CN102946482A - Method for detecting user terminal and user terminal - Google Patents

Method for detecting user terminal and user terminal Download PDF

Info

Publication number
CN102946482A
CN102946482A CN201210461493XA CN201210461493A CN102946482A CN 102946482 A CN102946482 A CN 102946482A CN 201210461493X A CN201210461493X A CN 201210461493XA CN 201210461493 A CN201210461493 A CN 201210461493A CN 102946482 A CN102946482 A CN 102946482A
Authority
CN
China
Prior art keywords
user terminal
information
described user
identification card
subregion
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201210461493XA
Other languages
Chinese (zh)
Inventor
张国全
王娜
陶钧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Technology Co Ltd
Original Assignee
Beijing Xiaomi Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Technology Co Ltd filed Critical Beijing Xiaomi Technology Co Ltd
Priority to CN201210461493XA priority Critical patent/CN102946482A/en
Publication of CN102946482A publication Critical patent/CN102946482A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Telephone Function (AREA)

Abstract

The embodiment of the invention discloses a method for detecting a user terminal and the user terminal. The method comprises the following steps of: detecting whether information on a subscriber identity module card currently inserted in the user terminal is consistent with information on a previously arranged first specified subscriber identity module card stored in a non-volatile partition of the user terminal; when detecting that the information on the currently inserted subscriber identity module card is inconsistent with the information on the first specified subscriber identity module card, determining that the user terminal is stolen; and when detecting that the information on the currently inserted subscriber identity module card is consistent with the information on the first specified subscriber identity module card, determining that the user terminal is not stolen. By using the scheme provided by the embodiment of the invention, after the user terminal is stolen, invalidation of an anti-theft function of the user terminal cannot be realized by deleting the information.

Description

A kind of method and user terminal that detects user terminal
Technical field
The present invention relates to the terminal technology field, relate in particular to a kind of method and user terminal that detects user terminal.
Background technology
Continuous increase along with cell-phone function, mobile phone is except possessing communication function, the function that has also possessed other electronic equipments such as palmtop PC (Personal Digital Assistant, PDA), digital camera, mobile phone has obtained using widely in real life as user terminal.
Mobile phone is simultaneously as portable terminal, because its portability, cause being easy to lose or stolen, so the technology of hand-set from stolen occurred preventing, although industry is called Mobile phone antitheft technology with this technology usually, be in fact a kind of remedial technique that after mobile phone is stolen, triggers, for example, can be the technology of getting back mobile phone, also can be the technology of the data on the getting back mobile phone.It also can be the technology etc. of locking cell-phone function.
Present Mobile phone antitheft technology is normally installed antitheft software at mobile phone, and by the antitheft information that the user is provided for carrying out antitheft processing operation, after hand-set from stolen, determines automatically that by mobile phone self is stolen, then triggers corresponding antitheft processing operation.
Yet, in above-mentioned antitheft mobile phone scheme, behind hand-set from stolen, if before triggering antitheft processing operation, antitheft software is deleted from mobile phone, perhaps with the mobile phone factory reset, perhaps mobile phone is brushed machine operation again, the anti-theft feature of mobile phone can be removed from this mobile phone, thereby cause the anti-theft feature of mobile phone to lose efficacy.
Summary of the invention
The embodiment of the invention provides a kind of method and user terminal that detects user terminal, causes the problem of user terminal anti-theft feature inefficacy in order to the mode of passing through deletion information that solves present existence.
The embodiment of the invention provides whether stolen method of a kind of definite user terminal, comprising:
Whether the information of the first designated user identification card that sets in advance of storing in the information that detects the Subscriber Identity Module of current insertion in the user terminal and the non-volatile subregion of described user terminal is consistent;
When the information inconsistency of the information of the Subscriber Identity Module that detects described current insertion and described the first designated user identification card, determine that described user terminal is stolen;
When the information of the information of the Subscriber Identity Module that detects described current insertion and described the first designated user identification card is consistent, determine that described user terminal is not stolen.
The embodiment of the invention also provides a kind of user terminal, comprising:
Detecting unit, whether the information of the first designated user identification card that sets in advance of storing in the non-volatile subregion for detection of the information of the Subscriber Identity Module of current insertion in the user terminal and described user terminal is consistent;
Determining unit is used for determining that described user terminal is stolen when inconsistent; And when consistent, determine that described user terminal is not stolen.
In the method that the embodiment of the invention provides, when whether definite user terminal is stolen, being whether the information of the first designated user identification card that sets in advance stored in the non-volatile subregion of information and this user terminal by detecting the Subscriber Identity Module of current insertion in the user terminal is consistent determines, when inconsistent, determine that this user terminal is stolen, when consistent, determine that this user terminal is not stolen.Because non-volatile subregion is to be used for the radio frequency parameter of storage user terminal and an encrypted partition of functional parameter in the user terminal, it has the advantages that institute's canned data can not be illegally modified and delete, so, will for determine user terminal whether the information of stolen the first designated user identification card that sets in advance be stored in the non-volatile subregion of user terminal, even if this user terminal is stolen, also this information can't be deleted from this user terminal, thereby can't this user terminal be determined whether that stolen function removes by the mode of deletion information, namely can't cause the user terminal anti-theft feature to lose efficacy by the mode of deletion information.
Description of drawings
Accompanying drawing is used to provide a further understanding of the present invention, and consists of the part of specification, is used from explanation the present invention with the embodiment of the invention one, is not construed as limiting the invention.In the accompanying drawings:
Whether definite user terminal that Fig. 1 provides for the embodiment of the invention flow chart of stolen method;
The flow chart that antitheft information first is set of Fig. 2 for providing in the embodiment of the invention 1;
The flow chart of antitheft information is provided for the renewal that provides in the embodiment of the invention 1 Fig. 3;
Definite user terminal of providing in the embodiment of the invention 2 flow chart of stolen method whether is provided Fig. 4;
The structural representation of the user terminal that provides in the embodiment of the invention 3 is provided Fig. 5.
Embodiment
In order to provide the implementation of avoiding causing by the mode of deletion information the inefficacy of user terminal anti-theft feature, the embodiment of the invention provides a kind of method and user terminal that detects user terminal, below in conjunction with Figure of description the preferred embodiments of the present invention are described, be to be understood that, preferred embodiment described herein only is used for description and interpretation the present invention, is not intended to limit the present invention.And in the situation of not conflicting, embodiment and the feature among the embodiment among the application can make up mutually.
The embodiment of the invention provides a kind of method that detects user terminal, as shown in Figure 1, comprising:
Step 101, detect the information of the Subscriber Identity Module of current insertion in the user terminal, whether consistent with the information of the first designated user identification card that sets in advance of storing in the non-volatile subregion of user terminal.
Step 102, when the information inconsistency of the information of the Subscriber Identity Module that detects current insertion and the first designated user identification card, determine that this user terminal is stolen; When the information of the information of the Subscriber Identity Module that detects current insertion and the first designated user identification card is consistent, determine that this user terminal is not stolen.
Wherein, the Subscriber Identity Module of user terminal can be user identity identification (Subscriber IdentityModule, SIM) card, also can be global user identity identification (Universal Subscriber IdentityModule, USIM) card.
Further, after definite this user terminal is stolen, can also carry out the antitheft processing operation of this user terminal, when carrying out antitheft processing operation based on antitheft information, also can be to set in advance and be stored in the non-volatile subregion of user terminal, after definite this user terminal is not stolen, can trigger the function that user terminal communicates by the Subscriber Identity Module that inserts.
The execution trigger condition of the said method that the embodiment of the invention provides, can arrange flexibly according to actual needs, for example, can be when each user terminal start, to trigger to carry out, also can be that triggering is carried out when starting shooting first after user terminal is reinserted into Subscriber Identity Module, also can be to trigger to carry out when user terminal receives the specify message that sets in advance.
The information of employed the first designated user identification card in the said method that the embodiment of the invention provides can set in advance in the following way:
When arranging first, obtain the password that the user arranges, and the password that the user is arranged is stored in the non-volatile subregion of user terminal; And according to the information of user input indication is set, with the information of the Subscriber Identity Module of the current insertion of the user terminal information as the first designated user identification card, store in the non-volatile subregion of user terminal; And according to the function on indication of user input, start and determine whether stolen function of user terminal;
When arranging first, obtain the password of user's input when non-; When the password of storing in the non-volatile subregion of the password of user input and user terminal was consistent, according to the functional shielding indication of user's input, whether the definite user terminal of shielding stolen function; Information according to user input arranges indication, with the information of the Subscriber Identity Module of the current insertion of the user terminal information as the first designated user identification card, stores in the non-volatile subregion of user terminal; And according to the function on indication of user input, start and determine whether stolen function of user terminal.
Below in conjunction with accompanying drawing, with specific embodiment method provided by the invention and user terminal are described in detail.
Embodiment 1:
At definite user terminal that the embodiment of the invention provides whether in the stolen method, can set in advance antitheft information, this antitheft information can comprise determines whether stolen information of user terminal, and after definite user terminal is stolen, when carrying out antitheft processing and operating based on information.
Figure 2 shows that the flow chart that antitheft information is set first that the embodiment of the invention 1 provides, specifically comprise following treatment step:
Step 201, user terminal detect whether be inserted with Subscriber Identity Module after start, if be not inserted with Subscriber Identity Module, enter step 202, if be inserted with Subscriber Identity Module, enter step 203.
Step 202, prompting user insert Subscriber Identity Module.
Whether step 203, detection user terminal had started the antitheft information setting of anti-theft feature, if started, entered step 204, if do not start, entered step 205.
Step 204, user terminal trigger the function that communicates by the Subscriber Identity Module that inserts.
Step 205, user terminal prompting user carry out the anti-theft feature setting, can comprise following operation:
The display reminding user carries out the information that anti-theft feature arranges on terminal screen, and display password arranges frame, the options that can also show antitheft processing operation, and prompting user inputs the antitheft information of antitheft processing operational correspondence, such as arrange in the information of the Subscriber Identity Module of determining to be used for after stolen receive data etc.
In this step, information can once show, also can distinguish successively demonstration.
Accordingly, the user is according to the information of user terminal displays, and antitheft processing option of operation, corresponding antitheft information, the information of input password, selection arrange indication and function on indication etc.
The user can once input based on the information that once shows, also can input successively based on the information that shows successively.
The configuration information of step 206, user terminal storage user input can comprise following operation:
Behind the password that obtains user's setting, the password that the user is arranged is stored in the non-volatile subregion of this user terminal;
Information according to user input arranges indication, with the information of the Subscriber Identity Module of the current insertion of the user terminal information as the first designated user identification card, stores in the non-volatile subregion of user terminal;
Flag information with the antitheft processing option of operation of user selection stores in the non-volatile subregion of user terminal, and with the antitheft information of the correspondence of user's input, stores in the non-volatile subregion of user terminal;
According to the function on indication of user input, the startup flag information of anti-theft feature is stored in the non-volatile subregion of user terminal, namely start and determine whether stolen function of user terminal.
By above-mentioned step 201-step 206 shown in Figure 2, finished the first setting of the various antitheft information of anti-theft feature.
After antitheft information is arranged first, can also make amendment to the antitheft information that arranges in the embodiment of the invention, namely again arrange, Figure 3 shows that the non-flow chart that antitheft information is set first that the embodiment of the invention 1 provides, specifically comprise following treatment step:
Step 301, user terminal start the again setting of antitheft information according to the information updating indication of user's input, display password input frame at first, prompting user input password.
Step 302, judge user input the non-volatile subregion of password and user terminal in the password stored whether consistent, if inconsistent, enter step 303, if unanimously, enter step 304.
Step 303, prompt cipher input error.
Step 304, when the user will reset the information of first user identification card, need to shield first the anti-theft feature of user terminal, the user can shield anti-theft feature by input function shielding indication.
In this step, user terminal obtains the functional shielding indication of user input, and whether stolen function of user terminal is determined in shielding.
Step 305, having shielded user terminal whether after the stolen function, can shut down and change the Subscriber Identity Module that user terminal inserts, after start again and again inputting correct password, can indication be set input message.
User terminal arranges indication according to the information of user's input, with the information of the Subscriber Identity Module of the current insertion of the user terminal information as the first designated user identification card, store in the non-volatile subregion of user terminal, be used for replacing the information of original the first designated user identification card of storing.
Step 306, after the renewal of the information of finishing the first designated user identification card arranges, user terminal can be according to the function on indication of user input, starts to determine whether stolen function of user terminal.
Step 307, when the user will reset other antitheft information except the information of first user identification card, for example, the change password, the antitheft processing option of operation of selecting, and corresponding antitheft information etc., do not need to shield first the anti-theft feature of user terminal this moment
User terminal obtains the antitheft information of user's input, and stores in the non-volatile subregion of user terminal, is used for replacing the antitheft information of original correspondence of storing.
Each step in this step and the above-mentioned steps 304-step 306 does not have strict sequencing.
By above-mentioned step 301-step 307 shown in Figure 3, finished the renewal setting of the various antitheft information of anti-theft feature, namely again arrange.
In the embodiment of the invention 1, the non-volatile subregion that is used for the antitheft information such as information of storage the first designated user identification card, for being used for storing the radio frequency parameter of user terminal and an encrypted partition of functional parameter in the user terminal, namely store antitheft information by hardware (hardware), canned data can not be illegally modified and delete in this non-volatile subregion.
Embodiment 2:
After setting in advance antitheft information, namely can start anti-theft feature, determine whether user terminal is stolen, and after definite user terminal is stolen, trigger corresponding antitheft processing operation.
Figure 4 shows that whether stolen method of definite user terminal that the embodiment of the invention 2 provides, specifically comprise following treatment step:
Step 401, when satisfying the trigger condition set in advance, whether the information that detects the first designated user identification card that sets in advance of storing in the non-volatile subregion of information and user terminal of Subscriber Identity Module of the current insertion of user terminal is consistent, if consistent, enter step 402, if inconsistent, enter step 403.
Wherein, carrying out trigger condition can arrange according to actual needs flexibly, for example, can be when each user terminal start, to trigger to carry out, also can be that triggering is carried out when starting shooting first after user terminal is reinserted into Subscriber Identity Module, also can be to trigger to carry out when user terminal receives the specify message that sets in advance.
Step 402, determine that this user terminal is not stolen, trigger the function that user terminal communicates by the Subscriber Identity Module that inserts.
Step 403, determine that user terminal is stolen.
Step 404, carry out corresponding antitheft processing operation according to the antitheft information of storing in the non-volatile subregion, can comprise at least one of following operation:
Operation one: the information of the second designated user identification card that sets in advance of storing in the non-volatile subregion according to user terminal is sent to the terminal that the second designated user identification card is positioned at one of following at least information:
Satisfy the data of the specified type of storing in the communication information of specified format and the user terminal between the information of the Subscriber Identity Module of current insertion, the current location information of user terminal, user terminal and other terminal;
Wherein, the positional information of the base station that positional information can belong to for this user terminal, also can be for passing through global positioning system (Global Positioning System, GPS) location coordinate information that obtains of location, the communication information can be for comprising the various types of based on information mutual between communication network and other terminal or the server of note etc.;
Send the communication information that satisfies specified format between the current location information of information, user terminal of the Subscriber Identity Module of current insertion and user terminal and other terminal, can be so that the user can understand based on these communication informations the situation of stolen user terminal, and the situation of stealing the user of this user terminal, thereby can give this user terminal for change;
Send the data of the specified type of storing in the user terminal, can make the data that the user gives for change to be needed, such as note, address list, photo and audio-video document etc.
Operation two: the information of the second designated user identification card that sets in advance of storing in the non-volatile subregion according to user terminal, when user terminal receives the calling of the terminal that the second designated user identification card is positioned at, automatic call establishment is so that the user can understand the current residing ambient conditions of stolen user terminal.
Operation three: the data of the specified type of storing in the deletion user terminal, for example, note, address list, photo and audio-video document etc. are to avoid the leakage of individual subscriber privacy information.
Operation four: trigger user terminal and play alarm sound, this operation can be to trigger after receiving the warning indication that terminal that the second designated user identification card is positioned at sends, this warning indication can be indicated for message, also can be for calling out indication, for example, can at the current location information of user according to this user terminal, arrive after the current Location of this user terminal, trigger alarm, thus give this portable terminal for change.
Operation five: the communication function of locking user terminal.
Adopt whether stolen method of definite user terminal that the embodiment of the invention 2 provides, because institute's canned data can not be illegally modified and delete in the non-volatile subregion of user terminal, described, even if this user terminal is stolen, also this information can't be deleted from this user terminal, thereby can't this user terminal be determined whether that stolen function removes by the mode of deletion information, namely can't cause the user terminal anti-theft feature to lose efficacy by the mode of deletion information.
Further, the such scheme that the embodiment of the invention provides can be realized by the antitheft software that belongs to systems soft ware on the user terminal, because systems soft ware can't be deleted, so can avoid causing the user terminal anti-theft feature to lose efficacy by the mode of deletion software.
Embodiment 3:
Based on same inventive concept, whether the definite user terminal that provides according to the above embodiment of the present invention stolen method, and correspondingly, the embodiment of the invention 3 also provides a kind of user terminal, and its structural representation specifically comprises as shown in Figure 5:
Detecting unit 501, whether the information of the first designated user identification card that sets in advance of storing in the non-volatile subregion for detection of the information of the Subscriber Identity Module of current insertion in the user terminal and described user terminal is consistent;
Determining unit 502 when being used for the information inconsistency when the information of the Subscriber Identity Module that detects described current insertion and described the first designated user identification card, determines that described user terminal is stolen; And when the information of the information of the Subscriber Identity Module that detects described current insertion and described the first designated user identification card is consistent, determine that described user terminal is not stolen.
Further, above-mentioned user terminal also comprises:
Processing unit 503 is used for after determining unit 502 determines that described user terminal is stolen, carries out the antitheft processing operation of described user terminal.
Further, processing unit 503, the information for the second designated user identification card that sets in advance of storing according to the non-volatile subregion of described user terminal is sent to the terminal that described the second designated user identification card is positioned at one of following at least information:
Satisfy the data of the specified type of storing in the communication information of specified format and the described user terminal between the information of the Subscriber Identity Module of current insertion, the current location information of described user terminal, described user terminal and other terminal.
Further, processing unit 503, the information that is used for the second designated user identification card that sets in advance stored according to the non-volatile subregion of described user terminal, when described user terminal receives the calling of the terminal that described the second designated user identification card is positioned at, automatic call establishment; Perhaps
Delete the data of the specified type of storing in the described user terminal; Perhaps
Trigger described user terminal and play alarm sound; Perhaps
Lock the communication function of described user terminal.
Further, above-mentioned user terminal also comprises:
Function setting unit 504 is used for setting in advance at the non-volatile subregion of described user terminal in the following way the information of the first designated user identification card:
When arranging first, obtain the password that the user arranges, and the password that the user is arranged is stored in the non-volatile subregion of described user terminal; And according to the information of user input indication is set, with the information of the Subscriber Identity Module of the current insertion of the described user terminal information as the first designated user identification card, store in the non-volatile subregion of described user terminal; And according to the function on indication of user input, start and determine whether stolen function of described user terminal;
When arranging first, obtain the password of user's input when non-; When the password of storing in the non-volatile subregion of the password of user input and described user terminal was consistent, according to the functional shielding indication of user's input, whether the definite described user terminal of shielding stolen function; Information according to user input arranges indication, with the information of the Subscriber Identity Module of the current insertion of the described user terminal information as the first designated user identification card, stores in the non-volatile subregion of described user terminal; And according to the function on indication of user input, start and determine whether stolen function of described user terminal.
The function of above-mentioned each unit can corresponding to the respective handling step of Fig. 1 to the flow process shown in Figure 4, not repeat them here.
In sum, the scheme that the embodiment of the invention provides comprises: whether the information of the first designated user identification card that sets in advance of storing in the information that detects the Subscriber Identity Module of current insertion in the user terminal and the non-volatile subregion of user terminal is consistent; And when inconsistent, determine that this user terminal is stolen, when consistent, determine that this user terminal is not stolen.The scheme that adopts the embodiment of the invention to provide is so that after user terminal is stolen, can't cause the user terminal anti-theft feature to lose efficacy by the mode of deletion information.
The user terminal that the application's embodiment provides can be realized by computer program.Those skilled in the art should be understood that; above-mentioned Module Division mode only is a kind of in numerous Module Division modes; if be divided into other modules or do not divide module, as long as user terminal has above-mentioned functions, all should be within the application's protection range.
The application is that reference is described according to flow chart and/or the block diagram of method, equipment (system) and the computer program of the embodiment of the present application.Should understand can be by the flow process in each flow process in computer program instructions realization flow figure and/or the block diagram and/or square frame and flow chart and/or the block diagram and/or the combination of square frame.Can provide these computer program instructions to the processor of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing device producing a machine, so that the instruction of carrying out by the processor of computer or other programmable data processing device produces the device of the function that is used for being implemented in flow process of flow chart or a plurality of flow process and/or square frame of block diagram or a plurality of square frame appointments.
These computer program instructions also can be stored in energy vectoring computer or the computer-readable memory of other programmable data processing device with ad hoc fashion work, so that the instruction that is stored in this computer-readable memory produces the manufacture that comprises command device, this command device is implemented in the function of appointment in flow process of flow chart or a plurality of flow process and/or square frame of block diagram or a plurality of square frame.
These computer program instructions also can be loaded on computer or other programmable data processing device, so that carry out the sequence of operations step producing computer implemented processing at computer or other programmable devices, thereby be provided for being implemented in the step of the function of appointment in flow process of flow chart or a plurality of flow process and/or square frame of block diagram or a plurality of square frame in the instruction that computer or other programmable devices are carried out.
Obviously, those skilled in the art can carry out various changes and modification to the present invention and not break away from the spirit and scope of the present invention.Like this, if of the present invention these are revised and modification belongs within the scope of claim of the present invention and equivalent technologies thereof, then the present invention also is intended to comprise these changes and modification interior.

Claims (10)

1. a method that detects user terminal is characterized in that, comprising:
Detect the information of the Subscriber Identity Module of current insertion in the user terminal, whether consistent with the information of the first designated user identification card that sets in advance of storing in the non-volatile subregion of described user terminal;
When the information inconsistency of the information of the Subscriber Identity Module that detects described current insertion and described the first designated user identification card, determine that described user terminal is stolen;
When the information of the information of the Subscriber Identity Module that detects described current insertion and described the first designated user identification card is consistent, determine that described user terminal is not stolen.
2. the method for claim 1 is characterized in that, after definite described user terminal is stolen, also comprises:
Carry out the antitheft processing operation of described user terminal.
3. method as claimed in claim 2 is characterized in that, carries out the antitheft processing operation of described user terminal, comprising:
The information of the second designated user identification card that sets in advance of storing in the non-volatile subregion according to described user terminal is sent to the terminal that described the second designated user identification card is positioned at one of following at least information:
Satisfy the data of the specified type of storing in the communication information of specified format and the described user terminal between the information of the Subscriber Identity Module of current insertion, the current location information of described user terminal, described user terminal and other terminal.
4. method as claimed in claim 2 is characterized in that, carries out the antitheft processing operation of described user terminal, comprising:
The information of the second designated user identification card that sets in advance of storing in the non-volatile subregion according to described user terminal, when described user terminal receives the calling of the terminal that described the second designated user identification card is positioned at, automatic call establishment; Perhaps
Delete the data of the specified type of storing in the described user terminal; Perhaps
Trigger described user terminal and play alarm sound; Perhaps
Lock the communication function of described user terminal.
5. such as the arbitrary described method of claim 1-4, it is characterized in that, in the non-volatile subregion of described user terminal, set in advance in the following way the information of the first designated user identification card:
When arranging first, obtain the password that the user arranges, and the password that the user is arranged is stored in the non-volatile subregion of described user terminal; And according to the information of user input indication is set, with the information of the Subscriber Identity Module of the current insertion of the described user terminal information as the first designated user identification card, store in the non-volatile subregion of described user terminal; And according to the function on indication of user input, start and determine whether stolen function of described user terminal;
When arranging first, obtain the password of user's input when non-; When the password of storing in the non-volatile subregion of the password of user input and described user terminal was consistent, according to the functional shielding indication of user's input, whether the definite described user terminal of shielding stolen function; Information according to user input arranges indication, with the information of the Subscriber Identity Module of the current insertion of the described user terminal information as the first designated user identification card, stores in the non-volatile subregion of described user terminal; And according to the function on indication of user input, start and determine whether stolen function of described user terminal.
6. a user terminal is characterized in that, comprising:
Detecting unit, for detection of the information of the Subscriber Identity Module of current insertion in the user terminal, whether consistent with the information of the first designated user identification card that sets in advance of storing in the non-volatile subregion of described user terminal;
Determining unit when being used for the information inconsistency when the information of the Subscriber Identity Module that detects described current insertion and described the first designated user identification card, determines that described user terminal is stolen; And when the information of the information of the Subscriber Identity Module that detects described current insertion and described the first designated user identification card is consistent, determine that described user terminal is not stolen.
7. user terminal as claimed in claim 6 is characterized in that, also comprises:
Processing unit is used for after described determining unit determines that described user terminal is stolen, carries out the antitheft processing operation of described user terminal.
8. user terminal as claimed in claim 7, it is characterized in that, described processing unit, information for the second designated user identification card that sets in advance of storing according to the non-volatile subregion of described user terminal is sent to the terminal that described the second designated user identification card is positioned at one of following at least information:
Satisfy the data of the specified type of storing in the communication information of specified format and the described user terminal between the information of the Subscriber Identity Module of current insertion, the current location information of described user terminal, described user terminal and other terminal.
9. user terminal as claimed in claim 7, it is characterized in that, described processing unit, information for the second designated user identification card that sets in advance of storing according to the non-volatile subregion of described user terminal, when described user terminal receives the calling of the terminal that described the second designated user identification card is positioned at, automatic call establishment; Perhaps
Delete the data of the specified type of storing in the described user terminal; Perhaps
Trigger described user terminal and play alarm sound; Perhaps
Lock the communication function of described user terminal.
10. such as the arbitrary described user terminal of claim 6-9, it is characterized in that, also comprise:
Function setting unit is used for setting in advance at the non-volatile subregion of described user terminal in the following way the information of the first designated user identification card:
When arranging first, obtain the password that the user arranges, and the password that the user is arranged is stored in the non-volatile subregion of described user terminal; And according to the information of user input indication is set, with the information of the Subscriber Identity Module of the current insertion of the described user terminal information as the first designated user identification card, store in the non-volatile subregion of described user terminal; And according to the function on indication of user input, start and determine whether stolen function of described user terminal;
When arranging first, obtain the password of user's input when non-; When the password of storing in the non-volatile subregion of the password of user input and described user terminal was consistent, according to the functional shielding indication of user's input, whether the definite described user terminal of shielding stolen function; Information according to user input arranges indication, with the information of the Subscriber Identity Module of the current insertion of the described user terminal information as the first designated user identification card, stores in the non-volatile subregion of described user terminal; And according to the function on indication of user input, start and determine whether stolen function of described user terminal.
CN201210461493XA 2012-11-15 2012-11-15 Method for detecting user terminal and user terminal Pending CN102946482A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210461493XA CN102946482A (en) 2012-11-15 2012-11-15 Method for detecting user terminal and user terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210461493XA CN102946482A (en) 2012-11-15 2012-11-15 Method for detecting user terminal and user terminal

Publications (1)

Publication Number Publication Date
CN102946482A true CN102946482A (en) 2013-02-27

Family

ID=47729387

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210461493XA Pending CN102946482A (en) 2012-11-15 2012-11-15 Method for detecting user terminal and user terminal

Country Status (1)

Country Link
CN (1) CN102946482A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104134025A (en) * 2014-07-29 2014-11-05 深圳市中兴移动通信有限公司 Mobile terminal locking method and device based on SIM cards and mobile terminal
CN105141736A (en) * 2015-09-22 2015-12-09 广东欧珀移动通信有限公司 Information security protection method and apparatus
CN105260667A (en) * 2015-10-08 2016-01-20 青岛海信移动通信技术股份有限公司 Mobile terminal information confidential method and mobile terminal
CN105335677A (en) * 2014-07-24 2016-02-17 小米科技有限责任公司 Anti-theft method and device of mobile terminal
WO2016177097A1 (en) * 2015-08-18 2016-11-10 中兴通讯股份有限公司 Method and device for maintaining information security of mobile terminal, and storage medium
CN106506763A (en) * 2016-09-26 2017-03-15 广东小天才科技有限公司 Test control method and device of mobile terminal and mobile terminal
CN108717377A (en) * 2018-03-27 2018-10-30 广州视源电子科技股份有限公司 Method and device for controlling event operation, terminal equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101252703A (en) * 2008-03-28 2008-08-27 宇龙计算机通信科技(深圳)有限公司 Terminal data protecting method, system as well as mobile communication terminal
CN101459721A (en) * 2007-12-11 2009-06-17 上海晨兴电子科技有限公司 Method and device for anti-theft tracking of mobile phone
US20090270126A1 (en) * 2008-04-24 2009-10-29 Hon Hai Precision Industry Co., Ltd. Mobile terminal having anti-theft function and anti-theft method
CN102256027A (en) * 2010-05-20 2011-11-23 英华达(上海)电子有限公司 Alarming method and alarming terminal
CN102378411A (en) * 2010-08-26 2012-03-14 乐金电子(中国)研究开发中心有限公司 Method for realizing retrieving function based on mobile terminal and mobile terminal
CN102694920A (en) * 2012-05-28 2012-09-26 广东欧珀移动通信有限公司 Mobile phone antitheft method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101459721A (en) * 2007-12-11 2009-06-17 上海晨兴电子科技有限公司 Method and device for anti-theft tracking of mobile phone
CN101252703A (en) * 2008-03-28 2008-08-27 宇龙计算机通信科技(深圳)有限公司 Terminal data protecting method, system as well as mobile communication terminal
US20090270126A1 (en) * 2008-04-24 2009-10-29 Hon Hai Precision Industry Co., Ltd. Mobile terminal having anti-theft function and anti-theft method
CN102256027A (en) * 2010-05-20 2011-11-23 英华达(上海)电子有限公司 Alarming method and alarming terminal
CN102378411A (en) * 2010-08-26 2012-03-14 乐金电子(中国)研究开发中心有限公司 Method for realizing retrieving function based on mobile terminal and mobile terminal
CN102694920A (en) * 2012-05-28 2012-09-26 广东欧珀移动通信有限公司 Mobile phone antitheft method

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105335677A (en) * 2014-07-24 2016-02-17 小米科技有限责任公司 Anti-theft method and device of mobile terminal
CN104134025A (en) * 2014-07-29 2014-11-05 深圳市中兴移动通信有限公司 Mobile terminal locking method and device based on SIM cards and mobile terminal
CN104134025B (en) * 2014-07-29 2019-02-15 努比亚技术有限公司 Mobile terminal locking method, device and mobile terminal based on SIM card
WO2016177097A1 (en) * 2015-08-18 2016-11-10 中兴通讯股份有限公司 Method and device for maintaining information security of mobile terminal, and storage medium
CN105141736A (en) * 2015-09-22 2015-12-09 广东欧珀移动通信有限公司 Information security protection method and apparatus
CN105260667A (en) * 2015-10-08 2016-01-20 青岛海信移动通信技术股份有限公司 Mobile terminal information confidential method and mobile terminal
CN106506763A (en) * 2016-09-26 2017-03-15 广东小天才科技有限公司 Test control method and device of mobile terminal and mobile terminal
CN106506763B (en) * 2016-09-26 2019-04-30 广东小天才科技有限公司 Test control method and device of mobile terminal and mobile terminal
CN108717377A (en) * 2018-03-27 2018-10-30 广州视源电子科技股份有限公司 Method and device for controlling event operation, terminal equipment and storage medium

Similar Documents

Publication Publication Date Title
CN102946482A (en) Method for detecting user terminal and user terminal
US9301143B2 (en) Mobile terminal and method of providing security thereto
EP3113131B1 (en) Method and device for providing object finding information
CN105389507B (en) The method and device of monitoring system partitioned file
KR101678038B1 (en) Method, apparatus, program, and recording medium for automatically connecting wireless network
CN113110852A (en) Firmware upgrading method and device and storage medium
EP3229136B1 (en) Application calling management methods and apparatuses
CN103220637A (en) Mobile phone anti-theft protection method and mobile phone anti-theft protection device
CN103218564A (en) Mobile terminal protection method and mobile terminal protection device
CN104348959A (en) Mobile terminal alarm method and device
CN104601818A (en) Method and device for switching operating systems in communication process
CN104427468A (en) Automatic alarming method and device of mobile terminal
WO2015154452A1 (en) Method and terminal for remotely querying information about contact person
WO2017097258A1 (en) Spam blocking method and apparatus, computer program, and readable medium
CN108737655B (en) Picture processing method and related device
WO2014181479A1 (en) Management device
CN111209559B (en) Permission processing method and device of application program, storage medium and electronic equipment
CN104796531A (en) Method and system for protecting information privacy
CN103458394A (en) Mobile terminal, processing method and processing device for internal information of mobile terminal
CN104780530A (en) A method and a terminal for protecting user data
CN111858182B (en) Data reading method and device, storage medium and mobile terminal
CN108959955B (en) File processing method and device
CN106022162A (en) Private information protection method and system suitable for communication terminal
CN112100612A (en) Terminal authority protection method and device and terminal
CN106664557B (en) Control method of mobile terminal and mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C53 Correction of patent of invention or patent application
CB02 Change of applicant information

Address after: 100085 Beijing city Haidian District Qinghe Street No. 68 Huarun colorful city shopping center two floor 13

Applicant after: Xiaomi Technology Co., Ltd.

Address before: 100102, No. 50, block A, building No. 12, winding stone world building, Wangjing West Road, Beijing, Chaoyang District

Applicant before: Beijing Xiaomi Technology Co., Ltd.

C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20130227