IMEI code-based anti-theft method
Technical Field
The invention relates to the field of communication, in particular to an IMEI code-based anti-theft method.
Background
Along with the development of science and technology, mobile terminal becomes the indispensable electronic equipment of people's life work, and mobile terminal's function is more and more powerful simultaneously, has evolved from a single communication tool to become an integrated multi-functional electron portable equipment, and the loss or the stolen very ordinary thing that becomes of mobile terminal can bring certain economic loss's danger to people like this.
The existing anti-theft method is a method for obtaining the information of an illegal user in an information feedback mode when an SIM card of a mobile terminal is used so as to realize anti-theft retrieval or anti-theft locking, wherein the information of the illegal user comprises the position of the mobile terminal, a mobile phone number, a base station number and the like.
The existing anti-theft retrieving method can be carried out only after the mobile terminal is used, and the mobile terminal cannot be protected in the inventory stage before being used, so that the problem needs to be solved urgently.
Disclosure of Invention
The invention aims to solve the technical problem of providing an IMEI code-based anti-theft method for protecting in an inventory stage.
The purpose of the invention is realized by the following technical scheme: an IMEI code based anti-theft method, comprising the steps of:
generating a use password according to a preset rule based on the IMEI code of the mobile terminal;
and setting a password using verification program on the mobile terminal, comparing the acquired input information with the password using verification program, wherein if the input information is consistent with the password, the mobile terminal is normally used, and if the input information is inconsistent with the password, the mobile terminal cannot be used.
Preferably, the mobile terminal is shipped and boxed according to the IMEI code.
The mobile terminal is stolen in the inventory stage, and the whole box processing can be carried out, so that the reaction speed is improved.
Preferably, the anti-theft method further comprises the step of setting a temporary password authentication program in the mobile terminal, and the mobile terminal can use the mobile terminal according to a preset temporary password rule by inputting the temporary password before inputting the use password.
The temporary password can be used when a client checks the mobile terminal or a seller shows the mobile terminal, the temporary password can be used for a plurality of times and then becomes invalid, the temporary password is required to be input again after the mobile terminal is turned off, shielded and used for a plurality of minutes, the temporary password can be universal or can be in one-to-one correspondence with the mobile terminal, and for example, a plurality of digits of the IMEI code are taken as the temporary password.
Preferably, the anti-theft method further comprises the step of setting a password input error coping program at the mobile terminal, and the mobile terminal is locked when the password is input and used for a preset number of times, and the mobile terminal can be unlocked only when a preset unlocking rule is met.
The preset unlocking rule comprises automatic unlocking after a plurality of times, such as automatic unlocking after a plurality of hours or the next day, and unlocking in a mode of inputting an unlocking password and the like.
Preferably, the password input error handling program includes a step of updating the password after locking the mobile terminal when the password input use error reaches a preset number of times.
Prevent others from inputting the use password for many times and cracking the use password.
Preferably, the anti-theft method further comprises the step of setting contact information of a manufacturer or a seller on the mobile terminal.
The contact information of the manufacturer or the seller is displayed on the mobile terminal, the user dials the telephone of the manufacturer or the seller to obtain the use password, the use password can be displayed on a dialing interface, a use password input interface and the like, and the user can directly dial by clicking the telephone of the manufacturer or the seller.
Preferably, the anti-theft method further comprises a reporting step.
The mobile terminal obtains the use password according to the IMEI code of the mobile terminal and reports the use password in the background, so that the sale condition of the mobile terminal can be known.
Preferably, the step of preparing includes preparing the lost mobile terminal IMEI code.
If the registered lost mobile terminal IMEI code wants to obtain the use password, a manufacturer or a seller does not give the use password, so that the mobile phone can be prevented from being stolen after the manufacturer delivers goods and at the inventory stage of the seller.
Preferably, the password authentication program is arranged after an initialization program of the boot program.
The mobile terminal can be used only by inputting the use password immediately after the mobile terminal is powered on.
Preferably, the step of using the password authentication program includes the step of setting a waiting program.
The mobile terminal needs to input the use password after being started for a period of time, so that a user calls to ask for the use password, the mobile terminal can be set to have a waiting program only after being started for the first time, and can also be set to have preset time when being started for the first time.
The mobile terminal is provided with the use password generated according to the preset rule based on the IMEI code of the mobile terminal, the use password verification program is operated after the mobile terminal is started, the mobile terminal acquires the input information and then compares the input information with the use password, the mobile terminal can be normally used only by using the password verification program if the input information is consistent with the use password, and the mobile terminal cannot be normally used if the input information is inconsistent with the use password and cannot pass the use password verification program. After taking the mobile terminal, a seller acquires a use password from a manufacturer according to the IMEI code of the mobile terminal, if the mobile terminal is stolen in the inventory stage, the IMEI number section of the stolen mobile terminal is judged according to the box number to which the stolen mobile terminal belongs, the seller or the manufacturer reports the IMEI code of the stolen mobile terminal, and even if someone asks for the use password from the seller or the manufacturer, the seller or the manufacturer cannot give the use password, so that the stolen mobile terminal cannot be used in the stage. Therefore, the mobile terminal can be prevented from being stolen in the inventory stage after the manufacturer delivers goods and before the seller sells the goods, the condition that the stolen mobile terminal is stolen in the inventory stage is reduced, and the circulation of the stolen mobile terminal is prevented.
Drawings
Fig. 1 is a schematic diagram of an IMEI code-based anti-theft method according to an embodiment of the present invention.
Detailed Description
The invention is further described with reference to the drawings and the preferred embodiments.
As shown in fig. 1, an IMEI code based anti-theft method includes the steps of:
generating a use password according to a preset rule based on the IMEI code of the mobile terminal;
and setting a password using verification program on the mobile terminal, comparing the acquired input information with the password using verification program, wherein if the input information is consistent with the password, the mobile terminal is normally used, and if the input information is inconsistent with the password, the mobile terminal cannot be used.
The predetermined rule may be an IMEI-based encryption algorithm from which the generated usage password is unique.
The mobile terminal is provided with a use password generated according to a preset rule based on an IMEI code of the mobile terminal, the use password verification program is run after the mobile terminal is started, the mobile terminal acquires input information and then compares the input information with the use password, the mobile terminal can be normally used only by using the password verification program if the input information is consistent with the use password, and the mobile terminal cannot be normally used if the input information is inconsistent with the use password and cannot pass the use password verification program. After taking the mobile terminal, a seller acquires a use password from a manufacturer according to the IMEI code of the mobile terminal, if the mobile terminal is stolen in the inventory stage, the IMEI number section of the stolen mobile terminal is judged according to the box number to which the stolen mobile terminal belongs, the seller or the manufacturer registers the IMEI code of the stolen mobile terminal, even if someone asks for the use password from the seller or the manufacturer, the seller or the manufacturer can not give the use password, thus the mobile terminal can be prevented from being stolen in the inventory stage before the sale of the seller after the manufacturer delivers goods, the stolen condition of the mobile terminal in the inventory stage is reduced, and the circulation of the stolen mobile terminal is prevented. The password authentication program can be network authentication or local authentication, namely authentication of the password is carried out through the network, or the password is stored by the mobile terminal and then directly authenticated. The using password can be calculated by some or all digits in the IMEI, or can be an irregular digit, and then the using password is in one-to-one correspondence with the IMEI code of the mobile terminal.
And the mobile terminal is shipped and boxed according to the IMEI code. The mobile terminal is stolen in the inventory stage, and the whole box processing can be carried out, so that the reaction speed is improved.
The anti-theft method further comprises the step of setting a temporary password verification program in the mobile terminal, and the mobile terminal can be used according to a preset temporary password rule by inputting the temporary password before inputting the use password. The temporary password can be used when a client checks the mobile terminal or a seller shows the mobile terminal, the temporary password can be used for a plurality of times and then becomes invalid, the temporary password is required to be input again after the mobile terminal is turned off, shielded and used for a plurality of minutes, the temporary password can be universal or can be in one-to-one correspondence with the mobile terminal, and for example, a plurality of digits of the IMEI code are taken as the temporary password.
The anti-theft method also comprises the step of setting a password input error coping program at the mobile terminal, and the mobile terminal is locked when the password is input and used for a preset number of times, and the mobile terminal can be unlocked only when a preset unlocking rule is met. The preset unlocking rule comprises automatic unlocking after a plurality of times, such as automatic unlocking after a plurality of hours or the next day, and unlocking in a mode of inputting an unlocking password and the like.
The password input error handling program comprises a step of updating the password after the mobile terminal is locked when the password input and use error reaches a preset number. Prevent others from inputting the use password for many times and cracking the use password.
The anti-theft method further comprises the step of setting contact information of a manufacturer or a seller on the mobile terminal. The contact information of the manufacturer or the seller is displayed on the mobile terminal, the user dials the telephone of the manufacturer or the seller to obtain the use password, the use password can be displayed on a dialing interface, a use password input interface and the like, and the user can directly dial by clicking the telephone of the manufacturer or the seller.
The anti-theft method also comprises a preparation step. The mobile terminal obtains the use password according to the IMEI code of the mobile terminal and reports the use password in the background, so that the sale condition of the mobile terminal can be known.
The step of preparing comprises preparing the lost mobile terminal IMEI code. If the registered lost mobile terminal IMEI code wants to obtain the use password, a manufacturer or a seller does not give the use password, so that the mobile phone can be prevented from being stolen after the manufacturer delivers goods and at the inventory stage of the seller.
The password authentication program is arranged after the initialization program of the starting program. The mobile terminal can be used only by inputting the use password immediately after the mobile terminal is powered on.
The step of using the password authentication program includes the step of setting a waiting program. The mobile terminal needs to input the use password after being started for a period of time, so that a user calls to ask for the use password, the mobile terminal can be set to have a waiting program only after being started for the first time, and can also be set to have preset time when being started for the first time.
The mobile terminal comprises electronic equipment with an IMEI code, such as a mobile phone, a tablet computer and the like.
The foregoing is a more detailed description of the invention in connection with specific preferred embodiments and it is not intended that the invention be limited to these specific details. For those skilled in the art to which the invention pertains, several simple deductions or substitutions can be made without departing from the spirit of the invention, and all shall be considered as belonging to the protection scope of the invention.