WO2015067102A1 - 移动设备防盗处理方法及设备 - Google Patents
移动设备防盗处理方法及设备 Download PDFInfo
- Publication number
- WO2015067102A1 WO2015067102A1 PCT/CN2014/087170 CN2014087170W WO2015067102A1 WO 2015067102 A1 WO2015067102 A1 WO 2015067102A1 CN 2014087170 W CN2014087170 W CN 2014087170W WO 2015067102 A1 WO2015067102 A1 WO 2015067102A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- mobile device
- imei
- server
- sim card
- user
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/22—Processing or transfer of terminal data, e.g. status or physical capabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/126—Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/71—Hardware identity
Definitions
- the present invention relates to the field of Internet applications, and in particular, to a mobile device anti-theft processing method and device.
- the above-mentioned mobile device anti-theft method is simple and easy, but as the thief's technical level rises, the mapping relationship between the SIM card and the IMEI information can be cleared by restoring the mobile device to the factory setting or performing the brush operation. After the mapping relationship between the SIM card and the IMEI information is cleared, the mobile device anti-theft method will be invalid.
- there is a time limit problem in such methods that is, the stolen person has a query opportunity. When the stolen person no longer pursues the stolen mobile device, the thief can easily resell the stolen mobile device and obtain profits. The existence of such query timing problems also indirectly stimulates the theft of thieves.
- the present invention has been made in order to provide a mobile device anti-theft processing method and apparatus that overcomes the above problems or at least partially solves or alleviates the above problems.
- a mobile device anti-theft processing method including: after detecting that a mobile device is enabled, acquiring an international mobile identity code IMEI of the mobile device, and querying whether the server includes the IMEI. Recording; if not, sending the IMEI, the user identification module SIM card information currently used by the mobile device, and the user account information of the current user to the server, generating a record in the mutual mapping relationship between the server and Saving; if yes, determining whether the SIM card information currently used by the mobile device matches the SIM card information in the record including the IMEI stored in the server; and confirming whether the mobile device is stolen according to the matching result.
- IMEI international mobile identity code
- determining whether the SIM card information currently used by the mobile device matches the SIM card information in the record that includes the IMEI stored in the server includes: if the matching result is the same, confirming the The mobile device has been retrieved after being stolen or stolen; if the matching result is different, confirm the mobile device Ready to be stolen.
- the method further includes: encrypting the SIM card information currently used by the mobile device, and sending the information to the server, where the server writes the information in the user account information.
- the mobile device has been stolen.
- the method further includes: waiting for the mobile device to enable a GPS function, sending real-time location information of the mobile device to the server, and real time for the mobile device by the server The location information is displayed.
- the method further includes: acquiring communication information generated and stored locally when the mobile device uses a SIM card in a record including the IMEI; uploading the communication information to the User account information.
- the method is applied to a client disposed on the mobile device.
- a mobile device anti-theft processing method including: receiving a query request carrying an international mobile identity code IMEI of a mobile device, and querying whether a record including the IMEI is stored locally; Receiving, by the IMEI, the SIM card information of the user identification module currently used by the mobile device, and the user account information of the current user, generating a record in a mutual mapping relationship and storing the three; if yes, according to the IMEI, including the The SIM card information in the record including the IMEI is found in the IMEI record and fed back to the query request sender.
- IMEI international mobile identity code
- the query request sender is a client set on the mobile device.
- identifiers are set in the user account information to identify whether the mobile device is lost.
- setting a different identifier in the user account information to identify whether the mobile device is lost including: when the IMEI corresponding identifier in the user account information is 0, identifying that the mobile device is not lost; When the IMEI corresponding identifier in the user account information is 1, it is identified that the mobile device has been lost.
- the mobile device anti-theft processing method further includes: receiving, when the SIM card information in the record that is fed back to the client including the IMEI does not match the SIM card information currently used by the mobile device, The SIM card information currently used by the mobile device sent by the client; the SIM card information currently used by the mobile device is encrypted; and the encrypted SIM card information currently used by the mobile device is written into the user account information. .
- the method further includes: waiting for the mobile device to enable the GPS function, acquiring real-time location information of the mobile device, and performing display.
- the method further includes: performing anonymous communication between a pre-user and a successor user of the mobile device.
- performing anonymous communication between the pre-user and the successor user of the mobile device including: receiving a message transmitted by the predecessor user through the cloud server, and forwarding the message to the successor user; The message transmitted by the successor user through the encrypted SIM card information currently used by the mobile device is forwarded to the predecessor user.
- the IMEI corresponding identifier is 1 in the user account information
- storing the IMEI and the user identifier UID in the user account information in a cache table according to the IMEI, including the IMEI Locating the SIM card information in the record including the IMEI in the record, including: querying the IMEI in the cache table; if the IMEI exists in the cache table, searching the locality according to the UID
- the stored record including the IMEI; the SIM card information is obtained in a record including the IMEI.
- the method is applied to a server.
- a client including: a detector configured to detect mobile device activation; a data acquirer configured to acquire an international mobile device identity code IMEI of the mobile device; and a data query And configured to query whether a record including the international mobile device identity code IMEI is stored in the server; the data transmitter configured to use the IMEI, the user identification module SIM card information currently used by the mobile device, and the current user The user account information is sent to the server, and the server generates a record and saves in a mutually mapped relationship; the data matcher is configured to determine that the SIM card information currently used by the mobile device is stored in the server and includes the Whether the SIM card information in the IMEI record matches, and confirms whether the mobile device is stolen according to the matching result.
- the data matcher is further configured to: if the matching result is the same, confirm that the mobile device is not stolen or has been retrieved; if the matching result is different, confirm that the mobile device is Pirates.
- the client is disposed on a mobile device.
- a server including: a data receiver configured to receive a query request carrying an international mobile identity code IMEI of the mobile device; and a data querier configured to query whether the local storage includes a record of the IMEI, configured to receive an IMEI of the mobile device, a SIM card information of a user identification module currently used by the mobile device, and user account information of a current user, and generate a record in a mutually mapped relationship. And a data feedback device configured to find SIM card information in the record including the IMEI in the record including the IMEI according to the IMEI, and feed back to the query request sender.
- a data receiver configured to receive a query request carrying an international mobile identity code IMEI of the mobile device
- a data querier configured to query whether the local storage includes a record of the IMEI, configured to receive an IMEI of the mobile device, a SIM card information of a user identification module currently used by the mobile device, and user account information of a current user, and generate a record in a mutually mapped
- the query request sender is a client set on the mobile device.
- the server further includes: a data writer configured to write the mobile device loss information in the user account information in the server if the mobile device is lost.
- a computer program comprising computer readable code that, when executed on a computing device, causes the computing device to perform the mobile device theft prevention method described above.
- a computer readable medium wherein the computer program described above is stored.
- the embodiment of the present invention can record the IMEI of the mobile device, the SIM card information of the user identification module currently used by the mobile device, and the user account information of the current user in a mutually mapped relationship and save the data to the server, and determine the current state of the mobile device.
- the SIM card information used is stored in the server including IMEI Whether the SIM card information in the record matches whether the mobile device is stolen or not, and avoids the thief mentioned in the prior art to use the method of restoring the factory settings or flashing to crack the mobile device.
- the related information of the mobile device is uploaded to the server, and after the mobile device is stolen, regardless of the length of time, when the mobile device is confirmed to be stolen, the server can detect the stolen mobile device in real time, and solve the existing In the technology, due to the timing of the query, if the time exceeds the predetermined time, the problem of the mobile device cannot be recovered, thereby preventing the theft crime, reducing the crime rate of the theft, protecting the security of the user's property, and protecting the legitimate rights and interests of the user.
- FIG. 1 is a flowchart showing a process of a mobile device anti-theft processing method on a client side according to an embodiment of the present invention
- FIG. 2 is a flowchart showing a process of a mobile device anti-theft processing method on a server side according to an embodiment of the present invention
- FIG. 3 is a flowchart showing a process of a mobile device theft prevention processing method according to a preferred embodiment of the present invention
- FIG. 4 is a schematic structural diagram of a client according to an embodiment of the present invention.
- FIG. 5 is a schematic structural diagram of a server according to an embodiment of the present invention.
- Figure 6 is a schematic block diagram of a computing device for performing a mobile device theft prevention method in accordance with the present invention.
- Fig. 7 schematically shows a storage unit for holding or carrying program code implementing the mobile device theft prevention processing method according to the present invention.
- the thief can crack the anti-theft method of the mobile device in the prior art by restoring the factory settings or flashing the machine. After the hacking, the anti-theft method of the mobile device in the prior art fails, and the security of the mobile device of the user cannot be guaranteed. At the same time, the mobile device anti-theft method in the prior art has a query timing problem, which indirectly stimulates the theft behavior. In addition, some mobile device anti-theft methods, although high security, are not conducive to promotion, can only be implemented in a small scope, and thus can not solve the problem of anti-theft of mobile devices of most people.
- FIG. 1 is a flow chart showing the processing of a mobile device anti-theft processing method on the client side according to an embodiment of the present invention.
- the process starts in step S102.
- the mobile device's International Mobile Equipment Identity (IMEI) is obtained, and the server is queried whether or not the storage is included.
- the record of the IMEI If the query does not store the record including the IMEI, the step S104 shown in FIG. 1 is performed, and the IMEI of the mobile device and the Subscriber Identity Module (SIM card) information currently used by the mobile device are used.
- SIM card Subscriber Identity Module
- step S106 determines whether the SIM card information currently used by the mobile device matches the SIM card information in the record including the IMEI stored in the server. And executing step S108, confirming whether the mobile device is stolen according to the matching result.
- the embodiment of the present invention can record the IMEI of the mobile device, the SIM card information of the user identification module currently used by the mobile device, and the user account information of the current user in a mutually mapped relationship and save the data to the server, and determine the current state of the mobile device. Whether the used SIM card information matches the SIM card information in the record including the IMEI stored in the server to confirm whether the mobile device is stolen, and avoid the thief mentioned in the prior art to use the method of restoring the factory settings or flashing to crack the mobile device. .
- the related information of the mobile device is uploaded to the server, and after the mobile device is stolen, regardless of the length of time, when the mobile device is confirmed to be stolen, the server can detect the stolen mobile device in real time, and solve the existing In the technology, due to the timing of the query, if the time exceeds the predetermined time, the problem of the mobile device cannot be recovered, thereby preventing the theft crime, reducing the crime rate of the theft, protecting the security of the user's property, and protecting the legitimate rights and interests of the user.
- step S102 the client set on the mobile device acquires the IMEI of the mobile device, and sends the IMEI to the server, and then queries the server according to the IMEI. Whether or not a record including the IMEI is stored.
- step S104 is performed, and the client set on the mobile device uses the IMEI of the mobile device, the SIM card information currently used by the mobile device, and the current The user account information of the user is sent to the server, and the server generates and records the three in a mutually mapped relationship.
- the foregoing record may include at least a user name, a user identification (UID), and a number of a SIM card currently used by the mobile device (ie, the mobile device currently makes The SIM card information used) and the IMEI of the mobile device.
- the server After receiving the above information, the server generates the following record by mapping the IMEI of the mobile device, the SIM card information currently used by the mobile device, and the user account information to each other:
- each identifier included in the record may further include other information related to the user, such as the number of calls, the number of short messages, and the like in the previous days of the user.
- the IMEI of the mobile device itself is permanently bound to the mobile device and is unique and highly recognizable. Therefore, in the embodiment of the present invention, the IMEI of the mobile device, the SIM card information currently used by the mobile device, and the user account information of the current user are generated in a mutual mapping relationship to ensure that the mobile device information can be utilized after the mobile device is stolen.
- One of the data information in the search finds the corresponding other data. For example, after the user mobile device is stolen, the SIM card information in the record including the IMEI is sent to the server through the cloud service platform, and the IMEI information corresponding to the SIM card information in the record including the IMEI returned by the server can be received. And user account information using the SIM card.
- the embodiment of the present invention is implemented by a client in a mobile device.
- step S106 shown in FIG. 1 is performed to determine the SIM card information currently used by the mobile device and the record including the IMEI stored in the server. Whether the SIM card information matches, and performing step S108, determining whether the mobile device is stolen according to the matching result. Specifically, if the matching result is the same, it is confirmed that the mobile device has been retrieved after being stolen or stolen. If the matching result is different, the mobile device is confirmed to be stolen.
- the client in the mobile device After the mobile device is stolen, the client in the mobile device encrypts the SIM card information currently used by the mobile device and sends the information to the server, and the server writes the information that the mobile device has been stolen in the user account information, and writes the encrypted information.
- the SIM card information currently used by the mobile device After confirming that the mobile device is stolen, the client disposed on the mobile device can acquire the communication information generated and stored locally when the mobile device uses the SIM card in the record including the IMEI, and upload the communication information to the user account. information.
- the client disposed on the mobile device can acquire the communication information generated and stored locally when the mobile device uses the SIM card in the record including the IMEI, and the communication information is obtained. Uploading to the user account information ensures that the user can obtain the communication information stored in the stolen mobile device in time after the lost mobile device is retrieved. Even if the stolen mobile device cannot be retrieved, the SIM card information in the record including the above IMEI can be used to retrieve the communication information stored in the stolen mobile device, thereby reducing the loss due to the mobile device. The inconvenience brought to the user ensures that the user's communication information is not lost as the user's mobile device is lost.
- step S202 is a flow chart showing the processing of a mobile device anti-theft processing method on the server side according to an embodiment of the present invention.
- the process starts in step S202, and receives a query request carrying the international mobile identity code IMEI of the mobile device, and queries whether a record including the IMEI is stored locally, and then performs the next step according to the query result.
- step S204 shown in FIG. 2 is performed, and the IMEI of the mobile device, the user identification module SIM card information currently used by the mobile device, and the user of the current user are received.
- the account information is generated and recorded in a mutual mapping relationship.
- step S206 shown in FIG. 2 is performed, and the IMEI is found in the record including the IMEI.
- the SIM card information in the record of the IMEI is included, and the SIM card information is fed back to the query request sender.
- the embodiment of the present invention can record the IMEI of the mobile device, the SIM card information of the user identification module currently used by the mobile device, and the user account information of the current user in a mutually mapped relationship and save the data to the server, and determine the current state of the mobile device. Whether the used SIM card information matches the SIM card information in the record including the IMEI stored in the server to confirm whether the mobile device is stolen, and avoid the thief mentioned in the prior art to use the method of restoring the factory settings or flashing to crack the mobile device. .
- the related information of the mobile device is uploaded to the server, and after the mobile device is stolen, regardless of the length of time, when the mobile device is confirmed to be stolen, the server can detect the stolen mobile device in real time, and solve the existing In the technology, due to the timing of the query, if the time exceeds the predetermined time, the problem of the mobile device cannot be recovered, thereby preventing the theft crime, reducing the crime rate of the theft, protecting the security of the user's property, and protecting the legitimate rights and interests of the user.
- the mobile device anti-theft processing method provided by the embodiment of the present invention is applied to the server side.
- the server receives a query request carrying the international mobile identity code IMEI of the mobile device, and queries whether a record including the IMEI is stored locally.
- the next step of execution is selected based on the results of the query. If the server does not store the record including the IMEI, the server performs the step S204 as shown in FIG. 2, and receives the IMEI of the mobile device, the SIM card information currently used by the mobile device, and the user account information of the current user. Further, the server generates and records the three in a mutually mapped relationship.
- the server If the server locally stores the record including the IMEI, the server performs the step S206 shown in FIG. 2, and finds the SIM card information in the record including the IMEI in the record including the IMEI according to the IMEI, and the The SIM card information is fed back to the sender of the query request.
- the query request sender is a client set on the mobile device.
- the client set on the mobile device will use the SIM card currently used by the mobile device.
- the information is encrypted and the SIM card information currently used by the encrypted mobile device is sent to the server.
- the server After receiving the SIM card information currently used by the mobile device sent by the client, the server writes the SIM card information to the user account information.
- the client in the mobile device acquires the real-time location information of the mobile device, and sends the location information to the server, and the stolen mobile on the server.
- the real-time location information of the device is displayed, so that it can be chased in real time. Track the location of stolen mobile devices and increase the likelihood of retrieving stolen mobile devices.
- the former user and the successor user of the stolen mobile device can perform anonymous communication through the server. Specifically, the former user of the stolen mobile device transmits a message to the server through the cloud server, and the server forwards the message of the predecessor user to the successor user, and the succeeding user transmits the message through the SIM card information currently used by the encrypted mobile device. To the server, forwarded by the server to the predecessor.
- the former user and the successor user of the stolen mobile device can communicate through the server, and the communication of the two users can extract clues to capture the thief, thereby reducing the crime rate of theft.
- the former user and the succeeding user of the stolen mobile device communicate, the information of each user is encrypted, and the privacy of each user is ensured.
- the user can log in to the server and report the mobile device.
- the identifier of the IMEI in each user account information defaults to 0.
- the identifier of the IMEI in the user account information is changed to 1, the mobile device is stolen, and the UID in the IMEI and the user account information is stored in the high speed.
- Cache in the table In the embodiment of the present invention, the cache table is used to cache related information of the mobile device. When the mobile device is stolen, the stolen person can obtain the information of the stolen mobile device in real time through the cache table, without relying on the query timing in the prior art. The query mechanism for the problem.
- the cache table can store the information of the stolen mobile device until the stolen mobile device is retrieved.
- the cache table in the embodiment of the present invention can create an index to ensure that the cache table can be used to create an index. Return information about stolen mobile devices in real time.
- the client After inserting the SIM card currently used by the mobile device in the mobile device, the client sends the IMEI to the server, and the server receives the IMEI sent by the mobile device to scan the cache table. If the IMEI exists in the cache table, the server searches for the corresponding record according to the UID, obtains the SIM card information in the record including the IMEI, and feeds back to the client, so that the client matches, and then determines whether the mobile device is stolen. .
- FIG. 3 is a flowchart showing a process of the mobile device anti-theft processing method according to a preferred embodiment of the present invention, which is used to support any of the above-described mobile device anti-theft processing methods, and the above-described mobile device anti-theft processing method is more clearly explained.
- the mobile device may be a mobile phone, or may be a device that a user such as a tablet computer or a personal video player can carry with him or her.
- the mobile device anti-theft processing method provided by the embodiment of the present invention can be implemented by a client, and can also be integrated into a single function of a common client on the mobile device.
- the mobile device is a mobile phone, and the mobile phone mobile device anti-theft processing method can be implemented by using the mobile phone anti-theft function in the mobile guard.
- step S302 is performed to install the mobile guard client in the mobile phone.
- the mobile phone anti-theft function in the mobile guards is used for theft prevention.
- the user turns on the mobile phone anti-theft function and allows the mobile guard to obtain the IMEI of the mobile phone.
- the process proceeds to step S306, and the user logs in the mobile phone using the account number (hereinafter referred to as Username) 29702@xxyy.com. Guardian, and send the obtained IMEI to the server, the server queries, the local does not store the record including the IMEI, then the mobile phone guard Send user account information, IMEI, SIM card information, and UID to the server.
- Username account number
- the server After receiving the above information, the server generates a record by mapping the IMEI, the SIM card information in the record of the IMEI including the mobile device, and the user account information to each other:
- the server After the server generates the record as described above, the record is saved. It should be noted that, similar to the above, the user account, the IMEI number, and the SIM card information provided in the preferred embodiment are only used as examples, and are not actually present, and the specific selection of each number and the number of bits of each parameter are according to specific application scenarios. And set.
- step S308 in FIG. 3 When the situation shown in step S308 in FIG. 3 occurs, the user's mobile phone is stolen, the user logs in to the cloud server, and performs step S310 shown in FIG. 3 to mark the mobile phone from being stolen in the cloud server. After receiving the stolen information of the mobile phone input by the user, the server performs the following operations:
- step S312 and step S314 shown in FIG. 3 the thief performs a brush operation on the mobile phone and sells the mobile phone, and the purchaser installs the mobile guard in the mobile phone.
- step S316 is performed to acquire the IMEI of the mobile phone and send it to the server.
- the server After receiving the IMEI sent by the mobile guard, the server performs step S318, receives the IMEI and scans the cache table, and queries whether there is matching data in the cache table, matches the [7524998201] in the cache table, and then performs the UID:1. Query to get the record as described above:
- Step S320 is performed by the mobile phone guard to obtain the SIM card information currently used by the mobile device, and the received SIM card information in the record including the IMEI of the mobile device is matched with the SIM card information currently used by the mobile device.
- step S322 if the SIM card information in the record of the IMEI including the mobile device is consistent with the SIM card information currently used by the mobile device, step S322 is performed, and the mobile guardian pops up the message “Congratulations, your mobile phone found it! Whether to log in and cancel Lost information?", and the operation is terminated according to the user's choice to end the process.
- step S324 of FIG. After the server receives the SIM card information currently used by the mobile device, step S326 is performed to prompt the user that the mobile phone has been found.
- the mobile guard performs step S328 to send the real-time location of the mobile phone to the server, and the server displays the current location of the mobile phone to the user.
- the current user of the mobile phone and the current user of the mobile phone can perform step S330 through the server, that is, the two communicate anonymously through the server, wherein the stolen person communicates with the current user of the mobile phone through the web version of the cloud server, and the current user of the mobile phone
- the stolen person is communicated by the SIM card number currently used by the encrypted mobile device.
- the thief can be found, and the thief can be legally sanctioned, thereby effectively reducing theft.
- FIG. 4 shows a schematic structural diagram of a client according to an embodiment of the present invention.
- the client 400 of the embodiment of the present invention includes at least a detector 410, a data acquirer 420, a data querier 430, a data transmitter 440, and a data matcher 450.
- the detector 410 detects that the mobile device movement is enabled, the IMEI of the mobile device is acquired by the data acquirer 420, and the query request carrying the above IMEI is sent to the server by the data querier 430 coupled thereto.
- the data querier 430 triggers the data transmitter 440 if a record including the above IMEI is not queried locally at the server.
- the IMEI of the mobile device, the SIM card information used by the mobile device, and the user account information of the current user are transmitted by the data transmitter 440 to the server, and the information is generated and recorded by the server in a mutually mapped relationship.
- the data querier 430 receives the SIM card information in the record including the IMEI sent by the server, and sends the SIM card information to the data matcher 450 for matching.
- the data matcher 450 determines whether the SIM card information currently used by the mobile device matches the SIM card information in the record including the IMEI, and confirms whether the mobile device is stolen according to the matching result.
- the embodiment of the present invention can record the IMEI of the mobile device, the SIM card information of the user identification module currently used by the mobile device, and the user account information of the current user in a mutually mapped relationship and save the data to the server, and determine the current state of the mobile device. Whether the used SIM card information matches the SIM card information in the record including the IMEI stored in the server to confirm whether the mobile device is stolen, and avoid the thief mentioned in the prior art to use the method of restoring the factory settings or flashing to crack the mobile device. .
- the related information of the mobile device is uploaded to the server, and after the mobile device is stolen, regardless of the length of time, when the mobile device is confirmed to be stolen, the server can detect the stolen mobile device in real time, and solve the existing In the technology, due to the timing of the query, if the time exceeds the predetermined time, the problem of the mobile device cannot be recovered, thereby preventing the theft crime, reducing the crime rate of the theft, protecting the security of the user's property, and protecting the legitimate rights and interests of the user.
- the embodiment of the present invention is implemented by the client 400 as shown in FIG.
- the detector 410 triggers the data acquirer 420 coupled thereto.
- the data acquirer 420 obtains the IMEI of the mobile device and sends it to the data querier 430, and the data querier 430 sends a query request carrying the above IMEI to the server.
- the server After receiving the query request, the server queries, according to the IMEI carried in the query request, whether a record including the above IMEI is stored locally.
- the IMEI itself is permanently bound to the mobile device and is unique and highly identifiable. Therefore, in the embodiment of the present invention, the IMEI, the SIM card information in the record including the IMEI, and the user account of the current user are used.
- the information is generated in a mutual mapping relationship, and can ensure that when the mobile device is stolen, the data information in the mobile device information can be used to find other data information, for example, after the user mobile device is stolen, the cloud service platform sends the data through the cloud service platform.
- the SIM card information in the record of the above IMEI is sent to the server, and is capable of receiving the IMEI information returned by the server corresponding to the SIM card information in the record including the IMEI and the user account using the SIM card in the record including the IMEI. information.
- the IMEI information returned by the server corresponding to the SIM card information in the record including the IMEI and the user account using the SIM card in the record including the IMEI. information.
- the IMEI and the SIM card information in the record including the above IMEI can also be obtained by using the user account information.
- the next step is performed according to the query result. Specifically, if the server does not store the record including the IMEI described above according to the query result, the data querier 430 triggers the data transmitter 440, and the IMEI of the mobile device and the user identification module currently used by the mobile device are used by the data transmitter 440. The SIM card information and the user account information of the current user are sent to the server, and the records are generated and saved in the mutually mapped relationship between the servers.
- the foregoing record may include at least a user name, a user identification (UID), and a SIM card currently used by the mobile device (ie, the SIM card information currently used by the mobile device). ) and IMEI.
- the server After receiving the above information, the server generates the following record by mapping the IMEI, the SIM card information currently used by the mobile device, and the user account information to each other:
- each identifier included in the record may further include other information related to the user, such as the number of calls, the number of short messages, and the like in the previous days of the user.
- the data finder 430 triggers the data matcher 450, and the data matcher 450 determines the SIM card information currently used by the mobile device and the record including the IMEI stored in the server. Whether the SIM card information in the match matches and confirms whether the mobile device is stolen according to the matching result. Specifically, if the matching result is the same, it is confirmed that the mobile device has been retrieved after being stolen or stolen. If the matching result is different, the mobile device is confirmed to be stolen.
- the data matcher 450 triggers the data transmitter 440, and the data transmitter 440 encrypts the SIM card information used by the mobile device to the server, and the server writes the mobile device to the user account information.
- the information is stolen and written to the encrypted SIM card information used by the mobile device.
- the client set on the mobile device can acquire the mobile device usage including the above IMEI.
- the SIM card in the record is generated and stored in the local communication information, and the communication information is uploaded to the user account information.
- the client disposed on the mobile device can acquire the communication information generated and stored locally when the mobile device uses the SIM card in the record including the IMEI, and the communication information is obtained. Uploading to the user account information ensures that the user can obtain the communication information stored in the stolen mobile device in time after the lost mobile device is retrieved. Even if the stolen mobile device cannot be retrieved, the communication information stored in the stolen mobile device can be retrieved by using the SIM card information in the record including the above IMEI, thereby reducing the inconvenience caused by the loss of the mobile device and ensuring the communication of the user. Information is not lost as the user's mobile device is lost.
- FIG. 5 shows a schematic structural diagram of a server according to an embodiment of the present invention.
- the server 500 of the embodiment of the present invention includes at least a data receiver 510, a data querier 520, a memory 530, a data feedback unit 540, and a data writer 550.
- the data receiver 510 receives the query request carrying the IMEI of the mobile device and triggers the data finder 520.
- the data querier 520 queries whether the record including the IMEI is stored locally according to the above IMEI. If the server 500 does not store the record including the IMEI locally according to the query result of the data querier 520, the memory 530 coupled thereto is triggered, and the IMEI of the mobile device, the SIM card information currently used by the mobile device, and the current use are received by the memory 530. User account information, the three are generated in a mutual mapping relationship and saved.
- the server 500 locally stores the record including the IMEI according to the query result of the data querier 520, the data querier 520 triggers the data feeder 540 of the desired sum, and the data feedback unit 540 is in the record including the IMEI according to the IMEI.
- the SIM card information in the record including the above IMEI is found, and the SIM card information is fed back to the query request sender.
- the embodiment of the present invention can record the IMEI of the mobile device, the SIM card information of the user identification module currently used by the mobile device, and the user account information of the current user in a mutually mapped relationship and save the data to the server, and determine the current state of the mobile device. Whether the used SIM card information matches the SIM card information in the record including the IMEI stored in the server to confirm whether the mobile device is stolen, and avoid the thief mentioned in the prior art to use the method of restoring the factory settings or flashing to crack the mobile device. .
- the related information of the mobile device is uploaded to the server, and after the mobile device is stolen, regardless of the length of time, when the mobile device is confirmed to be stolen, the server can detect the stolen mobile device in real time, and solve the existing In the technology, due to the timing of the query, if the time exceeds the predetermined time, the problem of the mobile device cannot be recovered, thereby preventing the theft crime, reducing the crime rate of the theft, protecting the security of the user's property, and protecting the legitimate rights and interests of the user.
- the data receiver 510 in the server 500 first receives the query request carrying the international mobile identity code IMEI of the mobile device, and triggers the data querier 520 coupled thereto, and the data querier 520 queries whether the server 500 is local. A record including the above IMEI is stored, and secondly, a query is made according to the data querier 520. Go to the next step.
- the server 500 does not locally store the record including the IMEI according to the query result of the data querier 520, the IMEI of the mobile device, the SIM card information currently used by the mobile device, and the current user's user account are received by the memory 530. Information, in turn, the three are generated in a mutual mapping relationship and saved. If the server 500 locally stores the record including the IMEI according to the query result of the data querier 520, the data feedback 540 finds the SIM card information in the record including the IMEI in the record including the IMEI according to the IMEI, and The SIM card information is fed back to the query request sender.
- the query request sender is a client set on the mobile device.
- the client set on the mobile device When the SIM card information in the record including the above IMEI fed back to the client set on the mobile device does not match the SIM card information currently used by the mobile device, the client set on the mobile device will use the SIM card currently used by the mobile device.
- the information is encrypted and the SIM card information currently used by the encrypted mobile device is transmitted to the server 500.
- the memory 530 in the server 500 After receiving the SIM card information currently used by the mobile device sent by the client, the memory 530 in the server 500 writes the SIM card information into the user account information.
- the client in the mobile device After the GPS device is turned on by the stolen mobile device, the client in the mobile device acquires real-time location information of the mobile device, and sends the location information to the server 500, and displays the real-time location information of the stolen mobile device on the server 500, thereby Ability to track the location of stolen mobile devices in real time, increasing the likelihood of retrieving stolen mobile devices.
- the former user and the successor user of the stolen mobile device can perform anonymous communication through the server 500.
- the predecessor user of the stolen mobile device transmits a message to the server 500 through the cloud server, and the server 500 forwards the message of the predecessor user to the successor user, and continues the SIM card information currently used by the user through the encrypted mobile device.
- the message is transmitted to the server 500 and forwarded by the server 500 to the predecessor.
- the former user and the successor user of the stolen mobile device can communicate through the server 500, and the communication of the two users can extract clues to capture the thief, thereby reducing the crime rate of theft.
- the information of each user is encrypted, which ensures the security of the privacy of the two users.
- the user can log in to the server 500 and report the mobile device.
- the identifier of the IMEI in each user account information defaults to 0.
- the identifier of the IMEI stored in the user account information stored in the memory 530 by the data writer 550 in the server 500 is modified to 1, and the mobile device is identified as being Theft, and store the IMID and the UID in the user account information in the cache table.
- the cache table is used to cache related information of the mobile device. When the mobile device is stolen, the stolen person can obtain the information of the stolen mobile device in real time through the cache table, without relying on the query timing in the prior art.
- the query mechanism for the problem can store the information of the stolen mobile device until the stolen mobile device is retrieved.
- the cache table in the embodiment of the present invention can create an index to ensure that the cache table can be used to create an index. Return information about stolen mobile devices in real time.
- the client After inserting the SIM card currently used by the mobile device in the mobile device, the client sends the IMEI to the server 500, and the data receiver 510 in the server 500 receives the IMEI sent by the mobile device, scanning the cache table. If the above IMEI exists in the cache table, the data feedback unit 540 in the server 500 finds the corresponding record according to the UID. The SIM card information in the record of the IMEI is taken and fed back to the client, so that the client performs matching, thereby determining whether the mobile device is stolen.
- the embodiment of the present invention can achieve the following beneficial effects:
- the embodiment of the present invention can record the IMEI of the mobile device, the SIM card information of the user identification module currently used by the mobile device, and the user account information of the current user in a mutually mapped relationship and save the data to the server, and determine the current state of the mobile device. Whether the used SIM card information matches the SIM card information in the record including the IMEI stored in the server to confirm whether the mobile device is stolen, and avoid the thief mentioned in the prior art to use the method of restoring the factory settings or flashing to crack the mobile device. .
- the related information of the mobile device is uploaded to the server, and after the mobile device is stolen, regardless of the length of time, when the mobile device is confirmed to be stolen, the server can detect the stolen mobile device in real time, and solve the existing In the technology, due to the timing of the query, if the time exceeds the predetermined time, the problem of the mobile device cannot be recovered, thereby preventing the theft crime, reducing the crime rate of the theft, protecting the security of the user's property, and protecting the legitimate rights and interests of the user.
- the cache table is used to cache related information of the mobile device.
- the stolen person can obtain the information of the stolen mobile device in real time through the cache table, without relying on existing technologies.
- Query mechanism for querying timing issues The cache table can store the information of the stolen mobile device until the stolen mobile device is retrieved.
- the cache table in the embodiment of the present invention can create an index to ensure that the cache table can be used to create an index. Return information about stolen mobile devices in real time.
- modules in the devices of the embodiments can be adaptively changed and placed in one or more devices different from the embodiment.
- the modules or units or components of the embodiments may be combined into one module or unit or component, and further they may be divided into a plurality of sub-modules or sub-units or sub-components.
- any combination of the features disclosed in the specification, including the accompanying claims, the abstract and the drawings, and any methods so disclosed, or All processes or units of the device are combined.
- Each feature disclosed in this specification (including the accompanying claims, the abstract and the drawings) may be replaced by alternative features that provide the same, equivalent or similar purpose.
- the various component embodiments of the present invention may be implemented in hardware, or in a software module running on one or more processors, or in a combination thereof.
- a microprocessor or digital signal processor DSP
- the invention can also be implemented as a device or device program (e.g., a computer program and a computer program product) for performing some or all of the methods described herein.
- a program implementing the invention may be stored on a computer readable medium or may be in the form of one or more signals.
- signals may be downloaded from an Internet website, provided on a carrier signal, or provided in any other form.
- Figure 6 illustrates a computing device that can implement the mobile device theft prevention process in accordance with the present invention.
- the computing device traditionally includes a computer program product or computer readable medium in the form of a processor 610 and a memory 620.
- the memory 620 may be an electronic memory such as a flash memory, an EEPROM (Electrically Erasable Programmable Read Only Memory), an EPROM, a hard disk, or a ROM.
- Memory 620 has a storage space 630 for storing program code that performs any of the method steps described above.
- storage space 630 for program code may include various program code 631 for implementing various steps in the above methods, respectively.
- the program code can be read from or written to one or more computer program products.
- These computer program products include program code carriers such as hard disks, compact disks (CDs), memory cards or floppy disks. Such computer program products are typically portable or fixed storage units as described in FIG.
- the storage unit may have a storage segment, a storage space, and the like that are configured similarly to the storage 620 in the computing device of FIG.
- the program code can be compressed in any suitable form.
- the storage unit can include computer readable code 631' that can be read by a processing device, such as processor 610 of Figure 6, when the code is run by a computing device, resulting in The computing device performs the various steps in the methods described above.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Databases & Information Systems (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
本发明公开了一种移动设备防盗处理方法及设备,包括当检测到移动设备启用后,获取移动设备的国际移动设备身份码IMEI,并查询服务器中是否存储有包括移动设备的IMEI的记录;若否,则将IMEI、移动设备当前使用的用户识别模块SIM卡信息以及当前使用者的用户账户信息发送至服务器,在服务器以互相映射关系生成记录并保存;若是,则判断移动设备当前使用的SIM卡信息与服务器中存储的包括IMEI的记录中的SIM卡信息是否匹配;根据匹配结果确认是否移动设备被盗。采用本发明实施例能够有效防止移动设备被盗,保护用户移动设备安全。
Description
本发明涉及互联网应用领域,尤其涉及一种移动设备防盗处理方法及设备。
随着移动设备在人们的生活中扮演着越来越重要的角色,移动设备的丢失给人们带来很多麻烦及不便,有时甚至是很大的损失。随着信息社会的快速发展,移动设备在更新,移动设备的防盗方法却没有很大的突破。现有技术中,移动设备的防盗方法的具体步骤为:
1、获取移动设备的IMEI信息与SIM卡信息;
2、将获取到的上述信息存储于本地;
3、当SIM卡被更换之后,发现IMEI与SIM卡信息不匹配,则认为移动设备被盗。
上述移动设备防盗方法简单易行,但随着盗窃者技术水平的上升,只要将移动设备恢复出厂设置或者进行刷机操作,即可以清除SIM卡与IMEI信息的映射关系。SIM卡与IMEI信息的映射关系清除之后,该移动设备防盗方法就会失效。另外,此类方法存在时限问题,即被盗者存在查询时机,超过此查询时机,被盗者不再追究被盗移动设备时,盗窃者能够轻易倒卖被盗移动设备,获取利润。这种查询时机问题的存在也间接激励了盗窃者的盗窃行为。
发明内容
鉴于上述问题,提出了本发明以便提供一种克服上述问题或者至少部分地解决或者减缓上述问题的移动设备防盗处理方法及设备。
依据本发明的一个方面,提供了一种移动设备防盗处理方法,包括:当检测到移动设备启用后,获取所述移动设备的国际移动身份码IMEI,并查询服务器中是否存储有包括所述IMEI的记录;若否,则将所述IMEI、所述移动设备当前使用的用户识别模块SIM卡信息以及当前使用者的用户账户信息发送至所述服务器,在所述服务器以相互映射关系生成记录并保存;若是,则判断所述移动设备当前使用的SIM卡信息与所述服务器中存储的包括所述IMEI的记录中的SIM卡信息是否匹配;根据匹配结果确认是否所述移动设备被盗。
可选地,判断所述移动设备当前使用的SIM卡信息与所述服务器中存储的包括所述IMEI的记录中的SIM卡信息是否匹配,包括:若匹配结果为两者相同,则确认所述移动设备未被盗或被盗后已找回;若匹配结果为两者不同,则确认所述移动设
备被盗。
可选地,确认所述移动设备被盗之后,还包括:将所述移动设备当前使用的SIM卡信息加密后发送至所述服务器,由所述服务器在所述用户账户信息中写入所述移动设备已被盗。
可选地,确认所述移动设备被盗之后,还包括:待所述移动设备开启GPS功能,发送所述移动设备的实时位置信息至所述服务器,由所述服务器对所述移动设备的实时位置信息进行显示。
可选地,确认所述移动设备被盗之后,还包括:获取所述移动设备使用包括所述IMEI的记录中的SIM卡时产生并存储在本地的通信信息;上传所述通信信息至所述用户账户信息。
可选地,所述方法应用于设置在所述移动设备上的客户端。
依据本发明的另一个方面,还提供了一种移动设备防盗处理方法,包括:接收携带有移动设备的国际移动身份码IMEI的查询请求,查询本地是否存储有包括所述IMEI的记录;若否,接收所述IMEI、所述移动设备当前使用的用户识别模块SIM卡信息以及当前使用者的用户账户信息,将三者以相互映射关系生成记录并保存;若是,根据所述IMEI在包括所述IMEI的记录中查找到包括所述IMEI的记录中的SIM卡信息,并反馈至查询请求发送方。
可选地,所述查询请求发送方为设置在所述移动设备上的客户端。
可选地,在所述用户账户信息中设置不同标识,标识所述移动设备是否丢失。
可选地,在所述用户账户信息中设置不同标识,标识所述移动设备是否丢失,包括:当所述用户账户信息中IMEI对应标识为0时,标识所述移动设备未丢失;当所述用户账户信息中IMEI对应标识为1时,标识所述移动设备已丢失。
可选地,所述移动设备防盗处理方法还包括:当反馈至所述客户端的包括所述IMEI的记录中的SIM卡信息与所述移动设备当前使用的SIM卡信息不匹配时,接收所述客户端发送的所述移动设备当前使用的SIM卡信息;对所述移动设备当前使用的SIM卡信息进行加密;将加密后的所述移动设备当前使用的SIM卡信息写入所述用户账户信息。
可选地,接收所述客户端发送的所述移动设备当前使用的SIM卡信息之后,还包括:待所述移动设备开启GPS功能,获取所述移动设备的实时位置信息并进行显示。
可选地,接收所述客户端发送的所述移动设备当前使用的SIM卡信息之后,还包括:在所述移动设备的前任使用者和继任使用者之间进行匿名通信。
可选地,在所述移动设备的前任使用者和继任使用者之间进行匿名通信,包括:接收所述前任使用者通过云服务端传输的消息,并转发至所述继任使用者;接收所述继任使用者通过加密后的所述移动设备当前使用的SIM卡信息传输的消息,并转发至所述前任使用者。
可选地,当所述用户账户信息中IMEI对应标识为1时,将所述IMEI以及所述用户账户信息中的用户标识UID存储在高速缓存表中;根据所述IMEI在包括所述IMEI的记录中查找包括所述IMEI的记录中的SIM卡信息,包括:在所述高速缓存表中查询所述IMEI;若所述高速缓存表中存在所述IMEI,根据所述UID查找到所述本地存储的包括所述IMEI的记录;在包括所述IMEI的记录中获取所述SIM卡信息。
可选地,所述方法应用于服务器。
依据本发明的另一个方面,还提供了一种客户端,包括:检测器,配置为检测到移动设备启用;数据获取器,配置为获取所述移动设备的国际移动设备身份码IMEI;数据查询器,配置为查询服务器中是否存储有包括所述国际移动设备身份码IMEI的记录;数据发送器,配置为将所述IMEI、所述移动设备当前使用的用户识别模块SIM卡信息以及当前使用者的用户账户信息发送至所述服务器,在所述服务器以互相映射关系生成记录并保存;数据匹配器,配置为判断所述移动设备当前使用的SIM卡信息与所述服务器中存储的包括所述IMEI的记录中的SIM卡信息是否匹配,并根据匹配结果确认是否所述移动设备被盗。
可选地,所述数据匹配器还配置为:若匹配结果为两者相同,则确认所述移动设备未被盗或已找回;若匹配结果为两者不同,则确认所述移动设备被盗。
可选地,所述客户端设置于移动设备上。
依据本发明的另一个方面,还提供了一种服务器,包括:数据接收器,配置为接收携带有移动设备的国际移动身份码IMEI的查询请求;数据查询器,配置为查询本地是否存储有包括所述IMEI的记录;存储器,配置为接收所述移动设备的IMEI、所述移动设备当前使用的用户识别模块SIM卡信息以及当前使用者的用户账户信息,将三者以相互映射关系生成记录并保存;数据反馈器,配置为根据所述IMEI在包括所述IMEI的记录中查找到包括所述IMEI的记录中的SIM卡信息,并反馈至查询请求发送方。
可选地,所述查询请求发送方为设置在所述移动设备上的客户端。
可选地,所述服务器还包括:数据写入器,配置为若所述移动设备丢失,在所述服务器中的用户账户信息中写入移动设备丢失信息。
根据本发明的又一个方面,提供了一种计算机程序,其包括计算机可读代码,当所述计算机可读代码在计算设备上运行时,导致所述计算设备执行上述的移动设备防盗处理方法。
根据本发明的再一个方面,提供了一种计算机可读介质,其中存储了上述的计算机程序。
本发明的有益效果为:
采用本发明实施例能够将移动设备的IMEI、移动设备当前使用的用户识别模块SIM卡信息以及当前使用者的用户账户信息三者以互相映射关系生成记录并保存至服务器,并且通过判断移动设备当前使用的SIM卡信息与服务器中存储的包括IMEI
的记录中的SIM卡信息是否匹配确认移动设备是否被盗,避免现有技术中提到的盗窃者使用恢复出厂设置或刷机等方法破解移动设备防盗。进一步,本发明实施例中,将移动设备的相关信息上传至服务器,移动设备被盗之后,不论时间长短,当确认移动设备被盗时,服务器能够实时监测到被盗移动设备,解决了现有技术中由于存在查询时机,超过预定时间,则无法找回移动设备的问题,进而能够打击盗窃犯罪,降低盗窃犯罪率,保护用户的财产安全,保障用户的合法权益。
上述说明仅是本发明技术方案的概述,为了能够更清楚了解本发明的技术手段,而可依照说明书的内容予以实施,并且为了让本发明的上述和其它目的、特征和优点能够更明显易懂,以下特举本发明的具体实施方式。
根据下文结合附图对本发明具体实施例的详细描述,本领域技术人员将会更加明了本发明的上述以及其他目的、优点和特征。
通过阅读下文优选实施方式的详细描述,各种其他的优点和益处对于本领域普通技术人员将变得清楚明了。附图仅用于示出优选实施方式的目的,而并不认为是对本发明的限制。而且在整个附图中,用相同的参考符号表示相同的部件。在附图中:
图1示出了根据本发明一个实施例的客户端一侧的移动设备防盗处理方法的处理流程图;
图2示出了根据本发明一个实施例的服务器一侧的移动设备防盗处理方法的处理流程图;
图3示出了根据本发明一个优选实施例的移动设备防盗处理方法的处理流程图;
图4示出了根据本发明一个实施例的客户端的结构示意图;
图5示出了根据本发明一个实施例的服务器的结构示意图;
图6示意性地示出了用于执行根据本发明的移动设备防盗处理方法的计算设备的框图;以及
图7示意性地示出了用于保持或者携带实现根据本发明的移动设备防盗处理方法的程序代码的存储单元。
下面结合附图和具体的实施方式对本发明作进一步的描述。
在此提供的算法和显示不与任何特定计算机、虚拟系统或者其它设备固有相关。各种通用系统也可以与基于在此的示教一起使用。根据上面的描述,构造这类系统所要求的结构是显而易见的。此外,本发明也不针对任何特定编程语言。应当明白,可以利用
各种编程语言实现在此描述的本发明的内容,并且上面对特定语言所做的描述是为了披露本发明的最佳实施方式。
相关技术中提及,盗窃者能够通过恢复出厂设置或者刷机等方法破解现有技术中的移动设备防盗方法,破解之后,现有技术中的移动设备防盗方法失效,无法保障用户的移动设备安全。同时,现有技术中的移动设备防盗方法存在查询时机问题,间接激励盗窃行为。另外,有的移动设备防盗方法虽然安全性较高,但是不利于推广,只能小范围实行,进而不能解决大多数人的移动设备防盗问题。
为解决上述技术问题,本发明实施例提供了一种移动设备防盗处理方法。图1示出了根据本发明一个实施例的客户端一侧的移动设备防盗处理方法的处理流程图。如图1所示,该流程起始于步骤S102,当检测到移动设备启用后,获取移动设备的国际移动设备身份码(International Mobile Equipment Identity,以下简称IMEI),并查询服务器中是否存储有包括该IMEI的记录。若经查询,服务器中未存储有包括该IMEI的记录,执行如图1所示的步骤S104,将移动设备的IMEI、移动设备当前使用的用户识别模块(Subscriber Identity Module,以下简称SIM卡)信息以及当前使用者的用户账户信息发送至服务器,其中,服务器将三者以相互映射关系生成记录并保存。
若经查询,服务器中存储有包括该IMEI的记录,则执行如图1所示的步骤S106,判断移动设备当前使用的SIM卡信息与服务器中存储的包括IMEI的记录中的SIM卡信息是否匹配,并执行步骤S108,根据匹配结果确认是否移动设备被盗。
采用本发明实施例能够将移动设备的IMEI、移动设备当前使用的用户识别模块SIM卡信息以及当前使用者的用户账户信息三者以互相映射关系生成记录并保存至服务器,并且通过判断移动设备当前使用的SIM卡信息与服务器中存储的包括IMEI的记录中的SIM卡信息是否匹配确认移动设备是否被盗,避免现有技术中提到的盗窃者使用恢复出厂设置或刷机等方法破解移动设备防盗。进一步,本发明实施例中,将移动设备的相关信息上传至服务器,移动设备被盗之后,不论时间长短,当确认移动设备被盗时,服务器能够实时监测到被盗移动设备,解决了现有技术中由于存在查询时机,超过预定时间,则无法找回移动设备的问题,进而能够打击盗窃犯罪,降低盗窃犯罪率,保护用户的财产安全,保障用户的合法权益。
具体地,如图1所示,当检测到移动设备启用之后,执行步骤S102,设置于移动设备上的客户端获取移动设备的IMEI,并将该IMEI发送至服务器,进而根据该IMEI查询服务器中是否存储有包括该IMEI的记录。
若根据在服务器中进行查询的结果,服务器中未存储有包括该IMEI的记录,则执行步骤S104,设置于移动设备上的客户端将移动设备的IMEI、移动设备当前使用的SIM卡信息以及当前使用者的用户账户信息发送至服务器,在服务器将三者以相互映射关系生成记录并保存。
可选地,本发明实施例中,上述记录中至少可以包括用户名称、用户身份证明(User Identification,以下简称UID)、移动设备当前使用的SIM卡的号码(即移动设备当前使
用的SIM卡信息)以及移动设备的IMEI。例如,服务器接收到上述信息之后,将移动设备的IMEI、移动设备当前使用的SIM卡信息以及用户账户信息以互相映射关系生成下面这一记录:
Username(用户账户信息):29702@xxyy.com
UID:1
Phone:19002335896
IMEI:[“752499820,0”,“752499821,0”]
需要说明的是,本优选实施例中提供的用户账号、IMEI号码以及SIM卡信息仅用作示例,并非真实存在,所选取的各个号码以及记录中各标识的位数多少不能用作真实参考。进一步,记录中所包含的各标识还可以包括与用户相关的其他信息,例如用户之前若干天内的通话数量、短信数量等。
如上文所述的记录中,移动设备的IMEI本身与移动设备是终身绑定且唯一不变,并且可识别性高。因此,本发明实施例中,将移动设备的IMEI、移动设备当前使用的SIM卡信息以及当前使用者的用户账户信息以相互映射关系生成记录,保证当移动设备被盗之后,能够利用移动设备信息中的一个数据信息查找到相应的其他数据。例如,用户移动设备被盗之后,通过云服务平台发送包括上述IMEI的记录中的SIM卡信息至服务器,则能够接收到服务器返回的与包括上述IMEI的记录中的SIM卡信息相对应的IMEI信息以及使用该SIM卡的用户账户信息。同样,发送移动设备的IMEI至服务器,就能够获取包括该IMEI的记录中的SIM卡信息以及用户账户信息,而利用用户账户信息也能够获得移动设备的IMEI以及包括该IMEI的记录中的SIM卡信息。可选地,本发明实施例通过移动设备中的客户端实现。
若根据在服务器中进行查询的结果,服务器中存储有包括该IMEI的记录,则执行如图1所示的步骤S106,判断移动设备当前使用的SIM卡信息与服务器中存储的包括IMEI的记录中的SIM卡信息是否匹配,并执行步骤S108,根据匹配结果确定移动设备是否被盗。具体地,若匹配结果为两者相同,则确认移动设备未被盗或被盗后已找回,若匹配结果为两者不同,则确认移动设备被盗。
移动设备被盗之后,移动设备中的客户端将移动设备当前使用的SIM卡信息加密后发送至服务器,由服务器在用户账户信息中写入移动设备已被盗的信息,并写入加密后的移动设备当前使用的SIM卡信息。另外,确认移动设备被盗之后,设置于移动设备上的客户端能够获取移动设备使用包括上述IMEI的记录中的SIM卡时产生并存储在本地的通信信息,并将该通信信息上传至用户账户信息。
本发明实施例中,确认移动设备被盗之后,设置于移动设备上的客户端能够获取移动设备使用包括上述IMEI的记录中的SIM卡时产生并存储在本地的通信信息,并将该通信信息上传至用户账户信息,保证用户在找回丢失的移动设备之后,能够及时获取存储于被盗移动设备中的通信信息。即使被盗移动设备无法找回,利用包括上述IMEI的记录中的SIM卡信息也能够找回存储于被盗移动设备中的通信信息,降低因移动设备丢失
带给用户的不便,保证用户的通信信息不会随用户移动设备的丢失而丢失。
图2示出了根据本发明一个实施例的服务器一侧的移动设备防盗处理方法的处理流程图。如图2所示,该流程起始于步骤S202,接收携带有移动设备的国际移动身份码IMEI的查询请求,查询本地是否存储有包括上述IMEI的记录,进而根据查询结果执行下一步骤。具体地,当查询到本地未存储有包括上述IMEI的记录时,执行如图2所示的步骤S204,接收移动设备的IMEI、移动设备当前使用的用户识别模块SIM卡信息以及当前使用者的用户账户信息,将三者以相互映射关系生成记录并保存,当查询到本地存储有包括上述IMEI的记录时,执行如图2所示的步骤S206,根据上述IMEI在包括该IMEI的记录中查找到包括该IMEI的记录中的SIM卡信息,并将该SIM卡信息反馈至查询请求发送方。
采用本发明实施例能够将移动设备的IMEI、移动设备当前使用的用户识别模块SIM卡信息以及当前使用者的用户账户信息三者以互相映射关系生成记录并保存至服务器,并且通过判断移动设备当前使用的SIM卡信息与服务器中存储的包括IMEI的记录中的SIM卡信息是否匹配确认移动设备是否被盗,避免现有技术中提到的盗窃者使用恢复出厂设置或刷机等方法破解移动设备防盗。进一步,本发明实施例中,将移动设备的相关信息上传至服务器,移动设备被盗之后,不论时间长短,当确认移动设备被盗时,服务器能够实时监测到被盗移动设备,解决了现有技术中由于存在查询时机,超过预定时间,则无法找回移动设备的问题,进而能够打击盗窃犯罪,降低盗窃犯罪率,保护用户的财产安全,保障用户的合法权益。
具体地,如图2所示,本发明实施例提供的移动设备防盗处理方法应用于服务器一侧。首先,执行步骤S202,服务器接收携带有移动设备的国际移动身份码IMEI的查询请求,查询本地是否存储有包括上述IMEI的记录。其次,根据查询结果选择执行的下一步骤。若根据查询结果,服务器本地未存储有包括上述IMEI的记录,则执行如图2所示的步骤S204,接收移动设备的IMEI、移动设备当前使用的SIM卡信息以及当前使用者的用户账户信息,进而,由服务器将三者以相互映射关系生成记录并保存。若根据查询结果,服务器本地存储有包括上述IMEI的记录,则执行如图2所示的步骤S206,根据上述IMEI在包括IMEI的记录中查找到包括IMEI的记录中的SIM卡信息,并将该SIM卡信息反馈至查询请求发送方。可选地,本发明实施例中,查询请求发送方为设置在移动设备上的客户端。
当反馈至设置在移动设备上的客户端的包括上述IMEI的记录中的SIM卡信息与移动设备当前使用的SIM卡信息不匹配时,设置在移动设备上的客户端将移动设备当前使用的SIM卡信息进行加密,并将加密后的移动设备当前使用的SIM卡信息发送至服务器。服务器接收到上述客户端发送的移动设备当前使用的SIM卡信息之后,将该SIM卡信息写入用户账户信息。待被盗移动设备开启全球定位系统(Global Positioning System,以下简称GPS)之后,移动设备中的客户端获取移动设备的实时位置信息,并将该位置信息发送至服务器,在服务器上对被盗移动设备的实时位置信息进行显示,从而能够实时追
踪到被盗移动设备的位置,增加找回被盗移动设备的可能性。
另外,本发明实施例中,当确认移动设备被盗之后,被盗移动设备的前任使用者和继任使用者能够通过服务器进行匿名通信。具体地,被盗移动设备的前任使用者通过云服务端传输消息至服务器,由服务器转发前任使用者的消息至继任使用者,继任使用者通过加密后的移动设备当前使用的SIM卡信息传输消息至服务器,由服务器转发至前任使用者。本发明实施例中,被盗移动设备的前任使用者以及继任使用者能够通过服务器进行通信,通过两任使用者的通信能够提取线索抓取偷窃者,继而减少偷窃犯罪率。另外,本发明实施例中,被盗移动设备的前任使用者以及继任使用者之间进行通信时,两任使用者各自的信息是加密的,保证两任使用者各自隐私的安全性。
本发明实施例中,当用户移动设备丢失之后,用户能够登录服务器,将移动设备报失。每个用户账户信息中的IMEI的标识默认为0,报失之后,由服务器将用户账户信息中的IMEI的标识修改为1,标识移动设备被盗,并将IMEI以及用户账户信息中UID存储在高速缓存表中。本发明实施例中,使用高速缓存表缓存移动设备的相关信息,当移动设备被盗,被盗者能够通过高速缓存表实时获取被盗移动设备的信息,而不用依赖现有技术中存在查询时机问题的查询机制。高速缓存表能够存储被盗移动设备的信息直到被盗移动设备被找回,当高速缓存表中缓存信息过大,数据量过大时,本发明实施例中的高速缓存表能够创建索引,保证实时返回被盗移动设备的相关信息。
当移动设备中插入移动设备当前使用的SIM卡之后,客户端发送IMEI至服务器,服务器接收移动设备发送的IMEI,扫描高速缓存表。若高速缓存表中存在IMEI,服务器根据UID查找到对应的记录,获取其中包括所述IMEI的记录中的SIM卡信息,并反馈给客户端,以便客户端进行匹配,进而判断移动设备是否被盗。
实施例一
图3示出了根据本发明一个优选实施例的移动设备防盗处理方法的处理流程图,用于支持上述任意一个移动设备防盗处理方法,将上述移动设备防盗处理方法阐述得更清楚明白。
本发明实施例中,移动设备可以是手机,也可以是平板电脑、个人视频播放器等用户能够随身携带的设备。另外,本发明实施例提供的移动设备防盗处理方法能够通过客户端实现,也能够集成于移动设备上常用客户端的单一功能上实现。为将本发明实施例提供的移动设备防盗处理方法阐述得简明易懂,本优选实施例中,移动设备为手机,手机移动设备防盗处理方法可以通过手机卫士中的手机防盗功能实现。
参见图3,用户购买到手机之后,首先执行步骤S302,在手机中安装手机卫士客户端。其次,利用手机卫士中的手机防盗功能进行手机防盗。具体地,如图3中的步骤S304所示,用户开启手机防盗功能并允许手机卫士获取手机的IMEI,获取之后,执行步骤S306,用户使用账号(以下称为Username)29702@xxyy.com登陆手机卫士,并将获取到的IMEI发送至服务器,服务器经查询,本地未存储包括该IMEI的记录,则由手机卫
士将用户账户信息、IMEI、SIM卡信息以及UID发送至服务器。
服务器接收到上述信息之后,将IMEI、包括移动设备的IMEI的记录中的SIM卡信息以及用户账户信息以互相映射关系生成记录:
Username:29702@xxyy.com
UID:1
Phone:19002335896
IMEI:[“752499820,0”,“752499821,0”]
服务器生成如上文所述的记录之后,保存该记录。需要说明的是,与上文相同,本优选实施例中提供的用户账号、IMEI号码以及SIM卡信息仅用作示例,并非真实存在,各个号码的具体选取以及各参数的位数根据具体应用场景而定。
当发生如图3中的步骤S308所示的情况,用户手机被盗,则用户登录云服务器,并执行如图3所示的步骤S310,在云服务器中标记该手机被盗。接收到用户输入的手机被盗的信息之后,服务器执行如下操作:
用户29702@xxyy.com标识752499820的IMEI所对应的手机被盗,将数据变更为:
Username:29702@xxyy.com
UID:1
Phone:19002335896
IMEI:[“752499820,1”,“752499821,0”]
服务器变更数据之后,将752499820与UID加入一个高速缓存表,加入的格式为:[7524998201]。
如图3所示的步骤S312以及步骤S314,盗窃者对手机进行刷机操作并将手机卖出,购买者在手机中安装手机卫士。手机卫士被重新安装之后,执行步骤S316,获取手机的IMEI并发送至服务器。服务器接收到手机卫士发送的IMEI之后,执行步骤S318,接收该IMEI并扫描高速缓存表,查询高速缓存表中是否存在匹配数据,匹配到高速缓存表中的[7524998201]之后,通过UID:1进行查询,得到如上文所述的记录:
Username:29702@xxyy.com
UID:1
Phone:19002335896
IMEI:[“752499820,1”,“752499821,0”]
得到IMEI对应的记录之后,服务器返回包括移动设备的IMEI的记录中的SIM卡信息至手机。由手机卫士执行步骤S320,获取移动设备当前使用的SIM卡信息,并将接收到的包括移动设备的IMEI的记录中的SIM卡信息和移动设备当前使用的SIM卡信息进行匹配。
根据匹配结果,若包括移动设备的IMEI的记录中的SIM卡信息和移动设备当前使用的SIM卡信息一致,执行步骤S322,手机卫士弹出信息“恭喜您,您的手机找到了!是否登录并取消丢失信息?”,并根据用户选择执行操作,结束流程。
若根据匹配结果,包括移动设备的IMEI的记录中的SIM卡信息和移动设备当前使
用的SIM卡信息不一致,则执行如图3所示的步骤S324将移动设备当前使用的SIM卡信息经过加密处理之后发送至服务器。服务器接收到移动设备当前使用的SIM卡信息之后,执行步骤S326,提示用户手机已找到。当手机开启GPS功能时,手机卫士执行步骤S328,将手机的实时位置发送至服务器,由服务器向用户展示手机的当前位置。另外,手机被盗者与手机当前使用者能够通过服务器执行步骤S330,即两者通过服务器进行匿名通信,其中,被盗者通过网页版的云服务器与手机当前使用者进行通信,手机当前使用者通过加密的移动设备当前使用的SIM卡号与被盗者进行通信。本优选实施例中,通过被盗者与手机当前使用者进行匿名通信,能够查找到盗窃者,对进而对盗窃者进行依法制裁,有效减少盗窃行为。
基于上文各优选实施例提供的移动设备防盗处理方法,基于同一发明构思,本发明实施例提供了一种客户端,用于实现上述移动设备防盗处理方法。图4示出了根据本发明一个实施例的客户端的结构示意图。如图4所示,本发明实施例的客户端400至少包括:检测器410、数据获取器420、数据查询器430、数据发送器440以及数据匹配器450。
现介绍本发明实施例的客户端400的各器件或组成的功能以及各部分间的连接关系。检测器410检测到移动设备移动启用之后,由数据获取器420获取移动设备的IMEI,并由与其耦合的数据查询器430发送携带有上述IMEI的查询请求至服务器。若在服务器本地未查询到存储有包括上述IMEI的记录,则数据查询器430触发数据发送器440。由数据发送器440将移动设备的IMEI、移动设备档期使用的SIM卡信息以及当前使用者的用户账户信息发送至服务器,在服务器以互相映射关系将上述信息生成记录并保存。
若在服务器本地查询到存储有包括上述IMEI的记录,则数据查询器430接收服务器发送的包括上述IMEI的记录中的SIM卡信息,并将该SIM卡信息发送至数据匹配器450进行匹配。数据匹配器450判断移动设备当前使用的SIM卡信息与包括上述IMEI的记录中的SIM卡信息是否匹配,并根据匹配结果确认移动设备是否被盗。
采用本发明实施例能够将移动设备的IMEI、移动设备当前使用的用户识别模块SIM卡信息以及当前使用者的用户账户信息三者以互相映射关系生成记录并保存至服务器,并且通过判断移动设备当前使用的SIM卡信息与服务器中存储的包括IMEI的记录中的SIM卡信息是否匹配确认移动设备是否被盗,避免现有技术中提到的盗窃者使用恢复出厂设置或刷机等方法破解移动设备防盗。进一步,本发明实施例中,将移动设备的相关信息上传至服务器,移动设备被盗之后,不论时间长短,当确认移动设备被盗时,服务器能够实时监测到被盗移动设备,解决了现有技术中由于存在查询时机,超过预定时间,则无法找回移动设备的问题,进而能够打击盗窃犯罪,降低盗窃犯罪率,保护用户的财产安全,保障用户的合法权益。
具体地,本发明实施例通过如图4所示的客户端400实现。如图4所示,检测器410检测到移动设备启用之后,触发与其耦合的数据获取器420。数据获取器420获取移动设备的IMEI,并发送至数据查询器430,由数据查询器430发送携带有上述IMEI的查询请求至服务器。
服务器接收查询请求之后,根据查询请求中携带的IMEI查询本地是否存储有包括上述IMEI的记录。其中,IMEI本身与移动设备是终身绑定且唯一不变,并且可识别性高,因此,本发明实施例中,将IMEI、包括上述IMEI的记录中的SIM卡信息以及当前使用者的用户账户信息以相互映射关系生成记录,能够保证当移动设备被盗之后,能够利用移动设备信息中的一个数据信息查找到相应的其他数据信息,例如,用户移动设备被盗之后,通过云服务平台发送包括上述IMEI的记录中的SIM卡信息至服务器,则能够接收到服务器返回的与该包括上述IMEI的记录中的SIM卡信息相对应的IMEI信息以及使用包括上述IMEI的记录中的SIM卡的用户账户信息。同样,发送IMEI至服务器,就能够获取包括上述IMEI的记录中的SIM卡信息以及用户账户信息,而利用用户账户信息也能够获得IMEI以及包括上述IMEI的记录中的SIM卡信息。
当客户端400中的数据查询器430接收到服务器返回的查询结果之后,根据查询结果进行下一步骤。具体地,若根据查询结果,服务器本地未存储有包括上述IMEI的记录,则数据查询器430触发数据发送器440,并由数据发送器440将移动设备的IMEI、移动设备当前使用的用户识别模块SIM卡信息以及当前使用者的用户账户信息发送至服务器,在服务器以互相映射关系生成记录并保存。
可选地,本发明实施例中,上述记录中至少可以包括用户名称、用户身份证明(User Identification,以下简称UID)、移动设备当前使用的SIM卡的号码(即移动设备当前使用的SIM卡信息)以及IMEI。例如,服务器接收到上述信息之后,将IMEI、移动设备当前使用的SIM卡信息以及用户账户信息以互相映射关系生成下面这一记录:
Username(用户账户信息):29702@xxyy.com
UID:1
Phone:19002335896
IMEI:[“752499820,0”,“752499821,0”]
需要说明的是,本优选实施例中提供的用户账号、IMEI号码以及SIM卡信息仅用作示例,并非真实存在,所选取的各个号码以及记录中各标识的位数多少不能用作真实参考。进一步,记录中所包含的各标识还可以包括与用户相关的其他信息,例如用户之前若干天内的通话数量、短信数量等。
若根据查询结果,在服务器本地存储有包括上述IMEI的记录,则数据查询器430触发数据匹配器450,由数据匹配器450判断移动设备当前使用的SIM卡信息与服务器中存储的包括IMEI的记录中的SIM卡信息是否匹配,并根据匹配结果确认是否移动设备被盗。具体地,若匹配结果为两者相同,则确认移动设备未被盗或被盗后已找回,若匹配结果为两者不同,则确认移动设备被盗。
确认移动设备被盗之后,数据匹配器450触发数据发送器440,由数据发送器440将移动设备档期使用的SIM卡信息加密后发送至服务器,由服务器在用户账户信息中写入移动设备已被盗的信息,并写入加密后的移动设备档期使用的SIM卡信息。另外,确认移动设备被盗之后,设置于移动设备上的客户端能够获取移动设备使用包括上述IMEI
的记录中的SIM卡时产生并存储在本地的通信信息,并将该通信信息上传至用户账户信息。
本发明实施例中,确认移动设备被盗之后,设置于移动设备上的客户端能够获取移动设备使用包括上述IMEI的记录中的SIM卡时产生并存储在本地的通信信息,并将该通信信息上传至用户账户信息,保证用户在找回丢失的移动设备之后,能够及时获取存储于被盗移动设备中的通信信息。即使被盗移动设备无法找回,利用包括上述IMEI的记录中的SIM卡信息也能够找回存储于被盗移动设备中的通信信息,降低因移动设备丢失带给用户的不便,保证用户的通信信息不会随用户移动设备的丢失而丢失。
基于上文各优选实施例提供的移动设备防盗处理方法及设备,基于同一发明构思,本发明实施例提供了一种服务器,用于实现上述移动设备防盗处理方法以及完善上述移动设备防盗处理客户端。图5示出了根据本发明一个实施例的服务器的结构示意图。如图5所示,本发明实施例的服务器500至少包括:数据接收器510、数据查询器520、存储器530、数据反馈器540以及数据写入器550。
现介绍本发明实施例的服务器500的各器件或组成的功能以及各部分间的连接关系。如图5所示的服务器500中,数据接收器510接收携带有移动设备的IMEI的查询请求,并触发数据查询器520。数据查询器520根据上述IMEI查询本地是否存储有包括该IMEI的记录。若根据数据查询器520的查询结果,服务器500本地未存储有包括上述IMEI的记录,则触发与其耦合的存储器530,由存储器530接收移动设备的IMEI、移动设备当前使用的SIM卡信息以及当前使用者的用户账户信息,将三者以相互映射关系生成记录并保存。
若根据数据查询器520的查询结果,服务器500本地存储有包括上述IMEI的记录,则数据查询器520触发欲求和的数据反馈器540,由数据反馈器540根据上述IMEI在包括上述IMEI的记录中查找到包括上述IMEI的记录中的SIM卡信息,并将该SIM卡信息反馈至查询请求发送方。
采用本发明实施例能够将移动设备的IMEI、移动设备当前使用的用户识别模块SIM卡信息以及当前使用者的用户账户信息三者以互相映射关系生成记录并保存至服务器,并且通过判断移动设备当前使用的SIM卡信息与服务器中存储的包括IMEI的记录中的SIM卡信息是否匹配确认移动设备是否被盗,避免现有技术中提到的盗窃者使用恢复出厂设置或刷机等方法破解移动设备防盗。进一步,本发明实施例中,将移动设备的相关信息上传至服务器,移动设备被盗之后,不论时间长短,当确认移动设备被盗时,服务器能够实时监测到被盗移动设备,解决了现有技术中由于存在查询时机,超过预定时间,则无法找回移动设备的问题,进而能够打击盗窃犯罪,降低盗窃犯罪率,保护用户的财产安全,保障用户的合法权益。
如上文所述,首先由服务器500中的数据接收器510接收携带有移动设备的国际移动身份码IMEI的查询请求,并触发与其耦合的数据查询器520,由数据查询器520查询服务器500本地是否存储有包括上述IMEI的记录,其次,根据数据查询器520的查询结
果进行下一步骤。
具体地,若根据数据查询器520的查询结果,服务器500本地未存储有包括上述IMEI的记录,则由存储器530接收移动设备的IMEI、移动设备当前使用的SIM卡信息以及当前使用者的用户账户信息,进而,将三者以相互映射关系生成记录并保存。若根据数据查询器520的查询结果,服务器500本地存储有包括上述IMEI的记录,则由数据反馈其540根据上述IMEI在包括IMEI的记录中查找到包括IMEI的记录中的SIM卡信息,并将该SIM卡信息反馈至查询请求发送方。可选地,本发明实施例中,查询请求发送方为设置在移动设备上的客户端。
当反馈至设置在移动设备上的客户端的包括上述IMEI的记录中的SIM卡信息与移动设备当前使用的SIM卡信息不匹配时,设置在移动设备上的客户端将移动设备当前使用的SIM卡信息进行加密,并将加密后的移动设备当前使用的SIM卡信息发送至服务器500。服务器500中的存储器530接收到上述客户端发送的移动设备当前使用的SIM卡信息之后,将该SIM卡信息写入用户账户信息。待被盗移动设备开启GPS之后,移动设备中的客户端获取移动设备的实时位置信息,并将该位置信息发送至服务器500,在服务器500上对被盗移动设备的实时位置信息进行显示,从而能够实时追踪到被盗移动设备的位置,增加找回被盗移动设备的可能性。
本发明实施例中,当确认移动设备被盗之后,被盗移动设备的前任使用者和继任使用者能够通过服务器500进行匿名通信。具体地,被盗移动设备的前任使用者通过云服务端传输消息至服务器500,由服务器500转发前任使用者的消息至继任使用者,继任使用者通过加密后的移动设备当前使用的SIM卡信息传输消息至服务器500,由服务器500转发至前任使用者。本发明实施例中,被盗移动设备的前任使用者以及继任使用者能够通过服务器500进行通信,通过两任使用者的通信能够提取线索抓取偷窃者,继而减少偷窃犯罪率。另外,本发明实施例中,被盗移动设备的前任使用者以及继任使用者之间进行通信时,两任使用者各自的信息是加密的,保证了两任使用者各自隐私的安全性。
另外,本发明实施例中,当用户移动设备丢失之后,用户能够登录服务器500,将移动设备报失。每个用户账户信息中的IMEI的标识默认为0,报失之后,由服务器500中的数据写入器550将存储在存储器530中的用户账户信息中的IMEI的标识修改为1,标识移动设备被盗,并将IMEI以及用户账户信息中UID存储在高速缓存表中。本发明实施例中,使用高速缓存表缓存移动设备的相关信息,当移动设备被盗,被盗者能够通过高速缓存表实时获取被盗移动设备的信息,而不用依赖现有技术中存在查询时机问题的查询机制。高速缓存表能够存储被盗移动设备的信息直到被盗移动设备被找回,当高速缓存表中缓存信息过大,数据量过大时,本发明实施例中的高速缓存表能够创建索引,保证实时返回被盗移动设备的相关信息。
当移动设备中插入移动设备当前使用的SIM卡之后,客户端发送IMEI至服务器500,服务器500中的数据接收器510接收移动设备发送的IMEI,扫描高速缓存表。若高速缓存表中存在上述IMEI,服务器500中的数据反馈器540根据UID查找到对应的记录,获
取其中包括所述IMEI的记录中的SIM卡信息,并反馈给客户端,以便客户端进行匹配,进而判断移动设备是否被盗。
根据上述任意一个优选实施例或多个优选实施例的组合,本发明实施例能够达到如下有益效果:
采用本发明实施例能够将移动设备的IMEI、移动设备当前使用的用户识别模块SIM卡信息以及当前使用者的用户账户信息三者以互相映射关系生成记录并保存至服务器,并且通过判断移动设备当前使用的SIM卡信息与服务器中存储的包括IMEI的记录中的SIM卡信息是否匹配确认移动设备是否被盗,避免现有技术中提到的盗窃者使用恢复出厂设置或刷机等方法破解移动设备防盗。进一步,本发明实施例中,将移动设备的相关信息上传至服务器,移动设备被盗之后,不论时间长短,当确认移动设备被盗时,服务器能够实时监测到被盗移动设备,解决了现有技术中由于存在查询时机,超过预定时间,则无法找回移动设备的问题,进而能够打击盗窃犯罪,降低盗窃犯罪率,保护用户的财产安全,保障用户的合法权益。
另外,本发明实施例中,使用高速缓存表缓存移动设备的相关信息,当移动设备被盗,被盗者能够通过高速缓存表实时获取被盗移动设备的信息,而不用依赖现有技术中存在查询时机问题的查询机制。高速缓存表能够存储被盗移动设备的信息直到被盗移动设备被找回,当高速缓存表中缓存信息过大,数据量过大时,本发明实施例中的高速缓存表能够创建索引,保证实时返回被盗移动设备的相关信息。
在此处所提供的说明书中,说明了大量具体细节。然而,能够理解,本发明的实施例可以在没有这些具体细节的情况下实践。在一些实例中,并未详细示出公知的方法、结构和技术,以便不模糊对本说明书的理解。
类似地,应当理解,为了精简本公开并帮助理解各个发明方面中的一个或多个,在上面对本发明的示例性实施例的描述中,本发明的各个特征有时被一起分组到单个实施例、图、或者对其的描述中。然而,并不应将该公开的方法解释成反映如下意图:即所要求保护的本发明要求比在每个权利要求中所明确记载的特征更多的特征。更确切地说,如下面的权利要求书所反映的那样,发明方面在于少于前面公开的单个实施例的所有特征。因此,遵循具体实施方式的权利要求书由此明确地并入该具体实施方式,其中每个权利要求本身都作为本发明的单独实施例。
本领域那些技术人员可以理解,可以对实施例中的设备中的模块进行自适应性地改变并且把它们设置在与该实施例不同的一个或多个设备中。可以把实施例中的模块或单元或组件组合成一个模块或单元或组件,以及此外可以把它们分成多个子模块或子单元或子组件。除了这样的特征和/或过程或者单元中的至少一些是相互排斥之外,可以采用任何组合对本说明书(包括伴随的权利要求、摘要和附图)中公开的所有特征以及如此公开的任何方法或者设备的所有过程或单元进行组合。除非另外明确陈述,本说明书(包括伴随的权利要求、摘要和附图)中公开的每个特征可以由提供相同、等同或相似目的的替代特征来代替。
此外,本领域的技术人员能够理解,尽管在此所述的一些实施例包括其它实施例中所包括的某些特征而不是其它特征,但是不同实施例的特征的组合意味着处于本发明的范围之内并且形成不同的实施例。例如,在下面的权利要求书中,所要求保护的实施例的任意之一都可以以任意的组合方式来使用。
本发明的各个部件实施例可以以硬件实现,或者以在一个或者多个处理器上运行的软件模块实现,或者以它们的组合实现。本领域的技术人员应当理解,可以在实践中使用微处理器或者数字信号处理器(DSP)来实现根据本发明实施例的移动设备防盗处理设备中的一些或者全部部件的一些或者全部功能。本发明还可以实现为用于执行这里所描述的方法的一部分或者全部的设备或者装置程序(例如,计算机程序和计算机程序产品)。这样的实现本发明的程序可以存储在计算机可读介质上,或者可以具有一个或者多个信号的形式。这样的信号可以从因特网网站上下载得到,或者在载体信号上提供,或者以任何其他形式提供。
例如,图6示出了可以实现根据本发明的移动设备防盗处理的计算设备。该计算设备传统上包括处理器610和存储器620形式的计算机程序产品或者计算机可读介质。存储器620可以是诸如闪存、EEPROM(电可擦除可编程只读存储器)、EPROM、硬盘或者ROM之类的电子存储器。存储器620具有用于存储执行上述方法中的任何方法步骤的程序代码的存储空间630。例如,用于程序代码的存储空间630可以包括分别用于实现上述方法中的各种步骤的各个程序代码631。这些程序代码可以从一个或者多个计算机程序产品中读出或者写入到这一个或者多个计算机程序产品中。这些计算机程序产品包括诸如硬盘,紧致盘(CD)、存储卡或者软盘之类的程序代码载体。这样的计算机程序产品通常为如图7所述的便携式或者固定存储单元。所述存储单元可以具有与图6的计算设备中的存储器620类似配置的存储段、存储空间等。所述程序代码可以任何适当形式进行压缩。通常,所述存储单元可包括计算机可读代码631’,所述计算机可读代码631’可以由诸如图6中处理器610之类的处理装置读取,当这些代码由计算设备运行时,导致该计算设备执行上面所描述的方法中的各个步骤。
本文中所称的“一个实施例”、“实施例”或者“一个或者多个实施例”意味着,结合实施例描述的特定特征、结构或者特性包括在本发明的至少一个实施例中。此外,请注意,这里“在一个实施例中”的词语不一定全指同一个实施例。
应该注意的是上述实施例对本发明进行说明而不是对本发明进行限制,并且本领域技术人员在不脱离所附权利要求的范围的情况下可设计出替换实施例。在权利要求中,不应将位于括号之间的任何参考符号构造成对权利要求的限制。单词“包含”不排除存在未列在权利要求中的元件或步骤。位于元件之前的单词“一”或“一个”不排除存在多个这样的元件。本发明可以借助于包括有若干不同元件的硬件以及借助于适当编程的计算机来实现。在列举了若干装置的单元权利要求中,这些装置中的若干个可以是通过同一个硬件项来具体体现。单词第一、第二、以及第三等的使用不表示任何顺序。可将这些单词解释为名称。
此外,还应当注意,本说明书中使用的语言主要是为了可读性和教导的目的而选择的,而不是为了解释或者限定本发明的主题。因此,在不偏离所附权利要求书的范围和精神的情况下,对于本技术领域的普通技术人员来说许多修改和变更都是显而易见的。对于本发明的范围,对本发明所做的公开是说明性的,而非限制性的,本发明的范围应当由所附权利要求书限定。
Claims (24)
- 一种移动设备防盗处理方法,包括:当检测到移动设备启用后,获取所述移动设备的国际移动设备身份码IMEI,并查询服务器中是否存储有包括所述IMEI的记录;若否,则将所述IMEI、所述移动设备当前使用的用户识别模块SIM卡信息以及当前使用者的用户账户信息发送至所述服务器,在所述服务器以互相映射关系生成记录并保存;若是,则判断所述移动设备当前使用的SIM卡信息与所述服务器中存储的包括所述IMEI的记录中的SIM卡信息是否匹配;根据匹配结果确认所述移动设备是否被盗。
- 根据权利要求1所述的方法,其中,判断所述移动设备当前使用的SIM卡信息与所述服务器中存储的包括所述IMEI的记录中的SIM卡信息是否匹配,包括:若匹配结果为两者相同,则确认所述移动设备未被盗或被盗后已找回;若匹配结果为两者不同,则确认所述移动设备被盗。
- 根据权利要求2所述的方法,其中,确认所述移动设备被盗之后,还包括:将所述移动设备当前使用的SIM卡信息加密后发送至所述服务器,由所述服务器在所述用户账户信息中写入所述移动设备已被盗。
- 根据权利要求2所述的方法,其中,确认所述移动设备被盗之后,还包括:待所述移动设备开启GPS功能,发送所述移动设备的实时位置信息至所述服务器,由所述服务器对所述移动设备的实时位置信息进行显示。
- 根据权利要求2至4任一项所述的方法,其中,确认所述移动设备被盗之后,还包括:获取所述移动设备使用包括所述IMEI的记录中的SIM卡时产生并存储在本地的通信信息;上传所述通信信息至所述用户账户信息。
- 根据权利要求1至5任一项所述的方法,其中,所述方法应用于设置在所述移动设备上的客户端。
- 一种移动设备防盗处理方法,包括:接收携带有移动设备的国际移动身份码IMEI的查询请求,查询本地是否存储有包括所述IMEI的记录;若否,接收所述IMEI、所述移动设备当前使用的用户识别模块SIM卡信息以及 当前使用者的用户账户信息,将三者以相互映射关系生成记录并保存;若是,根据所述IMEI在包括所述IMEI的记录中查找到包括所述IMEI的记录中的SIM卡信息,并反馈至查询请求发送方。
- 根据权利要求7所述的方法,其中,所述查询请求发送方为设置在所述移动设备上的客户端。
- 根据权利要求7或8所述的方法,其中,在所述用户账户信息中设置不同标识以标识所述移动设备是否丢失。
- 根据权利要求9所述的方法,其中,在所述用户账户信息中设置不同标识以标识所述移动设备是否丢失包括:当所述用户账户信息中IMEI对应标识为0时,标识所述移动设备未丢失;当所述用户账户信息中IMEI对应标识为1时,标识所述移动设备已丢失。
- 根据权利要求7至10任一项所述的方法,其中,还包括:当反馈至所述客户端的包括所述IMEI的记录中的SIM卡信息与所述移动设备当前使用的SIM卡信息不匹配时,接收所述客户端发送的所述移动设备当前使用的SIM卡信息;对所述移动设备当前使用的SIM卡信息进行加密;将加密后的所述移动设备当前使用的SIM卡信息写入所述用户账户信息。
- 根据权利要求11所述的方法,其中,接收所述客户端发送的所述移动设备当前使用的SIM卡信息之后,还包括:待所述移动设备开启GPS功能,获取所述移动设备的实时位置信息并进行显示。
- 根据权利要求11或12所述的方法,其中,接收所述客户端发送的所述移动设备当前使用的SIM卡信息之后,还包括:在所述移动设备的前任使用者和继任使用者之间进行匿名通信。
- 根据权利要求13所述的方法,其中,在所述移动设备的前任使用者和继任使用者之间进行匿名通信,包括:接收所述前任使用者通过云服务端传输的消息,并转发至所述继任使用者;接收所述继任使用者通过加密后的所述移动设备当前使用的SIM卡信息传输的消息,并转发至所述前任使用者。
- 根据权利要求10至14任一项所述的方法,其中,当所述用户账户信息中的IMEI对应标识为1时,将所述IMEI以及所述用户账户信息中的用户标识UID存储在高速缓存表中;根据所述IMEI在包括所述IMEI的记录中查找包括所述IMEI的记录中的SIM卡 信息,包括:在所述高速缓存表中查询所述IMEI;若所述高速缓存表中存在所述IMEI,根据所述UID查找到所述本地存储的包括所述IMEI的记录;在包括所述IMEI的记录中获取所述SIM卡信息。
- 根据权利要求7至15任一项所述的方法,其中,所述方法应用于服务器。
- 一种客户端,包括:检测器,配置为检测到移动设备启用;数据获取器,配置为获取所述移动设备的国际移动设备身份码IMEI;数据查询器,配置为查询服务器中是否存储有包括所述IMEI的记录;数据发送器,配置为将所述IMEI、所述移动设备当前使用的用户识别模块SIM卡信息以及当前使用者的用户账户信息发送至所述服务器,在所述服务器以互相映射关系生成记录并保存;数据匹配器,配置为判断所述移动设备当前使用的SIM卡信息与所述服务器中存储的包括所述IMEI的记录中的SIM卡信息是否匹配,并根据匹配结果确认是否所述移动设备被盗。
- 根据权利要求17所述的客户端,其中,所述数据匹配器还配置为:若匹配结果为两者相同,则确认所述移动设备未被盗或已找回;若匹配结果为两者不同,则确认所述移动设备被盗。
- 根据权利要求17或18所述的客户端,其中,所述客户端设置于移动设备上。
- 一种服务器,包括:数据接收器,配置为接收携带有移动设备的国际移动身份码IMEI的查询请求;数据查询器,配置为查询本地是否存储有包括所述IMEI的记录;存储器,配置为接收所述IMEI,所述移动设备当前使用的用户识别模块SIM卡信息以及当前使用者的用户账户信息,将三者以相互映射关系生成记录并保存;数据反馈器,配置为根据所述IMEI在包括所述IMEI的记录中查找到包括所述IMEI的记录中的SIM卡信息,并反馈至查询请求发送方。
- 根据权利要求20所述的服务器,还包括:数据写入器,配置为若所述移动设备丢失,在所述服务器中的用户账户信息中写入移动设备丢失信息。
- 根据权利要求21所述的服务器,还包括:数据写入器,配置为若所述移动设备丢失,在所述服务器中的用户账户信息中写入移动设备丢失信息。
- 一种计算机程序,包括计算机可读代码,当所述计算机可读代码在计算设备上运行时,导致所述计算设备执行根据权利要求1-16中的任一个所述的移动设备防盗处理方法。
- 一种计算机可读介质,其中存储了如权利要求23所述的计算机程序。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310551805.0A CN103648089B (zh) | 2013-11-07 | 2013-11-07 | 移动设备防盗处理方法及设备 |
CN201310551805.0 | 2013-11-07 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2015067102A1 true WO2015067102A1 (zh) | 2015-05-14 |
Family
ID=50253228
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2014/087170 WO2015067102A1 (zh) | 2013-11-07 | 2014-09-23 | 移动设备防盗处理方法及设备 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN103648089B (zh) |
WO (1) | WO2015067102A1 (zh) |
Families Citing this family (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103648089B (zh) * | 2013-11-07 | 2017-05-17 | 北京奇虎科技有限公司 | 移动设备防盗处理方法及设备 |
CN105100130A (zh) * | 2014-04-25 | 2015-11-25 | 北京奇虎科技有限公司 | 终端设备、终端设备防盗方法及系统 |
CN105100131A (zh) * | 2014-04-25 | 2015-11-25 | 北京奇虎科技有限公司 | 终端设备、终端设备防盗方法及系统 |
WO2016015199A1 (zh) * | 2014-07-28 | 2016-02-04 | 华为技术有限公司 | 锁定方法、装置、终端和服务器 |
CN104268189B (zh) * | 2014-09-17 | 2018-06-22 | 广州华多网络科技有限公司 | 评价应用的方法及装置 |
CN105578451A (zh) * | 2014-10-17 | 2016-05-11 | 中兴通讯股份有限公司 | 一种防盗方法及防盗装置 |
CN104506491B (zh) * | 2014-11-28 | 2018-11-23 | 小米科技有限责任公司 | 个人数据帐号管理方法及装置 |
CN106572462B (zh) * | 2015-10-13 | 2020-07-24 | 腾讯科技(深圳)有限公司 | 一种告警信息发送方法及装置 |
CN106612507A (zh) * | 2015-10-21 | 2017-05-03 | 中兴通讯股份有限公司 | 一种控制方法及装置 |
CN105635488A (zh) * | 2016-03-17 | 2016-06-01 | 广东欧珀移动通信有限公司 | 一种移动终端防盗处理的方法及设备 |
CN105704697B (zh) * | 2016-03-25 | 2019-06-04 | Oppo广东移动通信有限公司 | 网络侧实现移动设备丢失报警的方法和系统 |
CN105930749A (zh) * | 2016-05-09 | 2016-09-07 | 广东欧珀移动通信有限公司 | 移动终端防盗处理方法及装置 |
CN106454730A (zh) * | 2016-10-12 | 2017-02-22 | 深圳铂睿智恒科技有限公司 | 移动终端的防盗方法、系统及移动终端 |
CN106331169A (zh) * | 2016-10-14 | 2017-01-11 | 深圳天珑无线科技有限公司 | 一种移动终端挂失的方法及云客户端、云服务器、移动终端 |
CN106453375A (zh) * | 2016-11-04 | 2017-02-22 | 北京用友政务软件有限公司 | 一种智能终端的寻回方法和装置 |
CN106954196A (zh) * | 2017-02-14 | 2017-07-14 | 北京奇虎科技有限公司 | 一种电话号码的获取方法、装置及移动终端 |
CN106921959B (zh) * | 2017-04-26 | 2020-12-29 | 努比亚技术有限公司 | 移动终端的刷机方法、装置及刷机设备 |
CN107197102A (zh) * | 2017-06-29 | 2017-09-22 | 北京小米移动软件有限公司 | 通信请求处理方法、装置及存储介质 |
CN107368760A (zh) * | 2017-08-03 | 2017-11-21 | 北京奇安信科技有限公司 | 一种电子设备状态处理方法及装置 |
CN107580132B (zh) * | 2017-09-05 | 2020-05-08 | Oppo广东移动通信有限公司 | 信息发送方法、装置、存储介质及电子设备 |
US10970722B2 (en) * | 2017-11-14 | 2021-04-06 | Brightstar Corp. | Method, systems, and computer-readable storage media for real-time event management system for mobile devices |
CN107967327A (zh) * | 2017-11-24 | 2018-04-27 | 吉旗(成都)科技有限公司 | 一种sim卡自动识别、匹配的方法 |
CN109145022B (zh) * | 2018-08-15 | 2022-01-11 | Oppo(重庆)智能科技有限公司 | 移动设备网络身份标识写入方法、装置及存储介质 |
CN112637830B (zh) * | 2019-10-08 | 2022-10-14 | 中国移动通信集团浙江有限公司 | 终端找回方法、装置及网络设备 |
CN112460752B (zh) * | 2020-10-27 | 2022-03-18 | 珠海格力电器股份有限公司 | 分体式空调器的防盗控制方法、控制系统、空调器及终端 |
CN114666782B (zh) * | 2020-12-03 | 2023-12-12 | 中移物联网有限公司 | 卡号切换方法、装置、电子设备及定位系统 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1541015A (zh) * | 2003-10-31 | 2004-10-27 | 大唐微电子技术有限公司 | 应用国际移动设备识别码实现手机防盗的方法及其系统 |
CN101990209A (zh) * | 2009-07-30 | 2011-03-23 | 中国电信股份有限公司 | 移动终端丢失后提供查找线索的方法和系统 |
CN103052024A (zh) * | 2012-12-06 | 2013-04-17 | 广东欧珀移动通信有限公司 | 一种手机防盗方法、客户端及服务器 |
CN103648089A (zh) * | 2013-11-07 | 2014-03-19 | 北京奇虎科技有限公司 | 移动设备防盗处理方法及设备 |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1980457A (zh) * | 2005-11-30 | 2007-06-13 | 中兴通讯股份有限公司 | 一种网络侧实现报警的方法 |
CN102647508B (zh) * | 2011-12-15 | 2016-12-07 | 中兴通讯股份有限公司 | 一种移动终端及用户身份识别方法 |
-
2013
- 2013-11-07 CN CN201310551805.0A patent/CN103648089B/zh active Active
-
2014
- 2014-09-23 WO PCT/CN2014/087170 patent/WO2015067102A1/zh active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1541015A (zh) * | 2003-10-31 | 2004-10-27 | 大唐微电子技术有限公司 | 应用国际移动设备识别码实现手机防盗的方法及其系统 |
CN101990209A (zh) * | 2009-07-30 | 2011-03-23 | 中国电信股份有限公司 | 移动终端丢失后提供查找线索的方法和系统 |
CN103052024A (zh) * | 2012-12-06 | 2013-04-17 | 广东欧珀移动通信有限公司 | 一种手机防盗方法、客户端及服务器 |
CN103648089A (zh) * | 2013-11-07 | 2014-03-19 | 北京奇虎科技有限公司 | 移动设备防盗处理方法及设备 |
Also Published As
Publication number | Publication date |
---|---|
CN103648089A (zh) | 2014-03-19 |
CN103648089B (zh) | 2017-05-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2015067102A1 (zh) | 移动设备防盗处理方法及设备 | |
US10771963B2 (en) | Method and browser for browsing web page, and storage medium | |
CA2847708C (en) | Retrieving images | |
US9860703B2 (en) | Determining the last location of lost and stolen portable electronic devices when wireless communications access to the lost or stolen devices is lost or intermittent | |
US9215311B2 (en) | Mobile electronic device and method | |
WO2015085871A1 (zh) | 移动终端防盗方法及客户端 | |
WO2015096528A1 (zh) | 网络购物环境安全性检测方法及装置 | |
US9813605B2 (en) | Apparatus, method, and program product for tracking items | |
CN104486482A (zh) | 一种移动终端防盗追踪方法 | |
CN103581441B (zh) | 移动终端追踪防盗系统和方法 | |
US10252701B2 (en) | Object tracking system and method therewith | |
WO2015070654A1 (zh) | 基于Android的移动设备安全保护方法和装置 | |
US20170223539A1 (en) | Authentication method, wireless router and computer storage medium | |
WO2018121266A1 (zh) | 一种应用程序获取方法和装置以及一种终端设备 | |
CN112954043B (zh) | 基于网站访问日志识别用户的方法及计算机设备 | |
WO2018223998A1 (zh) | 业务过程的启动方法和装置 | |
CN104486745A (zh) | 一种移动终端防盗追踪装置 | |
WO2017107679A1 (zh) | 一种历史信息展示方法及装置 | |
JP2008233966A5 (zh) | ||
CN106612283B (zh) | 一种识别下载文件来源的方法及装置 | |
WO2015085942A1 (zh) | 终端状态查询方法、终端防盗方法及相应的设备 | |
TWI750252B (zh) | 記錄網站存取日誌的方法和裝置 | |
US20140040626A1 (en) | Anonymization and reattribution framework for offline identifiers | |
CN106845202B (zh) | 用于人脸识别系统的文件存取方法、装置和系统 | |
CN107968803B (zh) | 针对移动终端的远程取证方法、装置、移动终端和系统 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14860002 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 14860002 Country of ref document: EP Kind code of ref document: A1 |