CN104519491B - A kind of alarm method and device for mobile terminal - Google Patents

A kind of alarm method and device for mobile terminal Download PDF

Info

Publication number
CN104519491B
CN104519491B CN201310462464.XA CN201310462464A CN104519491B CN 104519491 B CN104519491 B CN 104519491B CN 201310462464 A CN201310462464 A CN 201310462464A CN 104519491 B CN104519491 B CN 104519491B
Authority
CN
China
Prior art keywords
mobile terminal
data
sim card
default
cell phone
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310462464.XA
Other languages
Chinese (zh)
Other versions
CN104519491A (en
Inventor
李斌
任晓丹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Datang Terminal Equipment Co Ltd
Original Assignee
Datang Terminal Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Datang Terminal Equipment Co Ltd filed Critical Datang Terminal Equipment Co Ltd
Priority to CN201310462464.XA priority Critical patent/CN104519491B/en
Publication of CN104519491A publication Critical patent/CN104519491A/en
Application granted granted Critical
Publication of CN104519491B publication Critical patent/CN104519491B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M11/00Telephonic communication systems specially adapted for combination with other electrical systems
    • H04M11/04Telephonic communication systems specially adapted for combination with other electrical systems with alarm systems, e.g. fire, police or burglar alarm systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

This application provides a kind of alarm method and device for mobile terminal, method therein specifically includes:Monitor whether the behavior of unloading SIM card be present;When monitoring to unload the behavior of SIM card, cell phone network, and the default end message of collection are set up using SIM card;When the end message gathered meets default alert if, set up cell phone network is utilized to perform actuation of an alarm.The application can realize mobile terminal alarm as early as possible after losing or be stolen, to reduce the loss that user profile and documentation are illegally used in mobile terminal.

Description

A kind of alarm method and device for mobile terminal
Technical field
The application is related to communication technical field, more particularly to a kind of alarm method and device for mobile terminal.
Background technology
At present, becoming increasingly popular with mobile terminals such as mobile phones, the stolen phenomenon of mobile terminal are also increasingly severe.Example Such as, to realize the tasks such as environmental monitoring.But the internet-of-things terminal in unattended area is in the layout of, internet-of-things terminal typically layout exists The unattended place such as field, it is easy to stolen.
It is a thing being difficult to substantially that mobile phone is thought to give for change again after stolen, therefore there is an urgent need to one kind tool in market There is the mobile phone of warning function so that warning information can be issued the user with after hand-set from stolen automatically, makes original user according to information, Possible condition is created for getting back mobile phone.
The more existing alarm method for mobile phone, as long as changing SIM(Client identification module, Subscriber Identity Module)Card, mobile phone are just informed the information of neocaine to user so that user can take locking mobile phone, locking The operation such as card, also gives a clue for user's getting back mobile phone.
However, these current are remedied just for some after mobile phone replacing SIM card for the alarm method of mobile phone and arranged Apply, and in mobile phone is stolen and mobile phone changes this period of time between SIM card, the user profile and documentation that are preserved in machine It may be illegally used, cause to bring even more serious loss to user.
The content of the invention
Technical problems to be solved in this application are to provide a kind of alarm method and device for mobile terminal, Neng Goushi Existing mobile terminal alarm as early as possible after losing or be stolen, it is illegal to reduce user profile and documentation in mobile terminal The loss used.
In order to solve the above problems, this application discloses a kind of alarm method for mobile terminal, including:
Monitor whether the behavior of unloading SIM card be present;
When monitoring to unload the behavior of SIM card, cell phone network, and the default terminal letter of collection are set up using SIM card Breath;
When the end message gathered meets default alert if, set up cell phone network is utilized to perform alarm dynamic Make.
Preferably, it is described to monitor whether the step of behavior of unloading SIM card be present, including:
Using the sensor at the mobile terminal middle probe hole, detect whether to exist to insert into the probe aperture and visit The behavior of pin.
Preferably, described the step of setting up cell phone network using SIM card, including:
Obtain the international mobile subscriber identity IMSI in client identification module SIM card;
The IMSI is sent to network side, by the network side identifying after the IMSI authentication procedure;
Receive the authentication data from the network side;
The authentication data is handled using mobile phone identification key KI to generate a response;
The network side is sent the response to, corresponding movement is determined whether according to the response by the network side Terminal accesses cell phone network, and sends corresponding authentication response;
The authentication response from the network side is received, cell phone network, which is set up, to be completed.
Preferably, the default end message includes one or more in following information:The input time of startup password The quantity information of address list and the geographic position data of mobile terminal in number, mobile terminal.
Preferably, the default alert if includes one or more in following condition:The input time of startup password Number has reached preset times, and address list is cleared in mobile terminal, and the geographic position data of mobile terminal is not in default geography In region.
Preferably, described the step of utilizing set up cell phone network to perform actuation of an alarm, including:
Alert data is sent to specified alert receipt side;Wherein, the specified alert receipt side includes assigned telephone number And/or specified email address.
Preferably, the alert data includes one or more in following data:Default short message data, interim bat The picture data and the geographic position data of mobile terminal taken the photograph.
On the other hand, disclosed herein as well is a kind of warning device for mobile terminal, including:
Monitoring modular, for the behavior for monitoring whether to have unloading SIM card;
Networking module, for when monitoring to unload the behavior of SIM card, cell phone network to be set up using SIM card;
Acquisition module, for when monitoring to unload the behavior of SIM card, gathering default end message;And
Alarm module, during for meeting default alert if in the end message gathered, utilize set up mobile phone Network performs actuation of an alarm.
Preferably, the monitoring modular includes:
Sensor detects submodule, for using the sensor at the mobile terminal middle probe hole, detecting whether In the presence of the behavior that probe is inserted into the probe aperture.
Preferably, the networking module includes:
Identification code acquisition submodule, for obtaining the international mobile subscriber identity IMSI in client identification module SIM card;
Identification code sending submodule, for the IMSI to be sent into network side, as described in the network side in identification Start authentication procedure after IMSI;
Authentication data receiving submodule, for receiving the authentication data from the network side;
Authentication data handles submodule, for being handled the authentication data to generate one using mobile phone identification key KI Individual response, and the network side is sent the response to, determine whether to move accordingly according to the response by the network side Dynamic terminal access cell phone network, and send corresponding authentication response;And
Authentication response receiving submodule, the authentication response from the network side, cell phone network are received for authentication response Set up and complete.
Preferably, the default end message includes one or more in following information:The input time of startup password The quantity information of address list and the geographic position data of mobile terminal in number, mobile terminal.
Preferably, the default alert if includes one or more in following condition:The input time of startup password Number has reached preset times, and address list is cleared in mobile terminal, and the geographic position data of mobile terminal is not in default geography In region.
Preferably, the alarm module includes:
Alert data sending submodule, for sending alert data to specified alert receipt side;Wherein, the specified alarm Recipient includes assigned telephone number and/or specified email address.
Preferably, the alert data includes one or more in following data:Default short message data, interim bat The picture data and the geographic position data of mobile terminal taken the photograph.
Compared with prior art, the application has advantages below:
The application sets up cell phone network when monitoring to unload the behavior of SIM card, using SIM card, and at the end gathered When client information meets default alert if, set up cell phone network is utilized to perform actuation of an alarm;Due to monitoring to unload SIM The behavior of card separates needs with mobile terminal to SIM card and taken some time, therefore the application can monitor to unload SIM card This period of time for being separated with mobile terminal to SIM card of behavior in using SIM card set up cell phone network, accordingly, with respect to existing There are some the alarm measures of technology after mobile terminal changes SIM card, the application can realize that mobile terminal is being lost or is being stolen Alarm as early as possible afterwards, to reduce in mobile phone stolen this period of time changed mobile phone between SIM card user in mobile terminal The loss that information and documentation are illegally used.
Brief description of the drawings
Fig. 1 is a kind of flow chart of alarm method embodiment for mobile terminal of the application;
Fig. 2 is a kind of flow chart of alarm method embodiment for internet-of-things terminal of the application;
Fig. 3 is a kind of structure chart of warning device embodiment for mobile terminal of the application.
Embodiment
It is below in conjunction with the accompanying drawings and specific real to enable the above-mentioned purpose of the application, feature and advantage more obvious understandable Mode is applied to be described in further detail the application.
After mobile terminal is stolen, in order to prevent mobile terminal reporting data or user tracking, thief would generally SIM card is unloaded at once, then illegally using the user profile and documentation preserved in mobile terminal.And it is unloaded in SIM card In the case of, the connectivity port of mobile terminal and cell phone network, therefore some existing actuation of an alarms(As in background technology neocaine Information inform actuation of an alarm to user)It can not perform.
The embodiment of the present application sets up cell phone network when monitoring to unload the behavior of SIM card, using SIM card, and utilizes institute The cell phone network of establishment performs actuation of an alarm;Because the behavior for monitoring to unload SIM card separates needs to SIM card with mobile terminal Take some time, thus the application can monitor that the behavior for unloading SIM card separates with mobile terminal to SIM card this Cell phone network is set up using SIM card in the section time, to realize mobile terminal alarm as early as possible after losing or be stolen.
Reference picture 1, a kind of flow chart of alarm method embodiment for mobile terminal of the application is shown, specifically can be with Including:
Step 101, monitor whether the behavior for unloading SIM card be present;
The embodiment of the present application can apply to be provided with the various mobile terminals of SIM card, for realizing that mobile terminal is being lost Alarm as early as possible after losing or being stolen.
In the embodiment of the present application, the behavior for unloading SIM card is mainly used in representing the behavior for preparing unloading SIM card.With Exemplified by Iphone mobile phones, there is probe aperture on its top, and inserting a probe into the probe aperture can insert SIM card from the SIM card of mobile phone Groove ejects, and reaches the purpose that SIM card separates with mobile phone;Wherein, detect at the time of probe inserts the probe aperture with SIM card and hand It is exactly often to be utilized using this time interval with certain time interval, the embodiment of the present application at the time of machine separates The SIM card not yet unloaded sets up cell phone network.
Therefore, in a preferred embodiment of the present application, the step for monitoring whether to have the behavior of unloading SIM card Suddenly, can specifically include:Using the sensor at the mobile terminal middle probe hole, detect whether exist to the probe aperture The behavior of middle insertion probe.
Certainly, sensor is intended only as preferred embodiment, it will be understood that in addition to the sensors, other to detect whether Device in the presence of the behavior that probe is inserted into the probe aperture is also feasible.
Step 102, when monitoring to unload the behavior of SIM card, set up cell phone network using SIM card, and collection is default End message;
In the embodiment of the present application, the cell phone network of establishment can be included such as any in lower network:GSM(The whole world is mobile logical Letter system, Global System for Mobile Communications)、CDMA(CDMA, Code Division Multiple Access)、WCDMA(WCDMA, Wideband Code Division Multiple Access)With TD-SCDMA(TD SDMA, Time Division-Synchronous Code Division Multiple Access)Etc.;It is appreciated that if the cell phone network set up is supported by corresponding SIM card, the embodiment of the present application The cell phone network of establishment is not any limitation as.
Illustrated below exemplified by setting up GSM using SIM card, it is correspondingly, described to set up cell phone network using SIM card Step 102, can specifically include:
International mobile subscriber identity IMSI in sub-step S121, acquisition client identification module SIM card(The world is mobile to be used Family identification code, International Mobile Subscriber IdentificationNumber);
Sub-step S122, the IMSI is sent to network side, recognized by the network side identifying after the IMSI Demonstrate,prove program;
Sub-step S123, receive the authentication data from the network side;
Sub-step S124, use KI(Mobile phone identification key, Key Identifier)The authentication data is handled with One response of generation;
Sub-step S125, the network side is sent the response to, judge whether to permit according to the response by the network side Perhaps corresponding mobile terminal access cell phone network, and send corresponding authentication response;
Sub-step S126, the authentication response from the network side is received, cell phone network, which is set up, to be completed.
For the building process of the cell phone networks such as CDMA, WCDMA and TD-SCDMA, corresponding network standard refer to i.e. Can, therefore not to repeat here.
Step 103, when the end message gathered meets default alert if, utilize set up cell phone network to hold Row actuation of an alarm.
In practice, unloading the behavior of SIM card can specifically include:In normal condition(Non-theft state)Lower owner The behavior of the unloading SIM card of execution, or, the behavior for the unloading SIM card that non-owner performs under stolen state.And for just The behavior for the unloading SIM card that owner performs under normal state, is without alarm, alarms easily owner is made in such cases Into unnecessary interference.
Therefore, in order to avoid unnecessary interference to caused by owner of alarming in normal state, the embodiment of the present application according to Judge whether to need to alarm according to default end message, specifically, meeting default alert if in the end message gathered When, just alarmed.
In the specific implementation, the default end message and default alert if can be used for the foundation of alarm decision, It can be determined according to actual conditions by those skilled in the art, the embodiment of the present application to specific end message and alert if not It is any limitation as.
For example, in a kind of embodiment of the application, the default end message can specifically include in following information It is one or more:Startup password inputs the quantity information of address list and the geographical position of mobile terminal in number, mobile terminal Put data.Wherein, the geographic position data of mobile terminal can include GPS(Global positioning system, Global Positioning System)Data etc..
In a kind of embodiment of the application, the default alert if can specifically include one in following condition It is or multinomial:The input number of startup password has reached preset times, and address list is cleared in mobile terminal, the geography of mobile terminal Position data is not in default geographic area.Wherein, the preset times, default geographic area can be by art technologies Personnel determine according to actual conditions.
In the embodiment of the present application, actuation of an alarm can include:Short message is sent, mail is sent, calls, shoots photo And send etc., the embodiment of the present application is not any limitation as to specific actuation of an alarm.
In a kind of embodiment of the application, described the step of utilizing set up cell phone network to perform actuation of an alarm, tool Body can include:Alert data is sent to specified alert receipt side;Wherein, the specified alert receipt side can specifically include referring to Determine telephone number and/or specified email address.
In one kind application example of the application, the alert data can specifically include one or more in following data :The geographic position data of default short message, the photo shot temporarily and mobile terminal.
To make those skilled in the art more fully understand the application, reference picture 2, show that the application is a kind of and be used for Internet of Things The flow chart of the alarm method embodiment of terminal, can specifically include:
Step 201, using the sensor at internet-of-things terminal middle probe hole, detect whether exist into the probe aperture Insert the behavior of probe;
Step 202, when inserting in detecting to the probe aperture behavior of probe, SIM card is utilized to set up cell phone network;
Step 203, when inserting in detecting to the probe aperture behavior of probe, gather the GPS numbers of the internet-of-things terminal According to;
Step 204, the gps data of the internet-of-things terminal is judged whether in default geography fence, if it is not, then performing step Rapid 205;
Wherein, the default geography fence can be the geography fence residing for the placement position of internet-of-things terminal.
Step 205, shooting photo, and utilize set up cell phone network that captured photo is sent into designated mobile phone number Code.
Corresponding to preceding method embodiment, the embodiment of the present application additionally provides a kind of warning device for mobile terminal, Structure chart shown in reference picture 3, it can specifically include:
Monitoring modular 301, for the behavior for monitoring whether to have unloading SIM card;
Networking module 302, for when monitoring to unload the behavior of SIM card, cell phone network to be set up using SIM card;
Acquisition module 303, for when monitoring to unload the behavior of SIM card, gathering default end message;And
Alarm module 304, during for meeting default alert if in the end message gathered, utilize set up hand Machine network performs actuation of an alarm.
In a preferred embodiment of the present application, the monitoring modular 301 can specifically include:
Sensor detects submodule, for using the sensor at the mobile terminal middle probe hole, detecting whether In the presence of the behavior that probe is inserted into the probe aperture.
In another preferred embodiment of the present application, the networking module 302 can specifically include:
Identification code acquisition submodule, for obtaining the international mobile subscriber identity IMSI in client identification module SIM card;
Identification code sending submodule, for the IMSI to be sent into network side, as described in the network side in identification Start authentication procedure after IMSI;
Authentication data receiving submodule, for receiving the authentication data from the network side;
Authentication data handles submodule, for being handled the authentication data to generate one using mobile phone identification key KI Individual response, and the network side is sent the response to, determine whether to move accordingly according to the response by the network side Dynamic terminal access cell phone network, and send corresponding authentication response;And
Authentication response receiving submodule, the authentication response from the network side, cell phone network are received for authentication response Set up and complete.
In the embodiment of the present application, it is preferred that the default end message can specifically include in following data It is one or more:Startup password inputs the quantity information of address list and the geographical position of mobile terminal in number, mobile terminal Data.
In the embodiment of the present application, it is preferred that the default alert if can specifically include in following condition It is one or more:The input number of startup password has reached preset times, and address list is cleared in mobile terminal, mobile terminal Geographic position data is not in default geographic area.
In a preferred embodiment of the present application, the alarm module 304 can specifically include:
Alert data sending submodule, for sending alert data to specified alert receipt side;Wherein, the specified alarm Recipient includes assigned telephone number and/or specified email address.
In the embodiment of the present application, it is preferred that the alert data specifically can include following data in one or It is multinomial:The geographic position data of default short message, the photo shot temporarily and mobile terminal.
In actual applications, the warning device for mobile terminal can be located in mobile terminal, wherein, monitor mould Block 301 can realize that networking module 302, acquisition module 303 and alarm module 304 etc. can conducts by devices such as sensors The software module of mobile terminal operating system.
Each embodiment in this specification is described by the way of progressive, what each embodiment stressed be with The difference of other embodiment, between each embodiment identical similar part mutually referring to.For device embodiment For, because it is substantially similar to embodiment of the method, so description is fairly simple, referring to the portion of embodiment of the method in place of correlation Defend oneself bright.
Above to a kind of alarm method and device for mobile terminal provided herein, it is described in detail, Specific case used herein is set forth to the principle and embodiment of the application, and the explanation of above example is simply used Understand the present processes and its core concept in help;Meanwhile for those of ordinary skill in the art, according to the application's Thought, there will be changes in specific embodiments and applications, in summary, this specification content should not be construed as Limitation to the application.

Claims (12)

  1. A kind of 1. alarm method for mobile terminal, it is characterised in that including:
    Monitor whether the behavior of unloading SIM card be present;
    When monitoring to unload the behavior of SIM card, cell phone network, and the default end message of collection are set up using SIM card, its Middle the step of setting up cell phone network using SIM card, including:
    Obtain the international mobile subscriber identity IMSI in client identification module SIM card;
    The IMSI is sent to network side, by the network side identifying after the IMSI authentication procedure;
    Receive the authentication data from the network side;
    The authentication data is handled using mobile phone identification key KI to generate a response;
    The network side is sent the response to, corresponding mobile terminal is determined whether according to the response by the network side Cell phone network is accessed, and sends corresponding authentication response;
    The authentication response from the network side is received, cell phone network, which is set up, to be completed;
    When the end message gathered meets default alert if, set up cell phone network is utilized to perform actuation of an alarm.
  2. 2. the method as described in claim 1, it is characterised in that it is described to monitor whether the step of behavior of unloading SIM card be present, Including:
    Using the sensor at the mobile terminal middle probe hole, detect whether to exist and probe is inserted into the probe aperture Behavior.
  3. 3. method as claimed in claim 1 or 2, it is characterised in that the default end message is included in following information It is one or more:Startup password inputs the quantity information of address list and the geographical position of mobile terminal in number, mobile terminal Data.
  4. 4. according to the method for claim 3, it is characterised in that the default alert if includes one in following condition Item is multinomial:The input number of startup password has reached preset times, and address list is cleared in mobile terminal, the ground of mobile terminal Position data is managed not in default geographic area.
  5. 5. method as claimed in claim 1 or 2, it is characterised in that described to utilize set up cell phone network execution alarm dynamic The step of making, including:
    Alert data is sent to specified alert receipt side;Wherein, the specified alert receipt side include assigned telephone number and/or Specify email address.
  6. 6. method as claimed in claim 5, it is characterised in that the alert data includes one or more in following data :The geographic position data of default short message data, the picture data shot temporarily and mobile terminal.
  7. A kind of 7. warning device for mobile terminal, it is characterised in that including:
    Monitoring modular, for the behavior for monitoring whether to have unloading SIM card;
    Networking module, for when monitoring to unload the behavior of SIM card, cell phone network, wherein networking module to be set up using SIM card Including:
    Identification code acquisition submodule, for obtaining the international mobile subscriber identity IMSI in client identification module SIM card;
    Identification code sending submodule, for the IMSI to be sent into network side, by the network side after the IMSI is identified Start authentication procedure;
    Authentication data receiving submodule, for receiving the authentication data from the network side;
    Authentication data handles submodule, for being handled using mobile phone identification key KI the authentication data to generate a sound Should, and the network side is sent the response to, determine whether corresponding movement eventually according to the response by the network side Terminate into cell phone network, and send corresponding authentication response;And
    Authentication response receiving submodule, the authentication response from the network side is received for authentication response, cell phone network is set up Complete;
    Acquisition module, for when monitoring to unload the behavior of SIM card, gathering default end message;And
    Alarm module, during for meeting default alert if in the end message gathered, utilize set up cell phone network Perform actuation of an alarm.
  8. 8. device as claimed in claim 7, it is characterised in that the monitoring modular includes:
    Sensor detects submodule, for using the sensor at the mobile terminal middle probe hole, detecting whether exist The behavior of probe is inserted into the probe aperture.
  9. 9. device as claimed in claim 7 or 8, it is characterised in that the default end message is included in following information It is one or more:Startup password inputs the quantity information of address list and the geographical position of mobile terminal in number, mobile terminal Data.
  10. 10. device according to claim 9, it is characterised in that the default alert if is included in following condition It is one or more:The input number of startup password has reached preset times, and address list is cleared in mobile terminal, mobile terminal Geographic position data is not in default geographic area.
  11. 11. device as claimed in claim 7 or 8, it is characterised in that the alarm module includes:
    Alert data sending submodule, for sending alert data to specified alert receipt side;Wherein, the specified alert receipt Side includes assigned telephone number and/or specified email address.
  12. 12. the device stated such as claim 11, it is characterised in that the alert data includes one or more in following data :The geographic position data of default short message data, the picture data shot temporarily and mobile terminal.
CN201310462464.XA 2013-09-30 2013-09-30 A kind of alarm method and device for mobile terminal Active CN104519491B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310462464.XA CN104519491B (en) 2013-09-30 2013-09-30 A kind of alarm method and device for mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310462464.XA CN104519491B (en) 2013-09-30 2013-09-30 A kind of alarm method and device for mobile terminal

Publications (2)

Publication Number Publication Date
CN104519491A CN104519491A (en) 2015-04-15
CN104519491B true CN104519491B (en) 2017-12-05

Family

ID=52794094

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310462464.XA Active CN104519491B (en) 2013-09-30 2013-09-30 A kind of alarm method and device for mobile terminal

Country Status (1)

Country Link
CN (1) CN104519491B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109606311B (en) * 2017-09-30 2021-01-29 比亚迪汽车工业有限公司 Vehicle authentication method, device and storage medium
CN113853779A (en) * 2019-07-04 2021-12-28 华为技术有限公司 Method, device and system for guaranteeing terminal safety

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2471039Y (en) * 2000-11-01 2002-01-09 张军 Mobile phone antitheft lock
CN201374818Y (en) * 2009-02-27 2009-12-30 卢坤 Novel anti-theft cellphone
CN102196438A (en) * 2010-03-16 2011-09-21 高通股份有限公司 Communication terminal identifier management methods and device
CN102231882A (en) * 2011-07-08 2011-11-02 康佳集团股份有限公司 Method and device for obtaining information in lost mobile communication terminal
CN102665004A (en) * 2012-04-26 2012-09-12 南京云恒瑞通网络科技有限责任公司 Anti-theft method by using mobile phones to photograph
CN202679426U (en) * 2012-07-26 2013-01-16 深圳市赛格导航科技股份有限公司 Mobile terminal anti-theft device
WO2013110436A1 (en) * 2012-01-27 2013-08-01 Alcatel Lucent Mobile communication device tracing

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2471039Y (en) * 2000-11-01 2002-01-09 张军 Mobile phone antitheft lock
CN201374818Y (en) * 2009-02-27 2009-12-30 卢坤 Novel anti-theft cellphone
CN102196438A (en) * 2010-03-16 2011-09-21 高通股份有限公司 Communication terminal identifier management methods and device
CN102231882A (en) * 2011-07-08 2011-11-02 康佳集团股份有限公司 Method and device for obtaining information in lost mobile communication terminal
WO2013110436A1 (en) * 2012-01-27 2013-08-01 Alcatel Lucent Mobile communication device tracing
CN102665004A (en) * 2012-04-26 2012-09-12 南京云恒瑞通网络科技有限责任公司 Anti-theft method by using mobile phones to photograph
CN202679426U (en) * 2012-07-26 2013-01-16 深圳市赛格导航科技股份有限公司 Mobile terminal anti-theft device

Also Published As

Publication number Publication date
CN104519491A (en) 2015-04-15

Similar Documents

Publication Publication Date Title
Willassen Forensics and the GSM mobile telephone system
CN103209402B (en) Set of terminal accessibility determines method and system
Dabrowski et al. The messenger shoots back: Network operator based IMSI catcher detection
JP6567751B2 (en) Multi-number service provision method
US20070077912A1 (en) Method enabling detection of stolen mobile communication devices and systems thereof
CN106465045A (en) Apparatuses and methods for fast onboarding an internet-enabled device
JP2015515156A (en) Tracking mobile communication devices
FR2979783A1 (en) MOBILE TERMINAL FLIGHT DETECTION SYSTEM
CN105636016B (en) A kind of methods, devices and systems connecting network
CN104519491B (en) A kind of alarm method and device for mobile terminal
US20120297051A1 (en) P2p activity detection and management
CN104982054B (en) Communication equipment and cellular wide area radio base station
JP2010517485A (en) System and method for filtering cellular telephone messages
US10104215B2 (en) Blacklist management method and device
EP2417792B1 (en) A method for identifying a mobile telephone
CN107708115B (en) Redirection control method and device and mobile terminal
CN103716833B (en) User equipment information monitoring method and device, system
WO2017098127A1 (en) Method of securing a mobile terminal and corresponding terminal
CN105245494A (en) Network attack determination method and device
CN112440937B (en) Vehicle unlocking method and related device
US20090111439A1 (en) System and method for monitoring a monitored mobile phone
WO2011060543A1 (en) Multiple device loss status retrieval without id provision
CN113609473B (en) Wind control method for retrieving passwords, terminal equipment and server
CN108271145A (en) A kind of method and apparatus based on more card registered networks
CN110366184A (en) A kind of method and intelligent terminal identifying pseudo-base station note

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C53 Correction of patent for invention or patent application
CB02 Change of applicant information

Address after: 100094 Yongjia North Road, Beijing, No. 6, No.

Applicant after: DATANG TERMINAL EQUIPMENT CO., LTD.

Address before: 100000, No. 15 Garden Garden Road, 4, Beijing, Haidian District

Applicant before: Datang Telecom (Tianjin) Communication Terminal Manufacture Co., Ltd.

COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 100000 HAIDIAN, BEIJING TO: 100094 HAIDIAN, BEIJING

Free format text: CORRECT: APPLICANT; FROM: DATANG TELECOM (TIANJIN) COMMUNICATION TERMINAL MANUFACTURE CO., LTD. TO: DATANG TERMINAL EQUIPMENT CO., LTD.

GR01 Patent grant
GR01 Patent grant