CN104519491A - Alarm method and alarm device for mobile terminals - Google Patents

Alarm method and alarm device for mobile terminals Download PDF

Info

Publication number
CN104519491A
CN104519491A CN201310462464.XA CN201310462464A CN104519491A CN 104519491 A CN104519491 A CN 104519491A CN 201310462464 A CN201310462464 A CN 201310462464A CN 104519491 A CN104519491 A CN 104519491A
Authority
CN
China
Prior art keywords
mobile terminal
sim card
data
alert
behavior
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310462464.XA
Other languages
Chinese (zh)
Other versions
CN104519491B (en
Inventor
李斌
任晓丹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Datang Telecom Tianjin Communication Terminal Manufacture Co Ltd
Original Assignee
Datang Telecom Tianjin Communication Terminal Manufacture Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Datang Telecom Tianjin Communication Terminal Manufacture Co Ltd filed Critical Datang Telecom Tianjin Communication Terminal Manufacture Co Ltd
Priority to CN201310462464.XA priority Critical patent/CN104519491B/en
Publication of CN104519491A publication Critical patent/CN104519491A/en
Application granted granted Critical
Publication of CN104519491B publication Critical patent/CN104519491B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M11/00Telephonic communication systems specially adapted for combination with other electrical systems
    • H04M11/04Telephonic communication systems specially adapted for combination with other electrical systems with alarm systems, e.g. fire, police or burglar alarm systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides an alarm method and an alarm device for mobile terminals. The method specifically includes: monitoring whether the behavior of removing an SIM (subscriber identity module) card exists or not; when the behavior of removing the SIM card is monitored, establishing a mobile phone network with the SIM card, and collecting preset terminal information; when the collected preset terminal information conforms to preset alarm conditions, utilizing the established mobile phone network to execute alarm action. By the method and the device, alarm prompt is realized as soon as possible after the mobile terminals are lost or stolen, so that loss caused by the fact that user information and documents in the mobile terminals are used illegally is reduced.

Description

A kind of alarm method for mobile terminal and device
Technical field
The application relates to communication technical field, particularly relates to a kind of alarm method for mobile terminal and device.
Background technology
At present, day by day universal along with mobile terminals such as mobile phones, the stolen phenomenon of mobile terminal is also more and more serious.Such as, for realizing the tasks such as environmental monitoring.But be in the layout of the internet-of-things terminal in unattended operation area, the general layout of internet-of-things terminal, in unattended places such as fields, is easy to stolen.
It is a thing being substantially difficult to realize that mobile phone is thought again to give for change after stolen, therefore market is in the urgent need to a kind of mobile phone with warning function, warning information can be sent from trend user after making hand-set from stolen, make original user according to information, for getting back mobile phone creates possible condition.
The more existing alarm method for mobile phone, as long as change SIM(client identification module, SubscriberIdentity Module) card, mobile phone just the information notification of neocaine to user, make user can take the operation such as locking mobile phone, locking card, also for user's getting back mobile phone is given a clue.
But, these current alarm methods for mobile phone just change some remedial measures after SIM card for mobile phone, and stolen and mobile phone is changed in this period of time between SIM card at mobile phone, the user profile of preserving in machine and documentation may be illegally used, and cause bringing even more serious loss to user.
Summary of the invention
Technical problems to be solved in this application are to provide a kind of alarm method for mobile terminal and device, can realize mobile terminal loss or stolen after alarm as early as possible, to reduce the loss that in mobile terminal, user profile and documentation are illegally used.
In order to solve the problem, this application discloses a kind of alarm method for mobile terminal, comprising:
Whether monitoring exists the behavior of unloading SIM card;
When monitoring the behavior of unloading SIM card, utilizing SIM card to set up cell phone network, and gathering the end message preset;
When gathered end message meets default alert if, the cell phone network set up is utilized to perform actuation of an alarm.
Preferably, whether described monitoring exists the step of the behavior of unloading SIM card, comprising:
Utilize the transducer being positioned at described mobile terminal middle probe hole place, whether detection exists the behavior of inserting probe in this probe aperture.
Preferably, the described step utilizing SIM card to set up cell phone network, comprising:
Obtain the international mobile subscriber identity IMSI in client identification module SIM card;
Described IMSI is sent to network side, authentication procedure by described network side is after the described IMSI of identification;
Receive the verify data from described network side;
Mobile phone identification key K I is used to process to generate a response to this verify data;
This response is sent to described network side, is judged whether to allow corresponding mobile terminal to access cell phone network according to this response by described network side, and send corresponding authentication response;
Receive the authentication response from described network side, cell phone network has been set up.
Preferably, what described default end message comprised in following information is one or more: the quantity information of address list and the geographic position data of mobile terminal in the input number of times of startup password, mobile terminal.
Preferably, it is one or more that described default alert if comprises in following condition: the input number of times of startup password reaches preset times, and in mobile terminal, address list is cleared, and the geographic position data of mobile terminal is not in the geographic area of presetting.
Preferably, the cell phone network that described utilization is set up performs the step of actuation of an alarm, comprising:
To appointment, alert receipt side sends alert data; Wherein, described appointment alert receipt side comprises assigned telephone number and/or specifies email address.
Preferably, what described alert data comprised in following data is one or more: the short message data preset, the interim picture data of shooting and the geographic position data of mobile terminal.
On the other hand, disclosed herein as well is a kind of warning device for mobile terminal, comprising:
Monitoring modular, for monitoring the behavior that whether there is unloading SIM card;
Networking module, for when monitoring the behavior of unloading SIM card, utilizes SIM card to set up cell phone network;
Acquisition module, for when monitoring the behavior of unloading SIM card, gathers the end message preset; And
Alarm module, for when gathered end message meets default alert if, utilizes the cell phone network set up to perform actuation of an alarm.
Preferably, described monitoring modular comprises:
Transducer detection submodule, for utilizing the transducer being positioned at described mobile terminal middle probe hole place, whether detection exists the behavior of inserting probe in this probe aperture.
Preferably, described networking module comprises:
Identification code obtains submodule, for obtaining the international mobile subscriber identity IMSI in client identification module SIM card;
Identification code sends submodule, for described IMSI is sent to network side, and authentication procedure by described network side is after the described IMSI of identification;
Verify data receives submodule, for receiving the verify data from described network side;
Verify data process submodule, process to generate a response to this verify data for using mobile phone identification key K I, and this response is sent to described network side, judged whether to allow corresponding mobile terminal to access cell phone network according to this response by described network side, and send corresponding authentication response; And
Authentication response receives submodule, and receive the authentication response from described network side for authentication response, cell phone network has been set up.
Preferably, what described default end message comprised in following information is one or more: the quantity information of address list and the geographic position data of mobile terminal in the input number of times of startup password, mobile terminal.
Preferably, it is one or more that described default alert if comprises in following condition: the input number of times of startup password reaches preset times, and in mobile terminal, address list is cleared, and the geographic position data of mobile terminal is not in the geographic area of presetting.
Preferably, described alarm module comprises:
Alert data sends submodule, for sending alert data to appointment alert receipt side; Wherein, described appointment alert receipt side comprises assigned telephone number and/or specifies email address.
Preferably, what described alert data comprised in following data is one or more: the short message data preset, the interim picture data of shooting and the geographic position data of mobile terminal.
Compared with prior art, the application has the following advantages:
The application, when monitoring the behavior of unloading SIM card, utilizes SIM card to set up cell phone network, and when gathered end message meets default alert if, utilizes the cell phone network set up to perform actuation of an alarm, need to spend the regular hour because the behavior monitoring unloading SIM card to be separated to SIM card with mobile terminal, therefore the application can utilize SIM card to set up cell phone network within behavior this period of time that be separated with mobile terminal to SIM card monitoring unloading SIM card, therefore, relative to prior art some warning measures after mobile terminal changes SIM card, the application can realize mobile terminal loss or stolen after alarm as early as possible, to reduce the loss that in this period of time that the stolen and mobile phone of mobile phone changes between SIM card, in mobile terminal, user profile and documentation are illegally used.
Accompanying drawing explanation
Fig. 1 is the flow chart of a kind of alarm method embodiment for mobile terminal of the application;
Fig. 2 is the flow chart of a kind of alarm method embodiment for internet-of-things terminal of the application;
Fig. 3 is the structure chart of a kind of warning device embodiment for mobile terminal of the application.
Embodiment
For enabling above-mentioned purpose, the feature and advantage of the application more become apparent, below in conjunction with the drawings and specific embodiments, the application is described in further detail.
After stealing mobile terminal, in order to prevent mobile terminal reporting data or user tracking, thief can unload SIM card usually at once, the user profile of then preserving in illegal use mobile terminal and documentation.And when SIM card is unloaded, the connectivity port of mobile terminal and cell phone network, thus more existing actuation of an alarms (as in background technology the information notification of neocaine to the actuation of an alarm of user) cannot perform.
The embodiment of the present application, when monitoring the behavior of unloading SIM card, utilizes SIM card to set up cell phone network, and utilizes the cell phone network set up to perform actuation of an alarm; Need to spend the regular hour because the behavior monitoring unloading SIM card to be separated to SIM card with mobile terminal, therefore the application can utilize SIM card to set up cell phone network within behavior this period of time that be separated with mobile terminal to SIM card monitoring unloading SIM card, with realize mobile terminal lose or stolen after alarm as early as possible.
With reference to Fig. 1, show the flow chart of a kind of alarm method embodiment for mobile terminal of the application, specifically can comprise:
Whether step 101, monitoring exist the behavior of unloading SIM card;
The embodiment of the present application can be applied to the various mobile terminals being provided with SIM card, for realize mobile terminal loss or stolen after alarm as early as possible.
In the embodiment of the present application, the behavior of unloading SIM card is mainly used in representing the behavior preparing unloading SIM card.For Iphone mobile phone, there is probe aperture on its top, probe is inserted this probe aperture and namely the SIM card slot of SIM card from mobile phone can be ejected, reach the object that SIM card is separated with mobile phone; Wherein, detect the moment that moment that probe inserts this probe aperture is separated with mobile phone with SIM card, have certain time interval often, the SIM card that the embodiment of the present application utilizes this time interval to utilize and not yet unloads sets up cell phone network.
Therefore, in a preferred embodiment of the present application, whether described monitoring exists the step of the behavior of unloading SIM card, specifically can comprise: utilize the transducer being positioned at described mobile terminal middle probe hole place, and whether detection exists the behavior of inserting probe in this probe aperture.
Certainly, transducer is just as preferred embodiment, and be appreciated that in addition to the sensors, other can detect the device that whether there is the behavior of inserting probe in this probe aperture is also feasible.
Step 102, monitor unloading SIM card behavior time, utilize SIM card set up cell phone network, and gather preset end message;
In the embodiment of the present application, it is arbitrary that the cell phone network set up can comprise as in lower network: GSM(global system for mobile communications, Global System for Mobile Communications), CDMA(code division multiple access, Code Division Multiple Access), WCDMA(Wideband Code Division Multiple Access (WCDMA), WidebandCode Division Multiple Access) and TD-SCDMA(TD SDMA, TimeDivision-Synchronous Code Division Multiple Access) etc.; As long as be appreciated that set up cell phone network is subject to corresponding SIM card and supports, the embodiment of the present application is not limited the cell phone network set up.
Be described to utilize SIM card to set up GSM below, correspondingly, the described step 102 utilizing SIM card to set up cell phone network, specifically can comprise:
Sub-step S121, the international mobile subscriber identity IMSI(international mobile subscriber identity obtained in client identification module SIM card, International Mobile Subscriber IdentificationNumber);
Sub-step S122, described IMSI is sent to network side, authentication procedure by described network side is after the described IMSI of identification;
Sub-step S123, receive verify data from described network side;
Sub-step S124, use KI(mobile phone identification key, Key Identifier) process to generate a response to this verify data;
Sub-step S125, this response is sent to described network side, is judged whether to allow corresponding mobile terminal to access cell phone network according to this response by described network side, and send corresponding authentication response;
Sub-step S126, receive authentication response from described network side, cell phone network has been set up.
For the building process of the cell phone networks such as CDMA, WCDMA and TD-SCDMA, please refer to corresponding network standard, therefore not to repeat here.
Step 103, when gathered end message meets default alert if, the cell phone network set up is utilized to perform actuation of an alarm.
In practice, the behavior of unloading SIM card specifically can comprise: the behavior of the unloading SIM card that owner performs under normal condition (non-theft state), or, the behavior of the unloading SIM card that non-owner performs under stolen state.And the behavior of the unloading SIM card that owner is in normal state performed, without the need to reporting to the police, reporting to the police in such cases and easily unnecessary interference being caused to owner.
Therefore, in order to avoid the unnecessary interference caused owner of reporting to the police in normal state, the embodiment of the present application judges whether to need to report to the police according to the end message preset, concrete, when gathered end message meets default alert if, just reports to the police.
In specific implementation, described default end message and the alert if preset can be used for the foundation of alarm decision, and it can be determined according to actual conditions by those skilled in the art, and the embodiment of the present application is not limited concrete end message and alert if.
Such as, in a kind of embodiment of the application, it is one or more that described default end message specifically can comprise in following information: the quantity information of address list and the geographic position data of mobile terminal in the input number of times of startup password, mobile terminal.Wherein, the geographic position data of mobile terminal can comprise GPS(global positioning system, Global Positioning System) data etc.
In a kind of embodiment of the application, it is one or more that described default alert if specifically can comprise in following condition: the input number of times of startup password reaches preset times, in mobile terminal, address list is cleared, and the geographic position data of mobile terminal is not in the geographic area of presetting.Wherein, described preset times, default geographic area all can be determined according to actual conditions by those skilled in the art.
In the embodiment of the present application, actuation of an alarm can comprise: send SMS message, send mail, call, take pictures and send etc., the embodiment of the present application is not limited concrete actuation of an alarm.
In a kind of embodiment of the application, the cell phone network that described utilization is set up performs the step of actuation of an alarm, specifically can comprise: to appointment, alert receipt side sends alert data; Wherein, described appointment alert receipt side specifically can comprise assigned telephone number and/or specify email address.
In a kind of application example of the application, it is one or more that described alert data specifically can comprise in following data: the short message preset, the interim photo of shooting and the geographic position data of mobile terminal.
For making those skilled in the art understand the application better, with reference to Fig. 2, showing the flow chart of a kind of alarm method embodiment for internet-of-things terminal of the application, specifically can comprise:
Step 201, utilization are positioned at the transducer at internet-of-things terminal middle probe hole place, and whether detection exists the behavior of inserting probe in this probe aperture;
Step 202, when detecting the behavior of inserting probe in this probe aperture, utilize SIM card set up cell phone network;
Step 203, when detecting the behavior of inserting probe in this probe aperture, gather the gps data of this internet-of-things terminal;
Step 204, judge that the gps data of this internet-of-things terminal is whether in the geography fence preset, and if not, then performs step 205;
Wherein, described default geography fence can be the geography fence residing for placement position of internet-of-things terminal.
Step 205, to take pictures, and utilize the cell phone network set up that captured photo is sent to specified mobile phone number.
Corresponding to preceding method embodiment, the embodiment of the present application additionally provides a kind of warning device for mobile terminal, with reference to the structure chart shown in Fig. 3, specifically can comprise:
Monitoring modular 301, for monitoring the behavior that whether there is unloading SIM card;
Networking module 302, for when monitoring the behavior of unloading SIM card, utilizes SIM card to set up cell phone network;
Acquisition module 303, for when monitoring the behavior of unloading SIM card, gathers the end message preset; And
Alarm module 304, for when gathered end message meets default alert if, utilizes the cell phone network set up to perform actuation of an alarm.
In a preferred embodiment of the present application, described monitoring modular 301 specifically can comprise:
Transducer detection submodule, for utilizing the transducer being positioned at described mobile terminal middle probe hole place, whether detection exists the behavior of inserting probe in this probe aperture.
In another preferred embodiment of the present application, described networking module 302 specifically can comprise:
Identification code obtains submodule, for obtaining the international mobile subscriber identity IMSI in client identification module SIM card;
Identification code sends submodule, for described IMSI is sent to network side, and authentication procedure by described network side is after the described IMSI of identification;
Verify data receives submodule, for receiving the verify data from described network side;
Verify data process submodule, process to generate a response to this verify data for using mobile phone identification key K I, and this response is sent to described network side, judged whether to allow corresponding mobile terminal to access cell phone network according to this response by described network side, and send corresponding authentication response; And
Authentication response receives submodule, and receive the authentication response from described network side for authentication response, cell phone network has been set up.
In the embodiment of the present application, preferably, what described default end message specifically can comprise in following data is one or more: the quantity information of address list and the geographic position data of mobile terminal in the input number of times of startup password, mobile terminal.
In the embodiment of the present application, preferably, it is one or more that described default alert if specifically can comprise in following condition: the input number of times of startup password reaches preset times, in mobile terminal, address list is cleared, and the geographic position data of mobile terminal is not in the geographic area of presetting.
In a preferred embodiment of the present application, described alarm module 304 specifically can comprise:
Alert data sends submodule, for sending alert data to appointment alert receipt side; Wherein, described appointment alert receipt side comprises assigned telephone number and/or specifies email address.
In the embodiment of the present application, preferably, what described alert data specifically can comprise in following data is one or more: the short message preset, the interim photo of shooting and the geographic position data of mobile terminal.
In actual applications, the described warning device for mobile terminal can be positioned at mobile terminal, wherein, monitoring modular 301 realizes by sensor device, and networking module 302, acquisition module 303 and alarm module 304 etc. can as the software modules of mobile terminal operating system.
Each embodiment in this specification all adopts the mode of going forward one by one to describe, and what each embodiment stressed is the difference with other embodiments, between each embodiment identical similar part mutually see.For device embodiment, due to itself and embodiment of the method basic simlarity, so description is fairly simple, relevant part illustrates see the part of embodiment of the method.
A kind of alarm method for mobile terminal above the application provided and device, be described in detail, apply specific case herein to set forth the principle of the application and execution mode, the explanation of above embodiment is just for helping method and the core concept thereof of understanding the application; Meanwhile, for one of ordinary skill in the art, according to the thought of the application, all will change in specific embodiments and applications, in sum, this description should not be construed as the restriction to the application.

Claims (14)

1. for an alarm method for mobile terminal, it is characterized in that, comprising:
Whether monitoring exists the behavior of unloading SIM card;
When monitoring the behavior of unloading SIM card, utilizing SIM card to set up cell phone network, and gathering the end message preset;
When gathered end message meets default alert if, the cell phone network set up is utilized to perform actuation of an alarm.
2. the method for claim 1, is characterized in that, whether described monitoring exists the step of the behavior of unloading SIM card, comprising:
Utilize the transducer being positioned at described mobile terminal middle probe hole place, whether detection exists the behavior of inserting probe in this probe aperture.
3. the method for claim 1, is characterized in that, the described step utilizing SIM card to set up cell phone network, comprising:
Obtain the international mobile subscriber identity IMSI in client identification module SIM card;
Described IMSI is sent to network side, authentication procedure by described network side is after the described IMSI of identification;
Receive the verify data from described network side;
Mobile phone identification key K I is used to process to generate a response to this verify data;
This response is sent to described network side, is judged whether to allow corresponding mobile terminal to access cell phone network according to this response by described network side, and send corresponding authentication response;
Receive the authentication response from described network side, cell phone network has been set up.
4. the method as described in claim 1 or 2 or 3, is characterized in that, it is one or more that described default end message comprises in following information: the quantity information of address list and the geographic position data of mobile terminal in the input number of times of startup password, mobile terminal.
5. method according to claim 4, it is characterized in that, it is one or more that described default alert if comprises in following condition: the input number of times of startup password reaches preset times, in mobile terminal, address list is cleared, and the geographic position data of mobile terminal is not in the geographic area of presetting.
6. the method as described in claim 1 or 2 or 3, is characterized in that, the cell phone network that described utilization is set up performs the step of actuation of an alarm, comprising:
To appointment, alert receipt side sends alert data; Wherein, described appointment alert receipt side comprises assigned telephone number and/or specifies email address.
7. method as claimed in claim 6, is characterized in that, it is one or more that described alert data comprises in following data: the short message data preset, the interim picture data of shooting and the geographic position data of mobile terminal.
8. for a warning device for mobile terminal, it is characterized in that, comprising:
Monitoring modular, for monitoring the behavior that whether there is unloading SIM card;
Networking module, for when monitoring the behavior of unloading SIM card, utilizes SIM card to set up cell phone network;
Acquisition module, for when monitoring the behavior of unloading SIM card, gathers the end message preset; And
Alarm module, for when gathered end message meets default alert if, utilizes the cell phone network set up to perform actuation of an alarm.
9. device as claimed in claim 8, it is characterized in that, described monitoring modular comprises:
Transducer detection submodule, for utilizing the transducer being positioned at described mobile terminal middle probe hole place, whether detection exists the behavior of inserting probe in this probe aperture.
10. device as claimed in claim 8, it is characterized in that, described networking module comprises:
Identification code obtains submodule, for obtaining the international mobile subscriber identity IMSI in client identification module SIM card;
Identification code sends submodule, for described IMSI is sent to network side, and authentication procedure by described network side is after the described IMSI of identification;
Verify data receives submodule, for receiving the verify data from described network side;
Verify data process submodule, process to generate a response to this verify data for using mobile phone identification key K I, and this response is sent to described network side, judged whether to allow corresponding mobile terminal to access cell phone network according to this response by described network side, and send corresponding authentication response; And
Authentication response receives submodule, and receive the authentication response from described network side for authentication response, cell phone network has been set up.
11. devices as described in claim 8 or 9 or 10, it is characterized in that, it is one or more that described default end message comprises in following information: the quantity information of address list and the geographic position data of mobile terminal in the input number of times of startup password, mobile terminal.
12. devices according to claim 11, it is characterized in that, it is one or more that described default alert if comprises in following condition: the input number of times of startup password reaches preset times, in mobile terminal, address list is cleared, and the geographic position data of mobile terminal is not in the geographic area of presetting.
13. devices as described in claim 8 or 9 or 10, it is characterized in that, described alarm module comprises:
Alert data sends submodule, for sending alert data to appointment alert receipt side; Wherein, described appointment alert receipt side comprises assigned telephone number and/or specifies email address.
14. devices stated as claim 13, is characterized in that, it is one or more that described alert data comprises in following data: the short message data preset, the interim picture data of shooting and the geographic position data of mobile terminal.
CN201310462464.XA 2013-09-30 2013-09-30 A kind of alarm method and device for mobile terminal Active CN104519491B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310462464.XA CN104519491B (en) 2013-09-30 2013-09-30 A kind of alarm method and device for mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310462464.XA CN104519491B (en) 2013-09-30 2013-09-30 A kind of alarm method and device for mobile terminal

Publications (2)

Publication Number Publication Date
CN104519491A true CN104519491A (en) 2015-04-15
CN104519491B CN104519491B (en) 2017-12-05

Family

ID=52794094

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310462464.XA Active CN104519491B (en) 2013-09-30 2013-09-30 A kind of alarm method and device for mobile terminal

Country Status (1)

Country Link
CN (1) CN104519491B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109606311A (en) * 2017-09-30 2019-04-12 比亚迪汽车工业有限公司 Vehicle authentication method, device and storage medium
WO2021000319A1 (en) * 2019-07-04 2021-01-07 华为技术有限公司 Method, apparatus, and system for ensuring terminal security

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2471039Y (en) * 2000-11-01 2002-01-09 张军 Mobile phone antitheft lock
CN201374818Y (en) * 2009-02-27 2009-12-30 卢坤 Novel anti-theft cellphone
CN102196438A (en) * 2010-03-16 2011-09-21 高通股份有限公司 Communication terminal identifier management methods and device
CN102231882A (en) * 2011-07-08 2011-11-02 康佳集团股份有限公司 Method and device for obtaining information in lost mobile communication terminal
CN102665004A (en) * 2012-04-26 2012-09-12 南京云恒瑞通网络科技有限责任公司 Anti-theft method by using mobile phones to photograph
CN202679426U (en) * 2012-07-26 2013-01-16 深圳市赛格导航科技股份有限公司 Mobile terminal anti-theft device
WO2013110436A1 (en) * 2012-01-27 2013-08-01 Alcatel Lucent Mobile communication device tracing

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2471039Y (en) * 2000-11-01 2002-01-09 张军 Mobile phone antitheft lock
CN201374818Y (en) * 2009-02-27 2009-12-30 卢坤 Novel anti-theft cellphone
CN102196438A (en) * 2010-03-16 2011-09-21 高通股份有限公司 Communication terminal identifier management methods and device
CN102231882A (en) * 2011-07-08 2011-11-02 康佳集团股份有限公司 Method and device for obtaining information in lost mobile communication terminal
WO2013110436A1 (en) * 2012-01-27 2013-08-01 Alcatel Lucent Mobile communication device tracing
CN102665004A (en) * 2012-04-26 2012-09-12 南京云恒瑞通网络科技有限责任公司 Anti-theft method by using mobile phones to photograph
CN202679426U (en) * 2012-07-26 2013-01-16 深圳市赛格导航科技股份有限公司 Mobile terminal anti-theft device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109606311A (en) * 2017-09-30 2019-04-12 比亚迪汽车工业有限公司 Vehicle authentication method, device and storage medium
WO2021000319A1 (en) * 2019-07-04 2021-01-07 华为技术有限公司 Method, apparatus, and system for ensuring terminal security

Also Published As

Publication number Publication date
CN104519491B (en) 2017-12-05

Similar Documents

Publication Publication Date Title
US8055306B2 (en) Mobile phone alert system and method
EP2621202B1 (en) Mobile communication device tracing
Dabrowski et al. The messenger shoots back: Network operator based IMSI catcher detection
US20120276924A1 (en) System and method for positioning mobile terminal, and mobile terminal
WO2015114710A1 (en) Apparatus and methods for tracking in wireless communication systems in response to an activation event
US20170118679A1 (en) Event Based eUICC Fall-Back
US11044276B2 (en) Cellular security framework
EP2679073A1 (en) Enabling ip-communication with a machine to machine unit
US9179259B2 (en) Recognizing unknown actors based on wireless behavior
EP2912863A1 (en) Cost optimization for firmware updates for globally mobile machine-to-machine devices
CN111095960A (en) ESIM profile provisioning between proximate devices
US20160373880A1 (en) Subscription-aware and updates-aware sim process
US10638324B2 (en) Method and fake base station for detecting subscriber identity
CN105794240A (en) Method, apparatus, computer program product to fallback to an alternative subscription during an eUICC subscription change
CN101808116A (en) Method for monitoring network camera by using mobile phone and system file server thereof
CN111065049B (en) Positioning method and device of Bluetooth equipment
US20140243045A1 (en) Method for provisioning of a sim card
US10104215B2 (en) Blacklist management method and device
US20120172039A1 (en) System and method for securing lost terminal using wireless network
CN101877848A (en) Mobile terminal, mobile terminal data protection method and mobile terminal monitoring system
CN104519491A (en) Alarm method and alarm device for mobile terminals
CN101232677A (en) Method and apparatus for start-up logging of mobile terminal
CN102547249A (en) 3G (3rd Generation) network-based video surveillance point-to-point access method
EP2502178A1 (en) Multiple device loss status retrieval without id provision
CN108390912B (en) Method and device for acquiring multi-terminal test data

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C53 Correction of patent of invention or patent application
CB02 Change of applicant information

Address after: 100094 Yongjia North Road, Beijing, No. 6, No.

Applicant after: DATANG TERMINAL EQUIPMENT CO., LTD.

Address before: 100000, No. 15 Garden Garden Road, 4, Beijing, Haidian District

Applicant before: Datang Telecom (Tianjin) Communication Terminal Manufacture Co., Ltd.

COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 100000 HAIDIAN, BEIJING TO: 100094 HAIDIAN, BEIJING

Free format text: CORRECT: APPLICANT; FROM: DATANG TELECOM (TIANJIN) COMMUNICATION TERMINAL MANUFACTURE CO., LTD. TO: DATANG TERMINAL EQUIPMENT CO., LTD.

GR01 Patent grant
GR01 Patent grant