CN102104697A - Stealing processing method and device - Google Patents

Stealing processing method and device Download PDF

Info

Publication number
CN102104697A
CN102104697A CN2011100027693A CN201110002769A CN102104697A CN 102104697 A CN102104697 A CN 102104697A CN 2011100027693 A CN2011100027693 A CN 2011100027693A CN 201110002769 A CN201110002769 A CN 201110002769A CN 102104697 A CN102104697 A CN 102104697A
Authority
CN
China
Prior art keywords
terminal
stolen
platform
theft
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011100027693A
Other languages
Chinese (zh)
Inventor
熊静
王串辉
刘少华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN2011100027693A priority Critical patent/CN102104697A/en
Priority to PCT/CN2011/071491 priority patent/WO2012092723A1/en
Publication of CN102104697A publication Critical patent/CN102104697A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M11/00Telephonic communication systems specially adapted for combination with other electrical systems
    • H04M11/04Telephonic communication systems specially adapted for combination with other electrical systems with alarm systems, e.g. fire, police or burglar alarm systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • H04L12/1895Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for short real-time information, e.g. alarms, notifications, alerts, updates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Alarm Systems (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a stealing processing method and a stealing processing device. The method comprises that: a machine-to-machine (M2M) terminal is determined to be stolen; and the M2M terminal performs stealing processing, wherein the stealing processing comprises at least one of transmitting information used for indicating the M2M terminal is stolen to an M2M platform and the information used for tracking the M2M terminal, dialing a police-calling number and broadcasting the information used for tracking the M2M terminal. By the method and the device, the effect of stealing processing reliability is achieved.

Description

Stolen processing method and device
Technical Field
The invention relates to the field of communication, in particular to a stolen processing method and device.
Background
The machine-to-machine (M2M for short) is widely used, the module supporting the M2M communication protocol and the industrial application device form an integrated M2M terminal, and the terminals perform data communication with the M2M platform and other M2M terminals through a wireless network, so as to achieve the functions of data acquisition, information sharing, macro regulation and control and the like almost without manual intervention. However, since most terminals are unattended and many terminals are distributed in a plurality of places indoors and outdoors, the security and the theft prevention are a problem which cannot be ignored for some industrial application devices with certain economic values, such as sensors, liquid crystal screens and high-end cameras. Currently, in the related art, there is no anti-theft processing for the M2M terminal.
Disclosure of Invention
The present invention is directed to a method and apparatus for theft handling, which at least solve the above problems.
According to one aspect of the invention, a theft processing method is provided, which comprises the following steps: the machine-to-machine M2M terminal determines that it is stolen; the M2M terminal performs theft processing, wherein the theft processing comprises at least one of the following: sending information indicating that the M2M terminal has been stolen and information for tracking the M2M terminal to an M2M platform, dialing an alarm number, and broadcasting the information for tracking the M2M terminal.
Preferably, the determining that the M2M terminal is stolen comprises: the M2M terminal receives a message sent by the M2M platform to indicate that the M2M terminal has been stolen.
Preferably, the determining that the M2M terminal is stolen comprises: the M2M terminal establishes connection with the M2M platform and updates anti-theft parameters after performing normal data interaction with the M2M platform; the M2M terminal inquires whether the anti-theft parameter is updated or not, and determines that the M2M terminal is stolen under the condition that the anti-theft parameter is not updated in a preset time and/or the number of times that the anti-theft parameter is not updated reaches a threshold value.
Preferably, the information for tracking the M2M terminal is position information of the M2M terminal collected through a GPS chip.
Preferably, the information indicating that the M2M terminal has been stolen is an anti-theft key, where the anti-theft key is a security code negotiated by the M2M terminal and the M2M platform when the terminal is legally accessed, and used for proving the identity of the M2M terminal.
According to another aspect of the present invention, there is also provided a theft processing method, including: the M2M platform receives the information which is transmitted from the M2M terminal and used for indicating that the M2M terminal has been stolen and the information used for tracking the M2M terminal; the M2M platform determines that the M2M terminal is stolen.
Preferably, the method further comprises the following steps: the M2M platform sends a message to the M2M terminal indicating that the M2M terminal has been stolen.
Preferably, before the M2M platform sends the message for indicating that the M2M terminal has been stolen, the method further includes: the M2M platform determines that the M2M terminal is stolen under the condition that the data sent by the M2M terminal is abnormal; alternatively, the M2M platform receives the command to send the message indicating that the M2M terminal has been stolen to the M2M terminal.
According to an aspect of the present invention, there is also provided a theft processing apparatus, located in an M2M terminal, including: a determining module, configured to determine that the M2M terminal is stolen; a processing module, configured to perform theft processing on the M2M terminal, where the theft processing includes at least one of: sending information indicating that the M2M terminal has been stolen and information for tracking the M2M terminal to an M2M platform, dialing an alarm number, and broadcasting the information for tracking the M2M terminal.
According to another aspect of the present invention, there is also provided a theft processing apparatus, located in an M2M platform, including: the receiving module is used for receiving the information which is transmitted by the M2M platform and used for indicating that the M2M terminal has been stolen and the information used for tracking the M2M terminal from the M2M terminal; and the determining module is used for determining that the M2M terminal is stolen by the M2M platform.
By the invention, the M2M terminal is adopted to determine that the terminal is stolen; the M2M terminal performs theft processing, wherein the theft processing comprises at least one of the following: information indicating that the M2M terminal has been stolen and information for tracking the M2M terminal are transmitted to the M2M platform, an alarm number is dialed, and information for tracking the M2M terminal is broadcasted. The problem that the M2M terminal is not processed in the related technology is solved, and the safety of the M2M terminal is further improved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the invention without limiting the invention. In the drawings:
FIG. 1 is a first flowchart of a method for handling theft of an M2M terminal according to an embodiment of the present invention;
FIG. 2 is a flowchart II of a method for handling theft of an M2M terminal according to an embodiment of the present invention;
FIG. 3 is a block diagram of a first embodiment of a theft processing apparatus according to the present invention;
FIG. 4 is a block diagram of the stolen processing apparatus according to the embodiment of the present invention;
FIG. 5 is a flow diagram of a theft process without replacing a SIM card, according to an embodiment of the present invention;
FIG. 6 is a flow diagram of a theft process in the event of a replacement SIM card, according to an embodiment of the present invention;
FIG. 7 is a flow diagram of a stolen process without a SIM card according to an embodiment of the present invention;
fig. 8 is a schematic diagram of modules in an M2M terminal and service interrelation between the modules according to an embodiment of the present invention.
Detailed Description
The invention will be described in detail hereinafter with reference to the accompanying drawings in conjunction with embodiments. It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict.
In this embodiment, a method for processing theft of an M2M terminal is provided, and fig. 1 is a first flowchart of a method for processing theft of an M2M terminal according to an embodiment of the present invention, as shown in fig. 1, the flowchart includes the following steps:
step S102, the M2M terminal determines that the terminal is stolen;
step S104, the M2M terminal performs a theft process, wherein the theft process may include at least one of the following: information indicating that the M2M terminal has been stolen and information for tracking the M2M terminal are transmitted to the M2M platform, an alarm number is dialed, and information for tracking the M2M terminal is broadcasted.
Through the above steps, the M2M terminal may perform relevant processing after determining that it is stolen, and of course, in the case that the M2M terminal may communicate with the M2M platform, information for tracking the M2M terminal may be transmitted to the M2M platform. Of course, at the same time, the M2M terminal may dial an alarm number. This further improves the theft handling of M2M. If only one processing mode is performed, the processing problem after the M2M terminal is stolen can be solved, for example, M2M can select different processing methods according to the communication conditions after the theft.
Preferably, in practice, the M2M terminal determines that it has been stolen in many ways, which are described below by way of example:
for example, it may be determined by the M2M platform that the M2M terminal was stolen, after the M2M platform determined that the M2M terminal was stolen, a message indicating that the M2M terminal has been stolen is sent to the M2M terminal, and then the M2M terminal receives the message sent by the M2M platform indicating that the M2M terminal has been stolen. The method can be applied under the condition that the SIM card of the stolen terminal is not replaced, and the terminal continues to carry out data interaction with the M2M platform because the SIM card is not replaced, and the M2M platform directly sends a message to the terminal. The M2M platform can determine that the M2M terminal is stolen under the condition that the data sent by the M2M terminal is abnormal; alternatively, the M2M platform may receive a command to send a message to the M2M terminal indicating that the M2M terminal has been stolen, in which case it may be the command sent by the administrator or other monitoring device to the M2M platform after discovering that the M2M terminal has been stolen.
For example, it may be determined by the M2M terminal that it is stolen. One preferable determination method may be: the M2M terminal establishes connection with the M2M platform, and updates the anti-theft parameters after performing normal data interaction with the M2M platform; the M2M terminal inquires whether the anti-theft parameter is updated, and determines that the M2M terminal is stolen if the anti-theft parameter is not updated in a preset time and/or the number of times that the anti-theft parameter is not updated reaches a threshold value. The processing mode can be applied to the situation that the SIM card of the stolen terminal is replaced or the SIM card is abandoned or stopped, and because the SIM card is replaced, the M2M terminal is refused to access the system according to a Wireless Machine Management Protocol (WMMP for short), so that the purpose of stolen processing of the M2M terminal is achieved without other external equipment.
Preferably, the information for tracking the M2M terminal may be position information of the M2M terminal collected through a GPS chip. The data obtained by GPS is more accurate, but may also be in another way by information used to track the M2M terminal, for example, the M2M terminal may take a picture to record the information, etc.
Of course, for better security, the information indicating that the M2M terminal has been stolen is a security key, where the security key is a security code negotiated by the M2M terminal and the M2M platform when the terminal is legally accessed and used for proving the identity of the M2M terminal.
The embodiment further provides a method for processing theft of an M2M terminal, and fig. 2 is a second flowchart of the method for processing theft of an M2M terminal according to the embodiment of the present invention, as shown in fig. 2, the flowchart includes the following steps:
step S202, the M2M platform receives the information which is sent by the M2M terminal and used for indicating that the M2M terminal has been stolen and the information used for tracking the M2M terminal;
step S204: the M2M platform determines that the M2M terminal was stolen.
This flow is described from the perspective of the M2M platform, and other elements already described above are not described again here.
The embodiment also provides a stolen processing device, which is located in the M2M terminal and is used for implementing the above embodiment and the preferred embodiment thereof, which have already been described and are not described herein again, and the following description is provided for the modules involved in the device. Fig. 3 is a first block diagram of a stolen processing apparatus according to an embodiment of the present invention, as shown in fig. 3, the apparatus includes: the structure of the determination module 32 and the processing module 34 will be described below.
A determination module 32 for determining that the M2M terminal is stolen; the processing module 34 is connected to the determination module 32, and is configured to perform a theft process on the M2M terminal, wherein the theft process includes at least one of: and sending information for indicating that the M2M terminal has been stolen and information for tracking the M2M terminal to the M2M platform, dialing an alarm number, and broadcasting the information for tracking the M2M terminal.
The embodiment also provides a stolen processing apparatus, which is located in the M2M platform and is used for implementing the above embodiment and the preferred embodiment thereof, which have already been described and are not described herein again, and the following description is provided for the modules involved in the apparatus. Fig. 4 is a block diagram of a second configuration of a stolen processing apparatus according to an embodiment of the present invention, and as shown in fig. 4, the second configuration includes: the receiving module 42 and the determining module 44 describe the structure below.
A receiving module 42, configured to receive, by the M2M platform, information indicating that the M2M terminal has been stolen and information tracking the M2M terminal, which are sent from the M2M terminal; the determination module 44 is coupled to the reception module 42, which is used by the M2M platform to determine that the M2M terminal is stolen.
The following preferred embodiment is described by taking as an example the different SIM card handling situations after the M2M terminal has been stolen.
In the preferred embodiment, for the security and theft prevention problem of the M2M system, the WMMP data relationship between the M2M terminal and the M2M platform (or referred to as M2M console) is used to determine the theft condition, and the key information (such as GPS location, new SIM card number, security key, etc.) after the device transfer is transmitted to the M2M platform by WMMP message according to the condition. Meanwhile, considering the special condition that a thief possibly abandons the SIM card and only uses the inherent function of the industry application, the positioning device for automatically dialing the emergency call and playing the fixed format voice is provided, and a reliable method is provided for the M2M terminal to prevent burglary.
There may be three situations for stolen equipment: temporarily not replacing the SIM card, and abandoning the SIM card. The implementation details are different in each case subject to the condition limitation, but the processing flow can comprise the following steps: A. powering on the equipment, automatically registering, connecting data service and trying to connect the M2M platform; B. receiving an anti-theft message and updating anti-theft parameters; C. inquiring anti-theft parameters at regular time and judging whether the anti-theft parameters are stolen or not; D. and if the equipment is judged to be stolen, starting anti-theft measures. This will be explained below.
Step A: when the M2M terminal is powered on, the data service will be automatically registered and connected, and when the data service connection is successful, the terminal will actively initiate the link with the M2M platform. And B, when the step A is successfully executed and the anti-theft function is started, the anti-theft logic executes the step B, otherwise, the step C is directly executed.
And B: during WMMP data interaction between the M2M terminal and the platform, the anti-theft logic will update a variable after each normal data interaction, which is called as an anti-theft parameter in this embodiment, and may be, for example, incremented by an integer. The parameter is a basis for judging whether the terminal successfully interacts with the platform within a certain time. Meanwhile, under some special conditions, for example, when the stolen device does not replace the SIM card, the M2M platform knows that the terminal is stolen manually or automatically, and actively acquires information such as the location of the stolen device by sending an anti-theft message to the stolen terminal, in this case, step D is directly executed.
And C: except for the situation that the M2M platform actively issues the anti-theft message and the terminal successfully receives the message, the step needs to be executed. The anti-theft logic starts a timer after the terminal equipment is powered on, the timer starts to inquire whether the anti-theft parameter is updated within a certain time interval, if the anti-theft parameter is continuously found to be not updated for several times (for example, three times), the equipment is judged to be stolen, and step D is executed.
Step D: the anti-theft measures are started, and the communication conditions of the M2M terminal are different under different conditions, so the mode of sending the anti-theft information is different. When the SIM card is not replaced, the terminal directly acquires the position information obtained by the GPS module, sends the position information to the M2M platform in the form of WMMP message, and automatically retransmits when the position information is changed; when a thief replaces the SIM card, according to the WMMP protocol, if the security parameters are illegal, the M2M platform end refuses the terminal to access the system, the method can judge whether the terminal is stolen by adopting the method of the step C, if the terminal is stolen, a preset anti-theft key is adopted, and an anti-theft message is formed by combining the acquired GPS position information and is sent to the M2M platform for processing; if the SIM card is abandoned or the SIM card is shut down due to defaulting, the stolen conclusion is obtained according to the logic of the step C, the M2M terminal obtains GPS information, and the combination is carried out by combining with a preset voice template, so that the emergency number is automatically dialed for alarming.
By the preferred embodiment, a simple and feasible anti-theft method is provided for the security hole of unattended M2M terminals by utilizing the existing business process of M2M. Meanwhile, the special condition that the common service of the SIM card is unavailable is considered, the mode of automatically dialing the emergency number and playing the combined voice is adopted, the anti-theft measures are improved, and the anti-theft scheme is more practical and reliable.
The following description is made with reference to the accompanying drawings.
In the event that the stolen terminal is removed and the SIM card has not been replaced, data communication with the M2M platform will continue whether or not the terminal is powered back up. In this case, the terminal device is stolen, which is firstly discovered by the M2M platform, for example, the returned data is seriously abnormal, or the device is artificially discovered, and at this time, the M2M platform sends a message with an anti-theft security instruction to the M2M terminal. Then, the terminal analyzes the message, and replies corresponding information to the platform according to the indication, for example: and acquiring the current position parameters from the GPS module. The platform can take corresponding measures after obtaining the information. Fig. 5 is a flowchart of a stolen process without replacing the SIM card according to an embodiment of the present invention, as shown in fig. 5, the flowchart includes the following steps:
step S502, the M2M terminal equipment is powered on and connected to the M2M platform, and data communication with the M2M platform is continued;
step S504, the M2M platform end finds that the terminal is possibly stolen, if the M2M terminal is judged to be stolen, the step S506 is entered;
step S506, the M2M platform sends an anti-theft message to the M2M terminal to request to acquire information such as position and the like;
step S508, the M2M terminal analyzes the anti-theft message, acquires the current position information and sends a WMMP message to the M2M platform;
in step S510, the M2M platform determines whether to perform alarm processing according to the location information.
If the thief replaces the SIM card in the M2M terminal device, the platform cannot find the M2M terminal using the original data connection, and the flow is slightly different, fig. 6 is a flow chart of the theft process in the case of replacing the SIM card according to the embodiment of the present invention, as shown in fig. 6, the flow includes the following steps:
step S602, after the SIM card is replaced, the terminal will automatically register and connect the data service, if successful, the step S604 is entered;
step S604, the terminal tries to connect the M2M platform according to the original parameters, for the condition of replacing the SIM card, the platform and the terminal have negotiation strategies, if there is no special treatment, the attempted link after replacing the SIM card will be refused to ignore, go to step S606;
step S606, the anti-theft logic of the terminal will start the mechanism of checking the anti-theft parameter in a certain time, here it is mainly to judge whether the anti-theft parameter is updated, the condition that the anti-theft parameter is updated is that the data interaction is carried on normally with the platform;
step S608, if the security parameters are not updated after being checked for several times, the long time is not connected with the platform, the anti-theft logic checks the network state of the anti-theft logic, and if the network is normal, the step S610 is carried out;
step S610, sending an anti-theft message containing the security key and the GPS position parameter to the M2M platform, identifying the anti-theft key by the M2M platform, extracting the position information and processing the position information. The security key is a password negotiated by the terminal and the M2M platform when the terminal and the M2M platform are legally accessed before, and is a security code for proving the identity of the terminal.
Since the M2M terminal is integrated by the industrial application equipment and the communication module supporting the M2M, the particularity determines that the thief may pay attention to the value of the industrial application equipment without using a SIM card, and the anti-theft logic of the invention can still play a role in the special case. Fig. 7 is a flowchart of a theft process without SIM card according to an embodiment of the present invention, and as shown in fig. 7, the process includes the following steps:
step S702, when the SIM card is pulled out, the terminal will try to automatically register and connect the data service;
step S704, the terminal fails to automatically register and connect the data service, and naturally cannot connect the M2M platform;
step S706, the anti-theft master controller is started regularly to inquire whether the anti-theft parameters are updated;
step S708, based on the conclusion of the previous step, if the query results are abnormal for several times continuously, the device is judged to be stolen, and the current network is unavailable, and a special alarm mode is entered;
step S710, obtaining the current key information of the lost device, for example, obtaining the current position from the GPS module, and sending the current position to the voice alarm module for alarm voice recombination;
step S712, reconstructing a new alarm voice according to the preset voice template and the current GPS information, for example: "xx corporation, contact phone: xxxxxx, device xx is stolen, and the current GPS location is: xxxxxx ";
step 714, after the alarm voice synthesis, the voice alarm module will dial the emergency number automatically to alarm, and when the message of the call connection is intercepted, the voice alarm will be played automatically.
Fig. 8 is a schematic diagram of modules and service interrelation between modules in an M2M terminal adopted according to an embodiment of the present invention. As shown in fig. 8, the M2M terminal includes: an anti-theft information processing module (for implementing the function of the determination module 32), an anti-theft main control module, a GPS information module, and a voice alarm module (the anti-theft main control module, the GPS information module, and the voice alarm module are for implementing the function of the processing module 34), which will be described below.
The anti-theft information processing module is responsible for receiving and sending anti-theft messages and updating anti-theft parameters; the anti-theft main control module is responsible for inquiring anti-theft parameters at regular time, judging theft conditions and organizing a GPS and a voice alarm module; the GPS information module is used for collecting position information from the GPS chip and providing the position information to the anti-theft main control module and the voice alarm module for processing; and the voice alarm module organizes voice segments according to a preset voice template and GPS information, is responsible for the calling function of the emergency number, and automatically plays the voice segments for alarming after the telephone is connected.
As shown in fig. 8, the service interaction relationship among the modules is: d1 is the interaction between the M2M platform and the anti-theft information processing module, and is mainly used for receiving and analyzing the anti-theft message issued by the M2M platform, and updating anti-theft parameters according to the successful data interaction between the platform and the terminal; d2 is the interaction between the anti-theft information processing module and the anti-theft main control module, on one hand, the anti-theft information processing module transmits the anti-theft information request issued by the platform to the main control module, on the other hand, the main control module inquires the anti-theft parameters and replies the message content requested by the M2M platform; d3 is the interaction between the main control module and the voice alarm module, when the SIM card is missing or the service is unavailable, the main control module issues a task to the emergency voice module to start the emergency voice process; d4 is the interaction between the main control module and the GPS information module, mainly when the SIM card exists, the main control module obtains the current position information from the GPS module, and sends the information to the platform in the mode of WMMP message; d5 is the interaction of GPS module and voice alarm module, refer to D3, when the emergency voice procedure starts, the voice alarm module will obtain the current position information from GPS module and make the voice fragment combination.
In summary, the above embodiments solve the problem that the M2M terminal is not processed in the related art, and thus improve the security of the M2M terminal.
It will be apparent to those skilled in the art that the modules or steps of the present invention described above may be implemented by a general purpose computing device, they may be centralized on a single computing device or distributed across a network of multiple computing devices, and alternatively, they may be implemented by program code executable by a computing device, such that they may be stored in a storage device and executed by a computing device, or they may be separately fabricated into various integrated circuit modules, or multiple modules or steps thereof may be fabricated into a single integrated circuit module. Thus, the present invention is not limited to any specific combination of hardware and software.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A theft processing method, comprising:
the machine-to-machine M2M terminal determines that it is stolen;
the M2M terminal performs theft processing, wherein the theft processing comprises at least one of the following: sending information indicating that the M2M terminal has been stolen and information for tracking the M2M terminal to an M2M platform, dialing an alarm number, and broadcasting the information for tracking the M2M terminal.
2. The method of claim 1, wherein the M2M terminal determining that it is stolen comprises:
the M2M terminal receives a message sent by the M2M platform to indicate that the M2M terminal has been stolen.
3. The method of claim 1, wherein the M2M terminal determining that it is stolen comprises:
the M2M terminal establishes connection with the M2M platform and updates anti-theft parameters after performing normal data interaction with the M2M platform;
the M2M terminal inquires whether the anti-theft parameter is updated or not, and determines that the M2M terminal is stolen under the condition that the anti-theft parameter is not updated in a preset time and/or the number of times that the anti-theft parameter is not updated reaches a threshold value.
4. The method of claim 1, wherein the information for tracking the M2M terminal is position information of the M2M terminal collected through a GPS chip.
5. The method of claim 1, wherein the information indicating that the M2M terminal has been stolen is a security key, and wherein the security key is a security code negotiated by the M2M terminal and the M2M platform when legally accessed and used for proving the identity of the M2M terminal.
6. A theft processing method, comprising:
the M2M platform receives the information which is transmitted from the M2M terminal and used for indicating that the M2M terminal has been stolen and the information used for tracking the M2M terminal;
the M2M platform determines that the M2M terminal is stolen.
7. The method of claim 6, further comprising:
the M2M platform sends a message to the M2M terminal indicating that the M2M terminal has been stolen.
8. The method of claim 7, wherein before the M2M platform sends the message indicating that the M2M terminal has been stolen, further comprising:
the M2M platform determines that the M2M terminal is stolen under the condition that the data sent by the M2M terminal is abnormal; or,
the M2M platform receives the command to send the message to the M2M terminal indicating that the M2M terminal has been stolen.
9. A theft processing device located in an M2M terminal, comprising:
a determining module, configured to determine that the M2M terminal is stolen;
a processing module, configured to perform theft processing on the M2M terminal, where the theft processing includes at least one of: sending information indicating that the M2M terminal has been stolen and information for tracking the M2M terminal to an M2M platform, dialing an alarm number, and broadcasting the information for tracking the M2M terminal.
10. A theft processing device located in an M2M platform, comprising:
the receiving module is used for receiving the information which is transmitted by the M2M platform and used for indicating that the M2M terminal has been stolen and the information used for tracking the M2M terminal from the M2M terminal;
and the determining module is used for determining that the M2M terminal is stolen by the M2M platform.
CN2011100027693A 2011-01-07 2011-01-07 Stealing processing method and device Pending CN102104697A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN2011100027693A CN102104697A (en) 2011-01-07 2011-01-07 Stealing processing method and device
PCT/CN2011/071491 WO2012092723A1 (en) 2011-01-07 2011-03-03 Theft processing method and apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011100027693A CN102104697A (en) 2011-01-07 2011-01-07 Stealing processing method and device

Publications (1)

Publication Number Publication Date
CN102104697A true CN102104697A (en) 2011-06-22

Family

ID=44157201

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011100027693A Pending CN102104697A (en) 2011-01-07 2011-01-07 Stealing processing method and device

Country Status (2)

Country Link
CN (1) CN102104697A (en)
WO (1) WO2012092723A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104080060A (en) * 2013-03-25 2014-10-01 展讯通信(上海)有限公司 Method of transmitting antitheft short message through mobile terminal
CN105979491A (en) * 2016-05-09 2016-09-28 北京邮电大学 SIM card remote control method, intelligent terminal and server
WO2018001081A1 (en) * 2016-06-28 2018-01-04 深圳市中兴微电子技术有限公司 Network device identification method, apparatus, and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050149752A1 (en) * 2003-12-29 2005-07-07 Johnson Robert K. System and method for tracking laptop computers
CN1848891A (en) * 2006-04-05 2006-10-18 中国移动通信集团公司 Method of network detecting antitheft terminal state
CN1859670A (en) * 2005-09-21 2006-11-08 华为技术有限公司 Mobile terminal with anti-theft function and anti-theft method for mobile terminal

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1992762A (en) * 2005-12-29 2007-07-04 腾讯科技(深圳)有限公司 Anti-theft method for handset
CN101340638A (en) * 2008-08-12 2009-01-07 青岛海信移动通信技术股份有限公司 Alarm control method of mobile communication apparatus and mobile communication apparatus

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050149752A1 (en) * 2003-12-29 2005-07-07 Johnson Robert K. System and method for tracking laptop computers
CN1859670A (en) * 2005-09-21 2006-11-08 华为技术有限公司 Mobile terminal with anti-theft function and anti-theft method for mobile terminal
CN1848891A (en) * 2006-04-05 2006-10-18 中国移动通信集团公司 Method of network detecting antitheft terminal state

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104080060A (en) * 2013-03-25 2014-10-01 展讯通信(上海)有限公司 Method of transmitting antitheft short message through mobile terminal
CN104080060B (en) * 2013-03-25 2018-06-22 展讯通信(上海)有限公司 The method that mobile terminal sends antitheft short message
CN105979491A (en) * 2016-05-09 2016-09-28 北京邮电大学 SIM card remote control method, intelligent terminal and server
WO2018001081A1 (en) * 2016-06-28 2018-01-04 深圳市中兴微电子技术有限公司 Network device identification method, apparatus, and storage medium

Also Published As

Publication number Publication date
WO2012092723A1 (en) 2012-07-12

Similar Documents

Publication Publication Date Title
CN104737590B (en) A kind of method and apparatus for carrying out access control
US7664952B2 (en) Service verifying system, authentication requesting terminal, service utilizing terminal, and service providing method
EP2861003A1 (en) Method and apparatus for controlling application right
US10321319B2 (en) Securing access to vehicles
JP2015515156A (en) Tracking mobile communication devices
US20090077249A1 (en) Method and device for implementing remote control of a terminal
US20070232297A1 (en) Telephone conversation resumption system, telephone conversation resumption program, telephone conversation resumption method, portable terminal and relay apparatus
WO2012113178A1 (en) Method and apparatus for detecting connection loss of terminal
EP3043581B1 (en) Proximity map request method, server and network entity using the same, proximity request validating method, and server and network entity using the same
CN112911207A (en) Calling method and intelligent talkback system
EP2555545A1 (en) Method and system for selecting mobility management entity of terminal group
CN110719583A (en) Communication method and device
US9374710B2 (en) Mediation server, control method therefor, communication device, control method therefor, communication system, and computer program
WO2017219587A1 (en) Master-slave device switching method, slave device, management server, and storage medium
CN102104697A (en) Stealing processing method and device
CN109981202B (en) Vehicle broadcast alarm method and device
JP5636100B2 (en) International mobile device identity tracking method and tracking radio network controller for user equipment
CN102547249A (en) 3G (3rd Generation) network-based video surveillance point-to-point access method
CA2877661A1 (en) Mobile management message distribution and active on-network determination
US20170070867A1 (en) Method and system for triggering terminal group
JP2018174404A (en) Communication control apparatus, communication control method, and program
CN110650259B (en) Call request response method, device, server, terminal and storage medium
CN115022877B (en) Terminal authentication method, device, electronic equipment and computer readable storage medium
JP4796924B2 (en) Button phone system
KR20150054359A (en) Remote control method for vehicle using telematics and smart device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20110622