Embodiment
The present invention is further described in more detail below in conjunction with drawings and the specific embodiments.
The flow chart of the monitoring stolen mobile terminal that Fig. 1 provides for the embodiment of the invention, setting portable terminal A in the present embodiment is stolen mobile terminal, as shown in Figure 1, its concrete steps are as follows:
Step 101: the monitoring sign is set on portable terminal A.
The monitoring sign can be the number of password, monitoring portable terminal etc.For example: if certain user has two portable terminal A, B, can on portable terminal A, monitor the number that sign is set to portable terminal B, on portable terminal B, monitor sign and be set to the number of portable terminal A, thereby portable terminal A, B are bound the other side's monitor terminal mutually.
Step 102: the user finds that portable terminal A is stolen, starts the monitoring function of portable terminal B, and portable terminal B sends the monitoring starting command to portable terminal A, and the monitoring sign is carried in this order.
A monitoring function button can be set on portable terminal B, after the owner of lost property finds that portable terminal A is stolen, select or import the number of portable terminal A on portable terminal B, and click this monitoring function button, triggering mobile terminals B sends the monitoring starting command to portable terminal A.
The monitoring starting command can send with short message way.
Step 103: portable terminal A receives the monitoring starting command, judges whether the monitoring sign that this order carries is marking matched with the monitoring of self preserving, if, execution in step 105; Otherwise, execution in step 104.
Step 104: portable terminal A does not deal with, and this flow process finishes.
Step 105: portable terminal A enters monitored state.
After portable terminal A entered monitored state, portable terminal B just can send monitor command to portable terminal A, and monitor command is divided into following several situation usually:
Situation one, obtain the stolen mobile terminal number.
After portable terminal was stolen, stealer was communicated by letter with oneself for fear of the owner of lost property, the number that can change stolen mobile terminal usually as: change subscriber identification module (SIM, Subscriber Identity Module) card.If the owner of lost property can learn the number after the change, thereby communicates by letter with stealer, this can increase the possibility of recovering stolen mobile terminal greatly.
Situation two, obtain the owner of lost property's information on the stolen mobile terminal, and the owner of lost property's information on the damage stolen mobile terminal.
Preserved the owner of lost property's information such as phone directory, short message record, communications records on the stolen mobile terminal, the common all communication modes with household, friend of people are recorded on the portable terminal of oneself now, portable terminal is stolen makes troubles for the owner of lost property's life, work, therefore, after portable terminal is stolen, if the owner of lost property's information on the portable terminal can be sent to the owner of lost property, will greatly make things convenient for the owner of lost property's life, work.In addition, owner of lost property's information of preserving on the portable terminal not only relates to the owner of lost property's individual privacy, simultaneously also can be to stealer manufacturing personation owner of lost property identity extortion owner of lost property household, friend's chance, therefore, after portable terminal is stolen, if can in time damage the owner of lost property's information on the portable terminal, then will reduce greatly to the owner of lost property and to the owner of lost property's household, friend's infringement.
Situation three, obtain stolen mobile terminal place subdistrict position.
Portable terminal by with the communicating by letter of base station, can perception self place subdistrict position, if after portable terminal is stolen, can know the subdistrict position at stolen mobile terminal place, this will help tracking stealer such as the owner of lost property, public security organ and then track down this pilferage case.Especially when stealer is frequently committed a crime, help public security organ and dwindle the suspicion scope.
Situation four, obtain the information of the stealer on the stolen mobile terminal, comprising: phone directory, short message record and message registration.
After portable terminal is stolen, if the information that can get access to the stealer on the stolen mobile terminal is as phone directory, short message record and message registration, then can learn the household of stealer, friend's communication mode, the owner of lost property can palm off stealer and communicate by letter with household, the friend of stealer, the household, the friend that perhaps palm off stealer communicate by letter with stealer, can increase the possibility of recovering stolen mobile terminal greatly like this.
The communication process of situation five, intervention stealer.
After portable terminal is stolen, if communicating by letter with stealer, the owner of lost property usually can directly be refused, as if at stealer with his family, when friend communicates, get involved this communication process then also increasing the possibility of recovering stolen mobile terminal by stealer.
Situation six, refusal stealer use stolen mobile terminal to communicate.
After portable terminal is stolen, if stealer continue to use original number as: SIM card number etc. communicates, and then can bring economic loss to the owner of lost property; Mention simultaneously, also can bring inconvenience in life, the work etc. to the owner of lost property as situation two.If can be after finding that portable terminal is stolen, the refusal stealer uses stolen mobile terminal to communicate, and then can eliminate above-mentioned infringement.
At above-mentioned six kinds of situations, the present invention provides corresponding solution.
In following each embodiment, with embodiment illustrated in fig. 1 corresponding, setting portable terminal A is stolen mobile terminal, and portable terminal B is a monitor terminal.
After the stolen mobile terminal that Fig. 2 provides for the embodiment of the invention entered monitored state, monitor terminal obtained the flow chart of the number of stolen mobile terminal, and as shown in Figure 2, its concrete steps are as follows:
Step 201: portable terminal A enters monitored state, the number that detects self take place change as: SIM card is replaced, and the number after the change is sent to portable terminal B.
Step 202: portable terminal B receives the number of portable terminal A, uses this number to communicate by letter with portable terminal A.
After the stolen mobile terminal that Fig. 3 provides for the embodiment of the invention entered monitored state, monitor terminal obtained the flow chart of the owner of lost property's information on the stolen mobile terminal, and as shown in Figure 2, its concrete steps are as follows:
Step 301: portable terminal A enters monitored state, and mobile terminal receive B sends obtains owner of lost property's message command, and owner of lost property's information such as the owner of lost property's of self storage phone directory, short message record, communications records are sent to portable terminal B.
Step 302: portable terminal A receives the deletion owner of lost property message command that portable terminal B sends, and owner of lost property's information that self is preserved is as contents such as phone directory, short message record, message registration deletions.
After the stolen mobile terminal that Fig. 4 provides for the embodiment of the invention entered monitored state, monitor terminal obtained the flow chart of stolen mobile terminal place subdistrict position, and as shown in Figure 4, its concrete steps are as follows:
Step 401: portable terminal A enters monitored state, and mobile terminal receive B sends obtains the subdistrict position order.
Step 402: portable terminal A sends to portable terminal B with current self place location information of cell.
After the stolen mobile terminal that Fig. 5 provides for the embodiment of the invention entered monitored state, monitor terminal obtained the flow chart of the information of stealer, and as shown in Figure 5, its concrete steps are as follows:
Step 501: portable terminal A enters monitored state, and mobile terminal receive B sends obtains the stealer message command.
Step 502: portable terminal A with self the storage stealer information as: contents such as phone directory, short message record, message registration send to portable terminal B.
Portable terminal A can issue portable terminal B with telephone directory information, short message record, the communications records of receiving after the monitoring starting command that portable terminal B sends certainly or stealer is changed after the SIM card.
Step 503: portable terminal B receives the information of stealer, and this information is presented on the screen.
Step 504: the owner of lost property selects the household of a stealer or friend's number according to the information of stealer, communicates by letter with the household or the friend of stealer by this number.
Step 505: the owner of lost property is according to the information of stealer, select the household of a stealer or friend's number, on portable terminal B, select or import this number, portable terminal B sends the order of personation short message to portable terminal A, and the household or the friend's of selected stealer number and content of short message carried in this order.
Step 506: portable terminal A receives the order of personation short message, content of short message in this order is presented on the screen, and the household of the stealer in will ordering or friend's number, are sent for oneself friend or household so that stealer is thought this short message by mistake on screen as caller ID display.
After the stolen mobile terminal that Fig. 6 provides for the embodiment of the invention entered monitored state, monitor terminal was got involved the flow chart of the communication process of stealer, and as shown in Figure 6, its concrete steps are as follows:
Step 601: portable terminal A enters monitored state, and the communication that mobile terminal receive B sends gets involved order.
Short message sign or conversation sign can be further carried in this order, get involved the short message communication process with indication and still get involved communication process.In the present embodiment, set communication intervention order and do not carry the short message sign, also do not carry the i.e. expression of conversation sign and get involved short message and communication process simultaneously.
Perhaps, communication intervention order can be divided into short message and get involved order and conversation intervention order, the former represents to get involved the short message process, and the latter represents to get involved communication process.
Step 602: portable terminal A detects stealer and imports short message to self, then when sending SMS message, the number of portable terminal B is added the destination Mobile Station International ISDN Number field of short message, short message is sent to portable terminal B.
Step 603: portable terminal A detects stealer and is dialing calledly, then when sending message related to calls, the number of portable terminal B is added the destination Mobile Station International ISDN Number field of message related to calls, message related to calls is sent to portable terminal B.
Step 604: portable terminal A detects stealer and called 's call through, then dialog context is transferred to portable terminal B.
At this moment, the owner of lost property not only can listen to stealer and called dialog context, simultaneously, and also can be directly and the stealer conversation.
After the stolen mobile terminal that Fig. 7 provides for the embodiment of the invention enters monitored state, make the flow chart that stolen mobile terminal stops to communicate by letter, as shown in Figure 7, its concrete steps are as follows:
Step 701: portable terminal A enters monitored state, and the kayser rigid order that mobile terminal receive B sends is set at locking state with self SIM card.
Step 702: the shutdown command that portable terminal A mobile terminal receive B sends enters closed condition.
It is to be noted, in Fig. 2~7 illustrated embodiments, after portable terminal A enters monitored state, all interacting messages that portable terminal A and portable terminal B carry out, on portable terminal A, do not show, portable terminal A does not store yet, and awares to avoid stealer that self has been monitored.
The structural representation of the portable terminal that Fig. 8 provides for the embodiment of the invention, as shown in Figure 8, it mainly comprises: monitoring sign memory module 81, monitored startup module 82 and monitored administration module 83, wherein:
Monitoring sign memory module 81: be used for storage monitoring sign.
Monitored startup module 82: receive the monitoring starting command that monitor terminal is sent, judge whether the monitoring sign in this order is marking matched with the monitoring of monitoring in the sign memory module 81, if enter monitored state indication to monitored administration module 83 transmissions.
Monitored administration module 83: receive the monitored state indication that enters that monitored startup module 82 sends, begin to accept the monitoring of monitor terminal.
In actual applications, monitored administration module 83 can be by following several frame modes of forming:
Structure one, form by number monitoring module 001 and monitored message transmission module 002, wherein:
Number monitoring module 001: be used to receive monitoring and start the monitored state indication that enters that module 82 sends, number management module 003 on this portable terminal sends the number change and reports order, number after the change that receiving number administration module 003 is sent, the number after monitored message transmission module 002 sends this change.
Monitored message transmission module 002: the number after the change that receiving number monitoring module 001 is sent sends to monitor terminal with this number.
Here, number management module 003 is the original function module on this portable terminal, receiving after number that number monitoring module 001 sends replaces with the order of reporting on one's mission, to change if detect the number of this portable terminal, the number after then will changing reports number monitoring module 001.
Structure two, form by owner of lost property's information monitoring module 011 and monitored message transmission module 012, wherein:
Owner of lost property's information monitoring module 011: the monitored state that enters that reception monitoring startup module 82 is sent is indicated, what receive that monitor terminal sends obtains owner of lost property's message command, from owner of lost property's information storage module 013 of this portable terminal, obtain owner of lost property's information, owner of lost property's information is sent to monitored message transmission module 012.
Monitored message transmission module 012: receive owner of lost property's information that owner of lost property's information monitoring module 011 is sent, owner of lost property's information is sent to monitor terminal.
Here, owner of lost property's information storage module 013 is the original function module on this portable terminal, and the information of preserving the owner of lost property is as telephone directory information, short message record, message registration etc.
In this structure, can also comprise personation short message processing module 014 in the monitored administration module 83: be used to receive the personation short message order that monitor terminal is sent, content of short message in this order is presented on the screen of this portable terminal, with the mobile terminal number of personation in the order as caller ID display on the screen of this portable terminal.
Structure three, form by owner of lost property's information deletion module 021, wherein:
Owner of lost property's information deletion module 021: be used to receive monitoring and start the monitored state indication that enters that module 82 sends, receive the deletion owner of lost property message command that monitor terminal is sent, send delete command to owner of lost property's information storage module 013 of this portable terminal.
Identical in owner of lost property's information storage module 013 in this structure and the structure two, and after receiving the delete command that owner of lost property's information deletion module 021 is sent deleted owner of lost property's information of self storage.
Structure four, form by subdistrict position monitoring module 031 and monitored message transmission module 032, wherein:
Subdistrict position monitoring module 031: receive monitoring and start the monitored state indication that enters that module 82 sends, what receive that monitor terminal sends obtains the subdistrict position order, and the location information of cell at this portable terminal place is sent to monitored message transmission module 032.
Monitored message transmission module 032: the location information of cell at this portable terminal place that reception subdistrict position monitoring module 031 is sent sends to monitor terminal with this location information of cell.
Structure five, get involved module 041 by short message and form, wherein:
Short message is got involved module 041: receive monitoring and start the monitored state indication 82 that enters that module sends, receive the short message that monitor terminal sends and get involved order, send the monitored order of carrying the monitor terminal number to the short message module 042 of this portable terminal.
Here, short message module 042 is the original function module of this portable terminal, and, receiving after short message gets involved the monitored order of carrying the monitor terminal number that module 041 sends, self there is short message to be about to send if detect, then the number with monitor terminal adds in the destination Mobile Station International ISDN Number of short message, so that short message is sent to monitor terminal.
Structure six, get involved module 051 by conversation and form, wherein:
Conversation gets involved module 051: receive monitoring and start the monitored state indication that enters that module 82 sends, receive the conversation that monitor terminal sends and get involved order, send the monitored order of carrying the monitor terminal number to the conversation module 052 of this portable terminal.
Here, conversation module 052 is the original function module of this portable terminal, and, receiving after conversation gets involved the monitored order of carrying the monitor terminal number that module 051 sends, if detecting this mobile phone users is dialing called number, then the number with monitor terminal adds in the destination Mobile Station International ISDN Number of message related to calls, so that message related to calls is sent to monitor terminal, and behind call through, this mobile phone users and called dialog context are transferred to monitor terminal.
Structure seven, form by SIM card monitoring module 061, wherein:
SIM card monitoring module 061: be used to receive monitoring and start the monitored state indication that enters that module 82 sends, receive the kayser rigid order that monitor terminal is sent, send locked order to the SIM card control module 062 of this portable terminal.
Here, SIM card control module 062 is the original function module of this portable terminal, and, after receiving the locked order that SIM card monitoring module 061 sends, be locked with the setting state of SIM card.
Structure eight, form by monitoring switch module 071, wherein:
Monitoring switch module 071: be used to receive monitoring and start the monitored state indication that enters that module 82 sends, receive the shutdown command that monitor terminal is sent, send shutdown command to the startup module 072 of this portable terminal.
Here, starting module 072 is the original function module of this portable terminal, and, after receiving the shutdown command that monitoring switch module 071 sends, close this portable terminal.
In actual applications, monitored administration module 83 can be made of in above-mentioned eight kinds of frame modes any one, also can be by any several the constituting in above-mentioned eight kinds of frame modes.
The monitor terminal of mentioning among the present invention can for portable terminal, personal computer (PC, PersonalComputer) etc.
The above only is process of the present invention and method embodiment, in order to restriction the present invention, all any modifications of being made within the spirit and principles in the present invention, is not equal to replacement, improvement etc., all should be included within protection scope of the present invention.