CN103699821A - Processing method for stolen terminal and server - Google Patents
Processing method for stolen terminal and server Download PDFInfo
- Publication number
- CN103699821A CN103699821A CN201310687600.5A CN201310687600A CN103699821A CN 103699821 A CN103699821 A CN 103699821A CN 201310687600 A CN201310687600 A CN 201310687600A CN 103699821 A CN103699821 A CN 103699821A
- Authority
- CN
- China
- Prior art keywords
- terminal
- modification message
- status
- status modification
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/88—Detecting or preventing theft or loss
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides a processing method for a stolen terminal and a server. The method comprises the steps of receiving a state modification message from a sender, wherein the state modification message carries identity identification information of the terminal and the current state of the terminal; verifying the legality of the state modification message through the server; modifying the state information of the terminal corresponding to the identity identification information into the current state according to the state modification message which passes the legality verification. According to the processing method disclosed by the embodiment of the invention, the state information of the terminal can be modified, the problem that the fact whether the terminal is stolen cannot be indicated by other identifications in the prior art can be solved, and the beneficial effects that the finding probability of the stolen terminal can be increased and stealing behaviors are effectively contained can be achieved.
Description
Technical field
The present invention relates to internet, applications field, particularly relate to a kind of disposal route and server of stolen terminal.
Background technology
Along with the develop rapidly of intelligent terminal and network, terminal (comprising the plurality of devices such as computer, mobile phone, flat board) role in people's life is also more and more important, more and more becomes indispensable comprehensive " assistant " in people's work and life.For convenience of using, people conventionally can directly be stored in terminal by information such as various account information, private chat record and picture photos when using the application of terminal.Therefore,, if lost terminal not only can be brought property loss to user, what is more important user is stored in the personal information in terminal, such as financial information such as account number ciphers.If these personal informations are revealed, the loss that user is caused is difficult to estimate.Therefore, terminal is antitheft very important.
In prior art, after lost terminal, the owner of lost property only can be stolen by the means explanation terminal of reporting to the police, and cannot provide other identifier declaration terminals stolen.But stolen by the means explanation terminal of reporting to the police, only the owner of lost property and police etc. among a small circle crowd can know that terminal is stolen.Most people, especially, when stealer carries on transactions to stolen terminal, whether people's None-identified terminal of buying stolen terminal is stolen.This technological deficiency causes user easily to buy stolen terminal, further promotes the ill effect of the malfeasant generation of pilferage terminal.
Summary of the invention
In view of the above problems, the present invention has been proposed to a kind of disposal route and corresponding server of the stolen terminal that overcomes the problems referred to above or address the above problem are at least in part provided.
According to one aspect of the present invention, a kind of disposal route of stolen terminal is provided, comprising: receive the status modification message from transmit leg, wherein, in described status modification message, carry the identification information of terminal and the current state of described terminal; Utilize server to carry out legitimate verification to described status modification message; According to the status information of revising terminal corresponding to described identification information by the described status modification message of legitimate verification to described current state.
Alternatively, the status information of revising terminal corresponding to described identification information, to after described current state, also comprises: return to modification result that the status information of described terminal is modified to described transmit leg.
Alternatively, utilize server to carry out legitimate verification to described status modification message, comprise: utilize described server whether to mate with the identification information of the local storage of described server according to the identification information of carrying in described status modification message, verify that whether described status modification message is legal; If the identification information of carrying in described status modification message is not all mated with the identification information of the local storage of described server, described status modification message is illegal; If the identification information of carrying in described status modification message is mated with the identification information of the local storage of described server, described status modification message is legal.
Alternatively, after described status modification message is carried out to legitimate verification, also comprise: if described status modification message is illegal, ignore described status modification message; If described status modification message is legal, trigger described status information retouching operation.
Alternatively, the identification information of described terminal at least comprise following one of arbitrarily: the International Mobile Equipment Identity code IMEI of described terminal; The User Identity code ID of described terminal; The hardware identity identification code ID of described terminal.
Alternatively, described transmit leg is arranged at mobile terminal, and sends described status modification message with short message or latticed form; Or described transmit leg is arranged at terminal, and send described status modification message with latticed form.
According to another aspect of the present invention, a kind of server is provided, comprising: receiver, be configured to receive the status modification message from transmit leg, wherein, in described status modification message, carry the identification information of terminal and the current state of described terminal; Determining device, is configured to judge whether described status modification message passes through legitimate verification; Status modifier device, is configured to according to the status information of revising terminal corresponding to described identification information by the described status modification message of legitimate verification to described current state.
Alternatively, described server also comprises: transmitter, is configured to return modification result that the status information of described terminal is modified to described transmit leg.
Whether alternatively, described determining device is also configured to: according to the identification information of carrying in described status modification message, mate with the identification information of the local storage of described server, judge whether described status modification message passes through legitimate verification; If the identification information of carrying in described status modification message is not all mated with the identification information of the local storage of server, described determining device judges that described status modification message is illegal; If the identification information of carrying in described status modification message is mated with the identification information of the local storage of described server, described determining device judges that described status modification message is legal.
Alternatively, described status modifier device is also configured to: if described determining device judges that described status modification message is illegal, ignore described status modification message; If described determining device judges that described status modification message is legal, according to described status modification message, revise the status information of described terminal.
The embodiment of the present invention receives the status modification message from transmit leg, and this status modification message is verified, the status modification message that assurance is received is authentic and valid believable message, avoid receiving the status modification message from the transmit leg transmission of insincere or malice, cause the status information of terminal by malicious modification.If the status information of terminal is by malicious modification, may cause server feedback terminal user's real time position to malice transmit leg, reveal user profile to malice transmit leg, or may cause stolen terminal to be disengaged stolen sign, and then cannot obtain the relevant information of stolen terminal, cannot to stealer, arrest according to the relevant information of stolen terminal.Status modification message is by after legitimate verification, and the embodiment of the present invention is modified to the status information of terminal according to this status modification message, has solved in prior art and cannot provide other identifier declaration terminals whether stolen problem.The disposal route of the stolen terminal that the employing embodiment of the present invention provides can be changed the status information of stolen terminal.For example, after terminal is stolen, the current state that the employing embodiment of the present invention can be changed terminal is for stolen.If stealer is concluded the business to stolen terminal, it is stolen that buyer can inquire terminal, and then shut the book and the clue of stealer is provided.Therefore, adopt the embodiment of the present invention to reach and increase the beneficial effect of giving probability for change and effectively containing pilferage behavior of stolen terminal.
Above-mentioned explanation is only the general introduction of technical solution of the present invention, in order to better understand technological means of the present invention, and can be implemented according to the content of instructions, and for above and other objects of the present invention, feature and advantage can be become apparent, below especially exemplified by the specific embodiment of the present invention.
According to the detailed description to the specific embodiment of the invention by reference to the accompanying drawings below, those skilled in the art will understand above-mentioned and other objects, advantage and feature of the present invention more.
Accompanying drawing explanation
By reading below detailed description of the preferred embodiment, various other advantage and benefits will become cheer and bright for those of ordinary skills.Accompanying drawing is only for the object of preferred implementation is shown, and do not think limitation of the present invention.And in whole accompanying drawing, by identical reference symbol, represent identical parts.In the accompanying drawings:
Fig. 1 shows the processing flow chart of the disposal route of stolen terminal according to an embodiment of the invention;
Fig. 2 shows the processing flow chart of the disposal route of stolen terminal in accordance with a preferred embodiment of the present invention;
Fig. 3 shows according to the processing flow chart of the disposal route of the stolen terminal of another preferred embodiment of the present invention;
Fig. 4 shows the processing flow chart of the disposal route of the stolen terminal of another preferred embodiment according to the present invention; And
Fig. 5 shows the structural representation of server according to an embodiment of the invention.
Embodiment
The algorithm providing at this is intrinsic not relevant to any certain computer, virtual system or miscellaneous equipment with demonstration.Various general-purpose systems also can with based on using together with this teaching.According to description above, it is apparent constructing the desired structure of this type systematic.In addition, the present invention is not also for any certain programmed language.It should be understood that and can utilize various programming languages to realize content of the present invention described here, and the description of above language-specific being done is in order to disclose preferred forms of the present invention.
In correlation technique, mention, cannot determine that whether terminal is stolen, therefore, after terminal is stolen, the owner of lost property at present only can be stolen by the means explanation terminal of reporting to the police, and cannot provide other identifier declaration terminals stolen.This technological deficiency causes user easily to buy stolen terminal, makes the lawbreaking activities of stealing terminal can produce ill effect.
For solving the problems of the technologies described above, the embodiment of the present invention provides a kind of disposal route of stolen terminal.Fig. 1 shows the processing flow chart of the disposal route of stolen terminal according to an embodiment of the invention.As shown in Figure 1, this flow process at least comprises that step S102 is to step S106.
Step S102, receive the status modification message from transmit leg, wherein, in status modification message, carry the identification information of terminal and the current state of terminal.
Step S104, utilize server to carry out legitimate verification to status modification message.
The status information that step S106, basis are revised terminal corresponding to identification information by the status modification message of legitimate verification is to current state.
The embodiment of the present invention receives the status modification message from transmit leg, and this status modification message is verified, the status modification message that assurance is received is authentic and valid believable message, avoid receiving the status modification message from the transmit leg transmission of insincere or malice, cause the status information of terminal by malicious modification.If the status information of terminal is by malicious modification, may cause server feedback terminal user's real time position to malice transmit leg, reveal user profile to malice transmit leg, or may cause stolen terminal to be disengaged stolen sign, and then cannot obtain the relevant information of stolen terminal, cannot to stealer, arrest according to the relevant information of stolen terminal.Status modification message is by after legitimate verification, and the embodiment of the present invention is modified to the status information of terminal according to this status modification message, has solved in prior art and cannot provide other identifier declaration terminals whether stolen problem.The disposal route of the stolen terminal that the employing embodiment of the present invention provides can be changed the status information of stolen terminal.For example, after terminal is stolen, the current state that the employing embodiment of the present invention can be changed terminal is for stolen.If stealer is concluded the business to stolen terminal, it is stolen that buyer can inquire terminal, and then shut the book and the clue of stealer is provided.Therefore, adopt the embodiment of the present invention to reach and increase the beneficial effect of giving probability for change and effectively containing pilferage behavior of stolen terminal.
As shown in the step S102 in Fig. 1 and step S104, after receiving the status modification message from transmit leg, for guaranteeing that the status modification message receiving is authentic and valid believable, avoid reception to cause server to carry out bug patch to the status information of terminal from status modification message insincere or that malice transmitting terminal sends, the embodiment of the present invention utilizes server to carry out legitimate verification to status modification message.
Above mention, in status modification message from transmit leg, carry the identification information of terminal, whether the embodiment of the present invention utilizes the identification information of this terminal to mate the legitimacy of status modification message is verified with the identification information of the local storage of server.Particularly, if the identification information of the terminal of carrying in status modification message can be mated with the identification information of the local storage of server, status modification message is legal; If the identification information of the terminal of carrying in status modification message can not be mated with the identification information of the local storage of server, status modification message is illegal.
According to the result to status modification message, the embodiment of the present invention is carried out different operations.If status modification message is illegal, the embodiment of the present invention cannot guarantee that the status modification message that server receives is authentic and valid believable, and the transmit leg of cannot Guarantee Status revising message is not insincere or malice transmitting terminal.Therefore, when verifying through the embodiment of the present invention, when status modification message is illegal, for guaranteeing that server can not carry out bug patch to the status information of terminal according to the status modification message from insincere side, the embodiment of the present invention is ignored the status modifier information receiving, and does not carry out any operation.
If status modification message is legal, the embodiment of the present invention determines according to the identification information of the terminal of carrying in status modification message the terminal that this identification information is corresponding.After determining corresponding terminal, the embodiment of the present invention is carried out correspondence modification according to the current state of this terminal in status modification message to the status information of the terminal of the local storage of server, and the status information of the terminal of assurance server stores can access and upgrade in time.
In the embodiment of the present invention, the current state of terminal can comprise that terminal is stolen and terminal is not stolen, terminal is given for change etc. after stolen.After terminal is stolen, the embodiment of the present invention is carried out time update to the status information of terminal, so that the relevant information (as fingerprint of the real time position of terminal, the current user of terminal etc.) that server receives terminal afterwards, the related thread of stolen terminal can be provided to the owner of lost property, increase the possibility that the owner of lost property gives terminal for change.After giving for change after terminal is stolen, the state of embodiment of the present invention time update terminal is to give for change after stolen, and server is also just without the relevant information of the resource queries such as wasting space and storage terminal.Further, the current state of the terminal of the embodiment of the present invention can also comprise the explanation that other are more detailed, such as comprising that terminal is not sold, terminal use in and terminal by the sale of terminals such as reselling, bought status information, can also be the current state information of other any terminals, the embodiment of the present invention be limited this.
Preferably, after the status information of terminal is revised as to current state, the embodiment of the present invention is returned and is revised result to the transmit leg of status modifier information.In the embodiment of the present invention, after the current state of terminal is revised, modification result is sent to transmit leg, reminds the current state of this terminal of transmit leg to revise, and then make transmit leg to carry out corresponding operating according to the current state after terminal modifications.For example, when terminal is mobile phone, user uses with kith and kin's number of stolen mobile phone binding and sends status modifier order to stolen mobile phone, and mark mobile phone is stolen.When server is revised mobile phone current state for after stolen according to status modifier order, if return to modification result to kith and kin's number, user can be known in time mobile phone mark is stolen, further stolen mobile phone is carried out to other antitheft operations.
In the embodiment of the present invention, the identification information of terminal can be International Mobile Equipment Identity identification code (the International Mobile Equipment Identity of terminal, hereinafter to be referred as IMEI), can be the User Identity code (Identity of terminal, hereinafter to be referred as ID), can also be arbitrarily can unique identification terminal identification information, the embodiment of the present invention is not limited this.
For improving the security of terminal, determine that the status modification message receiving is that legal state is revised message, preferably, the embodiment of the present invention provides a kind of terminal identity sign.This terminal identity is designated the hardware ID of terminal.Because obtaining of hardware ID comprised IMEI, the NIC address of terminal and the central processing unit of terminal (the Central Processing Unit to terminal, hereinafter to be referred as CPU) the comprehensive computing number carried out of string, therefore, hardware ID is a comprehensive identify label of terminal.Identify label using hardware ID as terminal is carried out legitimate verification to status modification message, if status modification message is by checking, show the IMEI of terminal that carries in status modification message, the CPU of the NIC address of terminal and terminal string number all by verifying, has had higher assurance to the legitimacy of status modification message.
As an embodiment, can calculate as follows described hardware ID: obtain the International Mobile Equipment Identity code IMEI of described terminal, be designated as the first character string; Obtain the NIC address of described terminal, the non-letter in the described NIC address of removal and the character string of nonnumeric character are designated as to the second character string; The string number that obtains the central processor CPU of described terminal, is designated as three-character doctrine string; By predefined procedure, merge described the first character string, described the second character string and described three-character doctrine string, and the character string after conversion merging is to uppercase format, is designated as the first result; Described the first result is carried out to Message Digest 5 MD5 computing and obtain the second result; Change described the second result to uppercase format, obtain described hardware ID.
In addition, in the embodiment of the present invention, the transmit leg of status modification message can be arranged at mobile terminal, mobile phone for example, and notebook computer etc., and send status modification message by the form of short message or network.Transmit leg in the embodiment of the present invention can also be arranged at terminal, computer for example, and send above-mentioned status modification message by the form of network.Adopt the embodiment of the present invention, status information that can time update terminal.For example, after terminal is stolen, user can send platform by various message and send status modification message, and assurance and tense marker terminal are stolen.Further can know in time the relevant information of stolen terminal, increase the probability that stolen terminal is given for change.
Now with specific embodiment, the disposal route of stolen terminal of the present invention is described.
Embodiment mono-
Fig. 2 shows the processing flow chart of the disposal route of stolen terminal in accordance with a preferred embodiment of the present invention, supports the disposal route of above-mentioned any one stolen terminal, and the disposal route of above-mentioned stolen terminal is set forth more clear understandablely.Referring to Fig. 2, this flow process at least comprises that step S202 is to step S210.
It should be noted that, for this preferred embodiment being set forth more simply clear, in this preferred embodiment, the transmit leg of status modification message is arranged to kith and kin's mobile phone, terminal is set to stolen mobile phone, and wherein, kith and kin's mobile phone is the mobile phone at kith and kin's number place of stolen mobile phone binding.
Step S202, transmission status modification message, mark hand-set from stolen.
Particularly, after user finds hand-set from stolen, can be by sending status modification message to server with the mobile phone of kith and kin's number of stolen mobile phone binding in advance.While using kith and kin's mobile phone, this preferred embodiment can send this status modifier information to server by short message.And, be sent to the identification information that carries stolen mobile phone in the status modification message of server.
Step S204, judge that whether status modification message is legal.
After server receives status modification message, this status modification message is carried out to legitimate verification.If the identification information of carrying in status modification message can not be mated with the identification information of the local storage of server, server judgement status modification message can not be passed through legitimate verification, performs step S206.If the identification information of carrying in status modification message can be mated with the identification information of the local storage of server, server judgement status modification message, by legitimate verification, performs step S208.
Step S206, status modification message be not by legitimate verification, and server is ignored status modification message.
Step S208, status modification message are by legitimate verification, and server is revised the status information of stolen mobile phone according to status modification message.
After server judgement status modification message is by checking, the status information that server is revised stolen mobile phone according to this status modification message is that mobile phone is stolen.
Step S210, return to modification result.
After server is complete to the status information modification of stolen mobile phone, by short message, sends and revise result to the transmit leg of status modification message, i.e. kith and kin's mobile phone or PC in this preferred embodiment.After the transmit leg of status modification message receives the modification result that server returns, determine successful mark hand-set from stolen.
Embodiment bis-
Fig. 3 shows according to the processing flow chart of the disposal route of the stolen terminal of another preferred embodiment of the present invention, forever supports the disposal route of above-mentioned any one stolen terminal, and the disposal route of above-mentioned stolen terminal is set forth more clear understandablely.Referring to Fig. 3, this flow process at least comprises that step S302 is to step S310.
It should be noted that, for this preferred embodiment being set forth more simply clear, in this preferred embodiment, the transmit leg of status modification message is arranged to PC, terminal is set to stolen mobile phone.
Step S302, transmission status modification message, mark hand-set from stolen.
Particularly, after user finds hand-set from stolen, can send status modification message to server by PC.While using PC, this preferred embodiment can send status modification message to server by network.And, be sent to the identification information that carries stolen mobile phone in the status modification message of server.
Step S304, judge that whether status modification message is legal.
After server receives status modification message, this status modification message is carried out to legitimate verification.If the identification information of carrying in status modification message can not be mated with the identification information of the local storage of server, server judgement status modification message can not be passed through legitimate verification, performs step S306.If the identification information of carrying in status modification message can be mated with the identification information of the local storage of server, server judgement status modification message, by legitimate verification, performs step S308.
Step S306, status modification message be not by legitimate verification, and server is ignored status modification message.
Step S308, status modification message are by legitimate verification, and server is revised the status information of stolen mobile phone according to status modification message.
After server judgement status modification message is by checking, the status information that server is revised stolen mobile phone according to this status modification message is that mobile phone is stolen.
Step S310, return to modification result.
After server is complete to the status information modification of stolen mobile phone, by network, sends modification result to the transmission of status modification message and send out, be i.e. kith and kin's mobile phone or PC in this preferred embodiment.After the transmit leg of status modification message receives the modification result that server returns, determine successful mark hand-set from stolen.
Embodiment tri-
Fig. 4 shows the processing flow chart of the disposal route of the stolen terminal of another preferred embodiment according to the present invention, supports the disposal route of above-mentioned any one stolen terminal, and the disposal route of above-mentioned stolen terminal is set forth more clear understandablely.Referring to Fig. 4, this flow process at least comprises that step S402 is to step S410.
It should be noted that, for this preferred embodiment being set forth more simply clear, in this preferred embodiment, the transmit leg of status modification message is arranged to kith and kin's mobile phone, terminal is set to stolen mobile phone, and wherein, kith and kin's mobile phone is the mobile phone at kith and kin's number place of stolen mobile phone binding.
Step S402, transmission status modification message, mark hand-set from stolen.
Particularly, after user finds hand-set from stolen, can be by sending status modification message to server with the mobile phone of kith and kin's number of stolen mobile phone binding in advance.While using kith and kin's mobile phone, this preferred embodiment can send this status modifier information to server by network.And, be sent to the identification information that carries stolen mobile phone in the status modification message of server.
Step S404, judge that whether status modification message is legal.
After server receives status modification message, this status modification message is carried out to legitimate verification.If the identification information of carrying in status modification message can not be mated with the identification information of the local storage of server, server judgement status modification message can not be passed through legitimate verification, performs step S406.If the identification information of carrying in status modification message can be mated with the identification information of the local storage of server, server judgement status modification message, by legitimate verification, performs step S408.
Step S406, status modification message be not by legitimate verification, and server is ignored status modification message.
Step S408, status modification message are by legitimate verification, and server is revised the status information of stolen mobile phone according to status modification message.
After server judgement status modification message is by checking, the status information that server is revised stolen mobile phone according to this status modification message is that mobile phone is stolen.
Step S410, return to modification result.
After server is complete to the status information modification of stolen mobile phone, by network, sends modification result to the transmission of status modification message and send out, be i.e. kith and kin's mobile phone or PC in this preferred embodiment.After the transmit leg of status modification message receives the modification result that server returns, determine successful mark hand-set from stolen.
The disposal route of the stolen terminal based on above each preferred embodiment provides, based on same inventive concept, the embodiment of the present invention provides a kind of server, for realizing the disposal route of above-mentioned stolen terminal.
Fig. 5 shows the structural representation of server according to an embodiment of the invention.Referring to Fig. 5, the server of the embodiment of the present invention at least comprises: receiver 510, determining device 520 and status modifier device 530.
Now introduce each device of server or the function of composition and the annexation between each several part of the embodiment of the present invention:
Determining device 520, is coupled with receiver 510, is configured to judge whether status modification message passes through legitimate verification.
The embodiment of the present invention receives the status modification message from transmit leg, and this status modification message is verified, the status modification message that assurance is received is authentic and valid believable message, avoid receiving the status modification message from the transmit leg transmission of insincere or malice, cause the status information of terminal by malicious modification.If the status information of terminal is by malicious modification, may cause server feedback terminal user's real time position to malice transmit leg, reveal user profile to malice transmit leg, or may cause stolen terminal to be disengaged stolen sign, and then cannot obtain the relevant information of stolen terminal, cannot to stealer, arrest according to the relevant information of stolen terminal.Status modification message is by after legitimate verification, and the embodiment of the present invention is modified to the status information of terminal according to this status modification message, has solved in prior art and cannot provide other identifier declaration terminals whether stolen problem.The disposal route of the stolen terminal that the employing embodiment of the present invention provides can be changed the status information of stolen terminal.For example, after terminal is stolen, the current state that the employing embodiment of the present invention can be changed terminal is for stolen.If stealer is concluded the business to stolen terminal, it is stolen that buyer can inquire terminal, and then shut the book and the clue of stealer is provided.Therefore, adopt the embodiment of the present invention to reach and increase the beneficial effect of giving probability for change and effectively containing pilferage behavior of stolen terminal.
Server as shown in Figure 5, receiver 510 receives the status modification message from transmit leg, wherein, carries the identify label of the terminal that status information changes in this status modification message.After receiver 510 receives the status modification message from transmit leg, for guaranteeing that the status modification message of accepting is authentic and valid believable, avoid reception to cause server to carry out bug patch to the status information of terminal from status modification message insincere or that malice transmitting terminal sends, receiver 510 triggers determining devices 520.After determining device 520 is triggered, to status modification message, can judge by legitimacy.Particularly, if the identification information of the terminal of carrying in status modification message can be mated with the identification information of the terminal of the local storage of server, determining device 520 judgement status modification message are passed through legitimate verification.If the identification information of the terminal of carrying in status modification message can not be mated with the identification information of the terminal of the local storage of server, determining device 520 judgement status modification message are not passed through legitimate verification.
After the status modification message that 520 pairs of receivers 510 of determining device receive is verified, if status modification message is not by checking, server cannot guarantee that the status modification message that server receives is authentic and valid believable, and the transmit leg of cannot Guarantee Status revising message is not insincere or malice transmitting terminal.Therefore,, when determining device 520 judgement state verification information is illegal, for guaranteeing that server can not carry out bug patch to the status information of terminal according to the status modification message from insincere side, server is ignored this status modification message, does not carry out any operation.If determining device 520 judgement status modification message are legal, trigger the status modifier device 530 with determining device 520 couplings.After status modifier device is received triggering, according to the identification information of the terminal of carrying in status modification message, determine corresponding terminal.After terminal is determined, status modifier device 520 is modified to the status information of the terminal of the local storage of server according to status modification message, guarantees the status information of terminal to upgrade in time.
In the embodiment of the present invention, the current state of terminal can comprise that terminal is stolen and terminal is not stolen, terminal is given for change etc. after stolen.After terminal is stolen, the status information of 520 pairs of terminals of status modifier device is carried out time update, so that the relevant information (as fingerprint of the real time position of terminal, the current user of terminal etc.) that server receives terminal afterwards, the related thread of stolen terminal can be provided to the owner of lost property, increase the possibility that the owner of lost property gives terminal for change.After giving for change after terminal is stolen, the state of the status modifier device 520 time update terminals in server is to give for change after stolen, and server is also just without the relevant information of the resource queries such as wasting space and storage terminal.Further, the current state of the terminal of the embodiment of the present invention can also comprise the explanation that other are more detailed, such as comprising that terminal is not sold, terminal use in and terminal by the sale of terminals such as reselling, bought status information, can also be the current state information of other any terminals, the embodiment of the present invention be limited this.
Preferably, after status modifier device 520 is revised as current state by the status information of terminal, trigger transmitter 540.Transmitter 540 returns revises the transmit leg that result phase is revised information.In the embodiment of the present invention, after the current state of terminal is revised, by transmitter 540, modification result is sent to transmit leg, reminds the current state of this terminal of transmit leg to revise, and then make transmit leg to carry out corresponding operating according to the current state after terminal modifications.For example, when terminal is mobile phone, user uses with kith and kin's number of stolen mobile phone binding and sends status modifier order to stolen mobile phone, and mark mobile phone is stolen.When server is revised mobile phone current state for after stolen according to status modifier order, if return to modification result to kith and kin's number, user can be known in time mobile phone mark is stolen, further stolen mobile phone is carried out to other antitheft operations.
In the embodiment of the present invention, the identification information of terminal can be the IMEI of terminal, can be the user ID of terminal, can also be arbitrarily can unique identification terminal identification information, the embodiment of the present invention is not limited this.
For improving the security of terminal, determine that the status modification message receiving is that legal state is revised message, preferably, the embodiment of the present invention provides a kind of terminal identity sign.This terminal identity is designated the hardware ID of terminal.Because obtaining of hardware ID comprised the comprehensive computing that IMEI, the NIC address of terminal and the CPU of terminal string number to terminal carry out, therefore, hardware ID is a comprehensive identify label of terminal.Identify label using hardware ID as terminal is carried out legitimate verification to status modification message, if status modification message is by checking, show the IMEI of terminal that carries in status modification message, the CPU of the NIC address of terminal and terminal string number all by verifying, has had higher assurance to the legitimacy of status modification message.
As an embodiment, can calculate as follows described hardware ID: obtain the International Mobile Equipment Identity code IMEI of described terminal, be designated as the first character string; Obtain the NIC address of described terminal, the non-letter in the described NIC address of removal and the character string of nonnumeric character are designated as to the second character string; The string number that obtains the central processor CPU of described terminal, is designated as three-character doctrine string; By predefined procedure, merge described the first character string, described the second character string and described three-character doctrine string, and the character string after conversion merging is to uppercase format, is designated as the first result; Described the first result is carried out to Message Digest 5 MD5 computing and obtain the second result; Change described the second result to uppercase format, obtain described hardware ID.
In addition, in the embodiment of the present invention, the transmit leg of status modification message can be arranged at mobile terminal, mobile phone for example, and notebook computer etc., and send status modification message by the form of short message or network.Transmit leg in the embodiment of the present invention can also be arranged at terminal, computer for example, and send above-mentioned status modification message by the form of network.Adopt the embodiment of the present invention, status information that can time update terminal.For example, after terminal is stolen, user can send platform by various message and send status modification message, and assurance and tense marker terminal are stolen.Further can know in time the relevant information of stolen terminal, increase the probability that stolen terminal is given for change.
According to the combination of above-mentioned any one preferred embodiment or a plurality of preferred embodiments, the embodiment of the present invention can reach following beneficial effect:
The embodiment of the present invention receives the status modification message from transmit leg, and this status modification message is verified, the status modification message that assurance is received is authentic and valid believable message, avoid receiving the status modification message from the transmit leg transmission of insincere or malice, cause the status information of terminal by malicious modification.If the status information of terminal is by malicious modification, may cause server feedback terminal user's real time position to malice transmit leg, reveal user profile to malice transmit leg, or may cause stolen terminal to be disengaged stolen sign, and then cannot obtain the relevant information of stolen terminal, cannot to stealer, arrest according to the relevant information of stolen terminal.Status modification message is by after legitimate verification, and the embodiment of the present invention is modified to the status information of terminal according to this status modification message, has solved in prior art and cannot provide other identifier declaration terminals whether stolen problem.The disposal route of the stolen terminal that the employing embodiment of the present invention provides can be changed the status information of stolen terminal.For example, after terminal is stolen, the current state that the employing embodiment of the present invention can be changed terminal is for stolen.If stealer is concluded the business to stolen terminal, it is stolen that buyer can inquire terminal, and then shut the book and the clue of stealer is provided.Therefore, adopt the embodiment of the present invention to reach and increase the beneficial effect of giving probability for change and effectively containing pilferage behavior of stolen terminal.
In the instructions that provided herein, a large amount of details have been described.Yet, can understand, embodiments of the invention can not put into practice in the situation that there is no these details.In some instances, be not shown specifically known method, structure and technology, so that not fuzzy understanding of this description.
Similarly, be to be understood that, in order to simplify the disclosure and to help to understand one or more in each inventive aspect, in the above in the description of exemplary embodiment of the present invention, each feature of the present invention is grouped together into single embodiment, figure or sometimes in its description.Yet, the method for the disclosure should be construed to the following intention of reflection: the present invention for required protection requires than the more feature of feature of clearly recording in each claim.Or rather, as reflected in claims below, inventive aspect is to be less than all features of disclosed single embodiment above.Therefore, claims of following embodiment are incorporated to this embodiment thus clearly, and wherein each claim itself is as independent embodiment of the present invention.
Those skilled in the art are appreciated that and can the module in the equipment in embodiment are adaptively changed and they are arranged in one or more equipment different from this embodiment.Module in embodiment or unit or assembly can be combined into a module or unit or assembly, and can put them into a plurality of submodules or subelement or sub-component in addition.At least some in such feature and/or process or unit are mutually repelling, and can adopt any combination to combine all processes or the unit of disclosed all features in this instructions (comprising claim, summary and the accompanying drawing followed) and disclosed any method like this or equipment.Unless clearly statement in addition, in this instructions (comprising claim, summary and the accompanying drawing followed) disclosed each feature can be by providing identical, be equal to or the alternative features of similar object replaces.
In addition, those skilled in the art can understand, although embodiment more described herein comprise some feature rather than further feature included in other embodiment, the combination of the feature of different embodiment means within scope of the present invention and forms different embodiment.For example, in claims, the one of any of embodiment required for protection can be used with array mode arbitrarily.
All parts embodiment of the present invention can realize with hardware, or realizes with the software module moved on one or more processor, or realizes with their combination.It will be understood by those of skill in the art that and can use in practice microprocessor or digital signal processor (DSP) to realize the some or all functions according to the some or all parts in the treatment facility of the stolen terminal of the embodiment of the present invention.The present invention for example can also be embodied as, for carrying out part or all equipment or device program (, computer program and computer program) of method as described herein.Realizing program of the present invention and can be stored on computer-readable medium like this, or can there is the form of one or more signal.Such signal can be downloaded and obtain from internet website, or provides on carrier signal, or provides with any other form.
It should be noted above-described embodiment the present invention will be described rather than limit the invention, and those skilled in the art can design alternative embodiment in the situation that do not depart from the scope of claims.In the claims, any reference symbol between bracket should be configured to limitations on claims.Word " comprises " not to be got rid of existence and is not listed as element or step in the claims.Being positioned at word " " before element or " one " does not get rid of and has a plurality of such elements.The present invention can be by means of including the hardware of some different elements and realizing by means of the computing machine of suitably programming.In having enumerated the unit claim of some devices, several in these devices can be to carry out imbody by same hardware branch.The use of word first, second and C grade does not represent any order.Can be title by these word explanations.
So far, those skilled in the art will recognize that, although detailed, illustrate and described a plurality of exemplary embodiment of the present invention herein, but, without departing from the spirit and scope of the present invention, still can directly determine or derive many other modification or the modification that meets the principle of the invention according to content disclosed by the invention.Therefore, scope of the present invention should be understood and regard as and cover all these other modification or modifications.
Claims (10)
1. a disposal route for stolen terminal, comprising:
Reception, from the status modification message of transmit leg, wherein, carries the identification information of terminal and the current state of described terminal in described status modification message;
Utilize server to carry out legitimate verification to described status modification message;
According to the status information of revising terminal corresponding to described identification information by the described status modification message of legitimate verification to described current state.
2. method according to claim 1, wherein, the status information of revising terminal corresponding to described identification information, to after described current state, also comprises:
Return to modification result that the status information of described terminal is modified to described transmit leg.
3. method according to claim 1 and 2, wherein, utilizes server to carry out legitimate verification to described status modification message, comprising:
Utilize described server whether to mate with the identification information of the local storage of described server according to the identification information of carrying in described status modification message, verify that whether described status modification message is legal;
If the identification information of carrying in described status modification message is not all mated with the identification information of the local storage of described server, described status modification message is illegal;
If the identification information of carrying in described status modification message is mated with the identification information of the local storage of described server, described status modification message is legal.
4. method according to claim 3, wherein, after described status modification message is carried out to legitimate verification, also comprises:
If described status modification message is illegal, ignore described status modification message;
If described status modification message is legal, trigger described status information retouching operation.
5. according to the method described in claim 1 to 4 any one, wherein, the identification information of described terminal at least comprise following one of arbitrarily:
The International Mobile Equipment Identity code IMEI of described terminal;
The User Identity code ID of described terminal;
The hardware identity identification code ID of described terminal.
6. according to the method described in claim 1 to 5 any one, wherein, described transmit leg is arranged at mobile terminal, and sends described status modification message with short message or latticed form; Or
Described transmit leg is arranged at terminal, and sends described status modification message with latticed form.
7. a server, comprising:
Receiver, is configured to receive the status modification message from transmit leg, wherein, carries the identification information of terminal and the current state of described terminal in described status modification message;
Determining device, is configured to judge whether described status modification message passes through legitimate verification;
Status modifier device, is configured to according to the status information of revising terminal corresponding to described identification information by the described status modification message of legitimate verification to described current state.
8. server according to claim 7, wherein, also comprises:
Transmitter, is configured to return modification result that the status information of described terminal is modified to described transmit leg.
9. according to the server described in claim 7 or 8, wherein, described determining device is also configured to:
According to the identification information of carrying in described status modification message, whether mate with the identification information of the local storage of described server, judge whether described status modification message passes through legitimate verification;
If the identification information of carrying in described status modification message is not all mated with the identification information of the local storage of server, described determining device judges that described status modification message is illegal;
If the identification information of carrying in described status modification message is mated with the identification information of the local storage of described server, described determining device judges that described status modification message is legal.
10. server according to claim 9, wherein, described status modifier device is also configured to:
If described determining device judges that described status modification message is illegal, ignore described status modification message;
If described determining device judges that described status modification message is legal, according to described status modification message, revise the status information of described terminal.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310687600.5A CN103699821B (en) | 2013-12-13 | 2013-12-13 | The processing method of stolen terminal and server |
US15/103,396 US10078765B2 (en) | 2013-12-13 | 2014-12-11 | Method and device for processing stolen terminal |
PCT/CN2014/093637 WO2015085941A1 (en) | 2013-12-13 | 2014-12-11 | Method and device for processing stolen terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310687600.5A CN103699821B (en) | 2013-12-13 | 2013-12-13 | The processing method of stolen terminal and server |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103699821A true CN103699821A (en) | 2014-04-02 |
CN103699821B CN103699821B (en) | 2016-12-28 |
Family
ID=50361348
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310687600.5A Active CN103699821B (en) | 2013-12-13 | 2013-12-13 | The processing method of stolen terminal and server |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103699821B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104540115A (en) * | 2014-12-18 | 2015-04-22 | 小米科技有限责任公司 | Communication method and device |
WO2015085941A1 (en) * | 2013-12-13 | 2015-06-18 | 北京奇虎科技有限公司 | Method and device for processing stolen terminal |
CN104751086A (en) * | 2015-03-04 | 2015-07-01 | 深圳市金立通信设备有限公司 | Terminal anti-theft method |
CN104751087A (en) * | 2015-03-04 | 2015-07-01 | 深圳市金立通信设备有限公司 | Terminal |
CN105930138A (en) * | 2015-12-25 | 2016-09-07 | 中国银联股份有限公司 | Message processing method and apparatus |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050096094A1 (en) * | 2003-11-03 | 2005-05-05 | Samsung Electronics Co., Ltd. | Mobile terminal and system for providing total status information thereof at one time |
CN102780989A (en) * | 2012-07-06 | 2012-11-14 | 北京小米科技有限责任公司 | Method and system for preventing loss of mobile terminal |
CN102833712A (en) * | 2012-08-31 | 2012-12-19 | 北京小米科技有限责任公司 | Method, device, server and system for preventing information leakage and equipment |
CN102843405A (en) * | 2011-06-24 | 2012-12-26 | 基信康信息技术(上海)有限公司 | Mobile terminal, network server and method for anti-theft service of mobile terminal |
-
2013
- 2013-12-13 CN CN201310687600.5A patent/CN103699821B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050096094A1 (en) * | 2003-11-03 | 2005-05-05 | Samsung Electronics Co., Ltd. | Mobile terminal and system for providing total status information thereof at one time |
CN102843405A (en) * | 2011-06-24 | 2012-12-26 | 基信康信息技术(上海)有限公司 | Mobile terminal, network server and method for anti-theft service of mobile terminal |
CN102780989A (en) * | 2012-07-06 | 2012-11-14 | 北京小米科技有限责任公司 | Method and system for preventing loss of mobile terminal |
CN102833712A (en) * | 2012-08-31 | 2012-12-19 | 北京小米科技有限责任公司 | Method, device, server and system for preventing information leakage and equipment |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015085941A1 (en) * | 2013-12-13 | 2015-06-18 | 北京奇虎科技有限公司 | Method and device for processing stolen terminal |
US10078765B2 (en) | 2013-12-13 | 2018-09-18 | Beijing Qihoo Technology Company Limited | Method and device for processing stolen terminal |
CN104540115A (en) * | 2014-12-18 | 2015-04-22 | 小米科技有限责任公司 | Communication method and device |
CN104751086A (en) * | 2015-03-04 | 2015-07-01 | 深圳市金立通信设备有限公司 | Terminal anti-theft method |
CN104751087A (en) * | 2015-03-04 | 2015-07-01 | 深圳市金立通信设备有限公司 | Terminal |
CN105930138A (en) * | 2015-12-25 | 2016-09-07 | 中国银联股份有限公司 | Message processing method and apparatus |
CN105930138B (en) * | 2015-12-25 | 2019-05-10 | 中国银联股份有限公司 | A kind of message treatment method and device |
Also Published As
Publication number | Publication date |
---|---|
CN103699821B (en) | 2016-12-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103686667A (en) | Method and device for inquiring state of terminal | |
CN112689979B (en) | Article identity management method, terminal, microprocessor unit, identification device and system | |
CN105407074A (en) | Authentication method, apparatus and system | |
CN103699821A (en) | Processing method for stolen terminal and server | |
CN104283841A (en) | Method, device and system for carrying out service access control on third-party application | |
US20190354962A1 (en) | Distributed Ledger Payments Platform for Telecoms | |
CN104767613A (en) | Signature verification method, device and system | |
CN103152354B (en) | To method, system and client device that dangerous website is pointed out | |
CN104185158A (en) | Malicious short message processing method and client based on false base station | |
CN104202345A (en) | Verification code generating method, device and system | |
CN103702331A (en) | Mobile terminal antitheft method and client | |
CN106664308B (en) | Device authentication prior to enrollment | |
CN103136678A (en) | Identification method and device of intelligent terminal, processing method and device of identification information and identification system | |
CN103702299A (en) | Mobile terminal antitheft method and client | |
CN104134143A (en) | Mobile payment security protection method, mobile payment security protection device and cloud server | |
CN103702317A (en) | Mobile terminal antitheft method and client | |
CN103929411A (en) | Information displaying method, terminal, safety server and system | |
CN113641940A (en) | Page jump method, device, system, equipment and storage medium | |
CN103561115A (en) | Method, open platform and system for obtaining electronic codes in real-time mode | |
CN103634935A (en) | WPS (Wi-Fi protected setup) or QSS (quick secure setup)-based network accessing method and device | |
CN104715386A (en) | WeChat ID-based anti-fake method for achieving authentication of all bar codes | |
CN103702314A (en) | Stolen terminal processing method and equipment | |
CN102024124A (en) | Method, device and system for processing mobile widgets as well as client-side | |
CN108965108B (en) | Message pushing method and related equipment | |
CN103702315A (en) | Stolen terminal processing method and equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220727 Address after: Room 801, 8th floor, No. 104, floors 1-19, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing 100015 Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd. Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park) Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd. Patentee before: Qizhi software (Beijing) Co.,Ltd. |
|
TR01 | Transfer of patent right |