WO2021230702A1 - 분실된 휴대 단말에 대한 안심 서비스를 제공하기 위한 방법 및 장치 - Google Patents
분실된 휴대 단말에 대한 안심 서비스를 제공하기 위한 방법 및 장치 Download PDFInfo
- Publication number
- WO2021230702A1 WO2021230702A1 PCT/KR2021/006060 KR2021006060W WO2021230702A1 WO 2021230702 A1 WO2021230702 A1 WO 2021230702A1 KR 2021006060 W KR2021006060 W KR 2021006060W WO 2021230702 A1 WO2021230702 A1 WO 2021230702A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- portable terminal
- mobile terminal
- control
- loss
- terminal
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 57
- 230000004044 response Effects 0.000 claims description 36
- 238000011017 operating method Methods 0.000 claims 2
- 238000011084 recovery Methods 0.000 abstract description 4
- 230000006872 improvement Effects 0.000 abstract description 2
- 238000012545 processing Methods 0.000 description 44
- 230000006870 function Effects 0.000 description 25
- 238000004891 communication Methods 0.000 description 20
- 230000008569 process Effects 0.000 description 20
- 230000008859 change Effects 0.000 description 12
- 230000005540 biological transmission Effects 0.000 description 9
- 238000007689 inspection Methods 0.000 description 4
- 238000010295 mobile communication Methods 0.000 description 4
- 230000006855 networking Effects 0.000 description 4
- 230000007958 sleep Effects 0.000 description 4
- 238000013459 approach Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 238000004590 computer program Methods 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 208000019901 Anxiety disease Diseases 0.000 description 1
- 230000036506 anxiety Effects 0.000 description 1
- 239000000969 carrier Substances 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 230000007423 decrease Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 230000002123 temporal effect Effects 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/22—Processing or transfer of terminal data, e.g. status or physical capabilities
- H04W8/24—Transfer of terminal data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72484—User interfaces specially adapted for cordless or mobile telephones wherein functions are triggered by incoming communication events
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q9/00—Arrangements in telecontrol or telemetry systems for selectively calling a substation from a main station, in which substation desired apparatus is selected for applying a control signal thereto or for obtaining measured values therefrom
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/60—Subscription-based services using application servers or record carriers, e.g. SIM application toolkits
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q2209/00—Arrangements in telecontrol or telemetry systems
- H04Q2209/40—Arrangements in telecontrol or telemetry systems using a wireless architecture
Definitions
- the following embodiments relate to a method and apparatus for performing control of a portable terminal, and in more detail, a method and apparatus for providing a relief service to a lost portable terminal are disclosed.
- the number of lost mobile phones exceeded 1 million units in one year, but reports of lost mobile phones appearing to be on the decline. If the price of one mobile phone is set at 500,000 won, damage is expected to be about 570 billion won per year.
- An embodiment may provide an apparatus and method for providing a function for obtaining a lost portable terminal.
- An embodiment may provide an apparatus and method for providing a function for protecting personal information in a lost portable terminal.
- the method comprising: receiving a control message from a control server that has registered the loss of the portable terminal, performed by the portable terminal; performing an operation according to the control according to the control message; and transmitting a response to the control message to the control server.
- the method comprising: receiving a request for control of the lost mobile terminal from the user terminal, performed by the control server; transmitting a control message requesting the control to the mobile terminal; and receiving a response to the control message from the portable terminal, wherein the response to the control message includes a result of performing the operation performed in the portable terminal by control according to the control message.
- An apparatus and method for providing a function for obtaining a lost portable terminal are provided.
- An apparatus and method for providing a function for protecting personal information in a lost portable terminal are provided.
- FIG. 1 shows the structure of a terminal according to an embodiment.
- FIG. 2 shows the structure of a control server according to an embodiment.
- FIG. 3 is a flowchart of a service providing control for a lost mobile terminal according to an embodiment.
- FIG. 4 illustrates that a lost mobile terminal according to an example is sleep-on by a learner.
- FIG. 5 illustrates that the portable terminal according to an example is switched to a battery ultra-power saving mode.
- FIG. 6 illustrates an output of a loss notification message according to an example.
- FIG. 7 illustrates a direct call function through a loss notification message according to an example.
- FIG. 8 illustrates a login interface for authentication of a lost mobile terminal according to an example.
- FIG 9 illustrates a mobile phone status check interface according to an example.
- FIG. 10 illustrates the detection of a SIM change according to an example.
- FIG. 11 illustrates a photo and/or video capturing interface according to an example.
- FIG. 12 illustrates a portable terminal in which a photo and/or a video is being taken according to an example.
- FIG. 13 illustrates an interface for checking and downloading a photographed picture according to an example.
- FIG. 14 illustrates a siren sound interface according to an example.
- FIG. 15 illustrates an interface of implementation of a microphone according to an example.
- 16 illustrates an interface of outgoing video call according to an example.
- FIG. 17 illustrates a real-time location search interface according to an example.
- FIG. 18 illustrates a WIFI SSID tracking interface according to an example.
- 19 illustrates a data backup interface according to an example.
- FIG. 20 illustrates a data backup file selection interface according to an example.
- 21 illustrates a data initialization interface according to an example.
- 22 illustrates a process of forcibly locking a mobile terminal according to an example.
- 23 illustrates a process of forcibly locking a mobile terminal through a homepage according to an example.
- FIG. 24 illustrates a process of resetting a pin number according to an example.
- 25 illustrates a process of releasing a forced lock for a mobile terminal according to an example.
- first and second may be used to describe various components, but the above components should not be limited by the above terms.
- the above terms are used to refer to one component as distinct from another component.
- a first component may be referred to as a second component, and similarly, a second component may also be referred to as a first component.
- each component shown in the embodiments are shown independently to represent different characteristic functions, and it does not mean that each component is made of separate hardware or only one software component unit. That is, each component is listed as each component for convenience of description. For example, at least two of the components may be combined into one component. Also, one component may be divided into a plurality of components. Integrated embodiments and separate embodiments of each of these components are also included in the scope of rights without departing from the essence.
- components are not essential components to perform essential functions, but may be optional components only to improve performance.
- Embodiments may be implemented including only components essential for implementing the essence of the embodiment, and for example, structures in which optional components are excluded, such as components used only for performance improvement, are also included in the scope of rights.
- a mobile phone may mean a mobile phone or a smart phone.
- FIG. 1 shows the structure of a terminal according to an embodiment.
- the mobile terminal 100 may be a user's mobile phone.
- the mobile terminal 100 may be lost.
- the mobile terminal 100 may include at least a portion of the processing unit 110 , the communication unit 120 , and the storage unit 130 as components.
- the components may communicate with each other via one or more communication buses or signal lines.
- the components shown for the portable terminal 100 in FIG. 1 may be merely examples. Not all of the illustrated components may be essential for the portable terminal 100 .
- the mobile terminal 100 may have more or fewer components than those shown in FIG. 1 . Also, two or more components shown in FIG. 1 may be combined. Also, the components may be configured or arranged differently than shown in FIG. 1 .
- Each component may be implemented in hardware including one or more signal processing and/or application specific integrated circuits (ASICs), implemented in software, or a combination of hardware and software.
- ASICs application specific integrated circuits
- the processing unit 110 may process a task required for the operation of the portable terminal 100 .
- the processing unit 110 may execute codes of operations or steps of the processing unit 110 described in the embodiments.
- the processing unit 110 may generate and process signals, data, or information that are input to, output from, or generated in the portable terminal 100 , and may generate and process signals, data, or information. related inspection, comparison, and judgment can be performed. In other words, in the embodiment, generation and processing of data or information and inspection, comparison, and judgment related to data or information may be performed by the processing unit 110 .
- the processing unit 110 may be at least one processor.
- the processor may be a hardware processor, or a central processing unit (CPU). There may be a plurality of processors. Alternatively, the processor may include a plurality of cores, and may provide multi-tasking for simultaneously executing a plurality of processes and/or a plurality of threads. At least some of the steps of the embodiments may be performed in parallel for a plurality of objects via a plurality of processors, a plurality of cores, a plurality of processes and/or a plurality of threads.
- the processing unit 110 may execute codes of operations or steps of the portable terminal 100 described in the embodiments.
- the processing unit 110 may run a program.
- the processing unit 110 may execute codes constituting a program.
- the program may include an operating system (OS) of the portable terminal 100 , a system program, an application, and an app.
- OS operating system
- processing unit 110 may control other components of the portable terminal 100 for the function of the processing unit 110 described above.
- the communication unit 120 may receive data or information used for the operation of the portable terminal 100 , and may transmit data or information used for the operation of the portable terminal 100 .
- the communication unit 120 may transmit data or information to another device in a network to which the portable terminal 100 is connected, and may receive data or information from the other device. In other words, transmission or reception of data or information described in the embodiment may be performed by the communication unit 120 .
- the communication unit 120 may be a networking chip, a networking interface, or a communication port.
- the storage unit 130 may store data or information used for the operation of the portable terminal 100 . That is, data or information possessed by the portable terminal 100 described in the embodiment may be stored in the storage unit 130 .
- the storage unit 130 may be a memory.
- the storage unit 130 may include a built-in storage medium such as a RAM and a flash memory, and may include a removable storage medium such as a memory card.
- the storage unit 130 may store at least one program.
- the processing unit 110 may execute at least one program.
- the processor 110 may read the code of at least one program from the storage 130 and execute the read code.
- processing unit 110 the communication unit 120 , and the storage unit 130 of the portable terminal 100 will be described in detail below with reference to the embodiments.
- the mobile terminal 100 may further include an output unit 140 .
- the output unit 140 may output data or information of the portable terminal 100 . That is, data or information output from the portable terminal 100 described in the embodiment may be output by the output unit.
- the user of the portable terminal 100 may recognize data or information output through the output unit 140 .
- the mobile terminal 100 may further include a photographing unit 150 .
- the photographing unit 150 may generate an image and a moving picture of the object by photographing the object.
- the photographing unit 150 may include a camera and a microphone.
- FIG. 2 shows the structure of a control server according to an embodiment.
- the control server 200 may be a server of a mobile communication company that provides a mobile communication service to the mobile terminal 100 .
- the control server 200 may be a server of a communication company that provides a communication service to the portable terminal 100 , may be a server of a manufacturer that manufactured the portable terminal 100 , and after-sales service for the portable terminal 100 .
- it may be a server of an institution that provides other management services.
- the control server 200 may include at least a portion of the processing unit 210 , the communication unit 220 , and the storage unit 230 as components.
- the components may communicate with each other via one or more communication buses or signal lines.
- the components shown for the control server 200 in FIG. 2 may be merely an example. Not all of the illustrated components may be essential for the control server 200 .
- the control server 200 may have more or fewer components than shown in FIG. 2 . Also, two or more components shown in FIG. 2 may be combined. Also, the components may be configured or arranged differently than shown in FIG. 2 .
- Each component may be implemented in hardware including one or more signal processing and/or application specific integrated circuits (ASICs), implemented in software, or a combination of hardware and software.
- ASICs application specific integrated circuits
- the processing unit 210 may process a job required for the operation of the control server 200 .
- the processing unit 210 may execute codes of operations or steps of the processing unit 210 described in the embodiments.
- the processing unit 210 may generate and process signals, data, or information that are input to the control server 200 , output from the control server 200 , or generated in the control server 200 , and may generate and process signals, data or information. related inspection, comparison, and judgment can be performed. In other words, in the embodiment, generation and processing of data or information and inspection, comparison, and judgment related to data or information may be performed by the processing unit 210 .
- the processing unit 210 may be at least one processor.
- the processor may be a hardware processor, or a central processing unit (CPU). There may be a plurality of processors. Alternatively, the processor may include a plurality of cores, and may provide multi-tasking for simultaneously executing a plurality of processes and/or a plurality of threads. At least some of the steps of the embodiments may be performed in parallel for a plurality of objects via a plurality of processors, a plurality of cores, a plurality of processes and/or a plurality of threads.
- processing unit 210 may execute codes of operations or steps of the control server 200 described in the embodiments.
- the processing unit 210 may run a program.
- the processing unit 210 may execute codes constituting the program.
- the program may include an operating system (OS), a system program, an application, and an app of the control server 200 .
- processing unit 210 may control other components of the control server 200 for the function of the processing unit 210 described above.
- the communication unit 220 may receive data or information used for the operation of the control server 200 , and may transmit data or information used for the operation of the control server 200 .
- the communication unit 220 may transmit data or information to another device in a network to which the control server 200 is connected, and may receive data or information from the other device. In other words, transmission or reception of data or information described in the embodiment may be performed by the communication unit 220 .
- the communication unit 220 may be a networking chip, a networking interface, or a communication port.
- the storage unit 230 may store data or information used for the operation of the control server 200 . That is, data or information possessed by the control server 200 described in the embodiment may be stored in the storage unit 230 .
- the storage unit 230 may be a memory.
- the storage unit 230 may include an embedded storage medium such as a RAM and a flash memory, and may include a removable storage medium such as a memory card.
- the storage unit 230 may store at least one program.
- the processing unit 210 may execute at least one program.
- the processor 210 may read the code of at least one program from the storage 230 and execute the read code.
- control server 200 The operations, functions and features of the processing unit 210 , the communication unit 220 , and the storage unit 230 of the control server 200 will be described in detail below with reference to the embodiments.
- FIG. 3 is a flowchart of a service providing control for a lost mobile terminal according to an embodiment.
- the control server 200 may provide a mobile phone loss relief service for the lost mobile terminal 100 . As a function of the mobile phone loss relief service, the control server 200 may provide control for the lost mobile terminal 100 .
- the user terminal 301 may be a terminal used by the user of the portable terminal 100 to request a service for obtaining the lost portable terminal 100 .
- the user of the portable terminal 100 may be the owner of the portable terminal 100 .
- the user terminal 301 may be a personal computer such as a notebook computer or another portable terminal that a user can use.
- the storage server 302 may be a server that stores data provided from the portable terminal 100 .
- the control server 200 and the storage server 302 may be physically one server or may be separate servers.
- the storage server 302 may be cloud storage for a service.
- the user may perform registration for use of the service.
- step 310 the mobile terminal 100 (or the user terminal 301 ) may transmit a service subscription request to the control server 200 .
- the mobile terminal 100 may receive a response to the request for service subscription from the control server 200 .
- the mobile terminal 100 may install an application for a service.
- a response to the request for service subscription may include an address for installing an application.
- the mobile terminal 100 may download an application from the control server 200 or the storage server 320 and install the downloaded application.
- the control server 200 may subscribe the mobile terminal 100 to the service through 1) a request for service subscription in step 310 and 2) an interaction with an application installed in the mobile terminal 100 in step 320. Also, the mobile terminal information for controlling the mobile terminal 100 may be registered in the control server 200 .
- step 330 and the like may be performed.
- the user terminal 301 may transmit a report of loss of the portable terminal 100 to the control server 200 .
- the control server 200 may receive a report of loss of the portable terminal 100 from the user terminal 301 .
- the report of loss may include 1) an identifier (ID) of a user, 2) an identifier of the portable terminal 100, 3) a date and time of loss, and 4) a description of the loss.
- the identifier of the mobile terminal 100 may be a phone number of the mobile terminal 100 .
- Reporting of loss may be performed in the manner exemplified in Table 1 below.
- the user terminal 301 may access a homepage operated by the control server 200 , and may input a report of loss to the control server 200 through the homepage.
- the control server 200 may provide a secure homepage or secure site for loss of the mobile terminal 100 , and the user terminal 301 may report the loss by accessing the secure homepage.
- the homepage may be provided by a homepage server separate from the control server 200 .
- contents described as being performed by the control server 200 in relation to the homepage may be regarded as being performed by the homepage server.
- ARS automatic response system
- the user may generate a report of loss by manipulating the user terminal 301 according to the ARS, and the ARS server may provide the report of loss to the control server 200 .
- the ARS server may be the control server 200 .
- SMS text The user of the user terminal 301 may transmit the loss report to the control server 200 through a Short Message Service (SMS) text indicating the loss report.
- SMS Short Message Service
- control server 200 may register the loss of the mobile terminal 100 according to the report of the loss.
- control server 200 may first A control message may be transmitted to the mobile terminal 100 .
- the mobile terminal 100 may receive the first control message from the control server 200 .
- the first control message may be a message requesting the first control of the portable terminal 100 according to the registration of the loss of the portable terminal 100 .
- the first control message may be a message automatically transmitted from the control server 200 to the portable terminal 100 according to the registration of the loss of the portable terminal 100 .
- step 345 the mobile terminal 100 may perform a first operation according to the first control according to the first control message.
- the mobile terminal 100 may transmit a response to the first control message to the control server 200 .
- the control server 200 may receive a response to the first control message from the portable terminal 100 .
- the response to the first control message may include a result of performing the first operation.
- the user may perform an operation to obtain the lost portable terminal 100 again using the user terminal 301 .
- step 360 the user terminal 301 may access the control server 200 to obtain the lost portable terminal 100 .
- the user terminal 301 may perform authentication for the lost portable terminal 100 with respect to the control server 200 .
- the user terminal 301 may authenticate the lost mobile terminal 100 using a phone number and an authentication pin number of the lost mobile terminal 100 .
- the user terminal 301 may transmit a second control request for obtaining the lost portable terminal 100 to the control server 200 .
- the control server 200 may receive a control request from the user terminal 301 .
- step 370 upon receiving the request for the second control, the control server 200 may transmit a second control message to the portable terminal 100 .
- the mobile terminal 100 may receive the second control message from the control server 200 .
- the second control message may be a message requesting a second control of the portable terminal 100 to obtain the lost portable terminal 100 .
- the second control for the portable terminal 100 may be to control the portable terminal 100 to perform a specified operation that increases the possibility of recovery of the lost portable terminal 100 .
- the mobile terminal 100 may perform a second operation according to the second control according to the second control message.
- the mobile terminal 100 may transmit a response to the second control message to the control server 200 and/or the storage server 3020 .
- the control server 200 may receive a response to the second control message from the portable terminal 100 .
- the response to the second control message may include a result of performing the second operation.
- control server 200 may transmit a response to the second control message to the user terminal 301 .
- the user terminal 301 may receive a response to the second control message from the control server 200 .
- steps 365 , 370 , 375 , 380 and 385 may be performed repeatedly.
- the above-described first control message, first control, and first operation may be called a loss report message, a loss report control, and a loss report operation, respectively.
- the above-described second control request, second control message, second control and second operation may be respectively named as control request, control message, control and operation, respectively.
- the description of the first control message, the first control and the first operation, and the description of the second control message, the second control, and the second operation described above may be replaced with each other.
- the first operation and the second operation may be regarded as the same.
- the control server 200 may provide a mobile phone loss relief service by the control server 200 through a specified interface such as a web page.
- a specified interface such as a web page.
- the user terminal 301 may transmit a report of loss and a request for control through an interface to be described later, and communicate with the control server 200 . connection can be made.
- mobile phone described in the drawings may represent the lost portable terminal 100 .
- the first operation may include switching the setting of the portable terminal 100 to the specified setting when a specified event occurs in the portable terminal 100 .
- the first control may represent switching the setting of the portable terminal 100 to the specified setting when an event specified according to the first control occurs.
- the portable terminal 100 may change the setting of the portable terminal 100 to the specified setting.
- the portable terminal 100 when the portable terminal 100 is switched to the specified setting, re-change of the switched portion may be prohibited, and other related settings other than the switched specified setting may be disabled.
- FIG. 4 illustrates that a lost mobile terminal according to an example is sleep-on by a learner.
- FIG 5 illustrates that the portable terminal 100 according to an example is switched to a battery ultra-power saving mode.
- the specified event may be that the acquirer of the portable terminal 100 approaches the portable terminal 100 .
- the specified event may be that the portable terminal 100 is sleep-on (ON).
- Sleep-on may be a transition of the mobile terminal 100 from a sleep mode to an operation mode. For example, as the learner presses a button of the portable terminal 100 , the portable terminal 100 may sleep on.
- the specified event is 1) that an object approaches the proximity sensor of the portable terminal 100 , 2) that the image captured by the camera of the portable terminal 100 changes, 3) that of the portable terminal 100 It may include detecting light exceeding a standard specified by the camera, 4) changing the position of the portable terminal 100 , 5) unfolding the foldable portable terminal 100 , and the like.
- the specified setting may be a battery deep sleep mode.
- the ultra-battery power saving mode may be a mode for maximally saving a battery among settable modes related to power saving of a battery of the portable terminal 100 .
- the specified setting may include 1) entry into the lock mode and 2) release of the lock mode.
- step 345 when the portable terminal 100 sleeps on the portable terminal 100 , the portable terminal 100 may be switched to a battery ultra-power saving mode, and power saving of the portable terminal 100 is disabled. Mode and general power saving mode may be disabled (disabled).
- the first operation may be performed when a specified event occurs in the portable terminal 100 .
- the first operation may include taking a picture and/or a video using the camera of the portable terminal 100 . Since such a photographing is performed automatically by the portable terminal 100 , it may be called an automatic photographing.
- the plurality of cameras are 1) a front camera disposed on the front of the mobile terminal 100 , 2) a rear camera disposed on the back of the mobile terminal 100 , and 3) disposed inside the foldable mobile terminal 100 .
- a camera may be included.
- the video may include sound, and the microphone of the portable terminal 100 may be used to include the video including the sound.
- the response to the first control message may include transmitting the picture and/or video taken by the portable terminal 100 to the control server 200 or the storage server 302 .
- the mobile terminal 100 may upload the captured photo and/or video to the control server 200 or the storage server 302 .
- the user of the mobile terminal 100 may check the photographed photos and/or videos uploaded from the mobile phone loss security homepage, which will be described later.
- information about the location, situation, or the acquirer of the lost portable terminal 100 may be provided to the user of the portable terminal 100 .
- the learner's face may be photographed by the mobile terminal 100 .
- the captured photos and/or moving images may include information on the location of the portable terminal 100 .
- the captured photos and/or video may include location tracking information for the portable terminal 100 .
- the photographed photos and/or videos can be used as evidence in the statement prepared when reporting the crime of escaping and embezzlement, and can be used as evidence to gain an advantage in legal disputes. .
- the first operation may include double locking of the portable terminal 100 .
- the double lock may indicate applying an additional screen lock together with the normal screen lock for the mobile terminal 100 .
- the control server 200 may transmit a second control message 370 to the portable terminal 100 to release an additional screen lock, and the portable terminal 100 may perform the second operation in step 375 . You can unlock additional screen locks.
- FIG. 6 illustrates an output of a loss notification message according to an example.
- FIG. 7 illustrates a direct call function through a loss notification message according to an example.
- the loss notification message may be a message requesting that the user of the portable terminal 100 assist the acquirer of the portable terminal 100 to obtain the lost portable terminal 100 .
- the fact of loss may be notified to the acquirer of the mobile terminal 100 through the loss notification message.
- the loss notification message may be preset by an application installed by the portable terminal 100 , and may be transmitted to the control server 200 through the application.
- the first control message may include information on the loss notification message.
- the first control may indicate outputting a loss notification message to the mobile terminal 100 using information of the loss notification message.
- the first operation may include outputting a loss notification message from the mobile terminal 100 .
- the loss notification message may be displayed on the lock screen even when the mobile terminal 100 is in a locked state or in a double lock state.
- a lost notification message can provide a direct call function to an emergency contact.
- a dialing screen in which a specified phone number is input may be output, or a call to a specified phone number may be performed.
- the specified phone number may be a phone number related to the user of the portable terminal 100 .
- the specified phone number may be a phone number of an acquaintance of the user of the portable terminal 100 .
- the specified phone number may be an emergency contact number of the user of the portable terminal 100 .
- the specified phone number may be preset by an application installed by the portable terminal 100 , and may be transmitted to the control server 200 through the application.
- FIG. 8 illustrates a login interface for authentication of a lost mobile terminal according to an example.
- the user terminal 301 may authenticate the lost portable terminal 100 with respect to the control server 200 .
- Authentication may include logging into the control server 200 .
- 4 shows a login interface for login.
- the user's user terminal 301 when the user's user terminal 301 loses the mobile terminal 100, the user may report the loss of the mobile terminal through the interface of the "reliable lost mobile phone homepage" provided in step 330 .
- the user terminal 301 may log in from the web page of FIG. 8 in order to use the function provided through the mobile phone loss relief service, and may use the function provided by the control server 200 after completion of the login.
- the login may be performed using the number and PIN number of the mobile terminal 100 .
- the "safety lost mobile phone home page" may provide the following interfaces. That is, in step 360 , the control server 200 may provide the user terminal 301 with the interface described below as a web page, and provide information included in the interface to the user terminal 301 through the web page. can In step 365 , the user terminal 301 may transmit a second control request to the control server 200 by manipulating a web page output to the web browser of the user terminal 301 .
- FIG 9 illustrates a mobile phone status check interface according to an example.
- the mobile phone status check interface may include information such as items in Table 2 below.
- the icon may be an icon, a symbol, a picture, or a photo indicating the appearance of the mobile terminal 100 .
- the icon may reflect the type, shape, and color of the mobile terminal 100 .
- designation The name may be a name or abbreviation of the portable terminal 100 such as "my mobile phone", or alphanumeric characters indicating the portable terminal 100 .
- Phone number The phone number may be an identifier of the mobile terminal 100 or a number for a call with the mobile terminal 100 .
- battery level The remaining battery level may indicate the remaining amount of charge of the battery of the portable terminal 100 .
- Loss report time The loss report time may be a time at which loss of the portable terminal 100 is reported or a time at which loss is registered.
- USIM change history The USIM (Universal Subscriber Identity Module; USIM) change history may indicate a change history of the USIM of the mobile terminal 100 after the loss report time.
- the changed phone number of the mobile terminal 100 may be checked through the USIM change history, and the current phone number of the mobile terminal 100 may be confirmed through the changed phone number.
- double lock The double lock may indicate whether the double lock is applied to the mobile terminal 100 or may set a fisherman to which the double lock is applied.
- state of mobile terminal The state of the mobile terminal may indicate the state of the lost mobile terminal 100 .
- the state of the mobile terminal may include an operation (taking a photo and/or a video, sounding a siren, transmission of a voice, a video call, etc.) being executed by the mobile terminal 100 .
- the state of the mobile terminal may include a camera used by the mobile terminal 100 .
- the first operation may be to prevent the mobile terminal 100 from using a new USIM.
- the first control may be to prevent replacement of the USIM of the lost mobile terminal 100 .
- the new USIM can be prevented from being used, and a new USIM user can be determined using the new USIM number.
- a change of a USIM from a lost USIM lost together with the portable terminal 100 to a new USIM may be included in the change history of the USIM described above.
- the control server 200 controls the mobile terminal 100 in which loss is registered with a mobile operator server that provides a communication service to the mobile terminal 100 .
- identifier and lost USIM can be registered.
- the identifier may be an International Mobile Equipment Identify (IMEI) of the mobile terminal 100 .
- the mobile communication company server may store the access history of the USIM of the mobile terminal 100 in which the loss is registered, and may provide the stored access history of the USIM to the control server 200 .
- the response to the first control message in step 350 may include a change history of the USIM.
- the response to the second control message in step 380 and delivery of the response in step 385 may include the USIM change history.
- the USIM change history may be provided to the user of the user terminal 301 through the aforementioned mobile phone status check interface.
- the user of the user terminal 301 may select a desired second operation by manipulating a web page output to the web browser of the user terminal 301 , and may transmit a request for a second control for the second operation to the control server 200 . ) can be transmitted.
- FIG. 11 illustrates a photo and/or video capturing interface according to an example.
- the second operation may include taking a picture and/or a video using the camera of the portable terminal 100 . That is, the second control may be to remotely execute the camera of the portable terminal 100 to take a picture and/or a video with the camera. Since the photographing is performed by the second control message according to the user's request of the user terminal 301, it may be called manual photographing.
- the plurality of cameras are 1) a front camera disposed on the front of the mobile terminal 100 , 2) a rear camera disposed on the back of the mobile terminal 100 , and 3) disposed inside the foldable mobile terminal 100 .
- a camera may be included.
- the video may include sound, and the microphone of the portable terminal 100 may be used to include the video including the sound.
- the response to the second control message in step 380 may include transmitting the picture and/or video taken by the portable terminal 100 to the control server 200 or the storage server 302 .
- the mobile terminal 100 may upload the captured photo and/or video to the control server 200 or the storage server 302 .
- the control server 200 may transmit the transmitted photo and/or video to the user terminal 301 through the photo and/or video capturing interface.
- the user of the user terminal 301 may check the current state of the portable terminal 100 through the photographed photograph and / or video uploaded through the photograph and / or video recording interface, and through the repetition of step 365 It is possible to select whether to continue taking pictures and/or videos, and select whether to save the captured photos and/or videos.
- FIG. 12 illustrates a portable terminal in which a photo and/or a video is being taken according to an example.
- shooting information indicating that the camera of the portable terminal 100 is taking a picture and/or a video may be output.
- the photographing information may include a time during which a video is being photographed in the portable terminal 100 .
- the photographing information may include an image of a picture and/or a video being photographed by the portable terminal 100 .
- FIG. 13 illustrates an interface for checking and downloading a photographed picture according to an example.
- the second operation may include transmission of a picture and/or a video taken using the camera of the portable terminal 100 . That is, the second control may be to transmit a picture and/or a video taken using the camera of the portable terminal 100 to the control server 200 .
- the photo and/or moving picture may be generated by the above-described automatic shooting and/or manual shooting.
- the response to the second control message in step 380 and transmission of the response in step 385 may include a photo and/or a video taken by the portable terminal 100 .
- the user terminal 301 may download a photo and/or a video taken by the portable terminal 100 from the control server 200 or the storage server 302 .
- FIG. 14 illustrates a siren sound interface according to an example.
- the second operation may include sounding of a siren using the speaker of the portable terminal 100 .
- the siren may include sound, sound, and voice according to the settings of the portable terminal 100 .
- the siren sound may ignore other settings of the portable terminal 100 . For example, even if the portable terminal 100 is set to a silent mode or a vibration mode, or the volume of the portable terminal 100 is set (low), the siren may be sounded at a specified volume.
- the specified volume may be the maximum volume of the portable terminal 100 .
- the siren sound may be performed for a time according to the setting of the portable terminal 100 .
- FIG. 15 illustrates an interface of implementation of a microphone according to an example.
- the second control request may include the user's voice recorded using the microphone of the user terminal 301 .
- the second control message may include a recorded user's voice. That is, the recorded user's voice may be transmitted to the portable terminal 100 through the second control request and the second control message.
- the user may record his/her own voice through the interface of executing the microphone, and the recorded voice may be output from the portable terminal 100 .
- the second operation may include outputting the recorded user's voice. Through such transmission, the user's voice may be transmitted to the learner at a remote location.
- the voice transmission may ignore other settings of the mobile terminal 100 . For example, even if the portable terminal 100 is set to a silent mode or a vibration mode, or the volume of the portable terminal 100 is set to (low), a voice output may be performed at a specified volume.
- the specified volume may be the maximum volume of the portable terminal 100 .
- 16 illustrates an interface of outgoing video call according to an example.
- the second control request may include a video call request using the user terminal 301 .
- the second control message may include a video call request. That is, the video call request may be transmitted to the portable terminal 100 through the second control request and the second control message.
- the video call request may include a recorded video and a recorded voice generated by the user terminal 301 .
- the second operation may include a video call between the user terminal 301 and the portable terminal 100 .
- a video call between the user terminal 301 and the portable terminal 100 may be started.
- the video call may be performed through a video call dialing interface.
- the video call may be automatically executed even if the learner does not respond to the message of the video call request output from the portable terminal 100 . That is, when the second control message including the video call request is transmitted to the mobile terminal 100 in step 370 , the operation of the camera and the microphone of the mobile terminal 100 for the video call may be automatically executed.
- FIG. 17 illustrates a real-time location search interface according to an example.
- the second operation may include performing a real-time location search of the portable terminal 100 . That is, the second control may be to search for a real-time location of the portable terminal 100 using a sensor of the portable terminal 100 such as a Global Positioning System (GPS).
- GPS Global Positioning System
- the response to the second control message in step 380 may include transmitting, by the mobile terminal 100, information on the searched location generated by real-time location search to the control server 200 or the storage server 302. can
- the control server 200 may transmit information on the searched location to the user terminal 301 through a real-time location search interface.
- the user of the user terminal 301 may check the current location of the portable terminal 100 through information on the searched location output through the real-time location search interface.
- the performance of the real-time location search described above may be repeated. There may be a plurality of pieces of information on a location searched according to such repetition. Information on a plurality of searched locations may indicate a location of the mobile terminal 100 that changes over time.
- the user of the user terminal 301 may check the moved location or movement path of the portable terminal 100 through information on a plurality of searched locations output through the real-time location search interface.
- the searched location, the moved location, and the movement route may be displayed on a map, and the searched locations may be connected with a line according to a temporal sequence.
- the real-time location search interface may include a last location among information on a plurality of searched locations and a time at which the last location was searched.
- Information on the searched location may include information such as items in Table 3 below.
- the location may indicate the found location of the mobile terminal 100 .
- the location may be expressed as an address corresponding to the found physical location of the mobile terminal 100 .
- search time The search time may indicate the date and time at which the location of the portable terminal 100 was searched.
- FIG. 18 shows a WIFI SSID tracking interface according to an example.
- the second operation may include performing Wi-Fi Service Set IDentifier (SSID) tracking of the mobile terminal 100 . That is, the second control may be to search for a list of networks (eg, WiFi) accessible to the portable terminal 100 using the communication unit 120 of the portable terminal 100 .
- SSID Wi-Fi Service Set IDentifier
- the response to the second control message in step 380 may include transmitting the list of networks searched by the portable terminal 100 to the control server 200 or the storage server 302 .
- the control server 200 may transmit the searched network list to the user terminal 301 through the WIFI SSID tracking interface.
- the user of the user terminal 301 may check the list of networks output through the WIFI SSID tracking interface, and estimate the current location of the portable terminal 100 through the list of networks.
- the list of networks may include information about one or more networks.
- Information on each of the one or more networks may include information such as items in Table 4 below.
- the signal strength may indicate the signal strength of the searched network.
- designation The name may indicate the name of the searched network.
- Kinds The type may indicate a type of a searched network such as 2.4G and 5G. Whether it is a public network Whether the search network is a public network may indicate whether the search network is a public network that can be used without authentication or a private network that requires authentication.
- FIG. 19 illustrates a data backup interface according to an example.
- the second operation may include backing up data stored in the portable terminal 100 . That is, the second control may be to back up data stored in the portable terminal 100 to another remote storage such as the control server 200 and the storage server 302 .
- the data may include a user's personal information record and file.
- the response to the second control message in step 380 may include transmitting the data to be backed up to the control server 200 or the storage server 302 .
- the second operation, the backup of data stored in the portable terminal 100 may be selectively performed according to the type of data.
- the user may select a type of data to be backed up among data in the portable terminal 100 through the data backup file selection interface output to the user terminal 301 .
- the type of data may include 1) a call list, 2) a message, 3) a photo in an album, 4) a conversation in a messenger, 5) an address book, and 6) files.
- the request for second control of step 365 and the second control message of step 370 may include information indicative of this selection.
- Data backed up by the control server 200 or the storage server 302 may be deleted from the portable terminal 100 .
- the data backup interface may provide a function of recovering the backed up data.
- the restoration of the backed up data may be to install the backed up data in the user's new portable terminal.
- the user may select recovery of the backed up data through the data backup interface output to the user terminal 301 .
- the data backup interface may provide a function of data initialization of the portable terminal 100 .
- FIG. 20 illustrates a data backup file selection interface according to an example.
- the second operation of backing up data stored in the portable terminal 100 may be selectively performed with respect to the files stored in the portable terminal 100 .
- the user may select a folder (or directory) to be backed up among data in the portable terminal 100 through the data backup file selection interface output to the user terminal 301 .
- the request for second control of step 365 and the second control message of step 370 may include information indicative of this selection.
- the first operation of step 345 may include generation of file and folder information indicating the structure of files and folders in the portable terminal 100 .
- the response to the first control message of step 350 may include file and folder information.
- the file and folder information may be transmitted from the control server 200 to the portable terminal 100 in the process of access in step 360 .
- the second control request and the second control message may include a request for file and folder information.
- the mobile terminal 100 receiving the request for file and folder information may generate file and folder information indicating the structure of files and folders in the mobile terminal 100 as a second operation.
- the response to the second control message of step 380 and delivery of the response of step 385 may include file and folder information.
- 21 illustrates a data initialization interface according to an example.
- the second operation may include initialization of data stored in the portable terminal 100 and initialization of settings of the portable terminal 100 . That is, the second control may be to delete data stored in the portable terminal 100 and initialize the settings of the portable terminal 100 .
- the initialization may include a setting for recovering the lost mobile terminal 100 as described above.
- the response to the second control message in step 380 and transmission of the response in step 385 may include information indicating whether initialization of data and settings succeeds or fails.
- data in the portable terminal 100 such as personal information records (eg, a record for a phone call, a record for a text, and a photo) in the portable terminal 100 can be deleted, and the personal Information leakage can be minimized.
- personal information records eg, a record for a phone call, a record for a text, and a photo
- the above-described mobile phone loss relief service may be provided through collaboration between a mobile phone loss security service provider and a mobile communication company. Through such collaboration, powerful functions for the loss of the mobile terminal 100 may be provided, and revenue generated by these services and interworking with other additional services may be made.
- the possibility of recovery of the lost mobile terminal 100 may be improved.
- the above-described camera control, video call, location inquiry, siren and backup provided by the mobile phone loss relief service are provided.
- the possibility of retrieval of the portable terminal 100 may be improved.
- the anxiety about the loss of the mobile terminal 100 can be minimized through the setting in preparation for the loss of the mobile terminal 100 .
- a control for protection and leakage prevention of personal information may be provided, and in addition to the control, phishing hacking compensation insurance, etc. may be provided with the service. .
- the creation of new customers can be expected by providing a service that allows customers to actually recover the lost mobile terminal 100 through the mobile phone loss relief service, and mobile carriers can provide differentiated products and move The competitiveness of telecommunication companies can be strengthened.
- Another embodiment for reporting the loss of the mobile terminal 100 is Another embodiment for reporting the loss of the mobile terminal 100
- the loss of the portable terminal 100 may be reported by the user terminal 301 . Unlike this embodiment, the report of loss may be made through other methods.
- the loss of the portable terminal 100 may be reported by the operation of the portable terminal 100 .
- the portable terminal 100 may transmit a report of loss of the portable terminal 100 to the control server 200 .
- Reporting of loss of the portable terminal 100 may be performed together with a forced lock on the portable terminal 100 .
- the report of loss of the portable terminal 100 may be understood to include a forced lock on the portable terminal 100 .
- the report of loss of the portable terminal 100 may be understood by replacing the forced lock on the portable terminal 100 .
- the forced locking of the portable terminal 100 may mean that the portable terminal 100 enters the lock mode without manipulation of the portable terminal 100 by the user or the learner.
- the forced unlocking of the portable terminal 100 may mean that the lock mode of the portable terminal 100 is released without manipulation of the portable terminal 100 by the user or the learner.
- 22 illustrates a process of forcibly locking a mobile terminal according to an example.
- Step 330 described above with reference to FIG. 3 may be replaced with the following steps 2210 , 2220 , 2230 , 2240 , 2250 , 2260 and 2270 .
- step 330 may include steps 2210 , 2220 , 2230 , 2240 , 2250 , 2260 and 2270 .
- the learner of the mobile terminal 100 may operate the acquired mobile terminal 100 .
- the portable terminal 100 may recognize a specified operation for the portable terminal 100 .
- the operation may be OFF (OFF) of the power of the portable terminal 100 .
- the mobile terminal 100 may request the learner for primary authentication.
- the primary authentication may be made by input of the first information under specified conditions.
- the first information may be a pin number of the user of the portable terminal 100 .
- the specified condition may be an input within a specified time.
- the mobile terminal 100 may display a count of a specified time, such as 20 seconds, and if the first information is not input within the count, it may be considered that the input has failed.
- the specified condition may be a limit on the number of inputs.
- the mobile terminal 100 may limit the input of the first information to a specified number of times, such as five times.
- the mobile terminal 100 may determine whether the primary authentication has been successful.
- the mobile terminal 100 may determine that the first authentication is successful when the first information is input while satisfying a specified condition.
- the mobile terminal 100 may determine that the first authentication has failed.
- step 2240 may be performed. If the primary authentication is successful, step 2270 may be performed.
- the mobile terminal 100 may request the learner for secondary authentication.
- secondary authentication by the mobile terminal 100 may be performed.
- Secondary authentication may be performed by input of second information.
- the second information may be information used for the portable terminal 100 .
- the second information may be an ID of a user of an application store for the mobile terminal 100 . More specifically, the second information may be a Google Play ID of the user for the mobile terminal 100 using the Android operating system.
- the mobile terminal 100 may determine whether the secondary authentication is successful.
- the mobile terminal 100 may determine that the second authentication is successful.
- the mobile terminal 100 may determine that the second authentication has failed.
- step 2260 may be performed. If the second authentication is successful, step 2270 may be performed.
- step 2260 when the primary authentication and the secondary authentication fail, the mobile terminal 100 may execute a forced lock on the mobile terminal 100 . Also, the mobile terminal 100 may transmit a report of loss of the mobile terminal 100 to the control server 200 .
- the mobile terminal 100 may perform an operation according to the recognized operation. For example, the portable terminal 100 may turn off the power of the portable terminal 100 .
- 23 illustrates a process of forcibly locking a mobile terminal through a homepage according to an example.
- Step 330 described above with reference to FIG. 3 may be replaced with the following steps 2310 , 2320 , 2330 , 2340 , 2350 , 2360 and 2370 .
- step 330 may include steps 2310 , 2320 , 2330 , 2340 , 2350 , 2360 and 2370 .
- the above-described forced locking of the portable terminal 100 may be performed through the user terminal 301 and the control server 200 .
- the user of the portable terminal 301 may input information into a web page output to the user terminal 301 , and the user terminal 301 may transmit the input information to the control server 200 .
- the user terminal 301 may transmit information of the primary authentication to the control server 200 .
- the information of the primary authentication may be information for logging into the control server 200 .
- the information of the primary authentication may be a phone number of the mobile terminal 100 and a pin number of the user.
- a login page provided from the control server 200 may be output to the user terminal 301 , and the user may input information for logging in to the user terminal 301 .
- control server 200 may determine whether the primary authentication has been successful by using the information of the primary authentication.
- control server 200 may determine that the primary authentication is successful.
- step 2330 may be performed.
- step 2340 may be performed.
- the second authentication in steps 2340 and 2350 may be optional. If the secondary authentication is not performed, steps 2340 and 2350 may be omitted, and if the primary authentication is successful, step 2370 may be immediately performed.
- An application installed in the mobile terminal 100 may set whether to use the secondary authentication, and when setting, the mobile terminal 100 may transmit whether to use the secondary authentication to the control server 200 .
- step 2330 a reset of the pin number may be performed.
- the user terminal 301 may transmit information of the secondary authentication to the control server 200 .
- the information of the secondary authentication may be information used for the portable terminal 100 .
- the information of the secondary authentication may be an ID of a user of an application store for the mobile terminal 100 . More specifically, the information of the secondary authentication may be a Google Play ID of the user for the mobile terminal 100 using the Android operating system.
- the information input page of the secondary authentication provided from the control server 200 may be output to the user terminal 301 , and the user may input information of the secondary authentication to the user terminal 301 .
- control server 200 may determine whether the primary authentication has succeeded using the information of the secondary authentication.
- control server 200 may determine that the secondary authentication is successful if the transmitted secondary authentication information is information of the user of the portable terminal 100 .
- control server 200 may determine that the secondary authentication is successful.
- step 2360 may be performed.
- step 2370 may be performed.
- the user terminal 301 may output a web page indicating failure of login.
- the control server 200 may transmit a web page indicating failure of login to the user terminal 301 according to the failure of the secondary authentication.
- step 2370 if the primary authentication and the secondary authentication are successful, the control server 100 may execute a forced lock on the portable terminal 100 . That is, the control server 100 may perform an operation when a report of loss of the portable terminal 100 is received in step 330 .
- the report of loss of the portable terminal 100 may be replaced with the above-described primary authentication and secondary authentication.
- FIG. 24 illustrates a process of resetting a pin number according to an example.
- Step 2330 described above with reference to FIG. 23 may include the following steps 2410 , 2420 , 2430 , and 2440 .
- a request for pin number reset may be sent.
- a request for resetting the PIN number may be sent through a registered e-mail.
- the registered e-mail may be an e-mail of a user registered in the application store for the mobile terminal 100 . More specifically, the registered email may be an email of a user registered in Google Play for the mobile terminal 100 using the Android operating system.
- the user terminal 301 may access the PIN number reset page through an email.
- the pin number reset page may be provided by the control server 200 .
- a link in the email may refer to a pin number reset page.
- the user may input a reset of the pin number to the user terminal 301 , and the user terminal 301 may transmit reset information about the pin number to the control server 200 .
- the reset information for the pin number may include a new pin number of the user, and may include confirmation of input of the new pin number.
- control server 200 may reset the user's pin number using the transmitted reset information of the pin number.
- 25 illustrates a process of releasing a forced lock for a mobile terminal according to an example.
- the user After the mobile terminal 100 is recovered from the acquirer to the user, the user performs the release of the forced lock set in the mobile terminal 100 through the following steps 2510 , 2520 , 2530 , 2540 , 2550 , 2560 and 2570 . can do.
- step 2510 the user of the portable terminal 100 may perform an operation for releasing the forced lock of the recovered portable terminal 100 .
- the portable terminal 100 may recognize an operation of the portable terminal 100 .
- the user may select release of the lock from among the menus output to the portable terminal 100 .
- the mobile terminal 100 may request the user for primary authentication.
- the primary authentication may be made by input of the first information under specified conditions.
- the first information may be a pin number of the user of the portable terminal 100 .
- the specified condition may be an input within a specified time.
- the mobile terminal 100 may display a count of a specified time, such as 20 seconds, and if the first information is not input within the count, it may be considered that the input has failed.
- the specified condition may be a limit on the number of inputs.
- the mobile terminal 100 may limit the input of the first information to a specified number of times, such as five times.
- the mobile terminal 100 may determine whether the primary authentication is successful.
- the mobile terminal 100 may determine that the first authentication is successful when the first information is input while satisfying a specified condition.
- the mobile terminal 100 may determine that the first authentication has failed.
- step 2540 may be performed. If the primary authentication is successful, step 2570 may be performed.
- the mobile terminal 100 may request the user for secondary authentication.
- secondary authentication by the portable terminal 100 may be performed.
- Secondary authentication may be performed by input of second information.
- the second information may be information used for the portable terminal 100 .
- the second information may be an ID of a user of an application store for the mobile terminal 100 . More specifically, the second information may be a Google Play ID of the user for the mobile terminal 100 using the Android operating system.
- the mobile terminal 100 may determine whether the secondary authentication is successful.
- the mobile terminal 100 may determine that the second authentication is successful.
- the mobile terminal 100 may determine that the second authentication has failed.
- step 2560 may be performed. If the second authentication is successful, step 2570 may be performed.
- step 2560 when the primary authentication and the secondary authentication fail, the mobile terminal 100 may maintain a forced lock on the mobile terminal 100 .
- step 2570 when at least one of the primary authentication and the secondary authentication is successful, the mobile terminal 100 may release the forced lock on the mobile terminal 100 .
- the device described above may be implemented as a hardware component, a software component, and/or a combination of the hardware component and the software component.
- devices and components described in the embodiments may include, for example, a processor, a controller, an arithmetic logic unit (ALU), a digital signal processor, a microcomputer, a field programmable array (FPA), It may be implemented using one or more general purpose or special purpose computers, such as a programmable logic unit (PLU), microprocessor, or any other device capable of executing and responding to instructions.
- the processing device may execute an operating system (OS) and one or more software applications running on the operating system.
- the processing device may also access, store, manipulate, process, and generate data in response to execution of the software.
- OS operating system
- the processing device may also access, store, manipulate, process, and generate data in response to execution of the software.
- the processing device includes a plurality of processing elements and/or a plurality of types of processing elements. It can be seen that may include For example, the processing device may include a plurality of processors or one processor and one controller. Other processing configurations are also possible, such as parallel processors.
- Software may comprise a computer program, code, instructions, or a combination of one or more of these, which configures a processing device to operate as desired or is independently or collectively processed You can command the device.
- the software and/or data may be any kind of machine, component, physical device, virtual equipment, computer storage medium or apparatus, to be interpreted by or to provide instructions or data to the processing device. , or may be permanently or temporarily embody in a transmitted signal wave.
- the software may be distributed over networked computer systems, and stored or executed in a distributed manner. Software and data may be stored in one or more computer-readable recording media.
- the method according to the embodiment may be implemented in the form of program instructions that can be executed through various computer means and recorded in a computer-readable medium.
- the computer-readable recording medium may contain information used in the embodiments according to the present invention.
- the computer-readable recording medium may include a bitstream, and the bitstream may include the information described in the embodiments according to the present invention.
- the computer-readable recording medium may include a non-transitory computer-readable medium.
- the computer-readable medium may include program instructions, data files, data structures, etc. alone or in combination.
- the program instructions recorded on the medium may be specially designed and configured for the embodiment, or may be known and available to those skilled in the art of computer software.
- Examples of the computer-readable recording medium include magnetic media such as hard disks, floppy disks and magnetic tapes, optical media such as CD-ROMs and DVDs, and magnetic such as floppy disks.
- - includes magneto-optical media, and hardware devices specially configured to store and execute program instructions, such as ROM, RAM, flash memory, and the like.
- Examples of program instructions include not only machine language codes such as those generated by a compiler, but also high-level language codes that can be executed by a computer using an interpreter or the like.
- the hardware devices described above may be configured to operate as one or more software modules to perform the operations of the embodiments, and vice versa.
- the apparatus described in the embodiment may include one or more processors and may include a memory.
- the memory may store one or more programs to be executed by one or more processors.
- One or more programs may perform the operation of the device described in the embodiment.
- one or more programs on the device may perform an operation described in a device-related one of the steps described above.
- the operation of the device described in the embodiment may be executed by one or more programs.
- the one or more programs may include programs, applications and apps of the device described above in the embodiment.
- one of the one or more programs may correspond to a program, an application, and an app of the device described above in an embodiment.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Human Computer Interaction (AREA)
- Databases & Information Systems (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
Abstract
Description
분실 신고 방식 | 설명 |
홈페이지 | 사용자 단말(301)은 제어 서버(200)에 의해 운영되는 홈페이지에 접속할 수 있고, 홈페이지를 통해 분실의 신고를 제어 서버(200)로 입력할 수 있다.
예를 들면, 제어 서버(200)는 휴대 단말(100)의 분실에 대한 안심 홈페이지 또는 안심 사이트를 제공할 수 있고, 사용자 단말(301)은 안심 홈페이지에 접근함으로써 분실의 신고를 할 수 있다. 실시예에서, 홈페이지는 제어 서버(200)와 별개로 분리된 홈페이지 서버에 의해 제공될 수도 있다. 말하자면, 홈페이지에 관련하여 제어 서버(200)에서 수행되는 것으로 설명된 내용은 홈페이지 서버에 의해 수행되는 것으로 간주될 수 있다. |
ARS | 사용자 단말(301)의 사용자는 에이알에스(Automatic Response System; ARS)를 통해 분실의 신고를 제어 서버(200)에게 전송할 수 있다.
사용자는 ARS에 따라 사용자 단말(301)을 조작함으로써 분실의 신고를 생성할 수 있고, ARS 서버는 분실의 신고를 제어 서버(200)에게 제공할 수 있다. 또는, ARS 서버는 제어 서버(200)일 수 있다. |
SMS 문자 | 사용자 단말(301)의 사용자는 분실의 신고를 나타내는 단문 메시지 서비스(Short Message Service; SMS) 문자를 통해 분실의 신고를 제어 서버(200)에게 전송할 수 있다. |
정보의 명칭 | 정보에 대한 설명 |
아이콘 | 아이콘은 휴대 단말(100)의 외형을 나타내는 아이콘, 기호, 그림 또는 사진일 수 있다.
아이콘은 휴대 단말(100)의 종류, 모양 및 색상 등을 반영할 수 있다. |
명칭 | 명칭은 "내 휴대폰"과 같이 휴대 단말(100)의 명칭, 약칭 또는 휴대 단말(100)을 나타내는 수문자일 수 있다. |
전화 번호 | 전화 번호는 휴대 단말(100)의 식별자 또는 휴대 단말(100)과의 통화를 위한 번호일 수 있다. |
배터리 잔량 | 배터리 잔량은 휴대 단말(100)의 배터리의 충전 잔량을 나타낼 수 있다. |
분실 신고 시각 | 분실 신고 시각은 휴대 단말(100)의 분실이 신고된 시각 또는 분실이 등록된 시각일 수있다. |
USIM 변동 이력 | 유심(Universal Subscriber Identity Module; USIM) 변동 이력은 분실 신고 시각 이후 휴대 단말(100)의 USIM이 변동된 이력을 나타낼 수 있다.
USIM 변동 이력을 통해 휴대 단말(100)의 변경된 전화 번호가 확인될 수 있고, 변경된 전화 번호를 통해 휴대 단말(100)의 현재의 전화 번호가 확인될 수 있다. |
이중 잠금 | 이중 잠금은 휴대 단말(100)에 대한 이중 잠금의 적용 여부를 나타내거나, 이중 잠금의 적용 어부를 설정할 수 있다. |
휴대 단말의 상태 | 휴대 단말의 상태는 분실된 휴대 단말(100)의 상태를 나타낼 수 있다.
휴대 단말의 상태는 휴대 단말(100)이 실행하고 있는 동작(사진 및/또는 동영상의 촬영, 사이렌의 울림, 음성의 전달 및 영상 통화 등)을 포함할 수 있다. 휴대 단말의 상태는 휴대 단말(100)이 사용하는 카메라를 포함할 수 있다. |
정보의 명칭 | 정보에 대한 설명 |
위치 | 위치는 검색된 휴대 단말(100)의 위치를 나타낼 수 있다. 위치는 검색된 휴대 단말(100)의 물리적 위치에 대응하는 주소로 표현될 수 있다. |
검색 시각 | 검색 시각은 휴대 단말(100)의 위치가 검색된 날짜 및 시각을 나타낼 수 있다. |
정보의 명칭 | 정보에 대한 설명 |
신호의 세기 | 신호의 세기는 검색된 네트워크의 신호의 세기를 나타낼 수 있다. |
명칭 | 명칭은 검색된 네트워크의 명칭을 나타낼 수 있다. |
종류 | 종류는, 2.4G 및 5G와 같은 검색된 네트워크의 종류를 나타낼 수 있다. |
공개 네트워크인지 여부 | 공개 네트워크인지 여부는 검색 네트워크가 인증 없이 사용할 수 있는 공용(public) 네트워크인지, 인증이 요구되는 사설(private) 네트워크인지 여부를 나타낼 수 있다. |
Claims (18)
- 휴대 단말에 의해 수행되는,상기 휴대 단말의 분실을 등록한 제어 서버로부터 제어 메시지를 수신하는 단계;상기 제어 메시지에 따른 제어에 의한 동작을 수행하는 단계; 및상기 제어 메시지에 대한 응답을 상기 제어 서버로 전송하는 단계를 포함하는, 동작 방법.
- 제1항에 있어서,상기 동작은 상기 휴대 단말의 카메라를 사용하는 사진 및/또는 동영상의 촬영의 수행을 포함하는, 동작 방법.
- 제1항에 있어서,상기 동작은 사용자 단말 및 상기 휴대 단말 간의 영상 통화를 포함하는, 동작 방법.
- 제1항에 있어서,상기 동작은 상기 휴대 단말의 실시간 위치 검색의 수행을 포함하는, 동작 방법.
- 제1항에 있어서,상기 동작은 상기 휴대 단말의 와이파이 에스에스아이디(Service Set IDentifier)의 추적의 수행을 포함하는, 동작 방법.
- 제1항에 있어서,상기 제어 서버로부터 분실 신고 메시지를 수신하는 단계;상기 분실 신고 메시지에 따른 제어에 의한 분실 신고 동작을 수행하는 단계; 및상기 분실 신고 메시지에 대한 응답을 상기 제어 서버로 전송하는 단계를 더 포함하는, 동작 방법.
- 제6항에 있어서,상기 분실 신고 동작은 상기 휴대 단말에서 특정된 이벤트가 발생하였을 때 상기 휴대 단말의 설정을 특정된 설정으로 변환하는 것을 포함하는, 동작 방법.
- 제6항에 있어서,상기 분실 신고 동작은 상기 휴대 단말에서 분실 알림 메시지를 출력하는 것을 포함하는, 동작 방법.
- 제1항 내지 제8항 중 어느 한 항의 방법을 수행하는 프로그램을 수록한 컴퓨터 판독 가능 기록 매체.
- 제어 서버에 의해 수행되는,사용자 단말로부터 분실된 휴대 단말에 대한 제어의 요청을 수신하는 단계;상기 제어를 요청하는 제어 메시지를 상기 휴대 단말로 전송하는 단계; 및상기 휴대 단말로부터 상기 제어 메시지에 대한 응답을 수신하는 단계를 포함하고,상기 제어 메시지에 대한 응답은 상기 제어 메시지에 따른 제어에 의한 상기 휴대 단말에서 수행된 동작의 수행의 결과를 포함하는, 동작 방법.
- 제10항에 있어서,상기 동작은 상기 휴대 단말의 카메라를 사용하는 사진 및/또는 동영상의 촬영의 수행을 포함하는, 동작 방법.
- 제10항에 있어서,상기 동작은 상기 사용자 단말 및 상기 휴대 단말 간의 영상 통화를 포함하는, 동작 방법.
- 제10항에 있어서,상기 동작은 상기 휴대 단말의 실시간 위치 검색의 수행을 포함하는, 동작 방법.
- 제10항에 있어서,상기 동작은 상기 휴대 단말의 와이파이 에스에스아이디(Service Set IDentifier)의 추적의 수행을 포함하는, 동작 방법.
- 제10항에 있어서,상기 사용자 단말로부터 상기 휴대 단말의 분실의 신고를 수신하는 단계;상기 휴대 단말의 분실의 등록을 수행하는 단계;분실 신고 제어를 요청하는 분실 신고 메시지를 상기 휴대 단말로 전송하는 단계; 및상기 휴대 단말로부터 상기 분실 신고 메시지에 대한 응답을 수신하는 단계를 더 포함하고,상기 분실 신고 메시지에 대한 응답은 상기 분실 신고 메시지에 따른 제어에 의한 상기 휴대 단말에서 수행된 분실 신고 동작의 수행의 결과를 포함하는, 동작 방법,
- 제15항에 있어서,상기 분실 신고 동작은 상기 휴대 단말에서 특정된 이벤트가 발생하였을 때 상기 휴대 단말의 설정을 특정된 설정으로 변환하는 것을 포함하는, 동작 방법.
- 제15항에 있어서,상기 분실 신고 동작은 상기 휴대 단말에서 분실 알림 메시지를 출력하는 것을 포함하는, 동작 방법.
- 제10항 내지 제17항 중 어느 한 항의 방법을 수행하는 프로그램을 수록한 컴퓨터 판독 가능 기록 매체.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR10-2020-0057836 | 2020-05-14 | ||
KR1020200057836 | 2020-05-14 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021230702A1 true WO2021230702A1 (ko) | 2021-11-18 |
Family
ID=78524693
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2021/006060 WO2021230702A1 (ko) | 2020-05-14 | 2021-05-14 | 분실된 휴대 단말에 대한 안심 서비스를 제공하기 위한 방법 및 장치 |
Country Status (2)
Country | Link |
---|---|
KR (1) | KR20210141427A (ko) |
WO (1) | WO2021230702A1 (ko) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR102505243B1 (ko) | 2022-07-18 | 2023-03-02 | 주식회사 데이터유니버스 | 분실 휴대폰 회수 지원 서비스 방법 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20090094665A (ko) * | 2008-03-03 | 2009-09-08 | 주식회사 케이티테크 | 영상 통화를 이용한 원격 제어 기능을 수행하는 통신단말기 및 그 방법 |
KR20120004679A (ko) * | 2010-07-07 | 2012-01-13 | 주식회사 디케이아이테크놀로지 | 분실 단말 추적 시스템 및 그 방법 |
KR20150057865A (ko) * | 2013-11-20 | 2015-05-28 | 조보경 | 분실된 스마트폰의 제어 시스템 |
KR20160117975A (ko) * | 2015-04-01 | 2016-10-11 | 연지민 | 스마트폰 실시간 위치추적 시스템 |
KR20190082733A (ko) * | 2019-07-03 | 2019-07-10 | 에스케이텔레콤 주식회사 | 메시지를 기반으로 분실 단말기를 제어하는 방법 및 그 기록매체 |
-
2021
- 2021-05-14 WO PCT/KR2021/006060 patent/WO2021230702A1/ko active Application Filing
- 2021-09-27 KR KR1020210126964A patent/KR20210141427A/ko not_active Application Discontinuation
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20090094665A (ko) * | 2008-03-03 | 2009-09-08 | 주식회사 케이티테크 | 영상 통화를 이용한 원격 제어 기능을 수행하는 통신단말기 및 그 방법 |
KR20120004679A (ko) * | 2010-07-07 | 2012-01-13 | 주식회사 디케이아이테크놀로지 | 분실 단말 추적 시스템 및 그 방법 |
KR20150057865A (ko) * | 2013-11-20 | 2015-05-28 | 조보경 | 분실된 스마트폰의 제어 시스템 |
KR20160117975A (ko) * | 2015-04-01 | 2016-10-11 | 연지민 | 스마트폰 실시간 위치추적 시스템 |
KR20190082733A (ko) * | 2019-07-03 | 2019-07-10 | 에스케이텔레콤 주식회사 | 메시지를 기반으로 분실 단말기를 제어하는 방법 및 그 기록매체 |
Also Published As
Publication number | Publication date |
---|---|
KR20210141427A (ko) | 2021-11-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2016017975A1 (en) | Method of modifying image including photographing restricted element, and device and system for performing the method | |
WO2016089009A1 (en) | Method and cloud server for managing device | |
WO2016018004A1 (en) | Method, apparatus, and system for providing translated content | |
WO2018082482A1 (zh) | 一种网络共享方法、接入网络方法及系统 | |
WO2016036045A1 (ko) | 근거리 무선 통신을 지원하는 화상형성장치 및 그 화상형성장치의 동작 방법, 근거리 무선 통신을 지원하는 모바일 단말 및 그 단말의 동작 방법 및 근거리 무선 통신을 이용한 클라우드 프린트 시스템 | |
WO2016126081A1 (en) | Cloud print server and method of providing automatic connection service performed by the cloud print server | |
WO2010013899A2 (ko) | 커뮤니케이션 그룹에 대한 통신 기능 제공 방법과 그를 위한 이동통신 단말기 및 프리젠스 서버 | |
WO2015115723A1 (ko) | 무선 충전 장치와 단말, 그를 포함하는 무선 충전 시스템, 그 제어 방법 및 컴퓨터 프로그램이 기록된 기록매체 | |
WO2014182043A1 (en) | System and method for providing content to an apparatus based on location of the apparatus | |
WO2016018017A1 (en) | Mobile communication system, different mobile devices sharing same phone number on mobile communication system, and method of providing mobile communication service between different mobile devices sharing same phone number | |
WO2015142002A1 (en) | Method and device for sharing functions of smart key | |
WO2020171672A1 (en) | Method for interoperating between bundle download process and esim profile download process by ssp terminal | |
WO2012077993A2 (ko) | 도어락 시스템 | |
WO2020032604A1 (ko) | 출입 관리 시스템 및 이를 이용한 출입 관리 방법 | |
WO2021002696A1 (en) | Method for transferring subscription and electronic device for supporting the same | |
WO2018076875A1 (zh) | 备份数据的同步方法、装置、存储介质、电子设备及服务器 | |
WO2021162279A1 (en) | Electronic device supporting multiple sims and operation method thereof | |
WO2020032649A1 (en) | Electronic device and communication relaying method thereof | |
WO2019132555A1 (ko) | 이모지가 포함된 메시지를 송수신하는 전자 장치 및 그 전자 장치를 제어하는 방법 | |
WO2019143081A1 (ko) | 데이터 통신을 제어하는 방법 및 전자 장치 | |
WO2019139247A1 (en) | Electronic device for managing embedded subscriber identification module and method for same | |
WO2021230702A1 (ko) | 분실된 휴대 단말에 대한 안심 서비스를 제공하기 위한 방법 및 장치 | |
WO2013187719A1 (en) | A method and system to notify users activity during an ongoing communication session | |
WO2019194428A1 (ko) | 외부 전자 장치의 키를 공유하는 전자 장치 및 전자 장치의 동작 방법 | |
WO2018070669A1 (ko) | 다국어 지원 객실용 서비스요청장치를 이용한 서비스요청 시스템 및 서비스요청방법 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21803901 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 21803901 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 12/05/2023) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 21803901 Country of ref document: EP Kind code of ref document: A1 |