CN102739868B - Method and system for handling loss of mobile terminal - Google Patents
Method and system for handling loss of mobile terminal Download PDFInfo
- Publication number
- CN102739868B CN102739868B CN201210206530.2A CN201210206530A CN102739868B CN 102739868 B CN102739868 B CN 102739868B CN 201210206530 A CN201210206530 A CN 201210206530A CN 102739868 B CN102739868 B CN 102739868B
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- information
- loss
- service layer
- processing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active - Reinstated
Links
Landscapes
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
技术领域 technical field
本申请涉及移动通信技术领域,特别是涉及一种移动终端的丢失处理方法及系统。The present application relates to the technical field of mobile communication, and in particular to a method and system for handling the loss of a mobile terminal.
背景技术 Background technique
随着无线通信技术的快速发展,手机等移动终端己普及到人们的日常生活中,且成为必不可少的通信装置之一。作为便携式通信装置,手机因为体积小,通常会因为机主的大意而遗失或者被盗,这除了会给机主造成财务损失。当手机落入不法分子手中时,还可能出现被盗打电话、手机内部私人信息被泄露等情况。更有甚者,犯罪分子还可能利用手机通讯录等信息进行犯罪活动。为此,关于手机防盗的一些方法以及技术逐渐被应用在手机上。With the rapid development of wireless communication technology, mobile terminals such as mobile phones have been popularized in people's daily life, and have become one of the indispensable communication devices. As a portable communication device, a mobile phone is usually lost or stolen due to the carelessness of the owner due to its small size, which will not only cause financial losses to the owner. When the mobile phone falls into the hands of criminals, there may also be situations such as stolen calls and private information inside the mobile phone being leaked. What's more, criminals may also use information such as mobile phone address books to carry out criminal activities. For this reason, some methods and technologies about mobile phone anti-theft are gradually applied on mobile phones.
目前,常见的一种手机防盗方法为设置开机密码,用户在开机后需要输入预先设定的密码才能进入操作系统界面进行正常操作。此种方法在每次开机后都需要输入密码,过程繁琐,而且其他用户在非法获取手机后也可以通过破解密码的方式进入操作系统界面,其防盗效果并不明显。At present, a common mobile phone anti-theft method is to set a power-on password, and the user needs to input a preset password to enter the operating system interface for normal operation after turning on the mobile phone. This kind of method needs to input password every time after starting up, and the process is loaded down with trivial details, and other users also can enter operating system interface by the mode of cracking password after obtaining mobile phone illegally, and its anti-theft effect is not obvious.
为此,出现了一些改进的手机防盗方法,例如,设置手机开机或者屏幕锁定密码,如果手机使用者连续几次输入错误的密码,则启动手机摄像头功能,对手机使用者进行拍照,并将照片传送到预先设定的邮箱中。这可以帮助机主确定手机当前的使用者,从而为找回手机提供了重要线索。此种方式可以在一定程度上实现手机防盗。但是,此种防盗方法的前提是手机必须有前置摄像头,因此在一定程度上限制了该防盗方法的使用范围。另外,照片的传递需要依赖于网络,如果在拍照后出现无网络的情况,则无法进行照片的传递。同样的,需要在每次开机或者解锁的时候输入密码,过程较为繁琐。For this reason, some improved mobile phone anti-theft methods have occurred, for example, set the mobile phone power-on or screen lock password, if the mobile phone user enters the wrong password several times in succession, then start the mobile phone camera function, the mobile phone user is taken pictures, and the photos sent to the preset mailbox. This can help the owner determine the current user of the phone, which provides an important clue for retrieving the phone. This way can realize mobile phone anti-theft to a certain extent. However, the premise of this anti-theft method is that the mobile phone must have a front camera, thus limiting the scope of use of this anti-theft method to a certain extent. In addition, the transmission of photos needs to rely on the network. If there is no network after taking pictures, the transmission of photos cannot be carried out. Similarly, it is cumbersome to enter a password every time the device is turned on or unlocked.
发明内容 Contents of the invention
本申请提供一种移动终端的丢失处理方法及系统,能够解决丢失处理过程繁琐、使用范围受限的问题。The present application provides a method and system for handling loss of a mobile terminal, which can solve the problems of cumbersome loss handling process and limited application range.
为了解决上述问题,本申请公开了一种移动终端的丢失处理方法,包括以下步骤:In order to solve the above problems, the application discloses a method for handling the loss of a mobile terminal, which includes the following steps:
启动移动终端的丢失保护,监测移动终端信息服务层的信息接收情况,在信息服务层拦截网络中发送给移动终端的信息;Start the loss protection of the mobile terminal, monitor the information reception of the mobile terminal information service layer, and intercept the information sent to the mobile terminal in the network at the information service layer;
解析所述信息,判断是否属于丢失处理信息,若是,Analyzing the information to determine whether it belongs to lost processing information, if so,
则在服务器端的数据库中调用所述丢失处理信息对应的处理指令,根据所述处理指令对移动终端进行处理。Then call the processing instruction corresponding to the lost processing information in the database at the server end, and process the mobile terminal according to the processing instruction.
进一步地,所述在信息服务层拦截网络中发送给移动终端的信息包括:Further, the information sent to the mobile terminal in the information service layer intercepting network includes:
在所述信息被写入移动终端的数据库之前进行拦截。The information is intercepted before it is written into the database of the mobile terminal.
进一步地,所述在信息服务层拦截网络中发送给移动终端的信息包括:Further, the information sent to the mobile terminal in the information service layer intercepting network includes:
监测移动终端信息服务层的信息接收情况,若有新信息,则拦截所述新信息。The information receiving situation of the information service layer of the mobile terminal is monitored, and if there is new information, the new information is intercepted.
进一步地,所述解析所述信息,判断是否属于丢失处理信息包括:Further, the analyzing the information and judging whether it belongs to the lost processing information includes:
将所述信息内容与预先设定的丢失处理信息匹配比较,若相同,则确定该信息属于丢失处理信息,反之,则不属于。The information content is matched and compared with the preset loss handling information, and if they are the same, it is determined that the information belongs to the loss handling information, otherwise, it does not belong.
进一步地,所述根据所述处理指令对移动终端进行处理至少包括以下一种或几种:锁定移动终端、播放报警音、定位移动终端当前位置、删除移动终端内部信息、拦截移动终端操作系统发送的关机指令。Further, the processing of the mobile terminal according to the processing instruction includes at least one or more of the following: locking the mobile terminal, playing an alarm sound, locating the current location of the mobile terminal, deleting internal information of the mobile terminal, intercepting the mobile terminal operating system to send shutdown command.
进一步地,所述锁定移动终端包括:Further, said locking the mobile terminal includes:
通过移动终端操作系统提供的接口创建窗口;Create a window through the interface provided by the mobile terminal operating system;
将所述窗口作为锁屏界面展示在移动终端显示界面。The window is displayed on the display interface of the mobile terminal as a lock screen interface.
进一步地,所述播放报警音之后还包括:Further, after playing the alarm sound, it also includes:
拦截移动终端操作系统更改音量和/或关闭报警音的指令。Intercept instructions from the mobile terminal operating system to change the volume and/or turn off the alarm sound.
进一步地,所述方法在拦截网络中发送给移动终端的信息之前还包括:Further, before intercepting the information sent to the mobile terminal in the network, the method also includes:
判断移动终端是否更换sim卡,若是,则触发移动终端发送短信给预先设定的安全号码。It is judged whether the mobile terminal replaces the sim card, and if so, the mobile terminal is triggered to send a short message to a preset safety number.
进一步地,所述判断移动终端是否更换sim卡包括:Further, said judging whether the mobile terminal replaces the sim card includes:
获取当前移动终端中sim卡的识别码;Obtain the identification code of the SIM card in the current mobile terminal;
判断所述识别码与预先设定的识别码是否相同,若是,则确定没有更换,反之,则确定已经更换。It is judged whether the identification code is the same as the preset identification code, if yes, it is determined that it has not been replaced, otherwise, it is determined that it has been replaced.
为了解决上述问题,本申请还公开了一种移动终端的丢失处理系统,包括:In order to solve the above problems, the present application also discloses a mobile terminal loss processing system, including:
信息拦截模块,用于启动移动终端的丢失保护,监测移动终端信息服务层的信息接收情况,在信息服务层拦截网络中发送给移动终端的信息;The information interception module is used to start the loss protection of the mobile terminal, monitor the information receiving situation of the information service layer of the mobile terminal, and intercept the information sent to the mobile terminal in the network at the information service layer;
解析模块,用于解析所述信息,判断是否属于丢失处理信息,若是,则触发处理模块;An analysis module, configured to analyze the information, determine whether it belongs to lost processing information, and if so, trigger the processing module;
处理模块,用于在服务器端的数据库中调用所述丢失处理信息对应的处理指令,根据所述处理指令对移动终端进行处理。The processing module is configured to call a processing instruction corresponding to the lost processing information in the database of the server, and process the mobile terminal according to the processing instruction.
进一步地,所述信息拦截模块在所述信息被写入移动终端的数据库之前进行拦截。Further, the information interception module intercepts the information before it is written into the database of the mobile terminal.
进一步地,所述信息拦截模块包括:Further, the information interception module includes:
监测单元,用于监测移动终端信息服务层的信息接收情况,若有新信息,则拦截所述信息。The monitoring unit is used to monitor the information receiving situation of the information service layer of the mobile terminal, and intercept the information if there is new information.
进一步地,所述解析模块包括:Further, the parsing module includes:
内容匹配单元,用于将所述信息内容与预先设定的丢失处理信息匹配比较,若相同,则确定该信息属于丢失处理信息,反之,则不属于。The content matching unit is used to match and compare the information content with the preset loss processing information, and if they are the same, determine that the information belongs to the loss processing information, otherwise, it does not belong to it.
进一步地,所述处理模块对移动终端进行处理至少包括以下一种或几种:Further, the processing of the mobile terminal by the processing module includes at least one or more of the following:
锁定移动终端、播放报警音、定位移动终端当前位置、删除移动终端内部信息、拦截移动终端操作系统发送的关机指令、拦截移动终端操作系统更改音量和/或关闭报警音的指令。Lock the mobile terminal, play the alarm sound, locate the current location of the mobile terminal, delete the internal information of the mobile terminal, intercept the shutdown command sent by the mobile terminal operating system, intercept the command of the mobile terminal operating system to change the volume and/or turn off the alarm sound.
进一步地,所述系统还包括:Further, the system also includes:
sim卡更换判断模块,用于判断移动终端是否更换sim卡,若是,则触发移动终端发送短信给预先设定的安全号码。The sim card replacement judging module is used to judge whether the mobile terminal has replaced the sim card, and if so, triggers the mobile terminal to send a short message to a preset security number.
进一步地,所述sim卡更换判断模块包括:Further, the sim card replacement judgment module includes:
识别码获取单元,用于获取当前移动终端中sim卡的识别码;An identification code obtaining unit is used to obtain the identification code of the sim card in the current mobile terminal;
识别码比较单元,用于判断所述识别码与预先设定的识别码是否相同,若是,则确定没有更换,反之,则确定已经更换。The identification code comparing unit is used to judge whether the identification code is the same as the preset identification code, if so, it is determined that it has not been replaced, otherwise, it is determined that it has been replaced.
与现有技术相比,本申请包括以下优点:Compared with the prior art, the present application includes the following advantages:
本申请的移动终端的丢失处理方法及系统通过在移动终端中安装移动终端丢失处理系统,实时对移动终端接收的信息进行分析,并判断是否属于预定的丢失处理信息,再根据判断结果进行处理。整个过程都是在后台运行,并不会影响移动终端正常使用。而且,只有当判断出移动终端接收的信息是丢失处理信息之后,才会进行相应的处理。整个过程中无需用户输入密码等繁琐操作,也无需依赖于是否有摄像头等硬件,从而使整个过程简单方便,且易于实现,可适用范围较大。The mobile terminal loss processing method and system of the present application install a mobile terminal loss processing system in the mobile terminal to analyze the information received by the mobile terminal in real time, and judge whether it belongs to the predetermined loss processing information, and then process according to the judgment result. The whole process is running in the background and will not affect the normal use of the mobile terminal. Moreover, corresponding processing will be performed only after it is determined that the information received by the mobile terminal is lost processing information. In the whole process, there is no need for users to enter cumbersome operations such as passwords, and there is no need to rely on hardware such as cameras, so that the whole process is simple, convenient, easy to implement, and has a wide range of applications.
附图说明 Description of drawings
为了更清楚地说明本申请实施例或现有技术中的技术方案,下面将对实施例中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the technical solutions in the embodiments of the present application or the prior art, the following will briefly introduce the accompanying drawings required in the embodiments. Obviously, the accompanying drawings in the following description are only some of the present application. Embodiments, for those of ordinary skill in the art, other drawings can also be obtained based on these drawings without any creative effort.
图1是本申请的移动终端的丢失处理方法实施例一的流程图;FIG. 1 is a flow chart of Embodiment 1 of a method for handling loss of a mobile terminal of the present application;
图2是本申请的移动终端的丢失处理方法实施例二的流程图;FIG. 2 is a flow chart of Embodiment 2 of the mobile terminal loss processing method of the present application;
图3是本申请的移动终端的丢失处理系统实施例一的结构示意图;FIG. 3 is a schematic structural diagram of Embodiment 1 of the mobile terminal loss processing system of the present application;
图4是本申请的移动终端的丢失处理系统实施例二的结构示意图。FIG. 4 is a schematic structural diagram of Embodiment 2 of the mobile terminal loss processing system of the present application.
具体实施方式detailed description
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员所获得的所有其他实施例,都属于本申请保护的范围。The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. All other embodiments obtained by persons of ordinary skill in the art based on the embodiments in this application belong to the protection scope of this application.
本申请的移动终端的丢失处理方法通过预先安装在移动终端中的移动终端的丢失处理系统实现。移动终端的丢失处理系统通过对外部发送给移动终端的信息进行处理来判断移动终端是否被盗,从而进行相应的处理。其中,所述移动终端可以是手机、平板电脑等。The mobile terminal loss processing method of the present application is realized by the mobile terminal loss processing system pre-installed in the mobile terminal. The lost processing system of the mobile terminal judges whether the mobile terminal is stolen by processing the information sent to the mobile terminal from outside, so as to perform corresponding processing. Wherein, the mobile terminal may be a mobile phone, a tablet computer, and the like.
参照图1,示出本申请的一种移动终端的丢失处理方法实施例一,包括以下步骤:Referring to FIG. 1 , it shows Embodiment 1 of a method for handling loss of a mobile terminal of the present application, including the following steps:
步骤101,启动移动终端的丢失保护,监测移动终端信息服务层的信息接收情况,在信息服务层拦截网络中发送给移动终端的信息。Step 101, start the loss protection of the mobile terminal, monitor the information receiving situation of the information service layer of the mobile terminal, and intercept the information sent to the mobile terminal in the network at the information service layer.
外部发送给移动终端的信息包括文字短信、语音短信、即时通信信息或者邮件等信息,具体的可以根据移动终端功能来设定。可以理解,因为文字短信为移动终端的基本功能,所以此处优选的信息为文字短信。当移动终端包含有其他功能时,则还可以包含除文字短信外的其他信息。例如,如果移动终端包含有接收语音信息的功能,此处的信息也可以是语音短信或者其他安装在移动终端中的通信软件所能够接收的语音信息。另外,某些移动终端可能有特殊功能,那么信息也可以是这些特殊功能所对应的信息。例如,对于iphone手机来说,其包含有imessage这一功能,所以,此处的信息可以是文字短信或者语音短信,也可以是imessage信息。The information sent externally to the mobile terminal includes information such as text messages, voice messages, instant messaging messages or emails, which can be specifically set according to the functions of the mobile terminal. It can be understood that since the text message is the basic function of the mobile terminal, the preferred information here is the text message. When the mobile terminal includes other functions, it may also include other information except text messages. For example, if the mobile terminal includes the function of receiving voice information, the information here may also be a voice message or other voice information that can be received by communication software installed in the mobile terminal. In addition, some mobile terminals may have special functions, so the information may also be information corresponding to these special functions. For example, for an iphone mobile phone, it includes the function of imessage, so the information here can be a text message or a voice message, or it can be an imessage message.
其中,在信息被写入移动终端的数据库之前或者之后都可以在信息服务层对信息进行拦截。优选地,为了避免影响用户使用,可以在信息被写入移动终端的数据库之前,就对所述信息进行拦截。即,在移动终端发出收到信息的提示(如短信提示音、振动等等)之前进行拦截。这样,如果该信息属于丢失处理信息,则可以直接在内部进行处理,用户并不会知道有这样的信息存在,如果该信息不属于丢失处理信息,则再将信息写入数据库,从而使移动终端发出收到信息的提示。具体的,可以通过在信息服务层设置拦截接口,对信息服务层的信息接收情况进行实时监测,当外部发送给移动终端的信息到达信息服务层时,即监测到有新信息到达时,直接对信息进行拦截,暂时阻止该信息继续向移动终端内其他模块传送。移动终端的数据库是指用于存储移动终端相关数据的数据库。具体的,还可以根据信息类型来区分,例如,如果是短信,则可以是移动终端的短信数据库,若是其他信息,则可以存储其他信息的数据库。Wherein, the information can be intercepted at the information service layer before or after the information is written into the database of the mobile terminal. Preferably, in order to avoid affecting user use, the information can be intercepted before it is written into the database of the mobile terminal. That is, interception is carried out before the mobile terminal sends out a reminder of received information (such as SMS notification tone, vibration, etc.). In this way, if the information belongs to the lost processing information, it can be directly processed internally, and the user will not know that there is such information. If the information does not belong to the lost processing information, then the information will be written into the database, so that the mobile terminal Issue a notification that a message has been received. Specifically, by setting up an interception interface at the information service layer, real-time monitoring of information reception at the information service layer can be carried out. When the information sent from the outside to the mobile terminal reaches the information service layer, that is, when new information is detected, the The information is intercepted, and the information is temporarily prevented from continuing to be transmitted to other modules in the mobile terminal. The database of the mobile terminal refers to a database for storing data related to the mobile terminal. Specifically, it can also be distinguished according to the type of information. For example, if it is a short message, it can be a short message database of a mobile terminal; if it is other information, it can be a database storing other information.
信息服务层为与信息类型相对应的服务层。例如,对于短信来说,信息服务层即指短信服务层,对于imessage来说,信息服务层即指imessage服务层。The information service layer is the service layer corresponding to the information type. For example, for short messages, the information service layer refers to the short message service layer, and for imessage, the information service layer refers to the imessage service layer.
为了保证拦截的有效性,此处需要对所有外部发送给移动终端的信息进行拦截。In order to ensure the effectiveness of the interception, all external information sent to the mobile terminal needs to be intercepted here.
为了实现拦截,在此之前,需要对移动终端进行相应的设置,例如,启动移动终端的丢失保护。优选地,在启动移动终端的丢失保护之前,还可以预设安全号码或者安全邮箱等等。In order to implement interception, prior to this, it is necessary to perform corresponding settings on the mobile terminal, for example, start the loss protection of the mobile terminal. Preferably, before starting the loss protection of the mobile terminal, a safety number or a safety mailbox and the like can also be preset.
步骤102,解析所述信息,判断是否属于丢失处理信息,若是,则进行下一步。Step 102, analyzing the information, judging whether it belongs to lost processing information, and if so, go to the next step.
移动终端的丢失处理系统中预先设定了丢失处理信息的格式。在移动终端被盗后,移动终端机主可以根据预定的丢失处理信息格式编写丢失处理信息,并通过其它移动终端或者网络发送给被盗的移动终端。The format of the loss handling information is preset in the loss handling system of the mobile terminal. After the mobile terminal is stolen, the owner of the mobile terminal can write the loss handling information according to the predetermined loss handling information format, and send it to the stolen mobile terminal through other mobile terminals or the network.
解析所述信息,判断是否属于丢失处理信息包括:Analyzing the information and judging whether it belongs to lost processing information includes:
将所述信息内容与预先设定的丢失处理信息匹配比较,若相同,则确定该信息属于丢失处理信息,反之,则不属于。The information content is matched and compared with the preset loss handling information, and if they are the same, it is determined that the information belongs to the loss handling information, otherwise, it does not belong.
步骤103,在服务器端的数据库中调用所述丢失处理信息对应的处理指令,根据所述处理指令对移动终端进行处理。Step 103, calling the processing instruction corresponding to the lost processing information in the database of the server, and processing the mobile terminal according to the processing instruction.
丢失处理信息可以只有一种格式,此时,对移动终端进行处理也需要预先设定,即,只要确定信息是丢失处理信息,便直接执行预先设定的处理。The loss processing information may have only one format. At this time, the processing of the mobile terminal also needs to be pre-set, that is, as long as it is determined that the information is the loss processing information, the pre-set processing will be directly executed.
可以理解,还可以预先设定不同格式的丢失处理信息,分别对应不同的处理。例如,假设有两种格式的丢失处理信息,其中一种格式的丢失处理信息对应的处理为锁定移动终端,另外一种格式的丢失处理信息对应的处理为播放报警音。当拦截到某一信息,并对其进行解析后,确定其为丢失处理信息,且对应的处理为锁定移动终端,则对移动终端进行锁定处理,而不需要进行播放报警音。具体实现时,可以设定一种格式的丢失处理信息对应一种处理,也可以设定一种格式的丢失处理信息对应两种或两种以上的处理,具体根据实际情况来确定,并本申请对此并不限制。It can be understood that the loss processing information in different formats may also be preset, corresponding to different processing. For example, assuming there are two formats of loss handling information, one format of the loss handling information corresponds to locking the mobile terminal, and the other format of the loss handling information corresponds to playing an alarm sound. When a certain information is intercepted and analyzed, it is determined that it is lost processing information, and the corresponding processing is to lock the mobile terminal, then the mobile terminal is locked without playing an alarm sound. During specific implementation, one format of loss processing information can be set to correspond to one type of processing, or one format of loss processing information can be set to correspond to two or more types of processing. There is no limit to this.
对移动终端进行处理,所述处理至少包括以下一种或几种:锁定移动终端、播放报警音、定位移动终端当前位置、删除移动终端内部信息、拦截移动终端操作系统发送的关机指令。The mobile terminal is processed, and the processing includes at least one or more of the following: locking the mobile terminal, playing an alarm sound, locating the current location of the mobile terminal, deleting internal information of the mobile terminal, and intercepting a shutdown command sent by the operating system of the mobile terminal.
优选地,对于锁定移动终端这一处理方式具体可以通过如下方式实现:启动锁屏界面,所述锁屏界面包含解锁密码输入框。Preferably, the processing method of locking the mobile terminal can specifically be realized in the following manner: start a lock screen interface, and the lock screen interface includes an unlock password input box.
此处的锁屏界面可以直接由移动终端的丢失处理系统提供,即当移动终端的丢失处理系统确定丢失处理信息对应的指令为锁定移动终端后,可以通过移动终端操作系统提供的接口,创建一个窗口,并将该窗口作为锁屏界面展示在移动终端显示界面。其中,锁屏界面需要通过输入密码后才能进入。The lock screen interface here can be directly provided by the loss handling system of the mobile terminal, that is, when the loss handling system of the mobile terminal determines that the instruction corresponding to the loss handling information is to lock the mobile terminal, an interface provided by the operating system of the mobile terminal can be used to create a window, and display the window as a lock screen interface on the display interface of the mobile terminal. Wherein, the lock screen interface can only be entered after entering a password.
对于播放报警音,可以通过移动终端操作系统提供的接口来触发移动终端发出报警音。具体的,可以将报警音的音量设置为较大的音量,例如最大音量,并通过拦截移动终端操作系统内更改音量的指令来限制对报警音的音量进行修改。优选地,还可以设定报警音播放时间,例如,每一分钟报警一次,每次持续30秒的方式等等。For playing the alarm sound, the mobile terminal may be triggered to emit the alarm sound through an interface provided by the mobile terminal operating system. Specifically, the volume of the alarm sound can be set to a higher volume, such as the maximum volume, and the modification of the volume of the alarm sound can be restricted by intercepting the volume change instruction in the operating system of the mobile terminal. Preferably, the playing time of the alarm sound can also be set, for example, the alarm sounds once every minute and lasts for 30 seconds each time, and so on.
定位移动终端当前位置可以直接通过移动终端的丢失处理系统实现,即在移动终端的丢失处理系统中添加定位模块,实时获取当前位置,并将当前位置发送给预先设定的移动终端或者邮箱。Locating the current location of the mobile terminal can be realized directly through the lost processing system of the mobile terminal, that is, a positioning module is added to the lost processing system of the mobile terminal to obtain the current location in real time, and send the current location to a preset mobile terminal or mailbox.
删除移动终端内部信息包括:删除通信录、短信、文件或者其他信息。可以理解,只要不是移动终端原始文件都可以删除。具体的,可以通过查看文件属性、所在位置或者建立时间等方式来确定需要删除的文件,并进行删除。可以理解,在删除移动终端内部信息之前还可以包括:将所述移动终端内部信息发送给预先设定的移动终端或者邮箱。Deleting internal information of the mobile terminal includes: deleting address books, short messages, files or other information. It can be understood that as long as it is not the original file of the mobile terminal, any file can be deleted. Specifically, the file to be deleted can be determined by checking the file attribute, location, or creation time, and then deleted. It can be understood that before deleting the internal information of the mobile terminal, it may also include: sending the internal information of the mobile terminal to a preset mobile terminal or mailbox.
优选地,处理还可以采用如下方式:拦截移动终端操作系统发送的关机指令。也即,当确定信息为丢失处理信息后,如果移动终端当前的使用者通过移动终端上的功能键实现关机时,移动终端的丢失处理系统会自动拦截操作系统发送的关机指令,使操作系统底层无法接收到关机指令,从而阻止关机。因为移动终端若处于开机状态,可以便于通过移动终端中的应用软件或者其他方式来获取到更多的移动终端实时动态信息,从而为找回移动终端提供更多有效信息。例如,移动终端的丢失处理系统可以对移动终端当前位置进行定位,或者其他处理,以获取更多的信息,帮助找回移动终端。可以理解,此处为通过拦截关机指令的方式来阻止移动终端关机,但是较多的移动终端还可以通过拆卸电池的方式实现关机。因此,此处的方法优选应用于电池无法拆卸或者不方便拆卸的移动终端上。Preferably, the following method may also be used for processing: intercepting the shutdown command sent by the operating system of the mobile terminal. That is to say, after determining that the information is lost processing information, if the current user of the mobile terminal realizes shutdown through the function key on the mobile terminal, the loss processing system of the mobile terminal will automatically intercept the shutdown command sent by the operating system, so that the bottom layer of the operating system A shutdown command could not be received, preventing shutdown. Because if the mobile terminal is in the power-on state, it is convenient to obtain more real-time dynamic information of the mobile terminal through the application software in the mobile terminal or other methods, thereby providing more effective information for retrieving the mobile terminal. For example, the lost processing system of the mobile terminal can locate the current location of the mobile terminal, or perform other processing to obtain more information and help to find the mobile terminal. It can be understood that here is to prevent the shutdown of the mobile terminal by intercepting the shutdown command, but many mobile terminals can also be shut down by removing the battery. Therefore, the method here is preferably applied to a mobile terminal whose battery cannot be removed or is inconvenient to remove.
可以理解,在实际处理时,还可以根据实际情况对前述处理过程任意组合。也可以根据需要添加其他处理方式,例如对移动终端当前的使用者进行拍照并发送给预先设定的移动终端或者邮箱等等。It can be understood that, during actual processing, the foregoing processing procedures may be combined arbitrarily according to actual conditions. Other processing methods can also be added as required, for example, taking a photo of the current user of the mobile terminal and sending it to a preset mobile terminal or mailbox.
下面以iphone手机为例,对前述方法的实现进行详细的说明。The implementation of the foregoing method will be described in detail below by taking an iphone as an example.
假设外部发送给手机的信息为短信或imessage。首先,移动终端的丢失处理系统在短信服务层进行短信拦截,暂时阻止短信写入操作系统的短信数据库。或者,移动终端的丢失处理系统在imessage服务层进行imessage进行拦截,此时imessage已经与服务器建立通信,但是还未在手机中有反馈。移动终端的丢失处理系统此时对短信或imessage进行解析,获取其中的内容,并判断是否与预先设定的丢失处理信息匹配,若是,则获取丢失处理信息对应的处理指令,并进行相应的处理。若否,则停止拦截,让短信或imessage正常传送。Assume that the information sent externally to the mobile phone is a text message or imessage. First, the loss processing system of the mobile terminal intercepts the short message at the short message service layer, temporarily preventing the short message from being written into the short message database of the operating system. Alternatively, the loss processing system of the mobile terminal intercepts the imessage at the imessage service layer. At this time, the imessage has established communication with the server, but there is no feedback in the mobile phone. The loss processing system of the mobile terminal analyzes the text message or imessage at this time, obtains the content, and judges whether it matches the preset loss processing information, and if so, obtains the processing instruction corresponding to the loss processing information, and performs corresponding processing . If not, stop intercepting and let the SMS or imessage be sent normally.
因为iphone特殊的电池固定方式,使用者只能通过手机上的按键来关闭手机,正常情况下,很少有人会采用拆卸电池的方式来关闭手机。因此,本实例中,处理方式优选采用锁定手机,并阻止关机的方式。Because of the special battery fixing method of the iphone, users can only turn off the phone through the buttons on the phone. Under normal circumstances, few people will turn off the phone by removing the battery. Therefore, in this example, the processing method preferably adopts a method of locking the mobile phone and preventing it from being turned off.
手机中的丢失处理系统通过短信或imessage接收到锁定手机的处理指令后,首先启动一个锁屏界面,并要求输入密码。因为移动终端的丢失处理系统对关机指令进行了拦截,手机当前使用者便无法通过具体按键关闭手机,那么手机便会一直处于开机状态,同时又无法正常使用。此时,移动终端的丢失处理系统还可以触发内部的其他功能模块,例如定位模块来对手机进行定位,从而便于手机机主获取到手机实时的动态信息。After the loss processing system in the mobile phone receives a processing instruction to lock the mobile phone through a text message or imessage, it first starts a lock screen interface and requires input of a password. Because the loss processing system of the mobile terminal intercepts the shutdown command, the current user of the mobile phone cannot turn off the mobile phone through a specific button, so the mobile phone will always be on and cannot be used normally. At this time, the loss processing system of the mobile terminal can also trigger other internal functional modules, such as a positioning module to locate the mobile phone, so that the mobile phone owner can obtain real-time dynamic information of the mobile phone.
又或者,采用播放报警音的处理方式,移动终端的丢失处理系统中可以预先设定一段报警音,当接收到处理指令后,移动终端的丢失处理系统可以在后台启动报警音播放功能,从而实现报警音的播放。同时,移动终端的丢失处理系统在此时会拦截调整音量或者关闭报警音的指令,从而保证报警音能够连续正常的播放。Or, by adopting the processing method of playing an alarm sound, a section of alarm sound can be preset in the loss processing system of the mobile terminal. After receiving the processing instruction, the loss processing system of the mobile terminal can start the alarm sound playback function in the background, thereby realizing Playing of the alarm tone. At the same time, the loss processing system of the mobile terminal will intercept the instruction to adjust the volume or turn off the alarm sound at this time, so as to ensure that the alarm sound can be played continuously and normally.
可以理解,目前大多数手机通过sim(SubscriberIdentityModule,客户识别模块)卡来供网络提供商进行身份鉴别等操作。如果手机可以通过其他方式来实现身份鉴别,例如,手机中包含有特殊功能模块,以iphone手机中的imessage来说,其接收外部信息通过与服务器之间的联系就可以实现,根据手机中固定的编号便可以实现身份鉴别和数据交互。又或者,当手机中安装了可以实现即时通信的应用软件时,可以通过应用软件实现信息交互。在这些情况下,可以不用使用sim卡。但是在大部分情况下,手机或者某些其他移动终端需要依靠sim卡才能正常使用,对于此种情况,如果被盗手机或者其他移动终端中的sim卡被更换,便无法接收外部发送的信息,为此,对于装有sim卡的手机或者其他移动终端,本申请还可以采用如下方法。It can be understood that currently most mobile phones use sim (Subscriber Identity Module, customer identification module) cards for network providers to perform identity authentication and other operations. If the mobile phone can realize identity authentication through other methods, for example, the mobile phone contains a special function module, taking the imessage in the iphone mobile phone as an example, it can receive external information through the connection with the server, according to the fixed in the mobile phone The number can realize identity authentication and data interaction. Alternatively, when the mobile phone is installed with application software capable of realizing instant messaging, information interaction can be realized through the application software. In these cases, a sim card can be dispensed with. However, in most cases, mobile phones or some other mobile terminals need to rely on sim cards for normal use. In this case, if the sim card in the stolen mobile phone or other mobile terminals is replaced, it will not be able to receive externally sent information. For this reason, for mobile phones or other mobile terminals equipped with a sim card, the present application can also adopt the following method.
参照图2,示出本申请的移动终端的丢失处理方法实施例二,在实施例一的步骤101之前还包括如下步骤:Referring to Fig. 2, it shows the second embodiment of the mobile terminal loss processing method of the present application, which also includes the following steps before step 101 of the first embodiment:
步骤201,判断移动终端是否更换sim卡,若是,则触发移动终端发送短信给预先设定的安全号码。Step 201, judging whether the mobile terminal has replaced the sim card, and if so, triggering the mobile terminal to send a short message to a preset security number.
移动终端的机主需要预先设定一个备用的安全号码,当移动终端sim卡更换后,移动终端的丢失处理系统会自动触发移动终端内部的短信功能,发送一个短信给预先设定的移动终端号码,那么移动终端机主则可以通过该短信获取到移动终端当前的号码,以便于后续发送短信等操作。可以理解,短信的内容可以按照一定格式预先编好,发送时直接读取即可。The owner of the mobile terminal needs to pre-set a spare security number. When the sim card of the mobile terminal is replaced, the lost processing system of the mobile terminal will automatically trigger the short message function inside the mobile terminal and send a short message to the pre-set mobile terminal number. , then the owner of the mobile terminal can obtain the current number of the mobile terminal through the short message, so as to facilitate subsequent operations such as sending short messages. It can be understood that the content of the short message can be pre-edited according to a certain format, and can be read directly when sending.
其中,判断移动终端是否更换sim卡可以采用如下方式:Wherein, judging whether the mobile terminal replaces the sim card can adopt the following method:
获取当前移动终端中sim卡的识别码;Obtain the identification code of the SIM card in the current mobile terminal;
判断所述识别码与预先设定的识别码是否相同,若是,则确定没有更换,反之,则确定已经更换。It is judged whether the identification code is the same as the preset identification code, if yes, it is determined that it has not been replaced, otherwise, it is determined that it has been replaced.
具体实现时,可以通过移动终端的丢失处理系统在随移动终端操系统启动时,注册一个sim卡插入的消息,然后根据此消息来获取当前移动终端中sim卡的识别码,从而与预先设定的识别码进行比对判断。During specific implementation, the loss processing system of the mobile terminal can register a message that a sim card is inserted when the mobile terminal operating system is started, and then obtain the identification code of the sim card in the current mobile terminal according to this message, so as to be consistent with the preset The identification code is compared and judged.
参照图3,示出本申请的移动终端的丢失处理系统实施例一,包括信息拦截模块10、解析模块20和处理模块30。Referring to FIG. 3 , it shows Embodiment 1 of a loss processing system for a mobile terminal of the present application, including an information interception module 10 , an analysis module 20 and a processing module 30 .
信息拦截模块10,用于启动移动终端的丢失保护,监测移动终端信息服务层的信息接收情况,在信息服务层拦截网络中发送给移动终端的信息。优选地,信息拦截模块10在所述信息被写入移动终端的数据库之前进行拦截。可以理解,信息包括文字短信、语音短信、即时通信信息或邮件等等。优选地,该信息拦截模块包括监测单元,用于监测移动终端信息服务层的信息接收情况,若有新信息,则拦截所述新信息。The information interception module 10 is used to start the loss protection of the mobile terminal, monitor the information receiving situation of the information service layer of the mobile terminal, and intercept the information sent to the mobile terminal in the network at the information service layer. Preferably, the information interception module 10 intercepts the information before it is written into the database of the mobile terminal. It can be understood that the information includes text messages, voice messages, instant messaging messages or emails, and the like. Preferably, the information interception module includes a monitoring unit, which is used to monitor information reception at the information service layer of the mobile terminal, and intercept the new information if there is new information.
解析模块20,用于解析所述信息,判断是否属于丢失处理信息,若是,则触发处理模块30。优选地,解析模块包括内容匹配单元,用于将所述信息内容与预先设定的丢失处理信息匹配比较,若相同,则确定该信息属于丢失处理信息,反之,则不属于。The parsing module 20 is configured to parse the information, determine whether it belongs to lost processing information, and if so, trigger the processing module 30 . Preferably, the parsing module includes a content matching unit, configured to match and compare the information content with the preset loss processing information, and if they are the same, determine that the information belongs to the loss processing information; otherwise, it does not belong.
处理模块30,用于在服务器端的数据库中调用所述丢失处理信息对应的处理指令,根据所述处理指令对移动终端进行处理。优选地,所述处理至少包括以下一种或几种:锁定移动终端、播放报警音、定位移动终端当前位置、删除移动终端内部信息、拦截移动终端操作系统发送的关机指令、拦截移动终端操作系统更改音量和/或关闭报警音的指令。The processing module 30 is configured to call a processing instruction corresponding to the lost processing information in the database of the server, and process the mobile terminal according to the processing instruction. Preferably, the processing includes at least one or more of the following: locking the mobile terminal, playing an alarm sound, locating the current location of the mobile terminal, deleting internal information of the mobile terminal, intercepting the shutdown command sent by the operating system of the mobile terminal, intercepting the operating system of the mobile terminal Instructions to change the volume and/or turn off the alarm sound.
优选地,所述处理模块还包括锁屏单元,用于通过移动终端操作系统提供的接口创建窗口,并将所述窗口作为锁屏界面展示在移动终端显示界面。Preferably, the processing module further includes a lock screen unit, configured to create a window through an interface provided by the operating system of the mobile terminal, and display the window as a lock screen interface on the display interface of the mobile terminal.
参照图4,示出本申请的移动终端的丢失处理系统实施例二,该系统还包括sim卡更换判断模块60,用于判断移动终端是否更换sim卡,若是,则触发移动终端发送短信给预先设定的移动终端号码。其中,sim卡更换判断模块包括识别码获取单元和识别码比较单元。识别码获取单元,用于获取当前移动终端中sim卡的识别码;识别码比较单元,用于判断所述识别码与预先设定的识别码是否相同,若是,则确定没有更换,反之,则确定已经更换。Referring to Fig. 4, it shows embodiment two of the lost processing system of the mobile terminal of the present application, the system also includes a sim card replacement judging module 60 for judging whether the mobile terminal replaces the sim card, if so, triggers the mobile terminal to send a short message to the advance The set mobile terminal number. Wherein, the sim card replacement judging module includes an identification code acquisition unit and an identification code comparison unit. The identification code acquisition unit is used to obtain the identification code of the sim card in the current mobile terminal; the identification code comparison unit is used to judge whether the identification code is the same as the preset identification code, if so, then determine that there is no replacement, otherwise, then Make sure it has been replaced.
本申请的移动终端的丢失处理方法及系统通过在移动终端中安装丢失处理系统,实时对移动终端接收的信息进行分析,并判断是否属于预定的丢失处理信息,再根据判断结果进行处理。整个过程都是在后台运行,并不会影响移动终端正常使用。而且,只有当判断出移动终端接收的信息是丢失处理信息之后,才会进行相应的处理。整个过程中无需用户输入密码等繁琐操作,也无需依赖于是否有摄像头等硬件,从而使整个过程简单方便,且易于实现,可适用范围较大。The mobile terminal loss processing method and system of the present application install a loss processing system in the mobile terminal to analyze the information received by the mobile terminal in real time, and judge whether it belongs to the predetermined loss processing information, and then process according to the judgment result. The whole process is running in the background and will not affect the normal use of the mobile terminal. Moreover, only after it is determined that the information received by the mobile terminal is lost processing information, corresponding processing will be performed. In the whole process, there is no need for users to enter cumbersome operations such as passwords, and there is no need to rely on hardware such as cameras, so that the whole process is simple, convenient, easy to implement, and has a wide range of applications.
进一步地,对于特殊的移动终端,例如iphone来说,针对其特有的结构,采用阻止关机等方式,可以更好的获取到移动终端实时动态信息,从而给找回移动终端提供更多的线索。Further, for special mobile terminals, such as iphone, according to its unique structure, the real-time dynamic information of the mobile terminal can be obtained better by adopting methods such as preventing shutdown, thereby providing more clues for retrieving the mobile terminal.
另外,通过对sim卡是否更换进行实时监测,即使sim卡被更换了,也能够在第一时间获取到更换后的移动终端号码,并发送给移动终端机主,从而便于找回移动终端。In addition, through real-time monitoring of whether the SIM card is replaced, even if the SIM card is replaced, the mobile terminal number after replacement can be obtained at the first time and sent to the mobile terminal owner, thereby facilitating the retrieval of the mobile terminal.
可以理解,本申请的移动终端的丢失处理系统可以安装在移动终端操作系统中,为了适应不同的操作系统,在具体实现时可以根据操作系统的具体结构做出适应性的修改,只要基本思想符合前述描述即可,本申请对此并不限制。It can be understood that the loss processing system of the mobile terminal of the present application can be installed in the operating system of the mobile terminal. In order to adapt to different operating systems, adaptive modifications can be made according to the specific structure of the operating system during the specific implementation, as long as the basic idea conforms to The foregoing description is enough, and the present application does not limit it.
通过以上的实施方式的描述可知,本领域的技术人员可以清楚地了解到本申请可借助软件加必需的通用硬件平台的方式来实现。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品可以存储在存储介质中,如ROM/RAM、磁碟、光盘等,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例或者实施例的某些部分所述的方法。It can be known from the above description of the implementation manners that those skilled in the art can clearly understand that the present application can be implemented by means of software plus a necessary general-purpose hardware platform. Based on this understanding, the essence of the technical solution of this application or the part that contributes to the prior art can be embodied in the form of software products, and the computer software products can be stored in storage media, such as ROM/RAM, disk , CD, etc., including several instructions to make a computer device (which may be a personal computer, server, or network device, etc.) execute the methods described in various embodiments or some parts of the embodiments of the present application.
本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于装置或系统实施例而言,由于其基本相似于方法实施例,所以描述得比较简单,相关之处参见方法实施例的部分说明即可。以上所描述的装置及系统实施例仅仅是示意性的,其中所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本实施例方案的目的。本领域普通技术人员在不付出创造性劳动的情况下,即可以理解并实施。Each embodiment in this specification is described in a progressive manner, the same and similar parts of each embodiment can be referred to each other, and each embodiment focuses on the differences from other embodiments. In particular, for the device or system embodiments, since they are basically similar to the method embodiments, the description is relatively simple, and for relevant parts, please refer to part of the description of the method embodiments. The device and system embodiments described above are only illustrative, and the units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, It can be located in one place, or it can be distributed to multiple network elements. Part or all of the modules can be selected according to actual needs to achieve the purpose of the solution of this embodiment. It can be understood and implemented by those skilled in the art without creative effort.
以上对本申请所提供的移动终端的丢失处理方法及系统进行了详细介绍,本文中应用了具体个例对本申请的原理及实施方式进行了阐述,以上实施例的说明只是用于帮助理解本申请的方法及其核心思想;同时,对于本领域的一般技术人员,依据本申请的思想,在具体实施方式及应用范围上均会有改变之处,综上所述,本说明书内容不应理解为对本申请的限制。The method and system for handling the loss of mobile terminals provided by this application have been introduced in detail above. In this paper, specific examples are used to illustrate the principle and implementation of this application. The description of the above embodiments is only used to help understand the application. method and its core idea; at the same time, for those of ordinary skill in the art, according to the idea of this application, there will be changes in the specific implementation and application scope. Application Restrictions.
Claims (16)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201210206530.2A CN102739868B (en) | 2012-06-18 | 2012-06-18 | Method and system for handling loss of mobile terminal |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201210206530.2A CN102739868B (en) | 2012-06-18 | 2012-06-18 | Method and system for handling loss of mobile terminal |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN102739868A CN102739868A (en) | 2012-10-17 |
| CN102739868B true CN102739868B (en) | 2016-07-13 |
Family
ID=46994625
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201210206530.2A Active - Reinstated CN102739868B (en) | 2012-06-18 | 2012-06-18 | Method and system for handling loss of mobile terminal |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN102739868B (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10104063B2 (en) | 2013-11-15 | 2018-10-16 | Beijing Qihoo Technology Company Limited | Android-based mobile equipment security protection method, and device |
Families Citing this family (23)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103024160A (en) * | 2012-11-30 | 2013-04-03 | 北京网秦天下科技有限公司 | Mobile terminal locking method and mobile terminal |
| CN103457991B (en) * | 2013-05-29 | 2017-03-15 | 北京奇虎科技有限公司 | A kind of terminal safety protection method and system |
| CN103702317B (en) * | 2013-12-13 | 2017-11-10 | 北京奇虎科技有限公司 | Anti-theft method for mobile terminal and client |
| CN103702299A (en) * | 2013-12-13 | 2014-04-02 | 北京奇虎科技有限公司 | Mobile terminal antitheft method and client |
| CN103619002A (en) * | 2013-12-16 | 2014-03-05 | 北京百纳威尔科技有限公司 | Remote safety protection method of mobile phone |
| CN104954534B (en) | 2014-03-24 | 2019-03-15 | 腾讯科技(深圳)有限公司 | Control method, device and the corresponding communication terminal of communication terminal |
| CN105307135A (en) * | 2014-07-24 | 2016-02-03 | 芯讯通无线科技(上海)有限公司 | Mobile terminal and information protection method thereof |
| CN104239805B (en) * | 2014-08-29 | 2018-01-19 | 广东欧珀移动通信有限公司 | A kind of anti-theft method of mobile phone and device |
| US20160088146A1 (en) * | 2014-09-23 | 2016-03-24 | Mcafee, Inc. | Device lock while in motion |
| CN104298927B (en) * | 2014-09-24 | 2018-04-27 | 青岛海信移动通信技术股份有限公司 | A kind of terminal anti-theft method and terminal |
| CN104349306A (en) * | 2014-10-31 | 2015-02-11 | 北京奇虎科技有限公司 | Method and device for preventing mail from being lost |
| CN106470268A (en) * | 2015-08-20 | 2017-03-01 | 腾讯科技(深圳)有限公司 | A kind of method and apparatus of antitheft mobile phone |
| CN105138925B (en) * | 2015-09-25 | 2019-03-29 | 联想(北京)有限公司 | A kind of information processing method and electronic equipment |
| CN105721569A (en) * | 2016-02-03 | 2016-06-29 | 青岛海信移动通信技术股份有限公司 | Method, device and system for controlling mobile terminal |
| CN105825156B (en) * | 2016-03-21 | 2018-03-23 | 广东欧珀移动通信有限公司 | Anti-theft processing method and device and terminal equipment |
| CN106330884A (en) * | 2016-08-19 | 2017-01-11 | 浪潮集团有限公司 | A security management method for realizing alarm, locking and data destruction |
| CN106713638B (en) * | 2016-12-26 | 2021-05-28 | 上海传英信息技术有限公司 | Control system based on intelligent terminal |
| CN106611500A (en) * | 2017-02-20 | 2017-05-03 | 郑州云海信息技术有限公司 | Violation evidence taking and punishing device and method and violation management system |
| WO2019113928A1 (en) | 2017-12-15 | 2019-06-20 | Orange | Anti-theft mobile terminal and method for controlling the extraction of memory card out from mobile terminal |
| CN109067962A (en) * | 2018-05-29 | 2018-12-21 | 江西午诺科技有限公司 | A kind of unlocking method, device, readable storage medium storing program for executing and mobile terminal |
| CN109714465A (en) * | 2019-03-18 | 2019-05-03 | 深圳市道格恒通科技有限公司 | A kind of intelligent mobile phone anti-theft method and system |
| CN112653998B (en) * | 2021-01-07 | 2023-11-03 | 深圳市广和通无线股份有限公司 | Terminal equipment loss positioning method, terminal equipment and storage medium |
| CN112866986A (en) * | 2021-03-16 | 2021-05-28 | 北京小米移动软件有限公司 | Data protection method, device, server and storage medium |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1859677A (en) * | 2006-03-15 | 2006-11-08 | 华为技术有限公司 | Method for protecting information safety in mobile terminal |
| CN101640722A (en) * | 2009-05-19 | 2010-02-03 | 上海闻泰电子科技有限公司 | Mobile phone with safety protection function and safety protection method thereof |
| CN101772017A (en) * | 2009-01-06 | 2010-07-07 | 三星电子(中国)研发中心 | Method for remotely destroying information of communication terminal and communication terminal thereof |
| CN102378411A (en) * | 2010-08-26 | 2012-03-14 | 乐金电子(中国)研究开发中心有限公司 | Method for realizing retrieving function based on mobile terminal and mobile terminal |
Family Cites Families (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TWI271992B (en) * | 2004-07-28 | 2007-01-21 | Mediatek Inc | Mobile communication apparatus having anti-theft and auto-notification functions and method of operating the same |
| ES2370497T3 (en) * | 2005-07-07 | 2011-12-19 | Research In Motion Limited | CASE FOR A PORTABLE DEVICE AND RELATED METHODS. |
-
2012
- 2012-06-18 CN CN201210206530.2A patent/CN102739868B/en active Active - Reinstated
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1859677A (en) * | 2006-03-15 | 2006-11-08 | 华为技术有限公司 | Method for protecting information safety in mobile terminal |
| CN101772017A (en) * | 2009-01-06 | 2010-07-07 | 三星电子(中国)研发中心 | Method for remotely destroying information of communication terminal and communication terminal thereof |
| CN101640722A (en) * | 2009-05-19 | 2010-02-03 | 上海闻泰电子科技有限公司 | Mobile phone with safety protection function and safety protection method thereof |
| CN102378411A (en) * | 2010-08-26 | 2012-03-14 | 乐金电子(中国)研究开发中心有限公司 | Method for realizing retrieving function based on mobile terminal and mobile terminal |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10104063B2 (en) | 2013-11-15 | 2018-10-16 | Beijing Qihoo Technology Company Limited | Android-based mobile equipment security protection method, and device |
Also Published As
| Publication number | Publication date |
|---|---|
| CN102739868A (en) | 2012-10-17 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN102739868B (en) | Method and system for handling loss of mobile terminal | |
| US10318716B2 (en) | Systems and methods for identifying unauthorized users of an electronic device | |
| CN104468611B (en) | The data safety processing method and device switched based on dual system | |
| US8583082B2 (en) | System and method for tracking stolen communication terminal, and communication terminal | |
| CN105389507B (en) | The method and device of monitoring system partitioned file | |
| CN103581441B (en) | Mobile terminal tracking and anti-theft system and method | |
| US20090183266A1 (en) | Method and a system for recovering a lost or stolen electronic device | |
| CN102196021A (en) | Method and system for remote data removal, server and mobile device | |
| CN102780813A (en) | Mobile terminal-based alarm method and system | |
| JP2015507894A (en) | Anti-theft protection method and device for mobile phone | |
| CN105592146A (en) | Equipment control method, device and terminal | |
| CN100420324C (en) | A method for protecting information security in a mobile terminal | |
| CN102411684A (en) | Data protection method and device | |
| CN104967593A (en) | Identity verification method, apparatus and system | |
| CN107609407A (en) | Method and device for protecting information security in user terminal | |
| WO2016131362A1 (en) | Voiceprint-recognition-based security protection method and device | |
| CN101656966A (en) | Data protection method of mobile terminal, device thereof and mobile terminal | |
| CN113810535B (en) | Information processing method and electronic device | |
| CN106791171B (en) | Card locking method and device of mobile terminal and mobile terminal | |
| CN103067556A (en) | Handling method, terminal and system of privacy information | |
| CN106874795B (en) | Mobile terminal and machine disassembly prevention method and device thereof | |
| CN105827739B (en) | Contact person information synchronization method, device, server and system | |
| CN1980459A (en) | Method for realizing information destroying at network side | |
| CN106357671A (en) | Method and device for verifying login | |
| CN106101248A (en) | By external equipment detection terminal unit is harassed the method and system of communication service |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| ASS | Succession or assignment of patent right |
Owner name: QIZHI SOFTWARE (BEIJING) CO., LTD. Effective date: 20121026 Owner name: BEIJING QIHU TECHNOLOGY CO., LTD. Free format text: FORMER OWNER: QIZHI SOFTWARE (BEIJING) CO., LTD. Effective date: 20121026 |
|
| C41 | Transfer of patent application or patent right or utility model | ||
| COR | Change of bibliographic data |
Free format text: CORRECT: ADDRESS; FROM: 100016 CHAOYANG, BEIJING TO: 100088 XICHENG, BEIJING |
|
| TA01 | Transfer of patent application right |
Effective date of registration: 20121026 Address after: 100088 Beijing city Xicheng District xinjiekouwai Street 28, block D room 112 (Desheng Park) Applicant after: BEIJING QIHOO TECHNOLOGY Co.,Ltd. Applicant after: Qizhi software (Beijing) Co.,Ltd. Address before: The 4 layer 100016 unit of Beijing city Chaoyang District Jiuxianqiao Road No. 14 Building C Applicant before: Qizhi software (Beijing) Co.,Ltd. |
|
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| C14 | Grant of patent or utility model | ||
| GR01 | Patent grant | ||
| CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20160713 Termination date: 20190618 |
|
| CF01 | Termination of patent right due to non-payment of annual fee | ||
| RR01 | Reinstatement of patent right |
Former decision: termination of patent right due to unpaid annual fee Former decision publication date: 20200623 |
|
| RR01 | Reinstatement of patent right | ||
| TR01 | Transfer of patent right | ||
| TR01 | Transfer of patent right |
Effective date of registration: 20220819 Address after: No. 9-3-401, No. 39, Gaoxin 6th Road, Binhai Science and Technology Park, High-tech Zone, Binhai New District, Tianjin 300000 Patentee after: 3600 Technology Group Co.,Ltd. Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park) Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd. Patentee before: Qizhi software (Beijing) Co.,Ltd. |