ends.
  • the polling query is performed on the execution of the anti-theft command to ensure that the anti-theft command acquired by the mobile terminal can be executed in time, so as to prevent the thief from brushing or other operations on the mobile terminal due to the untimely execution of the anti-theft command. Can't be retrieved.
  • an embodiment of the present invention is about to execute a lock screen command to query whether the lock screen command is being executed. If the lock screen command is not executed, the embodiment of the present invention executes a lock screen command to lock the screen of the mobile terminal.
  • the embodiment of the present invention abandons the execution of the screen lock command. For example, in the embodiment of the present invention, a photo forensic command for the unlocker is to be executed, and then whether the command is executing the photo forensic command is determined. If the command is not executed according to the judgment result, the embodiment of the present invention executes the photo forensic command. If the command is being executed according to the judgment result, and the photo forensic command can be executed twice or more, and is not mutually exclusive, the embodiment of the present invention continues to execute the photo forensic command.
  • the embodiment of the present invention provides a mobile terminal anti-theft client for implementing the above-mentioned mobile terminal anti-theft method.
  • FIG. 28 is a schematic structural diagram of a mobile terminal anti-theft client according to an embodiment of the present invention.
  • the client of the embodiment of the present invention includes at least a determining module 2820, a parsing module 2840, and an executing module 2850.
  • the determining module 2820 is configured to determine the identity information of the sender based on the anti-theft command from the sender.
  • the parsing module 2840 is coupled to the determining module 2820 and configured to initiate an anti-theft policy that matches the sender identity information to parse the anti-theft command, and obtain an anti-theft command corresponding to the command.
  • the execution module 2850 is coupled to the parsing module 2840 and configured to perform an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
  • the determining module 2820 is further configured to:
  • the sender's identity information is determined based on the special characters.
  • the identity information of the sender includes at least one of the following:
  • the sender is a mobile terminal
  • the sender is the server
  • the sender is a personal computer PC terminal.
  • the determining module 2810 is further configured to:
  • the method further includes:
  • the matched anti-theft policy is a short message anti-theft strategy
  • the matching anti-theft policy is an account anti-theft policy
  • the matching anti-theft policy is a PC anti-theft policy or an account anti-theft policy.
  • the method further includes:
  • the sending carrier of the anti-theft command is a short message
  • the sending carrier of the anti-theft command is: a short message and/or a network command
  • the sending carrier of the anti-theft command is: short message and/or network command.
  • the determining module 2810 is further configured to:
  • the short message When the short message is used as the sending carrier of the anti-theft command, before determining the identity information of the sender, it is determined whether the received short message carries the anti-theft command;
  • the parsing module 2840 is further configured to: when the sender is a mobile terminal,
  • the SMS anti-theft policy is started to parse the anti-theft command, and the sender's mobile terminal identifier and/or password is obtained;
  • the parsing obtains the anti-theft command corresponding to the instruction.
  • the sender's mobile terminal identity includes at least one of: a sender's phone number, a sender's subscriber identity module SIM card number, and a sender's international mobile device identity code IMEI.
  • the password pre-stored by the mobile terminal includes at least one of the following:
  • the anti-theft command is sent to the server by the activated account, and the server forwards to the mobile terminal to trigger the anti-theft operation.
  • the activated account is logged in a client capable of triggering theft prevention of the mobile terminal, wherein the client comprises at least one of the following: a browser, a client with a mobile phone anti-theft function on the mobile phone side, and a PC side The client of the mobile phone anti-theft function.
  • the determination module 2820 is further configured to receive an anti-theft instruction forwarded by the server, the activated account is sent via a short message and/or a network command.
  • the content of the short message and/or network command includes at least one of the following: in addition to the special character: the activated account identifier, the anti-theft command, and the anti-theft object identifier.
  • the method further includes:
  • the special character is Account
  • the activated account identifier is the unique account identifier UID generated for the account at the time of current login;
  • the anti-theft command includes a command number and/or a task number
  • the anti-theft object identifier includes the IMEI of the mobile terminal.
  • the method further includes:
  • the activation module 2860 is configured to receive an activation file from the PC terminal before the anti-theft policy that matches the identity information of the sender is activated, and the activation file carries the identity of the mobile terminal and the anti-theft. Pattern identification
  • the activation module is further configured to:
  • the anti-theft mode identifier is a PC anti-theft mode identifier
  • the PC anti-theft policy is activated
  • the account anti-theft policy is activated.
  • the anti-theft mode identification includes at least one of the following:
  • the account identifier UID generated by the user after logging in to the account for identifying the account, wherein the account name of the UID user login is USERNAME;
  • the activation module 2860 is further configured to:
  • the anti-theft mode identifier includes only the GUID, the PC anti-theft policy is activated, and the operation corresponding to the anti-theft command is directly executed;
  • the PC anti-theft policy is activated to verify whether the PASSWROD is correct; if yes, the operation corresponding to the anti-theft command is executed; if not, the response is stopped;
  • the anti-theft mode identifier includes the UID, activate the account anti-theft policy, log in to the USERNAME in the mobile terminal, receive the anti-theft command from the UID, and perform the corresponding operation;
  • the anti-theft mode identifier includes the GUID and the UID
  • the PC anti-theft policy and the account anti-theft policy are activated, and the anti-theft command from the PC terminal or the UID is received and the corresponding operation is performed;
  • the anti-theft mode identifier includes the GUID, the UID, and the PASSWORD
  • the PC anti-theft policy and the account anti-theft policy are activated, and the anti-theft command from the PC terminal or the UID is authenticated to the PASSWORD; if the verification is passed, the corresponding operation of the received anti-theft command is performed; If the verification is not notified, the response is stopped.
  • the method further includes:
  • the decryption module 2830 is configured to decrypt the received anti-theft command by using a corresponding decryption means when the content of the anti-theft command is encrypted content, and obtain the parsable content of the anti-theft command.
  • the encryption mode is DES encryption and the decryption mode is DES decryption.
  • the encrypted anti-theft command comprises at least one of the following:
  • the method further includes:
  • the polling module 2870 is configured to poll the query for success if any of the anti-theft commands are executed;
  • the polling module 2870 is further configured to: if the receipt of the requested party is not received within the specified time, polling whether the query is successful;
  • the embodiment of the present invention can achieve the following beneficial effects:
  • the identity information of the sender can be determined according to the anti-theft command from the sender, the anti-theft policy matching the sender identity information is activated to parse the anti-theft command, the anti-theft command corresponding to the instruction is obtained, and the anti-theft command is executed. Operation to achieve anti-theft of the mobile terminal.
  • the anti-theft command in the embodiment of the present invention may be from a device or terminal capable of sending a short message (such as a sender of the anti-theft command being a mobile terminal or a server or a personal computer), or may be from a device or terminal capable of transmitting a network command.
  • SMS or network commands such as mobile phones, computers, tablets, etc.
  • the anti-theft command is sent quickly by SMS or network command, and the arrival time is accurate, which can save the traffic and power consumption of the stolen mobile terminal. Recovering the stolen mobile terminal to provide more time, so that the anti-theft of the mobile terminal can be realized conveniently and quickly, and solving the problem that the mobile terminal cannot continue to burglar the mobile terminal after the mobile terminal is stolen in the prior art.
  • the embodiment of the present invention After determining the identity information of the sender, the embodiment of the present invention initiates an anti-theft policy that matches the identity information of the sender to parse the anti-theft command, and obtains a corresponding anti-theft command, so as to ensure that the anti-theft protection can be performed on the mobile terminal according to the user's need to select an appropriate anti-theft policy.
  • an anti-theft policy can be matched to perform anti-theft protection on the mobile terminal, and multiple anti-theft policies can be matched to simultaneously protect the mobile terminal against theft, thereby enhancing the security of the mobile terminal.
  • the embodiment of the present invention after the mobile terminal is stolen, the anti-theft command of the sender can still be received, and the anti-theft operation is performed according to the anti-theft command obtained by parsing the anti-theft command.
  • the embodiment of the present invention can perform a lock screen operation on the stolen mobile terminal to prevent the thief from using the mobile terminal.
  • the inability of the thief to use the mobile terminal causes the thief to fail to renovate the mobile terminal by brushing the machine, and the thief cannot resell the stolen mobile terminal for profit. Further, the probability of theft crime can be effectively reduced.
  • the embodiment of the present invention can also obtain the identity information of the thief (such as a photo of the thief, a fingerprint, etc.). After the identity information of the thief is obtained according to the embodiment of the present invention, the thief can be arrested according to the identity identification information. Therefore, the embodiment of the present invention can effectively prevent theft of the terminal after the terminal is stolen, and reduce the crime rate of theft and protect the security of the user property.
  • the identity information of the thief such as a photo of the thief, a fingerprint, etc.
  • modules in the devices of the embodiments can be adaptively changed and placed in one or more devices different from the embodiment.
  • the modules or units or components of the embodiments may be combined into one module or unit or component, and further they may be divided into a plurality of sub-modules or sub-units or sub-components.
  • any combination of the features disclosed in the specification, including the accompanying claims, the abstract and the drawings, and any methods so disclosed, or All processes or units of the device are combined.
  • Each feature disclosed in this specification (including the accompanying claims, the abstract and the drawings) may be replaced by alternative features that provide the same, equivalent or similar purpose.
  • the various component embodiments of the present invention may be implemented in hardware, or in a software module running on one or more processors, or in a combination thereof.
  • a microprocessor or digital signal processor may be used in practice to implement some or all of the functionality of some or all of the components of the device in accordance with embodiments of the present invention.
  • the invention can also be implemented as a device or device program (e.g., a computer program and a computer program product) for performing some or all of the methods described herein.
  • a program implementing the invention may be stored on a computer readable medium or may be in the form of one or more signals.
  • Such signals may be downloaded from an Internet website, provided on a carrier signal, or provided in any other form.
  • FIG. 29 illustrates a computing device that can implement the mobile terminal anti-theft method in accordance with the present invention.
  • the computing device conventionally includes a processor 2910 and a computer program product or computer readable medium in the form of a memory 2920.
  • the memory 2920 may be an electronic memory such as a flash memory, an EEPROM (Electrically Erasable Programmable Read Only Memory), an EPROM, a hard disk, or a ROM.
  • Memory 2920 has a storage space 2930 for program code 2931 for performing any of the method steps described above.
  • the storage space 2930 for program code may include respective program codes 2931 for implementing various steps in the above methods, respectively.
  • the program code can be read from or written to one or more computer program products.
  • Such computer program products include program code carriers such as hard disks, compact disks (CDs), memory cards or floppy disks.
  • Such a computer program product is typically a portable or fixed storage unit as described with reference to FIG.
  • the storage unit may have a storage segment, a storage space, and the like that are similarly arranged to the storage 2920 in the computing device of FIG.
  • the program code can be compressed, for example, in an appropriate form.
  • the storage unit includes computer readable code 2931', code that can be read by a processor, such as, for example, 2910, which, when executed by a computing device, causes the computing device to execute Each of the steps in the method described above.

Landscapes

  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Provided are a mobile terminal antitheft method and a client. The mobile terminal antitheft method applies to a mobile terminal wherein an antitheft function has not been initiated. The method comprises: receiving a background antitheft turn-on command from a server, the background antitheft turn-on command carrying verification information of a mobile terminal (S102); analysing the background antitheft turn-on command, obtaining the verification information, and performing verification (S104); if verified, turning on an antitheft function in the background, according to the background antitheft turn-on command (S106). Other mobile terminal antitheft methods apply to a mobile terminal wherein an antitheft function has been initiated. The present invention can turn on an antitheft function of a mobile terminal after the mobile terminal has been lost, thereby executing corresponding antitheft operations according to an antitheft command, so as to more reasonably and effectively ensure the beneficial effects of mobile terminal safety and combating of theft.

Description

移动终端防盗方法及客户端Mobile terminal anti-theft method and client 技术领域Technical field
本发明涉及互联网应用领域,特别是涉及移动终端防盗方法及客户端。The present invention relates to the field of Internet applications, and in particular, to a mobile terminal anti-theft method and a client.
背景技术Background technique
随着智能移动终端和网络的飞速发展,移动终端(包括手机、平板等多种设备)在人们生活中扮演的角色也越来越重要,越来越成为人们工作和生活中不可或缺的全方位“助手”。为方便使用,人们在使用移动终端的应用时通常会将各种账号信息、私人聊天记录以及图片照片等信息直接存储在移动终端。因此,若移动终端丢失,不仅会给用户带来财产损失,更为重要的是用户存储于移动终端内的私人信息,例如账号密码等财务信息。这些私人信息若被泄露,对用户造成的损失难以估计。因此,移动终端的防盗十分重要。With the rapid development of smart mobile terminals and networks, the role of mobile terminals (including mobile phones, tablets and other devices) in people's lives is becoming more and more important, and it is becoming more and more indispensable in people's work and life. Direction "Assistant". For convenience of use, when using an application of a mobile terminal, people usually store various account information, private chat records, and photo photos directly in the mobile terminal. Therefore, if the mobile terminal is lost, not only will the user bring property damage, but more importantly, the user stores the personal information stored in the mobile terminal, such as account information and other financial information. If this private information is leaked, it is difficult to estimate the damage caused to the user. Therefore, the anti-theft of mobile terminals is very important.
现有技术中,用户仅能够在移动终端未丢失之前开启移动终端的防盗功能。若移动终端在开启防盗功能之前丢失,则偷盗者能够通过关闭移动终端或者对移动终端进行刷机等操作阻止失主找回移动终端。例如,若用户在手机中开启了防盗功能,手机丢失之后,用户能够通过手机的防盗功能获知获取偷盗者以及被盗移动终端的相关信息。若用户在手机丢失之前未开启手机防盗,则无法使用防盗功能获取上述信息,进而无法追回被盗手机。In the prior art, the user can only turn on the anti-theft function of the mobile terminal before the mobile terminal is lost. If the mobile terminal is lost before the anti-theft function is turned on, the thief can prevent the owner from retrieving the mobile terminal by turning off the mobile terminal or performing a flashing operation on the mobile terminal. For example, if the user turns on the anti-theft function in the mobile phone, after the mobile phone is lost, the user can obtain information about the thief and the stolen mobile terminal through the anti-theft function of the mobile phone. If the user does not turn on the mobile phone anti-theft before the mobile phone is lost, the anti-theft function cannot be used to obtain the above information, and the stolen mobile phone cannot be recovered.
现有技术中,若移动终端丢失之前没有开启防盗功能,则移动终端丢失之后无法使用各种防盗功能获取偷盗者以及被盗移动终端的相关信息,增大移动终端寻回的难度,无法有效打击偷窃犯罪。In the prior art, if the anti-theft function is not turned on before the mobile terminal is lost, the mobile terminal may not use various anti-theft functions to obtain information about the thief and the stolen mobile terminal, thereby increasing the difficulty of the mobile terminal to retrieve, and cannot effectively combat Stealing crime.
另外,现有技术中,当移动终端被盗之后,偷盗者可以继续使用被盗的移动终端。偷盗者通过对移动终端进行刷机或者拔出移动终端电池等操作阻止失主找回被盗移动终端,而失主在终端被盗之后无法对移动终端进行保护。当偷盗者对被盗终端进行交易,失主无法找回被盗终端,导致财产损失,并且,存储于移动终端中的数据等用户资料随着移动终端的丢失而丢失甚至造成更多难以估计的损失。In addition, in the prior art, after the mobile terminal is stolen, the thief can continue to use the stolen mobile terminal. The thief prevents the owner from retrieving the stolen mobile terminal by brushing the mobile terminal or unplugging the mobile terminal battery, and the owner cannot protect the mobile terminal after the terminal is stolen. When the thief deals with the stolen terminal, the owner cannot retrieve the stolen terminal, resulting in property loss, and the user data stored in the mobile terminal and the like are lost as the mobile terminal is lost or even cause more unpredictable losses. .
综上,现有技术中移动终端被盗之后,无法继续对移动终端进行防盗的缺陷间接鼓励偷盗者的偷盗行为,无法有效遏制偷盗犯罪,并且给用户造成财产损失等恶劣后果。In summary, after the mobile terminal is stolen in the prior art, the defect of theft prevention of the mobile terminal cannot be continued to indirectly encourage the theft of the thief, and the crime of theft can not be effectively curbed, and the user suffers property damage and other adverse consequences.
发明内容Summary of the invention
鉴于上述问题,提出了本发明以便提供一种克服上述问题或者至少部分地解决或者减缓上述问题的移动终端防盗方法及客户端。In view of the above problems, the present invention has been made in order to provide a mobile terminal anti-theft method and client that overcomes the above problems or at least partially solves or alleviates the above problems.
依据本发明的一个方面,提供了一种移动终端防盗方法,适用于未开启防盗功能的 移动终端,包括:接收来自服务器的后台防盗开启指令,其中,所述后台防盗开启指令中携带有本移动终端的验证信息;解析所述后台防盗开启指令,获取所述验证信息并进行验证;若验证通过,则根据所述后台开启防盗指令在后台开启防盗功能。According to an aspect of the present invention, a mobile terminal anti-theft method is provided, which is applicable to an anti-theft function that is not turned on. The mobile terminal includes: receiving a background anti-theft open command from the server, wherein the background anti-theft open command carries the verification information of the mobile terminal; parsing the background anti-theft open command, acquiring the verification information, and performing verification; After the verification is passed, the anti-theft function is turned on in the background according to the background opening anti-theft command.
本发明还提供了一种移动终端防盗客户端,设置于未开启防盗功能的移动终端,包括:接收模块,配置为接收来自服务器的后台防盗开启指令,其中,所述后台防盗开启指令中携带有本移动终端的验证信息;解析模块,配置为解析所述后台防盗开户指令,获取所述验证信息并进行验证;防盗开启模块,配置为若验证通过,则根据所述后台开启防盗指令在后台开启防盗功能。The present invention further provides a mobile terminal anti-theft client, which is disposed on a mobile terminal that does not have an anti-theft function, and includes: a receiving module configured to receive a background anti-theft opening command from the server, wherein the background anti-theft opening instruction carries The verification information of the mobile terminal; the parsing module is configured to parse the background anti-theft account opening instruction, obtain the verification information and perform verification; and the anti-theft opening module is configured to open in the background according to the background opening anti-theft command if the verification is passed Anti-theft function.
在本发明实施例中,当移动终端丢失时,能够通过服务器发送后台防盗开启指令至移动终端。接收到后台防盗开启指令之后,对其进行解析以及验证,保证接收到的后台防盗指令是真实有效可信的指令,避免接收来自不可信或恶意的服务器发送的后台防盗指令,导致移动终端错误开启防盗功能。若恶意服务器使用防盗功能恶意锁定移动终端,导致移动终端全部或部分功能不可用,则会对使用者产生恶劣影响。当接收到的后台防盗开启指令通过验证之后,本发明实施例根据后台开启防盗指令在移动终端的后台开启防盗功能,解决现有技术中,移动终端丢失之后无法开启防盗功能的问题。采用远程开启防盗功能的方式能够使得丢失的移动终端在不被找回的情况下也能够开启防盗,提高了移动终端的安全性保障,其中的验证功能也避免移动终端被恶意开启防盗功能,进一步提高移动终端的安全性。因此,本发明实施例能够在移动终端丢失之后,开启移动终端的防盗功能,进而根据防盗指令执行相应的防盗操作,达到了更加合理有效保证移动终端安全、打击偷窃犯罪的有益效果。In the embodiment of the present invention, when the mobile terminal is lost, the background anti-theft opening command can be sent to the mobile terminal through the server. After receiving the background anti-theft open command, it parses and verifies it to ensure that the received background anti-theft command is a real and valid and reliable command, avoiding receiving background anti-theft commands sent from untrusted or malicious servers, causing the mobile terminal to open incorrectly. Anti-theft function. If the malicious server maliciously locks the mobile terminal using the anti-theft function, causing all or part of the functions of the mobile terminal to be unavailable, the user may be adversely affected. After the received background anti-theft opening command is verified, the embodiment of the present invention turns on the anti-theft function in the background of the mobile terminal according to the background opening anti-theft command, which solves the problem that the anti-theft function cannot be opened after the mobile terminal is lost in the prior art. The method of remotely opening the anti-theft function enables the lost mobile terminal to open the anti-theft without being retrieved, thereby improving the security of the mobile terminal, and the verification function also prevents the mobile terminal from being maliciously turned on by the anti-theft function. Improve the security of mobile terminals. Therefore, the embodiment of the present invention can open the anti-theft function of the mobile terminal after the mobile terminal is lost, and then perform the corresponding anti-theft operation according to the anti-theft instruction, thereby achieving the beneficial effect of more reasonable and effective guarantee of the security of the mobile terminal and combating theft crime.
依据本发明的另一个方面,提供了一种移动终端防盗方法,包括:接收来自发送方的防盗指令,其中,所述防盗指令以短信为发送载体;解析所述防盗指令,得到该指令对应的防盗命令;执行所述防盗命令对应的操作,以实现移动终端防盗。According to another aspect of the present invention, a mobile terminal anti-theft method includes: receiving an anti-theft instruction from a sender, wherein the anti-theft instruction uses a short message as a transmission carrier; and parsing the anti-theft instruction to obtain a corresponding instruction An anti-theft command; performing an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
本发明还提供了一种移动终端防盗客户端,包括:接收模块,配置为接收来自发送方的防盗指令,其中,所述防盗指令以短信为发送载体;解析模块,配置为解析所述防盗指令,得到该指令对应的防盗命令;执行模块,配置为执行所述防盗命令对应的操作,以实现移动终端防盗。The present invention also provides a mobile terminal anti-theft client, comprising: a receiving module configured to receive an anti-theft command from a sender, wherein the anti-theft command uses a short message as a sending carrier; and the parsing module is configured to parse the anti-theft command Obtaining an anti-theft command corresponding to the instruction; and executing an module configured to perform an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
在本发明实施例中,接收来自发送方的、以短信为发送载体的防盗指令,通过解析防盗指令获取防盗命令,并且根据防盗命令,能够执行对应的防盗操作。由此可见,本发明实施例中的防盗指令来自能够发送短信的设备或终端,目前能够发送短信的设备或终端很多(例如手机、电脑、平板等),从而能够方便快捷地实现移动终端的防盗,解决了现有技术中,移动终端被盗之后,无法继续对移动终端进行防盗的问题。并且,使用能够发送短信的其他设备或终端能够开启本移动终端的防盗功能,避免如现有技术所说,因本移动终端自身未开启防盗功能导致给偷盗者可乘之机。本发明实施例在移动终端被盗之后,仍旧能够接收到发送方的防盗指令,并根据解析防盗指令获得的防盗命令 执行防盗操作。例如,用户移动终端丢失之后,通过发送防盗指令至被盗移动终端,本发明实施例能够对被盗移动终端进行锁屏操作,阻止偷盗者使用移动终端。偷盗者无法使用移动终端导致偷盗者无法通过刷机等操作翻新移动终端,进而偷盗者无法将被盗移动终端转卖获得利润。进一步,能够有效降低偷窃犯罪发生的概率。另外,根据接收到的防盗指令,本发明实施例还可以获取偷盗者的身份标识信息(如偷盗者的照片、指纹等)。根据本发明实施例获取到偷盗者的身份标识信息之后,能够根据上述身份标识信息对偷盗者进行抓捕。因此,本发明实施例能够达到终端被盗之后有效对终端进行防盗,并且降低偷盗犯罪率、保护用户财产安全的有益效果。In the embodiment of the present invention, the anti-theft command from the sender that uses the short message as the transmission carrier is received, the anti-theft command is obtained by parsing the anti-theft command, and the corresponding anti-theft operation can be performed according to the anti-theft command. Therefore, the anti-theft command in the embodiment of the present invention is from a device or a terminal capable of sending a short message, and a device or a terminal capable of sending a short message (such as a mobile phone, a computer, a tablet, etc.) can be realized, so that the anti-theft of the mobile terminal can be realized conveniently and quickly. The problem that the mobile terminal cannot be burglarized after the mobile terminal is stolen is solved in the prior art. Moreover, the use of other devices or terminals capable of sending short messages can enable the anti-theft function of the mobile terminal to avoid theft of the anti-theft function by the mobile terminal itself, as the prior art says. After the mobile terminal is stolen, the embodiment of the present invention can still receive the anti-theft instruction of the sender, and obtain the anti-theft command according to the anti-theft instruction. Perform anti-theft operations. For example, after the user mobile terminal is lost, by sending an anti-theft command to the stolen mobile terminal, the embodiment of the present invention can perform a lock screen operation on the stolen mobile terminal to prevent the thief from using the mobile terminal. The inability of the thief to use the mobile terminal causes the thief to fail to renovate the mobile terminal by brushing the machine, and the thief cannot resell the stolen mobile terminal for profit. Further, the probability of theft crime can be effectively reduced. In addition, according to the received anti-theft command, the embodiment of the present invention can also obtain the identity information of the thief (such as a photo of the thief, a fingerprint, etc.). After the identity information of the thief is obtained according to the embodiment of the present invention, the thief can be arrested according to the identity identification information. Therefore, the embodiment of the present invention can effectively prevent theft of the terminal after the terminal is stolen, and reduce the crime rate of theft and protect the security of the user property.
依据本发明的另一个方面,提供了一种移动终端防盗方法,包括:接收来自服务器的防盗指令,其中,所述防盗指令由已激活账户发送至所述服务器;解析所述防盗指令,得到该指令对应的防盗命令;执行所述防盗命令对应的操作,以实现移动终端防盗。According to another aspect of the present invention, a mobile terminal anti-theft method includes: receiving an anti-theft instruction from a server, wherein the anti-theft instruction is sent to the server by an activated account; parsing the anti-theft instruction to obtain the The anti-theft command corresponding to the instruction; performing the operation corresponding to the anti-theft command to implement the anti-theft of the mobile terminal.
本发明还提供了一种移动终端防盗客户端,包括:接收模块,配置为接收来自服务器的防盗指令,其中,所述防盗指令由已激活账户发送至所述服务器;解析模块,配置为解析所述防盗指令,得到该指令对应的防盗命令;执行模块,配置为执行所述防盗命令对应的操作,以实现移动终端防盗。The present invention also provides a mobile terminal anti-theft client, comprising: a receiving module configured to receive an anti-theft command from a server, wherein the anti-theft instruction is sent to the server by an activated account; and the parsing module is configured as an analysis The anti-theft command is obtained, and the anti-theft command corresponding to the instruction is obtained; and the execution module is configured to perform an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
在本发明实施例中,接收来自已激活账户的、经服务器转发的防盗指令,通过解析防盗指令获取防盗命令,并且根据防盗命令,能够执行对应的防盗操作。由此可见,本发明实施例中的防盗指令来自能够登录已激活账户的设备或终端,使用已激活账户发送防盗指令对设备或终端的要求较小,并且,使用已激活账户以短信或者网络指令均能够发送防盗指令,目前能够发送短信或者网络指令的发送平台很多,而能够登录账户的设备或终端更是不胜枚举(例如手机、电脑、平板等),从而能够方便快捷地实现移动终端的防盗,解决了现有技术中,移动终端被盗之后,无法继续对移动终端进行防盗的问题。并且,使用能够登录已激活账户的其他设备或终端能够开启本移动终端的防盗功能,避免如现有技术所说,因本移动终端自身未开启防盗功能导致给偷盗者可乘之机。本发明实施例在移动终端被盗之后,仍旧能够接收到发送方的防盗指令,并根据解析防盗指令获得的防盗命令执行防盗操作。例如,用户移动终端丢失之后,通过发送防盗指令至被盗移动终端,本发明实施例能够对被盗移动终端进行锁屏操作,阻止偷盗者使用移动终端。偷盗者无法使用移动终端导致偷盗者无法通过刷机等操作翻新移动终端,进而偷盗者无法将被盗移动终端转卖获得利润。进一步,能够有效降低偷窃犯罪发生的概率。另外,根据接收到的防盗指令,本发明实施例还可以获取偷盗者的身份标识信息(如偷盗者的照片、指纹等)。根据本发明实施例获取到偷盗者的身份标识信息之后,能够根据上述身份标识信息对偷盗者进行抓捕。因此,本发明实施例能够达到终端被盗之后有效对终端进行防盗,并且降低偷盗犯罪率、保护用户财产安全的有益效果。In the embodiment of the present invention, the anti-theft instruction forwarded by the server from the activated account is received, the anti-theft command is obtained by parsing the anti-theft command, and the corresponding anti-theft operation can be performed according to the anti-theft command. It can be seen that the anti-theft command in the embodiment of the present invention is from a device or terminal capable of logging in to the activated account, and the device or the terminal is required to send the anti-theft command by using the activated account, and the activated account is used to send a short message or a network command. All of them can send anti-theft commands. Currently, there are many sending platforms for sending short messages or network commands, and devices or terminals that can log in to accounts are numerous (such as mobile phones, computers, tablets, etc.), so that mobile terminals can be realized quickly and easily. Theft prevention solves the problem that the mobile terminal cannot be burglarized after the mobile terminal is stolen in the prior art. Moreover, the use of other devices or terminals capable of logging in to the activated account can enable the anti-theft function of the mobile terminal to avoid theft of the anti-theft function by the mobile terminal itself, as the prior art says. After the mobile terminal is stolen, the embodiment of the present invention can still receive the anti-theft instruction of the sender, and perform the anti-theft operation according to the anti-theft command obtained by analyzing the anti-theft instruction. For example, after the user mobile terminal is lost, by sending an anti-theft command to the stolen mobile terminal, the embodiment of the present invention can perform a lock screen operation on the stolen mobile terminal to prevent the thief from using the mobile terminal. The inability of the thief to use the mobile terminal causes the thief to fail to renovate the mobile terminal by brushing the machine, and the thief cannot resell the stolen mobile terminal for profit. Further, the probability of theft crime can be effectively reduced. In addition, according to the received anti-theft command, the embodiment of the present invention can also obtain the identity information of the thief (such as a photo of the thief, a fingerprint, etc.). After the identity information of the thief is obtained according to the embodiment of the present invention, the thief can be arrested according to the identity identification information. Therefore, the embodiment of the present invention can effectively prevent theft of the terminal after the terminal is stolen, and reduce the crime rate of theft and protect the security of the user property.
依据本发明的又一个方面,提供了一种移动终端防盗方法,包括:接收来自个人电 脑PC终端的防盗指令;解析所述防盗指令,得到该指令对应的防盗命令;执行所述防盗命令对应的操作,以实现移动终端防盗。According to still another aspect of the present invention, a mobile terminal anti-theft method includes: receiving a personal electric power The anti-theft command of the brain PC terminal; parsing the anti-theft command to obtain an anti-theft command corresponding to the instruction; and performing an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
本发明还提供了一种移动终端防盗客户端,包括:接收模块,配置为接收来自个人电脑PC终端的防盗指令;解析模块,配置为解析所述防盗指令,得到该指令对应的防盗命令;执行模块,配置为执行所述防盗命令对应的操作,以实现移动终端防盗。The present invention further provides a mobile terminal anti-theft client, comprising: a receiving module configured to receive an anti-theft command from a personal computer PC terminal; and an analysis module configured to parse the anti-theft command to obtain an anti-theft command corresponding to the instruction; The module is configured to perform an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
在本发明实施例中,接收来自PC终端的防盗指令,通过解析防盗指令获取防盗命令,并且根据防盗命令,能够执行对应的防盗操作。由此可见,本发明实施例中的防盗指令来自能够使用PC终端,在被盗移动终端未开启防盗功能的前提下,开启和使用移动终端的防盗功能。使用PC终端发送防盗指令,操作简单,从而能够方便快捷地实现移动终端的防盗,并且能够提供完善的防盗功能对移动终端进行防盗,解决了现有技术中,移动终端被盗之后,无法继续对移动终端进行防盗的问题。本发明实施例在移动终端被盗之后,仍旧能够接收到发送方的防盗指令,并根据解析防盗指令获得的防盗命令执行防盗操作。例如,用户移动终端丢失之后,通过发送防盗指令至被盗移动终端,本发明实施例能够对被盗移动终端进行锁屏操作,阻止偷盗者使用移动终端。偷盗者无法使用移动终端导致偷盗者无法通过刷机等操作翻新移动终端,进而偷盗者无法将被盗移动终端转卖获得利润。进一步,能够有效降低偷窃犯罪发生的概率。另外,根据接收到的防盗指令,本发明实施例还可以获取偷盗者的身份标识信息(如偷盗者的照片、指纹等)。根据本发明实施例获取到偷盗者的身份标识信息之后,能够根据上述身份标识信息对偷盗者进行抓捕。因此,本发明实施例能够达到终端被盗之后有效对终端进行防盗,并且降低偷盗犯罪率、保护用户财产安全的有益效果。In the embodiment of the present invention, the anti-theft command from the PC terminal is received, the anti-theft command is obtained by parsing the anti-theft command, and the corresponding anti-theft operation can be performed according to the anti-theft command. It can be seen that the anti-theft command in the embodiment of the present invention comes from being able to use the PC terminal to open and use the anti-theft function of the mobile terminal on the premise that the stolen mobile terminal does not have the anti-theft function turned on. The use of a PC terminal to send an anti-theft command is simple in operation, so that the anti-theft of the mobile terminal can be realized conveniently and quickly, and the anti-theft function can be provided to perform anti-theft on the mobile terminal. In the prior art, after the mobile terminal is stolen, the operation cannot be continued. The problem of theft prevention by the mobile terminal. After the mobile terminal is stolen, the embodiment of the present invention can still receive the anti-theft instruction of the sender, and perform the anti-theft operation according to the anti-theft command obtained by analyzing the anti-theft instruction. For example, after the user mobile terminal is lost, by sending an anti-theft command to the stolen mobile terminal, the embodiment of the present invention can perform a lock screen operation on the stolen mobile terminal to prevent the thief from using the mobile terminal. The inability of the thief to use the mobile terminal causes the thief to fail to renovate the mobile terminal by brushing the machine, and the thief cannot resell the stolen mobile terminal for profit. Further, the probability of theft crime can be effectively reduced. In addition, according to the received anti-theft command, the embodiment of the present invention can also obtain the identity information of the thief (such as a photo of the thief, a fingerprint, etc.). After the identity information of the thief is obtained according to the embodiment of the present invention, the thief can be arrested according to the identity identification information. Therefore, the embodiment of the present invention can effectively prevent theft of the terminal after the terminal is stolen, and reduce the crime rate of theft and protect the security of the user property.
依据本发明的再一个方面,提供了一种移动终端防盗方法,包括:根据来自发送方的防盗指令确定所述发送方的身份信息;启动与所述发送方身份信息匹配的防盗策略解析所述防盗指令,得到该指令对应的防盗命令;执行所述防盗命令对应的操作,以实现移动终端防盗。According to still another aspect of the present invention, a mobile terminal anti-theft method includes: determining identity information of the sender according to an anti-theft instruction from a sender; and initiating an anti-theft policy matching the sender identity information to parse the The anti-theft command obtains an anti-theft command corresponding to the instruction; and performs an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
本发明还提供了一种移动终端防盗客户端,包括:确定模块,配置为根据来自发送方的防盗指令确定所述发送方的身份信息;解析模块,配置为启动与所述发送方身份信息匹配的防盗策略解析所述防盗指令,得到该指令对应的防盗命令;执行模块,配置为执行所述防盗命令对应的操作,以实现移动终端防盗。The present invention also provides a mobile terminal anti-theft client, comprising: a determining module configured to determine identity information of the sender according to an anti-theft command from a sender; and a parsing module configured to initiate matching with the sender identity information The anti-theft policy resolves the anti-theft command to obtain an anti-theft command corresponding to the instruction; and the execution module is configured to perform an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
在本发明实施例中,能够根据来自发送方的防盗指令确定发送方的身份信息,启动与发送方身份信息匹配的防盗策略解析防盗指令,得到该指令对应的防盗命令,并且执行防盗命令对应的操作,以实现移动终端防盗。由此可见,本发明实施例中的防盗指令可以来自能够发送短信的设备或终端(如防盗指令的发送方为移动终端或者服务器或者个人电脑),还可以来自能够发送网络指令的设备或终端。目前能够发送短信或者网络指令的设备或终端很多(例如手机、电脑、平板等),并且通过短信或者网络指令发送防盗指令时效快、到达准,能够节省被盗移动终端的流量和电量消耗,为找回被盗移动 终端提供更多时间,从而能够方便快捷地实现移动终端的防盗,解决了现有技术中,移动终端被盗之后,无法继续对移动终端进行防盗的问题。本发明实施例确定发送方的身份信息之后,启动与发送方身份信息匹配的防盗策略解析防盗指令,得到对应的防盗命令,保证能够根据用户需要选择适当的防盗策略对移动终端进行防盗保护。并且,本发明实施例中,根据发送方的身份信息可以匹配一种防盗策略对移动终端进行防盗保护,还可以匹配到多种防盗策略同时对移动终端进行防盗保护,增强移动终端的安全性。另外,本发明实施例中,移动终端被盗之后,仍旧能够接收到发送方的防盗指令,并根据解析防盗指令获得的防盗命令执行防盗操作。例如,用户移动终端丢失之后,通过发送防盗指令至被盗移动终端,本发明实施例能够对被盗移动终端进行锁屏操作,阻止偷盗者使用移动终端。偷盗者无法使用移动终端导致偷盗者无法通过刷机等操作翻新移动终端,进而偷盗者无法将被盗移动终端转卖获得利润。进一步,能够有效降低偷窃犯罪发生的概率。另外,根据接收到的防盗指令,本发明实施例还可以获取偷盗者的身份标识信息(如偷盗者的照片、指纹等)。根据本发明实施例获取到偷盗者的身份标识信息之后,能够根据上述身份标识信息对偷盗者进行抓捕。因此,本发明实施例能够达到终端被盗之后有效对终端进行防盗,并且降低偷盗犯罪率、保护用户财产安全的有益效果。In the embodiment of the present invention, the identity information of the sender can be determined according to the anti-theft command from the sender, the anti-theft policy matching the sender identity information is activated to parse the anti-theft command, the anti-theft command corresponding to the instruction is obtained, and the anti-theft command is executed. Operation to achieve anti-theft of the mobile terminal. It can be seen that the anti-theft command in the embodiment of the present invention may be from a device or terminal capable of sending a short message (such as a sender of the anti-theft command being a mobile terminal or a server or a personal computer), or may be from a device or terminal capable of transmitting a network command. At present, there are many devices or terminals that can send SMS or network commands (such as mobile phones, computers, tablets, etc.), and the anti-theft command is sent quickly by SMS or network command, and the arrival time is accurate, which can save the traffic and power consumption of the stolen mobile terminal. Retrieving stolen mobile The terminal provides more time, so that the anti-theft of the mobile terminal can be realized conveniently and quickly, and the problem that the mobile terminal cannot be burglar-proof after the mobile terminal is stolen is solved in the prior art. After determining the identity information of the sender, the embodiment of the present invention initiates an anti-theft policy that matches the identity information of the sender to parse the anti-theft command, and obtains a corresponding anti-theft command, so as to ensure that the anti-theft protection can be performed on the mobile terminal according to the user's need to select an appropriate anti-theft policy. Moreover, in the embodiment of the present invention, according to the identity information of the sender, an anti-theft policy can be matched to perform anti-theft protection on the mobile terminal, and multiple anti-theft policies can be matched to simultaneously protect the mobile terminal against theft, thereby enhancing the security of the mobile terminal. In addition, in the embodiment of the present invention, after the mobile terminal is stolen, the anti-theft command of the sender can still be received, and the anti-theft operation is performed according to the anti-theft command obtained by parsing the anti-theft command. For example, after the user mobile terminal is lost, by sending an anti-theft command to the stolen mobile terminal, the embodiment of the present invention can perform a lock screen operation on the stolen mobile terminal to prevent the thief from using the mobile terminal. The inability of the thief to use the mobile terminal causes the thief to fail to renovate the mobile terminal by brushing the machine, and the thief cannot resell the stolen mobile terminal for profit. Further, the probability of theft crime can be effectively reduced. In addition, according to the received anti-theft command, the embodiment of the present invention can also obtain the identity information of the thief (such as a photo of the thief, a fingerprint, etc.). After the identity information of the thief is obtained according to the embodiment of the present invention, the thief can be arrested according to the identity identification information. Therefore, the embodiment of the present invention can effectively prevent theft of the terminal after the terminal is stolen, and reduce the crime rate of theft and protect the security of the user property.
根据本发明的又一个方面,提供了一种计算机程序,其包括计算机可读代码,当所述计算机可读代码在计算设备上运行时,导致所述计算设备执行本发明实施例提供的移动终端的防盗方法。According to still another aspect of the present invention, a computer program is provided, comprising computer readable code that, when executed on a computing device, causes the computing device to perform a mobile terminal provided by an embodiment of the present invention Anti-theft method.
根据本发明的再一个方面,提供了一种计算机可读介质,其中存储了执行本发明实施例提供的移动终端的防盗方法的计算机程序。According to still another aspect of the present invention, a computer readable medium storing a computer program for performing an antitheft method for a mobile terminal provided by an embodiment of the present invention is provided.
上述说明仅是本发明技术方案的概述,为了能够更清楚了解本发明的技术手段,而可依照说明书的内容予以实施,并且为了让本发明的上述和其它目的、特征和优点能够更明显易懂,以下特举本发明的具体实施方式。The above description is only an overview of the technical solutions of the present invention, and the above-described and other objects, features and advantages of the present invention can be more clearly understood. Specific embodiments of the invention are set forth below.
附图说明DRAWINGS
通过阅读下文优选实施方式的详细描述,各种其他的优点和益处对于本领域普通技术人员将变得清楚明了。附图仅用于示出优选实施方式的目的,而并不认为是对本发明的限制。而且在整个附图中,用相同的参考符号表示相同的部件。在附图中:Various other advantages and benefits will become apparent to those skilled in the art from a The drawings are only for the purpose of illustrating the preferred embodiments and are not to be construed as limiting. Throughout the drawings, the same reference numerals are used to refer to the same parts. In the drawing:
图1示出了根据本发明一个实施例的移动终端防盗方法的处理流程图;1 is a flowchart showing a process of a mobile terminal anti-theft method according to an embodiment of the present invention;
图2示出了根据本发明一个实施例的移动终端防盗客户端的结构示意图;2 is a schematic structural diagram of a mobile terminal anti-theft client according to an embodiment of the present invention;
图3示出了根据本发明又一个实施例的移动终端防盗方法的处理流程图;FIG. 3 is a flowchart showing a process of a mobile terminal anti-theft method according to still another embodiment of the present invention; FIG.
图4示出了根据本发明一个实施例的注册短信拦截功能的处理流程图; FIG. 4 is a flowchart showing a process of registering a short message interception function according to an embodiment of the present invention; FIG.
图5示出了根据本发明一个实施例的短信接收处理方法的处理流程图;FIG. 5 is a flowchart showing a process of a short message receiving processing method according to an embodiment of the present invention; FIG.
图6示出了根据本发明一个优选实施例的预先存储验证码的方法的处理流程图;6 shows a process flow diagram of a method of pre-storing a verification code in accordance with a preferred embodiment of the present invention;
图7示出了根据本发明一个实施例的对命令执行情况进行轮询查询的处理流程图;FIG. 7 is a flowchart showing a process of polling a command execution situation according to an embodiment of the present invention; FIG.
图8示出了根据本发明一个实施例的查询回执的方法的处理流程图;FIG. 8 is a flowchart showing a process of a method for querying a receipt according to an embodiment of the present invention; FIG.
图9示出了根据本发明又一个优选实施例的移动终端防盗方法的处理流程图;FIG. 9 is a flowchart showing a process of a mobile terminal anti-theft method according to still another preferred embodiment of the present invention; FIG.
图10示出了根据本发明一个实施例的亲友手机侧的移动终端防盗方法的处理流程图;FIG. 10 is a flowchart showing a process of a mobile terminal anti-theft method on a mobile phone side of a family member and a friend according to an embodiment of the present invention; FIG.
图11示出了根据本发明一个实施例的被盗手机一侧的移动终端防盗方法的处理流程图;FIG. 11 is a flowchart showing a process of a mobile terminal anti-theft method on the side of a stolen mobile phone according to an embodiment of the present invention; FIG.
图12示出了根据本发明又一个实施例的移动终端防盗客户端的结构示意图;FIG. 12 is a schematic structural diagram of a mobile terminal anti-theft client according to still another embodiment of the present invention; FIG.
图13示出了根据本发明又一个实施例的移动终端防盗方法的处理流程图;FIG. 13 is a flowchart showing a process of a mobile terminal anti-theft method according to still another embodiment of the present invention; FIG.
图14示出了根据本发明又一个实施例的开启防盗功能的方法的处理流程图;FIG. 14 is a flowchart showing a process of a method of turning on an anti-theft function according to still another embodiment of the present invention; FIG.
图15示出了根据本发明一个实施例的解除绑定的方法的处理流程图;FIG. 15 is a flowchart showing a process of a method of unbinding according to an embodiment of the present invention; FIG.
图16示出了根据本发明又一个优选实施例的移动终端防盗方法的处理流程图;16 is a flowchart showing a process of a mobile terminal anti-theft method according to still another preferred embodiment of the present invention;
图17示出了根据本发明一个实施例的已激活账户一侧发送防盗指令的处理流程图;17 is a flowchart showing a process of transmitting an anti-theft instruction on an activated account side according to an embodiment of the present invention;
图18示出了根据本发明一个实施例的移动终端一侧防盗的方法处理流程图;FIG. 18 is a flowchart of a method for preventing theft of a side of a mobile terminal according to an embodiment of the present invention; FIG.
图19示出了根据本发明又一个实施例的移动终端防盗客户端的结构示意图;FIG. 19 is a schematic structural diagram of a mobile terminal anti-theft client according to still another embodiment of the present invention; FIG.
图20示出了根据本发明又一个实施例的移动终端防盗方法的处理流程图;FIG. 20 is a flowchart showing a process of a mobile terminal anti-theft method according to still another embodiment of the present invention; FIG.
图21示出了根据本发明一个实施例的PC终端一侧的激活手机防盗功能的方法的处理流程图;21 is a flowchart showing a process of a method for activating a mobile phone anti-theft function on a side of a PC terminal according to an embodiment of the present invention;
图22示出了根据本发明又一个实施例手机一侧的防盗方法的处理流程图;FIG. 22 is a flow chart showing the processing of the anti-theft method on the side of the mobile phone according to still another embodiment of the present invention; FIG.
图23示出了根据本发明又一个实施例的移动终端防盗客户端的结构示意图;FIG. 23 is a schematic structural diagram of a mobile terminal anti-theft client according to still another embodiment of the present invention; FIG.
图24示出了根据本发明又一个实施例的移动终端防盗方法的处理流程图;FIG. 24 is a flowchart showing a process of a mobile terminal anti-theft method according to still another embodiment of the present invention; FIG.
图25示出了根据本发明又一个实施例的注册短信拦截功能的处理流程图;FIG. 25 is a flowchart showing a process of registering a short message interception function according to still another embodiment of the present invention; FIG.
图26示出了根据本发明一个实施例的判断防盗策略的方法的处理流程图;26 is a process flow diagram of a method of determining an anti-theft policy, in accordance with one embodiment of the present invention;
图27示出了根据本发明一个实施例的对命令执行情况进行互斥查询的处理流程图;FIG. 27 is a flowchart showing a process of mutually exclusive querying a command execution situation according to an embodiment of the present invention; FIG.
图28示出了根据本发明又一个实施例的移动终端防盗客户端的结构示意图;28 is a schematic structural diagram of a mobile terminal anti-theft client according to still another embodiment of the present invention;
图29示意性地示出了用于执行根据本发明的移动终端防盗方法的计算设备的框图;以及29 is a block diagram schematically showing a computing device for performing a mobile terminal theft prevention method according to the present invention;
图30示意性地示出了用于保持或者携带实现根据本发明的移动终端防盗方法的程序代码的存储单元。Fig. 30 schematically shows a storage unit for holding or carrying program code implementing the mobile terminal anti-theft method according to the present invention.
具体实施方式detailed description
下面结合附图和具体的实施方式对本发明作进一步的描述。 The invention is further described below in conjunction with the drawings and specific embodiments.
实施例一 Embodiment 1
相关技术中提及,若移动终端丢失之前未开启防盗功能,则移动终端丢失之后,无法远程开启并使用防盗功能,导致造成移动终端丢失后无法找回的恶劣后果。As mentioned in the related art, if the anti-theft function is not turned on before the mobile terminal is lost, after the mobile terminal is lost, the anti-theft function cannot be remotely opened and used, resulting in a bad result that the mobile terminal cannot be retrieved after being lost.
为解决上述技术问题,本发明实施例提供了一种移动终端防盗方法,应用于未开启防盗功能的移动终端。图1示出了根据本发明一个实施例的移动终端防盗方法的处理流程图。如图1所示,该流程至少包括步骤S102至步骤S106。To solve the above technical problem, an embodiment of the present invention provides a mobile terminal anti-theft method, which is applied to a mobile terminal that does not have an anti-theft function. FIG. 1 is a flow chart showing the processing of a mobile terminal anti-theft method according to an embodiment of the present invention. As shown in FIG. 1, the flow includes at least steps S102 to S106.
步骤S102、接收来自服务器的后台防盗开启指令,其中,后台防盗开启指令中携带有本移动终端的验证信息。Step S102: Receive a background anti-theft open command from the server, where the background anti-theft open command carries the verification information of the mobile terminal.
步骤S104、解析后台防盗开启指令,获取验证信息并进行验证。Step S104: Parsing the background anti-theft opening instruction, obtaining the verification information, and performing verification.
步骤S106、若验证通过,则根据后台开启防盗指令在后台开启防盗功能。Step S106: If the verification is passed, the anti-theft function is turned on in the background according to the anti-theft command in the background.
在本发明实施例中,当移动终端丢失时,能够通过服务器发送后台防盗开启指令至移动终端。接收到后台防盗开启指令之后,对其进行解析以及验证,保证接收到的后台防盗指令是真实有效可信的指令,避免接收来自不可信或恶意的服务器发送的后台防盗指令,导致移动终端错误开启防盗功能。若恶意服务器使用防盗功能恶意锁定移动终端,导致移动终端全部或部分功能不可用,则会对使用者产生恶劣影响。当接收到的后台防盗开启指令通过验证之后,本发明实施例根据后台开启防盗指令在移动终端的后台开启防盗功能,解决现有技术中,移动终端丢失之后无法开启防盗功能的问题。采用远程开启防盗功能的方式能够使得丢失的移动终端在不被找回的情况下也能够开启防盗,提高了移动终端的安全性保障,其中的验证功能也避免移动终端被恶意开启防盗功能,进一步提高移动终端的安全性。因此,本发明实施例能够在移动终端丢失之后,开启移动终端的防盗功能,进而根据防盗指令执行相应的防盗操作,达到了更加合理有效保证移动终端安全、打击偷窃犯罪的有益效果。In the embodiment of the present invention, when the mobile terminal is lost, the background anti-theft opening command can be sent to the mobile terminal through the server. After receiving the background anti-theft open command, it parses and verifies it to ensure that the received background anti-theft command is a real and valid and reliable command, avoiding receiving background anti-theft commands sent from untrusted or malicious servers, causing the mobile terminal to open incorrectly. Anti-theft function. If the malicious server maliciously locks the mobile terminal using the anti-theft function, causing all or part of the functions of the mobile terminal to be unavailable, the user may be adversely affected. After the received background anti-theft opening command is verified, the embodiment of the present invention turns on the anti-theft function in the background of the mobile terminal according to the background opening anti-theft command, which solves the problem that the anti-theft function cannot be opened after the mobile terminal is lost in the prior art. The method of remotely opening the anti-theft function enables the lost mobile terminal to open the anti-theft without being retrieved, thereby improving the security of the mobile terminal, and the verification function also prevents the mobile terminal from being maliciously turned on by the anti-theft function. Improve the security of mobile terminals. Therefore, the embodiment of the present invention can open the anti-theft function of the mobile terminal after the mobile terminal is lost, and then perform the corresponding anti-theft operation according to the anti-theft instruction, thereby achieving the beneficial effect of more reasonable and effective guarantee of the security of the mobile terminal and combating theft crime.
本发明实施例中,步骤S102中提及,后台防盗指令中携带有本移动终端的验证信息。其中,本移动终端(例如手机或者平板电脑)的验证信息可以包括本移动终端的唯一身份标识以及至少一个用户身份识别模块(Subscriber Identity Module,以下简称SIM)卡号,可以包括本移动终端的唯一身份标识以及用户的账户信息,还可以同时包括本移动终端的唯一身份标识、至少一个SIM卡号以及用户的账户信息三者。当然,验证信息也可以包括其他可对移动终端进行验证的信息,例如,移动终端的硬件配置、移动终端的硬件标识ID、移动终端的系统版本号,等等。其中,本发明实施例优选本移动终端的国际移动设备身份识别码(International Mobile Equipment Identity,以下简称IMEI号码),IMEI号码本身与移动终端是终身绑定且唯一不变,并且可识别性高,因此,本发明实施例中,优选IMEI号码为本移动终端的唯一身份标识。In the embodiment of the present invention, it is mentioned in step S102 that the background anti-theft command carries the verification information of the mobile terminal. The authentication information of the mobile terminal (such as a mobile phone or a tablet) may include a unique identity of the mobile terminal and at least one Subscriber Identity Module (SIM) card number, which may include the unique identity of the mobile terminal. The identifier and the account information of the user may also include the unique identity of the mobile terminal, the at least one SIM card number, and the account information of the user. Of course, the verification information may also include other information that can be verified by the mobile terminal, such as the hardware configuration of the mobile terminal, the hardware identification ID of the mobile terminal, the system version number of the mobile terminal, and the like. The embodiment of the present invention is preferably an International Mobile Equipment Identity (IMEI number) of the mobile terminal. The IMEI number itself is permanently bound to the mobile terminal and is unique and has high recognizability. Therefore, in the embodiment of the present invention, the preferred IMEI number is the unique identity of the mobile terminal.
现以不同的验证信息为例,对本发明实施例提供的移动防盗方法进行详细说明。本实施例中优选三组验证信息,分别是包括本移动终端的IMEI以及至少一个SIM卡号的第一组验证信息,包括本移动终端的IMEI以及用户的账户信息的第二组验证信息,以及同时包括本移动终端的IMEI、至少一个SIM卡号和用户的账户信息三者的第三组验证信 息。The mobile anti-theft method provided by the embodiment of the present invention will be described in detail by taking different verification information as an example. In this embodiment, three sets of verification information are selected, which are respectively a first group of verification information including an IMEI of the mobile terminal and at least one SIM card number, including an IMEI of the mobile terminal and a second group of verification information of the account information of the user, and simultaneously The third group of verification letters including the IMEI of the mobile terminal, the at least one SIM card number, and the account information of the user interest.
首先以第一组验证信息为例进行说明。本实施例中,本移动终端的验证信息包括本移动终端的IMEI以及至少一个SIM卡号。当本发明实施例接收到携带有该验证信息的防盗开启指令之后,执行如图1所示的步骤S104,解析接收到的后台防盗开启指令,并获取到后台防盗开启指令携带的验证信息。获取到验证信息之后,本发明实施例对验证信息中的IMEI以及至少一个SIM卡号分别进行验证。首先,本发明实施例对验证信息中的IMEI进行验证。若验证信息中的IMEI与本移动终端的IMEI匹配,则验证信息中的IMEI通过验证。其次,本发明实施例对验证信息中的SIM卡号进行验证。若验证信息中存在至少一个SIM卡号与本移动终端的联系人列表中的SIM卡号匹配,则验证信息中的SIM卡号通过验证。另外,本发明实施例中也可以首先验证至少存在一个SIM卡号与本移动终端的联系人列表中的SIM卡号匹配,其次,对验证信息中的IMEI进行验证。本发明实施例中对验证信息中包含的IMEI以及至少一个SIM卡号的验证顺序并不加以限定。First, the first group of verification information is taken as an example for explanation. In this embodiment, the verification information of the mobile terminal includes an IMEI of the mobile terminal and at least one SIM card number. After receiving the anti-theft open command carrying the verification information, the embodiment of the present invention performs step S104 as shown in FIG. 1 , parses the received background anti-theft open command, and obtains the verification information carried by the background anti-theft open command. After obtaining the verification information, the embodiment of the present invention separately verifies the IMEI and the at least one SIM card number in the verification information. First, the embodiment of the present invention verifies the IMEI in the verification information. If the IMEI in the verification information matches the IMEI of the mobile terminal, the IMEI in the verification information passes the verification. Next, the embodiment of the present invention verifies the SIM card number in the verification information. If at least one SIM card number in the verification information matches the SIM card number in the contact list of the mobile terminal, the SIM card number in the verification information passes the verification. In addition, in the embodiment of the present invention, it is also possible to first verify that at least one SIM card number matches the SIM card number in the contact list of the mobile terminal, and secondly, verify the IMEI in the verification information. In the embodiment of the present invention, the verification order of the IMEI and the at least one SIM card number included in the verification information is not limited.
本发明实施例中的验证信息包含的SIM卡号的个数可以是除0之外的任意整数值个,本发明实施例对此并不加以限定。例如,验证信息中包含4个SIM卡号,仅其中一个SIM卡号与本移动终端的联系人列表中的SIM卡号匹配,另外三个SIM卡号与本移动终端的联系人列表中的SIM卡号均不匹配,则该验证信息中的SIM卡号通过验证。再例如,验证信息中仅包含一个SIM卡号,且该SIM卡号与本移动终端的联系人列表中的SIM卡号能够匹配,则该验证信息中的SIM卡号通过验证。在实际运用中,用户移动终端的联系人列表会因为职位变更、工作地点变更等因素发生不定期更改。因此,本发明实施例中,验证信息中包含的SIM卡号有一个与本移动终端的联系人列表中的SIM卡号匹配,则验证信息中的SIM卡号通过验证。验证信息中的SIM卡号通过验证之后,标识该SIM卡号为可信任号码。本发明实施例中,将通过验证的SIM卡号均标识为可信任号码,保证在之后的操作中,任意可信任号码发送的防盗指令均能够被识别。并且,本发明实施例根据可信任号码发送的防盗指令执行防盗操作。The number of the SIM card numbers included in the verification information in the embodiment of the present invention may be any integer value other than 0, which is not limited by the embodiment of the present invention. For example, the verification information includes four SIM card numbers, and only one of the SIM card numbers matches the SIM card number in the contact list of the mobile terminal, and the other three SIM card numbers do not match the SIM card number in the contact list of the mobile terminal. , the SIM card number in the verification information is verified. For example, if the verification information includes only one SIM card number, and the SIM card number matches the SIM card number in the contact list of the mobile terminal, the SIM card number in the verification information passes the verification. In actual use, the contact list of the user's mobile terminal may change from time to time due to factors such as job change, work place change, and the like. Therefore, in the embodiment of the present invention, if the SIM card number included in the verification information matches a SIM card number in the contact list of the mobile terminal, the SIM card number in the verification information passes the verification. After the SIM card number in the verification information passes the verification, the SIM card number is identified as a trusted number. In the embodiment of the present invention, the verified SIM card numbers are all identified as trusted numbers, so that in the subsequent operations, the anti-theft commands sent by any trusted number can be identified. Moreover, the embodiment of the present invention performs an anti-theft operation according to the anti-theft instruction sent by the trusted number.
本发明实施例中,若验证信息中的IMEI通过验证,而没有SIM卡号与本移动终端的联系人列表中的SIM卡号匹配,则验证信息不能通过验证。同理,当验证信息中存在至少一个SIM卡号与本移动终端的联系人列表中的SIM卡号匹配,但该验证信息中的IMEI与本移动终端的IMEI不匹配,则验证信息不能通过。本发明实施例中,当验证信息中包含的两种信息均通过验证,则验证信息通过验证,保证用户的移动终端不会因为图谋不轨者的恶意操作或者用户的失误操作开启防盗指令,避免不必要的情况下开启防盗功能给用户带来的麻烦。In the embodiment of the present invention, if the IMEI in the verification information passes the verification, and the SIM card number does not match the SIM card number in the contact list of the mobile terminal, the verification information cannot pass the verification. Similarly, when at least one SIM card number in the verification information matches the SIM card number in the contact list of the mobile terminal, but the IMEI in the verification information does not match the IMEI of the mobile terminal, the verification information cannot pass. In the embodiment of the present invention, when both types of information included in the verification information are verified, the verification information is verified to ensure that the user's mobile terminal does not open the anti-theft command due to the malicious operation of the unscrupulous person or the user's mistake operation, thereby avoiding unnecessary In the case of opening the anti-theft function to the user.
如上文所述,步骤S104执行完毕之后,即对验证信息进行验证之后,若验证通过,执行如图1所示的步骤S106。步骤S106中,本发明实施例根据后台开启防盗指令在后台开启防盗功能。防盗功能开启后,当接收到标识为可信任号码的SIM卡号的防盗指令,本发明实施例解析该防盗指令,并执行该防盗指令对应的防盗操作。本发明实施例中, 标识为可信任号码的SIM卡号指与本移动终端绑定的、通过验证的可信任SIM卡号。例如,通讯录中的常用SIM卡号、指定白名单SIM卡号等等。当本移动终端开启防盗功能之后,本发明实施例接收到标识为可信任号码的SIM卡号发送的防盗指令。本发明实施例能够根据该防盗指令执行对应的防盗操作,避免本移动终端的丢失,或者在本移动终端丢失之后,提供找回本移动终端的线索。例如,用户手机丢失之后,本发明实施例能够通过服务器开启该丢失的手机的防盗功能。防盗功能开启之后,本发明实施例通过绑定的亲友号码发送防盗指令至该手机。手机接收到防盗指令之后,能够根据该防盗指令进行自动锁屏或者反馈更换后的SIM卡号至服务器或者返回该手机的实时位置至服务器等操作,帮助机主寻回被盗手机。As described above, after the execution of the step S104 is completed, that is, after the verification information is verified, if the verification is passed, the step S106 shown in FIG. 1 is executed. In step S106, the embodiment of the present invention turns on the anti-theft function in the background according to the anti-theft command in the background. After the anti-theft function is enabled, when receiving the anti-theft command of the SIM card number identified as the trusted number, the embodiment of the present invention parses the anti-theft command and executes the anti-theft operation corresponding to the anti-theft command. In the embodiment of the present invention, The SIM card number identified as a trusted number refers to a trusted SIM card number that is authenticated and bound to the mobile terminal. For example, a common SIM card number in the address book, a designated white list SIM card number, and the like. After the mobile terminal turns on the anti-theft function, the embodiment of the present invention receives the anti-theft instruction sent by the SIM card number identified as the trusted number. The embodiment of the invention can perform corresponding anti-theft operation according to the anti-theft instruction, avoid the loss of the mobile terminal, or provide a clue for retrieving the mobile terminal after the mobile terminal is lost. For example, after the user's mobile phone is lost, the embodiment of the present invention can enable the anti-theft function of the lost mobile phone through the server. After the anti-theft function is enabled, the embodiment of the present invention sends an anti-theft command to the mobile phone through the bound relatives and friends. After receiving the anti-theft command, the mobile phone can automatically lock the screen or feedback the replaced SIM card number to the server or return the real-time location of the mobile phone to the server according to the anti-theft command, thereby helping the owner to retrieve the stolen mobile phone.
其次以第二组验证信息为例进行说明。本实施例中,本移动终端的验证信息包括IMEI以及用户的账户信息。当本发明实施例接收到携带有该验证信息的防盗开启指令之后,执行如图1所示的步骤S104,解析接收到的后台防盗开启指令,并获取到后台防盗开启指令携带的验证信息。获取到验证信息之后,本发明实施例对验证信息中的IMEI以及用户的账户信息进行验证。Secondly, the second group of verification information is taken as an example for description. In this embodiment, the verification information of the mobile terminal includes the IMEI and the account information of the user. After receiving the anti-theft open command carrying the verification information, the embodiment of the present invention performs step S104 as shown in FIG. 1 , parses the received background anti-theft open command, and obtains the verification information carried by the background anti-theft open command. After obtaining the verification information, the embodiment of the present invention verifies the IMEI in the verification information and the account information of the user.
首先,本发明实施例对验证信息中的IMEI进行验证。若验证信息中的IMEI与本移动终端的IMEI匹配,则验证信息中的IMEI通过验证。其次,当验证信息中的IMEI通过验证之后,本发明实施例登录用户的账户信息获取该账户的标识(Identity,以下简称ID)。First, the embodiment of the present invention verifies the IMEI in the verification information. If the IMEI in the verification information matches the IMEI of the mobile terminal, the IMEI in the verification information passes the verification. Secondly, after the IMEI in the verification information passes the verification, the account information of the login user of the embodiment of the present invention acquires an identifier (Identity, hereinafter referred to as ID) of the account.
本发明实施例中的用户账户信息可以是用户名和密码,可以是用户名和系统随机选取的验证码,还可以是用户邮箱账号等等,本发明实施例对此并不加以限定。优选地,本发明实施例中,选择用户名和密码作为用户账户信息。在实际运用中,使用用户名和密码作为账户信息进行登录能够合理有效保证用户账户的安全。若使用用户名和随机选取的验证码作为账户,虽然仅需要记住用户名,无需密码,比较方便,但缺乏安全性。另外,使用邮箱账号作为账户信息同样比较方便,但由于邮箱账户登录地点容易发生改变,导致邮箱账号容易泄露,也存在安全隐患。因此,当验证信息中的IMEI通过验证之后,本发明实施例使用用户名和密码登录账户信息,获取该账户的ID。The user account information in the embodiment of the present invention may be a user name and a password, and may be a user name and a verification code randomly selected by the system, and may also be a user's email account, etc., which is not limited by the embodiment of the present invention. Preferably, in the embodiment of the present invention, the user name and password are selected as the user account information. In actual use, using the user name and password as the account information to log in can reasonably and effectively ensure the security of the user account. If the user name and the randomly selected verification code are used as the account, although it is only necessary to remember the user name and no password, it is convenient, but lacks security. In addition, it is more convenient to use the email account as the account information, but because the login location of the email account is easy to change, the email account is easily leaked, and there is also a security risk. Therefore, after the IMEI in the verification information passes the verification, the embodiment of the present invention uses the username and password to log in to the account information to obtain the ID of the account.
获取到账户ID之后,本发明实施例发送该账户ID至服务器,由服务器对该账户ID进行验证。本发明实施例接收到服务器经过验证得到的验证结果之后,确定用户的账户信息是否通过验证。若用户的账户信息通过验证,则本发明实施例确定验证信息通过验证,若用户的账户信息没有通过验证,则本发明实施例确定验证信息未通过验证。After obtaining the account ID, the embodiment of the present invention sends the account ID to the server, and the account ID is verified by the server. After receiving the verification result obtained by the server, the embodiment of the present invention determines whether the account information of the user passes the verification. If the user's account information is verified, the embodiment of the present invention determines that the verification information is verified. If the user's account information does not pass the verification, the embodiment of the present invention determines that the verification information has not passed the verification.
本发明实施例中,可以首先对验证信息中的IMEI进行验证。其次,对验证信息中的用户的账户信息进行验证。本发明实施例还可以首先验证用户的账户信息,其次,对验证信息中的IMEI进行验证。本发明实施例对验证验证信息中的IMEI以及用户的账户信息的顺序并不加以限定。对验证信息中的IMEI进行验证仅需要本发明实施例获取自身的IMEI,并对两个IMEI进行匹配。对验证信息中的用户账户信息进行验证,需要本发明实施例登录用户的账户信息,获取到账户ID之后,将该账户ID发送至服务器进行验证。 相对于验证IMEI,对用户的账户信息进行验证的步骤更为繁琐、复杂。因此,本发明实施例中优选首先验证IMEI。当验证信息中的IMEI通过验证之后,再对验证信息中的用户的账户信息进行验证,保证更加高效率地对验证信息进行验证。In the embodiment of the present invention, the IMEI in the verification information may be first verified. Secondly, the account information of the user in the verification information is verified. The embodiment of the present invention may also first verify the account information of the user, and secondly, verify the IMEI in the verification information. The embodiment of the present invention does not limit the order of the IMEI in the verification verification information and the account information of the user. The verification of the IMEI in the verification information only requires the embodiment of the present invention to obtain its own IMEI and match the two IMEIs. To verify the user account information in the verification information, the account information of the user is required to be logged in the embodiment of the present invention. After the account ID is obtained, the account ID is sent to the server for verification. The step of verifying the user's account information is more cumbersome and complicated than verifying the IMEI. Therefore, it is preferred in the embodiment of the invention to first verify the IMEI. After the IMEI in the verification information passes the verification, the account information of the user in the verification information is verified to ensure that the verification information is verified more efficiently.
如上文所述,本发明实施例中,当验证信息中包含的两种信息均通过验证,则验证信息通过验证,保证用户的移动终端不会因为图谋不轨者的恶意操作或者用户的失误操作开启防盗指令,避免不必要的情况下开启防盗功能给用户带来的麻烦。As described above, in the embodiment of the present invention, when both types of information included in the verification information are verified, the verification information is verified, and the user's mobile terminal is not opened by the malicious operation of the unscrupulous user or the user's mistake operation. Instructions to avoid the trouble of turning on the anti-theft function in unnecessary situations.
对验证信息进行验证之后,步骤S104执行完毕,本发明实施例继续执行步骤S106。步骤S106中,当验证信息通过验证,本发明实施例根据接收到的后台防盗开启指令在后台开启防盗功能。防盗功能开启后,当接收到上述通过验证的账户ID的防盗指令,本发明实施例解析该防盗指令,并执行该防盗指令对应的防盗操作。例如,当用户的手机丢失之后,若用户丢失的手机没有绑定可信任号码,则用户能够登陆服务器开启丢失的手机的防盗功能。丢失的手机的防盗功能开启之后,本发明实施例能够登录注册的账户,通过账户中的唯一账户ID发送防盗指令至手机。手机接收到防盗指令之后,能够根据该防盗指令,进行自动锁屏或者反馈更换后的SIM卡号至服务器或者返回该手机的实时位置至服务器等操作,帮助机主寻回被盗手机。After the verification information is verified, the step S104 is completed, and the embodiment of the present invention continues to perform step S106. In step S106, when the verification information is verified, the embodiment of the present invention turns on the anti-theft function in the background according to the received background anti-theft opening instruction. After the anti-theft function is enabled, when the anti-theft command of the verified account ID is received, the embodiment of the present invention parses the anti-theft command and executes the anti-theft operation corresponding to the anti-theft command. For example, after the user's mobile phone is lost, if the lost phone of the user is not bound with a trusted number, the user can log in to the server to enable the anti-theft function of the lost mobile phone. After the anti-theft function of the lost mobile phone is turned on, the embodiment of the present invention can log in to the registered account and send an anti-theft command to the mobile phone through the unique account ID in the account. After receiving the anti-theft command, the mobile phone can automatically lock the screen or feedback the replaced SIM card number to the server or return the real-time location of the mobile phone to the server according to the anti-theft command, thereby helping the owner to retrieve the stolen mobile phone.
最后以第三组验证信息为例进行说明。本实施例中,本移动终端的验证信息同时包括IMEI、至少一个SIM卡号和用户的账户信息三者。当本发明实施例接收到携带有该验证信息的防盗开启指令之后,执行如图1所示的步骤S104,解析接收到的后台防盗开启指令,并获取到后台防盗开启指令携带的验证信息。获取到验证信息之后,本发明实施例对验证信息中的IMEI、至少一个SIM卡号以及用户的账户信息分部进行验证。首先,本发明实施例对验证信息中的IMEI进行验证。若验证信息中的IMEI与本移动终端的IMEI匹配,则验证信息中的IMEI通过验证。其次,本发明实施例对验证信息中的SIM卡号进行验证。若验证信息中存在至少一个SIM卡号与本移动终端的联系人列表中的SIM卡号匹配,则验证信息中的SIM卡号通过验证。另外,本发明实施例中也可以首先验证至少存在一个SIM卡号与本移动终端的联系人列表中的SIM卡号匹配,其次,对验证信息中的IMEI进行验证,本发明实施例对此并不加以限定。Finally, the third group of verification information is taken as an example for description. In this embodiment, the verification information of the mobile terminal includes the IMEI, the at least one SIM card number, and the account information of the user. After receiving the anti-theft open command carrying the verification information, the embodiment of the present invention performs step S104 as shown in FIG. 1 , parses the received background anti-theft open command, and obtains the verification information carried by the background anti-theft open command. After obtaining the verification information, the embodiment of the present invention verifies the IMEI in the verification information, the at least one SIM card number, and the account information division of the user. First, the embodiment of the present invention verifies the IMEI in the verification information. If the IMEI in the verification information matches the IMEI of the mobile terminal, the IMEI in the verification information passes the verification. Next, the embodiment of the present invention verifies the SIM card number in the verification information. If at least one SIM card number in the verification information matches the SIM card number in the contact list of the mobile terminal, the SIM card number in the verification information passes the verification. In addition, in the embodiment of the present invention, it is also possible to first verify that at least one SIM card number matches the SIM card number in the contact list of the mobile terminal, and secondly, verify the IMEI in the verification information, which is not used in the embodiment of the present invention. limited.
本发明实施例中的验证信息包含的SIM卡号的格式可以是除0之外的任意整数值个,本发明实施例对此并不加以限定。例如,验证信息中包含2个SIM卡号,其中一个SIM卡号与本移动终端的联系人列表中的SIM卡号匹配,另外一个SIM卡号与本移动终端的联系人列表中的SIM卡号均不匹配,则该验证信息中的SIM卡号通过验证。在实际运用中,用户移动终端的联系人列表会因为职位变更、公国地点变更等因素发生不定期更改。因此,本发明实施例中,验证信息中包含的SIM卡号有一个与本移动终端的联系人列表中的SIM卡号匹配,则验证信息中的SIM卡号通过验证。The format of the SIM card number included in the verification information in the embodiment of the present invention may be any integer value other than 0, which is not limited by the embodiment of the present invention. For example, the verification information includes two SIM card numbers, one of which matches the SIM card number in the contact list of the mobile terminal, and the other SIM card number does not match the SIM card number in the contact list of the mobile terminal. The SIM card number in the verification information is verified. In actual use, the contact list of the user's mobile terminal may change from time to time due to factors such as the change of position, the change of the location of the Principality. Therefore, in the embodiment of the present invention, if the SIM card number included in the verification information matches a SIM card number in the contact list of the mobile terminal, the SIM card number in the verification information passes the verification.
当验证信息中的IMEI以及至少一个SIM卡号通过验证,本发明实施例继续对验证信息中的用户的账户信息进行验证。本发明实施例中的用户账户信息可以是用户名和密码,可以是用户名和系统随机选取的验证码,还可以是用户邮箱账号等等,本发明实施 例对此并不加以限定。优选地,本发明实施例中,选择用户名和密码作为用户账户信息。在实际运用中,使用用户名和密码作为账户信息进行登录能够合理有效保证用户账户的安全。若使用用户名和随机选取的验证码作为账户,虽然仅需要记住用户名,无需密码,比较方便,但缺乏安全性。另外,使用邮箱账号作为账户信息同样比较方便,但由于邮箱账户登录地点容易发生改变,导致邮箱账号容易泄露,也存在安全隐患。因此,当验证信息中的IMEI以及至少一个SIM卡号通过验证之后,本发明实施例使用用户名和密码登陆账户信息,获取该账户的ID。When the IMEI and the at least one SIM card number in the verification information pass the verification, the embodiment of the present invention continues to verify the account information of the user in the verification information. The user account information in the embodiment of the present invention may be a user name and a password, and may be a user name and a verification code randomly selected by the system, or may be a user email account, etc., and the implementation of the present invention This example does not limit this. Preferably, in the embodiment of the present invention, the user name and password are selected as the user account information. In actual use, using the user name and password as the account information to log in can reasonably and effectively ensure the security of the user account. If the user name and the randomly selected verification code are used as the account, although it is only necessary to remember the user name and no password, it is convenient, but lacks security. In addition, it is more convenient to use the email account as the account information, but because the login location of the email account is easy to change, the email account is easily leaked, and there is also a security risk. Therefore, after the IMEI in the verification information and the at least one SIM card number pass the verification, the embodiment of the present invention uses the username and password to log in to the account information to obtain the ID of the account.
获取到账户ID之后,本发明实施例发送该账户ID至服务器,由服务器对该账户ID进行验证。本发明实施例接收到服务器经过验证得到的验证结果之后,确定用户的账户信息是否通过验证。若用户的账户信息没有通过验证,则本发明实施例确定验证信息未通过验证。若用户的账户信息通过验证,则本发明实施例确定验证信息通过验证。After obtaining the account ID, the embodiment of the present invention sends the account ID to the server, and the account ID is verified by the server. After receiving the verification result obtained by the server, the embodiment of the present invention determines whether the account information of the user passes the verification. If the user's account information does not pass the verification, the embodiment of the present invention determines that the verification information has not passed the verification. If the account information of the user is verified, the embodiment of the present invention determines that the verification information passes the verification.
本发明实施例中,当本移动终端的验证信息包含IMEI、至少一个SIM卡号和用户的账户信息时,当且仅当三者同时通过验证,验证信息通过验证。例如,当验证信息中的IMEI以及至少一个SIM卡号通过验证,但验证信息中的用户账户信息未通过验证,则验证信息未通过验证。另外,本发明实施例中,若首先对验证信息中的IMEI进行验证,并且该IMEI未通过验证,则无需继续对验证信息中的SIM卡号以及用户的账户信息进行验证,验证信息无法通过验证。本发明实施例中,当验证信息中包含的所有信息均通过验证,则验证信息通过验证,保证用户的移动终端不会因为图谋不轨者的恶意操作或者用户的失误操作开启防盗指令,避免不必要的情况下开启防盗功能给用户带来的麻烦。In the embodiment of the present invention, when the verification information of the mobile terminal includes the IMEI, the at least one SIM card number, and the account information of the user, if only three of them simultaneously pass the verification, the verification information passes the verification. For example, when the IMEI and the at least one SIM card number in the verification information pass the verification, but the user account information in the verification information fails the verification, the verification information fails the verification. In addition, in the embodiment of the present invention, if the IMEI in the verification information is first verified, and the IMEI fails to pass the verification, the SIM card number in the verification information and the account information of the user need not be verified, and the verification information cannot pass the verification. In the embodiment of the present invention, when all the information included in the verification information is verified, the verification information is verified, so that the user's mobile terminal does not open the anti-theft command due to the malicious operation of the unscrupulous person or the user's mistake operation, thereby avoiding unnecessary In the case of turning on the anti-theft function to bring trouble to the user.
对验证信息进行验证之后,步骤S104执行完毕,本发明实施例继续执行步骤S106。步骤S106中,当验证信息通过验证,本发明实施例根据接收到的后台防盗开启指令在后台开启防盗功能。防盗功能开启之后,当接收到上述通过验证的账户ID的防盗指令,本发明实施例解析该防盗指令,并执行该防盗指令对应的防盗操作。例如,当用户的手机丢失之后,本发明实施例能够登陆服务器发送后台防盗开启指令至丢失手机。手机后台开启防盗功能之后,本发明实施例能够通过绑定的亲友号码或者注册的用户账户信息中的ID发送防盗指令至丢失手机。手机接收到防盗指令之后,能够根据该防盗指令进行自动锁屏或者反馈更换后的SIM卡号至服务器或者返回该手机的实时位置至服务器等操作,帮助机主寻回被盗手机。After the verification information is verified, the step S104 is completed, and the embodiment of the present invention continues to perform step S106. In step S106, when the verification information is verified, the embodiment of the present invention turns on the anti-theft function in the background according to the received background anti-theft opening instruction. After the anti-theft function is enabled, when the anti-theft instruction of the verified account ID is received, the embodiment of the present invention parses the anti-theft instruction and executes the anti-theft operation corresponding to the anti-theft instruction. For example, after the user's mobile phone is lost, the embodiment of the present invention can log in to the server to send a background anti-theft open command to the lost mobile phone. After the anti-theft function is enabled in the background of the mobile phone, the embodiment of the present invention can send an anti-theft command to the lost mobile phone through the bound friend number or the ID in the registered user account information. After receiving the anti-theft command, the mobile phone can automatically lock the screen or feedback the replaced SIM card number to the server or return the real-time location of the mobile phone to the server according to the anti-theft command, thereby helping the owner to retrieve the stolen mobile phone.
基于上文各优选实施例提供的移动终端防盗方法,基于同一发明构思,本发明实施例提供了一种客户端,设置于未开启防盗功能的移动终端,以实现上述移动终端防盗方法。The mobile terminal anti-theft method provided by the above preferred embodiments is based on the same inventive concept. The embodiment of the present invention provides a client, which is disposed on a mobile terminal that does not have an anti-theft function, to implement the anti-theft method of the mobile terminal.
图2示出了根据本发明一个实施例的移动终端防盗客户端的结构示意图。参见图2,本发明实施例的客户端至少包括:接收模块210、解析模块220以及防盗开启模块230。FIG. 2 is a schematic structural diagram of a mobile terminal anti-theft client according to an embodiment of the present invention. Referring to FIG. 2, the client in the embodiment of the present invention includes at least a receiving module 210, a parsing module 220, and an anti-theft opening module 230.
现介绍本发明实施例的客户端的各器件或组成的功能以及各部分间的连接关系:The functions of each device or component of the client and the connection relationship between the components of the embodiment of the present invention are now introduced:
接收模块210,配置为接收来自服务器的后台防盗开启指令,其中,后台防盗开启指令中携带有本移动终端的验证信息。 The receiving module 210 is configured to receive a background anti-theft opening command from the server, where the background anti-theft opening command carries the verification information of the mobile terminal.
解析模块220,与接收模块210相耦合,配置为解析后台防盗开启指令,获取验证信息并进行验证。The parsing module 220 is coupled to the receiving module 210 and configured to parse the background anti-theft opening command, obtain verification information, and perform verification.
防盗开启模块230,与解析模块220相耦合,配置为若验证通过,则根据后台开启防盗指令在后台开启防盗功能。The anti-theft opening module 230 is coupled to the parsing module 220 and configured to enable the anti-theft function in the background according to the anti-theft command in the background.
本发明实施例中,如图2所示的接收模块210接收来自服务器的后台防盗开启指令。其中,服务器的后台防盗开启指令中携带有本移动终端的验证信息。In the embodiment of the present invention, the receiving module 210 shown in FIG. 2 receives a background anti-theft opening command from the server. The backend anti-theft command of the server carries the verification information of the mobile terminal.
本发明实施例中,本移动终端(例如手机或者平板电脑)的验证信息可以包括本移动终端的唯一身份标识以及至少一个SIM卡号,可以包括本移动终端的唯一身份标识以及用户的账户信息,还可以同时包括本移动终端的唯一身份标识、至少一个SIM卡号以及用户的账户信息三者。其中,本发明实施例优选IMEI,IMEI本身与本移动终端是终身绑定且唯一不变,并且可识别性高,因此,本发明实施例中,优选IMEI为本移动终端的唯一身份标识。In the embodiment of the present invention, the verification information of the mobile terminal (such as a mobile phone or a tablet computer) may include the unique identity of the mobile terminal and the at least one SIM card number, and may include the unique identity of the mobile terminal and the account information of the user. The mobile phone's unique identity, at least one SIM card number, and the user's account information may be included at the same time. The embodiment of the present invention is preferably an IMEI. The IMEI itself is permanently bound to the mobile terminal and is unique and has high recognizability. Therefore, in the embodiment of the present invention, the IMEI is preferably a unique identifier of the mobile terminal.
现以不同的验证信息为例,对本发明实施例提供的移动防盗客户端进行详细说明。本实施例中优选三组验证信息,分别是包括本移动终端的IMEI以及至少一个SIM卡号的第一组验证信息,包括本移动终端的IMEI以及用户的账户信息的第二组验证信息,以及同时包括本移动终端的IMEI、至少一个SIM卡号和用户的账户信息三者的第三组验证信息。The mobile anti-theft client provided by the embodiment of the present invention will be described in detail by taking different authentication information as an example. In this embodiment, three sets of verification information are selected, which are respectively a first group of verification information including an IMEI of the mobile terminal and at least one SIM card number, including an IMEI of the mobile terminal and a second group of verification information of the account information of the user, and simultaneously The third group of verification information includes the IMEI of the mobile terminal, the at least one SIM card number, and the account information of the user.
首先以第一组验证信息为例进行说明。本实施例中,本移动终端的验证信息包括本移动终端的IMEI以及至少一个SIM卡号。当接收模块210接收到携带有该验证信息的防盗开启指令之后,触发解析模块220。解析模块220受到触发之后,解析上述防盗开启指令,并获取到后台防盗开启指令携带的验证信息。解析模块220获取到验证信息之后,继续对该验证信息中的IMEI以及至少一个SIM卡号分别进行验证。首先,解析模块220对验证信息中的IMEI进行验证。若验证信息中的IMEI与本移动终端的IMEI匹配,则验证信息中的IMEI通过验证。其次,解析模块220对验证信息中的SIM卡号进行验证。若验证信息中存在至少一个SIM卡号与本移动终端的联系人列表中的SIM卡号匹配,则验证信息中的SIM卡号通过验证。另外,本发明实施例中的解析模块220也可以首先验证至少存在一个SIM卡号与本移动终端的联系人列表中的SIM卡号匹配,其次,对验证信息中的IMEI进行验证。本发明实施例中对验证信息中包含的IMEI以及至少一个SIM卡号的验证顺序并不加以限定。First, the first group of verification information is taken as an example for explanation. In this embodiment, the verification information of the mobile terminal includes an IMEI of the mobile terminal and at least one SIM card number. After the receiving module 210 receives the anti-theft opening command carrying the verification information, the parsing module 220 is triggered. After the parsing module 220 is triggered, the anti-theft open command is parsed, and the verification information carried by the background anti-theft open command is obtained. After obtaining the verification information, the parsing module 220 continues to verify the IMEI and the at least one SIM card number in the verification information respectively. First, the parsing module 220 verifies the IMEI in the verification information. If the IMEI in the verification information matches the IMEI of the mobile terminal, the IMEI in the verification information passes the verification. Next, the parsing module 220 verifies the SIM card number in the verification information. If at least one SIM card number in the verification information matches the SIM card number in the contact list of the mobile terminal, the SIM card number in the verification information passes the verification. In addition, the parsing module 220 in the embodiment of the present invention may also first verify that at least one SIM card number matches the SIM card number in the contact list of the mobile terminal, and secondly, verify the IMEI in the verification information. In the embodiment of the present invention, the verification order of the IMEI and the at least one SIM card number included in the verification information is not limited.
本发明实施例中的验证信息包含的SIM卡号的个数可以是除0之外的任意整数值个,本发明实施例对此并不加以限定。例如,验证信息中包含4个SIM卡号,仅其中一个SIM卡号与本移动终端的联系人列表中的SIM卡号匹配,另外三个SIM卡号与本移动终端的联系人列表中的SIM卡号均不匹配,则该验证信息中的SIM卡号通过验证。再例如,验证信息中仅包含一个SIM卡号,且该SIM卡号与本移动终端的联系人列表中的SIM卡号能够匹配,则该验证信息中的SIM卡号通过验证。在实际运用中,用户移动终端的联系人列表会因为职位变更、工作地点变更等因素发生不定期更改。因此,本发明 实施例中,验证信息中包含的SIM卡号有一个与本移动终端的联系人列表中的SIM卡号匹配,则验证信息中的SIM卡号通过验证。The number of the SIM card numbers included in the verification information in the embodiment of the present invention may be any integer value other than 0, which is not limited by the embodiment of the present invention. For example, the verification information includes four SIM card numbers, and only one of the SIM card numbers matches the SIM card number in the contact list of the mobile terminal, and the other three SIM card numbers do not match the SIM card number in the contact list of the mobile terminal. , the SIM card number in the verification information is verified. For example, if the verification information includes only one SIM card number, and the SIM card number matches the SIM card number in the contact list of the mobile terminal, the SIM card number in the verification information passes the verification. In actual use, the contact list of the user's mobile terminal may change from time to time due to factors such as job change, work place change, and the like. Therefore, the present invention In an embodiment, if the SIM card number included in the verification information matches a SIM card number in the contact list of the mobile terminal, the SIM card number in the verification information passes the verification.
本发明实施例中,若验证信息中的IMEI通过验证,而没有SIM卡号与本移动终端的联系人列表中的SIM卡号匹配,则验证信息不能通过验证。同理,当验证信息中存在至少一个SIM卡号与本移动终端的联系人列表中的SIM卡号匹配,但该验证信息中的IMEI与本移动终端的IMEI不匹配,则验证信息不能通过。本发明实施例中,当验证信息中包含的两种信息均通过验证,则验证信息通过验证,保证用户的移动终端不会因为图谋不轨者的恶意操作或者用户的失误操作开启防盗指令,避免不必要的情况下开启防盗功能给用户带来的麻烦。In the embodiment of the present invention, if the IMEI in the verification information passes the verification, and the SIM card number does not match the SIM card number in the contact list of the mobile terminal, the verification information cannot pass the verification. Similarly, when at least one SIM card number in the verification information matches the SIM card number in the contact list of the mobile terminal, but the IMEI in the verification information does not match the IMEI of the mobile terminal, the verification information cannot pass. In the embodiment of the present invention, when both types of information included in the verification information are verified, the verification information is verified to ensure that the user's mobile terminal does not open the anti-theft command due to the malicious operation of the unscrupulous person or the user's mistake operation, thereby avoiding unnecessary In the case of opening the anti-theft function to the user.
如上文所述,解析模块220对验证信息进行验证之后,若根据解析模块220,验证信息未通过验证,则触发拒绝模块240。拒绝模块240受到触发之后,拒绝执行后台开启防盗指令。若根据解析模块220,验证信息通过验证,则如图2所示的防盗开启模块230根据后台开启防盗指令在后台开启防盗功能。防盗功能开启之后,与防盗开启模块230耦合的信任标识模块250标识通过验证的至少一个SIM卡号为可信任SIM卡号。当接收到标识为可信任号码的SIM卡号发送的防盗指令,防盗处理模块260根据该防盗指令执行对应的防盗操作,避免本移动终端的丢失,或者在本移动终端丢失之后,提供找回本移动终端的线索。As described above, after the verification module 220 verifies the verification information, if the verification information fails the verification according to the parsing module 220, the rejection module 240 is triggered. After the rejection module 240 is triggered, the background anti-theft instruction is refused to be executed. If the verification information passes the verification according to the parsing module 220, the anti-theft opening module 230 shown in FIG. 2 turns on the anti-theft function in the background according to the anti-theft command in the background. After the anti-theft function is turned on, the trust identification module 250 coupled with the anti-theft opening module 230 identifies that at least one SIM card number that has passed the verification is a trusted SIM card number. When receiving the anti-theft instruction sent by the SIM card number identified as the trusted number, the anti-theft processing module 260 performs a corresponding anti-theft operation according to the anti-theft instruction, avoids the loss of the mobile terminal, or provides the retrieval of the mobile after the mobile terminal is lost. The clue of the terminal.
其次以第二组验证信息为例进行说明。本实施例中,本移动终端的验证信息包括IMEI以及用户的账户信息。当客户端中的接收模块210接收到携带有该验证信息的防盗开启指令之后,触发解析模块220。解析模块220解析接收到的后台防盗开启指令,并获取到后台防盗开启指令携带的验证信息。获取到验证信息之后,解析模块220对验证信息中的IMEI以及用户的账户信息进行验证。Secondly, the second group of verification information is taken as an example for description. In this embodiment, the verification information of the mobile terminal includes the IMEI and the account information of the user. After the receiving module 210 in the client receives the anti-theft opening command carrying the verification information, the parsing module 220 is triggered. The parsing module 220 parses the received background anti-theft open command, and obtains the verification information carried by the background anti-theft open command. After obtaining the verification information, the parsing module 220 verifies the IMEI in the verification information and the account information of the user.
首先,解析模块220对验证信息中的IMEI进行验证。若验证信息中的IMEI与本移动终端的IMEI匹配,则验证信息中的IMEI通过验证。其次,当验证信息中的IMEI通过验证之后,本发明实施例登录用户的账户信息获取该账户的ID。First, the parsing module 220 verifies the IMEI in the verification information. If the IMEI in the verification information matches the IMEI of the mobile terminal, the IMEI in the verification information passes the verification. Secondly, after the IMEI in the verification information passes the verification, the account information of the login user of the embodiment of the present invention acquires the ID of the account.
本发明实施例中的用户账户信息可以是用户名和密码,可以是用户名和系统随机选取的验证码,还可以是用户邮箱账号等等,本发明实施例对此并不加以限定。优选地,本发明实施例中,选择用户名和密码作为用户账户信息。在实际运用中,使用用户名和密码作为账户信息进行登录能够合理有效保证用户账户的安全。若使用用户名和随机选取的验证码作为账户,虽然仅需要记住用户名,无需密码,比较方便,但缺乏安全性。另外,使用邮箱账号作为账户信息同样比较方便,但由于邮箱账户登录地点容易发生改变,导致邮箱账号容易泄露,也存在安全隐患。因此,当验证信息中的IMEI通过验证之后,本发明实施例使用用户名和密码登录账户信息,获取该账户的ID。The user account information in the embodiment of the present invention may be a user name and a password, and may be a user name and a verification code randomly selected by the system, and may also be a user's email account, etc., which is not limited by the embodiment of the present invention. Preferably, in the embodiment of the present invention, the user name and password are selected as the user account information. In actual use, using the user name and password as the account information to log in can reasonably and effectively ensure the security of the user account. If the user name and the randomly selected verification code are used as the account, although it is only necessary to remember the user name and no password, it is convenient, but lacks security. In addition, it is more convenient to use the email account as the account information, but because the login location of the email account is easy to change, the email account is easily leaked, and there is also a security risk. Therefore, after the IMEI in the verification information passes the verification, the embodiment of the present invention uses the username and password to log in to the account information to obtain the ID of the account.
获取到账户ID之后,解析模块220通过将该账户ID发送至服务器对该账户ID进行验证。解析模块220接收到服务器经过验证得到的验证结果之后,确定用户的账户信息是否通过验证。若用户的账户信息通过验证,则解析模块220确定验证信息通过验证, 并触发防盗开启模块230。防盗开启模块230在后台开启防盗功能。若用户的账户信息没有通过验证,则解析模块220触发拒绝模块240。拒绝模块240拒绝在后台开启防盗功能。After obtaining the account ID, the parsing module 220 verifies the account ID by sending the account ID to the server. After receiving the verification result obtained by the server, the parsing module 220 determines whether the account information of the user passes the verification. If the account information of the user passes the verification, the parsing module 220 determines that the verification information passes the verification. The anti-theft opening module 230 is triggered. The anti-theft opening module 230 turns on the anti-theft function in the background. If the user's account information does not pass the verification, the parsing module 220 triggers the rejection module 240. The rejection module 240 refuses to enable the anti-theft function in the background.
本发明实施例中,解析模块220可以首先对验证信息中的IMEI进行验证。其次,对验证信息中的用户的账户信息进行验证。解析模块220还可以首先验证用户的账户信息,其次,对验证信息中的IMEI进行验证。对验证信息中的IMEI进行验证仅需要本发明实施例获取自身的IMEI,并对两个IMEI进行匹配。对验证信息中的用户账户信息进行验证,需要本发明实施例登录用户的账户信息,获取到账户ID之后,将该账户ID发送至服务器进行验证。相对于验证IMEI,对用户的账户信息进行验证的步骤更为繁琐、复杂。因此,本发明实施例中优选首先验证IMEI。当验证信息中的IMEI通过验证之后,再对验证信息中的用户的账户信息进行验证,保证更加高效率地对验证信息进行验证。In the embodiment of the present invention, the parsing module 220 may first verify the IMEI in the verification information. Secondly, the account information of the user in the verification information is verified. The parsing module 220 may also first verify the account information of the user, and secondly, verify the IMEI in the verification information. The verification of the IMEI in the verification information only requires the embodiment of the present invention to obtain its own IMEI and match the two IMEIs. To verify the user account information in the verification information, the account information of the user is required to be logged in the embodiment of the present invention. After the account ID is obtained, the account ID is sent to the server for verification. The step of verifying the user's account information is more cumbersome and complicated than verifying the IMEI. Therefore, it is preferred in the embodiment of the invention to first verify the IMEI. After the IMEI in the verification information passes the verification, the account information of the user in the verification information is verified to ensure that the verification information is verified more efficiently.
当防盗开启模块230开启防盗功能之后,若防盗处理模块260接收到上述通过验证的账户ID发送的防盗指令,则防盗处理模块260解析该防盗指令。解析之后,防盗处理模块260根据该防盗指令执行对应的防盗操作。例如,当用户的手机丢失之后,登录服务器发送防盗开启指令至丢失手机,则本发明实施例的客户端的接收模块210接收到后台防盗开启指令之后,对该防盗开启指令进行验证。若后台防盗开启指令通过验证,则防盗开启模块230开启后台防盗功能,并由防盗处理模块260根据接收到的防盗指令执行相应操作。如根据接收到的防盗指令进行自动锁屏或者反馈更换后的SIM卡号至服务器或者返回该手机的实时位置至服务器等操作,帮助机主寻回被盗手机。After the anti-theft opening module 230 turns on the anti-theft function, if the anti-theft processing module 260 receives the anti-theft command sent by the verified account ID, the anti-theft processing module 260 parses the anti-theft instruction. After parsing, the anti-theft processing module 260 performs a corresponding anti-theft operation according to the anti-theft instruction. For example, after the user's mobile phone is lost, the login server sends an anti-theft open command to the lost mobile phone, and the receiving module 210 of the client in the embodiment of the present invention verifies the anti-theft open command after receiving the background anti-theft open command. If the background anti-theft opening command passes the verification, the anti-theft opening module 230 turns on the background anti-theft function, and the anti-theft processing module 260 performs the corresponding operation according to the received anti-theft instruction. For example, according to the received anti-theft command, the automatic lock screen or the feedback of the replaced SIM card number to the server or return to the real-time location of the mobile phone to the server, etc., help the owner to retrieve the stolen mobile phone.
最后以第三组验证信息为例进行说明。本实施例中,本移动终端的验证信息同时包括IMEI、至少一个SIM卡号和用户的账户信息三者。当如图2所示的客户端的接收模块210接收到携带有该验证信息的防盗开启指令之后,触发解析模块220。解析模块220解析接收到的后台防盗开启指令,并获取到后台防盗开启指令携带的验证信息。获取到验证信息之后,解析模块220对验证信息中的IMEI、至少一个SIM卡号以及用户的账户信息分部进行验证。首先,解析模块220对验证信息中的IMEI进行验证。若验证信息中的IMEI与本移动终端的IMEI匹配,则验证信息中的IMEI通过验证。其次,验证模块220对验证信息中的SIM卡号进行验证。若验证信息中存在至少一个SIM卡号与本移动终端的联系人列表中的SIM卡号匹配,则验证信息中的SIM卡号通过验证。另外,解析模块220也可以首先验证至少存在一个SIM卡号与本移动终端的联系人列表中的SIM卡号匹配,其次,对验证信息中的IMEI进行验证,本发明实施例对此并不加以限定。Finally, the third group of verification information is taken as an example for description. In this embodiment, the verification information of the mobile terminal includes the IMEI, the at least one SIM card number, and the account information of the user. When the receiving module 210 of the client shown in FIG. 2 receives the anti-theft opening command carrying the verification information, the parsing module 220 is triggered. The parsing module 220 parses the received background anti-theft open command, and obtains the verification information carried by the background anti-theft open command. After obtaining the verification information, the parsing module 220 verifies the IMEI in the verification information, the at least one SIM card number, and the account information portion of the user. First, the parsing module 220 verifies the IMEI in the verification information. If the IMEI in the verification information matches the IMEI of the mobile terminal, the IMEI in the verification information passes the verification. Next, the verification module 220 verifies the SIM card number in the verification information. If at least one SIM card number in the verification information matches the SIM card number in the contact list of the mobile terminal, the SIM card number in the verification information passes the verification. In addition, the parsing module 220 may first verify that at least one SIM card number matches the SIM card number in the contact list of the mobile terminal, and secondly, verify the IMEI in the verification information, which is not limited by the embodiment of the present invention.
本发明实施例中的验证信息包含的SIM卡号的格式可以是除0之外的任意整数值个,本发明实施例对此并不加以限定。例如,验证信息中包含2个SIM卡号,其中一个SIM卡号与本移动终端的联系人列表中的SIM卡号匹配,另外一个SIM卡号与本移动终端的联系人列表中的SIM卡号均不匹配,则该验证信息中的SIM卡号通过验证。在实际运用中,用户移动终端的联系人列表会因为职位变更、公国地点变更等因素发生不定期更改。因此,本发明实施例中,验证信息中包含的SIM卡号有一个与本移动终端的联系人列表中的SIM卡号匹配,则验证信息中的SIM卡号通过验证。 The format of the SIM card number included in the verification information in the embodiment of the present invention may be any integer value other than 0, which is not limited by the embodiment of the present invention. For example, the verification information includes two SIM card numbers, one of which matches the SIM card number in the contact list of the mobile terminal, and the other SIM card number does not match the SIM card number in the contact list of the mobile terminal. The SIM card number in the verification information is verified. In actual use, the contact list of the user's mobile terminal may change from time to time due to factors such as the change of position, the change of the location of the Principality. Therefore, in the embodiment of the present invention, if the SIM card number included in the verification information matches a SIM card number in the contact list of the mobile terminal, the SIM card number in the verification information passes the verification.
当验证信息中的IMEI以及至少一个SIM卡号通过验证,信任标识模块250标识通过验证的SIM卡号为可信任卡号。另外,解析模块220继续对验证信息中的用户的账户信息进行验证。本发明实施例中的用户账户信息可以是用户名和密码,可以是用户名和系统随机选取的验证码,还可以是用户邮箱账号等等,本发明实施例对此并不加以限定。优选地,本发明实施例中,选择用户名和密码作为用户账户信息。在实际运用中,使用用户名和密码作为账户信息进行登录能够合理有效保证用户账户的安全。若使用用户名和随机选取的验证码作为账户,虽然仅需要记住用户名,无需密码,比较方便,但缺乏安全性。另外,使用邮箱账号作为账户信息同样比较方便,但由于邮箱账户登录地点容易发生改变,导致邮箱账号容易泄露,也存在安全隐患。因此,当验证信息中的IMEI以及至少一个SIM卡号通过验证之后,本发明实施例使用用户名和密码登陆账户信息,获取该账户的ID。When the IMEI in the verification information and the at least one SIM card number pass the verification, the trust identification module 250 identifies the verified SIM card number as the trusted card number. In addition, the parsing module 220 continues to verify the account information of the user in the verification information. The user account information in the embodiment of the present invention may be a user name and a password, and may be a user name and a verification code randomly selected by the system, and may also be a user's email account, etc., which is not limited by the embodiment of the present invention. Preferably, in the embodiment of the present invention, the user name and password are selected as the user account information. In actual use, using the user name and password as the account information to log in can reasonably and effectively ensure the security of the user account. If the user name and the randomly selected verification code are used as the account, although it is only necessary to remember the user name and no password, it is convenient, but lacks security. In addition, it is more convenient to use the email account as the account information, but because the login location of the email account is easy to change, the email account is easily leaked, and there is also a security risk. Therefore, after the IMEI in the verification information and the at least one SIM card number pass the verification, the embodiment of the present invention uses the username and password to log in to the account information to obtain the ID of the account.
获取到账户ID之后,解析模块220发送该账户ID至服务器,由服务器对该账户ID进行验证。解析模块220接收到服务器经过验证得到的验证结果之后,确定用户的账户信息是否通过验证。若用户的账户信息没有通过验证,则解析模块220确定验证信息未通过验证。若用户的账户信息通过验证,则解析模块220确定验证信息通过验证。After obtaining the account ID, the parsing module 220 sends the account ID to the server, and the server ID verifies the account ID. After receiving the verification result obtained by the server, the parsing module 220 determines whether the account information of the user passes the verification. If the user's account information does not pass the verification, the parsing module 220 determines that the verification information has not passed the verification. If the account information of the user passes the verification, the parsing module 220 determines that the verification information passes the verification.
本发明实施例中,当本移动终端的验证信息包含IMEI、至少一个SIM卡号和用户的账户信息时,当且仅当三者同时通过验证,验证信息通过验证。例如,当验证信息中的IMEI以及至少一个SIM卡号通过验证,但验证信息中的用户账户信息未通过验证,则验证信息未通过验证。另外,本发明实施例中,若首先对验证信息中的IMEI进行验证,并且该IMEI未通过验证,则无需继续对验证信息中的SIM卡号以及用户的账户信息进行验证,验证信息无法通过验证。本发明实施例中,当验证信息中包含的所有信息均通过验证,则验证信息通过验证,保证用户的移动终端不会因为图谋不轨者的恶意操作或者用户的失误操作开启防盗指令,避免不必要的情况下开启防盗功能给用户带来的麻烦。In the embodiment of the present invention, when the verification information of the mobile terminal includes the IMEI, the at least one SIM card number, and the account information of the user, if only three of them simultaneously pass the verification, the verification information passes the verification. For example, when the IMEI and the at least one SIM card number in the verification information pass the verification, but the user account information in the verification information fails the verification, the verification information fails the verification. In addition, in the embodiment of the present invention, if the IMEI in the verification information is first verified, and the IMEI fails to pass the verification, the SIM card number in the verification information and the account information of the user need not be verified, and the verification information cannot pass the verification. In the embodiment of the present invention, when all the information included in the verification information is verified, the verification information is verified, so that the user's mobile terminal does not open the anti-theft command due to the malicious operation of the unscrupulous person or the user's mistake operation, thereby avoiding unnecessary In the case of turning on the anti-theft function to bring trouble to the user.
当客户端中的解析模块220确定验证信息未通过验证之后,解析模块220触发拒绝模块240。当客户端中的解析模块220确定验证信息通过验证之后,解析模块220触发防盗开启模块230。防盗功能开启之后,当防盗处理模块260接收到上述通过验证的账户ID的防盗指令,本发明实施例解析该防盗指令,并执行该防盗指令对应的防盗操作。After the parsing module 220 in the client determines that the verification information has not passed the verification, the parsing module 220 triggers the denial module 240. After the parsing module 220 in the client determines that the verification information passes the verification, the parsing module 220 triggers the anti-theft opening module 230. After the anti-theft function is enabled, when the anti-theft processing module 260 receives the anti-theft instruction of the verified account ID, the embodiment of the present invention parses the anti-theft instruction and executes the anti-theft operation corresponding to the anti-theft instruction.
例如,当用户的手机丢失之后,登陆服务器发送后台防盗开启指令至丢失手机,本发明实施例的客户端中的接收到后台防盗开启指令之后,对其进行验证。若该后台防盗开启指令通过验证,则在手机后台开启防盗功能。手机后台开启防盗功能之后,能够通过绑定的亲友号码或者注册的用户账户信息中的ID发送防盗指令至丢失手机。手机接收到防盗指令之后,能够根据该防盗指令进行自动锁屏或者反馈更换后的SIM卡号至服务器或者返回该手机的实时位置至服务器等操作,帮助机主寻回被盗手机。For example, after the user's mobile phone is lost, the login server sends a background anti-theft open command to the lost mobile phone, and the client in the embodiment of the present invention verifies the background anti-theft open command after receiving the background anti-theft open command. If the background anti-theft opening command passes the verification, the anti-theft function is turned on in the background of the mobile phone. After the anti-theft function is enabled in the background of the mobile phone, the anti-theft command can be sent to the lost mobile phone through the bound friend number or the ID in the registered user account information. After receiving the anti-theft command, the mobile phone can automatically lock the screen or feedback the replaced SIM card number to the server or return the real-time location of the mobile phone to the server according to the anti-theft command, thereby helping the owner to retrieve the stolen mobile phone.
根据上述任意一个优选实施例或多个优选实施例的组合,本发明实施例能够叨叨如下有益效果:According to any one of the above preferred embodiments or combinations of the plurality of preferred embodiments, the embodiments of the present invention can achieve the following beneficial effects:
在本发明实施例中,当移动终端丢失时,能够通过服务器发送后台防盗开启指令至 移动终端。接收到后台防盗开启指令之后,对其进行解析以及验证,保证接收到的后台防盗指令是真实有效可信的指令,避免接收来自不可信或恶意的服务器发送的后台防盗指令,导致移动终端错误开启防盗功能。若恶意服务器使用防盗功能恶意锁定移动终端,导致移动终端全部或部分功能不可用,则会对使用者产生恶劣影响。当接收到的后台防盗开启指令通过验证之后,本发明实施例根据后台开启防盗指令在移动终端的后台开启防盗功能,解决现有技术中,移动终端丢失之后无法开启防盗功能的问题。采用远程开启防盗功能的方式能够使得丢失的移动终端在不被找回的情况下也能够开启防盗,提高了移动终端的安全性保障,其中的验证功能也避免移动终端被恶意开启防盗功能,进一步提高移动终端的安全性。因此,本发明实施例能够在移动终端丢失之后,开启移动终端的防盗功能,进而根据防盗指令执行相应的防盗操作,达到了更加合理有效保证移动终端安全、打击偷窃犯罪的有益效果。In the embodiment of the present invention, when the mobile terminal is lost, the background anti-theft open command can be sent to the server to Mobile terminal. After receiving the background anti-theft open command, it parses and verifies it to ensure that the received background anti-theft command is a real and valid and reliable command, avoiding receiving background anti-theft commands sent from untrusted or malicious servers, causing the mobile terminal to open incorrectly. Anti-theft function. If the malicious server maliciously locks the mobile terminal using the anti-theft function, causing all or part of the functions of the mobile terminal to be unavailable, the user may be adversely affected. After the received background anti-theft opening command is verified, the embodiment of the present invention turns on the anti-theft function in the background of the mobile terminal according to the background opening anti-theft command, which solves the problem that the anti-theft function cannot be opened after the mobile terminal is lost in the prior art. The method of remotely opening the anti-theft function enables the lost mobile terminal to open the anti-theft without being retrieved, thereby improving the security of the mobile terminal, and the verification function also prevents the mobile terminal from being maliciously turned on by the anti-theft function. Improve the security of mobile terminals. Therefore, the embodiment of the present invention can open the anti-theft function of the mobile terminal after the mobile terminal is lost, and then perform the corresponding anti-theft operation according to the anti-theft instruction, thereby achieving the beneficial effect of more reasonable and effective guarantee of the security of the mobile terminal and combating theft crime.
实施例二Embodiment 2
本发明实施例提供了另一种移动终端防盗方法。图3示出了根据本发明一个实施例的移动终端防盗方法的处理流程图。如3所示,该流程至少包括步骤S302至步骤S306。Another embodiment of the present invention provides a mobile terminal anti-theft method. FIG. 3 is a flow chart showing the processing of the mobile terminal anti-theft method according to an embodiment of the present invention. As shown in FIG. 3, the flow includes at least steps S302 to S306.
步骤S302、接收来自发送方的防盗指令,其中,防盗指令以短信为发送载体。Step S302: Receive an anti-theft command from a sender, where the anti-theft command uses a short message as a transmission carrier.
步骤S304、解析防盗指令,得到该指令对应的防盗命令。Step S304, parsing the anti-theft command, and obtaining an anti-theft command corresponding to the instruction.
步骤S306、执行防盗命令对应的操作,以实现移动终端防盗。Step S306, performing an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
在本发明实施例中,接收来自发送方的、以短信为发送载体的防盗指令,通过解析防盗指令获取防盗命令,并且根据防盗命令,能够执行对应的防盗操作。由此可见,本发明实施例中的防盗指令来自能够发送短信的设备或终端,目前能够发送短信的设备或终端很多(例如手机、电脑、平板等),从而能够方便快捷地实现移动终端的防盗,解决了现有技术中,移动终端被盗之后,无法继续对移动终端进行防盗的问题。并且,使用能够发送短信的其他设备或终端能够开启本移动终端的防盗功能,避免如现有技术所说,因本移动终端自身未开启防盗功能导致给偷盗者可乘之机。本发明实施例在移动终端被盗之后,仍旧能够接收到发送方的防盗指令,并根据解析防盗指令获得的防盗命令执行防盗操作。例如,用户移动终端丢失之后,通过发送防盗指令至被盗移动终端,本发明实施例能够对被盗移动终端进行锁屏操作,阻止偷盗者使用移动终端。偷盗者无法使用移动终端导致偷盗者无法通过刷机等操作翻新移动终端,进而偷盗者无法将被盗移动终端转卖获得利润。进一步,能够有效降低偷窃犯罪发生的概率。另外,根据接收到的防盗指令,本发明实施例还可以获取偷盗者的身份标识信息(如偷盗者的照片、指纹等)。根据本发明实施例获取到偷盗者的身份标识信息之后,能够根据上述身份标识信息对偷盗者进行抓捕。因此,本发明实施例能够达到终端被盗之后有效对终端进行防盗,并且降低偷盗犯罪率、保护用户财产安全的有益效果。In the embodiment of the present invention, the anti-theft command from the sender that uses the short message as the transmission carrier is received, the anti-theft command is obtained by parsing the anti-theft command, and the corresponding anti-theft operation can be performed according to the anti-theft command. Therefore, the anti-theft command in the embodiment of the present invention is from a device or a terminal capable of sending a short message, and a device or a terminal capable of sending a short message (such as a mobile phone, a computer, a tablet, etc.) can be realized, so that the anti-theft of the mobile terminal can be realized conveniently and quickly. The problem that the mobile terminal cannot be burglarized after the mobile terminal is stolen is solved in the prior art. Moreover, the use of other devices or terminals capable of sending short messages can enable the anti-theft function of the mobile terminal to avoid theft of the anti-theft function by the mobile terminal itself, as the prior art says. After the mobile terminal is stolen, the embodiment of the present invention can still receive the anti-theft instruction of the sender, and perform the anti-theft operation according to the anti-theft command obtained by analyzing the anti-theft instruction. For example, after the user mobile terminal is lost, by sending an anti-theft command to the stolen mobile terminal, the embodiment of the present invention can perform a lock screen operation on the stolen mobile terminal to prevent the thief from using the mobile terminal. The inability of the thief to use the mobile terminal causes the thief to fail to renovate the mobile terminal by brushing the machine, and the thief cannot resell the stolen mobile terminal for profit. Further, the probability of theft crime can be effectively reduced. In addition, according to the received anti-theft command, the embodiment of the present invention can also obtain the identity information of the thief (such as a photo of the thief, a fingerprint, etc.). After the identity information of the thief is obtained according to the embodiment of the present invention, the thief can be arrested according to the identity identification information. Therefore, the embodiment of the present invention can effectively prevent theft of the terminal after the terminal is stolen, and reduce the crime rate of theft and protect the security of the user property.
如图3中的步骤S302所示,本发明实施例接收到的防盗指令以短信为发送载体。在接收以短信为载体的防盗指令之前,本发明实施例注册短信拦截功能。图4示出了根据 本发明一个实施例的注册短信拦截功能的处理流程图。如图4中的步骤S402所示,本发明实施例首先注册短信拦截功能。注册完成之后,本发明实施例执行步骤S404,生成防盗指令与防盗命令对应的映射表。若以短信为防盗指令的发送载体,也可以称该映射表为“短信-命令表”,实施时可以根据该表查找并确定接收短信对应的防盗命令。该映射表中,防盗指令以及防盗命令形成对应关系。例如“Dingwei#”、“Suoding#”等。在映射表中,防盗指令中的“Dingwei#”在映射表中可以查找到对应防盗命令中的定位(Locate)命令,同理,防盗指令中的“Suoding#”在映射表中可以查找到对应防盗命令中的锁定屏幕(Lock)命令。另外,为区分防盗指令与普通短信,防盗指令中存储有识别防盗指令的识别字符,帮助识别短信中存在防盗指令。例如“Dingwei#”、“Suoding#”中的“#”或者“*Dingwei*”中防盗指令前后的“*”。当短信中出现如上述优选实施例中提及的“#”或者“*”或者其他移动终端能够输入的识别字符时,本发明实施例能够识别并拦截到短信中的防盗指令,进而能够继续执行防盗操作。本例中的识别字符可以是一个或多个字符的组合。由于识别字符的区别特性,通常选取不常用的特殊字符作为识别字符,例如上文提及的“#”、“*”,再例如指定不常用的罗马字母、希腊字母等字符作为识别字符均可。多个字符的组合使用可以加强识别字符的验证功能,例如,可以设置如下防盗格式:每隔N个字符检测到一个特殊字符,则证明该条短信为防盗短信,并非是普通短信。此时,若根据短信内容的长度,特殊字符的个数相应变化,可以是1、2、3……。As shown in step S302 in FIG. 3, the anti-theft command received by the embodiment of the present invention uses a short message as a transmission carrier. Before receiving the anti-theft command with the short message as the carrier, the embodiment of the invention registers the short message interception function. Figure 4 shows the basis A flowchart of processing a registered short message interception function according to an embodiment of the present invention. As shown in step S402 in FIG. 4, the embodiment of the present invention first registers a short message interception function. After the registration is completed, the embodiment of the present invention performs step S404 to generate a mapping table corresponding to the anti-theft command and the anti-theft command. If the short message is the sending carrier of the anti-theft command, the mapping table may also be referred to as a “sms-command table”, and the anti-theft command corresponding to the received short message may be found and determined according to the table. In the mapping table, the anti-theft command and the anti-theft command form a correspondence relationship. For example, "Dingwei#", "Suoding#", etc. In the mapping table, "Dingwei#" in the anti-theft command can find the Locate command in the corresponding anti-theft command in the mapping table. Similarly, "Suoding#" in the anti-theft command can find the corresponding in the mapping table. The lock screen (Lock) command in the anti-theft command. In addition, in order to distinguish the anti-theft command from the ordinary short message, the anti-theft command stores an identification character identifying the anti-theft command to help identify the anti-theft command in the short message. For example, "#" in "Dingwei#", "Suoding#", or "*" before and after the anti-theft command in "*Dingwei*". When the "#" or "*" mentioned in the above preferred embodiment or other recognized characters that can be input by the mobile terminal appear in the short message, the embodiment of the present invention can identify and intercept the anti-theft instruction in the short message, thereby being able to continue execution. Anti-theft operation. The recognized character in this example can be a combination of one or more characters. Due to the distinguishing characteristics of the recognized characters, special characters that are not commonly used are usually selected as the recognized characters, such as "#" and "*" mentioned above, and for example, characters such as Roman letters and Greek letters that are not commonly used can be designated as the recognized characters. . The combination of multiple characters can enhance the verification function of identifying characters. For example, the following anti-theft format can be set: if a special character is detected every N characters, it proves that the short message is an anti-theft SMS, not a normal short message. At this time, according to the length of the short message content, the number of special characters changes accordingly, which may be 1, 2, 3, ....
短信拦截功能注册结束之后,本发明实施例按照如图4所示的本发明一个实施例的短信接收处理方法的处理流程图执行操作。如图5所示,当本发明实施例接收到短信(即步骤S502)之后,本发明实施例执行步骤S504,判断接收到的短信是否携带有防盗指令。根据在图4中的步骤S404中生成的映射表,本发明实施例查询接收到的短信中是否携带有该映射表中包含的特殊字符。若含有特殊字符,则判断出接收的短信中携带有防盗指令,本发明实施例继续执行步骤S506。若未含有上述特殊字符,则判断出接收的短信中未携带有防盗指令,本发明实施例继续执行步骤S508。After the SMS interception function is registered, the embodiment of the present invention performs the operation according to the processing flowchart of the short message receiving processing method according to an embodiment of the present invention as shown in FIG. 4 . As shown in FIG. 5, after the embodiment of the present invention receives the short message (ie, step S502), the embodiment of the present invention performs step S504 to determine whether the received short message carries the anti-theft instruction. According to the mapping table generated in step S404 in FIG. 4, the embodiment of the present invention queries whether the received short message carries the special character included in the mapping table. If the special character is included, it is determined that the received short message carries the anti-theft command, and the embodiment of the present invention continues to perform step S506. If the special character is not included, it is determined that the received short message does not carry the anti-theft command, and the embodiment of the present invention continues to step S508.
如图5中的步骤S506所示,本发明实施例判断短信中携带有防盗指令之后,拦截该短信(通常也称吃掉短信)。本发明实施例中,拦截短信可以避免该短信在移动终端的系统中出现,引起偷盗者的疑心,导致偷盗者提高警惕。若移动终端的系统中显示携带有防盗指令的短信,偷盗者据此判断移动终端开启防盗功能,则偷盗者可能对移动终端执行刷机或者拔出电池等操作,降低被盗移动终端被找回的机率,并增大相关部门找回被盗终端、抓获偷盗者的难度。步骤S506执行完毕,本发明实施例继续执行步骤S510,获取短信中的防盗指令信息,并触发对发送方的身份信息进行确定的操作,流程结束。若根据判断,接收到的短信中未携带有防盗指令,则本发明实施例执行步骤S508,放行短信,流程结束。As shown in step S506 in FIG. 5, the embodiment of the present invention determines that the short message is carried in the short message, and then intercepts the short message (also commonly referred to as eating the short message). In the embodiment of the present invention, intercepting the short message can prevent the short message from appearing in the system of the mobile terminal, causing the suspicion of the thief, and causing the thief to be vigilant. If the mobile terminal's system displays the short message carrying the anti-theft command, the thief judges that the mobile terminal turns on the anti-theft function, and the thief may perform operations such as flashing or unplugging the battery to the mobile terminal, thereby reducing the stolen mobile terminal being retrieved. Probability, and increase the difficulty of the relevant departments to retrieve stolen terminals and capture theft. After the step S506 is performed, the embodiment of the present invention continues to perform step S510, acquiring the anti-theft instruction information in the short message, and triggering the operation of determining the identity information of the sender, and the process ends. If it is determined that the received short message does not carry the anti-theft command, the embodiment of the present invention performs step S508 to release the short message, and the process ends.
本发明实施例中,当判断接收到的短信中未携带有防盗指令时,放行短信,能够降低偷盗者的警惕性,有利于找回被盗终端,抓获偷盗者。例如,当用户的移动终端丢失 之后,若偷盗者在被盗移动终端中看到移动终端能够接收到短信,认为移动终端并未被锁定,并未开启防盗功能。另外,本发明实施例将携带有防盗指令的短信拦截,使其无法显示在移动终端的系统中,而是在后台根据短信中携带的防盗指令进行防盗操作。偷盗者无法发现移动终端已开启防盗功能,并执行相应防盗操作,如上报移动终端的实时位置甚至上报偷盗者的指纹等操作。因此,本发明实施例能够降低偷盗者的警惕性,增大被盗移动终端找回的可能性,进而有效遏制偷盗犯罪的发生,保护用户的财产安全。In the embodiment of the present invention, when it is determined that the received short message does not carry the anti-theft command, releasing the short message can reduce the vigilance of the thief, and is beneficial for recovering the stolen terminal and capturing the thief. For example, when the user's mobile terminal is lost After that, if the thief sees that the mobile terminal can receive the short message in the stolen mobile terminal, it is considered that the mobile terminal is not locked, and the anti-theft function is not turned on. In addition, the embodiment of the present invention intercepts the short message carrying the anti-theft command so that it cannot be displayed in the system of the mobile terminal, but performs the anti-theft operation according to the anti-theft instruction carried in the short message in the background. The thief cannot find that the mobile terminal has turned on the anti-theft function, and performs the corresponding anti-theft operation, such as reporting the real-time location of the mobile terminal and even reporting the fingerprint of the thief. Therefore, the embodiment of the invention can reduce the vigilance of the thief and increase the possibility of the stolen mobile terminal retrieving, thereby effectively curbing the occurrence of theft crime and protecting the user's property security.
上文提及,当接收到的短信中携带有防盗指令时,本发明实施例获取短信中的防盗指令信息,并触发确定或验证发送方身份信息操作。如图3中的步骤S304所示,本发明实施例解析防盗指令,得到该指令对应的防盗命令。As mentioned above, when the received short message carries the anti-theft instruction, the embodiment of the present invention acquires the anti-theft instruction information in the short message and triggers the operation of determining or verifying the sender identity information. As shown in step S304 in FIG. 3, the embodiment of the present invention parses the anti-theft command, and obtains the anti-theft command corresponding to the instruction.
本发明实施例对防盗指令进行解析,得到发送该防盗指令的发送方的验证码。得到验证码之后,本发明实施例继续对得到的验证码与移动终端预存的验证码进行匹配,并根据匹配结果确定是否获取防盗指令对应的防盗命令。若得到的验证码与移动终端预存的可信任的移动终端标识和/或密码匹配,则获取防盗命令。若得到的验证码与移动终端预存的可信任的移动终端标识和/或密码不匹配,为避免接收到恶意发送端发送的防盗指令导致对移动终端执行错误的防盗操作,本发明实施例忽略该防盗命令。In the embodiment of the present invention, the anti-theft instruction is parsed, and the verification code of the sender that sends the anti-theft instruction is obtained. After the verification code is obtained, the embodiment of the present invention continues to match the obtained verification code with the verification code pre-stored by the mobile terminal, and determines whether to acquire the anti-theft command corresponding to the anti-theft instruction according to the matching result. If the obtained verification code matches the trusted mobile terminal identifier and/or password pre-stored by the mobile terminal, the anti-theft command is obtained. If the obtained verification code does not match the trusted mobile terminal identifier and/or password pre-stored by the mobile terminal, in order to avoid receiving the anti-theft command sent by the malicious sender, the erroneous anti-theft operation is performed on the mobile terminal, and the embodiment of the present invention ignores the Anti-theft command.
本发明实施例中,验证码可以是发送方的移动终端标识和/或证明发送方可信任的密码。其中,发送方的移动终端标识包括发送方的电话号码、发送方的SIM卡号以及发送方的IMEI至少任意之一。证明发送方可信任的密码可以是发送方的移动终端标识、预先设置的证明发送方可信任的字符串至少任意之一。例如,可以将数字与字母的任意组合设置为证明发送方可信任的字符串。如,ac1088206、A34TFAK6808等。还可以将用户的姓名或者用户的生日、宠物的生日设置为证明发送方可信任的密码等等。In the embodiment of the present invention, the verification code may be the sender's mobile terminal identifier and/or the password that the sender can trust. The sender's mobile terminal identifier includes at least one of a sender's phone number, a sender's SIM card number, and a sender's IMEI. The password that proves that the sender can trust may be at least one of the sender's mobile terminal identifier and a pre-set string that the sender can trust. For example, any combination of numbers and letters can be set to a string that proves that the sender can trust. For example, ac1088206, A34TFAK6808, etc. It is also possible to set the name of the user or the birthday of the user, the birthday of the pet as a password to prove that the sender can trust, and the like.
图6示出了根据本发明一个优选实施例的预先存储可信任的移动终端标识和/或密码的方法的处理流程图。需要说明的是,本优选实施例中,为方便称呼,将可信任的移动终端标识和/或密码统称为密码,将可信任的移动终端标识称为亲友号码。参见图6,该流程至少包括步骤S602至步骤S612。6 shows a process flow diagram of a method of pre-storing a trusted mobile terminal identity and/or password in accordance with a preferred embodiment of the present invention. It should be noted that, in the preferred embodiment, the trusted mobile terminal identifier and/or password are collectively referred to as a password, and the trusted mobile terminal identifier is referred to as a relative friend number. Referring to FIG. 6, the flow includes at least steps S602 to S612.
步骤S602、是否设置亲友号码。Step S602, whether to set a relative friend number.
本优选实施例中,首先询问用户是否在本移动终端上设置亲友号码,若是,则执行步骤S604,若否,则执行步骤S608。In the preferred embodiment, the user is first asked whether the friend number is set on the mobile terminal. If yes, step S604 is performed, and if no, step S608 is performed.
步骤S604、设置亲友号码。Step S604, setting a relative friend number.
若用户选择设置亲友号码,则本发明实施例根据在移动终端本地的通讯录或者常用联系人列表或者白名单中选择若干常用联系电话号码,将其设为亲友号码。If the user chooses to set the number of friends and relatives, the embodiment of the present invention selects several common contact telephone numbers according to the address book or the common contact list or white list local to the mobile terminal, and sets the number as a relative friend number.
步骤S606、对亲友号码设置完毕之后,设置密码为亲友号码。当移动终端接收到携带有防盗指令的短信之后,解析防盗指令获得验证码。若该验证码与预先设置的作为密码的亲友号码匹配,则获取防盗指令对应的防盗命令。Step S606: After setting the family and friends number, set the password as the relative friend number. After the mobile terminal receives the short message carrying the anti-theft command, the anti-theft command is parsed to obtain the verification code. If the verification code matches the pre-set number of friends and relatives as the password, the anti-theft command corresponding to the anti-theft command is obtained.
步骤S608、是否设置密码。Step S608, whether a password is set.
若根据用户选择,对亲友号码未进行设置,则继续询问是否设置密码。若不进行设 置,则流程结束。若设置,则执行步骤S612。If the friend and friend numbers are not set according to the user's selection, continue to ask whether to set the password. If not set Set, the process ends. If so, step S612 is performed.
步骤S610、根据用户输入的字符串设置密码Step S610, setting a password according to a string input by the user.
步骤S612、确认开启密码。In step S612, the password is confirmed to be turned on.
当设置密码为亲友号码成功之后,确认开启使用密码功能,流程结束。After setting the password to the number of friends and relatives, confirm that the password function is enabled and the process ends.
如上文所述的存储可信任的移动终端标识和/或密码的方法,本发明实施例还可以通过设置可信任的移动终端标识和/或密码为空将已存储的可信任的移动终端标识和/或密码删除。例如,本发明实施例能够按照如图6所示的流程,将亲友号码、短信防盗密码设置为空,并在点击“开启密码”栏以关闭密码功能。删除可信任的移动终端标识和/或密码之后,本发明实施例还可以选择注销防盗功能。The method for storing the trusted mobile terminal identifier and/or password is as described above. In this embodiment of the present invention, the trusted mobile terminal identifier and the stored trusted mobile terminal may be set by setting the trusted mobile terminal identifier and/or the password to be empty. / or password is deleted. For example, the embodiment of the present invention can set the family friend number and the SMS anti-theft password to be empty according to the flow shown in FIG. 6, and click the “open password” column to turn off the password function. After the trusted mobile terminal identifier and/or password is deleted, the embodiment of the present invention may also select the logout anti-theft function.
如上文所述,本发明实施例对防盗指令进行解析时获取验证码,确定防盗指令是否加密。若防盗指令为加密防盗指令,则本发明实施例采用相应的解密手段对防盗指令进行解密,并采用相应的解密手段对验证码进行解密,获取解密后的验证码并进行匹配。本发明实施例中,防盗指令可以是通过任意加密算法被加密,本发明实施例在对防盗指令进行解析时采用相应的解密手段对防盗命令以及验证码进行解密,本发明实施例对此并不加以限定。优选地,本发明实施例中采用目前使用最广泛的数据加密标准(Data Encryption Standard,以下简称DES)对防盗指令进行加密以及解密。另外,本发明实施例能够对接收到的防盗指令中除验证码以及防盗命令之外的其他信息或者内容也进行加密处理。本发明实施例对防盗指令中的所有信息或者内容进行加密处理,能够增强对防盗指令中重要信息或者内容(如防盗指令中的验证码或者防盗命令)的保护,提高接收到的防盗指令的安全性。As described above, the embodiment of the present invention obtains a verification code when parsing the anti-theft instruction, and determines whether the anti-theft instruction is encrypted. If the anti-theft command is an encrypted anti-theft command, the embodiment of the present invention decrypts the anti-theft instruction by using a corresponding decryption means, and decrypts the verification code by using a corresponding decryption means, and obtains the decrypted verification code and performs matching. In the embodiment of the present invention, the anti-theft command may be encrypted by using an encryption algorithm. In the embodiment of the present invention, the anti-theft command and the verification code are decrypted by using a corresponding decryption method when parsing the anti-theft command. Limited. Preferably, in the embodiment of the present invention, the most widely used Data Encryption Standard (DES) is used to encrypt and decrypt the anti-theft command. In addition, the embodiment of the present invention can perform encryption processing on other information or contents other than the verification code and the anti-theft command in the received anti-theft instruction. The embodiment of the invention encrypts all the information or content in the anti-theft command, and can enhance the protection of the important information or content in the anti-theft command (such as the verification code or the anti-theft command in the anti-theft command), and improve the security of the received anti-theft command. Sex.
当本发明实施例根据预先存储的验证码对防盗指令中携带的验证码进行匹配之后,若发送方的验证码与移动终端的验证码能够匹配,则解析防盗指令以得到对应的防盗命令。获取到防盗命令之后,执行如图3所示的步骤S306,执行防盗命令对应的操作,以实现移动终端防盗。After the verification code carried in the anti-theft command is matched according to the pre-stored verification code, if the verification code of the sender and the verification code of the mobile terminal can match, the anti-theft command is parsed to obtain the corresponding anti-theft command. After the anti-theft command is obtained, the step S306 shown in FIG. 3 is executed, and the operation corresponding to the anti-theft command is executed to implement the anti-theft of the mobile terminal.
在任一防盗命令被执行的过程中,本发明实施例轮询查询该命令是否执行成功。如图7示出了根据本发明一个实施例的对命令执行情况进行轮询查询的处理流程图。执行图7中的步骤S702,判断即将执行的防盗命令是否执行成功。若根据判断结果,该防盗命令未能执行,则执行步骤S704,再次尝试执行该防盗命令,流程结束。若根据判断结果,该防盗命令执行成功,则流程结束。In the process in which any anti-theft command is executed, the embodiment of the present invention polls whether the command is successfully executed. FIG. 7 shows a process flow diagram for polling a command execution situation in accordance with one embodiment of the present invention. Step S702 in FIG. 7 is executed to determine whether the anti-theft command to be executed is successfully executed. If the anti-theft command fails to be executed according to the judgment result, step S704 is executed, and the anti-theft command is attempted again, and the flow ends. If the anti-theft command is successfully executed according to the judgment result, the flow ends.
本发明实施例中,对防盗命令的执行情况进行轮询查询保证移动终端获取到的防盗命令能够被及时执行,避免因防盗命令执行不及时导致偷盗者对移动终端进行刷机或者其他操作使得移动终端无法被找回。例如,本发明实施例即将执行锁定屏幕命令,对该锁定屏幕命令是否执行成功进行查询。若锁定屏幕命令未执行,则本发明实施例执行锁定屏幕命令,对移动终端的屏幕进行锁定。若锁定屏幕命令执行成功,则本发明实施例放弃再次执行该屏幕锁定命令。In the embodiment of the present invention, the polling query is performed on the execution of the anti-theft command to ensure that the anti-theft command acquired by the mobile terminal can be executed in time, so as to prevent the thief from brushing or other operations on the mobile terminal due to the untimely execution of the anti-theft command. Can't be retrieved. For example, the embodiment of the present invention will execute a lock screen command to query whether the lock screen command is successfully executed. If the lock screen command is not executed, the embodiment of the present invention executes a lock screen command to lock the screen of the mobile terminal. If the lock screen command is successfully executed, the embodiment of the present invention abandons the execution of the screen lock command again.
当接收到的防盗命令执行完毕之后,本发明实施例将执行结果作为回执返回防盗指 令的发送方,提醒发送方防盗指令已执行。发送方收到该回执之后,能够继续下一步防盗操作。另外,若防盗指令发送方在指定时间内未收到回执,则本发明实施例发起轮询查询,查询回执是否成功。如图8示出了根据本发明一个实施例的查询回执的方法的处理流程图。当发送方在执行时间内未收到回执,本发明实施例执行如图8所示的步骤S802,向服务器请求查询回执。继而,本发明实施例执行步骤S804,查询是否回执成功。若成功,则流程结束。若未成功,则本发明实施例返回执行步骤S802,直至查询回执成功。通过发送回执查询,本发明实施例保证防盗指令发送方能够及时获知防盗指令的执行情况,并能够及时获知防盗指令执行结束,并更加高效执行防盗操作。进一步,本发明实施例能够提高被盗移动终端找回的机率。After the received anti-theft command is executed, the embodiment of the present invention returns the execution result as a receipt to return the anti-theft finger The sender of the order reminds the sender that the anti-theft command has been executed. After receiving the receipt, the sender can continue the next anti-theft operation. In addition, if the anti-theft command sender does not receive the receipt within the specified time, the embodiment of the present invention initiates a polling query to check whether the receipt is successful. FIG. 8 shows a process flow diagram of a method of querying a receipt in accordance with one embodiment of the present invention. When the sender does not receive the receipt within the execution time, the embodiment of the present invention performs step S802 shown in FIG. 8 to request a query receipt from the server. Then, the embodiment of the present invention performs step S804 to query whether the receipt is successful. If successful, the process ends. If not successful, the embodiment of the present invention returns to step S802 until the query receipt is successful. By sending a receipt query, the embodiment of the invention ensures that the sender of the anti-theft command can know the execution status of the anti-theft command in time, and can know the execution of the anti-theft command in time, and perform the anti-theft operation more efficiently. Further, the embodiment of the present invention can improve the probability of the stolen mobile terminal retrieving.
现以具体实施例对本发明的移动终端防盗方法进行说明。The mobile terminal anti-theft method of the present invention will now be described with reference to specific embodiments.
图9至图11示出了根据本发明一个优选实施例的移动终端防盗方法的处理流程图,用于支持上述任意一个移动终端防盗方法,将上述移动终端防盗方法阐述得更加清晰易懂。需要说明的是,为将本优选实施例阐述得更加明白简单,本优选实施例中,将发送方设置于亲友手机,将移动终端设置于被盗手机。9 to 11 are flowcharts showing the processing of the anti-theft method of the mobile terminal according to a preferred embodiment of the present invention. The method for supporting the anti-theft method of any of the mobile terminals is described above, and the anti-theft method of the mobile terminal is described more clearly and easily. It should be noted that, in order to make the preferred embodiment more clear and simple, in the preferred embodiment, the sender is set to the mobile phone of the relatives and friends, and the mobile terminal is set to the stolen mobile phone.
图9示出了根据本发明一个优选实施例的移动终端防盗方法的处理流程图。如图9所示,手机被盗之后,本优选实施例执行步骤S902,通过亲友手机发送防盗短信至被盗手机。其中,该亲友手机的号码预先存储于被盗手机中。被盗手机接收到防盗短信之后,本优选实施例执行步骤S904,处理防盗短信。处理完毕之后,执行步骤S906,返回被盗处理结果至亲友手机,完成被盗手机的防盗处理流程。FIG. 9 is a flow chart showing the processing of the mobile terminal anti-theft method according to a preferred embodiment of the present invention. As shown in FIG. 9, after the mobile phone is stolen, the preferred embodiment performs step S902 to send an anti-theft SMS to the stolen mobile phone through the mobile phone of the relatives and friends. The number of the friend's mobile phone is pre-stored in the stolen mobile phone. After the stolen mobile phone receives the anti-theft SMS, the preferred embodiment performs step S904 to process the anti-theft SMS. After the processing is completed, step S906 is executed to return the stolen processing result to the mobile phone of the relatives and friends, and the anti-theft processing flow of the stolen mobile phone is completed.
现分别从亲友手机侧以及被盗手机侧介绍本优选实施例的移动终端防盗方法的处理流程。The processing flow of the mobile terminal anti-theft method of the preferred embodiment is introduced from the mobile phone side of the relatives and friends and the stolen mobile phone side respectively.
请注意,在此以亲友手机代表防盗指令发送方,根据本发明公开的内容,本领域技术人员可以理解,防盗指令发送方不止可以使亲友手机,而可以是任何其他可以发送短信的通信设备,通过验证在防盗指令中包含的密码来验证该发送方的身份是否合法,本发明不限于此。Please note that the sender and the whistle-selling sender are represented by the family and friends mobile phone. According to the disclosure of the present invention, those skilled in the art can understand that the burglar-proof command sender can not only make the friends and relatives mobile phone, but can be any other communication device that can send short messages. The authenticity of the sender is verified by verifying the password contained in the anti-theft command, and the present invention is not limited thereto.
图10示出了根据本发明一个实施例的亲友手机侧的移动终端防盗方法的处理流程图。参见图10,该流程至少包括步骤S1002至步骤S1006。FIG. 10 is a flow chart showing the processing of the mobile terminal anti-theft method on the mobile phone side of the relatives and friends according to an embodiment of the present invention. Referring to FIG. 10, the flow includes at least steps S1002 to S1006.
当手机被盗之后,本实施例通过亲友手机编辑并发送防盗短信至被盗手机。在编辑防盗短信时,若防盗短信中的防盗命令为一些简单操作,如“锁定手机屏幕”,则本实施例可以通过编辑特殊的防盗短信直接进行发送。若防盗短信中的防盗命令为一些安全要求较高的防盗命令,如“删除手机数据”、“备份手机数据”等,则本实施例首先对即将发送的防盗短信进行加密。其次,将经过加密处理的防盗短信发送至被盗手机。After the mobile phone is stolen, the embodiment edits and sends the anti-theft SMS to the stolen mobile phone through the mobile phone of the relatives and friends. When editing the anti-theft SMS, if the anti-theft command in the anti-theft SMS is a simple operation, such as “locking the mobile phone screen”, the embodiment can directly transmit by editing the special anti-theft short message. If the anti-theft command in the anti-theft SMS is some anti-theft commands with high security requirements, such as "delete mobile phone data", "backup mobile phone data", etc., this embodiment first encrypts the anti-theft SMS to be sent. Second, the encrypted anti-theft SMS is sent to the stolen phone.
如图10所示的步骤S1002,本实施例对即将发送的防盗短信进行加密处理时,首先拼接特殊标记。在上文提及的包含特殊字符以及防盗指令的映射中存在步骤S1002中拼接的特殊标记。并且,在该映射中,存在专门用于加密的特殊标记。例如,该映射中,同时存在“Dingwei#”以及“Dingwei#E”,两者对应的防盗命令均为Locate命令。但 “Dingwei#”表示未加密的防盗指令,“Dingwei#E”标识加密的防盗命令。In step S1002 shown in FIG. 10, in the embodiment, when the anti-theft short message to be sent is encrypted, the special mark is first spliced. There is a special mark stitched in step S1002 in the above-mentioned map containing special characters and anti-theft instructions. Also, in this mapping, there are special tags dedicated to encryption. For example, in the mapping, both "Dingwei#" and "Dingwei#E" exist, and the corresponding anti-theft commands are all Locate commands. but "Dingwei#" indicates an unencrypted anti-theft command, and "Dingwei#E" identifies an encrypted anti-theft command.
之后,本实施例继续执行步骤S1004,对其余内容进行加密。例如,“Dingwei#E1380013800”中,“Dingwei#E”后面的数字表示验证码,即被盗手机预先存储的密码或者亲友号码等。步骤S1004对该密码或者亲友号码进行加密处理。加密处理之后,得到“DingweiE#ac35e5b301”。其中,需要说明的是,本发明实施例中展示的防盗指令中的字母及数字仅用作示例,不能代表真实的密码或者亲友号码的数字位数或者加密后的防盗指令的真实显示。对防盗短信进行加密之后,本实施例执行步骤S1006,发送防盗短信至被盗手机,流程结束。After that, the embodiment continues to perform step S1004 to encrypt the remaining content. For example, in "Dingwei#E1380013800", the number after "Dingwei#E" indicates the verification code, that is, the password or the number of friends and relatives pre-stored by the stolen mobile phone. Step S1004 performs encryption processing on the password or the relative friend number. After the encryption process, "DingweiE#ac35e5b301" is obtained. It should be noted that the letters and numbers in the anti-theft command shown in the embodiment of the present invention are only used as examples, and cannot represent the real digits of the real password or the number of friends and relatives or the actual display of the encrypted anti-theft command. After encrypting the anti-theft SMS, the embodiment proceeds to step S1006 to send the anti-theft SMS to the stolen mobile phone, and the process ends.
亲友手机发送防盗短信至被盗手机之后,被盗手机对接收到的防盗短信进行处理。如图11示出了根据本发明一个实施例的被盗手机一侧的移动终端防盗方法的处理流程图。参见图11,该流程至少包括步骤S1102至步骤S1120。After the relatives and friends send the anti-theft SMS to the stolen mobile phone, the stolen mobile phone processes the received anti-theft SMS. FIG. 11 is a flow chart showing the processing of the mobile terminal anti-theft method on the side of the stolen mobile phone according to an embodiment of the present invention. Referring to FIG. 11, the flow includes at least steps S1102 to S1120.
步骤S1102、接收防盗短信。Step S1102, receiving an anti-theft message.
步骤S1104、判断接收到的防盗短信的发送方是否为亲友号码。若是,直接执行步骤S1110,若否,执行步骤S1106。Step S1104: Determine whether the sender of the received anti-theft SMS is a relative friend number. If yes, step S1110 is directly executed, and if no, step S1106 is performed.
步骤S1106、判断接收到的防盗短信中是否含有经过DES加密的内容。若是,执行步骤S1118,若否,执行步骤S1108。Step S1106: Determine whether the received anti-theft SMS contains content encrypted by DES. If yes, go to step S1118, if no, go to step S1108.
步骤S1108、判断防盗短信中的验证码是否正确。Step S1108: Determine whether the verification code in the anti-theft SMS is correct.
具体地,防盗短信中的验证码可以是证明发送方可信任的密码,可以是发送方移动终端的标识信息,还可以同时包括密码以及移动终端的标识信息两者。经判断,若防盗短信中的验证码正确,执行步骤S1110,若错误,流程结束。Specifically, the verification code in the anti-theft SMS may be a password that proves that the sender can be trusted, may be the identification information of the sender's mobile terminal, and may also include both the password and the identification information of the mobile terminal. It is determined that if the verification code in the anti-theft SMS is correct, step S1110 is performed, and if the error occurs, the process ends.
步骤S1110、获取防盗命令。Step S1110: Obtain an anti-theft command.
被盗手机接收到防盗短信之后,解析防盗短信中携带的防盗指令,获取与该防盗指令对应的防盗命令。After the stolen mobile phone receives the anti-theft SMS, it analyzes the anti-theft command carried in the anti-theft SMS, and acquires the anti-theft command corresponding to the anti-theft command.
步骤S1112、执行防盗命令。Step S1112, executing an anti-theft command.
获取到防盗命令之后,被盗手机根据防盗命令执行相应的防盗操作。如根据防盗命令对被盗手机进行锁定屏幕的操作,或者根据防盗命令对解锁手机者进行拍照操作等的。After obtaining the anti-theft command, the stolen mobile phone performs the corresponding anti-theft operation according to the anti-theft command. For example, the operation of locking the screen of the stolen mobile phone according to the anti-theft command, or the photographing operation of the unlocking mobile phone according to the anti-theft command, and the like.
步骤S1114、返回执行结果。In step S1114, the execution result is returned.
防盗命令执行完毕之后,被盗手机返回执行结果至发送方,提示发送方命令执行完毕。After the execution of the anti-theft command is completed, the stolen mobile phone returns the execution result to the sender, prompting the sender to execute the command.
步骤S1116、返回执行结果至发送方之后,被盗手机防盗操作成功执行完毕,流程结束。Step S1116: After returning the execution result to the sender, the stolen mobile phone anti-theft operation is successfully completed, and the process ends.
步骤S1118、若防盗短信中存在DES加密内容,则对短信内容进行解密。Step S1118: If the DES encrypted content exists in the anti-theft SMS, the short message content is decrypted.
步骤S1120、判断对防盗短信内容解密是否成功。若是,返回执行步骤S1108,若否,流程结束。Step S1120: Determine whether the decryption of the anti-theft SMS content is successful. If yes, the process returns to step S1108, and if not, the process ends.
基于上文各优选实施例提供的移动终端防盗方法,基于同一发明构思,本发明实施例提供一种移动终端防盗客户端,用于实现上述移动终端防盗方法。 Based on the mobile terminal anti-theft method provided by the above preferred embodiments, the embodiment of the present invention provides a mobile terminal anti-theft client for implementing the above-mentioned mobile terminal anti-theft method.
图12示出了根据本发明一个实施例的移动终端防盗客户端的结构示意图。参见图12,本发明实施例的客户端至少包括:接收模块1220、解析模块1230以及执行模块1260。FIG. 12 is a schematic structural diagram of a mobile terminal anti-theft client according to an embodiment of the present invention. Referring to FIG. 12, the client of the embodiment of the present invention includes at least a receiving module 1220, a parsing module 1230, and an executing module 1260.
现介绍本发明实施例的移动终端防盗客户端的各器件或组成的功能以及各部分间的连接关系:The functions of each device or component of the anti-theft client of the mobile terminal and the connection relationship between the parts of the mobile terminal of the embodiment of the present invention are introduced:
接收模块1220,配置为接收来自发送方的防盗指令,其中,防盗指令以短信为发送载体。The receiving module 1220 is configured to receive an anti-theft command from the sender, wherein the anti-theft command uses the short message as the sending carrier.
解析模块1230,与接收模块1220以及执行模块1260分别耦合,配置为解析防盗指令,得到该指令对应的防盗命令。The parsing module 1230 is coupled to the receiving module 1220 and the executing module 1260 respectively, configured to parse the anti-theft command, and obtain an anti-theft command corresponding to the command.
执行模块1260,与解析模块1230相耦合,配置为执行防盗命令对应的操作,以实现移动终端防盗。The execution module 1260 is coupled to the parsing module 1230 and configured to perform an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
如图12所示,本发明实施例的移动终端防盗客户端中的接收模块1220接收来自发送方的防盗指令之前,短信拦截模块1210对移动终端接收到的短信进行筛选操作。即,移动终端接收到短信之后,短信拦截模块1210判断接收到的短信是否携带有防盗指令。As shown in FIG. 12, before the receiving module 1220 in the anti-theft client of the mobile terminal receives the anti-theft command from the sender, the short message intercepting module 1210 performs a filtering operation on the short message received by the mobile terminal. That is, after the mobile terminal receives the short message, the short message intercepting module 1210 determines whether the received short message carries the anti-theft instruction.
若短信拦截模块1210判断该短信中包含防盗指令,则短信拦截模块拦截该短信,阻止该短信在移动终端系统内显示,并触发接收模块1220接收以上述短信为载体的防盗指令。本发明实施例中,短信拦截模块1210对携带有防盗指令的短信进行拦截操作,避免该短信在移动终端的系统中出现,引起偷盗者的疑心,导致偷盗者提高警惕。若移动终端的系统中显示携带有防盗指令的短信,偷盗者据此判断移动终端开启防盗功能,则偷盗者可能对移动终端执行刷机或者拔出电池等操作,降低被盗移动终端被找回的机率,并增大相关部门找回被盗终端、抓获偷盗者的难度。If the short message intercepting module 1210 determines that the short message includes the anti-theft command, the short message intercepting module intercepts the short message, prevents the short message from being displayed in the mobile terminal system, and triggers the receiving module 1220 to receive the anti-theft command with the short message as the carrier. In the embodiment of the present invention, the short message intercepting module 1210 intercepts the short message carrying the anti-theft command to prevent the short message from appearing in the system of the mobile terminal, causing the thief's suspicion, and causing the thief to be vigilant. If the mobile terminal's system displays the short message carrying the anti-theft command, the thief judges that the mobile terminal turns on the anti-theft function, and the thief may perform operations such as flashing or unplugging the battery to the mobile terminal, thereby reducing the stolen mobile terminal being retrieved. Probability, and increase the difficulty of the relevant departments to retrieve stolen terminals and capture theft.
若短信拦截模块1210判断接收到的短信中未携带有防盗指令时,放行短信,能够降低偷盗者的警惕性,有利于找回被盗终端,抓获偷盗者。例如,当用户的移动终端丢失之后,若偷盗者在被盗移动终端中看到移动终端能够接收到短信,认为移动终端并未被锁定,并未开启防盗功能。另外,本发明实施例中的短信拦截模块1210将携带有防盗指令的短信拦截,使其无法显示在移动终端的系统中,而是触发接收模块1210在后台接收短信中携带的防盗指令,并进行防盗操作。偷盗者无法发现移动终端已开启防盗功能并执行相应防盗操作,如上报移动终端的实时位置甚至上报偷盗者的指纹等操作。因此,本发明实施例能够降低偷盗者的警惕性,增大被盗移动终端找回的可能性,进而有效遏制偷盗犯罪的发生,保护用户的财产安全。If the short message intercepting module 1210 determines that the received short message does not carry the anti-theft command, releasing the short message can reduce the vigilance of the thief, and is beneficial for recovering the stolen terminal and capturing the thief. For example, after the user's mobile terminal is lost, if the thief sees that the mobile terminal can receive the short message in the stolen mobile terminal, the mobile terminal is considered not to be locked, and the anti-theft function is not turned on. In addition, the short message intercepting module 1210 in the embodiment of the present invention intercepts the short message carrying the anti-theft command so that it cannot be displayed in the system of the mobile terminal, but triggers the receiving module 1210 to receive the anti-theft command carried in the short message in the background, and performs Anti-theft operation. The thief cannot find that the mobile terminal has turned on the anti-theft function and performs the corresponding anti-theft operation, such as reporting the real-time location of the mobile terminal and even reporting the fingerprint of the thief. Therefore, the embodiment of the invention can reduce the vigilance of the thief and increase the possibility of the stolen mobile terminal retrieving, thereby effectively curbing the occurrence of theft crime and protecting the user's property security.
当短信拦截模块1210拦截到携带有防盗指令的短信之后,触发接收模块1220。接收模块1220接收以短信为载体的防盗指令,并触发解析模块1230对该防盗指令进行解析。After the short message intercepting module 1210 intercepts the short message carrying the anti-theft command, the receiving module 1220 is triggered. The receiving module 1220 receives the anti-theft command with the short message as the carrier, and triggers the parsing module 1230 to parse the anti-theft command.
解析模块1230对防盗指令进行解析,得到发送该防盗指令的发送方的验证码。得到验证码之后,解析模块1230继续对得到的验证码与本地存储的可信任的移动终端标识和/或密码进行匹配,并根据匹配结果确定是否获取防盗指令对应的防盗命令。本发明实施例中,客户端本地存储的可信任的移动终端标识和/或密码由存储模块1240进行存储。若得到的验证码与存储模块1240存储的可信任的移动终端标识和/或密码匹配,则解析 模块1230获取防盗命令。若得到的验证码与存储模块1240存储的可信任的移动终端标识和/或密码不匹配,为避免接收到恶意发送端发送的防盗指令导致对移动终端执行错误的放到操作,解析模块1230忽略该防盗命令。另外,本发明实施例中,与存储模块1240相耦合的注销模块1250能够删除存储模块1240存储的发送方的移动终端标识和/或密码,并注销防盗功能。The analysis module 1230 analyzes the anti-theft command and obtains a verification code of the sender that transmitted the anti-theft command. After the verification code is obtained, the parsing module 1230 continues to match the obtained verification code with the locally stored trusted mobile terminal identifier and/or password, and determines whether to obtain the anti-theft command corresponding to the anti-theft instruction according to the matching result. In the embodiment of the present invention, the trusted mobile terminal identifier and/or password stored locally by the client is stored by the storage module 1240. If the obtained verification code matches the trusted mobile terminal identifier and/or password stored by the storage module 1240, the resolution is resolved. Module 1230 obtains an anti-theft command. If the obtained verification code does not match the trusted mobile terminal identifier and/or password stored by the storage module 1240, the parsing module 1230 ignores the erroneous placement operation on the mobile terminal to avoid receiving the anti-theft command sent by the malicious sender. The anti-theft command. In addition, in the embodiment of the present invention, the logout module 1250 coupled with the storage module 1240 can delete the sender's mobile terminal identifier and/or password stored by the storage module 1240, and deregister the anti-theft function.
另外,解析模块1230对防盗指令进行解析时获取验证码,确定防盗指令是否加密。若防盗指令为加密防盗指令,则解析模块1230采用相应的界面手段对防盗指令进行解密,并采用相应的解密手段对验证码进行解密,获取解密后的验证码并进行匹配。本发明实施例中,防盗指令可以是通过任意加密算法被加密,解析模块1230在对防盗指令进行解析时采用相应的解密手段对防盗指令以及验证码进行解密,本发明实施例对此并不加以限定。优选地,本发明实施例中采用目前使用最广泛的DES对防盗指令进行加密以及解密。另外,本发明实施例能够对接收到的防盗指令中除验证码以及防盗命令之外的其他信息或者内容也进行加密处理。In addition, the parsing module 1230 obtains the verification code when parsing the anti-theft command, and determines whether the anti-theft command is encrypted. If the anti-theft command is an encrypted anti-theft command, the parsing module 1230 decrypts the anti-theft command by using a corresponding interface means, and decrypts the verification code by using a corresponding decryption means, and obtains the decrypted verification code and matches. In the embodiment of the present invention, the anti-theft instruction may be encrypted by an arbitrary encryption algorithm, and the parsing module 1230 decrypts the anti-theft instruction and the verification code by using a corresponding decryption method when parsing the anti-theft instruction, which is not used in the embodiment of the present invention. limited. Preferably, in the embodiment of the present invention, the anti-theft instruction is encrypted and decrypted by using the most widely used DES. In addition, the embodiment of the present invention can perform encryption processing on other information or contents other than the verification code and the anti-theft command in the received anti-theft instruction.
当解析模块1230对防盗指令中携带的验证码以及存储模块1240预先存储的验证码进行匹配之后,若发送方的验证码与存储模块1240中存储的验证码能够匹配,则解析模块1230能够解析防盗指令得到对应的防盗命令。解析模块1230获取到防盗命令之后,触发执行模块1260根据防盗命令执行对应的操作,以实现移动终端防盗。在执行模块1260执行防盗命令的过程中,与执行模块1260相耦合的命令轮询模块1270轮询查询该防盗命令是否执行成功。若该防盗命令未执行成功,则命令轮询模块1270触发执行模块1260尝试再次执行该防盗命令。若该防盗命令执行成功,则命令轮询模块1270触发执行模块1260结束执行该防盗命令。After the parsing module 1230 matches the verification code carried in the anti-theft command and the verification code pre-stored by the storage module 1240, if the verification code of the sender and the verification code stored in the storage module 1240 can match, the parsing module 1230 can analyze the anti-theft. The instruction gets the corresponding anti-theft command. After the parsing module 1230 obtains the anti-theft command, the trigger execution module 1260 performs a corresponding operation according to the anti-theft command to implement the mobile terminal anti-theft. In the process in which the execution module 1260 executes the anti-theft command, the command polling module 1270 coupled with the execution module 1260 polls whether the anti-theft command is successfully executed. If the anti-theft command is not successfully executed, the command polling module 1270 triggers the execution module 1260 to attempt to execute the anti-theft command again. If the anti-theft command is successfully executed, the command polling module 1270 triggers the execution module 1260 to end execution of the anti-theft command.
本发明实施例中,命令轮询模块1270对防盗命令的执行情况进行轮询查询保证获取到的防盗命令能够被及时执行,避免因防盗命令执行不及时导致偷盗者对移动终端进行刷机或者其他操作使得移动终端无法被找回。例如,命令轮询模块1270对该锁定屏幕命令是否执行成功进行查询。若锁定屏幕命令未执行成功,则命令轮询模块1270触发执行模块1260尝试再次执行锁定屏幕命令。若锁定屏幕命令执行成功,则执行模块1260放弃再次执行该屏幕锁定命令。In the embodiment of the present invention, the command polling module 1270 performs a polling query on the execution of the anti-theft command to ensure that the obtained anti-theft command can be executed in time to prevent the thief from brushing or other operations on the mobile terminal due to the untimely execution of the anti-theft command. The mobile terminal cannot be retrieved. For example, the command polling module 1270 queries the lock screen command for successful execution. If the lock screen command is not successfully executed, the command polling module 1270 triggers the execution module 1260 to attempt to execute the lock screen command again. If the lock screen command is executed successfully, the execution module 1260 discards the screen lock command again.
根据上述任意一个优选实施例或多个优选实施例的组合,本发明实施例能够达到如下有益效果:According to any one of the preferred embodiments or the combination of the preferred embodiments, the embodiment of the present invention can achieve the following beneficial effects:
在本发明实施例中,接收来自发送方的、以短信为发送载体的防盗指令,通过解析防盗指令获取防盗命令,并且根据防盗命令,能够执行对应的防盗操作。由此可见,本发明实施例中的防盗指令来自能够发送短信的设备或终端,目前能够发送短信的设备或终端很多(例如手机、电脑、平板等),从而能够方便快捷地实现移动终端的防盗,解决了现有技术中,移动终端被盗之后,无法继续对移动终端进行防盗的问题。并且,使用能够发送短信的其他设备或终端能够开启本移动终端的防盗功能,避免如现有技术所说,因本移动终端自身未开启防盗功能导致给偷盗者可乘之机。本发明实施例在移动终 端被盗之后,仍旧能够接收到发送方的防盗指令,并根据解析防盗指令获得的防盗命令执行防盗操作。例如,用户移动终端丢失之后,通过发送防盗指令至被盗移动终端,本发明实施例能够对被盗移动终端进行锁屏操作,阻止偷盗者使用移动终端。偷盗者无法使用移动终端导致偷盗者无法通过刷机等操作翻新移动终端,进而偷盗者无法将被盗移动终端转卖获得利润。进一步,能够有效降低偷窃犯罪发生的概率。另外,根据接收到的防盗指令,本发明实施例还可以获取偷盗者的身份标识信息(如偷盗者的照片、指纹等)。根据本发明实施例获取到偷盗者的身份标识信息之后,能够根据上述身份标识信息对偷盗者进行抓捕。因此,本发明实施例能够达到终端被盗之后有效对终端进行防盗,并且降低偷盗犯罪率、保护用户财产安全的有益效果。In the embodiment of the present invention, the anti-theft command from the sender that uses the short message as the transmission carrier is received, the anti-theft command is obtained by parsing the anti-theft command, and the corresponding anti-theft operation can be performed according to the anti-theft command. Therefore, the anti-theft command in the embodiment of the present invention is from a device or a terminal capable of sending a short message, and a device or a terminal capable of sending a short message (such as a mobile phone, a computer, a tablet, etc.) can be realized, so that the anti-theft of the mobile terminal can be realized conveniently and quickly. The problem that the mobile terminal cannot be burglarized after the mobile terminal is stolen is solved in the prior art. Moreover, the use of other devices or terminals capable of sending short messages can enable the anti-theft function of the mobile terminal to avoid theft of the anti-theft function by the mobile terminal itself, as the prior art says. Embodiment of the present invention at the end of the mobile After the terminal is stolen, the sender's anti-theft command can still be received, and the anti-theft operation is performed according to the anti-theft command obtained by parsing the anti-theft command. For example, after the user mobile terminal is lost, by sending an anti-theft command to the stolen mobile terminal, the embodiment of the present invention can perform a lock screen operation on the stolen mobile terminal to prevent the thief from using the mobile terminal. The inability of the thief to use the mobile terminal causes the thief to fail to renovate the mobile terminal by brushing the machine, and the thief cannot resell the stolen mobile terminal for profit. Further, the probability of theft crime can be effectively reduced. In addition, according to the received anti-theft command, the embodiment of the present invention can also obtain the identity information of the thief (such as a photo of the thief, a fingerprint, etc.). After the identity information of the thief is obtained according to the embodiment of the present invention, the thief can be arrested according to the identity identification information. Therefore, the embodiment of the present invention can effectively prevent theft of the terminal after the terminal is stolen, and reduce the crime rate of theft and protect the security of the user property.
实施例三Embodiment 3
本发明实施例提供了又一种移动终端防盗方法。图13示出了根据本发明一个实施例的移动终端防盗方法的处理流程图。如图13所示,该流程至少包括步骤S1302至步骤S1306。The embodiment of the invention provides another method for preventing theft of a mobile terminal. FIG. 13 is a flow chart showing the processing of the mobile terminal anti-theft method according to an embodiment of the present invention. As shown in FIG. 13, the flow includes at least steps S1302 to S1306.
步骤S1302、接收来自服务器的防盗指令,其中,防盗指令由已激活账户发送至服务器。Step S1302, receiving an anti-theft command from the server, wherein the anti-theft command is sent to the server by the activated account.
步骤S1304、解析防盗指令,得到该指令对应的防盗命令。Step S1304: Analyze the anti-theft command, and obtain an anti-theft command corresponding to the instruction.
步骤S1306、执行防盗命令对应的操作,以实现移动终端防盗。Step S1306: Perform an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
在本发明实施例中,接收来自已激活账户的、经服务器转发的防盗指令,通过解析防盗指令获取防盗命令,并且根据防盗命令,能够执行对应的防盗操作。由此可见,本发明实施例中的防盗指令来自能够登录已激活账户的设备或终端,使用已激活账户发送防盗指令对设备或终端的要求较小,并且,使用已激活账户以短信或者网络指令均能够发送防盗指令,目前能够发送短信或者网络指令的发送平台很多,而能够登录账户的设备或终端更是不胜枚举(例如手机、电脑、平板等),从而能够方便快捷地实现移动终端的防盗,解决了现有技术中,移动终端被盗之后,无法继续对移动终端进行防盗的问题。并且,使用能够登录已激活账户的其他设备或终端能够开启本移动终端的防盗功能,避免如现有技术所说,因本移动终端自身未开启防盗功能导致给偷盗者可乘之机。本发明实施例在移动终端被盗之后,仍旧能够接收到发送方的防盗指令,并根据解析防盗指令获得的防盗命令执行防盗操作。例如,用户移动终端丢失之后,通过发送防盗指令至被盗移动终端,本发明实施例能够对被盗移动终端进行锁屏操作,阻止偷盗者使用移动终端。偷盗者无法使用移动终端导致偷盗者无法通过刷机等操作翻新移动终端,进而偷盗者无法将被盗移动终端转卖获得利润。进一步,能够有效降低偷窃犯罪发生的概率。另外,根据接收到的防盗指令,本发明实施例还可以获取偷盗者的身份标识信息(如偷盗者的照片、指纹等)。根据本发明实施例获取到偷盗者的身份标识信息之后,能够根据上述身份标识信息对偷盗者进行抓捕。因此,本发明实施例能够达到终端被盗之后有效对终端进行防盗,并且降低偷盗犯罪率、保护用户财产安全的有益效果。 In the embodiment of the present invention, the anti-theft instruction forwarded by the server from the activated account is received, the anti-theft command is obtained by parsing the anti-theft command, and the corresponding anti-theft operation can be performed according to the anti-theft command. It can be seen that the anti-theft command in the embodiment of the present invention is from a device or terminal capable of logging in to the activated account, and the device or the terminal is required to send the anti-theft command by using the activated account, and the activated account is used to send a short message or a network command. All of them can send anti-theft commands. Currently, there are many sending platforms for sending short messages or network commands, and devices or terminals that can log in to accounts are numerous (such as mobile phones, computers, tablets, etc.), so that mobile terminals can be realized quickly and easily. Theft prevention solves the problem that the mobile terminal cannot be burglarized after the mobile terminal is stolen in the prior art. Moreover, the use of other devices or terminals capable of logging in to the activated account can enable the anti-theft function of the mobile terminal to avoid theft of the anti-theft function by the mobile terminal itself, as the prior art says. After the mobile terminal is stolen, the embodiment of the present invention can still receive the anti-theft instruction of the sender, and perform the anti-theft operation according to the anti-theft command obtained by analyzing the anti-theft instruction. For example, after the user mobile terminal is lost, by sending an anti-theft command to the stolen mobile terminal, the embodiment of the present invention can perform a lock screen operation on the stolen mobile terminal to prevent the thief from using the mobile terminal. The inability of the thief to use the mobile terminal causes the thief to fail to renovate the mobile terminal by brushing the machine, and the thief cannot resell the stolen mobile terminal for profit. Further, the probability of theft crime can be effectively reduced. In addition, according to the received anti-theft command, the embodiment of the present invention can also obtain the identity information of the thief (such as a photo of the thief, a fingerprint, etc.). After the identity information of the thief is obtained according to the embodiment of the present invention, the thief can be arrested according to the identity identification information. Therefore, the embodiment of the present invention can effectively prevent theft of the terminal after the terminal is stolen, and reduce the crime rate of theft and protect the security of the user property.
如图13中的步骤S1302所示,本发明实施例接收来自服务器的防盗指令。其中,防盗指令格式可以只包括防盗命令,还可以既包括防盗命令,还包括除防盗命令之外的其他标识信息。本发明实施例中,防盗指令可以包括防盗策略标识、已激活账户标识、防盗命令、防盗对象标识中的至少一项。优选地,本发明实施例中,防盗策略标识为账户(Account),用来确定防盗策略的标识,该标识确定之后,不会发生改变。已激活账户标识为当前登录时为该账户生成的唯一的账号识别码(UID)。防盗命令包括命令编号(ACTIONID)和/或任务编号(TASKID),其中,通过ACTIONID能够在包含ACTIONID与防盗命令的对应表中查找到对应的命令。TASKID为防盗指令发送时,在服务器中生成的对应的任务编号,通过该TASKID能够在服务器中对该TASKID对应的防盗命令的执行情况进行查询。另外,当该防盗指令为首次发起时,TASKID为0。防盗对象标识可以包括本移动终端的IMEI,还可以包括能够唯一标识本移动终端的其他身份标识。综上,本发明实施例中,防盗指令的格式可以设置为:As shown in step S1302 in Fig. 13, the embodiment of the present invention receives an anti-theft instruction from a server. The anti-theft instruction format may only include an anti-theft command, and may also include an anti-theft command, and other identification information other than the anti-theft command. In the embodiment of the present invention, the anti-theft instruction may include at least one of an anti-theft policy identifier, an activated account identifier, an anti-theft command, and an anti-theft object identifier. Preferably, in the embodiment of the present invention, the anti-theft policy is identified as an account, and is used to determine an identifier of the anti-theft policy. After the identifier is determined, no change occurs. The activated account ID is the unique account identification number (UID) generated for the account at the time of the current login. The anti-theft command includes a command number (ACTIONID) and/or a task number (TASKID), wherein the corresponding command can be found in the correspondence table containing the ACTIONID and the anti-theft command by the ACTIONID. TASKID is a corresponding task number generated in the server when the anti-theft command is transmitted, and the TASKID can query the execution status of the anti-theft command corresponding to the TASKID in the server. In addition, when the anti-theft command is initiated for the first time, the TASKID is 0. The anti-theft object identifier may include the IMEI of the mobile terminal, and may also include other identity identifiers that can uniquely identify the mobile terminal. In summary, in the embodiment of the present invention, the format of the anti-theft instruction can be set as:
[Accout]<UID>,<IMEI>,<ACTIONID>,<TASKID>,<OTHERS>[Accout]<UID>,<IMEI>,<ACTIONID>,<TASKID>,<OTHERS>
其中,OTHERS为与防盗指令相关的附加信息。例如,Erase的附加信息为指定删除移动终端系统中哪部分的数据(如删除系统内的短信数据或者记事本数据或者应用的聊天记录数据等)。再例如,TakePhoto的附加信息可以是对拍摄照片的清晰度的要求。Among them, OTHERS is additional information related to the anti-theft command. For example, the additional information of Erase is to specify which part of the mobile terminal system to delete data (such as deleting the SMS data or notebook data in the system or the chat data of the application, etc.). As another example, the additional information of TakePhoto can be a requirement for the clarity of the captured photo.
例如,终端锁定指令的格式为:[Accout]200868996,323450296939291,LOCK,2000000,0。For example, the format of the terminal lock instruction is: [Accout] 200868996, 323450296939291, LOCK, 2000000, 0.
需要说明的是,本发明实施例中提及的代表UID、IMEI以及TASKID的数字仅用作示例,不能代表真实运用中代表UID、IMEI以及TASKID的数字的位数及组合。It should be noted that the numbers representing UID, IMEI, and TASKID mentioned in the embodiments of the present invention are only used as an example, and cannot represent the number of bits and combinations of numbers representing UID, IMEI, and TASKID in real use.
当本发明实施例执行步骤S1302完毕,接收到防盗指令之后,执行步骤S1304,解析该防盗指令。在对防盗指令进行解析操作时,本发明实施例确定防盗指令是否被加密。若防盗指令为加密防盗指令,则本发明实施例采用相应的解密手段对防盗指令进行解密。加解密方式请参见实施例二相应介绍部分,在此不做赘述。After the step S1302 is performed in the embodiment of the present invention, after receiving the anti-theft command, step S1304 is executed to parse the anti-theft command. In the case of performing an analysis operation on the anti-theft instruction, the embodiment of the present invention determines whether the anti-theft instruction is encrypted. If the anti-theft command is an encrypted anti-theft command, the embodiment of the present invention decrypts the anti-theft command by using a corresponding decryption means. For the encryption and decryption mode, refer to the corresponding introduction part of the second embodiment, and no further details are provided here.
上文对本发明实施例接收到的防盗指令进行了介绍,本发明实施例在接收防盗指令之前,需要在本移动终端启动防盗功能。如图14示出了根据本发明一个实施例的开启防盗功能的方法的处理流程图。参见图14,该流程至少包括步骤S1402至步骤S1414。The anti-theft command received by the embodiment of the present invention is described above. Before receiving the anti-theft command, the embodiment of the present invention needs to activate the anti-theft function in the mobile terminal. Figure 14 is a process flow diagram showing a method of turning on the anti-theft function in accordance with one embodiment of the present invention. Referring to FIG. 14, the flow includes at least steps S1402 through S1414.
步骤S1402、登陆已激活的账号。Step S1402, logging in to the activated account.
通过网络向登陆服务器发送登陆请求。A login request is sent to the login server over the network.
步骤S1404、返回登录信息。Step S1404, returning login information.
登录服务器接收到登陆请求之后,返回登陆信息,如“账户名称”、“账户识别码”。After the login server receives the login request, it returns the login information, such as "account name" and "account identification code".
步骤S1406、通过短信发送绑定(Bind)指令。Step S1406: Send a Bind command by using a short message.
通过短信发送Bind指令至防盗服务器。该Bind指令中,ACTIONID为Bind,TASKID为0,OTHERS为空。并且,该指令中携带的号码为本移动终端的电话号码。当绑定成功之后,将本移动终端的电话号码设置为可信任号码,并启动防盗功能。Send a Bind command to the anti-theft server via SMS. In the Bind instruction, ACTIONID is Bind, TASKID is 0, and OTHERS is empty. Moreover, the number carried in the instruction is the telephone number of the mobile terminal. After the binding is successful, the mobile phone number of the mobile terminal is set to a trusted number, and the anti-theft function is activated.
步骤S1408、检查Bind状态。 Step S1408, checking the Bind state.
若发送Bind指令之后,预定时间(如20秒)内,没有收到防盗服务器返回的查询结果,则通过网络检查Bind状态。If the query result returned by the anti-theft server is not received within a predetermined time (for example, 20 seconds) after the Bind command is sent, the Bind status is checked through the network.
步骤S1410、防盗服务器返回Bind结果。In step S1410, the anti-theft server returns a Bind result.
防盗服务器返回的查询结果中包含OTHERS格式的信息。若OTHERS为1,则表示本移动终端绑定成功,若OTHERS为0,则表示本移动终端绑定失败。The query result returned by the anti-theft server contains information in OTHERS format. If OTHERS is 1, it indicates that the mobile terminal is successfully bound. If OTHERS is 0, the mobile terminal fails to bind.
本发明实施例中,步骤S1408以及步骤S1410能够多次重复执行,其中,每隔预定时间(如20秒)若未收到防盗服务器返回的查询结果或者绑定结果为失败,检查Bind状态。In the embodiment of the present invention, step S1408 and step S1410 can be repeatedly executed repeatedly, wherein if the query result returned by the anti-theft server is not received or the binding result is failed every predetermined time (for example, 20 seconds), the Bind state is checked.
步骤S1412、若重复检查Bind状态三次之后,仍然无法成功绑定,通过网络发送未携带有本移动终端电话号码的Bind指令。若绑定成功,则启动防盗功能,并标识本移动终端为不可信任号码。In step S1412, if the Bind state is repeatedly checked three times, the binding cannot be successfully performed, and the Bind instruction that does not carry the mobile terminal's telephone number is sent through the network. If the binding is successful, the anti-theft function is activated, and the mobile terminal is identified as an untrusted number.
步骤S1414、防盗服务器返回网络发送的Bind结果。Step S1414: The anti-theft server returns a Bind result sent by the network.
需要说明的是,如图14所示,当本移动终端未被盗时,图14中的登录方可以是被盗之后登陆已激活账户一侧,还可以是本移动终端一侧。此时,登录服务器与防盗服务器为同一服务器。It should be noted that, as shown in FIG. 14, when the mobile terminal is not stolen, the login party in FIG. 14 may be the side of the activated account after being stolen, or may be the mobile terminal side. At this point, the login server and the anti-theft server are the same server.
图15示出了根据本发明一个实施例的解除绑定的方法的处理流程图。参见图15,该流程至少包括步骤S1502至步骤S1506。Figure 15 shows a process flow diagram of a method of unbinding in accordance with one embodiment of the present invention. Referring to FIG. 15, the flow includes at least steps S1502 through S1506.
步骤S1502、发送解除绑定(Unbind)指令。In step S1502, an unbind command is sent.
具体地,本步骤通过网络向防盗服务器发送Unbind指令。该Unbind指令为一种防盗指令,采用上文提及的防盗指令格式。在本Unbind指令中,ACTIONID为Unbind,TASKID为0,OTHERS为空。Specifically, this step sends an Unbind command to the anti-theft server through the network. The Unbind command is an anti-theft command that uses the anti-theft command format mentioned above. In this Unbind command, ACTIONID is Unbind, TASKID is 0, and OTHERS is empty.
步骤S1504、防盗服务器返回Unbind结果。若解除绑定成功,则执行步骤S1506,若解除绑定失败,则提示用户进行其他操作。In step S1504, the anti-theft server returns an Unbind result. If the unbinding is successful, step S1506 is performed, and if the unbinding fails, the user is prompted to perform other operations.
步骤S1506、解除绑定成功,删除已激活账户的账户信息以及防盗记录。如将账户信息中的“账户名称”、“账户识别码”设置为空并删除该账户对应的防盗记录的数据库等。In step S1506, the binding is successfully cancelled, and the account information of the activated account and the anti-theft record are deleted. For example, the "account name" and "account identification code" in the account information are set to be empty, and the database of the anti-theft record corresponding to the account is deleted.
另外,解除绑定成功并删除已激活账户的账户信息以及防盗记录之后,本发明实施例能够注销防盗功能。In addition, after the binding is successfully cancelled and the account information of the activated account and the anti-theft record are deleted, the embodiment of the present invention can cancel the anti-theft function.
上文介绍了本发明实施例中开启防盗功能以及注销防盗功能的处理流程。当移动终端丢失之后,本发明实施例首先对已激活账户在能够触发移动终端防盗的客户端中进行登录。优选地,本发明实施例中,能够触发移动终端防盗的客户端可以是浏览器,可以是手机侧带有手机防盗功能的客户端(例如手机卫士),还可以是个人电脑(Personal Computer,以下简称PC)侧带有手机防盗功能的客户端(例如安全卫士)等,本发明实施例对此并不加以限定。本发明实施例中,已激活账户登录之后,能够以短信和/或网络指令为载体发送防盗指令,保证移动终端丢失之后,能够通过常用发送方及时发送防盗指令对丢失的移动终端进行防盗。其中,若已激活账户以短信为载体发送防盗指令,则 本发明实施例中,移动终端接收到短信之后,首先判断短信中是否携带有防盗指令,若是,拦截该短信,并触发如图13中步骤S1304所示的解析防盗指令操作。若否,则放行该短信。The process flow of opening the anti-theft function and deregistering the anti-theft function in the embodiment of the present invention is described above. After the mobile terminal is lost, the embodiment of the present invention first logs in the activated account in the client that can trigger the theft prevention of the mobile terminal. Preferably, in the embodiment of the present invention, the client capable of triggering theft prevention of the mobile terminal may be a browser, and may be a client with a mobile phone anti-theft function on the mobile phone side (for example, a mobile guard), or may be a personal computer (Personal Computer, below) A client (such as a security guard) with a mobile phone anti-theft function on the side of the PC is not limited in this embodiment of the present invention. In the embodiment of the present invention, after the account is activated, the anti-theft command can be sent by using the short message and/or the network command as the carrier to ensure that the mobile terminal can be burglarized by sending the anti-theft command in time through the common sender. Wherein, if the activated account sends the anti-theft command by using the short message as the carrier, then In the embodiment of the present invention, after receiving the short message, the mobile terminal first determines whether the short message carries the anti-theft command, and if so, intercepts the short message, and triggers the parsing anti-theft instruction operation as shown in step S1304 in FIG. If not, release the message.
本发明实施例判断短信中携带有防盗指令之后,拦截该短信(通常也称吃掉短信),其功能描述请参见实施例二相应介绍部分。The embodiment of the present invention determines that the short message is carried in the short message, and then intercepts the short message (usually referred to as eating the short message). For the function description, refer to the corresponding introduction part of the second embodiment.
如上文所述,移动终端丢失之后,对已激活账户进行登陆,并接收已激活账户以短信和/或网络为载体发送的防盗指令。具体地,在已激活账户中存在存储有与激活账户绑定的至少一个移动终端的标识的设备列表。本发明实施例在已激活账户的设备列表中选择进行防盗操作的本移动终端,并由已激活账户将针对本移动终端的防盗指令发送至服务器。例如,发送“获取设备列表”指令至服务器,该“获取设备列表”指令中,ACTIONID为GET_LIST,TASKID为0,OTHERS为空。服务器返回该账户对应的设备列表。其中,设备列表中包含能够唯一标识移动终端的身份标识信息(如IMEI或者UID等)以及移动终端的电话号码等信息。已激活账户在设备列表中选取指定的移动终端,并将针对该移动终端的防盗指令发送至服务器,由服务器转发至该移动终端。As described above, after the mobile terminal is lost, the activated account is logged in, and the anti-theft command sent by the activated account with the short message and/or the network as the carrier is received. Specifically, there is a device list in the activated account in which the identity of at least one mobile terminal bound to the activation account is stored. In the embodiment of the present invention, the mobile terminal that performs the anti-theft operation is selected in the device list of the activated account, and the anti-theft command for the mobile terminal is sent to the server by the activated account. For example, the "Get Device List" command is sent to the server. In the "Get Device List" command, ACTIONID is GET_LIST, TASKID is 0, and OTHERS is empty. The server returns a list of devices corresponding to the account. The device list includes information such as identity information (such as IMEI or UID) of the mobile terminal and a phone number of the mobile terminal. The activated account selects the specified mobile terminal in the device list, and sends an anti-theft command to the mobile terminal to the server, which is forwarded by the server to the mobile terminal.
另外,若进行防盗操作的本移动终端的标识未存储于设备列表中,由已激活账户输入本移动终端的标识,将该输入的本移动终端的标识添加至已激活账户的设备列表中。并且,选择本移动终端对应的防盗操作通过服务器发送至本移动终端。In addition, if the identity of the mobile terminal performing the theft prevention operation is not stored in the device list, the identifier of the mobile terminal is input from the activated account, and the input identifier of the mobile terminal is added to the device list of the activated account. And, the anti-theft operation corresponding to the mobile terminal is selected and sent to the mobile terminal by the server.
本移动终端接收到防盗指令之后,解析防盗指令得到防盗命令,进而根据防盗命令执行防盗操作。本发明实施例中,当任一防盗命令被执行的过程中,轮询查询该防盗命令是否执行成功,若是,则结束该防盗命令的执行,若否,则再次尝试执行该防盗命令。After receiving the anti-theft command, the mobile terminal parses the anti-theft command to obtain an anti-theft command, and then performs an anti-theft operation according to the anti-theft command. In the embodiment of the present invention, when any anti-theft command is executed, polling queries whether the anti-theft command is successfully executed, and if so, ends the execution of the anti-theft command, and if not, attempts to execute the anti-theft command again.
当接收到的防盗命令执行完毕之后,本发明实施例将执行结果作为回执返回服务器,提醒服务器已执行。服务器收到该回执之后,能够继续下一步防盗操作。另外,若服务器在指定时间内未收到回执,则本发明实施例发起轮询查询,查询回执是否成功。查询回执的方法的处理流程图参见图8。After the execution of the received anti-theft command is completed, the embodiment of the present invention returns the execution result as a receipt to the server, and reminds the server that the execution has been performed. After the server receives the receipt, it can continue the next anti-theft operation. In addition, if the server does not receive the receipt within the specified time, the embodiment of the present invention initiates a polling query to check whether the receipt is successful. See Figure 8 for the process flow of the method of querying the receipt.
现以具体实施例对本发明的移动终端防盗方法进行说明。The mobile terminal anti-theft method of the present invention will now be described with reference to specific embodiments.
图16示出了根据本发明一个优选实施例的移动终端防盗方法的处理流程图。参见图16,该流程至少包括步骤S1602至步骤S1618。Figure 16 is a flow chart showing the processing of the mobile terminal anti-theft method in accordance with a preferred embodiment of the present invention. Referring to FIG. 16, the flow includes at least steps S1602 through S1618.
步骤S1602、登录已激活账户,并通过该已激活账户发送防盗指令至服务器。Step S1602: Log in to the activated account, and send an anti-theft command to the server through the activated account.
步骤S1604、服务器返回对防盗指令的处理结果,提示已激活账户服务器接收到防盗指令。其中,服务器返回的处理结果中携带有服务器生成的TASKID。Step S1604: The server returns a processing result of the anti-theft instruction, and prompts the activated account server to receive the anti-theft instruction. The processing result returned by the server carries the TASKID generated by the server.
步骤S1604执行完毕之后,根据已激活账户发送的防盗指令,若被盗移动终端的手机号码为可信任号码,则直接执行步骤S1608,若被盗移动终端的手机号码为不可信号码,执行步骤S1606。After the execution of the step S1604, according to the anti-theft command sent by the activated account, if the mobile phone number of the stolen mobile terminal is a trusted number, step S1608 is directly executed. If the mobile phone number of the stolen mobile terminal is a non-signal code, step S1606 is performed. .
步骤S1606、在已激活账户中输入被盗移动终端的手机号码,并发送至服务器,以便在服务器中存储的已激活账户对应的设备列表中添加该手机号码。将该手机号码添加至设备列表之后,被盗移动终端的手机号码由不可信任号码转变为可信任号码。 Step S1606: Enter the mobile phone number of the stolen mobile terminal in the activated account, and send it to the server to add the mobile phone number to the device list corresponding to the activated account stored in the server. After the mobile phone number is added to the device list, the mobile phone number of the stolen mobile terminal is converted from an untrusted number to a trusted number.
步骤S1608、确定被盗移动终端的手机号码为可信任号码之后,服务器以短信形式发送防盗指令至被盗移动终端。其中,该防盗指令中的ACTIONID和OTHERS与已激活账户发送至服务器的防盗指令中的ACTIONID和OTHERS相同,而该防盗指令中的TASKID为步骤S1604中生成的TASKID。Step S1608: After determining that the mobile phone number of the stolen mobile terminal is a trusted number, the server sends the anti-theft command to the stolen mobile terminal by using a short message. The ACTIONID and OTHERS in the anti-theft command are the same as the ACTIONID and OTHERS in the anti-theft command sent to the server by the activated account, and the TASKID in the anti-theft command is the TASKID generated in step S1604.
步骤S1610、已激活账户发送防盗指令完毕,每隔预定时间(如30秒),通过网络向服务器发送查询请求,查询防盗指令的执行结果。其中,查询请求中携带有被盗移动终端的身份标识信息(如被盗移动终端的IMEI或者UID等)以及步骤S1604中生成的TASKID。Step S1610: The activated account sends an anti-theft command, and sends a query request to the server through the network every predetermined time (for example, 30 seconds) to query the execution result of the anti-theft command. The query request carries the identity information of the stolen mobile terminal (such as the IMEI or UID of the stolen mobile terminal, etc.) and the TASKID generated in step S1604.
步骤S1612、服务器接收到查询请求之后,查询防盗指令的执行情况,并返回至已激活账户。如服务器返回“被盗移动终端未收到防盗指令”、“被盗终端正在执行防盗指令”、“被盗终端执行防盗指令成功”或者“被盗终端执行防盗指令失败”等等至已激活账户。用户能够及时通过已激活账户查看被盗终端执行防盗指令的情况,并根据防盗指令的执行情况选择执行下一防盗指令等操作。Step S1612: After receiving the query request, the server queries the execution status of the anti-theft command and returns to the activated account. If the server returns "the stolen mobile terminal did not receive the anti-theft command", "the stolen terminal is executing the anti-theft command", "the stolen terminal successfully executed the anti-theft command" or "the stolen terminal failed to execute the anti-theft command", etc., to the activated account . The user can view the stolen terminal to execute the anti-theft instruction through the activated account in time, and select to perform the next anti-theft instruction and the like according to the execution of the anti-theft instruction.
步骤S1614、被盗终端对防盗命令执行完毕之后,返回执行结果至服务器。服务器接收到返回结果之后,将TASKID对应的防盗命令的状态更新为“已完成”。Step S1614: After the stolen terminal completes the execution of the anti-theft command, the execution result is returned to the server. After receiving the returned result, the server updates the status of the anti-theft command corresponding to the TASKID to "completed".
步骤S1616、已激活账户向服务器发送查询请求,查询防盗指令的执行结果。Step S1616: The activated account sends a query request to the server to query the execution result of the anti-theft command.
步骤S1618、接收到已激活账户的查询请求之后,返回“被盗终端执行防盗指令成功”至已激活账户。Step S1618: After receiving the query request of the activated account, returning “the stolen terminal executes the anti-theft command successfully” to the activated account.
需要说明的是,上述流程中,步骤S1610以及步骤S1612能够轮询执行一次或者多次。如已激活账户能够每隔30秒发送查询请求至服务器,查询被盗终端对防盗指令的执行情况直到服务器返回被盗终端执行防盗指令成功。即,在上述流程中,步骤S1616以及步骤S1618为步骤S1610以及步骤S1612的重复。It should be noted that, in the above process, step S1610 and step S1612 can be polled one or more times. If the account has been activated, the query request can be sent to the server every 30 seconds to query the execution of the anti-theft command by the stolen terminal until the server returns to the stolen terminal to execute the anti-theft command successfully. That is, in the above flow, step S1616 and step S1618 are the repetition of step S1610 and step S1612.
图17示出了根据本发明一个实施例的已激活账户一侧发送防盗指令的处理流程图。参见图17,该流程至少包括步骤S1702至步骤S1708。Figure 17 is a flow diagram showing the process of transmitting an anti-theft command on the side of an activated account in accordance with one embodiment of the present invention. Referring to FIG. 17, the flow includes at least steps S1702 through S1708.
步骤S1702、生成防盗指令内容。Step S1702: Generate an antitheft instruction content.
生成防盗指令中,ACTIONID为要执行的命令的命令编号,如定位(Locate)、删除(Erase)、拍照取证(TakePhoto)等等。TASKID为0,OTHERS为与防盗指令相关的附加信息。例如,Erase指令的附加信息为指定删除移动终端系统中哪部分的数据(如删除系统内的短信数据或者记事本数据或者应用的聊天记录数据等)。再例如,TakePhoto的附加信息可以是对拍摄照片的清晰度的要求。In the generated anti-theft command, ACTIONID is the command number of the command to be executed, such as Locate, Erase, TakePhoto, and so on. TASKID is 0, OTHERS is additional information related to the anti-theft command. For example, the additional information of the Erase command is to specify which part of the data in the mobile terminal system is deleted (for example, deleting the short message data or the notebook data in the system or the chat data of the application, etc.). As another example, the additional information of TakePhoto can be a requirement for the clarity of the captured photo.
步骤S1704、对防盗指令进行加密处理。In step S1704, the anti-theft instruction is encrypted.
在防盗指令中,除Accout外,其他数据或内容或信息均需要经过加密处理,本优选实施例中,采用DES对防盗指令进行加密处理,保证防盗指令能够被更加安全地发送至服务器,再由服务器转发至被盗终端。另外,若已激活账户与服务器的通讯采用了具有安全性的加密传输协议(Hypertext Transfer Protocol over Secure Socket Layer,以下简称Https)等加密协议,则本优选实施例可以跳过该加密步骤。 In the anti-theft command, in addition to the Accout, other data or content or information needs to be encrypted. In the preferred embodiment, the DES is used to encrypt the anti-theft command to ensure that the anti-theft command can be sent to the server more securely. The server forwards to the stolen terminal. In addition, the preferred embodiment may skip the encryption step if the communication between the activated account and the server uses an encryption protocol such as a Hypertext Transfer Protocol over Secure Socket Layer (hereinafter referred to as Https).
步骤S1706、发送防盗指令至服务器。Step S1706: Send an anti-theft command to the server.
步骤S1708、发送轮询查询请求至服务器,查询被盗终端对防盗指令的执行情况。若执行完毕,流程结束。若未执行完毕,重复步骤S1708。Step S1708: Send a polling query request to the server, and query the execution status of the theft prevention terminal by the stolen terminal. If the execution is completed, the process ends. If not completed, step S1708 is repeated.
图18示出了根据本发明一个实施例的移动终端一侧防盗的方法处理流程图。参见图18,该流程至少包括步骤S1802至步骤S1814。FIG. 18 is a flowchart showing a method of processing the theft side of the mobile terminal according to an embodiment of the present invention. Referring to FIG. 18, the flow includes at least steps S1802 through S1814.
步骤S1802、接收携带有防盗指令的短信。Step S1802, receiving a short message carrying an anti-theft command.
步骤S1804、对防盗指令进行解密处理。若能够解密,执行步骤S1808,若不能够解密,执行步骤S1806。In step S1804, the anti-theft instruction is decrypted. If it is possible to decrypt, step S1808 is executed, and if it is not possible to decrypt, step S1806 is executed.
步骤S1806、解密失败,执行防盗指令失败,流程结束。In step S1806, the decryption fails, the execution of the anti-theft command fails, and the process ends.
步骤S1808、解密成功,确定防盗指令中携带的移动终端标识(如IMEI或者UID)是否正确。若是,则执行步骤S1810。若否,则防盗指令的发送方错误发送,该防盗指令不由本移动终端执行,返回执行步骤S1806。Step S1808: The decryption succeeds, and it is determined whether the mobile terminal identifier (such as IMEI or UID) carried in the anti-theft command is correct. If yes, step S1810 is performed. If not, the sender of the anti-theft command is erroneously transmitted, and the anti-theft command is not executed by the mobile terminal, and the process returns to step S1806.
步骤S1810、解析接收到的防盗指令,获取与该防盗指令对应的防盗命令。Step S1810: Parse the received anti-theft command, and acquire an anti-theft command corresponding to the anti-theft command.
步骤S1812、执行防盗命令。Step S1812, executing an anti-theft command.
步骤S1814、执行完毕之后,返回执行结果至服务器,流程结束。In step S1814, after the execution is completed, the execution result is returned to the server, and the process ends.
基于上文各优选实施例提供的移动终端防盗方法,基于同一发明构思,本发明实施例提供一种移动终端防盗客户端,用于实现上述移动终端防盗方法。Based on the mobile terminal anti-theft method provided by the above preferred embodiments, the embodiment of the present invention provides a mobile terminal anti-theft client for implementing the above-mentioned mobile terminal anti-theft method.
图19示出了根据本发明一个实施例的移动终端防盗客户端的结构示意图。参见图19,本发明实施例的客户端至少包括:接收模块1940、解析模块1950以及执行模块1960。FIG. 19 is a schematic structural diagram of a mobile terminal anti-theft client according to an embodiment of the present invention. Referring to FIG. 19, the client of the embodiment of the present invention includes at least a receiving module 1940, a parsing module 1950, and an executing module 1960.
现介绍本发明实施例的移动终端防盗客户端的各器件或组成的功能以及各部分间的连接关系:The functions of each device or component of the anti-theft client of the mobile terminal and the connection relationship between the parts of the mobile terminal of the embodiment of the present invention are introduced:
接收模块1940,配置为接收来自服务器的防盗指令,其中,防盗指令由已激活账户发送至服务器。The receiving module 1940 is configured to receive an anti-theft command from the server, wherein the anti-theft command is sent to the server by the activated account.
解析模块1950,与接收模块1940相耦合,配置为解析防盗指令,得到该指令对应的防盗命令。The parsing module 1950 is coupled to the receiving module 1940 and configured to parse the anti-theft command to obtain an anti-theft command corresponding to the command.
执行模块1960,与执行模块1950相耦合,配置为执行防盗命令对应的操作,以实现移动终端防盗。The execution module 1960 is coupled to the execution module 1950 and configured to perform an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
本发明实施例中,如图19所示的移动终端防盗客户端中的判断模块1910在移动终端接收到短信之后,判断接收到的短信中是否携带有防盗指令。若是,则触发拦截模块1920,拦截携带有防盗指令的短信,若否,则触发放行模块1930,放行该短信。In the embodiment of the present invention, the determining module 1910 in the mobile terminal anti-theft client shown in FIG. 19 determines whether the received short message carries an anti-theft instruction after the mobile terminal receives the short message. If yes, the interception module 1920 is triggered to intercept the short message carrying the anti-theft command. If not, the release module 1930 is triggered to release the short message.
判断模块1910判断短信中携带有防盗指令之后,触发拦截模块1920拦截该短信(通常也称吃掉短信)。本发明实施例中,吃掉短信可以避免该短信在移动终端的系统中出现,引起偷盗者的疑心,导致偷盗者提高警惕。若移动终端的系统中显示携带有防盗指令的短信,偷盗者据此判断移动终端开启防盗功能,则偷盗者可能对移动终端执行刷机或者拔出电池等操作,降低被盗移动终端被找回的机率,并增大相关部门找回被盗终端、抓获偷盗者的难度。 After the judging module 1910 determines that the short message carries the anti-theft command, the triggering intercepting module 1920 intercepts the short message (also commonly referred to as eating the short message). In the embodiment of the present invention, eating the short message can prevent the short message from appearing in the system of the mobile terminal, causing the suspicion of the thief, and causing the thief to be vigilant. If the mobile terminal's system displays the short message carrying the anti-theft command, the thief judges that the mobile terminal turns on the anti-theft function, and the thief may perform operations such as flashing or unplugging the battery to the mobile terminal, thereby reducing the stolen mobile terminal being retrieved. Probability, and increase the difficulty of the relevant departments to retrieve stolen terminals and capture theft.
本发明实施例中,当判断模块1910判断接收到的短信中未携带有防盗指令时,触发放行模块1930放行短信,能够降低偷盗者的警惕性,有利于找回被盗终端,抓获偷盗者。例如,当用户的移动终端丢失之后,若偷盗者在被盗移动终端中看到移动终端能够接收到短信,认为移动终端并未被锁定,并未开启防盗功能。另外,本发明实施例将携带有防盗指令的短信拦截,使其无法显示在移动终端的系统中,而是在后台根据短信中携带的防盗指令进行防盗操作。偷盗者无法发现移动终端已开启防盗功能,并执行相应防盗操作,如上报移动终端的实时位置甚至上报偷盗者的指纹等操作。因此,本发明实施例能够降低偷盗者的警惕性,增大被盗移动终端找回的可能性,进而有效遏制偷盗犯罪的发生,保护用户的财产安全。In the embodiment of the present invention, when the determining module 1910 determines that the received short message does not carry the anti-theft command, the trigger release module 1930 releases the short message, which can reduce the vigilance of the thief, and is beneficial to recover the stolen terminal and capture the thief. For example, after the user's mobile terminal is lost, if the thief sees that the mobile terminal can receive the short message in the stolen mobile terminal, the mobile terminal is considered not to be locked, and the anti-theft function is not turned on. In addition, the embodiment of the present invention intercepts the short message carrying the anti-theft command so that it cannot be displayed in the system of the mobile terminal, but performs the anti-theft operation according to the anti-theft instruction carried in the short message in the background. The thief cannot find that the mobile terminal has turned on the anti-theft function, and performs the corresponding anti-theft operation, such as reporting the real-time location of the mobile terminal and even reporting the fingerprint of the thief. Therefore, the embodiment of the invention can reduce the vigilance of the thief and increase the possibility of the stolen mobile terminal retrieving, thereby effectively curbing the occurrence of theft crime and protecting the user's property security.
上文提及,判断模块1910判断移动终端中携带有防盗指令之后,触发拦截模块1920拦截该短信。拦截模块1920拦截该短信之后,与拦截模块1920相耦合的接收模块1940接收短信中的防盗指令,并触发解析模块1950对该防盗命令进行解析。As mentioned above, after the judging module 1910 determines that the anti-theft command is carried in the mobile terminal, the intercepting module 1920 is triggered to intercept the short message. After the intercepting module 1920 intercepts the short message, the receiving module 1940 coupled to the intercepting module 1920 receives the anti-theft command in the short message, and triggers the parsing module 1950 to parse the anti-theft command.
若防盗指令为加密防盗指令,则解析模块1950采用相应的解密手段对防盗指令进行解密。本发明实施例中,防盗指令可以是通过任意加密算法被加密,解析模块1950在对防盗指令进行解析时采用相应的解密手段对防盗指令进行解密,本发明实施例对此并不加以限定。优选地,本发明实施例中采用目前使用最广泛的DES对防盗指令进行加密以及解密。另外,本发明实施例能够对接收到的防盗指令中除防盗命令之外的其他信息或者内容也进行加密处理。本发明实施例对防盗指令中的所有信息或者内容进行加密处理,能够增强对防盗指令中重要信息或者内容(如防盗指令中的验证码或者防盗命令)的保护,提高接收到的防盗指令的安全性。If the anti-theft command is an encrypted anti-theft command, the parsing module 1950 decrypts the anti-theft command by using a corresponding decryption means. In the embodiment of the present invention, the anti-theft command may be encrypted by an arbitrary encryption algorithm, and the parsing module 1950 decrypts the anti-theft command by using a corresponding decryption method when parsing the anti-theft command, which is not limited by the embodiment of the present invention. Preferably, in the embodiment of the present invention, the anti-theft instruction is encrypted and decrypted by using the most widely used DES. In addition, the embodiment of the present invention can perform encryption processing on other information or content other than the anti-theft command in the received anti-theft command. The embodiment of the invention encrypts all the information or content in the anti-theft command, and can enhance the protection of the important information or content in the anti-theft command (such as the verification code or the anti-theft command in the anti-theft command), and improve the security of the received anti-theft command. Sex.
解析模块1950对防盗指令进行解析之后,获取到相应的防盗命令。与解析模块1950相耦合的执行模块1960根据防盗命令执行防盗操作。在任一防盗命令被执行的过程中,与执行模块1960相耦合的命令轮询模块1970轮询查询该防盗命令是否执行成功。若是,则命令轮询模块1970触发执行模块1960结束执行防盗命令。若否,则命令轮询模块1970触发执行模块1960再次尝试执行该防盗命令。After the parsing module 1950 parses the anti-theft command, the corresponding anti-theft command is obtained. The execution module 1960 coupled to the parsing module 1950 performs an anti-theft operation in accordance with the anti-theft command. In the course of any anti-theft command being executed, the command polling module 1970 coupled with the execution module 1960 polls whether the anti-theft command was successfully executed. If so, the command polling module 1970 triggers the execution module 1960 to end the execution of the anti-theft command. If not, the command polling module 1970 triggers the execution module 1960 to attempt to execute the anti-theft command again.
命令轮询模块1970对防盗命令的执行情况进行轮询查询保证移动终端获取到的防盗命令能够被及时执行,避免因防盗命令执行不及时导致偷盗者对移动终端进行刷机或者其他操作使得移动终端无法被找回。例如,本发明实施例即将执行锁定屏幕命令,对该锁定屏幕命令是否执行成功进行查询。若锁定屏幕命令未执行成功,则命令轮询模块1970触发执行模块1960尝试再次执行锁定屏幕命令,对移动终端的屏幕进行锁定。若锁定屏幕命令执行成功,则命令轮询模块1970触发执行模块1960放弃再次执行该屏幕锁定命令。The polling module 1970 performs a polling query on the execution of the anti-theft command to ensure that the anti-theft command acquired by the mobile terminal can be executed in time, so as to prevent the thief from brushing the mobile terminal or other operations due to the untimely execution of the anti-theft command, so that the mobile terminal cannot Was recovered. For example, the embodiment of the present invention will execute a lock screen command to query whether the lock screen command is successfully executed. If the lock screen command is not successfully executed, the command polling module 1970 triggers the execution module 1960 to attempt to execute the lock screen command again to lock the screen of the mobile terminal. If the lock screen command is executed successfully, the command polling module 1970 triggers the execution module 1960 to abandon the execution of the screen lock command again.
如图19所示,本发明实施例中还包括激活模块1980以及注销模块1990。接收模块1940接收来自服务器的防盗指令之前,由激活模块1980利用已激活账户发送以短信为载体的Bind命令至服务器,激活本移动终端的防盗功能。当接收到服务器返回的与已激活账户绑定成功的消息,则本移动终端的手机号码为可信任号码,并且本移动终端成功启 动防盗客户端。另外,本发明实施例中,与激活模块1980相耦合的注销模块1990能够利用已激活账户向服务器发送解除绑定指令。解除绑定成功时,注销模块1990删除已激活账户的账户信息以及防盗记录,并注销本移动终端的防盗功能。As shown in FIG. 19, the embodiment of the present invention further includes an activation module 1980 and a logout module 1990. Before the receiving module 1940 receives the anti-theft command from the server, the activation module 1980 transmits the Bind command with the short message as the carrier to the server by using the activated account, and activates the anti-theft function of the mobile terminal. When receiving a message that the server returns a successful binding to the activated account, the mobile phone number of the mobile terminal is a trusted number, and the mobile terminal successfully starts Anti-theft client. In addition, in the embodiment of the present invention, the logout module 1990 coupled with the activation module 1980 can send an unbinding command to the server using the activated account. When the unbinding is successful, the logout module 1990 deletes the account information of the activated account and the anti-theft record, and cancels the anti-theft function of the mobile terminal.
本发明实施例中,已激活账户能够以短信和/或网络指令为载体发送防盗指令,保证移动终端丢失之后,能够使用常用发送平台发送防盗指令,更加有效地保护移动终端的安全性。另外,已激活账户在能够触发移动终端防盗的任意客户端中进行登录,如已激活账户可以在浏览器中登录,还可以在手机卫士或者安全卫士中进行登录。In the embodiment of the present invention, the activated account can send an anti-theft command by using a short message and/or a network instruction as a carrier to ensure that the mobile terminal is lost, and can use the common sending platform to send an anti-theft command, thereby more effectively protecting the security of the mobile terminal. In addition, the activated account is logged in any client that can trigger the theft of the mobile terminal. If the account is activated, you can log in in the browser, and you can log in in the mobile guard or security guard.
根据上述任意一个优选实施例或多个优选实施例的组合,本发明实施例能够达到如下有益效果:According to any one of the preferred embodiments or the combination of the preferred embodiments, the embodiment of the present invention can achieve the following beneficial effects:
在本发明实施例中,接收来自已激活账户的、经服务器转发的防盗指令,通过解析防盗指令获取防盗命令,并且根据防盗命令,能够执行对应的防盗操作。由此可见,本发明实施例中的防盗指令来自能够登录已激活账户的设备或终端,使用已激活账户发送防盗指令对设备或终端的要求较小,并且,使用已激活账户以短信或者网络指令均能够发送防盗指令,目前能够发送短信或者网络指令的发送平台很多,而能够登录账户的设备或终端更是不胜枚举(例如手机、电脑、平板等),从而能够方便快捷地实现移动终端的防盗,解决了现有技术中,移动终端被盗之后,无法继续对移动终端进行防盗的问题。并且,使用能够登录已激活账户的其他设备或终端能够开启本移动终端的防盗功能,避免如现有技术所说,因本移动终端自身未开启防盗功能导致给偷盗者可乘之机。本发明实施例在移动终端被盗之后,仍旧能够接收到发送方的防盗指令,并根据解析防盗指令获得的防盗命令执行防盗操作。例如,用户移动终端丢失之后,通过发送防盗指令至被盗移动终端,本发明实施例能够对被盗移动终端进行锁屏操作,阻止偷盗者使用移动终端。偷盗者无法使用移动终端导致偷盗者无法通过刷机等操作翻新移动终端,进而偷盗者无法将被盗移动终端转卖获得利润。进一步,能够有效降低偷窃犯罪发生的概率。另外,根据接收到的防盗指令,本发明实施例还可以获取偷盗者的身份标识信息(如偷盗者的照片、指纹等)。根据本发明实施例获取到偷盗者的身份标识信息之后,能够根据上述身份标识信息对偷盗者进行抓捕。因此,本发明实施例能够达到终端被盗之后有效对终端进行防盗,并且降低偷盗犯罪率、保护用户财产安全的有益效果。In the embodiment of the present invention, the anti-theft instruction forwarded by the server from the activated account is received, the anti-theft command is obtained by parsing the anti-theft command, and the corresponding anti-theft operation can be performed according to the anti-theft command. It can be seen that the anti-theft command in the embodiment of the present invention is from a device or terminal capable of logging in to the activated account, and the device or the terminal is required to send the anti-theft command by using the activated account, and the activated account is used to send a short message or a network command. All of them can send anti-theft commands. Currently, there are many sending platforms for sending short messages or network commands, and devices or terminals that can log in to accounts are numerous (such as mobile phones, computers, tablets, etc.), so that mobile terminals can be realized quickly and easily. Theft prevention solves the problem that the mobile terminal cannot be burglarized after the mobile terminal is stolen in the prior art. Moreover, the use of other devices or terminals capable of logging in to the activated account can enable the anti-theft function of the mobile terminal to avoid theft of the anti-theft function by the mobile terminal itself, as the prior art says. After the mobile terminal is stolen, the embodiment of the present invention can still receive the anti-theft instruction of the sender, and perform the anti-theft operation according to the anti-theft command obtained by analyzing the anti-theft instruction. For example, after the user mobile terminal is lost, by sending an anti-theft command to the stolen mobile terminal, the embodiment of the present invention can perform a lock screen operation on the stolen mobile terminal to prevent the thief from using the mobile terminal. The inability of the thief to use the mobile terminal causes the thief to fail to renovate the mobile terminal by brushing the machine, and the thief cannot resell the stolen mobile terminal for profit. Further, the probability of theft crime can be effectively reduced. In addition, according to the received anti-theft command, the embodiment of the present invention can also obtain the identity information of the thief (such as a photo of the thief, a fingerprint, etc.). After the identity information of the thief is obtained according to the embodiment of the present invention, the thief can be arrested according to the identity identification information. Therefore, the embodiment of the present invention can effectively prevent theft of the terminal after the terminal is stolen, and reduce the crime rate of theft and protect the security of the user property.
实施例四Embodiment 4
本发明实施例提供了又一种移动终端防盗方法。图20示出了根据本发明一个实施例的移动终端防盗方法的处理流程图。参见图20,该流程至少包括步骤S2002至步骤S2006。The embodiment of the invention provides another method for preventing theft of a mobile terminal. FIG. 20 is a flow chart showing the processing of the mobile terminal anti-theft method according to an embodiment of the present invention. Referring to FIG. 20, the flow includes at least steps S2002 to S2006.
步骤S2002、接收来自个人电脑(Personal Computer,以下简称PC)终端的防盗指令。Step S2002: Receive an anti-theft instruction from a personal computer (PC) terminal.
步骤S2004、解析防盗指令,得到该指令对应的防盗命令。Step S2004, parsing the anti-theft command, and obtaining an anti-theft command corresponding to the instruction.
步骤S2006、执行防盗命令对应的操作,以实现移动终端防盗。Step S2006: Perform an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
在本发明实施例中,接收来自PC终端的防盗指令,通过解析防盗指令获取防盗命令, 并且根据防盗命令,能够执行对应的防盗操作。由此可见,本发明实施例中的防盗指令来自能够使用PC终端,在被盗移动终端未开启防盗功能的前提下,开启和使用移动终端的防盗功能。使用PC终端发送防盗指令,操作简单,从而能够方便快捷地实现移动终端的防盗,并且能够提供完善的防盗功能对移动终端进行防盗,解决了现有技术中,移动终端被盗之后,无法继续对移动终端进行防盗的问题。本发明实施例在移动终端被盗之后,仍旧能够接收到发送方的防盗指令,并根据解析防盗指令获得的防盗命令执行防盗操作。例如,用户移动终端丢失之后,通过发送防盗指令至被盗移动终端,本发明实施例能够对被盗移动终端进行锁屏操作,阻止偷盗者使用移动终端。偷盗者无法使用移动终端导致偷盗者无法通过刷机等操作翻新移动终端,进而偷盗者无法将被盗移动终端转卖获得利润。进一步,能够有效降低偷窃犯罪发生的概率。另外,根据接收到的防盗指令,本发明实施例还可以获取偷盗者的身份标识信息(如偷盗者的照片、指纹等)。根据本发明实施例获取到偷盗者的身份标识信息之后,能够根据上述身份标识信息对偷盗者进行抓捕。因此,本发明实施例能够达到终端被盗之后有效对终端进行防盗,并且降低偷盗犯罪率、保护用户财产安全的有益效果。In the embodiment of the present invention, the anti-theft command from the PC terminal is received, and the anti-theft command is obtained by parsing the anti-theft command. And according to the anti-theft command, the corresponding anti-theft operation can be performed. It can be seen that the anti-theft command in the embodiment of the present invention comes from being able to use the PC terminal to open and use the anti-theft function of the mobile terminal on the premise that the stolen mobile terminal does not have the anti-theft function turned on. The use of a PC terminal to send an anti-theft command is simple in operation, so that the anti-theft of the mobile terminal can be realized conveniently and quickly, and the anti-theft function can be provided to perform anti-theft on the mobile terminal. In the prior art, after the mobile terminal is stolen, the operation cannot be continued. The problem of theft prevention by the mobile terminal. After the mobile terminal is stolen, the embodiment of the present invention can still receive the anti-theft instruction of the sender, and perform the anti-theft operation according to the anti-theft command obtained by analyzing the anti-theft instruction. For example, after the user mobile terminal is lost, by sending an anti-theft command to the stolen mobile terminal, the embodiment of the present invention can perform a lock screen operation on the stolen mobile terminal to prevent the thief from using the mobile terminal. The inability of the thief to use the mobile terminal causes the thief to fail to renovate the mobile terminal by brushing the machine, and the thief cannot resell the stolen mobile terminal for profit. Further, the probability of theft crime can be effectively reduced. In addition, according to the received anti-theft command, the embodiment of the present invention can also obtain the identity information of the thief (such as a photo of the thief, a fingerprint, etc.). After the identity information of the thief is obtained according to the embodiment of the present invention, the thief can be arrested according to the identity identification information. Therefore, the embodiment of the present invention can effectively prevent theft of the terminal after the terminal is stolen, and reduce the crime rate of theft and protect the security of the user property.
在执行如图20所示的步骤S2002之前,即,接收来自PC终端的防盗指令之前,接收来自PC终端的、携带有本移动终端的身份标识以及防盗模式标识的激活文件。优选地,本发明实施例中的激活文件由可扩展标记语言XML或者轻量级的数据交换格式(JavaScript Object Notation,以下简称JSON)组成,用于PC终端与移动终端间的激活操作。接收到激活文件之后,本发明实施例根据激活文件中携带的移动终端的身份标识对激活文件进行验证。若激活文件中携带的移动终端的身份标识是本移动终端的身份标识,则激活文件通过验证。若激活文件中携带的移动终端的身份标识不是本移动终端的身份标识,则激活文件未通过验证。考虑到PC终端除具备设备的属性外,还具备上网等特性,因此,PC终端适用范围较广,能够触发不同的防盗模式。当激活文件通过验证之后,本发明实施例可以根据激活文件携带的防盗模式标识在不同的防盗模式中确认本次所采用的防盗模式。Before executing the step S2002 shown in FIG. 20, that is, before receiving the anti-theft command from the PC terminal, the activation file carrying the identity of the mobile terminal and the anti-theft mode identification from the PC terminal is received. Preferably, the activation file in the embodiment of the present invention is composed of an extensible markup language XML or a lightweight data exchange format (JSON), which is used for an activation operation between the PC terminal and the mobile terminal. After receiving the activation file, the embodiment of the present invention verifies the activation file according to the identity of the mobile terminal carried in the activation file. If the identity of the mobile terminal carried in the activation file is the identity of the mobile terminal, the activation file passes the verification. If the identity of the mobile terminal carried in the activation file is not the identity of the mobile terminal, the activation file fails to pass the verification. Considering that the PC terminal has the characteristics of the device, it also has the characteristics of Internet access. Therefore, the PC terminal has a wide application range and can trigger different anti-theft modes. After the activation file is verified, the embodiment of the present invention can confirm the anti-theft mode adopted in the different anti-theft mode according to the anti-theft mode identifier carried in the activation file.
因防盗模式有多样性,防盗模式标识也相应存在多种。反过来说,可以根据不同防盗模式标识中包括的不同信息,区分不同防盗模式。本发明实施例中提供不同的防盗模式标识的例证,具体地,可以包括:Due to the variety of anti-theft modes, there are various types of anti-theft mode identification. Conversely, different anti-theft modes can be distinguished according to different information included in different anti-theft mode identifiers. Examples of different anti-theft mode identifications are provided in the embodiments of the present invention. Specifically, the method may include:
仅包括由PC生成的、与本移动终端一一对应的随机字符串GUID的第一组防盗模式标识、包括GUID和密码(PASSWORD)的第二组防盗模式标识、仅包括账号标识符(UID)的第三组防盗模式标识、包括GUID和UID的第四组防盗模式标识以及同时包括GUID、UID、PASSWORD三者的第五组防盗模式标识。The first group of anti-theft mode identifiers including the random string GUID corresponding to the mobile terminal and the second group of anti-theft mode identifiers including the GUID and the password (PASSWORD), including only the account identifier (UID), are included. The third set of anti-theft mode identifiers, the fourth set of anti-theft mode identifiers including GUID and UID, and the fifth set of anti-theft mode identifiers including GUID, UID, and PASSWORD.
现对五组不同的防盗模式标识及其作用分别进行说明。Five different sets of anti-theft patterns and their roles are described separately.
当防盗模式标识为仅包括GUID的第一组防盗模式标识时,开启PC防盗策略,并根据接收到的防盗命令直接执行相应的防盗操作。其中,GUID为PC生成的随机字符串,并且该字符串能够与移动终端建立一一对应的绑定关系。 When the anti-theft mode is identified as the first set of anti-theft mode identifiers including only the GUID, the PC anti-theft policy is turned on, and the corresponding anti-theft operation is directly executed according to the received anti-theft command. The GUID is a random string generated by the PC, and the string can establish a one-to-one binding relationship with the mobile terminal.
当防盗模式标识为包括GUID和PASSWORD的第二组防盗模式标识时,开启PC防盗策略,并对PASSWORD是否正确进行验证。若是,则执行接收到的防盗命令对应的防盗操作。若否,则停止响应,不执行任何操作。其中,该PASSWORD为用户预先设置的密码,当该密码值不为空时,本发明实施例在执行防盗命令前,对该PASSWORD进行验证。When the anti-theft mode is identified as the second set of anti-theft mode identifiers including GUID and PASSWORD, the PC anti-theft policy is turned on, and the PASSWORD is verified correctly. If yes, the anti-theft operation corresponding to the received anti-theft command is executed. If no, the response is stopped and no action is taken. The PASSWORD is a password set by the user in advance. When the password value is not empty, the embodiment of the present invention verifies the PASSWORD before executing the anti-theft command.
当防盗模式标识为仅包括UID的第三组防盗模式标识时,开启账号防盗策略。其中,UID为用户登录账号名称为USERSNAME的账号之后生成的用于标识账号的账号标识符。When the anti-theft mode is identified as a third set of anti-theft mode identifiers including only the UID, the account anti-theft policy is enabled. The UID is an account identifier that is generated after the user logs in to the account whose account name is USERSNAME is used to identify the account.
当防盗模式标识为包括UID以及GUID的第四组防盗模式标识时,开启PC防盗策略以及账号防盗策略,接收来自PC终端或者UID的防盗指令并执行相应的防盗操作。When the anti-theft mode is identified as the fourth set of anti-theft mode identifiers including the UID and the GUID, the PC anti-theft policy and the account anti-theft policy are enabled, the anti-theft command from the PC terminal or the UID is received, and the corresponding anti-theft operation is performed.
当防盗模式标识为同时包括GUID、UID、PASSWORD三者的第五组防盗模式标识时,开启PC防盗策略以及账号防盗策略。并且,接收到来自PC终端或者UID的防盗命令时均需要首先对PASSWORD进行验证。其次,根据PASSWORD是否通过验证进行下一步操作。具体地,当通过时,本发明实施例执行接收到的防盗命令对应的防盗操作,当不通过时,本发明实施例停止响应,不执行任何操作。When the anti-theft mode is identified as the fifth group of anti-theft mode identifiers including GUID, UID, and PASSWORD, the PC anti-theft policy and the account anti-theft policy are enabled. Moreover, when receiving an anti-theft command from a PC terminal or UID, it is necessary to first verify PASSWORD. Second, proceed to the next step based on whether PASSWORD is verified. Specifically, when passing, the embodiment of the present invention performs the anti-theft operation corresponding to the received anti-theft command. When not, the embodiment of the present invention stops responding and does not perform any operation.
如上文所述,根据PC终端发送的激活文件中携带的防盗模式标识的不同,本发明实施例能够激活不同的防盗模式。即,在通过PC终端对移动终端进行防盗操作时,通过PC终端可以触发一种防盗策略向移动终端发送防盗命令,还可以触发多种防盗策略同时向移动终端发送防盗命令。例如,当激活文件中的防盗模式标识为仅包含UID或者仅包含GUID时,本发明实施例能够分别仅进行账号防盗策略或者仅进行PC防盗策略。当激活文件中的防盗模式标识为同时包括UID以及GUID时,本发明实施例能够同时进行PC防盗以及账号防盗,增强对移动终端的防盗保护,增大找回移动终端的可能性。本发明实施例中,PC防盗包括通过PC终端发送防盗指令至移动终端对移动终端进行防盗,还包括激活账号对移动终端进行账号防盗。当PC终端激活账号对移动终端进行账号防盗时,PC终端仅将账号信息发送至作为登录方的移动终端中。As described above, the embodiment of the present invention can activate different anti-theft modes according to different types of anti-theft mode identifiers carried in the activation file sent by the PC terminal. That is, when the mobile terminal performs the anti-theft operation through the PC terminal, the anti-theft policy can be triggered by the PC terminal to send the anti-theft command to the mobile terminal, and multiple anti-theft policies can be triggered to simultaneously send the anti-theft command to the mobile terminal. For example, when the anti-theft mode identifier in the activation file is only included in the UID or only the GUID, the embodiment of the present invention can perform only the account anti-theft policy or only the PC anti-theft policy. When the anti-theft mode identifier in the activation file is included to include both the UID and the GUID, the embodiment of the present invention can simultaneously perform PC anti-theft and account anti-theft, enhance the anti-theft protection to the mobile terminal, and increase the possibility of retrieving the mobile terminal. In the embodiment of the present invention, the PC anti-theft includes sending an anti-theft command to the mobile terminal through the PC terminal to perform anti-theft on the mobile terminal, and further including an activation account to perform account anti-theft on the mobile terminal. When the PC terminal activates the account to perform account theft prevention on the mobile terminal, the PC terminal only transmits the account information to the mobile terminal as the login party.
本发明实施例中,PC防盗策略与账号防盗策略的不同之处有:PC防盗策略中的ACTIONID需要和帐号防盗策略中的ACTIONID区分开。例如在帐号防盗策略中的“定位”,ACTIONID为LOCATE,而在PC防盗策略种应为“LOCATE_PC”,但执行的操作完全相同。UID在PC防盗策略中为GUID。即,标记帐号防盗中的唯一帐号的信息是UID,而标记PC防盗中的唯一的计算机的信息是GUID。如果是防盗模式标识为包括GUID和PASSWORD的防盗模式标识的方式,也即发送命令需要密码,则在每一命令的OTHERS中,添加PASSWORD部分(可附在该字段的最后)。例如“清除手机数据”的<OTHERS>中可为“3,PASSWORD:123123123”,其中“3”表示要清除的手机数据类型,而“PASSWORD:”后面的就是密码。被盗方在收到命令后,如果通过PC激活时已有密码,则发来的命令中,还应取出<OTHERS>部分,取出“PASSWORD:”后面的密码进行对比。如果相同,则表示命令正确,否则有可能是用户密码输入错误,或者命令已经被篡 改。In the embodiment of the present invention, the difference between the PC anti-theft policy and the account anti-theft strategy is that the ACTIONID in the PC anti-theft policy needs to be distinguished from the ACTIONID in the account anti-theft strategy. For example, in the "location" of the account anti-theft policy, the ACTIONID is LOCATE, and the PC anti-theft strategy should be "LOCATE_PC", but the operation is exactly the same. The UID is a GUID in the PC anti-theft policy. That is, the information of the unique account in the tag account burglar is the UID, and the information of the unique computer in the tag PC burglar is the GUID. If the anti-theft mode is identified as the anti-theft mode identifier including GUID and PASSWORD, that is, the password is required to send the command, in the OTHERS of each command, the PASSWORD part (which can be attached to the end of the field) is added. For example, in <OTHERS> of "Clearing Phone Data", it can be "3, PASSWORD: 123123123", where "3" indicates the type of mobile phone data to be cleared, and "PASSWORD:" is followed by the password. After the stolen party receives the command, if there is already a password when it is activated by the PC, the <OTHERS> part of the sent command should also be taken out, and the password after the "PASSWORD:" should be taken out for comparison. If they are the same, the command is correct. Otherwise, the user password may be incorrectly entered, or the command may have been blocked. change.
另外,本发明实施例中,可以对PASSWORD进行个性化设置。若用户设置PASSWORD,在执行防盗操作之前,对该PASSWORD进行验证,能够避免恶意终端发送防盗指令导致移动终端错误执行防盗操作(如恶意锁屏、泄露实时位置信息等)导致恶劣的后果。用户也可以根据需要不进行PASSWORD的设置,直接通过PC或账户进行移动终端防盗,避免步骤繁琐。不需PASSWORD验证通常用于可信任的网络环境或者常用可信任终端,如家里电脑、办公室电脑等设备。In addition, in the embodiment of the present invention, the PASSWORD can be personalized. If the user sets PASSWORD, the PASSWORD is verified before the anti-theft operation is performed, which can prevent the malicious terminal from sending an anti-theft command, causing the mobile terminal to perform an anti-theft operation (such as malicious lock screen, leaking real-time location information, etc.), which causes bad consequences. Users can also perform PASSWORD settings as needed, and directly perform mobile terminal anti-theft through PC or account, avoiding cumbersome steps. No need for PASSWORD authentication is usually used in trusted network environments or commonly used trusted terminals, such as home computers, office computers and other devices.
本发明实施例中,根据通过验证的激活文件中的防盗模式标识激活相应的防盗模式之后,执行如图20所示的步骤S2002,接收来自PC终端的防盗指令。接收到之后,执行步骤S2004,对接收到的防盗指令进行解析,得到防盗指令中携带的本移动终端的身份标识。得到防盗指令中携带的本移动终端的身份标识之后,本发明实施例对身份标识进行验证。若验证通过,则执行如图20所示的步骤S2006,执行防盗命令对应的操作,以实现移动终端防盗。若验证未通过,则本发明实施例停止响应,不执行任何操作。In the embodiment of the present invention, after the corresponding anti-theft mode is activated according to the anti-theft mode identifier in the activated activation file, step S2002 shown in FIG. 20 is performed to receive the anti-theft instruction from the PC terminal. After receiving, step S2004 is executed to parse the received anti-theft command to obtain the identity of the mobile terminal carried in the anti-theft command. After obtaining the identity of the mobile terminal carried in the anti-theft command, the embodiment of the present invention verifies the identity identifier. If the verification is passed, the step S2006 shown in FIG. 20 is executed, and the operation corresponding to the anti-theft command is executed to implement the anti-theft of the mobile terminal. If the verification fails, the embodiment of the present invention stops responding and does not perform any operation.
本发明实施例中,在任一防盗命令被执行的过程中,轮询查询该防盗命令是否执行成功,若是,则结束该防盗命令的执行,若否,则再次尝试执行该防盗命令。In the embodiment of the present invention, in the process of executing any anti-theft command, polling whether the anti-theft command is successfully executed, if yes, ending the execution of the anti-theft command, and if not, attempting to execute the anti-theft command again.
本发明实施例中,优选IMEI为本移动终端的唯一身份标识。In the embodiment of the present invention, the IMEI is preferably a unique identifier of the mobile terminal.
另外,本发明实施例中,PC终端与本移动终端能够通过有线或者无线方式连接打通。例如,PC终端与本移动终端能够通过通用串行总线(Universal Serial Bus,以下简称USB)数据线进行连接。再例如,PC终端与本移动终端能够通过蓝牙、无线网络等无线方式进行连接。本发明实施例中,PC终端与本移动终端能够通过有线或者无线方式进行连接并打通,方便PC终端以及移动终端通过多种方式或者手段进行连接并打通,进而能够通过PC终端对移动终端进行防盗,有效保证移动终端的安全性。In addition, in the embodiment of the present invention, the PC terminal and the mobile terminal can be connected through a wired or wireless connection. For example, the PC terminal and the mobile terminal can be connected through a Universal Serial Bus (USB) data line. For another example, the PC terminal and the mobile terminal can be connected by wireless means such as Bluetooth or a wireless network. In the embodiment of the present invention, the PC terminal and the mobile terminal can be connected and opened through wired or wireless manner, so that the PC terminal and the mobile terminal can be connected and opened through various methods or means, thereby being able to perform anti-theft on the mobile terminal through the PC terminal. To effectively ensure the security of the mobile terminal.
现以具体实施例对本发明的移动终端防盗方法进行说明。The mobile terminal anti-theft method of the present invention will now be described with reference to specific embodiments.
图21示出了根据本发明一个实施例的PC终端一侧的激活手机防盗功能的方法的处理流程图。参见图21,该流程至少包括步骤S2102至步骤S2116。21 is a process flow diagram showing a method of activating a mobile phone anti-theft function on the side of a PC terminal according to an embodiment of the present invention. Referring to FIG. 21, the flow includes at least steps S2102 through S2116.
步骤S2102、判断PC终端与手机是否已建立连接。若是,执行步骤S2104,若否,流程结束。Step S2202, determining whether the connection between the PC terminal and the mobile phone is established. If yes, go to step S2104, if no, the flow ends.
步骤S2104、获取手机的身份标识IMEI。Step S2104: Acquire an identity identifier IMEI of the mobile phone.
步骤S2106、判断用户登录账号是否已激活。若否,执行步骤S2108,若是,执行步骤S2110。Step S2106: Determine whether the user login account is activated. If no, step S2108 is performed, and if so, step S2110 is performed.
步骤S2108、向服务器发送PC绑定(Bind_By_PC)指令。Step S2108: Send a PC Binding (Bind_By_PC) instruction to the server.
若根据步骤S2106的判断结果,用户登录账号未激活,则触发PC防盗策略,通过PC终端直接发送防盗指令至服务器,或者,在输入PASSWORD并通过验证之后,发送防盗指令至服务器。其中,该防盗指令的格式可以包括命令编号(ACTIONID)、任务编号(TASKID)以及附加信息(OTHERS)。例如,ACTIONID为Bind_By_PC,TASKID为0以及OTHERS为GUID、IMEI和密码三者。 If the user login account is not activated according to the determination result of step S2106, the PC anti-theft policy is triggered, and the anti-theft command is directly sent to the server through the PC terminal, or after the PASSWORD is input and the verification is passed, the anti-theft command is sent to the server. The format of the anti-theft instruction may include a command number (ACTIONID), a task number (TASKID), and additional information (OTHERS). For example, ACTIONID is Bind_By_PC, TASKID is 0, and OTHERS is GUID, IMEI, and password.
步骤S2110、向服务器发送Bind指令。Step S2110: Send a Bind instruction to the server.
若根据步骤S2106的判断结果,用户登录账号已激活,则触发账号防盗策略。If the user login account is activated according to the judgment result of step S2106, the account anti-theft policy is triggered.
步骤S2112、生成激活文件。In step S2122, an activation file is generated.
生成携带有手机的IMEI以及防盗模式标识激活文件。其中,若仅需手机开启PC防盗,则防盗模式标识为仅包括GUID或者包括GUID和PASSWORD。若仅需手机开启账号防盗,则防盗模式标识为仅包括UID。若手机需要开启PC防盗以及账号防盗,则防盗模式标识包括GUID和UID或者同时包括GUID、UID和PASSWORD三者。Generate an IMEI carrying the mobile phone and an anti-theft mode identification activation file. If the mobile phone only needs to be turned on by the mobile phone, the anti-theft mode is identified as including only the GUID or including the GUID and the PASSWORD. If only the mobile phone needs to open the account anti-theft, the anti-theft mode is identified as including only the UID. If the mobile phone needs to turn on PC anti-theft and account anti-theft, the anti-theft mode identifier includes GUID and UID or includes GUID, UID and PASSWORD at the same time.
步骤S2114、将激活文件发送至手机。Step S2114: Send the activation file to the mobile phone.
步骤S2116、通知手机读取激活文件并打开。Step S2116, notifying the mobile phone to read the activation file and open.
具体地,在手机安卓系统中读取激活文件并打开的步骤为:启动进程,其进程名和参数为:adb shell am start-a BIND_FROM_PC-n com.qihoo360.mobilesafe/com.qihoo360.mobilesafe.PortalActivity-d/mnt/sdcard/Protection.dat。其中:BIND_FROM_PC表示一个Intent的Action。Com.qihoo360.mobilesafe表示安卓应用的包名。Com.qihoo360.PortalActivity表示真正用来处理激活的Activity。/mnt/sdcard/Protection.dat表示打通文件所放的路径。Specifically, the step of reading the activation file in the mobile phone Android system and opening it is: starting the process, the process name and parameters are: adb shell am start-a BIND_FROM_PC-n com.qihoo360.mobilesafe/com.qihoo360.mobilesafe.PortalActivity- d/mnt/sdcard/Protection.dat. Where: BIND_FROM_PC represents an Intent Action. Com.qihoo360.mobilesafe represents the package name of the Android app. Com.qihoo360.PortalActivity represents the Activity that is actually used to handle the activation. /mnt/sdcard/Protection.dat indicates the path where the file is opened.
图22示出了根据本发明一个实施例手机一侧的防盗方法的处理流程图。参见图22,该流程至少包括步骤S2202至步骤S2224。Figure 22 is a flow chart showing the processing of the anti-theft method on the side of the mobile phone according to an embodiment of the present invention. Referring to FIG. 22, the flow includes at least steps S2202 to S2224.
步骤S2202、接收到PC终端发送的激活指令,判断其合法性。In step S2202, an activation command sent by the PC terminal is received, and the legitimacy is determined.
手机接收到PC终端发送的激活指令之后,判断激活指令中的命令是否为Bind_From_PC,并且获取指令中的字段,查看该字段是否为完整激活文件的路径。若激活指令中的命令为Bind_From_PC,则判断指令合法,执行步骤S2204,若不合法,流程结束。After receiving the activation command sent by the PC terminal, the mobile phone determines whether the command in the activation command is Bind_From_PC, and obtains a field in the instruction to check whether the field is the path of the complete activation file. If the command in the activation command is Bind_From_PC, it is determined that the instruction is legal, and step S2204 is performed. If not, the process ends.
步骤S2204、解析激活文件,获取激活文件中携带的IMEI。In step S2204, the activation file is parsed, and the IMEI carried in the activation file is obtained.
步骤S2206、判断IMEI是否正确,若是,执行步骤S2208,若否,执行步骤S2210。In step S2206, it is determined whether the IMEI is correct. If yes, step S2208 is performed, and if no, step S2210 is performed.
步骤S2208、读取激活文件中携带的防盗模式标识,并保存。In step S2208, the anti-theft mode identifier carried in the activation file is read and saved.
在本地保存如下信息:Save the following information locally:
当防盗模式标识仅包括GUID时,开启PC防盗策略,直接执行防盗命令对应的操作。When the anti-theft mode identifier includes only the GUID, the PC anti-theft policy is turned on, and the operation corresponding to the anti-theft command is directly executed.
当防盗模式标识包括GUID和PASSWORD时,开启PC防盗策略,验证PASSWROD是否正确;若是,则执行防盗命令对应的操作;若否,则停止响应。When the anti-theft mode identifier includes GUID and PASSWORD, the PC anti-theft policy is turned on to verify whether the PASSWROD is correct; if yes, the operation corresponding to the anti-theft command is executed; if not, the response is stopped.
当防盗模式标识包括UID时,开启账号防盗策略,在本移动终端中登录USERNAME,接收来自UID的防盗命令并执行对应的操作。When the anti-theft mode identifier includes the UID, the account anti-theft policy is activated, the USERNAME is registered in the mobile terminal, the anti-theft command from the UID is received, and the corresponding operation is performed.
当防盗模式标识包括GUID和UID时,开启PC防盗策略以及账号防盗策略,接收来自PC终端或者UID的防盗命令并执行对应的操作。When the anti-theft mode identifier includes the GUID and the UID, the PC anti-theft policy and the account anti-theft policy are enabled, and the anti-theft command from the PC terminal or the UID is received and the corresponding operation is performed.
当防盗模式标识包括GUID、UID和PASSWORD,开启PC防盗策略以及账号防盗策略,接收到来自PC终端或者述UID的防盗命令均对PASSWORD进行验证;若验证通过,则执行接收的防盗命令对应的操作;若验证不通过,则停止响应。 When the anti-theft mode identifier includes the GUID, the UID, and the PASSWORD, the PC anti-theft policy and the account anti-theft policy are enabled, and the anti-theft command from the PC terminal or the UID is verified to verify the PASSWORD; if the verification is passed, the corresponding operation of the received anti-theft command is performed. ; If the verification fails, the response stops.
在本移动终端中,接收到相应指令后会开启不同的防盗模式,现对移动终端自身如何设置相应属性值开启不同的防盗模式进行说明。In the mobile terminal, after receiving the corresponding instruction, different anti-theft modes are enabled, and now the mobile terminal itself sets the corresponding attribute value to open different anti-theft modes for explanation.
当防盗模式标识仅包括GUID时:When the anti-theft mode flag only includes the GUID:
1.设置选项中,“PC防盗标示符值”设置为GUID值。1. In the setting options, "PC anti-theft identifier value" is set to the GUID value.
2.设置选项中,“开启PC防盗值”为true。2. In the setting options, "Enable PC Anti-theft Value" is true.
当防盗模式标识包括GUID和PASSWORD时:When the anti-theft mode identifier includes GUID and PASSWORD:
1.设置选项中,“PC防盗标示符值”设置为GUID值。1. In the setting options, "PC anti-theft identifier value" is set to the GUID value.
2.设置选项中,“PC防盗密码值”为密码值。2. In the setting options, "PC anti-theft password value" is the password value.
3.设置选项中,“开通PC防盗值”为true。3. In the setting options, "Open PC Anti-theft Value" is true.
当防盗模式标识包括UID时:When the anti-theft mode identifier includes a UID:
1.设置选项中,“帐号识别码值”设置为UID值。1. In the setup options, “Account ID Value” is set to the UID value.
2.设置选项中,“帐号名值”设置为USERNAME值。2. In the setup options, "Account Name Value" is set to the USERNAME value.
3.设置选项中,“开通帐号防盗值”为True。3. In the setting options, “Open Account Anti-theft Value” is True.
注意:此处没有设置“开通PC防盗值”,因为没有打开PC防盗。Note: The “Open PC Anti-theft Value” is not set here because the PC anti-theft is not turned on.
当防盗模式标识包括GUID和UID时:When the anti-theft mode identifier includes GUID and UID:
1.设置选项中,“PC防盗标示符值”为GUID值。1. In the setting options, "PC anti-theft identifier value" is the GUID value.
2.设置选项中,“帐号识别码值”为UID值。2. In the setting options, “Account ID Value” is the UID value.
3.设置选项中,“帐号名值”设置为USERNAME值。3. In the setup options, the "Account Name Value" is set to the USERNAME value.
4.设置选项中,“开通帐号防盗值”为true。4. In the setting options, "Open account anti-theft value" is true.
5.设置选项中,“开通PC防盗值”为true。5. In the setting options, "Open PC Anti-theft Value" is true.
当防盗模式标识包括GUID、UID和PASSWORD时:When the anti-theft mode identifier includes GUID, UID, and PASSWORD:
1.设置选项中,“PC防盗标示符值”为GUID值。1. In the setting options, "PC anti-theft identifier value" is the GUID value.
2.设置选项中,“PC防盗密码值”为密码值。2. In the setting options, "PC anti-theft password value" is the password value.
3.设置选项中,“帐号识别码值”为UID值。3. In the setting options, “Account ID Value” is the UID value.
4.设置选项中,“帐号名值”设置为USERNAME值。4. In the setup options, the "Account Name Value" is set to the USERNAME value.
5.设置选项中,“开通帐号防盗值”为true。5. In the setting options, "Open account anti-theft value" is true.
6.设置选项中,“开通PC防盗值”为true。6. In the setting options, "Open PC Anti-theft Value" is true.
当防盗模式标识包括其他情况时,均按失败处理。When the anti-theft mode flag includes other conditions, it is processed as a failure.
步骤S2210、开启防盗功能失败。In step S2210, the anti-theft function fails.
步骤S2212、开启防盗功能成功。In step S2212, the anti-theft function is successfully activated.
步骤S2214、接收PC终端发送的防盗指令。Step S2214: Receive an anti-theft command sent by the PC terminal.
步骤S2216、解析防盗指令,获取防盗命令以及身份标识。Step S2216, parsing the anti-theft command, and acquiring the anti-theft command and the identity identifier.
步骤S2218、对防盗指令中携带的身份标识进行验证。若验证通过,执行步骤S2220,若验证未通过,流程结束。Step S2218, verifying the identity identifier carried in the anti-theft command. If the verification is passed, step S2220 is performed, and if the verification fails, the process ends.
步骤S2220、执行防盗命令对应的操作。Step S2220: Perform an operation corresponding to the anti-theft command.
步骤S2222、轮询查询防盗命令是否执行成功。若是,执行步骤S2224,若否,继续 执行该步骤。Step S2222: Polling whether the anti-theft command is successfully executed. If yes, go to step S2224, if no, continue Perform this step.
步骤S2224、防盗命令执行成功,返回执行结果至PC终端,流程结束。In step S2224, the anti-theft command is successfully executed, and the execution result is returned to the PC terminal, and the process ends.
基于上文各优选实施例提供的移动终端防盗方法,基于同一发明构思,本发明实施例提供一种移动终端防盗客户端,用于实现上述移动终端防盗方法。Based on the mobile terminal anti-theft method provided by the above preferred embodiments, the embodiment of the present invention provides a mobile terminal anti-theft client for implementing the above-mentioned mobile terminal anti-theft method.
图23示出了根据本发明一个实施例的移动终端防盗客户端的结构示意图。参见图23,本发明实施例的客户端至少包括:接收模块2330、解析模块2340以及执行模块2350。FIG. 23 is a schematic structural diagram of a mobile terminal anti-theft client according to an embodiment of the present invention. Referring to FIG. 23, the client of the embodiment of the present invention includes at least a receiving module 2330, a parsing module 2340, and an executing module 2350.
现介绍本发明实施例的移动终端防盗客户端的各器件或组成的功能以及各部分间的连接关系:The functions of each device or component of the anti-theft client of the mobile terminal and the connection relationship between the parts of the mobile terminal of the embodiment of the present invention are introduced:
接收模块2330,配置为接收来自PC终端的防盗指令。The receiving module 2330 is configured to receive an anti-theft command from the PC terminal.
解析模块2340,与接收模块2330相耦合,配置为解析防盗指令,得到该指令对应的防盗命令。The parsing module 2340 is coupled to the receiving module 2330 and configured to parse the anti-theft command to obtain an anti-theft command corresponding to the command.
执行模块2350,与解析模块2340相耦合,配置为执行防盗命令对应的操作,以实现移动终端防盗。The execution module 2350 is coupled to the parsing module 2340 and configured to perform an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
接收模块2330接收来自PC终端的防盗指令之前,激活模块2320接收来自PC终端的、携带有本移动终端的身份标识以及防盗模式标识的激活文件。接收到激活文件之后,激活模块2320根据激活文件中携带的移动终端的身份标识对激活文件进行验证。若激活文件中携带的移动终端的身份标识是本移动终端的身份标识,则激活文件通过验证。若激活文件中携带的移动终端的身份标识不是本移动终端的身份标识,则激活文件未通过验证。当激活文件通过验证之后,激活模块2320根据激活文件携带的防盗模式标识确定不同的防盗模式。Before the receiving module 2330 receives the anti-theft command from the PC terminal, the activation module 2320 receives the activation file from the PC terminal carrying the identity of the mobile terminal and the anti-theft mode identifier. After receiving the activation file, the activation module 2320 verifies the activation file according to the identity of the mobile terminal carried in the activation file. If the identity of the mobile terminal carried in the activation file is the identity of the mobile terminal, the activation file passes the verification. If the identity of the mobile terminal carried in the activation file is not the identity of the mobile terminal, the activation file fails to pass the verification. After the activation file passes the verification, the activation module 2320 determines different anti-theft modes according to the anti-theft mode identification carried by the activation file.
根据不同防盗模式标识中包括的不同信息,能够将防盗模式标识分为仅包括随机字符串GUID的第一组防盗模式标识、包括GUID和PASSWORD的第二组防盗模式标识、仅包括UID的第三组防盗模式标识、包括GUID和UID的第四组防盗模式标识以及同时包括GUID、UID、PASSWORD三者的第五组防盗模式标识。现对五组不同的防盗模式标识及其作用分别进行说明。According to different information included in different anti-theft mode identifiers, the anti-theft mode identifier can be divided into a first group of anti-theft mode identifiers including only a random string GUID, a second group of anti-theft mode identifiers including GUID and PASSWORD, and a third including only UIDs. The group anti-theft mode identifier, the fourth group of anti-theft mode identifiers including the GUID and the UID, and the fifth group of anti-theft mode identifiers including the GUID, the UID, and the PASSWORD. Five different sets of anti-theft patterns and their roles are described separately.
当防盗模式标识为仅包括GUID的第一组防盗模式标识时,激活模块2320开启PC防盗策略,并根据接收到的防盗命令直接执行相应的防盗操作。其中,GUID为PC终端生成的随机字符串,并且该字符串能够与移动终端建立一一对应的绑定关系。When the anti-theft mode is identified as the first set of anti-theft mode identifiers including only the GUID, the activation module 2320 turns on the PC anti-theft policy, and directly performs the corresponding anti-theft operation according to the received anti-theft command. The GUID is a random string generated by the PC terminal, and the string can establish a one-to-one binding relationship with the mobile terminal.
当防盗模式标识为包括GUID和PASSWORD的第二组防盗模式标识时,激活模块2320开启PC防盗策略,并对PASSWORD是否正确进行验证。若是,则执行接收到的防盗命令对应的防盗操作。若否,则停止响应,不执行任何操作。其中,该PASSWORD为用户预先设置的密码,当该密码值不为空时,本发明实施例在执行防盗命令前,对该PASSWORD进行验证。When the anti-theft mode is identified as the second set of anti-theft mode identifiers including GUID and PASSWORD, the activation module 2320 turns on the PC anti-theft policy and verifies whether the PASSWORD is correct. If yes, the anti-theft operation corresponding to the received anti-theft command is executed. If no, the response is stopped and no action is taken. The PASSWORD is a password set by the user in advance. When the password value is not empty, the embodiment of the present invention verifies the PASSWORD before executing the anti-theft command.
当防盗模式标识为仅包括UID的第三组防盗模式标识时,激活模块2320开启账号防盗策略。其中,UID为用户登录账号名称为USERSNAME的账号之后生成的用于标识账号的账号标识符。 When the anti-theft mode is identified as a third set of anti-theft mode identification including only the UID, the activation module 2320 activates the account anti-theft policy. The UID is an account identifier that is generated after the user logs in to the account whose account name is USERSNAME is used to identify the account.
当防盗模式标识为包括UID以及GUID的第四组防盗模式标识时,激活模块2320开启PC防盗策略以及账号防盗策略,接收来自PC终端或者UID的防盗指令并执行相应的防盗操作。When the anti-theft mode is identified as the fourth set of anti-theft mode identifiers including the UID and the GUID, the activation module 2320 activates the PC anti-theft policy and the account anti-theft policy, receives the anti-theft command from the PC terminal or the UID, and performs a corresponding anti-theft operation.
当防盗模式标识为同时包括GUID、UID、PASSWORD三者的第五组防盗模式标识时,激活模块2320开启PC防盗策略以及账号防盗策略。并且,接收到来自PC终端或者UID的防盗命令时均需要首先对PASSWORD进行验证。其次,根据PASSWORD是否通过验证进行下一步操作。具体地,当通过时,本发明实施例执行接收到的防盗命令对应的防盗操作,当不通过时,本发明实施例停止响应,不执行任何操作。When the anti-theft mode is identified as the fifth group of anti-theft mode identifiers including GUID, UID, and PASSWORD, the activation module 2320 enables the PC anti-theft policy and the account anti-theft policy. Moreover, when receiving an anti-theft command from a PC terminal or UID, it is necessary to first verify PASSWORD. Second, proceed to the next step based on whether PASSWORD is verified. Specifically, when passing, the embodiment of the present invention performs the anti-theft operation corresponding to the received anti-theft command. When not, the embodiment of the present invention stops responding and does not perform any operation.
本发明实施例中,激活模块2320根据通过验证的激活文件中的防盗模式标识激活相应的防盗模式之后,触发与其耦合的接收模块2330。当接收模块2330接收到防盗指令之后,触发解析模块2340对防盗指令进行解析,得到防盗指令中携带的本移动终端的身份标识,并对其进行验证。若通过验证,则解析模块2340触发执行模块2350对该防盗命令对应的防盗操作进行执行,以实现移动终端防盗。若验证未通过,则停止响应,不执行任何操作。In the embodiment of the present invention, after the activation module 2320 activates the corresponding anti-theft mode according to the anti-theft mode identifier in the activated activation file, the receiving module 2330 coupled thereto is triggered. After the receiving module 2330 receives the anti-theft command, the trigger parsing module 2340 parses the anti-theft command, obtains the identity of the mobile terminal carried in the anti-theft command, and verifies the anti-theft command. If the verification is successful, the parsing module 2340 triggers the execution module 2350 to perform the anti-theft operation corresponding to the anti-theft command to implement the anti-theft of the mobile terminal. If the verification fails, the response is stopped and no action is taken.
在任一防盗命令被执行的过程中,与执行模块2350相耦合的轮询模块2360轮询查询该防盗命令是否执行成功,若是,则轮询模块2360触发执行模块2350结束该防盗命令的执行,若否,则轮询模块2360触发执行模块2350再次尝试执行该防盗命令。本发明实施例中,轮询模块2360对防盗命令的执行情况进行轮询查询保证移动终端获取到的防盗命令能够被及时执行,避免因防盗命令执行不及时导致偷盗者对移动终端进行刷机或者其他操作使得移动终端无法被找回。例如,本发明实施例即将执行锁定屏幕命令,对该锁定屏幕命令是否执行成功进行查询。若锁定屏幕命令未执行,则本发明实施例执行锁定屏幕命令,对移动终端的屏幕进行锁定。若锁定屏幕命令执行成功,则本发明实施例放弃再次执行该屏幕锁定命令。In the process of executing any anti-theft command, the polling module 2360 coupled with the executing module 2350 polls whether the anti-theft command is successfully executed, and if so, the polling module 2360 triggers the executing module 2350 to end the execution of the anti-theft command. If not, the polling module 2360 triggers the execution module 2350 to attempt to execute the anti-theft command again. In the embodiment of the present invention, the polling module 2360 performs a polling query on the execution of the anti-theft command to ensure that the anti-theft command acquired by the mobile terminal can be executed in time to prevent the thief from brushing the mobile terminal or other due to the untimely execution of the anti-theft command. The operation makes the mobile terminal unable to be retrieved. For example, the embodiment of the present invention will execute a lock screen command to query whether the lock screen command is successfully executed. If the lock screen command is not executed, the embodiment of the present invention executes a lock screen command to lock the screen of the mobile terminal. If the lock screen command is successfully executed, the embodiment of the present invention abandons the execution of the screen lock command again.
另外,如图23所示的移动终端防盗客户端所在的本移动终端通过与激活模块2320相耦合的接口2310与PC终端进行连接打通。本发明实施例中,接口2310能够通过有线或者无线方式将本移动终端与PC终端进行连接打通。例如,接口2310能够通过USB数据线与PC终端进行连接。再例如,接口2310能够通过蓝牙、无线网络等无线方式与PC终端进行连接。本发明实施例中,PC终端与接口2310能够通过有线或者无线方式进行连接并打通,方便PC终端以及移动终端通过多种方式或者手段进行连接并打通,进而能够通过PC对移动终端进行防盗,有效保证移动终端的安全性。In addition, the mobile terminal where the mobile terminal anti-theft client is located as shown in FIG. 23 is connected to the PC terminal through the interface 2310 coupled to the activation module 2320. In the embodiment of the present invention, the interface 2310 can connect the mobile terminal to the PC terminal by wire or wirelessly. For example, the interface 2310 can be connected to a PC terminal via a USB data line. For another example, the interface 2310 can be connected to a PC terminal via a wireless method such as Bluetooth or a wireless network. In the embodiment of the present invention, the PC terminal and the interface 2310 can be connected and opened through wired or wireless manner, so that the PC terminal and the mobile terminal can be connected and opened through various methods or means, thereby enabling the mobile terminal to perform anti-theft through the PC. Ensure the security of the mobile terminal.
根据上述任意一个优选实施例或多个优选实施例的组合,本发明实施例能够达到如下有益效果:According to any one of the preferred embodiments or the combination of the preferred embodiments, the embodiment of the present invention can achieve the following beneficial effects:
在本发明实施例中,接收来自PC终端的防盗指令,通过解析防盗指令获取防盗命令,并且根据防盗命令,能够执行对应的防盗操作。由此可见,本发明实施例中的防盗指令来自能够使用PC终端,在被盗移动终端未开启防盗功能的前提下,开启和使用移动终端的防盗功能。使用PC终端发送防盗指令,操作简单,从而能够方便快捷地实现移动终端 的防盗,并且能够提供完善的防盗功能对移动终端进行防盗,解决了现有技术中,移动终端被盗之后,无法继续对移动终端进行防盗的问题。本发明实施例在移动终端被盗之后,仍旧能够接收到发送方的防盗指令,并根据解析防盗指令获得的防盗命令执行防盗操作。例如,用户移动终端丢失之后,通过发送防盗指令至被盗移动终端,本发明实施例能够对被盗移动终端进行锁屏操作,阻止偷盗者使用移动终端。偷盗者无法使用移动终端导致偷盗者无法通过刷机等操作翻新移动终端,进而偷盗者无法将被盗移动终端转卖获得利润。进一步,能够有效降低偷窃犯罪发生的概率。另外,根据接收到的防盗指令,本发明实施例还可以获取偷盗者的身份标识信息(如偷盗者的照片、指纹等)。根据本发明实施例获取到偷盗者的身份标识信息之后,能够根据上述身份标识信息对偷盗者进行抓捕。因此,本发明实施例能够达到终端被盗之后有效对终端进行防盗,并且降低偷盗犯罪率、保护用户财产安全的有益效果。In the embodiment of the present invention, the anti-theft command from the PC terminal is received, the anti-theft command is obtained by parsing the anti-theft command, and the corresponding anti-theft operation can be performed according to the anti-theft command. It can be seen that the anti-theft command in the embodiment of the present invention comes from being able to use the PC terminal to open and use the anti-theft function of the mobile terminal on the premise that the stolen mobile terminal does not have the anti-theft function turned on. Using a PC terminal to send an anti-theft command, the operation is simple, so that the mobile terminal can be realized conveniently and quickly The anti-theft, and can provide a complete anti-theft function to burglar the mobile terminal, and solve the problem that the mobile terminal cannot continue to burglar the mobile terminal after the mobile terminal is stolen in the prior art. After the mobile terminal is stolen, the embodiment of the present invention can still receive the anti-theft instruction of the sender, and perform the anti-theft operation according to the anti-theft command obtained by analyzing the anti-theft instruction. For example, after the user mobile terminal is lost, by sending an anti-theft command to the stolen mobile terminal, the embodiment of the present invention can perform a lock screen operation on the stolen mobile terminal to prevent the thief from using the mobile terminal. The inability of the thief to use the mobile terminal causes the thief to fail to renovate the mobile terminal by brushing the machine, and the thief cannot resell the stolen mobile terminal for profit. Further, the probability of theft crime can be effectively reduced. In addition, according to the received anti-theft command, the embodiment of the present invention can also obtain the identity information of the thief (such as a photo of the thief, a fingerprint, etc.). After the identity information of the thief is obtained according to the embodiment of the present invention, the thief can be arrested according to the identity identification information. Therefore, the embodiment of the present invention can effectively prevent theft of the terminal after the terminal is stolen, and reduce the crime rate of theft and protect the security of the user property.
实施例五Embodiment 5
本发明实施例提供了又一种移动终端防盗方法。图24示出了根据本发明一个实施例的移动终端防盗方法的处理流程图。参见图24,该流程至少包括步骤S2402至步骤S2406。The embodiment of the invention provides another method for preventing theft of a mobile terminal. FIG. 24 is a flow chart showing the processing of the mobile terminal anti-theft method according to an embodiment of the present invention. Referring to FIG. 24, the flow includes at least steps S2402 through S2406.
步骤S2402、根据来自发送方的防盗指令确定发送方的身份信息。Step S2402: Determine identity information of the sender according to the anti-theft command from the sender.
步骤S2404、启动与发送方身份信息匹配的防盗策略解析防盗指令,得到该指令对应的防盗命令。Step S2404: Start an anti-theft policy that matches the identity information of the sender, and parse the anti-theft command to obtain an anti-theft command corresponding to the instruction.
步骤S2406、执行防盗命令对应的操作,以实现移动终端防盗。Step S2406: Perform an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
在本发明实施例中,能够根据来自发送方的防盗指令确定发送方的身份信息,启动与发送方身份信息匹配的防盗策略解析防盗指令,得到该指令对应的防盗命令,并且执行防盗命令对应的操作,以实现移动终端防盗。由此可见,本发明实施例中的防盗指令可以来自能够发送短信的设备或终端(如防盗指令的发送方为移动终端或者服务器或者个人电脑),还可以来自能够发送网络指令的设备或终端。目前能够发送短信或者网络指令的设备或终端很多(例如手机、电脑、平板等),并且通过短信或者网络指令发送防盗指令时效快、到达准,能够节省被盗移动终端的流量和电量消耗,为找回被盗移动终端提供更多时间,从而能够方便快捷地实现移动终端的防盗,解决了现有技术中,移动终端被盗之后,无法继续对移动终端进行防盗的问题。本发明实施例确定发送方的身份信息之后,启动与发送方身份信息匹配的防盗策略解析防盗指令,得到对应的防盗命令,保证能够根据用户需要选择适当的防盗策略对移动终端进行防盗保护。并且,本发明实施例中,根据发送方的身份信息可以匹配一种防盗策略对移动终端进行防盗保护,还可以匹配到多种防盗策略同时对移动终端进行防盗保护,增强移动终端的安全性。另外,本发明实施例中,移动终端被盗之后,仍旧能够接收到发送方的防盗指令,并根据解析防盗指令获得的防盗命令执行防盗操作。例如,用户移动终端丢失之后,通过发送防盗指令至被盗移动终端,本发明实施例能够对被盗移动终端进行锁屏操作,阻止偷盗者使用移动终端。偷盗者无法使用移动终端导致偷盗者无法通过刷机等操作翻新移动终 端,进而偷盗者无法将被盗移动终端转卖获得利润。进一步,能够有效降低偷窃犯罪发生的概率。另外,根据接收到的防盗指令,本发明实施例还可以获取偷盗者的身份标识信息(如偷盗者的照片、指纹等)。根据本发明实施例获取到偷盗者的身份标识信息之后,能够根据上述身份标识信息对偷盗者进行抓捕。因此,本发明实施例能够达到终端被盗之后有效对终端进行防盗,并且降低偷盗犯罪率、保护用户财产安全的有益效果。In the embodiment of the present invention, the identity information of the sender can be determined according to the anti-theft command from the sender, the anti-theft policy matching the sender identity information is activated to parse the anti-theft command, the anti-theft command corresponding to the instruction is obtained, and the anti-theft command is executed. Operation to achieve anti-theft of the mobile terminal. It can be seen that the anti-theft command in the embodiment of the present invention may be from a device or terminal capable of sending a short message (such as a sender of the anti-theft command being a mobile terminal or a server or a personal computer), or may be from a device or terminal capable of transmitting a network command. At present, there are many devices or terminals that can send SMS or network commands (such as mobile phones, computers, tablets, etc.), and the anti-theft command is sent quickly by SMS or network command, and the arrival time is accurate, which can save the traffic and power consumption of the stolen mobile terminal. Recovering the stolen mobile terminal to provide more time, so that the anti-theft of the mobile terminal can be realized conveniently and quickly, and solving the problem that the mobile terminal cannot continue to burglar the mobile terminal after the mobile terminal is stolen in the prior art. After determining the identity information of the sender, the embodiment of the present invention initiates an anti-theft policy that matches the identity information of the sender to parse the anti-theft command, and obtains a corresponding anti-theft command, so as to ensure that the anti-theft protection can be performed on the mobile terminal according to the user's need to select an appropriate anti-theft policy. Moreover, in the embodiment of the present invention, according to the identity information of the sender, an anti-theft policy can be matched to perform anti-theft protection on the mobile terminal, and multiple anti-theft policies can be matched to simultaneously protect the mobile terminal against theft, thereby enhancing the security of the mobile terminal. In addition, in the embodiment of the present invention, after the mobile terminal is stolen, the anti-theft command of the sender can still be received, and the anti-theft operation is performed according to the anti-theft command obtained by parsing the anti-theft command. For example, after the user mobile terminal is lost, by sending an anti-theft command to the stolen mobile terminal, the embodiment of the present invention can perform a lock screen operation on the stolen mobile terminal to prevent the thief from using the mobile terminal. The thief cannot use the mobile terminal, and the thief cannot operate the refurbishment mobile terminal by brushing the machine or the like. In turn, the thief cannot resell the stolen mobile terminal for profit. Further, the probability of theft crime can be effectively reduced. In addition, according to the received anti-theft command, the embodiment of the present invention can also obtain the identity information of the thief (such as a photo of the thief, a fingerprint, etc.). After the identity information of the thief is obtained according to the embodiment of the present invention, the thief can be arrested according to the identity identification information. Therefore, the embodiment of the present invention can effectively prevent theft of the terminal after the terminal is stolen, and reduce the crime rate of theft and protect the security of the user property.
执行如图24中的步骤S2402时,本发明实施例获取防盗指令中携带的特殊字符,根据该特殊字符确定发送方的身份信息。其中,特殊字符为特定的字符串。本发明实施例中,根据特殊字符确定的发送方的身份信息包括移动终端、服务器或者PC至少之一。当发送方为移动终端时,防盗指令的发送载体为短信。当发送方为服务器时,防盗指令的发送载体为短信和/或网络指令。当发送方为PC终端时,防盗指令的发送载体为短信和/或网络指令。可以看出,本发明实施例中,不论发送方为移动终端或者服务器或者PC终端时,防盗指令均可以以短信为载体进行发送。在接收已短信为载体的防盗指令之前,本发明实施例注册短信拦截功能。When the step S2402 in FIG. 24 is executed, the embodiment of the present invention obtains a special character carried in the anti-theft command, and determines the identity information of the sender according to the special character. Among them, special characters are specific strings. In the embodiment of the present invention, the identity information of the sender determined according to the special character includes at least one of a mobile terminal, a server, or a PC. When the sender is a mobile terminal, the sending carrier of the anti-theft command is a short message. When the sender is a server, the sending carrier of the anti-theft command is a short message and/or a network command. When the sender is a PC terminal, the sending carrier of the anti-theft command is a short message and/or a network command. It can be seen that, in the embodiment of the present invention, when the sender is a mobile terminal or a server or a PC terminal, the anti-theft command can be sent by using a short message as a carrier. Before receiving the anti-theft command that has been sent as a carrier, the embodiment of the present invention registers the short message interception function.
图25示出了根据本发明一个实施例的注册短信拦截功能的处理流程图。如图25中的步骤S2502所示,本发明实施例首先注册短信拦截功能。注册完成之后,本发明实施例执行步骤S2504,生成防盗指令与防盗命令对应的映射表。若以短信为防盗指令的发送载体,也可以称该映射表为“短信-命令表”,实施时可以根据该表查找并确定接收短信对应的防盗命令。该映射表中,防盗指令以及防盗命令形成对应关系。具体请参见实施例一中的相应介绍部分,在此不做赘述。Figure 25 is a flow chart showing the process of registering a short message interception function in accordance with one embodiment of the present invention. As shown in step S2502 in FIG. 25, the embodiment of the present invention first registers a short message interception function. After the registration is completed, the embodiment of the present invention executes step S2504 to generate a mapping table corresponding to the anti-theft command and the anti-theft command. If the short message is the sending carrier of the anti-theft command, the mapping table may also be referred to as a “sms-command table”, and the anti-theft command corresponding to the received short message may be found and determined according to the table. In the mapping table, the anti-theft command and the anti-theft command form a correspondence relationship. For details, refer to the corresponding introduction part in the first embodiment, and no further details are provided herein.
参见图25所示流程,步骤S2504执行完毕之后,执行步骤S2506,生成命令编号(ACTIONID)对应的映射表。该映射表中,命令编号与命令形成一一对应的映射关系。在生成该映射表时,还可以将被盗移动终端可识别的命令加入该映射。例如Bind对应账号防盗、PC防盗绑定时使用的命令,UnBind对应账号防盗、PC防盗解除绑定时使用的命令。生成该映射表之后,执行步骤S2508,向PC端公开读取文件的接口。在PC防盗策略中,需要公开能够被PC端直接调用的接口。Referring to the flow shown in FIG. 25, after the execution of step S2504 is completed, step S2506 is executed to generate a mapping table corresponding to the command number (ACTIONID). In the mapping table, the command number forms a one-to-one mapping relationship with the command. When the mapping table is generated, a command recognizable by the stolen mobile terminal can also be added to the mapping. For example, Bind corresponds to the account used for anti-theft and PC anti-theft binding, and UnBind corresponds to the command used when the account anti-theft and PC anti-theft are unbound. After the mapping table is generated, step S2508 is executed to disclose the interface for reading the file to the PC side. In the PC anti-theft strategy, it is necessary to disclose an interface that can be directly called by the PC.
短信拦截功能注册结束之后,根据图5所示的本发明一个实施例的短信接收处理方法的处理流程图执行操作。如图5所示,当本发明实施例所示出的接收到短信(即步骤)之后的处理流程图对该短信进行处理。本发明实施例判断接收到的短信是否携带有防盗指令。根据在图25中的步骤S2504中生成的防盗指令与防盗命令对应的映射表,本发明实施例查询接收到的短信中是否携带有该映射表中包含特殊字符的防盗指令。若含有特殊字符,则判断出接收的短信中携带有防盗指令,拦截该短信(通常也称吃掉短信)。进而获取短信中的防盗指令信息,并触发对发送方的身份信息进行确定的操作,流程结束。本发明实施例继续执行步骤。若未含有上述特殊字符,则判断出接收的短信中未携带有防盗指令,本发明实施例放行短信,流程结束。After the end of the short message interception function registration, the operation flowchart of the short message receiving processing method according to an embodiment of the present invention shown in FIG. 5 is performed. As shown in FIG. 5, the processing flow chart after receiving the short message (ie, step) shown in the embodiment of the present invention processes the short message. The embodiment of the invention determines whether the received short message carries an anti-theft instruction. According to the mapping table corresponding to the anti-theft command and the anti-theft command generated in step S2504 in FIG. 25, the embodiment of the present invention queries whether the received short message carries the anti-theft instruction including the special character in the mapping table. If there is a special character, it is judged that the received short message carries an anti-theft command and intercepts the short message (usually called eating the short message). Then, the anti-theft instruction information in the short message is obtained, and the operation of determining the identity information of the sender is triggered, and the process ends. The embodiment of the invention continues the steps. If the special character is not included, it is determined that the received short message does not carry the anti-theft command. In the embodiment of the present invention, the short message is released, and the process ends.
上文提及,本发明实施例能够运用的防盗策略至少包括三种,因此,在实际应用中,当防盗终端接收到防盗短信时,需要判断是根据何种防盗策略发出的防盗短信,进而能 够根据相应的防盗策略进行处理。图26示出了根据本发明一个实施例的判断防盗策略的方法的处理流程图。参见图26,该流程至少包括步骤S2602至步骤S2622。As mentioned above, the anti-theft strategy that can be used in the embodiments of the present invention includes at least three types. Therefore, in an actual application, when the anti-theft terminal receives the anti-theft SMS, it needs to determine which anti-theft SMS is issued according to the anti-theft policy, and thus It can be processed according to the corresponding anti-theft strategy. 26 shows a process flow diagram of a method of determining an anti-theft policy in accordance with one embodiment of the present invention. Referring to FIG. 26, the flow includes at least steps S2602 through S2622.
步骤S2602、移动终端接收到短信。Step S2602: The mobile terminal receives the short message.
步骤S2604、判断是否为短信防盗短信。若是,执行步骤S2606,若否,执行步骤S2610。Step S2604, determining whether it is a short message anti-theft SMS. If yes, go to step S2606, if no, go to step S2610.
步骤S2606、拦截短信,触发短信防盗策略。Step S2606, intercepting the short message, and triggering the SMS anti-theft strategy.
步骤S2608、执行短信防盗策略,流程结束。In step S2608, the SMS anti-theft strategy is executed, and the process ends.
步骤S2610、判断是否为账号防盗短信。若是,执行步骤S2612,若否,执行步骤S2616。Step S2610: Determine whether it is an account anti-theft SMS. If yes, go to step S2612, if no, go to step S2616.
步骤S2612、拦截短信,触发账号防盗策略。Step S2612, intercepting the short message, triggering the account anti-theft strategy.
步骤S2614、执行账号防盗策略,流程结束。In step S2614, the account anti-theft strategy is executed, and the process ends.
步骤S2616、判断是否为PC防盗短信。若是,执行步骤S2618,若否,执行步骤S2622。In step S2616, it is determined whether it is a PC anti-theft SMS. If yes, go to step S2618, if no, go to step S2622.
步骤S2618、拦截短信,触发PC防盗策略。Step S2618, intercepting the short message, triggering the PC anti-theft strategy.
步骤S2620、执行PC防盗策略,流程结束。In step S2620, the PC anti-theft strategy is executed, and the process ends.
步骤S2622、放行短信,流程结束。In step S2622, the short message is released, and the process ends.
本发明实施例中,当判断接收到的短信中未携带有防盗指令时,放行短信,能够降低偷盗者的警惕性,有利于找回被盗终端,抓获偷盗者。例如,当用户的移动终端丢失之后,若偷盗者在被盗移动终端中看到移动终端能够接收到短信,认为移动终端并未被锁定,并未开启防盗功能。另外,本发明实施例将携带有防盗指令的短信拦截,使其无法显示在移动终端的系统中,而是在后台根据短信中携带的防盗指令进行防盗操作。偷盗者无法发现移动终端已开启防盗功能,并执行相应防盗操作,如上报移动终端的实时位置甚至上报偷盗者的指纹等操作。因此,本发明实施例能够降低偷盗者的警惕性,增大被盗移动终端找回的可能性,进而有效遏制偷盗犯罪的发生,保护用户的财产安全。In the embodiment of the present invention, when it is determined that the received short message does not carry the anti-theft command, releasing the short message can reduce the vigilance of the thief, and is beneficial for recovering the stolen terminal and capturing the thief. For example, after the user's mobile terminal is lost, if the thief sees that the mobile terminal can receive the short message in the stolen mobile terminal, the mobile terminal is considered not to be locked, and the anti-theft function is not turned on. In addition, the embodiment of the present invention intercepts the short message carrying the anti-theft command so that it cannot be displayed in the system of the mobile terminal, but performs the anti-theft operation according to the anti-theft instruction carried in the short message in the background. The thief cannot find that the mobile terminal has turned on the anti-theft function, and performs the corresponding anti-theft operation, such as reporting the real-time location of the mobile terminal and even reporting the fingerprint of the thief. Therefore, the embodiment of the invention can reduce the vigilance of the thief and increase the possibility of the stolen mobile terminal retrieving, thereby effectively curbing the occurrence of theft crime and protecting the user's property security.
根据图26所示流程确定当前启动的防盗策略后,继续执行图24中的步骤S2404,启动与发送方身份信息匹配的防盗策略解析防盗指令,得到该指令对应的防盗命令。上文提及,本发明实施例中,防盗策略包括三种,相应的发送方根据防盗策略不同而不同,例如,防盗策略为短信防盗策略时,发送方为移动终端,防盗策略为账号防盗策略时,发送方为服务器或PC终端,防盗策略为PC防盗策略时,发送方为PC终端。现根据发送方的不同(即对应不同的防盗策略)对本发明实施例的移动终端防盗方法分别进行介绍。After determining the currently activated anti-theft policy according to the flow shown in FIG. 26, step S2404 in FIG. 24 is continued, and the anti-theft policy matching the sender identity information is started to parse the anti-theft command, and the anti-theft command corresponding to the instruction is obtained. As mentioned above, in the embodiment of the present invention, the anti-theft policy includes three types, and the corresponding sender differs according to the anti-theft policy. For example, when the anti-theft policy is the SMS anti-theft policy, the sender is the mobile terminal, and the anti-theft policy is the account anti-theft strategy. When the sender is a server or a PC terminal, and the anti-theft policy is a PC anti-theft policy, the sender is a PC terminal. The mobile terminal anti-theft method according to the embodiment of the present invention is separately introduced according to different senders (ie, corresponding different anti-theft policies).
首先介绍当发送方为移动终端时,本发明实施例提供的移动终端防盗方法。当发送方为移动终端时,与移动终端匹配的防盗策略为短信防盗策略,防盗指令以短信为载体发送。The mobile terminal anti-theft method provided by the embodiment of the present invention is first introduced when the sender is a mobile terminal. When the sender is a mobile terminal, the anti-theft policy matched with the mobile terminal is a short message anti-theft policy, and the anti-theft command is sent by using the short message as a carrier.
当接收到的短信中携带有防盗指令时,本发明实施例获取短信中的防盗指令信息,并触发确定或验证发送方身份信息操作。本发明实施例对防盗指令进行解析,得到发送该防盗指令的发送方的验证码。得到验证码之后,本发明实施例继续对得到的验证码与 移动终端预存的验证码进行匹配,并根据匹配结果确定是否获取防盗指令对应的防盗命令。若得到的验证码与移动终端预存的可信任的移动终端标识和/或密码匹配,则获取防盗命令。若得到的验证码与移动终端预存的可信任的移动终端标识和/或密码不匹配,为避免接收到恶意发送端发送的防盗指令导致对移动终端执行错误的防盗操作,本发明实施例忽略该防盗命令。When the received short message carries the anti-theft command, the embodiment of the present invention acquires the anti-theft instruction information in the short message, and triggers the operation of determining or verifying the sender identity information. In the embodiment of the present invention, the anti-theft instruction is parsed, and the verification code of the sender that sends the anti-theft instruction is obtained. After obtaining the verification code, the embodiment of the present invention continues to obtain the verification code and The verification code pre-stored by the mobile terminal is matched, and according to the matching result, it is determined whether to obtain the anti-theft command corresponding to the anti-theft instruction. If the obtained verification code matches the trusted mobile terminal identifier and/or password pre-stored by the mobile terminal, the anti-theft command is obtained. If the obtained verification code does not match the trusted mobile terminal identifier and/or password pre-stored by the mobile terminal, in order to avoid receiving the anti-theft command sent by the malicious sender, the erroneous anti-theft operation is performed on the mobile terminal, and the embodiment of the present invention ignores the Anti-theft command.
本发明实施例中,验证码可以是发送方的移动终端标识和/或证明发送方可信任的密码。其中,发送方的移动终端标识包括发送方的电话号码、发送方的SIM卡号以及发送方的IMEI至少任意之一。证明发送方可信任的密码可以是发送方的移动终端标识、预先设置的证明发送方可信任的字符串至少任意之一。例如,可以将数字与字母的任意组合设置为证明发送方可信任的字符串。如,ac1088206、A34TFAK6808等。还可以将用户的姓名或者用户的生日、宠物的生日设置为证明发送方可信任的密码等等。In the embodiment of the present invention, the verification code may be the sender's mobile terminal identifier and/or the password that the sender can trust. The sender's mobile terminal identifier includes at least one of a sender's phone number, a sender's SIM card number, and a sender's IMEI. The password that proves that the sender can trust may be at least one of the sender's mobile terminal identifier and a pre-set string that the sender can trust. For example, any combination of numbers and letters can be set to a string that proves that the sender can trust. For example, ac1088206, A34TFAK6808, etc. It is also possible to set the name of the user or the birthday of the user, the birthday of the pet as a password to prove that the sender can trust, and the like.
需要说明的是,本优选实施例中,为方便称呼,将可信任的移动终端标识和/或密码统称为密码,将可信任的移动终端标识称为亲友号码。预先存储可信任的移动终端标识和/或密码的方法的处理流程图请参见图6。如上文所述的存储可信任的移动终端标识和/或密码的方法,本发明实施例还可以通过设置可信任的移动终端标识和/或密码为空将已存储的可信任的移动终端标识和/或密码删除。例如,本发明实施例能够按照如图6所示的流程,将亲友号码、短信防盗密码设置为空,并在点击“开启密码”栏以关闭密码功能。删除可信任的移动终端标识和/或密码之后,本发明实施例还可以选择注销防盗功能。It should be noted that, in the preferred embodiment, the trusted mobile terminal identifier and/or password are collectively referred to as a password, and the trusted mobile terminal identifier is referred to as a relative friend number. See Figure 6 for a process flow diagram of a method of pre-storing a trusted mobile terminal identity and/or password. The method for storing the trusted mobile terminal identifier and/or password is as described above. In this embodiment of the present invention, the trusted mobile terminal identifier and the stored trusted mobile terminal may be set by setting the trusted mobile terminal identifier and/or the password to be empty. / or password is deleted. For example, the embodiment of the present invention can set the family friend number and the SMS anti-theft password to be empty according to the flow shown in FIG. 6, and click the “open password” column to turn off the password function. After the trusted mobile terminal identifier and/or password is deleted, the embodiment of the present invention may also select the logout anti-theft function.
如上文所述,本发明实施例对防盗指令进行解析时获取验证码,确定防盗指令是否加密。若防盗指令为加密防盗指令,则本发明实施例采用相应的解密手段对防盗指令进行解密,并采用相应的解密手段对验证码进行解密,获取解密后的验证码并进行匹配。As described above, the embodiment of the present invention obtains a verification code when parsing the anti-theft instruction, and determines whether the anti-theft instruction is encrypted. If the anti-theft command is an encrypted anti-theft command, the embodiment of the present invention decrypts the anti-theft instruction by using a corresponding decryption means, and decrypts the verification code by using a corresponding decryption means, and obtains the decrypted verification code and performs matching.
当本发明实施例根据预先存储的验证码对防盗指令中携带的验证码进行匹配之后,若发送方的验证码与移动终端的验证码能够匹配,则解析防盗指令以得到对应的防盗命令。获取到防盗命令之后,执行如图24所示的步骤S2406,执行防盗命令对应的操作,以实现移动终端防盗。After the verification code carried in the anti-theft command is matched according to the pre-stored verification code, if the verification code of the sender and the verification code of the mobile terminal can match, the anti-theft command is parsed to obtain the corresponding anti-theft command. After the anti-theft command is obtained, step S2406 shown in FIG. 24 is executed, and the operation corresponding to the anti-theft command is executed to implement the anti-theft of the mobile terminal.
在任一防盗命令被执行的过程中,本发明实施例轮询查询该命令是否执行成功,对命令执行情况进行轮询查询的处理流程图请参见图7。本发明实施例中,对防盗命令的执行情况进行轮询查询保证移动终端获取到的防盗命令能够被及时执行,避免因防盗命令执行不及时导致偷盗者对移动终端进行刷机或者其他操作使得移动终端无法被找回。例如,本发明实施例即将执行锁定屏幕命令,对该锁定屏幕命令是否执行成功进行查询。若锁定屏幕命令未执行,则本发明实施例执行锁定屏幕命令,对移动终端的屏幕进行锁定。若锁定屏幕命令执行成功,则本发明实施例放弃再次执行该屏幕锁定命令。In the process in which any anti-theft command is executed, the embodiment of the present invention polls whether the command is successfully executed, and the flowchart of the process of polling the command execution is shown in FIG. 7. In the embodiment of the present invention, the polling query is performed on the execution of the anti-theft command to ensure that the anti-theft command acquired by the mobile terminal can be executed in time, so as to prevent the thief from brushing or other operations on the mobile terminal due to the untimely execution of the anti-theft command. Can't be retrieved. For example, the embodiment of the present invention will execute a lock screen command to query whether the lock screen command is successfully executed. If the lock screen command is not executed, the embodiment of the present invention executes a lock screen command to lock the screen of the mobile terminal. If the lock screen command is successfully executed, the embodiment of the present invention abandons the execution of the screen lock command again.
当接收到的防盗命令执行完毕之后,本发明实施例将执行结果作为回执返回防盗指令的发送方,提醒发送方防盗指令已执行。发送方收到该回执之后,能够继续下一步防盗操作。另外,若防盗指令发送方在指定时间内未收到回执,则本发明实施例发起轮询查询,查询回执是否成功。查询回执的方法的处理流程图请参见图8。 After the received anti-theft command is executed, the embodiment of the present invention returns the execution result as a sender to the sender of the anti-theft command, and reminds the sender that the anti-theft command has been executed. After receiving the receipt, the sender can continue the next anti-theft operation. In addition, if the anti-theft command sender does not receive the receipt within the specified time, the embodiment of the present invention initiates a polling query to check whether the receipt is successful. See Figure 8 for the process flow of the method for querying receipts.
现以具体实施例对本发明的移动终端防盗方法(发送方为移动终端)进行说明。The mobile terminal anti-theft method (the sender is a mobile terminal) of the present invention will now be described by way of a specific embodiment.
需要说明的是,为将本优选实施例阐述得更加明白简单,本优选实施例中,将发送方设置于亲友手机,将移动终端设置于被盗手机。It should be noted that, in order to make the preferred embodiment more clear and simple, in the preferred embodiment, the sender is set to the mobile phone of the relatives and friends, and the mobile terminal is set to the stolen mobile phone.
根据本发明一个优选实施例提供了采用短信防盗策略的移动终端防盗方法的处理流程图,具体流程参见图9。According to a preferred embodiment of the present invention, a processing flowchart of a mobile terminal anti-theft method using a short message anti-theft policy is provided. For the specific process, refer to FIG. 9.
现分别从亲友手机侧以及被盗手机侧介绍本优选实施例的移动终端防盗方法的处理流程。The processing flow of the mobile terminal anti-theft method of the preferred embodiment is introduced from the mobile phone side of the relatives and friends and the stolen mobile phone side respectively.
请注意,在此以亲友手机代表防盗指令发送方,根据本发明公开的内容,本领域技术人员可以理解,防盗指令发送方不止可以使亲友手机,而可以是任何其他可以发送短信的通信设备,通过验证在防盗指令中包含的密码来验证该发送方的身份是否合法,本发明不限于此。Please note that the sender and the whistle-selling sender are represented by the family and friends mobile phone. According to the disclosure of the present invention, those skilled in the art can understand that the burglar-proof command sender can not only make the friends and relatives mobile phone, but can be any other communication device that can send short messages. The authenticity of the sender is verified by verifying the password contained in the anti-theft command, and the present invention is not limited thereto.
其中,从亲友手机侧出发,本发明一个实施例提供的亲友手机侧的移动终端防盗方法的处理流程图参见图10。The process flow of the mobile terminal anti-theft method on the mobile phone side of the relatives and friends provided by one embodiment of the present invention is shown in FIG. 10 .
当手机被盗之后,本实施例通过亲友手机编辑并发送防盗短信至被盗手机。在编辑防盗短信时,若防盗短信中的防盗命令为一些简单操作,如“锁定手机屏幕”,则本实施例可以通过编辑特殊的防盗短信直接进行发送。若防盗短信中的防盗命令为一些安全要求较高的防盗命令,如“删除手机数据”、“备份手机数据”等,则本实施例首先对即将发送的防盗短信进行加密。其次,将经过加密处理的防盗短信发送至被盗手机。After the mobile phone is stolen, the embodiment edits and sends the anti-theft SMS to the stolen mobile phone through the mobile phone of the relatives and friends. When editing the anti-theft SMS, if the anti-theft command in the anti-theft SMS is a simple operation, such as “locking the mobile phone screen”, the embodiment can directly transmit by editing the special anti-theft short message. If the anti-theft command in the anti-theft SMS is some anti-theft commands with high security requirements, such as "delete mobile phone data", "backup mobile phone data", etc., this embodiment first encrypts the anti-theft SMS to be sent. Second, the encrypted anti-theft SMS is sent to the stolen phone.
本实施例对即将发送的防盗短信进行加密处理时,首先拼接特殊标记。在上文提及的包含特殊字符以及防盗指令的映射中存在步骤S1002中拼接的特殊标记。并且,在该映射中,存在专门用于加密的特殊标记。例如,该映射中,同时存在“Dingwei#”以及“Dingwei#E”,两者对应的防盗命令均为Locate命令。但“Dingwei#”表示未加密的防盗指令,“Dingwei#E”标识加密的防盗命令。In this embodiment, when the burglaring short message to be sent is encrypted, the special mark is first spliced. There is a special mark stitched in step S1002 in the above-mentioned map containing special characters and anti-theft instructions. Also, in this mapping, there are special tags dedicated to encryption. For example, in the mapping, both "Dingwei#" and "Dingwei#E" exist, and the corresponding anti-theft commands are all Locate commands. However, "Dingwei#" indicates an unencrypted anti-theft command, and "Dingwei#E" identifies an encrypted anti-theft command.
之后,本实施例继续执行步骤S1004,对其余内容进行加密。例如,“Dingwei#E1380013800”中,“Dingwei#E”后面的数字表示验证码,即被盗手机预先存储的密码或者亲友号码等。步骤S1004对该密码或者亲友号码进行加密处理。加密处理之后,得到“DingweiE#ac35e5b301”。其中,需要说明的是,本发明实施例中展示的防盗指令中的字母及数字仅用作示例,不能代表真实的密码或者亲友号码的数字位数或者加密后的防盗指令的真实显示。对防盗短信进行加密之后,本实施例执行步骤S1006,发送防盗短信至被盗手机,流程结束。After that, the embodiment continues to perform step S1004 to encrypt the remaining content. For example, in "Dingwei#E1380013800", the number after "Dingwei#E" indicates the verification code, that is, the password or the number of friends and relatives pre-stored by the stolen mobile phone. Step S1004 performs encryption processing on the password or the relative friend number. After the encryption process, "DingweiE#ac35e5b301" is obtained. It should be noted that the letters and numbers in the anti-theft command shown in the embodiment of the present invention are only used as examples, and cannot represent the real digits of the real password or the number of friends and relatives or the actual display of the encrypted anti-theft command. After encrypting the anti-theft SMS, the embodiment proceeds to step S1006 to send the anti-theft SMS to the stolen mobile phone, and the process ends.
亲友手机发送防盗短信至被盗手机之后,被盗手机对接收到的防盗短信进行处理。从被盗手机侧出发,本发明一个实施例提供了被盗手机一侧的移动终端防盗方法的处理流程图,如图11所示。After the relatives and friends send the anti-theft SMS to the stolen mobile phone, the stolen mobile phone processes the received anti-theft SMS. Starting from the stolen mobile phone side, an embodiment of the present invention provides a processing flowchart of the mobile terminal anti-theft method on the side of the stolen mobile phone, as shown in FIG.
其次介绍当发送方为服务器时,本发明实施例提供了另一种移动终端防盗方法。当发送方为服务器时,与服务器匹配的防盗策略为账号防盗策略,防盗指令以短信和/或网络指令为载体发送。 Secondly, when the sender is a server, the embodiment of the present invention provides another method for preventing theft of the mobile terminal. When the sender is a server, the anti-theft policy matched with the server is an account anti-theft policy, and the anti-theft command is sent by using a short message and/or a network instruction as a carrier.
当发送方为服务器时,本发明实施例接收来自服务器的防盗指令。其中,防盗指令格式可以只包括特殊字符,还可以既包括特殊字符,还包括除特殊字符之外的其他标识信息。本发明实施例中,防盗指令可以包括特殊字符、已激活账户标识、防盗命令、防盗对象标识。中的至少一项。优选地,本发明实施例中,特殊字符为Account,用来确定防盗策略的标识,该标识确定之后,不会发生改变。已激活账户标识为当前登录时为该账户生成的唯一的UID。防盗命令包括命令编号(ACTIONID)和/或任务编号(TASKID),其中,通过ACTIONID能够在包含防盗指令与防盗命令的对应表中查找到对应的命令。TASKID为防盗指令发送时,在服务器中生成的对应的任务编号,通过该TASKID能够在服务器中对该TASKID对应的防盗命令的执行情况进行查询。另外,当该防盗指令为首次发起时,TASKID为0。防盗对象标识可以包括本移动终端的IMEI,还可以包括能够唯一标识本移动终端的其他身份标识。综上,本发明实施例中,防盗指令的格式可以设置为:When the sender is a server, the embodiment of the present invention receives an anti-theft instruction from the server. The anti-theft instruction format may include only special characters, and may include both special characters and other identification information except special characters. In the embodiment of the present invention, the anti-theft instruction may include a special character, an activated account identifier, an anti-theft command, and an anti-theft object identifier. At least one of them. Preferably, in the embodiment of the present invention, the special character is Account, which is used to determine the identifier of the anti-theft policy. After the identifier is determined, no change occurs. The activated account ID is the unique UID generated for the account at the time of login. The anti-theft command includes a command number (ACTIONID) and/or a task number (TASKID), wherein the corresponding command can be found in the correspondence table including the anti-theft command and the anti-theft command by the ACTIONID. TASKID is a corresponding task number generated in the server when the anti-theft command is transmitted, and the TASKID can query the execution status of the anti-theft command corresponding to the TASKID in the server. In addition, when the anti-theft command is initiated for the first time, the TASKID is 0. The anti-theft object identifier may include the IMEI of the mobile terminal, and may also include other identity identifiers that can uniquely identify the mobile terminal. In summary, in the embodiment of the present invention, the format of the anti-theft instruction can be set as:
[Accout]<UID>,<IMEI>,<ACTIONID>,<TASKID>,<OTHERS>[Accout]<UID>,<IMEI>,<ACTIONID>,<TASKID>,<OTHERS>
其中,OTHERS为与防盗指令相关的附加信息。例如,Erase指令的信息为指定删除移动终端系统中哪部分的数据(如删除系统内的短信数据或者记事本数据或者应用的聊天记录数据等)。再例如,TakePhoto的附加信息可以是对拍摄照片的清晰度的要求。Among them, OTHERS is additional information related to the anti-theft command. For example, the information of the Erase command is to specify which part of the data in the mobile terminal system is deleted (for example, deleting the short message data or the notebook data in the system or the chat data of the application, etc.). As another example, the additional information of TakePhoto can be a requirement for the clarity of the captured photo.
例如,终端锁定指令的格式为:[Accout]200868996,323450296939291,LOCK,2000000,0。For example, the format of the terminal lock instruction is: [Accout] 200868996, 323450296939291, LOCK, 2000000, 0.
需要说明的是,本发明实施例中提及的代表UID、IMEI以及TASKID的数字仅用作示例,不能代表真实运用中代表UID、IMEI以及TASKID的数字的位数及组合。It should be noted that the numbers representing UID, IMEI, and TASKID mentioned in the embodiments of the present invention are only used as an example, and cannot represent the number of bits and combinations of numbers representing UID, IMEI, and TASKID in real use.
接收到防盗指令之后,本发明实施例根据账号防盗策略对防盗指令进行解析。在对防盗指令进行解析操作时,本发明实施例确定防盗指令是否被加密。若防盗指令为加密防盗指令,则本发明实施例采用相应的解密手段对防盗指令进行解密。本发明实施例中,防盗指令可以是通过任意加密算法被加密,本发明实施例在对防盗指令进行解析时采用相应的解密手段对防盗指令进行解密,本发明实施例对此并不加以限定。加解密方式请参见实施例二相应介绍部分,在此不做赘述。After receiving the anti-theft command, the embodiment of the present invention parses the anti-theft command according to the account anti-theft policy. In the case of performing an analysis operation on the anti-theft instruction, the embodiment of the present invention determines whether the anti-theft instruction is encrypted. If the anti-theft command is an encrypted anti-theft command, the embodiment of the present invention decrypts the anti-theft command by using a corresponding decryption means. In the embodiment of the present invention, the anti-theft instruction may be encrypted by any encryption algorithm. In the embodiment of the present invention, the anti-theft instruction is decrypted by using a corresponding decryption method when parsing the anti-theft instruction, which is not limited by the embodiment of the present invention. For the encryption and decryption mode, refer to the corresponding introduction part of the second embodiment, and no further details are provided here.
上文对本发明实施例接收到的防盗指令进行了介绍,本发明实施例在接收防盗指令之前,需要在本移动终端启动防盗功能。本发明一个实施例提供了开启防盗功能的方法的处理流程图,具体请参见图14。The anti-theft command received by the embodiment of the present invention is described above. Before receiving the anti-theft command, the embodiment of the present invention needs to activate the anti-theft function in the mobile terminal. One embodiment of the present invention provides a processing flowchart of a method for turning on the anti-theft function. For details, please refer to FIG. 14.
本发明一个实施例还提供了解除绑定的方法,其处理流程图参见图15。An embodiment of the present invention also provides a method for unbinding, and a processing flowchart thereof is shown in FIG. 15.
另外,解除绑定成功并删除已激活账户的账户信息以及防盗记录之后,本发明实施例能够注销防盗功能。In addition, after the binding is successfully cancelled and the account information of the activated account and the anti-theft record are deleted, the embodiment of the present invention can cancel the anti-theft function.
上文介绍了本发明实施例中开启防盗功能以及注销防盗功能的处理流程。当移动终端丢失之后,本发明实施例首先对已激活账户在能够触发移动终端防盗的客户端中进行登录。优选地,本发明实施例中,能够触发移动终端防盗的客户端可以是浏览器,可以是手机侧带有手机防盗功能的客户端(例如手机卫士),还可以是PC侧带有手机防盗功 能的客户端(例如安全卫士)等,本发明实施例对此并不加以限定。本发明实施例中,已激活账户登录之后,能够以短信和/或网络指令为载体发送防盗指令,保证移动终端丢失之后,能够通过常用发送方及时发送防盗指令对丢失的移动终端进行防盗。其中,若已激活账户以短信为载体发送防盗指令,则本发明实施例中,移动终端接收到短信之后,首先判断短信中是否携带有防盗指令,若是,拦截该短信,并触发解析防盗指令操作。若否,则放行该短信。The process flow of opening the anti-theft function and deregistering the anti-theft function in the embodiment of the present invention is described above. After the mobile terminal is lost, the embodiment of the present invention first logs in the activated account in the client that can trigger the theft prevention of the mobile terminal. Preferably, in the embodiment of the present invention, the client capable of triggering theft prevention of the mobile terminal may be a browser, and may be a client with a mobile phone anti-theft function on the mobile phone side (for example, a mobile guard), or may have a mobile phone anti-theft function on the PC side. The embodiments of the present invention are not limited by the embodiments of the present invention. In the embodiment of the present invention, after the account is activated, the anti-theft command can be sent by using the short message and/or the network command as the carrier to ensure that the mobile terminal can be burglarized by sending the anti-theft command in time through the common sender. In the embodiment of the present invention, after the mobile terminal receives the short message, the mobile terminal first determines whether the short message carries the anti-theft command, and if so, intercepts the short message and triggers the analysis of the anti-theft command operation. . If not, release the message.
本发明实施例判断短信中携带有防盗指令之后,拦截该短信(通常也称吃掉短信),其功能描述请参见实施例二相应介绍部分。The embodiment of the present invention determines that the short message is carried in the short message, and then intercepts the short message (usually referred to as eating the short message). For the function description, refer to the corresponding introduction part of the second embodiment.
如上文所述,移动终端丢失之后,对已激活账户进行登陆,并接收已激活账户以短信和/或网络为载体发送的防盗指令。具体地,在已激活账户中存在存储有与激活账户绑定的至少一个移动终端的标识的设备列表。本发明实施例在已激活账户的设备列表中选择进行防盗操作的本移动终端,并由已激活账户将针对本移动终端的防盗指令发送至服务器。例如,发送“获取设备列表”指令至服务器,该“获取设备列表”指令中,ACTIONID为GET_LIST,TASKID为0,OTHERS为空。服务器返回该账户对应的设备列表。其中,设备列表中包含能够唯一标识移动终端的身份标识信息(如IMEI或者UID等)以及移动终端的电话号码等信息。已激活账户在设备列表中选取指定的移动终端,并将针对该移动终端的防盗指令发送至服务器,由服务器转发至该移动终端。As described above, after the mobile terminal is lost, the activated account is logged in, and the anti-theft command sent by the activated account with the short message and/or the network as the carrier is received. Specifically, there is a device list in the activated account in which the identity of at least one mobile terminal bound to the activation account is stored. In the embodiment of the present invention, the mobile terminal that performs the anti-theft operation is selected in the device list of the activated account, and the anti-theft command for the mobile terminal is sent to the server by the activated account. For example, the "Get Device List" command is sent to the server. In the "Get Device List" command, ACTIONID is GET_LIST, TASKID is 0, and OTHERS is empty. The server returns a list of devices corresponding to the account. The device list includes information such as identity information (such as IMEI or UID) of the mobile terminal and a phone number of the mobile terminal. The activated account selects the specified mobile terminal in the device list, and sends an anti-theft command to the mobile terminal to the server, which is forwarded by the server to the mobile terminal.
另外,若进行防盗操作的本移动终端的标识未存储于设备列表中,由已激活账户输入本移动终端的标识,将该输入的本移动终端的标识添加至已激活账户的设备列表中。并且,选择本移动终端对应的防盗操作通过服务器发送至本移动终端。In addition, if the identity of the mobile terminal performing the theft prevention operation is not stored in the device list, the identifier of the mobile terminal is input from the activated account, and the input identifier of the mobile terminal is added to the device list of the activated account. And, the anti-theft operation corresponding to the mobile terminal is selected and sent to the mobile terminal by the server.
本移动终端接收到防盗指令之后,解析防盗指令得到防盗命令,进而根据防盗命令执行防盗操作。本发明实施例中,当任一防盗命令被执行的过程中,轮询查询该防盗命令是否执行成功,若是,则结束该防盗命令的执行,若否,则再次尝试执行该防盗命令。After receiving the anti-theft command, the mobile terminal parses the anti-theft command to obtain an anti-theft command, and then performs an anti-theft operation according to the anti-theft command. In the embodiment of the present invention, when any anti-theft command is executed, polling queries whether the anti-theft command is successfully executed, and if so, ends the execution of the anti-theft command, and if not, attempts to execute the anti-theft command again.
本发明实施例中,对防盗命令的执行情况进行轮询查询保证移动终端获取到的防盗命令能够被及时执行,避免因防盗命令执行不及时导致偷盗者对移动终端进行刷机或者其他操作使得移动终端无法被找回。例如,本发明实施例即将执行锁定屏幕命令,对该锁定屏幕命令是否执行成功进行查询。若锁定屏幕命令未执行,则本发明实施例执行锁定屏幕命令,对移动终端的屏幕进行锁定。若锁定屏幕命令执行成功,则本发明实施例放弃再次执行该屏幕锁定命令。In the embodiment of the present invention, the polling query is performed on the execution of the anti-theft command to ensure that the anti-theft command acquired by the mobile terminal can be executed in time, so as to prevent the thief from brushing or other operations on the mobile terminal due to the untimely execution of the anti-theft command. Can't be retrieved. For example, the embodiment of the present invention will execute a lock screen command to query whether the lock screen command is successfully executed. If the lock screen command is not executed, the embodiment of the present invention executes a lock screen command to lock the screen of the mobile terminal. If the lock screen command is successfully executed, the embodiment of the present invention abandons the execution of the screen lock command again.
当接收到的防盗命令执行完毕之后,本发明实施例将执行结果作为回执返回服务器,提醒服务器已执行。服务器收到该回执之后,能够继续下一步防盗操作。另外,若服务器在指定时间内未收到回执,则本发明实施例发起轮询查询,查询回执是否成功。本发明一个实施例提供了查询回执的方法的处理流程图,具体参见图8。After the execution of the received anti-theft command is completed, the embodiment of the present invention returns the execution result as a receipt to the server, and reminds the server that the execution has been performed. After the server receives the receipt, it can continue the next anti-theft operation. In addition, if the server does not receive the receipt within the specified time, the embodiment of the present invention initiates a polling query to check whether the receipt is successful. One embodiment of the present invention provides a processing flowchart of a method for querying a receipt, which is specifically shown in FIG. 8.
图示出了根据本发明一个优选实施例的还提供了采用账号防盗策略的移动终端防盗方法的处理流程图,具体请参见图16。The figure shows a processing flowchart of a mobile terminal anti-theft method using an account anti-theft policy according to a preferred embodiment of the present invention. For details, please refer to FIG. 16.
本发明一个实施例提供了已激活账户一侧发送防盗指令的处理流程图,具体请参见 图17。相对应的,本发明一个实施例提供了移动终端一侧防盗的方法处理流程图,具体请参见图18。An embodiment of the present invention provides a process flow for sending an anti-theft command on the side of an activated account. For details, see Figure 17. Correspondingly, an embodiment of the present invention provides a processing flowchart of a method for preventing theft on the side of the mobile terminal. For details, please refer to FIG. 18.
最后介绍当发送方为PC终端时,本发明实施例提供的移动终端防盗方法。当发送方为PC终端时,与服务器匹配的防盗策略为PC防盗策略或者账号防盗策略,防盗指令以短信和/或网络指令为载体发送。Finally, a mobile terminal anti-theft method provided by an embodiment of the present invention is provided when the sender is a PC terminal. When the sender is a PC terminal, the anti-theft policy matched with the server is a PC anti-theft policy or an account anti-theft policy, and the anti-theft command is sent by using a short message and/or a network command as a carrier.
当发送为PC终端时,接收来自PC终端的防盗指令之前,接收来自PC终端的、携带有本移动终端的身份标识以及防盗模式标识的激活文件。激活文件的介绍部分请参见实施例四。When transmitting as a PC terminal, before receiving the anti-theft command from the PC terminal, the activation file carrying the identity of the mobile terminal and the anti-theft mode identifier from the PC terminal is received. See Example 4 for an introduction to the activation file.
因防盗模式有多样性,防盗模式标识也相应存在多种。反过来说,可以根据不同防盗模式标识中包括的不同信息,区分不同防盗模式。本发明实施例中提供不同的防盗模式标识的例证参见实施例四。Due to the variety of anti-theft modes, there are various types of anti-theft mode identification. Conversely, different anti-theft modes can be distinguished according to different information included in different anti-theft mode identifiers. For an example of providing different anti-theft mode identifications in the embodiments of the present invention, refer to Embodiment 4.
如上文所述,根据PC终端发送的激活文件中携带的防盗模式标识的不同,本发明实施例能够激活不同的防盗模式。即,在通过PC终端对移动终端进行防盗操作时,通过PC终端可以触发一种防盗策略向移动终端发送防盗命令,还可以触发多种防盗策略同时向移动终端发送防盗命令。例如,当激活文件中的防盗模式标识为仅包含UID或者仅包含GUID时,本发明实施例能够分别仅进行账号防盗策略或者仅进行PC防盗策略。当激活文件中的防盗模式标识为同时包括UID以及GUID时,本发明实施例能够同时进行PC防盗以及账号防盗,增强对移动终端的防盗保护,增大找回移动终端的可能性。本发明实施例中,PC防盗包括通过PC终端发送防盗指令至移动终端对移动终端进行防盗,还包括激活账号对移动终端进行账号防盗。当PC终端激活账号对移动终端进行账号防盗时,PC终端仅将账号信息发送至作为登录方的移动终端中。其中,本发明实施例中,PC防盗策略与账号防盗策略的不同之处及相应处理方法请参见实施例四。As described above, the embodiment of the present invention can activate different anti-theft modes according to different types of anti-theft mode identifiers carried in the activation file sent by the PC terminal. That is, when the mobile terminal performs the anti-theft operation through the PC terminal, the anti-theft policy can be triggered by the PC terminal to send the anti-theft command to the mobile terminal, and multiple anti-theft policies can be triggered to simultaneously send the anti-theft command to the mobile terminal. For example, when the anti-theft mode identifier in the activation file is only included in the UID or only the GUID, the embodiment of the present invention can perform only the account anti-theft policy or only the PC anti-theft policy. When the anti-theft mode identifier in the activation file is included to include both the UID and the GUID, the embodiment of the present invention can simultaneously perform PC anti-theft and account anti-theft, enhance the anti-theft protection to the mobile terminal, and increase the possibility of retrieving the mobile terminal. In the embodiment of the present invention, the PC anti-theft includes sending an anti-theft command to the mobile terminal through the PC terminal to perform anti-theft on the mobile terminal, and further including an activation account to perform account anti-theft on the mobile terminal. When the PC terminal activates the account to perform account theft prevention on the mobile terminal, the PC terminal only transmits the account information to the mobile terminal as the login party. For the difference between the PC anti-theft policy and the account anti-theft strategy and the corresponding processing method, refer to Embodiment 4 in the embodiment of the present invention.
另外,本发明实施例中,可以对PASSWORD进行个性化设置。若用户设置PASSWORD,在执行防盗操作之前,对该PASSWORD进行验证,能够避免恶意终端发送防盗指令导致移动终端错误执行防盗操作(如恶意锁屏、泄露实时位置信息等)导致恶劣的后果。用户也可以根据需要不进行PASSWORD的设置,直接通过PC或账户进行移动终端防盗,避免步骤繁琐。不需PASSWORD验证通常用于可信任的网络环境或者常用可信任终端,如家里电脑、办公室电脑等设备。In addition, in the embodiment of the present invention, the PASSWORD can be personalized. If the user sets PASSWORD, the PASSWORD is verified before the anti-theft operation is performed, which can prevent the malicious terminal from sending an anti-theft command, causing the mobile terminal to perform an anti-theft operation (such as malicious lock screen, leaking real-time location information, etc.), which causes bad consequences. Users can also perform PASSWORD settings as needed, and directly perform mobile terminal anti-theft through PC or account, avoiding cumbersome steps. No need for PASSWORD authentication is usually used in trusted network environments or commonly used trusted terminals, such as home computers, office computers and other devices.
本发明实施例中,根据通过验证的激活文件中的防盗模式标识激活相应的防盗模式之后,接收来自PC终端的防盗指令。接收到之后,对接收到的防盗指令进行解析,得到防盗指令中携带的本移动终端的身份标识。得到防盗指令中携带的本移动终端的身份标识之后,本发明实施例对身份标识进行验证。若验证通过,则执行防盗命令对应的操作,以实现移动终端防盗。若验证未通过,则本发明实施例停止响应,不执行任何操作。In the embodiment of the present invention, after the corresponding anti-theft mode is activated according to the anti-theft mode identifier in the activated activation file, the anti-theft instruction from the PC terminal is received. After receiving, the received anti-theft command is parsed to obtain the identity of the mobile terminal carried in the anti-theft command. After obtaining the identity of the mobile terminal carried in the anti-theft command, the embodiment of the present invention verifies the identity identifier. If the verification is passed, the operation corresponding to the anti-theft command is executed to implement the anti-theft of the mobile terminal. If the verification fails, the embodiment of the present invention stops responding and does not perform any operation.
本发明实施例中,在任一防盗命令被执行的过程中,轮询查询该防盗命令是否执行成功,若是,则结束该防盗命令的执行,若否,则再次尝试执行该防盗命令。本发明实施例中,对防盗命令的执行情况进行轮询查询保证移动终端获取到的防盗命令能够被及 时执行,避免因防盗命令执行不及时导致偷盗者对移动终端进行刷机或者其他操作使得移动终端无法被找回。例如,本发明实施例即将执行锁定屏幕命令,对该锁定屏幕命令是否执行成功进行查询。若锁定屏幕命令未执行,则本发明实施例执行锁定屏幕命令,对移动终端的屏幕进行锁定。若锁定屏幕命令执行成功,则本发明实施例放弃再次执行该屏幕锁定命令。In the embodiment of the present invention, in the process of executing any anti-theft command, polling whether the anti-theft command is successfully executed, if yes, ending the execution of the anti-theft command, and if not, attempting to execute the anti-theft command again. In the embodiment of the present invention, a polling query is performed on the execution of the anti-theft command to ensure that the anti-theft command acquired by the mobile terminal can be The execution is performed to avoid that the thief does not promptly perform the flashing of the mobile terminal or other operations caused by the burglary command, so that the mobile terminal cannot be retrieved. For example, the embodiment of the present invention will execute a lock screen command to query whether the lock screen command is successfully executed. If the lock screen command is not executed, the embodiment of the present invention executes a lock screen command to lock the screen of the mobile terminal. If the lock screen command is successfully executed, the embodiment of the present invention abandons the execution of the screen lock command again.
本发明实施例中,移动终端的身份标识可以是SIM卡号,可以是移动终端的硬件配置信息等任意能够唯一标识移动终端的身份标识信息。优选地,本发明实施例采用移动终端的IMEI号码作为本移动终端的身份标识,IMEI号码本身与移动终端是终身绑定且唯一不变,并且可识别性高,因此,本发明实施例中,优选IMEI为本移动终端的唯一身份标识。In the embodiment of the present invention, the identity of the mobile terminal may be a SIM card number, and may be any identity identification information that can uniquely identify the mobile terminal, such as hardware configuration information of the mobile terminal. Preferably, the embodiment of the present invention adopts the IMEI number of the mobile terminal as the identity of the mobile terminal, and the IMEI number itself is permanently bound to the mobile terminal and is unique and has high recognizability. Therefore, in the embodiment of the present invention, Preferably, the IMEI is a unique identity of the mobile terminal.
另外,本发明实施例中,PC终端与本移动终端能够通过有线或者无线方式连接打通。例如,PC终端与本移动终端能够通过通用串行总线(Universal Serial Bus,以下简称USB)数据线进行连接。再例如,PC终端与本移动终端能够通过蓝牙、无线网络等无线方式进行连接。本发明实施例中,PC终端与本移动终端能够通过有线或者无线方式进行连接并打通,方便PC终端以及移动终端通过多种方式或者手段进行连接并打通,进而能够通过PC终端对移动终端进行防盗,有效保证移动终端的安全性。In addition, in the embodiment of the present invention, the PC terminal and the mobile terminal can be connected through a wired or wireless connection. For example, the PC terminal and the mobile terminal can be connected through a Universal Serial Bus (USB) data line. For another example, the PC terminal and the mobile terminal can be connected by wireless means such as Bluetooth or a wireless network. In the embodiment of the present invention, the PC terminal and the mobile terminal can be connected and opened through wired or wireless manner, so that the PC terminal and the mobile terminal can be connected and opened through various methods or means, thereby being able to perform anti-theft on the mobile terminal through the PC terminal. To effectively ensure the security of the mobile terminal.
现以具体实施例对本发明的移动终端防盗方法(发送方为PC终端)进行说明。The mobile terminal anti-theft method (the sender is a PC terminal) of the present invention will now be described by way of a specific embodiment.
本发明一个实施例提供了PC终端一侧的激活手机防盗功能的方法的处理流程图,具体流程图参见图21。相应的,本发明一个实施例还提供了手机一侧的防盗方法的处理流程图,具体流程图参见图22。One embodiment of the present invention provides a processing flowchart of a method for activating a mobile phone anti-theft function on a PC terminal side. For a specific flowchart, refer to FIG. 21. Correspondingly, an embodiment of the present invention further provides a processing flowchart of the anti-theft method on the mobile phone side. For a specific flowchart, refer to FIG. 22.
上文详细介绍了本发明实施例中,当发送方分别为移动终端、服务器以及PC终端时,本发明实施例的移动防盗方法的处理流程。其中,在对防盗命令执行完毕之后,本发明实施例均发送回执至防盗指令发送方。当不确定发送方身份时,防盗命令执行完毕之后,首先判断回执类型,其次,根据回执类型的不同,尝试回执次数不同。例如,当执行PC防盗策略时,通过网络发送回执至PC终端,本法实施了可以设置尝试发送10次回执至PC终端。当执行短信防盗策略时,本发明实施例直接发送回执至移动终端。为避免引起偷盗者的警惕性,减少回执发送次数至5次。当执行账号防盗策略时,为减少消耗短信条数,本发明实施例通过网络发送回执至服务器,若尝试多次发送(如8次),仍旧发送失败,则尝试以短信为载体发送回执至移动终端,如可以设置尝试次数为2次。The processing flow of the mobile anti-theft method according to the embodiment of the present invention is described in detail in the embodiment of the present invention, when the sender is a mobile terminal, a server, and a PC terminal. After the execution of the anti-theft command is completed, the embodiment of the present invention sends a receipt to the anti-theft command sender. When the identity of the sender is not determined, after the execution of the anti-theft command is completed, the type of receipt is first determined, and secondly, the number of attempts to return is different according to the type of receipt. For example, when the PC anti-theft policy is executed, the receipt is sent to the PC terminal through the network, and the method is implemented to set an attempt to send 10 receipts to the PC terminal. When the SMS anti-theft policy is executed, the embodiment of the present invention directly sends a receipt to the mobile terminal. In order to avoid the vigilance of the thief, reduce the number of receipts sent to 5 times. When the account anti-theft policy is executed, in order to reduce the number of consumed SMS messages, the embodiment of the present invention sends a receipt to the server through the network. If the transmission is attempted multiple times (for example, 8 times), the transmission still fails, and then the message is sent as a carrier to send the receipt to the mobile device. Terminal, if you can set the number of attempts to 2 times.
在对移动终端进行防盗保护时,本发明实施例可以仅使用短信防盗策略、账户防盗策略以及PC防盗策略中的一种对移动终端进行防盗保护,还可以同时使用上述三种防盗策略中的任意两种或者同时使用三种防盗策略对移动终端进行防盗保护。因此,在任一防盗命令被执行的过程中,本发明实施例轮询查询该命令是否执行成功。图27示出了根据本发明一个实施例的对命令执行情况进行互斥查询的处理流程图。如图27所示,本发明实施例即将执行命令时,执行图27中的步骤S2702,判断即将执行的防盗命令是否正在执行。若根据判断结果,该防盗命令未执行,则执行步骤S2706,执行该防盗命令, 流程结束。若根据判断结果,该防盗命令正在执行,则执行步骤S2704。步骤S2704中,判断若该防盗命令被同时执行两次或两次以上是否互斥。若互斥,则执行步骤S2708,执行防盗命令失败,流程结束。若不互斥,则执行步骤S2706,执行该防盗命令,流程结束。When the mobile terminal is protected against theft, the embodiment of the present invention can use only one of the SMS anti-theft policy, the account anti-theft policy, and the PC anti-theft strategy to protect the mobile terminal against theft, and can simultaneously use any of the above three anti-theft strategies. The mobile terminal is protected against theft by two or three anti-theft strategies. Therefore, in the process in which any anti-theft command is executed, the embodiment of the present invention polls whether the command is successfully executed. FIG. 27 is a flow chart showing a process of mutually exclusive querying a command execution situation according to an embodiment of the present invention. As shown in FIG. 27, when the command is executed in the embodiment of the present invention, step S2702 in FIG. 27 is executed to determine whether the anti-theft command to be executed is being executed. If the anti-theft command is not executed according to the judgment result, step S2706 is executed to execute the anti-theft command. The process ends. If the anti-theft command is being executed according to the judgment result, step S2704 is performed. In step S2704, it is determined whether the anti-theft command is executed twice or more twice or not. If they are mutually exclusive, step S2708 is executed, the execution of the anti-theft command fails, and the process ends. If they are not mutually exclusive, step S2706 is executed to execute the anti-theft command, and the process ends.
本发明实施例中,对防盗命令的执行情况进行轮询查询保证移动终端获取到的防盗命令能够被及时执行,避免因防盗命令执行不及时导致偷盗者对移动终端进行刷机或者其他操作使得移动终端无法被找回。例如,本发明实施例即将执行锁定屏幕命令,对该锁定屏幕命令是否正在执行进行查询。若锁定屏幕命令未执行,则本发明实施例执行锁定屏幕命令,对移动终端的屏幕进行锁定。若锁定屏幕命令正在执行,并且移动终端屏幕无法被锁定多次,即可以判断锁定屏幕执行两次及两次以上是互斥的,则本发明实施例放弃执行该屏幕锁定命令。再例如,本发明实施例即将执行对解锁者拍照取证命令,则对该命令是否正在执行拍照取证命令进行判断。若根据判断结果,该命令未执行,则本发明实施例执行拍照取证命令。若根据判断结果,该命令正在执行,并且拍照取证命令能够被执行两次或者两次以上,并不互斥,则本发明实施例继续执行该拍照取证命令。In the embodiment of the present invention, the polling query is performed on the execution of the anti-theft command to ensure that the anti-theft command acquired by the mobile terminal can be executed in time, so as to prevent the thief from brushing or other operations on the mobile terminal due to the untimely execution of the anti-theft command. Can't be retrieved. For example, an embodiment of the present invention is about to execute a lock screen command to query whether the lock screen command is being executed. If the lock screen command is not executed, the embodiment of the present invention executes a lock screen command to lock the screen of the mobile terminal. If the lock screen command is being executed and the mobile terminal screen cannot be locked multiple times, that is, it can be judged that the lock screen is executed twice and two times or more are mutually exclusive, the embodiment of the present invention abandons the execution of the screen lock command. For example, in the embodiment of the present invention, a photo forensic command for the unlocker is to be executed, and then whether the command is executing the photo forensic command is determined. If the command is not executed according to the judgment result, the embodiment of the present invention executes the photo forensic command. If the command is being executed according to the judgment result, and the photo forensic command can be executed twice or more, and is not mutually exclusive, the embodiment of the present invention continues to execute the photo forensic command.
基于上文各优选实施例提供的移动终端防盗方法,基于同一发明构思,本发明实施例提供一种移动终端防盗客户端,用于实现上述移动终端防盗方法。Based on the mobile terminal anti-theft method provided by the above preferred embodiments, the embodiment of the present invention provides a mobile terminal anti-theft client for implementing the above-mentioned mobile terminal anti-theft method.
图28示出了根据本发明一个实施例的移动终端防盗客户端的结构示意图。参见图28,本发明实施例的客户端至少包括:确定模块2820、解析模块2840以及执行模块2850。FIG. 28 is a schematic structural diagram of a mobile terminal anti-theft client according to an embodiment of the present invention. Referring to FIG. 28, the client of the embodiment of the present invention includes at least a determining module 2820, a parsing module 2840, and an executing module 2850.
现介绍本发明实施例的移动终端防盗客户端的各器件或组成的功能以及各部分间的连接关系:The functions of each device or component of the anti-theft client of the mobile terminal and the connection relationship between the parts of the mobile terminal of the embodiment of the present invention are introduced:
确定模块2820,配置为根据来自发送方的防盗指令确定发送方的身份信息。The determining module 2820 is configured to determine the identity information of the sender based on the anti-theft command from the sender.
解析模块2840,与确定模块2820相耦合,配置为启动与发送方身份信息匹配的防盗策略解析防盗指令,得到该指令对应的防盗命令。The parsing module 2840 is coupled to the determining module 2820 and configured to initiate an anti-theft policy that matches the sender identity information to parse the anti-theft command, and obtain an anti-theft command corresponding to the command.
执行模块2850,与解析模块2840相耦合,配置为执行防盗命令对应的操作,以实现移动终端防盗。The execution module 2850 is coupled to the parsing module 2840 and configured to perform an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
在一个优选实施例中,确定模块2820还配置为:In a preferred embodiment, the determining module 2820 is further configured to:
获取防盗指令中携带的特殊字符,其中,特殊字符为特定的字符串;Obtain special characters carried in the anti-theft command, wherein the special characters are specific strings;
根据特殊字符确定发送方的身份信息。The sender's identity information is determined based on the special characters.
在一个优选实施例中,发送方的身份信息包括下列至少之一:In a preferred embodiment, the identity information of the sender includes at least one of the following:
发送方为移动终端;The sender is a mobile terminal;
发送方为服务器;The sender is the server;
发送方为个人电脑PC终端。The sender is a personal computer PC terminal.
在一个优选实施例中,还包括判断模块2810,配置为:In a preferred embodiment, the determining module 2810 is further configured to:
分别接收到身份信息不同的发送方发送的防盗指令时,判断在后接收的防盗指令解析出的防盗命令是否与在前接收的防盗指令解析出的防盗命令互斥;When receiving the anti-theft command sent by the sender with different identity information, it is determined whether the anti-theft command parsed by the anti-theft command received later is mutually exclusive with the anti-theft command parsed by the previously received anti-theft command;
若是,则拒绝执行后一防盗命令; If yes, refuse to execute the latter anti-theft command;
若否,则继续执行后一防盗命令。If no, continue to execute the latter anti-theft command.
在一个优选实施例中,还包括:In a preferred embodiment, the method further includes:
发送方为移动终端时,匹配的防盗策略为短信防盗策略;When the sender is a mobile terminal, the matched anti-theft policy is a short message anti-theft strategy;
发送方为服务器时,匹配的防盗策略为账号防盗策略;When the sender is a server, the matching anti-theft policy is an account anti-theft policy;
发送方为PC终端时,匹配的防盗策略为PC防盗策略或者账号防盗策略。When the sender is a PC terminal, the matching anti-theft policy is a PC anti-theft policy or an account anti-theft policy.
在一个优选实施例中,还包括:In a preferred embodiment, the method further includes:
发送方为移动终端时,防盗指令的发送载体为短信;When the sender is a mobile terminal, the sending carrier of the anti-theft command is a short message;
发送方为服务器时,防盗指令的发送载体为:短信和/或网络指令;When the sender is a server, the sending carrier of the anti-theft command is: a short message and/or a network command;
发送方为PC终端时,防盗指令的发送载体为:短信和/或网络指令。When the sender is a PC terminal, the sending carrier of the anti-theft command is: short message and/or network command.
在一个优选实施例中,判断模块2810还配置为:In a preferred embodiment, the determining module 2810 is further configured to:
利用短信作为防盗指令的发送载体时,在确定发送方的身份信息之前,判断收到的短信是否携带有防盗指令;When the short message is used as the sending carrier of the anti-theft command, before determining the identity information of the sender, it is determined whether the received short message carries the anti-theft command;
若是,则拦截该短信,获取防盗指令并触发发送方的身份信息确定操作;If yes, intercepting the short message, obtaining an anti-theft command and triggering the identity information determination operation of the sender;
若否,则放行该短信。If not, release the message.
在一个优选实施例中,解析模块2840还配置为:发送方为移动终端时,In a preferred embodiment, the parsing module 2840 is further configured to: when the sender is a mobile terminal,
启动短信防盗策略解析防盗指令,得到发送方的移动终端标识和/或密码;The SMS anti-theft policy is started to parse the anti-theft command, and the sender's mobile terminal identifier and/or password is obtained;
将得到的发送方的移动终端标识与本移动终端预存的可信任移动终端标识进行匹配,和/或,将得到的密码与本移动终端预存的密码进行匹配;Matching the obtained mobile terminal identifier of the sender with the trusted mobile terminal identifier pre-stored by the mobile terminal, and/or matching the obtained password with the password pre-stored by the mobile terminal;
若两者能够匹配,则解析获得该指令对应的防盗命令。If the two can match, the parsing obtains the anti-theft command corresponding to the instruction.
在一个优选实施例中,发送方的移动终端标识包括下列至少之一:发送方的电话号码、发送方的用户识别模块SIM卡号、发送方的国际移动设备身份识别码IMEI。In a preferred embodiment, the sender's mobile terminal identity includes at least one of: a sender's phone number, a sender's subscriber identity module SIM card number, and a sender's international mobile device identity code IMEI.
在一个优选实施例中,本移动终端预存的密码包括下列至少之一:In a preferred embodiment, the password pre-stored by the mobile terminal includes at least one of the following:
发送方的移动终端标识;The sender's mobile terminal identity;
预先设置的证明发送方身份的字符串。A pre-set string that proves the identity of the sender.
在一个优选实施例中,发送方为服务器时,防盗指令由已激活账户发送至服务器,由服务器转发至本移动终端,触发防盗操作。In a preferred embodiment, when the sender is a server, the anti-theft command is sent to the server by the activated account, and the server forwards to the mobile terminal to trigger the anti-theft operation.
在一个优选实施例中,已激活账户在能够触发移动终端防盗的客户端中登录,其中,客户端包括下列至少之一:浏览器、手机侧带有手机防盗功能的客户端、PC侧带有手机防盗功能的客户端。In a preferred embodiment, the activated account is logged in a client capable of triggering theft prevention of the mobile terminal, wherein the client comprises at least one of the following: a browser, a client with a mobile phone anti-theft function on the mobile phone side, and a PC side The client of the mobile phone anti-theft function.
在一个优选实施例中,确定模块2820还配置为接收所述服务器转发的、已激活账户通过短信和/或网络指令发送的防盗指令。In a preferred embodiment, the determination module 2820 is further configured to receive an anti-theft instruction forwarded by the server, the activated account is sent via a short message and/or a network command.
在一个优选实施例中,短信和/或网络指令的内容除包括特殊字符外,还包括下列至少之一:已激活账户标识、防盗命令、防盗对象标识。In a preferred embodiment, the content of the short message and/or network command includes at least one of the following: in addition to the special character: the activated account identifier, the anti-theft command, and the anti-theft object identifier.
在一个优选实施例中,还包括:In a preferred embodiment, the method further includes:
特殊字符为Account;The special character is Account;
已激活账户标识为当前登录时为该账户生成的唯一的账号识别码UID; The activated account identifier is the unique account identifier UID generated for the account at the time of current login;
防盗命令包括命令编号和/或任务编号;The anti-theft command includes a command number and/or a task number;
防盗对象标识包括本移动终端的IMEI。The anti-theft object identifier includes the IMEI of the mobile terminal.
在一个优选实施例中,还包括:In a preferred embodiment, the method further includes:
激活模块2860,配置为发送方为PC终端时,启动与发送方身份信息匹配的防盗策略解析防盗指令之前,接收来自PC终端的激活文件;其中,激活文件携带有本移动终端的身份标识以及防盗模式标识;The activation module 2860 is configured to receive an activation file from the PC terminal before the anti-theft policy that matches the identity information of the sender is activated, and the activation file carries the identity of the mobile terminal and the anti-theft. Pattern identification
根据身份标识对所述激活文件进行验证;Verifying the activation file according to the identity identifier;
若验证通过,根据防盗模式标识激活不同的防盗模式。If the verification is passed, different anti-theft modes are activated according to the anti-theft mode identification.
在一个优选实施例中,激活模块还配置为:In a preferred embodiment, the activation module is further configured to:
若防盗模式标识为PC防盗模式标识,则激活PC防盗策略;If the anti-theft mode identifier is a PC anti-theft mode identifier, the PC anti-theft policy is activated;
若防盗模式标识为账号防盗模式标识,则激活账号防盗策略。If the anti-theft mode is identified as the account anti-theft mode identifier, the account anti-theft policy is activated.
在一个优选实施例中,防盗模式标识包括下列至少之一:In a preferred embodiment, the anti-theft mode identification includes at least one of the following:
PC终端生成的、与本移动终端一一对应的随机字符串GUID;a random character string GUID generated by the PC terminal corresponding to the mobile terminal;
用户登录账号后生成的用于标识账号的账号标识符UID,其中,UID的用户登录的账号名称为USERNAME;The account identifier UID generated by the user after logging in to the account for identifying the account, wherein the account name of the UID user login is USERNAME;
密码PASSWORD。Password PASSWORD.
在一个优选实施例中,激活模块2860还配置为:In a preferred embodiment, the activation module 2860 is further configured to:
若防盗模式标识仅包括GUID时,激活PC防盗策略,直接执行防盗命令对应的操作;If the anti-theft mode identifier includes only the GUID, the PC anti-theft policy is activated, and the operation corresponding to the anti-theft command is directly executed;
若防盗模式标识包括GUID和PASSWORD时,激活PC防盗策略,验证PASSWROD是否正确;若是,则执行防盗命令对应的操作;若否,则停止响应;If the anti-theft mode identifier includes the GUID and the PASSWORD, the PC anti-theft policy is activated to verify whether the PASSWROD is correct; if yes, the operation corresponding to the anti-theft command is executed; if not, the response is stopped;
若防盗模式标识包括UID时,激活账号防盗策略,在本移动终端中登录USERNAME,接收来自UID的防盗命令并执行对应的操作;If the anti-theft mode identifier includes the UID, activate the account anti-theft policy, log in to the USERNAME in the mobile terminal, receive the anti-theft command from the UID, and perform the corresponding operation;
若防盗模式标识包括GUID和UID时,激活PC防盗策略以及账号防盗策略,接收来自PC终端或者UID的防盗命令并执行对应的操作;If the anti-theft mode identifier includes the GUID and the UID, the PC anti-theft policy and the account anti-theft policy are activated, and the anti-theft command from the PC terminal or the UID is received and the corresponding operation is performed;
若防盗模式标识包括GUID、UID和PASSWORD,激活PC防盗策略以及账号防盗策略,接收到来自PC终端或者UID的防盗命令均对PASSWORD进行验证;若验证通过,则执行接收的防盗命令对应的操作;若验证不通知,则停止响应。If the anti-theft mode identifier includes the GUID, the UID, and the PASSWORD, the PC anti-theft policy and the account anti-theft policy are activated, and the anti-theft command from the PC terminal or the UID is authenticated to the PASSWORD; if the verification is passed, the corresponding operation of the received anti-theft command is performed; If the verification is not notified, the response is stopped.
在一个优选实施例中,还包括:In a preferred embodiment, the method further includes:
解密模块2830,配置为防盗命令中除特殊字符外的内容为加密内容时,采用相应的解密手段对接收的防盗指令进行解密,获取防盗指令的可解析内容。The decryption module 2830 is configured to decrypt the received anti-theft command by using a corresponding decryption means when the content of the anti-theft command is encrypted content, and obtain the parsable content of the anti-theft command.
在一个优选实施例中,加密方式为DES加密,解密方式为DES解密。In a preferred embodiment, the encryption mode is DES encryption and the decryption mode is DES decryption.
在一个优选实施例中,加密的防盗指令包括以下至少一项:In a preferred embodiment, the encrypted anti-theft command comprises at least one of the following:
删除手机数据指令;Delete the mobile phone data command;
备份手机数据指令。Back up your phone data instructions.
在一个优选实施例中,还包括:In a preferred embodiment, the method further includes:
轮询模块2870,配置为当任一防盗命令进行执行时,轮询查询其是否执行成功; The polling module 2870 is configured to poll the query for success if any of the anti-theft commands are executed;
若是,则结束该防盗命令的执行;If yes, the execution of the anti-theft command is ended;
若否,则再次尝试执行该防盗命令。If not, try again to execute the anti-theft command.
在一个优选实施例中,轮询模块2870还配置为:若在指定时间内未收到被请求方的回执,则轮询查询是否回执成功;In a preferred embodiment, the polling module 2870 is further configured to: if the receipt of the requested party is not received within the specified time, polling whether the query is successful;
若是,则结束回执查询;If yes, the receipt of the receipt is completed;
若否,则再次请求回执。If no, request a return receipt again.
根据上述任意一个优选实施例或多个优选实施例的组合,本发明实施例能够达到如下有益效果:According to any one of the preferred embodiments or the combination of the preferred embodiments, the embodiment of the present invention can achieve the following beneficial effects:
在本发明实施例中,能够根据来自发送方的防盗指令确定发送方的身份信息,启动与发送方身份信息匹配的防盗策略解析防盗指令,得到该指令对应的防盗命令,并且执行防盗命令对应的操作,以实现移动终端防盗。由此可见,本发明实施例中的防盗指令可以来自能够发送短信的设备或终端(如防盗指令的发送方为移动终端或者服务器或者个人电脑),还可以来自能够发送网络指令的设备或终端。目前能够发送短信或者网络指令的设备或终端很多(例如手机、电脑、平板等),并且通过短信或者网络指令发送防盗指令时效快、到达准,能够节省被盗移动终端的流量和电量消耗,为找回被盗移动终端提供更多时间,从而能够方便快捷地实现移动终端的防盗,解决了现有技术中,移动终端被盗之后,无法继续对移动终端进行防盗的问题。本发明实施例确定发送方的身份信息之后,启动与发送方身份信息匹配的防盗策略解析防盗指令,得到对应的防盗命令,保证能够根据用户需要选择适当的防盗策略对移动终端进行防盗保护。并且,本发明实施例中,根据发送方的身份信息可以匹配一种防盗策略对移动终端进行防盗保护,还可以匹配到多种防盗策略同时对移动终端进行防盗保护,增强移动终端的安全性。另外,本发明实施例中,移动终端被盗之后,仍旧能够接收到发送方的防盗指令,并根据解析防盗指令获得的防盗命令执行防盗操作。例如,用户移动终端丢失之后,通过发送防盗指令至被盗移动终端,本发明实施例能够对被盗移动终端进行锁屏操作,阻止偷盗者使用移动终端。偷盗者无法使用移动终端导致偷盗者无法通过刷机等操作翻新移动终端,进而偷盗者无法将被盗移动终端转卖获得利润。进一步,能够有效降低偷窃犯罪发生的概率。另外,根据接收到的防盗指令,本发明实施例还可以获取偷盗者的身份标识信息(如偷盗者的照片、指纹等)。根据本发明实施例获取到偷盗者的身份标识信息之后,能够根据上述身份标识信息对偷盗者进行抓捕。因此,本发明实施例能够达到终端被盗之后有效对终端进行防盗,并且降低偷盗犯罪率、保护用户财产安全的有益效果。In the embodiment of the present invention, the identity information of the sender can be determined according to the anti-theft command from the sender, the anti-theft policy matching the sender identity information is activated to parse the anti-theft command, the anti-theft command corresponding to the instruction is obtained, and the anti-theft command is executed. Operation to achieve anti-theft of the mobile terminal. It can be seen that the anti-theft command in the embodiment of the present invention may be from a device or terminal capable of sending a short message (such as a sender of the anti-theft command being a mobile terminal or a server or a personal computer), or may be from a device or terminal capable of transmitting a network command. At present, there are many devices or terminals that can send SMS or network commands (such as mobile phones, computers, tablets, etc.), and the anti-theft command is sent quickly by SMS or network command, and the arrival time is accurate, which can save the traffic and power consumption of the stolen mobile terminal. Recovering the stolen mobile terminal to provide more time, so that the anti-theft of the mobile terminal can be realized conveniently and quickly, and solving the problem that the mobile terminal cannot continue to burglar the mobile terminal after the mobile terminal is stolen in the prior art. After determining the identity information of the sender, the embodiment of the present invention initiates an anti-theft policy that matches the identity information of the sender to parse the anti-theft command, and obtains a corresponding anti-theft command, so as to ensure that the anti-theft protection can be performed on the mobile terminal according to the user's need to select an appropriate anti-theft policy. Moreover, in the embodiment of the present invention, according to the identity information of the sender, an anti-theft policy can be matched to perform anti-theft protection on the mobile terminal, and multiple anti-theft policies can be matched to simultaneously protect the mobile terminal against theft, thereby enhancing the security of the mobile terminal. In addition, in the embodiment of the present invention, after the mobile terminal is stolen, the anti-theft command of the sender can still be received, and the anti-theft operation is performed according to the anti-theft command obtained by parsing the anti-theft command. For example, after the user mobile terminal is lost, by sending an anti-theft command to the stolen mobile terminal, the embodiment of the present invention can perform a lock screen operation on the stolen mobile terminal to prevent the thief from using the mobile terminal. The inability of the thief to use the mobile terminal causes the thief to fail to renovate the mobile terminal by brushing the machine, and the thief cannot resell the stolen mobile terminal for profit. Further, the probability of theft crime can be effectively reduced. In addition, according to the received anti-theft command, the embodiment of the present invention can also obtain the identity information of the thief (such as a photo of the thief, a fingerprint, etc.). After the identity information of the thief is obtained according to the embodiment of the present invention, the thief can be arrested according to the identity identification information. Therefore, the embodiment of the present invention can effectively prevent theft of the terminal after the terminal is stolen, and reduce the crime rate of theft and protect the security of the user property.
在此处所提供的说明书中,说明了大量具体细节。然而,能够理解,本发明的实施例可以在没有这些具体细节的情况下实践。在一些实例中,并未详细示出公知的方法、结构和技术,以便不模糊对本说明书的理解。In the description provided herein, numerous specific details are set forth. However, it is understood that the embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures, and techniques are not shown in detail so as not to obscure the understanding of the description.
类似地,应当理解,为了精简本公开并帮助理解各个发明方面中的一个或多个,在上面对本发明的示例性实施例的描述中,本发明的各个特征有时被一起分组到单个实施例、图、或者对其的描述中。然而,并不应将该公开的方法解释成反映如下意图:即所 要求保护的本发明要求比在每个权利要求中所明确记载的特征更多的特征。更确切地说,如下面的权利要求书所反映的那样,发明方面在于少于前面公开的单个实施例的所有特征。因此,遵循具体实施方式的权利要求书由此明确地并入该具体实施方式,其中每个权利要求本身都作为本发明的单独实施例。Similarly, the various features of the invention are sometimes grouped together into a single embodiment, in the above description of the exemplary embodiments of the invention, Figure, or a description of it. However, the method disclosed should not be interpreted to reflect the following intent: The claimed invention requires more features than those explicitly recited in each claim. Rather, as the following claims reflect, inventive aspects reside in less than all features of the single embodiments disclosed herein. Therefore, the claims following the specific embodiments are hereby explicitly incorporated into the embodiments, and each of the claims as a separate embodiment of the invention.
本领域那些技术人员可以理解,可以对实施例中的设备中的模块进行自适应性地改变并且把它们设置在与该实施例不同的一个或多个设备中。可以把实施例中的模块或单元或组件组合成一个模块或单元或组件,以及此外可以把它们分成多个子模块或子单元或子组件。除了这样的特征和/或过程或者单元中的至少一些是相互排斥之外,可以采用任何组合对本说明书(包括伴随的权利要求、摘要和附图)中公开的所有特征以及如此公开的任何方法或者设备的所有过程或单元进行组合。除非另外明确陈述,本说明书(包括伴随的权利要求、摘要和附图)中公开的每个特征可以由提供相同、等同或相似目的的替代特征来代替。Those skilled in the art will appreciate that the modules in the devices of the embodiments can be adaptively changed and placed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and further they may be divided into a plurality of sub-modules or sub-units or sub-components. In addition to such features and/or at least some of the processes or units being mutually exclusive, any combination of the features disclosed in the specification, including the accompanying claims, the abstract and the drawings, and any methods so disclosed, or All processes or units of the device are combined. Each feature disclosed in this specification (including the accompanying claims, the abstract and the drawings) may be replaced by alternative features that provide the same, equivalent or similar purpose.
此外,本领域的技术人员能够理解,尽管在此所述的一些实施例包括其它实施例中所包括的某些特征而不是其它特征,但是不同实施例的特征的组合意味着处于本发明的范围之内并且形成不同的实施例。例如,在下面的权利要求书中,所要求保护的实施例的任意之一都可以以任意的组合方式来使用。In addition, those skilled in the art will appreciate that, although some embodiments described herein include certain features that are included in other embodiments and not in other features, combinations of features of different embodiments are intended to be within the scope of the present invention. Different embodiments are formed and formed. For example, in the following claims, any one of the claimed embodiments can be used in any combination.
本发明的各个部件实施例可以以硬件实现,或者以在一个或者多个处理器上运行的软件模块实现,或者以它们的组合实现。本领域的技术人员应当理解,可以在实践中使用微处理器或者数字信号处理器(DSP)来实现根据本发明实施例的设备中的一些或者全部部件的一些或者全部功能。本发明还可以实现为用于执行这里所描述的方法的一部分或者全部的设备或者装置程序(例如,计算机程序和计算机程序产品)。这样的实现本发明的程序可以存储在计算机可读介质上,或者可以具有一个或者多个信号的形式。这样的信号可以从因特网网站上下载得到,或者在载体信号上提供,或者以任何其他形式提供。The various component embodiments of the present invention may be implemented in hardware, or in a software module running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that a microprocessor or digital signal processor (DSP) may be used in practice to implement some or all of the functionality of some or all of the components of the device in accordance with embodiments of the present invention. The invention can also be implemented as a device or device program (e.g., a computer program and a computer program product) for performing some or all of the methods described herein. Such a program implementing the invention may be stored on a computer readable medium or may be in the form of one or more signals. Such signals may be downloaded from an Internet website, provided on a carrier signal, or provided in any other form.
例如,图29示出了可以实现根据本发明的移动终端防盗方法的计算设备。该计算设备传统上包括处理器2910和以存储器2920形式的计算机程序产品或者计算机可读介质。存储器2920可以是诸如闪存、EEPROM(电可擦除可编程只读存储器)、EPROM、硬盘或者ROM之类的电子存储器。存储器2920具有用于执行上述方法中的任何方法步骤的程序代码2931的存储空间2930。例如,用于程序代码的存储空间2930可以包括分别用于实现上面的方法中的各种步骤的各个程序代码2931。这些程序代码可以从一个或者多个计算机程序产品中读出或者写入到这一个或者多个计算机程序产品中。这些计算机程序产品包括诸如硬盘,紧致盘(CD)、存储卡或者软盘之类的程序代码载体。这样的计算机程序产品通常为如参考图30所述的便携式或者固定存储单元。该存储单元可以具有与图29的计算设备中的存储器2920类似布置的存储段、存储空间等。程序代码可以例如以适当形式进行压缩。通常,存储单元包括计算机可读代码2931’,即可以由例如诸如2910之类的处理器读取的代码,这些代码当由计算设备运行时,导致该计算设备执行 上面所描述的方法中的各个步骤。For example, FIG. 29 illustrates a computing device that can implement the mobile terminal anti-theft method in accordance with the present invention. The computing device conventionally includes a processor 2910 and a computer program product or computer readable medium in the form of a memory 2920. The memory 2920 may be an electronic memory such as a flash memory, an EEPROM (Electrically Erasable Programmable Read Only Memory), an EPROM, a hard disk, or a ROM. Memory 2920 has a storage space 2930 for program code 2931 for performing any of the method steps described above. For example, the storage space 2930 for program code may include respective program codes 2931 for implementing various steps in the above methods, respectively. The program code can be read from or written to one or more computer program products. These computer program products include program code carriers such as hard disks, compact disks (CDs), memory cards or floppy disks. Such a computer program product is typically a portable or fixed storage unit as described with reference to FIG. The storage unit may have a storage segment, a storage space, and the like that are similarly arranged to the storage 2920 in the computing device of FIG. The program code can be compressed, for example, in an appropriate form. Typically, the storage unit includes computer readable code 2931&apos;, code that can be read by a processor, such as, for example, 2910, which, when executed by a computing device, causes the computing device to execute Each of the steps in the method described above.
本文中所称的“一个实施例”、“实施例”或者“一个或者多个实施例”意味着,结合实施例描述的特定特征、结构或者特性包括在本发明的至少一个实施例中。此外,请注意,这里“在一个实施例中”的词语例子不一定全指同一个实施例。&quot;an embodiment,&quot; or &quot;an embodiment,&quot; or &quot;an embodiment,&quot; In addition, it is noted that the phrase "in one embodiment" is not necessarily referring to the same embodiment.
应该注意的是上述实施例对本发明进行说明而不是对本发明进行限制,并且本领域技术人员在不脱离所附权利要求的范围的情况下可设计出替换实施例。在权利要求中,不应将位于括号之间的任何参考符号构造成对权利要求的限制。单词“包含”不排除存在未列在权利要求中的元件或步骤。位于元件之前的单词“一”或“一个”不排除存在多个这样的元件。本发明可以借助于包括有若干不同元件的硬件以及借助于适当编程的计算机来实现。在列举了若干装置的单元权利要求中,这些装置中的若干个可以是通过同一个硬件项来具体体现。单词第一、第二、以及第三等的使用不表示任何顺序。可将这些单词解释为名称。It is to be noted that the above-described embodiments are illustrative of the invention and are not intended to be limiting, and that the invention may be devised without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as a limitation. The word "comprising" does not exclude the presence of the elements or steps that are not recited in the claims. The word "a" or "an" The invention can be implemented by means of hardware comprising several distinct elements and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means can be embodied by the same hardware item. The use of the words first, second, and third does not indicate any order. These words can be interpreted as names.
此外,还应当注意,本说明书中使用的语言主要是为了可读性和教导的目的而选择的,而不是为了解释或者限定本发明的主题而选择的。因此,在不偏离所附权利要求书的范围和精神的情况下,对于本技术领域的普通技术人员来说许多修改和变更都是显而易见的。对于本发明的范围,对本发明所做的公开是说明性的,而非限制性的,本发明的范围由所附权利要求书限定。 In addition, it should be noted that the language used in the specification has been selected for the purpose of readability and teaching, and is not intended to be construed or limited. Therefore, many modifications and changes will be apparent to those skilled in the art without departing from the scope of the invention. The disclosure of the present invention is intended to be illustrative, and not restrictive, and the scope of the invention is defined by the appended claims.

Claims (109)

  1. 一种移动终端防盗方法,适用于未开启防盗功能的移动终端,包括:A mobile terminal anti-theft method is applicable to a mobile terminal that does not have an anti-theft function, and includes:
    接收来自服务器的后台防盗开启指令,其中,所述后台防盗开启指令中携带有本移动终端的验证信息;Receiving a background anti-theft opening instruction from the server, wherein the background anti-theft opening instruction carries the verification information of the mobile terminal;
    解析所述后台防盗开启指令,获取所述验证信息并进行验证;Parsing the background anti-theft opening instruction, acquiring the verification information, and performing verification;
    若验证通过,则根据所述后台开启防盗指令在后台开启防盗功能。If the verification is passed, the anti-theft function is turned on in the background according to the background opening anti-theft command.
  2. 根据权利要求1所述的方法,其中,还包括:若验证失败,则拒绝执行所述后台开启防盗指令。The method of claim 1, further comprising: refusing to execute the background open anti-theft command if the verification fails.
  3. 根据权利要求1或2所述的方法,其中,所述验证信息包括本移动终端的唯一身份标识;The method according to claim 1 or 2, wherein the verification information comprises a unique identity of the mobile terminal;
    还包括:至少一个用户身份识别模块SIM卡号和/或用户的账户信息。Also included is at least one user identity module SIM card number and/or user account information.
  4. 根据权利要求3所述的方法,其中,所述唯一身份标识为国际移动设备身份识别码IMEI。The method of claim 3 wherein the unique identity is an International Mobile Equipment Identity (IMEI).
  5. 根据权利要求3所述的方法,其中,所述验证信息包括本移动终端的唯一身份标识以及至少一个SIM卡号时,The method of claim 3, wherein the verification information comprises a unique identity of the mobile terminal and at least one SIM card number,
    获取所述验证信息并进行验证,包括:Obtain the verification information and verify it, including:
    分别对所述验证信息中的IMEI以及所述至少一个SIM卡号进行验证;Verifying the IMEI and the at least one SIM card number in the verification information respectively;
    若所述验证信息中的IMEI与本移动终端的IMEI匹配,且所述至少一个SIM卡号与在本移动终端的联系人列表中的SIM卡号匹配时,确定所述验证信息验证通过;否则为验证未通过。If the IMEI in the verification information matches the IMEI of the mobile terminal, and the at least one SIM card number matches the SIM card number in the contact list of the mobile terminal, determining that the verification information is verified; otherwise, verifying Did not pass.
  6. 根据权利要求5所述的方法,其中,所述验证信息验证通过之后,还包括:标识所述至少一个SIM卡号为可信任号码;The method according to claim 5, wherein after the verification of the verification information is passed, the method further comprises: identifying the at least one SIM card number as a trusted number;
    根据所述后台开启防盗指令在后台开启防盗功能之后,还包括:After the anti-theft function is enabled in the background according to the background opening anti-theft command, the method further includes:
    接收来自标识为可信任号码的SIM卡号的防盗指令;Receiving an anti-theft command from a SIM card number identified as a trusted number;
    解析所述防盗指令,执行所述防盗指令对应的防盗操作。Parsing the anti-theft command, and performing an anti-theft operation corresponding to the anti-theft command.
  7. 根据权利要求3所述的方法,其中,所述验证信息包括本移动终端的唯一身份标识以及用户的账户信息时,The method according to claim 3, wherein said verification information includes a unique identification of the mobile terminal and account information of the user,
    获取所述验证信息并进行验证,包括:Obtain the verification information and verify it, including:
    所述验证信息中的IMEI与本移动终端的IMEI匹配时,登录所述账户信息获取该账户的标识ID;When the IMEI in the verification information matches the IMEI of the mobile terminal, the account information is logged in to obtain the identifier ID of the account;
    发送该账户的ID至所述服务器;Send the ID of the account to the server;
    接收来自所述服务器的ID验证通过消息,确定所述验证信息通过验证。Receiving an ID verification pass message from the server, determining that the verification information passes verification.
  8. 根据权利要求7所述的方法,其中,根据所述后台开启防盗指令在后台开启防盗功能之后,还包括:The method according to claim 7, wherein after the anti-theft function is turned on in the background according to the background opening anti-theft command, the method further includes:
    接收来自该账户ID的防盗指令; Receiving an anti-theft instruction from the account ID;
    解析所述防盗指令,执行所述防盗指令对应的防盗操作。Parsing the anti-theft command, and performing an anti-theft operation corresponding to the anti-theft command.
  9. 根据权利要求7或8所述的方法,其中,所述账户信息包括用户名和密码。The method of claim 7 or 8, wherein the account information comprises a username and a password.
  10. 根据权利要求3所述的方法,其中,所述验证信息包括本移动终端的唯一身份标识、用户的账户信息以及至少一个SIM卡号时,The method according to claim 3, wherein said verification information comprises a unique identity of the mobile terminal, account information of the user, and at least one SIM card number,
    获取所述验证信息并进行验证,包括:Obtain the verification information and verify it, including:
    分别对所述验证信息中的IMEI以及所述至少一个SIM卡号进行验证;Verifying the IMEI and the at least one SIM card number in the verification information respectively;
    若所述验证信息中的IMEI与本移动终端的IMEI匹配,且所述至少一个SIM卡号与在本移动终端的联系人列表中的SIM卡号匹配时,登录所述账户信息获取该账户的ID;If the IMEI in the verification information matches the IMEI of the mobile terminal, and the at least one SIM card number matches the SIM card number in the contact list of the mobile terminal, logging in the account information to obtain an ID of the account;
    发送该账户的ID至所述服务器;Send the ID of the account to the server;
    接收来自所述服务器的ID验证通过消息,确定所述验证信息通过验证。Receiving an ID verification pass message from the server, determining that the verification information passes verification.
  11. 根据权利要求10所述的方法,其中,根据所述后台开启防盗指令在后台开启防盗功能之后,还包括:The method according to claim 10, wherein after the anti-theft function is turned on in the background according to the background opening anti-theft command, the method further includes:
    接收来自该账户ID的防盗指令;Receiving an anti-theft instruction from the account ID;
    解析所述防盗指令,执行所述防盗指令对应的防盗操作。Parsing the anti-theft command, and performing an anti-theft operation corresponding to the anti-theft command.
  12. 一种移动终端防盗客户端,设置于未开启防盗功能的移动终端,包括:A mobile terminal anti-theft client is disposed on a mobile terminal that does not have an anti-theft function, and includes:
    接收模块,配置为接收来自服务器的后台防盗开启指令,其中,所述后台防盗开启指令中携带有本移动终端的验证信息;The receiving module is configured to receive a background anti-theft opening command from the server, where the background anti-theft opening command carries the verification information of the mobile terminal;
    解析模块,配置为解析所述后台防盗开户指令,获取所述验证信息并进行验证;The parsing module is configured to parse the background anti-theft account opening instruction, obtain the verification information, and perform verification;
    防盗开启模块,配置为若验证通过,则根据所述后台开启防盗指令在后台开启防盗功能。The anti-theft opening module is configured to enable the anti-theft function in the background according to the background opening anti-theft command if the verification is passed.
  13. 根据权利要求12所述的客户端,其中,还包括:The client of claim 12, further comprising:
    拒绝模块,配置为若验证失败,则拒绝执行所述后台开启防盗指令。The reject module is configured to refuse to execute the background open anti-theft command if the verification fails.
  14. 根据权利要求12或13所述的客户端,其中,所述验证信息包括本移动终端的唯一身份标识;The client according to claim 12 or 13, wherein the verification information comprises a unique identity of the mobile terminal;
    还包括:至少一个用户身份识别模块SIM卡号和/或用户的账户信息。Also included is at least one user identity module SIM card number and/or user account information.
  15. 根据权利要求14所述的客户端,其中,所述唯一身份标识为国际移动设备身份识别码IMEI。The client of claim 14, wherein the unique identity is an International Mobile Equipment Identity (IMEI).
  16. 根据权利要求15所述的客户端,其中,所述解析模块还配置为:The client of claim 15, wherein the parsing module is further configured to:
    所述验证信息包括本移动终端的唯一身份标识以及至少一个SIM卡号时,When the verification information includes a unique identity of the mobile terminal and at least one SIM card number,
    分别对所述验证信息中的IMEI以及所述至少一个SIM卡号进行验证;Verifying the IMEI and the at least one SIM card number in the verification information respectively;
    若所述验证信息中的IMEI与本移动终端的IMEI匹配,且所述至少一个SIM卡号与在本移动终端的联系人列表中的SIM卡号匹配时,确定所述验证信息验证通过;否则为验证未通过。If the IMEI in the verification information matches the IMEI of the mobile terminal, and the at least one SIM card number matches the SIM card number in the contact list of the mobile terminal, determining that the verification information is verified; otherwise, verifying Did not pass.
  17. 根据权利要求16所述的客户端,其中,还包括:The client according to claim 16, further comprising:
    信任标识模块,配置为所述验证信息验证通过之后,标识所述至少一个SIM卡号为可信任号码; a trust identification module, configured to identify the at least one SIM card number as a trusted number after the verification information is verified;
    防盗处理模块,配置为接收来自标识为可信任号码的SIM卡号的防盗指令;解析所述防盗指令,执行所述防盗指令对应的防盗操作。The anti-theft processing module is configured to receive an anti-theft instruction from a SIM card number identified as a trusted number; parse the anti-theft instruction, and perform an anti-theft operation corresponding to the anti-theft instruction.
  18. 根据权利要求15所述的客户端,其中,所述解析模块还配置为:The client of claim 15, wherein the parsing module is further configured to:
    所述验证信息包括本移动终端的唯一身份标识以及用户的账户信息时,When the verification information includes the unique identity of the mobile terminal and the account information of the user,
    所述验证信息中的IMEI与本移动终端的IMEI匹配时,登录所述账户信息获取该账户的标识身份标识号码ID;When the IMEI in the verification information matches the IMEI of the mobile terminal, the account information is logged in to obtain the identification identity number ID of the account;
    发送该账户的ID至所述服务器;Send the ID of the account to the server;
    接收来自所述服务器的ID验证通过消息,确定所述验证信息通过验证。Receiving an ID verification pass message from the server, determining that the verification information passes verification.
  19. 根据权利要求18所述的客户端,其中,所述防盗处理模块还配置为接收来自该账户ID的防盗指令;解析所述防盗指令,执行所述防盗指令对应的防盗操作。The client according to claim 18, wherein the anti-theft processing module is further configured to receive an anti-theft instruction from the account ID; parse the anti-theft instruction, and perform an anti-theft operation corresponding to the anti-theft instruction.
  20. 根据权利要求18或19所述的客户端,其中,所述账户信息包括用户名和密码。A client according to claim 18 or 19, wherein said account information comprises a username and a password.
  21. 根据权利要求15所述的客户端,其中,所述解析模块还配置为:The client of claim 15, wherein the parsing module is further configured to:
    所述验证信息包括本移动终端的唯一身份标识、用户的账户信息以及至少一个SIM卡号时,The verification information includes a unique identity of the mobile terminal, account information of the user, and at least one SIM card number.
    分别对所述验证信息中的IMEI以及所述至少一个SIM卡号进行验证;Verifying the IMEI and the at least one SIM card number in the verification information respectively;
    若所述验证信息中的IMEI与本移动终端的IMEI匹配,且所述至少一个SIM卡号与在本移动终端的联系人列表中的SIM卡号匹配时,登录所述账户信息获取该账户的ID;If the IMEI in the verification information matches the IMEI of the mobile terminal, and the at least one SIM card number matches the SIM card number in the contact list of the mobile terminal, logging in the account information to obtain an ID of the account;
    发送该账户的ID至所述服务器;Send the ID of the account to the server;
    接收来自所述服务器的ID验证通过消息,确定所述验证信息通过验证。Receiving an ID verification pass message from the server, determining that the verification information passes verification.
  22. 根据权利要求21所述的客户端,所述防盗处理模块还配置为接收来自该账户ID的防盗指令;解析所述防盗指令,执行所述防盗指令对应的防盗操作。The client according to claim 21, wherein the anti-theft processing module is further configured to receive an anti-theft instruction from the account ID; parse the anti-theft instruction, and perform an anti-theft operation corresponding to the anti-theft instruction.
  23. 一种移动终端防盗方法,包括:A mobile terminal anti-theft method includes:
    接收来自发送方的防盗指令,其中,所述防盗指令以短信为发送载体;Receiving an anti-theft instruction from a sender, wherein the anti-theft instruction uses a short message as a transmission carrier;
    解析所述防盗指令,得到该指令对应的防盗命令;Parsing the anti-theft command to obtain an anti-theft command corresponding to the instruction;
    执行所述防盗命令对应的操作,以实现移动终端防盗。Performing operations corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
  24. 根据权利要求23所述的方法,其中,解析所述防盗指令,得到该指令对应的防盗命令,包括:The method according to claim 23, wherein parsing the anti-theft instruction to obtain an anti-theft command corresponding to the instruction comprises:
    解析所述防盗指令,得到所述发送方的验证码,其中,所述验证码包括所述发送方的移动终端标识和/或证明所述发送方可信任的密码;Parsing the anti-theft command to obtain a verification code of the sender, where the verification code includes a mobile terminal identifier of the sender and/or a password that the sender can trust;
    将得到的所述发送方的验证码与预存的验证码进行匹配;Matching the obtained verification code of the sender with a pre-stored verification code;
    若确定两者匹配,则解析得到所述防盗指令对应的防盗命令。If it is determined that the two match, the anti-theft command corresponding to the anti-theft command is obtained.
  25. 根据权利要求24所述的方法,其中,所述发送方的移动终端标识包括下列至少之一:The method of claim 24, wherein the sender's mobile terminal identity comprises at least one of the following:
    所述发送方的电话号码;The sender's phone number;
    所述发送方的用户识别模块SIM卡号;The user identification module SIM card number of the sender;
    所述发送方的国际移动设备身份识别码IMEI。 The sender's international mobile device identification code IMEI.
  26. 根据权利要求24或25所述的方法,其中,证明所述发送方可信任的密码包括下列至少之一:The method according to claim 24 or 25, wherein the password certifying that the sender is trustworthy comprises at least one of the following:
    所述发送方的移动终端标识;The sender's mobile terminal identifier;
    预先设置的证明所述发送方可信任的字符串。A pre-set string that proves that the sender can trust.
  27. 根据权利要求23至26任一项所述的方法,其中,解析所述防盗指令,包括:The method according to any one of claims 23 to 26, wherein parsing the anti-theft instruction comprises:
    确定所述防盗指令是否被加密;Determining whether the anti-theft instruction is encrypted;
    若是,采用相应的解密手段对所述防盗指令进行解密。If so, the anti-theft command is decrypted by using a corresponding decryption means.
  28. 根据权利要求27所述的方法,其中,所述防盗指令中的所述发送方的验证码被加密;The method of claim 27, wherein the verification code of the sender in the anti-theft instruction is encrypted;
    相应的,采用相应的解密手段对所述验证码进行解密,获取解密后的验证码。Correspondingly, the verification code is decrypted by using a corresponding decryption means to obtain the decrypted verification code.
  29. 根据权利要求27或28所述的方法,其中,加密手段为数据加密标准DES加密,解密手段为DES解密。The method according to claim 27 or 28, wherein the encryption means is data encryption standard DES encryption, and the decryption means is DES decryption.
  30. 根据权利要求23至29任一项所述的方法,其中,接收来自发送方的防盗指令之前,还包括:The method according to any one of claims 23 to 29, wherein before receiving the anti-theft instruction from the sender, the method further comprises:
    预先存储可信任的移动终端标识和/或可信任的密码,以待对所述发起方进行验证。A trusted mobile terminal identity and/or a trusted password are pre-stored for verification by the initiator.
  31. 根据权利要求23至30任一项所述的方法,其中,还包括:The method according to any one of claims 23 to 30, further comprising:
    将已存储的可信任的发送方的移动终端标识和/或密码删除;Deleting the stored mobile terminal identifier and/or password of the trusted sender;
    注销防盗功能。Log out of the anti
  32. 根据权利要求23至31任一项所述的方法,其中,当任一防盗命令被执行的过程中,The method according to any one of claims 23 to 31, wherein, in the course of any anti-theft command being executed,
    轮询查询其是否执行成功;Polling for a successful execution;
    若是,则结束该防盗命令的执行;If yes, the execution of the anti-theft command is ended;
    若否,则再次尝试执行该防盗命令。If not, try again to execute the anti-theft command.
  33. 根据权利要求23至32任一项所述的方法,其中,执行所述防盗命令对应的操作之后,还包括:The method according to any one of claims 23 to 32, wherein after performing the operation corresponding to the anti-theft command, the method further comprises:
    将执行结果作为回执返回所述发送方,其中,若所述发送方在指定时间内未收到所述回执,则发起轮询查询,查询是否回执成功;若是,则结束回执查询;若否,则再次请求回执。Returning the execution result as a receipt to the sender, wherein if the sender does not receive the receipt within a specified time, the polling query is initiated to query whether the receipt is successful; if yes, the receipt receipt is ended; if not, Then request a receipt again.
  34. 根据权利要求23至33任一项所述的方法,其中,利用短信作为所述防盗指令的发送载体时,在确定所述发送方的身份信息之前,还包括:The method according to any one of claims 23 to 33, wherein, when the short message is used as the transmission carrier of the anti-theft instruction, before determining the identity information of the sender, the method further includes:
    判断接收到的短信是否携带有所述防盗指令;Determining whether the received short message carries the anti-theft instruction;
    若是,则拦截该短信,获取所述防盗指令信息并触发所述发送方的身份信息确定操作;If yes, intercepting the short message, obtaining the anti-theft instruction information and triggering the identity information determining operation of the sender;
    若否,则放行该短信。If not, release the message.
  35. 一种移动终端防盗客户端,包括:A mobile terminal anti-theft client includes:
    接收模块,配置为接收来自发送方的防盗指令,其中,所述防盗指令以短信为发送 载体;a receiving module configured to receive an anti-theft command from a sender, wherein the anti-theft command is sent by using a short message Carrier
    解析模块,配置为解析所述防盗指令,得到该指令对应的防盗命令;The parsing module is configured to parse the anti-theft command to obtain an anti-theft command corresponding to the instruction;
    执行模块,配置为执行所述防盗命令对应的操作,以实现移动终端防盗。The execution module is configured to perform an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
  36. 根据权利要求35所述的移动终端防盗客户端,其中,所述解析模块还配置为:The mobile terminal anti-theft client according to claim 35, wherein the parsing module is further configured to:
    解析所述防盗指令,得到所述发送方的验证码,其中,所述验证码包括所述发送方的移动终端标识和/或证明所述发送方可信任的密码;Parsing the anti-theft command to obtain a verification code of the sender, where the verification code includes a mobile terminal identifier of the sender and/or a password that the sender can trust;
    将得到的所述发送方的验证码与预存的验证码进行匹配;Matching the obtained verification code of the sender with a pre-stored verification code;
    若确定两者匹配,则解析得到所述防盗指令对应的防盗命令。If it is determined that the two match, the anti-theft command corresponding to the anti-theft command is obtained.
  37. 根据权利要求35或36所述的移动终端防盗客户端,其中,所述解析模块还配置为:The mobile terminal anti-theft client according to claim 35 or 36, wherein the parsing module is further configured to:
    确定所述防盗指令是否被加密;Determining whether the anti-theft instruction is encrypted;
    若是,采用相应的解密手段对所述防盗指令进行解密。If so, the anti-theft command is decrypted by using a corresponding decryption means.
  38. 根据权利要求37所述的移动终端防盗客户端,其中,所述解析模块还配置为:The mobile terminal anti-theft client according to claim 37, wherein the parsing module is further configured to:
    所述防盗指令中的所述发送方的验证码被加密;The verification code of the sender in the anti-theft instruction is encrypted;
    相应的,采用相应的解密手段对所述验证码进行解密,获取解密后的验证码。Correspondingly, the verification code is decrypted by using a corresponding decryption means to obtain the decrypted verification code.
  39. 根据权利要求35至38任一项所述的移动终端客户端,其中,还包括存储模块,配置为:The mobile terminal client according to any one of claims 35 to 38, further comprising a storage module configured to:
    预先存储可信任的移动终端标识和/或可信任的密码,以待对所述发起方进行验证。A trusted mobile terminal identity and/or a trusted password are pre-stored for verification by the initiator.
  40. 根据权利要求35至39任一项所述的移动终端客户端,其中,还包括注销模块,配置为将已存储的可信任的发送方的移动终端标识和/或密码删除;注销防盗功能。The mobile terminal client according to any one of claims 35 to 39, further comprising a logout module configured to delete the stored mobile terminal identifier and/or password of the trusted sender; and log out the anti-theft function.
  41. 根据权利要求35至40任一项所述的移动终端客户端,其中,还包括:The mobile terminal client according to any one of claims 35 to 40, further comprising:
    命令轮询模块,配置为当任一防盗命令被执行的过程中,轮询查询其是否执行成功;若是,则结束该防盗命令的执行;若否,则再次尝试执行该防盗命令。The command polling module is configured to poll the query for success if any of the anti-theft commands are executed; if so, the execution of the anti-theft command is ended; if not, the anti-theft command is attempted again.
  42. 根据权利要求35至41任一项所述的移动终端客户端,其中,还包括短信拦截模块,配置为:The mobile terminal client according to any one of claims 35 to 41, further comprising a short message intercepting module configured to:
    判断接收到的短信是否携带有所述防盗指令;Determining whether the received short message carries the anti-theft instruction;
    若是,则拦截该短信,获取所述防盗指令信息并触发所述发送方的身份信息确定操作;If yes, intercepting the short message, obtaining the anti-theft instruction information and triggering the identity information determining operation of the sender;
    若否,则放行该短信。If not, release the message.
  43. 一种移动终端防盗方法,包括:A mobile terminal anti-theft method includes:
    接收来自服务器的防盗指令,其中,所述防盗指令由已激活账户发送至所述服务器;Receiving an anti-theft instruction from a server, wherein the anti-theft instruction is sent to the server by an activated account;
    解析所述防盗指令,得到该指令对应的防盗命令;Parsing the anti-theft command to obtain an anti-theft command corresponding to the instruction;
    执行所述防盗命令对应的操作,以实现移动终端防盗。Performing operations corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
  44. 根据权利要求43所述的方法,其中,所述防盗指令以短信和/或网络指令为发送载体。The method of claim 43 wherein said anti-theft command is a transmission carrier with a short message and/or a network command.
  45. 根据权利要求44所述的方法,其中,所述防盗指令以短信作为发送载体时,解 析所述防盗指令之前,还包括:The method according to claim 44, wherein the anti-theft instruction is solved by using a short message as a transmission carrier Before analyzing the anti-theft command, it also includes:
    判断该短信中是否携带有所述防盗指令;Determining whether the anti-theft instruction is carried in the short message;
    若是,拦截该短信,触发所述防盗指令的解析操作;If yes, intercepting the short message, triggering the parsing operation of the anti-theft instruction;
    若否,放行该短信。If not, release the message.
  46. 根据权利要求43至45任一项所述的方法,其中,所述已激活账户在能够触发移动终端防盗的客户端中登录。The method of any of claims 43 to 45, wherein the activated account is logged in a client capable of triggering theft of the mobile terminal.
  47. 根据权利要求46所述的方法,其中,所述客户端包括下列至少之一:浏览器、手机侧带有手机防盗功能的客户端、PC侧带有手机防盗功能的客户端。The method according to claim 46, wherein the client comprises at least one of the following: a browser, a client with a mobile phone anti-theft function on the mobile phone side, and a client with a mobile phone anti-theft function on the PC side.
  48. 根据权利要求43至47任一项所述的方法,其中,所述防盗指令由已激活账户发送至所述服务器,包括:The method according to any one of claims 43 to 47, wherein the anti-theft instruction is sent to the server by an activated account, comprising:
    在所述已激活账户的设备列表中选择进行防盗操作的本移动终端,其中,设备列表中存储有与所述已激活账户绑定的至少一个移动终端的标识;Selecting, in the device list of the activated account, the mobile terminal that performs the anti-theft operation, wherein the device list stores an identifier of the at least one mobile terminal bound to the activated account;
    由所述已激活账户将针对本移动终端的防盗指令发送至所述服务器。An anti-theft command for the mobile terminal is sent to the server by the activated account.
  49. 根据权利要求48所述的方法,其中,若进行防盗操作的本移动终端的标识未存储在所述设备列表中,由所述已激活账户输入本移动终端的标识;以及,由所述服务器将所述防盗指令发送至本移动终端的标识对应的移动终端中。The method according to claim 48, wherein if the identity of the mobile terminal performing the theft prevention operation is not stored in the device list, the identity of the mobile terminal is input by the activated account; and, by the server The anti-theft command is sent to the mobile terminal corresponding to the identifier of the mobile terminal.
  50. 根据权利要求49所述的方法,其中,将所述已激活账户输入的本移动终端的标识添加到所述设备列表中。The method of claim 49, wherein the identification of the mobile terminal input by the activated account is added to the device list.
  51. 根据权利要求43至50任一项所述的方法,其中,所述防盗指令格式包括以下至少一项:防盗策略标识、所述已激活账户标识、防盗命令、防盗对象标识。The method according to any one of claims 43 to 50, wherein the anti-theft instruction format comprises at least one of the following: an anti-theft policy identification, the activated account identification, an anti-theft command, an anti-theft object identification.
  52. 根据权利要求51所述的方法,其中,The method of claim 51, wherein
    所述防盗策略标识为账户Account;The anti-theft policy is identified as an account Account;
    所述已激活账户标识为当前登录时为该账户生成的唯一的账号识别码UID;The activated account identifier is a unique account identifier UID generated for the account when currently logged in;
    所述防盗命令包括命令编号和/或任务编号;The anti-theft command includes a command number and/or a task number;
    所述防盗对象标识包括本移动终端的国际移动设备身份识别码IMEI。The anti-theft object identifier includes an international mobile device identification code IMEI of the mobile terminal.
  53. 根据权利要求43至52任一项所述的方法,其中,解析所述防盗指令,包括:The method according to any one of claims 43 to 52, wherein parsing the anti-theft instruction comprises:
    确定所述防盗指令是否被加密;Determining whether the anti-theft instruction is encrypted;
    若是,采用相应的解密手段对所述防盗指令进行解密。If so, the anti-theft command is decrypted by using a corresponding decryption means.
  54. 根据权利要求53所述的方法,其中,所述防盗指令中除防盗策略标识外的其他内容被加密;The method according to claim 53, wherein the content of the anti-theft instruction other than the anti-theft policy identification is encrypted;
    相应的,采用相应的解密手段对所述防盗指令中除防盗策略标识外的其他内容进行解密。Correspondingly, the content of the anti-theft command except the anti-theft policy identifier is decrypted by using a corresponding decryption means.
  55. 根据权利要求53或54所述的方法,其中,加密手段为数据加密标准DES加密,解密手段为DES解密。The method according to claim 53 or 54, wherein the encryption means is data encryption standard DES encryption, and the decryption means is DES decryption.
  56. 根据权利要求43至55任一项所述的方法,其中,接收来自服务器的防盗指令之前,还包括采用如下方式激活本移动终端的防盗功能: The method according to any one of claims 43 to 55, wherein before receiving the anti-theft command from the server, the method further comprises: activating the anti-theft function of the mobile terminal in the following manner:
    利用所述已激活账户向所述服务器发送以短信为载体的绑定Bind指令,其中,所述短信的发送号码为本移动终端的手机号码;Sending, by using the activated account, a binding Bind instruction that uses a short message as a carrier to the server, where the sending number of the short message is a mobile phone number of the mobile terminal;
    接收所述服务器返回的与所述已激活账户的绑定成功消息,将本移动终端的手机号码设置为可信任号码,启动防盗功能。Receiving a binding success message returned by the server and the activated account, setting a mobile phone number of the mobile terminal as a trusted number, and starting an anti-theft function.
  57. 根据权利要求56所述的方法,其中,若接收所述服务器返回的绑定失败消息,则利用所述已激活账户向所述服务器发送以网络指令为载体的Bind指令;The method according to claim 56, wherein if a binding failure message returned by the server is received, a Bind instruction with a network instruction as a carrier is sent to the server by using the activated account;
    接收所述服务器返回的绑定成功消息,启动防盗功能。Receiving the binding success message returned by the server, and starting the anti-theft function.
  58. 根据权利要求43至57任一项所述的方法,其中,还包括:The method of any of claims 43 to 57, further comprising:
    利用所述已激活账户向所述服务器发送解除绑定指令;Sending an unbinding instruction to the server by using the activated account;
    解除绑定成功时,删除所述已激活账户的账户信息以及防盗记录;When the unbinding is successful, the account information of the activated account and the anti-theft record are deleted;
    注销防盗功能。Log out of the anti
  59. 根据权利要求43至58任一项所述的方法,其中,当任一防盗命令被执行的过程中,A method according to any one of claims 43 to 58, wherein, in the course of any anti-theft command being executed,
    轮询查询其是否执行成功;Polling for a successful execution;
    若是,则结束该防盗命令的执行;If yes, the execution of the anti-theft command is ended;
    若否,则再次尝试执行该防盗命令。If not, try again to execute the anti-theft command.
  60. 根据权利要求43至59任一项所述的方法,其中,执行所述防盗命令对应的操作之后,还包括:The method according to any one of claims 43 to 59, wherein after performing the operation corresponding to the anti-theft command, the method further comprises:
    将执行结果作为回执返回所述服务器,其中,若所述服务器在指定时间内未收到所述回执,则发起轮询查询,查询是否回执成功;若是,则结束回执查询;若否,则再次请求回执。Returning the execution result as a receipt to the server, wherein if the server does not receive the receipt within a specified time, a polling query is initiated to query whether the receipt is successful; if yes, the receipt receipt is ended; if not, then again Request a receipt.
  61. 一种移动终端防盗客户端,包括:A mobile terminal anti-theft client includes:
    接收模块,配置为接收来自服务器的防盗指令,其中,所述防盗指令由已激活账户发送至所述服务器;a receiving module configured to receive an anti-theft command from a server, wherein the anti-theft command is sent to the server by an activated account;
    解析模块,配置为解析所述防盗指令,得到该指令对应的防盗命令;The parsing module is configured to parse the anti-theft command to obtain an anti-theft command corresponding to the instruction;
    执行模块,配置为执行所述防盗命令对应的操作,以实现移动终端防盗。The execution module is configured to perform an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
  62. 根据权利要求61所述的移动终端防盗客户端,其中,所述防盗指令以短信和/或网络指令为发送载体。The mobile terminal anti-theft client according to claim 61, wherein the anti-theft instruction is a short message and/or a network command as a transmission carrier.
  63. 根据权利要求62所述的移动终端防盗客户端,其中,还包括:The mobile terminal anti-theft client according to claim 62, further comprising:
    判断模块,配置为判断该短信中是否携带有所述防盗指令;The determining module is configured to determine whether the anti-theft instruction is carried in the short message;
    拦截模块,配置为若是,拦截该短信,触发所述防盗指令的解析操作;The intercepting module is configured to intercept the short message and trigger the parsing operation of the anti-theft instruction;
    放行模块,配置为若否,放行该短信。Release the module, configure if it is no, release the SMS.
  64. 根据权利要求61至63任一项所述的移动终端防盗客户端,其中,所述已激活账户在能够触发移动终端防盗的客户端中登录。The mobile terminal anti-theft client according to any one of claims 61 to 63, wherein the activated account is logged in a client capable of triggering theft prevention of the mobile terminal.
  65. 根据权利要求64所述的移动终端防盗客户端,其中,所述客户端包括下列至少之一:浏览器、手机卫士、安全卫士。 The mobile terminal anti-theft client according to claim 64, wherein the client comprises at least one of the following: a browser, a mobile guard, and a security guard.
  66. 根据权利要求61至64任一项所述的移动终端防盗客户端,其中,所述解析模块还配置为:The mobile terminal anti-theft client according to any one of claims 61 to 64, wherein the parsing module is further configured to:
    确定所述防盗指令是否被加密;Determining whether the anti-theft instruction is encrypted;
    若是,采用相应的解密手段对所述防盗指令进行解密。If so, the anti-theft command is decrypted by using a corresponding decryption means.
  67. 根据权利要求61至66任一项所述的移动终端防盗客户端,其中,接收来自服务器的防盗指令之前,还包括激活模块,配置为采用如下方式激活本移动终端的防盗功能:The mobile terminal anti-theft client according to any one of claims 61 to 66, wherein before receiving the anti-theft command from the server, the method further includes an activation module configured to activate the anti-theft function of the mobile terminal in the following manner:
    利用所述已激活账户向所述服务器发送以短信为载体的绑定Bind指令,其中,所述短信的发送号码为本移动终端的手机号码;Sending, by using the activated account, a binding Bind instruction that uses a short message as a carrier to the server, where the sending number of the short message is a mobile phone number of the mobile terminal;
    接收所述服务器返回的与所述已激活账户的绑定成功消息,将本移动终端的手机号码设置为可信任号码,启动防盗功能。Receiving a binding success message returned by the server and the activated account, setting a mobile phone number of the mobile terminal as a trusted number, and starting an anti-theft function.
  68. 根据权利要求67所述的移动终端防盗客户端,其中,所述激活模块还配置为若接收所述服务器返回的绑定失败消息,则利用所述已激活账户向所述服务器发送以网络指令为载体的Bind指令;The mobile terminal anti-theft client according to claim 67, wherein the activation module is further configured to: if receiving a binding failure message returned by the server, send, by using the activated account, the network instruction to the server The Bind instruction of the carrier;
    接收所述服务器返回的绑定成功消息,启动防盗功能。Receiving the binding success message returned by the server, and starting the anti-theft function.
  69. 根据权利要求61至68任一项所述的移动终端防盗客户端,其中,还包括注销模块,配置为:The mobile terminal anti-theft client according to any one of claims 61 to 68, further comprising a logout module configured to:
    利用所述已激活账户向所述服务器发送解除绑定指令;Sending an unbinding instruction to the server by using the activated account;
    解除绑定成功时,删除所述已激活账户的账户信息以及防盗记录;When the unbinding is successful, the account information of the activated account and the anti-theft record are deleted;
    注销防盗功能。Log out of the anti
  70. 根据权利要求61至69任一项所述的移动终端防盗客户端,其中,还包括:The mobile terminal anti-theft client according to any one of claims 61 to 69, further comprising:
    命令轮询模块,配置为当任一防盗命令被执行的过程中,轮询查询其是否执行成功;The command polling module is configured to poll the query for success if any of the anti-theft commands are executed;
    若是,则结束该防盗命令的执行;If yes, the execution of the anti-theft command is ended;
    若否,则再次尝试执行该防盗命令。If not, try again to execute the anti-theft command.
  71. 一种移动终端防盗方法,包括:A mobile terminal anti-theft method includes:
    接收来自个人电脑PC终端的防盗指令;Receiving an anti-theft command from a personal computer PC terminal;
    解析所述防盗指令,得到该指令对应的防盗命令;Parsing the anti-theft command to obtain an anti-theft command corresponding to the instruction;
    执行所述防盗命令对应的操作,以实现移动终端防盗。Performing operations corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
  72. 根据权利要求71所述的方法,其中,解析所述防盗指令,得到该指令对应的防盗命令,包括:The method according to claim 71, wherein parsing the anti-theft instruction to obtain an anti-theft command corresponding to the instruction comprises:
    解析所述防盗指令,得到所述防盗指令中携带的本移动终端的身份标识;Parsing the anti-theft command to obtain an identity identifier of the mobile terminal carried in the anti-theft command;
    对所述身份标识进行验证;Verifying the identity identifier;
    若验证通过,则触发所述防盗命令的执行操作;If the verification is passed, triggering an execution operation of the anti-theft command;
    若验证未通过,则停止响应。If the verification fails, the response is stopped.
  73. 根据权利要求72所述的方法,其中,所述本移动终端的身份标识包括:所述本移动终端的国际移动设备身份识别码IMEI。 The method according to claim 72, wherein the identity of the mobile terminal comprises: an international mobile device identity code IMEI of the mobile terminal.
  74. 根据权利要求71至73任一项所述的方法,其中,所述接收来自PC终端的防盗指令之前,包括:The method according to any one of claims 71 to 73, wherein the receiving the anti-theft instruction from the PC terminal comprises:
    接收来自所述PC终端的激活文件,其中,所述激活文件携带有所述本移动终端的身份标识以及防盗模式标识;Receiving an activation file from the PC terminal, where the activation file carries an identity of the mobile terminal and an anti-theft mode identifier;
    根据所述身份标识对所述激活文件进行验证;Verifying the activation file according to the identity identifier;
    若验证通过,根据所述防盗模式标识激活不同的防盗模式。If the verification is passed, different anti-theft modes are activated according to the anti-theft mode identification.
  75. 根据权利要求74所述的方法,其中,根据所述防盗模式标识确定不同的防盗模式,包括:The method according to claim 74, wherein determining different anti-theft modes according to the anti-theft mode identifier comprises:
    若所述防盗模式标识为PC防盗模式标识,则启动PC防盗策略;If the anti-theft mode identifier is a PC anti-theft mode identifier, the PC anti-theft policy is activated;
    若所述防盗模式标识为账号防盗模式标识,则启动账号防盗策略。If the anti-theft mode identifier is an account anti-theft mode identifier, the account anti-theft policy is activated.
  76. 根据权利要求74或75所述的方法,其中,所述防盗模式标识包括下列至少之一:The method of claim 74 or 75, wherein the anti-theft mode identification comprises at least one of the following:
    所述PC终端生成的、与本移动终端一一对应的随机字符串GUID;a random character string GUID generated by the PC terminal and corresponding to the mobile terminal;
    用户登录账号后生成的用于标识账号的账号标识符UID,其中,UID的用户登录的账号名称为USERNAME;The account identifier UID generated by the user after logging in to the account for identifying the account, wherein the account name of the UID user login is USERNAME;
    密码PASSWORD。Password PASSWORD.
  77. 根据权利要求74至76任一项所述的方法,其中,根据所述防盗模式标识确定不同的防盗模式,包括:The method according to any one of claims 74 to 76, wherein determining different anti-theft modes according to the anti-theft mode identifier comprises:
    若所述防盗模式标识仅包括所述GUID时,开启PC防盗策略,直接执行所述防盗命令对应的操作;If the anti-theft mode identifier includes only the GUID, the PC anti-theft policy is enabled, and the operation corresponding to the anti-theft command is directly executed;
    若所述防盗模式标识包括所述GUID和所述PASSWORD时,开启PC防盗策略,验证所述PASSWROD是否正确;若是,则执行所述防盗命令对应的操作;若否,则停止响应;If the anti-theft mode identifier includes the GUID and the PASSWORD, the PC anti-theft policy is turned on, and the PASSWROD is verified to be correct; if yes, the operation corresponding to the anti-theft command is executed; if not, the response is stopped;
    若所述防盗模式标识包括所述UID时,开启账号防盗策略,在所述本移动终端中登录所述USERNAME,接收来自所述UID的防盗命令并执行对应的操作;If the anti-theft mode identifier includes the UID, opening an account anti-theft policy, logging in the USERNAME in the mobile terminal, receiving an anti-theft command from the UID, and performing a corresponding operation;
    若所述防盗模式标识包括所述GUID和所述UID时,开启PC防盗策略以及账号防盗策略,接收来自PC终端或者所述UID的防盗命令并执行对应的操作;If the anti-theft mode identifier includes the GUID and the UID, enable a PC anti-theft policy and an account anti-theft policy, receive an anti-theft command from the PC terminal or the UID, and perform a corresponding operation;
    若所述防盗模式标识包括所述GUID、所述UID和所述PASSWORD,开启PC防盗策略以及账号防盗策略,接收到来自所述PC终端或者所述UID的防盗命令均对所述PASSWORD进行验证;若验证通过,则执行接收的防盗命令对应的操作;若验证不通过,则停止响应。If the anti-theft mode identifier includes the GUID, the UID, and the PASSWORD, the PC anti-theft policy and the account anti-theft policy are enabled, and the anti-theft command from the PC terminal or the UID is received to verify the PASSWORD; If the verification is passed, the operation corresponding to the received anti-theft command is executed; if the verification fails, the response is stopped.
  78. 根据权利要求71至77任一项所述的方法,其中,还包括:The method of any one of claims 71 to 77, further comprising:
    当任一操作被执行的过程中,轮询查询其是否执行成功;When any operation is performed, polling for a successful execution;
    若是,则结束该操作;If yes, the operation ends;
    若否,则再次尝试执行该操作。If no, try the operation again.
  79. 根据权利要求71至78任一项所述的方法,其中,执行所述防盗命令对应的操 作之后,还包括:The method according to any one of claims 71 to 78, wherein the operation corresponding to the anti-theft command is performed After doing this, it also includes:
    将执行结果作为回执返回所述PC终端,其中,若所述PC终端在指定时间内未收到所述回执,则发起轮询查询,查询是否回执成功;若是,则结束回执查询;若否,则再次请求回执。Returning the execution result as a receipt to the PC terminal, wherein if the PC terminal does not receive the receipt within a specified time, initiate a polling query to query whether the receipt is successful; if yes, end the receipt query; if not, Then request a receipt again.
  80. 根据权利要求71至79任一项所述的方法,其中,所述PC终端与本移动终端通过有线或无线方式连接并打通,其中,所述有线方式包括通用串行总线USB连接线,所述无线方式包括无线网络。The method according to any one of claims 71 to 79, wherein the PC terminal is connected to the mobile terminal by wire or wirelessly, and the wired mode comprises a universal serial bus USB connection line, Wireless methods include wireless networks.
  81. 一种移动终端防盗客户端,包括:A mobile terminal anti-theft client includes:
    接收模块,配置为接收来自个人电脑PC终端的防盗指令;a receiving module configured to receive an anti-theft command from a PC terminal of the personal computer;
    解析模块,配置为解析所述防盗指令,得到该指令对应的防盗命令;The parsing module is configured to parse the anti-theft command to obtain an anti-theft command corresponding to the instruction;
    执行模块,配置为执行所述防盗命令对应的操作,以实现移动终端防盗。The execution module is configured to perform an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
  82. 根据权利要求81所述的客户端,其中,所述解析模块还配置为:The client of claim 81, wherein the parsing module is further configured to:
    解析所述防盗指令,得到所述防盗指令中携带的本移动终端的身份标识;Parsing the anti-theft command to obtain an identity identifier of the mobile terminal carried in the anti-theft command;
    对所述身份标识进行验证;Verifying the identity identifier;
    若验证通过,则触发所述防盗命令的执行操作;If the verification is passed, triggering an execution operation of the anti-theft command;
    若验证未通过,则停止响应。If the verification fails, the response is stopped.
  83. 根据权利要求82所述的客户端,其中,所述本移动终端的身份标识包括:所述本移动终端的国际移动设备身份识别码IMEI。The client according to claim 82, wherein the identity of the mobile terminal comprises: an international mobile device identity code IMEI of the mobile terminal.
  84. 根据权利要求81至83任一项所述的客户端,其中,还包括:激活模块,配置为:The client according to any one of claims 81 to 83, further comprising: an activation module configured to:
    接收来自所述PC终端的激活文件,其中,所述激活文件携带有所述本移动终端的身份标识以及防盗模式标识;Receiving an activation file from the PC terminal, where the activation file carries an identity of the mobile terminal and an anti-theft mode identifier;
    根据所述身份标识对所述激活文件进行验证;Verifying the activation file according to the identity identifier;
    若验证通过,根据所述防盗模式标识激活不同的防盗模式。If the verification is passed, different anti-theft modes are activated according to the anti-theft mode identification.
  85. 根据权利要求84所述的客户端,其中,所述激活模块还配置为:The client of claim 84, wherein the activation module is further configured to:
    若所述防盗模式标识为PC防盗模式标识,则启动PC防盗策略;If the anti-theft mode identifier is a PC anti-theft mode identifier, the PC anti-theft policy is activated;
    若所述防盗模式标识为账号防盗模式标识,则启动账号防盗策略。If the anti-theft mode identifier is an account anti-theft mode identifier, the account anti-theft policy is activated.
  86. 根据权利要求84或85所述的客户端,其中,所述防盗模式标识包括下列至少之一:A client according to claim 84 or 85, wherein said anti-theft mode identification comprises at least one of the following:
    所述PC终端生成的、与本移动终端一一对应的随机字符串GUID;a random character string GUID generated by the PC terminal and corresponding to the mobile terminal;
    用户登录账号后生成的用于标识账号的账号标识符UID,其中,UID的用户登录的账号名称为USERNAME;The account identifier UID generated by the user after logging in to the account for identifying the account, wherein the account name of the UID user login is USERNAME;
    密码PASSWORD。Password PASSWORD.
  87. 根据权利要求84至86任一项所述的客户端,其中,所述激活模块还配置为:The client according to any one of claims 84 to 86, wherein the activation module is further configured to:
    若所述防盗模式标识仅包括所述GUID时,开启PC防盗策略,直接执行所述防盗命令对应的操作; If the anti-theft mode identifier includes only the GUID, the PC anti-theft policy is enabled, and the operation corresponding to the anti-theft command is directly executed;
    若所述防盗模式标识包括所述GUID和所述PASSWORD时,开启PC防盗策略,验证所述PASSWROD是否正确;若是,则执行所述防盗命令对应的操作;若否,则停止响应;If the anti-theft mode identifier includes the GUID and the PASSWORD, the PC anti-theft policy is turned on, and the PASSWROD is verified to be correct; if yes, the operation corresponding to the anti-theft command is executed; if not, the response is stopped;
    若所述防盗模式标识包括所述UID时,开启账号防盗策略,在所述本移动终端中登录所述USERNAME,接收来自所述UID的防盗命令并执行对应的操作;If the anti-theft mode identifier includes the UID, opening an account anti-theft policy, logging in the USERNAME in the mobile terminal, receiving an anti-theft command from the UID, and performing a corresponding operation;
    若所述防盗模式标识包括所述GUID和所述UID时,开启PC防盗策略以及账号防盗策略,接收来自PC终端或者所述UID的防盗命令并执行对应的操作;If the anti-theft mode identifier includes the GUID and the UID, enable a PC anti-theft policy and an account anti-theft policy, receive an anti-theft command from the PC terminal or the UID, and perform a corresponding operation;
    若所述防盗模式标识包括所述GUID、所述UID和所述PASSWORD,开户PC防盗策略以及账号防盗策略,接收到来自所述PC终端或者所述UID的防盗命令均对所述PASSWORD进行验证;若验证通过,则执行接收的防盗命令对应的操作;若验证不通知,则停止响应。If the anti-theft mode identifier includes the GUID, the UID, the PASSWORD, the account opening anti-theft policy, and the account anti-theft policy, the anti-theft command from the PC terminal or the UID is used to verify the PASSWORD; If the verification is passed, the operation corresponding to the received anti-theft command is executed; if the verification is not notified, the response is stopped.
  88. 根据权利要求81至87任一项所述的客户端,其中,还包括轮询模块,配置为:The client according to any one of claims 81 to 87, further comprising a polling module configured to:
    当任一操作被执行的过程中,轮询查询其是否执行成功;When any operation is performed, polling for a successful execution;
    若是,则结束该操作;If yes, the operation ends;
    若否,则再次尝试执行该操作。If no, try the operation again.
  89. 根据权利要求81至88任一项所述的客户端,其中,还包括:The client according to any one of claims 81 to 88, further comprising:
    接口,配置为通过有线或无线方式连接所述PC终端与本移动终端,其中,所述有线方式包括通用串行总线USB连接线,所述无线方式包括无线网络。The interface is configured to connect the PC terminal and the mobile terminal by wire or wirelessly, wherein the wired mode comprises a universal serial bus USB connection line, and the wireless mode comprises a wireless network.
  90. 一种移动终端防盗方法,包括:A mobile terminal anti-theft method includes:
    根据来自发送方的防盗指令确定所述发送方的身份信息;Determining identity information of the sender according to an anti-theft instruction from a sender;
    启动与所述发送方身份信息匹配的防盗策略解析所述防盗指令,得到该指令对应的防盗命令;Initiating an anti-theft command that matches the sender identity information to parse the anti-theft command, and obtaining an anti-theft command corresponding to the instruction;
    执行所述防盗命令对应的操作,以实现移动终端防盗。Performing operations corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
  91. 根据权利要求90所述的方法,其中,所述根据来自发送方的防盗指令确定所述发送方的身份信息,包括:The method of claim 90, wherein the determining the identity information of the sender based on an anti-theft command from a sender comprises:
    获取所述防盗指令中携带的特殊字符,其中,所述特殊字符为特定的字符串;Obtaining a special character carried in the anti-theft instruction, wherein the special character is a specific character string;
    根据所述特殊字符确定所述发送方的身份信息。The identity information of the sender is determined according to the special character.
  92. 根据权利要求90或91所述的方法,其中,所述发送方的身份信息包括下列至少之一:The method according to claim 90 or 91, wherein the identity information of the sender comprises at least one of the following:
    所述发送方为移动终端;The sender is a mobile terminal;
    所述发送方为服务器;The sender is a server;
    所述发送方为个人电脑PC终端。The sender is a personal computer PC terminal.
  93. 根据权利要求90至92任一项所述的方法,其中,还包括:The method of any one of claims 90 to 92, further comprising:
    分别接收到身份信息不同的发送方发送的防盗指令时,判断在后接收的防盗指令解析出的防盗命令是否与在前接收的防盗指令解析出的防盗命令互斥;When receiving the anti-theft command sent by the sender with different identity information, it is determined whether the anti-theft command parsed by the anti-theft command received later is mutually exclusive with the anti-theft command parsed by the previously received anti-theft command;
    若是,则拒绝执行后一防盗命令; If yes, refuse to execute the latter anti-theft command;
    若否,则继续执行后一防盗命令。If no, continue to execute the latter anti-theft command.
  94. 根据权利要求92或93所述的方法,其中,The method according to claim 92 or 93, wherein
    所述发送方为移动终端时,匹配的防盗策略为短信防盗策略;When the sender is a mobile terminal, the matched anti-theft policy is a short message anti-theft strategy;
    所述发送方为服务器时,匹配的防盗策略为账号防盗策略;When the sender is a server, the matched anti-theft policy is an account anti-theft policy;
    所述发送方为PC终端时,匹配的防盗策略为PC防盗策略或者所述账号防盗策略。When the sender is a PC terminal, the matched anti-theft policy is a PC anti-theft policy or the account anti-theft policy.
  95. 根据权利要求91至94任一项所述的方法,其中,所述防盗指令的内容除包括所述特殊字符外,还包括下列至少之一:所述已激活账户标识、防盗命令、防盗对象标识。The method according to any one of claims 91 to 94, wherein the content of the anti-theft instruction includes at least one of the following: in addition to the special character: the activated account identifier, the anti-theft command, the anti-theft object identifier .
  96. 根据权利要求95所述的方法,其中,The method of claim 95, wherein
    所述特殊字符为Account;The special character is Account;
    所述已激活账户标识为当前登录时为该账户生成的唯一的账号识别码UID;The activated account identifier is a unique account identifier UID generated for the account when currently logged in;
    所述防盗命令包括命令编号和/或任务编号;The anti-theft command includes a command number and/or a task number;
    所述防盗对象标识包括本移动终端的IMEI。The anti-theft object identifier includes an IMEI of the mobile terminal.
  97. 根据权利要求91至96任一项所述的方法,其中,所述防盗命令中除所述特殊字符外的内容为加密内容;以及The method according to any one of claims 91 to 96, wherein content other than the special character in the anti-theft command is encrypted content;
    采用相应的解密手段对接收的防盗指令进行解密,获取所述防盗指令的可解析内容。The received anti-theft instruction is decrypted by using a corresponding decryption means to obtain the parsable content of the anti-theft instruction.
  98. 根据权利要求97所述的方法,其中,加密的防盗指令包括以下至少一项:The method of claim 97, wherein the encrypted anti-theft instruction comprises at least one of the following:
    删除手机数据指令;Delete the mobile phone data command;
    备份手机数据指令。Back up your phone data instructions.
  99. 一种移动终端防盗客户端,包括:A mobile terminal anti-theft client includes:
    确定模块,配置为根据来自发送方的防盗指令确定所述发送方的身份信息;a determining module configured to determine identity information of the sender according to an anti-theft command from a sender;
    解析模块,配置为启动与所述发送方身份信息匹配的防盗策略解析所述防盗指令,得到该指令对应的防盗命令;The parsing module is configured to start an anti-theft command that matches the identity information of the sender, and parse the anti-theft command to obtain an anti-theft command corresponding to the instruction;
    执行模块,配置为执行所述防盗命令对应的操作,以实现移动终端防盗。The execution module is configured to perform an operation corresponding to the anti-theft command to implement anti-theft of the mobile terminal.
  100. 根据权利要求99所述的客户端,其中,所述确定模块还配置为:The client of claim 99, wherein the determining module is further configured to:
    获取所述防盗指令中携带的特殊字符,其中,所述特殊字符为特定的字符串;Obtaining a special character carried in the anti-theft instruction, wherein the special character is a specific character string;
    根据所述特殊字符确定所述发送方的身份信息。The identity information of the sender is determined according to the special character.
  101. 根据权利要求99或100所述的客户端,其中,所述发送方的身份信息包括下列至少之一:The client according to claim 99 or 100, wherein the identity information of the sender comprises at least one of the following:
    所述发送方为移动终端;The sender is a mobile terminal;
    所述发送方为服务器;The sender is a server;
    所述发送方为个人电脑PC终端。The sender is a personal computer PC terminal.
  102. 根据权利要求99至101任一项所述的客户端,其中,还包括判断模块,配置为:The client according to any one of claims 99 to 101, further comprising a judging module configured to:
    分别接收到身份信息不同的发送方发送的防盗指令时,判断在后接收的防盗指令解析出的防盗命令是否与在前接收的防盗指令解析出的防盗命令互斥; When receiving the anti-theft command sent by the sender with different identity information, it is determined whether the anti-theft command parsed by the anti-theft command received later is mutually exclusive with the anti-theft command parsed by the previously received anti-theft command;
    若是,则拒绝执行后一防盗命令;If yes, refuse to execute the latter anti-theft command;
    若否,则继续执行后一防盗命令。If no, continue to execute the latter anti-theft command.
  103. 根据权利要求101或102所述的客户端,其中,A client according to claim 101 or 102, wherein
    所述发送方为移动终端时,匹配的防盗策略为短信防盗策略;When the sender is a mobile terminal, the matched anti-theft policy is a short message anti-theft strategy;
    所述发送方为服务器时,匹配的防盗策略为账号防盗策略;When the sender is a server, the matched anti-theft policy is an account anti-theft policy;
    所述发送方为PC终端时,匹配的防盗策略为PC防盗策略或者所述账号防盗策略。When the sender is a PC terminal, the matched anti-theft policy is a PC anti-theft policy or the account anti-theft policy.
  104. 根据权利要求100至103中任一项所述的客户端,其中,所述防盗指令的内容除包括所述特殊字符外,还包括下列至少之一:所述已激活账户标识、防盗命令、防盗对象标识。The client according to any one of claims 100 to 103, wherein the content of the anti-theft instruction includes at least one of the following: in addition to the special character: the activated account identifier, the anti-theft command, the theft prevention Object ID.
  105. 根据权利要求104所述的客户端,其中,A client according to claim 104, wherein
    所述特殊字符为Account;The special character is Account;
    所述已激活账户标识为当前登录时为该账户生成的唯一的账号识别码UID;The activated account identifier is a unique account identifier UID generated for the account when currently logged in;
    所述防盗命令包括命令编号和/或任务编号;The anti-theft command includes a command number and/or a task number;
    所述防盗对象标识包括本移动终端的IMEI。The anti-theft object identifier includes an IMEI of the mobile terminal.
  106. 根据权利要求100至105任一项所述的客户端,其中,还包括:The client according to any one of claims 100 to 105, further comprising:
    解密模块,配置为所述防盗命令中除所述特殊字符外的内容为加密内容时,采用相应的解密手段对接收的防盗指令进行解密,获取所述防盗指令的可解析内容。The decryption module is configured to decrypt the received anti-theft instruction by using a corresponding decryption means when the content of the anti-theft command is encrypted content, and obtain the parsable content of the anti-theft instruction.
  107. 根据权利要求106所述的客户端,其中,加密的防盗指令包括以下至少一项:The client of claim 106, wherein the encrypted anti-theft instruction comprises at least one of the following:
    删除手机数据指令;Delete the mobile phone data command;
    备份手机数据指令。Back up your phone data instructions.
  108. 一种计算机程序,包括计算机可读代码,当所述计算机可读代码在计算设备上运行时,导致所述计算设备执行根据权利要求23至34任一项所述的移动终端防盗方法,和/或,权利要求43至60任一项所述的移动终端防盗方法,和/或,权利要求71至80任一项所述的移动终端防盗方法,和/或,权利要求90至98任一项所述的移动终端防盗方法。A computer program comprising computer readable code, when the computer readable code is run on a computing device, causing the computing device to perform the mobile terminal theft prevention method according to any one of claims 23 to 34, and/ Or the mobile terminal anti-theft method according to any one of claims 43 to 60, and/or the mobile terminal anti-theft method according to any one of claims 71 to 80, and/or any one of claims 90 to 98 The mobile terminal anti-theft method.
  109. 一种计算机可读介质,其中存储了如权利要求108所述的计算机程序。 A computer readable medium storing the computer program of claim 108.
PCT/CN2014/093636 2013-12-13 2014-12-11 Mobile terminal antitheft method and client WO2015085940A1 (en)

Applications Claiming Priority (10)

Application Number Priority Date Filing Date Title
CN201310687136.X 2013-12-13
CN201310684848.6A CN103702317B (en) 2013-12-13 2013-12-13 Anti-theft method for mobile terminal and client
CN201310687136.XA CN103702331A (en) 2013-12-13 2013-12-13 Mobile terminal antitheft method and client
CN201310687832.0 2013-12-13
CN201310687832.0A CN103702318A (en) 2013-12-13 2013-12-13 Mobile terminal antitheft method and client
CN201310686970.7A CN103716791B (en) 2013-12-13 2013-12-13 Anti-theft method for mobile terminal and client
CN201310684896.5 2013-12-13
CN201310684896.5A CN103702299A (en) 2013-12-13 2013-12-13 Mobile terminal antitheft method and client
CN201310684848.6 2013-12-13
CN201310686970.7 2013-12-13

Publications (1)

Publication Number Publication Date
WO2015085940A1 true WO2015085940A1 (en) 2015-06-18

Family

ID=53370635

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/093636 WO2015085940A1 (en) 2013-12-13 2014-12-11 Mobile terminal antitheft method and client

Country Status (1)

Country Link
WO (1) WO2015085940A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112437428A (en) * 2020-11-27 2021-03-02 中国联合网络通信集团有限公司 Verification method and server
CN112653998A (en) * 2021-01-07 2021-04-13 深圳市广和通无线股份有限公司 Terminal equipment loss positioning method, terminal equipment and storage medium
US11991525B2 (en) 2021-12-02 2024-05-21 T-Mobile Usa, Inc. Wireless device access and subsidy control

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1859677A (en) * 2006-03-15 2006-11-08 华为技术有限公司 Method for protecting information safety in mobile terminal
CN101039346A (en) * 2006-03-16 2007-09-19 上海晨兴电子科技有限公司 Handset anti-theft method, equipment and communication terminal having the same
CN102231740A (en) * 2011-06-24 2011-11-02 中兴通讯股份有限公司 Antitheft platform, client, terminal and antitheft processing method for mobile terminal
CN103702299A (en) * 2013-12-13 2014-04-02 北京奇虎科技有限公司 Mobile terminal antitheft method and client
CN103702318A (en) * 2013-12-13 2014-04-02 北京奇虎科技有限公司 Mobile terminal antitheft method and client
CN103702317A (en) * 2013-12-13 2014-04-02 北京奇虎科技有限公司 Mobile terminal antitheft method and client
CN103702331A (en) * 2013-12-13 2014-04-02 北京奇虎科技有限公司 Mobile terminal antitheft method and client
CN103716791A (en) * 2013-12-13 2014-04-09 北京奇虎科技有限公司 Mobile terminal theft prevention method and client

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1859677A (en) * 2006-03-15 2006-11-08 华为技术有限公司 Method for protecting information safety in mobile terminal
CN101039346A (en) * 2006-03-16 2007-09-19 上海晨兴电子科技有限公司 Handset anti-theft method, equipment and communication terminal having the same
CN102231740A (en) * 2011-06-24 2011-11-02 中兴通讯股份有限公司 Antitheft platform, client, terminal and antitheft processing method for mobile terminal
CN103702299A (en) * 2013-12-13 2014-04-02 北京奇虎科技有限公司 Mobile terminal antitheft method and client
CN103702318A (en) * 2013-12-13 2014-04-02 北京奇虎科技有限公司 Mobile terminal antitheft method and client
CN103702317A (en) * 2013-12-13 2014-04-02 北京奇虎科技有限公司 Mobile terminal antitheft method and client
CN103702331A (en) * 2013-12-13 2014-04-02 北京奇虎科技有限公司 Mobile terminal antitheft method and client
CN103716791A (en) * 2013-12-13 2014-04-09 北京奇虎科技有限公司 Mobile terminal theft prevention method and client

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112437428A (en) * 2020-11-27 2021-03-02 中国联合网络通信集团有限公司 Verification method and server
CN112437428B (en) * 2020-11-27 2022-08-19 中国联合网络通信集团有限公司 Verification method and server
CN112653998A (en) * 2021-01-07 2021-04-13 深圳市广和通无线股份有限公司 Terminal equipment loss positioning method, terminal equipment and storage medium
US11991525B2 (en) 2021-12-02 2024-05-21 T-Mobile Usa, Inc. Wireless device access and subsidy control

Similar Documents

Publication Publication Date Title
CN110121873B (en) Access token management method, terminal and server
US8554176B2 (en) Method and apparatus for creating a remotely activated secure backup service for mobile handsets
CN104662870B (en) Data safety management system
CN103702317B (en) Anti-theft method for mobile terminal and client
CN101304418A (en) Client side protection against drive-by pharming via referrer checking
WO2015066236A1 (en) Authentication for application
CN103702318A (en) Mobile terminal antitheft method and client
CN103825863B (en) A kind of accounts management method and device
CN109792601B (en) Method and equipment for deleting eUICC configuration file
CN103905399A (en) Account registration management method and apparatus
WO2012174898A1 (en) Anti-theft platform and client, terminal and mobile terminal anti-theft processing method
WO2015085940A1 (en) Mobile terminal antitheft method and client
KR20150026587A (en) Apparatus, method and computer readable recording medium for providing notification of log-in from new equipments
US20120144470A1 (en) User authentication method using location information
WO2017201804A1 (en) Method for anti-theft verification of terminal, terminal, and server
TWI759908B (en) The method of generating the authorization allow list and the information security system using it
CN101854357B (en) Method and system for monitoring network authentication
WO2015085942A1 (en) Terminal status query method, terminal anti-theft method and corresponding device
KR101294805B1 (en) 2-channel authentication method and system based on authentication application
KR100563544B1 (en) Method for authenticating a user with one-time password
JP6307610B2 (en) Data falsification detection device, data falsification detection method, and program
JP4894382B2 (en) Security system, information processing apparatus, information protection method, program
KR101212510B1 (en) System and method for service security based on location
JP2007053454A (en) Authentication device and method
KR101195027B1 (en) System and method for service security

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14868827

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 14868827

Country of ref document: EP

Kind code of ref document: A1