WO2018232660A1 - Mobile terminal information releasing method and mobile terminal - Google Patents
Mobile terminal information releasing method and mobile terminal Download PDFInfo
- Publication number
- WO2018232660A1 WO2018232660A1 PCT/CN2017/089444 CN2017089444W WO2018232660A1 WO 2018232660 A1 WO2018232660 A1 WO 2018232660A1 CN 2017089444 W CN2017089444 W CN 2017089444W WO 2018232660 A1 WO2018232660 A1 WO 2018232660A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- mobile terminal
- communication account
- communication
- logged
- account
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/725—Cordless telephones
Definitions
- the present invention relates to the field of communications technologies, and in particular, to a mobile terminal information publishing method and a mobile terminal.
- the location information is sent to the server, for example, by the mobile terminal, and the server transmits the location information to the user according to the received location information, so that the user can search for the mobile terminal according to the location information.
- the server since the user only retrieves the mobile terminal based on the location information, it is highly likely that the mobile terminal cannot be retrieved. It can be seen that the probability that the mobile terminal is lost and retrieved is relatively low.
- the object of the present invention is to provide a mobile terminal information publishing method and a mobile terminal, which solves the problem that the probability of loss recovery of the mobile terminal is relatively low.
- an embodiment of the present invention provides a method for publishing information of a mobile terminal, including:
- the mobile terminal determines whether it is currently in a stolen state
- the mobile terminal If the mobile terminal belongs to the stolen state, and the mobile terminal detects that the mobile terminal is abnormally unlocked, the mobile terminal detects whether the currently registered communication account is a communication account that has been logged in by the mobile terminal history;
- the mobile terminal issues the communication account in the social webpage of the communication account and logs in on the mobile terminal that the user steals. Notifying the message, and transmitting the account information of the communication account to the pre-bound terminal device.
- the method further includes:
- the mobile terminal specially sets the notification message in the social webpage, and the special setting The setting includes not being visible to the communication account itself.
- the method further includes:
- the mobile terminal sends a notification message to each communication contact person in the address book of the communication account, the communication account is logged in on the mobile terminal stolen by the user, and deletes the group record.
- the mobile terminal determines whether it is currently in a stolen state, including:
- the method further includes:
- the mobile terminal When the mobile terminal is in a stolen state, the mobile terminal hides an application specified on the mobile terminal that needs to be kept secret from being hidden on the interface, and prohibits the pre-designated application that needs to be kept secret, and The location information is sent to the pre-bound terminal device.
- the method further includes:
- the mobile terminal matches the communication information included in the address book of the communication account with the communication information in the communication record of the communication account that the mobile terminal has logged in, and if the same communication information is matched, the communication is performed
- the communication account corresponding to the information is sent a notification message that the communication account is logged in to the mobile terminal, and the notification message further includes a communication account that the mobile terminal has logged in to indicate that the mobile terminal is the mobile terminal.
- the embodiment of the invention further provides a mobile terminal, including:
- a judging module configured to determine whether the current status is stolen
- a detecting module configured to: if the mobile terminal is in a stolen state, and the mobile terminal detects that the mobile terminal is abnormally unlocked, detecting whether the currently registered communication account is a communication account that has been logged in by the mobile terminal history ;
- a publishing module configured to: the mobile terminal that is currently logged in is not the communication account that has been logged in by the mobile terminal history, and the mobile terminal publishes the communication account in the social webpage of the communication account and logs in on the mobile terminal that the user steals The notification message, and the account information of the communication account is sent to the pre-bound terminal device.
- the mobile terminal further includes:
- a setting module configured to perform special setting on the notification message in the social webpage, the special The settings include not being visible to the communication account itself.
- the mobile terminal further includes:
- the group sending module is configured to send, in the address book of the communication account, each communication contact group, the notification message that the communication account is logged in on the mobile terminal that the user steals, and delete the grouped record.
- the determining module is configured to determine whether the location information of the mobile terminal belongs to a location range corresponding to a motion track pre-stored by the mobile terminal, and if the location information does not belong to the location range, determine the The mobile terminal is in a stolen state;
- the mobile terminal further includes:
- a hiding module when the mobile terminal is in a stolen state, the mobile terminal hides an application specified on the mobile terminal that needs to be kept secret from being hidden on the interface, and prohibits the pre-designated application that needs to be kept secret Run and send the location information to the pre-bound terminal device.
- the mobile terminal further includes:
- a sending module configured to: the mobile terminal matches the communication information included in the address book of the communication account with the communication information in the communication record of the communication account that the mobile terminal has logged in, if the same communication information is matched Transmitting, by the communication account corresponding to the communication information, a notification message that the communication account is logged in to the mobile terminal, and the notification message further includes a communication account that the mobile terminal has logged in to indicate the mobile terminal a mobile terminal that is a communication account that has been logged in by the mobile terminal history.
- the mobile terminal determines whether the mobile terminal belongs to the stolen state; if the mobile terminal belongs to the stolen state, and the mobile terminal detects that the mobile terminal is abnormally unlocked, the mobile terminal detects the current login. Whether the communication account is a communication account that has been logged in by the mobile terminal history; if the communication account currently logged in by the mobile terminal is not a communication account that has been logged in by the mobile terminal history, the mobile terminal is socialized in the communication account.
- the webpage publishes a notification message that the communication account is logged in on the mobile terminal that the user steals, and sends the account information of the communication account to the pre-bound terminal device. In this way, the user can directly contact the thief through the communication account to improve the probability of retrieving the mobile terminal.
- FIG. 1 is a schematic flowchart of a method for publishing information of a mobile terminal according to an embodiment of the present invention
- FIG. 2 is a schematic structural diagram of a mobile terminal according to an embodiment of the present invention.
- FIG. 3 is a schematic structural diagram of another mobile terminal according to an embodiment of the present invention.
- FIG. 4 is a schematic structural diagram of another mobile terminal according to an embodiment of the present invention.
- FIG. 5 is a schematic structural diagram of another mobile terminal according to an embodiment of the present disclosure.
- FIG. 6 is a schematic structural diagram of another mobile terminal according to an embodiment of the present invention.
- FIG. 1 is a schematic flowchart of a method for publishing information of a mobile terminal according to an embodiment of the present invention. As shown in FIG. 1
- the mobile terminal determines whether the current state is a stolen state
- the mobile terminal detects whether the currently logged-in communication account is a communication that has been logged in by the mobile terminal history. account number;
- the communication account currently registered by the mobile terminal is not a communication account that has been logged in by the mobile terminal history, and the mobile terminal issues the communication account on the mobile terminal of the communication account on the mobile terminal that the user steals.
- the login notification message, and the account information of the communication account is sent to the pre-bound terminal device.
- the stolen state may be that the user who uses the mobile terminal is not the user of the mobile terminal itself, that is, used by others.
- the above abnormal unlocking can be understood as not using the unlocking of the unlocking code of the mobile terminal.
- the above-mentioned steps can be implemented to release the social network page of the communication account.
- the account information of the communication account so that the user can directly find the thief according to the account, so as to conveniently retrieve the mobile terminal.
- the method further includes:
- the mobile terminal specially sets the notification message in the social webpage, and the special setting includes not being visible to the communication account itself.
- setting the notification message in the social webpage to be invisible to the communication account itself may be beneficial to spread the notification message in the social network, so as to prevent the thief from the message from the social network. Deleted.
- the method further includes:
- the mobile terminal sends a notification message to each communication contact person in the address book of the communication account, the communication account is logged in on the mobile terminal stolen by the user, and deletes the group record.
- the foregoing notification message is grouped in the address book, which is more advantageous for the diffusion of the notification province, so that the user can quickly view the notification message and retrieve the mobile terminal in time.
- the mobile terminal determines whether it is currently in a stolen state, including:
- the method further includes:
- the mobile terminal When the mobile terminal is in a stolen state, the mobile terminal hides an application specified on the mobile terminal that needs to be kept secret from being hidden on the interface, and prohibits the pre-designated application that needs to be kept secret, and The location information is sent to the pre-bound terminal device.
- the stolen state of the mobile terminal can be accurately determined through the foregoing steps, and the application that needs to be kept secret is hidden on the interface, and the application that needs to be kept secret is prohibited from being operated, and
- the location information is sent to the pre-bound terminal device, so that the security information of the mobile terminal is effectively protected to prevent the security information from being leaked.
- the location information is sent to the pre-bound terminal device, thereby facilitating the user to retrieve the mobile terminal.
- the method further includes:
- the mobile terminal matches the communication information included in the address book of the communication account with the communication information in the communication record of the communication account that the mobile terminal has logged in, and if the same communication information is matched, the communication is performed
- the communication account corresponding to the information is sent a notification message that the communication account is logged in to the mobile terminal, and the notification message further includes a communication account that the mobile terminal has logged in to indicate that the mobile terminal is the mobile terminal.
- the same communication information exists, that is, the two communication accounts have the same communication friend, so that the user is more convenient to retrieve the mobile terminal through the friend. Because, through this friend, you can directly contact the thief.
- the mobile terminal determines whether the mobile terminal belongs to the stolen state; if the mobile terminal belongs to the stolen state, and the mobile terminal detects that the mobile terminal is abnormally unlocked, the mobile terminal detects the current login. Whether the communication account is a communication account that has been logged in by the mobile terminal history; if the communication account currently logged in by the mobile terminal is not a communication account that has been logged in by the mobile terminal history, the mobile terminal is socialized in the communication account.
- the webpage publishes a notification message that the communication account is logged in on the mobile terminal that the user steals, and sends the account information of the communication account to the pre-bound terminal device. In this way, the user can directly contact the thief through the communication account to improve the probability of retrieving the mobile terminal.
- FIG. 2 is a schematic structural diagram of a mobile terminal according to an embodiment of the present invention. As shown in FIG. 2, the method includes:
- the determining module 201 is configured to determine whether the current state is a stolen state
- the detecting module 202 is configured to detect, if the mobile terminal belongs to a stolen state, and the mobile terminal detects that the mobile terminal is abnormally unlocked, whether the currently registered communication account is a communication that has been logged in by the mobile terminal history. account number;
- a publishing module 203 configured to: when the currently registered communication account is not a communication account that has been logged in by the mobile terminal history, the mobile terminal issues the communication account in the social network page of the communication account on the mobile terminal that the user steals The login notification message, and the account information of the communication account is sent to the pre-bound terminal device.
- the mobile terminal further includes:
- a setting module 204 configured to perform special setting on the notification message in the social webpage
- Special settings include invisibility to the communication account itself.
- the mobile terminal further includes:
- the group sending module 205 is configured to send, in the address book of the communication account, each communication contact group, the notification message that the communication account is logged in on the mobile terminal that the user steals, and delete the grouped record.
- the determining module 201 is configured to determine whether the location information of the mobile terminal belongs to a location range corresponding to a motion track pre-stored by the mobile terminal, and if the location information does not belong to the location range, determine the location The mobile terminal is in a stolen state;
- the mobile terminal further includes:
- a hiding module 206 configured to: when the mobile terminal is in a stolen state, the mobile terminal hides an application specified on the mobile terminal that needs to be kept secret from being hidden on the interface, and prohibits the pre-designated application that needs to be kept secret
- the program runs and sends the location information to the pre-bound terminal device.
- the mobile terminal further includes:
- the sending module 207 is configured to: the mobile terminal matches the communication information included in the address book of the communication account with the communication information in the communication record of the communication account that the mobile terminal has logged in, if the same communication is matched And transmitting, to the communication account corresponding to the communication information, a notification message that the communication account is logged in on the mobile terminal, and the notification message further includes a communication account that the mobile terminal has logged in to indicate the movement
- the terminal is a mobile terminal of a communication account that has been logged in by the mobile terminal history.
- the mobile terminal determines whether the mobile terminal belongs to the stolen state; if the mobile terminal belongs to the stolen state, and the mobile terminal detects that the mobile terminal is abnormally unlocked, the mobile terminal detects the current login. Whether the communication account is a communication account that has been logged in by the mobile terminal history; if the communication account currently logged in by the mobile terminal is not a communication account that has been logged in by the mobile terminal history, the mobile terminal is socialized in the communication account.
- the webpage publishes a notification message that the communication account is logged in on the mobile terminal that the user steals, and sends the account information of the communication account to the pre-bound terminal device. In this way, the user can directly contact the thief through the communication account to improve the probability of retrieving the mobile terminal.
- the disclosed method and apparatus may be implemented in other manners.
- the device embodiments described above are merely illustrative, for example, The division of the unit is only a logical function division, and the actual implementation may have another division manner.
- multiple units or components may be combined or may be integrated into another system, or some features may be ignored or not executed.
- the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
- each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may be physically included separately, or two or more units may be integrated into one unit.
- the above integrated unit can be implemented in the form of hardware or in the form of hardware plus software functional units.
- the above-described integrated unit implemented in the form of a software functional unit can be stored in a computer readable storage medium.
- the above software functional unit is stored in a storage medium and includes a plurality of instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform part of the steps of the transceiving method of the various embodiments of the present invention.
- the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like, and the program code can be stored. Medium.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephone Function (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
Claims (10)
- 一种移动终端信息发布方法,其特征在于,包括:A mobile terminal information publishing method, comprising:移动终端判断当前是否属于被盗状态;The mobile terminal determines whether it is currently in a stolen state;若所述移动终端属于被盗状态,且所述移动终端检测到所述移动终端被非正常解锁时,所述移动终端检测当前登录的通信账号是否为所述移动终端历史登录过的通信账号;If the mobile terminal belongs to the stolen state, and the mobile terminal detects that the mobile terminal is abnormally unlocked, the mobile terminal detects whether the currently registered communication account is a communication account that has been logged in by the mobile terminal history;所述移动终端当前登录的通信账号不为所述移动终端历史登录过的通信账号,则所述移动终端在所述通信账号的社交网页中发布所述通信账号在用户偷盗的移动终端上登录的通知消息,以及向预先绑定的终端设备发送所述通信账号的账号信息。If the communication account currently registered by the mobile terminal is not the communication account that has been logged in by the mobile terminal history, the mobile terminal issues the communication account in the social webpage of the communication account and logs in on the mobile terminal that the user steals. Notifying the message, and transmitting the account information of the communication account to the pre-bound terminal device.
- 如权利要求1所述的方法,其特征在于,所述方法还包括:The method of claim 1 wherein the method further comprises:所述移动终端在所述社交网页中对所述通知消息做特殊设置,所述特殊设置包括对所述通信账号本身不可见。The mobile terminal specially sets the notification message in the social webpage, and the special setting includes not being visible to the communication account itself.
- 如权利要求1或2所述的方法,其特征在于,所述方法还包括:The method of claim 1 or 2, wherein the method further comprises:所述移动终端在所述通信账号的通讯录中各通信联系人群发,所述通信账号在用户偷盗的移动终端上登录的通知消息,并删除所述群发的记录。The mobile terminal sends a notification message to each communication contact person in the address book of the communication account, the communication account is logged in on the mobile terminal stolen by the user, and deletes the group record.
- 如权利要求3所述的方法,其特征在于,所述移动终端判断当前是否属于被盗状态,包括:The method of claim 3, wherein the mobile terminal determines whether it is currently in a stolen state, including:所述移动终端判断所述移动终端的位置信息是否属于所述移动终端预先存储的运动轨迹所对应的位置范围;Determining, by the mobile terminal, location information of the mobile terminal that belongs to a location range corresponding to a motion track pre-stored by the mobile terminal;若所述位置信息不属于所述位置范围,则确定所述移动终端处于被盗状态;If the location information does not belong to the location range, determining that the mobile terminal is in a stolen state;所述方法还包括:The method further includes:所述移动终端处于被盗状态时,所述移动终端将所述移动终端上安装的预先指定需要保密的应用程序在界面上隐藏,且禁止所述预先指定需要保密的应用程序运行,并将所述位置信息发送给预先绑定的终端设备。When the mobile terminal is in a stolen state, the mobile terminal hides an application specified on the mobile terminal that needs to be kept secret from being hidden on the interface, and prohibits the pre-designated application that needs to be kept secret, and The location information is sent to the pre-bound terminal device.
- 如权利要求4所述的方法,其特征在于,所述方法还包括:The method of claim 4, wherein the method further comprises:所述移动终端将所述通信账号的通讯录中包括的通信信息与所述移动终端历史登录过的通信账号的通信录中的通信信息进行匹配,若匹配到相同的通信信息,则向该通信信息对应的通讯账号发送所述通信账号在所述移动终端上 登录的通知消息,且该通知消息中还包括所述移动终端历史登录过的通信账号,以表示所述移动终端为所述移动终端历史登录过的通信账号的移动终端。The mobile terminal matches the communication information included in the address book of the communication account with the communication information in the communication record of the communication account that the mobile terminal has logged in, and if the same communication information is matched, the communication is performed The communication account corresponding to the information sends the communication account on the mobile terminal The notification message of the login, and the communication message further includes the communication account that the mobile terminal has logged in to indicate that the mobile terminal is the mobile terminal of the communication account that the mobile terminal has logged in.
- 一种移动终端,其特征在于,包括:A mobile terminal, comprising:判断模块,用于判断当前是否属于被盗状态;a judging module, configured to determine whether the current status is stolen;检测模块,用于若所述移动终端属于被盗状态,且所述移动终端检测到所述移动终端被非正常解锁时,检测当前登录的通信账号是否为所述移动终端历史登录过的通信账号;a detecting module, configured to: if the mobile terminal is in a stolen state, and the mobile terminal detects that the mobile terminal is abnormally unlocked, detecting whether the currently registered communication account is a communication account that has been logged in by the mobile terminal history ;发布模块,用于当前登录的通信账号不为所述移动终端历史登录过的通信账号,则所述移动终端在所述通信账号的社交网页中发布所述通信账号在用户偷盗的移动终端上登录的通知消息,以及向预先绑定的终端设备发送所述通信账号的账号信息。a publishing module, configured to: the mobile terminal that is currently logged in is not the communication account that has been logged in by the mobile terminal history, and the mobile terminal publishes the communication account in the social webpage of the communication account and logs in on the mobile terminal that the user steals The notification message, and the account information of the communication account is sent to the pre-bound terminal device.
- 如权利要求6所述的移动终端,其特征在于,所述移动终端还包括:The mobile terminal of claim 6, wherein the mobile terminal further comprises:设置模块,用于在所述社交网页中对所述通知消息做特殊设置,所述特殊设置包括对所述通信账号本身不可见。And a setting module, configured to perform special setting on the notification message in the social webpage, where the special setting comprises not being visible to the communication account itself.
- 如权利要求6或7所述的移动终端,其特征在于,所述移动终端还包括:The mobile terminal according to claim 6 or 7, wherein the mobile terminal further comprises:群发模块,用于在所述通信账号的通讯录中各通信联系人群发,所述通信账号在用户偷盗的移动终端上登录的通知消息,并删除所述群发的记录。The group sending module is configured to send, in the address book of the communication account, each communication contact group, the notification message that the communication account is logged in on the mobile terminal that the user steals, and delete the grouped record.
- 如权利要求8所述的移动终端,其特征在于,所述判断模块用于判断所述移动终端的位置信息是否属于所述移动终端预先存储的运动轨迹所对应的位置范围,若所述位置信息不属于所述位置范围,则确定所述移动终端处于被盗状态;The mobile terminal according to claim 8, wherein the determining module is configured to determine whether the location information of the mobile terminal belongs to a location range corresponding to a motion track pre-stored by the mobile terminal, if the location information Not belonging to the location range, determining that the mobile terminal is in a stolen state;所述移动终端还包括:The mobile terminal further includes:隐藏模块,用于所述移动终端处于被盗状态时,所述移动终端将所述移动终端上安装的预先指定需要保密的应用程序在界面上隐藏,且禁止所述预先指定需要保密的应用程序运行,并将所述位置信息发送给预先绑定的终端设备。a hiding module, when the mobile terminal is in a stolen state, the mobile terminal hides an application specified on the mobile terminal that needs to be kept secret from being hidden on the interface, and prohibits the pre-designated application that needs to be kept secret Run and send the location information to the pre-bound terminal device.
- 如权利要求9所述的移动终端,其特征在于,所述移动终端还包括:The mobile terminal of claim 9, wherein the mobile terminal further comprises:发送模块,用于所述移动终端将所述通信账号的通讯录中包括的通信信息与所述移动终端历史登录过的通信账号的通信录中的通信信息进行匹配,若匹 配到相同的通信信息,则向该通信信息对应的通讯账号发送所述通信账号在所述移动终端上登录的通知消息,且该通知消息中还包括所述移动终端历史登录过的通信账号,以表示所述移动终端为所述移动终端历史登录过的通信账号的移动终端。 a sending module, configured to: the mobile terminal matches the communication information included in the address book of the communication account with the communication information in the communication record of the communication account that the mobile terminal has logged in, if And assigning the same communication information, sending a notification message that the communication account is logged in to the mobile terminal to the communication account corresponding to the communication information, and the notification message further includes a communication account that has been logged in by the mobile terminal history. A mobile terminal that indicates that the mobile terminal is a communication account that has been logged in by the mobile terminal history.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2017/089444 WO2018232660A1 (en) | 2017-06-21 | 2017-06-21 | Mobile terminal information releasing method and mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2017/089444 WO2018232660A1 (en) | 2017-06-21 | 2017-06-21 | Mobile terminal information releasing method and mobile terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018232660A1 true WO2018232660A1 (en) | 2018-12-27 |
Family
ID=64737458
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2017/089444 WO2018232660A1 (en) | 2017-06-21 | 2017-06-21 | Mobile terminal information releasing method and mobile terminal |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2018232660A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111311285A (en) * | 2020-02-21 | 2020-06-19 | 深圳壹账通智能科技有限公司 | Method, device, equipment and storage medium for preventing user from illegally logging in |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103491236A (en) * | 2012-06-13 | 2014-01-01 | 鸿富锦精密工业(深圳)有限公司 | Electronic device with theft tracking function and theft tracking method |
CN103581441A (en) * | 2013-10-31 | 2014-02-12 | 中国电子科技集团公司第十五研究所 | Mobile terminal tracking anti-theft system and method |
CN103973876A (en) * | 2013-02-05 | 2014-08-06 | 联想移动通信科技有限公司 | Mobile terminal and tracking method for lost mobile terminal |
US20150207917A1 (en) * | 2012-12-14 | 2015-07-23 | Beijing Netqin Technology Co., Ltd. | Mobile terminal intelligent anti-theft method and mobile terminal |
CN105915714A (en) * | 2016-05-24 | 2016-08-31 | 北京小米移动软件有限公司 | Method and device for prompting terminal loss |
CN106161514A (en) * | 2015-03-31 | 2016-11-23 | 小米科技有限责任公司 | Information processing method and device |
-
2017
- 2017-06-21 WO PCT/CN2017/089444 patent/WO2018232660A1/en active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103491236A (en) * | 2012-06-13 | 2014-01-01 | 鸿富锦精密工业(深圳)有限公司 | Electronic device with theft tracking function and theft tracking method |
US20150207917A1 (en) * | 2012-12-14 | 2015-07-23 | Beijing Netqin Technology Co., Ltd. | Mobile terminal intelligent anti-theft method and mobile terminal |
CN103973876A (en) * | 2013-02-05 | 2014-08-06 | 联想移动通信科技有限公司 | Mobile terminal and tracking method for lost mobile terminal |
CN103581441A (en) * | 2013-10-31 | 2014-02-12 | 中国电子科技集团公司第十五研究所 | Mobile terminal tracking anti-theft system and method |
CN106161514A (en) * | 2015-03-31 | 2016-11-23 | 小米科技有限责任公司 | Information processing method and device |
CN105915714A (en) * | 2016-05-24 | 2016-08-31 | 北京小米移动软件有限公司 | Method and device for prompting terminal loss |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111311285A (en) * | 2020-02-21 | 2020-06-19 | 深圳壹账通智能科技有限公司 | Method, device, equipment and storage medium for preventing user from illegally logging in |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10318716B2 (en) | Systems and methods for identifying unauthorized users of an electronic device | |
US9763100B2 (en) | Instant messaging message processing method and device and storage medium | |
US9356920B2 (en) | Differentiating between good and bad content in a user-provided content system | |
US8549594B2 (en) | Method of identity authentication and fraudulent phone call verification that utilizes an identification code of a communication device and a dynamic password | |
CN104468611A (en) | Data security processing method and device based on dual-system switching | |
WO2015188739A1 (en) | Message processing method and apparatus | |
JP2018501694A (en) | System and method for protecting against unauthorized network intrusion | |
US20190342753A1 (en) | Device configuration method, apparatus and system | |
US11297024B1 (en) | Chat-based systems and methods for data loss prevention | |
TWI611359B (en) | Instant messaging message transmission method, system and device | |
CN104796310A (en) | Social communication method and system | |
CN104980899A (en) | Communication method and system for mobile terminal, mobile terminal and server | |
Rottermanner et al. | Privacy and data protection in smartphone messengers | |
US9338112B2 (en) | Safety protocols for messaging service-enabled cloud services | |
WO2018232660A1 (en) | Mobile terminal information releasing method and mobile terminal | |
US11212245B1 (en) | Detection of forged e-mail messages at e-mail gateway | |
US11363020B2 (en) | Method, device and storage medium for forwarding messages | |
CN113766166A (en) | Communication method and system of cloud video | |
TWI690190B (en) | Communication method capable of managing privacy right with virtual account | |
CN108694682B (en) | Method and system for setting user head portrait | |
CN107483326A (en) | A kind of information of mobile terminal dissemination method and mobile terminal | |
CN114070634B (en) | SMTP protocol-based secret stealing behavior detection method and device and electronic equipment | |
KR102156905B1 (en) | method for verifying user of messenger account for preventing messenger phishing | |
WO2018232650A1 (en) | Mobile terminal having communication account protection function and related product | |
Birlea | Phishing Attacks: Detection And Prevention |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17915059 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 17915059 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A OF 18.05.2020) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 17915059 Country of ref document: EP Kind code of ref document: A1 |