CN107483547B - Loss prevention method for user terminal, server, mobile terminal and storage medium - Google Patents

Loss prevention method for user terminal, server, mobile terminal and storage medium Download PDF

Info

Publication number
CN107483547B
CN107483547B CN201710599385.1A CN201710599385A CN107483547B CN 107483547 B CN107483547 B CN 107483547B CN 201710599385 A CN201710599385 A CN 201710599385A CN 107483547 B CN107483547 B CN 107483547B
Authority
CN
China
Prior art keywords
user terminal
loss
instruction
server
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710599385.1A
Other languages
Chinese (zh)
Other versions
CN107483547A (en
Inventor
周佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Everest Mobile Communication Co Ltd
Original Assignee
Beijing Everest Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Everest Mobile Communication Co Ltd filed Critical Beijing Everest Mobile Communication Co Ltd
Priority to CN201710599385.1A priority Critical patent/CN107483547B/en
Publication of CN107483547A publication Critical patent/CN107483547A/en
Application granted granted Critical
Publication of CN107483547B publication Critical patent/CN107483547B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72454User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions

Abstract

The invention discloses a loss prevention method for a user terminal, a server, a mobile terminal and a storage medium. Wherein, the method comprises the following steps: receiving a login request of a first user terminal, wherein the login request comprises a target login account; feeding back a device list corresponding to the target login account to the first user terminal so that the first user terminal can acquire a lost second user terminal selected by a user according to the device list and generate a control instruction for controlling the second user terminal, wherein the device list comprises at least one user terminal bound with the target login account, and the control instruction comprises a loss processing instruction and target object information; receiving a control instruction sent by a first user terminal; and sending the loss processing instruction to a second user terminal corresponding to the target object information so that the second user terminal can execute the loss processing operation according to the loss processing instruction. The invention not only widens the application object range of the loss prevention method, but also improves the loss prevention execution rate and the user experience.

Description

Loss prevention method for user terminal, server, mobile terminal and storage medium
Technical Field
The present invention relates to the field of mobile communications technologies, and in particular, to a loss prevention method for a user terminal, a server, a mobile terminal, and a storage medium.
Background
With the APP of various functions and services, more and more information and data in the life and work of a mobile phone user are concentrated in one mobile phone. Therefore, mobile phones carry more and more sensitive information for the owner. If the mobile phone is not protected, the lost cost is higher and higher. For a mobile phone with security, most users can save more important files or privacy information in the mobile phone based on trust of the mobile phone, and the loss after loss is larger. In the early years, a statistical result is issued by McAfe and market research Institute, namely Ponemon Institute, and according to an incomplete survey, the mobile phone loss rate reaches 43% every year and only 7% of mobile phones can be found really by business personnel.
In the existing mobile phone anti-loss processing method, another number is mainly set as a relatives and friends number, so that a mobile phone lost by a mobile phone owner is found through the relatives and friends number. However, the method for processing loss prevention of the mobile phone has the following defects: 1. when the mobile phone of the owner is not lost, the user of the relatives and friends number can inquire the position information of the owner in real time, so that the trace of the owner is leaked, and the use experience of the user is influenced. 2. Only the mobile phone of the relatives and friends can be used to find the lost mobile phone of the owner, so the problem of narrow application object range of the loss prevention method exists. 3. When the mobile phone of the owner is lost, the owner may not be able to contact the user of the friend number immediately (for example, the mobile phone of the friend number is in a scene of power off, conversation, arrearage and the like), so that the lost mobile phone is lost in the best time, and the problem of low execution rate of loss prevention exists.
Disclosure of Invention
The invention aims to provide a loss prevention method of a user terminal, a server, a mobile terminal and a storage medium, and aims to solve the problems of low loss prevention execution rate, narrow application object range and poor user experience.
In order to solve the above problem, the present invention provides a method for preventing a user terminal from being lost, which is applied to a server, and the method for preventing the user terminal from being lost comprises the following steps:
receiving a login request of a first user terminal, wherein the login request comprises a target login account;
feeding back a device list corresponding to the target login account to the first user terminal so that the first user terminal can acquire a lost second user terminal selected by a user according to the device list and generate a control instruction for controlling the second user terminal, wherein the device list comprises at least one user terminal bound with the target login account, and the control instruction comprises a loss processing instruction and target object information;
receiving a control instruction sent by a first user terminal;
and sending the loss processing instruction to a second user terminal corresponding to the target object information so that the second user terminal can execute the loss processing operation according to the loss processing instruction.
As a further improvement of the present invention, before the step of sending the loss processing instruction to the second user terminal corresponding to the target object information, the method includes:
detecting whether the second user terminal is on-line;
and if the second user terminal is not on-line, storing the control instruction, continuously detecting whether the second user terminal is on-line within a preset time period from the current time point, and if the second user terminal is not on-line within the preset time period from the current time point, generating feedback information and sending the feedback information to the first user terminal.
As a further improvement of the present invention, after the step of detecting whether the second user terminal is online, the method further comprises:
if the second user terminal is on-line, acquiring the use state information of the second user terminal;
judging whether a loss prevention switch group of the second user terminal is started or not according to the use state information;
and if the loss prevention switch group of the second user terminal is judged not to be started according to the use state information, sending a loss prevention switch group starting instruction to the second user terminal.
As a further improvement of the invention, the anti-loss switch group comprises an automatic anti-theft photo shooting switch and a power-off sending position switch.
A server comprising a first processor, a first memory coupled to the first processor;
the first processor and the first memory can realize the steps of the loss prevention method of the user terminal when in work.
A storage medium having stored thereon first program data, the first program data when executed by a first processor implementing the steps in the above-described loss prevention method for a user terminal.
A method for preventing loss of a user terminal is applied to a second user terminal, and comprises the following steps:
receiving a loss processing instruction which is transmitted by a first user terminal logged in through a target login account and forwarded by a server, wherein the target login account is bound with a second user terminal;
the miss processing operation is performed in accordance with the miss processing instruction.
As a further improvement of the present invention, after the step of receiving a loss handling instruction sent by a first user terminal logged in through a target login account and forwarded by a server, the method includes:
detecting whether to start the authority to execute the lost processing operation;
and if the authority for executing the lost processing operation is not opened, forcibly opening the authority for executing the lost processing operation.
As a further improvement of the invention, the loss processing instruction at least comprises one or more of the following: the remote control system comprises a remote locking instruction, a data retrieving instruction, a real-time tracking instruction, a remote photographing instruction, a data clearing instruction and a ring tone playing instruction.
As a further improvement of the present invention, if the lost processing instruction is a remote lock instruction, the performing the lost processing operation according to the lost processing instruction includes:
locking the second user terminal;
and feeding back a locking result to the first user terminal through the server.
As a further improvement of the present invention, the loss processing instruction includes target contact information, and after the step of locking the second user terminal, the method further includes:
and outputting and displaying the target contact information to a screen locking display interface of the second user terminal.
As a further improvement of the present invention, if the missing processing instruction is a retrieve data instruction, the performing the missing processing operation according to the missing processing instruction includes:
and forcibly synchronizing the preset important data information in the second user terminal to the server.
As a further improvement of the present invention, the step of forcing the preset important data information in the second user terminal to be synchronized to the server includes:
detecting whether the current network type is a mobile data network or a Wi-Fi network;
if the current network type is a mobile data network, synchronizing preset important data information to a server according to the preset data priority;
if the current network type is the Wi-Fi network, acquiring a file directory of a second user terminal, and sending the file directory to the first user terminal through the server, so that the first user terminal can acquire required file information selected by a user according to the file directory; and receiving required file information transmitted by the first user terminal and forwarded by the server, and synchronizing a file corresponding to the required file information to the server.
A mobile terminal comprising a second processor, a second memory coupled to the second processor, a display;
the second processor, the second memory and the display can realize the steps of the loss prevention method of the user terminal when in work.
A storage medium having stored thereon second program data, the second program data when executed by a second processor implementing the steps in the above-described loss prevention method for a user terminal.
Compared with the prior art, after the second user terminal is lost, the user can send a loss processing instruction to the second user terminal through any one first user terminal through the server to execute the loss processing operation, so that the application object range of the loss prevention method is widened, and the loss prevention execution rate is also improved. In addition, the position information of the second user terminal cannot be known by other people in real time, so that the use experience of the user is improved.
Drawings
Fig. 1 is a flowchart illustrating a first embodiment of a method for preventing a user terminal from being lost according to the present invention;
fig. 2 is a schematic view of an application scenario of the loss prevention method of the ue according to the present invention;
fig. 3 is a flowchart illustrating a second embodiment of a method for preventing loss of a ue according to the present invention;
fig. 4 is a flowchart illustrating a loss prevention method for a ue according to a third embodiment of the present invention;
FIG. 5 is a terminal interface presentation diagram of one embodiment of a second user terminal;
FIG. 6 is a functional block diagram of a first embodiment of a server according to the present invention;
FIG. 7 is a functional block diagram of a server according to a second embodiment of the present invention;
FIG. 8 is a functional block diagram of a server according to a third embodiment of the present invention;
fig. 9 is a flowchart illustrating a first embodiment of a method for preventing loss of a ue according to another embodiment of the present invention;
fig. 10 is a flowchart illustrating a second embodiment of a method for preventing loss of a ue according to another embodiment of the present invention;
fig. 11 is a flowchart illustrating a first embodiment of a loss handling operation in another method for preventing a loss of a ue according to the present invention;
fig. 12 is a flowchart illustrating a second embodiment of the loss handling operation in the method for preventing loss of a ue according to the present invention;
fig. 13 is a flowchart illustrating a loss prevention method for a ue according to a third embodiment of the present invention;
FIG. 14 is a flowchart illustrating an embodiment of information synchronization operation in another loss prevention method of a UE according to the present invention;
FIG. 15 is a functional block diagram of a first embodiment of a second user terminal according to the present invention;
FIG. 16 is a functional block diagram of a second embodiment of a second user terminal according to the present invention;
fig. 17 is a functional block diagram of a first embodiment of a loss processing module in a second user terminal according to the present invention;
fig. 18 is a functional block diagram of a second embodiment of a loss handling module in a second user terminal according to the present invention;
fig. 19 is a functional block diagram of a third embodiment of a second user terminal according to the present invention;
fig. 20 is a functional module diagram of an embodiment of an information synchronization sub-module in the second user terminal according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Fig. 1 shows an embodiment of the loss prevention method of the user terminal of the present invention. In this embodiment, the loss prevention method of the user terminal is applied to the server. Specifically, the method for preventing the loss of the user terminal comprises the following steps:
step S1, receiving a login request of the first user terminal, where the login request includes a target login account.
It should be noted that, the first user terminal in this embodiment may include: smart phones, tablets, computer devices such as laptops, desktops, and the like.
Step S2, feeding back a device list corresponding to the target login account to the first user terminal, so that the first user terminal obtains a second user terminal lost by the user according to the device list, and generates a control instruction for controlling the second user terminal, where the device list includes at least one user terminal bound to the target login account, and the control instruction includes a loss processing instruction and target object information.
It should be noted that one target login account may be bound to one or more user terminals, and related binding information may exist in the server, and when a user accesses the server in this embodiment through the target login account, the server may search, according to the target login account, an equipment list corresponding to the target login account, where the equipment list stores at least one user terminal bound to the target login account. Further, the device list of this embodiment necessarily includes the second user terminal, but the device list may include the first user terminal or may not include the first user terminal. Further, in this embodiment, the binding between the target login account and each user terminal may be implemented according to the international equipment identity IMEI of each user terminal.
In addition, the second user terminal in this embodiment may include: smart phones, smart wearable devices, tablets, personal digital assistants, laptop portable computers, and the like.
And step S3, receiving a control instruction sent by the first user terminal.
Step S4, sending a loss processing instruction to the second user terminal corresponding to the target object information, so that the second user terminal performs a loss processing operation according to the loss processing instruction.
In an exemplary application scenario, as shown in fig. 2, the application scenario includes: a server 1, a first user terminal 2 and a second user terminal 3. The first user terminal 2 is a loss-prevention user terminal. The second user terminal 3 is a lost user terminal.
First, after losing the second user terminal 3, the owner may send a login request to the server 1 through the first user terminal 2, where the login request includes a target login account. Next, when receiving the login request, the server 1 feeds back the device list corresponding to the target login account to the first user terminal 2. And thirdly, when the first user terminal 2 receives the equipment list, outputting and displaying the equipment list so that the user can select the lost second user terminal 3 according to the equipment list, and generating a control instruction for controlling the second user terminal 3, wherein the control instruction comprises a loss processing instruction and target object information. Again, the first user terminal 2 sends the control instruction to the server 1. Again, the server 1 transmits a loss processing instruction to the second user terminal 3 corresponding to the target object information. Finally, the second user terminal 3 performs the loss handling operation according to the loss handling instruction.
As can be seen from the foregoing embodiments, in this embodiment, after the second user terminal is lost, the user may send a loss processing instruction to the second user terminal through any one of the first user terminals via the server to execute the loss processing operation, so that the application object range of the loss prevention method is widened, and the loss prevention execution rate is also increased. In addition, the position information of the second user terminal cannot be known by other people in real time, so that the use experience of the user is improved.
The method for preventing the user terminal from being lost is applied to the using process of the server, the online state of the second user terminal is automatically detected, and the invalid sending of the control instruction is avoided. Therefore, on the basis of the above embodiment, in another embodiment, referring to fig. 3, before step S4, the method further includes:
step S10, detecting whether the second user terminal is online. If the second user terminal is not online, step S11 is executed. If the second user terminal is online, step S4 is executed.
And step S11, storing the control instruction, continuously detecting whether the second user terminal is on-line within a preset time period from the current time point, and generating feedback information and sending the feedback information to the first user terminal if the second user terminal is not on-line within the preset time period from the current time point.
The embodiment automatically detects the online state of the second user terminal, so that the second user terminal sends the control instruction when the second user terminal is online, and the second user terminal is not online in the preset time period, and sends the feedback information to the first user terminal, thereby avoiding executing the operation of sending the control instruction under the condition that the second user terminal is not online, so that the second user terminal is mistakenly considered to execute the loss processing operation, and further reducing the loss prevention application effect. In addition, the detection whether the second user terminal is on line or not is avoided being executed for a long time, so that the effective utilization rate of system resources of the server is reduced.
The method for preventing the user terminal from being lost is applied to the using process of the server, when the second user terminal is online, the second user terminal needs to be ensured to be started, and a foundation is provided for the subsequent second user terminal to automatically execute the anti-loss treatment. Therefore, on the basis of the above embodiment, in another embodiment, referring to fig. 4, step S4 is preceded by:
step S20, the use state information of the second user terminal is acquired.
It should be noted that the usage state information in this embodiment includes an open state of the anti-lost open in the second user terminal. Wherein, prevent losing the switch default and open in the second user terminal, and when preventing losing the switch and opening, support following function:
1. allowing some simple information to be sent to the server
2. Allowing remote locking/unlocking (after locking, the network can not be shut down and closed actively)
3. Allowing forced data backup (invisible synchronous switch)
4. Enabling remote one-touch emptying of data
5. Allowing forced ringing
6. Allowing position location tracking (forcing the use of high precision positioning)
7. Automatic reporting of current number after card change
And step S21, judging whether the anti-loss switch group of the second user terminal is opened or not according to the using state information. If it is determined that the loss prevention switch group of the second user terminal is not turned on according to the use state information, step S22 is performed. If it is determined that the loss prevention switch group of the second user terminal is turned on according to the use state information, step S4 is performed.
And step S22, sending the anti-loss switch group opening instruction to the second user terminal. Step S4 is executed.
It should be noted that, in the present embodiment, the automatic photo taking switch and the power-off sending position switch are provided. Specifically, fig. 5 shows a terminal interface display diagram of the present embodiment.
Automatically shooting an anti-theft photo: and default opening is performed, a password is input in a screen locking interface during opening, and when the password is input for 5 times in a continuous mistake-proofing mode, the front-facing camera is automatically started to shoot a picture.
Shutdown sending position: and default opening, wherein when the mobile phone is started, and is shut down at low power or manually, the current geographic position is taken and sent to the server.
The protection time is as follows: the calculation starts from the day the second user terminal function is found to be activated, and the date is displayed for 1 day when the day is started.
The server automatically acquires the use state information of the second user terminal, and when the anti-loss switch group is automatically judged to be not opened according to the use state information, sends an opening instruction of the anti-loss switch group to the second user terminal so as to open the anti-loss switch group, so that the situation that the user cannot execute the loss processing operation under the condition that the user does not open the anti-loss switch group is avoided, and the use experience of the user is further improved.
Fig. 6 illustrates one embodiment of a server of the present invention. In this embodiment, the server includes a login request receiving module 10, a first feedback module 11, a control instruction receiving module 12, and a first sending module 13.
The system comprises a login request receiving module 10, a login request processing module and a login request processing module, wherein the login request receiving module is used for receiving a login request of a first user terminal, and the login request comprises a target login account; the first feedback module 11 is configured to feed back a device list corresponding to the target login account to the first user terminal, so that the first user terminal obtains a second user terminal lost by a user according to the device list, and generates a control instruction for controlling the second user terminal, where the device list includes at least one user terminal bound to the target login account, and the control instruction includes a loss processing instruction and target object information; a control instruction receiving module 12, configured to receive a control instruction sent by a first user terminal; and the first sending module 13 is configured to send a loss processing instruction to the second user terminal corresponding to the target object information, so that the second user terminal performs a loss processing operation according to the loss processing instruction.
On the basis of the above embodiment, in other embodiments, referring to fig. 7, the server further includes a detection module 20 and a second feedback module 21.
The detecting module 20 is configured to detect whether the second user terminal is online; the second feedback module 21 is configured to store the control instruction if the second user terminal is not online, continue to detect whether the second user terminal is online within a preset time period from the current time point, generate feedback information if the second user terminal is not online within the preset time period from the current time point, and send the feedback information to the first user terminal.
On the basis of the above embodiment, in other embodiments, referring to fig. 8, the server further includes an obtaining module 30, a determining module 31, and a second sending module 32.
The obtaining module 30 is configured to obtain the use state information of the second user terminal if the second user terminal is online; the judging module 31 is configured to judge whether the loss prevention switch group of the second user terminal is turned on according to the use state information; the second sending module 32 is configured to send an open instruction of the anti-loss switch group to the second user terminal if it is determined that the anti-loss switch group of the second user terminal is not open according to the use state information.
On the basis of the above embodiment, in other embodiments, the anti-loss switch group includes an automatic anti-theft photo taking switch and a power-off sending position switch.
For other details of the technical solutions implemented by the modules in the server in the above three embodiments, reference may be made to the description of the loss prevention method for the user terminal in the above embodiments, and details are not described here again.
It should be noted that, in the present specification, the embodiments are all described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments may be referred to each other. For the device-like embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The embodiment also provides a server, which includes a first processor and a first memory, wherein the first processor is coupled to the first memory. The first memory stores the functional modules described in the above embodiments. The first processor executes the functional modules stored in the first memory and described in the above embodiments, and may implement the loss prevention method for the user terminal provided by the present application.
The embodiment also provides a storage medium for storing first program data, which contains program data designed for executing the embodiment of the loss prevention method of the user terminal described above in the present application. By executing the first program data stored in the storage medium, the loss prevention method of the user terminal provided by the application can be realized.
As shown in fig. 9, fig. 9 is a flow chart illustrating another loss prevention method for a user terminal; the method for preventing the user terminal from being lost is applied to a second user terminal. Specifically, the method for preventing the loss of the user terminal comprises the following steps:
step S40, receiving a loss handling instruction sent by the first user terminal logged in through the target login account forwarded by the server, where the target login account is bound to the second user terminal.
It should be noted that one target login account may be bound to one or more user terminals, and related binding information may exist in the server, and when a user accesses the server in this embodiment through the target login account, the server may search, according to the target login account, an equipment list corresponding to the target login account, where the equipment list stores at least one user terminal bound to the target login account. Further, the device list of this embodiment necessarily includes the second user terminal, but the device list may include the first user terminal or may not include the first user terminal. Further, in this embodiment, the binding between the target login account and each user terminal may be implemented according to the international equipment identity IMEI of each user terminal.
In step S41, a miss processing operation is performed according to the miss processing instruction.
On the basis of the above embodiment, in other embodiments, the miss processing instruction includes at least one or more of the following: the remote control system comprises a remote locking instruction, a data retrieving instruction, a real-time tracking instruction, a remote photographing instruction, a data clearing instruction and a ring tone playing instruction.
The present embodiment is still applicable to the application scenarios described in the above embodiments, and therefore, the description is not repeated again.
As can be seen from the foregoing embodiments, in this embodiment, after the second user terminal is lost, the user may send a loss processing instruction to the second user terminal through any one of the first user terminals via the server to execute the loss processing operation, so that the application object range of the loss prevention method is widened, and the loss prevention execution rate is also increased. In addition, the position information of the second user terminal cannot be known by other people in real time, so that the use experience of the user is improved.
When the method for preventing the user terminal from being lost is applied to the use process of the mobile terminal, the second user terminal is required to automatically detect and open the permission of the loss processing operation. Therefore, on the basis of the above embodiment, in another embodiment, referring to fig. 10, after step S40, the method further includes:
in step S50, it is detected whether or not the authority to perform the loss processing operation is turned on. If the authority to execute the missing processing operation is not turned on, step S51 is executed. If the authority to perform the miss processing operation is turned on, step S41 is performed.
In step S51, the authority to perform the loss processing operation is forcibly turned on. Step S41 is executed.
The second user terminal of the embodiment automatically detects that the authority for executing the loss processing operation is not opened, and forcibly opens the authority for executing the loss processing operation, so that the problem that the loss processing operation cannot be executed under the condition that the authority for executing the loss processing operation is not opened by a user is avoided, and the user experience is further improved.
When the method for preventing the loss of the user terminal of the present invention is applied to the use process of the mobile terminal, and if the loss processing instruction is a remote locking instruction, referring to fig. 11, step S41 specifically includes:
step S4101 locks the second user terminal.
Specifically, locking the second user terminal includes prohibiting the second user terminal from lighting a screen, locking a screen-locked interface, prohibiting unlocking an access system, prohibiting pulling out a notification or setting a mobile phone on a toolbar, prohibiting powering off via a power key, prohibiting dragging the power off, and the like.
Step S4102, feeding back the locking result to the first user terminal through the server.
Specifically, the second user terminal returns a notification of device locking to the server, the server issues the notification to the first user terminal, the first user terminal changes the current locking state of the second user terminal into a locked state, and the remote locking button is displayed to unlock. Furthermore, the first user terminal may further send the unlocking instruction to the second user terminal through the server by clicking the unlocking instruction, so as to unlock the second user terminal.
According to the embodiment, the second user terminal is remotely locked, so that other users are prevented from operating the second user terminal, the leakage of the privacy data of the second user terminal is avoided, and the data security performance of the terminal is improved.
The method for preventing the loss of the user terminal of the present invention is applied to the use process of the mobile terminal, and in order to facilitate the finder to quickly contact the owner, on the basis of the above embodiment, in other embodiments, the loss processing instruction includes the target contact information, referring to fig. 12, and after step S4101, the method further includes:
and step S4111, outputting and displaying the target contact information to a screen locking display interface of the second user terminal.
Specifically, the first user terminal is provided with a remote lock button. And when the user clicks the remote locking button, outputting a display input box to allow the user to input screen locking display contents in the input box, wherein the screen locking display contents comprise target contact information, and generating a loss processing instruction according to the screen locking display contents.
And further, after the second user terminal is locked, outputting and displaying the target contact information to a screen locking display interface of the second user terminal. In this embodiment, the target contact information may include: contact addresses of contacts, names of contacts, attachment messages, and the like, which may include: the mobile phone number, the landline number, the mailbox, the account number of the social software, the contact address, and the like of the contact person, and the attachment message may include: any one piece of content for guiding the user who picks up the second user terminal to contact the owner, such as' good person, please contact me after picking up the mobile phone, and return for a fee.
It should be noted that, in this embodiment, step S4111 and step S4102 are not in sequence.
The embodiment outputs and displays the target contact information so that the picker of the terminal can contact the owner of the terminal in real time, and therefore the use experience of the user is further improved.
The method for preventing loss of the user terminal of the present invention is applied to the use process of the mobile terminal, so as to avoid leakage of important data information, on the basis of the foregoing embodiment, in another embodiment, referring to fig. 13, step S41 specifically includes:
step S4120, forcibly synchronize the preset important data information in the second user terminal to the server.
It should be noted that, in this embodiment, synchronizing the preset important data information to the server is to cut the preset important data information and transmit the cut preset important data information to the server. Further, the preset important data information in this embodiment may preset set important data, such as: some types of material, such as documents, pictures, etc., or the latest material.
The embodiment forces the preset important data information to be synchronized to the server, so that the loss of the important data information is avoided on one hand, and the leakage of the important data information is avoided on the other hand.
The loss prevention method of the user terminal is applied to the use process of the mobile terminal, and different synchronization strategies can be adopted according to different network types so as to improve the use experience of the user. Therefore, on the basis of the above embodiment, in another embodiment, referring to fig. 14, step S4120 specifically includes:
step S41201, detecting whether the current network type is a mobile data network or a Wi-Fi network. If the current network type is the mobile data network, step S41202 is performed. If the current network type is a Wi-Fi network, step S41203 is performed.
In step S41202, the preset important data information is synchronized to the server according to the preset data priority.
It should be noted that, in this embodiment, the data priority under the mobile data network may be preset to set, so as to perform data transmission according to the data priority. In addition, the user of the embodiment can also revise the data priority in real time.
Step S41203, acquiring a file directory of the second user terminal, and sending the file directory to the first user terminal through the server, so that the first user terminal can acquire the required file information selected by the user according to the file directory; and receiving required file information transmitted by the first user terminal and forwarded by the server, and synchronizing a file corresponding to the required file information to the server.
Further, if the loss prevention instruction is a real-time tracking instruction, after receiving the loss prevention instruction, the second user terminal performs a loss prevention operation according to the loss prevention instruction, including:
under the condition that the second user terminal has a network, the second user terminal transmits the position information to the server in real time, and the first user terminal can track the motion track of the second user terminal in real time through the server. Furthermore, when the second user terminal transmits the position information to the server in real time, high-precision positioning is forcibly used.
Further, if the loss prevention instruction is a remote photographing instruction, after the second user equipment receives the remote photographing instruction, the second user terminal triggers a front camera and a back camera to photograph to obtain a photographed image, and the photographed image is transmitted back to the server.
Further, if the loss prevention instruction is a ring playing instruction, the second user equipment forces the second user terminal to play a preset ring at the maximum volume after receiving the ring playing instruction, and the ring can be automatically stopped after playing for a preset time, or the user can actively select to stop playing the ring at the first user terminal.
Further, if the loss prevention instruction is a data clearing instruction, the second user equipment restores factory settings at the second user terminal after receiving the data clearing instruction.
Fig. 15 shows an embodiment of the second user terminal of the present invention. In this embodiment, the second user terminal comprises a receiving module 50 and a loss processing module 51.
The receiving module 50 is configured to receive a loss processing instruction sent by a first user terminal logged in through a target login account, where the target login account is bound to a second user terminal; and a miss processing module 51, configured to perform a miss processing operation according to the miss processing instruction.
On the basis of the above embodiment, in other embodiments, referring to fig. 16, the second user terminal further includes a detection module 60 and an opening module 61.
Wherein, the detecting module 60 is configured to detect whether to start an authority to execute the loss handling operation; the starting module 61 is configured to, if the permission to execute the lost processing operation is not started, forcibly start the permission to execute the lost processing operation.
On the basis of the above embodiment, in other embodiments, the loss processing instruction includes at least one or more of the following: the remote control system comprises a remote locking instruction, a data retrieving instruction, a real-time tracking instruction, a remote photographing instruction, a data clearing instruction and a ring tone playing instruction.
On the basis of the above embodiment, in other embodiments, referring to fig. 17, if the lost processing instruction is a remote lock instruction, the lost processing module 51 includes a lock unit 5101 and a feedback unit 5102.
The locking unit 5101 is configured to lock the second user terminal; the feedback unit 5102 is configured to feed back the locking result to the first user terminal through the server.
On the basis of the above embodiment, in other embodiments, referring to fig. 18, the loss processing instruction includes the target contact information, and the loss processing module 51 further includes an output display unit 5111. The output display unit 5111 is configured to output and display the target contact information to a screen locking display interface of the second user terminal.
On the basis of the above embodiment, in other embodiments, referring to fig. 19, if the miss processing instruction is a retrieve data instruction, the miss processing module 51 further includes an information synchronization sub-module 5121. The information synchronization sub-module 5121 is configured to force the information of the important data preset in the second user terminal to be synchronized with the server.
On the basis of the above-described embodiment, in other embodiments, referring to fig. 20, the information synchronization sub-module 5121 includes a detection unit 51211, a first synchronization unit 51212, and a second synchronization unit 51213.
The detecting unit 51211 is configured to detect whether the current network type is a mobile data network or a Wi-Fi network; a first synchronizing unit 51212, configured to synchronize the preset important data information to the server according to the preset data priority if the current network type is the mobile data network; a second synchronizing unit 51213, configured to, if the current network type is a Wi-Fi network, obtain a file directory of the second user terminal, and send the file directory to the first user terminal through the server, so that the first user terminal obtains information of a file required by the user according to the file directory; and receiving required file information transmitted by the first user terminal and forwarded by the server, and synchronizing a file corresponding to the required file information to the server.
For other details of the technical solutions implemented by the modules in the server in the six embodiments, reference may be made to the description of the loss prevention method for the user terminal in the embodiments, and details are not described here again.
It should be noted that, in the present specification, the embodiments are all described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments may be referred to each other. For the device-like embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The embodiment also provides a mobile terminal, which includes a second processor and a second memory, wherein the second processor is coupled to the second memory. The second memory stores the functional modules described in the above embodiments. The second processor executes the functional modules stored in the second memory and described in the above embodiments, and may implement the loss prevention method for the user terminal provided by the present application.
The embodiment also provides a storage medium for storing second program data, which contains program data designed for executing the embodiment of the loss prevention method of the user terminal described above in the present application. The method for preventing the user terminal from being lost provided by the application can be realized by executing the second program data stored in the storage medium.
The above detailed description of the embodiments of the present invention is provided as an example, and the present invention is not limited to the above described embodiments. It will be apparent to those skilled in the art that any equivalent modifications or substitutions can be made within the scope of the present invention, and thus, equivalent changes and modifications, improvements, etc. made without departing from the spirit and scope of the present invention should be included in the scope of the present invention.

Claims (13)

1. A method for preventing loss of a user terminal is applied to a server, and the method for preventing loss of the user terminal comprises the following steps:
receiving a login request of a first user terminal, wherein the login request comprises a target login account;
feeding back a device list corresponding to the target login account to the first user terminal so that the first user terminal can acquire a lost second user terminal selected by a user according to the device list and generate a control instruction for controlling the second user terminal, wherein the device list comprises at least one user terminal bound with the target login account, and the control instruction comprises a loss processing instruction and target object information;
receiving the control instruction sent by the first user terminal;
detecting whether a second user terminal corresponding to the target object information is online;
if the second user terminal is not on-line, storing the control instruction, continuously detecting whether the second user terminal is on-line within a preset time period from the current time point, and if the second user terminal is not on-line within the preset time period from the current time point, generating feedback information and sending the feedback information to the first user terminal;
and if the second user terminal is online, sending the loss processing instruction to the second user terminal so that the second user terminal can execute loss processing operation according to the loss processing instruction.
2. The method of claim 1, wherein after the step of detecting whether the second user terminal is online, the method further comprises:
if the second user terminal is on-line, acquiring the use state information of the second user terminal;
judging whether a loss prevention switch group of the second user terminal is started or not according to the use state information;
and if the loss prevention switch group of the second user terminal is judged not to be started according to the use state information, sending a loss prevention switch group starting instruction to the second user terminal.
3. The method of claim 2, wherein the anti-loss switch set comprises an auto-shoot anti-theft photo switch and a power-off send position switch.
4. A server, comprising a first processor, a first memory coupled to the first processor;
the first processor, the first memory and being operable to implement the steps of the method of preventing loss of a user terminal of any of claims 1-3.
5. A storage medium having first program data stored thereon, wherein the first program data, when executed by a first processor, implements the steps in the loss prevention method of the user terminal according to any one of claims 1-3.
6. A method for preventing a user terminal from being lost is applied to a second user terminal, and the method for preventing the user terminal from being lost comprises the following steps:
receiving a loss processing instruction which is transmitted by a first user terminal logged in through a target login account and forwarded by a server, wherein the target login account is bound with a second user terminal;
detecting whether to turn on the authority to execute the loss processing operation;
if the authority for executing the lost processing operation is not started, the authority for executing the lost processing operation is forcibly started;
and executing the lost processing operation according to the lost processing instruction.
7. The method according to claim 6, wherein the loss handling instruction at least includes one or more of the following: the remote control system comprises a remote locking instruction, a data retrieving instruction, a real-time tracking instruction, a remote photographing instruction, a data clearing instruction and a ring tone playing instruction.
8. The method according to claim 7, wherein if the loss processing command is a remote lock command, the performing the loss processing operation according to the loss processing command comprises:
locking the second user terminal;
and feeding back a locking result to the first user terminal through the server.
9. The method of claim 8, wherein the loss handling instruction includes target contact information, and wherein after the step of locking the second user terminal, the method further comprises:
and outputting and displaying the target contact information to a screen locking display interface of the second user terminal.
10. The method according to claim 7, wherein if the loss processing instruction is a retrieve data instruction, the performing the loss processing operation according to the loss processing instruction comprises:
and forcibly synchronizing the preset important data information in the second user terminal to the server.
11. The method as claimed in claim 10, wherein the step of forcing the preset important data information in the second user terminal to be synchronized to the server comprises:
detecting whether the current network type is a mobile data network or a Wi-Fi network;
if the current network type is a mobile data network, synchronizing preset important data information to the server according to a preset data priority;
if the current network type is a Wi-Fi network, acquiring a file directory of the second user terminal, and sending the file directory to the first user terminal through the server, so that the first user terminal can acquire required file information selected by a user according to the file directory; and receiving the required file information transmitted by the first user terminal and forwarded by the server, and synchronizing the file corresponding to the required file information to the server.
12. A mobile terminal comprising a second processor, a second memory coupled to the second processor, a display;
the second processor, the second memory and the display are operable to implement the steps in the loss prevention method of the user terminal of any of claims 6-11.
13. A storage medium having second program data stored thereon, wherein the second program data, when executed by a second processor, implement the steps in the loss prevention method of the user terminal according to any one of claims 6 to 11.
CN201710599385.1A 2017-07-20 2017-07-20 Loss prevention method for user terminal, server, mobile terminal and storage medium Active CN107483547B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710599385.1A CN107483547B (en) 2017-07-20 2017-07-20 Loss prevention method for user terminal, server, mobile terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710599385.1A CN107483547B (en) 2017-07-20 2017-07-20 Loss prevention method for user terminal, server, mobile terminal and storage medium

Publications (2)

Publication Number Publication Date
CN107483547A CN107483547A (en) 2017-12-15
CN107483547B true CN107483547B (en) 2020-10-30

Family

ID=60595066

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710599385.1A Active CN107483547B (en) 2017-07-20 2017-07-20 Loss prevention method for user terminal, server, mobile terminal and storage medium

Country Status (1)

Country Link
CN (1) CN107483547B (en)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108366338B (en) * 2018-01-31 2021-07-16 联想(北京)有限公司 Method and device for searching electronic equipment
CN108401251B (en) * 2018-02-09 2021-10-15 深圳市易路网科技有限公司 Method for remotely locking and unlocking MIFI terminal
CN109379422A (en) * 2018-10-11 2019-02-22 广东小天才科技有限公司 Smartwatch reports the loss method, apparatus, equipment and storage medium
CN109639834A (en) * 2019-01-25 2019-04-16 努比亚技术有限公司 A kind of synchronizing information processing method, system and mobile terminal
CN110519453A (en) * 2019-08-14 2019-11-29 谢启银 A kind of mobile terminal loses method for retrieving, device and mobile terminal
CN110855833A (en) * 2019-11-12 2020-02-28 Oppo广东移动通信有限公司 Terminal retrieving method and device, terminal and storage medium
CN111050236B (en) * 2019-12-23 2022-12-13 珠海市魅族科技有限公司 Electronic equipment anti-theft method, device and system, electronic equipment and storage medium
CN115022458A (en) * 2021-11-08 2022-09-06 荣耀终端有限公司 Method, system, electronic device and medium for processing loss of electronic device
CN114205452A (en) * 2021-12-15 2022-03-18 Tcl通讯科技(成都)有限公司 Information processing method, apparatus and computer readable storage medium
WO2023169545A1 (en) * 2022-03-11 2023-09-14 华为技术有限公司 Offline device control method and related apparatus
CN115103055B (en) * 2022-06-17 2023-10-03 度小满科技(北京)有限公司 Loss processing method, loss processing device, mobile terminal and readable storage medium
CN116506496B (en) * 2023-06-25 2023-09-22 深圳市华曦达科技股份有限公司 Locking method, device, equipment and computer readable storage medium for equipment
CN116701064B (en) * 2023-08-08 2023-10-10 芯知科技(江苏)有限公司 Mobile equipment lost data processing method and system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105592146A (en) * 2015-12-16 2016-05-18 小米科技有限责任公司 Equipment control method, device and terminal
CN106060796A (en) * 2016-06-01 2016-10-26 宇龙计算机通信科技(深圳)有限公司 Method and device for destroying backups of terminal

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050186954A1 (en) * 2004-02-20 2005-08-25 Tom Kenney Systems and methods that provide user and/or network personal data disabling commands for mobile devices

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105592146A (en) * 2015-12-16 2016-05-18 小米科技有限责任公司 Equipment control method, device and terminal
CN106060796A (en) * 2016-06-01 2016-10-26 宇龙计算机通信科技(深圳)有限公司 Method and device for destroying backups of terminal

Also Published As

Publication number Publication date
CN107483547A (en) 2017-12-15

Similar Documents

Publication Publication Date Title
CN107483547B (en) Loss prevention method for user terminal, server, mobile terminal and storage medium
CN107707746B (en) Management method of mobile terminal, electronic device and storage medium
JP6521864B2 (en) Method using portable electronic device, portable electronic device, and computer program
EP3200483B1 (en) Method and device for acquiring location information
WO2016146060A1 (en) Sharing method and device for picture
EP3179397A1 (en) Methods and devices for managing automatic parallel login and logout in several applications
JP2015507894A (en) Anti-theft protection method and device for mobile phone
CN106095465B (en) Method and device for setting identity image
CN102158595A (en) Method and device for realizing burglary prevention of mobile terminal by face recognition
CN104902080B (en) A kind of information interacting method and equipment
CN108052822B (en) Terminal control method, device and system
EP2985979A1 (en) Method and device for backing up data and electronic device
CN113259226B (en) Information synchronization method and device, electronic equipment and storage medium
CN106713127B (en) Method and device for acquiring and processing instant chat records
CN113206781B (en) Client control method, device, equipment and storage medium
JP2013141215A (en) Selection method, system and device of image photographed by imaging device
CN112434338A (en) Picture sharing method and device, electronic equipment and storage medium
CN102446249A (en) Electronic device and method for acquiring illegal user information of same
CN108093177A (en) Image acquiring method, device, storage medium and electronic equipment
CN108156380A (en) Image acquiring method, device, storage medium and electronic equipment
CN107222576B (en) Photo album synchronization method and device
CN108027821B (en) Method and device for processing picture
CN109413340B (en) Processing method and device for generating album
CN111050236B (en) Electronic equipment anti-theft method, device and system, electronic equipment and storage medium
CN111935439B (en) Identification method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant