CN102104697A - Stealing processing method and device - Google Patents

Stealing processing method and device Download PDF

Info

Publication number
CN102104697A
CN102104697A CN2011100027693A CN201110002769A CN102104697A CN 102104697 A CN102104697 A CN 102104697A CN 2011100027693 A CN2011100027693 A CN 2011100027693A CN 201110002769 A CN201110002769 A CN 201110002769A CN 102104697 A CN102104697 A CN 102104697A
Authority
CN
China
Prior art keywords
terminal
stolen
platform
information
antitheft
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011100027693A
Other languages
Chinese (zh)
Inventor
熊静
王串辉
刘少华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN2011100027693A priority Critical patent/CN102104697A/en
Priority to PCT/CN2011/071491 priority patent/WO2012092723A1/en
Publication of CN102104697A publication Critical patent/CN102104697A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M11/00Telephonic communication systems specially adapted for combination with other electrical systems
    • H04M11/04Telephonic communication systems specially adapted for combination with other electrical systems with alarm systems, e.g. fire, police or burglar alarm systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • H04L12/1895Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for short real-time information, e.g. alarms, notifications, alerts, updates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Alarm Systems (AREA)
  • Telephone Function (AREA)

Abstract

The invention provides a stealing processing method and a stealing processing device. The method comprises that: a machine-to-machine (M2M) terminal is determined to be stolen; and the M2M terminal performs stealing processing, wherein the stealing processing comprises at least one of transmitting information used for indicating the M2M terminal is stolen to an M2M platform and the information used for tracking the M2M terminal, dialing a police-calling number and broadcasting the information used for tracking the M2M terminal. By the method and the device, the effect of stealing processing reliability is achieved.

Description

Stolen processing method and device
Technical field
The present invention relates to the communications field, in particular to a kind of stolen processing method and device.
Background technology
Machine is to machine (machine to machine, abbreviate M2M as) application day by day extensive, support the module of M2M communications protocol and the M2M terminal that the sector application device has constituted one, these terminals are carried out data communication by wireless network and M2M platform and other M2M terminal, finish functions such as data acquisition, information sharing, macro adjustments and controls hardly with manual intervention to reach.But because the most unattended operation of end side, and a lot of terminals are distributed in a plurality of places, indoor and outdoor, have the sector application device of certain economic value for some, for example transducer, liquid crystal display screen, high-end camera, safe antitheft is a problem that can not be ignored.In correlation technique, do not have antitheft processing at present to the M2M terminal.
Summary of the invention
Main purpose of the present invention is to provide a kind of stolen processing method and device, to address the above problem at least.
According to an aspect of the present invention, provide a kind of stolen processing method, having comprised: machine determines that to machine M2M terminal it is stolen; Described M2M terminal is carried out stolen processing, wherein, described stolen processing comprise following one of at least: send to the M2M platform and to be used to indicate the stolen information of described M2M terminal and to be used to follow the trail of described M2M terminal information, to dial the warning number and to report the described described M2M terminal information that is used to follow the trail of.
Preferably, described M2M terminal is determined its stolen comprising: described M2M terminal receives that described M2M platform sends is used to indicate the stolen message of described M2M terminal.
Preferably, described M2M terminal is determined its stolen comprising: described M2M terminal and described M2M platform connect, and after carrying out once normal data interaction with described M2M platform, upgrade antitheft parameter; Whether the described antitheft parameter of described M2M terminal inquiry is updated, and is not updated and/or inquires the number of times that described antitheft parameter is not updated in scheduled duration and arrive under the situation of threshold value inquiring described antitheft parameter, determines that described M2M terminal is stolen.
Preferably, describedly be used to follow the trail of the described M2M location information of terminals of described M2M terminal information for gathering by the GPS chip.
Preferably, described to be used to indicate the stolen information of described M2M terminal be antitheft key, and wherein, described antitheft key is described M2M terminal and described M2M platform safety code that consult and that be used to prove described M2M terminal identity when legal access.
According to another aspect of the present invention, also provide a kind of stolen processing method, having comprised: the M2M platform receives from described M2M terminal being used to of sending and indicates the stolen information of described M2M terminal and be used to follow the trail of described M2M terminal information; Described M2M platform determines that described M2M terminal is stolen.
Preferably, also comprise: described M2M platform sends to described M2M terminal and is used to indicate the stolen message of described M2M terminal.
Preferably, described M2M platform send described be used to indicate the stolen message of described M2M terminal before, also comprise: described M2M platform determines that described M2M terminal is stolen under the situation of the data exception that described M2M terminal sends; Perhaps, described M2M platform receives to described M2M terminal and sends the described order that is used to indicate the stolen message of described M2M terminal.
According to an aspect of the present invention, also provide a kind of stolen processing unit, be arranged in the M2M terminal, having comprised: determination module is used for determining that described M2M terminal is stolen; Processing module, be used for described M2M terminal is carried out stolen processing, wherein, described stolen processing comprise following one of at least: send to the M2M platform and to be used to indicate the stolen information of described M2M terminal and to be used to follow the trail of described M2M terminal information, to dial the warning number and to report the described described M2M terminal information that is used to follow the trail of.
According to another aspect of the present invention, a kind of stolen processing unit also is provided, be arranged in the M2M platform, comprise: receiver module is used for the M2M platform and receives from M2M terminal being used to of sending and indicate the stolen information of M2M terminal and be used to follow the trail of the M2M terminal information; Determination module is used for the M2M platform and determines that the M2M terminal is stolen.
By the present invention, adopt the M2M terminal to determine that it is stolen; The M2M terminal is carried out stolen processing, wherein, stolen processing comprise following one of at least: send to the M2M platform and to be used to indicate the stolen information of M2M terminal and to be used to follow the trail of the M2M terminal information, to dial the warning number and report and be used to follow the trail of the M2M terminal information.Solve the problem of the M2M terminal not being handled in the correlation technique, and then improved the fail safe of M2M terminal.
Description of drawings
Accompanying drawing described herein is used to provide further understanding of the present invention, constitutes the application's a part, and illustrative examples of the present invention and explanation thereof are used to explain the present invention, do not constitute improper qualification of the present invention.In the accompanying drawings:
Fig. 1 is the flow chart one according to the stolen processing method of M2M terminal of the embodiment of the invention;
Fig. 2 is the flowchart 2 according to the stolen processing method of M2M terminal of the embodiment of the invention;
Fig. 3 is the structured flowchart one according to the stolen processing unit of the embodiment of the invention;
Fig. 4 is the structured flowchart two according to the stolen processing unit of the embodiment of the invention;
Fig. 5 is the flow chart of not changing stolen processing under the SIM card situation according to the embodiment of the invention;
Fig. 6 is the flow chart according to stolen processing under the replacing SIM card situation of the embodiment of the invention;
Fig. 7 is the flow chart according to stolen processing under the no SIM card situation of the embodiment of the invention;
Fig. 8 is the schematic diagram that adopts professional correlation between module in the M2M terminal and each module according to the embodiment of the invention.
Embodiment
Hereinafter will describe the present invention with reference to the accompanying drawings and in conjunction with the embodiments in detail.Need to prove that under the situation of not conflicting, embodiment and the feature among the embodiment among the application can make up mutually.
In the present embodiment, provide a kind of M2M terminal stolen processing method, Fig. 1 is that as shown in Figure 1, this flow process comprises the steps: according to the flow chart one of the stolen processing method of M2M terminal of the embodiment of the invention
Step S102, the M2M terminal determines that it is stolen;
Step S104, the M2M terminal is carried out stolen processing, wherein, stolen processing can comprise following one of at least: send to the M2M platform and to be used to indicate the stolen information of M2M terminal and to be used to follow the trail of the M2M terminal information, to dial the warning number and report and be used to follow the trail of the M2M terminal information.
By above step, the M2M terminal determine its stolen after, the processing that can be correlated with, certainly, the M2M terminal can with situation that the M2M platform communicate by letter under, can be used to follow the trail of the M2M terminal information to the transmission of M2M platform.Certainly, simultaneously, the M2M terminal can be dialed the warning number.So just make the stolen processing of M2M more perfect.If only carried out a kind of processing mode, also can solve the stolen handling problem afterwards of M2M terminal this moment, for example, M2M can select different processing methods according to the communication condition after stolen.
Preferably, when implementing, it is a variety of that the M2M terminal determines that its stolen mode has, and below describes by way of example:
For example, can determine that the M2M terminal is stolen by the M2M platform, after the M2M platform determines that the M2M terminal is stolen, send to the M2M terminal and to be used to the message of indicating the M2M terminal stolen, then, the M2M terminal receives that the M2M platform sends is used to the message of indicating the M2M terminal stolen.This mode can not used under stolen terminal is changed the situation of SIM card, owing to do not change SIM card, terminal will continue and the M2M platform carries out data interaction, and at this moment the M2M platform is just directly to terminal transmission message.Wherein, the M2M platform can determine that the M2M terminal is stolen under the situation of the data exception that the M2M terminal sends; Perhaps, the M2M platform can receive to the M2M terminal and send the order that is used to indicate the stolen message of M2M terminal, in this case, may be that manager or other watch-dogs are found this order that the stolen back of this M2M terminal sends to the M2M platform.
For example, can determine that it is stolen by the M2M terminal.Wherein a kind of preferred determine mode can for: M2M terminal and M2M platform connect, and after carrying out once data interaction normally with the M2M platform, upgrade antitheft parameter; Whether the antitheft parameter of M2M terminal inquiry is updated, and is not updated and/or inquires the number of times that antitheft parameter is not updated in scheduled duration and arrive under the situation of threshold value inquiring antitheft parameter, determines that described M2M terminal is stolen.This processing mode can be changed under the situation that SIM card or SIM card abandon or shut down in stolen terminal and use; owing to change SIM card; according to radio equipment management agreement (Wireless Machine Management Protocol; abbreviate WMMP as) agreement; to refuse this M2M terminal connecting system, the M2M terminal is in the purpose that need just not reach stolen processing by other external device like this.
Preferably, be used to follow the trail of the M2M terminal information and can be the M2M location information of terminals of gathering by the GPS chip.More accurate by the data that GPS obtains, can certainly also can be other mode by being used to follow the trail of the M2M terminal information, for example, the M2M terminal can be taken pictures with recorded information or the like.
Certainly, for safer, being used to indicate the stolen information of M2M terminal is antitheft key, and wherein, antitheft key is M2M terminal and M2M platform safety code that consult and that be used to prove the M2M terminal identity when legal access.
Present embodiment also provides a kind of M2M terminal stolen processing method, and Fig. 2 is that as shown in Figure 2, this flow process comprises the steps: according to the flowchart 2 of the stolen processing method of M2M terminal of the embodiment of the invention
Step S202, M2M platform receive from M2M terminal being used to of sending and indicate the stolen information of M2M terminal and be used to follow the trail of the M2M terminal information;
Step S204:M2M platform determines that the M2M terminal is stolen.
This flow process is the explanation of carrying out from the angle of M2M platform, other above-mentioned carried out the explanation do not repeat them here.
Present embodiment also provides a kind of stolen processing unit, and this device is arranged in the M2M terminal, and this device is used to realize the foregoing description and preferred implementation thereof, has carried out not repeating them here of explanation, below the module that relates in this device is described.Fig. 3 is the structured flowchart one according to the stolen processing unit of the embodiment of the invention, and as shown in Figure 3, this device comprises: determination module 32, processing module 34 describe this structure below.
Determination module 32 is used for determining that the M2M terminal is stolen; Processing module 34 is connected to determination module 32, this module is used for the M2M terminal is carried out stolen processing, wherein, stolen processing comprise following one of at least: send to the M2M platform and to be used to indicate the stolen information of M2M terminal and to be used to follow the trail of the M2M terminal information, to dial the warning number and to report the described M2M terminal information that is used to follow the trail of.
Present embodiment also provides a kind of stolen processing unit, and this device is arranged in the M2M platform, and this device is used to realize the foregoing description and preferred implementation thereof, has carried out not repeating them here of explanation, below the module that relates in this device is described.Fig. 4 is the structured flowchart two according to the stolen processing unit of the embodiment of the invention, and as shown in Figure 4, this structure comprises: receiver module 42, determination module 44 describe this structure below.
Receiver module 42 is used for the M2M platform and receives from M2M terminal being used to of sending and indicate the stolen information of M2M terminal and be used to follow the trail of the M2M terminal information; Determination module 44 is connected to receiver module 42, and this module is used for the M2M platform and determines that the M2M terminal is stolen.
A following preferred embodiment is that example is illustrated with the stolen different SIM card disposition afterwards of M2M terminal.
This preferred embodiment, safe antitheft problem at the M2M system, utilize the WMMP data contact between M2M terminal and the M2M platform (or being called the M2M control desk), judge stolen condition, the key message after according to condition equipment being shifted (for example GPS position, new SIM card number, safe key etc.) sends the M2M platform to the WMMP message.Consider that simultaneously stealing the person may abandon SIM card, only use these special circumstances of sector application inherent function, proposed a kind of automatic emergency call, play the method positioning equipment of set form voice, for the M2M terminal anti-theft provides a kind of reliable method.
May there be three kinds of situations for stolen equipment: temporarily do not change SIM card, change SIM card, abandon SIM card.Every kind of situation is subjected to condition restriction to realize the details difference, but its handling process all can comprise the steps: the A. device power, and registration automatically, connection data service also attempt connecting the M2M platform; B. receive antitheft message, upgrade antitheft parameter; C. regularly inquire about antitheft parameter, judge whether stolen; D. if judgment device is stolen, enable anti-theft measure.Be explained below.
Steps A: when the M2M terminal powers on, will register automatically and be connected data service, when the data service successful connection, then terminal can initiatively be initiated and the link of M2M platform.When steps A runs succeeded and anti-theft feature when enabling, antitheft logic execution in step B, otherwise direct execution in step C.
Carry out between step B:M2M terminal and the platform in the process of WMMP data interaction, antitheft logic will be upgraded a variable after normal data each time is mutual, and this variable claims to be called in the present embodiment antitheft parameter, for example, can be that integer increases progressively.This parameter is to be used for judging within a certain period of time terminal whether success and the mutual foundation of platform.Simultaneously, at some in particular cases, when for example stolen equipment is not changed SIM card, the M2M platform learns that by manual or automated manner terminal is stolen, will initiatively obtain the information such as position of stolen equipment by sending antitheft message to stolen terminal, in this case, direct execution in step D.
Step C: described except previous step, the M2M platform initiatively issues antitheft message, and beyond the terminal situation about successfully receiving, all needs to carry out this step.Antitheft logic will start a timer after terminal equipment powers on, at certain time intervals, whether timer can start the antitheft parameter of inquiry and be updated, if continuously several times (for example, three times) to find that antitheft parameter is not updated the equipment that then is judged to be stolen, execution in step D.
Step D: enable anti-theft measure, because therefore the communication condition difference of M2M terminal under the different situations sends the also difference to some extent of mode of antitheft information.When SIM card was not changed, terminal was directly obtained the positional information that the GPS module obtains, and sent to the M2M platform with the form of WMMP message, and will retransmit automatically when positional information changes; Change SIM card when stealing the person, according to the WMMP agreement, if security parameter is illegal, M2M platform end can be refused this terminal connecting system, it is stolen that this mode adopts the method for step C to judge whether equally, if stolen, will adopt default antitheft key, in conjunction with the GPS positional information of obtaining, form antitheft message and send to the M2M platform and handle; If SIM card is abandoned or defaulting subscriber, draw stolen conclusion according to the logic of step C, the M2M terminal is obtained GPS information, makes up in conjunction with default sound template, dials emergency numbers automatically and reports to the police.
By this preferred embodiment, utilize the existing operation flow of M2M, at these security breaches of M2M terminal unattended operation, a kind of theft preventing method of simple possible has been proposed.Considered unavailable these special circumstances of SIM card service commonly used simultaneously, taked to dial automatically emergency numbers, play the mode of combine voice, improved anti-theft measure, made antitheft scheme more solid.
Describe below in conjunction with accompanying drawing.
When stolen terminal is transferred and does not change as yet under the situation of SIM card, no matter whether terminal re-powers, will continue and the M2M platform between carry out data communication.In this case, terminal equipment is stolen at first to be found by the M2M platform, and such as the data severely subnormal of passing back, perhaps artificial discovering device disappears, and this moment, the M2M platform can send the message with anti-theft security instruction to the M2M terminal.Then, this message of terminal parses will be replied corresponding information as indicated and give platform, for example: obtain the current location parameter from the GPS module.Platform has obtained these information and just can take appropriate measures.Fig. 5 is the flow chart of not changing stolen processing under the SIM card situation according to the embodiment of the invention, and as shown in Figure 5, this flow chart comprises the steps:
Step S502, the M2M terminal equipment powers on, is connected to the M2M platform, will continue and the M2M platform between carry out data communication;
Step S504, M2M platform end find that terminal may be stolen, if judge that the M2M terminal is stolen, then enter step S506;
Step S506, M2M platform send antitheft message to the M2M terminal, require to obtain information such as position;
Step S508, the antitheft message of M2M terminal parses obtains current location information and sends the WMMP message to the M2M platform;
Step S510, the M2M platform determines whether to report to the police processing according to positional information.
If the thief has changed the SIM card in the M2M terminal equipment, platform can't adopt original data to connect and find the M2M terminal, and at this moment flow process is slightly different, and Fig. 6 is the flow chart according to stolen processing under the replacing SIM card situation of the embodiment of the invention, as shown in Figure 6, this flow process comprises the steps:
Step S602, for after changing SIM card, terminal registration automatically also connects data service, if success then enter step S604;
Step S604, terminal attempts connecting the M2M platform according to original parameter, for the situation of common replacing SIM card, consulting tactical is all arranged, between platform and the terminal if there is not special processing, the link of attempting after the replacing SIM card will be rejected ignores, and enters step S606;
Step S606, the antitheft logic of terminal can start the mechanism of checking antitheft parameter at certain hour, mainly is to judge whether antitheft parameter is updated here, and the condition of antitheft parameter update is that peaceful interstation carries out data interaction normally;
Step S608, illustrate for a long time and platform does not have contact that antitheft logic will be checked the self networks state, if network is normal, will enter step S610 if check and to find that several times security parameter is not updated;
Step S610, the antitheft message that transmission comprises safe key and GPS location parameter is to the M2M platform, and the M2M land identification goes out antitheft key, extracts positional information and handles.The safe key here is the password that terminal and M2M platform consult when legal access before, is used for proving the safety code of terminal identity.
Owing to the M2M terminal is by sector application equipment and supports that the communication module of M2M is integrated and come, what this particularity had determined that the thief may pay attention to is the value of sector application equipment itself, and do not use SIM card, in particular cases adopt antitheft logic of the present invention this, still can play a role.Fig. 7 is that as shown in Figure 7, this flow process comprises the steps: according to the flow chart of stolen processing under the no SIM card situation of the embodiment of the invention
Step S702, when SIM card is pulled out, terminal will be attempted registration automatically and will be connected data service;
Step S704, terminal is registered automatically and is connected the data service fail, also can't connect the M2M platform naturally;
Step S706, whether antitheft main controller regularly starts, inquire about antitheft parameter and be updated;
Step S708 based on the conclusion of previous step, if Query Result is all unusual several times continuously, judge that then this equipment is stolen, and current network is unavailable, enters special alarm mode;
Step S710 obtains the current key message of loss equipment, for example obtains current location from the GPS module, sends to the audio alert module and carries out the alarm voice reorganization;
Step S712 is according to default sound template, in conjunction with the new alarm voice of current GPS information reorganization, for example: " equipment xx is stolen for xx company, telephone number: xxxxxx, and the Current GPS position is: xxxxxx ";
Step S714, after alarm voice is synthetic, the audio alert module will be dialed emergency numbers automatically and report to the police, and after the message that intercepts closing of the circuit, play audio alert automatically.
Fig. 8 is the schematic diagram of professional correlation between module in the M2M terminal that adopts according to the embodiment of the invention and each module.As shown in Figure 8, this M2M terminal comprises: antitheft message processing module (being used to realize the function of determination module 32), antitheft main control module, GPS information module, audio alert module (antitheft main control module, GPS information module and audio alert module are used to realize the function of above-mentioned processing module 34) are explained below.
Antitheft message processing module is responsible for receiving and sending antitheft message, and the renewal of antitheft parameter; Antitheft main control module, antitheft parameter is inquired about in responsible timing, judges stolen condition and organizes GPS and the audio alert module; The GPS information module is used for from GPS chip collection position information, offers antitheft main control module and the audio alert module is handled; The audio alert module according to default sound template and GPS information organization sound bite, is responsible for the call function of emergency numbers simultaneously, plays sound bite later on automatically when closing of the circuit and reports to the police.
As shown in Figure 8, the service interaction of each intermodule closes: D1 is mutual between M2M platform and antitheft message processing module, mainly act as reception and resolve the antitheft message that the M2M platform issues, and upgrade antitheft parameter according to the successful data interaction between platform and the terminal; D2 is mutual between antitheft message processing module and the antitheft main control module, antitheft message processing module passes to main control module with the antitheft information request that platform issues on the one hand, and main control module is inquired about the message content of antitheft parameter, answer M2M platform request on the other hand; D3 is mutual between main control module and the audio alert module, and when the SIM card disappearance or serve under the disabled situation, main control module assigns a task and starts the emergency speech flow process to the emergency speech module; D4 is mutual between main control module and GPS information module, and mainly when SIM card existed, main control module obtained current position information from the GPS module, sends to platform in the mode of WMMP message; D5 is the mutual of GPS module and audio alert module, and with reference to D3, behind the emergency speech flow startup, the audio alert module will be obtained current location information and carry out the sound bite combination from the GPS module.
In sum,, solved the problem of the M2M terminal not being handled in the correlation technique, and then improved the fail safe of M2M terminal by above embodiment.
Obviously, those skilled in the art should be understood that, above-mentioned each module of the present invention or each step can realize with the general calculation device, they can concentrate on the single calculation element, perhaps be distributed on the network that a plurality of calculation element forms, alternatively, they can be realized with the executable program code of calculation element, carry out by calculation element thereby they can be stored in the storage device, perhaps they are made into each integrated circuit modules respectively, perhaps a plurality of modules in them or step are made into the single integrated circuit module and realize.Like this, the present invention is not restricted to any specific hardware and software combination.
The above is the preferred embodiments of the present invention only, is not limited to the present invention, and for a person skilled in the art, the present invention can have various changes and variation.Within the spirit and principles in the present invention all, any modification of being done, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. a stolen processing method is characterized in that, comprising:
Machine determines that to machine M2M terminal it is stolen;
Described M2M terminal is carried out stolen processing, wherein, described stolen processing comprise following one of at least: send to the M2M platform and to be used to indicate the stolen information of described M2M terminal and to be used to follow the trail of described M2M terminal information, to dial the warning number and to report the described described M2M terminal information that is used to follow the trail of.
2. method according to claim 1 is characterized in that, described M2M terminal is determined its stolen comprising:
Described M2M terminal receives that described M2M platform sends is used to indicate the stolen message of described M2M terminal.
3. method according to claim 1 is characterized in that, described M2M terminal is determined its stolen comprising:
Described M2M terminal and described M2M platform connect, and after carrying out once normal data interaction with described M2M platform, upgrade antitheft parameter;
Whether the described antitheft parameter of described M2M terminal inquiry is updated, and is not updated and/or inquires the number of times that described antitheft parameter is not updated in scheduled duration and arrive under the situation of threshold value inquiring described antitheft parameter, determines that described M2M terminal is stolen.
4. method according to claim 1 is characterized in that, describedly is used to follow the trail of the described M2M location information of terminals of described M2M terminal information for gathering by the GPS chip.
5. method according to claim 1, it is characterized in that, it is described that to be used to indicate the stolen information of described M2M terminal be antitheft key, wherein, described antitheft key is described M2M terminal and described M2M platform safety code that consult and that be used to prove described M2M terminal identity when legal access.
6. a stolen processing method is characterized in that, comprising:
The M2M platform receives from described M2M terminal being used to of sending and indicates the stolen information of described M2M terminal and be used to follow the trail of described M2M terminal information;
Described M2M platform determines that described M2M terminal is stolen.
7. method according to claim 6 is characterized in that, also comprises:
Described M2M platform sends to described M2M terminal and is used to indicate the stolen message of described M2M terminal.
8. method according to claim 7 is characterized in that, described M2M platform send described be used to indicate the stolen message of described M2M terminal before, also comprise:
Described M2M platform determines that described M2M terminal is stolen under the situation of the data exception that described M2M terminal sends; Perhaps,
Described M2M platform receives to described M2M terminal and sends the described order that is used to indicate the stolen message of described M2M terminal.
9. a stolen processing unit is arranged in the M2M terminal, it is characterized in that, comprising:
Determination module is used for determining that described M2M terminal is stolen;
Processing module, be used for described M2M terminal is carried out stolen processing, wherein, described stolen processing comprise following one of at least: send to the M2M platform and to be used to indicate the stolen information of described M2M terminal and to be used to follow the trail of described M2M terminal information, to dial the warning number and to report the described described M2M terminal information that is used to follow the trail of.
10. a stolen processing unit is arranged in the M2M platform, it is characterized in that, comprising:
Receiver module is used for the M2M platform and receives from M2M terminal being used to of sending and indicate the stolen information of M2M terminal and be used to follow the trail of the M2M terminal information;
Determination module is used for the M2M platform and determines that the M2M terminal is stolen.
CN2011100027693A 2011-01-07 2011-01-07 Stealing processing method and device Pending CN102104697A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN2011100027693A CN102104697A (en) 2011-01-07 2011-01-07 Stealing processing method and device
PCT/CN2011/071491 WO2012092723A1 (en) 2011-01-07 2011-03-03 Theft processing method and apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011100027693A CN102104697A (en) 2011-01-07 2011-01-07 Stealing processing method and device

Publications (1)

Publication Number Publication Date
CN102104697A true CN102104697A (en) 2011-06-22

Family

ID=44157201

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011100027693A Pending CN102104697A (en) 2011-01-07 2011-01-07 Stealing processing method and device

Country Status (2)

Country Link
CN (1) CN102104697A (en)
WO (1) WO2012092723A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104080060A (en) * 2013-03-25 2014-10-01 展讯通信(上海)有限公司 Method of transmitting antitheft short message through mobile terminal
CN105979491A (en) * 2016-05-09 2016-09-28 北京邮电大学 SIM card remote control method, intelligent terminal and server
WO2018001081A1 (en) * 2016-06-28 2018-01-04 深圳市中兴微电子技术有限公司 Network device identification method, apparatus, and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050149752A1 (en) * 2003-12-29 2005-07-07 Johnson Robert K. System and method for tracking laptop computers
CN1848891A (en) * 2006-04-05 2006-10-18 中国移动通信集团公司 Method of network detecting antitheft terminal state
CN1859670A (en) * 2005-09-21 2006-11-08 华为技术有限公司 Mobile terminal with anti-theft function and anti-theft method for mobile terminal

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1992762A (en) * 2005-12-29 2007-07-04 腾讯科技(深圳)有限公司 Anti-theft method for handset
CN101340638A (en) * 2008-08-12 2009-01-07 青岛海信移动通信技术股份有限公司 Alarm control method of mobile communication apparatus and mobile communication apparatus

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050149752A1 (en) * 2003-12-29 2005-07-07 Johnson Robert K. System and method for tracking laptop computers
CN1859670A (en) * 2005-09-21 2006-11-08 华为技术有限公司 Mobile terminal with anti-theft function and anti-theft method for mobile terminal
CN1848891A (en) * 2006-04-05 2006-10-18 中国移动通信集团公司 Method of network detecting antitheft terminal state

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104080060A (en) * 2013-03-25 2014-10-01 展讯通信(上海)有限公司 Method of transmitting antitheft short message through mobile terminal
CN104080060B (en) * 2013-03-25 2018-06-22 展讯通信(上海)有限公司 The method that mobile terminal sends antitheft short message
CN105979491A (en) * 2016-05-09 2016-09-28 北京邮电大学 SIM card remote control method, intelligent terminal and server
WO2018001081A1 (en) * 2016-06-28 2018-01-04 深圳市中兴微电子技术有限公司 Network device identification method, apparatus, and storage medium

Also Published As

Publication number Publication date
WO2012092723A1 (en) 2012-07-12

Similar Documents

Publication Publication Date Title
CN106412833B (en) Intelligent household control method, device and system
EP1562394B1 (en) Apparatus and method for setting use restriction of mobile communication terminal
CN1157092C (en) Safe zones for portable electronic device
CN1759595B (en) Emergency call-back for a wireless communication device equipped with a user removable module
EP1172016B1 (en) Method of generating control signals based on location of radio terminals
US7664952B2 (en) Service verifying system, authentication requesting terminal, service utilizing terminal, and service providing method
EP1604508B1 (en) Remote data access in a mobile communication device
KR101729200B1 (en) Communication device and method for a mobile communication network
US5655004A (en) Method and apparatus for detection of cellular phone fraud
EP0993747B1 (en) Subscriber system with user station with removable data store
EP1901577B1 (en) Apparatus and method for controlling bluetooth in portable terminal
CA2275695A1 (en) System and method for changing subscriber service features in a radio telecommunications network
US10321319B2 (en) Securing access to vehicles
CN101720072B (en) System and method for realizing antitheft of mobile phone
US6615048B1 (en) Connection control method and system for mobile communication system
CN103905649A (en) Mobile phone anti-theft system based on Bluetooth technology
CN101631313B (en) Method for network management and associated device
CN102104697A (en) Stealing processing method and device
CN102547249A (en) 3G (3rd Generation) network-based video surveillance point-to-point access method
CN101232677A (en) Method and apparatus for start-up logging of mobile terminal
FI108327B (en) Method of establishing a connection in a mobile network
KR20070122379A (en) Method for tracking the stolen mobile communication terminal
EP0873032A1 (en) Authentication system for a mobile telephone
CN106792646A (en) Communication connection method for building up and electronic equipment
US5953654A (en) Wireless communications system for identifying unauthorized mobile units

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20110622