CN111132133A - Terminal searching method and device, storage medium and electronic device - Google Patents

Terminal searching method and device, storage medium and electronic device Download PDF

Info

Publication number
CN111132133A
CN111132133A CN201911381253.7A CN201911381253A CN111132133A CN 111132133 A CN111132133 A CN 111132133A CN 201911381253 A CN201911381253 A CN 201911381253A CN 111132133 A CN111132133 A CN 111132133A
Authority
CN
China
Prior art keywords
terminal
state
cloud server
determining
state information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911381253.7A
Other languages
Chinese (zh)
Inventor
黄超华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Meizu Technology Co Ltd
Original Assignee
Meizu Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Meizu Technology Co Ltd filed Critical Meizu Technology Co Ltd
Priority to CN201911381253.7A priority Critical patent/CN111132133A/en
Publication of CN111132133A publication Critical patent/CN111132133A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • H04W8/24Transfer of terminal data
    • H04W8/245Transfer of terminal data from a network towards a terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities

Abstract

The embodiment of the invention relates to a terminal searching method and device, a storage medium and an electronic device. Wherein, the method comprises the following steps: determining the state of the terminal according to the behavior of the terminal; when the terminal is in a dangerous state, acquiring state information corresponding to the terminal in a cloud server; and synchronizing the terminal according to the state information of the cloud. The invention solves the technical problem that the lost terminal can not be positioned and locked under the condition that the network can not be connected after the terminal is lost in the related technology.

Description

Terminal searching method and device, storage medium and electronic device
Technical Field
The invention relates to the field of electronic communication, in particular to a terminal searching method and device, a storage medium and an electronic device.
Background
In the related art, once a mobile phone is lost, a precondition that an owner wants to retrieve the mobile phone is that the lost mobile phone must be networked, and if the mobile phone is not networked all the time, the lost mobile phone can not be retrieved basically. In addition, in the problems in actual use, after a user loses the mobile phone, a thief or a person who picks up the mobile phone can pull out the SIM card of the mobile phone from the mobile phone at the first time, and the wifi networking is closed, so that the owner cannot position and lock the mobile phone.
In view of the above problems, no effective solution has been proposed.
Disclosure of Invention
The embodiment of the invention provides a terminal searching method and device, a storage medium and an electronic device, which at least solve the technical problem that the lost terminal cannot be positioned and locked under the condition that the network cannot be connected after the terminal is lost in the related technology.
According to an aspect of the embodiments of the present invention, a terminal searching method is provided, including: determining the state of the terminal according to the behavior of the terminal; when the terminal is in a dangerous state, acquiring state information corresponding to the terminal in a cloud server; and synchronizing the terminal according to the state information of the cloud.
Further, the determining the state of the terminal according to the behavior of the terminal includes: and determining that the terminal is in a dangerous state under the condition that the terminal is detected to have a behavior of removing the SIM card and all card slots of the terminal are idle.
Further, the determining the state of the terminal according to the behavior of the terminal includes: and under the condition that the shutdown duration of the terminal exceeds a preset time threshold, determining that the terminal is in a dangerous state.
Further, the determining the state of the terminal according to the behavior of the terminal includes: and under the condition that the failure times of the user authentication of the terminal exceed a preset number threshold, determining that the terminal is in a dangerous state.
Further, when the terminal is in a dangerous state, the acquiring of the state information of the cloud server includes: sending a query request to the cloud server through a virtual traffic card, wherein the virtual traffic card is distributed to the terminal by the cloud server; receiving a query response request sent by the cloud server; and acquiring the state information according to the query response request.
Further, before sending the query request to the cloud server through the virtual traffic card, the method further includes: the cloud server receives a user instruction, and modifies the state information into a lost state according to the user instruction; and the cloud server allocates virtual flow card resources for the terminal corresponding to the user instruction.
Further, the synchronizing the terminal according to the state information of the cloud includes: determining that the state information is a lost state; and sending the position information of the terminal to the cloud server, and locking the terminal.
According to another aspect of the embodiments of the present invention, there is also provided a terminal searching apparatus, including: the determining unit is used for determining the state of the terminal according to the behavior of the terminal; the acquisition unit is used for acquiring state information corresponding to the terminal in a cloud server when the terminal is in a dangerous state; and the synchronization unit is used for synchronizing the terminal according to the state information of the cloud.
According to another aspect of the embodiments of the present invention, there is also provided a storage medium, which includes a stored program, wherein the program executes the terminal searching method as described above when running.
According to another aspect of the embodiments of the present invention, there is also provided an electronic apparatus, including a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor executes the terminal search method as described above through the computer program.
In the embodiment of the invention, the state of the terminal is determined according to the behavior of the terminal, and when the terminal is in a dangerous state, the state information corresponding to the terminal in the cloud server is acquired; the method and the device have the advantages that the terminals are synchronized according to the state information of the cloud, so that the virtual flow card resources are distributed to the terminals under the condition that the SIM cards are removed from the terminals, the purposes of positioning and locking the terminals are achieved, and the technical problem that the lost terminals cannot be positioned and locked under the condition that networking cannot be performed after the terminals are lost in the related technology is solved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required to be used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without inventive labor.
FIG. 1 is a schematic diagram of an alternative communication system in accordance with an embodiment of the present invention;
fig. 2 is a schematic diagram of an alternative terminal searching method according to an embodiment of the present invention;
fig. 3 is a schematic diagram of an alternative terminal searching apparatus according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, are within the scope of the present invention.
It is noted that, in this document, relational terms such as "first" and "second," and the like, may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions.
Example 1
The embodiment of the invention provides a terminal searching method, which is mainly applied to a communication system shown in fig. 1, wherein the communication system comprises a terminal 10 and a cloud server 20. The terminal 10 is connected to the cloud server 20 through a network, and the cloud server 20 is configured to locate the terminal 10, receive a user instruction sent by the user 30, display the position of the terminal 10 by the user, modify the state information of the terminal 10, and the like. The state of the terminal 10 is determined according to the behavior of the terminal 10, and when the terminal 10 is determined to be in a dangerous state, the state information of the terminal 10 stored in the cloud server 20 is acquired, and the terminal 10 is synchronized according to the state information.
Optionally, the network includes but is not limited to: a wide area network, a metropolitan area network, or a local area network.
According to an embodiment of the present invention, a terminal searching method is provided, as shown in fig. 2, the method includes:
s202, determining the state of the terminal according to the behavior of the terminal;
s204, when the terminal is in a dangerous state, acquiring state information corresponding to the terminal in the cloud server;
and S206, synchronizing the terminal according to the state information of the cloud.
In this embodiment, the terminal includes, but is not limited to, a mobile terminal (e.g., a mobile phone), a PC, a tablet computer, a wearable device, and the like, and the terminal includes hardware resources to form a virtual network card or a traffic card, so that the terminal can access the cloud server through the virtual network card and the traffic card formed by the hardware resources when the terminal cannot be connected to a network.
Optionally, in a specific application scenario, taking a mobile phone as an example for explanation, after the mobile phone is lost, a general picker may perform actions such as removing the SIM card, entering a flight mode, or locking the mobile phone for a long time after acquiring the mobile phone. After the behaviors in the mobile phone are detected, the mobile phone is determined to be in a dangerous state, connection is established between the mobile phone and a cloud server through an embedded SIM card ESIM or a virtual flow card in the mobile phone, so that state information corresponding to the terminal in the cloud server is obtained, the terminal is locked according to operation corresponding to the state information under the condition that the state information is in a lost state, and position information of the terminal is fed back.
In this embodiment, the state information in the cloud server generally includes a lost state and a normal state. After the terminal is lost, the user sends a user instruction to the cloud server, and after the cloud server receives the user instruction, virtual flow card resources are distributed for the terminal, so that the terminal can communicate through the virtual flow card in the states that the SIM card is removed, the flight state is achieved, and the screen is locked.
It should be noted that the state of the terminal is determined according to the behavior of the terminal, and when the terminal is in a dangerous state, state information corresponding to the terminal in the cloud server is acquired; the method and the device have the advantages that the terminals are synchronized according to the state information of the cloud, so that the virtual flow card resources are distributed to the terminals under the condition that the SIM cards are removed from the terminals, the purposes of positioning and locking the terminals are achieved, and the technical problem that the lost terminals cannot be positioned and locked under the condition that networking cannot be performed after the terminals are lost in the related technology is solved.
Optionally, in this embodiment, determining the state of the terminal according to the behavior of the terminal includes, but is not limited to: and determining that the terminal is in a dangerous state under the condition that the terminal is detected to have the action of removing the SIM card and all card slots of the terminal are idle.
In a specific application scenario, when a behavior that a card slot of an SIM of a terminal is completely removed from the SIM card is detected, or the SIM card is invalid, it is determined that the terminal is in a dangerous state. In another example, before the SIM card is removed, the terminal pops up a confirmation window in the graphical user interface, in which a preset user authentication key needs to be input, and in case the user authentication key is authenticated, the removal of the SIM card in the terminal does not determine that the terminal is in a dangerous state.
Optionally, in this embodiment, determining the state of the terminal according to the behavior of the terminal includes, but is not limited to: and under the condition that the shutdown time of the terminal exceeds a preset time threshold, determining that the terminal is in a dangerous state.
In a specific application scenario, a preset time threshold is set, for example, 72 hours, once the terminal is restarted, the shutdown duration of the terminal is obtained, and when the shutdown duration of the terminal exceeds 72 hours, the terminal is determined to be in a dangerous state.
In another example, a timer is additionally set when the terminal is powered off, and the timer is separately powered by the terminal in case of the power off of the terminal. In yet another example, when the duration of the timer reaches a preset time threshold, a power-on signal is sent to the terminal through the timer, so that the terminal is powered on without lighting a screen, and the self state of the terminal is determined.
Optionally, in this embodiment, determining the state of the terminal according to the behavior of the terminal includes, but is not limited to: and under the condition that the failure times of the user authentication of the terminal exceed a preset number threshold, determining that the terminal is in a dangerous state.
In a specific application scenario, a preset number threshold is set to be 5, and the terminal is determined to be in a dangerous state under the condition that the number of times of user authentication failure exceeds 5. The user authentication includes but is not limited to password, graph, biometric features and other ways, wherein the biometric authentication includes but is not limited to pupil, fingerprint, voiceprint, face and the like.
Optionally, in this embodiment, when the terminal is in a dangerous state, the obtaining of the state information of the cloud server includes but is not limited to: sending a query request to a cloud server through a virtual traffic card, wherein the virtual traffic card is distributed for the terminal by the cloud server; receiving a query response request sent by a cloud server; and acquiring the state information according to the query response request.
In a specific application scenario, when the terminal is detected to be in a dangerous state, an application program related to the virtual traffic card is operated to determine whether available resources exist in virtual traffic card resources, and under the condition that the available resources exist in the virtual traffic card resources, the virtual traffic card resources are activated and a query request is sent to a cloud server through the virtual traffic card to acquire state information. The cloud server receives the query request sent by the terminal through the virtual flow card and stores the query request in the database
Optionally, in this embodiment, before sending the query request to the cloud server through the virtual traffic card in the terminal, the method further includes, but is not limited to: the cloud server receives a user instruction and modifies the state information into a lost state according to the user instruction; and the cloud server allocates virtual flow card resources for the terminal corresponding to the user instruction.
In a specific application scenario, when the terminal is lost, the user sends a user instruction to the cloud server through the communication network to instruct the cloud server to set the state information of the terminal to a lost state. And under the condition that the terminal is in a lost state, the cloud server allocates virtual flow card resources to the terminal, wherein the virtual flow card resources comprise the size of network flow and resource time limit. For example, the cloud server allocates a virtual traffic card of 30 gigabytes Mb for 10 days to the mobile phone in the lost state, and after 10 days or after 30Mb of traffic is used up, the mobile phone loses the virtual traffic card resource.
In an optimal technical scheme, the cloud server acquires the lost number of the terminals at intervals of preset time, and determines the number of the virtual traffic cards according to the resource time limit of the virtual traffic cards and the lost number of the terminals. For example, the number of virtual traffic cards is determined by the number of lost handsets per month and the resource time of the virtual traffic cards.
Optionally, in this embodiment, synchronizing the terminal according to the state information of the cloud includes, but is not limited to: and determining that the state information is in a lost state, sending the position information of the terminal to a cloud server, and locking the terminal.
In a specific application scenario, when the state information of the terminal is determined to be in a lost state, the position information of the terminal is sent to the cloud server, and meanwhile the terminal is locked. In one example, when it is determined that the state information of the mobile phone is in a lost state, the position information of the mobile phone is sent to the cloud server, the mobile phone is locked, and relevant information of a user is displayed on a display screen of the mobile phone, wherein the relevant information includes a user contact information, a contact address and the like.
In addition, after the cloud server receives the position information fed back by the terminal, the position information of the terminal is sent to the user through a contact way reserved by the user so as to prompt the position information of the terminal.
According to the embodiment, the state of the terminal is determined according to the behavior of the terminal, and when the terminal is in a dangerous state, the state information corresponding to the terminal in the cloud server is obtained; the method and the device have the advantages that the terminals are synchronized according to the state information of the cloud, so that the virtual flow card resources are distributed to the terminals under the condition that the SIM cards are removed from the terminals, the purposes of positioning and locking the terminals are achieved, and the technical problem that the lost terminals cannot be positioned and locked under the condition that networking cannot be performed after the terminals are lost in the related technology is solved.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the order of acts, as some steps may occur in other orders or concurrently in accordance with the invention. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required by the invention.
Through the above description of the embodiments, those skilled in the art can clearly understand that the method according to the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but the former is a better implementation mode in many cases. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present invention.
Example 2
According to an embodiment of the present invention, there is also provided a terminal searching apparatus for implementing the terminal searching method, as shown in fig. 3, the apparatus includes:
1) a determining unit 30 for determining a state of the terminal according to a behavior of the terminal;
2) the obtaining unit 32 is configured to obtain state information corresponding to the terminal in the cloud server when the terminal is in a dangerous state;
3) and the synchronization unit 34 is configured to synchronize the terminal according to the state information of the cloud.
Optionally, the specific example in this embodiment may refer to the example described in embodiment 1 above, and this embodiment is not described again here.
Example 3
According to an embodiment of the present invention, there is also provided a storage medium including a stored program, where the program executes the terminal search method as described above when running.
Optionally, in this embodiment, the storage medium is configured to store program code for performing the following steps:
s1, determining the state of the terminal according to the behavior of the terminal;
s2, when the terminal is in a dangerous state, acquiring state information corresponding to the terminal in a cloud server;
and S3, synchronizing the terminal according to the state information of the cloud.
Optionally, the storage medium is further configured to store program codes for executing the steps included in the method in embodiment 1, which is not described in detail in this embodiment.
Optionally, in this embodiment, the storage medium may include, but is not limited to: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
Optionally, the specific example in this embodiment may refer to the example described in embodiment 1 above, and this embodiment is not described again here.
Example 4
An embodiment of the present invention further provides an electronic apparatus, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor executes the terminal search method as described above through the computer program.
Optionally, in this embodiment, the memory is configured to store program code for performing the following steps:
s1, determining the state of the terminal according to the behavior of the terminal;
s2, when the terminal is in a dangerous state, acquiring state information corresponding to the terminal in a cloud server;
and S3, synchronizing the terminal according to the state information of the cloud.
Optionally, the specific example in this embodiment may refer to the example described in embodiment 1 above, and this embodiment is not described again here.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
The integrated unit in the above embodiments, if implemented in the form of a software functional unit and sold or used as a separate product, may be stored in the above computer-readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing one or more computer devices (which may be personal computers, servers, network devices, etc.) to execute all or part of the steps of the method according to the embodiments of the present invention.
In the above embodiments of the present invention, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the several embodiments provided in the present application, it should be understood that the disclosed client may be implemented in other manners. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one type of division of logical functions, and there may be other divisions when actually implemented, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, units or modules, and may be in an electrical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The foregoing is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, various modifications and decorations can be made without departing from the principle of the present invention, and these modifications and decorations should also be regarded as the protection scope of the present invention.

Claims (10)

1. A terminal searching method is characterized by comprising the following steps:
determining the state of the terminal according to the behavior of the terminal;
when the terminal is in a dangerous state, acquiring state information corresponding to the terminal in a cloud server;
and synchronizing the terminal according to the state information of the cloud.
2. The method of claim 1, wherein determining the state of the terminal according to the behavior of the terminal comprises:
and determining that the terminal is in a dangerous state under the condition that the terminal is detected to have a behavior of removing the SIM card and all card slots of the terminal are idle.
3. The method of claim 1, wherein determining the state of the terminal according to the behavior of the terminal comprises:
and under the condition that the shutdown duration of the terminal exceeds a preset time threshold, determining that the terminal is in a dangerous state.
4. The method of claim 1, wherein determining the state of the terminal according to the behavior of the terminal comprises:
and under the condition that the failure times of the user authentication of the terminal exceed a preset number threshold, determining that the terminal is in a dangerous state.
5. The method of claim 1, wherein the obtaining the state information of the cloud server when the terminal is in a dangerous state comprises:
sending a query request to the cloud server through a virtual traffic card, wherein the virtual traffic card is distributed to the terminal by the cloud server;
receiving a query response request sent by the cloud server;
and acquiring the state information according to the query response request.
6. The method of claim 5, wherein before sending the query request to the cloud server via the virtual traffic card, further comprising:
the cloud server receives a user instruction, and modifies the state information into a lost state according to the user instruction;
and the cloud server allocates virtual flow card resources for the terminal corresponding to the user instruction.
7. The method of claim 1, wherein the synchronizing the terminal according to the state information of the cloud comprises:
determining that the state information is a lost state;
and sending the position information of the terminal to the cloud server, and locking the terminal.
8. A terminal lookup apparatus, comprising:
the determining unit is used for determining the state of the terminal according to the behavior of the terminal;
the acquisition unit is used for acquiring state information corresponding to the terminal in a cloud server when the terminal is in a dangerous state;
and the synchronization unit is used for synchronizing the terminal according to the state information of the cloud.
9. A storage medium, characterized in that the storage medium comprises a stored program, wherein the program when executed performs the terminal finding method of any one of claims 1 to 7.
10. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor executes the terminal lookup method of any one of claims 1 to 7 by the computer program.
CN201911381253.7A 2019-12-27 2019-12-27 Terminal searching method and device, storage medium and electronic device Pending CN111132133A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911381253.7A CN111132133A (en) 2019-12-27 2019-12-27 Terminal searching method and device, storage medium and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911381253.7A CN111132133A (en) 2019-12-27 2019-12-27 Terminal searching method and device, storage medium and electronic device

Publications (1)

Publication Number Publication Date
CN111132133A true CN111132133A (en) 2020-05-08

Family

ID=70504754

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911381253.7A Pending CN111132133A (en) 2019-12-27 2019-12-27 Terminal searching method and device, storage medium and electronic device

Country Status (1)

Country Link
CN (1) CN111132133A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112203270A (en) * 2020-10-10 2021-01-08 北京字节跳动网络技术有限公司 Terminal control method and device, electronic equipment and storage medium
CN114205732A (en) * 2020-08-31 2022-03-18 南宁富联富桂精密工业有限公司 Method for retrieving mobile phone, electronic device and computer readable storage medium
CN114615656A (en) * 2022-04-11 2022-06-10 西安广和通无线软件有限公司 Method, system and related device for managing eSIM card in electronic equipment
CN114727272A (en) * 2021-01-06 2022-07-08 华为技术有限公司 Method for emergency networking, electronic device, storage medium and computer program product

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105491232A (en) * 2015-11-27 2016-04-13 上海斐讯数据通信技术有限公司 Built-in virtual SIM card based mobile phone security information protection system and method
CN105722064A (en) * 2016-01-29 2016-06-29 北京小米移动软件有限公司 Method and device for acquiring terminal information
CN106231080A (en) * 2016-07-22 2016-12-14 努比亚技术有限公司 Mobile terminal based on virtual client identification module card recovers method and mobile terminal
CN106412887A (en) * 2016-06-15 2017-02-15 苏州畅途网络科技有限公司 Virtual SIM card rapid authentication method, system, server and terminal
CN107194291A (en) * 2017-05-16 2017-09-22 努比亚技术有限公司 Anti-theft method for mobile terminal, mobile terminal and computer-readable recording medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105491232A (en) * 2015-11-27 2016-04-13 上海斐讯数据通信技术有限公司 Built-in virtual SIM card based mobile phone security information protection system and method
CN105722064A (en) * 2016-01-29 2016-06-29 北京小米移动软件有限公司 Method and device for acquiring terminal information
CN106412887A (en) * 2016-06-15 2017-02-15 苏州畅途网络科技有限公司 Virtual SIM card rapid authentication method, system, server and terminal
CN106231080A (en) * 2016-07-22 2016-12-14 努比亚技术有限公司 Mobile terminal based on virtual client identification module card recovers method and mobile terminal
CN107194291A (en) * 2017-05-16 2017-09-22 努比亚技术有限公司 Anti-theft method for mobile terminal, mobile terminal and computer-readable recording medium

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114205732A (en) * 2020-08-31 2022-03-18 南宁富联富桂精密工业有限公司 Method for retrieving mobile phone, electronic device and computer readable storage medium
CN112203270A (en) * 2020-10-10 2021-01-08 北京字节跳动网络技术有限公司 Terminal control method and device, electronic equipment and storage medium
CN114727272A (en) * 2021-01-06 2022-07-08 华为技术有限公司 Method for emergency networking, electronic device, storage medium and computer program product
CN114727272B (en) * 2021-01-06 2023-07-28 华为技术有限公司 Emergency networking method, electronic equipment and storage medium
CN114615656A (en) * 2022-04-11 2022-06-10 西安广和通无线软件有限公司 Method, system and related device for managing eSIM card in electronic equipment

Similar Documents

Publication Publication Date Title
CN111132133A (en) Terminal searching method and device, storage medium and electronic device
US8516236B2 (en) Portable desktop device and method of host computer system hardware recognition and configuration
US7877563B2 (en) Programmable memory device security
US9077703B1 (en) Systems and methods for protecting user accounts
CN110224854B (en) Block chain node deployment method and device and storage medium
US20190386962A1 (en) Method, server and storage medium for data distribution
CN107679370B (en) Equipment identifier generation method and device
US10462125B2 (en) Method of pushing passwords, pushing system and terminal device
US20130305324A1 (en) Incremental Password Barriers to Prevent Malevolent Intrusions
CN108769925B (en) Anti-theft recovery system for mobile terminal
CN103118357A (en) Antitheft system and antitheft method for mobile terminals
CN110619226A (en) Platform-based data processing method, system, equipment and storage medium
TW201804354A (en) Storage device, data protection method therefor, and data protection system
CN105516500B (en) A kind of method and system selecting equipment mode
US20220358226A1 (en) Network edge storage apparatus having security feature
CN111338889B (en) Evidence obtaining method, device, equipment and storage medium supporting multiple operating systems
CN107197075B (en) Clean boot means of defence, device and computer readable storage medium
CN108600964B (en) Mobile terminal tracking and positioning system
CN109873747B (en) Electronic device and unlocking method thereof
CN112214763A (en) Data monitoring method and device
CN111093186B (en) eSIM card operator file management method and system
CN110086942B (en) Anti-theft method, device and equipment of intelligent terminal and storage medium
KR102051613B1 (en) Analysis System and Method of iOS System Log
CN110633585A (en) Hard disk locking and unlocking method, device, equipment and readable storage medium
CN111464294B (en) Block chain data extraction method, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination