CN102946482A - Method for detecting user terminal and user terminal - Google Patents
Method for detecting user terminal and user terminal Download PDFInfo
- Publication number
- CN102946482A CN102946482A CN201210461493XA CN201210461493A CN102946482A CN 102946482 A CN102946482 A CN 102946482A CN 201210461493X A CN201210461493X A CN 201210461493XA CN 201210461493 A CN201210461493 A CN 201210461493A CN 102946482 A CN102946482 A CN 102946482A
- Authority
- CN
- China
- Prior art keywords
- user terminal
- information
- described user
- identification card
- subregion
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Telephone Function (AREA)
Abstract
The embodiment of the invention discloses a method for detecting a user terminal and the user terminal. The method comprises the following steps of: detecting whether information on a subscriber identity module card currently inserted in the user terminal is consistent with information on a previously arranged first specified subscriber identity module card stored in a non-volatile partition of the user terminal; when detecting that the information on the currently inserted subscriber identity module card is inconsistent with the information on the first specified subscriber identity module card, determining that the user terminal is stolen; and when detecting that the information on the currently inserted subscriber identity module card is consistent with the information on the first specified subscriber identity module card, determining that the user terminal is not stolen. By using the scheme provided by the embodiment of the invention, after the user terminal is stolen, invalidation of an anti-theft function of the user terminal cannot be realized by deleting the information.
Description
Technical field
The present invention relates to the terminal technology field, relate in particular to a kind of method and user terminal that detects user terminal.
Background technology
Continuous increase along with cell-phone function, mobile phone is except possessing communication function, the function that has also possessed other electronic equipments such as palmtop PC (Personal Digital Assistant, PDA), digital camera, mobile phone has obtained using widely in real life as user terminal.
Mobile phone is simultaneously as portable terminal, because its portability, cause being easy to lose or stolen, so the technology of hand-set from stolen occurred preventing, although industry is called Mobile phone antitheft technology with this technology usually, be in fact a kind of remedial technique that after mobile phone is stolen, triggers, for example, can be the technology of getting back mobile phone, also can be the technology of the data on the getting back mobile phone.It also can be the technology etc. of locking cell-phone function.
Present Mobile phone antitheft technology is normally installed antitheft software at mobile phone, and by the antitheft information that the user is provided for carrying out antitheft processing operation, after hand-set from stolen, determines automatically that by mobile phone self is stolen, then triggers corresponding antitheft processing operation.
Yet, in above-mentioned antitheft mobile phone scheme, behind hand-set from stolen, if before triggering antitheft processing operation, antitheft software is deleted from mobile phone, perhaps with the mobile phone factory reset, perhaps mobile phone is brushed machine operation again, the anti-theft feature of mobile phone can be removed from this mobile phone, thereby cause the anti-theft feature of mobile phone to lose efficacy.
Summary of the invention
The embodiment of the invention provides a kind of method and user terminal that detects user terminal, causes the problem of user terminal anti-theft feature inefficacy in order to the mode of passing through deletion information that solves present existence.
The embodiment of the invention provides whether stolen method of a kind of definite user terminal, comprising:
Whether the information of the first designated user identification card that sets in advance of storing in the information that detects the Subscriber Identity Module of current insertion in the user terminal and the non-volatile subregion of described user terminal is consistent;
When the information inconsistency of the information of the Subscriber Identity Module that detects described current insertion and described the first designated user identification card, determine that described user terminal is stolen;
When the information of the information of the Subscriber Identity Module that detects described current insertion and described the first designated user identification card is consistent, determine that described user terminal is not stolen.
The embodiment of the invention also provides a kind of user terminal, comprising:
Detecting unit, whether the information of the first designated user identification card that sets in advance of storing in the non-volatile subregion for detection of the information of the Subscriber Identity Module of current insertion in the user terminal and described user terminal is consistent;
Determining unit is used for determining that described user terminal is stolen when inconsistent; And when consistent, determine that described user terminal is not stolen.
In the method that the embodiment of the invention provides, when whether definite user terminal is stolen, being whether the information of the first designated user identification card that sets in advance stored in the non-volatile subregion of information and this user terminal by detecting the Subscriber Identity Module of current insertion in the user terminal is consistent determines, when inconsistent, determine that this user terminal is stolen, when consistent, determine that this user terminal is not stolen.Because non-volatile subregion is to be used for the radio frequency parameter of storage user terminal and an encrypted partition of functional parameter in the user terminal, it has the advantages that institute's canned data can not be illegally modified and delete, so, will for determine user terminal whether the information of stolen the first designated user identification card that sets in advance be stored in the non-volatile subregion of user terminal, even if this user terminal is stolen, also this information can't be deleted from this user terminal, thereby can't this user terminal be determined whether that stolen function removes by the mode of deletion information, namely can't cause the user terminal anti-theft feature to lose efficacy by the mode of deletion information.
Description of drawings
Accompanying drawing is used to provide a further understanding of the present invention, and consists of the part of specification, is used from explanation the present invention with the embodiment of the invention one, is not construed as limiting the invention.In the accompanying drawings:
Whether definite user terminal that Fig. 1 provides for the embodiment of the invention flow chart of stolen method;
The flow chart that antitheft information first is set of Fig. 2 for providing in the embodiment of the invention 1;
The flow chart of antitheft information is provided for the renewal that provides in the embodiment of the invention 1 Fig. 3;
Definite user terminal of providing in the embodiment of the invention 2 flow chart of stolen method whether is provided Fig. 4;
The structural representation of the user terminal that provides in the embodiment of the invention 3 is provided Fig. 5.
Embodiment
In order to provide the implementation of avoiding causing by the mode of deletion information the inefficacy of user terminal anti-theft feature, the embodiment of the invention provides a kind of method and user terminal that detects user terminal, below in conjunction with Figure of description the preferred embodiments of the present invention are described, be to be understood that, preferred embodiment described herein only is used for description and interpretation the present invention, is not intended to limit the present invention.And in the situation of not conflicting, embodiment and the feature among the embodiment among the application can make up mutually.
The embodiment of the invention provides a kind of method that detects user terminal, as shown in Figure 1, comprising:
Wherein, the Subscriber Identity Module of user terminal can be user identity identification (Subscriber IdentityModule, SIM) card, also can be global user identity identification (Universal Subscriber IdentityModule, USIM) card.
Further, after definite this user terminal is stolen, can also carry out the antitheft processing operation of this user terminal, when carrying out antitheft processing operation based on antitheft information, also can be to set in advance and be stored in the non-volatile subregion of user terminal, after definite this user terminal is not stolen, can trigger the function that user terminal communicates by the Subscriber Identity Module that inserts.
The execution trigger condition of the said method that the embodiment of the invention provides, can arrange flexibly according to actual needs, for example, can be when each user terminal start, to trigger to carry out, also can be that triggering is carried out when starting shooting first after user terminal is reinserted into Subscriber Identity Module, also can be to trigger to carry out when user terminal receives the specify message that sets in advance.
The information of employed the first designated user identification card in the said method that the embodiment of the invention provides can set in advance in the following way:
When arranging first, obtain the password that the user arranges, and the password that the user is arranged is stored in the non-volatile subregion of user terminal; And according to the information of user input indication is set, with the information of the Subscriber Identity Module of the current insertion of the user terminal information as the first designated user identification card, store in the non-volatile subregion of user terminal; And according to the function on indication of user input, start and determine whether stolen function of user terminal;
When arranging first, obtain the password of user's input when non-; When the password of storing in the non-volatile subregion of the password of user input and user terminal was consistent, according to the functional shielding indication of user's input, whether the definite user terminal of shielding stolen function; Information according to user input arranges indication, with the information of the Subscriber Identity Module of the current insertion of the user terminal information as the first designated user identification card, stores in the non-volatile subregion of user terminal; And according to the function on indication of user input, start and determine whether stolen function of user terminal.
Below in conjunction with accompanying drawing, with specific embodiment method provided by the invention and user terminal are described in detail.
Embodiment 1:
At definite user terminal that the embodiment of the invention provides whether in the stolen method, can set in advance antitheft information, this antitheft information can comprise determines whether stolen information of user terminal, and after definite user terminal is stolen, when carrying out antitheft processing and operating based on information.
Figure 2 shows that the flow chart that antitheft information is set first that the embodiment of the invention 1 provides, specifically comprise following treatment step:
Whether step 203, detection user terminal had started the antitheft information setting of anti-theft feature, if started, entered step 204, if do not start, entered step 205.
The display reminding user carries out the information that anti-theft feature arranges on terminal screen, and display password arranges frame, the options that can also show antitheft processing operation, and prompting user inputs the antitheft information of antitheft processing operational correspondence, such as arrange in the information of the Subscriber Identity Module of determining to be used for after stolen receive data etc.
In this step, information can once show, also can distinguish successively demonstration.
Accordingly, the user is according to the information of user terminal displays, and antitheft processing option of operation, corresponding antitheft information, the information of input password, selection arrange indication and function on indication etc.
The user can once input based on the information that once shows, also can input successively based on the information that shows successively.
The configuration information of step 206, user terminal storage user input can comprise following operation:
Behind the password that obtains user's setting, the password that the user is arranged is stored in the non-volatile subregion of this user terminal;
Information according to user input arranges indication, with the information of the Subscriber Identity Module of the current insertion of the user terminal information as the first designated user identification card, stores in the non-volatile subregion of user terminal;
Flag information with the antitheft processing option of operation of user selection stores in the non-volatile subregion of user terminal, and with the antitheft information of the correspondence of user's input, stores in the non-volatile subregion of user terminal;
According to the function on indication of user input, the startup flag information of anti-theft feature is stored in the non-volatile subregion of user terminal, namely start and determine whether stolen function of user terminal.
By above-mentioned step 201-step 206 shown in Figure 2, finished the first setting of the various antitheft information of anti-theft feature.
After antitheft information is arranged first, can also make amendment to the antitheft information that arranges in the embodiment of the invention, namely again arrange, Figure 3 shows that the non-flow chart that antitheft information is set first that the embodiment of the invention 1 provides, specifically comprise following treatment step:
Step 301, user terminal start the again setting of antitheft information according to the information updating indication of user's input, display password input frame at first, prompting user input password.
Step 302, judge user input the non-volatile subregion of password and user terminal in the password stored whether consistent, if inconsistent, enter step 303, if unanimously, enter step 304.
Step 303, prompt cipher input error.
Step 304, when the user will reset the information of first user identification card, need to shield first the anti-theft feature of user terminal, the user can shield anti-theft feature by input function shielding indication.
In this step, user terminal obtains the functional shielding indication of user input, and whether stolen function of user terminal is determined in shielding.
Step 305, having shielded user terminal whether after the stolen function, can shut down and change the Subscriber Identity Module that user terminal inserts, after start again and again inputting correct password, can indication be set input message.
User terminal arranges indication according to the information of user's input, with the information of the Subscriber Identity Module of the current insertion of the user terminal information as the first designated user identification card, store in the non-volatile subregion of user terminal, be used for replacing the information of original the first designated user identification card of storing.
Step 306, after the renewal of the information of finishing the first designated user identification card arranges, user terminal can be according to the function on indication of user input, starts to determine whether stolen function of user terminal.
Step 307, when the user will reset other antitheft information except the information of first user identification card, for example, the change password, the antitheft processing option of operation of selecting, and corresponding antitheft information etc., do not need to shield first the anti-theft feature of user terminal this moment
User terminal obtains the antitheft information of user's input, and stores in the non-volatile subregion of user terminal, is used for replacing the antitheft information of original correspondence of storing.
Each step in this step and the above-mentioned steps 304-step 306 does not have strict sequencing.
By above-mentioned step 301-step 307 shown in Figure 3, finished the renewal setting of the various antitheft information of anti-theft feature, namely again arrange.
In the embodiment of the invention 1, the non-volatile subregion that is used for the antitheft information such as information of storage the first designated user identification card, for being used for storing the radio frequency parameter of user terminal and an encrypted partition of functional parameter in the user terminal, namely store antitheft information by hardware (hardware), canned data can not be illegally modified and delete in this non-volatile subregion.
Embodiment 2:
After setting in advance antitheft information, namely can start anti-theft feature, determine whether user terminal is stolen, and after definite user terminal is stolen, trigger corresponding antitheft processing operation.
Figure 4 shows that whether stolen method of definite user terminal that the embodiment of the invention 2 provides, specifically comprise following treatment step:
Wherein, carrying out trigger condition can arrange according to actual needs flexibly, for example, can be when each user terminal start, to trigger to carry out, also can be that triggering is carried out when starting shooting first after user terminal is reinserted into Subscriber Identity Module, also can be to trigger to carry out when user terminal receives the specify message that sets in advance.
Operation one: the information of the second designated user identification card that sets in advance of storing in the non-volatile subregion according to user terminal is sent to the terminal that the second designated user identification card is positioned at one of following at least information:
Satisfy the data of the specified type of storing in the communication information of specified format and the user terminal between the information of the Subscriber Identity Module of current insertion, the current location information of user terminal, user terminal and other terminal;
Wherein, the positional information of the base station that positional information can belong to for this user terminal, also can be for passing through global positioning system (Global Positioning System, GPS) location coordinate information that obtains of location, the communication information can be for comprising the various types of based on information mutual between communication network and other terminal or the server of note etc.;
Send the communication information that satisfies specified format between the current location information of information, user terminal of the Subscriber Identity Module of current insertion and user terminal and other terminal, can be so that the user can understand based on these communication informations the situation of stolen user terminal, and the situation of stealing the user of this user terminal, thereby can give this user terminal for change;
Send the data of the specified type of storing in the user terminal, can make the data that the user gives for change to be needed, such as note, address list, photo and audio-video document etc.
Operation two: the information of the second designated user identification card that sets in advance of storing in the non-volatile subregion according to user terminal, when user terminal receives the calling of the terminal that the second designated user identification card is positioned at, automatic call establishment is so that the user can understand the current residing ambient conditions of stolen user terminal.
Operation three: the data of the specified type of storing in the deletion user terminal, for example, note, address list, photo and audio-video document etc. are to avoid the leakage of individual subscriber privacy information.
Operation four: trigger user terminal and play alarm sound, this operation can be to trigger after receiving the warning indication that terminal that the second designated user identification card is positioned at sends, this warning indication can be indicated for message, also can be for calling out indication, for example, can at the current location information of user according to this user terminal, arrive after the current Location of this user terminal, trigger alarm, thus give this portable terminal for change.
Operation five: the communication function of locking user terminal.
Adopt whether stolen method of definite user terminal that the embodiment of the invention 2 provides, because institute's canned data can not be illegally modified and delete in the non-volatile subregion of user terminal, described, even if this user terminal is stolen, also this information can't be deleted from this user terminal, thereby can't this user terminal be determined whether that stolen function removes by the mode of deletion information, namely can't cause the user terminal anti-theft feature to lose efficacy by the mode of deletion information.
Further, the such scheme that the embodiment of the invention provides can be realized by the antitheft software that belongs to systems soft ware on the user terminal, because systems soft ware can't be deleted, so can avoid causing the user terminal anti-theft feature to lose efficacy by the mode of deletion software.
Embodiment 3:
Based on same inventive concept, whether the definite user terminal that provides according to the above embodiment of the present invention stolen method, and correspondingly, the embodiment of the invention 3 also provides a kind of user terminal, and its structural representation specifically comprises as shown in Figure 5:
Detecting unit 501, whether the information of the first designated user identification card that sets in advance of storing in the non-volatile subregion for detection of the information of the Subscriber Identity Module of current insertion in the user terminal and described user terminal is consistent;
Determining unit 502 when being used for the information inconsistency when the information of the Subscriber Identity Module that detects described current insertion and described the first designated user identification card, determines that described user terminal is stolen; And when the information of the information of the Subscriber Identity Module that detects described current insertion and described the first designated user identification card is consistent, determine that described user terminal is not stolen.
Further, above-mentioned user terminal also comprises:
Processing unit 503 is used for after determining unit 502 determines that described user terminal is stolen, carries out the antitheft processing operation of described user terminal.
Further, processing unit 503, the information for the second designated user identification card that sets in advance of storing according to the non-volatile subregion of described user terminal is sent to the terminal that described the second designated user identification card is positioned at one of following at least information:
Satisfy the data of the specified type of storing in the communication information of specified format and the described user terminal between the information of the Subscriber Identity Module of current insertion, the current location information of described user terminal, described user terminal and other terminal.
Further, processing unit 503, the information that is used for the second designated user identification card that sets in advance stored according to the non-volatile subregion of described user terminal, when described user terminal receives the calling of the terminal that described the second designated user identification card is positioned at, automatic call establishment; Perhaps
Delete the data of the specified type of storing in the described user terminal; Perhaps
Trigger described user terminal and play alarm sound; Perhaps
Lock the communication function of described user terminal.
Further, above-mentioned user terminal also comprises:
Function setting unit 504 is used for setting in advance at the non-volatile subregion of described user terminal in the following way the information of the first designated user identification card:
When arranging first, obtain the password that the user arranges, and the password that the user is arranged is stored in the non-volatile subregion of described user terminal; And according to the information of user input indication is set, with the information of the Subscriber Identity Module of the current insertion of the described user terminal information as the first designated user identification card, store in the non-volatile subregion of described user terminal; And according to the function on indication of user input, start and determine whether stolen function of described user terminal;
When arranging first, obtain the password of user's input when non-; When the password of storing in the non-volatile subregion of the password of user input and described user terminal was consistent, according to the functional shielding indication of user's input, whether the definite described user terminal of shielding stolen function; Information according to user input arranges indication, with the information of the Subscriber Identity Module of the current insertion of the described user terminal information as the first designated user identification card, stores in the non-volatile subregion of described user terminal; And according to the function on indication of user input, start and determine whether stolen function of described user terminal.
The function of above-mentioned each unit can corresponding to the respective handling step of Fig. 1 to the flow process shown in Figure 4, not repeat them here.
In sum, the scheme that the embodiment of the invention provides comprises: whether the information of the first designated user identification card that sets in advance of storing in the information that detects the Subscriber Identity Module of current insertion in the user terminal and the non-volatile subregion of user terminal is consistent; And when inconsistent, determine that this user terminal is stolen, when consistent, determine that this user terminal is not stolen.The scheme that adopts the embodiment of the invention to provide is so that after user terminal is stolen, can't cause the user terminal anti-theft feature to lose efficacy by the mode of deletion information.
The user terminal that the application's embodiment provides can be realized by computer program.Those skilled in the art should be understood that; above-mentioned Module Division mode only is a kind of in numerous Module Division modes; if be divided into other modules or do not divide module, as long as user terminal has above-mentioned functions, all should be within the application's protection range.
The application is that reference is described according to flow chart and/or the block diagram of method, equipment (system) and the computer program of the embodiment of the present application.Should understand can be by the flow process in each flow process in computer program instructions realization flow figure and/or the block diagram and/or square frame and flow chart and/or the block diagram and/or the combination of square frame.Can provide these computer program instructions to the processor of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing device producing a machine, so that the instruction of carrying out by the processor of computer or other programmable data processing device produces the device of the function that is used for being implemented in flow process of flow chart or a plurality of flow process and/or square frame of block diagram or a plurality of square frame appointments.
These computer program instructions also can be stored in energy vectoring computer or the computer-readable memory of other programmable data processing device with ad hoc fashion work, so that the instruction that is stored in this computer-readable memory produces the manufacture that comprises command device, this command device is implemented in the function of appointment in flow process of flow chart or a plurality of flow process and/or square frame of block diagram or a plurality of square frame.
These computer program instructions also can be loaded on computer or other programmable data processing device, so that carry out the sequence of operations step producing computer implemented processing at computer or other programmable devices, thereby be provided for being implemented in the step of the function of appointment in flow process of flow chart or a plurality of flow process and/or square frame of block diagram or a plurality of square frame in the instruction that computer or other programmable devices are carried out.
Obviously, those skilled in the art can carry out various changes and modification to the present invention and not break away from the spirit and scope of the present invention.Like this, if of the present invention these are revised and modification belongs within the scope of claim of the present invention and equivalent technologies thereof, then the present invention also is intended to comprise these changes and modification interior.
Claims (10)
1. a method that detects user terminal is characterized in that, comprising:
Detect the information of the Subscriber Identity Module of current insertion in the user terminal, whether consistent with the information of the first designated user identification card that sets in advance of storing in the non-volatile subregion of described user terminal;
When the information inconsistency of the information of the Subscriber Identity Module that detects described current insertion and described the first designated user identification card, determine that described user terminal is stolen;
When the information of the information of the Subscriber Identity Module that detects described current insertion and described the first designated user identification card is consistent, determine that described user terminal is not stolen.
2. the method for claim 1 is characterized in that, after definite described user terminal is stolen, also comprises:
Carry out the antitheft processing operation of described user terminal.
3. method as claimed in claim 2 is characterized in that, carries out the antitheft processing operation of described user terminal, comprising:
The information of the second designated user identification card that sets in advance of storing in the non-volatile subregion according to described user terminal is sent to the terminal that described the second designated user identification card is positioned at one of following at least information:
Satisfy the data of the specified type of storing in the communication information of specified format and the described user terminal between the information of the Subscriber Identity Module of current insertion, the current location information of described user terminal, described user terminal and other terminal.
4. method as claimed in claim 2 is characterized in that, carries out the antitheft processing operation of described user terminal, comprising:
The information of the second designated user identification card that sets in advance of storing in the non-volatile subregion according to described user terminal, when described user terminal receives the calling of the terminal that described the second designated user identification card is positioned at, automatic call establishment; Perhaps
Delete the data of the specified type of storing in the described user terminal; Perhaps
Trigger described user terminal and play alarm sound; Perhaps
Lock the communication function of described user terminal.
5. such as the arbitrary described method of claim 1-4, it is characterized in that, in the non-volatile subregion of described user terminal, set in advance in the following way the information of the first designated user identification card:
When arranging first, obtain the password that the user arranges, and the password that the user is arranged is stored in the non-volatile subregion of described user terminal; And according to the information of user input indication is set, with the information of the Subscriber Identity Module of the current insertion of the described user terminal information as the first designated user identification card, store in the non-volatile subregion of described user terminal; And according to the function on indication of user input, start and determine whether stolen function of described user terminal;
When arranging first, obtain the password of user's input when non-; When the password of storing in the non-volatile subregion of the password of user input and described user terminal was consistent, according to the functional shielding indication of user's input, whether the definite described user terminal of shielding stolen function; Information according to user input arranges indication, with the information of the Subscriber Identity Module of the current insertion of the described user terminal information as the first designated user identification card, stores in the non-volatile subregion of described user terminal; And according to the function on indication of user input, start and determine whether stolen function of described user terminal.
6. a user terminal is characterized in that, comprising:
Detecting unit, for detection of the information of the Subscriber Identity Module of current insertion in the user terminal, whether consistent with the information of the first designated user identification card that sets in advance of storing in the non-volatile subregion of described user terminal;
Determining unit when being used for the information inconsistency when the information of the Subscriber Identity Module that detects described current insertion and described the first designated user identification card, determines that described user terminal is stolen; And when the information of the information of the Subscriber Identity Module that detects described current insertion and described the first designated user identification card is consistent, determine that described user terminal is not stolen.
7. user terminal as claimed in claim 6 is characterized in that, also comprises:
Processing unit is used for after described determining unit determines that described user terminal is stolen, carries out the antitheft processing operation of described user terminal.
8. user terminal as claimed in claim 7, it is characterized in that, described processing unit, information for the second designated user identification card that sets in advance of storing according to the non-volatile subregion of described user terminal is sent to the terminal that described the second designated user identification card is positioned at one of following at least information:
Satisfy the data of the specified type of storing in the communication information of specified format and the described user terminal between the information of the Subscriber Identity Module of current insertion, the current location information of described user terminal, described user terminal and other terminal.
9. user terminal as claimed in claim 7, it is characterized in that, described processing unit, information for the second designated user identification card that sets in advance of storing according to the non-volatile subregion of described user terminal, when described user terminal receives the calling of the terminal that described the second designated user identification card is positioned at, automatic call establishment; Perhaps
Delete the data of the specified type of storing in the described user terminal; Perhaps
Trigger described user terminal and play alarm sound; Perhaps
Lock the communication function of described user terminal.
10. such as the arbitrary described user terminal of claim 6-9, it is characterized in that, also comprise:
Function setting unit is used for setting in advance at the non-volatile subregion of described user terminal in the following way the information of the first designated user identification card:
When arranging first, obtain the password that the user arranges, and the password that the user is arranged is stored in the non-volatile subregion of described user terminal; And according to the information of user input indication is set, with the information of the Subscriber Identity Module of the current insertion of the described user terminal information as the first designated user identification card, store in the non-volatile subregion of described user terminal; And according to the function on indication of user input, start and determine whether stolen function of described user terminal;
When arranging first, obtain the password of user's input when non-; When the password of storing in the non-volatile subregion of the password of user input and described user terminal was consistent, according to the functional shielding indication of user's input, whether the definite described user terminal of shielding stolen function; Information according to user input arranges indication, with the information of the Subscriber Identity Module of the current insertion of the described user terminal information as the first designated user identification card, stores in the non-volatile subregion of described user terminal; And according to the function on indication of user input, start and determine whether stolen function of described user terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210461493XA CN102946482A (en) | 2012-11-15 | 2012-11-15 | Method for detecting user terminal and user terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210461493XA CN102946482A (en) | 2012-11-15 | 2012-11-15 | Method for detecting user terminal and user terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102946482A true CN102946482A (en) | 2013-02-27 |
Family
ID=47729387
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210461493XA Pending CN102946482A (en) | 2012-11-15 | 2012-11-15 | Method for detecting user terminal and user terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102946482A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104134025A (en) * | 2014-07-29 | 2014-11-05 | 深圳市中兴移动通信有限公司 | Mobile terminal locking method and device based on SIM cards and mobile terminal |
CN105141736A (en) * | 2015-09-22 | 2015-12-09 | 广东欧珀移动通信有限公司 | Information security protection method and apparatus |
CN105260667A (en) * | 2015-10-08 | 2016-01-20 | 青岛海信移动通信技术股份有限公司 | Mobile terminal information confidential method and mobile terminal |
CN105335677A (en) * | 2014-07-24 | 2016-02-17 | 小米科技有限责任公司 | Anti-theft method and device of mobile terminal |
WO2016177097A1 (en) * | 2015-08-18 | 2016-11-10 | 中兴通讯股份有限公司 | Method and device for maintaining information security of mobile terminal, and storage medium |
CN106506763A (en) * | 2016-09-26 | 2017-03-15 | 广东小天才科技有限公司 | Test control method and device of mobile terminal and mobile terminal |
CN108717377A (en) * | 2018-03-27 | 2018-10-30 | 广州视源电子科技股份有限公司 | Method and device for controlling event operation, terminal equipment and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101252703A (en) * | 2008-03-28 | 2008-08-27 | 宇龙计算机通信科技(深圳)有限公司 | Terminal data protecting method, system as well as mobile communication terminal |
CN101459721A (en) * | 2007-12-11 | 2009-06-17 | 上海晨兴电子科技有限公司 | Method and device for anti-theft tracking of mobile phone |
US20090270126A1 (en) * | 2008-04-24 | 2009-10-29 | Hon Hai Precision Industry Co., Ltd. | Mobile terminal having anti-theft function and anti-theft method |
CN102256027A (en) * | 2010-05-20 | 2011-11-23 | 英华达(上海)电子有限公司 | Alarming method and alarming terminal |
CN102378411A (en) * | 2010-08-26 | 2012-03-14 | 乐金电子(中国)研究开发中心有限公司 | Method for realizing retrieving function based on mobile terminal and mobile terminal |
CN102694920A (en) * | 2012-05-28 | 2012-09-26 | 广东欧珀移动通信有限公司 | Mobile phone antitheft method |
-
2012
- 2012-11-15 CN CN201210461493XA patent/CN102946482A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101459721A (en) * | 2007-12-11 | 2009-06-17 | 上海晨兴电子科技有限公司 | Method and device for anti-theft tracking of mobile phone |
CN101252703A (en) * | 2008-03-28 | 2008-08-27 | 宇龙计算机通信科技(深圳)有限公司 | Terminal data protecting method, system as well as mobile communication terminal |
US20090270126A1 (en) * | 2008-04-24 | 2009-10-29 | Hon Hai Precision Industry Co., Ltd. | Mobile terminal having anti-theft function and anti-theft method |
CN102256027A (en) * | 2010-05-20 | 2011-11-23 | 英华达(上海)电子有限公司 | Alarming method and alarming terminal |
CN102378411A (en) * | 2010-08-26 | 2012-03-14 | 乐金电子(中国)研究开发中心有限公司 | Method for realizing retrieving function based on mobile terminal and mobile terminal |
CN102694920A (en) * | 2012-05-28 | 2012-09-26 | 广东欧珀移动通信有限公司 | Mobile phone antitheft method |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105335677A (en) * | 2014-07-24 | 2016-02-17 | 小米科技有限责任公司 | Anti-theft method and device of mobile terminal |
CN104134025A (en) * | 2014-07-29 | 2014-11-05 | 深圳市中兴移动通信有限公司 | Mobile terminal locking method and device based on SIM cards and mobile terminal |
CN104134025B (en) * | 2014-07-29 | 2019-02-15 | 努比亚技术有限公司 | Mobile terminal locking method, device and mobile terminal based on SIM card |
WO2016177097A1 (en) * | 2015-08-18 | 2016-11-10 | 中兴通讯股份有限公司 | Method and device for maintaining information security of mobile terminal, and storage medium |
CN105141736A (en) * | 2015-09-22 | 2015-12-09 | 广东欧珀移动通信有限公司 | Information security protection method and apparatus |
CN105260667A (en) * | 2015-10-08 | 2016-01-20 | 青岛海信移动通信技术股份有限公司 | Mobile terminal information confidential method and mobile terminal |
CN106506763A (en) * | 2016-09-26 | 2017-03-15 | 广东小天才科技有限公司 | Test control method and device of mobile terminal and mobile terminal |
CN106506763B (en) * | 2016-09-26 | 2019-04-30 | 广东小天才科技有限公司 | Test control method and device of mobile terminal and mobile terminal |
CN108717377A (en) * | 2018-03-27 | 2018-10-30 | 广州视源电子科技股份有限公司 | Method and device for controlling event operation, terminal equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102946482A (en) | Method for detecting user terminal and user terminal | |
US9301143B2 (en) | Mobile terminal and method of providing security thereto | |
EP3113131B1 (en) | Method and device for providing object finding information | |
CN105389507B (en) | The method and device of monitoring system partitioned file | |
KR101678038B1 (en) | Method, apparatus, program, and recording medium for automatically connecting wireless network | |
CN113110852A (en) | Firmware upgrading method and device and storage medium | |
EP3229136B1 (en) | Application calling management methods and apparatuses | |
CN103220637A (en) | Mobile phone anti-theft protection method and mobile phone anti-theft protection device | |
CN103218564A (en) | Mobile terminal protection method and mobile terminal protection device | |
CN104348959A (en) | Mobile terminal alarm method and device | |
CN104601818A (en) | Method and device for switching operating systems in communication process | |
CN104427468A (en) | Automatic alarming method and device of mobile terminal | |
WO2015154452A1 (en) | Method and terminal for remotely querying information about contact person | |
WO2017097258A1 (en) | Spam blocking method and apparatus, computer program, and readable medium | |
CN108737655B (en) | Picture processing method and related device | |
WO2014181479A1 (en) | Management device | |
CN111209559B (en) | Permission processing method and device of application program, storage medium and electronic equipment | |
CN104796531A (en) | Method and system for protecting information privacy | |
CN103458394A (en) | Mobile terminal, processing method and processing device for internal information of mobile terminal | |
CN104780530A (en) | A method and a terminal for protecting user data | |
CN111858182B (en) | Data reading method and device, storage medium and mobile terminal | |
CN108959955B (en) | File processing method and device | |
CN106022162A (en) | Private information protection method and system suitable for communication terminal | |
CN112100612A (en) | Terminal authority protection method and device and terminal | |
CN106664557B (en) | Control method of mobile terminal and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C53 | Correction of patent of invention or patent application | ||
CB02 | Change of applicant information |
Address after: 100085 Beijing city Haidian District Qinghe Street No. 68 Huarun colorful city shopping center two floor 13 Applicant after: Xiaomi Technology Co., Ltd. Address before: 100102, No. 50, block A, building No. 12, winding stone world building, Wangjing West Road, Beijing, Chaoyang District Applicant before: Beijing Xiaomi Technology Co., Ltd. |
|
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20130227 |