WO2013107395A1 - 手机防盗保护方法及装置 - Google Patents
手机防盗保护方法及装置 Download PDFInfo
- Publication number
- WO2013107395A1 WO2013107395A1 PCT/CN2013/070717 CN2013070717W WO2013107395A1 WO 2013107395 A1 WO2013107395 A1 WO 2013107395A1 CN 2013070717 W CN2013070717 W CN 2013070717W WO 2013107395 A1 WO2013107395 A1 WO 2013107395A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- theft
- mobile phone
- instruction
- command
- theft protection
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/183—Processing at user equipment or user record carrier
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
- H04W12/082—Access security using revocation of authorisation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/126—Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/22—Processing or transfer of terminal data, e.g. status or physical capabilities
- H04W8/24—Transfer of terminal data
- H04W8/245—Transfer of terminal data from a network towards a terminal
Definitions
- the present invention relates to the field of information processing technologies, and in particular, to a mobile phone anti-theft protection method and device. Background technique
- the prior art provides a mobile phone anti-theft protection method.
- the user realizes that the mobile phone is stolen or lost, the user sends an anti-theft protection command to the stolen mobile phone, and the stolen mobile phone receives and executes the anti-theft protection command to achieve the purpose of the mobile phone anti-theft protection.
- the user can send the anti-theft protection command to the stolen mobile phone in the form of short message, such as sending the message "open anti-theft mode", "display mandatory information”, "delete SMS" to the stolen mobile phone, correspondingly, the stolen mobile phone performs the opening Anti-theft mode, display mandatory information, and delete SMS actions.
- the embodiment of the invention provides a mobile phone anti-theft protection method and device.
- the technical solution is as follows:
- the embodiment of the present invention provides a mobile phone theft protection method, where the method includes:
- the determining whether the mobile phone meets the preset anti-theft mode activation condition includes: Determining whether the current user data matches the pre-stored user data, if not, prompting the user to input an anti-theft command, and determining whether the user is legal according to the anti-theft command input by the current user, and if not, satisfying the anti-theft mode start condition ;
- the starting the anti-theft mode specifically includes:
- the method further includes:
- the method further includes:
- the anti-theft protection information includes an anti-theft protection command and a transmission form of the instruction, and the designated contact performs anti-theft processing on the mobile phone, specifically:
- the anti-theft protection information includes a website, and the website corresponding to the website is used to save the anti-theft protection instruction and the transmission form of the instruction, and the designated contact performs anti-theft processing on the mobile phone, specifically including
- the anti-theft protection instruction specifically includes:
- the embodiment of the present invention further provides a mobile phone anti-theft protection device, where the device includes:
- a judging module configured to determine whether the mobile phone meets a preset anti-theft mode activation condition
- a startup module configured to start an anti-theft mode when the judgment result of the determining module is that the anti-theft mode startup condition is met
- a sending module configured to send the anti-theft protection information to the designated contact after the startup module starts the anti-theft mode, Notifying the designated contact to perform anti-theft processing on the mobile phone.
- the determining module specifically includes:
- a first determining unit configured to determine whether the current user data matches the pre-stored user data
- a prompting unit when the determining result of the first determining unit is that the current user data does not match the pre-stored user data, prompting the user to input an anti-theft instruction
- a second determining unit configured to determine, according to an anti-theft command input by the current user, whether the user is legal, and if not, satisfy the anti-theft mode starting condition
- the third determining unit is configured to determine whether the remote anti-theft mode open command is received, and if received, satisfy the anti-theft mode start condition.
- the startup module is specifically configured to perform a locking operation on the mobile phone when the determination result of the determining module is that the anti-theft mode activation condition is met, so that the current mobile phone user cannot operate the mobile phone.
- the device further includes:
- the anti-theft mode exiting module is configured to: after the startup module starts the anti-theft mode, obtain an unlocking instruction input by the current user, determine whether the unlocking instruction is correct, and if correct, exit the anti-theft mode;
- the startup module starts the anti-theft mode, receiving a remote unlocking instruction, and exiting the anti-theft mode according to the remote unlocking instruction.
- the device further includes:
- the first instruction execution module is configured to execute a preset anti-theft protection command after the startup module starts the anti-theft mode.
- the anti-theft protection information includes an anti-theft protection instruction and a transmission form of the instruction
- the device further includes: a second instruction execution module, configured to: in the transmission form of the designated contact, the anti-theft protection instruction When the mobile phone is sent to the mobile phone, the anti-theft protection command is received, and the received anti-theft protection command is automatically executed.
- the anti-theft protection information includes a web address, and the website corresponding to the website is used to save the anti-theft protection command and the instruction.
- the device further includes:
- a second instruction execution module configured to receive the anti-theft protection command when the designated contact sends the anti-theft protection command to the mobile phone according to the sending form of the instruction saved in the website corresponding to the web address, The received theft protection command is automatically executed.
- the anti-theft protection instruction specifically includes:
- the anti-theft protection information is sent to the designated contact to notify the designated contact to perform anti-theft processing on the mobile phone, so that the designated contact does not miss the anti-theft opportunity, which is beneficial for recovering the stolen mobile phone and can be effective. Reduce the leakage of user private information.
- FIG. 1 is a flowchart of a method for protecting an antitheft device of a mobile phone according to Embodiment 1 of the present invention
- FIG. 2 is a flowchart of a method for protecting an antitheft device of a mobile phone according to Embodiment 2 of the present invention
- FIG. 3 is a schematic diagram of a built-in content forcible display screen in the second embodiment of the present invention.
- FIG. 4 is a schematic diagram of a remote content forcible display screen in Embodiment 2 of the present invention.
- FIG. 5 is a schematic structural diagram of a mobile phone anti-theft protection device according to Embodiment 3 of the present invention.
- FIG. 6 is a schematic structural diagram of a mobile phone anti-theft protection device according to Embodiment 4 of the present invention. detailed description
- This embodiment provides a mobile phone anti-theft protection method. Referring to FIG. 1, the method is as follows:
- the anti-theft protection information includes an anti-theft protection instruction and a transmission form and/or a web address of the instruction, and the website corresponding to the website is used to save the anti-theft protection instruction and the transmission form of the instruction.
- Embodiment 2 This embodiment provides a mobile phone anti-theft protection method. Referring to FIG. 2, the process of the method provided in this embodiment is specifically as follows: 201: Determine whether the mobile phone meets the preset anti-theft mode activation condition, and if not, activate the anti-theft mode.
- the anti-theft mode before the anti-theft mode is activated, it is determined whether the anti-theft mode is activated according to the preset anti-theft mode activation condition.
- the following two methods may be used to determine whether to activate the anti-theft mode, but it is not limited by the present invention.
- the first manner it is determined whether the current user data matches the pre-stored user data. If the matching, the normal mode is started. If the matching does not match, the user is prompted to input an anti-theft command, and according to the anti-theft command input by the current user, whether the current user is legal, if legal, , the normal mode is started, and if it is not legal, the anti-theft mode start condition is met, and the anti-theft mode is started.
- the user data and the anti-theft command are preset in the mobile phone and stored in the mobile phone.
- the user data may be a mobile phone identification number, including a mobile phone number, a SIM (Subscriber Identity Module) card number, or a UIM (User Identity). Module, User Identification Module) Card number, IMSI (International Mobile Subscriber Identification Number) and other data identifying the identity of the user.
- SIM Subscriber Identity Module
- UIM User Identity
- IMSI International Mobile Subscriber Identification Number
- the user can also set other user data.
- the mobile phone number in the SIM or UIM card and the mobile phone number saved by the mobile phone are read, and it is determined whether the mobile phone number in the read SIM or UIM card is consistent with the mobile phone number saved by the mobile phone, and if they are consistent, Start normal mode, if it is inconsistent, the phone locks and prompts the user to enter the anti-theft password;
- Obtain the anti-theft password entered by the current user determine whether the anti-theft password entered by the current user is the same as the anti-theft password stored on the mobile phone, if the same, start the normal mode, If the current user enters an anti-theft password within a predetermined time or a predetermined number of times different from the anti-theft password stored on the mobile phone, the anti-theft mode is activated.
- the second mode it is determined whether the remote anti-theft mode activation command is received. If it is received, the anti-theft mode activation condition is met, and the anti-theft mode is started according to the received remote anti-theft mode activation command.
- the remote anti-theft mode open command is actively sent to the stolen mobile phone. Accordingly, if the stolen mobile phone receives the remote anti-theft mode open command, the anti-theft mode start condition is satisfied, according to The remote anti-theft mode on command turns on the anti-theft mode.
- the user sends a remote anti-theft mode open command to the stolen mobile phone in the form of a short message.
- a remote anti-theft mode open command For example, if the content is "X X X X, the anti-theft mode is turned on" to the stolen mobile phone, where X X X X indicates the anti-theft password.
- the stolen mobile phone receives a text message with the content "X X X X Turns on the anti-theft mode"
- the anti-theft mode is turned on.
- the initiating anti-theft mode in this step specifically includes: performing a locking operation on the mobile phone, so that the current mobile phone user cannot operate the mobile phone.
- the method further includes: executing a preset anti-theft protection command.
- the preset anti-theft protection command includes a built-in content forced display instruction, a remote content forced display instruction, an upload user location information instruction, a replacement SIM card sending a short message instruction to the port, an automatic receiving incoming call instruction, an automatic front camera shooting instruction, and One or more of the specified data instructions are deleted/backed up, but are not intended to be limiting of the invention.
- the original mobile phone pre-sets the built-in content forcibly displaying the command and sets the content forcibly displayed, and accordingly, executes the built-in content forcible display instruction, such as displaying the forcibly displayed content on the screen of the locked mobile phone.
- the anti-theft protection information is used to enable the designated contact to send the anti-theft protection command to the stolen mobile phone according to the anti-theft protection information, specifically including the anti-theft protection instruction and the sending form and/or the website address of the instruction, wherein the website corresponding to the website uses In the form of sending the anti-theft protection command and the instruction, the website is automatically saved in the mobile phone when the original owner of the mobile phone is pre-stored in the mobile phone or when the anti-theft protection software is installed.
- the sending form of the anti-theft protection command and the instruction may enable the designated contact to send the anti-theft protection command to the stolen mobile phone according to the sending form of the instruction.
- the anti-theft protection information may also include other information, such as a specific description of each anti-theft protection instruction, a login account and password of the website corresponding to the website address, a current mobile phone number, a pre-set anti-theft protection command, and specific parameters or designated contacts.
- the designated contact may be one or more contacts, which may be the original of the stolen mobile phone or other contacts, and the contact may correspond to multiple contact methods, including a mobile phone number and/or a mailbox, etc.
- the stolen mobile phone sends the anti-theft protection information to the mobile phone number and/or mailbox corresponding to the designated contact.
- the anti-theft protection command includes a built-in content forced display instruction, a remote content forced display instruction, an upload user location information command, a replacement SIM card to send a short message to the port, an automatic call incoming command, an automatic front camera shooting command, and a delete/backup designation.
- One or more of the data instructions may also include other instructions.
- the anti-theft protection information is used as an anti-theft protection command and a transmission form of the instruction is taken as an example for description. If the mobile phone locally stores the anti-theft protection instruction list and the transmission form of the instruction in various situations, correspondingly, the anti-theft protection instruction can be obtained from the locally stored anti-theft protection instruction list, and the transmission form of the instruction in each case is obtained at the same time.
- the antitheft protection information is generated according to the obtained anti-theft protection instruction and the transmission form of the instruction in each case; or the instruction corresponding to the communication mode is obtained from the transmission form of the instruction in each case according to the currently available communication mode of the stolen mobile phone;
- the transmission form generates the theft protection information according to the obtained anti-theft protection command and the transmission form of the instruction corresponding to the currently available communication mode.
- the instruction transmission mode corresponding to the communication mode corresponding to the communication mode is generated, and the anti-theft protection information is generated according to the obtained anti-theft protection instruction and the generated form of the generated instruction.
- Table 1 is a list of anti-theft protection commands saved locally by the mobile phone, and the list includes the serial number of the instruction, the anti-theft protection instruction, and the instruction corresponding to the instruction.
- the anti-theft protection instruction list may also include other information, such as instructions in various situations. Send form, etc. Table 1
- a transmission form according to the currently available communication mode of the mobile phone and the instruction identification mode generation instruction corresponding to the communication mode is taken as an example for description.
- the communication mode currently available to the mobile phone is queried, and the transmission form of the instruction is generated according to the communication mode currently available to the mobile phone in combination with the instruction recognition mode corresponding to the communication mode.
- the mobile phone uses the form of short message communication, the mobile phone can randomly generate a verification code, save the verification code locally, and send the anti-theft protection command, the verification code, the current mobile phone number and the verification code usage instructions together as a short message. Specify a contact.
- the mobile phone after the mobile phone starts the anti-theft mode, it can query the wireless communication mode (such as sending and receiving short messages), and the generated content is "1.
- the built-in content is forced to display, 2.
- the remote content is forced to display, 3.
- the user location information is uploaded, 4.
- the SIM is replaced.
- the first part of the content of the SMS is the anti-theft protection command, and the latter part is the transmission form of the instruction.
- the anti-theft protection information is sent to the designated contact through one or more of the current communication methods. If the wireless channel is available, the anti-theft protection information is sent to the designated contact as a short message, such as to the specified mobile phone number; if the data channel is available, if the wifi hotspot is detected, the anti-theft protection information is sent to the email form to Specify the contact. Of course, if multiple communication methods are available, you can also try each available communication method to send the anti-theft protection information to the specified contact in turn, ensuring that the user can quickly receive the theft protection information and promptly access the stolen mobile phone. Take control.
- the embodiment of the present invention can send the anti-theft protection information to the designated contact at a predetermined time or a predetermined time interval, in addition to sending the anti-theft protection information to the designated contact immediately after the anti-theft mode is activated, so as to ensure that the user can receive the anti-theft protection information.
- the anti-theft protection information includes the theft protection means
- the transmission form and/or the website address of the instruction and the instruction the designated contact can send the anti-theft protection instruction according to the transmission form of the instruction, so that the relatively cumbersome anti-theft protection instruction does not need to be memorized, the operation is convenient, and the user experience is improved at the same time.
- the designated contact sends an anti-theft protection command to the mobile phone, and when the mobile phone receives the anti-theft protection command, automatically executes the received anti-theft protection command.
- the anti-theft protection command may be an anti-theft protection command sent by the user in various forms, such as an anti-theft protection instruction sent by a short message, an anti-theft protection instruction sent in the form of an email, and the like.
- the anti-theft mode After the anti-theft mode is activated, it can also obtain all external communication rights such as SMS, call, data network, etc., so that the pirate can not use the mobile phone and ensure that the stolen mobile phone can receive the anti-theft protection command sent by the user.
- the anti-theft protection command can be sent through the Internet to provide the end user with a webpage of the login server, and the terminal user can query the user data recorded on the server (such as mobile phone number, SIM card number or UIM card number, IMSI, IMEI (International Mobile Equipment Identity), such as the data identifying the user's identity, or the operating status of the mobile phone corresponding to the user data, and sending an anti-theft protection command to the mobile phone indicated by the user data according to the user data, the anti-theft protection command may
- the anti-theft protection command that has been edited is stored on the webpage, so that the user does not need to edit when sending the instruction to the lost mobile phone, and directly selects the anti-theft protection instruction that needs to be sent.
- the anti-theft protection instruction includes any one of the following instructions or a plurality of: an instruction to delete data in the mobile phone, an instruction to lock the mobile phone, an instruction to locate the mobile phone, and an instruction to retrieve the mobile phone password.
- the anti-theft protection command may also be performed by the user according to user data in real time. edit
- the mobile phone user when the mobile phone user finds that the mobile phone is lost, the mobile phone user logs in to the server through the personal account, and checks the running status of the mobile phone that is bound to the IMEI number, and according to the running status of the mobile phone, whether the mobile phone has been inserted into the new SIM number. And check the current SIM number of the lost phone obtained by the server. If the user finds that the running status of the mobile phone is lost, perform the operation on the web page, select the anti-theft protection command to be sent, and input the current SIM number of the lost mobile phone to generate the anti-theft protection command issued to the current SIM number of the mobile phone.
- the server And triggering the server to send the anti-theft protection command to the mobile phone, so that the mobile phone performs a corresponding operation according to the anti-theft protection instruction.
- the anti-theft protection command is sent to the lost mobile phone in the form of a short message.
- the designated contact may send the anti-theft protection instruction to the stolen mobile phone according to the anti-theft protection information according to the transmission form of the instruction, correspondingly, when When the stolen mobile phone receives the anti-theft protection command, it automatically executes the received anti-theft protection command.
- the anti-theft protection information includes the foregoing web address
- the designated contact may send the anti-theft protection command to the stolen mobile phone according to the sending form of the instruction stored in the website corresponding to the web address, and accordingly, when the stolen mobile phone receives the anti-theft protection When received, the received anti-theft protection command is automatically executed.
- the designated security After the designated contact receives the anti-theft protection information by means of a short message or an email, the designated security
- the content of the protection information is sent in the form of the anti-theft protection command and the instruction or the form of the anti-theft protection instruction and the instruction is obtained according to the website in the anti-theft protection information, and then the anti-theft protection is sent in the form of the instruction in the anti-theft protection information. instruction.
- the designated contact can send the anti-theft protection command to the stolen mobile phone in the form of the instruction in the anti-theft protection information on the current mobile phone or other mobile phone.
- the designated contact receives the short message in step 202, the designated contact wants the mobile phone to execute the built-in content forced display instruction, the remote content forced display instruction, and the delete/backup specified data instruction, then the designated contact can send or directly reply the content as "XXX +1+2+7" text message to number 123456789, of course, the designated contact can also send or directly reply to the message "XXX + built-in content forced display + remote content forced display + delete / backup specified data" The number is 123456789, where XXX is the verification code.
- the designated mobile phone transmits the anti-theft protection instruction in the anti-theft protection information according to the transmission form of the instruction in the anti-theft protection information, and the stolen mobile phone is stolen. It can receive and identify the anti-theft protection command sent by the specified contact, and execute the received anti-theft protection command.
- the content of the short message is identified, and it is determined whether the short message content starts with the specified verification code, and if so, the short message
- the content is parsed, and the instructions in the short message are obtained and executed, that is, the built-in content forced display instruction, the remote content forced display instruction, and the delete/backup specified data instruction are executed, wherein XXX is a verification code.
- each anti-theft protection command corresponding to each anti-theft protection command in step 202.
- the preset specified information is displayed on the screen, for example, the message and the user's contact information can be displayed, and the forced display content can be set according to the user's request, as shown in FIG.
- the anti-theft password input box and the specified information are displayed on the screen of the locked mobile phone.
- the specified information is "Big, I am the owner of the machine! To call the mobile phone, please call the mobile phone: 13800138000".
- the remote content forced display instruction correspondingly, the text, the short message, and the like sent by the specified information sending end are received, and the content is forcibly displayed on the mobile phone screen, as shown in FIG. 4, on the locked mobile phone screen.
- the anti-theft password input box and the information sent from the specified information sender are displayed.
- the message is "Please return the phone as soon as possible! To call the phone, please call 13800138000", where the specified message sender can be pre-designated or by the corresponding
- the instruction specifies either the specified contact or the sender of the current instruction.
- the uploading user location information instruction is received, correspondingly, the current location information is obtained, and the location information is sent to the specified location information receiving end, where the current GPS device or module of the mobile phone itself can be obtained.
- Location information or obtain location information such as wifi hotspot or base station number through the API of the mobile phone, where The specified location information receiving end may be specified in advance or specified by a corresponding instruction or a designated contact or a transmitting end of the current instruction.
- the replacement SIM card is sent to the port to send a short message instruction, accordingly, whether the mobile phone replaces the SIM or UIM card is detected, and if yes, the mobile phone number corresponding to the current SIM or UIM is obtained, and the mobile phone number is sent to the designated mobile phone number.
- the number information receiving end wherein the designated number information receiving end can be specified in advance or specified by a corresponding instruction or is a designated contact or a transmitting end of the current instruction.
- the mobile phone number can be used to query the operator for information about the current user of the mobile phone.
- an automatic front camera shooting instruction correspondingly, detecting whether there is a front camera, if yes, turning on the front camera to acquire imaging information (such as the current user's facial information), and transmitting the captured imaging information Give the specified camera information receiving end.
- the non-front camera can be controlled to obtain surrounding environmental information.
- the designated camera information receiving end may be specified in advance or specified by a corresponding instruction or a designated contact or a sending end of the current instruction.
- the user can also set a predetermined time and a predetermined time interval to take a photo. In this way, the stolen mobile phone can be retrieved by the camera information.
- the specified data is deleted and/or the specified data is sent to the specified server backup.
- the address book data and the short message data are deleted, and the address book data is sent to the specified server, wherein the content to be backed up and the specified server can be specified in advance or specified by corresponding instructions.
- the website address in the anti-theft protection information in step 202 may also include a website address of a website for controlling the mobile phone, and correspondingly, the user may log in to the corresponding website to implement control of the mobile phone, as in step 203,
- the stolen mobile phone can receive the anti-theft protection command sent by the specified website and execute the received anti-theft protection command.
- the anti-theft mode can be exited in the following two ways:
- the unlock command input by the current user is obtained, and it is determined whether the unlock command input by the current user is correct. If it is correct, the anti-theft mode is exited, and if not, the anti-theft mode is maintained. Specifically, after the mobile phone starts the anti-theft mode, the user is prompted to input an unlocking instruction, and the unlocking instruction input by the current user after seeing the prompt is obtained, and it is determined whether the unlocking instruction input by the current user is the same as the unlocking instruction saved by the mobile phone, and if the same, the security is quit. Mode; if not the same, keep the theft mode.
- the remote unlocking command is received, and the anti-theft mode is exited according to the received remote unlocking command. If you receive a text message with the content "XXXX Exit Anti-theft Mode", exit the anti-theft mode, where xxxx indicates the anti-theft password.
- the user data may be updated or the user may be required to reset the user data. If the user data is the mobile phone number, the preset mobile phone number is updated to the current mobile phone number.
- the method provided by the embodiment after the anti-theft mode is activated, sends the anti-theft protection information to the designated contact, to notify the designated contact to perform anti-theft processing on the mobile phone, so that the designated contact does not miss the anti-theft opportunity, which is beneficial for retrieving.
- the stolen mobile phone can effectively reduce the leakage of user private information.
- the embodiment provides a mobile phone anti-theft protection device, which is used to perform the mobile phone anti-theft protection method of the first embodiment.
- the mobile phone anti-theft protection device includes:
- the determining module 401 is configured to determine whether the mobile phone meets a preset anti-theft mode activation condition
- the startup module 402 is configured to start the anti-theft mode when the determination result of the determination module 401 is that the preset anti-theft mode activation condition is met;
- the sending module 403 is configured to start the anti-theft mode, and send the anti-theft protection information to the designated contact to notify the designated contact to perform anti-theft processing on the mobile phone.
- the mobile phone anti-theft protection device After the anti-theft mode is activated, the mobile phone anti-theft protection device provided by the embodiment sends the anti-theft protection information to the designated contact to notify the designated contact to perform anti-theft processing on the mobile phone, so that the designated contact does not miss the anti-theft opportunity. It is good for retrieving stolen mobile phones and effectively reducing the leakage of user private information.
- Embodiment 4
- the embodiment provides a mobile phone anti-theft protection device, which is used to perform the mobile phone anti-theft protection method of the second embodiment.
- the mobile phone anti-theft protection device includes:
- the determining module 501 is configured to determine whether the mobile phone meets a preset anti-theft mode activation condition
- the startup module 502 is configured to start the anti-theft mode when the determination result of the determination module 501 is that the preset anti-theft mode activation condition is met;
- the sending module 503 is configured to send the anti-theft protection information to the designated contact after the activation module 502 starts the anti-theft mode, to notify the designated contact to perform anti-theft processing on the mobile phone.
- the determining module 501 specifically includes:
- a first determining unit configured to determine whether the current user data matches the pre-stored user data
- the prompting unit when the judgment result of the first determining unit is that the current user data does not match the pre-stored user data, prompting the user to input an anti-theft instruction;
- a second determining unit configured to determine, according to an anti-theft command input by the current user, whether the current user is legal, if not The law satisfies the preset anti-theft mode activation condition
- the third determining unit is configured to determine whether the remote anti-theft mode open command is received, and if received, the preset steal mode start condition is met.
- the startup module 502 is specifically configured to perform a locking operation on the stolen mobile phone when the determination result of the determination module 501 is that the preset anti-theft mode activation condition is met, so that the current mobile phone user cannot operate the mobile phone.
- the device further comprises:
- the anti-theft mode exiting module 504 is configured to: after the startup module 502 starts the anti-theft mode, obtain an unlocking instruction input by the current user, determine whether the unlocking instruction is correct, and if correct, exit the anti-theft mode;
- the startup module 502 starts the anti-theft mode
- the remote unlocking command is received, and the anti-theft mode is exited according to the remote unlocking command.
- the device further comprises:
- the first instruction execution module 505 is configured to execute the preset anti-theft protection command after the startup module 502 starts the anti-theft mode.
- the anti-theft protection information includes an anti-theft protection command and a transmission form of the instruction
- the device further includes: a second instruction execution module 506, configured to: send the anti-theft protection instruction to the stolen mobile phone according to the sending form of the instruction When the anti-theft protection command is received, the received anti-theft protection command is automatically executed.
- the anti-theft protection information includes a web address
- the website corresponding to the web address is used to save the anti-theft protection instruction and the sending form of the instruction
- the device further includes:
- the second instruction execution module 506 is configured to: when the contact sends the anti-theft protection command to the stolen mobile phone according to the sending form of the instruction stored in the website corresponding to the web address, receive the anti-theft protection command, and automatically execute the received anti-theft protection instruction.
- the anti-theft protection instruction specifically includes:
- the mobile phone anti-theft protection device provided by the embodiment sends the anti-theft protection information to the designated contact to notify the designated contact to perform anti-theft processing on the mobile phone, so that the designated contact does not miss the anti-theft opportunity. It is good for retrieving stolen mobile phones and effectively reducing the leakage of user private information.
- the mobile phone anti-theft protection device provided in the above embodiment is only illustrated by the division of the above functional modules. In actual applications, the function distribution may be completed by different functional modules as needed. The internal structure of the device is divided into different functional modules to perform all or part of the functions described above.
- the embodiment of the mobile phone anti-theft protection device and the mobile phone anti-theft protection method in the above embodiments are in the same concept, and the specific implementation process is described in detail in the method embodiment, and details are not described herein again.
- a person skilled in the art may understand that all or part of the steps of implementing the above embodiments may be completed by hardware, or may be instructed by a program to execute related hardware, and the program may be stored in a computer readable storage medium.
- the storage medium mentioned may be a read only memory, a magnetic disk or an optical disk or the like. The above is only the preferred embodiment of the present invention, and is not intended to limit the present invention.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
Claims
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SG11201404008YA SG11201404008YA (en) | 2012-01-19 | 2013-01-18 | Anti-theft protection method and device for cellular phone |
EP13738538.1A EP2806666A4 (en) | 2012-01-19 | 2013-01-18 | METHOD AND DEVICE FOR SECURING MOBILE TELEPHONE SECURITY |
JP2014552502A JP5893169B2 (ja) | 2012-01-19 | 2013-01-18 | 携帯電話のための盗難防止保護方法およびデバイス |
IN6215DEN2014 IN2014DN06215A (zh) | 2012-01-19 | 2013-01-18 | |
US14/332,718 US9723482B2 (en) | 2012-01-19 | 2014-07-16 | Anti-theft protection method and device for cellular phone |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012100176067A CN103220637A (zh) | 2012-01-19 | 2012-01-19 | 手机防盗保护方法及装置 |
CN201210017606.7 | 2012-01-19 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/332,718 Continuation US9723482B2 (en) | 2012-01-19 | 2014-07-16 | Anti-theft protection method and device for cellular phone |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2013107395A1 true WO2013107395A1 (zh) | 2013-07-25 |
Family
ID=48798655
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2013/070717 WO2013107395A1 (zh) | 2012-01-19 | 2013-01-18 | 手机防盗保护方法及装置 |
Country Status (7)
Country | Link |
---|---|
US (1) | US9723482B2 (zh) |
EP (1) | EP2806666A4 (zh) |
JP (1) | JP5893169B2 (zh) |
CN (1) | CN103220637A (zh) |
IN (1) | IN2014DN06215A (zh) |
SG (1) | SG11201404008YA (zh) |
WO (1) | WO2013107395A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103581444A (zh) * | 2013-11-21 | 2014-02-12 | 北京网秦天下科技有限公司 | 手机和手机安全系统以及相应的方法 |
Families Citing this family (54)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9959539B2 (en) | 2012-06-29 | 2018-05-01 | Apple Inc. | Continual authorization for secured functions |
US10212158B2 (en) | 2012-06-29 | 2019-02-19 | Apple Inc. | Automatic association of authentication credentials with biometrics |
US9344885B2 (en) * | 2013-03-14 | 2016-05-17 | Intel Deutschland Gmbh | Communication devices and cellular wide area radio base station |
CN103442124B (zh) * | 2013-08-01 | 2016-05-04 | 宇龙计算机通信科技(深圳)有限公司 | 一种分体式移动终端及其防盗方法及系统 |
US10331866B2 (en) | 2013-09-06 | 2019-06-25 | Apple Inc. | User verification for changing a setting of an electronic device |
US20150073998A1 (en) | 2013-09-09 | 2015-03-12 | Apple Inc. | Use of a Biometric Image in Online Commerce |
CN103699860A (zh) * | 2013-12-13 | 2014-04-02 | 北京奇虎科技有限公司 | 终端防盗方法及设备 |
US20150220931A1 (en) | 2014-01-31 | 2015-08-06 | Apple Inc. | Use of a Biometric Image for Authorization |
CN103841264A (zh) * | 2014-02-19 | 2014-06-04 | 小米科技有限责任公司 | 一种保护终端设备的方法、装置及终端设备 |
US9721454B2 (en) | 2014-02-19 | 2017-08-01 | Xiaomi Inc. | Method for protecting terminal devices and the terminal device thereof |
US9747432B1 (en) * | 2014-04-02 | 2017-08-29 | Sprint Communications Company, L.P. | Remotely enabling a disabled user interface of a wireless communication device |
CN105323219B (zh) * | 2014-07-01 | 2020-06-16 | 腾讯科技(深圳)有限公司 | 验证用户帐号身份信息的方法及装置 |
WO2016018040A1 (en) * | 2014-07-31 | 2016-02-04 | Samsung Electronics Co., Ltd. | A terminal and a method of controlling the same |
CN104378500B (zh) * | 2014-10-16 | 2016-11-23 | 深圳天珑无线科技有限公司 | 防盗手机、基于该防盗手机的防盗方法以及防盗系统 |
CN105611495A (zh) * | 2014-11-25 | 2016-05-25 | 镇江金软计算机科技有限责任公司 | 一种基于位置定位的手机防盗系统 |
CN104462929B (zh) * | 2014-11-27 | 2017-07-04 | 广东欧珀移动通信有限公司 | 一种移动设备的隐私保护方法及装置 |
CN104601820A (zh) * | 2015-01-29 | 2015-05-06 | 成都三零瑞通移动通信有限公司 | 一种基于tf密码卡的手机终端信息保护方法 |
CN105992121A (zh) * | 2015-02-03 | 2016-10-05 | 中兴通讯股份有限公司 | 一种建立防盗对话的方法及装置 |
WO2016129863A1 (en) | 2015-02-12 | 2016-08-18 | Samsung Electronics Co., Ltd. | Payment processing method and electronic device supporting the same |
CN105989267B (zh) * | 2015-02-16 | 2021-02-02 | 中兴通讯股份有限公司 | 一种基于声纹识别的安全防护方法和装置 |
US11107047B2 (en) | 2015-02-27 | 2021-08-31 | Samsung Electronics Co., Ltd. | Electronic device providing electronic payment function and operating method thereof |
KR102460459B1 (ko) | 2015-02-27 | 2022-10-28 | 삼성전자주식회사 | 전자 장치를 이용한 카드 서비스 방법 및 장치 |
KR20160105346A (ko) * | 2015-02-27 | 2016-09-06 | 삼성전자주식회사 | 결제 기능 제어 방법 및 그 장치 |
US9565169B2 (en) | 2015-03-30 | 2017-02-07 | Microsoft Technology Licensing, Llc | Device theft protection associating a device identifier and a user identifier |
CN104902448B (zh) * | 2015-04-15 | 2016-05-25 | 努比亚技术有限公司 | 追踪移动终端的方法及系统 |
CN104902080B (zh) * | 2015-04-30 | 2019-04-09 | Oppo广东移动通信有限公司 | 一种信息交互方法和设备 |
US10278066B2 (en) * | 2015-05-04 | 2019-04-30 | Lg Electronics Inc. | Method and apparatus for displaying identification of lost device for anti-theft operations |
CN106470269A (zh) * | 2015-08-20 | 2017-03-01 | 腾讯科技(深圳)有限公司 | 一种手机防盗的方法和装置 |
CN105162976B (zh) * | 2015-08-24 | 2019-03-05 | 努比亚技术有限公司 | 移动终端及其防盗处理方法 |
CN105282326A (zh) * | 2015-09-14 | 2016-01-27 | 联想(北京)有限公司 | 一种控制方法、电子设备及电子装置 |
CN105827810B (zh) * | 2015-10-20 | 2019-09-24 | 南京步步高通信科技有限公司 | 一种基于声纹识别的通信终端寻回方法及通信终端 |
CN105491235B (zh) * | 2015-12-01 | 2019-11-26 | Tcl移动通信科技(宁波)有限公司 | 一种手机基于手势和动作识别的报警方法及其系统 |
CN105516500B (zh) * | 2015-12-14 | 2019-02-19 | 广东小天才科技有限公司 | 一种选择设备模式的方法及系统 |
CN105611072B (zh) * | 2016-02-24 | 2019-04-23 | Oppo广东移动通信有限公司 | 一种移动终端被盗保护装置、移动终端及被盗保护方法 |
CN105592230B (zh) * | 2016-02-24 | 2019-08-02 | Oppo广东移动通信有限公司 | 一种移动终端被盗保护装置、移动终端及被盗保护方法 |
CN106097628A (zh) * | 2016-06-15 | 2016-11-09 | 珠海市魅族科技有限公司 | 一种防盗保护方法及设备 |
KR20170143431A (ko) | 2016-06-21 | 2017-12-29 | 최명수 | 협력 기반의 상호 감시를 통해 중요 휴대 물품의 도난 및 분실을 방지하기 위한 시스템 및 방법 |
JP6437974B2 (ja) * | 2016-09-13 | 2018-12-12 | ソフトバンク株式会社 | 認証サーバ、認証方法、制御プログラム、及び認証システム |
CN106506843A (zh) * | 2016-11-22 | 2017-03-15 | 奇酷互联网络科技(深圳)有限公司 | 一种防盗方法和移动终端 |
CN106843729A (zh) * | 2017-01-20 | 2017-06-13 | 宇龙计算机通信科技(深圳)有限公司 | 一种终端操控方法及终端 |
CN107169384A (zh) * | 2017-05-15 | 2017-09-15 | 上海与德科技有限公司 | 一种基于移动终端的保护方法及系统 |
CN107241714B (zh) * | 2017-06-01 | 2020-12-08 | 珠海市魅族科技有限公司 | 一种建立通信的方法、装置及存储介质 |
CN107343088B (zh) * | 2017-06-21 | 2020-09-22 | 深圳传音通讯有限公司 | 移动终端的信息保护方法及移动终端 |
CN107172602B (zh) * | 2017-06-27 | 2021-08-10 | 上海展扬通信技术有限公司 | 移动终端的数据安全防护方法和装置 |
CN107707746B (zh) * | 2017-09-25 | 2021-02-23 | 北京珠穆朗玛移动通信有限公司 | 移动终端的管理方法、电子设备及存储介质 |
CN107483748A (zh) * | 2017-09-27 | 2017-12-15 | 上海与德科技有限公司 | 手机防盗方法和装置 |
CN108111594A (zh) * | 2017-12-08 | 2018-06-01 | 鹤壁职业技术学院 | 一种防盗式电子通讯装置 |
CN108040112A (zh) * | 2017-12-18 | 2018-05-15 | 珠海格力电器股份有限公司 | 一种通信方法及设备 |
CN109041059B (zh) * | 2018-08-23 | 2022-01-21 | 中国联合网络通信集团有限公司 | 一种移动终端安全认证方法、管控平台和移动终端 |
CN109086635A (zh) * | 2018-08-24 | 2018-12-25 | 合肥合纵光电科技有限公司 | 一种移动设备在丢失后对个人信息进行保护的系统 |
CN109688270B (zh) * | 2019-01-14 | 2020-09-25 | 电子科技大学 | 一种手机壳及基于该手机壳的智能防盗与预警方法 |
CN109714465A (zh) * | 2019-03-18 | 2019-05-03 | 深圳市道格恒通科技有限公司 | 一种智能手机防盗方法及系统 |
CN109889986A (zh) * | 2019-03-22 | 2019-06-14 | 深圳市趣创科技有限公司 | 手机远程找回方法、装置、系统及存储介质 |
CN110225188A (zh) * | 2019-05-20 | 2019-09-10 | 联想(北京)有限公司 | 一种信息处理方法及装置 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1787583A (zh) * | 2004-12-06 | 2006-06-14 | 英华达(南京)科技有限公司 | 利用简讯服务远程控制移动电话设置的方法 |
CN1859670A (zh) * | 2005-09-21 | 2006-11-08 | 华为技术有限公司 | 一种具有防盗功能的移动终端和移动终端防盗的方法 |
CN1946230A (zh) * | 2006-10-19 | 2007-04-11 | 宇龙计算机通信科技(深圳)有限公司 | 手机防盗的方法 |
CN101039346A (zh) * | 2006-03-16 | 2007-09-19 | 上海晨兴电子科技有限公司 | 手机防盗方法、设备以及含有该设备的通信终端 |
CN101287211A (zh) * | 2008-05-07 | 2008-10-15 | 中兴通讯股份有限公司 | 一种移动终端防盗方法 |
Family Cites Families (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5594740A (en) * | 1993-08-27 | 1997-01-14 | Axion Logistics Corporation | Wireless communications application specific enabling method and apparatus |
JP3693259B2 (ja) * | 1993-09-13 | 2005-09-07 | カシオ計算機株式会社 | 通信管理装置 |
KR100636111B1 (ko) * | 1999-10-30 | 2006-10-18 | 삼성전자주식회사 | 분실된 이동 단말기에 내장된 데이터 보호 방법 및 이에 관한 기록매체 |
US6662023B1 (en) * | 2000-07-06 | 2003-12-09 | Nokia Mobile Phones Ltd. | Method and apparatus for controlling and securing mobile phones that are lost, stolen or misused |
JP2004140710A (ja) * | 2002-10-18 | 2004-05-13 | Sony Corp | 携帯電話端末および携帯電話端末の制御方法 |
US7389123B2 (en) * | 2003-04-29 | 2008-06-17 | Sony Ericsson Mobile Communications Ab | Mobile apparatus with remote lock and control function |
CN1302681C (zh) * | 2004-05-11 | 2007-02-28 | 松讯达中科电子(深圳)有限公司 | 手机防盗的方法 |
TWI271992B (en) * | 2004-07-28 | 2007-01-21 | Mediatek Inc | Mobile communication apparatus having anti-theft and auto-notification functions and method of operating the same |
JP2006129329A (ja) * | 2004-11-01 | 2006-05-18 | Nec Corp | 携帯電話システム及び携帯電話の不正使用防止方法 |
JP2006261990A (ja) * | 2005-03-16 | 2006-09-28 | Fujitsu Ltd | 携帯端末および遠隔ロックプログラム |
US9160830B2 (en) * | 2005-07-25 | 2015-10-13 | Mediatek Inc. | Mobile communication apparatus having anti-theft and auto-notification functions |
EP1874069A1 (en) * | 2006-06-26 | 2008-01-02 | Samsung Electronics Co., Ltd. | Method for tracking a lost mobile station |
CN101098156B (zh) * | 2006-06-28 | 2012-05-23 | 鸿富锦精密工业(深圳)有限公司 | 具有特殊使用模式的通讯装置 |
US20090125442A1 (en) * | 2007-11-09 | 2009-05-14 | Jonathan Otto | Wireless communications device configured for automated returns |
CN101568119A (zh) * | 2008-04-24 | 2009-10-28 | 鸿富锦精密工业(深圳)有限公司 | 具防盗功能的移动终端及其防盗方法 |
US8467768B2 (en) * | 2009-02-17 | 2013-06-18 | Lookout, Inc. | System and method for remotely securing or recovering a mobile device |
US8483659B2 (en) * | 2009-02-26 | 2013-07-09 | Qualcomm Incorporated | Methods and systems for recovering lost or stolen mobile devices |
US8566610B2 (en) * | 2009-12-18 | 2013-10-22 | Intel Corporation | Methods and apparatus for restoration of an anti-theft platform |
US20110149078A1 (en) * | 2009-12-18 | 2011-06-23 | At&T Intellectual Property I, Lp | Wireless anti-theft security communications device and service |
JP5174048B2 (ja) * | 2010-01-07 | 2013-04-03 | 京セラ株式会社 | 携帯通信端末 |
US8730334B2 (en) * | 2010-12-10 | 2014-05-20 | Symantec Corporation | Techniques for providing improved perpetrator imaging |
WO2012154254A1 (en) * | 2011-02-16 | 2012-11-15 | Zealer Carl | Configurable advertising and content rendering |
US9042865B2 (en) * | 2012-03-29 | 2015-05-26 | Sony Computer Entertainment America Llc | Method for determining mobile device password settings based on check-in information |
CN103702331A (zh) * | 2013-12-13 | 2014-04-02 | 北京奇虎科技有限公司 | 移动终端防盗方法及客户端 |
-
2012
- 2012-01-19 CN CN2012100176067A patent/CN103220637A/zh active Pending
-
2013
- 2013-01-18 IN IN6215DEN2014 patent/IN2014DN06215A/en unknown
- 2013-01-18 WO PCT/CN2013/070717 patent/WO2013107395A1/zh active Application Filing
- 2013-01-18 EP EP13738538.1A patent/EP2806666A4/en not_active Withdrawn
- 2013-01-18 JP JP2014552502A patent/JP5893169B2/ja active Active
- 2013-01-18 SG SG11201404008YA patent/SG11201404008YA/en unknown
-
2014
- 2014-07-16 US US14/332,718 patent/US9723482B2/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1787583A (zh) * | 2004-12-06 | 2006-06-14 | 英华达(南京)科技有限公司 | 利用简讯服务远程控制移动电话设置的方法 |
CN1859670A (zh) * | 2005-09-21 | 2006-11-08 | 华为技术有限公司 | 一种具有防盗功能的移动终端和移动终端防盗的方法 |
CN101039346A (zh) * | 2006-03-16 | 2007-09-19 | 上海晨兴电子科技有限公司 | 手机防盗方法、设备以及含有该设备的通信终端 |
CN1946230A (zh) * | 2006-10-19 | 2007-04-11 | 宇龙计算机通信科技(深圳)有限公司 | 手机防盗的方法 |
CN101287211A (zh) * | 2008-05-07 | 2008-10-15 | 中兴通讯股份有限公司 | 一种移动终端防盗方法 |
Non-Patent Citations (1)
Title |
---|
See also references of EP2806666A4 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103581444A (zh) * | 2013-11-21 | 2014-02-12 | 北京网秦天下科技有限公司 | 手机和手机安全系统以及相应的方法 |
Also Published As
Publication number | Publication date |
---|---|
CN103220637A (zh) | 2013-07-24 |
EP2806666A1 (en) | 2014-11-26 |
US20140329500A1 (en) | 2014-11-06 |
IN2014DN06215A (zh) | 2015-10-23 |
SG11201404008YA (en) | 2014-10-30 |
US9723482B2 (en) | 2017-08-01 |
EP2806666A4 (en) | 2015-08-05 |
JP5893169B2 (ja) | 2016-03-23 |
JP2015507894A (ja) | 2015-03-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2013107395A1 (zh) | 手机防盗保护方法及装置 | |
CN101772018B (zh) | 防盗移动终端及移动终端的防盗方法 | |
US8583082B2 (en) | System and method for tracking stolen communication terminal, and communication terminal | |
CN102739868B (zh) | 移动终端的丢失处理方法及系统 | |
US20150207917A1 (en) | Mobile terminal intelligent anti-theft method and mobile terminal | |
WO2016034090A1 (zh) | 提高移动终端安全性的方法及系统 | |
WO2012109840A1 (zh) | 一种通过人脸识别实现移动终端防盗的方法和装置 | |
CN202679426U (zh) | 一种移动终端防盗装置 | |
CN101155212A (zh) | 一种限制移动终端使用的方法 | |
CN108769925B (zh) | 一种用于移动终端的防盗寻回系统 | |
CN101163290A (zh) | 一种通过机卡相互认证限制移动终端使用的方法 | |
CN110620847B (zh) | 智能终端的防盗方法、该智能终端 | |
EP3249570B1 (en) | Method and device for providing prompt indicating loss of terminal | |
WO2017185658A1 (zh) | 一种安全保护方法、装置、移动终端及电子设备 | |
CN101707642B (zh) | 一种智能防盗方法、终端和系统 | |
CN110730446A (zh) | 一种登录方法、终端及计算机存储介质 | |
WO2017024550A1 (zh) | 一种移动终端防盗系统及方法 | |
WO2010067263A2 (en) | A system for protection and backup of information in a mobile cell unit | |
CN108600964B (zh) | 一种移动终端追踪定位系统 | |
CN115551076A (zh) | 移动终端的定位方法、装置、电子设备及存储介质 | |
WO2008089638A1 (fr) | Procédé et terminal de communication pour contrôler l'information d'usager dans le terminal de communication | |
CN101163289A (zh) | 一种限制移动终端使用区域的方法 | |
CN111050236B (zh) | 电子设备防盗方法、装置及系统、电子设备及存储介质 | |
CN106921941A (zh) | 一种用于追寻被盗通信终端的系统和方法及通信终端 | |
CN107872559A (zh) | 一种防盗方法及装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 13738538 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2014552502 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
REEP | Request for entry into the european phase |
Ref document number: 2013738538 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2013738538 Country of ref document: EP |