CN104486745A - Mobile terminal anti-theft tracking device - Google Patents
Mobile terminal anti-theft tracking device Download PDFInfo
- Publication number
- CN104486745A CN104486745A CN201410658438.9A CN201410658438A CN104486745A CN 104486745 A CN104486745 A CN 104486745A CN 201410658438 A CN201410658438 A CN 201410658438A CN 104486745 A CN104486745 A CN 104486745A
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- server
- information
- antitheft
- instruction
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/02—Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
- H04W8/08—Mobility data transfer
- H04W8/16—Mobility data transfer selectively restricting mobility data tracking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/22—Processing or transfer of terminal data, e.g. status or physical capabilities
- H04W8/24—Transfer of terminal data
Landscapes
- Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephonic Communication Services (AREA)
Abstract
The embodiment of the invention discloses a mobile terminal anti-theft tracking device. The mobile terminal anti-theft tracking device comprises a transmitting unit for transmitting a predetermined anti-theft operation instruction in an anti-theft tracking system to a mobile terminal according to the unique identification information of the mobile terminal, an indicating unit for indicating the mobile terminal to feed back the tracking information according to the anti-theft operation instruction and a tracking unit for tracking the mobile terminal according to the tracking information. By utilizing the embodiment, the mobile terminal can be locked by the unique identification information, the operation success rate of the anti-theft tracking system is improved, the protection function of anti-theft operation is enhanced, and a lost mobile terminal of a user is conveniently found.
Description
Technical field
The present invention relates to the communications field, particularly relate to a kind of guarding against theft for mobile terminal follow-up mechanism.
Background technology
Along with the development of science and technology, mobile phone is more and more universal, simultaneously, function also from strength to strength, mobile phone develops the electronic portable device becoming a kind of integrated multifunction from a kind of simple means of communication, like this, the loss of mobile phone or stolenly become very usual something, can bring certain economic loss and the danger of privacy leakage like this.
At present, the technology of antitheft mobile phone mainly comprises following two classes: 1, utilize and change card operation judgement hand-set from stolen, obtain mobile phone geographical location information, changing card is plant thing comparatively frequently, thus causes this mode misoperation probability high; 2, utilize Accounting system in mobile phone to carry out antitheft information capture, this mode is after mobile phone carries out factory reset or format manipulation, and its accounts information is difficult to retain, once accounts information is lost, just cannot realize following the trail of.
Summary of the invention
Embodiments provide a kind of guarding against theft for mobile terminal follow-up mechanism, by unique identifying information, mobile terminal is followed the trail of, improve the success rate that mobile terminal is followed the trail of, long-term tracking can be realized.
Embodiment of the present invention first aspect provides a kind of server, and described server comprises:
Transmitting element, for being sent to described mobile terminal according to unique identification information by the antitheft operational order preset in anti-theft tracking system;
Indicating member, is used to indicate described mobile terminal and feeds back its tracked information according to described antitheft operational order;
Tracing unit, for following the trail of described mobile terminal according to described tracked information.
Embodiment of the present invention second aspect provides a kind of mobile terminal, and described mobile terminal comprises:
Receiving element, for the antitheft operational order preset in the anti-theft tracking system that reception server sends;
Feedback unit, for the described antitheft operational order that receives according to described receiving element to described server feedback tracked information, follows the trail of described mobile terminal according to described tracked information to make described server.
The antitheft operational order preset in anti-theft tracking system is sent to described mobile terminal according to the unique identification information of mobile terminal by the embodiment of the present invention, indicate described mobile terminal to feed back its tracked information according to described antitheft operational order, according to described tracked information, described mobile terminal is followed the trail of.The embodiment of the present invention can be locked mobile terminal by unique identifying information, improves anti-theft tracking Dynamic System success rate, enhances the defencive function of antitheft operation, is more conducive to the mobile terminal that user gives loss for change.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, be briefly described to the accompanying drawing used required in embodiment, description below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
First embodiment schematic flow sheet of a kind of guarding against theft for mobile terminal method for tracing that Fig. 1 provides for the embodiment of the present invention;
Second embodiment schematic flow sheet of a kind of guarding against theft for mobile terminal follow-up mechanism that Fig. 2 provides for the embodiment of the present invention;
The example structure schematic diagram of a kind of server that Fig. 3 provides for the embodiment of the present invention;
The example structure schematic diagram of a kind of mobile terminal that Fig. 4 provides for the embodiment of the present invention;
The example structure schematic diagram of a kind of guarding against theft for mobile terminal follow-up mechanism that Fig. 5 provides for the embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
In specific implementation, in the embodiment of the present invention, mobile terminal can include but not limited to: notebook computer, mobile phone, panel computer, intelligent wearable device etc.The system of mobile terminal refers to the operating system of terminal, can include but not limited to: android system, Saipan system, Windows system, IOS (Mobile operating system of Apple's exploitation) system etc.It should be noted that, Android mobile terminal refers to the mobile terminal of android system, and Saipan mobile terminal refers to the mobile terminal of Saipan system, etc.Above-mentioned mobile terminal is only citing, and non exhaustive, including but not limited to above-mentioned terminal.
Below will for mobile phone, the guarding against theft for mobile terminal method for tracing that composition graphs 1 to Fig. 5 provides the embodiment of the present invention and device are specifically described.
Refer to Fig. 1, Fig. 1 is the first embodiment schematic flow sheet of the guarding against theft for mobile terminal method for tracing that the embodiment of the present invention provides.Guarding against theft for mobile terminal method for tracing described in the present embodiment, comprises step:
S101, according to the unique identification information of mobile terminal, the antitheft operational order preset in anti-theft tracking system is sent to described mobile terminal, indicates described mobile terminal to feed back its tracked information according to described antitheft operational order.
In specific implementation, the guarding against theft for mobile terminal method for tracing described in the embodiment of the present invention can by mobile phone, or the appointed function module of embedded in mobile phone, or the terminal equipment of outer handset performs, and does not limit at this.Below the terminal equipment for outer handset is specifically described, this terminal equipment can be communicated by mobile phone, also can communicate with server, can in conjunction with the anti-theft tracking of server realization to mobile phone, such as between mobile phone and server, carry out with mobile phone and server the server that communicates.
Particularly, server, by the login interface of anti-theft tracking system, obtains the unique identification information of mobile terminal at this login interface.Wherein, the unique identification information of above-mentioned mobile terminal can have been inputted by user, and input mode comprises: by modes etc. such as key-press input, touch-screen input, pointer inputs.The account that unique identification information specifically can be mobile device international identity code (International Mobile Equipment Identity, IMEI) or associates with IMEI.Alternatively, before first use mobile terminal or mobile terminal are not lost, user arranges unique identification information at server or mobile terminal.Alternatively, unique identification information can be the IMEI number of mobile terminal, corresponding encrypted message can be set while IMEI number is set, like this after mobile terminal returns to Default Value or format, when there being network, still can mutual by with server, detect that this mobile terminal has had the Accounting system that mates and do not needed to repeat to arrange, reach and only need arrange once, and this burglary-resisting system keeps anti-theft state always.Further, because IMEI is longer, comprise 15 characters, be difficult to memory, unique identification information can be the account associated with IMEI, i.e. secondary account.Secondary account can arrange by user the account being convenient to remember, and the password that the password of secondary account can arrange the IMEI number associated with it is identical, also can be arranged in addition by client, secondary account is saved to server simultaneously.The mode of unique identification information is specifically set alternatively, secondary account information interface input IMEI number information being set or associating with IMEI number of server log anti-theft tracking system, and encrypted message is set, short-message verification information can be sent to mobile terminal simultaneously, continue the short-message verification information that the reception of interface input mobile terminal is set in server log anti-theft tracking system; Or mobile terminal logs in the secondary account information arranging interface input IMEI number information or associate with IMEI number of anti-theft tracking system, and encrypted message is set, association request can be sent to server simultaneously, server sends short-message verification information to mobile terminal, continues the short-message verification information arranging the reception of interface input mobile terminal logging in anti-theft tracking system at mobile terminal.By unique identification information, set up associating between server with mobile terminal.
In specific implementation, the anti-theft tracking instruction preset comprises: instruction, image watermarking instruction or application lock instruction etc. are eliminated in anti-theft tracking instruction, data.Server presets corresponding antitheft operational order, the instruction these set is pushed to mobile terminal, mobile terminal performs corresponding antitheft action according to these antitheft operational orders, and mobile terminal is to server feedback tracked information simultaneously, with the message making user get mobile terminal.
If the antitheft operational order preset is anti-theft tracking instruction, described mobile terminal is indicated to feed back its tracked information by anti-theft tracking instruction, wherein, tracked information comprises: SIM card information, audio/video information or associated person information etc. after geographical location information, replacing.The geographical location information of its position can be recorded by mobile terminal, and continuous positioning, timed sending is to server, and server is analyzed these locating information, marks the activity diagram in resource-user cost method region.Whether mobile terminal can also change SIM card information to it is detected, when it has changed SIM card, SIM card information after replacing can be fed back to server, meanwhile, also the associated person information stored in the SIM card after replacing can be fed back to server, public security organ can be followed the trail of by the information of SIM card, at present, great majority card is all system of real name, according to the SIM card of system of real name, is more conducive to the mobile terminal that public security organ recovers loss.If mobile terminal employs camera, the information feed back that camera can also be captured is to server.If post-positioned pick-up head, the scene information in the pictorial information obtained is analyzed, is analyzed the building in concrete scene, scenery etc., matched geographical position and other clues that photo Scene may occur.If front-facing camera, then obtain the portrait information of user possibly, the crime analysis or the lost article that may be used for public security organ recover work, the video information got can also be sent to server by camera.Alternatively, mobile terminal can also open listen mode, opens listen mode by anti-theft tracking instruction to mobile terminal, after mobile terminal is lost, is recorded by the telephone communication of user, is compressed into audio file, be sent to server.
S102, according to described tracked information, described mobile terminal to be followed the trail of.
Particularly, tracked information can be fed back to server by mobile terminal, then is analyzed these tracked information by server.When mobile terminal has network, user can carry out real-time tracing to the service condition of mobile terminal.
The antitheft operational order preset in anti-theft tracking system is sent to described mobile terminal by the unique identification information according to mobile terminal by the embodiment of the present invention, indicate described mobile terminal to feed back its tracked information according to described antitheft operational order, according to described tracked information, described mobile terminal is followed the trail of.The embodiment of the present invention can be locked mobile terminal by unique identifying information, improves the successful probability of anti-theft tracking Dynamic System, enhances the defencive function of antitheft operation, is more conducive to the mobile terminal that user gives loss for change.
As a kind of possible execution mode, the antitheft operational order preset being sent to mobile terminal in S101 step can be data and eliminates instruction, eliminate instruction indicating mobile terminal Backup Data by data and eliminate the data eliminated described in instruction, and indicating mobile terminal deletes the data that data elimination instruction will be eliminated.Corresponding privacy information is had in everyone mobile terminal, as contact person, message registration, photo, QQ, micro-letter, microblogging, Alipay etc., eliminate instruction by data and selectivity elimination is carried out to the data of mobile terminal, mobile terminal first can back up corresponding data to server, so that mobile terminal carries out date restoring after finding.As functions such as the contact persons in mobile terminal, when being provided with " deletion address list ", alternatively, data are eliminated instruction and are pushed to mobile terminal by server, indicating mobile terminal obtains the list of application of application function, server returns the list of application of the application function of mobile terminal, user needs the function carrying out hiding from the reality interface input of server, setting as selected is " address list ", the setting of selection is sent to mobile terminal by server, indicating mobile terminal carries out data elimination to address list application function, before the data of mobile terminal are eliminated, server can point out user the need of backup, after user determines backup, first server is saved to the data of address list application function, then the address book data of indicating mobile terminal to its inside is eliminated, the data removed can comprise message registration, the contact person of mobile terminal, contact person etc. in SIM card.Further alternatively, when being provided with " deletion address list ", mobile terminal, according to command prompt, searches the address list of its inside, is first backed up by the address list of its inside, and then is eliminated from mobile terminal by this address list.Further, if user needs data mobile terminal being recovered to elimination after giving mobile terminal for change, then only need to eliminate instruction in Servers installed data, further alternatively, server display interface there will be the list of application of the function eliminated or the application function occurring mobile terminal, the function that this list of application comprises elimination and the application function do not eliminated, user can select the application function eliminated, after determination operation, just the application function of backup can be sent to mobile terminal, user just can to again getting the data eliminated in the past.Data eliminate instruction at the privacy information to a certain degree protecting user the most fast.
Further alternatively, the antitheft operational order preset being sent to mobile terminal in S101 step can be image watermarking instruction, hides by image watermarking instruction indicating mobile terminal hiding data the data that instruction will hide.The data of mobile terminal to wherein outbalance can arrange hiding.As functions such as the quick payments in mobile terminal, when being provided with image watermarking instruction, image watermarking instruction is pushed to mobile terminal by server, indicating mobile terminal obtains the list of application of application function, server returns the list of application of the application function of mobile terminal, user needs the function carrying out hiding from the reality interface input of server, setting as selected is " Alipay ", the setting of selection is sent to mobile terminal by server, indicating mobile terminal locks Alipay application function, and such user just cannot use Alipay function.Further, if user needs to recover hiding data to mobile terminal after giving mobile terminal for change, then only need in the instruction of Servers installed image watermarking, further alternatively, the display interface that server connects there will be the list of application of the function hidden or the application function occurring mobile terminal, this list of application comprises hiding function and the application function do not hidden, user can select the application function hidden, after determination operation, just hiding application function can be recovered, user just can apply the application function hidden in the past again.
Further alternatively, the antitheft operational order preset being sent to mobile terminal in S101 step can be application lock instruction, the application function that will be locked by application lock instruction indicating mobile terminal locking application lock instruction.Particularly, when application lock instruction is set, the feature list of function in mobile terminal can be got, such as, the function that general mobile terminal is conventional, contact person, note, microblogging, QQ, everybody, the function such as beautiful group, Alipay, bank client payment system, 12306 ticket-booking systems, photo, video, daily record, user can select these functions at server, and the function of the needs locking selected just constitutes the application function applied and pre-set in lock instruction.Further possibly, user is when Servers installed application lock instruction, the display interface that server connects can show conventional locking to list, as the information such as " mobile terminal contact person ", " note ", " message registration ", " picture ", " audio frequency and video ", " daily record ", and indicating mobile terminal is not needed to obtain its application function.The application function that its inside comprises is found according to application lock instruction indicating mobile terminal, then, the application function searched out is mated with the application function in list of application, obtains applying in the application function of mobile terminal the application function that the application function in the list of application of lock instruction matches.To unlock the application function locked in mobile terminal, then only need to arrange application lock instruction, further alternatively, display interface there will be the list of application of the application function locked or the application function occurring mobile terminal, this list of application comprises the function of locking and the application function of non-locking, user only needs the application function to having locked to select, after determination operation, just can recover the application function locked, user just can apply the application function of locking in the past again.
Refer to Fig. 2, the second embodiment schematic flow sheet of a kind of guarding against theft for mobile terminal method for tracing that Fig. 2 provides for the embodiment of the present invention.The guarding against theft for mobile terminal method for tracing of the embodiment of the present invention, comprises step:
The antitheft operational order preset in the anti-theft tracking system that S201, reception server send.
Particularly, mobile terminal receives the antitheft operational order preset in anti-theft tracking system, and completes corresponding operation according to this antitheft operational order indicating mobile terminal.Anti-theft tracking system accessible site, in the operating system of mobile terminal, is also installed by client-side program.If the anti-theft tracking system integration, in the operating system of mobile terminal, just cannot unload.
S202, according to described antitheft operational order to server feedback tracked information, described mobile terminal is followed the trail of according to described tracked information to make described server.
Particularly, when mobile terminal completes corresponding antitheft action according to antitheft operational order, tracked information is fed back to server.As when mobile terminal opens camera, the number information of its inner SIM card embedded is fed back to server by mobile terminal.
The antitheft operational order preset in the anti-theft tracking system that the embodiment of the present invention is sent by reception server, according to described antitheft operational order to server feedback tracked information, described mobile terminal is followed the trail of according to described tracked information to make described server.The embodiment of the present invention can be locked mobile terminal by unique identifying information, improves the successful probability of anti-theft tracking Dynamic System, enhances the defencive function of antitheft operation, is more conducive to the mobile terminal that user gives loss for change.
See Fig. 3, it is the example structure schematic diagram of a kind of server that the embodiment of the present invention provides.Server described in the present embodiment, comprising:
Setting unit 301, for setting unit, if for user input be mobile device international identity code IMEI, mobile device international identity code IMEI is set to unique identification information.
In specific implementation, the guarding against theft for mobile terminal method for tracing described in the embodiment of the present invention can by mobile phone, or the appointed function module of embedded in mobile phone, or the terminal equipment of outer handset performs, and does not limit at this.Below the terminal equipment for outer handset is specifically described, this terminal equipment can be communicated by mobile phone, also can communicate with server, can in conjunction with the anti-theft tracking of server realization to mobile phone, such as between mobile phone and server, carry out with mobile phone and server the server that communicates.
Particularly, the unique identification information account that is mobile device international identity code IMEI or associates with mobile device international identity code IMEI.Alternatively, use before mobile terminal or mobile terminal do not lose first, user when using mobile terminal, setting unit 301, if for user's input is mobile device international identity code IMEI, mobile device international identity code IMEI is set to unique identification information.Alternatively, unique identification information can be the IMEI number of mobile terminal, corresponding encrypted message can be set while IMEI number is set, like this after mobile terminal returns to Default Value or format, when there being network, still can mutual by with server, detect that this mobile terminal has had the Accounting system that mates and do not needed to repeat to arrange, reach and only need arrange once, and this burglary-resisting system keeps anti-theft state always.Further, because IMEI number is longer, be difficult to memory, unique identification information can be the account associated with mobile device international identity code IMEI, i.e. secondary account.Secondary account can arrange by user the account being convenient to remember, and the password that the password of secondary account can arrange the IMEI number associated with it is identical, also can be arranged in addition by client and secondary account is saved to server simultaneously.The mode of unique identification information is specifically set alternatively, secondary account information interface input IMEI number information being set or associating with IMEI number of server log anti-theft tracking system, and encrypted message is set, short-message verification information can be sent to mobile terminal simultaneously, continue the short-message verification information that the reception of interface input mobile terminal is set in server log anti-theft tracking system; Or mobile terminal logs in the secondary account information arranging interface input IMEI number information or associate with IMEI number of anti-theft tracking system, and encrypted message is set, association request can be sent to server simultaneously, server sends short-message verification information to mobile terminal, continues the short-message verification information arranging the reception of interface input mobile terminal logging in anti-theft tracking system at mobile terminal.By unique identification information, set up associating between server with mobile terminal.
Further alternatively, if setting unit 301 also specifically for user input be the account associated with described mobile device international identity code IMEI time, the account associated with described mobile device international identity code IMEI is set to unique identification information, preserves described unique identification information simultaneously.
Transmitting element 302, for being sent to described mobile terminal according to unique identification information by the antitheft operational order preset in anti-theft tracking system.
In specific implementation, server at the login interface of anti-theft tracking system, can obtain the unique identification information of mobile terminal at this login interface.The mode obtaining unique identification information can comprise: user is inputted from login interface by modes such as key-press input, touch-screen input, pointer inputs.Server by display interface get be mobile device international identity code IMEI time, as long as input correct password, that just can set up between server and mobile terminal is mutual.
Particularly, the anti-theft tracking instruction preset comprises: at least one in instruction, image watermarking instruction or application lock instruction is eliminated in anti-theft tracking instruction, data.Corresponding antitheft operational order is set, the instruction that these are set by server by transmitting element 302 is pushed to mobile terminal, mobile terminal performs corresponding antitheft action, simultaneously to server feedback tracked information, with the message making user get mobile terminal according to these antitheft operational orders.
Indicating member 303, is used to indicate described mobile terminal and feeds back its tracked information according to described antitheft operational order.
Particularly, indicating member 303 indicates mobile terminal according to antitheft operational order, according to this indication information, mobile terminal implements corresponding operating, and to its tracked information of server feedback, what now arrange be antitheft operational order is anti-theft tracking instruction, and indicating member 303 indicates described mobile terminal to feed back its tracked information by anti-theft tracking instruction, wherein, tracked information comprises: at least one in SIM card information, audio/video information or associated person information after geographical location information, replacing.The geographical location information of its position can be recorded by mobile terminal, and continuous positioning, timed sending is to server, and server is analyzed these locating information, marks the activity diagram in resource-user cost method region.Whether mobile terminal can also change SIM card information to it is detected, and when it has changed SIM card, the SIM card information after replacing can be fed back to server, meanwhile, also the associated person information stored in the SIM card after replacing can be fed back to server.If mobile terminal employs camera, the information that camera can also be captured, feed back to server, if post-positioned pick-up head, scene information in the pictorial information obtained is analyzed, analyze the building in concrete scene, scenery etc., match geographical position and other clues that photo Scene may occur, if front-facing camera, then obtain the portrait information of user possibly, the crime analysis or the lost article that may be used for public security organ recover work, the video information got can also be sent to server by camera.Alternatively, mobile terminal can also open listen mode, opens listen mode by anti-theft tracking instruction to mobile terminal, after mobile terminal is lost, is recorded by the telephone communication of user, is compressed into audio file, be sent to server.
Tracing unit 304, for following the trail of described mobile terminal according to described tracked information.
Particularly, tracked information can be fed back to server by mobile terminal, then is analyzed these tracked information by server.When mobile terminal has network, user can carry out real-time tracing by this device to the service condition of mobile terminal.
The embodiment of the present invention is by setting unit 301, and what user inputted is that mobile device international identity code IMEI or the account that associates with described mobile device international identity code IMEI are set to unique identification information.The antitheft operational order preset in anti-theft tracking system is sent to described mobile terminal according to unique identification information by transmitting element 302; indicating member 303 indicating mobile terminal feeds back its tracked information according to antitheft operational order; tracing unit 304; according to this tracked information, mobile terminal is followed the trail of; the embodiment of the present invention can be locked mobile terminal by unique identifying information; improve the successful probability of anti-theft tracking Dynamic System; enhance the defencive function of antitheft operation, be more conducive to the mobile terminal that user gives loss for change.
As a kind of possible execution mode, when transmitting element 302 sends to the antitheft operational order of mobile terminal to be data elimination instruction, indicating member 303 also eliminates specifically for indicating described mobile terminal to back up described data the data eliminated described in instruction, and indicates described mobile terminal to delete described data to eliminate the data that instruction will eliminate.Further alternatively, above-mentioned antitheft operational order can be data and eliminates instruction, indicating member 303 is eliminated instruction indicating mobile terminal Backup Data by data and is eliminated the data eliminated described in instruction, and indicating mobile terminal deletes the data that data elimination instruction will be eliminated.Corresponding privacy information is had in everyone mobile terminal, as contact person, message registration, photo, QQ, micro-letter, microblogging etc., eliminate instruction by the data arranged and selectivity elimination is carried out to the data of mobile terminal, mobile terminal first can back up corresponding data to server end, so that mobile terminal carries out date restoring after finding.When being provided with " deletion address list ", mobile terminal, according to command prompt, searches the address list of its inside, is first backed up by the address list of its inside, and then is eliminated from mobile terminal by this address list.Further, if user needs data mobile terminal being recovered to elimination after giving mobile terminal for change, then only need to eliminate instruction by Servers installed data, further alternatively, the display interface that server connects there will be the list of application of the function eliminated or the application function occurring mobile terminal, the function that this list of application comprises elimination and the application function do not eliminated, user only needs the application function to having eliminated to select, after determination operation, just the application function of backup can be sent to mobile terminal, user just can to again getting the data eliminated in the past.Data eliminate instruction at the privacy information to a certain degree protecting user the most fast.
As a kind of possible execution mode, when transmitting element 302 sends to the antitheft operational order of mobile terminal to be image watermarking instruction, indicating member 303 is also specifically for hiding the data that instruction will be hidden by image watermarking instruction indicating mobile terminal hiding data.The data of mobile terminal to wherein outbalance can arrange hiding.As functions such as the quick payments in mobile terminal, when being provided with image watermarking instruction, image watermarking instruction is pushed to mobile terminal by server, indicating mobile terminal obtains the list of application of application function, server returns the list of application of the application function of mobile terminal, user needs the function carrying out hiding from the display interface input that server connects, setting as selected is " Alipay ", the setting of selection is sent to mobile terminal by server, indicating mobile terminal locks Alipay application function, and such user just cannot use Alipay function.Further, if user needs to recover hiding data to mobile terminal after giving mobile terminal for change, then only need in the instruction of Servers installed image watermarking, further alternatively, display interface there will be the list of application of the function hidden or the application function occurring mobile terminal, this list of application comprises hiding function and the application function do not hidden, user only needs the application function to hiding to select, after determination operation, just can recover hiding application function, user just can apply the application function hidden in the past again.
As a kind of possible execution mode, when transmitting element 302 sends to the antitheft operational order of mobile terminal for application lock instruction, indicating member 303 also locks the application function applied lock instruction and will lock specifically for indicating mobile terminal.Particularly, when user arranges application lock instruction, the feature list of function in mobile terminal can be got, such as, the function that general mobile terminal is conventional, contact person, note, microblogging, QQ, everybody, the function such as beautiful group, Alipay, bank client payment system, 12306 ticket-booking systems, photo, video, daily record, user can select these functions, and the function of the needs locking selected just constitutes the application function applied and pre-set in lock instruction.Further possibly, when user arranges application lock instruction, the locking application function list that direct acquisition is conventional, as the information such as " mobile terminal contact person ", " note ", " message registration ", " picture ", " audio frequency and video ", " daily record ", and indicating mobile terminal is not needed to obtain its application function.Mobile terminal searches the application function matched with the application function in described list of application in its internal applications function, and indicates the application function that the application function in described mobile terminal locking and described list of application matches.The application function that its inside comprises is found according to application lock instruction indicating mobile terminal, then, the application function searched out is mated with the application function in list of application, obtains applying in the application function of mobile terminal the application function that the application function in the list of application of lock instruction matches.To unlock the application function locked in mobile terminal, then can application lock instruction be set again, further alternatively, the list of application of the application function that locked or the application function that occurs mobile terminal can be there is in the display interface of connection server, this list of application comprises the function of locking and the application function of non-locking, user only needs the application function to having locked to select, after determination operation, just can recover the application function locked, user just can apply the application function of locking in the past again.
See Fig. 4, it is the example structure schematic diagram of a kind of mobile terminal that the embodiment of the present invention provides.Mobile terminal described in the present embodiment, comprising:
Receiving element 401, for the antitheft operational order preset in the anti-theft tracking system that reception server sends.
Particularly, receiving element 401 receives the antitheft operational order preset in the anti-theft tracking system of server transmission, and completes corresponding operation according to this antitheft operational order indicating mobile terminal.Anti-theft tracking system accessible site, in the operating system of mobile terminal, is also installed by client-side program.If the anti-theft tracking system integration, in the operating system of mobile terminal, just cannot unload.
Feedback unit 402, for the described antitheft operational order that receives according to described receiving element to described server feedback tracked information, follows the trail of described mobile terminal according to described tracked information to make described server.
Particularly, when mobile terminal completes corresponding antitheft action according to antitheft operational order, tracked information is fed back to server by feedback unit 402.As when mobile terminal opens camera, the number information of its inner SIM card embedded is fed back to server by mobile terminal.
The antitheft operational order of the embodiment of the present invention by presetting in the anti-theft tracking system of receiving element 401 reception server transmission, feedback unit 402, is followed the trail of described mobile terminal according to described tracked information to server feedback tracked information to make described server according to described antitheft operational order.The embodiment of the present invention can be locked mobile terminal by unique identifying information, improves the successful probability of anti-theft tracking Dynamic System, enhances the defencive function of antitheft operation, is more conducive to the mobile terminal that user gives loss for change.
See the 3rd example structure schematic diagram of a kind of guarding against theft for mobile terminal follow-up mechanism that Fig. 5, Fig. 5 provide for the embodiment of the present invention.Terminal described in the present embodiment comprises: at least one input equipment 1000; At least one output equipment 2000; At least one processor 3000, such as CPU; With memory 4000, above-mentioned input equipment 1000, output equipment 2000, processor 3000 are connected by bus 5000 with memory 4000.
Wherein, above-mentioned input equipment 1000 specifically can be the display interface of server, display interface can be contact panel, common PC, liquid crystal display screen, touch screen etc., for the unique identification information that user is inputted from login interface by modes such as key-press input, touch-screen input, pointer inputs.
Above-mentioned output equipment 2000 specifically can be the display screen of terminal, for exporting, showing trace data (at least one in SIM card information, audio/video information or associated person information after geographical location information, replacing).
Above-mentioned memory 4000 can be high-speed RAM memory, also can be non-labile memory (non-volatile memory), such as magnetic disc store.Above-mentioned memory 4000 is for storing batch processing code, and above-mentioned input equipment 1000, output equipment 2000 and processor 3000, for calling the program code stored in memory 4000, perform and operate as follows:
Above-mentioned input equipment 1000, when user uses mobile terminal, arranges unique identification information.
Above-mentioned processor 3000, is sent to described mobile terminal by the antitheft operational order preset in described anti-theft tracking system, and indicates described mobile terminal to feed back its tracked information according to described antitheft operational order.
Above-mentioned output equipment 2000, exports tracked information and follows the trail of described mobile terminal.
In the execution mode that some are feasible, above-mentioned input equipment 1000 also specifically for:
When user input be IMEI time, IMEI is set to unique identification information.
In the execution mode that some are feasible, above-mentioned input equipment 1000 also specifically for:
When user input be the account associated with IMEI time, the account associated with IMEI is set to unique identification information, preserves described unique identification information simultaneously.
Above-mentioned processor 3000 also specifically for:
When input equipment obtain be data eliminate instruction time, indicate described mobile terminal to back up described data and eliminate the data eliminated described in instruction, and indicate described mobile terminal to delete described data to eliminate the data that instruction will eliminate.
In the implementation that some are feasible, above-mentioned processor 3000 also specifically for:
When input equipment obtain be image watermarking instruction time, indicate described in described mobile terminal locking and apply the application function that lock instruction asks for locking.
In the implementation that some are feasible, above-mentioned processor 3000 also specifically for:
The data indicating described mobile terminal to hide described image watermarking instruction will to hide.
In the execution mode that some are feasible, above-mentioned memory 4000 also specifically for:
When described mobile terminal opens camera, the number information of the SIM card in mobile terminal is sent to memory 4000.
In the implementation that some are feasible, the guarding against theft for mobile terminal follow-up mechanism described by Fig. 5 also specifically for:
Anti-theft tracking system accessible site is in the operating system of guarding against theft for mobile terminal follow-up mechanism.
In specific implementation, input equipment 1000 described in the embodiment of the present invention, output equipment 2000 and processor 3000 can perform the implementation described in Fig. 1 or Fig. 2 of the guarding against theft for mobile terminal method for tracing that the embodiment of the present invention provides, also can perform the implementation of the device described in Fig. 3 or Fig. 4 of the device that the embodiment of the present invention provides, not repeat them here.
Module in all embodiments of the present invention or submodule, universal integrated circuit can be passed through, such as CPU (Central Processing Unit, central processing unit), or realized by ASIC (Application SpecificIntegrated Circuit, application-specific integrated circuit (ASIC)).
Step in embodiment of the present invention method can be carried out order according to actual needs and be adjusted, merges and delete.
Unit in embodiment of the present invention device can carry out merging, divide and deleting according to actual needs.
One of ordinary skill in the art will appreciate that all or part of flow process realized in above-described embodiment method, that the hardware that can carry out instruction relevant by computer program has come, described program can be stored in a computer read/write memory medium, this program, when performing, can comprise the flow process of the embodiment as above-mentioned each side method.Wherein, described storage medium can be magnetic disc, CD, read-only store-memory body (Read-Only Memory, ROM) or random access memory (Random Access Memory is called for short RAM) etc.
Above disclosedly be only present pre-ferred embodiments, certainly can not limit the interest field of the present invention with this, therefore according to the equivalent variations that the claims in the present invention are done, still belong to the scope that the present invention is contained.
Claims (9)
1. a server, is characterized in that, comprising:
Transmitting element, for being sent to described mobile terminal according to unique identification information by the antitheft operational order preset in anti-theft tracking system;
Indicating member, is used to indicate described mobile terminal and feeds back its tracked information according to described antitheft operational order;
Tracing unit, for following the trail of described mobile terminal according to described tracked information.
2. server as claimed in claim 1, it is characterized in that, described antitheft operational order comprises: at least one in instruction, image watermarking instruction or application lock instruction is eliminated in anti-theft tracking instruction, data.
3. server as claimed in claim 1 or 2, it is characterized in that, described antitheft operational order is anti-theft tracking instruction;
Described indicating member specifically for:
Described mobile terminal is indicated to feed back its tracked information by described anti-theft tracking instruction;
Wherein, described tracked information comprises: at least one in SIM card information, audio/video information or associated person information after geographical location information, replacing.
4. server as claimed in claim 1, is characterized in that, the account that described unique identification information is mobile device international identity code IMEI or associates with described mobile device international identity code IMEI.
5. the server as described in claim 1 or 4, is characterized in that, described unique identification information has been inputted at server or mobile terminal by user, also comprises:
Setting unit, if for user input be mobile device international identity code IMEI, mobile device international identity code IMEI is set to unique identification information.
6. server as claimed in claim 5, is characterized in that, described setting unit also specifically for:
If user's input is the account associated with described mobile device international identity code IMEI, the account associated is set to unique identification information, preserves described unique identification information simultaneously with described mobile device international identity code IMEI.
7. a mobile terminal, is characterized in that, comprising:
Receiving element, for the antitheft operational order preset in the anti-theft tracking system that reception server sends;
Feedback unit, for the described antitheft operational order that receives according to described receiving element to described server feedback tracked information, follows the trail of described mobile terminal according to described tracked information to make described server.
8. mobile terminal as claimed in claim 7, is characterized in that, described feedback unit also specifically for:
When described mobile terminal opens camera, the number information of the SIM card in described mobile terminal is fed back to server.
9. mobile terminal as claimed in claim 7, it is characterized in that, the described anti-theft tracking system integration is in the operating system of described mobile terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410658438.9A CN104486745A (en) | 2014-11-18 | 2014-11-18 | Mobile terminal anti-theft tracking device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410658438.9A CN104486745A (en) | 2014-11-18 | 2014-11-18 | Mobile terminal anti-theft tracking device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104486745A true CN104486745A (en) | 2015-04-01 |
Family
ID=52761235
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410658438.9A Pending CN104486745A (en) | 2014-11-18 | 2014-11-18 | Mobile terminal anti-theft tracking device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104486745A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105721569A (en) * | 2016-02-03 | 2016-06-29 | 青岛海信移动通信技术股份有限公司 | Method, device and system for controlling mobile terminal |
CN106211070A (en) * | 2016-06-30 | 2016-12-07 | 维沃移动通信有限公司 | The anti-theft protection method of a kind of mobile terminal and mobile terminal |
CN106303990A (en) * | 2016-08-09 | 2017-01-04 | 深圳市金立通信设备有限公司 | A kind of theft preventing method and terminal |
CN106686196A (en) * | 2017-01-22 | 2017-05-17 | 济南浪潮高新科技投资发展有限公司 | Personal mobile phone safety management method |
CN107172298A (en) * | 2017-06-26 | 2017-09-15 | 广东欧珀移动通信有限公司 | Information processing method, device, computer equipment and computer-readable recording medium |
CN111885118A (en) * | 2020-07-03 | 2020-11-03 | 上海钧正网络科技有限公司 | Vehicle tracking method, vehicle tracking device, computer equipment and storage medium |
CN112202972A (en) * | 2020-09-30 | 2021-01-08 | 上海商米科技集团股份有限公司 | System and method for protecting terminal equipment |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101179851A (en) * | 2007-11-23 | 2008-05-14 | 深圳市赛格导航科技股份有限公司 | Positioning system and method of navigation mobile phone |
CN103347131A (en) * | 2013-07-05 | 2013-10-09 | 张�林 | Intelligent mobile phone anti-theft method and system |
CN103559433A (en) * | 2013-10-31 | 2014-02-05 | 北京奇虎科技有限公司 | Mobile terminal antitheft method and device |
CN103702318A (en) * | 2013-12-13 | 2014-04-02 | 北京奇虎科技有限公司 | Mobile terminal antitheft method and client |
-
2014
- 2014-11-18 CN CN201410658438.9A patent/CN104486745A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101179851A (en) * | 2007-11-23 | 2008-05-14 | 深圳市赛格导航科技股份有限公司 | Positioning system and method of navigation mobile phone |
CN103347131A (en) * | 2013-07-05 | 2013-10-09 | 张�林 | Intelligent mobile phone anti-theft method and system |
CN103559433A (en) * | 2013-10-31 | 2014-02-05 | 北京奇虎科技有限公司 | Mobile terminal antitheft method and device |
CN103702318A (en) * | 2013-12-13 | 2014-04-02 | 北京奇虎科技有限公司 | Mobile terminal antitheft method and client |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105721569A (en) * | 2016-02-03 | 2016-06-29 | 青岛海信移动通信技术股份有限公司 | Method, device and system for controlling mobile terminal |
CN106211070A (en) * | 2016-06-30 | 2016-12-07 | 维沃移动通信有限公司 | The anti-theft protection method of a kind of mobile terminal and mobile terminal |
CN106211070B (en) * | 2016-06-30 | 2019-08-20 | 维沃移动通信有限公司 | A kind of anti-theft protection method and mobile terminal of mobile terminal |
CN106303990A (en) * | 2016-08-09 | 2017-01-04 | 深圳市金立通信设备有限公司 | A kind of theft preventing method and terminal |
CN106686196A (en) * | 2017-01-22 | 2017-05-17 | 济南浪潮高新科技投资发展有限公司 | Personal mobile phone safety management method |
CN107172298A (en) * | 2017-06-26 | 2017-09-15 | 广东欧珀移动通信有限公司 | Information processing method, device, computer equipment and computer-readable recording medium |
CN107172298B (en) * | 2017-06-26 | 2020-05-26 | Oppo广东移动通信有限公司 | Information processing method, information processing device, computer equipment and computer readable storage medium |
CN111885118A (en) * | 2020-07-03 | 2020-11-03 | 上海钧正网络科技有限公司 | Vehicle tracking method, vehicle tracking device, computer equipment and storage medium |
CN112202972A (en) * | 2020-09-30 | 2021-01-08 | 上海商米科技集团股份有限公司 | System and method for protecting terminal equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104486482A (en) | Mobile terminal anti-theft tracking method | |
CN104486745A (en) | Mobile terminal anti-theft tracking device | |
CN104540123B (en) | The method and system of mobile terminal significant data encrypted backup and safety deleting | |
US9277391B2 (en) | Pairing method between bluetooth devices and bluetooth system using the same | |
EP3816909A1 (en) | Payment processing method for offline scenario, server, and readable storage medium | |
CN104144419A (en) | Identity authentication method, device and system | |
US20090251318A1 (en) | Anti-theft system of mobile device | |
EP2835997B1 (en) | Cell phone data encryption method and decryption method | |
CN107707746B (en) | Management method of mobile terminal, electronic device and storage medium | |
US9501923B2 (en) | Distress identifier to cause an action | |
CN105447357A (en) | Application processing method and terminal | |
CN103914520A (en) | Data query method, terminal equipment and server | |
CN104751086A (en) | Terminal anti-theft method | |
CN106599115B (en) | Data protection method, device and terminal | |
CN105224194A (en) | A kind of data processing method and terminal | |
CN103916471A (en) | Information display method and device | |
CN105678143A (en) | Methods and devices for setting and acquiring electronic business card | |
WO2010067263A2 (en) | A system for protection and backup of information in a mobile cell unit | |
CN106101193B (en) | Information backup method, terminal equipment, operator server and backup system | |
US20140109221A1 (en) | User device, method of using function lock of the same and computer-readable recording medium | |
CN104809385A (en) | Operation method of safety protection equipment, mobile terminal and safety protection equipment | |
CN105450604A (en) | Safe verifying method and device based on graphic feature | |
CN110837630B (en) | Login method, image processing method and electronic device | |
CN108989998A (en) | A kind of information processing method and device | |
CN106982418A (en) | A kind of anti-lost processing method of mobile terminal and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20150401 |