WO2018201738A1 - Method for locking mobile terminal, mobile terminal and computer-readable storage medium - Google Patents
Method for locking mobile terminal, mobile terminal and computer-readable storage medium Download PDFInfo
- Publication number
- WO2018201738A1 WO2018201738A1 PCT/CN2017/118658 CN2017118658W WO2018201738A1 WO 2018201738 A1 WO2018201738 A1 WO 2018201738A1 CN 2017118658 W CN2017118658 W CN 2017118658W WO 2018201738 A1 WO2018201738 A1 WO 2018201738A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- mobile terminal
- unique identifier
- information
- locking
- flag bit
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/22—Processing or transfer of terminal data, e.g. status or physical capabilities
- H04W8/24—Transfer of terminal data
- H04W8/245—Transfer of terminal data from a network towards a terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/725—Cordless telephones
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/22—Processing or transfer of terminal data, e.g. status or physical capabilities
- H04W8/24—Transfer of terminal data
Definitions
- This document relates to, but is not limited to, the field of mobile terminal technologies, and in particular, to a method for locking a mobile terminal, a mobile terminal, and a computer readable storage medium.
- the stolen mobile terminal is locked by issuing a remote lock command.
- the mobile terminal is locked by the above solution, and the mobile phone needs to have a data service connection.
- the SIM card will be directly removed after the mobile phone is stolen, and the WIFI networking will not be enabled in the short term after being turned on.
- the terminal cannot connect to the data service. Therefore, the stolen mobile terminal cannot receive the remote lock command issued, and the stolen mobile terminal cannot be locked by the issued remote lock command.
- the embodiment of the invention provides a method for locking a mobile terminal, a mobile terminal and a computer readable storage medium.
- An embodiment of the present invention provides a method for locking a mobile terminal, where the method includes the following steps:
- the group sends the group-sending information that is sent by the operator through the dedicated channel according to the period, it is determined whether the group-distributed information has information that matches the unique identifier of the mobile terminal;
- the mobile terminal is determined to have lost the mobile terminal, and the lost mobile terminal is locked.
- the step of receiving, by the operator, the group sending information that is sent by using the dedicated channel according to the period, and determining whether the group sending information has information that matches the unique identifier of the mobile terminal includes:
- the group sending information has information that matches the unique identifier of the mobile terminal; if the information that matches the unique identifier of the mobile terminal is not matched, determining the group sending There is no information in the message that matches the unique identifier of the mobile terminal.
- the unique identifier of the mobile terminal includes: at least one of a Bluetooth address of the mobile terminal, a MAC address, and a registered address of the network terminal that the mobile terminal last registered by the local number.
- the method further includes:
- the lost mobile terminal When the location request information is received, the lost mobile terminal is located, and the location information of the lost mobile terminal is sent to the operator.
- the method further includes:
- the mobile terminal is determined to have retrieved the mobile terminal, and the retrieved mobile terminal is unlocked.
- an embodiment of the present invention further provides a mobile terminal, where the mobile terminal includes a processor and a memory, where the memory stores a program for locking the mobile terminal, and the processor is configured to execute the program for locking the mobile terminal.
- the group sends the group-sending information that is sent by the operator through the dedicated channel according to the period, it is determined whether the group-distributed information has information that matches the unique identifier of the mobile terminal;
- the flag bit corresponding to the unique identifier is a lock flag bit
- the mobile terminal is determined to have lost the mobile terminal, and the lost mobile terminal is locked.
- the method for locking a mobile terminal, the mobile terminal, and the computer readable storage medium provided by the embodiment of the present invention, if the mobile terminal has no data service connection, if the mobile terminal does not have a data service connection, if the operator receives the cycle according to the cycle
- the group sending information sent by the dedicated channel determines whether there is information matching the unique identifier of the mobile terminal in the group sending information, and the mobile terminal does not need to connect to the data service, and can receive the group sending information of the operator through a dedicated channel.
- the flag bit corresponding to the unique identifier is a lock flag bit; if the flag bit corresponding to the unique identifier is a lock flag bit And determining, by the mobile terminal, that the mobile terminal has been lost, and locking the lost mobile terminal, so that after the mobile terminal is lost, even if the data service is not connected, the locking can be performed, thereby ensuring that the mobile terminal is locked.
- the security of mobile terminal information If the information that matches the unique identifier of the mobile terminal exists in the group sending information, determining whether the flag bit corresponding to the unique identifier is a lock flag bit; if the flag bit corresponding to the unique identifier is a lock flag bit And determining, by the mobile terminal, that the mobile terminal has been lost, and locking the lost mobile terminal, so that after the mobile terminal is lost, even if the data service is not connected, the locking can be performed, thereby ensuring that the mobile terminal is locked. The security of mobile terminal information.
- FIG. 1 is a schematic flowchart of a method for locking a mobile terminal according to an embodiment of the present invention
- 2 is a step of determining, according to a method for locking a mobile terminal, a message that the operator receives the group sending information that is sent through the dedicated channel according to the period, and determines whether the group sending information matches the unique identifier of the mobile terminal.
- FIG. 3 is a schematic flowchart of another method for locking a mobile terminal according to an embodiment of the present invention.
- FIG. 4 is a schematic structural diagram of a terminal in a hardware operating environment according to an embodiment of the present invention.
- the mobile terminal does not have a data service connection
- the mobile terminal does not have a data service connection
- the group sends the group sending information that is sent by the operator through the dedicated channel according to the period, it is determined whether the group sending information exists.
- the mobile terminal does not need to connect to the data service, and the group sending information of the operator can be received through the dedicated channel, if the unique identifier of the mobile terminal exists in the group sending information
- Corresponding information determining whether the flag bit corresponding to the unique identifier is a lock flag bit; if the flag bit corresponding to the unique identifier is a lock flag bit, determining, by the mobile terminal, that the mobile terminal has lost the mobile terminal, and The lost mobile terminal is locked, so that after the mobile terminal is lost, even if the data service is not connected, the lock can be performed, and the security of the mobile terminal information is ensured.
- the mobile terminal locking method generally requires the mobile terminal to connect to the data service in order to receive the remote locking instruction and then lock the mobile terminal.
- the disadvantage of the embodiment of the present invention is that the SIM card will be directly removed after the mobile phone is stolen, and the WIFI networking will not be enabled in the short-term after the booting, and the stolen mobile terminal cannot connect to the data service at this time. That is, the mobile terminal that has been remotely locked by the remote lock command cannot be received, so the stolen mobile terminal cannot be locked by the issued remote lock command, thereby causing information leakage of the mobile terminal.
- the embodiment of the present invention provides a method for locking a mobile terminal. If the mobile terminal does not have a data service connection, if the group sends the group sending information that is sent by the operator through the dedicated channel, it is determined whether the group sending information is If there is information that matches the unique identifier of the mobile terminal, the mobile terminal does not need to connect to the data service, and can receive the group sending information of the operator through the dedicated channel, if the group sending information exists and the unique identifier of the mobile terminal Corresponding information, determining whether the flag bit corresponding to the unique identifier is a lock flag bit; if the flag bit corresponding to the unique identifier is a lock flag bit, determining, by the mobile terminal, that the mobile terminal has been lost, and The lost mobile terminal is locked, so that after the mobile terminal is lost, even if the data service is not connected, the locking can be performed, and the security of the mobile terminal information is ensured.
- FIG. 1 is a schematic flowchart of a method for locking a mobile terminal according to an embodiment of the present invention.
- the method includes:
- Step S10 If the mobile terminal does not have a data service connection, if it receives the group sending information that is sent by the operator through the dedicated channel according to the period, it is determined whether the group sending information has information that matches the unique identifier of the mobile terminal. ;
- the operator After the user finds that his mobile terminal is lost or stolen, it needs to report the loss to the operator and register. After the user registers, the operator will register or provide the information according to the user, The unique identifier of the stolen mobile terminal is queried, and the lost or stolen information is added to the lost list, and the unique identifier of the lost or stolen mobile terminal and the corresponding lock flag are added to the group sending information, that is, the group sending The information includes the unique identifier of the mobile terminal and the corresponding flag bit, and the flag is generally 1 and 0. Of course, the flag bit may also be other numbers or symbols, which is not limited herein.
- the group sending information includes the unique identifier of the mobile terminal.
- the group sending information includes the unique identifier of the mobile terminal and 0.
- the operator may set a period for sending the group sending information.
- the operator can also set the range of sending group sending information, for example, the range of sending group sending information is set to intra-cell, intra-provincial or whole network.
- the group can transmit the group sending information. If the mobile terminal receives the group sending information that is sent by the operator through the dedicated channel according to the period, it is determined whether there is information in the group sending information that matches the unique identifier of the mobile terminal.
- the unique identifier of the mobile terminal includes: at least one of a Bluetooth address of the mobile terminal, a MAC address, and a registered address of the network terminal that the mobile terminal last registered by the local number.
- the unique identifier of the mobile terminal may include: a Bluetooth address of the mobile terminal, a MAC address, a production serial number, a factory serial number, and a registered address of the network registration of the mobile terminal by the local number for the last time, which is not limited herein. No longer list them one by one.
- Step S20 if there is information in the group sending information that matches the unique identifier of the mobile terminal, determining whether the flag bit corresponding to the unique identifier is a locking flag bit;
- the group sending information determines whether the flag bit corresponding to the unique identifier is a lock flag bit, and if the flag bit corresponding to the unique identifier is 1, Determining that the flag bit corresponding to the unique identifier is a lock flag bit. If the flag bit corresponding to the unique identifier is not 1, determining whether the flag bit corresponding to the unique identifier is 0. If 0, the corresponding flag bit of the unique identifier is unlocked. Sign bit. If there is no information in the group sending information that matches the unique identifier of the mobile terminal, and the mobile terminal cannot be determined to be lost or stolen, the group sending information sent by the operator needs to be continued.
- Step S30 If the flag bit corresponding to the unique identifier is a lock flag bit, determine, by the mobile terminal, that the mobile terminal has been lost, and lock the lost mobile terminal.
- the flag corresponding to the unique identifier is a lock flag, and it can be determined that the mobile terminal has been lost or stolen, the mobile terminal is determined to have lost the mobile terminal, and the mobile terminal can be determined according to the received mobile terminal.
- the unique identifier and the corresponding identification bit lock the mobile terminal to prevent the information in the mobile terminal from being leaked, thereby ensuring information security of the mobile terminal.
- the operator can send a location request to the mobile terminal through a dedicated channel.
- the method further includes:
- the lost mobile terminal When the location request information is received, the lost mobile terminal is located, and the location information of the lost mobile terminal is sent to the operator.
- the mobile terminal When the mobile terminal receives the positioning request sent by the operator, the mobile terminal locates the current positioning information, and then sends the obtained positioning information to the operator, so that the operator or the mobile terminal is currently located, thereby helping the user to Lost or stolen mobile terminals to retrieve, reducing the user's property losses.
- the method for locking a mobile terminal in the case that the mobile terminal does not have a data service connection, if the mobile terminal does not have a data service connection, if the group sends the group sending information that is sent by the operator through the dedicated channel according to the period, it is determined.
- the mobile terminal does not need to connect to the data service, and can receive the group sending information of the operator through the dedicated channel, if the group sending information exists and If the unique identifier of the mobile terminal matches the information, it is determined whether the flag bit corresponding to the unique identifier is a lock flag bit; if the flag bit corresponding to the unique identifier is a lock flag bit, determining, by the mobile terminal, that the mobile terminal is The mobile terminal is lost, and the lost mobile terminal is locked, so that after the mobile terminal is lost, even if the data service is not connected, the locking can be performed, and the security of the mobile terminal information is ensured.
- step S10 includes:
- Step S11 When receiving the group sending information sent by the operator through the dedicated channel according to the period, matching the group sending information with the unique identifier of the mobile terminal;
- Step S12 If the information that matches the unique identifier of the mobile terminal is matched, determining that the group sending information has information that matches the unique identifier of the mobile terminal; if the information that matches the unique identifier of the mobile terminal is not matched, determining There is no information in the group sending information that matches the unique identifier of the mobile terminal.
- the group sending information when receiving the group sending information that is sent by the operator through the dedicated channel according to the period, the group sending information is matched with the unique identifier of the mobile terminal, for example, when the received group sending information includes the Bluetooth address of the mobile terminal. And the MAC address, etc., the received group sending information is matched with the Bluetooth address and the MAC address of the mobile terminal, and if the group sending information matches the information corresponding to the Bluetooth address of the mobile terminal, the group sending information can be determined. There is information that matches the unique identifier of the mobile terminal; if the information that matches the Bluetooth address of the mobile terminal is not matched in the group sending information, the information that the unique identifier of the mobile terminal matches does not exist in the group sending information. At this time, it is not necessary to take a measure of locking or unlocking the mobile terminal, and the mobile terminal can continue to receive the group sending information.
- FIG. 3 it is a schematic flowchart of another method for locking a mobile terminal according to an embodiment of the present invention.
- the method further includes:
- Step S40 If the flag bit corresponding to the unique identifier is not the lock flag bit, determine whether the flag bit corresponding to the unique identifier is an unlock flag bit;
- Step S50 If the flag bit corresponding to the unique identifier is an unlocking flag, the mobile terminal determines that the mobile terminal has been retrieved, and unlocks the retrieved mobile terminal.
- the flag bit corresponding to the unique identifier is a lock flag bit
- the flag bit corresponding to the unique identifier is not a lock flag bit
- the flag bit is not 1
- the method for locking a mobile terminal after determining whether the flag bit corresponding to the unique identifier is a lock flag bit, if the flag bit corresponding to the unique identifier is not a lock flag bit, determining that the unique identifier corresponds to Whether the flag bit is an unlock flag bit; if the flag bit corresponding to the unique identifier is an unlock flag bit, determining, by the mobile terminal, that the mobile terminal has been retrieved, and unlocking the retrieved mobile terminal, thereby The lock state of the mobile terminal is made reversible.
- the embodiment of the invention further provides a mobile terminal.
- FIG. 4 is a schematic structural diagram of a terminal in a hardware operating environment according to an embodiment of the present invention.
- the terminal may be a PC, or may be a smart phone, a tablet computer, an e-book reader, an MP3 (Moving Picture Experts Group Audio Layer III) player, and an MP4 (Moving Picture Experts).
- Group Audio Layer IV dynamic video experts compress standard audio layers 3) Players, portable computers and other portable terminal devices with display functions.
- the terminal may include a processor 1001, such as a CPU, a network interface 1004, a user interface 1003, a memory 1005, and a communication bus 1002.
- the communication bus 1002 is arranged to implement connection communication between these components.
- the user interface 1003 can include a display, an input unit such as a keyboard, and the optional user interface 1003 can also include a standard wired interface, a wireless interface.
- the network interface 1004 can optionally include a standard wired interface, a wireless interface (such as a WI-FI interface).
- the memory 1005 may be a high speed RAM memory or a non-volatile memory such as a disk memory.
- the memory 1005 can also optionally be a storage device independent of the aforementioned processor 1001.
- the terminal may further include a camera, an RF (Radio Frequency) circuit, a sensor, an audio circuit, a WiFi module, and the like.
- sensors such as light sensors, motion sensors, and other sensors.
- the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor can adjust the brightness of the display screen according to the brightness of the ambient light, and the proximity sensor can perform the closing of the display when the mobile terminal moves to the ear. At least one operation in the backlight.
- the gravity acceleration sensor can detect the magnitude of acceleration in each direction (usually three axes), and can detect the magnitude and direction of gravity when stationary, and can be set to identify the posture of the mobile terminal (such as horizontal and vertical screen switching).
- the mobile terminal can also be equipped with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, This will not be repeated here.
- terminal structure shown in FIG. 4 does not constitute a limitation to the terminal, and may include more or less components than those illustrated, or a combination of certain components, or different component arrangements.
- a memory 1005 as a computer storage medium may include an operating system, a network communication module, a user interface module, and a program for locking the mobile terminal.
- the network interface 1004 is mainly configured to connect to the background server for data communication with the background server;
- the user interface 1003 is mainly configured to connect the client (user end) to perform data communication with the client;
- the processor 1001 may be set to call a program that locks the mobile terminal stored in the memory 1005 and perform the following operations:
- the group sends the group-sending information that is sent by the operator through the dedicated channel according to the period, it is determined whether the group-distributed information has information that matches the unique identifier of the mobile terminal;
- the mobile terminal is determined to have lost the mobile terminal, and the lost mobile terminal is locked.
- the processor 1001 may further execute a program for locking the mobile terminal stored in the memory 1005 to implement the following steps:
- the group sending information is matched with the unique identifier of the mobile terminal;
- the group sending information has information that matches the unique identifier of the mobile terminal; if the information that matches the unique identifier of the mobile terminal is not matched, determining the group sending There is no information in the message that matches the unique identifier of the mobile terminal.
- the processor 1001 may further execute a program for locking the mobile terminal stored in the memory 1005 to implement the following steps:
- the unique identifier of the mobile terminal includes at least one of a Bluetooth address of the mobile terminal, a MAC address, and a registered address of the network terminal that the mobile terminal last registered by the local number.
- the processor 1001 may further execute a program for locking the mobile terminal stored in the memory 1005 to implement the following steps:
- the lost mobile terminal When the location request information is received, the lost mobile terminal is located, and the location information of the lost mobile terminal is sent to the operator.
- the processor 1001 may further execute a program for locking the mobile terminal stored in the memory 1005 to implement the following steps:
- the mobile terminal is determined to have retrieved the mobile terminal, and the retrieved mobile terminal is unlocked.
- the embodiments of the mobile terminal of the present invention are basically the same as the foregoing embodiments of the method for locking the mobile terminal, and are not described herein.
- An embodiment of the present invention further provides a computer readable storage medium storing one or more programs, the one or more programs being executable by one or more processors to implement the following step:
- the group sends the group-sending information that is sent by the operator through the dedicated channel according to the period, it is determined whether the group-distributed information has information that matches the unique identifier of the mobile terminal;
- the mobile terminal is determined to have lost the mobile terminal, and the lost mobile terminal is locked.
- the one or more programs are executable by the one or more processors, and the following steps are further implemented:
- the group sending information has information that matches the unique identifier of the mobile terminal; if the information that matches the unique identifier of the mobile terminal is not matched, determining the group sending There is no information in the message that matches the unique identifier of the mobile terminal.
- the one or more programs are executable by the one or more processors, and the following steps are further implemented:
- the unique identifier of the mobile terminal includes at least one of a Bluetooth address of the mobile terminal, a MAC address, and a registered address of the network terminal that the mobile terminal last registered by the local number.
- the one or more programs are executable by the one or more processors, and the following steps are further implemented:
- the lost mobile terminal When the location request information is received, the lost mobile terminal is located, and the location information of the lost mobile terminal is sent to the operator.
- the one or more programs are executable by the one or more processors, and the following steps are further implemented:
- the mobile terminal is determined to have retrieved the mobile terminal, and the retrieved mobile terminal is unlocked.
- the embodiment of the computer readable storage medium of the present invention is substantially the same as the method for locking the mobile terminal and the mobile terminal, and is not described herein.
- computer storage medium includes volatile and nonvolatile, implemented in any method or technology for storing information, such as computer readable instructions, data structures, program modules, or other data. , removable and non-removable media.
- Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disc (DVD) or other optical disc storage, magnetic cartridge, magnetic tape, magnetic disk storage or other magnetic storage device, or may Any other medium used to store the desired information and that can be accessed by the computer.
- communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal, such as a carrier wave or other transport mechanism, and can include any information delivery media.
- the embodiment of the invention realizes that after the mobile terminal is lost, even if the data service is not connected, the locking can be performed, and the security of the information of the mobile terminal is ensured.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Human Computer Interaction (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
A method for locking a mobile terminal, the method comprising the following steps: in the case where the mobile terminal has no data service connection, if group information sent by an operator periodically by means of a dedicated channel is received, determining whether information matching the unique identifier of the mobile terminal exists in the group information (S10); if information matching the unique identifier of the mobile terminal exists in the group information , determining whether the flag bit corresponding to the unique identifier is a locking flag bit (S20); and if the flag bit corresponding to the unique identifier is a locking flag bit, determining the mobile terminal to be a lost mobile terminal, and locking the lost mobile terminal (S30).
Description
本文涉及但不限于移动终端技术领域,尤其涉及一种锁定移动终端的方法、移动终端及计算机可读存储介质。This document relates to, but is not limited to, the field of mobile terminal technologies, and in particular, to a method for locking a mobile terminal, a mobile terminal, and a computer readable storage medium.
大部分的手机被盗之后,都是通过下发远程锁定指令将被盗的移动终端进行锁定。通过上述方案将移动终端进行锁定,需要手机有数据业务连接,但现实生活中,手机被盗后SIM卡会被直接移除,开机后短期内也不会启用WIFI联网,此时被盗的移动终端是无法进行数据业务连接的,因此被盗的移动终端无法接收下发的远程锁定指令,进而被盗的移动终端无法通过下发的远程锁定指令进行锁定。After most of the mobile phones are stolen, the stolen mobile terminal is locked by issuing a remote lock command. The mobile terminal is locked by the above solution, and the mobile phone needs to have a data service connection. However, in real life, the SIM card will be directly removed after the mobile phone is stolen, and the WIFI networking will not be enabled in the short term after being turned on. The terminal cannot connect to the data service. Therefore, the stolen mobile terminal cannot receive the remote lock command issued, and the stolen mobile terminal cannot be locked by the issued remote lock command.
发明内容Summary of the invention
以下是对本文详细描述的主题的概述。本概述并非是为了限制权利要求的保护范围。The following is an overview of the topics detailed in this document. This Summary is not intended to limit the scope of the claims.
本发明实施例提出一种锁定移动终端的方法、移动终端及计算机可读存储介质。The embodiment of the invention provides a method for locking a mobile terminal, a mobile terminal and a computer readable storage medium.
本发明实施例提供一种锁定移动终端的方法,所述方法包括以下步骤:An embodiment of the present invention provides a method for locking a mobile terminal, where the method includes the following steps:
在移动终端没有数据业务连接的情况下,若接收到运营商按照周期通过专用通道发送的群发信息,则判断所述群发信息中是否存在和所述移动终端的唯一标识相匹配的信息;If the mobile terminal does not have a data service connection, if the group sends the group-sending information that is sent by the operator through the dedicated channel according to the period, it is determined whether the group-distributed information has information that matches the unique identifier of the mobile terminal;
若所述群发信息中存在和所述移动终端的唯一标识相匹配的信息,则判断所述唯一标识对应的标志位是否为锁定标志位;If the information that matches the unique identifier of the mobile terminal exists in the group sending information, determining whether the flag bit corresponding to the unique identifier is a locking flag bit;
若所述唯一标识对应的标志位为锁定标志位,则将所述移动终端确定为已丢失移动终端,并将所述已丢失移动终端进行锁定。If the flag corresponding to the unique identifier is a lock flag, the mobile terminal is determined to have lost the mobile terminal, and the lost mobile terminal is locked.
可选地,所述接收到运营商按照周期接收通过专用通道发送的群发信息,则判断所述群发信息中是否存在和移动终端的唯一标识相匹配的信息的步骤包括:Optionally, the step of receiving, by the operator, the group sending information that is sent by using the dedicated channel according to the period, and determining whether the group sending information has information that matches the unique identifier of the mobile terminal includes:
当接收到运营商按照周期通过专用通道发送的群发信息时,将所述群发信息与移动终端的唯一标识进行匹配;When receiving the group sending information sent by the operator through the dedicated channel according to the period, matching the group sending information with the unique identifier of the mobile terminal;
若匹配到与移动终端的唯一标识一致的信息,则确定所述群发信息中存在和移动终端的唯一标识相匹配的信息;若没有匹配到与移动终端的唯一标识一致的信息,确定所述群发信息中不存在和移动终端的唯一标识相匹配的信息。If the information that matches the unique identifier of the mobile terminal is matched, determining that the group sending information has information that matches the unique identifier of the mobile terminal; if the information that matches the unique identifier of the mobile terminal is not matched, determining the group sending There is no information in the message that matches the unique identifier of the mobile terminal.
可选地,所述移动终端的唯一标识包括:移动终端的蓝牙地址、MAC地址和移动终端最后一次通过本地号码进行网络注册的注册地址中的至少一种。Optionally, the unique identifier of the mobile terminal includes: at least one of a Bluetooth address of the mobile terminal, a MAC address, and a registered address of the network terminal that the mobile terminal last registered by the local number.
可选地,所述将所述已丢失移动终端进行锁定的步骤之后还包括:Optionally, after the step of locking the lost mobile terminal, the method further includes:
当接收到定位请求信息时,则对所述已丢失移动终端进行定位,并将所述已丢失移动终端的定位信息发送至所述运营商。When the location request information is received, the lost mobile terminal is located, and the location information of the lost mobile terminal is sent to the operator.
可选地,所述判断所述唯一标识对应的标志位是否为锁定标志位的步骤之后还包括:Optionally, after the step of determining whether the flag bit corresponding to the unique identifier is a lock flag bit, the method further includes:
若所述唯一标识对应的标志位不为锁定标志位,则判断所述唯一标识对应的标志位是否为解锁标志位;If the flag bit corresponding to the unique identifier is not the lock flag bit, determining whether the flag bit corresponding to the unique identifier is an unlock flag bit;
若所述唯一标识对应的标志位为解锁标志位,则将所述移动终端确定为已找回移动终端,并将所述已找回移动终端进行解锁。If the flag corresponding to the unique identifier is an unlocking flag, the mobile terminal is determined to have retrieved the mobile terminal, and the retrieved mobile terminal is unlocked.
此外,本发明实施例还提供一种移动终端,所述移动终端包括处理器及存储器,所述存储器中存储有锁定移动终端的程序;所述处理器设置为执行所述锁定移动终端的程序,以实现以下步骤:In addition, an embodiment of the present invention further provides a mobile terminal, where the mobile terminal includes a processor and a memory, where the memory stores a program for locking the mobile terminal, and the processor is configured to execute the program for locking the mobile terminal. To achieve the following steps:
在移动终端没有数据业务连接的情况下,若接收到运营商按照周期通过专用通道发送的群发信息,则判断所述群发信息中是否存在和所述移动终端的唯一标识相匹配的信息;If the mobile terminal does not have a data service connection, if the group sends the group-sending information that is sent by the operator through the dedicated channel according to the period, it is determined whether the group-distributed information has information that matches the unique identifier of the mobile terminal;
若所述群发信息中存在和所述移动终端的唯一标识相匹配的信息,则判 断所述唯一标识对应的标志位是否为锁定标志位;If the information that matches the unique identifier of the mobile terminal exists in the group sending information, it is determined whether the flag bit corresponding to the unique identifier is a lock flag bit;
若所述唯一标识对应的标志位为锁定标志位,则将所述移动终端确定为已丢失移动终端,并将所述已丢失移动终端进行锁定。If the flag corresponding to the unique identifier is a lock flag, the mobile terminal is determined to have lost the mobile terminal, and the lost mobile terminal is locked.
本发明实施例提出的锁定移动终端的方法、移动终端及计算机可读存储介质,在移动终端没有数据业务连接的情况下,在移动终端没有数据业务连接的情况下,若接收到运营商按照周期通过专用通道发送的群发信息,则判断所述群发信息中是否存在和所述移动终端的唯一标识相匹配的信息,移动终端不需要连接数据业务,通过专用通道即可接收到运营商的群发信息,若所述群发信息中存在和所述移动终端的唯一标识相匹配的信息,则判断所述唯一标识对应的标志位是否为锁定标志位;若所述唯一标识对应的标志位为锁定标志位,则将所述移动终端确定为已丢失移动终端,并将所述已丢失移动终端进行锁定,从而实现了移动终端在丢失之后,即使没有连接数据业务的情况下,也能进行锁定,保证了移动终端信息的安全性。The method for locking a mobile terminal, the mobile terminal, and the computer readable storage medium provided by the embodiment of the present invention, if the mobile terminal has no data service connection, if the mobile terminal does not have a data service connection, if the operator receives the cycle according to the cycle The group sending information sent by the dedicated channel determines whether there is information matching the unique identifier of the mobile terminal in the group sending information, and the mobile terminal does not need to connect to the data service, and can receive the group sending information of the operator through a dedicated channel. If the information that matches the unique identifier of the mobile terminal exists in the group sending information, determining whether the flag bit corresponding to the unique identifier is a lock flag bit; if the flag bit corresponding to the unique identifier is a lock flag bit And determining, by the mobile terminal, that the mobile terminal has been lost, and locking the lost mobile terminal, so that after the mobile terminal is lost, even if the data service is not connected, the locking can be performed, thereby ensuring that the mobile terminal is locked. The security of mobile terminal information.
在阅读并理解了附图和详细描述后,可以明白其他方面。Other aspects will be apparent upon reading and understanding the drawings and detailed description.
附图概述BRIEF abstract
图1为本发明实施例锁定移动终端的方法流程示意图;1 is a schematic flowchart of a method for locking a mobile terminal according to an embodiment of the present invention;
图2为本发明实施例锁定移动终端的方法中接收到运营商按照周期接收通过专用通道发送的群发信息,则判断所述群发信息中是否存在和移动终端的唯一标识相匹配的信息的步骤的细化流程示意图;2 is a step of determining, according to a method for locking a mobile terminal, a message that the operator receives the group sending information that is sent through the dedicated channel according to the period, and determines whether the group sending information matches the unique identifier of the mobile terminal. Refine the schematic diagram of the process;
图3为本发明实施例另一锁定移动终端的方法流程示意图;3 is a schematic flowchart of another method for locking a mobile terminal according to an embodiment of the present invention;
图4为本发明实施例方案涉及的硬件运行环境的终端结构示意图。FIG. 4 is a schematic structural diagram of a terminal in a hardware operating environment according to an embodiment of the present invention.
应当理解,此处所描述的实施例仅仅用以解释本发明,并不用于限定本发明。It is understood that the embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
本发明实施例在移动终端没有数据业务连接的情况下,在移动终端没有 数据业务连接的情况下,若接收到运营商按照周期通过专用通道发送的群发信息,则判断所述群发信息中是否存在和所述移动终端的唯一标识相匹配的信息,移动终端不需要连接数据业务,通过专用通道即可接收到运营商的群发信息,若所述群发信息中存在和所述移动终端的唯一标识相匹配的信息,则判断所述唯一标识对应的标志位是否为锁定标志位;若所述唯一标识对应的标志位为锁定标志位,则将所述移动终端确定为已丢失移动终端,并将所述已丢失移动终端进行锁定,从而实现了移动终端在丢失之后,即使没有连接数据业务的情况下,也能进行锁定,保证了移动终端信息的安全性。In the case that the mobile terminal does not have a data service connection, if the mobile terminal does not have a data service connection, if the group sends the group sending information that is sent by the operator through the dedicated channel according to the period, it is determined whether the group sending information exists. And the information that matches the unique identifier of the mobile terminal, the mobile terminal does not need to connect to the data service, and the group sending information of the operator can be received through the dedicated channel, if the unique identifier of the mobile terminal exists in the group sending information Corresponding information, determining whether the flag bit corresponding to the unique identifier is a lock flag bit; if the flag bit corresponding to the unique identifier is a lock flag bit, determining, by the mobile terminal, that the mobile terminal has lost the mobile terminal, and The lost mobile terminal is locked, so that after the mobile terminal is lost, even if the data service is not connected, the lock can be performed, and the security of the mobile terminal information is ensured.
移动终端锁定方法一般是需要移动终端连接数据业务,才能接收到远程锁定指令,然后将移动终端锁定。本发明实施例考虑到该方案的缺点在于:手机被盗后SIM卡会被直接移除,开机后短期内也不会启用WIFI联网,此时被盗的移动终端是无法进行数据业务连接的,即下发的远程锁定指令被盗的移动终端是无法进行接收的,因此被盗的移动终端无法通过下发的远程锁定指令进行锁定,从而导致移动终端的信息泄露。The mobile terminal locking method generally requires the mobile terminal to connect to the data service in order to receive the remote locking instruction and then lock the mobile terminal. The disadvantage of the embodiment of the present invention is that the SIM card will be directly removed after the mobile phone is stolen, and the WIFI networking will not be enabled in the short-term after the booting, and the stolen mobile terminal cannot connect to the data service at this time. That is, the mobile terminal that has been remotely locked by the remote lock command cannot be received, so the stolen mobile terminal cannot be locked by the issued remote lock command, thereby causing information leakage of the mobile terminal.
为此,本发明实施例提出一种锁定移动终端的方法,在移动终端没有数据业务连接的情况下,若接收到运营商按照周期通过专用通道发送的群发信息,则判断所述群发信息中是否存在和所述移动终端的唯一标识相匹配的信息,移动终端不需要连接数据业务,通过专用通道即可接收到运营商的群发信息,若所述群发信息中存在和所述移动终端的唯一标识相匹配的信息,则判断所述唯一标识对应的标志位是否为锁定标志位;若所述唯一标识对应的标志位为锁定标志位,则将所述移动终端确定为已丢失移动终端,并将所述已丢失移动终端进行锁定,从而实现了移动终端在丢失之后,即使没有连接数据业务的情况下,也能进行锁定,保证了移动终端信息的安全性。Therefore, the embodiment of the present invention provides a method for locking a mobile terminal. If the mobile terminal does not have a data service connection, if the group sends the group sending information that is sent by the operator through the dedicated channel, it is determined whether the group sending information is If there is information that matches the unique identifier of the mobile terminal, the mobile terminal does not need to connect to the data service, and can receive the group sending information of the operator through the dedicated channel, if the group sending information exists and the unique identifier of the mobile terminal Corresponding information, determining whether the flag bit corresponding to the unique identifier is a lock flag bit; if the flag bit corresponding to the unique identifier is a lock flag bit, determining, by the mobile terminal, that the mobile terminal has been lost, and The lost mobile terminal is locked, so that after the mobile terminal is lost, even if the data service is not connected, the locking can be performed, and the security of the mobile terminal information is ensured.
参照图1,图1是本发明实施例锁定移动终端的方法流程示意图。Referring to FIG. 1, FIG. 1 is a schematic flowchart of a method for locking a mobile terminal according to an embodiment of the present invention.
在本实施例中,该方法包括:In this embodiment, the method includes:
步骤S10,在移动终端没有数据业务连接的情况下,若接收到运营商按照周期通过专用通道发送的群发信息,则判断所述群发信息中是否存在和所述移动终端的唯一标识相匹配的信息;Step S10: If the mobile terminal does not have a data service connection, if it receives the group sending information that is sent by the operator through the dedicated channel according to the period, it is determined whether the group sending information has information that matches the unique identifier of the mobile terminal. ;
在本实施例中,当用户发现自己的移动终端丢失或被盗之后,需要到运营商处挂失并登记,在用户进行登记之后,运营商即会根据用户进行登记及提供的信息,对丢失或被盗的移动终端的唯一标识进行查询,并将丢失或被盗的信息添加至丢失列表,并将丢失或被盗的移动终端的唯一标识及对应的锁定标志位添加至群发信息中,即群发信息中包括移动终端的唯一标识及对应的标志位,标志位一般为1和0,当然,所述标志位还可以为其他的数字或符号,在此不做限定。当标志位为1和0时,1表示锁定该终端唯一标识对应的手机,0表示解锁该终端唯一标识对应的终端,即当移动终端丢失或被盗时,群发信息中包括移动终端的唯一标识及1,当移动终端被找回时,此时群发信息中包括移动终端的唯一标识及0。可选地,运营商可以设置发送所述群发信息的周期。运营商还可以对发送群发信息的范围进行设置,比如将发送群发信息的范围设置为小区内、省内或全网。在移动终端丢失或被盗之后,SIM卡被直接移除,并且没有启用WIFI联网时,此时移动终端无法进行数据业务连接的情况下,可通过接收运营商发送的群发信息。若移动终端接收到运营商按照周期通过专用通道发送的群发信息,则判断群发信息中是否存在和所述移动终端的唯一标识相匹配的信息。In this embodiment, after the user finds that his mobile terminal is lost or stolen, it needs to report the loss to the operator and register. After the user registers, the operator will register or provide the information according to the user, The unique identifier of the stolen mobile terminal is queried, and the lost or stolen information is added to the lost list, and the unique identifier of the lost or stolen mobile terminal and the corresponding lock flag are added to the group sending information, that is, the group sending The information includes the unique identifier of the mobile terminal and the corresponding flag bit, and the flag is generally 1 and 0. Of course, the flag bit may also be other numbers or symbols, which is not limited herein. When the flag is 1 and 0, 1 indicates that the mobile phone corresponding to the unique identifier of the terminal is locked, and 0 indicates that the terminal corresponding to the unique identifier of the terminal is unlocked, that is, when the mobile terminal is lost or stolen, the group sending information includes the unique identifier of the mobile terminal. And 1, when the mobile terminal is retrieved, the group sending information includes the unique identifier of the mobile terminal and 0. Optionally, the operator may set a period for sending the group sending information. The operator can also set the range of sending group sending information, for example, the range of sending group sending information is set to intra-cell, intra-provincial or whole network. After the mobile terminal is lost or stolen, the SIM card is directly removed, and when the WIFI networking is not enabled, when the mobile terminal cannot perform the data service connection, the group can transmit the group sending information. If the mobile terminal receives the group sending information that is sent by the operator through the dedicated channel according to the period, it is determined whether there is information in the group sending information that matches the unique identifier of the mobile terminal.
可选地,所述移动终端的唯一标识包括:移动终端的蓝牙地址、MAC地址和移动终端最后一次通过本地号码进行网络注册的注册地址中的至少一种。Optionally, the unique identifier of the mobile terminal includes: at least one of a Bluetooth address of the mobile terminal, a MAC address, and a registered address of the network terminal that the mobile terminal last registered by the local number.
可选地,移动终端的唯一标识可以包括:移动终端的蓝牙地址、MAC地址、生产序列号、出厂序列号和移动终端最后一次通过本地号码进行网络注册的注册地址等,在此不做限定,不再一一列举。Optionally, the unique identifier of the mobile terminal may include: a Bluetooth address of the mobile terminal, a MAC address, a production serial number, a factory serial number, and a registered address of the network registration of the mobile terminal by the local number for the last time, which is not limited herein. No longer list them one by one.
步骤S20,若所述群发信息中存在和所述移动终端的唯一标识相匹配的信息,则判断所述唯一标识对应的标志位是否为锁定标志位;Step S20, if there is information in the group sending information that matches the unique identifier of the mobile terminal, determining whether the flag bit corresponding to the unique identifier is a locking flag bit;
若所述群发信息中存在和所述移动终端的唯一标识相匹配的信息,则判断所述唯一标识对应的标志位是否为锁定标志位,若所述唯一标识对应的标志位为1,则可以判断唯一标识对应的标志位为锁定标志位,若所述唯一标识对应的标志位不为1,则判断唯一标识对应的标志位是否为0,若为0,则唯一标识对应的标志位为解锁标志位。若所述群发信息中不存在和所述移 动终端的唯一标识相匹配的信息,此时无法对移动终端是否丢失或是否被盗进行确定,则需要继续进行接收运营商发送的群发信息。If the information that matches the unique identifier of the mobile terminal exists in the group sending information, determining whether the flag bit corresponding to the unique identifier is a lock flag bit, and if the flag bit corresponding to the unique identifier is 1, Determining that the flag bit corresponding to the unique identifier is a lock flag bit. If the flag bit corresponding to the unique identifier is not 1, determining whether the flag bit corresponding to the unique identifier is 0. If 0, the corresponding flag bit of the unique identifier is unlocked. Sign bit. If there is no information in the group sending information that matches the unique identifier of the mobile terminal, and the mobile terminal cannot be determined to be lost or stolen, the group sending information sent by the operator needs to be continued.
步骤S30,若所述唯一标识对应的标志位为锁定标志位,则将所述移动终端确定为已丢失移动终端,并将所述已丢失移动终端进行锁定。Step S30: If the flag bit corresponding to the unique identifier is a lock flag bit, determine, by the mobile terminal, that the mobile terminal has been lost, and lock the lost mobile terminal.
若所述唯一标识对应的标志位为锁定标志位,此时即可确定移动终端已丢失或已被盗,则将所述移动终端确定为已丢失移动终端,即可根据接收到的移动终端的唯一标识及对应的标识位将移动终端进行锁定,以防止移动终端中的信息被泄露,从而保证移动终端的信息安全。If the flag corresponding to the unique identifier is a lock flag, and it can be determined that the mobile terminal has been lost or stolen, the mobile terminal is determined to have lost the mobile terminal, and the mobile terminal can be determined according to the received mobile terminal. The unique identifier and the corresponding identification bit lock the mobile terminal to prevent the information in the mobile terminal from being leaked, thereby ensuring information security of the mobile terminal.
在将所述已丢失移动终端进行锁定之后,运营商可以通过专用通道将定位请求发送至移动终端。After the lost mobile terminal is locked, the operator can send a location request to the mobile terminal through a dedicated channel.
可选地,所述将所述已丢失移动终端进行锁定的步骤之后还包括:Optionally, after the step of locking the lost mobile terminal, the method further includes:
当接收到定位请求信息时,则对所述已丢失移动终端进行定位,并将所述已丢失移动终端的定位信息发送至所述运营商。When the location request information is received, the lost mobile terminal is located, and the location information of the lost mobile terminal is sent to the operator.
当移动终端接收到运营商发送的定位请求时,对自身当前的定位信息进行定位,然后将定位得到的定位信息发送至运营商,以便运营商或者移动终端当前所处的位置,从而帮助用户将丢失或被盗的移动终端找回,减少用户的财产损失。When the mobile terminal receives the positioning request sent by the operator, the mobile terminal locates the current positioning information, and then sends the obtained positioning information to the operator, so that the operator or the mobile terminal is currently located, thereby helping the user to Lost or stolen mobile terminals to retrieve, reducing the user's property losses.
本实施例提出的锁定移动终端的方法,在移动终端没有数据业务连接的情况下,在移动终端没有数据业务连接的情况下,若接收到运营商按照周期通过专用通道发送的群发信息,则判断所述群发信息中是否存在和所述移动终端的唯一标识相匹配的信息,移动终端不需要连接数据业务,通过专用通道即可接收到运营商的群发信息,若所述群发信息中存在和所述移动终端的唯一标识相匹配的信息,则判断所述唯一标识对应的标志位是否为锁定标志位;若所述唯一标识对应的标志位为锁定标志位,则将所述移动终端确定为已丢失移动终端,并将所述已丢失移动终端进行锁定,从而实现了移动终端在丢失之后,即使没有连接数据业务的情况下,也能进行锁定,保证了移动终端信息的安全性。The method for locking a mobile terminal according to the embodiment, in the case that the mobile terminal does not have a data service connection, if the mobile terminal does not have a data service connection, if the group sends the group sending information that is sent by the operator through the dedicated channel according to the period, it is determined. Whether there is information in the group sending information that matches the unique identifier of the mobile terminal, the mobile terminal does not need to connect to the data service, and can receive the group sending information of the operator through the dedicated channel, if the group sending information exists and If the unique identifier of the mobile terminal matches the information, it is determined whether the flag bit corresponding to the unique identifier is a lock flag bit; if the flag bit corresponding to the unique identifier is a lock flag bit, determining, by the mobile terminal, that the mobile terminal is The mobile terminal is lost, and the lost mobile terminal is locked, so that after the mobile terminal is lost, even if the data service is not connected, the locking can be performed, and the security of the mobile terminal information is ensured.
参照图2,为本发明实施例锁定移动终端的方法中接收到运营商按照周期接收通过专用通道发送的群发信息,则判断所述群发信息中是否存在和移动终端的唯一标识相匹配的信息的步骤的细化流程示意图;Referring to FIG. 2, in the method for locking a mobile terminal according to an embodiment of the present invention, when receiving an operator to receive group sending information that is sent through a dedicated channel according to a period, determining whether the group sending information has information that matches a unique identifier of the mobile terminal Schematic diagram of the detailed process of the steps;
在本实施例中,所述步骤S10包括:In this embodiment, the step S10 includes:
步骤S11,当接收到运营商按照周期通过专用通道发送的群发信息时,将所述群发信息与移动终端的唯一标识进行匹配;Step S11: When receiving the group sending information sent by the operator through the dedicated channel according to the period, matching the group sending information with the unique identifier of the mobile terminal;
步骤S12,若匹配到与移动终端的唯一标识一致的信息,则确定所述群发信息中存在和移动终端的唯一标识相匹配的信息;若没有匹配到与移动终端的唯一标识一致的信息,确定所述群发信息中不存在和移动终端的唯一标识相匹配的信息。Step S12: If the information that matches the unique identifier of the mobile terminal is matched, determining that the group sending information has information that matches the unique identifier of the mobile terminal; if the information that matches the unique identifier of the mobile terminal is not matched, determining There is no information in the group sending information that matches the unique identifier of the mobile terminal.
在本实施例中,当接收到运营商按照周期通过专用通道发送的群发信息时,将所述群发信息与移动终端的唯一标识进行匹配,比如当接收到的群发信息中包含移动终端的蓝牙地址、MAC地址等时,则将接收到的群发信息与移动终端的蓝牙地址及MAC地址等进行匹配,若在群发信息中匹配到与移动终端的蓝牙地址一致的信息,即可确定所述群发信息中存在和移动终端的唯一标识相匹配的信息;若没有在群发信息中匹配到与移动终端的蓝牙地址一致的信息,则说明所述群发信息中不存在和移动终端的唯一标识相匹配的信息,此时不需要对移动终端采取锁定或解锁的措施,移动终端继续接收群发信息即可。In this embodiment, when receiving the group sending information that is sent by the operator through the dedicated channel according to the period, the group sending information is matched with the unique identifier of the mobile terminal, for example, when the received group sending information includes the Bluetooth address of the mobile terminal. And the MAC address, etc., the received group sending information is matched with the Bluetooth address and the MAC address of the mobile terminal, and if the group sending information matches the information corresponding to the Bluetooth address of the mobile terminal, the group sending information can be determined. There is information that matches the unique identifier of the mobile terminal; if the information that matches the Bluetooth address of the mobile terminal is not matched in the group sending information, the information that the unique identifier of the mobile terminal matches does not exist in the group sending information. At this time, it is not necessary to take a measure of locking or unlocking the mobile terminal, and the mobile terminal can continue to receive the group sending information.
可选地,参照图3,为本发明实施例另一锁定移动终端的方法流程示意图。Optionally, referring to FIG. 3, it is a schematic flowchart of another method for locking a mobile terminal according to an embodiment of the present invention.
在本实施例中,所述判断所述唯一标识对应的标志位是否为锁定标志位的步骤之后还包括:In this embodiment, after the step of determining whether the flag bit corresponding to the unique identifier is a lock flag bit, the method further includes:
步骤S40,若所述唯一标识对应的标志位不为锁定标志位,则判断所述唯一标识对应的标志位是否为解锁标志位;Step S40: If the flag bit corresponding to the unique identifier is not the lock flag bit, determine whether the flag bit corresponding to the unique identifier is an unlock flag bit;
步骤S50,若所述唯一标识对应的标志位为解锁标志位,则将所述移动终端确定为已找回移动终端,并将所述已找回移动终端进行解锁。Step S50: If the flag bit corresponding to the unique identifier is an unlocking flag, the mobile terminal determines that the mobile terminal has been retrieved, and unlocks the retrieved mobile terminal.
在本实施例中,在判断所述唯一标识对应的标志位是否为锁定标志位之后,若所述唯一标识对应的标志位不为锁定标志位,假设所述锁定标志位为1,此时即所述标志位不为1,则需要进一步判断所述唯一标识对应的标志位是否为解锁标志位,假设所述解锁标识位为0,即判断所述标志位是否为0,若所述唯一标识对应的标志位为解锁标志位,则将所述移动终端确定为已找回移动终端,并将所述已找回移动终端进行解锁,从而使得移动终端的锁定状态是可逆的。In this embodiment, after determining whether the flag bit corresponding to the unique identifier is a lock flag bit, if the flag bit corresponding to the unique identifier is not a lock flag bit, it is assumed that the lock flag bit is 1, If the flag bit is not 1, it is necessary to further determine whether the flag bit corresponding to the unique identifier is an unlock flag bit, and if the unlock flag bit is 0, that is, whether the flag bit is 0, if the unique identifier is The corresponding flag bit is the unlock flag bit, and the mobile terminal is determined to have retrieved the mobile terminal, and the retrieved mobile terminal is unlocked, so that the locked state of the mobile terminal is reversible.
本实施例提出的锁定移动终端的方法,在判断所述唯一标识对应的标志位是否为锁定标志位之后,若所述唯一标识对应的标志位不为锁定标志位,则判断所述唯一标识对应的标志位是否为解锁标志位;若所述唯一标识对应的标志位为解锁标志位,则将所述移动终端确定为已找回移动终端,并将所述已找回移动终端进行解锁,从而使得移动终端的锁定状态是可逆的。The method for locking a mobile terminal according to the embodiment, after determining whether the flag bit corresponding to the unique identifier is a lock flag bit, if the flag bit corresponding to the unique identifier is not a lock flag bit, determining that the unique identifier corresponds to Whether the flag bit is an unlock flag bit; if the flag bit corresponding to the unique identifier is an unlock flag bit, determining, by the mobile terminal, that the mobile terminal has been retrieved, and unlocking the retrieved mobile terminal, thereby The lock state of the mobile terminal is made reversible.
本发明实施例还提供一种移动终端。The embodiment of the invention further provides a mobile terminal.
如图4所示,图4是本发明实施例方案涉及的硬件运行环境的终端结构示意图。As shown in FIG. 4, FIG. 4 is a schematic structural diagram of a terminal in a hardware operating environment according to an embodiment of the present invention.
本发明实施例终端可以是PC,也可以是智能手机、平板电脑、电子书阅读器、MP3(Moving Picture Experts Group Audio Layer III,动态影像专家压缩标准音频层面3)播放器、MP4(Moving Picture Experts Group Audio Layer IV,动态影像专家压缩标准音频层面3)播放器、便携计算机等具有显示功能的可移动式终端设备。In the embodiment of the present invention, the terminal may be a PC, or may be a smart phone, a tablet computer, an e-book reader, an MP3 (Moving Picture Experts Group Audio Layer III) player, and an MP4 (Moving Picture Experts). Group Audio Layer IV, dynamic video experts compress standard audio layers 3) Players, portable computers and other portable terminal devices with display functions.
如图4所示,该终端可以包括:处理器1001,例如CPU,网络接口1004,用户接口1003,存储器1005,通信总线1002。其中,通信总线1002设置为实现这些组件之间的连接通信。用户接口1003可以包括显示屏(Display)、输入单元比如键盘(Keyboard),可选用户接口1003还可以包括标准的有线接口、无线接口。网络接口1004可选的可以包括标准的有线接口、无线接口(如WI-FI接口)。存储器1005可以是高速RAM存储器,也可以是稳定的存储器(non-volatile memory),例如磁盘存储器。存储器1005可选的还可以是独立于前述处理器1001的存储装置。As shown in FIG. 4, the terminal may include a processor 1001, such as a CPU, a network interface 1004, a user interface 1003, a memory 1005, and a communication bus 1002. Among them, the communication bus 1002 is arranged to implement connection communication between these components. The user interface 1003 can include a display, an input unit such as a keyboard, and the optional user interface 1003 can also include a standard wired interface, a wireless interface. The network interface 1004 can optionally include a standard wired interface, a wireless interface (such as a WI-FI interface). The memory 1005 may be a high speed RAM memory or a non-volatile memory such as a disk memory. The memory 1005 can also optionally be a storage device independent of the aforementioned processor 1001.
可选地,终端还可以包括摄像头、RF(Radio Frequency,射频)电路, 传感器、音频电路、WiFi模块等等。其中,传感器比如光传感器、运动传感器以及其他传感器。可选地,光传感器可包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节显示屏的亮度,接近传感器可在移动终端移动到耳边时,执行关闭显示屏和背光中至少一项操作。作为运动传感器的一种,重力加速度传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可设置为识别移动终端姿态的应用(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等;当然,移动终端还可配置陀螺仪、气压计、湿度计、温度计、红外线传感器等其他传感器,在此不再赘述。Optionally, the terminal may further include a camera, an RF (Radio Frequency) circuit, a sensor, an audio circuit, a WiFi module, and the like. Among them, sensors such as light sensors, motion sensors, and other sensors. Optionally, the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor can adjust the brightness of the display screen according to the brightness of the ambient light, and the proximity sensor can perform the closing of the display when the mobile terminal moves to the ear. At least one operation in the backlight. As a kind of motion sensor, the gravity acceleration sensor can detect the magnitude of acceleration in each direction (usually three axes), and can detect the magnitude and direction of gravity when stationary, and can be set to identify the posture of the mobile terminal (such as horizontal and vertical screen switching). , related games, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping), etc.; of course, the mobile terminal can also be equipped with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, This will not be repeated here.
本领域技术人员可以理解,图4中示出的终端结构并不构成对终端的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。It will be understood by those skilled in the art that the terminal structure shown in FIG. 4 does not constitute a limitation to the terminal, and may include more or less components than those illustrated, or a combination of certain components, or different component arrangements.
如图4所示,作为一种计算机存储介质的存储器1005中可以包括操作系统、网络通信模块、用户接口模块以及锁定移动终端的程序。As shown in FIG. 4, a memory 1005 as a computer storage medium may include an operating system, a network communication module, a user interface module, and a program for locking the mobile terminal.
在图4所示的终端中,网络接口1004主要设置为连接后台服务器,与后台服务器进行数据通信;用户接口1003主要设置为连接客户端(用户端),与客户端进行数据通信;而处理器1001可以设置为调用存储器1005中存储的锁定移动终端的程序,并执行以下操作:In the terminal shown in FIG. 4, the network interface 1004 is mainly configured to connect to the background server for data communication with the background server; the user interface 1003 is mainly configured to connect the client (user end) to perform data communication with the client; and the processor 1001 may be set to call a program that locks the mobile terminal stored in the memory 1005 and perform the following operations:
在移动终端没有数据业务连接的情况下,若接收到运营商按照周期通过专用通道发送的群发信息,则判断所述群发信息中是否存在和所述移动终端的唯一标识相匹配的信息;If the mobile terminal does not have a data service connection, if the group sends the group-sending information that is sent by the operator through the dedicated channel according to the period, it is determined whether the group-distributed information has information that matches the unique identifier of the mobile terminal;
若所述群发信息中存在和所述移动终端的唯一标识相匹配的信息,则判断所述唯一标识对应的标志位是否为锁定标志位;If the information that matches the unique identifier of the mobile terminal exists in the group sending information, determining whether the flag bit corresponding to the unique identifier is a locking flag bit;
若所述唯一标识对应的标志位为锁定标志位,则将所述移动终端确定为已丢失移动终端,并将所述已丢失移动终端进行锁定。If the flag corresponding to the unique identifier is a lock flag, the mobile terminal is determined to have lost the mobile terminal, and the lost mobile terminal is locked.
可选地,处理器1001还可以执行存储器1005中存储的锁定移动终端的程序,以实现以下步骤:Optionally, the processor 1001 may further execute a program for locking the mobile terminal stored in the memory 1005 to implement the following steps:
当接收到运营商按照周期通过专用通道发送的群发信息时,将所述群发 信息与移动终端的唯一标识进行匹配;When receiving the group sending information sent by the operator through the dedicated channel according to the period, the group sending information is matched with the unique identifier of the mobile terminal;
若匹配到与移动终端的唯一标识一致的信息,则确定所述群发信息中存在和移动终端的唯一标识相匹配的信息;若没有匹配到与移动终端的唯一标识一致的信息,确定所述群发信息中不存在和移动终端的唯一标识相匹配的信息。If the information that matches the unique identifier of the mobile terminal is matched, determining that the group sending information has information that matches the unique identifier of the mobile terminal; if the information that matches the unique identifier of the mobile terminal is not matched, determining the group sending There is no information in the message that matches the unique identifier of the mobile terminal.
可选地,处理器1001还可以执行存储器1005中存储的锁定移动终端的程序,以实现以下步骤:Optionally, the processor 1001 may further execute a program for locking the mobile terminal stored in the memory 1005 to implement the following steps:
所述移动终端的唯一标识包括:移动终端的蓝牙地址、MAC地址和移动终端最后一次通过本地号码进行网络注册的注册地址中的至少一种。The unique identifier of the mobile terminal includes at least one of a Bluetooth address of the mobile terminal, a MAC address, and a registered address of the network terminal that the mobile terminal last registered by the local number.
可选地,处理器1001还可以执行存储器1005中存储的锁定移动终端的程序,以实现以下步骤:Optionally, the processor 1001 may further execute a program for locking the mobile terminal stored in the memory 1005 to implement the following steps:
当接收到定位请求信息时,则对所述已丢失移动终端进行定位,并将所述已丢失移动终端的定位信息发送至所述运营商。When the location request information is received, the lost mobile terminal is located, and the location information of the lost mobile terminal is sent to the operator.
可选地,处理器1001还可以执行存储器1005中存储的锁定移动终端的程序,以实现以下步骤:Optionally, the processor 1001 may further execute a program for locking the mobile terminal stored in the memory 1005 to implement the following steps:
若所述唯一标识对应的标志位不为锁定标志位,则判断所述唯一标识对应的标志位是否为解锁标志位;If the flag bit corresponding to the unique identifier is not the lock flag bit, determining whether the flag bit corresponding to the unique identifier is an unlock flag bit;
若所述唯一标识对应的标志位为解锁标志位,则将所述移动终端确定为已找回移动终端,并将所述已找回移动终端进行解锁。If the flag corresponding to the unique identifier is an unlocking flag, the mobile terminal is determined to have retrieved the mobile terminal, and the retrieved mobile terminal is unlocked.
本发明移动终端的实施例与上述锁定移动终端的方法各实施例基本相同,在此不作赘述。The embodiments of the mobile terminal of the present invention are basically the same as the foregoing embodiments of the method for locking the mobile terminal, and are not described herein.
本发明实施例还提供了一种计算机可读存储介质,所述计算机可读存储介质存储有一个或者多个程序,所述一个或者多个程序可被一个或者多个处理器执行,以实现以下步骤:An embodiment of the present invention further provides a computer readable storage medium storing one or more programs, the one or more programs being executable by one or more processors to implement the following step:
在移动终端没有数据业务连接的情况下,若接收到运营商按照周期通过专用通道发送的群发信息,则判断所述群发信息中是否存在和所述移动终端的唯一标识相匹配的信息;If the mobile terminal does not have a data service connection, if the group sends the group-sending information that is sent by the operator through the dedicated channel according to the period, it is determined whether the group-distributed information has information that matches the unique identifier of the mobile terminal;
若所述群发信息中存在和所述移动终端的唯一标识相匹配的信息,则判断所述唯一标识对应的标志位是否为锁定标志位;If the information that matches the unique identifier of the mobile terminal exists in the group sending information, determining whether the flag bit corresponding to the unique identifier is a locking flag bit;
若所述唯一标识对应的标志位为锁定标志位,则将所述移动终端确定为已丢失移动终端,并将所述已丢失移动终端进行锁定。If the flag corresponding to the unique identifier is a lock flag, the mobile terminal is determined to have lost the mobile terminal, and the lost mobile terminal is locked.
可选地,所述一个或者多个程序可被所述一个或者多个处理器执行,还实现以下步骤:Optionally, the one or more programs are executable by the one or more processors, and the following steps are further implemented:
当接收到运营商按照周期通过专用通道发送的群发信息时,将所述群发信息与移动终端的唯一标识进行匹配;When receiving the group sending information sent by the operator through the dedicated channel according to the period, matching the group sending information with the unique identifier of the mobile terminal;
若匹配到与移动终端的唯一标识一致的信息,则确定所述群发信息中存在和移动终端的唯一标识相匹配的信息;若没有匹配到与移动终端的唯一标识一致的信息,确定所述群发信息中不存在和移动终端的唯一标识相匹配的信息。If the information that matches the unique identifier of the mobile terminal is matched, determining that the group sending information has information that matches the unique identifier of the mobile terminal; if the information that matches the unique identifier of the mobile terminal is not matched, determining the group sending There is no information in the message that matches the unique identifier of the mobile terminal.
可选地,所述一个或者多个程序可被所述一个或者多个处理器执行,还实现以下步骤:Optionally, the one or more programs are executable by the one or more processors, and the following steps are further implemented:
所述移动终端的唯一标识包括:移动终端的蓝牙地址、MAC地址和移动终端最后一次通过本地号码进行网络注册的注册地址中的至少一种。The unique identifier of the mobile terminal includes at least one of a Bluetooth address of the mobile terminal, a MAC address, and a registered address of the network terminal that the mobile terminal last registered by the local number.
可选地,所述一个或者多个程序可被所述一个或者多个处理器执行,还实现以下步骤:Optionally, the one or more programs are executable by the one or more processors, and the following steps are further implemented:
当接收到定位请求信息时,则对所述已丢失移动终端进行定位,并将所述已丢失移动终端的定位信息发送至所述运营商。When the location request information is received, the lost mobile terminal is located, and the location information of the lost mobile terminal is sent to the operator.
可选地,所述一个或者多个程序可被所述一个或者多个处理器执行,还实现以下步骤:Optionally, the one or more programs are executable by the one or more processors, and the following steps are further implemented:
若所述唯一标识对应的标志位不为锁定标志位,则判断所述唯一标识对应的标志位是否为解锁标志位;If the flag bit corresponding to the unique identifier is not the lock flag bit, determining whether the flag bit corresponding to the unique identifier is an unlock flag bit;
若所述唯一标识对应的标志位为解锁标志位,则将所述移动终端确定为已找回移动终端,并将所述已找回移动终端进行解锁。If the flag corresponding to the unique identifier is an unlocking flag, the mobile terminal is determined to have retrieved the mobile terminal, and the retrieved mobile terminal is unlocked.
本发明计算机可读存储介质的实施例与上述锁定移动终端的方法和移动终端各实施例基本相同,在此不作赘述。The embodiment of the computer readable storage medium of the present invention is substantially the same as the method for locking the mobile terminal and the mobile terminal, and is not described herein.
还需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。It is also to be understood that the term "comprises", "comprising", or any other variants thereof is intended to encompass a non-exclusive inclusion, such that a process, method, article, or device that comprises a And includes other elements not explicitly listed, or elements that are inherent to such a process, method, article, or device. An element that is defined by the phrase "comprising a ..." does not exclude the presence of additional equivalent elements in the process, method, item, or device that comprises the element.
本领域普通技术人员可以理解,上文中所公开方法中的全部或某些步骤、系统、装置中的功能模块/单元可以被实施为软件、固件、硬件及其适当的组合。在硬件实施方式中,在以上描述中提及的功能模块/单元之间的划分不一定对应于物理单元的划分;例如,一个物理组件可以具有多个功能,或者一个功能或步骤可以由若干物理组件合作执行。某些组件或所有组件可以被实施为由处理器,如数字信号处理器或微处理器执行的软件,或者被实施为硬件,或者被实施为集成电路,如专用集成电路。这样的软件可以分布在计算机可读介质上,计算机可读介质可以包括计算机存储介质(或非暂时性介质)和通信介质(或暂时性介质)。如本领域普通技术人员公知的,术语计算机存储介质包括用于存储信息(诸如计算机可读指令、数据结构、程序模块或其他数据)的任何方法或技术中实施的易失性和非易失性、可移除和不可移除介质。计算机存储介质包括但不限于RAM、ROM、EEPROM、闪存或其他存储器技术、CD-ROM、数字多功能盘(DVD)或其他光盘存储、磁盒、磁带、磁盘存储或其他磁存储装置、或者可以用于存储期望的信息并且可以被计算机访问的任何其他的介质。此外,本领域技术人员公知的是,通信介质通常包含计算机可读指令、数据结构、程序模块或者诸如载波或其他传输机制之类的调制数据信号中的其他数据,并且可包括任何信息递送介质。Those of ordinary skill in the art will appreciate that all or some of the steps, systems, and functional blocks/units of the methods disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof. In a hardware implementation, the division between functional modules/units mentioned in the above description does not necessarily correspond to the division of physical units; for example, one physical component may have multiple functions, or one function or step may be composed of several physical The components work together. Some or all of the components may be implemented as software executed by a processor, such as a digital signal processor or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on a computer readable medium, which may include computer storage media (or non-transitory media) and communication media (or transitory media). As is well known to those of ordinary skill in the art, the term computer storage medium includes volatile and nonvolatile, implemented in any method or technology for storing information, such as computer readable instructions, data structures, program modules, or other data. , removable and non-removable media. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disc (DVD) or other optical disc storage, magnetic cartridge, magnetic tape, magnetic disk storage or other magnetic storage device, or may Any other medium used to store the desired information and that can be accessed by the computer. Moreover, it is well known to those skilled in the art that communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal, such as a carrier wave or other transport mechanism, and can include any information delivery media.
以上仅为本发明的可选实施例,并非因此限制本发明的专利范围,凡是利用本发明说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本发明的专利保护范围内。The above is only an alternative embodiment of the present invention, and thus does not limit the scope of the invention, and the equivalent structure or equivalent process transformation made by using the specification and the drawings of the present invention, or directly or indirectly applied to other related technologies. The fields are all included in the scope of patent protection of the present invention.
本发明实施例实现了移动终端在丢失之后,即使没有连接数据业务的情况下,也能进行锁定,保证了移动终端信息的安全性。The embodiment of the invention realizes that after the mobile terminal is lost, even if the data service is not connected, the locking can be performed, and the security of the information of the mobile terminal is ensured.
Claims (10)
- 一种锁定移动终端的方法,所述方法包括以下步骤:A method of locking a mobile terminal, the method comprising the steps of:在移动终端没有数据业务连接的情况下,若接收到运营商按照周期通过专用通道发送的群发信息,则判断所述群发信息中是否存在和所述移动终端的唯一标识相匹配的信息(S10);If the mobile terminal does not have a data service connection, if the group sends the group-sending information that is sent by the operator through the dedicated channel according to the period, it is determined whether there is information in the group-sending information that matches the unique identifier of the mobile terminal (S10). ;若所述群发信息中存在和所述移动终端的唯一标识相匹配的信息,则判断所述唯一标识对应的标志位是否为锁定标志位(S20);If there is information in the group sending information that matches the unique identifier of the mobile terminal, determining whether the flag bit corresponding to the unique identifier is a lock flag bit (S20);若所述唯一标识对应的标志位为锁定标志位,则将所述移动终端确定为已丢失移动终端,并将所述已丢失移动终端进行锁定(S30)。If the flag corresponding to the unique identifier is a lock flag, the mobile terminal is determined to have lost the mobile terminal, and the lost mobile terminal is locked (S30).
- 如权利要求1所述的锁定移动终端的方法,其中,所述接收到运营商按照周期接收通过专用通道发送的群发信息,则判断所述群发信息中是否存在和移动终端的唯一标识相匹配的信息(S10)的步骤包括:The method for locking a mobile terminal according to claim 1, wherein the receiving the operator receives the group sending information sent through the dedicated channel according to the period, and determining whether the group sending information matches the unique identifier of the mobile terminal. The steps of the information (S10) include:当接收到运营商按照周期通过专用通道发送的群发信息时,将所述群发信息与移动终端的唯一标识进行匹配(S11);When receiving the group sending information sent by the operator through the dedicated channel according to the period, matching the group sending information with the unique identifier of the mobile terminal (S11);若匹配到与移动终端的唯一标识一致的信息,则确定所述群发信息中存在和移动终端的唯一标识相匹配的信息;若没有匹配到与移动终端的唯一标识一致的信息,确定所述群发信息中不存在和移动终端的唯一标识相匹配的信息(S12)。If the information that matches the unique identifier of the mobile terminal is matched, determining that the group sending information has information that matches the unique identifier of the mobile terminal; if the information that matches the unique identifier of the mobile terminal is not matched, determining the group sending There is no information in the information that matches the unique identifier of the mobile terminal (S12).
- 如权利要求1所述的锁定移动终端的方法,其中,所述移动终端的唯一标识包括:移动终端的蓝牙地址、媒体介入控制MAC地址和移动终端最后一次通过本地号码进行网络注册的注册地址中的至少一种。The method for locking a mobile terminal according to claim 1, wherein the unique identifier of the mobile terminal comprises: a Bluetooth address of the mobile terminal, a media intervention control MAC address, and a registered address of the mobile terminal for network registration by the local number last time. At least one of them.
- 如权利要求1所述的锁定移动终端的方法,还包括:The method of locking a mobile terminal of claim 1 further comprising:所述将所述已丢失移动终端进行锁定(S30)的步骤之后,当接收到定位请求信息时,则对所述已丢失移动终端进行定位,并将所述已丢失移动终端的定位信息发送至所述运营商。After the step of locking the lost mobile terminal (S30), when the location request information is received, the lost mobile terminal is located, and the location information of the lost mobile terminal is sent to The operator.
- 如权利要求1-4任一项所述的锁定移动终端的方法,还包括:The method of locking a mobile terminal according to any one of claims 1 to 4, further comprising:所述判断所述唯一标识对应的标志位是否为锁定标志位(S20)的步骤 之后,若所述唯一标识对应的标志位不为锁定标志位,则判断所述唯一标识对应的标志位是否为解锁标志位(S40);After the step of determining whether the flag bit corresponding to the unique identifier is a lock flag bit (S20), if the flag bit corresponding to the unique identifier is not a lock flag bit, determining whether the flag bit corresponding to the unique identifier is Unlock the flag (S40);若所述唯一标识对应的标志位为解锁标志位,则将所述移动终端确定为已找回移动终端,并将所述已找回移动终端进行解锁(S50)。If the flag corresponding to the unique identifier is an unlocking flag, the mobile terminal is determined to have retrieved the mobile terminal, and unlocks the retrieved mobile terminal (S50).
- 一种移动终端,所述移动终端包括处理器(1001)及存储器(1005),所述存储器(1005)中存储有锁定移动终端的程序;所述处理器(1001)设置为执行所述锁定移动终端的程序,以实现以下步骤:A mobile terminal comprising a processor (1001) and a memory (1005), wherein the memory (1005) stores a program for locking the mobile terminal; the processor (1001) is configured to perform the lock movement The terminal's program to implement the following steps:在移动终端没有数据业务连接的情况下,若接收到运营商按照周期通过专用通道发送的群发信息,则判断所述群发信息中是否存在和所述移动终端的唯一标识相匹配的信息;If the mobile terminal does not have a data service connection, if the group sends the group-sending information that is sent by the operator through the dedicated channel according to the period, it is determined whether the group-distributed information has information that matches the unique identifier of the mobile terminal;若所述群发信息中存在和所述移动终端的唯一标识相匹配的信息,则判断所述唯一标识对应的标志位是否为锁定标志位;If the information that matches the unique identifier of the mobile terminal exists in the group sending information, determining whether the flag bit corresponding to the unique identifier is a locking flag bit;若所述唯一标识对应的标志位为锁定标志位,则将所述移动终端确定为已丢失移动终端,并将所述已丢失移动终端进行锁定。If the flag corresponding to the unique identifier is a lock flag, the mobile terminal is determined to have lost the mobile terminal, and the lost mobile terminal is locked.
- 如权利要求6所述的移动终端,其中,所述处理器(1001)还设置为执行所述锁定移动终端的程序,以实现以下步骤:The mobile terminal of claim 6, wherein the processor (1001) is further configured to execute the program for locking the mobile terminal to implement the following steps:当接收到运营商按照周期通过专用通道发送的群发信息时,将所述群发信息与移动终端的唯一标识进行匹配;When receiving the group sending information sent by the operator through the dedicated channel according to the period, matching the group sending information with the unique identifier of the mobile terminal;若匹配到与移动终端的唯一标识一致的信息,则确定所述群发信息中存在和移动终端的唯一标识相匹配的信息;若没有匹配到与移动终端的唯一标识一致的信息,确定所述群发信息中不存在和移动终端的唯一标识相匹配的信息。If the information that matches the unique identifier of the mobile terminal is matched, determining that the group sending information has information that matches the unique identifier of the mobile terminal; if the information that matches the unique identifier of the mobile terminal is not matched, determining the group sending There is no information in the message that matches the unique identifier of the mobile terminal.
- 如权利要求6所述的移动终端,其中,所述处理器(1001)还设置为执行所述锁定移动终端的程序,以实现以下步骤:The mobile terminal of claim 6, wherein the processor (1001) is further configured to execute the program for locking the mobile terminal to implement the following steps:当接收到定位请求信息时,则对所述已丢失移动终端进行定位,并将所述已丢失移动终端的定位信息发送至所述运营商。When the location request information is received, the lost mobile terminal is located, and the location information of the lost mobile terminal is sent to the operator.
- 如权利要求6所述的移动终端,其中,所述处理器(1001)还设置为执行所述锁定移动终端的程序,以实现以下步骤:The mobile terminal of claim 6, wherein the processor (1001) is further configured to execute the program for locking the mobile terminal to implement the following steps:若所述唯一标识对应的标志位不为锁定标志位,则判断所述唯一标识对应的标志位是否为解锁标志位;If the flag bit corresponding to the unique identifier is not the lock flag bit, determining whether the flag bit corresponding to the unique identifier is an unlock flag bit;若所述唯一标识对应的标志位为解锁标志位,则将所述移动终端确定为已找回移动终端,并将所述已找回移动终端进行解锁。If the flag corresponding to the unique identifier is an unlocking flag, the mobile terminal is determined to have retrieved the mobile terminal, and the retrieved mobile terminal is unlocked.
- 一种计算机可读存储介质,所述计算机可读存储介质上存储有锁定移动终端的程序,所述锁定移动终端的程序被处理器执行时实现如权利要求1至5中任一项所述的锁定移动终端的方法的步骤。A computer readable storage medium having stored thereon a program for locking a mobile terminal, the program for locking the mobile terminal being executed by a processor to implement the method of any one of claims 1 to 5 The steps of the method of locking the mobile terminal.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710311172.4 | 2017-05-03 | ||
CN201710311172.4A CN108810873A (en) | 2017-05-03 | 2017-05-03 | Lock method, mobile terminal and the computer readable storage medium of mobile terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018201738A1 true WO2018201738A1 (en) | 2018-11-08 |
Family
ID=64016860
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2017/118658 WO2018201738A1 (en) | 2017-05-03 | 2017-12-26 | Method for locking mobile terminal, mobile terminal and computer-readable storage medium |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN108810873A (en) |
WO (1) | WO2018201738A1 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117041150B (en) * | 2023-10-09 | 2024-01-23 | 苏州元脑智能科技有限公司 | Routing method, routing terminal and data transmission system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090149192A1 (en) * | 2007-12-05 | 2009-06-11 | Sandra Vargas | Device Locate Service |
CN101720072A (en) * | 2009-12-10 | 2010-06-02 | 候万春 | System and method for realizing antitheft of mobile phone |
CN105657827A (en) * | 2016-01-28 | 2016-06-08 | 努比亚技术有限公司 | Terminal locating system and terminal locating method |
CN106792644A (en) * | 2017-01-20 | 2017-05-31 | 努比亚技术有限公司 | Mobile terminal, server and information processing method |
-
2017
- 2017-05-03 CN CN201710311172.4A patent/CN108810873A/en active Pending
- 2017-12-26 WO PCT/CN2017/118658 patent/WO2018201738A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090149192A1 (en) * | 2007-12-05 | 2009-06-11 | Sandra Vargas | Device Locate Service |
CN101720072A (en) * | 2009-12-10 | 2010-06-02 | 候万春 | System and method for realizing antitheft of mobile phone |
CN105657827A (en) * | 2016-01-28 | 2016-06-08 | 努比亚技术有限公司 | Terminal locating system and terminal locating method |
CN106792644A (en) * | 2017-01-20 | 2017-05-31 | 努比亚技术有限公司 | Mobile terminal, server and information processing method |
Also Published As
Publication number | Publication date |
---|---|
CN108810873A (en) | 2018-11-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11800004B2 (en) | Executing applications in conjunction with other devices | |
US9792460B2 (en) | Method and apparatus for processing biometric information in electronic device | |
US8478195B1 (en) | Two-factor user authentication using near field communication | |
US10129741B2 (en) | Electronic device and method for processing data in electronic device | |
US9762575B2 (en) | Method for performing communication via fingerprint authentication and electronic device thereof | |
US9832607B2 (en) | Method of processing beacon of electronic device and electronic device thereof | |
EP2978265B1 (en) | Method and apparatus for automatically connecting to a wireless network | |
KR102161200B1 (en) | Method for controlling a sleep mode and an electronic device thereof | |
US10242167B2 (en) | Method for user authentication and electronic device implementing the same | |
KR102247343B1 (en) | Electronic apparatus and method for network temporary unlock | |
KR102469569B1 (en) | Electronic Device and Operating Method Thereof | |
KR102250780B1 (en) | Method for controlling security and electronic device thereof | |
US10366246B2 (en) | Electronic device and operating method thereof | |
US11250656B2 (en) | Electronic apparatus and operating method thereof | |
KR102696887B1 (en) | Method for installing a subscriber profile and electronic device thereof | |
US10242170B2 (en) | Method and apparatus for obtaining sensing data | |
CN110855534B (en) | Method and apparatus for searching and controlling controllee in smart home system | |
US9729815B2 (en) | Method and electronic device for controlling content integrity using numerical data | |
KR20150086976A (en) | Method for controlling a displaying an object and an electronic device | |
CN111867003A (en) | Equipment network distribution method, device, equipment and computer readable storage medium | |
KR20150104697A (en) | Method and apparatus for grouping of personal electronic device using qr code and system therefor | |
WO2018201738A1 (en) | Method for locking mobile terminal, mobile terminal and computer-readable storage medium | |
US20180076855A1 (en) | Nfc device, reader/writer device and methods for authorizing and performing an update | |
US20190138741A1 (en) | Electronic device and control method thereof | |
KR102165165B1 (en) | Apparatas and method for reducing a current sinking of the time a roaming in an electronic device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17908277 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 17908277 Country of ref document: EP Kind code of ref document: A1 |