CN1665260A - A remote control method for mobile telephone - Google Patents

A remote control method for mobile telephone Download PDF

Info

Publication number
CN1665260A
CN1665260A CN 200510024044 CN200510024044A CN1665260A CN 1665260 A CN1665260 A CN 1665260A CN 200510024044 CN200510024044 CN 200510024044 CN 200510024044 A CN200510024044 A CN 200510024044A CN 1665260 A CN1665260 A CN 1665260A
Authority
CN
China
Prior art keywords
mobile phone
short message
control
control command
receiving terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 200510024044
Other languages
Chinese (zh)
Inventor
郑南
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
HANGZHOU STARCOMM COMMUNICATION CO Ltd
Original Assignee
HANGZHOU STARCOMM COMMUNICATION CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by HANGZHOU STARCOMM COMMUNICATION CO Ltd filed Critical HANGZHOU STARCOMM COMMUNICATION CO Ltd
Priority to CN 200510024044 priority Critical patent/CN1665260A/en
Publication of CN1665260A publication Critical patent/CN1665260A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention provides a mobile telephone remote controlling method, including: a transmitter edits a control short message containing control command and transmits the control short message to a receiving-end mobile telephone; and the receiving-end mobile telephone receives the control short message and draws the control command from the control short message and executes the control command. And as editing a control short message, the transmitter needs to select/input the control command list and control parameters list according to the requirement and inputs the number and control cipher of the receiving-end mobile telephone and after having been edited, the control short message is transmitted to the receiving-end mobile telephone. And the receiving-end mobile telephone receives the short message and then draws the control cipher from it and obtains the ID identification code of the transmitter to compare with the encrypted identification code stored in the mobile telephone: if they are the same, draw the codes of the control command and control parameters, decode them according to the control command list and parameter list and call the corresponding operating function to operate the receiving-end mobile telephone.

Description

A kind of long-range control method of mobile phone
[technical field]
The present invention relates in the wireless telecommunication system control method of portable terminal is related in particular to a kind of method of mobile phone being controlled by the mode that sends SMS message.
[background technology]
Along with the development of mobile communication technology, various mobile communication terminals, also more and more perfect as the function of mobile phone, PDA etc.For mobile phone (comprising the mobile phone of common theory and Personal Handyphone System etc.) user, except the function of basic conversation and transmitting-receiving short message, the memory function that also can use mobile phone is stored individual privacy information such as contact method, message registration, short message record, daily arrangement.Made things convenient for searching of user and record with the so many information of mobile phone storage, in case still mobile phone is lost, these information leakage will cause very big influence to user's life.Because the mobile phone volume is less, lose or stolen possibility all very big, in case mobile phone is lost or is stolen, how to prevent in the mobile phone canned data reveal, how to give stolen mobile phone for change in addition how can allow the machine master the very first time to losing or stolen mobile phone carries out remote control operation, all be the new problem that the mobile phone research staff faces.
In existing technology, more common mobile phone anti-theft feature is provided with password and short message warning etc.Chinese patent application discloses No. 1477890 and has disclosed a kind of method of personal information protection; this method promptly allows the user set in advance the mobile phone password and is stored in the read-only memory; and the user wished that the personal information of maintaining secrecy encrypts storage; just can see this enciphered message after having only the correct password (with the identical password of password in being stored in read-only memory) of input, can prevent that like this other people from obtaining this information.
Though this method can be protected user's personal information in theory; but the mobile phone password in this method is the comparison easy crack; such as mobile phone is brushed machine; make mobile phone return to reset condition when dispatching from the factory; the mobile phone password that so former first chance master sets has not just come into force yet, thereby the method for this protection personal information had also just lost efficacy.In addition, the important information user storage that has back on mobile phone is not just left backup again, after mobile phone is lost so, information is also lost thereupon, though the robber can't obtain these information, but the machine master also can't obtain these information again, so this method still can not effectively be avoided machine master's loss.Moreover this method can not help the machine master to give mobile phone for change, so economic loss is unavoidable.
The Chinese invention patent application discloses No. 1434626, all disclosed by secret short message notification for No. 1555183 and No. 1395407 and carried out the antitheft method of mobile phone, briefly, these methods mainly all are whether the information of comparing in the SIM card earlier in start is consistent with the corresponding information in the mobile phone, as whether the PIN PIN code of comparing in the SIM card is consistent with the Mobile Directory Number that is stored in advance in the mobile phone, or whether the international mobile subscriber identity IMSI sign indicating number in the comparison SIM card is consistent with the IMSI sign indicating number that is stored in advance in the mobile phone; If unanimity then mobile phone enters normal holding state, can use; If inconsistent then mobile phone can send SMS message to the preassigned receipt number of machine master, and mobile phone when sending SMS message the robber have no to discover.Like this, no matter which type of mobile phone neocaine the robber changes, and the machine master can know the Mobile Directory Number that the robber changes from the short message of receiving.Well imagine,, will provide very useful clue recovering stolen mobile phone if machine chief commander number offers the police and commmunication company.Though this method might be given stolen mobile phone for change to reduce economic loss of user, but the hope of giving for change in actual applications is also little, also need to take a long time even if give for change, moreover, no matter whether really can give stolen mobile phone for change, a large amount of individual privacies or important information may be revealed, and now a lot of offender to steal mobile phone be in order to utilize the inside canned data crime, obviously be not enough so utilize this method to carry out antitheft merely.On the other hand, this method can only be at the situation of mobile theft, if machine master oneself loses mobile phone, nobody replaces new SIM card, then can't find mobile phone according to sending the short message of returning.
Except stolen and lose both of these case, the user also can run into the other trouble sometimes, during such as working mobile phone is forgotten at home, and stored customer data etc. in the mobile phone to working crucial information, at this moment the user can only oneself come back home and reach mobile phone, and is not only consuming time but also require great effort undoubtedly.
At above-mentioned stolen, lose, drop on all situations such as somewhere, mobile phone is made the commercial city in the function of developing some hommizations energetically, to reduce user's loss in all fields to greatest extent.
[summary of the invention]
The objective of the invention is to provides a kind of long-range control method of mobile phone at above-mentioned the deficiencies in the prior art, makes the user can control mobile phone a long way off.
Another object of the present invention is on the basis of the long-range control method of above-mentioned mobile phone, a kind of mobile phone theft preventing method further is provided, preventing leakage of personal information, or control stolen mobile phone information needed is returned to the machine master, to retrieve machine master's partial loss.
For achieving the above object, the present invention adopts following technical scheme: the long-range control method of mobile phone of the present invention comprises the steps: that the sender edits the control short message that has comprised control command, and sends the control short message to the receiving terminal mobile phone; And the receiving terminal mobile phone receives the control short message, therefrom takes out control command, and carries out control command.
The long-range control method of above-mentioned mobile phone also comprised before the receiving terminal mobile phone sends the control short message carrying out: the sender is according to the control command table on the user interface and parameter list selections/input of control commands and Control Parameter, and the number of input receiving terminal mobile phone and control password.The number of described receiving terminal mobile phone is confirmed according to following method: the receiving terminal mobile phone reads the number information on the current mobile phone card, and read the number information of mobile phone storage inside, when the two not simultaneously, send number information on the current mobile phone card with the form of short message to the receipt number that the machine master presets, this number information will send the destination Mobile Station International ISDN Number of control short message as the sender; If the sender does not obtain receipt, then can directly send to former Mobile Directory Number.
Be sent to the receiving terminal mobile phone after the control short message that the user edits is encoded.The receiving terminal mobile phone takes out the control password earlier after receiving the control short message, by obtaining the identity of the sender authentication code after the functional operation, compare with the encryption authentication code of mobile phone stored, when the identity of the sender authentication code is identical with the mobile phone authentication code, just can call corresponding handling function and carry out control command.Can't show reception and the operating process of controlling short message on the user interface of receiving terminal mobile phone.After executing control command, the receiving terminal mobile phone is deletion control short message record automatically.
Compared with prior art, the long-range control method of mobile phone of the present invention not only can be realized the mobile phone anti-theft feature, all right Long-distance Control mobile phone locking, shutdown, even telephone directory returns, the information passback, and mobile phone is provided with and manages, greatly facilitate management and the use of machine master to mobile phone.
[description of drawings]
Fig. 1 is the composition Organization Chart of the tele-control system that long-range control method adopted of mobile phone of the present invention.
Fig. 2 is the composition schematic diagram of control short message in the long-range control method of mobile phone of the present invention.
Fig. 3 is the transmitting terminal workflow diagram of the long-range control method of mobile phone of the present invention.
Fig. 4 is the receiving terminal workflow diagram of the long-range control method of mobile phone of the present invention.
Fig. 5 is the workflow diagram of the Mobile Directory Number tracking that combines with the long-range control method of mobile phone of the present invention.
[embodiment]
Please refer to shown in Figure 1, the long-range control method of mobile phone of the present invention need adopt a kind of tele-control system to realize, this control system is divided into transmitting terminal and two parts of receiving terminal, and transmitting terminal comprises user's input module 10, control short message memory module 20, control short message coding module 30 and short message sending module 40; Receiving terminal comprises short message types judge module 50, short message sender identification module 60, short message decoder module 70, control command Executive Module 80 and control short message record removing module 90.In the present invention, the support hardware of transmitting terminal can be mobile phone or computer etc., and receiving terminal can only be a mobile phone.
User's input module 10 comprises a visual user interface (or claiming man-machine interface), this user interface can show selective menu according to control command table that transmitting terminal provided and parameter list, and the user can utilize keyboard or mode such as hand-written to select/input of control commands and Control Parameter according to visual menu easily.Above-mentioned control command can be mobile phone locking, shutdown, mobile phone setting, mobile phone management, address list passback, the passback of information record or the like, Control Parameter then is the required concrete parameter of some control command, as telephone number, name, time or the like.See also shown in Figure 2ly, this control command and Control Parameter have constituted the content 13 of control short message jointly.In addition, user's input module 10 also can be pointed out the number (destination Mobile Station International ISDN Number) 14 that the user inputs the receiving terminal mobile phone and the control password 15 of receiving terminal mobile phone.This control password 15 is imported after purchasing machine by the machine master and is advanced mobile phone, encrypts on the memory of authentication code long preservation at mobile phone through forming one after the One-Way Encryption function calculation at the control password 15 of inner identity code ID that can be had according to mobile phone itself of mobile phone and machine primary input.
In mobile phone, common short message and control short message need separate storage.Above-mentioned control short message memory module 20 promptly is specifically designed to storage control short message.The control short message is made up of short message body 12 and short message head 11.The content (comprising control command and Control Parameter) 13 of the control short message of inputing by user's input module 10, the number 14 of receiving terminal mobile phone and control password 15 all are stored in the short message body 12.
Control short message coding module 30 is used for the short message body 12 of control short message is encoded.Before short message sent, the lowermost layer human-machine interface layer of agreement (MMI layer) can be given second layer protocol layer with the short message body 12 behind the coding, was added the short message head 11 of expression short message classification to the short message body 12 after encoding by protocol layer.Present embodiment is to distinguish control short message and common short message by the application identity symbol field of setting in the short message head 11, for example: in the common short message, application identity symbol field is set at 04H, and in the control short message, application identity symbol field is set at 05H.
Short message sending module 40 will be controlled short message by normal short message transmission flow and send.
Short message types judge module 50 is judged the type of received short message by resolving short message head 11, be that received short message is common short message or control short message, in the present embodiment, as long as the application identity that short message types judge module 50 reads in the short message head 11 accords with the type that field can be judged short message, content as application identity symbol field is 04H, then common short message can be judged as,, then the control short message can be judged as if the application identity field is 05H.
Short message sender identification module 60 is used to differentiate short message sender's identity.Short message sender identification module 60 takes out control password 15 (in theory in short message body 12, the only organic master of control password knows, so the correct control password 15 of only organic this talent conference of master input), this control password 15 and mobile phone identity code ID are translated into an identity of the sender authentication code by unidirectional encryption function together, come to compare with the encryption authentication code that originally was stored on the FLASH memory.If the identity of the sender authentication code is identical with the encryption authentication code, then accept this control short message; If the identity of the sender authentication code is different with the encryption authentication code, then abandon this control short message.
Short message decoder module 70 is used for the control short message that receives is decoded.After receiving terminal is received the control short message, take out the coding of control command and Control Parameter in the short message body of this short message decoder module 70 behind the coding, and resolve, thereby learn control command and the Control Parameter that the user imports according to control command table and parameter list.
Control command Executive Module 80 is responsible for carrying out concrete operation according to control command.Such as, control command is " shutdown ", then this control command Executive Module 80 can go shutdown function in the caller to carry out the action of shutdown; If control command is " telephone number passback ", Control Parameter is " Zhang San " simultaneously, and this control command Executive Module 80 will go telephone number in the caller to return function to carry out telephone number with Zhang San and return operation to transmitting terminal so.
The control short message record is removed module 90 and carry out work after control command Executive Module 80 is executed control command, is responsible for the control short message deletion that will receive.
The short message types judge module 50 of above-mentioned receiving terminal, short message sender identification module 60, short message decoder module 70, control command Executive Module 80 and control short message record are removed the work of module 90 and are all carried out in the inner secret of receiving terminal mobile phone, in the process of carrying out, do not have any demonstration or any prompting on the receiving terminal mobile phone, that is to say that the holder of receiving terminal mobile phone is the activity that can not know above-mentioned five modules.
The long-range control method of mobile phone of the present invention sees also Fig. 3 and shown in Figure 4, and Fig. 3 is the workflow diagram of transmitting terminal, and Fig. 4 is the workflow diagram of receiving terminal.
The long-range control method of mobile phone of the present invention comprises the steps:
Step 100, transmitting terminal user (to call the sender in the following text) can be connected to the control short message user interface that the equipment of mobile communications network enters transmitting terminal by mobile phone or computer etc.;
Control command table and parameter list selection/input of control commands and Control Parameter that step 101, sender show according to user interface, thus control short message body formed;
Step 102, sender import the control password of receiving terminal mobile phone under the prompting at mobile phone user interface;
Step 103, sender import the number of receiving terminal mobile phone under the prompting at mobile phone user interface;
Step 104, transmitting terminal are encoded to control short message body, and add the short message head, thereby form the control short message;
Step 105, transmitting terminal send the control short message;
Step 200, receiving terminal mobile phone receive the short message that transmitting terminal sends;
Step 201, receiving terminal mobile phone are judged the type of the short message that receives according to the content of the symbol of the application identity in message header field.If the control short message, then flow process advances to step 203; If common short message, then flow process advances to step 202;
Step 202, receiving terminal mobile phone are done normal demonstration with this short message and are handled;
Step 203, receiving terminal mobile phone take out the control password from control short message body, calculate according to the One-Way Encryption function, draw the identity of the sender authentication code, compare, thereby judge whether the sender is authorized user with the encryption authentication code of longer-term storage in the mobile phone memory; Authorized user is interpreted as knowing with regular approach the people of control password herein, such as the machine master, perhaps by the people of machine master mandate etc.; If the identity of the sender authentication code is identical with the encryption authentication code, then be judged as authorized user, flow process advances to step 205; If the identity of the sender authentication code is different with the encryption authentication code, then be judged as unauthorized user, flow process advances to step 204;
Step 204, receiving terminal mobile phone are abandoned this control short message, and withdraw from;
Step 205, receiving terminal mobile phone are decoded to this control short message, thereby promptly search the control command table and parameter list parses control command and Control Parameter;
Step 206, receiving terminal mobile phone are carried out control command;
Step 207, receiving terminal mobile phone are deleted this control short message, and withdraw from.
Above-mentioned control command, in preferred embodiment of the present invention, can be mobile phone locking, shutdown, mobile phone setting, address list passback, short message passback, mobile phone management or the like, which kind of control command what no matter transmitting terminal sent is, receiving terminal receives all can carry out in step 206 accordingly after this order and operates.Certainly, be easy to expect, control command be not limited only to above-mentioned these, cooperate the development of mobile phone and need, mobile phone manufacturer and Virtual network operator can be developed more mobile phone control command.
Now a lot of users are that a people uses the mobile phone more than two ones even two ones, if the user wishes to control another mobile phone with the mobile phone of oneself, such as watching the telephone number of storing in another mobile phone, then can utilize disclosed method that another mobile phone is carried out Long-distance Control.
If user's mobile phone is lost or is stolen, the user wishes timely locking mobile phone in case personal information is leaked, and then needs method in conjunction with the long-range control method of mobile phone of the present invention and " Mobile Directory Number tracking " to realize jointly losing or the Long-distance Control of stolen mobile phone.Please refer to shown in Figure 5, the method that described Mobile Directory Number is followed the tracks of requires the user to open the function that Mobile Directory Number is followed the tracks of, and in the mobile phone memory, stored Mobile Directory Number information and default receipt number in advance, this mobile phone tracking comprises the steps:
Step 300, unauthorized user are changed the user profile identification card SIM card (then is that PIM card or burn again number is stored in the FLASH card for Personal Handyphone System) of mobile phone, and start;
Step 301, read the Mobile Directory Number information in the SIM/PIM/FLASH card;
Step 302, read in the mobile phone memory Mobile Directory Number information of storage in advance, and compare with the Mobile Directory Number information in the SIM/PIM/FLASH card, if the two is identical, then advance to step 303, if the two difference then advances to step 304;
Step 303, normal boot-strap use;
Step 304, start, and secret the transmission comprised the receipt number of the short message of new Mobile Directory Number information to user preset;
Step 305, deletion short message send record.
The method of being followed the tracks of by above Mobile Directory Number as can be known, after mobile phone is lost or is stolen, if because changed new SIM/PIM card or burning number and changed Mobile Directory Number again, then mobile phone can send secret short message from trend receipt number, so former machine master can learn the number of current mobile phone, and as the destination Mobile Station International ISDN Number that sends the control short message in the long-range control method of mobile phone of the present invention, and then realization is to the Long-distance Control of purpose mobile phone.
The long-range control method of mobile phone of the present invention and network are irrelevant, and the transmission and the reception of control short message realize in terminal that fully so network does not need to make any modification, general mobile network communication agreement is at present abideed by in the transmission of control short message fully; In addition, the control command table among the present invention separates with other modules in the mobile phone with parameter list, only needs expansion control command table and parameter list can expand the kind and the content of control command, does not need to change system configuration; At last, the One-Way Encryption function of being mentioned in the above embodiment of the present invention just will be controlled password and convert a kind of computational methods of encrypting authentication code to, and in other embodiments, this method can adopt other security algorithm.

Claims (12)

1. the long-range control method of a mobile phone comprises:
Step 1: the sender has comprised the control short message of control command the transmitting terminal editor, and sends the control short message to the receiving terminal mobile phone; And
Step 2: the receiving terminal mobile phone receives the control short message, therefrom takes out control command, and carries out control command.
2. the long-range control method of mobile phone as claimed in claim 1, it is characterized in that: step 1 further comprises the sender according to control command table and parameter list selection/input of control commands and Control Parameter, and the number of input receiving terminal mobile phone and control password.
3. the long-range control method of mobile phone as claimed in claim 2, it is characterized in that: comprising the steps: also before the execution in step one that the receiving terminal mobile phone reads the number information on the current mobile phone card, and read the number information of mobile phone storage inside, when the two not simultaneously, form with short message sends current number information on this mobile phone card to the receipt number that the machine master presets, and this number information will send the destination Mobile Station International ISDN Number of control short message as the sender.
4. the long-range control method of mobile phone as claimed in claim 1 or 2 is characterized in that: the control short message described in the step 1 is to be different from common short message by the application identity symbol field of setting in the short message format.
5. the long-range control method of mobile phone as claimed in claim 4 is characterized in that: described setting application identity symbol field is finished by protocol layer before short message sends.
6. as the long-range control method of claim 1 or 3 described mobile phones, it is characterized in that: step 2 also comprises after the receiving terminal mobile phone receives the control short message takes out the control password earlier, and by obtaining the identity of the sender authentication code after the functional operation, compare with the encryption authentication code of mobile phone stored, when the identity of the sender authentication code is identical with the encryption authentication code, just can carry out control command.
7. the long-range control method of mobile phone as claimed in claim 6, it is characterized in that: in the step 2, the receiving terminal mobile phone obtains the identity of the sender authentication code according to the One-Way Encryption functional operation.
8. the long-range control method of mobile phone as claimed in claim 6, it is characterized in that: step 2 comprises that also the receiving terminal mobile phone receives the coding that takes out control command behind the control short message, resolve according to control command table and parameter list, and corresponding handling function is operated the receiving terminal mobile phone in the caller.
9. the long-range control method of mobile phone as claimed in claim 8, it is characterized in that: when described control command was the mobile phone locking, the receiving terminal mobile phone called the mobile phone latch function with the mobile phone locking.
10. the long-range control method of mobile phone as claimed in claim 8 is characterized in that: when described control command was the information passback, receiving terminal mobile phone recalls information passback function returned information to transmitting terminal according to Control Parameter.
11. the long-range control method of mobile phone as claimed in claim 6 is characterized in that: in the step 2, do not show the receiving course of controlling short message and the implementation of control command on the user interface of receiving terminal mobile phone.
12. the long-range control method of mobile phone as claimed in claim 6 is characterized in that: in the step 2, after the execution control command finishes, deletion control short message record.
CN 200510024044 2005-02-24 2005-02-24 A remote control method for mobile telephone Pending CN1665260A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200510024044 CN1665260A (en) 2005-02-24 2005-02-24 A remote control method for mobile telephone

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200510024044 CN1665260A (en) 2005-02-24 2005-02-24 A remote control method for mobile telephone

Publications (1)

Publication Number Publication Date
CN1665260A true CN1665260A (en) 2005-09-07

Family

ID=35036136

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200510024044 Pending CN1665260A (en) 2005-02-24 2005-02-24 A remote control method for mobile telephone

Country Status (1)

Country Link
CN (1) CN1665260A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009079947A1 (en) * 2007-11-21 2009-07-02 Shenzhen Huawei Communication Technologies Co., Ltd. Method and device for controlling mobile terminal
CN101902358A (en) * 2010-07-20 2010-12-01 中兴通讯股份有限公司 Method and device for controlling internet use
CN102065392A (en) * 2010-12-02 2011-05-18 中兴通讯股份有限公司 Communication terminal and short message secret-keeping method thereof
CN101184265B (en) * 2007-12-14 2011-07-13 北京中星微电子有限公司 Method for monitoring stolen mobile terminal and mobile terminal
CN102271315A (en) * 2011-07-26 2011-12-07 深圳市易联盛世科技有限公司 Short message enhancement function realization method and device
CN101296430B (en) * 2007-04-23 2013-06-19 英特尔移动通信有限责任公司 Method for retrieving data, mobile communication terminal and method and server for providing data
CN103428370A (en) * 2013-08-23 2013-12-04 上海华勤通讯技术有限公司 Mobile phone and multi-user control method thereof
CN103559433A (en) * 2013-10-31 2014-02-05 北京奇虎科技有限公司 Mobile terminal antitheft method and device
CN103916408A (en) * 2012-12-31 2014-07-09 比亚迪股份有限公司 Terminal remote control method and system
CN105451201A (en) * 2014-09-29 2016-03-30 展讯通信(天津)有限公司 Mobile terminal, remote control method of mobile terminal, remote control device of mobile terminal and remote control system of mobile terminal
CN105516948A (en) * 2014-09-26 2016-04-20 华为技术有限公司 Device control method and device control unit
CN106778388A (en) * 2015-11-25 2017-05-31 神讯电脑(昆山)有限公司 Communication device and its establishing method
CN109462701A (en) * 2018-12-27 2019-03-12 江苏恒宝智能系统技术有限公司 A kind of mobile communication control method

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101296430B (en) * 2007-04-23 2013-06-19 英特尔移动通信有限责任公司 Method for retrieving data, mobile communication terminal and method and server for providing data
WO2009079947A1 (en) * 2007-11-21 2009-07-02 Shenzhen Huawei Communication Technologies Co., Ltd. Method and device for controlling mobile terminal
CN101184265B (en) * 2007-12-14 2011-07-13 北京中星微电子有限公司 Method for monitoring stolen mobile terminal and mobile terminal
CN101902358A (en) * 2010-07-20 2010-12-01 中兴通讯股份有限公司 Method and device for controlling internet use
CN102065392A (en) * 2010-12-02 2011-05-18 中兴通讯股份有限公司 Communication terminal and short message secret-keeping method thereof
CN102271315B (en) * 2011-07-26 2014-01-22 深圳市易联盛世科技有限公司 Short message enhancement function realization method and device
CN102271315A (en) * 2011-07-26 2011-12-07 深圳市易联盛世科技有限公司 Short message enhancement function realization method and device
CN103916408A (en) * 2012-12-31 2014-07-09 比亚迪股份有限公司 Terminal remote control method and system
CN103428370A (en) * 2013-08-23 2013-12-04 上海华勤通讯技术有限公司 Mobile phone and multi-user control method thereof
CN103559433A (en) * 2013-10-31 2014-02-05 北京奇虎科技有限公司 Mobile terminal antitheft method and device
CN105516948A (en) * 2014-09-26 2016-04-20 华为技术有限公司 Device control method and device control unit
CN105516948B (en) * 2014-09-26 2019-05-10 华为技术有限公司 A kind of apparatus control method and device
CN105451201A (en) * 2014-09-29 2016-03-30 展讯通信(天津)有限公司 Mobile terminal, remote control method of mobile terminal, remote control device of mobile terminal and remote control system of mobile terminal
CN106778388A (en) * 2015-11-25 2017-05-31 神讯电脑(昆山)有限公司 Communication device and its establishing method
CN109462701A (en) * 2018-12-27 2019-03-12 江苏恒宝智能系统技术有限公司 A kind of mobile communication control method

Similar Documents

Publication Publication Date Title
CN1665260A (en) A remote control method for mobile telephone
CN101141721B (en) Safety mobile telephone based communication custom
CN101252703B (en) Terminal data protecting method, system as well as mobile communication terminal
CN101141722B (en) Safety mobile telephone based on user vocal feature and implementing method thereof
CN1285235C (en) Method and system of preventing handset from theft by using international id code of mobile facilities
CN101184265B (en) Method for monitoring stolen mobile terminal and mobile terminal
WO2011153748A1 (en) Method and apparatus for communicating using spurious contact information
CN101960738A (en) Method and system of providing personal information control service for mobile communication terminal
CN102065392A (en) Communication terminal and short message secret-keeping method thereof
CN1533207A (en) Method for delocking mobile phone radio communication terminal
CN1794844A (en) Method of realizing autometic hidden picture taking and transmitting color message for illegal using mobile phone
CN101742731A (en) Method and device for sharing user identification card
CN1859677A (en) Method for protecting information safety in mobile terminal
CN1941958A (en) Method for automatically destroying cell phone and cell phone thereof
CN1606326A (en) Security management method for mobile phone
CN1968539A (en) Encrypted information processing method and terminal
CN1469675A (en) Method of bundling mobile communication terminal and subscriber identifying module
CN101872420A (en) Encrypted writing signing mobile terminal
CN101257358B (en) Method and system for updating user cipher key
CN101415186A (en) Method for security protection of mobile phone information
CN100571436C (en) A kind of implementation method of mobile terminal information resource safety guarantee
CN101895829A (en) Method and system for retrieving FLASH data from mobile telephone, and mobile telephone
TWI502951B (en) Antitheft devices and methods for use in mobile communication terminal equipment
CN105554578B (en) Plug and play equipment activation method and system thereof
CN103595855B (en) Business card system for mobile phone

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication