WO2015085942A1 - 终端状态查询方法、终端防盗方法及相应的设备 - Google Patents
终端状态查询方法、终端防盗方法及相应的设备 Download PDFInfo
- Publication number
- WO2015085942A1 WO2015085942A1 PCT/CN2014/093638 CN2014093638W WO2015085942A1 WO 2015085942 A1 WO2015085942 A1 WO 2015085942A1 CN 2014093638 W CN2014093638 W CN 2014093638W WO 2015085942 A1 WO2015085942 A1 WO 2015085942A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- terminal
- query request
- query
- server
- information
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/88—Detecting or preventing theft or loss
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/22—Processing or transfer of terminal data, e.g. status or physical capabilities
- H04W8/24—Transfer of terminal data
Definitions
- the present invention relates to the field of Internet applications, and in particular, to a terminal status query method, a terminal anti-theft method, and a corresponding device.
- FIG. 1 is a schematic diagram showing the interface of the mobile phone anti-theft input verification information in the prior art.
- the interface prompts the phone to turn on the anti-theft function.
- the user needs to input the verification information to unlock the phone screen.
- the user needs to enter the family and friends number starting with 138 to unlock the mobile phone.
- the phone prompts to unlock the initiator and fails to unlock. Please wait for the owner to contact.
- the app cannot be opened.
- the unlocking initiator is photographed for forensics.
- the terminal anti-theft interface usually displays a warning message, indicating that the terminal is in a stolen state.
- the thief will be vigilant based on these warnings, and because he does not know the unlock verification information, he may abandon the input verification code to unlock, or even directly remove the battery to ensure that he will not be tracked.
- the existing terminal anti-theft method increases the degree of vigilance of the thief, and the time interval for taking the photo forensics by the terminal itself is longer, which increases the difficulty of the terminal recovery and the difficulty of solving the stolen terminal.
- the present invention has been made in order to provide a terminal status inquiry method, a terminal immobilization method, and a corresponding apparatus that overcome the above problems or at least partially solve or alleviate the above problems.
- the present invention provides a method for querying a terminal status, including: sending a query request to a server to query status information of a specified terminal, wherein the query request carries an identity of the specified terminal Receiving a query result returned by the server, wherein the server stores state information of the specified terminal, and the server receives the query request according to the identity identification information in the stored state information. Performing a query to obtain the query result; determining a current state of the designated terminal according to the query result.
- the present invention further provides a method for querying a terminal status, comprising: receiving a query request, wherein the query request carries identity identification information of a specified terminal; and the identity identifier of the designated terminal carried in the query request The information is queried in the status information stored in the server, and the status information of the specified terminal is queried to obtain a query result; and the query result is returned to the query request sender.
- the invention further provides a query client of the terminal state, comprising: a sender configured to send a query request to the server, and query status information of the specified terminal, wherein the query request carries the identity identification information of the designated terminal a receiver configured to receive a query result returned by the server, where the server stores state information of the designated terminal, and when the server receives the query request, the server stores the identifier information according to the identifier information.
- the query is performed in the status information to obtain the query result; the determiner is configured to determine a current state of the designated terminal according to the query result.
- the present invention further provides a server, comprising: a request receiver, configured to receive a query request, wherein the query request carries identity identification information of a specified terminal; and the querier is configured to be carried according to the query request.
- the identity information of the designated terminal is used to query the status information of the specified terminal in the state information stored in the server to obtain the query result.
- the result sender is configured to return the query result to the query request sender.
- the embodiment of the present invention sends a query request to the server, queries the status information of the specified terminal, and determines the current state of the terminal according to the query result returned by the received server, which can solve the prior art.
- the problem of the current state of the terminal could not be determined.
- the embodiment of the present invention if the thief conducts a transaction on the stolen terminal, the purchaser can inquire that the terminal is stolen, thereby stopping the transaction and providing clues to the thief, and even returning the stolen terminal to the owner. Therefore, the embodiment of the invention can avoid the purchase of the stolen terminal, increase the probability of the stolen terminal, and effectively curb the beneficial effect of the theft.
- the present invention provides a terminal anti-theft method, including: when a terminal is stolen, a password-free screen lock screen interface is generated and displayed; when an unlock command is received, the screen unlock operation is rejected, and an unlock command is obtained.
- a terminal anti-theft method including: when a terminal is stolen, a password-free screen lock screen interface is generated and displayed; when an unlock command is received, the screen unlock operation is rejected, and an unlock command is obtained.
- the identifiable information of the originator including: when a terminal is stolen, a password-free screen lock screen interface is generated and displayed; when an unlock command is received, the screen unlock operation is rejected, and an unlock command is obtained.
- the invention also provides a terminal anti-theft client, comprising: an anti-theft triggering module, configured to trigger an interface display module when the terminal is stolen; the interface display module is configured to generate a password-free screen lock screen interface and display; The module, configured to receive the unlock command, rejects the screen unlock operation and obtains identifiable information of the unlocking instruction initiator.
- the embodiment of the present invention when the terminal is stolen, a passwordless screen lock screen interface is generated and displayed.
- the thief checks the interface as a passwordless screen lock screen, it cannot find that the terminal has turned on the anti-theft function, and will relax the alarm and directly unlock the operation. Therefore, the embodiment of the present invention can delay the time when the thief in the prior art displays that the terminal has turned on the anti-theft function through the terminal interface, and prevents the thief from pulling out the terminal battery, closing the terminal, and the like, which is unfavorable for retrieving the stolen terminal.
- the unlocking after the unlocking instruction is received, the unlocking is rejected, and the identifiable information of the unlocking instruction initiator is obtained.
- the embodiment of the present invention can solve the problem that the photo taking evidence can be performed only after the unlocking fails in the prior art.
- the embodiment of the invention can avoid the problem that the time interval for taking photo forensics is long, which leads to the missed opportunity to obtain the identifiable information of the thief.
- the embodiment of the invention can generate a passwordless interface to relax the thief.
- the embodiment of the present invention can immediately obtain the identifiable information of the unlocking instruction initiator (ie, the thief), and does not need to wait for multiple unlocking failures before taking the photo forensics, thereby shortening the photo forensic time. Therefore, the method provided by the embodiment of the invention can increase the possibility of the user retrieving the terminal, and more reasonably and effectively ensure the security of the user property.
- a computer program comprising computer readable code causing the computing device to perform a query of a terminal status according to the present invention when the computer readable code is run on a computing device Method, and/or, terminal anti-theft method.
- a computer readable medium storing a computer program according to the present invention.
- FIG. 1 is a schematic diagram of an interface of a mobile phone anti-theft input verification code in the prior art
- FIG. 2 is a flowchart of a method for querying a terminal status according to an embodiment of the present invention
- FIG. 3 is a flowchart showing a process of another terminal status query method according to an embodiment of the present invention.
- FIG. 4 is a flowchart showing a process of a method for querying a terminal state according to a preferred embodiment of the present invention
- FIG. 5 is a flowchart showing a process of a method for querying a terminal state according to another preferred embodiment of the present invention.
- FIG. 6 is a flowchart showing a process of a method for querying a terminal state according to still another preferred embodiment of the present invention.
- FIG. 7 is a schematic structural diagram of a query client of a terminal state according to an embodiment of the present invention.
- FIG. 8 shows a schematic structural diagram of a server according to an embodiment of the present invention.
- FIG. 9 is a flowchart showing a process of a terminal immobilizing method according to an embodiment of the present invention.
- FIG. 10 is a flowchart showing a process of a terminal anti-theft method according to a preferred embodiment of the present invention.
- FIG. 11 is a schematic diagram showing a default lock screen interface of a mobile phone according to an embodiment of the present invention.
- FIG. 12 is a schematic diagram showing a passwordless screen interface according to an embodiment of the present invention.
- FIG. 13 is a schematic structural diagram of a terminal anti-theft client according to an embodiment of the present invention.
- Figure 14 is a block diagram schematically showing a computing device for performing a query method and/or a terminal theft prevention method for a terminal state according to the present invention
- Fig. 15 schematically shows a storage unit for holding or carrying a program code for implementing a query method according to the present invention, and/or a terminal immobilizer method.
- the status information of the terminal cannot be determined, and thus, the user is easy to purchase the stolen terminal, and the illegal behavior of stealing the terminal is promoted, which has bad consequences.
- FIG. 2 is a flowchart showing a process of a method for querying a terminal state according to an embodiment of the present invention. As shown in FIG. 2, the flow includes at least steps S202 to S206.
- Step S202 Send a query request to the server, and query status information of the specified terminal, where the query request carries the identity identification information of the designated terminal.
- Step S204 Receive a query result returned by the server, where the server stores state information of the specified terminal, and when the server receives the query request, the server performs a query according to the identity identification information in the stored state information, and obtains a query result.
- Step S206 Determine a current state of the designated terminal according to the query result.
- the query request is sent to the server, the status information of the specified terminal is queried, and the current status of the terminal is determined according to the query result returned by the received server, which can solve the problem that the terminal cannot be determined in the prior art.
- the problem with the current state For example, with the embodiment of the present invention, if the thief conducts a transaction on the stolen terminal, the purchaser can inquire that the terminal is stolen, thereby stopping the transaction and providing clues to the thief, and even returning the stolen terminal to the owner. Therefore, the embodiment of the invention can avoid the purchase of the stolen terminal, increase the probability of the stolen terminal, and effectively curb the beneficial effect of the theft.
- step S202 shown in FIG. 2 before performing step S202 shown in FIG. 2, the identity identification information of the terminal that needs to be queried is obtained. After obtaining the identity information, the embodiment of the present invention performs the step S202 shown in FIG. 2, and sends a query request carrying the identity identification information of the designated terminal to the server to query the status information of the designated terminal.
- the identity identification information of the terminal may be an International Mobile Equipment Identity (IMEI) of the terminal, and may be a user identity code (Identity, hereinafter referred to as ID) of the terminal, and may also be It is any identifiable information that can uniquely identify the terminal, which is not limited by the embodiment of the present invention.
- IMEI International Mobile Equipment Identity
- ID user identity code
- an embodiment of the present invention provides a terminal identity identifier.
- the terminal identity Known as the hardware ID of the terminal.
- the embodiment of the present invention acquires the hardware ID.
- the embodiment of the present invention first obtains the IMEI of the terminal and records it as the first character string.
- the embodiment of the present invention obtains the network card address of the stolen mobile terminal, and removes non-letter and non-numeric characters in the network card address, and the removed network card address is recorded as the second character string.
- the embodiment of the present invention obtains a serial number of a Central Processing Unit (CPU) of the terminal, which is recorded as a third character string.
- CPU Central Processing Unit
- the embodiment of the present invention merges the above three character strings in a predetermined order.
- the predetermined sequence may be that the three strings are merged in the first, second, and third order, and the three strings may be merged in the third, second, and first reverse order, and may be other reservations.
- the order of the present invention is not limited thereto.
- the embodiment of the present invention After merging the above-mentioned character strings, the embodiment of the present invention converts the combined result into an uppercase format and records it as the first result. After obtaining the first result, the embodiment of the present invention continues the operation of the message digest algorithm 5 (hereinafter referred to as MD5) to obtain the second result. Then, the embodiment of the present invention converts the second result into an uppercase format to obtain the hardware ID of the terminal.
- MD5 message digest algorithm 5
- the hardware ID of the terminal in the embodiment of the present invention can ensure that the query request received by the server is authentic and reliable by combining the IMEI of the terminal, the network card address, and the serial number of the CPU, and avoid receiving the disguise from the untrusted or malicious sender.
- the query request sent by the trusted party causes the server to return the status information of the terminal to the malicious sender, and leaks the status information of the terminal.
- the embodiment of the present invention sends a query request carrying the identity identification information of the terminal to the server.
- the server validates the query request according to the identity identifier information carried in the query request.
- the server searches for the status information of the corresponding terminal in the status information of the locally stored terminal according to the identity identification information carried in the query request, and returns the query result.
- the embodiment of the present invention can determine the state of the terminal according to the query result.
- the status information of the queried terminal may include that the terminal is stolen, not stolen, or the terminal is stolen and retrieved, and the like.
- the purchase terminal can immediately stop the transaction, help find the owner, return the mobile phone, and provide clues for the thief to help arrest the thief and further reduce Theft crime.
- the status information of the terminal in the embodiment of the present invention may further include other more detailed descriptions, such as the sale purchase status information of the terminal, such as the terminal not being sold, the terminal being used, and the terminal being resold, and may also be the current status of any other terminal.
- the status information is not limited in this embodiment of the present invention.
- the embodiment of the present invention can send a query request to the server, and determine the current state of the mobile phone according to the query result returned by the server. If the status information of the mobile phone is not stolen, the user can purchase the mobile phone. If the status information of the mobile phone is stolen, the user can refuse to purchase the mobile phone in time, and provide the thief's clue to the relevant department to help the lost owner to retrieve the stolen mobile phone.
- the sender of the query request may be set in a mobile terminal, such as a mobile phone, a laptop, etc., and send a query request in the form of short message or network.
- the sender in the embodiment of the present invention also Can be set to a terminal, such as a computer.
- the embodiment of the present invention can use the terminal to send the query request through the network.
- the status information of the terminal can be queried in time. For example, when the user purchases the terminal, the status information of the terminal is first queried, and whether to purchase is determined according to the query result.
- the user can purchase the terminal without risk. If the terminal is found to be a stolen terminal, the user can stop the transaction in time and return the stolen terminal to the owner, and at the same time help arrest the thief and effectively curb the theft crime.
- the embodiment of the present invention provides another method for querying the terminal status based on the query method of the terminal state provided by the foregoing preferred embodiments.
- FIG. 3 shows a process flow diagram of another method for querying a terminal status according to an embodiment of the present invention. As shown in FIG. 3, the flow includes at least steps S302 to S306.
- Step S302 Receive a query request, where the query request carries the identity identification information of the designated terminal.
- Step S304 Query the status information of the specified terminal in the status information stored in the server according to the identity information of the specified terminal carried in the query request, and obtain the query result.
- Step S306 returning the query result to the query request sender.
- the embodiment of the present invention receives the query request sent by the sender, queries the status information of the specified terminal, and returns the query result.
- the sender determines the current state of the terminal according to the query result returned by the server, which can be solved in the prior art.
- the problem with the current state of the terminal For example, with the embodiment of the present invention, if the thief conducts a transaction on the stolen terminal, the purchaser can inquire that the terminal is stolen, thereby stopping the transaction and providing clues to the thief, and even returning the stolen terminal to the owner. Therefore, the embodiment of the invention can avoid the purchase of the stolen terminal, increase the probability of the stolen terminal, and effectively curb the beneficial effect of the theft.
- the embodiment of the present invention receives the query request that is sent by the sender and carries the terminal identity information.
- the embodiment of the present invention performs legality verification on the received query request.
- the validity of the received query request is verified to avoid receiving the query request sent by the untrusted or malicious sender, so that the server queries the state information of the terminal and leaks the state information of the terminal to the criminal.
- the validity of the query request is verified by using the identity identification information of the terminal carried in the query request. If the identity information of the terminal carried in the query request matches the identity information stored locally by the server, the query request is verified by legality. If the identity information of the terminal carried in the query request cannot be matched with the identity information stored locally by the server, the query request cannot pass the legality verification.
- the embodiment of the present invention performs different operations according to whether the query request passes the legality verification. If the query request fails the legality verification, the embodiment of the present invention ignores the query request and does not perform any operation. If the query request passes the legality verification, the embodiment of the present invention performs step S304 as shown in FIG. 3, and queries the status information of the specified terminal in the state information stored locally by the server according to the identity identification information of the designated terminal carried in the query request. , get the query results. Preferably, in the embodiment of the present invention, the status information of the terminal is queried by using the identity information of the terminal as a primary key. For example, after the query request passes the legality verification, the hair is issued.
- the embodiment may query the status information of the terminal with the IMEI of the specified terminal and/or the user ID of the specified terminal and/or the hardware ID of the designated terminal as the primary key, and ensure that the obtained query result is the terminal specified in the query request. Then, the embodiment of the present invention continues to perform step S306 shown in FIG. 3, and returns the query result to the query request sender, and the sender performs a corresponding operation according to the query result. For example, if the terminal is a stolen terminal according to the result of the query, the user can immediately stop the transaction, provide a clue to the thief to help capture the thief, and return the stolen terminal to the owner.
- the identifier information of the terminal may be the IMEI of the terminal, and may be the user ID of the terminal, or may be any identifier information that can uniquely identify the terminal, such as the hardware ID of the terminal. Limited.
- the hardware ID of the terminal is comprehensive identity information that aggregates multiple terminal identity information.
- the hardware ID can ensure that the query request received by the server is authentic and reliable by combining the IMEI of the terminal, the network card address, and the serial number of the CPU.
- the query request is verified by using the hardware ID as the identity identification information. When the hardware IDs match, the IMEI, the network card address, and the CPU serial number of the terminal can be matched, and the query received by the embodiment of the present invention can be determined. The legality of the request.
- FIG. 4 is a flowchart of a method for querying a state of a terminal according to a preferred embodiment of the present invention. The method for querying the status of any of the above terminals is described, and the method for querying the state of the terminal is explained more clearly and easily.
- the preferred embodiment includes at least steps S402 to S412.
- the sender of the query request is set to the mobile phone, and the terminal is set as the designated mobile phone.
- Step S402 Acquire identity identification information of the specified mobile phone.
- Step S404 sending a query request to the server.
- the mobile phone may send a short message to send the query request to the server.
- the identity information of the designated mobile phone such as the IMEI number of the mobile phone or the hardware ID of the mobile phone
- Step S406 Determine whether the query request is legal.
- the server validates the query request according to the identity identification information carried in the query request. If the query request fails the legality verification, step S408 is performed. If the query request passes the legality verification, step S410 is performed.
- Step S408 The query request fails the legality verification, and the server ignores the query request.
- Step S410 The query request passes the legality verification, and the server queries the status information of the specified mobile phone.
- the server After the query request is verified by the legality, the server queries the status information of the specified mobile phone in the state information of the locally stored mobile phone by using the identity information carried in the query request as the primary key.
- Step S412 returning the query result.
- the server After the server queries the status information of the specified mobile phone, the query result is obtained, and the query result is sent to the query request sender through the short message.
- the user After receiving the query result, the user can determine whether the specified mobile phone is a stolen mobile phone according to the query result. If the designated mobile phone is not a stolen mobile phone, the user can purchase it. If the designated mobile phone is a stolen mobile phone, the user can stop the transaction, return the designated mobile phone to the owner, and provide the thief's clue to help capture the phone. The thief.
- FIG. 5 is a flowchart of a method for querying a state of a terminal according to another preferred embodiment of the present invention. The method for querying the status of any of the foregoing terminals is described, and the method for querying the state of the terminal is described in a clearer and more understandable manner. Referring to FIG. 5, the preferred embodiment includes at least steps S502 through S512.
- the sender of the query request is set to the mobile phone, and the terminal is set as the designated mobile phone.
- Step S502 Acquire identity identification information of the specified mobile phone.
- Step S504 sending a query request to the server.
- the mobile phone may select to send the query request to the server through the network.
- the identity information of the designated mobile phone such as the IMEI number of the mobile phone or the hardware ID of the mobile phone
- Step S506 determining whether the query request is legal.
- the server validates the query request according to the identity identification information carried in the query request. If the query request fails the legality verification, step S508 is performed. If the query request passes the legality verification, step S510 is performed.
- Step S508 The query request fails the legality verification, and the server ignores the query request.
- Step S510 The query request passes the legality verification, and the server queries the status information of the specified mobile phone.
- the server After the query request is verified by the legality, the server queries the status information of the specified mobile phone in the state information of the locally stored mobile phone by using the identity information carried in the query request as the primary key.
- Step S512 returning the query result.
- the server After the server queries the status information of the specified mobile phone, the query result is obtained, and the query result is sent to the query request sender through the network.
- the user After receiving the query result, the user can determine whether the specified mobile phone is a stolen mobile phone according to the query result. If the designated mobile phone is not a stolen mobile phone, the user can purchase it. If the designated mobile phone is a stolen mobile phone, the user can stop the transaction, return the designated mobile phone to the owner, and provide the thief's clue to help capture the thief.
- FIG. 6 is a flowchart of a method for querying a state of a terminal according to another preferred embodiment of the present invention. The method for querying the status of any of the foregoing terminals is described, and the method for querying the state of the terminal is described in a clearer and more understandable manner. Referring to FIG. 6, the preferred embodiment includes at least steps S602 through S612.
- the sender of the query request is set to the computer, and the terminal is set to the designated mobile phone.
- Step S602 Acquire identity identification information of the specified mobile phone.
- Step S604 sending a query request to the server.
- the user when the user purchases the mobile phone, after obtaining the identity information of the designated mobile phone (such as the IMEI number of the mobile phone or the hardware ID of the mobile phone), the user may choose to use the computer to send a query request to the server through the network. Wherein, before the user chooses to use the computer to send the query request, it is determined that the computer that sends the query request and the designated mobile phone can enter Data transmission, so that the computer can obtain the identity information of the specified mobile phone.
- the identity information of the designated mobile phone such as the IMEI number of the mobile phone or the hardware ID of the mobile phone
- Step S606 Determine whether the query request is legal.
- the server validates the query request according to the identity identification information carried in the query request. If the query request fails the legality verification, step S608 is performed. If the query request passes the legality verification, step S610 is performed.
- Step S608 The query request fails the legality verification, and the server ignores the query request.
- Step S610 The query request passes the legality verification, and the server queries the status information of the specified mobile phone.
- the server After the query request is verified by the legality, the server queries the status information of the specified mobile phone in the state information of the locally stored mobile phone by using the identity information carried in the query request as the primary key.
- Step S612 returning the query result.
- the server After the server queries the status information of the specified mobile phone, the query result is obtained, and the query result is sent to the query request sender through the network.
- the user After receiving the query result, the user can determine whether the specified mobile phone is a stolen mobile phone according to the query result. If the designated mobile phone is not a stolen mobile phone, the user can purchase it. If the designated mobile phone is a stolen mobile phone, the user can stop the transaction, return the designated mobile phone to the owner, and provide the thief's clue to help capture the thief.
- FIG. 7 is a schematic structural diagram of a query client of a terminal state according to an embodiment of the present invention.
- the query client of the terminal state of the embodiment of the present invention at least includes: a transmitter 720, a receiver 730, and a determiner 740.
- the sender 720 is configured to send a query request to the server to query status information of the specified terminal, where the query request carries the identity identification information of the designated terminal.
- the receiver 730 is coupled to the transmitter 720 and configured to receive a query result returned by the server, where the server stores status information of the specified terminal, and when the server receives the query request, the server performs the status information according to the identity information. Query and get the query result.
- a determiner 740 coupled to the receiver 730, is configured to determine a current state of the designated terminal based on the result of the query.
- the embodiment of the present invention sends a query request to the server, queries the status information of the specified terminal, and determines the current state of the terminal according to the query result returned by the received server, which can solve the problem that the current state of the terminal cannot be determined in the prior art. For example, with the embodiment of the present invention, if the thief conducts a transaction on the stolen terminal, the purchaser can inquire that the terminal is stolen, thereby stopping the transaction and providing clues to the thief, and even returning the stolen terminal to the owner. Therefore, the embodiment of the invention can avoid the purchase of the stolen terminal, increase the probability of the stolen terminal, and effectively curb the beneficial effect of the theft.
- the acquirer 710 acquires the identity information of the terminal. After the acquirer 710 acquires the identity information of the terminal, the transmitter 720 is triggered. Transmitter 720 Upon being triggered, a query request carrying the identity information of the terminal is sent to the server.
- the server After receiving the query request, the server validates the query request according to the identity identifier information carried in the query request. After the query request passes the validity verification, the server searches for the status information of the corresponding terminal in the status information of the locally stored terminal according to the identity identification information carried in the query request, and returns the query result.
- the receiver 730 in the client as shown in FIG. 7 receives the query result returned by the server and determines the current state of the terminal by the determiner 740 coupled thereto. For example, when the terminal is a mobile phone and the mobile phone is purchased, the client in the embodiment of the present invention sends a query request to the server, and determines the current state of the mobile phone according to the query result returned by the server.
- the user can purchase the mobile phone. If the status information of the mobile phone is not stolen, the user can refuse to purchase the mobile phone in time, and provide the thief's clue to the relevant department to help the lost owner to retrieve the stolen mobile phone.
- the identifier information of the terminal may be the IMEI of the terminal, and may be the user ID of the terminal, and may be any identifier information that can uniquely identify the terminal, which is not limited by the embodiment of the present invention.
- the query request received by the server is a query request that passes the legality verification.
- an embodiment of the present invention provides a terminal identity identifier.
- the terminal identity is the hardware ID of the terminal.
- the acquisition of the hardware ID is now described in detail.
- the above hardware ID is acquired by the acquirer 710 before the sender 720 sends the query request.
- the acquirer 710 first acquires the IMEI of the terminal, which is recorded as the first character string.
- the acquirer 710 obtains the network card address of the stolen mobile terminal, and removes non-alphanumeric and non-numeric characters in the network card address, and the removed network card address is recorded as the second character string.
- the acquirer 710 acquires the CPU serial number of the terminal, and records it as the third character string.
- the acquirer 710 merges the above three character strings in a predetermined order.
- the predetermined sequence may be that the three strings are merged in the first, second, and third order, and the three strings may be merged in the third, second, and first reverse order, and may be other reservations.
- the order of the present invention is not limited thereto.
- the acquirer 710 After merging the above strings, the acquirer 710 converts the merged result into an uppercase format and records it as the first result. After obtaining the first result, the embodiment of the present invention continues to perform the MD5 operation on the first result to obtain a second result. Thereafter, the acquirer 710 converts the second result into an uppercase format to obtain the hardware ID of the terminal.
- the hardware ID of the terminal in the embodiment of the present invention can ensure that the query request received by the server is authentic and reliable by combining the IMEI of the terminal, the network card address, and the serial number of the CPU, and avoid receiving the disguise from the untrusted or malicious sender.
- the query request sent by the trusted party causes the server to return the status information of the terminal to the malicious sender, and leaks the status information of the terminal.
- the status information of the terminal determined by the determiner 740 according to the query result may include that the terminal is stolen, not stolen, or the terminal is stolen and retrieved, and the like. If the determiner 740 determines that the current status information of the terminal is the stolen terminal according to the query result of the server, the purchase terminal can immediately stop the transaction, help find the owner, return the mobile phone, and provide the thief's clue to help arrest the thief. To further reduce theft crime. Further, the status information of the terminal in the embodiment of the present invention may further include other more detailed descriptions, such as the sale purchase status information of the terminal, such as the terminal not being sold, the terminal being used, and the terminal being resold, and may also be the current status of any other terminal. The status information is not limited in this embodiment of the present invention.
- the client can be set in a mobile terminal, such as a mobile phone, a notebook computer, etc.
- Send a query request in the form of a short message or a network may also be disposed in a terminal, such as a computer.
- the embodiment of the present invention can use the terminal to send the query request through the network.
- the status information of the terminal can be queried in time. For example, when the user purchases the terminal, the status information of the terminal is first queried, and whether to purchase is determined according to the query result.
- the user can purchase the terminal without risk. If the terminal is found to be a stolen terminal, the user can stop the transaction in time and return the stolen terminal to the owner, and at the same time help arrest the thief and effectively curb the theft crime.
- the embodiment of the present invention further provides a server for implementing the foregoing terminal state query method.
- FIG. 8 shows a schematic structural diagram of a server according to an embodiment of the present invention.
- the server of the embodiment of the present invention includes at least a request receiver 810, a querier 830, and a result sender 840.
- the request receiver 810 is configured to receive a query request, where the query request carries the identity identification information of the designated terminal.
- the querier 830 is coupled to the request receiver 810, and configured to query the status information of the specified terminal in the state information stored locally by the server according to the identity information of the specified terminal carried in the query request, to obtain a query result.
- the result sender 840 coupled to the querier 830, is configured to return the query result to the query request sender.
- the embodiment of the present invention receives the query request sent by the sender, queries the status information of the specified terminal, and returns the query result.
- the sender determines the current state of the terminal according to the query result returned by the server, which can be solved in the prior art.
- the problem with the current state of the terminal For example, with the embodiment of the present invention, if the thief conducts a transaction on the stolen terminal, the purchaser can inquire that the terminal is stolen, thereby stopping the transaction and providing clues to the thief, and even returning the stolen terminal to the owner. Therefore, the embodiment of the invention can avoid the purchase of the stolen terminal, increase the probability of the stolen terminal, and effectively curb the beneficial effect of the theft.
- the request receiver 810 in the server shown in FIG. 8 receives the query request that is sent by the sender and carries the terminal identity information. In order to ensure that the query request is authentic and reliable, avoid receiving the query request sent by the untrusted or malicious sender, causing the server to query the terminal's state information and reveal the terminal's state information to the criminal, the request receiver 810 triggers the determiner 820. The legality judgment is made on the received query request.
- the determiner 820 determines the legality of the query request by using the identity information of the terminal carried in the query request. If the identity information of the terminal carried in the query request matches the identity information stored locally by the server, the determiner 820 determines that the query request passes the legality verification. If the identity information of the terminal carried in the query request cannot be matched with the identity information stored locally by the server, the determiner 820 determines that the query request cannot pass the legality verification.
- the determiner 820 determines the validity of the query request, if the query request fails the legality verification, the server ignores the query request and does not perform any operation. If the query request passes the legality verification, the determiner 820 A querier 830 coupled thereto is triggered. After the querier 830 is triggered, the querier 830 queries the status information of the specified terminal in the state information stored in the server according to the identity information of the specified terminal carried in the query request, and obtains the query result. Preferably, the querier 830 queries the status information of the designated terminal by using the identity information of the terminal as a primary key.
- the embodiment of the present invention may query the status information of the terminal by using the IMEI of the specified terminal and/or the user ID of the designated terminal and/or the hardware ID of the designated terminal as the primary key to ensure the obtained query.
- the result is the terminal specified in the query request.
- the querier 830 obtains the query result
- the result sender 840 is triggered.
- the result sender 840 coupled with the querier 830 returns the query result to the query request sender, and the sender performs the corresponding operation based on the query result. For example, if the terminal is a stolen terminal according to the result of the query, the user can immediately stop the transaction, provide a clue to the thief to help capture the thief, and return the stolen terminal to the owner.
- the identifier information of the terminal may be the IMEI of the terminal, and may be the user ID of the terminal, or may be any identifier information that can uniquely identify the terminal, such as the hardware ID of the terminal. Limited.
- the hardware ID of the terminal is comprehensive identity information that aggregates multiple terminal identity information.
- the hardware ID can ensure that the query request received by the server is authentic and reliable by combining the IMEI of the terminal, the network card address, and the serial number of the CPU.
- the query request is verified by using the hardware ID as the identity identification information. When the hardware IDs match, the IMEI, the network card address, and the CPU serial number of the terminal can be matched, and the query received by the embodiment of the present invention can be determined. The legality of the request.
- the embodiment of the present invention can achieve the following beneficial effects:
- the embodiment of the present invention sends a query request to the server, queries the status information of the specified terminal, and determines the current state of the terminal according to the query result returned by the received server, which can solve the problem that the current state of the terminal cannot be determined in the prior art. For example, with the embodiment of the present invention, if the thief conducts a transaction on the stolen terminal, the purchaser can inquire that the terminal is stolen, thereby stopping the transaction and providing clues to the thief, and even returning the stolen terminal to the owner. Therefore, the embodiment of the invention can avoid the purchase of the stolen terminal, increase the probability of the stolen terminal, and effectively curb the beneficial effect of the theft.
- the related art also mentions that after the terminal is stolen, the thief can recognize that the terminal has turned on the anti-theft function according to the terminal display interface, and then abandon the unlocking of the terminal, thereby failing to obtain the identifiable information of the thief in time, thereby causing the terminal to be stolen. I can't find it later.
- FIG. 9 shows a process flow diagram of a method of preventing theft of a terminal according to an embodiment of the present invention. As shown in FIG. 9, the flow includes at least steps S902 to S904.
- Step S902 When it is determined that the terminal is stolen, a passwordless screen lock screen interface is generated and displayed.
- Step S904 When receiving the unlocking instruction, reject the screen unlocking operation, and obtain the identifiable information of the unlocking instruction initiator.
- a passwordless screen lock screen interface is generated and displayed.
- the thief checks the interface as a passwordless screen lock screen, it cannot find that the terminal has turned on the anti-theft function, and will relax the alarm and directly unlock the operation. Therefore, the embodiment of the present invention can delay the display of the thief in the prior art through the terminal interface display.
- the terminal has turned on the anti-theft function, it is not conducive to the operation of the stolen terminal to remove the terminal battery and close the terminal.
- the unlocking is rejected, and the identifiable information of the unlocking instruction initiator is obtained.
- the embodiment of the present invention can solve the problem that the photo taking evidence can be performed only after the unlocking fails in the prior art.
- the embodiment of the invention can avoid the problem that the time interval for taking photo forensics is long, which leads to the missed opportunity to obtain the identifiable information of the thief.
- the embodiment of the invention can generate a passwordless interface to relax the thief.
- the embodiment of the present invention can immediately obtain the identifiable information of the unlocking instruction initiator (ie, the thief), and does not need to wait for multiple unlocking failures before taking the photo forensics, thereby shortening the photo forensic time. Therefore, the method provided by the embodiment of the invention can increase the possibility of the user retrieving the terminal, and more reasonably and effectively ensure the security of the user property.
- the trusted party may be a server, or may be a friend or friend number set by the user when using the terminal. It is now explained separately as a trusted party.
- the server as a trusted party.
- the user logs in to the server, identifies the status of the terminal in the server, and modifies the terminal status to be stolen.
- the server sends the stolen command to the terminal to inform the terminal that it has been stolen.
- the number of friends and relatives in this example refers to the trusted number bound to the stolen terminal, such as the common phone number in the address book, the specified whitelist number, and so on.
- the stolen command is sent to the stolen terminal by the number of relatives and friends, and the terminal is confirmed to be stolen in time.
- the steps of the trusted party are different, the steps performed are different, but both play the same role in the embodiment of the present invention, that is, the terminal is determined to be stolen. After the determination, other operations are performed to avoid the bad consequences of the stolen terminal being unable to retrieve the stolen terminal due to the unsuccessful transmission of the stolen instruction.
- the embodiment of the present invention can also determine whether the terminal is stolen by detecting whether the Subscriber Identity Module (SIM) card of the terminal is replaced.
- SIM Subscriber Identity Module
- the embodiment of the invention can ensure that the terminal is found to be stolen in the event that the terminal is not found to be stolen, and the corresponding processing is performed on the stolen terminal in time.
- step S902 After determining that the terminal is stolen, the embodiment of the present invention performs step S902 shown in FIG. 9 to generate a passwordless lock screen interface and display it. After the passwordless screen is displayed, if an unlock command is received, step S904 is performed as shown, the screen unlock operation is rejected, and the identifiable information of the unlocking instruction initiator is obtained.
- the embodiment of the present invention after the terminal is lost, the lock screen state is entered.
- the embodiment of the present invention can obtain the identifiable information of the unlocking instruction initiator and generate a password input interface, prompting that the correct password needs to be input to unlock the screen.
- the password input interface requires the user to input a password to unlock.
- the embodiment of the present invention performs a screen unlocking operation. If the terminal receives an incorrect password, the embodiment of the present invention keeps the screen locked. If the password is entered incorrectly, it will usually be allowed to be entered again. If multiple password entries (for example, more than 3 times) are incorrect, in order to ensure terminal security, password input and any other operations may be prohibited for a certain period of time.
- the identifiable information of the unlocking instruction initiator may be any identifiable information that can be obtained by the terminal and unlocked by the initiator of the instruction.
- the front camera of the terminal can be used to take a picture of the unlocking instruction initiator, obtain a photo, and record the fingerprint of the unlocking instruction initiator.
- the photo or fingerprint of the unlocking instruction originator obtained in the embodiment of the present invention is unique to each person. Therefore, the identification information obtained by the embodiment of the present invention can directly, quickly and effectively find the pick-up or the thief of the stolen terminal, and ensure that the stolen terminal is retrieved, thereby reducing the theft rate of the terminal and reducing the crime of theft. rate.
- the embodiment of the present invention may send the identifiable information to the trusted party, and may also save the identifiable information for further processing.
- the embodiment of the present invention sends the identifiable information to a trusted party, such as a friend or a friend number bound by the server or the stolen terminal, or other trusted party, so as to ensure that the stolen user can obtain the theft in time.
- a trusted party such as a friend or a friend number bound by the server or the stolen terminal, or other trusted party, so as to ensure that the stolen user can obtain the theft in time.
- the identifiable information of the person, and according to the identifiable information, the thief is captured and the stolen terminal is retrieved.
- the layout and elements of the default lock screen interface of the terminal are different. For example, some terminals default to the lock screen interface by sliding down and unlocking the unlock button on the bottom of the screen. For another example, some terminal default lock screen interface unlocks the screen by dragging the slider from left to right.
- layout details between the lock screens of different terminals For example, obtaining the desktop wallpaper image resources currently set by the user, or the specific way of adding desktop clock space, will be different due to different terminals and different operating systems in the terminal. . Therefore, the layout of the passwordless screen generated in the embodiment of the present invention may be different according to different terminals and different operating systems used in the terminal.
- a passwordless screen that is the same as the default lock screen interface of the terminal may be generated, and a passwordless screen different from the default lock screen interface of the terminal may also be generated.
- the embodiment of the invention preferably generates the same passwordless screen as the default lock screen of the terminal.
- the password-free screen is the same as the default screen of the terminal, and the recognition degree is low, and the thief is prevented from recognizing that the terminal has opened the anti-theft function, thereby increasing the possibility of retrieving the stolen terminal. , efficient and reasonable protection of user property security.
- FIG. 3 is a flowchart of processing a terminal anti-theft method according to a preferred embodiment of the present invention, which is used to support the above-mentioned terminal anti-theft method, and the above-described terminal anti-theft method is explained more clearly and easily.
- the terminal is configured as a mobile phone for description.
- the preferred embodiment includes at least steps S1002 through S1012.
- Step S1002 The mobile phone is bound to a relative friend number.
- a friend and friend number may be set, and the friend and friend number may be the user's own mobile phone number, or may be the mobile phone number of the user's family member or friend, and ensure that the user's mobile phone is lost and can be sent in time with the relatives and friends. Anti-theft processing instructions to the stolen phone.
- Step S1004 Receive a stolen notification command sent by the relatives and friends to determine that the mobile phone is stolen.
- the stolen notification instruction is sent to the stolen mobile phone through the relative friends and friends number bound in step S1002. After the stolen mobile phone receives the stolen notification command sent by the relatives and friends, it can be determined that the mobile phone is stolen.
- Step S1006 Generate a passwordless screen interface for display, and wait for an unlock command.
- FIG. 11 is a schematic diagram of a default lock screen interface of a mobile phone according to an embodiment of the present invention
- FIG. 12 is a schematic diagram of a passwordless screen interface according to an embodiment of the present invention.
- the passwordless screen generated by the preferred embodiment has the same elements as the default lock screen interface.
- the wallpaper of the passwordless screen generated in the preferred embodiment and the default lock screen interface are the same wallpaper.
- Step S1008 Receive an unlock command, obtain identifiable information, and prompt a password input.
- the mobile phone After receiving the unlocking command, the mobile phone uses the terminal camera to take a photo of the unlocking instruction initiator, obtains a photo of the person who picked up the mobile phone or the thief, and also records the fingerprint of the initiator of the unlocking instruction, and saves the obtained identifiable information. To the mobile phone, and generate a screen lock screen interface that needs to input a password to display, prompting the unlocking instruction initiator to enter the password.
- Step S1010 Determine whether the password input is correct.
- step S1012 After receiving the password input by the initiator of the unlocking instruction, it is determined whether the password input is correct. If the entered password is correct, the screen unlocking operation is performed, and the process ends. If the password is entered incorrectly, the screen is kept locked, and step S1012 is performed.
- Step S1012 the acquired identifiable information is sent to the relatives and friends.
- the preferred embodiment After confirming that the note has been stolen, the preferred embodiment transmits the acquired identifiable information to the relatives and friends, and the process ends.
- the preferred embodiment it is possible to obtain a photo and/or fingerprint of the mobile phone picker or the thief in the case of determining that the mobile phone is stolen, and to find the mobile phone picker or the thief according to the photo and/or the fingerprint. Ensure that users can retrieve their mobile phones in time after the loss of their mobile phones, further reducing the rate of mobile phone theft and reducing the crime of theft.
- the embodiment of the present invention provides a terminal anti-theft client for implementing the above-mentioned terminal anti-theft method.
- FIG. 13 is a schematic structural diagram of a terminal anti-theft client according to an embodiment of the present invention.
- the terminal anti-theft client of the embodiment of the present invention includes at least an anti-theft trigger module 1310, an interface display module 1320, and a processing module 1330.
- the anti-theft trigger module 1310 is configured to trigger the interface display module 1320 when the terminal is determined to be stolen.
- the interface display module 1320 is coupled to the anti-theft trigger module 1310, configured to generate a passwordless screen lock screen interface and display.
- the processing module 1330 is coupled to the interface display module 1320, configured to reject the screen unlocking operation when receiving the unlocking instruction, and obtain the identifiable information of the unlocking instruction initiator.
- a passwordless screen lock screen interface is generated and displayed. Thief When the interface is a passwordless screen lock screen, you cannot find that the terminal has the anti-theft function enabled, and you will relax the alarm and directly unlock the operation. Therefore, the embodiment of the present invention can delay the time when the thief in the prior art displays that the terminal has turned on the anti-theft function through the terminal interface, and prevents the thief from pulling out the terminal battery, closing the terminal, and the like, which is unfavorable for retrieving the stolen terminal. According to an embodiment of the present invention, after the unlocking instruction is received, the unlocking is rejected, and the identifiable information of the unlocking instruction initiator is obtained.
- the embodiment of the present invention can solve the problem that the photo taking evidence can be performed only after the unlocking fails in the prior art.
- the embodiment of the invention can avoid the problem that the time interval for taking photo forensics is long, which leads to the missed opportunity to obtain the identifiable information of the thief.
- the embodiment of the invention can generate a passwordless interface to relax the thief.
- the embodiment of the present invention can immediately obtain the identifiable information of the unlocking instruction initiator (ie, the thief), and does not need to wait for multiple unlocking failures before taking the photo forensics, thereby shortening the photo forensic time. Therefore, the method provided by the embodiment of the invention can increase the possibility of the user retrieving the terminal, and more reasonably and effectively ensure the security of the user property.
- the anti-theft triggering module shown in FIG. 13 when the anti-theft triggering module shown in FIG. 13 receives the stolen notification instruction sent by the trusted party, it is determined that the terminal is stolen.
- the trusted party may be a server, or may be a friend or friend number set by the user when using the terminal. It is now explained separately as a trusted party.
- the server as a trusted party.
- the user can log in to the server, confirm the status of the terminal in the server, and modify the terminal status to be stolen. Subsequently, the server sends the stolen command to the terminal to confirm that the terminal has been stolen.
- the relatives and friends number in this example refers to the trusted number bound to the stolen terminal.
- the stolen instruction is sent to the terminal by the number of relatives and friends, and the terminal is confirmed to be stolen in time.
- the steps of the trusted party are different, the steps performed are different, but both play the same role in the embodiment of the present invention, that is, the terminal is determined to be stolen. After the determination, other operations are performed to avoid the bad consequences of the stolen terminal being unable to retrieve the stolen terminal due to the unsuccessful transmission of the stolen instruction.
- the anti-theft trigger module 1310 in the embodiment of the present invention can also determine whether the terminal is stolen by detecting whether the SIM card of the terminal is replaced.
- the SIM card is usually replaced, otherwise it is easy to trace back. Therefore, detecting whether the SIM card is replaced is an effective means for determining whether the terminal is stolen.
- the embodiment of the invention can ensure that the terminal is stolen in the event that the terminal is not found to be stolen, and the corresponding processing is performed on the stolen terminal in time.
- the interface display module 1320 is triggered. After the interface display module 1320 is triggered, a passwordless lock screen interface is generated and displayed. After the interface display module 1320 displays the passwordless lock screen interface, the processing module 1330 receives the lock screen command. When the processing module 1330 receives the lock screen command, the processing module 1330 rejects the screen unlocking operation and acquires the identifiable information of the unlocking instruction initiator. In the embodiment of the present invention, after the terminal is lost, the lock screen state is entered. When the terminal owner or the thief attempts to perform a screen unlocking operation on the terminal, the processing module 1330 generates a password input interface prompting that the correct password needs to be input to unlock the screen.
- the password input interface requires the user to input a password to unlock. If the terminal receives the correct password, the processing module 1330 performs a screen unlocking operation. If the terminal receives the wrong password, the processing module 1330 keeps the screen locked. If a password is entered once Mistakes usually allow you to enter again. If multiple password entries (for example, more than 3 times) are incorrect, in order to ensure terminal security, password input and any other operations may be prohibited for a certain period of time.
- the identifiable information of the unlocking instruction initiator may be any identifiable information that can be obtained by the terminal and unlocked by the initiator of the instruction.
- the front camera of the terminal can be used to take a picture of the unlocking instruction initiator, obtain a photo, and record the fingerprint of the unlocking instruction initiator.
- the photo or fingerprint of the unlocking instruction originator obtained in the embodiment of the present invention is unique to each person. Therefore, the identification information obtained by the embodiment of the present invention can directly, quickly and effectively find the pick-up or the thief of the stolen terminal, and ensure that the stolen terminal is retrieved, thereby reducing the theft rate of the terminal and reducing the crime of theft. rate.
- the embodiment of the present invention may send the identifiable information to the trusted party through the sending module 1340 as shown in FIG. 13, and may also save the identifiable information and wait for further processing.
- the sending module 1340 sends the identifiable information to the trusted party.
- the trusted party includes a friend or friend number bound by the server or the stolen terminal or other trusted party.
- the sending module 1340 sends the identifiable information to the trusted party to ensure that the stolen user can obtain the identifiable information of the thief in time, and capture the thief according to the identifiable information, and retrieve the stolen terminal.
- the layout and elements of the default lock screen interface of the terminal are different. For example, some terminals default to the lock screen interface by sliding down and unlocking the unlock button on the bottom of the screen. For another example, some terminal default lock screen interface unlocks the screen by dragging the slider from left to right.
- layout details between the lock screens of different terminals For example, obtaining the desktop wallpaper image resources currently set by the user, or the specific way of adding desktop clock space, will be different due to different terminals and different operating systems in the terminal. . Therefore, the layout of the passwordless screen generated in the embodiment of the present invention may be different according to different terminals and different operating systems used in the terminal.
- the password-free screen generated by the interface display module 1320 coupled with the terminal may be the same as the default lock screen interface of the terminal, or may be different.
- the passwordless screen is the same as the terminal default lock screen interface. Creating a passwordless screen that is different from the terminal default lock screen interface is easy for the thief to recognize that the terminal has turned on the anti-theft function, resulting in an opportunity to miss the thief-recognizable information.
- the password-free screen is the same as the default screen of the terminal, and the recognition degree is low, and the thief is prevented from recognizing that the terminal has opened the anti-theft function, thereby increasing the possibility of retrieving the stolen terminal. , efficient and reasonable protection of user property security.
- the embodiment of the present invention can achieve the following beneficial effects:
- a passwordless screen lock screen interface is generated and displayed.
- the thief checks the interface as a passwordless screen lock screen, it cannot find that the terminal has turned on the anti-theft function, and will relax the alarm and directly unlock the operation. Therefore, the embodiment of the present invention can delay the time when the thief in the prior art displays that the terminal has turned on the anti-theft function through the terminal interface, and prevents the thief from pulling out the terminal battery, closing the terminal, and the like, which is unfavorable for retrieving the stolen terminal. According to the embodiment of the present invention, after receiving the unlocking instruction, the unlocking can be refused and acquired. Unlock the identifiable information of the initiator of the instruction.
- the embodiment of the present invention can solve the problem that the photo taking evidence can be performed only after the unlocking fails in the prior art.
- the embodiment of the invention can avoid the problem that the time interval for taking photo forensics is long, which leads to the missed opportunity to obtain the identifiable information of the thief.
- the embodiment of the invention can generate a passwordless interface to relax the thief.
- the embodiment of the present invention can immediately obtain the identifiable information of the unlocking instruction initiator (ie, the thief), and does not need to wait for multiple unlocking failures before taking the photo forensics, thereby shortening the photo forensic time. Therefore, the method provided by the embodiment of the invention can increase the possibility of the user retrieving the terminal, and more reasonably and effectively ensure the security of the user property.
- modules in the devices of the embodiments can be adaptively changed and placed in one or more devices different from the embodiment.
- the modules or units or components of the embodiments may be combined into one module or unit or component, and further they may be divided into a plurality of sub-modules or sub-units or sub-components.
- any combination of the features disclosed in the specification, including the accompanying claims, the abstract and the drawings, and any methods so disclosed, or All processes or units of the device are combined.
- Each feature disclosed in this specification (including the accompanying claims, the abstract and the drawings) may be replaced by alternative features that provide the same, equivalent or similar purpose.
- the various component embodiments of the present invention may be implemented in hardware, or in a software module running on one or more processors, or in a combination thereof.
- a microprocessor or digital signal processor may be used in practice to implement some or all of the functionality of some or all of the devices or devices or clients in accordance with embodiments of the present invention.
- the invention can also be implemented as a device or device program (e.g., a computer program and a computer program product) for performing some or all of the methods described herein.
- a program implementing the invention may be stored on a computer readable medium or may be in the form of one or more signals. Such signals can be downloaded from the Internet website, or provided on the carrier signal, or Any other form is provided.
- FIG. 14 illustrates a computing device that can implement a method of querying a terminal state in accordance with the present invention, and/or a terminal theft prevention method.
- the computing device conventionally includes a processor 1410 and a computer program product or computer readable medium in the form of a memory 1420.
- the memory 1420 may be an electronic memory such as a flash memory, an EEPROM (Electrically Erasable Programmable Read Only Memory), an EPROM, a hard disk, or a ROM.
- Memory 1420 has a memory space 1430 for program code 1431 for performing any of the method steps described above.
- storage space 1430 for program code may include various program code 1431 for implementing various steps in the above methods, respectively.
- the program code can be read from or written to one or more computer program products.
- These computer program products include program code carriers such as hard disks, compact disks (CDs), memory cards or floppy disks.
- Such a computer program product is typically a portable or fixed storage unit as described with reference to FIG.
- the storage unit may have storage segments, storage spaces, and the like that are similarly arranged to memory 1420 in the computing device of FIG.
- the program code can be compressed, for example, in an appropriate form.
- the storage unit includes computer readable code 1431', ie, code that can be read by, for example, a processor such as 1410, which when executed by the computing device causes the computing device to perform each of the methods described above step.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
本发明提供了一种终端状态的查询方法及设备、终端防盗方法及设备。其中,终端状态的查询方法包括:发送查询请求至服务器,查询指定终端的状态信息,其中,查询请求中携带有指定终端的身份标识信息;接收服务器返回的查询结果,其中,服务器中存储有指定终端的状态信息,服务器接收到查询请求时根据身份标识信息在已存储的状态信息中进行查询,获得查询结果;根据查询结果确定指定终端的当前状态。本发明实施例能够解决现有技术无法确定终端的当前状态的问题,达到避免购买被盗终端的目的。终端防盗方法能够生成无密码界面使偷盗者放松警惕,进而能够获取到该解锁指令发起方的可识别信息,增大用户找回终端的可能性,合理有效保证用户财产安全。
Description
本发明涉及互联网应用领域,特别是涉及终端状态查询方法、终端防盗方法及相应的设备。
随着智能终端和网络的飞速发展,终端(包括电脑、手机、平板等多种设备)在人们生活中扮演的角色也越来越重要,越来越成为人们工作和生活中不可或缺的全方位“助手”。为方便使用,人们在使用终端的应用时通常会将各种账号信息、私人聊天记录以及图片照片等信息直接存储在终端。因此,若终端丢失,不仅会给用户带来财产损失,更为重要的是用户存储于终端内的私人信息,例如账号密码等财务信息。这些私人信息若被泄露,对用户造成的损失难以估计。
现实中,丢失的终端很可能被人不合法地出售给用户;而用户在购买终端时却不能确定终端是否为合法出售的终端。因为,现有技术缺乏有效的方法来确定终端的状态。偷盗者利用现有技术的缺陷将赃物(偷盗的手机等终端)出售给用户。这种技术缺陷导致偷盗者很容易将被盗终端出售,进一步促进了不法行为的发生。
另一方面,为了防止丢失终端中的私人信息不被泄露,终端的防盗十分重要。现有技术中,终端的防盗方法主要通过锁定移动设备屏幕实现。图1示出了现有技术中手机防盗输入验证信息的界面示意图。如图1所示,手机被盗之后,出现界面提示手机已开启防盗功能,用户需要输入验证信息才能够对手机屏幕进行解锁。如图1中,用户需要输入开头为138的亲友号码对手机进行解锁。当解锁失败,如图1所示,手机在界面提示解锁发起者解锁失败,请等待机主联系。另外,手机无法解锁时,也无法开启其中的应用。现有技术中,只有当被盗手机多次解锁失败(例如3次),才会进行对解锁发起者进行拍照取证。
并且,在现有技术中,若解锁失败,终端防盗界面通常会出现警示语,提示本终端处于被盗状态。偷盗者根据这些警示语会提高警惕,并且由于不知道解锁验证信息,可能放弃输入验证码解锁,甚至可能直接取出电池保证自己不会被追踪。
由上述现有技术可知,现有的终端防盗方法会增加偷盗者的警惕程度,利用终端自身进行拍照取证的时间间隔较长,相应增加了终端寻回的难度以及终端被盗的破案难度。
发明内容
鉴于上述问题,提出了本发明以便提供一种克服上述问题或者至少部分地解决或者减缓上述问题的终端状态查询方法、终端防盗方法及相应的设备。
依据本发明的一个方面,本发明提供了一种终端状态的查询方法,包括:发送查询请求至服务器,查询指定终端的状态信息,其中,所述查询请求中携带有所述指定终端的身份标识信息;接收所述服务器返回的查询结果,其中,所述服务器中存储有所述指定终端的状态信息,所述服务器接收到所述查询请求时根据所述身份标识信息在已存储的状态信息中进行查询,获得所述查询结果;根据所述查询结果确定所述指定终端的当前状态。
本发明还提供了一种终端状态的查询方法,包括:接收查询请求,其中,所述查询请求中携带有指定终端的身份标识信息;根据所述查询请求中携带的所述指定终端的身份标识信息在服务器本地存储的状态信息中对所述指定终端的状态信息进行查询,获得查询结果;返回所述查询结果至所述查询请求发送方。
本发明还提供了一种终端状态的查询客户端,包括:发送器,配置发送查询请求至服务器,查询指定终端的状态信息,其中,所述查询请求中携带有所述指定终端的身份标识信息;接收器,配置为接收所述服务器返回的查询结果,其中,所述服务器中存储有所述指定终端的状态信息,所述服务器接收到所述查询请求时根据所述身份标识信息在已存储的状态信息中进行查询,获得所述查询结果;确定器,配置为根据所述查询结果确定所述指定终端的当前状态。
本发明还提供了一种服务器,包括:请求接收器,配置为接收查询请求,其中,所述查询请求中携带有指定终端的身份标识信息;查询器,配置为根据所述查询请求中携带的所述指定终端的身份标识信息在服务器本地存储的状态信息中对所述指定终端的状态信息进行查询,获得查询结果;结果发送器,配置为返回查询结果至所述查询请求发送方。
基于本发明的终端状态的查询方法及设备,本发明实施例发送查询请求至服务器,查询指定终端的状态信息,并根据接收到的服务器返回的查询结果确定终端的当前状态,能够解决现有技术中无法确定终端的当前状态的问题。例如,采用本发明实施例,若偷盗者对被盗终端进行交易,购买者能够查询到终端被盗,进而停止交易并提供偷盗者的线索,甚至将被盗终端归还失主。因此,采用本发明实施例能够达到避免购买被盗终端,增加被盗终端的找回机率,并有效遏制偷盗行为的有益效果。
依据本发明的另一个方面,本发明提供了一种终端防盗方法,包括:确定终端被盗时,生成无密码屏幕锁屏界面并显示;接收解锁指令时,拒绝屏幕解锁操作,并获取解锁指令发起方的可识别信息。
本发明还提供了一种终端防盗客户端,包括:防盗触发模块,配置为确定终端被盗时,触发界面显示模块;所述界面显示模块,配置为生成无密码屏幕锁屏界面并显示;处理模块,配置为接收解锁指令时,拒绝屏幕解锁操作,并获取解锁指令发起方的可识别信息。
基于本发明的终端防盗方法及设备,在本发明实施例中,确定终端被盗时,生成无密码屏幕锁屏界面并显示。偷盗者查看该界面为无密码屏幕锁屏界面时,无法发现终端已开启了防盗功能,会放松警惕直接进行解锁操作。因此,本发明实施例能够延缓解决现有技术中偷盗者通过终端界面显示发现终端已开启防盗功能的时间,避免偷盗者进行拔出终端电池、关闭终端等不利于找回被盗终端的操作。依据本发明实施例能够在接收到解锁指令之后,拒绝解锁,并获取解锁指令发起方的可识别信息。因此,采用本发明实施例能够解决现有技术中只有解锁失败之后才能进行拍照取证的问题。本发明实施例能够避免因拍照取证的时间间隔较长,导致错过获取偷盗者可识别信息的最佳时机的问题。本发明实施例能够生成无密码界面使偷盗者放松警惕。当偷盗者对终端进行解锁,本发明实施例能够即时获取到该解锁指令发起方(即偷盗者)的可识别信息,无须等待多次解锁失败后才进行拍照取证,缩短拍照取证时间。因此,根据本发明实施例提供的方法能够增大用户找回终端的可能性,更加合理有效保证用户财产安全。
根据本发明的又一个方面,提供了一种计算机程序,其包括计算机可读代码,当所述计算机可读代码在计算设备上运行时,导致所述计算设备执行根据本发明的终端状态的查询方法,和/或,终端防盗方法。
根据本发明的再一个方面,提供了一种计算机可读介质,其中存储了根据本发明的计算机程序。
上述说明仅是本发明技术方案的概述,为了能够更清楚了解本发明的技术手段,而可依照说明书的内容予以实施,并且为了让本发明的上述和其它目的、特征和优点能够更明显易懂,以下特举本发明的具体实施方式。
通过阅读下文优选实施方式的详细描述,各种其他的优点和益处对于本领域普通技术人员将变得清楚明了。附图仅用于示出优选实施方式的目的,而并不认为是对本发明的限制。而且在整个附图中,用相同的参考符号表示相同的部件。在附图中:
图1示出了现有技术中手机防盗输入验证码的界面示意图;
图2示出了根据本发明一个实施例的一种终端状态的查询方法的处理流程图;
图3示出了根据本发明一个实施例的另一种终端状态的查询方法的处理流程图;
图4示出了根据本发明一个优选实施例的终端状态的查询方法的处理流程图;
图5示出了根据本发明另一个优选实施例的终端状态的查询方法的处理流程图;
图6示出了根据本发明又一个优选实施例的终端状态的查询方法的处理流程图;
图7示出了根据本发明一个实施例的终端状态的查询客户端的结构示意图;
图8示出了根据本发明一个实施例的服务器的结构示意图。
图9示出了根据本发明一个实施例的终端防盗方法的处理流程图;
图10示出了根据本发明一个优选实施例的终端防盗方法的处理流程图;
图11示出了根据本发明一个实施例的手机默认锁屏界面示意图;
图12示出了根据本发明一个实施例的无密码屏幕界面示意图;
图13示出了根据本发明一个实施例的终端防盗客户端的结构示意图;
图14示意性地示出了用于执行根据本发明的终端状态的查询方法和/或终端防盗方法的计算设备的框图;以及
图15示意性地示出了用于保持或者携带实现根据本发明的终端状态的查询方法,和/或终端防盗方法的的程序代码的存储单元。
下面结合附图和具体的实施方式对本发明作进一步的描述。
相关技术中提及,无法确定终端的状态信息,因此,导致用户容易购买被盗终端,促进偷盗终端的不法行为,产生恶劣后果。
为解决上述技术问题,本发明实施例提供了一种终端状态的查询方法。图2示出了根据本发明一个实施例的一种终端状态的查询方法的处理流程图。如图2所示,该流程至少包括步骤S202至步骤S206。
步骤S202、发送查询请求至服务器,查询指定终端的状态信息,其中,查询请求中携带有指定终端的身份标识信息。
步骤S204、接收服务器返回的查询结果,其中,服务器中存储有指定终端的状态信息,服务器接收到查询请求时根据身份标识信息在已存储的状态信息中进行查询,获得查询结果。
步骤S206、根据查询结果确定指定终端的当前状态。
本发明实施例的终端状态的查询方法中,发送查询请求至服务器,查询指定终端的状态信息,并根据接收到的服务器返回的查询结果确定终端的当前状态,能够解决现有技术中无法确定终端的当前状态的问题。例如,采用本发明实施例,若偷盗者对被盗终端进行交易,购买者能够查询到终端被盗,进而停止交易并提供偷盗者的线索,甚至将被盗终端归还失主。因此,采用本发明实施例能够达到避免购买被盗终端,增加被盗终端的找回机率,并有效遏制偷盗行为的有益效果。
本发明实施例中,执行如图2所示的步骤S202之前,获取需要查询的终端的身份标识信息。获取到身份标识信息之后,本发明实施例执行如图2所示的步骤S202,发送携带有指定终端的身份标识信息的查询请求至服务器,查询指定终端的状态信息。
本发明实施例中,终端的身份标识信息可以是终端的国际移动设备身份识别码(International Mobile Equipment Identity,以下简称IMEI),可以是终端的用户身份标识码(Identity,以下简称ID),还可以是任意能够唯一标识终端的身份标识信息,本发明实施例对此并不加以限定。为提高终端的安全性,确定服务器接收到的查询请求为通过合法性验证的查询请求。优选地,本发明实施例提供一种终端身份标识。该终端身份标
识为终端的硬件ID。
现对该硬件ID的获取进行具体介绍。如上文所述,本发明实施例发送查询请求之前,获取上述硬件ID。本发明实施例首先获取终端的IMEI,记为第一字符串。其次,本发明实施例获取被盗移动终端的网卡地址,并去除网卡地址中的非字母以及非数字字符,去除后的网卡地址记为第二字符串。获取到第一字符串以及第二字符串之后,本发明实施例获取终端的中央处理器(Central Processing Unit,以下简称CPU)串号,记为第三字符串。获取到第一、第二以及第三字符串之后,本发明实施例按预定顺序合并上述三个字符串。其中,该预定顺序可以是按第一、第二、第三的顺序合并上述三个字符串,可以是按第三、第二、第一的倒序合并上述三个字符串,还可以是其他预定的顺序,本发明实施例对此并不加以限定。
合并上述字符串之后,本发明实施例将合并后得到的结果转换为大写格式,并记为第一结果。获取到第一结果之后,本发明实施例继续将该第一结果进行消息摘要算法第五版(Message Digest Algorithm 5,以下简称MD5)运算,得到第二结果。之后,本发明实施例将该第二结果转换为大写格式得到终端的硬件ID。
本发明实施例中终端的硬件ID通过将终端的IMEI、网卡地址以及CPU的串号进行合并运算能够保证服务器接收的查询请求是真实有效可信的,避免接收来自不可信或恶意发送端伪装成可信任方发送的查询请求导致服务器返回终端的状态信息至恶意发送端,泄露终端的状态信息。
如上文所述,本发明实施例发送携带有终端的身份标识信息的查询请求至服务器。服务器接收到查询请求之后,根据查询请求中携带的身份标识信息对该查询请求进行合法性验证。当查询请求通过合法性验证之后,服务器根据查询请求中携带的身份标识信息在本地存储的终端的状态信息中查找到对应的终端的状态信息,并返回查询结果。本发明实施例接收到服务器返回的查询结果之后,根据该查询结果能够确定终端的状态。
本发明实施例中,查询到的终端的状态信息可以包括终端被盗、未被盗或者终端被盗后找回等等。若根据服务器的查询结果,确定终端的当前状态信息为终端被盗,则购买终端者能够立刻停止交易,帮助找到失主,归还手机,并且能够提供偷盗者的线索,帮助抓捕偷盗者,进一步减少盗窃犯罪。进一步,本发明实施例的终端的状态信息还可以包括其他更为详细的说明,例如包括终端未出售、终端使用中以及终端被转卖等终端的出售购买状态信息,还可以是其他任意终端的当前状态信息,本发明实施例对此并不加以限定。
例如,当终端为手机,购买手机时,本发明实施例能够发送查询请求至服务器,并根据服务器返回的查询结果确定当前手机的状态。若手机的状态信息为未被盗,则用户能够购买手机。若手机的状态信息为被盗,则用户能够及时拒绝购买该手机,同时提供偷盗者的线索至相关部门,帮助失主寻回被盗手机。
另外,本发明实施例中,查询请求的发送方可以设置于移动终端,例如手机,笔记本电脑等等,并通过短信息或者网络的形式发送查询请求。本发明实施例中的发送方还
可以设置于终端,例如电脑。当该终端与查询请求中携带的身份标识信息对应的终端之间成功建立连接,能够进行数据传输之后,本发明实施例能够利用该终端通过网络的形式发送上述查询请求。采用本发明实施例,能够及时查询终端的状态信息。例如,当用户购买终端时,首先对该终端的状态信息进行查询,并根据查询结果决定是否购买。若查询到终端不是被盗终端,则用户能够不存在风险地购买该终端。若查询到终端为被盗终端,则用户能够及时停止交易,并将被盗终端归还失主,同时帮助抓捕偷盗者,有效遏制偷窃犯罪的发生。
基于上文各优选实施例提供的终端状态的查询方法,基于同一发明构思,本发明实施例提供另一种终端状态的查询方法。
图3示出了根据本发明一个实施例的另一种终端状态的查询方法的处理流程图。如图3所示,该流程至少包括步骤S302至步骤S306。
步骤S302、接收查询请求,其中,查询请求中携带有指定终端的身份标识信息。
步骤S304、根据查询请求中携带的指定终端的身份标识信息在服务器本地存储的状态信息中对指定终端的状态信息进行查询,获得查询结果。
步骤S306、返回查询结果至查询请求发送方。
本发明实施例接收发送方发送的查询请求,查询指定终端的状态信息,并返回查询结果,由发送方根据接收到的服务器返回的查询结果确定终端的当前状态,能够解决现有技术中无法确定终端的当前状态的问题。例如,采用本发明实施例,若偷盗者对被盗终端进行交易,购买者能够查询到终端被盗,进而停止交易并提供偷盗者的线索,甚至将被盗终端归还失主。因此,采用本发明实施例能够达到避免购买被盗终端,增加被盗终端的找回机率,并有效遏制偷盗行为的有益效果。
如图3所示的步骤S302执行完毕之后,本发明实施例接收到发送方发送的携带有终端身份标识信息的查询请求。为保证服务器接收到的查询请求是真实有效可信的,本发明实施例对接收到的查询请求进行合法性验证。本发明实施例通过对接收到的查询请求进行合法性验证,避免接收来自不可信或恶意发送端发送的查询请求导致服务器查询终端的状态信息并泄露终端的状态信息至不法分子。
本发明实施例中,利用查询请求中携带的终端的身份标识信息对查询请求的合法性进行验证。若查询请求中携带的终端的身份标识信息与服务器本地存储的身份标识信息能够匹配,则查询请求通过合法性验证。若查询请求中携带的终端的身份标识信息与服务器本地存储的身份标识信息不能够匹配,则查询请求不能通过合法性验证。
对查询请求进行合法性验证之后,本发明实施例根据查询请求是否通过合法性验证执行不同的操作。若查询请求未通过合法性验证,本发明实施例忽略该查询请求不执行任何操作。若查询请求通过合法性验证,本发明实施例执行如图3所示的步骤S304,根据查询请求中携带的指定终端的身份标识信息在服务器本地存储的状态信息中对指定终端的状态信息进行查询,获得查询结果。优选地,本发明实施例中以终端的身份标识信息为主键对指定终端的状态信息进行查询。例如,查询请求通过合法性验证之后,本发
明实施例可以以指定终端的IMEI和/或指定终端的用户ID和/或指定终端的硬件ID为主键对终端的状态信息进行查询,保证获得的查询结果为查询请求中指定的终端。之后,本发明实施例继续执行如图3所示的步骤S306,将该查询结果返回至查询请求发送方,由发送方根据该查询结果执行相应操作。例如,若根据查询结果,该终端为被盗终端,则用户能够立即停止交易,提供偷盗者的线索帮助抓获偷盗者,并将被盗终端归还失主。
本发明实施例中,终端的身份标识信息可以是终端的IMEI,可以是终端的用户ID,还可以是终端的硬件ID等任意能够唯一标识终端的身份标识信息,本发明实施例对此并不加以限定。其中,终端的硬件ID为汇集多种终端身份标识信息的、综合的身份标识信息。硬件ID通过将终端的IMEI、网卡地址以及CPU的串号进行合并运算能够保证服务器接收的查询请求是真实有效可信的。若本发明实施例中以硬件ID为身份标识信息对查询请求进行验证,当硬件ID匹配,则终端的IMEI、网卡地址以及CPU串号均能够匹配,则能够确定本发明实施例接收到的查询请求的合法性。
现以具体实施例对本发明的终端状态的查询方法进行说明。
实施例一
图4示出了根据本发明一个优选实施例的终端状态的查询方法的处理流程图,用于支持上述任意一个终端状态的查询方法,将上述终端状态的查询方法阐述得更加清晰易懂。参见图4,该优选实施例至少包括步骤S402至步骤S412。
需要说明的是,为将本优选实施例阐述得简单明白,本优选实施例中,将查询请求的发送方设置于手机,终端设置为指定手机。
步骤S402、获取指定手机的身份标识信息。
步骤S404、发送查询请求至服务器。
具体地,当用户购买手机时,获取到该指定手机的身份标识信息(如手机的IMEI号码或者手机的硬件ID)之后,可以选择使用手机发送短信息将查询请求发送至服务器。
步骤S406、判断查询请求是否合法。
服务器接收到查询请求之后,根据查询请求中携带的身份标识信息对查询请求进行合法性验证。若查询请求未通过合法性验证,执行步骤S408.若查询请求通过合法性验证,执行步骤S410。
步骤S408、查询请求未通过合法性验证,服务器忽略该查询请求。
步骤S410、查询请求通过合法性验证,服务器查询指定手机的状态信息。
查询请求通过合法性验证之后,服务器以查询请求中携带的身份标识信息为主键在本地存储的手机的状态信息中对该指定手机的状态信息进行查询。
步骤S412、返回查询结果。
服务器对指定手机的状态信息进行查询之后,得到查询结果,并通过短信息发送该查询结果至查询请求发送方。用户接收到查询结果之后,根据查询结果,能够判断指定手机是否为被盗手机。若该指定手机不是被盗手机,则用户可以购买。若该指定手机为被盗手机,用户能够停止交易,将该指定手机归还失主,并提供偷盗者的线索帮助抓获
偷盗者。
实施例二
图5示出了根据本发明另一个优选实施例的终端状态的查询方法的处理流程图,用于支持上述任意一个终端状态的查询方法,将上述终端状态的查询方法阐述得更加清晰易懂。参见图5,该优选实施例至少包括步骤S502至步骤S512。
需要说明的是,为将本优选实施例阐述得简单明白,本优选实施例中,将查询请求的发送方设置于手机,终端设置为指定手机。
步骤S502、获取指定手机的身份标识信息。
步骤S504、发送查询请求至服务器。
具体地,当用户购买手机时,获取到该指定手机的身份标识信息(如手机的IMEI号码或者手机的硬件ID)之后,可以选择使用手机通过网络发送查询请求至服务器。
步骤S506、判断查询请求是否合法。
服务器接收到查询请求之后,根据查询请求中携带的身份标识信息对查询请求进行合法性验证。若查询请求未通过合法性验证,执行步骤S508.若查询请求通过合法性验证,执行步骤S510。
步骤S508、查询请求未通过合法性验证,服务器忽略该查询请求。
步骤S510、查询请求通过合法性验证,服务器查询指定手机的状态信息。
查询请求通过合法性验证之后,服务器以查询请求中携带的身份标识信息为主键在本地存储的手机的状态信息中对该指定手机的状态信息进行查询。
步骤S512、返回查询结果。
服务器对指定手机的状态信息进行查询之后,得到查询结果,并通过网络发送该查询结果至查询请求发送方。用户接收到查询结果之后,根据查询结果,能够判断指定手机是否为被盗手机。若该指定手机不是被盗手机,则用户可以购买。若该指定手机为被盗手机,用户能够停止交易,将该指定手机归还失主,并提供偷盗者的线索帮助抓获偷盗者。
实施例三
图6示出了根据本发明又一个优选实施例的终端状态的查询方法的处理流程图,用于支持上述任意一个终端状态的查询方法,将上述终端状态的查询方法阐述得更加清晰易懂。参见图6,该优选实施例至少包括步骤S602至步骤S612。
需要说明的是,为将本优选实施例阐述得简单明白,本优选实施例中,将查询请求的发送方设置于电脑,终端设置为指定手机。
步骤S602、获取指定手机的身份标识信息。
步骤S604、发送查询请求至服务器。
具体地,当用户购买手机时,获取到该指定手机的身份标识信息(如手机的IMEI号码或者手机的硬件ID)之后,可以选择使用电脑通过网络发送查询请求至服务器。其中,用户选择使用电脑发送查询请求之前,确定发送查询请求的电脑与指定手机能够进
行数据传输,以便电脑获取到指定手机的身份标识信息。
步骤S606、判断查询请求是否合法。
服务器接收到查询请求之后,根据查询请求中携带的身份标识信息对查询请求进行合法性验证。若查询请求未通过合法性验证,执行步骤S608.若查询请求通过合法性验证,执行步骤S610。
步骤S608、查询请求未通过合法性验证,服务器忽略该查询请求。
步骤S610、查询请求通过合法性验证,服务器查询指定手机的状态信息。
查询请求通过合法性验证之后,服务器以查询请求中携带的身份标识信息为主键在本地存储的手机的状态信息中对该指定手机的状态信息进行查询。
步骤S612、返回查询结果。
服务器对指定手机的状态信息进行查询之后,得到查询结果,并通过网络发送该查询结果至查询请求发送方。用户接收到查询结果之后,根据查询结果,能够判断指定手机是否为被盗手机。若该指定手机不是被盗手机,则用户可以购买。若该指定手机为被盗手机,用户能够停止交易,将该指定手机归还失主,并提供偷盗者的线索帮助抓获偷盗者。
基于上文各优选实施例提供的终端状态的查询方法,基于同一发明构思,本发明实施例提供了一种终端状态的查询客户端,用于实现上述终端状态的查询方法。
图7示出了根据本发明一个实施例的终端状态的查询客户端的结构示意图。参见图7,本发明实施例的终端状态的查询客户端至少包括:发送器720、接收器730以及确定器740。
现介绍本发明实施例的终端状态的查询客户端的各器件或组成的功能以及各部分间的连接关系:
发送器720,配置发送查询请求至服务器,查询指定终端的状态信息,其中,查询请求中携带有指定终端的身份标识信息。
接收器730,与发送器720相耦合,配置为接收服务器返回的查询结果,其中,服务器中存储有指定终端的状态信息,服务器接收到查询请求时根据身份标识信息在已存储的状态信息中进行查询,获得查询结果。
确定器740,与接收器730相耦合,配置为根据查询结果确定指定终端的当前状态。
本发明实施例发送查询请求至服务器,查询指定终端的状态信息,并根据接收到的服务器返回的查询结果确定终端的当前状态,能够解决现有技术中无法确定终端的当前状态的问题。例如,采用本发明实施例,若偷盗者对被盗终端进行交易,购买者能够查询到终端被盗,进而停止交易并提供偷盗者的线索,甚至将被盗终端归还失主。因此,采用本发明实施例能够达到避免购买被盗终端,增加被盗终端的找回机率,并有效遏制偷盗行为的有益效果。
如图7所示,发送器720发送查询请求至服务器之前,获取器710获取终端的身份标识信息。获取器710获取到终端的身份标识信息之后,触发发送器720。发送器720
受到触发,发送携带有终端的身份标识信息的查询请求至服务器。
服务器接收到查询请求之后,根据查询请求中携带的身份标识信息对该查询请求进行合法性验证。当查询请求通过合法性验证之后,服务器根据查询请求中携带的身份标识信息在本地存储的终端的状态信息中查找到对应的终端的状态信息,并返回查询结果。如图7所示的客户端中的接收器730接收服务器返回的查询结果,并由与其耦合的确定器740确定终端的当前状态。例如,当终端为手机,购买手机时,本发明实施例的客户端发送查询请求至服务器,并根据服务器返回的查询结果确定当前手机的状态。若手机的状态信息为未被盗,则用户能够购买手机。若手机的状态信息为被盗,则用户能够及时拒绝购买该手机,同时提供偷盗者的线索至相关部门,帮助失主寻回被盗手机。
本发明实施例中,终端的身份标识信息可以是终端的IMEI,可以是终端的用户ID,还可以是任意能够唯一标识终端的身份标识信息,本发明实施例对此并不加以限定。为提高终端的安全性,确定服务器接收到的查询请求为通过合法性验证的查询请求。优选地,本发明实施例提供一种终端身份标识。该终端身份标识为终端的硬件ID。
现对该硬件ID的获取进行具体介绍。如上文所述,发送器720发送查询请求之前,由获取器710获取上述硬件ID。获取器710首先获取终端的IMEI,记为第一字符串。其次,获取器710获取被盗移动终端的网卡地址,并去除网卡地址中的非字母以及非数字字符,去除后的网卡地址记为第二字符串。获取到第一字符串以及第二字符串之后,获取器710获取终端的CPU串号,记为第三字符串。获取到第一、第二以及第三字符串之后,获取器710预定顺序合并上述三个字符串。其中,该预定顺序可以是按第一、第二、第三的顺序合并上述三个字符串,可以是按第三、第二、第一的倒序合并上述三个字符串,还可以是其他预定的顺序,本发明实施例对此并不加以限定。
合并上述字符串之后,获取器710将合并后得到的结果转换为大写格式,并记为第一结果。获取到第一结果之后,本发明实施例继续将该第一结果进行MD5运算,得到第二结果。之后,获取器710将该第二结果转换为大写格式得到终端的硬件ID。
本发明实施例中终端的硬件ID通过将终端的IMEI、网卡地址以及CPU的串号进行合并运算能够保证服务器接收的查询请求是真实有效可信的,避免接收来自不可信或恶意发送端伪装成可信任方发送的查询请求导致服务器返回终端的状态信息至恶意发送端,泄露终端的状态信息。
本发明实施例中,确定器740根据查询结果确定的终端的状态信息可以包括终端被盗、未被盗或者终端被盗后找回等等。若根据服务器的查询结果,确定器740确定终端的当前状态信息为终端被盗,则购买终端者能够立刻停止交易,帮助找到失主,归还手机,并且能够提供偷盗者的线索,帮助抓捕偷盗者,进一步减少盗窃犯罪。进一步,本发明实施例的终端的状态信息还可以包括其他更为详细的说明,例如包括终端未出售、终端使用中以及终端被转卖等终端的出售购买状态信息,还可以是其他任意终端的当前状态信息,本发明实施例对此并不加以限定。
本发明实施例中,客户端可以设置于移动终端,例如手机,笔记本电脑等等,并通
过短信息或者网络的形式发送查询请求。本发明实施例中的客户端还可以设置于终端,例如电脑。当该客户端所在的终端与查询请求中携带的身份标识信息对应的终端之间成功建立连接,能够进行数据传输之后,本发明实施例能够利用该终端通过网络的形式发送上述查询请求。采用本发明实施例,能够及时查询终端的状态信息。例如,当用户购买终端时,首先对该终端的状态信息进行查询,并根据查询结果决定是否购买。若查询到终端不是被盗终端,则用户能够不存在风险地购买该终端。若查询到终端为被盗终端,则用户能够及时停止交易,并将被盗终端归还失主,同时帮助抓捕偷盗者,有效遏制偷窃犯罪的发生。
基于上文各优选实施例提供的终端状态的查询方法及客户端,基于同一发明构思,本发明实施例还提供了一种服务器,用于实现上述终端状态的查询方法。
图8示出了根据本发明一个实施例的服务器的结构示意图。参见图8,本发明实施例的服务器至少包括:请求接收器810、查询器830以及结果发送器840。
现介绍本发明实施例的服务器的各器件或组成的功能以及各部分间的连接关系:
请求接收器810,配置为接收查询请求,其中,查询请求中携带有指定终端的身份标识信息。
查询器830,与请求接收器810相耦合,配置为根据查询请求中携带的指定终端的身份标识信息在服务器本地存储的状态信息中对指定终端的状态信息进行查询,获得查询结果。
结果发送器840,与查询器830相耦合,配置为返回查询结果至查询请求发送方。
本发明实施例接收发送方发送的查询请求,查询指定终端的状态信息,并返回查询结果,由发送方根据接收到的服务器返回的查询结果确定终端的当前状态,能够解决现有技术中无法确定终端的当前状态的问题。例如,采用本发明实施例,若偷盗者对被盗终端进行交易,购买者能够查询到终端被盗,进而停止交易并提供偷盗者的线索,甚至将被盗终端归还失主。因此,采用本发明实施例能够达到避免购买被盗终端,增加被盗终端的找回机率,并有效遏制偷盗行为的有益效果。
如图8所示的服务器中的请求接收器810接收发送方发送的携带有终端身份标识信息的查询请求。为保证该查询请求是真实有效可信的,避免接收来自不可信或恶意发送端发送的查询请求导致服务器查询终端的状态信息并泄露终端的状态信息至不法分子,请求接收器810触发判断器820对接收到的查询请求进行合法性判断。
判断器820利用查询请求中携带的终端的身份标识信息对查询请求的合法性进行判断。若查询请求中携带的终端的身份标识信息与服务器本地存储的身份标识信息能够匹配,则判断器820判断查询请求通过合法性验证。若查询请求中携带的终端的身份标识信息与服务器本地存储的身份标识信息不能够匹配,则判断器820判断查询请求不能通过合法性验证。
判断器820对查询请求的合法性进行判断之后,若查询请求未通过合法性验证,则服务器忽略该查询请求,不执行任何操作。若查询请求通过合法性验证,则判断器820
触发与其耦合的查询器830。查询器830受到触发之后,根据查询请求中携带的指定终端的身份标识信息在服务器本地存储的状态信息中对指定终端的状态信息进行查询,获得查询结果。优选地,查询器830以终端的身份标识信息为主键对指定终端的状态信息进行查询。例如,查询请求通过合法性验证之后,本发明实施例可以以指定终端的IMEI和/或指定终端的用户ID和/或指定终端的硬件ID为主键对终端的状态信息进行查询,保证获得的查询结果为查询请求中指定的终端。查询器830获得查询结果之后,触发结果发送器840。与查询器830相耦合的结果发送器840将查询结果返回至查询请求发送方,由发送方根据该查询结果执行相应操作。例如,若根据查询结果,该终端为被盗终端,则用户能够立即停止交易,提供偷盗者的线索帮助抓获偷盗者,并将被盗终端归还失主。
本发明实施例中,终端的身份标识信息可以是终端的IMEI,可以是终端的用户ID,还可以是终端的硬件ID等任意能够唯一标识终端的身份标识信息,本发明实施例对此并不加以限定。其中,终端的硬件ID为汇集多种终端身份标识信息的、综合的身份标识信息。硬件ID通过将终端的IMEI、网卡地址以及CPU的串号进行合并运算能够保证服务器接收的查询请求是真实有效可信的。若本发明实施例中以硬件ID为身份标识信息对查询请求进行验证,当硬件ID匹配,则终端的IMEI、网卡地址以及CPU串号均能够匹配,则能够确定本发明实施例接收到的查询请求的合法性。
根据上述任意一个优选实施例或多个优选实施例的组合,本发明实施例能够达到如下有益效果:
本发明实施例发送查询请求至服务器,查询指定终端的状态信息,并根据接收到的服务器返回的查询结果确定终端的当前状态,能够解决现有技术中无法确定终端的当前状态的问题。例如,采用本发明实施例,若偷盗者对被盗终端进行交易,购买者能够查询到终端被盗,进而停止交易并提供偷盗者的线索,甚至将被盗终端归还失主。因此,采用本发明实施例能够达到避免购买被盗终端,增加被盗终端的找回机率,并有效遏制偷盗行为的有益效果。
相关技术中还提及,终端被盗之后,偷盗者根据终端显示界面能够识别出终端已开启防盗功能,则放弃对终端进行解锁,导致无法及时获取偷盗者的可识别信息,进而导致终端被盗后无法找回。
为解决上述技术问题,本发明实施例提供了一种终端防盗方法。图9示出了根据本发明一个实施例的终端防盗方法的处理流程图。如图9所示,该流程至少包括步骤S902至步骤S904。
步骤S902、确定终端被盗时,生成无密码屏幕锁屏界面并显示。
步骤S904、接收解锁指令时,拒绝屏幕解锁操作,并获取解锁指令发起方的可识别信息。
在本发明实施例中,确定终端被盗时,生成无密码屏幕锁屏界面并显示。偷盗者查看该界面为无密码屏幕锁屏界面时,无法发现终端已开启了防盗功能,会放松警惕直接进行解锁操作。因此,本发明实施例能够延缓现有技术中偷盗者通过终端界面显示发现
终端已开启防盗功能的时间,避免偷盗者进行拔出终端电池、关闭终端等不利于找回被盗终端的操作。依据本发明实施例能够在接收到解锁指令之后,拒绝解锁,并获取解锁指令发起方的可识别信息。因此,采用本发明实施例能够解决现有技术中只有解锁失败之后才能进行拍照取证的问题。本发明实施例能够避免因拍照取证的时间间隔较长,导致错过获取偷盗者可识别信息的最佳时机的问题。本发明实施例能够生成无密码界面使偷盗者放松警惕。当偷盗者对终端进行解锁,本发明实施例能够即时获取到该解锁指令发起方(即偷盗者)的可识别信息,无须等待多次解锁失败后才进行拍照取证,缩短拍照取证时间。因此,根据本发明实施例提供的方法能够增大用户找回终端的可能性,更加合理有效保证用户财产安全。
本发明实施例接收到可信任方发送的被盗通知指令时,确定终端被盗。其中,可信任方可以是服务器,还可以是用户在使用该终端时设置的亲友号码。现以可信任方的身份分别进行说明。
首先,对采用服务器为可信任方进行说明。在本例中,当用户发现终端被盗之后,登陆服务器,在服务器中对终端的状态进行标识,将终端状态修改为被盗。随后,服务器发送被盗指令至终端,告知终端已被盗。
其次,对采用亲友号码为可信任方进行说明。本例中的亲友号码是指与被盗终端绑定的可信任号码,例如通讯录里的常用电话号码、指定白名单号码等等。实施时,由亲友号码发送被盗指令至被盗终端,及时确认终端被盗。
虽然信任方身份不同,所执行的步骤也不同,但是两者在本发明实施例中起到相同的作用,即,确定终端被盗。在确定之后再执行其他操作,避免因发送被盗指令不及时,导致不法分子有机可乘对终端进行刷机等操作导致被盗终端无法找回的恶劣后果。
另外,本发明实施例还能够通过检测到终端的用户身份识别模块(Subscriber Identity Module,以下简称SIM)卡是否被更换,确定终端是否被盗。盗窃者在使用被盗终端时,通常会更换SIM卡,否则容易被追溯到,因此,检测SIM卡是否被更换是确定终端是否被盗的一个有效手段。采用本发明实施例能够保证失主没有发现终端被盗的情况下,及时发现终端被盗,并及时对被盗终端做出相应处理。
本发明实施例确定终端被盗之后,执行如图9所示的步骤S902,生成无密码锁屏界面并显示。显示无密码锁屏界面之后,若接收到解锁指令,执行如图所示的步骤S904,拒绝屏幕解锁操作,并获取解锁指令发起方的可识别信息。本发明实施例中,终端丢失之后进入锁屏状态。当拾到终端者或者偷盗者企图对终端进行屏幕解锁操作,本发明实施例可以获取解锁指令发起方的可识别信息,并生成密码输入界面,提示需要输入正确的密码以对屏幕进行解锁。密码输入界面需要使用者输入密码方能解锁,若终端接收到正确的密码,则本发明实施例进行屏幕解锁操作,若终端接收到错误的密码,则本发明实施例保持屏幕被锁状态。若一次密码输入有误,通常会允许再次输入。若多次密码输入(例如3次以上)均不正确,为保证终端安全性,则可能会在一定时间内禁止密码输入以及其他任何操作。
本发明实施例中,上述解锁指令发起方的可识别信息可以是通过终端能够获取的、解锁指令发起方的任意可识别信息。优选地,本发明实施例中,可以利用终端的前置摄像头对解锁指令发起方进行拍照,获取照片,还可以记录解锁指令发起方的指纹。本发明实施例中获取到的解锁指令发起方的照片或者指纹为每个人特有的。因此,通过本发明实施例获取到的识别信息能够直接、快速并且有效地寻找到被盗终端的拾到者或者偷盗者,保证被盗终端被找回,进而能够减少终端失窃率并降低偷盗犯罪率。
如上文所述,本发明实施例获取到解锁指令发起方的可识别信息之后,本发明实施例可以发送可识别信息至可信任方,还可以保存上述可识别信息等待进一步处理。优选地,本发明实施例获取到可识别信息之后,发送该可识别信息至可信任方,例如服务器或者被盗终端绑定的亲友号码或者其他可信任方,保证被盗用户能够及时获取到偷盗者的可识别信息,并根据该可识别信息抓获偷盗者,找回被盗终端。
另外,需要说明的是,对于不同的终端以及采用不同操作系统的终端,终端默认锁屏界面的布局和元素存在差异。例如,有的终端默认锁屏界面通过按住屏幕中下方的解锁键向四周滑动解锁。再例如,有的终端默认锁屏界面通过从左向右拖动滑块对屏幕进行解锁。不同终端的锁屏界面还有一些布局细节存在差异,例如获取用户当前设置的桌面壁纸图片资源,或者添加桌面时钟空间的具体方式等,均会因不同终端以及终端中不同的操作系统而存在差异。因此,本发明实施例中生成的无密码屏幕的布局会根据不同的终端以及终端中采用的不同操作系统存在差异。
本发明实施例中,根据终端默认锁屏界面的布局和元素,可以生成与终端默认锁屏界面相同的无密码屏幕,还可以生成与终端默认锁屏界面不同的无密码屏幕。本发明实施例优选生成与终端默认锁屏界面相同的无密码屏幕。
生成与终端默认锁屏界面不同的无密码屏幕容易被偷盗者识别出终端开启了防盗功能,导致错过获取偷盗者可识别信息的机会。综上,本发明实施例中优选无密码屏幕与终端默认锁屏界面是相同的,可识别度低,并防止偷盗者识别出终端开启了防盗功能,进而增大找回被盗终端的可能性,高效合理保护用户财产安全。
现对本发明实施例提供的终端防盗方法进行说明。
实施例四
图3示出了根据本发明一个优选实施例的终端防盗方法的处理流程图,用于支持上述终端防盗方法,将上述终端防盗方法阐述得更加清晰易懂。需要说明的是,为将本发明实施例阐述得简洁易懂,本优选实施例中将终端设置为手机进行说明。参见图3,该优选实施例至少包括步骤S1002至步骤S1012。
步骤S1002、手机绑定亲友号。
具体地,用户购买手机后,可以设置一个亲友号,该亲友号可以是用户自己的其他手机号码,还可以是用户的家人或者朋友的手机号码,保证用户手机丢失之后,能够及时使用亲友号发送防盗处理指令至被盗手机。
步骤S1004、接收到亲友号发送的被盗通知指令,确定手机被盗。
当用户发现手机被盗之后,通过步骤S1002中绑定的亲友号发送被盗通知指令至被盗手机。被盗手机接收到亲友号发送的被盗通知指令之后,能够确定手机被盗。
步骤S1006、生成无密码屏幕界面进行显示,等待解锁命令。
手机确定被盗之后,生成与默认锁屏界面相同或相似的无密码屏幕,等待拾到手机者或者偷盗者对手机进行解锁操作。如图11示出了根据本发明一个实施例的手机默认锁屏界面示意图,图12示出了根据本发明一个实施例的无密码屏幕界面示意图。由图11以及图12对比可知,本优选实施例生成的无密码屏幕与默认锁屏界面含有相同的元素。并且,如图11以及图12所示,本优选实施例中生成的无密码屏幕与默认锁屏界面的壁纸为相同壁纸。
步骤S1008、接收到解锁命令,获取可识别信息,提示密码输入。
当手机接收到解锁命令之后,利用终端摄像头对解锁指令发起方进行拍照,获取拾到手机者或者偷盗者的照片,另外,还可以记录解锁指令发起方的指纹,将获取到的可识别信息保存至手机,并生成需要输入密码的屏幕锁屏界面进行显示,提示解锁指令发起方进行密码输入。
步骤S1010、判断密码输入是否正确。
接收到解锁指令发起方输入的密码之后,判断密码输入是否正确,若输入的密码正确,则进行屏幕解锁操作,流程结束。若密码输入错误,则保持屏幕被锁状态,并执行步骤S1012。
步骤S1012、将获取到的可识别信息发送至亲友号。
确认手记被盗之后,本优选实施例发送获取到的可识别信息至亲友号,流程结束。
通过本优选实施例,能够在确定手机被盗的情况下,获取到手机拾到者或者偷盗者的照片和/或指纹,根据照片和/或指纹,能够查找到手机拾到者或者偷盗者,保证用户在手机丢失之后及时找回手机,进一步减少手机失窃率,降低偷盗犯罪。
基于上文各优选实施例提供的终端防盗方法,基于同一发明构思,本发明实施例提供一种终端防盗客户端,用于实现上述终端防盗方法。
图13示出了根据本发明一个实施例的终端防盗客户端的结构示意图。参见图13,本发明实施例的终端防盗客户端的至少包括:防盗触发模块1310、界面显示模块1320以及处理模块1330。
现介绍本发明实施例的终端防盗客户端的各器件或组成的功能以及各部分间的连接关系:
防盗触发模块1310,配置为确定终端被盗时,触发界面显示模块1320。
界面显示模块1320,与防盗触发模块1310相耦合,配置为生成无密码屏幕锁屏界面并显示。
处理模块1330,与界面显示模块1320相耦合,配置为接收解锁指令时,拒绝屏幕解锁操作,并获取解锁指令发起方的可识别信息。
在本发明实施例中,确定终端被盗时,生成无密码屏幕锁屏界面并显示。偷盗者查
看该界面为无密码屏幕锁屏界面时,无法发现终端已开启了防盗功能,会放松警惕直接进行解锁操作。因此,本发明实施例能够延缓现有技术中偷盗者通过终端界面显示发现终端已开启防盗功能的时间,避免偷盗者进行拔出终端电池、关闭终端等不利于找回被盗终端的操作。依据本发明实施例能够在接收到解锁指令之后,拒绝解锁,并获取解锁指令发起方的可识别信息。因此,采用本发明实施例能够解决现有技术中只有解锁失败之后才能进行拍照取证的问题。本发明实施例能够避免因拍照取证的时间间隔较长,导致错过获取偷盗者可识别信息的最佳时机的问题。本发明实施例能够生成无密码界面使偷盗者放松警惕。当偷盗者对终端进行解锁,本发明实施例能够即时获取到该解锁指令发起方(即偷盗者)的可识别信息,无须等待多次解锁失败后才进行拍照取证,缩短拍照取证时间。因此,根据本发明实施例提供的方法能够增大用户找回终端的可能性,更加合理有效保证用户财产安全。
本发明实施例中,如图13所示的防盗触发模块接收到可信任方发送的被盗通知指令时,确定终端被盗。其中,可信任方可以是服务器,还可以是用户在使用该终端时设置的亲友号码。现以可信任方的身份分别进行说明。
首先,对采用服务器为可信任方进行说明。在本例中,当用户发现终端被盗之后,能够登陆服务器,在服务器中确认对终端的状态进行标识,将终端状态修改为被盗。随后,并由服务器发送被盗指令至终端,确认告知终端已被盗。
其次,对采用亲友号码为可信任方进行说明。本例中的亲友号码是指与被盗终端绑定的可信任号码。例如通讯录里的常用电话号码、指定白名单号码等等。实施时,由亲友号码发送被盗指令至终端,及时确认终端被盗。
虽然信任方身份不同,所执行的步骤也不同,但是两者在本发明实施例中起到相同的作用,即,确定终端被盗。在确定之后再执行其他操作,避免因发送被盗指令不及时,导致不法分子有机可乘对终端进行刷机等操作导致被盗终端无法找回的恶劣后果。
另外,本发明实施例中的防盗触发模块1310还能够通过检测到终端的SIM卡是否被更换,确定终端是否被盗。盗窃者在使用被盗终端时,通常会更换SIM卡,否则容易被追溯到,因此,检测SIM卡是否被更换是确定终端是否被盗的一个有效手段。采用本发明实施例能够保证失主没有发现终端被盗的情况下,能够及时发现终端被盗,并及时对被盗终端做出相应处理。
防盗触发模块1310确定终端被盗之后,触发界面显示模块1320。界面显示模块1320受到触发之后,生成无密码锁屏界面并显示。界面显示模块1320显示无密码锁屏界面之后,处理模块1330接收锁屏指令。当处理模块1330接收到锁屏指令时,处理模块1330拒绝屏幕解锁操作,并获取解锁指令发起方的可识别信息。本发明实施例中,终端丢失之后进入锁屏状态。当拾到终端者或者偷盗者企图对终端进行屏幕解锁操作,处理模块1330生成密码输入界面,提示需要输入正确的密码以对屏幕进行解锁。密码输入界面需要使用者输入密码方能解锁,若终端接收到正确的密码,处理模块1330进行屏幕解锁操作。若终端接收到错误的密码,则处理模块1330保持屏幕被锁状态。若一次密码输入有
误,通常会允许再次输入。若多次密码输入(例如3次以上)均不正确,为保证终端安全性,则可能会在一定时间内禁止密码输入以及其他任何操作。
本发明实施例中,该解锁指令发起方的可识别信息可以是通过终端能够获取的、解锁指令发起方的任意可识别信息。优选地,本发明实施例中,可以利用终端的前置摄像头对解锁指令发起方进行拍照,获取照片,还可以记录解锁指令发起方的指纹。本发明实施例中获取到的解锁指令发起方的照片或者指纹为每个人特有的。因此,通过本发明实施例获取到的识别信息能够直接、快速并且有效地寻找到被盗终端的拾到者或者偷盗者,保证被盗终端被找回,进而能够减少终端失窃率并降低偷盗犯罪率。
处理模块1330获取到解锁指令发起方的可识别信息之后,本发明实施例可以通过如图13所示的发送模块1340发送可识别信息至可信任方,还可以保存上述可识别信息等待进一步处理。优选地,本发明实施例中,处理模块1330获取到可识别信息之后,发送模块1340发送该可识别信息至可信任方。其中,该可信任方包括服务器或者被盗终端绑定的亲友号码或者其他可信任方。本发明实施例优选发送模块1340发送可识别信息至可信任方,保证被盗用户能够及时获取到偷盗者的可识别信息,并根据该可识别信息抓获偷盗者,找回被盗终端。
另外,需要说明的是,对于不同的终端以及采用不同操作系统的终端,终端默认锁屏界面的布局和元素存在差异。例如,有的终端默认锁屏界面通过按住屏幕中下方的解锁键向四周滑动解锁。再例如,有的终端默认锁屏界面通过从左向右拖动滑块对屏幕进行解锁。不同终端的锁屏界面还有一些布局细节存在差异,例如获取用户当前设置的桌面壁纸图片资源,或者添加桌面时钟空间的具体方式等,均会因不同终端以及终端中不同的操作系统而存在差异。因此,本发明实施例中生成的无密码屏幕的布局会根据不同的终端以及终端中采用的不同操作系统存在差异。
本发明实施例中,防盗触发模块1310确定终端被盗时,与其耦合的界面显示模块1320生成的无密码屏幕与终端默认锁屏界面可以是相同的,还可以是不同的。优选地,本发明实施例中,无密码屏幕与终端默认锁屏界面是相同的。生成与终端默认锁屏界面不同的无密码屏幕容易被偷盗者识别出终端开启了防盗功能,导致错过获取偷盗者可识别信息的机会。综上,本发明实施例中优选无密码屏幕与终端默认锁屏界面是相同的,可识别度低,并防止偷盗者识别出终端开启了防盗功能,进而增大找回被盗终端的可能性,高效合理保护用户财产安全。
根据上述任意一个优选实施例或多个优选实施例的组合,本发明实施例能够达到如下有益效果:
在本发明实施例中,确定终端被盗时,生成无密码屏幕锁屏界面并显示。偷盗者查看该界面为无密码屏幕锁屏界面时,无法发现终端已开启了防盗功能,会放松警惕直接进行解锁操作。因此,本发明实施例能够延缓解决现有技术中偷盗者通过终端界面显示发现终端已开启防盗功能的时间,避免偷盗者进行拔出终端电池、关闭终端等不利于找回被盗终端的操作。依据本发明实施例能够在接收到解锁指令之后,拒绝解锁,并获取
解锁指令发起方的可识别信息。因此,采用本发明实施例能够解决现有技术中只有解锁失败之后才能进行拍照取证的问题。本发明实施例能够避免因拍照取证的时间间隔较长,导致错过获取偷盗者可识别信息的最佳时机的问题。本发明实施例能够生成无密码界面使偷盗者放松警惕。当偷盗者对终端进行解锁,本发明实施例能够即时获取到该解锁指令发起方(即偷盗者)的可识别信息,无须等待多次解锁失败后才进行拍照取证,缩短拍照取证时间。因此,根据本发明实施例提供的方法能够增大用户找回终端的可能性,更加合理有效保证用户财产安全。
在此处所提供的说明书中,说明了大量具体细节。然而,能够理解,本发明的实施例可以在没有这些具体细节的情况下实践。在一些实例中,并未详细示出公知的方法、结构和技术,以便不模糊对本说明书的理解。
类似地,应当理解,为了精简本公开并帮助理解各个发明方面中的一个或多个,在上面对本发明的示例性实施例的描述中,本发明的各个特征有时被一起分组到单个实施例、图、或者对其的描述中。然而,并不应将该公开的方法解释成反映如下意图:即所要求保护的本发明要求比在每个权利要求中所明确记载的特征更多的特征。更确切地说,如下面的权利要求书所反映的那样,发明方面在于少于前面公开的单个实施例的所有特征。因此,遵循具体实施方式的权利要求书由此明确地并入该具体实施方式,其中每个权利要求本身都作为本发明的单独实施例。
本领域那些技术人员可以理解,可以对实施例中的设备中的模块进行自适应性地改变并且把它们设置在与该实施例不同的一个或多个设备中。可以把实施例中的模块或单元或组件组合成一个模块或单元或组件,以及此外可以把它们分成多个子模块或子单元或子组件。除了这样的特征和/或过程或者单元中的至少一些是相互排斥之外,可以采用任何组合对本说明书(包括伴随的权利要求、摘要和附图)中公开的所有特征以及如此公开的任何方法或者设备的所有过程或单元进行组合。除非另外明确陈述,本说明书(包括伴随的权利要求、摘要和附图)中公开的每个特征可以由提供相同、等同或相似目的的替代特征来代替。
此外,本领域的技术人员能够理解,尽管在此所述的一些实施例包括其它实施例中所包括的某些特征而不是其它特征,但是不同实施例的特征的组合意味着处于本发明的范围之内并且形成不同的实施例。例如,在下面的权利要求书中,所要求保护的实施例的任意之一都可以以任意的组合方式来使用。
本发明的各个部件实施例可以以硬件实现,或者以在一个或者多个处理器上运行的软件模块实现,或者以它们的组合实现。本领域的技术人员应当理解,可以在实践中使用微处理器或者数字信号处理器(DSP)来实现根据本发明实施例的装置或设备或客户端中的一些或者全部部件的一些或者全部功能。本发明还可以实现为用于执行这里所描述的方法的一部分或者全部的设备或者装置程序(例如,计算机程序和计算机程序产品)。这样的实现本发明的程序可以存储在计算机可读介质上,或者可以具有一个或者多个信号的形式。这样的信号可以从因特网网站上下载得到,或者在载体信号上提供,或者以
任何其他形式提供。
例如,图14示出了可以实现根据本发明的终端状态的查询方法,和/或终端防盗方法的计算设备。该计算设备传统上包括处理器1410和以存储器1420形式的计算机程序产品或者计算机可读介质。存储器1420可以是诸如闪存、EEPROM(电可擦除可编程只读存储器)、EPROM、硬盘或者ROM之类的电子存储器。存储器1420具有用于执行上述方法中的任何方法步骤的程序代码1431的存储空间1430。例如,用于程序代码的存储空间1430可以包括分别用于实现上面的方法中的各种步骤的各个程序代码1431。这些程序代码可以从一个或者多个计算机程序产品中读出或者写入到这一个或者多个计算机程序产品中。这些计算机程序产品包括诸如硬盘,紧致盘(CD)、存储卡或者软盘之类的程序代码载体。这样的计算机程序产品通常为如参考图15所述的便携式或者固定存储单元。该存储单元可以具有与图14的计算设备中的存储器1420类似布置的存储段、存储空间等。程序代码可以例如以适当形式进行压缩。通常,存储单元包括计算机可读代码1431’,即可以由例如诸如1410之类的处理器读取的代码,这些代码当由计算设备运行时,导致该计算设备执行上面所描述的方法中的各个步骤。
本文中所称的“一个实施例”、“实施例”或者“一个或者多个实施例”意味着,结合实施例描述的特定特征、结构或者特性包括在本发明的至少一个实施例中。此外,请注意,这里“在一个实施例中”的词语例子不一定全指同一个实施例。
应该注意的是上述实施例对本发明进行说明而不是对本发明进行限制,并且本领域技术人员在不脱离所附权利要求的范围的情况下可设计出替换实施例。在权利要求中,不应将位于括号之间的任何参考符号构造成对权利要求的限制。单词“包含”不排除存在未列在权利要求中的元件或步骤。位于元件之前的单词“一”或“一个”不排除存在多个这样的元件。本发明可以借助于包括有若干不同元件的硬件以及借助于适当编程的计算机来实现。在列举了若干装置的单元权利要求中,这些装置中的若干个可以是通过同一个硬件项来具体体现。单词第一、第二、以及第三等的使用不表示任何顺序。可将这些单词解释为名称。
此外,还应当注意,本说明书中使用的语言主要是为了可读性和教导的目的而选择的,而不是为了解释或者限定本发明的主题而选择的。因此,在不偏离所附权利要求书的范围和精神的情况下,对于本技术领域的普通技术人员来说许多修改和变更都是显而易见的。对于本发明的范围,对本发明所做的公开是说明性的,而非限制性的,本发明的范围由所附权利要求书限定。
Claims (31)
- 一种终端状态的查询方法,包括:发送查询请求至服务器,查询指定终端的状态信息,其中,所述查询请求中携带有所述指定终端的身份标识信息;接收所述服务器返回的查询结果,其中,所述服务器中存储有所述指定终端的状态信息,所述服务器接收到所述查询请求时根据所述身份标识信息在已存储的状态信息中进行查询,获得所述查询结果;根据所述查询结果确定所述指定终端的当前状态。
- 根据权利要求1所述的方法,其中,所述发送查询请求至服务器之前,还包括:获取所述指定终端的身份标识信息。
- 根据权利要求1或2所述的方法,其中,所述指定终端的身份标识信息至少包括下列任意之一:所述指定终端的国际移动设备身份码IMEI;所述指定终端的用户身份标识码ID;所述指定终端的硬件身份标识码ID。
- 根据权利要求3所述的方法,其中,按以下步骤计算所述指定终端的硬件ID:获取所述指定终端的IMEI,记为第一字符串;获取所述指定终端的网卡地址,将去除所述网卡地址中的非字母以及非数字字符的字符串记为第二字符串;获取所述指定终端的中央处理器CPU的串号,记为第三字符串;按预定顺序合并所述第一字符串、所述第二字符串以及所述第三字符串,并转换合并后的字符串至大写格式,记为第一结果;将所述第一结果进行消息摘要算法MD5运算得到第二结果;转换所述第二结果至大写格式,得到所述指定终端的硬件ID。
- 根据权利要求1至4任一项所述的方法,其中,所述查询请求发送方设置于移动终端,并以短信息或者网络形式发送所述查询请求;或者所述查询请求发送方设置于终端,并以网络形式发送所述查询请求。
- 一种终端状态的查询方法,包括:接收查询请求,其中,所述查询请求中携带有指定终端的身份标识信息;根据所述查询请求中携带的所述指定终端的身份标识信息在服务器本地存储的状态信息中对所述指定终端的状态信息进行查询,获得查询结果;返回所述查询结果至所述查询请求发送方。
- 根据权利要求6所述的方法,其中,所述接收查询请求之后,还包括:判断所述查询请求中携带的所述指定终端的身份标识信息与所述服务器中存储的身 份标识信息是否匹配;若所述查询请求中携带的所述指定终端的身份标识信息与所述服务器中存储的身份标识信息均不匹配,则忽略所述查询请求;若所述查询请求中携带的所述指定终端的身份标识信息与所述服务器中存储的身份标识信息匹配,则触发所述查询操作。
- 根据权利要求6或7所述的方法,其中,所述指定终端的身份标识信息至少包括下列任意之一:所述指定终端的国际移动设备身份码IMEI;所述指定终端的用户身份标识码ID;所述指定终端的硬件身份标识码ID。
- 根据权利要求6至8任一项所述的方法,其中,根据所述查询请求中携带的所述指定终端的身份标识信息在服务器本地存储的状态信息中对所述指定终端的状态信息进行查询,获得查询结果,包括:以所述指定终端的IMEI和/或所述指定终端的用户ID和/或所述指定终端的硬件ID为主键在服务器本地存储的状态信息中对所述指定终端的状态信息进行查询,获得查询结果。
- 一种终端状态的查询客户端,包括:发送器,用于发送查询请求至服务器,查询指定终端的状态信息,其中,所述查询请求中携带有所述指定终端的身份标识信息;接收器,用于接收所述服务器返回的查询结果,其中,所述服务器中存储有所述指定终端的状态信息,所述服务器接收到所述查询请求时根据所述身份标识信息在已存储的状态信息中进行查询,获得所述查询结果;确定器,用于根据所述查询结果确定所述指定终端的当前状态。
- 根据权利要求10所述的客户端,其中,还包括:获取器,用于在所述发送器发送所述查询请求之前,获取所述指定终端的身份标识信息。
- 根据权利要求10或11所述的客户端,其中,所述指定终端的身份标识信息至少包括下列任意之一:所述指定终端的国际移动设备身份码IMEI;所述指定终端的用户身份标识码ID;所述指定终端的硬件身份标识码ID。
- 根据权利要求12所述的客户端,其中,所述获取器还用于利用以下步骤获取所述指定终端的硬件ID:获取所述指定终端的IMEI,记为第一字符串;获取所述指定终端的网卡地址,将去除所述网卡地址中的非字母以及非数字字符的字符串记为第二字符串;获取所述指定终端的中央处理器CPU的串号,记为第三字符串;按预定顺序合并所述第一字符串、所述第二字符串以及所述第三字符串,并转换合并后的字符串至大写格式,记为第一结果;将所述第一结果进行消息摘要算法MD5运算得到第二结果;转换所述第二结果至大写格式,得到所述指定终端的硬件ID。
- 根据权利要求10至13任一项所述的客户端,其中,所述客户端设置于移动终端,并以短信息或者网络形式发送所述查询请求;或者所述客户端设置于终端,并以网络形式发送所述查询请求。
- 一种服务器,包括:请求接收器,用于接收查询请求,其中,所述查询请求中携带有指定终端的身份标识信息;查询器,用于根据所述查询请求中携带的所述指定终端的身份标识信息在服务器本地存储的状态信息中对所述指定终端的状态信息进行查询,获得查询结果;结果发送器,用于返回查询结果至所述查询请求发送方。
- 根据权利要求15所述的服务器,其中,还包括:判断器,用于所述接收器接收到所述查询请求之后,判断所述查询请求中携带的所述指定终端的身份标识信息与所述服务器中存储的身份标识信息是否匹配。
- 根据权利要求16所述的服务器,其中,所述查询器还用于:若根据所述判断器,所述查询请求中携带的所述指定终端的身份标识信息与所述服务器中存储的身份标识信息均不匹配,则所述查询器忽略所述查询请求;若根据所述判断器,若所述查询请求中携带的所述指定终端的身份标识信息与所述服务器中存储的身份标识信息匹配,则所述查询器查询所述指定终端的状态信息,并生成查询结果。
- 一种终端防盗方法,包括:确定终端被盗时,生成无密码屏幕锁屏界面并显示;接收解锁指令时,拒绝屏幕解锁操作,并获取解锁指令发起方的可识别信息。
- 根据权利要求18所述的方法,所述确定终端被盗,包括:接收到可信任方发送的被盗通知指令时,确定所述终端被盗;或者检测到所述终端的SIM卡被更换,确定所述终端被盗。
- 根据权利要求19所述的方法,其中,所述获取解锁指令发起方的可识别信息之后,还包括:将所述可识别信息发送至所述可信任方。
- 根据权利要求18至20任一项所述的方法,其中,所述获取解锁指令发起方的可识别信息,包括:利用终端摄像头对所述解锁指令发起方进行拍照,获取照片;记录所述解锁指令发起方的指纹。
- 根据权利要求18至21任一项所述的方法,其中,所述无密码屏幕锁屏界面与所述终端默认锁屏界面相同。
- 根据权利要求18至22任一项所述的方法,其中,所述拒绝屏幕解锁操作之后,还包括:生成需输入密码的屏幕锁屏界面并显示;以及接收输入的密码,判断密码是否正确;若是,则进行屏幕解锁操作;若否,则保持屏幕被锁状态。
- 一种终端防盗客户端,包括:防盗触发模块,用于确定终端被盗时,触发界面显示模块;所述界面显示模块,用于生成无密码屏幕锁屏界面并显示;处理模块,用于接收解锁指令时,拒绝屏幕解锁操作,并获取解锁指令发起方的可识别信息。
- 根据权利要求24所述的客户端,所述防盗触发模块还用于:接收到可信任方发送的被盗通知指令时,确定所述终端被盗;或者检测到所述终端的SIM卡被更换,确定所述终端被盗。
- 根据权利要求25所述的客户端,其中,还包括:发送模块,用于所述获取解锁指令发起方的可识别信息之后,将所述可识别信息发送至所述可信任方。
- 根据权利要求24至26任一项所述的客户端,其中,所述处理模块还包括:利用终端摄像头对所述解锁指令发起方进行拍照,获取照片;记录所述解锁指令发起方的指纹。
- 根据权利要求24至27任一项所述的客户端,其中,所述无密码屏幕锁屏界面与所述终端默认锁屏界面相同。
- 根据权利要求24至28任一项所述的客户端,其中,所述界面显示模块还用于所述拒绝屏幕解锁操作之后,生成需输入密码的屏幕锁屏界面并显示;所述处理模块还用于接收输入的密码,判断密码是否正确;若是,则进行屏幕解锁操作;若否,则保持屏幕被锁状态。
- 一种计算机程序,包括计算机可读代码,当所述计算机可读代码在计算设备上运行时,导致所述计算设备执行根据权利要求1-5中的任一个所述的终端状态的查询方法,和/或,权利要求6-9任一个所述的终端状态的查询方法,和/或,权利要求18-23任一个所述的终端防盗方法。
- 一种计算机可读介质,其中存储了如权利要求30所述的计算机程序。
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310687619.XA CN103699860A (zh) | 2013-12-13 | 2013-12-13 | 终端防盗方法及设备 |
CN201310685215.7 | 2013-12-13 | ||
CN201310687619.X | 2013-12-13 | ||
CN201310685215.7A CN103686667A (zh) | 2013-12-13 | 2013-12-13 | 终端状态的查询方法及设备 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2015085942A1 true WO2015085942A1 (zh) | 2015-06-18 |
Family
ID=53370637
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2014/093638 WO2015085942A1 (zh) | 2013-12-13 | 2014-12-11 | 终端状态查询方法、终端防盗方法及相应的设备 |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2015085942A1 (zh) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106887080A (zh) * | 2017-04-10 | 2017-06-23 | 福建强闽信息科技有限公司 | 一种基于窄带物联网远程报警的防拆装置及其使用方法 |
CN108280375A (zh) * | 2017-12-29 | 2018-07-13 | 申子涵 | 一种可以防止非法刷机的移动终端 |
CN110275785A (zh) * | 2019-04-28 | 2019-09-24 | 阿里巴巴集团控股有限公司 | 数据处理方法、装置、客户端和服务器 |
CN111667347A (zh) * | 2020-06-12 | 2020-09-15 | 吉林吉大通信设计院股份有限公司 | 一种基于5g通信技术的大数据式搜索系统及其搜索方法 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101170735A (zh) * | 2007-11-29 | 2008-04-30 | 中兴通讯股份有限公司 | 一种实现终端状态周期上报的方法及系统 |
CN101267609A (zh) * | 2008-04-24 | 2008-09-17 | 中兴通讯股份有限公司 | 用于集群系统的终端状态查询方法 |
CN102523337A (zh) * | 2011-12-02 | 2012-06-27 | 深圳市同洲电子股份有限公司 | 一种跨媒体移动终端状态查询方法及系统、终端、服务器 |
CN102638628A (zh) * | 2012-03-30 | 2012-08-15 | 深圳市金立通信设备有限公司 | 基于手机摄像头及gps实现手机防盗的系统及方法 |
CN103686667A (zh) * | 2013-12-13 | 2014-03-26 | 北京奇虎科技有限公司 | 终端状态的查询方法及设备 |
CN103699860A (zh) * | 2013-12-13 | 2014-04-02 | 北京奇虎科技有限公司 | 终端防盗方法及设备 |
-
2014
- 2014-12-11 WO PCT/CN2014/093638 patent/WO2015085942A1/zh active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101170735A (zh) * | 2007-11-29 | 2008-04-30 | 中兴通讯股份有限公司 | 一种实现终端状态周期上报的方法及系统 |
CN101267609A (zh) * | 2008-04-24 | 2008-09-17 | 中兴通讯股份有限公司 | 用于集群系统的终端状态查询方法 |
CN102523337A (zh) * | 2011-12-02 | 2012-06-27 | 深圳市同洲电子股份有限公司 | 一种跨媒体移动终端状态查询方法及系统、终端、服务器 |
CN102638628A (zh) * | 2012-03-30 | 2012-08-15 | 深圳市金立通信设备有限公司 | 基于手机摄像头及gps实现手机防盗的系统及方法 |
CN103686667A (zh) * | 2013-12-13 | 2014-03-26 | 北京奇虎科技有限公司 | 终端状态的查询方法及设备 |
CN103699860A (zh) * | 2013-12-13 | 2014-04-02 | 北京奇虎科技有限公司 | 终端防盗方法及设备 |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106887080A (zh) * | 2017-04-10 | 2017-06-23 | 福建强闽信息科技有限公司 | 一种基于窄带物联网远程报警的防拆装置及其使用方法 |
CN108280375A (zh) * | 2017-12-29 | 2018-07-13 | 申子涵 | 一种可以防止非法刷机的移动终端 |
CN110275785A (zh) * | 2019-04-28 | 2019-09-24 | 阿里巴巴集团控股有限公司 | 数据处理方法、装置、客户端和服务器 |
CN110275785B (zh) * | 2019-04-28 | 2023-01-13 | 创新先进技术有限公司 | 数据处理方法、装置、客户端和服务器 |
CN111667347A (zh) * | 2020-06-12 | 2020-09-15 | 吉林吉大通信设计院股份有限公司 | 一种基于5g通信技术的大数据式搜索系统及其搜索方法 |
CN111667347B (zh) * | 2020-06-12 | 2023-11-07 | 吉林吉大通信设计院股份有限公司 | 一种基于5g通信技术的大数据式搜索系统及其搜索方法 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109583184B (zh) | 身份验证方法及装置和电子设备 | |
JP7182924B2 (ja) | モバイルセキュリティ対策 | |
US10135818B2 (en) | User biological feature authentication method and system | |
US8483659B2 (en) | Methods and systems for recovering lost or stolen mobile devices | |
WO2019042324A1 (zh) | 资源转移方法、资金支付方法、装置及电子设备 | |
WO2016034090A1 (zh) | 提高移动终端安全性的方法及系统 | |
WO2015085871A1 (zh) | 移动终端防盗方法及客户端 | |
US20170013464A1 (en) | Method and a device to detect and manage non legitimate use or theft of a mobile computerized device | |
CN107862527A (zh) | 一种支付方法、终端及服务器 | |
WO2015085942A1 (zh) | 终端状态查询方法、终端防盗方法及相应的设备 | |
US20190260589A1 (en) | Identity validity verification method, apparatus and system | |
JP2001312469A (ja) | 認証装置 | |
CN105809045A (zh) | 一种设备系统在数据重置时的处理方法和装置 | |
CN107786349B (zh) | 一种针对用户账号的安全管理方法及装置 | |
CN114168929A (zh) | 身份验证方法、装置、设备及存储介质 | |
TW201926117A (zh) | 電子裝置及其解鎖方法 | |
US20170195425A1 (en) | Method and Electronic Device for Remotely Locking a Mobile Terminal | |
WO2010067263A2 (en) | A system for protection and backup of information in a mobile cell unit | |
WO2015085940A1 (zh) | 移动终端防盗方法及客户端 | |
CN108563934B (zh) | 一种指纹解锁的方法及装置 | |
CN106303017A (zh) | 报警处理方法及装置 | |
JP2005128847A (ja) | 個人認証方法及びシステム | |
CN107403080B (zh) | 隐藏/显示应用程序的方法及终端设备 | |
JP6151120B2 (ja) | 生体認証管理システム及びそれにおける生体認証方法 | |
WO2017197689A1 (zh) | 一种sim卡处理方法、装置、终端及esam芯片 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14869135 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 14869135 Country of ref document: EP Kind code of ref document: A1 |