WO2015131705A1 - Procédé de sécurité, dispositif de sécurité et support d'informations pour ordinateur - Google Patents

Procédé de sécurité, dispositif de sécurité et support d'informations pour ordinateur Download PDF

Info

Publication number
WO2015131705A1
WO2015131705A1 PCT/CN2015/071474 CN2015071474W WO2015131705A1 WO 2015131705 A1 WO2015131705 A1 WO 2015131705A1 CN 2015071474 W CN2015071474 W CN 2015071474W WO 2015131705 A1 WO2015131705 A1 WO 2015131705A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
sim card
identity information
authorization code
cloud server
Prior art date
Application number
PCT/CN2015/071474
Other languages
English (en)
Chinese (zh)
Inventor
席浩
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2015131705A1 publication Critical patent/WO2015131705A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data
    • H04W8/205Transfer to or from user equipment or user record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security

Definitions

  • the present invention relates to the security field of mobile terminals, and in particular, to an anti-theft method, an anti-theft device, and a computer storage medium.
  • the role of smartphones in personal life is becoming more and more important. According to Nielsen's latest market research report, most people spend more time on smartphones than computers every month.
  • the user's mobile phone stores a large amount of personal information, such as contacts, text messages, photos, videos, email accounts, and even bank accounts.
  • the voice of mobile phone information security has become stronger and stronger. California has begun to issue a decree to force the addition of smartphones.
  • the Kill-Switch device can realize the possibility of remotely destroying mobile phones.
  • Major mobile phone manufacturers are also exploring solutions for mobile phone theft and self-destruction.
  • the existing anti-theft technology is generally based on a pure software mechanism. Once the software is cracked or incorporated, it poses a certain hidden danger to the security of the smartphone.
  • This paper proposes a method for creating a file for each mobile phone's Subscriber Identity Module (SIM) through the cloud server. Through this method, the user can know the usage of the mobile phone after being stolen, and can also issue instructions to locate, format or destroy the mobile phone.
  • SIM Subscriber Identity Module
  • the embodiment of the present invention is to provide an anti-theft method, an anti-theft device, and a computer storage medium, which can enable the user to query the terminal device and the SIM card related information through the cloud server to know the use situation after the terminal is stolen.
  • the embodiment of the present invention adopts the following technical solutions:
  • an anti-theft method is provided, which is applied to a first terminal, and the method includes:
  • identity information of the first terminal uploading identity information of the SIM card, and identity information of the first terminal to a cloud server, so that the cloud server synchronously saves identity information of the SIM card and the The identity information of a terminal is established, and the SIM card usage file of the first terminal and the terminal usage file of the SIM card are established.
  • the method further includes:
  • the identity information has a one-to-one correspondence.
  • the method further includes:
  • the authorization code is displayed.
  • the method further includes:
  • the method further includes:
  • the method further includes:
  • the method further includes:
  • the control instruction includes erasing data of the first terminal, destroying the first terminal, and positioning the The first terminal.
  • the method further includes:
  • the method further includes:
  • an anti-theft method for applying to a cloud server, the method comprising:
  • Synchronizing the identity information of the SIM card and the identity information of the first terminal establishing a SIM card usage file and a SIM card of the first terminal based on the identity information of the SIM card and the identity information of the first terminal
  • the terminal uses the file.
  • the method further comprises:
  • control instruction includes erasing data of the first terminal, and destroying the Describe the first terminal and locate the first terminal.
  • the method further include:
  • the method further includes:
  • the method further includes:
  • Obtaining a record request sent by the third terminal for querying the SIM card used by the first terminal, and sending the record request for querying the SIM card used by the first terminal includes the identity information of the SIM card currently used by the third terminal Corresponding authorization code and identity information of the first terminal that needs to be queried;
  • the method further include:
  • the control The instructions include erasing data of the first terminal, destroying the first terminal, and locating the first terminal.
  • an anti-theft device which is applied to the first terminal, and includes:
  • a detecting module configured to detect a state of the SIM card insertion interface of the first terminal
  • a reading module configured to read the identity information of the SIM card when the detecting module detects that the SIM card insertion interface has a SIM card insertion;
  • the first determining module is configured to determine whether the identity information of the SIM card is not pre-stored in the first terminal;
  • a first storage module configured to save identity information of the SIM card when the first determining module determines that the identity information of the SIM card is not pre-stored in the first terminal;
  • a transmission module configured to acquire identity information of the first terminal, upload identity information of the SIM card saved by the first storage module, and identity information of the first terminal to a cloud server, to enable the cloud server Synchronizing the identity information of the SIM card and the identity information of the first terminal, and establishing a SIM card usage file of the first terminal and a terminal usage file of the SIM card.
  • the anti-theft device further includes:
  • An authorization code creation module configured to save the identity card of the SIM card by the first storage module After the information is created, an authorization code corresponding to the identity information of the SIM card is created, and the authorization code is uploaded to the cloud server, so that the cloud server saves the authorization code, and the authorization code is The identity information of the SIM card has a one-to-one correspondence.
  • the anti-theft device further includes:
  • a display module configured to: after the authorization code creation module uploads the authorization code to the cloud server, display the authorization code.
  • the anti-theft device further includes:
  • the first query module is configured to send a request for querying the SIM card to use the terminal record to the cloud server, where the sent request for querying the SIM card using the terminal includes the identity information of the SIM card and the phase The corresponding authorization code.
  • the anti-theft device further includes:
  • the second query module is configured to send, to the cloud server, a request for querying the SIM card usage file record of the first terminal; wherein the sent request for querying the SIM card usage record of the first terminal includes an email address
  • the email address is an email address bound to the first terminal.
  • the anti-theft device further includes:
  • a third query module configured to send, to the cloud server, a request for querying a SIM card record used by the second terminal; where the sent request for querying the SIM card used by the second terminal includes the current use of the first terminal.
  • the anti-theft device further includes:
  • a receiving module configured to receive a control instruction sent by the cloud server, and perform a control operation on the first terminal according to the control instruction; the control instruction includes erasing data of the first terminal, and destroying the first Terminal and positioning the first terminal.
  • the anti-theft device further includes:
  • a synchronization status module configured to record a synchronization status flag bit as 0 after determining that the identity information of the SIM card is not pre-stored in the first terminal, and configured to set identity information of the SIM card and the After the identity information of a terminal is uploaded to the cloud server, it is determined that the synchronization status flag is recorded when the cloud server receives the feedback information of the identity information of the SIM card and the identity information of the first terminal. Is 1.
  • the first storage module is located in an area of the first terminal where it is difficult to change information.
  • an anti-theft device for use in a cloud server, including:
  • a first acquiring module configured to acquire identity information of the SIM card sent by the first terminal and identity information of the first terminal;
  • the second storage module is configured to synchronously save the identity information of the SIM card and the identity information of the first terminal, and establish the first terminal based on the identity information of the SIM card and the identity information of the first terminal.
  • the SIM card uses the file and the terminal file of the SIM card.
  • the anti-theft device further comprises:
  • a first instruction output module configured to acquire an instruction sent by the second terminal to operate the first terminal, and send a control instruction to the first terminal according to the instruction;
  • the control instruction includes erasing the Data of the first terminal, destroying the first terminal, and locating the first terminal.
  • the anti-theft device further includes:
  • a third storage module configured to: after the second storage module establishes the SIM card usage file of the first terminal and the terminal usage file of the SIM card, based on the identity information of the SIM card and the identity information of the first terminal, Obtaining an authorization code sent by the first terminal, and saving the authorization code in a SIM card usage file of the first terminal.
  • the anti-theft device further includes:
  • a second obtaining module configured to: after the third storage module saves the authorization code in the SIM card usage file of the first terminal, acquiring, by the first terminal, the query that is recorded by the SIM card using the terminal The request, the sent request to query the SIM card using the terminal record includes the identity information of the SIM card and a corresponding authorization code;
  • a second instruction output module configured to search for a terminal usage file of the SIM card according to the request for querying the SIM card using the terminal, and send a list of the identity information of the SIM card use terminal to the first terminal .
  • the anti-theft device further includes:
  • a third obtaining module configured to: after the third storage module saves the authorization code in the SIM card usage file of the first terminal, acquire, by the third terminal, a query for the SIM card used by the first terminal And sending, by the query, the SIM card record request used by the first terminal includes the identity information of the SIM card currently used by the third terminal, the corresponding authorization code, and the identity information of the first terminal that needs to be queried;
  • the third instruction output module searches for the SIM card usage file of the first terminal according to the query request of the SIM card used by the first terminal, and sends the used file to the third terminal. A list of the identity information of the SIM card.
  • the anti-theft device further includes:
  • the second determining module is configured to compare the first terminal by using the SIM card usage file of the first terminal and the terminal usage file of the SIM card based on the identity information of the SIM card and the identity information of the first terminal.
  • the length of use of the SIM card used is determined to be greater than the preset time length, the corresponding SIM card is set as the super user, and the super user has the right to send a control command to the first terminal;
  • the control command includes erasing data of the first terminal, destroying the first terminal, and locating the first terminal.
  • a computer storage medium storing computer executable instructions for use in a computer storage medium.
  • the anti-theft method applied to the first terminal according to the embodiment of the present invention is performed.
  • a computer storage medium storing computer executable instructions for performing the application to the cloud according to an embodiment of the present invention.
  • the anti-theft method of the server is provided.
  • the beneficial effects of the embodiment of the present invention are: in this embodiment, the identity information of the SIM card used by the terminal device and the terminal device is synchronously saved to the cloud server, and after the terminal device is lost or stolen, the user can query the lost through the cloud server. Or the use of the stolen terminal device, and can send control commands to the lost or stolen terminal device through the cloud server, remotely clear important information in the terminal device or destroy the terminal device or locate the terminal device, thereby preventing important in the terminal device.
  • Information disclosure also provides further possibilities for retrieving terminal devices.
  • Embodiment 1 is a flow chart showing an antitheft method according to Embodiment 1 of the present invention.
  • FIG. 2 is a schematic diagram showing a query result of a cloud server displayed by a first terminal in an embodiment of the present invention
  • FIG. 3 is a schematic flow chart showing an antitheft method according to Embodiment 2 of the present invention.
  • FIG. 4 is a schematic diagram showing an interaction process of a user querying terminal information through a cloud server in an embodiment of the present invention
  • Figure 5 is a block diagram showing an antitheft device applied to a first terminal side in an embodiment of the present invention
  • Fig. 6 is a block diagram showing an antitheft device applied to the cloud server side in the embodiment of the present invention.
  • the anti-theft method applied to the first terminal in the embodiment of the present invention first detects the state of the user identity identification SIM card insertion interface of the first terminal, and reads the current use SIM when detecting that the SIM card insertion interface has a SIM card insertion.
  • the identity information of the card is determined according to the read information, and whether the identity information of the currently used SIM card is not saved in advance. If the determination result is yes, the identity information of the current SIM card is saved, and the identity of the first terminal is acquired.
  • FIG. 1 is a schematic flow chart of an antitheft method according to Embodiment 1 of the present invention; as shown in FIG. 1, the method includes:
  • Step S101 The state of the SIM card insertion interface of the first terminal is detected.
  • step S102 is performed.
  • Step S102 When it is detected that the SIM card insertion interface has a SIM card inserted, the identity information of the SIM card is read.
  • the SIM card insertion interface detects the insertion of the SIM card
  • the identity information of the inserted SIM card is read, and the identity information of the SIM card may specifically be the card number of the SIM card, and step S103 is performed.
  • Step S103 When it is determined that the identity information of the SIM card is not pre-stored in the first terminal, the identity information of the SIM card is saved.
  • the identity information of the SIM card read in step S102 it is determined whether the identity information of the SIM card is the SIM card identity information that is not pre-saved. If the determination result is yes, that is, the identity information of the SIM card is not The pre-stored SIM card identity information is used to save the identity information of the SIM card.
  • Step S104 Obtain identity information of the first terminal, upload identity information of the SIM card, and identity information of the first terminal to a cloud server, so that the cloud server synchronously saves identity information of the SIM card and And identifying the identity information of the first terminal, and establishing a SIM card usage file of the first terminal and a terminal usage file of the SIM card.
  • the cloud server enables the cloud server to synchronously save the identity information of the current SIM card and the identity information of the first terminal, and establish a SIM card usage file of the first terminal and a terminal usage file of the SIM card. Users can query the file information stored in the cloud server when needed.
  • IMEI mobile device international identity
  • the method further includes:
  • Step S1031 Create an authorization code corresponding to the identity information of the SIM card, and upload the authorization code to the cloud server, so that the cloud server saves the authorization code, and has a one-to-one correspondence between the authorization code and the identity information of the SIM card.
  • the method further includes: displaying the authorization code.
  • the authorization code is generated by the first terminal by using the identity information of the SIM card according to a preset algorithm, and each SIM card number corresponds to a unique authorization code; after the authorization code is saved in the cloud server, the A terminal may display an authorization code to prompt the user to record. If the user wants to query the identity information of the first terminal and the SIM card stored in the cloud server, the identity information of the SIM card and the corresponding information need to be provided at the same time.
  • Authorization code where the user can query by texting or logging in to the cloud server through the network. If the user forgets the authorization code, the SIM card can be inserted into the terminal device with the anti-theft mechanism to view the authorization code information.
  • the authorization code is uploaded to the cloud server to enable the cloud service After the authorization code is saved, the method further includes:
  • the sent request for querying the SIM card using the terminal includes the identity information of the SIM card and a corresponding authorization code;
  • the identity information of the current SIM card and the corresponding authorization code are provided at the same time.
  • the method further includes:
  • the method further includes:
  • the sent request for querying the SIM card used by the second terminal includes the identity information of the SIM card currently used by the first terminal Corresponding authorization code and identity information of the second terminal that needs to be queried.
  • the user may query the information of the other terminal device through the terminal device having the anti-theft mechanism, but provide the cloud server with the identity information and the corresponding authorization of the SIM card currently used in the terminal device performing the query operation. The code and the identity information of the terminal device being queried.
  • the method further includes:
  • Step S105 Receive a control instruction sent by the cloud server, and perform a control operation on the first terminal according to the control instruction.
  • the control instruction includes erasing data of the first terminal, destroying the first terminal, and a location location.
  • the first terminal is described. In this embodiment, after the first terminal is stolen or lost, the important information stored in the first terminal may be prevented from leaking, and the first terminal that is stolen or lost may also be conveniently found.
  • the identity information of the SIM card is saved, and the synchronization status flag is recorded as 0, that is, the first terminal is indicated.
  • the information needs to be synchronized with the cloud server, and the synchronized information content includes the identity information of the first terminal and the identity information of the SIM card, and uploads the identity information of the SIM card and the identity information of the first terminal to the cloud server.
  • the cloud server completes the synchronization when it is determined that the cloud server completes the synchronous storage of the identity information of the SIM card and the feedback information of the identity information of the first terminal. Thereafter, the synchronization status flag is recorded as 1.
  • the embodiment of the present invention further provides a computer storage medium, where the computer storage medium stores computer executable instructions, and the computer executable instructions are used to execute the antitheft method applied to the first terminal according to the embodiment of the present invention. .
  • the technical solution provided by the embodiment of the present invention is to synchronously store the identity information of the SIM card used in the same terminal on the cloud server, so that the user can judge the time and usage of the lost or stolen terminal according to the queried information. It is important to complete the synchronization between the terminal and the cloud server.
  • the terminal After the terminal is lost or stolen, it is directly used for card replacement, and the terminal will send the identity information of the currently used SIM card to the cloud server to complete synchronization;
  • the terminal is restored to the factory settings or brushed. If the identity information of the currently used SIM card has been saved in the terminal before being restored to the factory settings or brushed, but the synchronization with the cloud server is not completed, the factory is restored. Even if the SIM card is not inserted in the plug-in interface of the terminal, the terminal synchronizes with the cloud server; if the identity information of the SIM card currently used before the factory reset is saved in the terminal, the SIM card is inserted into the card of the terminal again. After the interface is synchronized with the cloud server;
  • SIM card number used by the network can be synchronized to the cloud server, and the user can query the currently used SIM card number. .
  • FIG. 2 is a schematic diagram showing the result of the cloud server query displayed by the first terminal in the embodiment of the present invention.
  • the SIM card of the user may exist in two or more files due to the SIM card. Used in different terminal devices with this anti-theft mechanism.
  • the cloud server will return the SIMEI associated IMEI code for the last 3 months, and indicate the usage time. The user can determine the lost or stolen terminal according to the specific usage time. And check the current status of the lost or stolen terminal.
  • the embodiment of the invention further provides an anti-theft method, and the anti-theft method is applied to a cloud server.
  • 3 is a schematic flow chart of an antitheft method according to Embodiment 2 of the present invention; as shown in FIG. 3, the method includes:
  • Step S201 Acquire identity information of the SIM card sent by the first terminal and identity information of the first terminal.
  • Step S202 Synchronize the identity information of the SIM card and the identity information of the first terminal, and establish a SIM card usage file of the first terminal based on the identity information of the SIM card and the identity information of the first terminal. And the terminal of the SIM card uses the file.
  • the cloud server After the synchronization saves the identity information of the SIM card and the identity information of the first terminal, the cloud server establishes a SIM card usage file of the first terminal and a terminal usage file of the SIM card, and the user may Need to query the usage files of the terminal device and SIM card.
  • the synchronization saves identity information of the SIM card and identity information of the first terminal, and establishes the first information based on identity information of the SIM card and identity information of the first terminal.
  • the method further includes:
  • Step S203 Acquire an authorization code sent by the first terminal, and save the authorization code in a SIM card usage file of the first terminal.
  • the method further includes:
  • Step S204 Acquire an instruction for operating the first terminal by the second terminal, and send a control instruction to the first terminal according to the instruction; the control instruction includes erasing data of the first terminal. Destroying the first terminal and locating the first terminal.
  • a super user is set on the cloud server, and only the super user has the right to send a control command to the first terminal.
  • the setting rule of the super user is: comparing the length of use of all the SIM cards used by the first terminal, determining that the SIM card having the longest usage time is the super user, and enabling the super user to have the right authority
  • the first terminal sends a control command, the control command includes erasing data of the first terminal, destroying the first terminal, and locating the first terminal.
  • the method further includes:
  • CXSJ is an abbreviation for querying mobile phones.
  • This example is a way to query information, or you can log in to the cloud website for similar methods.
  • the method further includes:
  • Obtaining a record request sent by the third terminal for querying the SIM card used by the first terminal, and sending the record request for querying the SIM card used by the first terminal includes the identity information of the SIM card currently used by the third terminal Corresponding authorization code and identity information of the first terminal that needs to be queried;
  • IMEI1's user profile is:
  • the first terminal After receiving the short message command, the first terminal will automatically return to the current location;
  • the first terminal After receiving the short message instruction, the first terminal automatically erases the data in the storage space;
  • CXWZ is an abbreviation for the query location
  • CCSJ is an abbreviation for erasing data.
  • This example is a way to query information, or you can log in to the cloud website for similar methods.
  • the embodiment of the invention further provides a computer storage medium, wherein the computer storage medium stores computer executable instructions, and the computer executable instructions are used to execute the anti-theft method applied to the cloud server according to the embodiment of the invention.
  • FIG. 4 is a schematic diagram showing an interaction process of a user querying terminal information through a cloud server in an embodiment of the present invention.
  • the first terminal may send a query to the cloud server to query the SIM card usage file record of the first terminal or use the current SIM card.
  • the cloud server determines whether the request information sent by the first terminal is correct, and if yes, sends the SIM card usage record of the first terminal or the current SIM to the first terminal.
  • the card uses the information recorded by the terminal file.
  • the process in which the second terminal sends a request for querying the SIM card usage file record of the first terminal to the cloud server or the first terminal sends a request for querying the SIM card usage file record of the second terminal to the cloud server is the same as the process described above. same.
  • FIG. 5 is a block diagram of an anti-theft device applied to the first terminal side in the embodiment of the present invention; as shown in FIG. 5, the anti-theft device includes:
  • the detecting module 301 is configured to detect a state of the SIM card insertion interface of the first terminal;
  • the reading module 302 is configured to read the identity information of the SIM card when the detecting module 301 detects that the SIM card insertion interface has a SIM card insertion;
  • the first determining module 303 is configured to determine whether the first terminal does not save the foregoing Identity information of the SIM card;
  • the first storage module 304 is configured to save the identity information of the SIM card when the first determining module 303 determines that the identity information of the SIM card is not pre-stored in the first terminal;
  • the transmitting module 306 is configured to acquire the identity information of the first terminal, and upload the identity information of the SIM card saved by the first storage module 304 and the identity information of the first terminal to a cloud server, so that the The cloud server synchronously saves the identity information of the SIM card and the identity information of the first terminal, and establishes a SIM card usage file of the first terminal and a terminal usage file of the SIM card.
  • the anti-theft device further includes: an authorization code creation module 305, configured to: after the first storage module 304 saves the identity information of the SIM card, create an identity information corresponding to the SIM card. And the authorization code is uploaded to the cloud server, so that the cloud server saves the authorization code, and has a one-to-one correspondence between the authorization code and the identity information of the SIM card.
  • an authorization code creation module 305 configured to: after the first storage module 304 saves the identity information of the SIM card, create an identity information corresponding to the SIM card. And the authorization code is uploaded to the cloud server, so that the cloud server saves the authorization code, and has a one-to-one correspondence between the authorization code and the identity information of the SIM card.
  • the anti-theft device further includes: a display module configured to display the authorization code.
  • the anti-theft device further includes: a first query module configured to send a request to the cloud server to query the SIM card usage terminal record; wherein the sent query uses the SIM card use terminal
  • the recorded request includes the identity information of the SIM card and a corresponding authorization code.
  • the anti-theft device further includes: a second query module, configured to send, to the cloud server, a request for querying a SIM card usage file record of the first terminal; wherein the sent query is The request for using the file record by the SIM card of the first terminal includes an email address, and the email address is an email address bound to the first terminal.
  • a second query module configured to send, to the cloud server, a request for querying a SIM card usage file record of the first terminal; wherein the sent query is The request for using the file record by the SIM card of the first terminal includes an email address, and the email address is an email address bound to the first terminal.
  • the anti-theft device further includes: a third query module configured to send, to the cloud server, a request for querying a SIM card record used by the second terminal; wherein, the sent The request for querying the SIM card used by the second terminal includes the identity information of the SIM card currently used by the first terminal, the corresponding authorization code, and the identity information of the second terminal that needs to be queried.
  • a third query module configured to send, to the cloud server, a request for querying a SIM card record used by the second terminal; wherein, the sent The request for querying the SIM card used by the second terminal includes the identity information of the SIM card currently used by the first terminal, the corresponding authorization code, and the identity information of the second terminal that needs to be queried.
  • the anti-theft device further includes: a receiving module configured to receive a control instruction sent by the cloud server, and perform a control operation on the first terminal according to the control instruction; Deleting the first terminal and locating the first terminal in addition to the data of the first terminal.
  • the anti-theft device further includes: a synchronization status module configured to: after determining that the identity information of the SIM card is not pre-saved in the first terminal, record the synchronization status flag as 0; After uploading the identity information of the SIM card and the identity information of the first terminal to the cloud server, determining that the cloud server receives the identity information of the SIM card and the identity information of the first terminal are synchronously saved. The synchronization status flag is recorded as 1 when the feedback information is received.
  • a synchronization status module configured to: after determining that the identity information of the SIM card is not pre-saved in the first terminal, record the synchronization status flag as 0; After uploading the identity information of the SIM card and the identity information of the first terminal to the cloud server, determining that the cloud server receives the identity information of the SIM card and the identity information of the first terminal are synchronously saved. The synchronization status flag is recorded as 1 when the feedback information is received.
  • the first storage module is located in an area in the first terminal where it is difficult to change information; specifically, the first storage module is located in a read only memory (ROM) in the first terminal.
  • ROM read only memory
  • Boot Area Partition or PRMB Area Partition in the zone In addition to the Boot Area Partition or PRMB Area Partition in the ROM area, it can also be a ROM space of other devices, such as a separate encrypted ROM, an audio processor, a ROM, a SENSOR ROM, which is characterized in that the content stored therein is restored by the factory. Settings or flashing cannot be changed.
  • processing units in the anti-theft device of the embodiments of the present invention can be understood by referring to the related description of the anti-theft method.
  • the processing units in the anti-theft device according to the embodiments of the present invention can be implemented by implementing the present invention.
  • the function of the analog circuit described in the example is implemented, and can also be implemented by running the software of the function described in the embodiment of the present invention on the smart terminal.
  • the detecting module 301, the reading module 302, the first determining module 303, and the authorization code creating module 305 in the anti-theft device may be centrally located in the device in practical applications.
  • the first storage module 304 in the anti-theft device is actually In an application, it may be implemented by a memory in the device; in a practical application, the transmission module 306 in the anti-theft device may be implemented by a transceiver or a transceiver antenna in the device.
  • the embodiment of the invention also provides an anti-theft device.
  • 6 is a block diagram showing an antitheft device applied to a cloud server side in an embodiment of the present invention; as shown in FIG. 6, the antitheft device includes:
  • the first obtaining module 401 is configured to acquire identity information of the SIM card sent by the first terminal and identity information of the first terminal;
  • the second storage module 402 is configured to synchronously save the identity information of the SIM card and the identity information of the first terminal, and establish the first terminal based on the identity information of the SIM card and the identity information of the first terminal.
  • the SIM card uses the file and the SIM card for the terminal to use the file.
  • the anti-theft device further includes: a third storage module 403, configured to: the second storage module 402 establishes the first information based on identity information of the SIM card and identity information of the first terminal After the SIM card of the terminal uses the file and the terminal of the SIM card to use the file, the authorization code sent by the first terminal is obtained, and the authorization code is saved in the SIM card usage file of the first terminal.
  • a third storage module 403 configured to: the second storage module 402 establishes the first information based on identity information of the SIM card and identity information of the first terminal After the SIM card of the terminal uses the file and the terminal of the SIM card to use the file, the authorization code sent by the first terminal is obtained, and the authorization code is saved in the SIM card usage file of the first terminal.
  • the anti-theft device further includes: a first instruction output module 404 configured to acquire an instruction sent by the second terminal to operate the first terminal, according to the instruction, to the A terminal sends a control command; the control command includes erasing data of the first terminal, destroying the first terminal, and locating the first terminal.
  • the anti-theft device further includes: a second acquiring module, configured to: after the third storage module 403 saves the authorization code in the SIM card usage file of the first terminal, acquire the The request sent by the first terminal to query the SIM card using the terminal, The sent request for querying the SIM card using the terminal includes the identity information of the SIM card and a corresponding authorization code;
  • a second instruction output module configured to search for a terminal usage file of the SIM card according to the request for querying the SIM card using the terminal, and send a list of the identity information of the SIM card use terminal to the first terminal .
  • the anti-theft device further includes: a third obtaining module, configured to: the third storage module 403 saves the authorization code after the SIM card usage file of the first terminal, and acquires a third Querying, by the terminal, the SIM card record request used by the first terminal, and sending the query that the SIM card record request used by the first terminal includes the identity information of the SIM card currently used by the third terminal, and the corresponding authorization The code and the identity information of the first terminal that needs to be queried;
  • a third instruction output module configured to search for a SIM card usage file of the first terminal according to the query request for querying the SIM card used by the first terminal, and send the first terminal to the third terminal A list of identity information that has been used with the SIM card.
  • the anti-theft device further includes: a second determining module, configured to establish a SIM card usage file of the first terminal based on identity information of the SIM card and identity information of the first terminal After the terminal of the SIM card uses the file, compare the length of use of the SIM card used by the first terminal, and determine that the used time length is greater than the preset time length, set the corresponding SIM card as the super user, and make the The super user has the right to send a control instruction to the first terminal; the control instruction includes erasing data of the first terminal, destroying the first terminal, and locating the first terminal.
  • a second determining module configured to establish a SIM card usage file of the first terminal based on identity information of the SIM card and identity information of the first terminal After the terminal of the SIM card uses the file, compare the length of use of the SIM card used by the first terminal, and determine that the used time length is greater than the preset time length, set the corresponding SIM card as the super user, and make the The super user has the right to send a control instruction to the first terminal
  • processing units in the anti-theft device of the embodiments of the present invention can be understood by referring to the related description of the anti-theft method.
  • the processing units in the anti-theft device according to the embodiments of the present invention can be implemented by implementing the present invention.
  • the function of the analog circuit described in the example is implemented, and the software running the function described in the embodiment of the present invention can also be implemented on the smart terminal. Now.
  • the second storage module 402 and the third storage module 403 in the anti-theft device may be implemented by a memory in the device in an actual application; the first acquisition module 401 in the anti-theft device and The first instruction output module 404 can be implemented by a transceiver or a transceiver antenna in the device in practical applications.
  • embodiments of the present invention can be provided as a method, system, or computer program product. Accordingly, the present invention can take the form of a hardware embodiment, a software embodiment, or a combination of software and hardware. Moreover, the invention can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage and optical storage, etc.) including computer usable program code.
  • the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
  • the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
  • These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device. Instructions are provided for implementation The steps of a function specified in a block or blocks of a flow or a flow and/or a block diagram of a flow chart.
  • the embodiment of the present invention saves the identity information of the SIM card used by the terminal device and the terminal device to the cloud server, and after the terminal device is lost or stolen, the user can query the use of the lost or stolen terminal device through the cloud server.
  • the cloud server can send control commands to the lost or stolen terminal device, remotely clear important information in the terminal device or destroy the terminal device or locate the terminal device, prevent important information leakage in the terminal device, and also retrieve the terminal.
  • the device offers further possibilities.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

Selon ses modes de réalisation, la présente invention concerne un procédé de sécurité, un dispositif de sécurité et un support d'informations pour ordinateur, ledit procédé comprenant : la détection de l'état d'un orifice d'introduction de carte SIM d'un premier terminal ; lorsqu'il est détecté qu'une carte SIM est introduite dans l'orifice d'introduction de carte SIM, la lecture des informations d'identité de la carte SIM ; lorsqu'il est déterminé que les informations d'identité de la carte SIM n'ont pas été mémorisées au préalable dans le terminal, la mémorisation des informations d'identité de la carte SIM ; l'obtention des informations d'identité du premier terminal et le téléchargement de ces informations avec les informations d'identité de la carte SIM vers un serveur sur un cloud, ce qui amène ledit serveur à synchroniser les informations d'identité respectives de la carte SIM et du premier terminal, puis à créer un fichier d'utilisation de carte SIM pour le premier terminal et un fichier d'utilisation de terminal pour la carte SIM.
PCT/CN2015/071474 2014-10-17 2015-01-23 Procédé de sécurité, dispositif de sécurité et support d'informations pour ordinateur WO2015131705A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410554870.3 2014-10-17
CN201410554870.3A CN105578451A (zh) 2014-10-17 2014-10-17 一种防盗方法及防盗装置

Publications (1)

Publication Number Publication Date
WO2015131705A1 true WO2015131705A1 (fr) 2015-09-11

Family

ID=54054553

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/071474 WO2015131705A1 (fr) 2014-10-17 2015-01-23 Procédé de sécurité, dispositif de sécurité et support d'informations pour ordinateur

Country Status (2)

Country Link
CN (1) CN105578451A (fr)
WO (1) WO2015131705A1 (fr)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105635488A (zh) * 2016-03-17 2016-06-01 广东欧珀移动通信有限公司 一种移动终端防盗处理的方法及设备
CN105657709A (zh) * 2016-02-24 2016-06-08 惠州Tcl移动通信有限公司 云端化网络化移动终端及其通信方法和云通信系统
CN105704697A (zh) * 2016-03-25 2016-06-22 广东欧珀移动通信有限公司 网络侧实现移动设备丢失报警的方法和系统
CN113407364A (zh) * 2021-06-25 2021-09-17 青岛海信移动通信技术股份有限公司 应用程序的调用服务方法、装置、电子设备及存储介质
CN113543023A (zh) * 2021-07-29 2021-10-22 展讯半导体(成都)有限公司 一种定位方法及通信装置

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106304033A (zh) * 2016-08-31 2017-01-04 北京握奇数据系统有限公司 一种基于机卡绑定的手机信息防御方法及系统
CN108134995A (zh) * 2017-04-26 2018-06-08 黄策 机卡分离型网络终端的有效性管理办法
CN107197102A (zh) * 2017-06-29 2017-09-22 北京小米移动软件有限公司 通信请求处理方法、装置及存储介质
CN113821843A (zh) * 2020-06-18 2021-12-21 青岛海信移动通信技术股份有限公司 移动终端及其插入卡的类型确定方法
CN113190824B (zh) * 2021-04-19 2023-02-21 深圳市安全守护科技有限公司 身份信息的获取方法、装置、终端设备及计算机存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1395407A (zh) * 2001-07-05 2003-02-05 致福股份有限公司 移动电话防盗窃的设定及其运作方法
US20080081609A1 (en) * 2006-09-29 2008-04-03 Motorola, Inc. Method and system for associating a user profile to a sim card
CN103648089A (zh) * 2013-11-07 2014-03-19 北京奇虎科技有限公司 移动设备防盗处理方法及设备
CN103813315A (zh) * 2014-03-05 2014-05-21 上海优思通信科技有限公司 移动通讯终端数据保护方法

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7474894B2 (en) * 2004-07-07 2009-01-06 At&T Mobility Ii Llc System and method for IMEI detection and alerting
CN103379478B (zh) * 2012-04-25 2015-05-27 腾讯科技(深圳)有限公司 一种控制方法、系统、客户端和服务器
CN103702318A (zh) * 2013-12-13 2014-04-02 北京奇虎科技有限公司 移动终端防盗方法及客户端

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1395407A (zh) * 2001-07-05 2003-02-05 致福股份有限公司 移动电话防盗窃的设定及其运作方法
US20080081609A1 (en) * 2006-09-29 2008-04-03 Motorola, Inc. Method and system for associating a user profile to a sim card
CN103648089A (zh) * 2013-11-07 2014-03-19 北京奇虎科技有限公司 移动设备防盗处理方法及设备
CN103813315A (zh) * 2014-03-05 2014-05-21 上海优思通信科技有限公司 移动通讯终端数据保护方法

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105657709A (zh) * 2016-02-24 2016-06-08 惠州Tcl移动通信有限公司 云端化网络化移动终端及其通信方法和云通信系统
CN105657709B (zh) * 2016-02-24 2019-09-24 惠州Tcl移动通信有限公司 云端化网络化移动终端及其通信方法和云通信系统
CN105635488A (zh) * 2016-03-17 2016-06-01 广东欧珀移动通信有限公司 一种移动终端防盗处理的方法及设备
CN105704697A (zh) * 2016-03-25 2016-06-22 广东欧珀移动通信有限公司 网络侧实现移动设备丢失报警的方法和系统
CN113407364A (zh) * 2021-06-25 2021-09-17 青岛海信移动通信技术股份有限公司 应用程序的调用服务方法、装置、电子设备及存储介质
CN113543023A (zh) * 2021-07-29 2021-10-22 展讯半导体(成都)有限公司 一种定位方法及通信装置
CN113543023B (zh) * 2021-07-29 2022-08-02 展讯半导体(成都)有限公司 一种定位方法及通信装置

Also Published As

Publication number Publication date
CN105578451A (zh) 2016-05-11

Similar Documents

Publication Publication Date Title
WO2015131705A1 (fr) Procédé de sécurité, dispositif de sécurité et support d'informations pour ordinateur
US10355865B1 (en) Systems and techniques for certification of trusted media data
EP3075177B1 (fr) Procédé, appareil et dispositif pour échanger une carte de visite
KR102065833B1 (ko) 데이터 동기화 방법 및 장치
TWI512491B (zh) 通訊系統及其相關資料同步方法
WO2015101320A1 (fr) Procédé de génération de numéro de compte, terminal et serveur d'arrière-plan
KR101656633B1 (ko) 파일 백업 방법, 장치, 프로그램 및 기록매체
CN103914520B (zh) 数据查询方法、终端设备和服务器
US20170270106A1 (en) Methods and apparatuses for storing file path and accessing local file
WO2015085146A1 (fr) Synchronisation de contenu entre des dispositifs
WO2014111022A1 (fr) Procédé d'affichage de données utilisateurs de terminaux mobiles, terminal mobile, et système de services
US9438609B2 (en) Device verification prior to registration
WO2017076051A1 (fr) Procédé et appareil d'acquisition d'une autorisation de superutilisateur
CN103281375A (zh) 一种第三方应用的联系人管理方法及装置、系统
US20140310780A1 (en) Communication system
WO2015117356A1 (fr) Procédé de démarrage et terminal de communication
WO2018103370A1 (fr) Procédé de réinitialisation d'un système, appareil et dispositif électronique associés
WO2012126241A1 (fr) Procédé et appareil de gestion d'informations d'utilisateur
WO2021233351A1 (fr) Procédé et dispositif de transfert de données ainsi que terminal et support d'informations lisible par ordinateur
CN106937281B (zh) 一种终端应用的管理方法、装置、终端及服务器
WO2017166780A1 (fr) Procédé et appareil de suppression d'informations de terminal utilisateur et dispositif électronique
WO2017156931A1 (fr) Système et procédé de verrouillage destinés à un terminal mobile
WO2017190411A1 (fr) Procédé et dispositif de synchronisation d'application
WO2016095359A1 (fr) Procédé et système pour transmettre des données entre des terminaux intelligents
TW201800981A (zh) 行動電話安全鎖定系統及鎖定方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15757675

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15757675

Country of ref document: EP

Kind code of ref document: A1