CN106911653B - Method, device, mobile terminal and system for realizing remote control of mobile terminal - Google Patents

Method, device, mobile terminal and system for realizing remote control of mobile terminal Download PDF

Info

Publication number
CN106911653B
CN106911653B CN201510982128.7A CN201510982128A CN106911653B CN 106911653 B CN106911653 B CN 106911653B CN 201510982128 A CN201510982128 A CN 201510982128A CN 106911653 B CN106911653 B CN 106911653B
Authority
CN
China
Prior art keywords
mobile terminal
remote control
server
password
instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510982128.7A
Other languages
Chinese (zh)
Other versions
CN106911653A (en
Inventor
黄铮
张炅轩
范国峰
闫学松
镡云宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
3600 Technology Group Co ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201510982128.7A priority Critical patent/CN106911653B/en
Publication of CN106911653A publication Critical patent/CN106911653A/en
Application granted granted Critical
Publication of CN106911653B publication Critical patent/CN106911653B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Abstract

The application discloses a method, a device, a mobile terminal and a system for realizing remote control of the mobile terminal. Wherein the method comprises the following steps: the mobile terminal receives a remote control starting instruction sent by the server; the mobile terminal checks whether the IMEI information carried in the remote control starting instruction is consistent with the IMEI information stored in the mobile terminal; if the number is consistent with the number, the mobile terminal checks whether the associated number exists in a trusted number list of the mobile terminal; if the user name and the password exist, the mobile terminal logs in the server by using the user name and the password to obtain a remote control ID; and the mobile terminal sends a message carrying the remote control ID to the server so as to start the function of remotely controlling the mobile terminal through the remote control ID. The method and the device can realize corresponding control on the mobile terminal when the mobile terminal is stolen or lost.

Description

Method, device, mobile terminal and system for realizing remote control of mobile terminal
Technical Field
The present application relates to the field of internet applications, and in particular, to a method, an apparatus, a mobile terminal, and a system for implementing remote control of a mobile terminal.
Background
Along with the popularization of intelligent mobile terminals and the rapid development of networks, the role played by mobile terminals in the life of people is more and more important, and the intelligent mobile terminals become indispensable all-round assistants in work and life of people. For convenience of use, people usually voluntarily or forcibly leave information related to personal identity and property, such as various account information, private chat records, pictures and photos, in the mobile terminal when using the application of the mobile terminal. If the mobile terminal is lost, not only property loss may be brought to the user, but also more importantly, private information and the like stored in the mobile terminal by the user may be leaked, so that loss which is difficult to estimate is caused. Therefore, control and processing after the mobile terminal is lost are very important.
In the prior art, if a mobile terminal, such as a mobile phone, is not started before being stolen, a loser cannot control the mobile phone after the mobile phone is stolen, generally, the problem can be solved only by alarming, and at this time, if the stolen mobile phone cannot be located, the hope of finding the mobile phone is extremely lost.
In summary, after the mobile terminal is stolen in the prior art, the owner of the mobile terminal cannot take effective measures to prevent the information on the mobile terminal from being leaked or the mobile terminal from being retrieved, and therefore, an effective remote control technology for the mobile terminal is urgently needed.
Disclosure of Invention
The embodiments of the present application provide a method and an apparatus for implementing remote control of a mobile phone, which overcome the above problems or at least partially solve the above problems.
The embodiment of the application adopts the following technical scheme:
a method for realizing remote control of a mobile terminal comprises the following steps:
the mobile terminal receives a remote control starting instruction which is sent by a server and carries IMEI information, an associated number and a user name and a password for obtaining a remote control ID;
the mobile terminal checks whether the IMEI information carried in the remote control starting instruction is consistent with the IMEI information stored in the mobile terminal;
if the number is consistent with the number, the mobile terminal checks whether the associated number exists in a trusted number list of the mobile terminal;
if the user name and the password exist, the mobile terminal logs in the server by using the user name and the password to obtain a remote control ID;
and the mobile terminal sends a message which is used for starting a remote control function of the mobile terminal and carries the remote control ID to the server.
A method for realizing remote control of a mobile terminal comprises the following steps:
the server sends a remote control starting instruction carrying IMEI information, an associated number and a user name and a password for obtaining a remote control ID to the mobile terminal;
the server sends a remote control ID to the mobile terminal which logs in the server by using the user name and the password;
the server receives a message which is sent by the mobile terminal and carries the remote control ID;
the server starts a function of remotely controlling the mobile terminal through the remote control ID;
and the server sends the remote control ID to a remote control terminal corresponding to the associated number. .
An apparatus for implementing remote control of a mobile terminal, comprising:
the receiving unit is used for receiving a remote control starting instruction which is sent by the server and carries IMEI information, an associated number and a user name and a password for obtaining a remote control ID;
the first checking unit is used for checking whether the IMEI information carried in the remote control starting instruction is consistent with the IMEI information stored in the mobile terminal;
a second checking unit, configured to check whether the associated number exists in a trusted number list of the mobile terminal when the IMEI information carried in the remote control start instruction is consistent with the IMEI information stored in the mobile terminal;
the obtaining unit is used for logging in the server by using the user name and the password to obtain a remote control ID (identity) when the associated number exists in a trusted number list of the mobile terminal;
and the sending unit is used for sending a message which is used for starting the remote control function of the mobile terminal and carries the remote control ID to the server.
An apparatus for implementing remote control of a mobile terminal, comprising:
the mobile terminal comprises a first sending unit, a second sending unit and a third sending unit, wherein the first sending unit is used for sending a remote control starting instruction carrying IMEI information, an associated number and a user name and a password for obtaining a remote control ID to the mobile terminal;
a second transmitting unit for transmitting a remote control ID to the mobile terminal which logs in the server using the user name and the password;
a first receiving unit, configured to receive a message carrying the remote control ID sent by the mobile terminal;
the starting unit is used for starting the function of remotely controlling the mobile terminal through the remote control ID;
and the third sending unit is used for sending the remote control ID to the remote control terminal corresponding to the associated number.
A mobile terminal comprises the device for realizing the remote control of the mobile terminal.
A system for realizing remote control of a mobile terminal comprises the mobile terminal and the server, wherein the mobile terminal comprises the device for realizing remote control of the mobile terminal, and the server comprises the device for realizing remote control of the mobile terminal.
The embodiment of the application adopts at least one technical scheme which can achieve the following beneficial effects:
the remote control function of the mobile terminal is started through the server, so that a user can log in the server through the remote control ID to realize the remote control of the mobile terminal after the remote control function of the mobile terminal is started. Through the process, the mobile terminal can be correspondingly controlled when being stolen or lost.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a flowchart illustrating a method for implementing remote control of a mobile terminal according to an embodiment of the present disclosure;
fig. 2 is a flowchart of a method for implementing remote control of a mobile terminal by using the mobile terminal as a main body according to an embodiment of the present application;
fig. 3 is a flowchart of a method for implementing remote control of a mobile terminal by using a server as a main body according to an embodiment of the present application;
fig. 4 is a block diagram of a remote control apparatus (included in a mobile terminal) for implementing a mobile terminal according to an embodiment of the present application;
fig. 5 is a block diagram of an implementation of a remote control apparatus (included in a server) of a mobile terminal according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail and completely with reference to the following specific embodiments of the present application and the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The method and the device mainly aim at the easy theft or loss of the mobile terminal, and realize the remote control of the mobile terminal when the mobile terminal is in a stolen or lost state. The mobile terminal can be a mobile phone or a tablet computer.
Fig. 1 is a flowchart of a method for implementing remote control of a mobile terminal according to an embodiment of the present application, where the method includes:
s101: and the server sends a remote control starting instruction carrying the IMEI information, the associated number and the user name and the password for obtaining the remote control ID to the mobile terminal with the remote control function to be started.
In the embodiment of the application, the mobile terminal may be stolen and is in a stolen state. In this step, "IMEI information" is mentioned, and IMEI is short for International Mobile Equipment Identification Number (International Mobile Equipment identity) to distinguish different Mobile terminals. IMEI information is stored in mobile devices and can be used to monitor stolen or invalid mobile devices. The IMEI is obtained by keying in "# 06#" (the content required to be input by different mobile phones of different manufacturers is different, and the content required to be input by different mobile phones of the same manufacturer is also different). In general, the total length of the IMEI is 15 digits, each digit only uses 0 to 9 digits, and the composition of the IMEI is as follows:
1. the first 6 digits (TAC, Type Approval Code) is a "model Approval number", which generally represents a model.
2. The next 2-digit number (FAC, Final Assembly Code) is the "Final Assembly number", which generally represents the place of origin.
3. The next 6 digits (SNR, Serial Number, factory Serial Number) are "Serial Number", which generally represents a production Serial Number.
4. The last 1-bit number (SP) is usually "0" and is reserved for the check code.
The IMEI code has uniqueness, is attached to a mark on the back of the mobile phone, and is read and written in a memory of the mobile phone. It is also the 'file' and 'identification number' of the mobile phone at the manufacturer.
Such as: the IMEI of a GT-I9308 handset from SAMSUNG is: 355065053311001/01. Where 355065 is TAC, 05 is FAC, 331100 is SNR, 1 is SP, 01 is software version number.
IMEI is TAC + FAC + SNR + SP. IMEI, which corresponds to each handset one-to-one, and the code is unique worldwide. Each handset, when assembled, is assigned a globally unique set of numbers that are recorded by the manufacturer from production to delivery. Therefore, the IMEI of the mobile phone, just like the national identity card number, becomes an authoritative mark for identifying the attribution and properties of the mobile phone.
If the remote control function is not started before the mobile phone of the user is lost, after the mobile phone of the user is lost, the user can mark evidence that the user is the mobile phone and the number owner by providing a current phone purchase invoice, a recent call record list of the mobile phone, a part of mobile phone contact list and the like, a server is required to issue a remote control starting instruction to the stolen mobile phone, and IMEI information and associated numbers are carried in the remote control starting instruction issued by the server. Of course, in the actual application process, besides the manner of manually triggering the server to issue the remote control start instruction, the server may also send a request to the server by using other electronic devices (e.g., other mobile terminals) to instruct the server to issue the remote control start instruction to the stolen mobile phone (i.e., the mobile terminal).
In the embodiment of the application, in order to implement the remote control function of the mobile terminal, the server presets an ID for performing remote control for each mobile terminal, that is, once the remote control function of a certain mobile terminal is turned on (the mobile terminal cannot be remotely controlled under a normal use condition), the remote control of the mobile terminal can be implemented through the remote control ID corresponding to the mobile terminal. The remote control ID can be generally stored in the server, the server and the mobile terminal can agree in advance, and the remote control ID is obtained through a corresponding user name and a corresponding password, so that the remote control ID is prevented from being illegally stolen. The user name and password for obtaining the remote control ID may be a user name and password for logging in the server, and the user name and password may be pre-registered by the user or randomly generated by the server.
S102: and the mobile terminal receives the IMEI information, the associated number and a remote control opening instruction for obtaining the user name and the password of the remote control ID sent by the server.
S103: the mobile terminal checks whether the IMEI information carried in the remote control starting instruction is consistent with the IMEI information stored in the mobile terminal; if yes, go to step S104.
And the mobile terminal receives a remote control starting instruction which is sent by the server and carries the IMEI information and the associated number when in a stolen state. After the mobile terminal is stolen, measures such as data deletion, machine swiping, SIM card replacement and the like are taken by a stealer, and the mobile terminal can receive a remote control starting instruction carrying IMEI information and an associated number sent by a server as long as the mobile terminal is in a starting communication state.
After receiving the IMEI information carried in the remote control starting instruction, the mobile terminal compares the IMEI information with the IMEI information corresponding to the mobile terminal to determine whether the IMEI information is consistent with the IMEI information: if the two are not consistent, the remote control function can not be started, and the notification information of 'inconsistency' can be returned to the server. Certainly, in the actual application process, there may be many reasons that the sent IMEI information is inconsistent with the IMEI stored in the mobile terminal itself that receives the information, for example, the IMEI information is provided incorrectly, changed in the transmission process, and the mobile terminal device is damaged; if the two are identical, step S103 is executed.
For example, the IMEI number included in the remote control activation command sent by the server to the stolen mobile phone is 355065053311001/01, and when the stolen mobile phone receives the information, the IMEI number is compared with the IMEI number 355056043311001/01 of the stolen mobile phone, and if the IMEI number is inconsistent with the IMEI number, the activation of the remote control function fails.
If the IMEI number contained in the remote control opening instruction sent by the server to the stolen mobile phone is 355056043311001/01, after the stolen mobile phone receives the information, the IMEI number is compared with the IMEI number 355056043311001/01 of the stolen mobile phone to be consistent, and then the next step is carried out.
S104: the mobile terminal checks whether the associated number exists in the trusted number list of the mobile terminal, and if so, step S105 is executed.
The mobile terminal checks whether the IMEI information carried in the remote control starting instruction is consistent with the IMEI information of the mobile terminal or not, and then checks whether the associated number exists in a trusted number list of the mobile terminal or not; if so, proceed to step 104.
For example, the association number included in the anti-theft opening instruction sent by the server to the stolen mobile phone is 13333333333, after the stolen mobile phone verifies that the IMEI is correct, the association number 13333333333 is not in the trusted number list of the stolen mobile phone, and the opening of the remote control function fails; if it is in the list of trusted numbers, the stolen handset can proceed to the next step.
It is worth mentioning that, in the embodiment of the present application, before the step S104, the method may further include: the mobile terminal checks whether the server identifier for sending the remote control start instruction is consistent with a server identifier preset in the mobile terminal, and if so, the step S104 is executed. The mobile terminal can judge whether the remote control opening instruction is sent by the server for remote control by checking whether the server identifier for sending the remote control opening instruction is consistent with the preset server identifier, so that the hidden danger that the mobile terminal is illegally opened by other illegal communication devices through stealing the remote control opening instruction and sending the remote control opening instruction to the mobile terminal is avoided, and the safety is improved.
S105: and the mobile terminal logs in the server by using the user name and the password to obtain the remote control ID.
In this embodiment of the application, after receiving the remote control start instruction, the mobile terminal may force to start a network (e.g., Wi-Fi, 4G, 3G/2G, etc.) of the mobile terminal, so as to log in the server by using the received user name and password, where the logging in may be to log in the server through an internet application APP installed on the mobile terminal (i.e., the mobile terminal in which the application APP is installed is a client of the server). After the mobile terminal successfully logs in, the server can issue the remote control ID for realizing the remote control function to the mobile terminal. The remote control ID is uniquely corresponding to the current mobile terminal.
S106: and the mobile terminal sends a message (such as a short message) carrying the remote control ID to the server.
After receiving the remote control ID, the mobile terminal may send a message carrying the remote control ID to the server in a manner of, for example, a short message, where the message is used to notify the server to start a remote control function for the mobile terminal.
S107: the server receives a message carrying the remote control ID.
S108: and the server starts a remote control function of the mobile terminal through the remote control ID and sends the remote control ID to the remote control terminal corresponding to the associated number.
After the remote control function is started, the user who loses the mobile terminal can realize the remote control of the mobile terminal through the remote control terminal, and the remote control terminal can be another mobile phone corresponding to the associated number. Generally, a user may log in a server through a web page or APP using the remote control ID, so as to implement a remote control function for the mobile terminal.
S109: and the remote control terminal receives the remote control ID sent by the server.
The remote control terminal may be, for example, a mobile phone of a parent of the mobile terminal or another mobile phone of a person. In this embodiment, the remote control terminal may receive the remote control ID in a short message or an instant message in an APP.
S110: and the remote control terminal sends a preset instruction for controlling the mobile terminal to the server.
In this embodiment of the application, after receiving the remote control ID, a user using the remote control terminal may log in the server through a web page or an APP, and send a preset instruction for controlling the mobile terminal to the server, where the preset instruction may be embodied as various instructions, and a range, a form, a format, and the like of the instruction may be agreed in advance. For example, the preset instruction may be an instruction to acquire a location of the mobile terminal, an instruction to acquire data stored in the mobile terminal, or an instruction to delete data in the mobile terminal.
S111: and the server receives the preset instruction and forwards the preset instruction to the mobile terminal.
S112: and the mobile terminal receives the preset instruction and executes the operation corresponding to the preset instruction.
For example, after the IMEI and the associated number are verified, the mobile terminal (i.e., the stolen mobile phone) starts the remote control function, the associated terminal corresponding to the associated number may send a control instruction to request the stolen mobile phone to delete the photo stored in the mobile phone, and after receiving the control instruction, the stolen mobile phone executes the instruction to delete the photo and feeds the instruction back to the associated terminal.
According to the method provided by the embodiment of the application, the remote control function of the mobile terminal is started through the server, so that a user can log in the server through the remote control ID to realize the remote control of the mobile terminal after the remote control function of the mobile terminal is started. Through the process, the mobile terminal can be correspondingly controlled when being stolen or lost.
Fig. 2 is a flowchart of a method for implementing remote control of a mobile terminal by using the mobile terminal as a main body according to an embodiment of the present application, where the method corresponds to fig. 1, and includes:
s201: and the mobile terminal receives a remote control opening instruction which is sent by the server and carries IMEI information, the association number and a user name and a password for obtaining the remote control ID.
S202: the mobile terminal checks whether the IMEI information carried in the remote control starting instruction is consistent with the IMEI information stored in the mobile terminal; if yes, go to step S203.
S203: the mobile terminal checks whether the associated number exists in a trusted number list of the mobile terminal; if yes, go to step S204.
S204: and the mobile terminal logs in the server by using the user name and the password to obtain a remote control ID.
S205: and the mobile terminal sends a message which is used for starting a remote control function of the mobile terminal and carries the remote control ID to the server.
Through the process, the mobile terminal can be correspondingly controlled when being stolen or lost.
Fig. 3 is a flowchart of a method for implementing remote control of a mobile terminal by using a server as a main body according to an embodiment of the present application, where the method corresponds to fig. 1, and includes:
s301: the server sends a remote control starting instruction carrying IMEI information, an associated number and a user name and a password for obtaining a remote control ID to the mobile terminal;
s302: the server sends a remote control ID to the mobile terminal which logs in the server by using the user name and the password;
s303: the server receives a message which is sent by the mobile terminal and carries the remote control ID;
s304: the server starts a function of remotely controlling the mobile terminal through the remote control ID;
s305: and the server sends the remote control ID to a remote control terminal corresponding to the associated number.
Through the process, the mobile terminal can be correspondingly controlled when being stolen or lost.
Fig. 4 is a block diagram of a remote control apparatus (included in a mobile terminal) for implementing a mobile terminal according to an embodiment of the present application. The functions implemented by the units included in the apparatus are the same as the functions implemented by the steps included in the method, so that the apparatus can refer to the specific contents of the method, and the apparatus will not be described in detail herein. The apparatus 100 comprises:
a receiving unit 101, configured to receive a remote control start instruction, which is sent by a server and carries IMEI information, an association number, and a user name and a password for obtaining a remote control ID;
a first checking unit 102, configured to check whether IMEI information carried in the remote control start instruction is consistent with IMEI information stored in the mobile terminal;
a second checking unit 103, configured to check whether the associated number exists in the trusted number list of the mobile terminal when the IMEI information carried in the remote control start instruction is consistent with the IMEI information stored in the mobile terminal;
an obtaining unit 104, configured to log in the server by using the user name and the password to obtain a remote control ID, where the associated number exists in a trusted number list of the mobile terminal;
a sending unit 105, configured to send, to the server, a message carrying the remote control ID to start a function of remote control on the mobile terminal.
The device provided by the embodiment of the application can realize the corresponding control of the mobile terminal when the mobile terminal is stolen or lost.
In this embodiment, the apparatus further includes:
the third checking unit is used for checking whether the server identifier for sending the remote control starting instruction is consistent with the preset server identifier in the mobile terminal before checking whether the associated number exists in the trusted number list of the mobile terminal;
accordingly, the second checking unit 103 is specifically configured to:
and if the server identifier for sending the remote control starting instruction is consistent with the preset server identifier in the mobile terminal, checking whether the associated number exists in a trusted number list of the mobile terminal. The risk that the remote control opening instruction is illegally stolen and sent can be further avoided through the third verification unit.
Fig. 5 is a block diagram of an implementation of a remote control apparatus (included in a server) of a mobile terminal according to an embodiment of the present application. The functions implemented by the units included in the apparatus are the same as the functions implemented by the steps included in the method, so that the apparatus can refer to the specific contents of the method, and the apparatus will not be described in detail herein. The apparatus 200 comprises:
a first sending unit 201, configured to send a remote control start instruction carrying IMEI information, an association number, and a user name and a password for obtaining a remote control ID to a mobile terminal;
a second sending unit 202, configured to send a remote control ID to the mobile terminal that logs in the server using the user name and the password;
a first receiving unit 203, configured to receive a message carrying the remote control ID sent by the mobile terminal;
an opening unit 204 configured to open a function of remotely controlling the mobile terminal by using the remote control ID;
a third sending unit 205, configured to send the remote control ID to the remote control terminal corresponding to the associated number.
In an embodiment of the present application, the apparatus further includes: and the second receiving unit is used for receiving a preset instruction for controlling the mobile terminal, which is sent by the remote control terminal, after the function of remotely controlling the mobile terminal through the remote control ID is started, and sending the preset instruction to the mobile terminal.
In addition, the present application also provides a mobile terminal comprising the apparatus 100, a server comprising the apparatus 200, and a system for implementing remote control of a mobile terminal at least comprising the mobile terminal and the server. The mobile terminal, the server and the system can utilize the remote control ID to realize the corresponding control of the mobile terminal when the mobile terminal is stolen or lost.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. A method for realizing remote control of a mobile terminal is characterized in that the method is used for starting remote control of the mobile terminal when the mobile terminal is in a stolen or lost state, and comprises the following steps:
the mobile terminal receives a remote control starting instruction which is sent by a server and carries IMEI information, an associated number and a user name and a password for obtaining a remote control ID;
the mobile terminal checks whether the IMEI information carried in the remote control starting instruction is consistent with the IMEI information stored in the mobile terminal;
if the number is consistent with the number, the mobile terminal checks whether the associated number exists in a trusted number list of the mobile terminal; if not, the remote control function cannot be started;
if the user name and the password exist, the mobile terminal logs in the server by using the user name and the password to obtain a remote control ID; if not, the remote control function is failed to be started;
after the mobile terminal receives the remote control ID, the mobile terminal sends a message which is used for starting the remote control function of the mobile terminal and carries the remote control ID to the server.
2. The method of claim 1, wherein before the mobile terminal verifies whether the associated number exists in a list of trusted numbers for the mobile terminal, the method further comprises:
the mobile terminal checks whether the server identification for sending the remote control starting instruction is consistent with the preset server identification in the mobile terminal;
the mobile terminal checking whether the associated number exists in a trusted number list of the mobile terminal specifically includes:
and if the server identifier for sending the remote control starting instruction is consistent with the preset server identifier in the mobile terminal, the mobile terminal checks whether the associated number exists in a trusted number list of the mobile terminal.
3. A method for realizing remote control of a mobile terminal is characterized in that the method is used for starting remote control of the mobile terminal when the mobile terminal is in a stolen or lost state, and comprises the following steps:
the server sends a remote control starting instruction carrying IMEI information, an associated number and a user name and a password for obtaining a remote control ID to the mobile terminal;
the server sends a remote control ID to the mobile terminal which logs in the server by using the user name and the password;
the server receives a message which is sent by the mobile terminal and carries the remote control ID;
the server starts a function of remotely controlling the mobile terminal through the remote control ID;
and the server sends the remote control ID to a remote control terminal corresponding to the associated number.
4. The method of claim 3, wherein after the server transmits the remote control ID to a remote control terminal corresponding to the association number, the method further comprises:
the server receives a preset instruction which is sent by a remote control terminal and used for controlling the mobile terminal, and sends the preset instruction to the mobile terminal.
5. An apparatus for implementing remote control of a mobile terminal, the apparatus being configured to enable remote control of the mobile terminal when the mobile terminal is in a stolen or lost state, the apparatus comprising:
the receiving unit is used for receiving a remote control starting instruction which is sent by the server and carries IMEI information, an associated number and a user name and a password for obtaining a remote control ID;
the first checking unit is used for checking whether the IMEI information carried in the remote control starting instruction is consistent with the IMEI information stored in the mobile terminal;
a second checking unit, configured to check whether the associated number exists in a trusted number list of the mobile terminal when the IMEI information carried in the remote control start instruction is consistent with the IMEI information stored in the mobile terminal;
the obtaining unit is used for logging in the server by using the user name and the password to obtain a remote control ID (identity) when the associated number exists in a trusted number list of the mobile terminal;
a sending unit, configured to send, to the server, a message carrying a remote control ID and used to start a remote control function of the mobile terminal after the mobile terminal receives the remote control ID;
wherein the apparatus is further configured to: if the IMEI information carried in the remote control starting instruction is inconsistent with the IMEI information stored in the mobile terminal, the remote control function cannot be started; and if the associated number does not exist in the trusted number list of the mobile terminal, the remote control function is failed to be started.
6. The apparatus of claim 5, wherein the apparatus further comprises:
the third checking unit is used for checking whether the server identifier for sending the remote control starting instruction is consistent with the preset server identifier in the mobile terminal before checking whether the associated number exists in the trusted number list of the mobile terminal;
the second verification unit is specifically configured to:
and if the server identifier for sending the remote control starting instruction is consistent with the preset server identifier in the mobile terminal, checking whether the associated number exists in a trusted number list of the mobile terminal.
7. An apparatus for implementing remote control of a mobile terminal, the apparatus being configured to enable remote control of the mobile terminal when the mobile terminal is in a stolen or lost state, the apparatus comprising:
the mobile terminal comprises a first sending unit, a second sending unit and a third sending unit, wherein the first sending unit is used for sending a remote control starting instruction carrying IMEI information, an associated number and a user name and a password for obtaining a remote control ID to the mobile terminal;
a second transmitting unit for transmitting a remote control ID to the mobile terminal which logs in a server using the user name and password;
a first receiving unit, configured to receive a message carrying the remote control ID sent by the mobile terminal;
the starting unit is used for starting the function of remotely controlling the mobile terminal through the remote control ID;
and the third sending unit is used for sending the remote control ID to the remote control terminal corresponding to the associated number.
8. The apparatus of claim 7, wherein the apparatus further comprises:
and the second receiving unit is used for receiving a preset instruction for controlling the mobile terminal, which is sent by the remote control terminal, after the function of remotely controlling the mobile terminal through the remote control ID is started, and sending the preset instruction to the mobile terminal.
9. A mobile terminal, characterized in that, it includes the apparatus for implementing mobile terminal remote control of any claim 5 to 6.
10. A system for implementing remote control of a mobile terminal, comprising the mobile terminal and a server, wherein the mobile terminal comprises the apparatus for implementing remote control of a mobile terminal according to any one of claims 5 to 6, and the server comprises the apparatus for implementing remote control of a mobile terminal according to any one of claims 7 to 8.
CN201510982128.7A 2015-12-23 2015-12-23 Method, device, mobile terminal and system for realizing remote control of mobile terminal Active CN106911653B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510982128.7A CN106911653B (en) 2015-12-23 2015-12-23 Method, device, mobile terminal and system for realizing remote control of mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510982128.7A CN106911653B (en) 2015-12-23 2015-12-23 Method, device, mobile terminal and system for realizing remote control of mobile terminal

Publications (2)

Publication Number Publication Date
CN106911653A CN106911653A (en) 2017-06-30
CN106911653B true CN106911653B (en) 2021-05-11

Family

ID=59206228

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510982128.7A Active CN106911653B (en) 2015-12-23 2015-12-23 Method, device, mobile terminal and system for realizing remote control of mobile terminal

Country Status (1)

Country Link
CN (1) CN106911653B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107358070A (en) * 2017-07-30 2017-11-17 安徽云帮邦网络技术有限公司 A kind of installation method using smart mobile phone as the computer program of key device
CN108600183A (en) * 2018-03-28 2018-09-28 湖南东方华龙信息科技有限公司 Target device control method
CN110881053A (en) * 2019-12-31 2020-03-13 中国银行股份有限公司 Mobile phone remote control method, device and system based on bank system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1984401A (en) * 2006-05-22 2007-06-20 高金铎 Monitoring cell-phone and long-range monitoring method
CN101179851A (en) * 2007-11-23 2008-05-14 深圳市赛格导航科技股份有限公司 Positioning system and method of navigation mobile phone
CN104601324A (en) * 2013-10-30 2015-05-06 阿里巴巴集团控股有限公司 Verification method specific to applications, terminal and system
CN104980926A (en) * 2015-06-05 2015-10-14 小米科技有限责任公司 Remote control method and device for mobile terminal

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102060646B1 (en) * 2013-07-10 2019-12-30 삼성전자주식회사 Method, electronic device and computer readable recording medium for providing location based services

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1984401A (en) * 2006-05-22 2007-06-20 高金铎 Monitoring cell-phone and long-range monitoring method
CN101179851A (en) * 2007-11-23 2008-05-14 深圳市赛格导航科技股份有限公司 Positioning system and method of navigation mobile phone
CN104601324A (en) * 2013-10-30 2015-05-06 阿里巴巴集团控股有限公司 Verification method specific to applications, terminal and system
CN104980926A (en) * 2015-06-05 2015-10-14 小米科技有限责任公司 Remote control method and device for mobile terminal

Also Published As

Publication number Publication date
CN106911653A (en) 2017-06-30

Similar Documents

Publication Publication Date Title
KR102307665B1 (en) identity authentication
CN104601324B (en) A kind of verification method, terminal and system for application
RU2418387C2 (en) Method to disable mobile device
JP5893169B2 (en) Anti-theft protection method and device for mobile phone
CN102413456B (en) User terminal anti-theft method, user terminal anti-theft device and user terminal anti-theft system based on operation network
CA2882033C (en) Data access method and device
CN101252703B (en) Terminal data protecting method, system as well as mobile communication terminal
US20150207917A1 (en) Mobile terminal intelligent anti-theft method and mobile terminal
US8359008B2 (en) Security system and method for an electronic device
WO2015131705A1 (en) Security method, security device and computer storage medium
CN101616495A (en) The method and system of individual privacy in the protection mobile phone
CN106911653B (en) Method, device, mobile terminal and system for realizing remote control of mobile terminal
CN103581441A (en) Mobile terminal tracking anti-theft system and method
CN103079203A (en) Terminal authentication method and smart card
US20150220726A1 (en) Authentication Method, Authentication Apparatus and Authentication Device
CN104811927A (en) Information processing method, terminal and server and communication method and system
CN107786486B (en) Method and device for activating operating system
WO2011140756A1 (en) Mobile terminal, data protection method of mobile terminal and monitor system of mobile terminal
CN107172602B (en) Data security protection method and device for mobile terminal
CN100571436C (en) A kind of implementation method of mobile terminal information resource safety guarantee
CN103379478A (en) Control method, control system, client terminal and server
WO2008089638A1 (en) Method and communication terminal of controlling user information on the communication termial
CN114254342A (en) Communication connection method, system, device, storage medium and processor
WO2016054892A1 (en) Method and device for user information protection
CN105554727B (en) Mobile phone card security verification method, mobile phone card security verification device and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20220825

Address after: No. 9-3-401, No. 39, Gaoxin 6th Road, Binhai Science and Technology Park, High-tech Zone, Binhai New District, Tianjin 300000

Patentee after: 3600 Technology Group Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co.,Ltd.

TR01 Transfer of patent right