WO2019085312A9 - 移动终端防盗方法、装置、设备以及计算机可读存储介质 - Google Patents

移动终端防盗方法、装置、设备以及计算机可读存储介质 Download PDF

Info

Publication number
WO2019085312A9
WO2019085312A9 PCT/CN2018/075075 CN2018075075W WO2019085312A9 WO 2019085312 A9 WO2019085312 A9 WO 2019085312A9 CN 2018075075 W CN2018075075 W CN 2018075075W WO 2019085312 A9 WO2019085312 A9 WO 2019085312A9
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
server
theft
identification module
module card
Prior art date
Application number
PCT/CN2018/075075
Other languages
English (en)
French (fr)
Other versions
WO2019085312A1 (zh
Inventor
陈建波
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2019085312A1 publication Critical patent/WO2019085312A1/zh
Publication of WO2019085312A9 publication Critical patent/WO2019085312A9/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • H04W8/24Transfer of terminal data

Definitions

  • the present application relates to the field of computer technologies, and in particular, to a mobile terminal anti-theft method, apparatus, device, and computer readable storage medium.
  • the existing mobile terminal anti-theft technology although most mobile terminals are equipped with corresponding anti-theft retrieval function, but when the mobile phone is lost or stolen, it is rarely able to retrieve, the existing anti-theft technology is mainly the SIM of the mobile phone
  • the card information is written into the mobile phone, and the information newly inserted into the SIM card is compared with the written information to determine whether it is stolen.
  • this method is easy to cause the stored SIM information to be cleared because the mobile phone is brushed, so that the comparison operation cannot be performed, so that the subsequent anti-theft measures are ineffective.
  • the embodiment of the present application provides a mobile terminal anti-theft method, device, device, and computer readable storage medium, which can obtain new unique identification information through a server or a preset external device, so as to facilitate the user to retrieve the terminal.
  • an embodiment of the present application provides a mobile terminal anti-theft method, where the method includes:
  • the read unique identification information is sent to the server or a preset external device.
  • the embodiment of the present application provides a mobile terminal anti-theft method, where the method includes:
  • the server binds the identification number of the terminal to the initial customer identification module card number according to the operation of the user;
  • the server If the server receives the anti-theft command, it sends an operation command to the corresponding terminal according to the terminal identification number.
  • an embodiment of the present application provides a mobile terminal anti-theft device, where the device includes:
  • a detecting unit configured to detect whether a customer identification module card is installed if an operation instruction sent by the server is received
  • a first obtaining unit configured to read the unique identification information stored in the customer identification module card if it detects that the customer identification module card is installed;
  • the first sending unit is configured to send the read unique identification information to the server or a preset external device.
  • the embodiment of the present application further provides a server, where the server includes:
  • a binding unit configured to bind the identification number of the terminal to the initial customer identification module card number according to the operation of the user
  • the fourth sending unit is configured to send an operation instruction to the corresponding terminal according to the terminal identification number if receiving the anti-theft instruction.
  • the embodiment of the present application further provides a mobile terminal anti-theft device, including:
  • a memory for storing a program implementing the anti-theft method
  • a processor for running a program for implementing the anti-theft method stored in the memory to perform the following operations:
  • the read unique identification information is sent to the server or a preset external device.
  • the embodiment of the present application further provides a server, where the server includes:
  • a memory for storing a program implementing the anti-theft method
  • a processor configured to execute a program for implementing the anti-theft method stored in the memory, to perform the following steps:
  • an operation command is sent to the corresponding terminal according to the terminal identification number.
  • the embodiment of the present application further provides a computer readable storage medium, where the one or more programs are stored, and the one or more programs may be used by one or more processors. Execute to implement the following steps:
  • the read unique identification information is sent to the server or a preset external device.
  • the embodiment of the present application further provides a computer readable storage medium, where the one or more programs are stored, and the one or more programs may be used by one or more processors. Execute to implement the following steps:
  • the server binds the identification number of the terminal to the initial customer identification module card number according to the operation of the user;
  • the server If the server receives the anti-theft command, it sends an operation command to the corresponding terminal according to the terminal identification number.
  • the embodiment of the present application detects whether a customer identification module card is installed by receiving an operation instruction sent by the server; if it detects that the customer identification module card is installed, reads the unique identification information stored in the customer identification module card; The unique identification information read is sent to the server or a preset external device.
  • the terminal receives the operation instruction sent by the server, the unique identification information stored in the customer identification module card on the terminal is read, and the unique identification information on the terminal is sent to the server or the preset external device, thereby realizing After the terminal is lost, as long as a new customer identification module card is installed on the terminal, the user can obtain new unique identification information through the server or a preset external device, so that the user can retrieve the terminal.
  • FIG. 1 is a schematic flowchart of a method for preventing an anti-theft of a mobile terminal according to an embodiment of the present application
  • FIG. 2 is a schematic diagram showing a method for preventing an anti-theft of a mobile terminal according to an embodiment of the present application
  • FIG. 3 is a schematic flowchart of a method for preventing theft of a mobile terminal according to another embodiment of the present application.
  • FIG. 4 is another schematic flowchart of a method for preventing an anti-theft of a mobile terminal according to an embodiment of the present application
  • FIG. 5 is a schematic flowchart of a method for preventing theft of a mobile terminal according to another embodiment of the present application.
  • FIG. 6 is a schematic diagram of the reply information displayed on the terminal according to the embodiment of the present application.
  • FIG. 7 is a schematic flowchart of a method for preventing theft of a mobile terminal according to another embodiment of the present application.
  • FIG. 8 is a schematic block diagram of a mobile terminal anti-theft device according to an embodiment of the present application.
  • FIG. 9 is another schematic block diagram of a mobile terminal anti-theft device according to an embodiment of the present application.
  • FIG. 10 is another schematic block diagram of a mobile terminal anti-theft device according to an embodiment of the present application.
  • FIG. 11 is another schematic block diagram of a mobile terminal anti-theft device according to an embodiment of the present application.
  • FIG. 12 is a schematic block diagram of a server according to an embodiment of the present application.
  • FIG. 13 is a schematic structural diagram of a mobile terminal anti-theft device according to an embodiment of the present application.
  • FIG. 1 is a schematic flowchart of a method for preventing an anti-theft of a mobile terminal according to an embodiment of the present disclosure.
  • the method can be run on terminals such as smart phones (such as Android phones, IOS phones, etc.), tablets, laptops, and smart devices.
  • the anti-theft method of the mobile terminal in the embodiment of the present application can obtain a new user identification card number through a server or a preset external device, so that the user can retrieve the terminal.
  • FIG. 1 is a schematic flowchart of a method for preventing an anti-theft of a mobile terminal according to an embodiment of the present application.
  • the method includes steps S101 to S103.
  • the terminal If the terminal receives the operation instruction sent by the server, it detects whether a SIM (Subscriber Identification Module) card, also called a customer identification module card, is installed.
  • SIM Subscriber Identification Module
  • the mobile terminal includes, but is not limited to, a smart phone, a tablet computer, a notebook computer, a smart device, and the like.
  • the server needs to be associated with the mobile terminal in advance, and the associated method may be any
  • the mobile terminal or the computer is used to log in to the preset server webpage to manually input the corresponding terminal identification number.
  • the terminal identification number used in the embodiment of the present application is the IMEI code (International Mobile Equipment Identity) of the terminal, and the IMEI code.
  • the terminal can be uniquely identified. Therefore, the association between the terminal and the server can be implemented through the IMEI code, and the unique terminal corresponding to the IMEI code can be accurately locked.
  • the step of detecting whether the customer identification module card is installed may be that the SIM card slot is provided on the terminal for the user to insert the SIM card. If the SIM card slot is inserted with the SIM card, the terminal can detect and identify If the SIM card is installed, if the SIM card slot is not inserted with the SIM card, the terminal cannot detect or recognize that the SIM card is installed, or the corresponding prompt message can be displayed on the terminal to prompt the user to the SIM card slot. The SIM card is not installed.
  • An operation instruction is defined by the server, and the operation instruction may be a lost instruction, and the operation instruction sent by the terminal receiving server may be a lost instruction sent by the terminal receiving server, wherein the defined lost instruction is determined according to a protocol. The server can send the lost command to the terminal.
  • the terminal after receiving the operation instruction sent by the server, the terminal determines that the terminal is in a lost state, and starts a function module for reading the unique identification information on the SIM card on the terminal, and reads the terminal.
  • Unique identification information on the installed SIM card the unique identification information may be a SIM card number.
  • the terminal is an A mobile phone. When the A mobile phone is lost, once it is picked up and used by others, the user is bound to The SIM card is installed in the SIM card slot of the A mobile phone.
  • the SIM card number obtained in the embodiment of the present application generally refers to the phone number of the A mobile phone after the newly installed SIM card.
  • the phone number on the SIM card can be China Mobile's phone number, such as Shenzhouxing, Global Pass, Dynamic Belt, etc., or China Unicom's phone number, such as China Unicom's 4G, etc., or China Telecom's phone number.
  • the number, such as China Telecom 3G, Tianyi, etc. can also be the telephone number of international telecommunications and so on.
  • the preset external device refers to another terminal associated with the server, for example, a smart phone, a tablet computer, a notebook computer, and other smart devices, and sends the read unique identification information.
  • the unique identification information read may be sent to an installed application on the preset external device, for example, SMS, Tencent QQ, WeChat, or other receiving Information function app. More specifically, the read unique identification information may be sent to a service platform having an APP that receives the information function, and the service platform may be a public number or the like.
  • the terminal is an A mobile phone
  • the SIM card number is a phone number newly installed on the A mobile phone.
  • the terminal sends the SIM card number to the mobile phone number.
  • Server H if the user operates on a preset external device and requests to send the SIM card number, the terminal sends the SIM card number to the preset external device. For example, if the user connects to the associated server H on the B mobile phone by using the WeChat connection, the SIM card number is sent to the WeChat of the B mobile phone associated with the server. More specifically, the SIM card number can be sent to the WeChat public number. .
  • the embodiment of the present application detects whether a customer identification module card is installed by receiving an operation instruction sent by the server; if it detects that the customer identification module card is installed, reads the unique identity stored in the customer identification module card. Identifying the information; transmitting the read unique identification information to the server or a preset external device.
  • the terminal receives the operation instruction sent by the server, the unique identification information stored in the customer identification module card on the terminal is read, and the unique identification information on the terminal is sent to the server or the preset external device, thereby realizing After the terminal is lost, as long as a new customer identification module card is installed on the terminal, the user can obtain new unique identification information through the server or a preset external device, so that the user can retrieve the terminal.
  • FIG. 3 is a schematic flowchart of a method for preventing theft of a mobile terminal according to an embodiment of the present application.
  • the method can be run on terminals such as smart phones (such as Android phones, IOS phones, etc.), tablets, laptops, and smart devices.
  • terminals such as smart phones (such as Android phones, IOS phones, etc.), tablets, laptops, and smart devices.
  • the method includes steps S201 to S202.
  • the current address location location information specifies the current address location information of the terminal, and the terminal uses the positioning technology to perform self-location at regular intervals, and the server also has a certain interval.
  • the terminal can obtain the current address location information by using the GPS positioning method, and use the GPS positioning module on the terminal to send its own address location signal to the positioning background to implement self-positioning of the terminal.
  • the current address location location information sent by the terminal is sent to the C mobile phone.
  • step S201 includes steps S2011 to S2012.
  • S2011 If receiving an operation instruction sent by the server, determining whether the terminal is connected to the network.
  • the lost terminal is networked, that is, whether it is in a network state, in order to obtain accurate positioning information of the lost terminal in real time.
  • the location information of the terminal obtained in the networked state accurately reflects the geographical location of the terminal, so that the user can understand the terminal state as much as possible.
  • the embodiment of the present application helps the user to retrieve the lost terminal as much as possible by sending an operation instruction to the terminal and acquiring the positioning information of the terminal, thereby reducing the economic loss of the user.
  • FIG. 5 is a schematic flowchart of a method for preventing theft of a mobile terminal according to an embodiment of the present application.
  • the method can be run on terminals such as smart phones (such as Android phones, IOS phones, etc.), tablets, laptops, and smart devices. As shown in FIG. 5, the method includes steps S301 to S304.
  • the current address location location information specifies the current address location information of the terminal, and the terminal uses the positioning technology to perform self-location at regular intervals, and the server also has a certain interval.
  • the terminal can obtain the current address location information by using the GPS positioning method, and use the GPS positioning module on the terminal to send its own address location signal to the positioning background to implement self-positioning of the terminal.
  • the terminal sends current address location location information to the server or a preset external device.
  • the current address location location information sent by the terminal is sent to the C mobile phone.
  • the terminal determines whether a reply command input by the user is received.
  • the server sends a push message to the terminal and interacts with the terminal, where the push message may be a notification sent from the server to the terminal, and transmits certain information, for example, the terminal will receive the information at intervals.
  • the content of the push message can be prepared by the user, for example: "I am the owner, but also my mobile phone, or alarm".
  • the terminal sends a reply command input by the user to the server or a preset external device.
  • the server sends a push message to the terminal, and the terminal sends a reply command to the server according to the push message to implement information exchange between the server and the terminal, thereby facilitating communication between the user who loses the terminal and the current user. Help users find lost terminals as much as possible.
  • FIG. 7 is a schematic flowchart of a method for preventing theft of a mobile terminal according to an embodiment of the present application.
  • the steps of the method are the execution steps of the server described in the present application. As shown in FIG. 7, the method includes steps S401 to S402.
  • the server binds the identification number of the terminal to the initial customer identification module card number according to the operation of the user.
  • the identification number of the terminal and the initial SIM card number are input into the server through the operation of the user, and the identification number described in the embodiment of the present application is the IMEI code of the mobile phone.
  • the IMEI code can uniquely identify the terminal. Therefore, the association between the terminal and the server can be implemented through the IMEI code, and the unique terminal corresponding to the IMEI code is accurately locked.
  • the SIM card number is the initial mobile phone number of the user, which is accurate. It is the mobile number when the user uses the mobile phone.
  • the server If the server receives the anti-theft instruction, sends an operation instruction to the corresponding terminal according to the terminal identification number.
  • the server itself does not open the anti-theft command first, and only after the user logs in to the server, the operation server opens the anti-theft command at the corresponding position.
  • the server obtains the corresponding terminal identification number, and the server associates with the terminal through the identification number.
  • the operation instruction sent by the server may be a lost instruction, and the server sends an operation instruction to the corresponding terminal to send a missing instruction to the corresponding terminal for the server, wherein the defined lost instruction is determined according to the protocol, the server The lost command can be sent to the terminal.
  • the embodiment of the present application further provides a mobile terminal anti-theft device, and the device 100 includes: a detecting unit 101, a first acquiring unit 102, and a first sending unit 103.
  • the detecting unit 101 is configured to detect whether a SIM (Subscriber Identification Module) card is installed if the terminal receives an operation instruction sent by the server.
  • the mobile terminal includes, but is not limited to, a smart phone, a tablet computer, a notebook computer, a smart device, and the like.
  • the server needs to be associated with the mobile terminal in advance, and the associated method may be any
  • the mobile terminal or the computer is used to log in to the preset server webpage to manually input the corresponding terminal identification number.
  • the terminal identification number used in the embodiment of the present application is the IMEI code (International Mobile Equipment Identity) of the terminal, and the IMEI code.
  • the terminal can be uniquely identified. Therefore, the association between the terminal and the server can be implemented through the IMEI code, and the unique terminal corresponding to the IMEI code can be accurately locked.
  • the step of detecting whether the customer identification module card is installed may be that the SIM card slot is provided on the terminal for the user to insert the SIM card. If the SIM card slot is inserted with the SIM card, the terminal can detect and identify If the SIM card is installed, if the SIM card slot is not inserted with the SIM card, the terminal cannot detect or recognize that the SIM card is installed, or the corresponding prompt message can be displayed on the terminal to prompt the user to the SIM card slot. The SIM card is not installed.
  • An operation instruction is defined by the server, and the operation instruction may be a lost instruction, and the operation instruction sent by the terminal receiving server may be a lost instruction sent by the terminal receiving server, wherein the defined lost instruction is determined according to a protocol. The server can send the lost command to the terminal.
  • the first obtaining unit 102 is configured to read the unique identification information stored in the customer identification module card if it detects that the customer identification module card is installed.
  • the terminal After receiving the operation instruction sent by the server, the terminal determines that the terminal is in a lost state, and starts a function module for reading the unique identification information on the SIM card on the terminal, and reads the terminal.
  • Unique identification information on the installed SIM card the unique identification information may be a SIM card number.
  • the terminal is an A mobile phone. When the A mobile phone is lost, once it is picked up and used by others, the user is bound to The SIM card is installed in the SIM card slot of the A mobile phone.
  • the SIM card number obtained in the embodiment of the present application generally refers to the phone number of the A mobile phone after the newly installed SIM card.
  • the phone number on the SIM card can be China Mobile's phone number, such as Shenzhouxing, Global Pass, Dynamic Belt, etc., or China Unicom's phone number, such as China Unicom's 4G, etc., or China Telecom's phone number.
  • the number, such as China Telecom 3G, Tianyi, etc. can also be the telephone number of international telecommunications and so on.
  • the first sending unit 103 is configured to send the read unique identification information to the server or a preset external device.
  • the preset external device refers to another terminal associated with the server, for example, a smart phone, a tablet computer, a notebook computer, and other smart devices, and sends the read unique identification information.
  • the unique identification information read may be sent to an installed application on the preset external device, for example, SMS, Tencent QQ, WeChat, or other receiving Information function app. More specifically, the read unique identification information may be sent to a service platform having an APP that receives the information function, and the service platform may be a public number or the like. As shown in FIG.
  • the terminal is an A mobile phone
  • the SIM card number is a phone number newly installed on the A mobile phone. If the user requests to send the SIM card number on the server, the terminal sends the SIM card number to the mobile phone number.
  • Server H if the user operates on a preset external device and requests to send the SIM card number, the terminal sends the SIM card number to the preset external device. For example, if the user connects to the associated server H on the B mobile phone by using the WeChat connection, the SIM card number is sent to the WeChat of the B mobile phone associated with the server. More specifically, the SIM card number can be sent to the WeChat public number. .
  • the embodiment of the present application detects whether a customer identification module card is installed by receiving an operation instruction sent by the server; if it detects that the customer identification module card is installed, reads the unique identity stored in the customer identification module card. Identifying the information; transmitting the read unique identification information to the server or a preset external device.
  • the terminal receives the operation instruction sent by the server, the unique identification information stored in the customer identification module card on the terminal is read, and the unique identification information on the terminal is sent to the server or the preset external device, thereby realizing After the terminal is lost, as long as a new customer identification module card is installed on the terminal, the user can obtain new unique identification information through the server or a preset external device, so that the user can retrieve the terminal.
  • the embodiment of the present application further provides a terminal anti-theft device, and the device 200 includes: a second acquiring unit 201 and a second sending unit 202.
  • the second obtaining unit 201 is configured to obtain the current address location location information of the terminal if receiving an operation instruction sent by the server.
  • the current address location location information specifies the current address location information of the terminal, and the terminal uses the positioning technology to perform self-location at regular intervals, and the server also has a certain interval.
  • the terminal can obtain the current address location information by using the GPS positioning method, and use the GPS positioning module on the terminal to send its own address location signal to the positioning background to implement self-positioning of the terminal.
  • the second sending unit 202 is configured to send the current address location location information to the server or a preset external device.
  • a preset external device such as a C mobile phone
  • the C mobile phone logs in to the server through the server webpage
  • the current address location location information sent by the terminal is sent to the C mobile phone.
  • the second acquiring unit 201 includes:
  • the first determining unit 2011 is configured to determine whether the terminal is connected to the network if receiving an operation instruction sent by the server. In the embodiment of the present application, it is determined whether the lost terminal is networked, that is, whether it is in a network state, in order to obtain accurate positioning information of the lost terminal in real time.
  • the second obtaining subunit 2012 is configured to obtain current address location location information of the terminal if the network is connected.
  • the location information of the terminal obtained in the networked state accurately reflects the geographical location of the terminal, so that the user can understand the terminal state as much as possible.
  • the embodiment of the present application helps the user to retrieve the lost terminal as much as possible by sending an operation instruction to the terminal and acquiring the positioning information of the terminal, thereby reducing the economic loss of the user.
  • the embodiment of the present application further provides a mobile terminal anti-theft device, and the device 300 includes: a second acquiring unit 301, a second sending unit 302, and a second determining unit 303.
  • the third transmitting unit 304 is provided.
  • the second obtaining unit 301 is configured to obtain the current address location location information of the terminal if receiving an operation instruction sent by the server.
  • the current address location location information specifies the current address location information of the terminal, and the terminal uses the positioning technology to perform self-location at regular intervals, and the server also has a certain interval.
  • the terminal can obtain the current address location information by using the GPS positioning method, and use the GPS positioning module on the terminal to send its own address location signal to the positioning background to implement self-positioning of the terminal.
  • the second sending unit 302 is configured to send the current address location location information to the server or a preset external device.
  • a preset external device such as a C mobile phone
  • the C mobile phone logs in to the server through the server webpage
  • the current address location location information sent by the terminal is sent to the C mobile phone.
  • the second determining unit 303 is configured to: if the terminal receives the push message sent by the server, the terminal determines whether a reply command input by the user is received.
  • the server sends a push message to the terminal and interacts with the terminal.
  • the push message may be a notification sent from the server to the terminal, and transmits certain information, for example, the terminal may receive the information at intervals.
  • the content of the push message can be prepared by the user, for example: "I am the owner, but also my mobile phone, or alarm".
  • the third sending unit 304 is configured to: if the terminal receives the reply command, send a reply command input by the user to the server or the preset external device.
  • the terminal sends a reply command input by the user to the server or a preset external device.
  • the server sends a push message to the terminal, and the terminal sends the reply message to the server according to the push message to implement information exchange between the server and the terminal, thereby facilitating communication between the user of the lost terminal and the current user.
  • the embodiment of the present application further provides a server, where the server 400 includes a binding unit 401 and a fourth sending unit 402.
  • the binding unit 401 is configured to bind the identification number of the terminal to the initial customer identification module card number according to the operation of the user.
  • the identification number of the terminal and the initial SIM card number are input into the server through the operation of the user, and the identification number described in the embodiment of the present application is the IMEI code of the mobile phone.
  • the IMEI code can uniquely identify the terminal. Therefore, the association between the terminal and the server can be implemented through the IMEI code, and the unique terminal corresponding to the IMEI code is accurately locked; the SIM card number is the initial mobile phone number of the user, which is accurately The mobile number when the user uses the phone.
  • the fourth sending unit 402 is configured to send an operation instruction to the corresponding terminal according to the terminal identification number if receiving the anti-theft instruction.
  • the server itself does not open the anti-theft command first, and only after the user logs in to the server, the operation server opens the anti-theft command at the corresponding position. After the user logs in to the server and the anti-theft command is enabled, the server obtains the corresponding terminal identification number, and the server associates with the terminal through the identification number.
  • the operation instruction sent by the server may be a lost instruction, and the server sends an operation instruction to the corresponding terminal to send a missing instruction to the corresponding terminal for the server, wherein the defined lost instruction is determined according to the protocol, the server The lost command can be sent to the terminal.
  • the embodiment of the present application further provides a server, the server includes: a memory for storing a program for implementing an anti-theft method; and a processor for running the anti-theft method stored in the memory The program to perform the following steps:
  • S1 Bind the identification number of the terminal to the initial customer identification module card number according to the operation of the user.
  • the identification number of the terminal and the initial SIM card number are input into the server through the operation of the user, and the identification number described in the embodiment of the present application is the IMEI code of the mobile phone.
  • the IMEI code can uniquely identify the terminal. Therefore, the association between the terminal and the server can be implemented through the IMEI code, and the unique terminal corresponding to the IMEI code is accurately locked; the SIM card number is the initial mobile phone number of the user, which is accurately The mobile number when the user uses the phone.
  • the server itself does not open the anti-theft command first, and only after the user logs in to the server, the operation server opens the anti-theft command at the corresponding position. After the user logs in to the server and the anti-theft command is enabled, the server obtains the corresponding terminal identification number, and the server associates with the terminal through the identification number.
  • the operation instruction sent by the server may be a lost instruction, and the server sends an operation instruction to the corresponding terminal to send a missing instruction to the corresponding terminal for the server, wherein the defined lost instruction is determined according to the protocol, the server The lost command can be sent to the terminal.
  • the above detecting unit 101, the first obtaining unit 102, the first sending unit 103, and the like may be embedded in hardware device or in a device independent of data processing, or may be stored in software in a memory of the data processing device.
  • the processor can be a central processing unit (CPU), a microprocessor, a microcontroller, or the like.
  • the anti-theft device described above can be implemented in the form of a computer program that can be run on a computer device as shown in FIG.
  • FIG. 13 is a schematic structural diagram of a mobile terminal anti-theft device according to the present application.
  • the device may be a terminal or a server, wherein the terminal may be a communication-enabled electronic device such as a smart phone, a tablet computer, a notebook computer, a desktop computer, a personal digital assistant, and a wearable device.
  • the server can be a standalone server or a server cluster consisting of multiple servers.
  • the computer device 500 includes a processor 502, a non-volatile storage medium 503, an internal memory 504, and a network interface 505 connected by a system bus 501.
  • the non-volatile storage medium 503 of the computer device 500 can store an operating system 5031 and a computer program 5032.
  • the processor 502 can be caused to perform a mobile terminal anti-theft method.
  • the processor 502 of the computer device 500 is used to provide computing and control capabilities to support the operation of the entire computer device 500.
  • the internal memory 504 provides an environment for operation of the computer program 5032 in the non-volatile storage medium 503, which when executed by the processor, causes the processor 502 to perform a mobile terminal theft prevention method.
  • the network interface 505 of the computer device 500 is used for network communications, such as sending assigned tasks and the like. It will be understood by those skilled in the art that the structure shown in FIG. 13 is only a block diagram of a part of the structure related to the solution of the present application, and does not constitute a limitation of the computer device to which the solution of the present application is applied.
  • the specific computer device may It includes more or fewer components than those shown in the figures, or some components are combined, or have different component arrangements.
  • the processor 502 performs the following operations:
  • the read unique identification information is sent to the server or a preset external device.
  • the processor 502 also performs the following operations:
  • acquiring the current address location location information of the terminal includes:
  • the current address location location information of the terminal is obtained.
  • the processor 502 also performs the following operations:
  • the terminal determines whether a reply command input by the user is received;
  • the terminal receives the reply command, sending a reply command input by the user to the server or the preset external device.
  • the embodiment of the anti-theft device shown in FIG. 13 does not constitute a limitation on the specific configuration of the anti-theft device of the mobile terminal.
  • the anti-theft device of the mobile terminal may include more or more than the illustration. There are few parts, or some parts are combined, or different parts are arranged.
  • the mobile terminal anti-theft device includes only the memory and the processor. In such an embodiment, the structure and function of the memory and the processor are the same as those of the embodiment shown in FIG. 13, and details are not described herein again.
  • the application provides a computer readable storage medium storing one or more programs, the one or more programs being executable by one or more processors to implement the following steps:
  • the read unique identification information is sent to the server or a preset external device.
  • the steps further include:
  • acquiring the current address location location information of the terminal includes:
  • the current address location location information of the terminal is obtained.
  • the steps further include:
  • the terminal determines whether a reply command input by the user is received;
  • the terminal receives the reply command, sending a reply command input by the user to the server or the preset external device.
  • the application provides a computer readable storage medium storing one or more programs, the one or more programs being executable by one or more processors to implement the following steps:
  • the server binds the identification number of the terminal to the initial customer identification module card number according to the operation of the user;
  • the server If the server receives the anti-theft command, it sends an operation command to the corresponding terminal according to the terminal identification number.
  • the foregoing storage medium of the present application includes: a magnetic disk, an optical disk, a read-only memory (ROM), and the like, which can store various program codes.
  • the units in all the embodiments of the present application may be implemented by a general-purpose integrated circuit, such as a CPU (Central Processing Unit), or by an ASIC (Application Specific Integrated Circuit).
  • a general-purpose integrated circuit such as a CPU (Central Processing Unit), or by an ASIC (Application Specific Integrated Circuit).
  • the steps in the anti-theft method of the mobile terminal in the embodiment of the present application may be sequentially adjusted, merged, and deleted according to actual needs.
  • the units in the anti-theft device of the mobile terminal in the embodiment of the present application may be combined, divided, and deleted according to actual needs.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Human Computer Interaction (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请实施例公开了一种移动终端防盗方法、装置、设备以及计算机可读存储介质,其中,所述方法包括:若接收到服务器发送的操作指令,检测是否安装有客户识别模块卡;若检测到安装有客户识别模块卡,读取所述客户识别模块卡中存储的唯一身份识别信息;将读取的所述唯一身份识别信息发送至所述服务器或者预设的外部设备。通过当终端接收到服务器发送的操作指令时,读取终端上的客户识别模块卡中存储的唯一身份识别信息,并将终端上的唯一身份识别信息发送至服务器或者预设的外部设备,从而实现终端在丢失后,只要终端上安装有新的客户识别模块卡,用户都可以通过服务器或者预设的外部设备获取到新的唯一身份识别信息,方便用户找回终端。

Description

移动终端防盗方法、装置、设备以及计算机可读存储介质
本申请要求于2017年11月2日提交中国专利局、申请号为CN 201711063998.X、申请名称为“移动终端防盗方法、装置、设备以及计算机可读存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及计算机技术领域,尤其涉及一种移动终端防盗方法、装置、设备以及计算机可读存储介质。
背景技术
现有的移动终端防盗技术,虽然大多数移动终端都设置有相应的防盗找回功能,但是当手机丢失或被盗后,却很少能够找回,现有的防盗技术主要是将手机的SIM卡信息写入手机中,通过将新插入SIM卡的信息和已写入的信息进行对比,以判断是否被盗。但是这种方法容易因为手机被刷机而导致存入的SIM信息被清除,从而无法执行比对操作,使得后续的防盗措施形同虚设。
发明内容
有鉴于此,本申请实施例提供一种移动终端防盗方法、装置、设备以及计算机可读存储介质,可以通过服务器或者预设的外部设备获取到新的唯一身份识别信息,方便用户找回终端。
第一方面,本申请实施例提供了一种移动终端防盗方法,该方法包括:
若接收到服务器发送的操作指令,检测是否安装有客户识别模块卡;
若检测到安装有客户识别模块卡,读取所述客户识别模块卡中存储的唯一身份识别信息;
将读取的所述唯一身份识别信息发送至所述服务器或者预设的外部设备。
第二方面,本申请实施例提供了一种移动终端防盗方法,所述方法包括:
服务器根据用户的操作将终端的标识号码与初始客户识别模块卡号码进行 绑定;
服务器若接收到开启防盗指令,根据终端标识号码发送操作指令给相应的终端。
第三方面,本申请实施例提供了一种移动终端防盗装置,该装置包括:
检测单元,用于若接收到服务器发送的操作指令,检测是否安装有客户识别模块卡;
第一获取单元,用于若检测到安装有客户识别模块卡,读取所述客户识别模块卡中存储的唯一身份识别信息;
第一发送单元,用于将读取的所述唯一身份识别信息发送至所述服务器或者预设的外部设备。
第四方面,本申请实施例还提供了一种服务器,所述服务器包括:
绑定单元,用于根据用户的操作将终端的标识号码与初始客户识别模块卡号码进行绑定;
第四发送单元,用于若接收到开启防盗指令,根据终端标识号码发送操作指令给相应的终端。
第五方面,本申请实施例还提供了一种移动终端防盗设备,包括:
存储器,用于存储实现防盗方法的程序;以及
处理器,用于运行所述存储器中存储的实现防盗方法的程序,以执行以下操作:
若接收到服务器发送的操作指令,检测是否安装有客户识别模块卡;
若检测到安装有客户识别模块卡,读取所述客户识别模块卡中存储的唯一身份识别信息;
将读取的所述唯一身份识别信息发送至所述服务器或者预设的外部设备。
第六方面,本申请实施例还提供了一种服务器,所述服务器包括:
存储器,用于存储实现防盗方法的程序;以及
处理器,用于运行所述存储器中存储的实现防盗方法的程序,以执行如下步骤:
根据用户的操作将终端的标识号码与初始客户识别模块卡号码进行绑定;
若接收到开启防盗指令,根据终端标识号码发送操作指令给相应的终端。
第七方面,本申请实施例还提供了一种计算机可读存储介质,所述计算机 可读存储介质存储有一个或者一个以上程序,所述一个或者一个以上程序可被一个或者一个以上的处理器执行,以实现以下步骤:
若接收到服务器发送的操作指令,检测是否安装有客户识别模块卡;
若检测到安装有客户识别模块卡,读取所述客户识别模块卡中存储的唯一身份识别信息;
将读取的所述唯一身份识别信息发送至所述服务器或者预设的外部设备。
第八方面,本申请实施例还提供了一种计算机可读存储介质,所述计算机可读存储介质存储有一个或者一个以上程序,所述一个或者一个以上程序可被一个或者一个以上的处理器执行,以实现以下步骤:
服务器根据用户的操作将终端的标识号码与初始客户识别模块卡号码进行绑定;
服务器若接收到开启防盗指令,根据终端标识号码发送操作指令给相应的终端。
本申请实施例通过若接收到服务器发送的操作指令,检测是否安装有客户识别模块卡;若检测到安装有客户识别模块卡,读取所述客户识别模块卡中存储的唯一身份识别信息;将读取的所述唯一身份识别信息发送至所述服务器或者预设的外部设备。通过当终端接收到服务器发送的操作指令时,读取终端上的客户识别模块卡中存储的唯一身份识别信息,并将终端上的唯一身份识别信息发送至服务器或者预设的外部设备,从而实现终端在丢失后,只要终端上安装有新的客户识别模块卡,用户都可以通过服务器或者预设的外部设备获取到新的唯一身份识别信息,方便用户找回终端。
附图说明
为了更清楚地说明本申请实施例技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是本申请实施例提供的一种移动终端防盗方法的示意流程图;
图2是本申请实施例提供的一种移动终端防盗方法的演示示意图;
图3是本申请另一实施例提供的一种移动终端防盗方法的示意流程图;
图4是本申请实施例提供的一种移动终端防盗方法的另一流程示意图;
图5是本申请另一实施例提供的一种移动终端防盗方法的示意流程图;
图6是本申请实施例所述的回复信息在终端上显示的示意图;
图7是本申请另一实施例提供的一种移动终端防盗方法的示意流程图;
图8是本申请实施例提供的一种移动终端防盗装置的示意性框图;
图9是本申请实施例提供的一种移动终端防盗装置的另一示意性框图;
图10是本申请实施例提供的一种移动终端防盗装置的另一示意性框图;
图11是本申请实施例提供的一种移动终端防盗装置的另一示意性框图;
图12是本申请实施例提供的一种服务器的示意性框图;
图13是本申请实施例提供的一种移动终端防盗设备的结构组成示意图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
应当理解,当在本说明书和所附权利要求书中使用时,术语“包括”和“包含”指示所描述特征、整体、步骤、操作、元素和/或组件的存在,但并不排除一个或多个其它特征、整体、步骤、操作、元素、组件和/或其集合的存在或添加。
还应当理解,在此本申请说明书中所使用的术语仅仅是出于描述特定实施例的目的而并不意在限制本申请。如在本申请说明书和所附权利要求书中所使用的那样,除非上下文清楚地指明其它情况,否则单数形式的“一”、“一个”及“该”意在包括复数形式。
请参阅图1,图1为本申请实施例提供的一种移动终端防盗方法的示意流程图。该方法可以运行在智能手机(如Android手机、IOS手机等)、平板电脑、笔记本电脑以及智能设备等终端中。本申请实施例所述的移动终端防盗方法可以通过服务器或者预设的外部设备获取到新的用户身份识别卡号码,方便用户找回终端。图1是本申请实施例提供的移动终端防盗方法的示意流程图。该方法包括步骤S101~S103。
S101,若终端接收到服务器发送的操作指令,检测是否安装有SIM(Subscriber Identification Module,客户识别模块)卡,又称客户识别模块卡。
在本申请实施例中,所述移动终端包括但不限于智能手机、平板电脑、笔记本电脑以及智能设备等,所述服务器需预先与所述移动终端进行关联,关联的方法可以为用户通过任一移动终端或电脑端登录预设的服务器网页手动输入相应的终端标识号码,本申请实施例使用的终端标识号码为终端的IMEI码(International Mobile Equipment Identity,移动设备国际识别码),所述IMEI码可以唯一标识终端,因此,可以通过IMEI码实现终端与服务器的关联,并准确锁定与该IMEI码对应的唯一终端。
需要说明的是,所述检测是否安装有客户识别模块卡的步骤可以是终端上提供有SIM卡卡槽以供用户插入SIM卡,若SIM卡卡槽插有SIM卡,终端便可以检测并识别出安装有SIM卡,若SIM卡卡槽未插有SIM卡,终端便检测不到或者识别不出安装有SIM卡,或者可以通过在终端上显示相对应的提示信息以提示用户SIM卡卡槽上未安装SIM卡。由所述服务器中定义操作指令,所述操作指令可以为丢失指令,所述终端接收服务器发送的操作指令可以为所述终端接收服务器发送的丢失指令,其中所定义的丢失指令是根据协议制定的,服务器可以发送该丢失指令至终端。
S102,若检测到安装有客户识别模块卡,读取所述客户识别模块卡中存储的唯一身份识别信息。
在本申请实施例中,当终端接收到服务器发送的操作指令后,便确定该终端处于丢失状态,启动终端上读取所述SIM卡上的唯一身份识别信息的功能模块,并读取终端上已安装的SIM卡上的唯一身份识别信息,所述唯一身份识别信息可以是SIM卡号码,例如,终端为A手机,当A手机丢失后,一旦被其他人拾取并使用,使用者势必会在A手机的SIM卡卡槽处安装SIM卡,本申请实施例中所获取的SIM卡号码一般指的是新安装SIM卡后A手机的电话号码。具体的,SIM卡上的电话号码可以是中国移动的电话号码,如神州行、全球通、动感动带等,也可以是中国联通的电话号码,如中国联通沃4G等,也可以是中国电信的电话号码,如中国电信3G、天翼等,还可以是国际电信的电话号码等等。
S103,将读取的所述唯一身份识别信息发送至所述服务器或者预设的外部 设备。
在本申请实施例中,所述预设的外部设备指的是与服务器关联的其他终端,例如,智能手机、平板电脑、笔记本电脑以及其他智能设备,将读取的所述唯一身份识别信息发送至所述预设的外部设备,可以是将读取的所述唯一身份识别信息发送至所述预设的外部设备上已安装的应用程序,例如,短信、腾讯QQ、微信、或者其他具有接收信息功能的APP。更具体的,可以将读取的唯一身份识别信息发送至具有接收信息功能的APP的服务平台上,所述服务平台可以是公众号等。如图2所示,例如,终端为A手机,SIM卡号码为新安装在A手机上的电话号码,若用户在服务器上操作要求发送该SIM卡号码,该终端就将SIM卡号码发送至该服务器H;若用户在预设的外部设备上操作并要求发送该SIM卡号码,该终端就将SIM卡号码发送至该预设的外部设备。再例如,用户在B手机上通过登录微信连接关联的服务器H,则SIM卡号码就发送至与服务器关联的B手机的微信上,更具体的,可以将SIM卡号码发送至微信的公众号上。
由以上可见,本申请实施例通过若接收到服务器发送的操作指令,检测是否安装有客户识别模块卡;若检测到安装有客户识别模块卡,读取所述客户识别模块卡中存储的唯一身份识别信息;将读取的所述唯一身份识别信息发送至所述服务器或者预设的外部设备。通过当终端接收到服务器发送的操作指令时,读取终端上的客户识别模块卡中存储的唯一身份识别信息,并将终端上的唯一身份识别信息发送至服务器或者预设的外部设备,从而实现终端在丢失后,只要终端上安装有新的客户识别模块卡,用户都可以通过服务器或者预设的外部设备获取到新的唯一身份识别信息,方便用户找回终端。
请参阅图3,图3是本申请实施例提供的一种移动终端防盗方法的示意流程图。该方法可以运行在智能手机(如Android手机、IOS手机等)、平板电脑、笔记本电脑以及智能设备等终端中。如图3所示,该方法包括步骤S201~S202。
S201,若接收到服务器发送的操作指令,获取终端当前地址位置定位信息。
在本申请实施例中,所述当前地址位置定位信息指定的是终端所处的当前地址位置信息,终端会每隔一定的时间间隔利用定位技术进行自我定位,服务器同样会每隔一定的时间间隔获取终端通过定位技术获得的地理位置信息。具体的,终端可以通过GPS的定位方式来获得当前地址位置信息,利用终端上的GPS定位模块将自己的地址位置信号发送到定位后台来实现终端的自我定位。
S202,发送所述当前地址位置定位信息至所述服务器或者预设的外部设备。
在本申请实施例中,例如用户使用其他预设的外部设备,如C手机,并由C手机通过服务器网页登录服务器进行操作的,则终端发送的当前地址位置定位信息到C手机。
进一步的,如图4所示,步骤S201包括步骤S2011~S2012。
S2011,若接收到服务器发送的操作指令,判断所述终端是否联网。
在本申请实施例中,判断丢失的终端是否联网,即是否处于网络状态,为了实时获取丢失的终端的准确定位信息。
S2012,若联网,获取所述终端的当前地址位置定位信息。
在本申请实施例中,通过在联网状态下获取的终端的定位信息,准确的反映了终端所处的地理位置,以方便用户尽可能的了解终端状态。
由以上可见,本申请实施例通过向终端发送操作指令,并获取终端的定位信息,帮助用户尽可能找回丢失的终端,从而降低用户的经济损失。
请参阅图5,图5是本申请实施例提供的一种移动终端防盗方法的示意流程图。该方法可以运行在智能手机(如Android手机、IOS手机等)、平板电脑、笔记本电脑以及智能设备等终端中。如图5所示,该方法包括步骤S301~S304。
S301,若接收到服务器发送的操作指令,获取终端当前地址位置定位信息。
在本申请实施例中,所述当前地址位置定位信息指定的是终端所处的当前地址位置信息,终端会每隔一定的时间间隔利用定位技术进行自我定位,服务器同样会每隔一定的时间间隔获取终端通过定位技术获得的地理位置信息。具体的,终端可以通过GPS的定位方式来获得当前地址位置信息,利用终端上的GPS定位模块将自己的地址位置信号发送到定位后台来实现终端的自我定位。
S302,所述终端发送当前地址位置定位信息至所述服务器或者预设的外部设备。
在本申请实施例中,例如用户使用其他预设的外部设备,如C手机,并由C手机通过服务器网页登录服务器进行操作的,则终端发送的当前地址位置定位信息到C手机。
S303,若所述终端接收到服务器发送的推送消息,所述终端判断是否接收到用户输入的回复指令。
在本申请实施例中,服务器会发送推送消息至终端,并与终端进行交互, 所述推送消息可以是从服务器向终端发送的通知,并传输有一定的信息,例如终端会每隔一段时间收到一条或者多条通知,或者在终端的某些应用软件发送推送消息,推送消息的内容可以由用户自行拟定,例如:“我是机主,还我手机,不然报警”等。
S304,若所述终端接收到回复指令,发送用户输入的回复指令至所述服务器或者所述预设的外部设备。
在本申请实施例中,例如图6所示,终端将用户输入的回复指令发送给服务器或者预设的外部设备。
由以上可见,本申请实施例三通过在服务器向终端发送推送消息,终端根据该推送消息发送回复指令至服务器,实现服务器与终端的信息交互,方便了丢失终端的用户与当前使用者进行沟通,帮助用户尽可能找回丢失的终端。
请参阅图7,图7是本申请实施例提供的一种移动终端防盗方法的示意流程图。该方法的步骤为本申请中所述服务器的执行步骤,如图7所示,该方法包括步骤S401~S402。
S401,服务器根据用户的操作将终端的标识号码与初始客户识别模块卡号码进行绑定。
在本申请实施例中,为了实现服务器与终端的关联,通过用户的操作将终端的标识号码,与初始的SIM卡号码输入服务器,本申请实施例中所述的标识号码为手机的IMEI码,所述IMEI码可以唯一标识终端,因此,可以通过IMEI码实现终端与服务器的关联,并准确锁定与该IMEI码对应的唯一终端;所述的SIM卡号码为用户初始的手机号码,准确的说是用户使用手机时的手机号码。
S402,服务器若接收到开启防盗指令,根据终端标识号码发送操作指令给相应的终端。
在本申请实施例中,服务器本身不会先开启防盗指令,只有通过用户登录服务器后,操作服务器相应位置开启防盗指令。用户登录服务器并开启防盗指令后,服务器会获取相应的终端标识号码,所述服务器通过该标识号码与终端关联。所述服务器所发送的操作指令可以是丢失指令,所述服务器发送操作指令给相应的终端可以为所述服务器发送丢失指令给相应的终端,其中,所定义的丢失指令是根据协议制定的,服务器可以发送该丢失指令至终端。
请参阅图8,对应上述一种移动终端防盗方法,本申请实施例还提出一种移 动终端防盗装置,该装置100包括:检测单元101、第一获取单元102、第一发送单元103。
其中,所述检测单元101,用于若终端接收到服务器发送的操作指令,检测是否安装有SIM(Subscriber Identification Module,客户识别模块)卡。在本申请实施例中,所述移动终端包括但不限于智能手机、平板电脑、笔记本电脑以及智能设备等,所述服务器需预先与所述移动终端进行关联,关联的方法可以为用户通过任一移动终端或电脑端登录预设的服务器网页手动输入相应的终端标识号码,本申请实施例使用的终端标识号码为终端的IMEI码(International Mobile Equipment Identity,移动设备国际识别码),所述IMEI码可以唯一标识终端,因此,可以通过IMEI码实现终端与服务器的关联,并准确锁定与该IMEI码对应的唯一终端。
需要说明的是,所述检测是否安装有客户识别模块卡的步骤可以是终端上提供有SIM卡卡槽以供用户插入SIM卡,若SIM卡卡槽插有SIM卡,终端便可以检测并识别出安装有SIM卡,若SIM卡卡槽未插有SIM卡,终端便检测不到或者识别不出安装有SIM卡,或者可以通过在终端上显示相对应的提示信息以提示用户SIM卡卡槽上未安装SIM卡。由所述服务器中定义操作指令,所述操作指令可以为丢失指令,所述终端接收服务器发送的操作指令可以为所述终端接收服务器发送的丢失指令,其中所定义的丢失指令是根据协议制定的,服务器可以发送该丢失指令至终端。
第一获取单元102,用于若检测到安装有客户识别模块卡,读取所述客户识别模块卡中存储的唯一身份识别信息。在本申请实施例中,当终端接收到服务器发送的操作指令后,便确定该终端处于丢失状态,启动终端上读取所述SIM卡上的唯一身份识别信息的功能模块,并读取终端上已安装的SIM卡上的唯一身份识别信息,所述唯一身份识别信息可以是SIM卡号码,例如,终端为A手机,当A手机丢失后,一旦被其他人拾取并使用,使用者势必会在A手机的SIM卡卡槽处安装SIM卡,本申请实施例中所获取的SIM卡号码一般指的是新安装SIM卡后A手机的电话号码。具体的,SIM卡上的电话号码可以是中国移动的电话号码,如神州行、全球通、动感动带等,也可以是中国联通的电话号码,如中国联通沃4G等,也可以是中国电信的电话号码,如中国电信3G、天翼等,还可以是国际电信的电话号码等等。
第一发送单元103,用于将读取的所述唯一身份识别信息发送至所述服务器或者预设的外部设备。在本申请实施例中,所述预设的外部设备指的是与服务器关联的其他终端,例如,智能手机、平板电脑、笔记本电脑以及其他智能设备,将读取的所述唯一身份识别信息发送至所述预设的外部设备,可以是将读取的所述唯一身份识别信息发送至所述预设的外部设备上已安装的应用程序,例如,短信、腾讯QQ、微信、或者其他具有接收信息功能的APP。更具体的,可以将读取的唯一身份识别信息发送至具有接收信息功能的APP的服务平台上,所述服务平台可以是公众号等。如图2所示,例如,终端为A手机,SIM卡号码为新安装在A手机上的电话号码,若用户在服务器上操作要求发送该SIM卡号码,该终端就将SIM卡号码发送至该服务器H;若用户在预设的外部设备上操作并要求发送该SIM卡号码,该终端就将SIM卡号码发送至该预设的外部设备。再例如,用户在B手机上通过登录微信连接关联的服务器H,则SIM卡号码就发送至与服务器关联的B手机的微信上,更具体的,可以将SIM卡号码发送至微信的公众号上。
由以上可见,本申请实施例通过若接收到服务器发送的操作指令,检测是否安装有客户识别模块卡;若检测到安装有客户识别模块卡,读取所述客户识别模块卡中存储的唯一身份识别信息;将读取的所述唯一身份识别信息发送至所述服务器或者预设的外部设备。通过当终端接收到服务器发送的操作指令时,读取终端上的客户识别模块卡中存储的唯一身份识别信息,并将终端上的唯一身份识别信息发送至服务器或者预设的外部设备,从而实现终端在丢失后,只要终端上安装有新的客户识别模块卡,用户都可以通过服务器或者预设的外部设备获取到新的唯一身份识别信息,方便用户找回终端。
请参阅图9,对应上述一种移动终端防盗方法,本申请实施例还提出一种终端防盗装置,该装置200包括:第二获取单元201、第二发送单元202。
其中,所述第二获取单元201,用于若接收到服务器发送的操作指令,获取终端当前地址位置定位信息。在本申请实施例中,所述当前地址位置定位信息指定的是终端所处的当前地址位置信息,终端会每隔一定的时间间隔利用定位技术进行自我定位,服务器同样会每隔一定的时间间隔获取终端通过定位技术获得的地理位置信息。具体的,终端可以通过GPS的定位方式来获得当前地址位置信息,利用终端上的GPS定位模块将自己的地址位置信号发送到定位后台 来实现终端的自我定位。
第二发送单元202,用于发送所述当前地址位置定位信息至所述服务器或者预设的外部设备。在本申请实施例中,例如用户使用其他预设的外部设备,如C手机,并由C手机通过服务器网页登录服务器进行操作的,则终端发送的当前地址位置定位信息到C手机。
如图10所示,所述第二获取单元201,包括:
第一判断单元2011,用于若接收到服务器发送的操作指令,判断所述终端是否联网。在本申请实施例中,判断丢失的终端是否联网,即是否处于网络状态,为了实时获取丢失的终端的准确定位信息。
第二获取子单元2012,用于若联网,获取所述终端的当前地址位置定位信息。在本申请实施例中,通过在联网状态下获取的终端的定位信息,准确的反映了终端所处的地理位置,以方便用户尽可能的了解终端状态。
由以上可见,本申请实施例通过向终端发送操作指令,并获取终端的定位信息,帮助用户尽可能找回丢失的终端,从而降低用户的经济损失。
请参阅图11,对应上述一种移动终端防盗方法,本申请实施例还提出一种移动终端防盗装置,该装置300包括:第二获取单元301、第二发送单元302、第二判断单元303、第三发送单元304。
其中,所述第二获取单元301,用于若接收到服务器发送的操作指令,获取终端当前地址位置定位信息。在本申请实施例中,所述当前地址位置定位信息指定的是终端所处的当前地址位置信息,终端会每隔一定的时间间隔利用定位技术进行自我定位,服务器同样会每隔一定的时间间隔获取终端通过定位技术获得的地理位置信息。具体的,终端可以通过GPS的定位方式来获得当前地址位置信息,利用终端上的GPS定位模块将自己的地址位置信号发送到定位后台来实现终端的自我定位。
第二发送单元302,用于发送所述当前地址位置定位信息至所述服务器或者预设的外部设备。在本申请实施例中,例如用户使用其他预设的外部设备,如C手机,并由C手机通过服务器网页登录服务器进行操作的,则终端发送的当前地址位置定位信息到C手机。
第二判断单元303,用于若所述终端接收到服务器发送的推送消息,所述终端判断是否接收到用户输入的回复指令。在本申请实施例中,服务器会发送推 送消息至终端,并与终端进行交互,所述推送消息可以是从服务器向终端发送的通知,并传输有一定的信息,例如终端会每隔一段时间收到一条或者多条通知,或者在终端的某些应用软件发送推送消息,推送消息的内容可以由用户自行拟定,例如:“我是机主,还我手机,不然报警”等。
第三发送单元304,用于若所述终端接收到回复指令,发送用户输入的回复指令至所述服务器或者所述预设的外部设备。在本申请实施例中,例如图5所示,终端将用户输入的回复指令发送给服务器或者预设的外部设备。
由以上可见,本申请实施例三通过在服务器向终端发送推送消息,终端根据该推送消息发送回复信息至服务器,实现服务器与终端的信息交互,方便了丢失终端的用户与当前使用者进行沟通,帮助用户尽可能找回丢失的终端。
请参阅图12,对应上述一种移动终端防盗方法,本申请实施例还提出一种服务器,该服务器400包括绑定单元401、第四发送单元402。
其中,所述绑定单元401,用于根据用户的操作将终端的标识号码与初始客户识别模块卡号码进行绑定。本申请实施例中,为了实现服务器与终端的关联,通过用户的操作将终端的标识号码,与初始的SIM卡号码输入服务器,本申请实施例中所述的标识号码为手机的IMEI码,所述IMEI码可以唯一标识终端,因此,可以通过IMEI码实现终端与服务器的关联,并准确锁定与该IMEI码对应的唯一终端;所述的SIM卡号码为用户初始的手机号码,准确的说是用户使用手机时的手机号码。
第四发送单元402,用于若接收到开启防盗指令,根据终端标识号码发送操作指令给相应的终端。在本申请实施例中,服务器本身不会先开启防盗指令,只有通过用户登录服务器后,操作服务器相应位置开启防盗指令。用户登录服务器并开启防盗指令后,服务器会获取相应的终端标识号码,所述服务器通过该标识号码与终端关联。所述服务器所发送的操作指令可以是丢失指令,所述服务器发送操作指令给相应的终端可以为所述服务器发送丢失指令给相应的终端,其中,所定义的丢失指令是根据协议制定的,服务器可以发送该丢失指令至终端。
对应上述一种移动终端防盗方法,本申请实施例还提出一种服务器,该服务器包括:存储器,用于存储实现防盗方法的程序;以及处理器,用于运行所述存储器中存储的实现防盗方法的程序,以执行如下步骤:
S1,根据用户的操作将终端的标识号码与初始客户识别模块卡号码进行绑定。本申请实施例中,为了实现服务器与终端的关联,通过用户的操作将终端的标识号码,与初始的SIM卡号码输入服务器,本申请实施例中所述的标识号码为手机的IMEI码,所述IMEI码可以唯一标识终端,因此,可以通过IMEI码实现终端与服务器的关联,并准确锁定与该IMEI码对应的唯一终端;所述的SIM卡号码为用户初始的手机号码,准确的说是用户使用手机时的手机号码。
S2,若接收到开启防盗指令,根据终端标识号码发送操作指令给相应的终端。在本申请实施例中,服务器本身不会先开启防盗指令,只有通过用户登录服务器后,操作服务器相应位置开启防盗指令。用户登录服务器并开启防盗指令后,服务器会获取相应的终端标识号码,所述服务器通过该标识号码与终端关联。所述服务器所发送的操作指令可以是丢失指令,所述服务器发送操作指令给相应的终端可以为所述服务器发送丢失指令给相应的终端,其中,所定义的丢失指令是根据协议制定的,服务器可以发送该丢失指令至终端。
在硬件实现上,以上检测单元101、第一获取单元102、第一发送单元103等可以以硬件形式内嵌于或独立于数据处理的装置中,也可以以软件形式存储于数据处理装置的存储器中,以便处理器调用执行以上各个单元对应的操作。该处理器可以为中央处理单元(CPU)、微处理器、单片机等。
上述防盗装置可以实现为一种计算机程序的形式,计算机程序可以在如图13所示的计算机设备上运行。
图13为本申请一种移动终端防盗设备的结构组成示意图。该设备可以是终端,也可以是服务器,其中,终端可以是智能手机、平板电脑、笔记本电脑、台式电脑、个人数字助理和穿戴式设备等具有通信功能的电子设备。服务器可以是独立的服务器,也可以是多个服务器组成的服务器集群。参照图13,该计算机设备500包括通过系统总线501连接的处理器502、非易失性存储介质503、内存储器504和网络接口505。其中,该计算机设备500的非易失性存储介质503可存储操作系统5031和计算机程序5032,该计算机程序5032被执行时,可使得处理器502执行一种移动终端防盗方法。该计算机设备500的处理器502用于提供计算和控制能力,支撑整个计算机设备500的运行。该内存储器504为非易失性存储介质503中的计算机程序5032的运行提供环境,该计算机程序被处理器执行时,可使得处理器502执行一种移动终端防盗方法。计算机设备 500的网络接口505用于进行网络通信,如发送分配的任务等。本领域技术人员可以理解,图13中示出的结构,仅仅是与本申请方案相关的部分结构的框图,并不构成对本申请方案所应用于其上的计算机设备的限定,具体的计算机设备可以包括比图中所示更多或更少的部件,或者组合某些部件,或者具有不同的部件布置。
其中,所述处理器502执行如下操作:
若接收到服务器发送的操作指令,检测是否安装有客户识别模块卡;
若检测到安装有客户识别模块卡,读取所述客户识别模块卡中存储的唯一身份识别信息;
将读取的所述唯一身份识别信息发送至所述服务器或者预设的外部设备。
在一个实施例中,所述处理器502还执行如下操作:
若接收到服务器发送的操作指令,获取终端当前地址位置定位信息;
发送所述当前地址位置定位信息至所述服务器或者预设的外部设备。
在一个实施例中,所述若接收到服务器发送的操作指令,获取终端当前地址位置定位信息,包括:
若接收到服务器发送的操作指令,判断所述终端是否联网;
若联网,获取所述终端的当前地址位置定位信息。
在一个实施例中,所述处理器502还执行如下操作:
若所述终端接收到服务器发送的推送消息,所述终端判断是否接收到用户输入的回复指令;
若所述终端接收到回复指令,发送用户输入的回复指令至所述服务器或者所述预设的外部设备。
本领域技术人员可以理解,图13中示出的防盗设备的实施例并不构成对移动终端防盗设备具体构成的限定,在其他实施例中,移动终端防盗设备可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。例如,在一些实施例中,移动终端防盗设备以仅包括存储器及处理器,在这样的实施例中,存储器及处理器的结构及功能与图13所示实施例一致,在此不再赘述。
本申请提供了一种计算机可读存储介质,计算机可读存储介质存储有一个或者一个以上程序,所述一个或者一个以上程序可被一个或者一个以上的处理器执行,以实现以下步骤:
若接收到服务器发送的操作指令,检测是否安装有客户识别模块卡;
若检测到安装有客户识别模块卡,读取所述客户识别模块卡中存储的唯一身份识别信息;
将读取的所述唯一身份识别信息发送至所述服务器或者预设的外部设备。
在一个实施例中,所述步骤还包括:
若接收到服务器发送的操作指令,获取终端当前地址位置定位信息;
发送所述当前地址位置定位信息至所述服务器或者预设的外部设备。
在一个实施例中,所述若接收到服务器发送的操作指令,获取终端当前地址位置定位信息,包括:
若接收到服务器发送的操作指令,判断所述终端是否联网;
若联网,获取所述终端的当前地址位置定位信息。
在一个实施例中,所述步骤还包括:
若所述终端接收到服务器发送的推送消息,所述终端判断是否接收到用户输入的回复指令;
若所述终端接收到回复指令,发送用户输入的回复指令至所述服务器或者所述预设的外部设备。
本申请提供了一种计算机可读存储介质,计算机可读存储介质存储有一个或者一个以上程序,所述一个或者一个以上程序可被一个或者一个以上的处理器执行,以实现以下步骤:
服务器根据用户的操作将终端的标识号码与初始客户识别模块卡号码进行绑定;
服务器若接收到开启防盗指令,根据终端标识号码发送操作指令给相应的终端。
本申请前述的存储介质包括:磁碟、光盘、只读存储记忆体(Read-Only Memory,ROM)等各种可以存储程序代码的介质。
本申请所有实施例中的单元可以通过通用集成电路,例如CPU(Central Processing Unit,中央处理器),或通过ASIC(Application Specific Integrated Circuit,专用集成电路)来实现。
本申请实施例移动终端防盗方法中的步骤可以根据实际需要进行顺序调整、合并和删减。
本申请实施例移动终端防盗装置中的单元可以根据实际需要进行合并、划分和删减。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到各种等效的修改或替换,这些修改或替换都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以权利要求的保护范围为准。

Claims (20)

  1. 一种移动终端防盗方法,其特征在于,所述方法包括:
    若接收到服务器发送的操作指令,检测是否安装有客户识别模块卡;
    若检测到安装有客户识别模块卡,读取所述客户识别模块卡中存储的唯一身份识别信息;
    将读取的所述唯一身份识别信息发送至所述服务器或者预设的外部设备。
  2. 如权利要求1所述的移动终端防盗方法,其特征在于,所述方法还包括:
    若接收到服务器发送的操作指令,获取终端当前地址位置定位信息;
    发送所述当前地址位置定位信息至所述服务器或者预设的外部设备。
  3. 如权利要求2所述的移动终端防盗方法,其特征在于,所述若接收到服务器发送的操作指令,获取终端当前地址位置定位信息,包括:
    若接收到服务器发送的操作指令,判断所述终端是否联网;
    若联网,获取所述终端的当前地址位置定位信息。
  4. 如权利要求2所述的防盗方法,其特征在于,所述方法还包括:
    若所述终端接收到服务器发送的推送消息,所述终端判断是否接收到用户输入的回复指令;
    若所述终端接收到回复指令,发送用户输入的回复指令至所述服务器或者所述预设的外部设备。
  5. 一种移动终端防盗方法,其特征在于,所述方法包括:
    服务器根据用户的操作将终端的标识号码与初始客户识别模块卡号码进行绑定;
    服务器若接收到开启防盗指令,根据终端标识号码发送操作指令给相应的终端。
  6. 一种移动终端防盗装置,其特征在于,所述装置包括:
    检测单元,用于若接收到服务器发送的操作指令,检测是否安装有客户识别模块卡;
    第一获取单元,用于若检测到安装有客户识别模块卡,读取所述客户识别模块卡中存储的唯一身份识别信息;
    第一发送单元,用于将读取的所述唯一身份识别信息发送至所述服务器或 者预设的外部设备。
  7. 如权利要求6所述的移动终端防盗装置,其特征在于,所述装置还包括:
    第二获取单元,用于若接收到服务器发送的操作指令,获取终端当前地址位置定位信息;
    第二发送单元,用于发送所述当前地址位置定位信息至所述服务器或者预设的外部设备。
  8. 如权利要求7所述的移动终端防盗装置,其特征在于,所述第二获取单元,包括:
    第一判断单元,用于若接收到服务器发送的操作指令,判断所述终端是否联网;
    第二获取子单元,用于若联网,获取所述终端的当前地址位置定位信息;
  9. 如权利要求7所述的移动终端防盗装置,其特征在于,所述装置还包括:
    第二判断单元,用于若所述终端接收到服务器发送的推送消息,所述终端判断是否接收到用户输入的回复指令;
    第三发送单元,用于若所述终端接收到回复指令,发送用户输入的回复指令至所述服务器或者所述预设的外部设备。
  10. 一种服务器,其特征在于,所述服务器包括:
    绑定单元,用于根据用户的操作将终端的标识号码与初始客户识别模块卡号码进行绑定;
    第四发送单元,用于若接收到开启防盗指令,根据终端标识号码发送操作指令给相应的终端。
  11. 一种移动终端防盗设备,其特征在于,包括:
    存储器,用于存储实现防盗方法的程序;以及
    处理器,用于运行所述存储器中存储的实现防盗方法的程序,以执行以下操作:
    若接收到服务器发送的操作指令,检测是否安装有客户识别模块卡;
    若检测到安装有客户识别模块卡,读取所述客户识别模块卡中存储的唯一身份识别信息;
    将读取的所述唯一身份识别信息发送至所述服务器或者预设的外部设备。
  12. 如权利要求11所述的移动终端防盗设备,其特征在于,所述处理器还执 行以下操作:
    若接收到服务器发送的操作指令,获取终端当前地址位置定位信息;
    发送所述当前地址位置定位信息至所述服务器或者预设的外部设备。
  13. 如权利要求12所述的移动终端防盗设备,其特征在于,所述若接收到服务器发送的操作指令,获取终端当前地址位置定位信息,包括:
    若接收到服务器发送的操作指令,判断所述终端是否联网;
    若联网,获取所述终端的当前地址位置定位信息。
  14. 如权利要求12所述的移动终端防盗设备,其特征在于,所述处理器还执行以下操作:
    若所述终端接收到服务器发送的推送消息,所述终端判断是否接收到用户输入的回复指令;
    若所述终端接收到回复指令,发送用户输入的回复指令至所述服务器或者所述预设的外部设备。
  15. 一种服务器,其特征在于,所述服务器包括:
    存储器,用于存储实现防盗方法的程序;以及
    处理器,用于运行所述存储器中存储的实现防盗方法的程序,以执行如下步骤:
    根据用户的操作将终端的标识号码与初始客户识别模块卡号码进行绑定;
    若接收到开启防盗指令,根据终端标识号码发送操作指令给相应的终端。
  16. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有一个或者一个以上程序,所述一个或者一个以上程序可被一个或者一个以上的处理器执行,以实现以下步骤:
    若接收到服务器发送的操作指令,检测是否安装有客户识别模块卡;
    若检测到安装有客户识别模块卡,读取所述客户识别模块卡中存储的唯一身份识别信息;
    将读取的所述唯一身份识别信息发送至所述服务器或者预设的外部设备。
  17. 如权利要求16所述的计算机可读存储介质,其特征在于,所述步骤还包括:
    若接收到服务器发送的操作指令,获取终端当前地址位置定位信息;
    发送所述当前地址位置定位信息至所述服务器或者预设的外部设备。
  18. 如权利要求17所述的计算机可读存储介质,其特征在于,所述若接收到服务器发送的操作指令,获取终端当前地址位置定位信息,包括:
    若接收到服务器发送的操作指令,判断所述终端是否联网;
    若联网,获取所述终端的当前地址位置定位信息。
  19. 如权利要求17所述的计算机可读存储介质,其特征在于,所述步骤还包括:
    若所述终端接收到服务器发送的推送消息,所述终端判断是否接收到用户输入的回复指令;
    若所述终端接收到回复指令,发送用户输入的回复指令至所述服务器或者所述预设的外部设备。
  20. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有一个或者一个以上程序,所述一个或者一个以上程序可被一个或者一个以上的处理器执行,以实现以下步骤:
    服务器根据用户的操作将终端的标识号码与初始客户识别模块卡号码进行绑定;
    服务器若接收到开启防盗指令,根据终端标识号码发送操作指令给相应的终端。
PCT/CN2018/075075 2017-11-02 2018-02-02 移动终端防盗方法、装置、设备以及计算机可读存储介质 WO2019085312A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201711063998.XA CN107819950A (zh) 2017-11-02 2017-11-02 移动终端防盗方法、装置、设备以及计算机可读存储介质
CN201711063998.X 2017-11-02

Publications (2)

Publication Number Publication Date
WO2019085312A1 WO2019085312A1 (zh) 2019-05-09
WO2019085312A9 true WO2019085312A9 (zh) 2019-10-10

Family

ID=61603083

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/075075 WO2019085312A1 (zh) 2017-11-02 2018-02-02 移动终端防盗方法、装置、设备以及计算机可读存储介质

Country Status (2)

Country Link
CN (1) CN107819950A (zh)
WO (1) WO2019085312A1 (zh)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110856126B (zh) * 2019-10-24 2021-09-14 深圳市梦网科技发展有限公司 信息上报、接收方法、终端设备及存储介质
CN111323831B (zh) * 2020-03-05 2023-01-17 上海顷实电子科技有限公司 一种卡钉测试方法、装置及计算机可读存储介质
CN112668995B (zh) * 2020-12-21 2024-02-09 富联裕展科技(深圳)有限公司 打标控制系统、方法及计算机可读存储介质
CN113301570B (zh) * 2021-06-29 2023-04-07 展讯通信(上海)有限公司 Sim卡的防盗方法和装置
CN114071424A (zh) * 2021-12-27 2022-02-18 京东方科技集团股份有限公司 移动端的失联找回方法、装置、系统、设备及存储介质
CN117812575A (zh) * 2022-09-23 2024-04-02 中兴通讯股份有限公司 密码找回方法、终端设备、电子设备及计算机存储介质

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009071735A1 (en) * 2007-12-05 2009-06-11 Erace Security Solutions Oy Ltd Management of mobile station
CN102281531A (zh) * 2011-08-10 2011-12-14 胡光力 一种手机防盗系统及方法
CN103052024A (zh) * 2012-12-06 2013-04-17 广东欧珀移动通信有限公司 一种手机防盗方法、客户端及服务器
CN103118357A (zh) * 2013-02-20 2013-05-22 上海斐讯数据通信技术有限公司 移动终端防盗系统及移动终端防盗方法
CN106303990A (zh) * 2016-08-09 2017-01-04 深圳市金立通信设备有限公司 一种防盗方法及终端

Also Published As

Publication number Publication date
CN107819950A (zh) 2018-03-20
WO2019085312A1 (zh) 2019-05-09

Similar Documents

Publication Publication Date Title
WO2019085312A9 (zh) 移动终端防盗方法、装置、设备以及计算机可读存储介质
JP6596173B1 (ja) 着呼管理方法及び装置
US10237272B2 (en) Methods, apparatus, and systems for identity authentication
US9131341B2 (en) System and method for locating a mobile device
WO2014146256A1 (zh) 一种升级方法、智能终端及升级系统
WO2012065381A1 (zh) 一种防止恶意软件发送数据的方法及装置
US20140031003A1 (en) Methods and systems for providing emergency calling
WO2018149137A1 (zh) 无线保真Wi-Fi连接方法及相关产品
KR20150062686A (ko) 전자 장치의 스팸 필터링 방법 및 그 전자 장치
US8331268B2 (en) Methods, systems, and computer-readable media for providing an event alert
US20090284371A1 (en) System and method for acquiring location information of a communication device
CN104181567B (zh) 终端设备的定位方法、终端设备及终端设备定位系统
ES2817936T3 (es) Métodos y sistemas para verificar usuarios mediante números de teléfono
CN107451488B (zh) 一种提供个人信息的方法、装置及移动终端
WO2016041171A1 (zh) 确定终端漫游状态的方法、装置、终端及服务器
CN112672278A (zh) 一种可穿戴设备的定位方法及装置
CN108830562B (zh) 一种考勤打卡方法及相关设备
WO2016141697A1 (zh) 临时联系人的存储方法及装置
CN106020917B (zh) 一种软件安装方法及装置、用户终端
CN109246280B (zh) 通讯录云处理方法、装置、计算机设备及可读存储介质
CN114401492A (zh) 来电信息通知方法、装置、呼叫通知服务器及存储介质
WO2016180165A1 (zh) 一种手机追踪方法、装置及终端
WO2018152978A1 (zh) 提醒更改账号绑定电话号码的方法及装置和计算机存储介质
WO2017036051A1 (zh) 一种呼叫转移状态查询方法及系统
CN104053132B (zh) 一种信息号码识别的方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18873900

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 28/09/2020)

122 Ep: pct application non-entry in european phase

Ref document number: 18873900

Country of ref document: EP

Kind code of ref document: A1