CN103581441B - Mobile terminal follows the trail of burglary-resisting system and method - Google Patents

Mobile terminal follows the trail of burglary-resisting system and method Download PDF

Info

Publication number
CN103581441B
CN103581441B CN201310533416.5A CN201310533416A CN103581441B CN 103581441 B CN103581441 B CN 103581441B CN 201310533416 A CN201310533416 A CN 201310533416A CN 103581441 B CN103581441 B CN 103581441B
Authority
CN
China
Prior art keywords
mobile terminal
trail
information
note
sim card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310533416.5A
Other languages
Chinese (zh)
Other versions
CN103581441A (en
Inventor
徐华
吴卫荣
李振宇
马德强
金辉
陈正中
王非
吴瑜
宋永华
史劲
舒张智
杨珍琪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CETC 15 Research Institute
Original Assignee
CETC 15 Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CETC 15 Research Institute filed Critical CETC 15 Research Institute
Priority to CN201310533416.5A priority Critical patent/CN103581441B/en
Publication of CN103581441A publication Critical patent/CN103581441A/en
Application granted granted Critical
Publication of CN103581441B publication Critical patent/CN103581441B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a kind of mobile terminal and follow the trail of burglary-resisting system and method, the method comprises: if mobile terminal follows the trail of the lost terminal report information that burglary-resisting system is sent to user by preassigned channel reception, then therefrom obtain user profile, and search SIM card number corresponding with user profile in the local log-on message stored, send according to the SIM card number determined and follow the trail of security note; If mobile terminal follows the trail of the stolen alarm message that burglary-resisting system receives mobile terminal transmission, then obtain No. MEID of the mobile terminal sending stolen alarm message, and after being stored in log-on message at No. MEID that confirms to obtain, the transmit leg to stolen alarm message returns follows the trail of security note; Wherein, stolen alarm message sends after mobile terminal detects to change SIM card.Technical scheme of the present invention can the antitheft operation of trigger trace neatly, the risk that the personal information reducing user is revealed.

Description

Mobile terminal follows the trail of burglary-resisting system and method
Technical field
The present invention relates to mobile terminal technology, particularly relate to a kind of mobile terminal and follow the trail of burglary-resisting system and method.
Background technology
Along with development and the growth in the living standard of science and technology, the user of the intelligentized mobile terminal such as smart mobile phone, panel computer is used to get more and more.
User, in routine work, life, can be carried out audio/video communication, transmitting-receiving note and mail, the micro-letter of transmitting-receiving, be taken pictures and video, mobile payment and Investment & Financing etc. by mobile terminal.Accordingly, user stores a large amount of personal informations in the terminal, such as, and contact person, message registration, note, mail, micro-letter, photo, video and account password etc.Once mobile terminal loss or stolen, probably cause the personal information of user to be revealed, thus give user and bring loss with user-dependent third party.Therefore, be necessary that tracking is carried out to mobile terminal antitheft.
At present, existing mobile terminal follows the trail of theft preventing method, as shown in Figure 1, generally includes following steps:
S101: if mobile terminal detects SIM(Subscriber Identity Module, client identification module) card replacement, then determine whether this mobile terminal is illegally used, and if so, then performs S102, if not, then process ends.
In this step, in mobile terminal, preassembled antitheft software automatically starts after mobile terminal-opening, obtain the identification code of current SIM card, and whether the identification code judging current SIM card is identical with the identification code of the SIM card prestored, if identical, then determine that this mobile terminal is by legal use, process ends; If different, then according to the password of user's input, determine whether this mobile terminal is illegally used.
The password that antitheft software inputs according to active user, determine whether this mobile terminal is illegally used to be specially: antitheft software display interface for password input, the password of user's input is received by this interface, and judge that whether the password received is identical with the password prestored, if identical, then determine that this mobile terminal is by legal use, antitheft software the identification code of the SIM card prestored is replaced with current SIM card identification code and after storing, process ends; If different, then determine that this mobile terminal is illegally used, perform step S102.
In this step, the identification code of the SIM card prestored is that antitheft software obtains when initiating switchup and stores, or detecting that SIM card the last time of this mobile terminal obtains and stores when changing; The password prestored is the user's input when initiating switchup of antitheft software, or user's the last time amendment.
S102: mobile terminal sends the mobile terminal of stolen alarm message to the communicating number of safety.
In this step, the antitheft software in mobile terminal, according to the communicating number of the safety that user presets, is sent to the mobile terminal of this communicating number by stolen alarm message.
S103: the mobile terminal of the communicating number of safety returns to mobile terminal follows the trail of security note.
Particularly, preassembled existing theftproof system of mobile terminal in the mobile terminal of the communicating number of safety, obtain the current SIM card number (SIM card number herein specifically refers to the communicating number of such as cell-phone number) of the transmit leg of stolen alarm message, according to the current SIM card number obtained, return carrying the tracking security note of following the trail of antitheft operation information to the mobile terminal as stolen alarm message transmit leg.
The antitheft operation information of tracking in this step can be specifically, location indication information, locking indication information, audible alarm indication information and the indication information etc. that clears data.
S104: mobile terminal carries out following the trail of antitheft operation according to the tracking security note received.
In this step, as the antitheft software in the mobile terminal of stolen alarm message transmit leg, parsing after following the trail of antitheft operation information from the tracking security note received, carrying out following the trail of antitheft operation accordingly to this mobile terminal according to parsing the antitheft operation information of tracking.
The antitheft operation of tracking in this step can be specifically, return the current GPS(Global Positioning System of mobile terminal, global positioning system) position that coordinate is corresponding, locking mobile terminal screen and power key, mobile terminal is sounded the alarm or removes the particular data (such as, address list, message registration, note, photo, account password) etc. in mobile terminal.
The present inventor finds, the mobile terminal of prior art follows the trail of theft preventing method needs SIM card to be in the terminal replaced the antitheft operation of rear trigger trace, if SIM card is not replaced, cannot the antitheft operation of trigger trace, then before user reports the loss SIM card, the personal information of the user stored in mobile terminal still faces very high disclosure risk.
In sum, the fail safe of the protection user personal information of the mobile terminal tracking theft preventing method of prior art is not high enough.Therefore, be necessary for vast mobile phone users, provide a kind of more flexible, safe mobile terminal to follow the trail of theft preventing method and system.
Summary of the invention
Embodiments provide a kind of mobile terminal and follow the trail of burglary-resisting system and method, in order to make to follow the trail of antitheft more flexible to mobile terminal, the risk that the personal information reducing the user in stolen mobile terminal is further revealed.
According to an aspect of the present invention, provide a kind of mobile terminal and follow the trail of theft preventing method, comprise: if mobile terminal follows the trail of the lost terminal report information that burglary-resisting system is sent to user by preassigned channel reception, then therefrom obtain user profile, and search SIM card number corresponding with described user profile in the local log-on message stored, send according to the SIM card number determined and follow the trail of security note;
If described mobile terminal follows the trail of the stolen alarm message that burglary-resisting system receives mobile terminal transmission, then obtain No. MEID of the mobile terminal sending described stolen alarm message, and after being stored in described log-on message at No. MEID that confirms to obtain, the transmit leg to described stolen alarm message returns described tracking security note;
Wherein, described stolen alarm message detects to change after SIM card at described mobile terminal and sends, and described tracking security note is that mobile terminal for controlling to receive described control note carries out following the trail of antitheft operation accordingly.
Further, described search SIM card number corresponding with described user profile in the local log-on message stored before, also comprise:
Described mobile terminal is followed the trail of after burglary-resisting system receives the registration information that user sends, by carry in described registration information, in log-on message that the user profile that inputted by described user, SIM card corresponding record store to this locality.
Preferably, described preassigned channel is specially special Internet channel, or special phone channel.
Preferably, described preassigned channel is specially preassigned email mailbox; And, described in the user profile be recorded in the local log-on message stored comprise E-mail address title; And
Described mobile terminal follows the trail of the lost terminal report information that burglary-resisting system is sent to user by preassigned channel reception, then therefrom obtain user profile, specifically comprise:
Described mobile terminal tracking burglary-resisting system receives the lost terminal report information of user's transmission by preassigned email mailbox after, obtain the E-mail address title of the transmit leg of described lost terminal report information.
Further, also comprise in described lost terminal report information: follow the trail of antitheft operation customized information; And
Before the SIM card number transmission tracking security note that described basis is determined, also comprise:
If described mobile terminal follows the trail of burglary-resisting system determine that the antitheft operation customized information of tracking in described lost terminal report information is specially location indication information, then determine that tracking security note to be sent is specially customization instruction and controls note; Described customization instruction controls note and returns current GPS location in order to the mobile terminal controlling to receive this note;
If described mobile terminal follows the trail of burglary-resisting system determine that the antitheft operation customized information of tracking in described lost terminal report information is specially data destroying indication information, then determine that tracking security note to be sent is specially data destroying and controls note; Described data destroying controls note and carries out data deletion in order to the mobile terminal controlling to receive this note;
If described mobile terminal follows the trail of burglary-resisting system determine that the tracking antitheft operation customized information in described lost terminal report information is specially comprehensive indication information, then determine that tracking security note to be sent specifically comprises customization instruction and controls note and data destroying control note; And
The SIM card number that described basis is determined sends tracking security note and is specially:
Described mobile terminal follows the trail of burglary-resisting system according to the SIM card number determined, the tracking security note to be sent determined is sent.
According to another aspect of the present invention, additionally provide a kind of mobile terminal and follow the trail of burglary-resisting system, comprise: information receiving module, if the lost terminal report information for being sent to user by preassigned channel reception, then outlet terminal loses report information process notice; If receive stolen alarm message, then export stolen alarm message process notice;
Lost terminal report information processing module, after the lost terminal report information process exported for receiving described information receiving module notifies, lost terminal report information is obtained from described information receiving module, and after therefrom obtaining user profile, search SIM card number corresponding with described user profile in the local log-on message stored, send according to the SIM card number determined and follow the trail of security note;
Stolen alarm message processing module, after the stolen alarm message process exported in order to receive described information receiving module notifies, stolen alarm message is obtained from described information receiving module, and obtain No. MEID of the mobile terminal sending described stolen alarm message, after being stored in described log-on message at No. MEID that confirms to obtain, the transmit leg to described stolen alarm message returns described tracking security note.
Further, described mobile terminal follows the trail of burglary-resisting system, also comprise: Registering modules, after receiving registration information that user sends, by carry in described registration information, in log-on message that the user profile that inputted by described user, SIM card corresponding record store to this locality.
Preferably, described preassigned channel is specially special Internet channel, or special phone channel.
Preferably, described preassigned channel is specially preassigned email mailbox; And, described in the user profile be recorded in the local log-on message stored comprise E-mail address title; And
After described lost terminal report information processing module notifies specifically for the lost terminal report information process receiving the output of described information receiving module, obtain lost terminal report information from described information receiving module, and obtain the E-mail address title of the transmit leg of described lost terminal report information; Search SIM card number corresponding with the user profile comprising this E-mail address title in the local log-on message stored, send according to the SIM card number determined and follow the trail of security note.
Further, also comprise in described lost terminal report information: follow the trail of antitheft operation customized information; And
If described lost terminal report information processing module is also for determining that the antitheft operation customized information of tracking in described lost terminal report information is specially location indication information, then determine that tracking security note to be sent is specially customization instruction and controls note; If determine, the antitheft operation customized information of tracking in described lost terminal report information is specially data destroying indication information, then determine that tracking security note to be sent is specially data destroying and controls note; If determine, the tracking antitheft operation customized information in described lost terminal report information is specially comprehensive indication information, then determine that tracking security note to be sent specifically comprises customization instruction and controls note and data destroying control note.
In the technical scheme of the embodiment of the present invention, mobile terminal follows the trail of burglary-resisting system, for the mobile terminal that SIM card is not replaced, can determine SIM card number corresponding with user profile in lost terminal report information in log-on message, the antitheft operation of trigger trace; For the mobile terminal that SIM card is replaced, can according to the SIM card number of the transmit leg of stolen alarm message, the antitheft operation of trigger trace; Enhance mobile terminal tracking burglary-resisting system to carry out following the trail of antitheft flexibility to mobile terminal, and the risk that the personal information reducing user in stolen mobile terminal is revealed.
Further, by carrying out certification to the MEID of mobile terminal in the user profile in lost terminal report information or stolen alarm message, make the mobile terminal outside log-on message coverage that this mobile terminal tracing system cannot be utilized to trigger the antitheft operation of corresponding tracking, enhance the fail safe of mobile terminal tracing system.
Accompanying drawing explanation
Fig. 1 is the signalling diagram of the mobile terminal tracking theft preventing method of prior art;
Fig. 2 is the signalling diagram that the mobile terminal before being replaced SIM card of the embodiment of the present invention carries out following the trail of theft preventing method;
Fig. 3 is the signalling diagram that the mobile terminal after being replaced SIM card of the embodiment of the present invention carries out following the trail of theft preventing method;
Fig. 4 is the internal truss frame structure schematic diagram of the mobile terminal tracking burglary-resisting system of the embodiment of the present invention.
Embodiment
For making object of the present invention, technical scheme and advantage clearly understand, enumerate preferred embodiment referring to accompanying drawing, the present invention is described in more detail.But it should be noted that, the many details listed in specification are only used to make reader to have a thorough understanding, even if do not have these specific details also can realize these aspects of the present invention to one or more aspect of the present invention.
The term such as " module " used in this application, " system " is intended to comprise the entity relevant to computer, such as but not limited to hardware, firmware, combination thereof, software or executory software.Such as, module can be, but be not limited in: the thread of the process that processor runs, processor, object, executable program, execution, program and/or computer.For example, application program computing equipment run and this computing equipment can be modules.One or more module can be positioned at an executory process and/or thread.
The present inventor considers, set up a mobile terminal and follow the trail of burglary-resisting system, the corresponding relation of the SIM card of user profile and mobile terminal number is prestored within the system, user profile is obtained the lost terminal report information that this system can send from user, and according to the SIM card number corresponding with the user profile obtained, send and follow the trail of security note.
Mobile terminal follows the trail of burglary-resisting system can also after SIM card be replaced in the terminal, the stolen alarm message that mobile terminal receive sends, and returns according to the current SIM card number of the transmit leg of stolen alarm message and follow the trail of security note.
Thus mobile terminal follows the trail of burglary-resisting system before SIM card is replaced in the terminal or afterwards, all can trigger the antitheft operation of the tracking of mobile terminal; This system is followed the trail of antitheft more flexible to mobile terminal, the risk of the personal information leakage of the user in the low stolen mobile terminal of a step-down of going forward side by side.
Technical scheme of the present invention is described in detail below in conjunction with accompanying drawing.Burglary-resisting system is followed the trail of by mobile terminal user, carry out mobile terminal follow the trail of antitheft before, can first mobile terminal follow the trail of burglary-resisting system register: administrative staff by mobile terminal follow the trail of burglary-resisting system administration interface input user registration information; Registration information can comprise: user profile, and the SIM card of the mobile terminal of user number, MEID(Mobile Equipment Identifier, mobile device identification code) number.User profile specifically can comprise: user logs in the contact method (such as, user's telephone number of specifying or E-mail address title) that mobile terminal follows the trail of the account of burglary-resisting system and password, user; Further, user profile can also comprise: address name, user affiliated unit.
Mobile terminal is followed the trail of after burglary-resisting system receives the registration information of user by administration interface, follows the trail of in the log-on message of burglary-resisting system by the SIM card of user profile wherein and mobile terminal number, MEID corresponding record to this mobile terminal; Namely the corresponding relation between the SIM card number of the user profile parsed and the mobile terminal parsed and No. MEID is set up.
The mobile terminal that the embodiment of the present invention provides is followed the trail of theft preventing method and is comprised: carry out following the trail of antitheft method and carrying out following the trail of antitheft method to the mobile terminal that SIM is replaced to the mobile terminal that SIM card is not replaced.
The mobile terminal that the embodiment of the present invention provides is followed the trail of in theft preventing method, carries out following the trail of antitheft method, as shown in Figure 2, can comprise the steps: the mobile terminal that SIM card is not replaced
S201: user follows the trail of burglary-resisting system transmitting terminal by preassigned channel to mobile terminal and loses report information.
In this step, user can follow the trail of burglary-resisting system transmitting terminal by special Internet channel to mobile terminal and lose report information; Such as, user follows the trail of burglary-resisting system by the mobile terminal of company's internal network visited company, inputs and submit lost terminal report information in the respective page that mobile terminal tracking burglary-resisting system provides.
User can follow the trail of burglary-resisting system transmitting terminal by special phone channel to mobile terminal and lose report information; Such as, user can follow the trail of by mobile terminal the telephone for special use that burglary-resisting system provides, and the administrative staff following the trail of burglary-resisting system to mobile terminal submit lost terminal report information to.
User can follow the trail of burglary-resisting system transmitting terminal by preassigned email mailbox to mobile terminal and lose report information.
Can comprise in lost terminal report information: user profile and the antitheft operation customized information of tracking; Follow the trail of antitheft operation customized information can comprise: location indication information, data destroying indication information or comprehensive indication information.
S202: after mobile terminal tracking burglary-resisting system parses user profile from the lost terminal report information received, search this mobile terminal and follow the trail of in the log-on message of burglary-resisting system whether store the user profile parsed, if having, then perform step 203; If nothing, then ignore this lost terminal report information.
In this step, after mobile terminal tracking burglary-resisting system parses user profile from the lost terminal report information received, certification is carried out to the user profile parsed:
If mobile terminal is followed the trail of in the log-on message that burglary-resisting system stores in this locality and found and the user profile parsed, then confirmation user information authentication passes through, and performs step 203; Such as, mobile terminal follows the trail of burglary-resisting system receives user's transmission lost terminal report information by preassigned email mailbox, obtain the E-mail address title of the transmit leg of lost terminal report information, if find the E-mail address title of acquisition in the log-on message that this locality stores, then confirm that the E-mail address name authentication as user profile passes through, and perform step 203.
If mobile terminal follows the trail of in the log-on message that burglary-resisting system stores in this locality the user profile of searching less than parsing, then confirmation user information authentication does not pass through, and ignores this lost terminal report information.
Mobile terminal tracing system is by carrying out certification to the user profile parsed, make the mobile terminal outside log-on message coverage that this mobile terminal tracing system cannot be utilized to trigger the antitheft operation of corresponding tracking, enhance the fail safe of mobile terminal tracing system.
S203: mobile terminal is followed the trail of burglary-resisting system and determined SIM card number corresponding with the user profile parsed in log-on message, and according to the SIM card number determined, send and follow the trail of security note.
In this step, mobile terminal is followed the trail of burglary-resisting system and is determined by SIM card number corresponding to the user profile of certification from log-on message, and from the lost terminal report information received, parse the antitheft operation customized information of tracking; If the antitheft operation customized information of the tracking parsed is specially location indication information, then determine that tracking security note to be sent is specially location instruction and controls note; If the antitheft operation customized information of the tracking parsed is specially data destroying indication information, then determine that tracking security note to be sent is specially data destroying and controls note; If the tracking parsed antitheft operation customized information is specially comprehensive indication information, then determine that tracking security note to be sent specifically comprises location instruction and controls note and data destroying control note.
Afterwards, mobile terminal follows the trail of burglary-resisting system according to the SIM card number determined, sends carry the tracking security note of following the trail of antitheft operation customized information to mobile terminal.
S204: mobile terminal carries out following the trail of antitheft operation accordingly according to the tracking security note received.
Particularly, the antitheft software in mobile terminal carries out following the trail of antitheft operation accordingly to this mobile terminal according to the antitheft operation customized information of the tracking parsed after parsing from the tracking security note received and following the trail of antitheft operation customized information:
If the antitheft operation customized information of the tracking that the antitheft software certification in mobile terminal parses is location indication information, then confirm that receiving location instruction controls note, obtain current GPS location, and the information of this GPS location is returned to mobile terminal tracking burglary-resisting system.
If the antitheft operation customized information of the tracking that the antitheft software certification in mobile terminal parses is data destroying indication information, then confirm that receiving data destroying controls note, delete the data (such as, address list, message registration, note, photo, account password etc.) in this mobile terminal.
If the tracking antitheft operation customized information that the antitheft software certification in mobile terminal parses is comprehensive indication information, then confirm that receiving location instruction controls note and data destroying control note, the information of the current GPS location obtained is followed the trail of burglary-resisting system to mobile terminal return, and delete the data in this mobile terminal.
In above-mentioned steps S201 to S204, after mobile terminal tracking burglary-resisting system parses user profile from the lost terminal report information that user sends, the SIM card number corresponding with this user profile can be determined in the log-on message prestored, send according to the SIM card number determined and follow the trail of security note, make the mobile terminal not changing SIM card carry out following the trail of antitheft operation according to the control note received.
The mobile terminal that the embodiment of the present invention provides is followed the trail of in theft preventing method, carries out following the trail of antitheft method, as shown in Figure 3, can comprise the steps: the mobile terminal that SIM card is replaced
S301: if mobile terminal detects that SIM card is changed, then whether the identification code judging current SIM card is identical with the identification code of the SIM card prestored, if identical, then ignore this SIM card and changes, if different, then perform step S302.
In this step, in mobile terminal, preassembled antitheft software automatically starts after mobile terminal-opening, obtain the identification code of current SIM card, and whether the identification code judging current SIM card is identical with the identification code of the SIM card prestored, if identical, then determine that this mobile terminal is by legal use, ignore this SIM card and change; If different, then perform step S302.
In this step, the identification code of the SIM card prestored is that antitheft software obtains when initiating switchup and stores, or detecting that SIM card the last time of this mobile terminal obtains and stores when changing.
S302: the password that mobile terminal inputs according to user, judges whether this mobile terminal is illegally used, and if so, then performs step S303; If not, then the password prestored is upgraded.
Particularly, antitheft software display interface for password input in mobile terminal, the password of user's input is received by this interface, and judge that whether the password received is identical with the password prestored, if identical, then determine that this mobile terminal is by legal use, the identification code of the SIM card prestored is replaced with the identification code of current SIM card and stores by antitheft software; If different, then determine that this mobile terminal is illegally used, perform step S303.
In this step, the password prestored is the user's input when initiating switchup of antitheft software, or user's the last time amendment.
S303: mobile terminal sends stolen alarm message to mobile terminal tracing system.
In this step, the antitheft software in mobile terminal will carry the stolen alarm message of No. MEID of this mobile terminal, be sent to mobile terminal tracing system.
S304: after mobile terminal tracing system parses No. MEID, mobile terminal from the stolen alarm message received, searches this mobile terminal and follows the trail of in the log-on message of burglary-resisting system whether store No. MEID that parses, if having, then performs step S305; If nothing, then ignore this stolen alarm message.
Particularly, mobile terminal tracing system carries out certification to No. MEID of parsing parse No. MEID of mobile terminal from the stolen alarm message received after:
If find No. MEID that parses in the log-on message that mobile terminal tracing system stores in this locality, then confirm that the MEID certification parsed is passed through, and perform step S305; Obtaining the SIM card number of the transmit leg of stolen alarm message, according to the SIM card number obtained, returning carrying the tracking security note of following the trail of antitheft operation customized information to mobile terminal.
If search No. MEID less than parsing in the log-on message that mobile terminal tracing system stores in this locality, then confirm that the MEID certification parsed is not passed through, ignore the stolen alarm message of reception.
Mobile terminal tracing system, by carrying out certification to No. MEID that parses, makes the mobile terminal outside log-on message coverage that this mobile terminal tracing system cannot be utilized to trigger the antitheft operation of corresponding tracking, enhances the fail safe of mobile terminal tracing system.
S305: mobile terminal follows the trail of the SIM card number that burglary-resisting system obtains the transmit leg of stolen alarm message, and according to the SIM card number obtained, send and follow the trail of security note.
In this step, mobile terminal follows the trail of the SIM card number that burglary-resisting system obtains the transmit leg of stolen alarm message, and according to the SIM card number obtained, sends carry the tracking security note of following the trail of antitheft operation customized information to mobile terminal.
The antitheft operation customized information of tracking in this step can be specifically, locates indication information, clear data indication information or comprehensive indication information.
S306: mobile terminal carries out following the trail of antitheft operation according to the tracking security note received.
In this step, after the antitheft software in mobile terminal parses and follows the trail of antitheft operation customized information from the tracking security note received, carry out following the trail of antitheft operation accordingly to this mobile terminal according to parsing the antitheft operation customized information of tracking.
The mobile terminal that the embodiment of the present invention provides follows the trail of the schematic diagram of the internal framework of burglary-resisting system, as shown in Figure 4, can comprise: information receiving module 401, lost terminal report information processing module 402 and stolen alarm message processing module 403.
If the lost terminal report information of information receiving module 401 for being sent to user by preassigned channel reception, then outlet terminal loses report information process notice; If receive stolen alarm message, then export stolen alarm message process notice.
After lost terminal report information processing module 402 notifies for the lost terminal report information process receiving information receiving module 401 output, lost terminal report information is obtained from information receiving module 401, and after therefrom obtaining user profile, search SIM card number corresponding with described user profile in the local log-on message stored, send according to the SIM card number determined and follow the trail of security note.If the user profile obtained is specially the E-mail address title of the transmit leg of lost terminal report information, then search SIM card number corresponding with the user profile comprising this E-mail address title in the local log-on message stored, send according to the SIM card number determined and follow the trail of security note.
If lost terminal report information processing module 402 is also for determining that the antitheft operation customized information of tracking in described lost terminal report information is specially location indication information, then determine that tracking security note to be sent is specially customization instruction and controls note; If determine, the antitheft operation customized information of tracking in described lost terminal report information is specially data destroying indication information, then determine that tracking security note to be sent is specially data destroying and controls note; If determine, the tracking antitheft operation customized information in described lost terminal report information is specially comprehensive indication information, then determine that tracking security note to be sent specifically comprises customization instruction and controls note and data destroying control note.
After stolen alarm message processing module 403 notifies in order to the stolen alarm message process receiving information receiving module 401 output, stolen alarm message is obtained from information receiving module 401, and obtain No. MEID of the mobile terminal sending described stolen alarm message, after being stored in local log-on message at No. MEID that confirms to obtain, the transmit leg to stolen alarm message returns follows the trail of security note.
In addition, the concrete purposes of information receiving module 401, lost terminal report information processing module 402 and stolen alarm message processing module 403, the mobile terminal that can provide with reference to the invention described above embodiment follows the trail of the particular content of step S201 ~ S204 and step S301 ~ S306 in theft preventing method.
Preferably, the mobile terminal that the embodiment of the present invention provides follows the trail of the schematic diagram of the internal framework of burglary-resisting system, as shown in Figure 4, can also comprise: Registering modules 404.
Registering modules 404 for after the registration information that receives user and send, by carry in this registration information, in log-on message that the user profile that inputted by user, SIM card corresponding record store to this locality.Particularly, the SIM card of the user profile in the registration information that user sent of Registering modules 404 and mobile terminal number, MEID corresponding record are followed the trail of in the log-on message of burglary-resisting system to this mobile terminal.
From the technical scheme of the embodiment of the present invention, mobile terminal follows the trail of burglary-resisting system, for the mobile terminal that SIM card is not replaced, can determine SIM card number corresponding with user profile in lost terminal report information in log-on message, the antitheft operation of trigger trace; For the mobile terminal that SIM card is replaced, can according to the SIM card number of the transmit leg of stolen alarm message, the antitheft operation of trigger trace; Enhance mobile terminal tracking burglary-resisting system to carry out following the trail of antitheft flexibility to mobile terminal, and the risk that the personal information reducing user in stolen mobile terminal is revealed.
Further, by carrying out certification to the MEID of mobile terminal in the user profile in lost terminal report information or stolen alarm message, make the mobile terminal outside log-on message coverage that this mobile terminal tracing system cannot be utilized to trigger the antitheft operation of corresponding tracking, enhance the fail safe of mobile terminal tracing system.
One of ordinary skill in the art will appreciate that all or part of step realized in above-described embodiment method is that the hardware that can carry out instruction relevant by program has come, this program can be stored in a computer read/write memory medium, as: ROM/RAM, magnetic disc, CD etc.
The above is only the preferred embodiment of the present invention; it should be pointed out that for those skilled in the art, under the premise without departing from the principles of the invention; can also make some improvements and modifications, these improvements and modifications also should be considered as protection scope of the present invention.

Claims (8)

1. mobile terminal follows the trail of a theft preventing method, it is characterized in that, comprising:
If mobile terminal follows the trail of the lost terminal report information that burglary-resisting system is sent to user by preassigned channel reception, then therefrom obtain user profile, and search SIM card number corresponding with described user profile in the local log-on message stored, send according to the SIM card number determined and follow the trail of security note;
If described mobile terminal follows the trail of the stolen alarm message that burglary-resisting system receives mobile terminal transmission, then obtain No. MEID of the mobile terminal sending described stolen alarm message, and after being stored in described log-on message at No. MEID that confirms to obtain, the transmit leg to described stolen alarm message returns described tracking security note;
Wherein, described stolen alarm message sends after described mobile terminal detects to change SIM card, also comprise in described lost terminal report information and follow the trail of antitheft operation customized information, and described tracking security note is that mobile terminal for controlling to receive described control note carries out following the trail of antitheft operation accordingly;
Before the SIM card number transmission tracking security note that described basis is determined, also comprise:
If described mobile terminal follows the trail of burglary-resisting system determine that the antitheft operation customized information of tracking in described lost terminal report information is specially location indication information, then determine that tracking security note to be sent is specially customization instruction and controls note; Described customization instruction controls note and returns current GPS location in order to the mobile terminal controlling to receive this note;
If described mobile terminal follows the trail of burglary-resisting system determine that the antitheft operation customized information of tracking in described lost terminal report information is specially data destroying indication information, then determine that tracking security note to be sent is specially data destroying and controls note; Described data destroying controls note and carries out data deletion in order to the mobile terminal controlling to receive this note;
If described mobile terminal follows the trail of burglary-resisting system determine that the tracking antitheft operation customized information in described lost terminal report information is specially comprehensive indication information, then determine that tracking security note to be sent specifically comprises customization instruction and controls note and data destroying control note; And
The SIM card number that described basis is determined sends tracking security note and is specially:
Described mobile terminal follows the trail of burglary-resisting system according to the SIM card number determined, the tracking security note to be sent determined is sent.
2. the method for claim 1, is characterized in that, described search SIM card number corresponding with described user profile in the local log-on message stored before, also comprise:
Described mobile terminal is followed the trail of after burglary-resisting system receives the registration information that user sends, by carry in described registration information, in log-on message that the user profile that inputted by described user, SIM card corresponding record store to this locality.
3. method as claimed in claim 2, it is characterized in that, described preassigned channel is specially special Internet channel, or special phone channel.
4. method as claimed in claim 2, it is characterized in that, described preassigned channel is specially preassigned email mailbox; And, described in the user profile be recorded in the local log-on message stored comprise E-mail address title; And
Described mobile terminal follows the trail of the lost terminal report information that burglary-resisting system is sent to user by preassigned channel reception, then therefrom obtain user profile, specifically comprise:
Described mobile terminal tracking burglary-resisting system receives the lost terminal report information of user's transmission by preassigned email mailbox after, obtain the E-mail address title of the transmit leg of described lost terminal report information.
5. mobile terminal follows the trail of a burglary-resisting system, it is characterized in that, comprising:
Information receiving module, if the lost terminal report information for being sent to user by preassigned channel reception, then outlet terminal loses report information process notice; If receive stolen alarm message, then export stolen alarm message process notice; Also comprise in described lost terminal report information: follow the trail of antitheft operation customized information;
Lost terminal report information processing module, after the lost terminal report information process exported for receiving described information receiving module notifies, lost terminal report information is obtained from described information receiving module, and after therefrom obtaining user profile, search SIM card number corresponding with described user profile in the local log-on message stored, send according to the SIM card number determined and follow the trail of security note; If described lost terminal report information processing module is also for determining that the antitheft operation customized information of tracking in described lost terminal report information is specially location indication information, then determine that tracking security note to be sent is specially customization instruction and controls note; If determine, the antitheft operation customized information of tracking in described lost terminal report information is specially data destroying indication information, then determine that tracking security note to be sent is specially data destroying and controls note; If determine, the tracking antitheft operation customized information in described lost terminal report information is specially comprehensive indication information, then determine that tracking security note to be sent specifically comprises customization instruction and controls note and data destroying control note;
Stolen alarm message processing module, after the stolen alarm message process exported in order to receive described information receiving module notifies, stolen alarm message is obtained from described information receiving module, and obtain No. MEID of the mobile terminal sending described stolen alarm message, after being stored in described log-on message at No. MEID that confirms to obtain, the transmit leg to described stolen alarm message returns described tracking security note.
6. system as claimed in claim 5, is characterized in that, also comprise:
Registering modules, after receiving registration information that user sends, by carry in described registration information, in log-on message that the user profile that inputted by described user, SIM card corresponding record store to this locality.
7. system as claimed in claim 6, it is characterized in that, described preassigned channel is specially special Internet channel, or special phone channel.
8. system as claimed in claim 6, it is characterized in that, described preassigned channel is specially preassigned email mailbox; And, described in the user profile be recorded in the local log-on message stored comprise E-mail address title; And
After described lost terminal report information processing module notifies specifically for the lost terminal report information process receiving the output of described information receiving module, obtain lost terminal report information from described information receiving module, and obtain the E-mail address title of the transmit leg of described lost terminal report information; Search SIM card number corresponding with the user profile comprising this E-mail address title in the local log-on message stored, send according to the SIM card number determined and follow the trail of security note.
CN201310533416.5A 2013-10-31 2013-10-31 Mobile terminal follows the trail of burglary-resisting system and method Active CN103581441B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310533416.5A CN103581441B (en) 2013-10-31 2013-10-31 Mobile terminal follows the trail of burglary-resisting system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310533416.5A CN103581441B (en) 2013-10-31 2013-10-31 Mobile terminal follows the trail of burglary-resisting system and method

Publications (2)

Publication Number Publication Date
CN103581441A CN103581441A (en) 2014-02-12
CN103581441B true CN103581441B (en) 2015-09-09

Family

ID=50052325

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310533416.5A Active CN103581441B (en) 2013-10-31 2013-10-31 Mobile terminal follows the trail of burglary-resisting system and method

Country Status (1)

Country Link
CN (1) CN103581441B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106331300A (en) * 2015-07-01 2017-01-11 中兴通讯股份有限公司 Mobile phone tracking method and device as well as terminal
CN106686196A (en) * 2017-01-22 2017-05-17 济南浪潮高新科技投资发展有限公司 Personal mobile phone safety management method
CN106954196A (en) * 2017-02-14 2017-07-14 北京奇虎科技有限公司 A kind of acquisition methods of telephone number, device and mobile terminal
CN107241714B (en) * 2017-06-01 2020-12-08 珠海市魅族科技有限公司 Method, device and storage medium for establishing communication
WO2018232660A1 (en) * 2017-06-21 2018-12-27 深圳支点电子智能科技有限公司 Mobile terminal information releasing method and mobile terminal
WO2018232650A1 (en) * 2017-06-21 2018-12-27 深圳支点电子智能科技有限公司 Mobile terminal having communication account protection function and related product
CN107682527A (en) * 2017-09-04 2018-02-09 深圳支点电子智能科技有限公司 Mobile terminal and Related product with communications account safeguard function
CN107483326A (en) * 2017-09-04 2017-12-15 深圳支点电子智能科技有限公司 A kind of information of mobile terminal dissemination method and mobile terminal
CN111354109B (en) * 2020-03-16 2021-11-26 广州鸿森资本管理有限公司 Security anti-theft monitoring system and method based on big data

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1819705A (en) * 2006-03-15 2006-08-16 中国移动通信集团公司 Method for realizing mobile terminal data protection
CN101005663A (en) * 2006-11-15 2007-07-25 深圳凯虹移动通信有限公司 Mobile terminal with lost tracking function and lost tracking method of mobile terminal
CN101990209A (en) * 2009-07-30 2011-03-23 中国电信股份有限公司 Method and system for providing clue for finding lost mobile terminal
CN103052024A (en) * 2012-12-06 2013-04-17 广东欧珀移动通信有限公司 Burglar-proof method for mobile phone, client side and server

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102457606A (en) * 2010-11-02 2012-05-16 鸿富锦精密工业(深圳)有限公司 Mobile phone and anti-theft method thereof

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1819705A (en) * 2006-03-15 2006-08-16 中国移动通信集团公司 Method for realizing mobile terminal data protection
CN101005663A (en) * 2006-11-15 2007-07-25 深圳凯虹移动通信有限公司 Mobile terminal with lost tracking function and lost tracking method of mobile terminal
CN101990209A (en) * 2009-07-30 2011-03-23 中国电信股份有限公司 Method and system for providing clue for finding lost mobile terminal
CN103052024A (en) * 2012-12-06 2013-04-17 广东欧珀移动通信有限公司 Burglar-proof method for mobile phone, client side and server

Also Published As

Publication number Publication date
CN103581441A (en) 2014-02-12

Similar Documents

Publication Publication Date Title
CN103581441B (en) Mobile terminal follows the trail of burglary-resisting system and method
US10694333B1 (en) Determining the last location of lost and stolen portable electronic devices when wireless communications access to the lost or stolen devices is lost or intermittent
CN104486727A (en) Mobile phone anti-theft method and system based on Android system
KR20090109126A (en) Apparatus and methods for locating, tracking and/or recovering a wireless communication device
CN104796385A (en) Terminal binding method, device and system
CN104243155A (en) Safety verification method and device
CN105516916B (en) A kind of alarm method and system of mobile device
CN202617350U (en) Mobile phone safety management and control system
CN106231572A (en) Pseudo-base station refuse messages discrimination method and system
CN103118087A (en) Mobile communication terminal and method and system of protecting data thereof
KR20110111022A (en) Method and apparatus for protecting information in user terminal
CN104917796A (en) Credit account creating method, system and method
CN106685891A (en) Verification method and apparatus for accessing network
CN103973876A (en) Mobile terminal and tracking method for lost mobile terminal
CN102420852B (en) Server, mobile terminal and data synchronizing method
CN103684796A (en) SMI (subscriber identity module) card and personal identity authentication method
CN104468466A (en) Operation management method and device for network account
EP3468261B1 (en) Control method and apparatus for smart card, terminal device, and smart card
CN113191169A (en) Terminal code scanning login method, device and system
CN102404305A (en) Method for identity authentication of Internet user
CN101316386A (en) System and method for monitoring geographical position of stolen mobile phone
CN101807313A (en) Method and device for sending checking-in data
CN106101193B (en) Information backup method, terminal equipment, operator server and backup system
KR101103634B1 (en) Method for attestating credit card company server and that server
CN103945325A (en) Mobile phone anti-theft and tracking system based on J2EE and Android platform

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant