Summary of the invention
Technical problems to be solved in this application are to provide a kind of alarm method for mobile terminal and device, can realize mobile terminal loss or stolen after alarm as early as possible, to reduce the loss that in mobile terminal, user profile and documentation are illegally used.
In order to solve the problem, this application discloses a kind of alarm method for mobile terminal, comprising:
Whether monitoring exists the behavior of unloading SIM card;
When monitoring the behavior of unloading SIM card, utilizing SIM card to set up cell phone network, and gathering the end message preset;
When gathered end message meets default alert if, the cell phone network set up is utilized to perform actuation of an alarm.
Preferably, whether described monitoring exists the step of the behavior of unloading SIM card, comprising:
Utilize the transducer being positioned at described mobile terminal middle probe hole place, whether detection exists the behavior of inserting probe in this probe aperture.
Preferably, the described step utilizing SIM card to set up cell phone network, comprising:
Obtain the international mobile subscriber identity IMSI in client identification module SIM card;
Described IMSI is sent to network side, authentication procedure by described network side is after the described IMSI of identification;
Receive the verify data from described network side;
Mobile phone identification key K I is used to process to generate a response to this verify data;
This response is sent to described network side, is judged whether to allow corresponding mobile terminal to access cell phone network according to this response by described network side, and send corresponding authentication response;
Receive the authentication response from described network side, cell phone network has been set up.
Preferably, what described default end message comprised in following information is one or more: the quantity information of address list and the geographic position data of mobile terminal in the input number of times of startup password, mobile terminal.
Preferably, it is one or more that described default alert if comprises in following condition: the input number of times of startup password reaches preset times, and in mobile terminal, address list is cleared, and the geographic position data of mobile terminal is not in the geographic area of presetting.
Preferably, the cell phone network that described utilization is set up performs the step of actuation of an alarm, comprising:
To appointment, alert receipt side sends alert data; Wherein, described appointment alert receipt side comprises assigned telephone number and/or specifies email address.
Preferably, what described alert data comprised in following data is one or more: the short message data preset, the interim picture data of shooting and the geographic position data of mobile terminal.
On the other hand, disclosed herein as well is a kind of warning device for mobile terminal, comprising:
Monitoring modular, for monitoring the behavior that whether there is unloading SIM card;
Networking module, for when monitoring the behavior of unloading SIM card, utilizes SIM card to set up cell phone network;
Acquisition module, for when monitoring the behavior of unloading SIM card, gathers the end message preset; And
Alarm module, for when gathered end message meets default alert if, utilizes the cell phone network set up to perform actuation of an alarm.
Preferably, described monitoring modular comprises:
Transducer detection submodule, for utilizing the transducer being positioned at described mobile terminal middle probe hole place, whether detection exists the behavior of inserting probe in this probe aperture.
Preferably, described networking module comprises:
Identification code obtains submodule, for obtaining the international mobile subscriber identity IMSI in client identification module SIM card;
Identification code sends submodule, for described IMSI is sent to network side, and authentication procedure by described network side is after the described IMSI of identification;
Verify data receives submodule, for receiving the verify data from described network side;
Verify data process submodule, process to generate a response to this verify data for using mobile phone identification key K I, and this response is sent to described network side, judged whether to allow corresponding mobile terminal to access cell phone network according to this response by described network side, and send corresponding authentication response; And
Authentication response receives submodule, and receive the authentication response from described network side for authentication response, cell phone network has been set up.
Preferably, what described default end message comprised in following information is one or more: the quantity information of address list and the geographic position data of mobile terminal in the input number of times of startup password, mobile terminal.
Preferably, it is one or more that described default alert if comprises in following condition: the input number of times of startup password reaches preset times, and in mobile terminal, address list is cleared, and the geographic position data of mobile terminal is not in the geographic area of presetting.
Preferably, described alarm module comprises:
Alert data sends submodule, for sending alert data to appointment alert receipt side; Wherein, described appointment alert receipt side comprises assigned telephone number and/or specifies email address.
Preferably, what described alert data comprised in following data is one or more: the short message data preset, the interim picture data of shooting and the geographic position data of mobile terminal.
Compared with prior art, the application has the following advantages:
The application, when monitoring the behavior of unloading SIM card, utilizes SIM card to set up cell phone network, and when gathered end message meets default alert if, utilizes the cell phone network set up to perform actuation of an alarm, need to spend the regular hour because the behavior monitoring unloading SIM card to be separated to SIM card with mobile terminal, therefore the application can utilize SIM card to set up cell phone network within behavior this period of time that be separated with mobile terminal to SIM card monitoring unloading SIM card, therefore, relative to prior art some warning measures after mobile terminal changes SIM card, the application can realize mobile terminal loss or stolen after alarm as early as possible, to reduce the loss that in this period of time that the stolen and mobile phone of mobile phone changes between SIM card, in mobile terminal, user profile and documentation are illegally used.
Embodiment
For enabling above-mentioned purpose, the feature and advantage of the application more become apparent, below in conjunction with the drawings and specific embodiments, the application is described in further detail.
After stealing mobile terminal, in order to prevent mobile terminal reporting data or user tracking, thief can unload SIM card usually at once, the user profile of then preserving in illegal use mobile terminal and documentation.And when SIM card is unloaded, the connectivity port of mobile terminal and cell phone network, thus more existing actuation of an alarms (as in background technology the information notification of neocaine to the actuation of an alarm of user) cannot perform.
The embodiment of the present application, when monitoring the behavior of unloading SIM card, utilizes SIM card to set up cell phone network, and utilizes the cell phone network set up to perform actuation of an alarm; Need to spend the regular hour because the behavior monitoring unloading SIM card to be separated to SIM card with mobile terminal, therefore the application can utilize SIM card to set up cell phone network within behavior this period of time that be separated with mobile terminal to SIM card monitoring unloading SIM card, with realize mobile terminal lose or stolen after alarm as early as possible.
With reference to Fig. 1, show the flow chart of a kind of alarm method embodiment for mobile terminal of the application, specifically can comprise:
Whether step 101, monitoring exist the behavior of unloading SIM card;
The embodiment of the present application can be applied to the various mobile terminals being provided with SIM card, for realize mobile terminal loss or stolen after alarm as early as possible.
In the embodiment of the present application, the behavior of unloading SIM card is mainly used in representing the behavior preparing unloading SIM card.For Iphone mobile phone, there is probe aperture on its top, probe is inserted this probe aperture and namely the SIM card slot of SIM card from mobile phone can be ejected, reach the object that SIM card is separated with mobile phone; Wherein, detect the moment that moment that probe inserts this probe aperture is separated with mobile phone with SIM card, have certain time interval often, the SIM card that the embodiment of the present application utilizes this time interval to utilize and not yet unloads sets up cell phone network.
Therefore, in a preferred embodiment of the present application, whether described monitoring exists the step of the behavior of unloading SIM card, specifically can comprise: utilize the transducer being positioned at described mobile terminal middle probe hole place, and whether detection exists the behavior of inserting probe in this probe aperture.
Certainly, transducer is just as preferred embodiment, and be appreciated that in addition to the sensors, other can detect the device that whether there is the behavior of inserting probe in this probe aperture is also feasible.
Step 102, monitor unloading SIM card behavior time, utilize SIM card set up cell phone network, and gather preset end message;
In the embodiment of the present application, it is arbitrary that the cell phone network set up can comprise as in lower network: GSM(global system for mobile communications, Global System for Mobile Communications), CDMA(code division multiple access, Code Division Multiple Access), WCDMA(Wideband Code Division Multiple Access (WCDMA), WidebandCode Division Multiple Access) and TD-SCDMA(TD SDMA, TimeDivision-Synchronous Code Division Multiple Access) etc.; As long as be appreciated that set up cell phone network is subject to corresponding SIM card and supports, the embodiment of the present application is not limited the cell phone network set up.
Be described to utilize SIM card to set up GSM below, correspondingly, the described step 102 utilizing SIM card to set up cell phone network, specifically can comprise:
Sub-step S121, the international mobile subscriber identity IMSI(international mobile subscriber identity obtained in client identification module SIM card, International Mobile Subscriber IdentificationNumber);
Sub-step S122, described IMSI is sent to network side, authentication procedure by described network side is after the described IMSI of identification;
Sub-step S123, receive verify data from described network side;
Sub-step S124, use KI(mobile phone identification key, Key Identifier) process to generate a response to this verify data;
Sub-step S125, this response is sent to described network side, is judged whether to allow corresponding mobile terminal to access cell phone network according to this response by described network side, and send corresponding authentication response;
Sub-step S126, receive authentication response from described network side, cell phone network has been set up.
For the building process of the cell phone networks such as CDMA, WCDMA and TD-SCDMA, please refer to corresponding network standard, therefore not to repeat here.
Step 103, when gathered end message meets default alert if, the cell phone network set up is utilized to perform actuation of an alarm.
In practice, the behavior of unloading SIM card specifically can comprise: the behavior of the unloading SIM card that owner performs under normal condition (non-theft state), or, the behavior of the unloading SIM card that non-owner performs under stolen state.And the behavior of the unloading SIM card that owner is in normal state performed, without the need to reporting to the police, reporting to the police in such cases and easily unnecessary interference being caused to owner.
Therefore, in order to avoid the unnecessary interference caused owner of reporting to the police in normal state, the embodiment of the present application judges whether to need to report to the police according to the end message preset, concrete, when gathered end message meets default alert if, just reports to the police.
In specific implementation, described default end message and the alert if preset can be used for the foundation of alarm decision, and it can be determined according to actual conditions by those skilled in the art, and the embodiment of the present application is not limited concrete end message and alert if.
Such as, in a kind of embodiment of the application, it is one or more that described default end message specifically can comprise in following information: the quantity information of address list and the geographic position data of mobile terminal in the input number of times of startup password, mobile terminal.Wherein, the geographic position data of mobile terminal can comprise GPS(global positioning system, Global Positioning System) data etc.
In a kind of embodiment of the application, it is one or more that described default alert if specifically can comprise in following condition: the input number of times of startup password reaches preset times, in mobile terminal, address list is cleared, and the geographic position data of mobile terminal is not in the geographic area of presetting.Wherein, described preset times, default geographic area all can be determined according to actual conditions by those skilled in the art.
In the embodiment of the present application, actuation of an alarm can comprise: send SMS message, send mail, call, take pictures and send etc., the embodiment of the present application is not limited concrete actuation of an alarm.
In a kind of embodiment of the application, the cell phone network that described utilization is set up performs the step of actuation of an alarm, specifically can comprise: to appointment, alert receipt side sends alert data; Wherein, described appointment alert receipt side specifically can comprise assigned telephone number and/or specify email address.
In a kind of application example of the application, it is one or more that described alert data specifically can comprise in following data: the short message preset, the interim photo of shooting and the geographic position data of mobile terminal.
For making those skilled in the art understand the application better, with reference to Fig. 2, showing the flow chart of a kind of alarm method embodiment for internet-of-things terminal of the application, specifically can comprise:
Step 201, utilization are positioned at the transducer at internet-of-things terminal middle probe hole place, and whether detection exists the behavior of inserting probe in this probe aperture;
Step 202, when detecting the behavior of inserting probe in this probe aperture, utilize SIM card set up cell phone network;
Step 203, when detecting the behavior of inserting probe in this probe aperture, gather the gps data of this internet-of-things terminal;
Step 204, judge that the gps data of this internet-of-things terminal is whether in the geography fence preset, and if not, then performs step 205;
Wherein, described default geography fence can be the geography fence residing for placement position of internet-of-things terminal.
Step 205, to take pictures, and utilize the cell phone network set up that captured photo is sent to specified mobile phone number.
Corresponding to preceding method embodiment, the embodiment of the present application additionally provides a kind of warning device for mobile terminal, with reference to the structure chart shown in Fig. 3, specifically can comprise:
Monitoring modular 301, for monitoring the behavior that whether there is unloading SIM card;
Networking module 302, for when monitoring the behavior of unloading SIM card, utilizes SIM card to set up cell phone network;
Acquisition module 303, for when monitoring the behavior of unloading SIM card, gathers the end message preset; And
Alarm module 304, for when gathered end message meets default alert if, utilizes the cell phone network set up to perform actuation of an alarm.
In a preferred embodiment of the present application, described monitoring modular 301 specifically can comprise:
Transducer detection submodule, for utilizing the transducer being positioned at described mobile terminal middle probe hole place, whether detection exists the behavior of inserting probe in this probe aperture.
In another preferred embodiment of the present application, described networking module 302 specifically can comprise:
Identification code obtains submodule, for obtaining the international mobile subscriber identity IMSI in client identification module SIM card;
Identification code sends submodule, for described IMSI is sent to network side, and authentication procedure by described network side is after the described IMSI of identification;
Verify data receives submodule, for receiving the verify data from described network side;
Verify data process submodule, process to generate a response to this verify data for using mobile phone identification key K I, and this response is sent to described network side, judged whether to allow corresponding mobile terminal to access cell phone network according to this response by described network side, and send corresponding authentication response; And
Authentication response receives submodule, and receive the authentication response from described network side for authentication response, cell phone network has been set up.
In the embodiment of the present application, preferably, what described default end message specifically can comprise in following data is one or more: the quantity information of address list and the geographic position data of mobile terminal in the input number of times of startup password, mobile terminal.
In the embodiment of the present application, preferably, it is one or more that described default alert if specifically can comprise in following condition: the input number of times of startup password reaches preset times, in mobile terminal, address list is cleared, and the geographic position data of mobile terminal is not in the geographic area of presetting.
In a preferred embodiment of the present application, described alarm module 304 specifically can comprise:
Alert data sends submodule, for sending alert data to appointment alert receipt side; Wherein, described appointment alert receipt side comprises assigned telephone number and/or specifies email address.
In the embodiment of the present application, preferably, what described alert data specifically can comprise in following data is one or more: the short message preset, the interim photo of shooting and the geographic position data of mobile terminal.
In actual applications, the described warning device for mobile terminal can be positioned at mobile terminal, wherein, monitoring modular 301 realizes by sensor device, and networking module 302, acquisition module 303 and alarm module 304 etc. can as the software modules of mobile terminal operating system.
Each embodiment in this specification all adopts the mode of going forward one by one to describe, and what each embodiment stressed is the difference with other embodiments, between each embodiment identical similar part mutually see.For device embodiment, due to itself and embodiment of the method basic simlarity, so description is fairly simple, relevant part illustrates see the part of embodiment of the method.
A kind of alarm method for mobile terminal above the application provided and device, be described in detail, apply specific case herein to set forth the principle of the application and execution mode, the explanation of above embodiment is just for helping method and the core concept thereof of understanding the application; Meanwhile, for one of ordinary skill in the art, according to the thought of the application, all will change in specific embodiments and applications, in sum, this description should not be construed as the restriction to the application.