WO2018232660A1 - Procédé de divulgation d'informations de terminal mobile et terminal mobile - Google Patents
Procédé de divulgation d'informations de terminal mobile et terminal mobile Download PDFInfo
- Publication number
- WO2018232660A1 WO2018232660A1 PCT/CN2017/089444 CN2017089444W WO2018232660A1 WO 2018232660 A1 WO2018232660 A1 WO 2018232660A1 CN 2017089444 W CN2017089444 W CN 2017089444W WO 2018232660 A1 WO2018232660 A1 WO 2018232660A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- mobile terminal
- communication account
- communication
- logged
- account
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/725—Cordless telephones
Definitions
- the present invention relates to the field of communications technologies, and in particular, to a mobile terminal information publishing method and a mobile terminal.
- the location information is sent to the server, for example, by the mobile terminal, and the server transmits the location information to the user according to the received location information, so that the user can search for the mobile terminal according to the location information.
- the server since the user only retrieves the mobile terminal based on the location information, it is highly likely that the mobile terminal cannot be retrieved. It can be seen that the probability that the mobile terminal is lost and retrieved is relatively low.
- the object of the present invention is to provide a mobile terminal information publishing method and a mobile terminal, which solves the problem that the probability of loss recovery of the mobile terminal is relatively low.
- an embodiment of the present invention provides a method for publishing information of a mobile terminal, including:
- the mobile terminal determines whether it is currently in a stolen state
- the mobile terminal If the mobile terminal belongs to the stolen state, and the mobile terminal detects that the mobile terminal is abnormally unlocked, the mobile terminal detects whether the currently registered communication account is a communication account that has been logged in by the mobile terminal history;
- the mobile terminal issues the communication account in the social webpage of the communication account and logs in on the mobile terminal that the user steals. Notifying the message, and transmitting the account information of the communication account to the pre-bound terminal device.
- the method further includes:
- the mobile terminal specially sets the notification message in the social webpage, and the special setting The setting includes not being visible to the communication account itself.
- the method further includes:
- the mobile terminal sends a notification message to each communication contact person in the address book of the communication account, the communication account is logged in on the mobile terminal stolen by the user, and deletes the group record.
- the mobile terminal determines whether it is currently in a stolen state, including:
- the method further includes:
- the mobile terminal When the mobile terminal is in a stolen state, the mobile terminal hides an application specified on the mobile terminal that needs to be kept secret from being hidden on the interface, and prohibits the pre-designated application that needs to be kept secret, and The location information is sent to the pre-bound terminal device.
- the method further includes:
- the mobile terminal matches the communication information included in the address book of the communication account with the communication information in the communication record of the communication account that the mobile terminal has logged in, and if the same communication information is matched, the communication is performed
- the communication account corresponding to the information is sent a notification message that the communication account is logged in to the mobile terminal, and the notification message further includes a communication account that the mobile terminal has logged in to indicate that the mobile terminal is the mobile terminal.
- the embodiment of the invention further provides a mobile terminal, including:
- a judging module configured to determine whether the current status is stolen
- a detecting module configured to: if the mobile terminal is in a stolen state, and the mobile terminal detects that the mobile terminal is abnormally unlocked, detecting whether the currently registered communication account is a communication account that has been logged in by the mobile terminal history ;
- a publishing module configured to: the mobile terminal that is currently logged in is not the communication account that has been logged in by the mobile terminal history, and the mobile terminal publishes the communication account in the social webpage of the communication account and logs in on the mobile terminal that the user steals The notification message, and the account information of the communication account is sent to the pre-bound terminal device.
- the mobile terminal further includes:
- a setting module configured to perform special setting on the notification message in the social webpage, the special The settings include not being visible to the communication account itself.
- the mobile terminal further includes:
- the group sending module is configured to send, in the address book of the communication account, each communication contact group, the notification message that the communication account is logged in on the mobile terminal that the user steals, and delete the grouped record.
- the determining module is configured to determine whether the location information of the mobile terminal belongs to a location range corresponding to a motion track pre-stored by the mobile terminal, and if the location information does not belong to the location range, determine the The mobile terminal is in a stolen state;
- the mobile terminal further includes:
- a hiding module when the mobile terminal is in a stolen state, the mobile terminal hides an application specified on the mobile terminal that needs to be kept secret from being hidden on the interface, and prohibits the pre-designated application that needs to be kept secret Run and send the location information to the pre-bound terminal device.
- the mobile terminal further includes:
- a sending module configured to: the mobile terminal matches the communication information included in the address book of the communication account with the communication information in the communication record of the communication account that the mobile terminal has logged in, if the same communication information is matched Transmitting, by the communication account corresponding to the communication information, a notification message that the communication account is logged in to the mobile terminal, and the notification message further includes a communication account that the mobile terminal has logged in to indicate the mobile terminal a mobile terminal that is a communication account that has been logged in by the mobile terminal history.
- the mobile terminal determines whether the mobile terminal belongs to the stolen state; if the mobile terminal belongs to the stolen state, and the mobile terminal detects that the mobile terminal is abnormally unlocked, the mobile terminal detects the current login. Whether the communication account is a communication account that has been logged in by the mobile terminal history; if the communication account currently logged in by the mobile terminal is not a communication account that has been logged in by the mobile terminal history, the mobile terminal is socialized in the communication account.
- the webpage publishes a notification message that the communication account is logged in on the mobile terminal that the user steals, and sends the account information of the communication account to the pre-bound terminal device. In this way, the user can directly contact the thief through the communication account to improve the probability of retrieving the mobile terminal.
- FIG. 1 is a schematic flowchart of a method for publishing information of a mobile terminal according to an embodiment of the present invention
- FIG. 2 is a schematic structural diagram of a mobile terminal according to an embodiment of the present invention.
- FIG. 3 is a schematic structural diagram of another mobile terminal according to an embodiment of the present invention.
- FIG. 4 is a schematic structural diagram of another mobile terminal according to an embodiment of the present invention.
- FIG. 5 is a schematic structural diagram of another mobile terminal according to an embodiment of the present disclosure.
- FIG. 6 is a schematic structural diagram of another mobile terminal according to an embodiment of the present invention.
- FIG. 1 is a schematic flowchart of a method for publishing information of a mobile terminal according to an embodiment of the present invention. As shown in FIG. 1
- the mobile terminal determines whether the current state is a stolen state
- the mobile terminal detects whether the currently logged-in communication account is a communication that has been logged in by the mobile terminal history. account number;
- the communication account currently registered by the mobile terminal is not a communication account that has been logged in by the mobile terminal history, and the mobile terminal issues the communication account on the mobile terminal of the communication account on the mobile terminal that the user steals.
- the login notification message, and the account information of the communication account is sent to the pre-bound terminal device.
- the stolen state may be that the user who uses the mobile terminal is not the user of the mobile terminal itself, that is, used by others.
- the above abnormal unlocking can be understood as not using the unlocking of the unlocking code of the mobile terminal.
- the above-mentioned steps can be implemented to release the social network page of the communication account.
- the account information of the communication account so that the user can directly find the thief according to the account, so as to conveniently retrieve the mobile terminal.
- the method further includes:
- the mobile terminal specially sets the notification message in the social webpage, and the special setting includes not being visible to the communication account itself.
- setting the notification message in the social webpage to be invisible to the communication account itself may be beneficial to spread the notification message in the social network, so as to prevent the thief from the message from the social network. Deleted.
- the method further includes:
- the mobile terminal sends a notification message to each communication contact person in the address book of the communication account, the communication account is logged in on the mobile terminal stolen by the user, and deletes the group record.
- the foregoing notification message is grouped in the address book, which is more advantageous for the diffusion of the notification province, so that the user can quickly view the notification message and retrieve the mobile terminal in time.
- the mobile terminal determines whether it is currently in a stolen state, including:
- the method further includes:
- the mobile terminal When the mobile terminal is in a stolen state, the mobile terminal hides an application specified on the mobile terminal that needs to be kept secret from being hidden on the interface, and prohibits the pre-designated application that needs to be kept secret, and The location information is sent to the pre-bound terminal device.
- the stolen state of the mobile terminal can be accurately determined through the foregoing steps, and the application that needs to be kept secret is hidden on the interface, and the application that needs to be kept secret is prohibited from being operated, and
- the location information is sent to the pre-bound terminal device, so that the security information of the mobile terminal is effectively protected to prevent the security information from being leaked.
- the location information is sent to the pre-bound terminal device, thereby facilitating the user to retrieve the mobile terminal.
- the method further includes:
- the mobile terminal matches the communication information included in the address book of the communication account with the communication information in the communication record of the communication account that the mobile terminal has logged in, and if the same communication information is matched, the communication is performed
- the communication account corresponding to the information is sent a notification message that the communication account is logged in to the mobile terminal, and the notification message further includes a communication account that the mobile terminal has logged in to indicate that the mobile terminal is the mobile terminal.
- the same communication information exists, that is, the two communication accounts have the same communication friend, so that the user is more convenient to retrieve the mobile terminal through the friend. Because, through this friend, you can directly contact the thief.
- the mobile terminal determines whether the mobile terminal belongs to the stolen state; if the mobile terminal belongs to the stolen state, and the mobile terminal detects that the mobile terminal is abnormally unlocked, the mobile terminal detects the current login. Whether the communication account is a communication account that has been logged in by the mobile terminal history; if the communication account currently logged in by the mobile terminal is not a communication account that has been logged in by the mobile terminal history, the mobile terminal is socialized in the communication account.
- the webpage publishes a notification message that the communication account is logged in on the mobile terminal that the user steals, and sends the account information of the communication account to the pre-bound terminal device. In this way, the user can directly contact the thief through the communication account to improve the probability of retrieving the mobile terminal.
- FIG. 2 is a schematic structural diagram of a mobile terminal according to an embodiment of the present invention. As shown in FIG. 2, the method includes:
- the determining module 201 is configured to determine whether the current state is a stolen state
- the detecting module 202 is configured to detect, if the mobile terminal belongs to a stolen state, and the mobile terminal detects that the mobile terminal is abnormally unlocked, whether the currently registered communication account is a communication that has been logged in by the mobile terminal history. account number;
- a publishing module 203 configured to: when the currently registered communication account is not a communication account that has been logged in by the mobile terminal history, the mobile terminal issues the communication account in the social network page of the communication account on the mobile terminal that the user steals The login notification message, and the account information of the communication account is sent to the pre-bound terminal device.
- the mobile terminal further includes:
- a setting module 204 configured to perform special setting on the notification message in the social webpage
- Special settings include invisibility to the communication account itself.
- the mobile terminal further includes:
- the group sending module 205 is configured to send, in the address book of the communication account, each communication contact group, the notification message that the communication account is logged in on the mobile terminal that the user steals, and delete the grouped record.
- the determining module 201 is configured to determine whether the location information of the mobile terminal belongs to a location range corresponding to a motion track pre-stored by the mobile terminal, and if the location information does not belong to the location range, determine the location The mobile terminal is in a stolen state;
- the mobile terminal further includes:
- a hiding module 206 configured to: when the mobile terminal is in a stolen state, the mobile terminal hides an application specified on the mobile terminal that needs to be kept secret from being hidden on the interface, and prohibits the pre-designated application that needs to be kept secret
- the program runs and sends the location information to the pre-bound terminal device.
- the mobile terminal further includes:
- the sending module 207 is configured to: the mobile terminal matches the communication information included in the address book of the communication account with the communication information in the communication record of the communication account that the mobile terminal has logged in, if the same communication is matched And transmitting, to the communication account corresponding to the communication information, a notification message that the communication account is logged in on the mobile terminal, and the notification message further includes a communication account that the mobile terminal has logged in to indicate the movement
- the terminal is a mobile terminal of a communication account that has been logged in by the mobile terminal history.
- the mobile terminal determines whether the mobile terminal belongs to the stolen state; if the mobile terminal belongs to the stolen state, and the mobile terminal detects that the mobile terminal is abnormally unlocked, the mobile terminal detects the current login. Whether the communication account is a communication account that has been logged in by the mobile terminal history; if the communication account currently logged in by the mobile terminal is not a communication account that has been logged in by the mobile terminal history, the mobile terminal is socialized in the communication account.
- the webpage publishes a notification message that the communication account is logged in on the mobile terminal that the user steals, and sends the account information of the communication account to the pre-bound terminal device. In this way, the user can directly contact the thief through the communication account to improve the probability of retrieving the mobile terminal.
- the disclosed method and apparatus may be implemented in other manners.
- the device embodiments described above are merely illustrative, for example, The division of the unit is only a logical function division, and the actual implementation may have another division manner.
- multiple units or components may be combined or may be integrated into another system, or some features may be ignored or not executed.
- the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
- each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may be physically included separately, or two or more units may be integrated into one unit.
- the above integrated unit can be implemented in the form of hardware or in the form of hardware plus software functional units.
- the above-described integrated unit implemented in the form of a software functional unit can be stored in a computer readable storage medium.
- the above software functional unit is stored in a storage medium and includes a plurality of instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform part of the steps of the transceiving method of the various embodiments of the present invention.
- the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like, and the program code can be stored. Medium.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
Abstract
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2017/089444 WO2018232660A1 (fr) | 2017-06-21 | 2017-06-21 | Procédé de divulgation d'informations de terminal mobile et terminal mobile |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2017/089444 WO2018232660A1 (fr) | 2017-06-21 | 2017-06-21 | Procédé de divulgation d'informations de terminal mobile et terminal mobile |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018232660A1 true WO2018232660A1 (fr) | 2018-12-27 |
Family
ID=64737458
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2017/089444 WO2018232660A1 (fr) | 2017-06-21 | 2017-06-21 | Procédé de divulgation d'informations de terminal mobile et terminal mobile |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2018232660A1 (fr) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111311285A (zh) * | 2020-02-21 | 2020-06-19 | 深圳壹账通智能科技有限公司 | 一种防止用户非法登录的方法、装置、设备和存储介质 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103491236A (zh) * | 2012-06-13 | 2014-01-01 | 鸿富锦精密工业(深圳)有限公司 | 具有追踪失窃功能的电子装置和追踪失窃方法 |
CN103581441A (zh) * | 2013-10-31 | 2014-02-12 | 中国电子科技集团公司第十五研究所 | 移动终端追踪防盗系统和方法 |
CN103973876A (zh) * | 2013-02-05 | 2014-08-06 | 联想移动通信科技有限公司 | 一种移动终端丢失追踪方法和移动终端 |
US20150207917A1 (en) * | 2012-12-14 | 2015-07-23 | Beijing Netqin Technology Co., Ltd. | Mobile terminal intelligent anti-theft method and mobile terminal |
CN105915714A (zh) * | 2016-05-24 | 2016-08-31 | 北京小米移动软件有限公司 | 终端丢失提示方法及装置 |
CN106161514A (zh) * | 2015-03-31 | 2016-11-23 | 小米科技有限责任公司 | 信息处理方法及装置 |
-
2017
- 2017-06-21 WO PCT/CN2017/089444 patent/WO2018232660A1/fr active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103491236A (zh) * | 2012-06-13 | 2014-01-01 | 鸿富锦精密工业(深圳)有限公司 | 具有追踪失窃功能的电子装置和追踪失窃方法 |
US20150207917A1 (en) * | 2012-12-14 | 2015-07-23 | Beijing Netqin Technology Co., Ltd. | Mobile terminal intelligent anti-theft method and mobile terminal |
CN103973876A (zh) * | 2013-02-05 | 2014-08-06 | 联想移动通信科技有限公司 | 一种移动终端丢失追踪方法和移动终端 |
CN103581441A (zh) * | 2013-10-31 | 2014-02-12 | 中国电子科技集团公司第十五研究所 | 移动终端追踪防盗系统和方法 |
CN106161514A (zh) * | 2015-03-31 | 2016-11-23 | 小米科技有限责任公司 | 信息处理方法及装置 |
CN105915714A (zh) * | 2016-05-24 | 2016-08-31 | 北京小米移动软件有限公司 | 终端丢失提示方法及装置 |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111311285A (zh) * | 2020-02-21 | 2020-06-19 | 深圳壹账通智能科技有限公司 | 一种防止用户非法登录的方法、装置、设备和存储介质 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10657238B2 (en) | Systems and methods for identifying unauthorized users of an electronic device | |
US9763100B2 (en) | Instant messaging message processing method and device and storage medium | |
US9356920B2 (en) | Differentiating between good and bad content in a user-provided content system | |
US8549594B2 (en) | Method of identity authentication and fraudulent phone call verification that utilizes an identification code of a communication device and a dynamic password | |
CN104468611A (zh) | 基于双系统切换的数据安全处理方法及装置 | |
WO2015188739A1 (fr) | Procédé et appareil de traitement de message | |
US11297024B1 (en) | Chat-based systems and methods for data loss prevention | |
TWI611359B (zh) | 即時通信消息的傳輸方法、系統及設備 | |
CN105681154A (zh) | 即时通信软件中发消息的方法和装置 | |
US20190081975A1 (en) | Increasing privacy and security level after potential attack | |
WO2017190436A1 (fr) | Procédé et appareil de traitement de données | |
CN104917738B (zh) | 金融平台数据处理方法和系统 | |
US20140020108A1 (en) | Safety protocols for messaging service-enabled cloud services | |
WO2018232660A1 (fr) | Procédé de divulgation d'informations de terminal mobile et terminal mobile | |
US11212245B1 (en) | Detection of forged e-mail messages at e-mail gateway | |
US10834080B2 (en) | Method, device and storage medium for forwarding messages | |
CN113766166A (zh) | 云端视频的通信方法及系统 | |
TWI690190B (zh) | 能以虛擬帳號管理隱私權之通訊方法 | |
CN108694682B (zh) | 一种用户头像的设置方法及系统 | |
CN107483326A (zh) | 一种移动终端信息发布方法和移动终端 | |
CN114070634B (zh) | 一种基于smtp协议的窃密行为检测方法、装置及电子设备 | |
KR20160087352A (ko) | 이중 로그인 탐지 방법 및 이중 로그인 탐지 시스템 | |
KR102156905B1 (ko) | 메신저 피싱 예방을 위한 사용자 확인 방법 | |
WO2018232650A1 (fr) | Terminal mobile équipé d'une fonction de protection de compte de communication et produit associé | |
US20140047511A1 (en) | Network storage system and method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17915059 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 17915059 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A OF 18.05.2020) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 17915059 Country of ref document: EP Kind code of ref document: A1 |