CN108650624A - A kind of terminal anti-theft method and terminal - Google Patents
A kind of terminal anti-theft method and terminal Download PDFInfo
- Publication number
- CN108650624A CN108650624A CN201810464285.2A CN201810464285A CN108650624A CN 108650624 A CN108650624 A CN 108650624A CN 201810464285 A CN201810464285 A CN 201810464285A CN 108650624 A CN108650624 A CN 108650624A
- Authority
- CN
- China
- Prior art keywords
- terminal
- active user
- security information
- security
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/025—Services making use of location information using location based information parameters
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/88—Detecting or preventing theft or loss
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B1/00—Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
- H04B1/38—Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving
- H04B1/3816—Mechanical arrangements for accommodating identification devices, e.g. cards or chips; with connectors for programming identification devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
A kind of terminal anti-theft method of offer of the embodiment of the present invention and terminal, are related to mobile terminal safety technical field, this method includes:Terminal obtains the identification information of active user, and terminal is the terminal configured with universal embedded integrated circuit eUICC cards.Terminal freezes the access right of terminal and positions current location, the identification information of current location and active user are then sent to security terminal when determining that active user is disabled user according to identification information.Since terminal is configured with eUICC cards, therefore after terminal is stolen, thief cannot take out card from terminal, secondly, when terminal determines that active user is disabled user according to the identification information of active user, freezes the access right of terminal and the identification information of the current location of terminal and active user is sent to security terminal, so that terminal user gives terminal for change according to current location and identification information, to improve the probability for being stolen terminal and giving for change, the loss of terminal user is substantially reduced.
Description
Technical field
The present embodiments relate to mobile terminal safety technical field more particularly to a kind of terminal anti-theft method and terminals.
Background technology
With the development of technology and the improvement of people ’ s living standards, mobile device have become be people life in can not or
Scarce object.Due to often saving the privacy information of user in mobile device, therefore after mobile device loses or is stolen, no
Only to the economic loss of bringing of user, while influencing the personal secrets of user.Currently, when mobile device is stolen, thief is often
Mobile device can be shut down, and take out the SIM card of mobile device, cause the difficulty being retrieved after mobile device is stolen big.
Invention content
A kind of terminal anti-theft method of offer of the embodiment of the present invention and terminal are given for change for solving after existing mobile device is stolen
The big problem of difficulty.
On the one hand, an embodiment of the present invention provides a kind of terminal anti-theft method, this method includes:Terminal obtains active user
Identification information, terminal be the terminal configured with universal embedded integrated circuit eUICC cards.Terminal is according to the identification information
When determining that the active user is disabled user, freezes the access right of the terminal and position current location, it then will be described
The identification information of current location and the active user are sent to security terminal, and the security terminal is tied up in advance with the terminal
It is fixed.Since terminal is configured with eUICC cards, therefore after terminal is stolen, thief cannot take out eUICC cards from terminal, secondly, steal
Surreptitiously after stealing terminal, only to start terminal, terminal will obtain the identification information of thief, and true according to identification information
It is disabled user to make active user, then freezes the access right of terminal, by the current location of terminal and active user
Identification information is sent to security terminal, and terminal user is notified by security terminal, so that present bit of the terminal user according to terminal
It sets and the identification information of active user gives terminal for change, to improve the probability for being stolen terminal and giving for change, substantially reduce terminal user
Loss.
Optionally, the identification information of the active user is that the permission that server is sent is freezed to instruct, and the permission is freezed
Instruction is that the server is sent to the terminal after the request for receiving the access right for freezing the terminal.In user
It was found that when lost terminal, the request for the access right for freezing terminal can be sent in time to server, is sent by server
Permission freezes the access right that terminal is freezed in instruction, avoids thief by terminal closedown or brush machine.
Optionally, the identification information of the active user is the security information of the active user of terminal acquisition,
The security information is used to indicate the terminal and starts.
The terminal freezes the use of the terminal when determining that active user is disabled user according to the identification information
Permission simultaneously positions current location, including:
The terminal determines that the active user is when determining that the security information is mismatched with preset security information
Then disabled user freezes the access right of the terminal and positions current location.Before being initiated due to terminal, automatic collection
The security information of active user freezes end when then judging active user according to the security information of active user for disabled user
The access right at end simultaneously positions current location, as long as therefore thief be intended to start the terminal, all can security information be collected by terminal
And it will be identified as disabled user, to enable terminal user to get the current location of terminal and the safety letter of thief in time
Breath, and terminal is recovered according to the current location of terminal and the security information of thief.
Optionally, the access right is brush machine permission;The terminal is determining the security information and preset safety
When information mismatches, determine that the active user is disabled user, including:
The security information is successfully uploaded to server by the terminal, so that the server sends out the security information
It send to the security terminal and is verified, determining that the security information mismatches or receive with the preset security information
The security information verification that the security terminal is sent not by message when, determine that the active user is disabled user.
For brush machine permission, terminal believes safety while obtaining the security information of active user and security information is identified
Breath is uploaded to server, and security information, which is then sent to security terminal, by server verifies, therefore is used eventually in thief
After the non-living bodies object such as photo of end subscriber is acquired as security information by terminal, terminal may identify that active user is to close at this time
Method user, but the corresponding secure relationship people of security terminal is after receiving security information, it can be determined that active user is illegal
User, then send verification not by message to terminal, terminal will freeze the operation of brush machine, and current location is sent to safety
Terminal so that terminal user recovers terminal according to current location, avoid thief using the non-living bodies objects such as photo to terminal into
Row brush machine, improves the safety of terminal.
Optionally, further include:When the terminal determines that the security information is uploaded to the server failure, described in determination
Active user is disabled user.When being uploaded to server failure due to security information, it may be possible to since thief closes terminal
Network, so when be also required to freeze the access right of terminal, in order to which terminal user gives terminal for change.
On the one hand, an embodiment of the present invention provides a kind of terminals, including:
Acquisition module, the identification information for obtaining active user, the terminal are configured with universal embedded integrated electricity
The terminal of road eUICC cards;
Processing module, it is described for when determining that the active user is disabled user according to the identification information, freezing
The access right of terminal simultaneously positions current location;
Sending module, for the security information of the current location and the active user to be sent to security terminal,
The security terminal is bound in advance with the terminal.
Optionally, the identification information of the active user is that the permission that server is sent is freezed to instruct, and the permission is freezed
Instruction is that the server is sent to the terminal after the request for receiving the access right for freezing the terminal.
Optionally, the identification information of the active user is the security information of the active user of terminal acquisition,
The security information is used to indicate the terminal and starts;
The processing module is specifically used for:
When determining that the security information is mismatched with preset security information, determine that the active user is illegal uses
Family;
Freeze the access right of the terminal and positions current location.
Optionally, the access right is brush machine permission;
The processing module is specifically used for:
The security information is successfully uploaded to server so that the server security information is sent to it is described
Security terminal is verified;
It is sent determining the security information and the preset security information mismatch or receiving the security terminal
The security information verification not by message when, determine the active user be disabled user.
Optionally, the processing module is additionally operable to:
When determining that the security information is uploaded to the server failure, determine that the active user is disabled user.
On the other hand, an embodiment of the present invention provides a kind of terminal device, including at least one processing unit and at least
One storage unit, wherein the storage unit is stored with computer program, when described program is executed by the processing unit
When so that the processing unit executes the step of any of the above-described the method.
Another aspect, an embodiment of the present invention provides a kind of computer-readable medium, being stored with can be held by terminal device
Capable computer program, when described program is run on the terminal device so that the terminal device executes any of the above-described institute
The step of stating method.
In the embodiment of the present invention, since terminal is the terminal configured with universal embedded integrated circuit eUICC cards, therefore at end
After end is stolen, thief cannot take out eUICC cards from terminal, and secondly, thief is after stealing terminal, only eventually to startup
End, terminal will obtain the identification information of active user, and determine that active user is disabled user according to identification information, then
The identification information of the current location of terminal and active user is sent to security terminal, passed through by the access right for freezing terminal
Security terminal notifies terminal user, so that terminal user gives end for change according to the current location of terminal and the identification information of thief
End substantially reduces the loss of terminal user to improve the probability for being stolen terminal and giving for change.
Description of the drawings
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment
Attached drawing is briefly introduced, it should be apparent that, drawings in the following description are only some embodiments of the invention, for this
For the those of ordinary skill in field, without having to pay creative labor, it can also be obtained according to these attached drawings
His attached drawing.
Fig. 1 is a kind of system architecture diagram provided in an embodiment of the present invention;
Fig. 2 is a kind of flow diagram of terminal anti-theft method provided in an embodiment of the present invention;
Fig. 3 is a kind of flow diagram of method obtaining identification information provided in an embodiment of the present invention;
Fig. 4 is a kind of flow diagram of terminal anti-theft method provided in an embodiment of the present invention;
Fig. 5 is a kind of structural schematic diagram of terminal anti-theft device provided in an embodiment of the present invention;
Fig. 6 is a kind of structural schematic diagram of terminal device provided in an embodiment of the present invention.
Specific implementation mode
In order to make the purpose of the present invention, technical solution and advantageous effect be more clearly understood, below in conjunction with attached drawing and implementation
Example, the present invention will be described in further detail.It should be appreciated that specific embodiment described herein is only used to explain this hair
It is bright, it is not intended to limit the present invention.
Fig. 1 illustrates a kind of applicable system architecture schematic diagram of the embodiment of the present invention, as shown in Figure 1, of the invention
The applicable system architecture of embodiment includes terminal 110, server 120, security terminal 130.
Terminal 110 and security terminal 130 are the electronic equipment for having network communications capability, which can be intelligence
Mobile phone, tablet computer or portable personal computer etc..Terminal 110 is bound and is each equipped with embedding in advance with security terminal 130
Enter formula universal integrated circuit eUICC cards.Terminal 110 is connect by wireless network with server 120, and security terminal 130 passes through nothing
Gauze network is connect with server 120, and server 120 is the server cluster or cloud of a server or several servers composition
Calculating center.Terminal 110 obtains the identification information of active user, is then made decisions to the identification information of active user, in root
When determining that active user is disabled user according to identification information, freezes the access right of terminal 110 and position current location, Zhi Houzai
The identification information of current location and active user are sent to security terminal 130 by server 120.
Based on system architecture diagram shown in FIG. 1, an embodiment of the present invention provides a kind of flow of terminal anti-theft method, the party
The flow of method can be executed by terminal, as shown in Fig. 2, including the following steps:
Step S201, terminal obtain the identification information of active user, and terminal is configured with universal embedded integrated circuit
The terminal of eUICC cards.
In a kind of possible embodiment, the identification information of active user is that the permission that server is sent is freezed to instruct,
It is that server is sent to terminal after the request for receiving the access right for freezing terminal that permission, which freezes instruction,.Server can be with
For the server that the operators such as movement/unicom/telecommunications provide, it can also be the third-party server such as Ali's cloud/Baidu's cloud, may be used also
To be the server of mobile device manufacturer.Terminal is the terminal configured with universal embedded integrated circuit eUICC cards, each
EUICC cards have unique identification code, i.e., global unique number EID.It is illustrated below with specific embodiment, as shown in figure 3,
Include the following steps:
Step S301, terminal user are logged in when knowing lost terminal by webpage in mobile device or client
Server.
Mobile device can be security terminal, can also have the equipment of network communications capability in addition to security terminal.
Step S302, mobile device send the request for the access right for freezing terminal to server, freeze the use of terminal
The identification code of eUICC cards is carried in the request of permission.
Step S303, server send identifying code to safety end when determining that the identification code of the eUICC cards received is legal
End.
Identifying code is sent to the corresponding mobile device of terminal user by step S304, security terminal.
Identifying code is sent to server by step S305, mobile device.
Step S306, for server when receiving legal identifying code, sending permission freezes instruction to terminal.
In a kind of possible embodiment, the identification information of active user is the safety letter of the active user of terminal acquisition
Breath, security information are used to indicate terminal startup.Security information can be face, iris, fingerprint, self-defined problem etc..Terminal
When first used, the security information of advance typing validated user and preservation.When user is started by button triggering terminal, terminal
The security information of active user is obtained, for example, terminal starts camera, acquires the face information of active user;For another example, terminal
The finger print information of user is acquired in active user's touch key-press;Also for example, terminal pop-up includes the identification frame of self-defined problem.
In a kind of possible embodiment, the identification information of active user is the security information verification that security terminal is sent
As a result.Security information can be face, iris, fingerprint, self-defined problem etc..Terminal when first used, close by advance typing
The security information of method user and preservation.Terminal obtains the security information of active user, while shooting the photo of active user, then
The security information for the photo for carrying active user is uploaded to server, security information is sent to security terminal by server.
Security terminal verifies security information, when determining that security information is legal, the corresponding secure relationship people of security terminal according to
The photo of active user further carries out live body judgement, if it is from terminal user's sheet that the photo of active user, which is shown as security information,
It is acquired on people, it is determined that active user is legal, if showing active user using non-living bodies such as photos in the photo of active user
Object progress security information verification and active user and non-end-user, it is determined that active user is disabled user, then
The result of verification is sent to terminal.
Step S202, terminal freeze the right to use of terminal when determining that active user is disabled user according to identification information
It limits and positions current location.
Optionally, when freezing the access right of terminal, all access rights of terminal can be freezed, terminal is in black at this time
Screen state, thief can not start terminal;Can also be to freeze the part permission of terminal, for example permission is arranged in freezing system, it is hidden
Either the window person of avoiding theft is arranged the network of closing terminal by system or is brushed to terminal Tibetan system setting icon
Machine can also be the private data freezed in terminal or the private data deleted in terminal.
In a kind of possible embodiment, terminal is when the permission for receiving server transmission freezes instruction, you can really
It is disabled user to determine active user, therefore freezes the access right of terminal and position current location.Find that terminal is lost in terminal user
When mistake, the request for the access right for freezing terminal can be sent in time to server, the permission sent by server is freezed to refer to
The access right for freezing terminal is enabled, avoids thief by terminal closedown or brush machine, improves the safety of terminal.
In a kind of possible embodiment, the security information of acquisition is compared by terminal with preset security information,
When determining that security information is mismatched with preset security information, determines that active user is disabled user, then freeze terminal
Access right simultaneously positions current location.
For example, terminal acquires the face information of active user by camera, then by the face information of acquisition and in advance
If face information be compared, when the face information of acquisition is matched with preset face information, start terminal, otherwise freeze
The access right of terminal simultaneously positions current location.
For another example, terminal obtains the answer of the predefined problem of active user's input, then by the pre- of active user's input
The answer of problem definition is compared with preset answer, is being determined the answer of the predefined problem of active user's input and is being preset
Answer it is consistent when, start terminal, otherwise freeze the access right of terminal and position current location.Since terminal is opened being triggered
When dynamic, then the security information of automatic collection active user judges that active user is illegal according to the security information of active user
When user, freeze the access right of terminal and position current location, as long as therefore thief be intended to start the terminal, can all be adopted by terminal
Collect security information and disabled user will be identified as, to enable terminal user to get current location and the robber of terminal in time
Security information surreptitiously, and terminal is recovered according to the current location of terminal and the security information of thief.
In a kind of possible embodiment, terminal is that verification does not pass through receiving security terminal to send verification result
When, freeze the access right of terminal and positions current location.The security information of terminal acquisition active user is simultaneously uploaded to server,
Then security information security terminal is sent to by server to verify, thus it is non-in the photo of thief using terminal user etc.
After live body object is acquired as security information by terminal, security terminal may identify that active user is validated user at this time, still
The secure relationship people of security terminal is after receiving security information, it can be determined that active user is disabled user, and sends and test
Card not by information to terminal, terminal will be freezed using operating and positioning current location, to avoid thief from using photo
Equal non-living bodies object carries out security information verification, improves the safety of terminal.
The identification information of current location and active user are sent to security terminal by step S203, terminal.
Security terminal is bound in advance with terminal, when terminal determines that active user is disabled user according to identification information, is frozen
The identification information of the current location of terminal and active user is sent to security terminal, passes through peace by the access right of knot terminal
Full terminal notification terminal user, so that terminal user gives end for change according to the current location of terminal and the identification information of active user
End substantially reduces the loss of terminal user to improve the probability for being stolen terminal and giving for change.
Optionally, when active user needs to carry out brush machine to terminal, the verification process of terminal-pair active user includes following
Step, as shown in Figure 4:
Security information is simultaneously successfully uploaded to server by step S401, the security information of terminal acquisition active user.
Security information is sent to security terminal and verified by step S402, server.
Step S403, security terminal verify security information.
Verification result message is sent to terminal by step S404, security terminal.
The security information of acquisition is compared by step S405, terminal with preset security information.
Step S406, terminal are determining security information and preset security information mismatch or are receiving security terminal transmission
Security information verification not by message when, determine active user be disabled user.
Step S407, terminal freeze the access right of terminal and position current location.
The security information of current location and active user are sent to security terminal by step S408, terminal.
The above process is illustrated with specific example below.When active user carries out brush machine to terminal, start camera shooting
Head, while frame prompt is played just in recognition of face, please face is placed in coverage, calls front camera and rear camera to shoot 10s at this time.
After terminal acquires the face information of active user, the face information of active user is uploaded to server, it then will by server
Security information is sent to security terminal.Security terminal is compared the face information of reception with preset face information, true
Surely when the face information that receives is mismatched with preset face information, directly transmit face information verification not by message to end
End.When determining that the face information received is matched with preset face information, further by the corresponding secure relationship of security terminal
People carries out live body judgement to the face information of reception, determine face information be acquired from the non-living bodies object such as photo when,
Send face Information Authentication not by message to terminal, determine face information be acquired from live body when, send face
Information Authentication by message to terminal.
After face information is successfully uploaded to server by terminal, judge that the face information of acquisition is with preset face information
No matching.Terminal mismatches or receives security terminal transmission with preset face information in the face information for determining acquisition
Face information verification not by message when, determine that active user is disabled user, then freeze the brush machine permission of terminal and fixed
Position current location, security terminal is sent to by the face information of current location and active user.Terminal is in the people for determining acquisition
When face information matches with preset face information and receive the message that the face information that security terminal is sent is verified, determine
Active user is validated user, then carries out brush machine to terminal immediately, can also carry out brush machine to terminal after preset time.For
Brush machine permission, terminal, will be in security information while obtaining the security information of active user and security information is identified
Server is reached, security information, which is then sent to security terminal, by server verifies, therefore is used in thief's using terminal
After the non-living bodies object such as the photo at family is acquired as security information by terminal, although terminal may identify that active user is legal use
Family, but the corresponding secure relationship people of security terminal is after receiving security information, it can be determined that active user is disabled user,
And send verification not by message to terminal, to make terminal freeze the operation of brush machine and positioning current location, and will work as
Front position is sent to security terminal, so that terminal user recovers terminal according to current location, to avoid thief from using photo
Equal non-living bodies object carries out brush machine to terminal, improves the probability that terminal is recovered.
Optionally, when terminal determines that security information is uploaded to server failure, determine that active user is disabled user, then
Freeze the access right of terminal.For example, when security information is uploaded to server by terminal, if because no signal leads to security information
When uploading failure, hides the interface of activation brush machine permission, freezes the private data in terminal or operating right.Restoring signal
When, it positions current location and current location and security information is uploaded to server, therefore the network of terminal is closed in thief
When, terminal also can freeze operation permission, it is therefore prevented that thief carries out brush machine to terminal and obtains the private data in terminal, carries
The high safety of terminal.
Based on same idea, an embodiment of the present invention provides a kind of terminal, which can execute terminal anti-theft method
Flow, as shown in figure 5, the terminal 500 includes:
Acquisition module 501, the identification information for obtaining active user, the terminal are configured with universal embedded integrated
The terminal of circuit eUICC cards;
Processing module 502, for when determining that the active user is disabled user according to the identification information, freezing institute
It states the access right of terminal and positions current location;
Sending module 503, for the security information of the current location and the active user to be sent to safe end
End, the security terminal are bound in advance with the terminal.
Optionally, the identification information of the active user is that the permission that server is sent is freezed to instruct, and the permission is freezed
Instruction is that the server is sent to the terminal after the request for receiving the access right for freezing the terminal.
Optionally, the identification information of the active user is the security information of the active user of terminal acquisition,
The security information is used to indicate the terminal and starts;
The processing module 502 is specifically used for:
When determining that the security information is mismatched with preset security information, determine that the active user is illegal uses
Family;
Freeze the access right of the terminal and positions current location.
Optionally, the access right is brush machine permission;
The processing module 502 is specifically used for:
The security information is successfully uploaded to server so that the server security information is sent to it is described
Security terminal is verified;
It is sent determining the security information and the preset security information mismatch or receiving the security terminal
The security information verification not by message when, determine the active user be disabled user.
Optionally, the processing module 502 is additionally operable to:
When determining that the security information is uploaded to the server failure, determine that the active user is disabled user.
An embodiment of the present invention provides a kind of terminal devices, including at least one processing unit and at least one storage list
Member, wherein the storage unit is stored with computer program, when described program is executed by the processing unit so that described
Processing unit executes the step of terminal anti-theft method.As shown in fig. 6, for the hardware of the terminal device described in the embodiment of the present invention
Structural schematic diagram, the terminal device are specifically as follows desktop computer, portable computer, smart mobile phone, tablet computer etc..Tool
Body, which may include memory 601, the computer program of processor 602 and storage on a memory, the place
The step of reason device 602 realizes any terminal theft preventing method in above-described embodiment when executing described program.Wherein, memory 601
It may include read-only memory (ROM) and random access memory (RAM), and provide in memory 601 and store to processor 602
Program instruction and data.
Further, the terminal device described in the embodiment of the present application can also include input unit 603 and output dress
Set 604 etc..Input unit 603 may include keyboard, mouse, touch screen etc.;Output device 604 may include display equipment, such as
Liquid crystal display (Liquid Crystal Display, LCD), cathode-ray tube (Cathode Ray Tube, CRT) touch
Screen etc..Memory 601, processor 602, input unit 603 and output device 604 can be connected by bus or other modes
It connects, in Fig. 6 for being connected by bus.Processor 602 calls the program instruction of the storage of memory 601 and the journey according to acquisition
The terminal anti-theft method that sequence instruction execution above-described embodiment provides.
The embodiment of the present invention additionally provides a kind of computer readable storage medium, and being stored with can be executed by terminal device
Computer program, when described program is run on the terminal device so that the terminal device executes the step of terminal anti-theft method
Suddenly.
It should be understood by those skilled in the art that, the embodiment of the present invention can be provided as method or computer program product.
Therefore, complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used in the present invention
Form.It is deposited moreover, the present invention can be used to can be used in the computer that one or more wherein includes computer usable program code
The shape for the computer program product implemented on storage media (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)
Formula.
The present invention be with reference to according to the method for the embodiment of the present invention, the flow of equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that can be realized by computer program instructions every first-class in flowchart and/or the block diagram
The combination of flow and/or box in journey and/or box and flowchart and/or the block diagram.These computer programs can be provided
Instruct the processor of all-purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce
A raw machine so that the instruction executed by computer or the processor of other programmable data processing devices is generated for real
The device for the function of being specified in present one flow of flow chart or one box of multiple flows and/or block diagram or multiple boxes.
These computer program instructions, which may also be stored in, can guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works so that instruction generation stored in the computer readable memory includes referring to
Enable the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one box of block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device so that count
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, in computer or
The instruction executed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one
The step of function of being specified in a box or multiple boxes.
Although preferred embodiments of the present invention have been described, it is created once a person skilled in the art knows basic
Property concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as
It selects embodiment and falls into all change and modification of the scope of the invention.
Obviously, various changes and modifications can be made to the invention without departing from essence of the invention by those skilled in the art
God and range.In this way, if these modifications and changes of the present invention belongs to the range of the claims in the present invention and its equivalent technologies
Within, then the present invention is also intended to include these modifications and variations.
Claims (10)
1. a kind of terminal anti-theft method, which is characterized in that including:
Terminal obtains the identification information of active user, and the terminal is the end configured with universal embedded integrated circuit eUICC cards
End;
The terminal freezes the use of the terminal when determining that the active user is disabled user according to the identification information
Permission simultaneously positions current location;
The identification information of the current location and the active user is sent to security terminal by the terminal, and the safety is eventually
It is bound in advance with the terminal at end.
2. the method as described in claim 1, which is characterized in that the identification information of the active user is the power that server is sent
Limit is freezed to instruct, and it is the server after the request for receiving the access right for freezing the terminal that the permission, which freezes instruction,
It is sent to the terminal.
3. the method as described in claim 1, which is characterized in that the identification information of the active user is terminal acquisition
The security information of the active user, the security information are used to indicate the terminal and start;
The terminal freezes the access right of the terminal when determining that active user is disabled user according to the identification information
And current location is positioned, including:
The terminal determines that the active user is illegal when determining that the security information is mismatched with preset security information
User;
The terminal freezes the access right of the terminal and positions current location.
4. method as claimed in claim 3, which is characterized in that the access right is brush machine permission;
The terminal determines that the active user is illegal when determining that the security information is mismatched with preset security information
User, including:
The security information is successfully uploaded to server by the terminal, so that the security information is sent to by the server
The security terminal is verified;
The terminal is determining the security information and the preset security information mismatch or is receiving the security terminal
Send the security information verification not by message when, determine the active user be disabled user.
5. method as claimed in claim 4, which is characterized in that further include:
When the terminal determines that the security information is uploaded to the server failure, determine that the active user is illegal uses
Family.
6. a kind of terminal, which is characterized in that including:
Acquisition module, the identification information for obtaining active user, the terminal are configured with universal embedded integrated circuit
The terminal of eUICC cards;
Processing module, for when determining that the active user is disabled user according to the identification information, freezing the terminal
Access right and position current location;
Sending module, it is described for the identification information of the current location and the active user to be sent to security terminal
Security terminal is bound in advance with the terminal.
7. terminal as claimed in claim 6, which is characterized in that the identification information of the active user is the power that server is sent
Limit is freezed to instruct, and it is the server after the request for receiving the access right for freezing the terminal that the permission, which freezes instruction,
It is sent to the terminal.
8. terminal as claimed in claim 6, which is characterized in that the identification information of the active user is terminal acquisition
The security information of the active user, the security information are used to indicate the terminal and start;
The processing module is specifically used for:
When determining that the security information is mismatched with preset security information, determine that the active user is disabled user;
Freeze the access right of the terminal and positions current location.
9. terminal as claimed in claim 8, which is characterized in that the access right is brush machine permission;
The processing module is specifically used for:
The security information is successfully uploaded to server, so that the security information is sent to the safety by the server
Terminal is verified;
Determining the security information and the preset security information mismatch or the institute for receiving the security terminal transmission
State security information verification not by message when, determine the active user be disabled user.
10. terminal as claimed in claim 9, which is characterized in that the processing module is additionally operable to:
When determining that the security information is uploaded to the server failure, determine that the active user is disabled user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810464285.2A CN108650624A (en) | 2018-05-15 | 2018-05-15 | A kind of terminal anti-theft method and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810464285.2A CN108650624A (en) | 2018-05-15 | 2018-05-15 | A kind of terminal anti-theft method and terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108650624A true CN108650624A (en) | 2018-10-12 |
Family
ID=63756105
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810464285.2A Pending CN108650624A (en) | 2018-05-15 | 2018-05-15 | A kind of terminal anti-theft method and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108650624A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112310188A (en) * | 2019-07-23 | 2021-02-02 | 珠海格力电器股份有限公司 | Lateral variable doping terminal structure and manufacturing method thereof |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103634453A (en) * | 2012-08-22 | 2014-03-12 | 上海景岩电子技术有限公司 | Face recognition anti-theft mobile phone |
CN103731821A (en) * | 2012-10-12 | 2014-04-16 | 华为终端有限公司 | Data privacy method and device based on embedded universal integrated circuit card |
CN104661178A (en) * | 2013-11-20 | 2015-05-27 | 中兴通讯股份有限公司 | Terminal searching method, terminal searching system, terminal and receiver |
US20150334552A1 (en) * | 2013-11-29 | 2015-11-19 | Telefonaktiebolaget L M Ericsson (Publ) | eUICC Subscription Change |
US20160066189A1 (en) * | 2009-02-17 | 2016-03-03 | Lookout, Inc. | Methods and systems for addressing mobile communications devices that are lost or stolen but not yet reported as such |
CN106060796A (en) * | 2016-06-01 | 2016-10-26 | 宇龙计算机通信科技(深圳)有限公司 | Method and device for destroying backups of terminal |
CN107438059A (en) * | 2016-05-27 | 2017-12-05 | 宇龙计算机通信科技(深圳)有限公司 | Terminal anti-theft verification method, terminal and server |
-
2018
- 2018-05-15 CN CN201810464285.2A patent/CN108650624A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160066189A1 (en) * | 2009-02-17 | 2016-03-03 | Lookout, Inc. | Methods and systems for addressing mobile communications devices that are lost or stolen but not yet reported as such |
CN103634453A (en) * | 2012-08-22 | 2014-03-12 | 上海景岩电子技术有限公司 | Face recognition anti-theft mobile phone |
CN103731821A (en) * | 2012-10-12 | 2014-04-16 | 华为终端有限公司 | Data privacy method and device based on embedded universal integrated circuit card |
CN104661178A (en) * | 2013-11-20 | 2015-05-27 | 中兴通讯股份有限公司 | Terminal searching method, terminal searching system, terminal and receiver |
US20150334552A1 (en) * | 2013-11-29 | 2015-11-19 | Telefonaktiebolaget L M Ericsson (Publ) | eUICC Subscription Change |
CN107438059A (en) * | 2016-05-27 | 2017-12-05 | 宇龙计算机通信科技(深圳)有限公司 | Terminal anti-theft verification method, terminal and server |
CN106060796A (en) * | 2016-06-01 | 2016-10-26 | 宇龙计算机通信科技(深圳)有限公司 | Method and device for destroying backups of terminal |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112310188A (en) * | 2019-07-23 | 2021-02-02 | 珠海格力电器股份有限公司 | Lateral variable doping terminal structure and manufacturing method thereof |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10645581B2 (en) | Method and apparatus for remote portable wireless device authentication | |
CN110651270B (en) | Data access method and device | |
EP3428819A1 (en) | Mobile security countermeasures | |
CN108632253B (en) | Client data security access method and device based on mobile terminal | |
CN107622203B (en) | Sensitive information protection method and device, storage medium and electronic equipment | |
US10185816B2 (en) | Controlling user access to electronic resources without password | |
US20130183936A1 (en) | Method and apparatus for remote portable wireless device authentication | |
CN104767713B (en) | Account binding method, server and system | |
CN108429879B (en) | Electronic apparatus, camera control method, camera control apparatus, and computer-readable storage medium | |
CN109416800B (en) | Authentication method of mobile terminal and mobile terminal | |
CN104901805B (en) | A kind of identification authentication methods, devices and systems | |
CN109979047B (en) | Multi-network intelligent door lock control method, storage medium, controller and fingerprint lock | |
US20150089631A1 (en) | Unlock processing method and device | |
CN105281907B (en) | Encrypted data processing method and device | |
CN106454800B (en) | Auth method, apparatus and system | |
CN111935349B (en) | Terminal-based information display method and device, terminal and storage medium | |
WO2019214438A1 (en) | Radio frequency card function calling method and device | |
CN109245902A (en) | The guard method of instant messaging message authentication codes and device | |
CN105325021B (en) | Method and apparatus for remote portable wireless device authentication | |
CN108123961A (en) | Information processing method, apparatus and system | |
CN112135275A (en) | Bluetooth scanning method and device, electronic equipment and readable storage medium | |
US20190007831A1 (en) | Communication method and device | |
CN108133129A (en) | A kind of unlocking method of application program, device and mobile terminal | |
CN108650624A (en) | A kind of terminal anti-theft method and terminal | |
CN202503545U (en) | Account security application system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181012 |
|
RJ01 | Rejection of invention patent application after publication |