CN105577931B - IMEI code-based anti-theft method - Google Patents

IMEI code-based anti-theft method Download PDF

Info

Publication number
CN105577931B
CN105577931B CN201510992458.4A CN201510992458A CN105577931B CN 105577931 B CN105577931 B CN 105577931B CN 201510992458 A CN201510992458 A CN 201510992458A CN 105577931 B CN105577931 B CN 105577931B
Authority
CN
China
Prior art keywords
mobile terminal
password
imei code
seller
manufacturer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510992458.4A
Other languages
Chinese (zh)
Other versions
CN105577931A (en
Inventor
蔡水萍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Waterward Information Co Ltd
Original Assignee
深圳市沃特沃德股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市沃特沃德股份有限公司 filed Critical 深圳市沃特沃德股份有限公司
Priority to CN201510992458.4A priority Critical patent/CN105577931B/en
Publication of CN105577931A publication Critical patent/CN105577931A/en
Application granted granted Critical
Publication of CN105577931B publication Critical patent/CN105577931B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72457User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to geographic location
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device

Landscapes

  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Environmental & Geological Engineering (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses an IMEI code-based anti-theft method, which comprises the steps of generating a use password according to a preset rule based on the IMEI code of a mobile terminal; and setting a password using verification program on the mobile terminal, comparing the acquired input information with the password using verification program, wherein if the input information is consistent with the password, the mobile terminal is normally used, and if the input information is inconsistent with the password, the mobile terminal cannot be used. The method can prevent the mobile phone from being stolen in the inventory stage after the mobile phone is delivered by a manufacturer and before the mobile phone is sold by a seller, and because the mobile phone in the inventory stage can not be normally used, the situation that the stolen mobile terminal is stolen in the inventory stage can be reduced, and the circulation of the stolen mobile terminal is prevented.

Description

IMEI code-based anti-theft method
Technical Field
The invention relates to the field of communication, in particular to an IMEI code-based anti-theft method.
Background
Along with the development of science and technology, mobile terminal becomes the indispensable electronic equipment of people's life work, and mobile terminal's function is more and more powerful simultaneously, has evolved from a single communication tool to become an integrated multi-functional electron portable equipment, and the loss or the stolen very ordinary thing that becomes of mobile terminal can bring certain economic loss's danger to people like this.
The existing anti-theft method is a method for obtaining the information of an illegal user in an information feedback mode when an SIM card of a mobile terminal is used so as to realize anti-theft retrieval or anti-theft locking, wherein the information of the illegal user comprises the position of the mobile terminal, a mobile phone number, a base station number and the like.
The existing anti-theft retrieving method can be carried out only after the mobile terminal is used, and the mobile terminal cannot be protected in the inventory stage before being used, so that the problem needs to be solved urgently.
Disclosure of Invention
The invention aims to solve the technical problem of providing an IMEI code-based anti-theft method for protecting in an inventory stage.
The purpose of the invention is realized by the following technical scheme: an IMEI code based anti-theft method, comprising the steps of:
generating a use password according to a preset rule based on the IMEI code of the mobile terminal;
and setting a password using verification program on the mobile terminal, comparing the acquired input information with the password using verification program, wherein if the input information is consistent with the password, the mobile terminal is normally used, and if the input information is inconsistent with the password, the mobile terminal cannot be used.
Preferably, the mobile terminal is shipped and boxed according to the IMEI code.
The mobile terminal is stolen in the inventory stage, and the whole box processing can be carried out, so that the reaction speed is improved.
Preferably, the anti-theft method further comprises the step of setting a temporary password authentication program in the mobile terminal, and the mobile terminal can use the mobile terminal according to a preset temporary password rule by inputting the temporary password before inputting the use password.
The temporary password can be used when a client checks the mobile terminal or a seller shows the mobile terminal, the temporary password can be used for a plurality of times and then becomes invalid, the temporary password is required to be input again after the mobile terminal is turned off, shielded and used for a plurality of minutes, the temporary password can be universal or can be in one-to-one correspondence with the mobile terminal, and for example, a plurality of digits of the IMEI code are taken as the temporary password.
Preferably, the anti-theft method further comprises the step of setting a password input error coping program at the mobile terminal, and the mobile terminal is locked when the password is input and used for a preset number of times, and the mobile terminal can be unlocked only when a preset unlocking rule is met.
The preset unlocking rule comprises automatic unlocking after a plurality of times, such as automatic unlocking after a plurality of hours or the next day, and unlocking in a mode of inputting an unlocking password and the like.
Preferably, the password input error handling program includes a step of updating the password after locking the mobile terminal when the password input use error reaches a preset number of times.
Prevent others from inputting the use password for many times and cracking the use password.
Preferably, the anti-theft method further comprises the step of setting contact information of a manufacturer or a seller on the mobile terminal.
The contact information of the manufacturer or the seller is displayed on the mobile terminal, the user dials the telephone of the manufacturer or the seller to obtain the use password, the use password can be displayed on a dialing interface, a use password input interface and the like, and the user can directly dial by clicking the telephone of the manufacturer or the seller.
Preferably, the anti-theft method further comprises a reporting step.
The mobile terminal obtains the use password according to the IMEI code of the mobile terminal and reports the use password in the background, so that the sale condition of the mobile terminal can be known.
Preferably, the step of preparing includes preparing the lost mobile terminal IMEI code.
If the registered lost mobile terminal IMEI code wants to obtain the use password, a manufacturer or a seller does not give the use password, so that the mobile phone can be prevented from being stolen after the manufacturer delivers goods and at the inventory stage of the seller.
Preferably, the password authentication program is arranged after an initialization program of the boot program.
The mobile terminal can be used only by inputting the use password immediately after the mobile terminal is powered on.
Preferably, the step of using the password authentication program includes the step of setting a waiting program.
The mobile terminal needs to input the use password after being started for a period of time, so that a user calls to ask for the use password, the mobile terminal can be set to have a waiting program only after being started for the first time, and can also be set to have preset time when being started for the first time.
The mobile terminal is provided with the use password generated according to the preset rule based on the IMEI code of the mobile terminal, the use password verification program is operated after the mobile terminal is started, the mobile terminal acquires the input information and then compares the input information with the use password, the mobile terminal can be normally used only by using the password verification program if the input information is consistent with the use password, and the mobile terminal cannot be normally used if the input information is inconsistent with the use password and cannot pass the use password verification program. After taking the mobile terminal, a seller acquires a use password from a manufacturer according to the IMEI code of the mobile terminal, if the mobile terminal is stolen in the inventory stage, the IMEI number section of the stolen mobile terminal is judged according to the box number to which the stolen mobile terminal belongs, the seller or the manufacturer reports the IMEI code of the stolen mobile terminal, and even if someone asks for the use password from the seller or the manufacturer, the seller or the manufacturer cannot give the use password, so that the stolen mobile terminal cannot be used in the stage. Therefore, the mobile terminal can be prevented from being stolen in the inventory stage after the manufacturer delivers goods and before the seller sells the goods, the condition that the stolen mobile terminal is stolen in the inventory stage is reduced, and the circulation of the stolen mobile terminal is prevented.
Drawings
Fig. 1 is a schematic diagram of an IMEI code-based anti-theft method according to an embodiment of the present invention.
Detailed Description
The invention is further described with reference to the drawings and the preferred embodiments.
As shown in fig. 1, an IMEI code based anti-theft method includes the steps of:
generating a use password according to a preset rule based on the IMEI code of the mobile terminal;
and setting a password using verification program on the mobile terminal, comparing the acquired input information with the password using verification program, wherein if the input information is consistent with the password, the mobile terminal is normally used, and if the input information is inconsistent with the password, the mobile terminal cannot be used.
The predetermined rule may be an IMEI-based encryption algorithm from which the generated usage password is unique.
The mobile terminal is provided with a use password generated according to a preset rule based on an IMEI code of the mobile terminal, the use password verification program is run after the mobile terminal is started, the mobile terminal acquires input information and then compares the input information with the use password, the mobile terminal can be normally used only by using the password verification program if the input information is consistent with the use password, and the mobile terminal cannot be normally used if the input information is inconsistent with the use password and cannot pass the use password verification program. After taking the mobile terminal, a seller acquires a use password from a manufacturer according to the IMEI code of the mobile terminal, if the mobile terminal is stolen in the inventory stage, the IMEI number section of the stolen mobile terminal is judged according to the box number to which the stolen mobile terminal belongs, the seller or the manufacturer registers the IMEI code of the stolen mobile terminal, even if someone asks for the use password from the seller or the manufacturer, the seller or the manufacturer can not give the use password, thus the mobile terminal can be prevented from being stolen in the inventory stage before the sale of the seller after the manufacturer delivers goods, the stolen condition of the mobile terminal in the inventory stage is reduced, and the circulation of the stolen mobile terminal is prevented. The password authentication program can be network authentication or local authentication, namely authentication of the password is carried out through the network, or the password is stored by the mobile terminal and then directly authenticated. The using password can be calculated by some or all digits in the IMEI, or can be an irregular digit, and then the using password is in one-to-one correspondence with the IMEI code of the mobile terminal.
And the mobile terminal is shipped and boxed according to the IMEI code. The mobile terminal is stolen in the inventory stage, and the whole box processing can be carried out, so that the reaction speed is improved.
The anti-theft method further comprises the step of setting a temporary password verification program in the mobile terminal, and the mobile terminal can be used according to a preset temporary password rule by inputting the temporary password before inputting the use password. The temporary password can be used when a client checks the mobile terminal or a seller shows the mobile terminal, the temporary password can be used for a plurality of times and then becomes invalid, the temporary password is required to be input again after the mobile terminal is turned off, shielded and used for a plurality of minutes, the temporary password can be universal or can be in one-to-one correspondence with the mobile terminal, and for example, a plurality of digits of the IMEI code are taken as the temporary password.
The anti-theft method also comprises the step of setting a password input error coping program at the mobile terminal, and the mobile terminal is locked when the password is input and used for a preset number of times, and the mobile terminal can be unlocked only when a preset unlocking rule is met. The preset unlocking rule comprises automatic unlocking after a plurality of times, such as automatic unlocking after a plurality of hours or the next day, and unlocking in a mode of inputting an unlocking password and the like.
The password input error handling program comprises a step of updating the password after the mobile terminal is locked when the password input and use error reaches a preset number. Prevent others from inputting the use password for many times and cracking the use password.
The anti-theft method further comprises the step of setting contact information of a manufacturer or a seller on the mobile terminal. The contact information of the manufacturer or the seller is displayed on the mobile terminal, the user dials the telephone of the manufacturer or the seller to obtain the use password, the use password can be displayed on a dialing interface, a use password input interface and the like, and the user can directly dial by clicking the telephone of the manufacturer or the seller.
The anti-theft method also comprises a preparation step. The mobile terminal obtains the use password according to the IMEI code of the mobile terminal and reports the use password in the background, so that the sale condition of the mobile terminal can be known.
The step of preparing comprises preparing the lost mobile terminal IMEI code. If the registered lost mobile terminal IMEI code wants to obtain the use password, a manufacturer or a seller does not give the use password, so that the mobile phone can be prevented from being stolen after the manufacturer delivers goods and at the inventory stage of the seller.
The password authentication program is arranged after the initialization program of the starting program. The mobile terminal can be used only by inputting the use password immediately after the mobile terminal is powered on.
The step of using the password authentication program includes the step of setting a waiting program. The mobile terminal needs to input the use password after being started for a period of time, so that a user calls to ask for the use password, the mobile terminal can be set to have a waiting program only after being started for the first time, and can also be set to have preset time when being started for the first time.
The mobile terminal comprises electronic equipment with an IMEI code, such as a mobile phone, a tablet computer and the like.
The foregoing is a more detailed description of the invention in connection with specific preferred embodiments and it is not intended that the invention be limited to these specific details. For those skilled in the art to which the invention pertains, several simple deductions or substitutions can be made without departing from the spirit of the invention, and all shall be considered as belonging to the protection scope of the invention.

Claims (5)

1. An IMEI code based anti-theft method, comprising the steps of:
generating a use password according to a preset rule based on the IMEI code of the mobile terminal;
setting a password using verification program on the mobile terminal, comparing the acquired input information with the password using verification program, wherein if the input information is consistent with the password, the mobile terminal is normally used, and if the input information is inconsistent with the password, the mobile terminal cannot be used;
the anti-theft method also comprises the step of setting the contact way of a manufacturer or a seller on the mobile terminal: obtaining a corresponding use password according to the IMEI code of the mobile terminal by dialing a manufacturer or a seller telephone;
the mobile terminal is shipped out from a factory and is boxed according to the IMEI code, if the mobile terminal is stolen in the inventory stage, the IMEI number section of the stolen mobile terminal is judged according to the box number to which the stolen mobile terminal belongs, and a seller or a manufacturer reports the IMEI code of the stolen mobile terminal;
if the registered lost mobile terminal IMEI code obtains the use password, the manufacturer or the seller can not give the password; the mobile terminal stolen in the inventory stage cannot be used;
the anti-theft method also comprises the step of setting contact information of a manufacturer or a seller on the mobile terminal: the contact way of the manufacturer or the seller is displayed on a dialing interface or a password using interface is input, and the contact way of the manufacturer or the seller can be directly dialed by clicking;
the step of using the password authentication program comprises the step of setting a waiting program, and the password needs to be input only after the mobile terminal is started for a period of time, so that a user calls to ask for the password; the waiting program is set to be started for the first time or the last times.
2. The IMEI code based anti-theft method according to claim 1, further comprising the step of setting a temporary password authentication procedure in the mobile terminal, wherein the mobile terminal can use the mobile terminal according to the preset temporary password rules when inputting the temporary password before inputting the use password.
3. The IMEI code based anti-theft method according to claim 1, further comprising the step of setting a password input error handling procedure in the mobile terminal, wherein the mobile terminal is locked when the password is input and used for a predetermined number of times, and the mobile terminal is unlocked only when a predetermined unlocking rule is satisfied.
4. The IMEI code based anti-theft method according to claim 3, wherein said password input error handling procedure comprises the step of updating the password after locking the mobile terminal if the password used is inputted by mistake for a predetermined number of times.
5. The IMEI code based anti-theft method according to claim 1, wherein said authentication procedure using password is set after initialization procedure of boot procedure.
CN201510992458.4A 2015-12-25 2015-12-25 IMEI code-based anti-theft method Active CN105577931B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510992458.4A CN105577931B (en) 2015-12-25 2015-12-25 IMEI code-based anti-theft method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510992458.4A CN105577931B (en) 2015-12-25 2015-12-25 IMEI code-based anti-theft method

Publications (2)

Publication Number Publication Date
CN105577931A CN105577931A (en) 2016-05-11
CN105577931B true CN105577931B (en) 2020-07-28

Family

ID=55887563

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510992458.4A Active CN105577931B (en) 2015-12-25 2015-12-25 IMEI code-based anti-theft method

Country Status (1)

Country Link
CN (1) CN105577931B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108199833B (en) * 2018-01-04 2021-01-08 成都理工大学 Block chain distributed type-based stolen mobile phone protection method
CN110418331B (en) * 2019-08-02 2022-04-12 Oppo广东移动通信有限公司 Unlocking method, unlocking device, mobile terminal and server

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1941009A (en) * 2005-09-29 2007-04-04 普天信息技术研究院 Method for realizing fee payment by mobile telecommunication terminal
CN101287298A (en) * 2008-05-29 2008-10-15 德信无线通讯科技(北京)有限公司 Authentication method and system for mobile communication terminal
CN101530319A (en) * 2008-03-10 2009-09-16 李元金 Physiological parameter detecting device and mobile communication terminal
CN102340578A (en) * 2011-09-23 2012-02-01 中兴通讯股份有限公司 Mobile terminal and starting-up method thereof
CN102883026A (en) * 2012-09-07 2013-01-16 广东欧珀移动通信有限公司 Method for implementing start-up protection on mobile terminal
CN103984904A (en) * 2014-05-27 2014-08-13 深圳市欧珀通信软件有限公司 Method and device for preventing screen locking code of mobile terminal from being cracked
CN104859909A (en) * 2015-04-20 2015-08-26 深圳市财富之舟科技有限公司 Packing method of mobile phone and control device
CN104918241A (en) * 2014-03-12 2015-09-16 中国移动通信集团湖北有限公司 User authentication method and system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH10164219A (en) * 1996-11-26 1998-06-19 Kokusai Electric Co Ltd Portable telephone set
CN101287211A (en) * 2008-05-07 2008-10-15 中兴通讯股份有限公司 Anti-theft method for mobile terminal
US8718606B2 (en) * 2009-12-28 2014-05-06 Nokia Corporation Method and apparatus for user interaction while device is locked

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1941009A (en) * 2005-09-29 2007-04-04 普天信息技术研究院 Method for realizing fee payment by mobile telecommunication terminal
CN101530319A (en) * 2008-03-10 2009-09-16 李元金 Physiological parameter detecting device and mobile communication terminal
CN101287298A (en) * 2008-05-29 2008-10-15 德信无线通讯科技(北京)有限公司 Authentication method and system for mobile communication terminal
CN102340578A (en) * 2011-09-23 2012-02-01 中兴通讯股份有限公司 Mobile terminal and starting-up method thereof
CN102883026A (en) * 2012-09-07 2013-01-16 广东欧珀移动通信有限公司 Method for implementing start-up protection on mobile terminal
CN104918241A (en) * 2014-03-12 2015-09-16 中国移动通信集团湖北有限公司 User authentication method and system
CN103984904A (en) * 2014-05-27 2014-08-13 深圳市欧珀通信软件有限公司 Method and device for preventing screen locking code of mobile terminal from being cracked
CN104859909A (en) * 2015-04-20 2015-08-26 深圳市财富之舟科技有限公司 Packing method of mobile phone and control device

Also Published As

Publication number Publication date
CN105577931A (en) 2016-05-11

Similar Documents

Publication Publication Date Title
US10147096B2 (en) Device diagnostic and data retrieval
CN101742499B (en) Account number protection system for mobile communication equipment terminal and application method thereof
CN104715178B (en) Unlocking system and method of electronic device
US6871063B1 (en) Method and apparatus for controlling access to a computer system
CN108093392B (en) Method for unlocking SIM card, mobile terminal and storage medium
KR101029758B1 (en) A method for firmware updating in remote
US7840204B2 (en) System and method for unlocking wireless communications device
JPH11501182A (en) Method and apparatus for locking a communication device
CN103984904A (en) Method and device for preventing screen locking code of mobile terminal from being cracked
CN105577931B (en) IMEI code-based anti-theft method
CN104192652B (en) The method of protection electric life controller parameter safety and elevator
US20130333053A1 (en) Method for protecting firmware being updated
JP4698481B2 (en) Worker management method, information processing apparatus, worker terminal, and program used therefor
CN107105082B (en) Method for unlocking network of terminal, method and device for starting terminal
CN109166199B (en) Password generation method, device and equipment
US20090291711A1 (en) Protection Setting Method and Protection Releasing Method for Portable Device
EP2665301B1 (en) Mobile terminal and network unlocking method and system thereof
JP2003018652A (en) Data processing system and program
JP2018148498A (en) Terminal device, registration processing program, and registration processing method
JP6148503B2 (en) Lock control method for mobile communication terminal device
JP4340600B2 (en) Work information management system, portable communication terminal, and work information management method
EP4283502A1 (en) Method for installing electronic certificate and system for installing electronic certificate
JP6660769B2 (en) Unlocking device, unlocking system, control method of unlocking device, control program, and recording medium
CN114125850B (en) Terminal locking method, terminal unlocking method, mobile terminal and server
CN105653929A (en) Electronic device safety management and control system and method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20200630

Address after: 518000 B, block 1079, garden city digital garden, Nanhai Road, Shekou, Shenzhen, Guangdong, 503, Nanshan District 602, China

Applicant after: SHENZHEN WATER WORLD Co.,Ltd.

Address before: Nanshan District road Shenzhen City, Guangdong province 518000 No. 1 Kang Hesheng building 7 building 701-716 room

Applicant before: SHENZHEN FORTUNE SHIP TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20210831

Address after: 518000 workshop 201, DAFUYUAN Industrial Park, No. 381, Juling old village, Jutang community, Fucheng street, Longhua District, Shenzhen, Guangdong Province

Patentee after: Shenzhen Water World Information Co.,Ltd.

Address before: 518000 B, 503, 602, digital city building, garden city, 1079 Shekou Road, Shekou, Nanshan District, Shenzhen, Guangdong.

Patentee before: Shenzhen Waterward Co.,Ltd.

TR01 Transfer of patent right