CN112637830A - Terminal retrieving method and device and network equipment - Google Patents

Terminal retrieving method and device and network equipment Download PDF

Info

Publication number
CN112637830A
CN112637830A CN201910948587.1A CN201910948587A CN112637830A CN 112637830 A CN112637830 A CN 112637830A CN 201910948587 A CN201910948587 A CN 201910948587A CN 112637830 A CN112637830 A CN 112637830A
Authority
CN
China
Prior art keywords
terminal
information
loss
network equipment
user portrait
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910948587.1A
Other languages
Chinese (zh)
Other versions
CN112637830B (en
Inventor
施锦河
傅一平
张颐宗
林方铭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Zhejiang Innovation Research Institute Co ltd
China Mobile Communications Group Co Ltd
China Mobile Group Zhejiang Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Group Zhejiang Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Group Zhejiang Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN201910948587.1A priority Critical patent/CN112637830B/en
Publication of CN112637830A publication Critical patent/CN112637830A/en
Application granted granted Critical
Publication of CN112637830B publication Critical patent/CN112637830B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data

Abstract

The embodiment of the invention relates to the technical field of wireless communication, and discloses a terminal retrieving method, a terminal retrieving device and network equipment. Wherein, the method comprises the following steps: the method comprises the steps that network equipment obtains loss reporting information, wherein the loss reporting information comprises a first number; the network equipment acquires identification information of a first terminal corresponding to the first number according to the loss reporting information; and the network equipment acquires the searching information of the first terminal from an operator database according to the identification information of the first terminal and sends the searching information of the first terminal. Through the mode, the terminal can be found back, additional arrangement on the terminal is not needed, and the operability is high.

Description

Terminal retrieving method and device and network equipment
Technical Field
The embodiment of the invention relates to the technical field of wireless communication, in particular to a terminal retrieving method, a terminal retrieving device and network equipment.
Background
With the continuous development of intelligent terminals and mobile internet technologies, the functions of personal mobile phones are more and more abundant, the carried personal information is increasingly increased, and the value of the personal mobile phones is more and more important. Especially, at present that mobile payment is widely popularized, due to bank cards and payment information bound to the mobile phone, loss of the mobile phone may cause loss of a large amount of personal property, and how to provide a reliable terminal retrieving method becomes a problem which needs to be solved urgently.
The existing terminal retrieving method generally adopts an additional anti-theft device to lock and position when the terminal is lost, additional arrangement is needed, and the popularization difficulty is high.
Disclosure of Invention
In view of the foregoing problems, embodiments of the present invention provide a terminal retrieving method, apparatus, and network device, which overcome the foregoing problems or at least partially solve the foregoing problems.
According to an aspect of the embodiments of the present invention, there is provided a terminal retrieving method, including: the method comprises the steps that network equipment obtains loss reporting information, wherein the loss reporting information comprises a first number; the network equipment acquires identification information of a first terminal corresponding to the first number according to the loss reporting information; and the network equipment acquires the searching information of the first terminal from an operator database according to the identification information of the first terminal and sends the searching information of the first terminal.
In an optional manner, the obtaining, according to the identification information of the first terminal, search information of the first terminal from an operator database, and sending the search information of the first terminal, further includes: acquiring the use information of the first terminal according to the identification information of the first terminal; generating a user portrait before the loss report and a user portrait after the loss report according to the use information of the first terminal; judging whether the first terminal is a lost terminal or not according to the user portrait before loss report and the user portrait after loss report; and if so, acquiring the searching information of the first terminal from an operator database.
In an optional manner, the determining whether the first terminal is a lost terminal according to the user representation before loss report and the user representation after loss report further includes: respectively acquiring characteristic information from the user portrait before loss report and the user portrait after loss report; inputting the characteristic information into a preset identification model; if the output result of the preset identification model is different users, determining that the first terminal is a lost terminal; and if the output result of the preset recognition model is the same user, determining that the first terminal is not a lost terminal.
In an alternative mode, the characteristic information comprises one or more of numbers, names, identification numbers, face recognition data, circle of contact, residence, place of work, application programs, use duration and trust level.
In an optional manner, the method further comprises: if the network equipment determines that the first terminal is a lost terminal, training the preset recognition model based on the user portrait before the loss report and the user portrait after the loss report; and the network equipment updates the preset recognition model according to the training result.
In an optional manner, the obtaining, according to the identification information of the first terminal, search information of the first terminal from an operator database, and sending the search information of the first terminal, further includes: and if the first terminal is determined not to be the lost terminal, stopping obtaining the use information of the first terminal.
In an optional manner, before the obtaining, according to the loss report information, the identification information of the first terminal corresponding to the first number, the method further includes: the network equipment acquires identity verification information, wherein the identity verification information comprises one or more of a number, a name, an identity card number, face recognition data, a circle of contact, a place of residence and loss time; the network equipment judges whether the identity authentication information passes or not; and if the identity authentication information passes, the network equipment acquires the identification information of the first terminal corresponding to the first number.
In an alternative, the identification information of the first terminal includes an international mobile equipment identity of the first terminal.
According to another aspect of the embodiments of the present invention, there is provided a terminal retrieving apparatus, including: the loss reporting module is used for acquiring loss reporting information, wherein the loss reporting information comprises a first number; the identification information acquisition module is used for acquiring identification information of the first terminal corresponding to the first number according to the loss reporting information; and the searching information sending module is used for acquiring the searching information of the first terminal from an operator database according to the identification information of the first terminal and sending the searching information of the first terminal.
According to still another aspect of the embodiments of the present invention, there is provided a network device, including: a processor, a memory, and a communication interface, the processor, the memory, and the communication interface in communication with each other; the memory is used for storing at least one executable instruction, and the executable instruction causes the network device to execute the operation of the terminal retrieving method.
According to another aspect of the embodiments of the present invention, there is provided a computer-readable storage medium having at least one executable instruction stored therein, the executable instruction causing a processor to execute the terminal retrieving method as described above.
According to the embodiment of the invention, the loss reporting information is acquired through the network equipment, the loss reporting information comprises the first number, the identification information of the first terminal corresponding to the first number is acquired according to the loss reporting information, the searching information of the first terminal is acquired from the operator database according to the identification information of the first terminal, and the searching information of the first terminal is sent to be sent, no additional setting is required to be carried out on the terminal, and the operability is strong.
The foregoing description is only an overview of the technical solutions of the embodiments of the present invention, and the embodiments of the present invention can be implemented according to the content of the description in order to make the technical means of the embodiments of the present invention more clearly understood, and the detailed description of the present invention is provided below in order to make the foregoing and other objects, features, and advantages of the embodiments of the present invention more clearly understandable.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
fig. 1 is a flowchart illustrating a terminal retrieving method according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating a terminal retrieving method according to another embodiment of the present invention;
FIG. 3 shows a flowchart of step 233 of FIG. 2;
fig. 4 is a flowchart illustrating a terminal retrieving method according to another embodiment of the present invention;
fig. 5 is a flowchart illustrating an application of the terminal retrieving method according to the embodiment of the present invention;
fig. 6 is a schematic structural diagram of a terminal retrieving device according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of a network device according to an embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present invention will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the invention are shown in the drawings, it should be understood that the invention can be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art.
The terminal retrieving method, the device and the network equipment provided by the embodiment of the invention can retrieve the terminal of the user, wherein the terminal can be a mobile phone, a personal computer, a palm computer and the like.
Fig. 1 shows a flowchart of a terminal retrieving method according to an embodiment of the present invention. The method is applied to network equipment, wherein the network equipment can be network equipment of an operator. As shown in fig. 1, the method comprises the steps of:
step 110, obtaining loss report information, wherein the loss report information comprises a first number.
When the mobile phone is lost, the user goes to the service provider business hall to report the lost mobile phone number and subsidizes the SIM card, and then the user obtains the lost number again. And acquiring loss reporting information, wherein the loss reporting information comprises a first number, and the first number is a lost number.
And step 120, acquiring identification information of the first terminal corresponding to the first number according to the loss report information.
The first terminal corresponding to the first number is a terminal using the first number before loss report, and the identification information of the first terminal may be an identification code of the terminal. Each terminal such as a mobile phone and a computer has a specific code, namely an identification code.
In this embodiment, the identification information of the first terminal is an International Mobile Equipment Identity (IMEI) of the first terminal. The IMEI is a mobile phone serial number, and is used for identifying mobile communication devices such as individual mobile phones in a mobile phone network, and corresponds to an "identity card" of a mobile phone. The IMEI is generally attached to the back of the body and the outer package, and is also stored in the mobile phone memory, and can be queried by inputting #06 #. When a mobile phone or other terminals are inserted into the SIM card for use, network authentication operation is required to be carried out firstly, and then a mapping relation between the mobile phone number and the IMEI is generated, so that the mobile phone using number can be determined according to the IMEI by utilizing the mapping relation. Then in step 120, it may be: and according to the loss report information, obtaining the IMEI which has a mapping relation with the mobile phone number in the historical information record, thereby obtaining the IMEI of the first terminal corresponding to the first number.
Optionally, the user may also prestore the IMEI of the mobile phone in advance, or report the IMEI of the terminal in an online or online manner after a loss is reported. Then in step 120, it may also be: according to the loss reporting information, obtaining a prestored IMEI (international mobile equipment identity) of the first terminal corresponding to the first number in a database; or receiving the IMEI of the first terminal corresponding to the first number input by the user according to the loss report information, thereby acquiring the IMEI of the first terminal.
Step 130, obtaining the searching information of the first terminal from the operator database according to the identification information of the first terminal, and sending the searching information of the first terminal.
The search information of the first terminal may be a currently used number of the first terminal or other related information (e.g., an activity location range, a circle of contact, etc.). Sending the search information of the first terminal may specifically be: and sending the searching information of the first terminal to the first number, or sending the searching information of the first terminal to a number reserved by a user, so that the user can find the first terminal according to the searching information of the first terminal.
According to the embodiment of the invention, the loss reporting information is acquired through the network equipment, the loss reporting information comprises the first number, the identification information of the first terminal corresponding to the first number is acquired according to the loss reporting information, the searching information of the first terminal is acquired from the operator database according to the identification information of the first terminal, and the searching information of the first terminal is sent to be sent, no additional setting is required to be carried out on the terminal, and the operability is strong.
Fig. 2 shows a flowchart of a terminal retrieving method according to another embodiment of the present invention. The method is applied to network equipment, wherein the network equipment can be network equipment of an operator. As shown in fig. 2, the method comprises the steps of:
step 210, obtaining loss report information, wherein the loss report information comprises a first number.
And step 220, acquiring identification information of the first terminal corresponding to the first number according to the loss report information.
And 231, acquiring the use information of the first terminal according to the identification information of the first terminal.
The usage information may be information obtained through the identification information of the first terminal, and may be track information, internet access information, and the like. The usage information of the first terminal includes usage information before the first terminal is reported to be lost and usage information after the first terminal is reported to be lost. Then, the obtaining of the usage information of the first terminal may specifically be: and obtaining the use information before the loss report from the historical record information according to the identification information of the first terminal, and obtaining the use information of the first terminal within the preset time after determining that the first terminal is in the use state according to the identification information of the first terminal to obtain the use information after the loss report. Wherein the preset time may be one week.
Further, the identification information of the first terminal may be added to a monitoring library, the identification information of the on-network terminal and the identification information in the monitoring library are matched every day, and if the matching is successful, the terminal is determined to be in a use state.
Step 232, generating a user portrait before the loss report and a user portrait after the loss report according to the use information of the first terminal.
And carrying out user identity portrait on the first terminal according to the use information of the first terminal before loss report to generate a user portrait before loss report, carrying out user identity portrait on the first terminal according to the use information of the first terminal after loss report to generate a user portrait after loss report.
And 233, judging whether the first terminal is a lost terminal or not according to the user portrait before the loss report and the user portrait after the loss report.
To avoid a false loss due to a false operation or mischief, a false alarm detection needs to be performed on the loss reporting terminal to determine that the loss reporting terminal is actually lost. As shown in fig. 3, step 233 may specifically include:
step 2331, obtaining feature information from the user portrait before the loss report and the user portrait after the loss report, respectively;
step 2332, inputting the characteristic information into a preset identification model;
step 2333, if the output result of the preset recognition model is different users, determining that the first terminal is a lost terminal;
step 2334, if the output result of the preset recognition model is the same user, determining that the first terminal is not a lost terminal.
Specifically, the feature information of the user portrait before the loss report and the feature information of the user portrait after the loss report are respectively acquired, and the feature information of the user portrait before the loss report and the feature information of the user portrait after the loss report are input into a preset recognition model, so that the preset recognition model outputs a coincidence value (or a difference value), and an output result is obtained according to the coincidence value (or the difference value). The coincidence value (or the difference value) can be represented by a numerical value between 0 and 1, if the coincidence value is closer to 1 (or the difference value is closer to 0), the similarity degree of the characteristic information is higher, and if the coincidence value is greater than a preset similarity threshold (or the difference value is smaller than the preset similarity threshold), the output result is the same user; on the contrary, if the coincidence value is closer to 0 (or the difference value is closer to 1), the lower the similarity degree of the feature information is indicated, and if the coincidence value is smaller than the preset similarity threshold (or the difference value is larger than the preset similarity threshold), the result is output as a different user. Through the mode, when the mobile phone is lost and then retrieved and used by a user, or the mobile phone is lost by mistake, the false alarm monitoring can be carried out to determine whether the terminal is lost indeed.
The characteristic information comprises one or more of numbers, names, identification numbers, face recognition data, contact circles, residence places, work places, application programs, use duration and trust degrees. Wherein, the circle of contact can be a number with high communication frequency. The preset recognition model may compare the similarity of each feature information, such as the number, the name, the identification number, the face recognition data, the circle of contact, the place of residence, the place of employment, the application program, the duration of use, the trust level, and the like, to obtain an output result. The preset identification model can be obtained by training by acquiring identification information of the terminal determined to be lost as sample data.
Further, as shown in fig. 3, the method further includes:
step 2335, if it is determined that the first terminal is a lost terminal, training a preset recognition model based on the user portrait before the loss report and the user portrait after the loss report;
and 2336, updating the preset recognition model according to the training result.
After the first terminal is determined to be a lost terminal in step 2333, the user portrait before the loss report and the user portrait after the loss report are used as sample data, the preset recognition model is trained, and the original preset recognition model is updated by the trained preset recognition model, so that the accuracy of the preset recognition model can be improved.
Step 234, if the first terminal is determined to be the lost terminal, obtaining the search information of the first terminal from the operator database, and sending the search information of the first terminal.
And 235, if the first terminal is determined not to be the lost terminal, stopping acquiring the use information of the first terminal.
And for the terminal which fails in false alarm detection, if the terminal is not qualified to the loss condition, removing the identification information of the terminal from the monitoring library, thereby stopping obtaining the use information of the terminal. Optionally, the first number may be notified that monitoring has stopped, and the user may apply for joining the monitoring library again after updating the information after confirming the notification result.
The embodiment of the invention obtains the loss reporting information which comprises a first number, obtains the identification information of a first terminal corresponding to the first number according to the loss reporting information, obtains the use information of the first terminal according to the identification information of the first terminal, generates a user portrait before loss reporting and a user portrait after loss reporting according to the use information of the first terminal, judges whether the first terminal is a lost terminal according to the user portrait before loss reporting and the user portrait after loss reporting, obtains the search information of the first terminal from an operator database if the first terminal is determined to be the lost terminal, and sends the search information of the first terminal.
In some embodiments, the user needs to be authenticated before the first terminal is monitored. Then, before step 220, as shown in fig. 4, the method further comprises:
step 241, obtaining identity authentication information;
step 242, judging whether the identity authentication information passes;
and 243, if the identity authentication information passes, acquiring the identification information of the first terminal corresponding to the first number.
The identity authentication information is input by a user, and the identity authentication information can comprise one or more of numbers, names, identity card numbers, face recognition data, circle of contact, residence and loss time. Then, judging whether the identity authentication information passes, specifically may be: and matching the identity authentication information based on the big data information, wherein if the identity authentication information is successfully matched, the identity authentication information passes, and the user is indicated as the owner user. Through carrying out authentication, can prevent that non-owner user from carrying out maliciously and reporting the loss.
Fig. 5 is a flowchart illustrating an application of the terminal retrieving method according to the embodiment of the present invention. The mobile phone (first terminal) of a certain user is stolen to cause loss, the user reports the lost mobile phone number to a business hall, and the SIM card is repaired to obtain the original lost number (first number), at the moment, the user buys a new mobile phone (second terminal) and uses the original lost number on the new mobile phone; and the lost handset (first terminal) is used because of the original lost number, and the new number (second number) is replaced to continue using. The method is applied to network equipment, wherein the network equipment can be network equipment of an operator. As shown in fig. 5, the method comprises the steps of:
step 301, obtaining loss report information of a user, wherein the loss report information comprises a first number;
step 302, obtaining the identity authentication information of the user;
wherein the authentication information includes: the mobile phone number, the name of a householder, the identity card number, the face recognition of the user, the number of 5 contact circles, the residence place, the approximate lost time and the like.
Step 303, if the identity authentication information passes, acquiring the IMEI of the first terminal, and adding the IMEI of the first terminal to a monitoring library;
step 304, matching the IMEI of the online mobile phone with the IMEI of the first terminal, if the matching is successful, marking the IMEI which is successfully matched and continuously monitoring for one week;
305, analyzing all-dimensional user portrait information such as the identity information of a householder, a circle of contact, a residence, daily use duration, internet surfing preference and the like of the IMEI based on a big data technology according to the communication, track and internet surfing behavior of the number corresponding to the IMEI of the first terminal, and generating a lost user portrait;
for example, a communication circle dimension is formed by using the number of the opposite end of the call in the monitoring period; forming dimensions of a workplace and a residence by utilizing the track residence condition; by utilizing the internet surfing behavior, the application use preference and the daily average use duration dimension are formed, so that the identity of the user is truly reflected.
Step 306, acquiring the use information of the first terminal before the loss report from the historical record information according to the IMEI of the first terminal, and generating a user portrait before the loss report;
step 307, extracting feature information from the user portrait before loss report and the user portrait after loss report, and performing feature integration;
wherein the feature integration comprises: whether the number is the same, whether the name is the same, whether the identity card number is the same, whether the face is the same, contact circle contact degree, whether the place of residence is the same, whether the place of work is the same, APP use contact degree, long time contact degree of use, credit degree difference, income difference, telephone charge difference and the like.
Step 308, inputting the data after feature integration into a preset identification model;
step 309, if the output results of the preset recognition models are different users, determining that the first terminal is a lost terminal;
and 310, acquiring the activity place range and the second number of the first terminal, and sending the activity place range and the second number to the first number to be used as a retrieval basis of the user.
The embodiment of the invention obtains the loss reporting information which comprises a first number, obtains the identification information of a first terminal corresponding to the first number according to the loss reporting information, obtains the use information of the first terminal according to the identification information of the first terminal, generates a user portrait before loss reporting and a user portrait after loss reporting according to the use information of the first terminal, judges whether the first terminal is a lost terminal according to the user portrait before loss reporting and the user portrait after loss reporting, obtains the search information of the first terminal if the first terminal is determined to be the lost terminal, and sends the search information of the first terminal to the first number.
Fig. 6 is a schematic structural diagram of a terminal retrieving device according to an embodiment of the present invention. As shown in fig. 5, the apparatus 400 includes: a loss reporting module 410, an identification information obtaining module 420 and a finding information sending module 430.
The loss reporting module 410 is configured to obtain loss reporting information, where the loss reporting information includes a first number; the identification information obtaining module 420 is configured to obtain identification information of the first terminal corresponding to the first number according to the loss report information; the search information sending module 430 is configured to obtain search information of the first terminal from an operator database according to the identification information of the first terminal, and send the search information of the first terminal.
In an alternative manner, the finding information sending module 430 includes: a usage information acquiring unit, a portrait unit, and a judging unit. The using information acquiring unit is used for acquiring the using information of the first terminal according to the identification information of the first terminal; the portrait unit is used for generating a user portrait before the loss report and a user portrait after the loss report according to the use information of the first terminal; the judging unit is used for judging whether the first terminal is a lost terminal or not according to the user portrait before loss report and the user portrait after loss report; and the searching information sending unit is used for acquiring the searching information of the first terminal from an operator database and sending the searching information of the first terminal if the searching information sending unit is used for acquiring the searching information of the first terminal from the operator database.
In an optional manner, the determining unit is specifically configured to: respectively acquiring characteristic information from the user portrait before loss report and the user portrait after loss report; inputting the characteristic information into a preset identification model; if the output result of the preset identification model is different users, determining that the first terminal is a lost terminal; and if the output result of the preset recognition model is the same user, determining that the first terminal is not a lost terminal.
In an optional manner, the apparatus 400 further comprises: the device comprises a training module and an updating module. The training module is used for training the preset recognition model based on the user portrait before the loss report and the user portrait after the loss report if the first terminal is determined to be the lost terminal; and the updating module is used for updating the preset recognition model according to the training result.
In an alternative mode, the characteristic information comprises one or more of numbers, names, identification numbers, face recognition data, circle of contact, residence, place of work, application programs, use duration and trust level.
In an optional manner, the finding information sending module 430 further includes: the monitoring unit is stopped. And the monitoring stopping module is used for stopping acquiring the use information of the first terminal if the first terminal is determined not to be the lost terminal.
In an optional manner, the apparatus 400 further comprises: the device comprises a verification information acquisition module, a verification module and a passing module. The authentication information acquisition module is used for acquiring authentication information, wherein the authentication information comprises one or more of a number, a name, an identity card number, face recognition data, a circle of contact, a place of residence and loss time; the verification module is used for judging whether the identity verification information passes or not; the passing module is used for acquiring the identification information of the first terminal corresponding to the first number if the identity authentication information passes.
In an alternative, the identification information of the first terminal includes an international mobile equipment identity of the first terminal.
It should be noted that the terminal retrieving device provided in the embodiments of the present invention is a device capable of executing the terminal retrieving method, and all embodiments of the terminal retrieving method are applicable to the device and can achieve the same or similar beneficial effects.
According to the embodiment of the invention, the loss reporting information is acquired through the network equipment, the loss reporting information comprises the first number, the identification information of the first terminal corresponding to the first number is acquired according to the loss reporting information, the searching information of the first terminal is acquired from the operator database according to the identification information of the first terminal, and the searching information of the first terminal is sent to be sent, no additional setting is required to be carried out on the terminal, and the operability is strong.
An embodiment of the present invention provides a computer storage medium, where at least one executable instruction is stored in the storage medium, and the executable instruction enables a processor to execute the terminal retrieving method in any of the above method embodiments.
According to the embodiment of the invention, the loss reporting information is acquired through the network equipment, the loss reporting information comprises the first number, the identification information of the first terminal corresponding to the first number is acquired according to the loss reporting information, the searching information of the first terminal is acquired from the operator database according to the identification information of the first terminal, and the searching information of the first terminal is sent to be sent, no additional setting is required to be carried out on the terminal, and the operability is strong.
An embodiment of the present invention provides a computer program product, which includes a computer program stored on a computer storage medium, where the computer program includes program instructions, and when the program instructions are executed by a computer, the computer executes the terminal retrieving method in any of the above-mentioned method embodiments.
According to the embodiment of the invention, the loss reporting information is acquired through the network equipment, the loss reporting information comprises the first number, the identification information of the first terminal corresponding to the first number is acquired according to the loss reporting information, the searching information of the first terminal is acquired from the operator database according to the identification information of the first terminal, and the searching information of the first terminal is sent to be sent, no additional setting is required to be carried out on the terminal, and the operability is strong.
Fig. 7 is a schematic structural diagram of a network device according to an embodiment of the present invention, and the specific embodiment of the present invention does not limit the specific implementation of the network device.
As shown in fig. 7, the network device may include: a processor (processor)502, a Communications Interface 504, a memory 506, and a communication bus 508.
Wherein: the processor 502, communication interface 504, and memory 506 communicate with one another via a communication bus 508. A communication interface 504 for communicating with network elements of other devices, such as clients or other servers. The processor 502 is configured to execute the program 510, and may specifically execute the terminal retrieving method in any of the above-described method embodiments.
In particular, program 510 may include program code that includes computer operating instructions.
The processor 502 may be a central processing unit CPU, or an Application Specific Integrated Circuit (ASIC), or one or more Integrated circuits configured to implement an embodiment of the present invention. The network device includes one or more processors, which may be the same type of processor, such as one or more CPUs; or may be different types of processors such as one or more CPUs and one or more ASICs.
And a memory 506 for storing a program 510. The memory 506 may comprise high-speed RAM memory, and may also include non-volatile memory (non-volatile memory), such as at least one disk memory.
According to the embodiment of the invention, the loss reporting information is acquired through the network equipment, the loss reporting information comprises the first number, the identification information of the first terminal corresponding to the first number is acquired according to the loss reporting information, the searching information of the first terminal is acquired from the operator database according to the identification information of the first terminal, and the searching information of the first terminal is sent to be sent, no additional setting is required to be carried out on the terminal, and the operability is strong.
The algorithms or displays presented herein are not inherently related to any particular computer, virtual system, or other apparatus. Various general purpose systems may also be used with the teachings herein. The required structure for constructing such a system will be apparent from the description above. In addition, embodiments of the present invention are not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of the present invention as described herein, and any descriptions of specific languages are provided above to disclose the best mode of the invention.
In the description provided herein, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the embodiments of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the invention and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that the invention as claimed requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and furthermore they may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments herein include some features included in other embodiments, rather than other features, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments. For example, in the following claims, any of the claimed embodiments may be used in any combination.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names. The steps in the above embodiments should not be construed as limiting the order of execution unless specified otherwise.

Claims (10)

1. A terminal retrieving method is characterized by comprising the following steps:
the method comprises the steps that network equipment obtains loss reporting information, wherein the loss reporting information comprises a first number;
the network equipment acquires identification information of a first terminal corresponding to the first number according to the loss reporting information;
and the network equipment acquires the searching information of the first terminal from an operator database according to the identification information of the first terminal and sends the searching information of the first terminal.
2. The method of claim 1, wherein the obtaining the search information of the first terminal from an operator database according to the identification information of the first terminal, and sending the search information of the first terminal, further comprises:
acquiring the use information of the first terminal according to the identification information of the first terminal;
generating a user portrait before the loss report and a user portrait after the loss report according to the use information of the first terminal;
judging whether the first terminal is a lost terminal or not according to the user portrait before loss report and the user portrait after loss report;
and if so, acquiring the searching information of the first terminal from an operator database.
3. The method of claim 2, wherein determining whether the first terminal is a lost terminal based on the pre-loss user representation and the post-loss user representation further comprises:
respectively acquiring characteristic information from the user portrait before loss report and the user portrait after loss report;
inputting the characteristic information into a preset identification model;
if the output result of the preset identification model is different users, determining that the first terminal is a lost terminal;
and if the output result of the preset recognition model is the same user, determining that the first terminal is not a lost terminal.
4. The method of claim 3, wherein the characteristic information comprises one or more of a number, a name, an identification number, face recognition data, a circle of contact, a place of residence, a place of employment, an application, a length of time of use, and a degree of trust.
5. The method of claim 2, further comprising:
if the network equipment determines that the first terminal is a lost terminal, training the preset recognition model based on the user portrait before the loss report and the user portrait after the loss report;
and the network equipment updates the preset recognition model according to the training result.
6. The method of claim 2, wherein the obtaining the search information of the first terminal from an operator database according to the identification information of the first terminal, and sending the search information of the first terminal, further comprises:
and if the first terminal is determined not to be the lost terminal, stopping obtaining the use information of the first terminal.
7. The method according to claim 1, wherein before the obtaining, according to the loss report information, the identification information of the first terminal corresponding to the first number, the method further comprises:
the network equipment acquires identity verification information, wherein the identity verification information comprises one or more of a number, a name, an identity card number, face recognition data, a circle of contact, a place of residence and loss time;
the network equipment judges whether the identity authentication information passes or not;
and if the identity authentication information passes, the network equipment acquires the identification information of the first terminal corresponding to the first number.
8. The method according to any of claims 1-7, wherein the identification information of the first terminal comprises an international mobile equipment identity of the first terminal.
9. A network device, comprising: a processor, a memory, and a communication interface, the processor, the memory, and the communication interface in communication with each other;
the memory is used for storing at least one executable instruction, and the executable instruction causes the network equipment to execute the operation of the terminal retrieving method according to any one of claims 1-7.
10. A computer-readable storage medium having stored thereon at least one executable instruction for causing a processor to execute the terminal retrieving method according to any one of claims 1-7.
CN201910948587.1A 2019-10-08 2019-10-08 Terminal retrieving method and device and network equipment Active CN112637830B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910948587.1A CN112637830B (en) 2019-10-08 2019-10-08 Terminal retrieving method and device and network equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910948587.1A CN112637830B (en) 2019-10-08 2019-10-08 Terminal retrieving method and device and network equipment

Publications (2)

Publication Number Publication Date
CN112637830A true CN112637830A (en) 2021-04-09
CN112637830B CN112637830B (en) 2022-10-14

Family

ID=75283013

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910948587.1A Active CN112637830B (en) 2019-10-08 2019-10-08 Terminal retrieving method and device and network equipment

Country Status (1)

Country Link
CN (1) CN112637830B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070077912A1 (en) * 2005-09-02 2007-04-05 Flextronics Software Systems Method enabling detection of stolen mobile communication devices and systems thereof
CN101330692A (en) * 2008-07-29 2008-12-24 Tcl天一移动通信(深圳)有限公司 Mobile phone with lose-proof function and method for preventing mobile phone from losing
CN103052024A (en) * 2012-12-06 2013-04-17 广东欧珀移动通信有限公司 Burglar-proof method for mobile phone, client side and server
CN103648089A (en) * 2013-11-07 2014-03-19 北京奇虎科技有限公司 Anti-theft processing method and anti-theft processing device for mobile equipment
CN105100130A (en) * 2014-04-25 2015-11-25 北京奇虎科技有限公司 Terminal device and terminal device theft prevention method and system
CN105142120A (en) * 2015-08-10 2015-12-09 闻泰通讯股份有限公司 Mobile phone anti-theft system
CN108684035A (en) * 2018-04-26 2018-10-19 中国联合网络通信集团有限公司 Method for retrieving, device, terminal and the computer readable storage medium of mobile phone

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070077912A1 (en) * 2005-09-02 2007-04-05 Flextronics Software Systems Method enabling detection of stolen mobile communication devices and systems thereof
CN101330692A (en) * 2008-07-29 2008-12-24 Tcl天一移动通信(深圳)有限公司 Mobile phone with lose-proof function and method for preventing mobile phone from losing
CN103052024A (en) * 2012-12-06 2013-04-17 广东欧珀移动通信有限公司 Burglar-proof method for mobile phone, client side and server
CN103648089A (en) * 2013-11-07 2014-03-19 北京奇虎科技有限公司 Anti-theft processing method and anti-theft processing device for mobile equipment
CN105100130A (en) * 2014-04-25 2015-11-25 北京奇虎科技有限公司 Terminal device and terminal device theft prevention method and system
CN105142120A (en) * 2015-08-10 2015-12-09 闻泰通讯股份有限公司 Mobile phone anti-theft system
CN108684035A (en) * 2018-04-26 2018-10-19 中国联合网络通信集团有限公司 Method for retrieving, device, terminal and the computer readable storage medium of mobile phone

Also Published As

Publication number Publication date
CN112637830B (en) 2022-10-14

Similar Documents

Publication Publication Date Title
CN110517097B (en) Method, device, equipment and storage medium for identifying abnormal users
CN109086317B (en) Risk control method and related device
CN109657107B (en) Terminal matching method and device based on third-party application
CN106776973B (en) Blacklist data generation method and apparatus
CN109460653B (en) Rule engine based verification method, verification device, storage medium and apparatus
CN108830562B (en) Attendance card punching method and related equipment
CN104751086A (en) Terminal anti-theft method
CN111461223B (en) Training method of abnormal transaction identification model and abnormal transaction identification method
CN111582868B (en) Transaction request processing method, device and equipment
CN105007571A (en) Information processing method and service equipment
CN112948224B (en) Data processing method, device, terminal and storage medium
CN112073407A (en) System, method and storage medium for real-time judgment of abnormal equipment in high-concurrency service
CN114218110A (en) Account checking test method and device for financial data, computer equipment and storage medium
CN107294981B (en) Authentication method and equipment
CN111371581A (en) Method, device, equipment and medium for detecting business abnormity of Internet of things card
CN112637830B (en) Terminal retrieving method and device and network equipment
CN116302889A (en) Performance test method and device for functional module and server
CN113962276B (en) Abnormal information determination method and device, electronic equipment and storage medium
CN114297735A (en) Data processing method and related device
CN111767544B (en) Multi-frequency replay attack vulnerability determination method, device, equipment and readable storage medium
CN114531340A (en) Log acquisition method and device, electronic equipment, chip and storage medium
CN113297583A (en) Vulnerability risk analysis method, device, equipment and storage medium
CN109561406B (en) SIM card selection method, device, system, electronic equipment and medium
CN113038480B (en) Identification method, device, server and storage medium
CN110516173B (en) Illegal network station identification method, illegal network station identification device, illegal network station identification equipment and illegal network station identification medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20231222

Address after: No.19, Jiefang East Road, Hangzhou, Zhejiang Province, 310000

Patentee after: CHINA MOBILE GROUP ZHEJIANG Co.,Ltd.

Patentee after: China Mobile (Zhejiang) Innovation Research Institute Co.,Ltd.

Patentee after: CHINA MOBILE COMMUNICATIONS GROUP Co.,Ltd.

Address before: No. 19, Jiefang East Road, Hangzhou, Zhejiang Province, 310016

Patentee before: CHINA MOBILE GROUP ZHEJIANG Co.,Ltd.

Patentee before: CHINA MOBILE COMMUNICATIONS GROUP Co.,Ltd.