CN108650624A - A kind of terminal anti-theft method and terminal - Google Patents

A kind of terminal anti-theft method and terminal Download PDF

Info

Publication number
CN108650624A
CN108650624A CN201810464285.2A CN201810464285A CN108650624A CN 108650624 A CN108650624 A CN 108650624A CN 201810464285 A CN201810464285 A CN 201810464285A CN 108650624 A CN108650624 A CN 108650624A
Authority
CN
China
Prior art keywords
terminal
active user
security information
security
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810464285.2A
Other languages
Chinese (zh)
Inventor
张全琛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN201810464285.2A priority Critical patent/CN108650624A/en
Publication of CN108650624A publication Critical patent/CN108650624A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/025Services making use of location information using location based information parameters
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B1/00Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
    • H04B1/38Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving
    • H04B1/3816Mechanical arrangements for accommodating identification devices, e.g. cards or chips; with connectors for programming identification devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A kind of terminal anti-theft method of offer of the embodiment of the present invention and terminal, are related to mobile terminal safety technical field, this method includes:Terminal obtains the identification information of active user, and terminal is the terminal configured with universal embedded integrated circuit eUICC cards.Terminal freezes the access right of terminal and positions current location, the identification information of current location and active user are then sent to security terminal when determining that active user is disabled user according to identification information.Since terminal is configured with eUICC cards, therefore after terminal is stolen, thief cannot take out card from terminal, secondly, when terminal determines that active user is disabled user according to the identification information of active user, freezes the access right of terminal and the identification information of the current location of terminal and active user is sent to security terminal, so that terminal user gives terminal for change according to current location and identification information, to improve the probability for being stolen terminal and giving for change, the loss of terminal user is substantially reduced.

Description

A kind of terminal anti-theft method and terminal
Technical field
The present embodiments relate to mobile terminal safety technical field more particularly to a kind of terminal anti-theft method and terminals.
Background technology
With the development of technology and the improvement of people ’ s living standards, mobile device have become be people life in can not or Scarce object.Due to often saving the privacy information of user in mobile device, therefore after mobile device loses or is stolen, no Only to the economic loss of bringing of user, while influencing the personal secrets of user.Currently, when mobile device is stolen, thief is often Mobile device can be shut down, and take out the SIM card of mobile device, cause the difficulty being retrieved after mobile device is stolen big.
Invention content
A kind of terminal anti-theft method of offer of the embodiment of the present invention and terminal are given for change for solving after existing mobile device is stolen The big problem of difficulty.
On the one hand, an embodiment of the present invention provides a kind of terminal anti-theft method, this method includes:Terminal obtains active user Identification information, terminal be the terminal configured with universal embedded integrated circuit eUICC cards.Terminal is according to the identification information When determining that the active user is disabled user, freezes the access right of the terminal and position current location, it then will be described The identification information of current location and the active user are sent to security terminal, and the security terminal is tied up in advance with the terminal It is fixed.Since terminal is configured with eUICC cards, therefore after terminal is stolen, thief cannot take out eUICC cards from terminal, secondly, steal Surreptitiously after stealing terminal, only to start terminal, terminal will obtain the identification information of thief, and true according to identification information It is disabled user to make active user, then freezes the access right of terminal, by the current location of terminal and active user Identification information is sent to security terminal, and terminal user is notified by security terminal, so that present bit of the terminal user according to terminal It sets and the identification information of active user gives terminal for change, to improve the probability for being stolen terminal and giving for change, substantially reduce terminal user Loss.
Optionally, the identification information of the active user is that the permission that server is sent is freezed to instruct, and the permission is freezed Instruction is that the server is sent to the terminal after the request for receiving the access right for freezing the terminal.In user It was found that when lost terminal, the request for the access right for freezing terminal can be sent in time to server, is sent by server Permission freezes the access right that terminal is freezed in instruction, avoids thief by terminal closedown or brush machine.
Optionally, the identification information of the active user is the security information of the active user of terminal acquisition, The security information is used to indicate the terminal and starts.
The terminal freezes the use of the terminal when determining that active user is disabled user according to the identification information Permission simultaneously positions current location, including:
The terminal determines that the active user is when determining that the security information is mismatched with preset security information Then disabled user freezes the access right of the terminal and positions current location.Before being initiated due to terminal, automatic collection The security information of active user freezes end when then judging active user according to the security information of active user for disabled user The access right at end simultaneously positions current location, as long as therefore thief be intended to start the terminal, all can security information be collected by terminal And it will be identified as disabled user, to enable terminal user to get the current location of terminal and the safety letter of thief in time Breath, and terminal is recovered according to the current location of terminal and the security information of thief.
Optionally, the access right is brush machine permission;The terminal is determining the security information and preset safety When information mismatches, determine that the active user is disabled user, including:
The security information is successfully uploaded to server by the terminal, so that the server sends out the security information It send to the security terminal and is verified, determining that the security information mismatches or receive with the preset security information The security information verification that the security terminal is sent not by message when, determine that the active user is disabled user. For brush machine permission, terminal believes safety while obtaining the security information of active user and security information is identified Breath is uploaded to server, and security information, which is then sent to security terminal, by server verifies, therefore is used eventually in thief After the non-living bodies object such as photo of end subscriber is acquired as security information by terminal, terminal may identify that active user is to close at this time Method user, but the corresponding secure relationship people of security terminal is after receiving security information, it can be determined that active user is illegal User, then send verification not by message to terminal, terminal will freeze the operation of brush machine, and current location is sent to safety Terminal so that terminal user recovers terminal according to current location, avoid thief using the non-living bodies objects such as photo to terminal into Row brush machine, improves the safety of terminal.
Optionally, further include:When the terminal determines that the security information is uploaded to the server failure, described in determination Active user is disabled user.When being uploaded to server failure due to security information, it may be possible to since thief closes terminal Network, so when be also required to freeze the access right of terminal, in order to which terminal user gives terminal for change.
On the one hand, an embodiment of the present invention provides a kind of terminals, including:
Acquisition module, the identification information for obtaining active user, the terminal are configured with universal embedded integrated electricity The terminal of road eUICC cards;
Processing module, it is described for when determining that the active user is disabled user according to the identification information, freezing The access right of terminal simultaneously positions current location;
Sending module, for the security information of the current location and the active user to be sent to security terminal, The security terminal is bound in advance with the terminal.
Optionally, the identification information of the active user is that the permission that server is sent is freezed to instruct, and the permission is freezed Instruction is that the server is sent to the terminal after the request for receiving the access right for freezing the terminal.
Optionally, the identification information of the active user is the security information of the active user of terminal acquisition, The security information is used to indicate the terminal and starts;
The processing module is specifically used for:
When determining that the security information is mismatched with preset security information, determine that the active user is illegal uses Family;
Freeze the access right of the terminal and positions current location.
Optionally, the access right is brush machine permission;
The processing module is specifically used for:
The security information is successfully uploaded to server so that the server security information is sent to it is described Security terminal is verified;
It is sent determining the security information and the preset security information mismatch or receiving the security terminal The security information verification not by message when, determine the active user be disabled user.
Optionally, the processing module is additionally operable to:
When determining that the security information is uploaded to the server failure, determine that the active user is disabled user.
On the other hand, an embodiment of the present invention provides a kind of terminal device, including at least one processing unit and at least One storage unit, wherein the storage unit is stored with computer program, when described program is executed by the processing unit When so that the processing unit executes the step of any of the above-described the method.
Another aspect, an embodiment of the present invention provides a kind of computer-readable medium, being stored with can be held by terminal device Capable computer program, when described program is run on the terminal device so that the terminal device executes any of the above-described institute The step of stating method.
In the embodiment of the present invention, since terminal is the terminal configured with universal embedded integrated circuit eUICC cards, therefore at end After end is stolen, thief cannot take out eUICC cards from terminal, and secondly, thief is after stealing terminal, only eventually to startup End, terminal will obtain the identification information of active user, and determine that active user is disabled user according to identification information, then The identification information of the current location of terminal and active user is sent to security terminal, passed through by the access right for freezing terminal Security terminal notifies terminal user, so that terminal user gives end for change according to the current location of terminal and the identification information of thief End substantially reduces the loss of terminal user to improve the probability for being stolen terminal and giving for change.
Description of the drawings
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment Attached drawing is briefly introduced, it should be apparent that, drawings in the following description are only some embodiments of the invention, for this For the those of ordinary skill in field, without having to pay creative labor, it can also be obtained according to these attached drawings His attached drawing.
Fig. 1 is a kind of system architecture diagram provided in an embodiment of the present invention;
Fig. 2 is a kind of flow diagram of terminal anti-theft method provided in an embodiment of the present invention;
Fig. 3 is a kind of flow diagram of method obtaining identification information provided in an embodiment of the present invention;
Fig. 4 is a kind of flow diagram of terminal anti-theft method provided in an embodiment of the present invention;
Fig. 5 is a kind of structural schematic diagram of terminal anti-theft device provided in an embodiment of the present invention;
Fig. 6 is a kind of structural schematic diagram of terminal device provided in an embodiment of the present invention.
Specific implementation mode
In order to make the purpose of the present invention, technical solution and advantageous effect be more clearly understood, below in conjunction with attached drawing and implementation Example, the present invention will be described in further detail.It should be appreciated that specific embodiment described herein is only used to explain this hair It is bright, it is not intended to limit the present invention.
Fig. 1 illustrates a kind of applicable system architecture schematic diagram of the embodiment of the present invention, as shown in Figure 1, of the invention The applicable system architecture of embodiment includes terminal 110, server 120, security terminal 130.
Terminal 110 and security terminal 130 are the electronic equipment for having network communications capability, which can be intelligence Mobile phone, tablet computer or portable personal computer etc..Terminal 110 is bound and is each equipped with embedding in advance with security terminal 130 Enter formula universal integrated circuit eUICC cards.Terminal 110 is connect by wireless network with server 120, and security terminal 130 passes through nothing Gauze network is connect with server 120, and server 120 is the server cluster or cloud of a server or several servers composition Calculating center.Terminal 110 obtains the identification information of active user, is then made decisions to the identification information of active user, in root When determining that active user is disabled user according to identification information, freezes the access right of terminal 110 and position current location, Zhi Houzai The identification information of current location and active user are sent to security terminal 130 by server 120.
Based on system architecture diagram shown in FIG. 1, an embodiment of the present invention provides a kind of flow of terminal anti-theft method, the party The flow of method can be executed by terminal, as shown in Fig. 2, including the following steps:
Step S201, terminal obtain the identification information of active user, and terminal is configured with universal embedded integrated circuit The terminal of eUICC cards.
In a kind of possible embodiment, the identification information of active user is that the permission that server is sent is freezed to instruct, It is that server is sent to terminal after the request for receiving the access right for freezing terminal that permission, which freezes instruction,.Server can be with For the server that the operators such as movement/unicom/telecommunications provide, it can also be the third-party server such as Ali's cloud/Baidu's cloud, may be used also To be the server of mobile device manufacturer.Terminal is the terminal configured with universal embedded integrated circuit eUICC cards, each EUICC cards have unique identification code, i.e., global unique number EID.It is illustrated below with specific embodiment, as shown in figure 3, Include the following steps:
Step S301, terminal user are logged in when knowing lost terminal by webpage in mobile device or client Server.
Mobile device can be security terminal, can also have the equipment of network communications capability in addition to security terminal.
Step S302, mobile device send the request for the access right for freezing terminal to server, freeze the use of terminal The identification code of eUICC cards is carried in the request of permission.
Step S303, server send identifying code to safety end when determining that the identification code of the eUICC cards received is legal End.
Identifying code is sent to the corresponding mobile device of terminal user by step S304, security terminal.
Identifying code is sent to server by step S305, mobile device.
Step S306, for server when receiving legal identifying code, sending permission freezes instruction to terminal.
In a kind of possible embodiment, the identification information of active user is the safety letter of the active user of terminal acquisition Breath, security information are used to indicate terminal startup.Security information can be face, iris, fingerprint, self-defined problem etc..Terminal When first used, the security information of advance typing validated user and preservation.When user is started by button triggering terminal, terminal The security information of active user is obtained, for example, terminal starts camera, acquires the face information of active user;For another example, terminal The finger print information of user is acquired in active user's touch key-press;Also for example, terminal pop-up includes the identification frame of self-defined problem.
In a kind of possible embodiment, the identification information of active user is the security information verification that security terminal is sent As a result.Security information can be face, iris, fingerprint, self-defined problem etc..Terminal when first used, close by advance typing The security information of method user and preservation.Terminal obtains the security information of active user, while shooting the photo of active user, then The security information for the photo for carrying active user is uploaded to server, security information is sent to security terminal by server. Security terminal verifies security information, when determining that security information is legal, the corresponding secure relationship people of security terminal according to The photo of active user further carries out live body judgement, if it is from terminal user's sheet that the photo of active user, which is shown as security information, It is acquired on people, it is determined that active user is legal, if showing active user using non-living bodies such as photos in the photo of active user Object progress security information verification and active user and non-end-user, it is determined that active user is disabled user, then The result of verification is sent to terminal.
Step S202, terminal freeze the right to use of terminal when determining that active user is disabled user according to identification information It limits and positions current location.
Optionally, when freezing the access right of terminal, all access rights of terminal can be freezed, terminal is in black at this time Screen state, thief can not start terminal;Can also be to freeze the part permission of terminal, for example permission is arranged in freezing system, it is hidden Either the window person of avoiding theft is arranged the network of closing terminal by system or is brushed to terminal Tibetan system setting icon Machine can also be the private data freezed in terminal or the private data deleted in terminal.
In a kind of possible embodiment, terminal is when the permission for receiving server transmission freezes instruction, you can really It is disabled user to determine active user, therefore freezes the access right of terminal and position current location.Find that terminal is lost in terminal user When mistake, the request for the access right for freezing terminal can be sent in time to server, the permission sent by server is freezed to refer to The access right for freezing terminal is enabled, avoids thief by terminal closedown or brush machine, improves the safety of terminal.
In a kind of possible embodiment, the security information of acquisition is compared by terminal with preset security information, When determining that security information is mismatched with preset security information, determines that active user is disabled user, then freeze terminal Access right simultaneously positions current location.
For example, terminal acquires the face information of active user by camera, then by the face information of acquisition and in advance If face information be compared, when the face information of acquisition is matched with preset face information, start terminal, otherwise freeze The access right of terminal simultaneously positions current location.
For another example, terminal obtains the answer of the predefined problem of active user's input, then by the pre- of active user's input The answer of problem definition is compared with preset answer, is being determined the answer of the predefined problem of active user's input and is being preset Answer it is consistent when, start terminal, otherwise freeze the access right of terminal and position current location.Since terminal is opened being triggered When dynamic, then the security information of automatic collection active user judges that active user is illegal according to the security information of active user When user, freeze the access right of terminal and position current location, as long as therefore thief be intended to start the terminal, can all be adopted by terminal Collect security information and disabled user will be identified as, to enable terminal user to get current location and the robber of terminal in time Security information surreptitiously, and terminal is recovered according to the current location of terminal and the security information of thief.
In a kind of possible embodiment, terminal is that verification does not pass through receiving security terminal to send verification result When, freeze the access right of terminal and positions current location.The security information of terminal acquisition active user is simultaneously uploaded to server, Then security information security terminal is sent to by server to verify, thus it is non-in the photo of thief using terminal user etc. After live body object is acquired as security information by terminal, security terminal may identify that active user is validated user at this time, still The secure relationship people of security terminal is after receiving security information, it can be determined that active user is disabled user, and sends and test Card not by information to terminal, terminal will be freezed using operating and positioning current location, to avoid thief from using photo Equal non-living bodies object carries out security information verification, improves the safety of terminal.
The identification information of current location and active user are sent to security terminal by step S203, terminal.
Security terminal is bound in advance with terminal, when terminal determines that active user is disabled user according to identification information, is frozen The identification information of the current location of terminal and active user is sent to security terminal, passes through peace by the access right of knot terminal Full terminal notification terminal user, so that terminal user gives end for change according to the current location of terminal and the identification information of active user End substantially reduces the loss of terminal user to improve the probability for being stolen terminal and giving for change.
Optionally, when active user needs to carry out brush machine to terminal, the verification process of terminal-pair active user includes following Step, as shown in Figure 4:
Security information is simultaneously successfully uploaded to server by step S401, the security information of terminal acquisition active user.
Security information is sent to security terminal and verified by step S402, server.
Step S403, security terminal verify security information.
Verification result message is sent to terminal by step S404, security terminal.
The security information of acquisition is compared by step S405, terminal with preset security information.
Step S406, terminal are determining security information and preset security information mismatch or are receiving security terminal transmission Security information verification not by message when, determine active user be disabled user.
Step S407, terminal freeze the access right of terminal and position current location.
The security information of current location and active user are sent to security terminal by step S408, terminal.
The above process is illustrated with specific example below.When active user carries out brush machine to terminal, start camera shooting Head, while frame prompt is played just in recognition of face, please face is placed in coverage, calls front camera and rear camera to shoot 10s at this time. After terminal acquires the face information of active user, the face information of active user is uploaded to server, it then will by server Security information is sent to security terminal.Security terminal is compared the face information of reception with preset face information, true Surely when the face information that receives is mismatched with preset face information, directly transmit face information verification not by message to end End.When determining that the face information received is matched with preset face information, further by the corresponding secure relationship of security terminal People carries out live body judgement to the face information of reception, determine face information be acquired from the non-living bodies object such as photo when, Send face Information Authentication not by message to terminal, determine face information be acquired from live body when, send face Information Authentication by message to terminal.
After face information is successfully uploaded to server by terminal, judge that the face information of acquisition is with preset face information No matching.Terminal mismatches or receives security terminal transmission with preset face information in the face information for determining acquisition Face information verification not by message when, determine that active user is disabled user, then freeze the brush machine permission of terminal and fixed Position current location, security terminal is sent to by the face information of current location and active user.Terminal is in the people for determining acquisition When face information matches with preset face information and receive the message that the face information that security terminal is sent is verified, determine Active user is validated user, then carries out brush machine to terminal immediately, can also carry out brush machine to terminal after preset time.For Brush machine permission, terminal, will be in security information while obtaining the security information of active user and security information is identified Server is reached, security information, which is then sent to security terminal, by server verifies, therefore is used in thief's using terminal After the non-living bodies object such as the photo at family is acquired as security information by terminal, although terminal may identify that active user is legal use Family, but the corresponding secure relationship people of security terminal is after receiving security information, it can be determined that active user is disabled user, And send verification not by message to terminal, to make terminal freeze the operation of brush machine and positioning current location, and will work as Front position is sent to security terminal, so that terminal user recovers terminal according to current location, to avoid thief from using photo Equal non-living bodies object carries out brush machine to terminal, improves the probability that terminal is recovered.
Optionally, when terminal determines that security information is uploaded to server failure, determine that active user is disabled user, then Freeze the access right of terminal.For example, when security information is uploaded to server by terminal, if because no signal leads to security information When uploading failure, hides the interface of activation brush machine permission, freezes the private data in terminal or operating right.Restoring signal When, it positions current location and current location and security information is uploaded to server, therefore the network of terminal is closed in thief When, terminal also can freeze operation permission, it is therefore prevented that thief carries out brush machine to terminal and obtains the private data in terminal, carries The high safety of terminal.
Based on same idea, an embodiment of the present invention provides a kind of terminal, which can execute terminal anti-theft method Flow, as shown in figure 5, the terminal 500 includes:
Acquisition module 501, the identification information for obtaining active user, the terminal are configured with universal embedded integrated The terminal of circuit eUICC cards;
Processing module 502, for when determining that the active user is disabled user according to the identification information, freezing institute It states the access right of terminal and positions current location;
Sending module 503, for the security information of the current location and the active user to be sent to safe end End, the security terminal are bound in advance with the terminal.
Optionally, the identification information of the active user is that the permission that server is sent is freezed to instruct, and the permission is freezed Instruction is that the server is sent to the terminal after the request for receiving the access right for freezing the terminal.
Optionally, the identification information of the active user is the security information of the active user of terminal acquisition, The security information is used to indicate the terminal and starts;
The processing module 502 is specifically used for:
When determining that the security information is mismatched with preset security information, determine that the active user is illegal uses Family;
Freeze the access right of the terminal and positions current location.
Optionally, the access right is brush machine permission;
The processing module 502 is specifically used for:
The security information is successfully uploaded to server so that the server security information is sent to it is described Security terminal is verified;
It is sent determining the security information and the preset security information mismatch or receiving the security terminal The security information verification not by message when, determine the active user be disabled user.
Optionally, the processing module 502 is additionally operable to:
When determining that the security information is uploaded to the server failure, determine that the active user is disabled user.
An embodiment of the present invention provides a kind of terminal devices, including at least one processing unit and at least one storage list Member, wherein the storage unit is stored with computer program, when described program is executed by the processing unit so that described Processing unit executes the step of terminal anti-theft method.As shown in fig. 6, for the hardware of the terminal device described in the embodiment of the present invention Structural schematic diagram, the terminal device are specifically as follows desktop computer, portable computer, smart mobile phone, tablet computer etc..Tool Body, which may include memory 601, the computer program of processor 602 and storage on a memory, the place The step of reason device 602 realizes any terminal theft preventing method in above-described embodiment when executing described program.Wherein, memory 601 It may include read-only memory (ROM) and random access memory (RAM), and provide in memory 601 and store to processor 602 Program instruction and data.
Further, the terminal device described in the embodiment of the present application can also include input unit 603 and output dress Set 604 etc..Input unit 603 may include keyboard, mouse, touch screen etc.;Output device 604 may include display equipment, such as Liquid crystal display (Liquid Crystal Display, LCD), cathode-ray tube (Cathode Ray Tube, CRT) touch Screen etc..Memory 601, processor 602, input unit 603 and output device 604 can be connected by bus or other modes It connects, in Fig. 6 for being connected by bus.Processor 602 calls the program instruction of the storage of memory 601 and the journey according to acquisition The terminal anti-theft method that sequence instruction execution above-described embodiment provides.
The embodiment of the present invention additionally provides a kind of computer readable storage medium, and being stored with can be executed by terminal device Computer program, when described program is run on the terminal device so that the terminal device executes the step of terminal anti-theft method Suddenly.
It should be understood by those skilled in the art that, the embodiment of the present invention can be provided as method or computer program product. Therefore, complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used in the present invention Form.It is deposited moreover, the present invention can be used to can be used in the computer that one or more wherein includes computer usable program code The shape for the computer program product implemented on storage media (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) Formula.
The present invention be with reference to according to the method for the embodiment of the present invention, the flow of equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that can be realized by computer program instructions every first-class in flowchart and/or the block diagram The combination of flow and/or box in journey and/or box and flowchart and/or the block diagram.These computer programs can be provided Instruct the processor of all-purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine so that the instruction executed by computer or the processor of other programmable data processing devices is generated for real The device for the function of being specified in present one flow of flow chart or one box of multiple flows and/or block diagram or multiple boxes.
These computer program instructions, which may also be stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that instruction generation stored in the computer readable memory includes referring to Enable the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one box of block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device so that count Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, in computer or The instruction executed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in a box or multiple boxes.
Although preferred embodiments of the present invention have been described, it is created once a person skilled in the art knows basic Property concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as It selects embodiment and falls into all change and modification of the scope of the invention.
Obviously, various changes and modifications can be made to the invention without departing from essence of the invention by those skilled in the art God and range.In this way, if these modifications and changes of the present invention belongs to the range of the claims in the present invention and its equivalent technologies Within, then the present invention is also intended to include these modifications and variations.

Claims (10)

1. a kind of terminal anti-theft method, which is characterized in that including:
Terminal obtains the identification information of active user, and the terminal is the end configured with universal embedded integrated circuit eUICC cards End;
The terminal freezes the use of the terminal when determining that the active user is disabled user according to the identification information Permission simultaneously positions current location;
The identification information of the current location and the active user is sent to security terminal by the terminal, and the safety is eventually It is bound in advance with the terminal at end.
2. the method as described in claim 1, which is characterized in that the identification information of the active user is the power that server is sent Limit is freezed to instruct, and it is the server after the request for receiving the access right for freezing the terminal that the permission, which freezes instruction, It is sent to the terminal.
3. the method as described in claim 1, which is characterized in that the identification information of the active user is terminal acquisition The security information of the active user, the security information are used to indicate the terminal and start;
The terminal freezes the access right of the terminal when determining that active user is disabled user according to the identification information And current location is positioned, including:
The terminal determines that the active user is illegal when determining that the security information is mismatched with preset security information User;
The terminal freezes the access right of the terminal and positions current location.
4. method as claimed in claim 3, which is characterized in that the access right is brush machine permission;
The terminal determines that the active user is illegal when determining that the security information is mismatched with preset security information User, including:
The security information is successfully uploaded to server by the terminal, so that the security information is sent to by the server The security terminal is verified;
The terminal is determining the security information and the preset security information mismatch or is receiving the security terminal Send the security information verification not by message when, determine the active user be disabled user.
5. method as claimed in claim 4, which is characterized in that further include:
When the terminal determines that the security information is uploaded to the server failure, determine that the active user is illegal uses Family.
6. a kind of terminal, which is characterized in that including:
Acquisition module, the identification information for obtaining active user, the terminal are configured with universal embedded integrated circuit The terminal of eUICC cards;
Processing module, for when determining that the active user is disabled user according to the identification information, freezing the terminal Access right and position current location;
Sending module, it is described for the identification information of the current location and the active user to be sent to security terminal Security terminal is bound in advance with the terminal.
7. terminal as claimed in claim 6, which is characterized in that the identification information of the active user is the power that server is sent Limit is freezed to instruct, and it is the server after the request for receiving the access right for freezing the terminal that the permission, which freezes instruction, It is sent to the terminal.
8. terminal as claimed in claim 6, which is characterized in that the identification information of the active user is terminal acquisition The security information of the active user, the security information are used to indicate the terminal and start;
The processing module is specifically used for:
When determining that the security information is mismatched with preset security information, determine that the active user is disabled user;
Freeze the access right of the terminal and positions current location.
9. terminal as claimed in claim 8, which is characterized in that the access right is brush machine permission;
The processing module is specifically used for:
The security information is successfully uploaded to server, so that the security information is sent to the safety by the server Terminal is verified;
Determining the security information and the preset security information mismatch or the institute for receiving the security terminal transmission State security information verification not by message when, determine the active user be disabled user.
10. terminal as claimed in claim 9, which is characterized in that the processing module is additionally operable to:
When determining that the security information is uploaded to the server failure, determine that the active user is disabled user.
CN201810464285.2A 2018-05-15 2018-05-15 A kind of terminal anti-theft method and terminal Pending CN108650624A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810464285.2A CN108650624A (en) 2018-05-15 2018-05-15 A kind of terminal anti-theft method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810464285.2A CN108650624A (en) 2018-05-15 2018-05-15 A kind of terminal anti-theft method and terminal

Publications (1)

Publication Number Publication Date
CN108650624A true CN108650624A (en) 2018-10-12

Family

ID=63756105

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810464285.2A Pending CN108650624A (en) 2018-05-15 2018-05-15 A kind of terminal anti-theft method and terminal

Country Status (1)

Country Link
CN (1) CN108650624A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112310188A (en) * 2019-07-23 2021-02-02 珠海格力电器股份有限公司 Lateral variable doping terminal structure and manufacturing method thereof

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103634453A (en) * 2012-08-22 2014-03-12 上海景岩电子技术有限公司 Face recognition anti-theft mobile phone
CN103731821A (en) * 2012-10-12 2014-04-16 华为终端有限公司 Data privacy method and device based on embedded universal integrated circuit card
CN104661178A (en) * 2013-11-20 2015-05-27 中兴通讯股份有限公司 Terminal searching method, terminal searching system, terminal and receiver
US20150334552A1 (en) * 2013-11-29 2015-11-19 Telefonaktiebolaget L M Ericsson (Publ) eUICC Subscription Change
US20160066189A1 (en) * 2009-02-17 2016-03-03 Lookout, Inc. Methods and systems for addressing mobile communications devices that are lost or stolen but not yet reported as such
CN106060796A (en) * 2016-06-01 2016-10-26 宇龙计算机通信科技(深圳)有限公司 Method and device for destroying backups of terminal
CN107438059A (en) * 2016-05-27 2017-12-05 宇龙计算机通信科技(深圳)有限公司 Terminal anti-theft verification method, terminal and server

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160066189A1 (en) * 2009-02-17 2016-03-03 Lookout, Inc. Methods and systems for addressing mobile communications devices that are lost or stolen but not yet reported as such
CN103634453A (en) * 2012-08-22 2014-03-12 上海景岩电子技术有限公司 Face recognition anti-theft mobile phone
CN103731821A (en) * 2012-10-12 2014-04-16 华为终端有限公司 Data privacy method and device based on embedded universal integrated circuit card
CN104661178A (en) * 2013-11-20 2015-05-27 中兴通讯股份有限公司 Terminal searching method, terminal searching system, terminal and receiver
US20150334552A1 (en) * 2013-11-29 2015-11-19 Telefonaktiebolaget L M Ericsson (Publ) eUICC Subscription Change
CN107438059A (en) * 2016-05-27 2017-12-05 宇龙计算机通信科技(深圳)有限公司 Terminal anti-theft verification method, terminal and server
CN106060796A (en) * 2016-06-01 2016-10-26 宇龙计算机通信科技(深圳)有限公司 Method and device for destroying backups of terminal

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112310188A (en) * 2019-07-23 2021-02-02 珠海格力电器股份有限公司 Lateral variable doping terminal structure and manufacturing method thereof

Similar Documents

Publication Publication Date Title
US10645581B2 (en) Method and apparatus for remote portable wireless device authentication
CN110651270B (en) Data access method and device
EP3428819A1 (en) Mobile security countermeasures
CN108632253B (en) Client data security access method and device based on mobile terminal
CN107622203B (en) Sensitive information protection method and device, storage medium and electronic equipment
US10185816B2 (en) Controlling user access to electronic resources without password
US20130183936A1 (en) Method and apparatus for remote portable wireless device authentication
CN104767713B (en) Account binding method, server and system
CN108429879B (en) Electronic apparatus, camera control method, camera control apparatus, and computer-readable storage medium
CN109416800B (en) Authentication method of mobile terminal and mobile terminal
CN104901805B (en) A kind of identification authentication methods, devices and systems
CN109979047B (en) Multi-network intelligent door lock control method, storage medium, controller and fingerprint lock
US20150089631A1 (en) Unlock processing method and device
CN105281907B (en) Encrypted data processing method and device
CN106454800B (en) Auth method, apparatus and system
CN111935349B (en) Terminal-based information display method and device, terminal and storage medium
WO2019214438A1 (en) Radio frequency card function calling method and device
CN109245902A (en) The guard method of instant messaging message authentication codes and device
CN105325021B (en) Method and apparatus for remote portable wireless device authentication
CN108123961A (en) Information processing method, apparatus and system
CN112135275A (en) Bluetooth scanning method and device, electronic equipment and readable storage medium
US20190007831A1 (en) Communication method and device
CN108133129A (en) A kind of unlocking method of application program, device and mobile terminal
CN108650624A (en) A kind of terminal anti-theft method and terminal
CN202503545U (en) Account security application system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181012

RJ01 Rejection of invention patent application after publication